query_id
stringlengths
32
32
query
stringlengths
7
4.32k
positive_passages
listlengths
1
1
negative_passages
listlengths
88
101
f2483fb56cecb4e66820dc416d6ddd12
FormatURLParam convert map into a url.Values
[ { "docid": "1d7b7a636813ebe5c7f7b42ed5d7e74e", "score": "0.75319535", "text": "func FormatURLParam(m map[string]interface{}) (urlParam string) {\n\tv := url.Values{}\n\tfor key, value := range m {\n\t\tv.Add(key, value.(string))\n\t}\n\treturn v.Encode()\n}", "title": "" } ]
[ { "docid": "31ad1eec6edf20f1718160e8a2e34752", "score": "0.70094407", "text": "func convertToURLValue(tagName string, param interface{}) url.Values {\n\tresult := url.Values{}\n\tconvertTo(tagName, param, &result, func(result interface{}, key string, value interface{}) {\n\t\tr := result.(*url.Values)\n\t\tr.Add(key, fmt.Sprint(value))\n\t})\n\treturn result\n}", "title": "" }, { "docid": "2bce808520da1e598cc9c4799c90d56d", "score": "0.7003077", "text": "func MapToQueryParams(m map[string]string) url.Values {\n\tparams := url.Values{}\n\tfor key, value := range m {\n\t\tparams.Add(key, value)\n\t}\n\treturn params\n}", "title": "" }, { "docid": "6257ea28eb77ac665b1e2955c15e05e1", "score": "0.6929687", "text": "func MapToURLEncodedString(valMap map[string]string) (encodedData string) {\n\tdata := url.Values{}\n\tfor k, v := range valMap {\n\t\tdata.Set(k, v)\n\t}\n\tencodedData = data.Encode()\n\treturn\n}", "title": "" }, { "docid": "f7a54a7a69fd31fa2c4b7aca5d744c07", "score": "0.6836493", "text": "func queryValues(m map[string]string) *url.Values {\n r := make(url.Values)\n for k, v := range m {\n r.Add(k, v)\n }\n return &r\n}", "title": "" }, { "docid": "8c9da8ee3f0c4927d1ac8951a542428f", "score": "0.67314017", "text": "func joinUrlParams(m map[string]string) string {\n\t// sort the params\n\tkeys := make([]string, 0, len(m))\n\tfor k, _ := range m {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Strings(keys)\n\n\tb := bytes.Buffer{}\n\tfor _, v := range keys {\n\t\tif !strings.EqualFold(signParamName, v) {\n\t\t\tb.WriteString(fmt.Sprintf(\"%s=%s&\", v, m[v]))\n\t\t}\n\t}\n\treturn b.String()\n}", "title": "" }, { "docid": "7ad60d4074edcc31ec1de9bf88310381", "score": "0.6491418", "text": "func paramsToMap(urlParams string) map[string]string {\n\tresult := make(map[string]string)\n\tparams := strings.Split(urlParams, \"&\")\n\n\tfor _, value := range params {\n\t\tvalue, _ := url.PathUnescape(value)\n\t\tsplit := strings.Split(value, \"=\")\n\t\tif len(split) == 2 {\n\t\t\tresult[split[0]] = split[1]\n\t\t} else {\n\t\t\tresult[\"filter\"] = value[7:]\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "d3956d10df137ecca23a1d085b1bab45", "score": "0.6481985", "text": "func extractParams(p url.Values) Params {\n\tparams := Params{}\n\tfor k, l := range p {\n\t\tfor _, v := range l {\n\t\t\tparams[k] = v\n\t\t}\n\t}\n\treturn params\n}", "title": "" }, { "docid": "04fa718aca24a192313bc6e2fad02c2e", "score": "0.62578046", "text": "func addURLParams(baseUrl string, keysAndValues ...interface{}) string {\n\tu, err := url.Parse(baseUrl)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"unable to parse url %s: %v\", baseUrl, err))\n\t}\n\n\tif (len(keysAndValues) % 2) != 0 {\n\t\tpanic(\"odd number of key value pairs\")\n\t}\n\n\tq := u.Query()\n\tfor i := 0; i < len(keysAndValues); i = i + 2 {\n\t\tkey := fmt.Sprintf(\"%v\", keysAndValues[i])\n\t\tvalue := fmt.Sprintf(\"%v\", keysAndValues[i+1])\n\n\t\tq.Set(key, value)\n\t}\n\n\tu.RawQuery = q.Encode()\n\treturn u.String()\n}", "title": "" }, { "docid": "26df32e8ed96b5e3809285036c3fbba2", "score": "0.6254728", "text": "func URLValuesToMap(values url.Values) map[string]string {\n\tr := make(map[string]string)\n\tfor k, v := range values {\n\t\tif v != nil && len(v) != 0 {\n\t\t\tr[k] = v[0]\n\t\t}\n\t}\n\treturn r\n}", "title": "" }, { "docid": "9acaecb3d59fc8e9b99115c1bc254010", "score": "0.6213086", "text": "func mergedDelimitedUrlParams(r *http.Request, key string) (values []string) {\n\tfor _, str := range r.URL.Query()[key] {\n\t\tfor _, value := range strings.Split(str, \",\") {\n\t\t\tvalues = append(values, value)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "e039da678094f628d9755edbe4c97568", "score": "0.61423844", "text": "func buildParamStr(params map[string]string) string {\n params[\"oauth_nonce\"] = GetRandomB64(32)\n params[\"oauth_timestamp\"] = GetUnixTimestamp()\n\n percentMap := make(map[string]string)\n for k, v := range params {\n percentKey := PercentEncode(k)\n percentVal := PercentEncode(v)\n percentMap[percentKey] = percentVal\n }\n\n paramStr := \"\"\n sortedKeys := GetSortedKeys(percentMap)\n n := len(sortedKeys)\n for i, k := range sortedKeys {\n paramStr += k + \"=\" + percentMap[k]\n if i < n - 1 {\n paramStr += \"&\"\n }\n i++\n }\n\n return paramStr\n}", "title": "" }, { "docid": "27b962f094a5d6cd8d736b3ca6ed7c1e", "score": "0.606638", "text": "func (vs Values) UrlValues() url.Values {\n\tq := url.Values{}\n\tfor k, v := range vs {\n\t\tq[k] = []string{v}\n\t}\n\treturn q\n}", "title": "" }, { "docid": "b9d88d859414211f9e706c2ab12c42ce", "score": "0.60599697", "text": "func structToMap(i interface{}) (values url.Values) {\n\tvalues = url.Values{}\n\tiVal := reflect.ValueOf(i).Elem()\n\ttyp := iVal.Type()\n\tfor i := 0; i < iVal.NumField(); i++ {\n\t\tf := iVal.Field(i)\n\t\t// You ca use tags here...\n\t\t// tag := typ.Field(i).Tag.Get(\"tagname\")\n\t\t// Convert each type into a string for the url.Values string map\n\t\tvar v string\n\t\tswitch f.Interface().(type) {\n\t\tcase int, int8, int16, int32, int64:\n\t\t\tv = strconv.FormatInt(f.Int(), 10)\n\t\tcase uint, uint8, uint16, uint32, uint64:\n\t\t\tv = strconv.FormatUint(f.Uint(), 10)\n\t\tcase float32:\n\t\t\tv = strconv.FormatFloat(f.Float(), 'f', 4, 32)\n\t\tcase float64:\n\t\t\tv = strconv.FormatFloat(f.Float(), 'f', 4, 64)\n\t\tcase []byte:\n\t\t\tv = string(f.Bytes())\n\t\tcase string:\n\t\t\tv = f.String()\n\t\t}\n\t\t//values.Set(strings.ToLower(typ.Field(i).Name), v)\n\t\tvalues.Set(LcFirst(typ.Field(i).Name), v)\n\t}\n\treturn\n}", "title": "" }, { "docid": "be4914b30b5c20492b7d0f9f8fa89865", "score": "0.60582894", "text": "func paramsToMap(r *plugin.CodeGeneratorRequest) map[string]string {\n\titems := strings.Split(r.GetParameter(), \",\")\n\tparams := make(map[string]string, len(items))\n\n\tfor _, p := range items {\n\t\tparts := strings.Split(p, \"=\")\n\t\tvar value string\n\t\tif len(parts) > 1 {\n\t\t\tvalue = strings.TrimSpace(parts[1])\n\t\t}\n\t\tparams[strings.TrimSpace(parts[0])] = value\n\t}\n\treturn params\n}", "title": "" }, { "docid": "8c2c1fecdb3138207f7b62a8a7a8a6da", "score": "0.5973994", "text": "func customEncode(v url.Values) string {\n\tif v == nil {\n\t\treturn \"\"\n\t}\n\tvar buf bytes.Buffer\n\tkeys := make([]string, 0, len(v))\n\tfor k := range v {\n\t\tkeys = append(keys, k)\n\t}\n\tfor _, k := range keys {\n\t\tvs := v[k]\n\t\tprefix := url.QueryEscape(k) + \"=\"\n\t\tfor _, v := range vs {\n\t\t\tif buf.Len() > 0 {\n\t\t\t\tbuf.WriteByte('&')\n\t\t\t}\n\t\t\tbuf.WriteString(prefix)\n\t\t\tbuf.WriteString(url.QueryEscape(v))\n\t\t}\n\t}\n\treturn buf.String()\n}", "title": "" }, { "docid": "8c37aafececcd21c9b8bb2d9d4429d74", "score": "0.59726", "text": "func (this *DynMap) urlEncode(vals *url.Values, key string, value interface{}) error {\n\n\tif IsDynMapConvertable(value) {\n\t\tmp, ok := ToDynMap(value)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"Unable to convert %s\", mp)\n\t\t}\n\t\tfor k, v := range mp.Map {\n\t\t\t//encode in rails style key[key2]=value\n\t\t\tthis.urlEncode(vals, fmt.Sprintf(\"%s[%s]\", key, k), v)\n\t\t}\n\t\treturn nil\n\t}\n\tr := reflect.ValueOf(value)\n\t//now test if it is an array\n\tif r.Kind() == reflect.Array || r.Kind() == reflect.Slice {\n\t\tfor i := 0; i < r.Len(); i++ {\n\t\t\tthis.urlEncode(vals, key, r.Index(i).Interface())\n\t\t}\n\t}\n\n\tvals.Add(key, ToString(value))\n\treturn nil\n}", "title": "" }, { "docid": "789e49c22ffbf8e14e34f0147241392a", "score": "0.59631056", "text": "func addParamsToValues(params interface{}, values *url.Values) {\n\tvar val string\n\n\tfor name, mtype := range attributes(params) {\n\t\tswitch mtype.Name() {\n\t\tcase \"string\":\n\t\t\tval = getString(params, name)\n\t\tcase \"int\":\n\t\t\tval = getInt(params, name)\n\t\tcase \"float64\":\n\t\t\tval = getFloat64(params, name)\n\t\tcase \"bool\":\n\t\t\tval = getBool(params, name)\n\t\t}\n\n\t\tif val != \"\" {\n\t\t\tvalues.Add(getTag(params, \"stripe_field\", name), val)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "eb37ca585e55f2faecb2773f94378967", "score": "0.5950167", "text": "func MakeURLValues(v interface{}) (url.Values, error) {\n\tvalues := make(url.Values)\n\n\tvalElem := reflect.ValueOf(v).Elem()\n\ttypElem := reflect.TypeOf(v).Elem()\n\n\tfor i := 0; i < typElem.NumField(); i++ {\n\t\tfield := typElem.Field(i)\n\t\turlTag := field.Tag.Get(\"url\")\n\t\tif urlTag == \"\" || urlTag == \"-\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tfieldValue := valElem.Field(i)\n\n\t\tstringer, ok := fieldValue.Interface().(fmt.Stringer)\n\t\tif ok {\n\t\t\tvalues.Set(urlTag, stringer.String())\n\t\t\tcontinue\n\t\t}\n\n\t\tk := fieldValue.Kind()\n\t\tvar s string\n\t\tswitch k {\n\t\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32,\n\t\t\treflect.Int64:\n\t\t\ts = strconv.FormatInt(fieldValue.Int(), 10)\n\t\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32,\n\t\t\treflect.Uint64:\n\t\t\ts = strconv.FormatUint(fieldValue.Uint(), 10)\n\t\tcase reflect.Float32:\n\t\t\ts = strconv.FormatFloat(fieldValue.Float(), 'f', 4, 32)\n\t\tcase reflect.Float64:\n\t\t\ts = strconv.FormatFloat(fieldValue.Float(), 'f', 4, 64)\n\t\tcase reflect.Slice:\n\t\t\tif field.Type.Elem().Kind() == reflect.Uint8 {\n\t\t\t\ts = string(fieldValue.Bytes())\n\t\t\t}\n\t\tcase reflect.String:\n\t\t\ts = fieldValue.String()\n\t\tcase reflect.Bool:\n\t\t\ts = fmt.Sprintf(\"%v\", fieldValue.Bool())\n\t\t}\n\t\tvalues.Set(urlTag, s)\n\t}\n\n\treturn values, nil\n}", "title": "" }, { "docid": "6265a120043b4deb0044ae32a26f7969", "score": "0.59405416", "text": "func makeQueryStringFromParam(params map[string][]string) string {\n\tif params == nil {\n\t\treturn \"\"\n\t}\n\tresult := \"\"\n\tfor key, array := range params {\n\t\tfor _, value := range array {\n\t\t\tkeyVal := fmt.Sprintf(\"%s-%s\", key, value)\n\t\t\tif result == \"\" {\n\t\t\t\tresult = \"?\" + keyVal\n\t\t\t} else {\n\t\t\t\tresult = result + \"&\" + keyVal\n\t\t\t}\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "dad363d516b1d680851044927754af2f", "score": "0.59328806", "text": "func canonicalizedFromMap(params map[string]string) string {\n\tkeys := make([]string, len(params))\n\ti := 0\n\tfor k := range params {\n\t\tkeys[i] = k\n\t\ti++\n\t}\n\tsort.Strings(keys)\n\tsign := \"\"\n\tfor _, v := range keys {\n\t\tsign += SEPARATOR + PercentEncode(v) + \"=\" + PercentEncode(params[v])\n\t}\n\tsign = PercentEncode(sign[1:])\n\treturn sign\n}", "title": "" }, { "docid": "dace25d408050dee5268baa65893ee2b", "score": "0.59070575", "text": "func EncodeMapParams(m map[string]interface{}) string {\n\tvar (\n\t\tbuf strings.Builder\n\t\tkeys []string\n\t)\n\tfor k := range m {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Strings(keys)\n\tfor _, k := range keys {\n\t\tif v, err := GetMapValueByKey(m, k); err == nil {\n\t\t\tbuf.WriteString(k)\n\t\t\tbuf.WriteByte('=')\n\t\t\tbuf.WriteString(v)\n\t\t\tbuf.WriteByte('&')\n\t\t}\n\t}\n\tif buf.Len() <= 0 {\n\t\treturn \"\"\n\t}\n\treturn buf.String()[:buf.Len()-1]\n}", "title": "" }, { "docid": "e3ee57693663ab31e76a38463179e394", "score": "0.5905389", "text": "func addParams(u *url.URL, params map[string]string) string {\n\tq, _ := url.ParseQuery(u.RawQuery)\n\n\tfor k, v := range params {\n\t\tq.Add(k, v)\n\t}\n\n\tu.RawQuery = q.Encode()\n\treturn u.String()\n}", "title": "" }, { "docid": "7835decf683cd358840b9ee19ff8d4da", "score": "0.5897507", "text": "func Map2UrlQueryBySort(mapParams map[string]string) string {\n\tvar keys []string\n\tfor key := range mapParams {\n\t\tkeys = append(keys, key)\n\t}\n\tsort.Strings(keys)\n\n\tvar strParams string\n\tfor _, key := range keys {\n\t\tstrParams += key + \"=\" + mapParams[key] + \"&\"\n\t}\n\n\t// remove \"&\" at the end of line\n\tif len(strParams) > 0 {\n\t\tstrParams = string([]rune(strParams)[:len(strParams)-1])\n\t}\n\n\treturn strParams\n}", "title": "" }, { "docid": "c82622d3c4a8f65739cfef20d58c981b", "score": "0.58792484", "text": "func parseUrlArgs(urlArgs url.Values) (map[string]string, error) {\n\tflatUrlArgs := make(map[string]string)\n\n\tfor key, value := range urlArgs {\n\t\tif len(value) != 1 {\n\t\t\treturn nil, errors.New(\"Url arguments must have exactly one value per key: Duplicates and empty values are not allowed\")\n\t\t}\n\n\t\tflatUrlArgs[key] = value[0]\n\t}\n\n\treturn flatUrlArgs, nil\n}", "title": "" }, { "docid": "6d6c7be2202f7b675c7cbedb823050f7", "score": "0.5875138", "text": "func getQueryParams(v interface{}, vals url.Values) error {\n\t// normalize all query string key/values\n\targs := make(map[string]string)\n\n\tfor k, v := range vals {\n\t\tif len(v) > 0 {\n\t\t\targs[k] = v[0]\n\t\t}\n\t}\n\n\tbytes, err := json.Marshal(args)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn json.Unmarshal(bytes, v)\n}", "title": "" }, { "docid": "86e80017612704a04764cd99961c5726", "score": "0.5851099", "text": "func getQueryParams(v interface{}, vals url.Values) error {\n\t// normalize all query string key/values\n\targs := make(map[string]string)\n\tfor k, v := range vals {\n\t\tif len(v) > 0 {\n\t\t\targs[k] = v[0]\n\t\t}\n\t}\n\n\tbytes, err := json.Marshal(args)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn json.Unmarshal(bytes, v)\n}", "title": "" }, { "docid": "b90df7b0faf94803bf5c6c7fc93c622d", "score": "0.5841208", "text": "func encodeParamsSorted(params url.Values) string {\n\tif params == nil {\n\t\treturn \"\"\n\t}\n\n\tvar keys []string\n\tfor k := range params {\n\t\tkeys = append(keys, k)\n\t}\n\n\tsort.Strings(keys)\n\n\tresult := bytes.Buffer{}\n\tfor i, k := range keys {\n\t\t// NOTE: Do not query escape these params, the string used for signing\n\t\t// must not have encoded params\n\t\tresult.WriteString(k)\n\t\tresult.WriteString(\"=\")\n\t\tresult.WriteString(params.Get(k))\n\n\t\tif i != len(keys)-1 {\n\t\t\tresult.WriteString(\"&\")\n\t\t}\n\t}\n\n\treturn result.String()\n}", "title": "" }, { "docid": "2df1ab03049e8b79a2da7084c60bdddf", "score": "0.5804108", "text": "func queryToParams(input string) (url.Values, error) {\n\tinput = strings.TrimPrefix(input, \"/\")\n\tinput = strings.TrimPrefix(input, \"?\")\n\treturn url.ParseQuery(input)\n}", "title": "" }, { "docid": "48bb9a1a5bdf966f7b06064b56a8db74", "score": "0.58039445", "text": "func (u *URL) parseParams(params QueryMap) {\n\tvar queryString string\n\tfor key, value := range params {\n\t\tif v, ok := value.([]interface{}); ok {\n\t\t\tfor _, val := range v {\n\t\t\t\tqueryString += fmt.Sprintf(\"&%s[]=%v\", key, val)\n\t\t\t}\n\t\t} else {\n\t\t\tqueryString += fmt.Sprintf(\"&%s=%v\", key, value)\n\t\t}\n\t}\n\n\tu.Query = strings.TrimLeft(queryString, \"&\")\n}", "title": "" }, { "docid": "fe4a657ddd638f377eaf0c8a620819d0", "score": "0.57599396", "text": "func (app *adapter) PeerToURLValues(peer Peer) url.Values {\n\tvalues := url.Values{}\n\tvalues.Add(\"peer\", peer.String())\n\treturn values\n}", "title": "" }, { "docid": "535de44f4d0436330c8721d5ac55a8a1", "score": "0.5750012", "text": "func ParseToStr(mp map[string]string) string {\n\tvalues := \"\"\n\tfor key, val := range mp {\n\t\tvalues += \"&\" + key + \"=\" + val\n\t}\n\ttemp := values[1:]\n\tvalues = \"?\" + temp\n\treturn values\n}", "title": "" }, { "docid": "f4db01bf3bbd25a9c0bf7a7b4683ef75", "score": "0.5734138", "text": "func URLWithPathParams(base string, path string, params map[string]interface{}) (u *url.URL) {\n\n\tu, err := url.Parse(base)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tif len(path) > 0 {\n\t\tu, err = u.Parse(path)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t}\n\n\tq := u.Query()\n\n\tfor k, v := range params {\n\t\tval := reflect.ValueOf(v)\n\n\t\tswitch val.Kind() {\n\t\tcase reflect.Slice:\n\t\t\tif val.IsNil() { // TODO: add an option to ignore empty values\n\t\t\t\tq.Set(k, \"\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfallthrough\n\n\t\tcase reflect.Array:\n\t\t\tfor i := 0; i < val.Len(); i++ {\n\t\t\t\tav := val.Index(i)\n\n\t\t\t\tif canStringify(av) {\n\t\t\t\t\tq.Add(k, fmt.Sprintf(\"%v\", av))\n\t\t\t\t}\n\t\t\t}\n\n\t\tdefault:\n\t\t\tif canStringify(val) {\n\t\t\t\tq.Set(k, fmt.Sprintf(\"%v\", v))\n\t\t\t} else {\n\t\t\t\tlog.Fatal(\"Invalid type \", val)\n\t\t\t}\n\t\t}\n\t}\n\n\tu.RawQuery = q.Encode()\n\treturn u\n}", "title": "" }, { "docid": "abbe0d02b3d1624aafcb9b34e132fd5c", "score": "0.57013357", "text": "func AssembleParams(form form.Values) (map[string]interface{}, error) {\n\tparams := make(map[string]interface{})\n\n\tfor _, pair := range form {\n\t\tkey := pair[0]\n\t\tvalue := pair[1]\n\n\t\tkeyParts := parseKey(key)\n\n\t\tif len(keyParts) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\trawkeyPart := keyParts[0]\n\t\tif rawkeyPart.KeyType() != keyTypeRaw {\n\t\t\treturn nil, fmt.Errorf(`invalid key \"%v\": keys must start with a name`, key)\n\t\t}\n\n\t\tpairParams, err := buildParamStructure(rawkeyPart.Content(), keyParts[1:], value)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t//fmt.Printf(\"new params = %+v\\n\", pairParams)\n\t\tmergeMapsRecursive(params, pairParams)\n\t\t//fmt.Printf(\"merge result = %+v\\n\\n\", params)\n\t}\n\n\treturn params, nil\n}", "title": "" }, { "docid": "9e5da9ad0b5e3ed10b8de5ca0b7fa048", "score": "0.5677144", "text": "func (f TaskEffort) EncodeValues(key string, v *url.Values) error {\n\treturn jsonAsURLParams(f, key, v)\n}", "title": "" }, { "docid": "d1ac8732b4b25dc2374c4e33e09ca11a", "score": "0.5670943", "text": "func ToQueryString(param map[string]string) string {\n\tvar args string\n\tfor k, v := range param {\n\t\tif args == \"\" {\n\t\t\targs += fmt.Sprintf(\"?%s=%s\", k, v)\n\t\t} else {\n\t\t\targs += fmt.Sprintf(\"&%s=%s\", k, v)\n\t\t}\n\t}\n\n\treturn args\n}", "title": "" }, { "docid": "d1ac8732b4b25dc2374c4e33e09ca11a", "score": "0.5670943", "text": "func ToQueryString(param map[string]string) string {\n\tvar args string\n\tfor k, v := range param {\n\t\tif args == \"\" {\n\t\t\targs += fmt.Sprintf(\"?%s=%s\", k, v)\n\t\t} else {\n\t\t\targs += fmt.Sprintf(\"&%s=%s\", k, v)\n\t\t}\n\t}\n\n\treturn args\n}", "title": "" }, { "docid": "517b7467e3f941b5ca6cf3b1febc2347", "score": "0.56691366", "text": "func ParamsRender(params map[string]string) string {\n\tparts := make([]string, 0, len(params))\n\tfor key, val := range params {\n\t\tparts = append(parts, fmt.Sprintf(\"%s=%s\", url.QueryEscape(key), url.QueryEscape(val)))\n\t}\n\treturn strings.Join(parts, \"&\")\n}", "title": "" }, { "docid": "97c4528a68f8845eb12e88e7bee45354", "score": "0.5655851", "text": "func (c *Alipay) UrlValuesEncode(a AliPayer) string {\n\tu := &url.Values{}\n\tu.Add(\"app_id\", c.AppId)\n\tu.Add(\"method\", a.ChooseApi())\n\tu.Add(\"format\", c.format)\n\tu.Add(\"charset\", c.charset)\n\tu.Add(\"sign_type\", c.signType)\n\tu.Add(\"timestamp\", time.Now().Format(\"2006-01-02 15:04:05\"))\n\tu.Add(\"version\", c.version)\n\tif ok, v := a.BizContentKey(); !ok {\n\t\tu.Add(v, a.BizContentValue())\n\t}\n\tif ok, v := a.SetExtraParam(); !ok {\n\t\tfor key, value := range v {\n\t\t\tu.Add(key, value)\n\t\t}\n\t}\n\tsig, err := SignRsa2(allKeys(u), u, chaos.String2Byte(c.privateKey))\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\tu.Add(\"sign\", sig)\n\treturn u.Encode()\n}", "title": "" }, { "docid": "eaace035feea4179134bd360c9c3a173", "score": "0.56531954", "text": "func LogParamsAsDict(params url.Values) *zerolog.Event {\n\tdict := zerolog.Dict()\n\n\tfor key, values := range params {\n\t\tarr := zerolog.Arr()\n\n\t\tvar nonEmpty bool\n\n\t\tfor _, v := range values {\n\t\t\tif v != \"\" {\n\t\t\t\tarr = arr.Str(v)\n\n\t\t\t\tif !nonEmpty {\n\t\t\t\t\tnonEmpty = true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif nonEmpty {\n\t\t\tdict = dict.Array(key, arr)\n\t\t}\n\t}\n\n\treturn dict\n}", "title": "" }, { "docid": "5dec00cd3831581cb0566bace5415b05", "score": "0.5645299", "text": "func URLParams(v url.Values) RequestOption {\n\treturn func(_ testing.TB, req *http.Request) {\n\t\treq.URL.RawQuery += v.Encode()\n\t}\n}", "title": "" }, { "docid": "8fa1e28f9bca2e201dff3c538408a72b", "score": "0.563806", "text": "func FormValues(f interface{}) url.Values {\n\tform := url.Values{}\n\tval := reflect.Indirect(reflect.ValueOf(f))\n\n\tfor i := 0; i < val.NumField(); i++ {\n\t\tvalueField := val.Field(i)\n\t\ttypeField := val.Type().Field(i)\n\t\ttag := typeField.Tag\n\n\t\tif valueField.Interface() == reflect.Zero(valueField.Type()).Interface() {\n\t\t\tcontinue\n\t\t}\n\n\t\tformKey := tag.Get(\"form\")\n\t\tif formKey == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tvar v string\n\n\t\tswitch valueField.Kind() {\n\t\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\n\t\t\tv = strconv.FormatInt(valueField.Int(), 10)\n\t\t\tform.Set(formKey, v)\n\t\tcase reflect.Bool:\n\t\t\tv = strconv.FormatBool(valueField.Bool())\n\t\t\tform.Set(formKey, v)\n\t\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64:\n\t\t\tv = strconv.FormatUint(valueField.Uint(), 10)\n\t\t\tform.Set(formKey, v)\n\t\tcase reflect.Float32:\n\t\t\tv = strconv.FormatFloat(valueField.Float(), 'f', 4, 32)\n\t\t\tform.Set(formKey, v)\n\t\tcase reflect.Float64:\n\t\t\tv = strconv.FormatFloat(valueField.Float(), 'f', 4, 64)\n\t\t\tform.Set(formKey, v)\n\t\tcase reflect.Slice:\n\t\t\t// Assume that this is a slice of bytes. Will panic if not.\n\t\t\tv = string(valueField.Bytes())\n\t\t\tform.Set(formKey, v)\n\t\tcase reflect.String:\n\t\t\tv = valueField.String()\n\t\t\tform.Set(formKey, v)\n\t\tdefault:\n\t\t\tsubVals := FormValues(valueField.Interface())\n\t\t\tfor key, vals := range subVals {\n\t\t\t\tfor _, val := range vals {\n\t\t\t\t\tform.Set(fmt.Sprintf(\"%s[%s]\", formKey, key), val)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn form\n}", "title": "" }, { "docid": "197ec1888a20214167f77dc63ff90ca6", "score": "0.5616816", "text": "func ParseURL(endpoint string, parameters map[string]string) string {\n\tfor key, value := range parameters {\n\t\tendpoint = strings.Replace(endpoint, \"{\"+key+\"}\", value, -1)\n\t}\n\treturn endpoint\n}", "title": "" }, { "docid": "dea45c936ee212bfe333d0a4a06eb855", "score": "0.5591305", "text": "func ToJSON(values url.Values) string {\n\tm := make(map[string]string)\n\n\tfor k, v := range values {\n\t\tif len(v) > 0 {\n\t\t\tm[k] = v[0]\n\t\t} else {\n\t\t\tm[k] = \"\"\n\t\t}\n\t}\n\n\tjs, _ := json.Marshal(m)\n\n\treturn string(js)\n}", "title": "" }, { "docid": "823f5944b80dda0daff333a65043da21", "score": "0.55613595", "text": "func DecodeUrlValues(values map[string][]string, ptr any, tagName string) error {\n\tdec := formam.NewDecoder(&formam.DecoderOptions{\n\t\tTagName: tagName,\n\t})\n\n\tif err := dec.Decode(values, ptr); err != nil {\n\t\treturn err\n\t}\n\treturn Validate(ptr)\n}", "title": "" }, { "docid": "89045ed6ec7db4c3c0cb066dd6116f13", "score": "0.556087", "text": "func unescapeParams(params denco.Params) error {\n\tfor i := 0; i < len(params); i++ {\n\t\ts, err := url.PathUnescape(params[i].Value)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tparams[i].Value = s\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d9674a8b02149f392f09e5474d5a19a6", "score": "0.55585927", "text": "func form(s ...string) urllib.Values {\n\tif len(s)%2 != 0 {\n\t\tpanic(\"Got odd number of arguments.\")\n\t}\n\n\tresult := map[string][]string{}\n\tfor i := 0; i < len(s); i += 2 {\n\t\tresult[s[i]] = []string{s[i+1]}\n\t}\n\n\treturn urllib.Values(result)\n}", "title": "" }, { "docid": "620e99752e61eb51a6d964e518d14b72", "score": "0.55437905", "text": "func getComplexMapStructValuesFormam() url.Values {\n\treturn url.Values{\n\t\t\"String.key\": []string{\"value\"},\n\t\t\"StringPtr.key\": []string{\"value\"},\n\t\t\"Int.0\": []string{\"1\"},\n\t\t\"IntPtr.0\": []string{\"1\"},\n\t\t\"Int8.0\": []string{\"1\"},\n\t\t\"Int8Ptr.0\": []string{\"1\"},\n\t\t\"Int16.0\": []string{\"1\"},\n\t\t\"Int16Ptr.0\": []string{\"1\"},\n\t\t\"Int32.0\": []string{\"1\"},\n\t\t\"Int32Ptr.0\": []string{\"1\"},\n\t\t\"Int64.0\": []string{\"1\"},\n\t\t\"Int64Ptr.0\": []string{\"1\"},\n\t\t\"Uint.0\": []string{\"1\"},\n\t\t\"UintPtr.0\": []string{\"1\"},\n\t\t\"Uint8.0\": []string{\"1\"},\n\t\t\"Uint8Ptr.0\": []string{\"1\"},\n\t\t\"Uint16.0\": []string{\"1\"},\n\t\t\"Uint16Ptr.0\": []string{\"1\"},\n\t\t\"Uint32.0\": []string{\"1\"},\n\t\t\"Uint32Ptr.0\": []string{\"1\"},\n\t\t\"Uint64.0\": []string{\"1\"},\n\t\t\"Uint64Ptr.0\": []string{\"1\"},\n\t\t\"NestedInt.1.2\": []string{\"3\"},\n\t\t\"NestedIntPtr.1.2\": []string{\"3\"},\n\t}\n}", "title": "" }, { "docid": "3619baa647dd678447bd85b1e1a2a910", "score": "0.5532615", "text": "func structToVals(s interface{}) (url.Values, error) {\n\tv := url.Values{}\n\tstructVals := reflect.ValueOf(s).Elem()\n\tt := structVals.Type()\n\tfor i := 0; i < structVals.NumField(); i++ {\n\t\tf := structVals.Field(i)\n\t\tvar val string\n\t\tswitch f.Interface().(type) {\n\t\tcase int, int8, int16, int32, int64:\n\t\t\tval = strconv.FormatInt(f.Int(), 10)\n\t\tcase uint, uint8, uint16, uint32, uint64:\n\t\t\tval = strconv.FormatUint(f.Uint(), 10)\n\t\tcase float32:\n\t\t\tval = strconv.FormatFloat(f.Float(), 'f', 4, 32)\n\t\tcase float64:\n\t\t\tval = strconv.FormatFloat(f.Float(), 'f', 4, 64)\n\t\tcase []byte:\n\t\t\tval = string(f.Bytes())\n\t\tcase string:\n\t\t\tval = f.String()\n\t\tdefault:\n\t\t\tLogger.Println(\"Ignoring unhandled type\")\n\t\t\tcontinue\n\t\t}\n\t\tname, opts := getTagName(t.Field(i))\n\t\tif name == \"\" {\n\t\t\t// If we have no name, ignore this field\n\t\t\tcontinue\n\t\t}\n\t\t// Check for omitempty\n\t\tif val == \"\" && opts.Contains(\"omitempty\") {\n\t\t\t// If we have no value and we have omitempty set, ignore this field\n\t\t\tcontinue\n\t\t}\n\n\t\tv.Set(name, val)\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "e8a04167b0c23462f6e29b8c7e19b685", "score": "0.55035424", "text": "func (p *Chunk) ToURLParam() url.Values {\n\tparameters := url.Values{}\n\tparameters.Add(\"path\", p.Path)\n\n\tstr := fmt.Sprint(p.Offset)\n\tparameters.Add(\"offset\", str)\n\n\tstr = fmt.Sprint(p.Size)\n\tparameters.Add(\"chunksize\", str)\n\n\treturn parameters\n}", "title": "" }, { "docid": "edb9b69a0592e44983f65526c4fb22ce", "score": "0.5492807", "text": "func filterParams(pattern *regexp.Regexp, values map[string][]string) map[string][]string {\n\tfor key := range values {\n\t\tif pattern.Match([]byte(key)) {\n\t\t\tvalues[key] = []string{FILTERED}\n\t\t}\n\t}\n\n\treturn values\n}", "title": "" }, { "docid": "0b4f6e8af99bd1d17a2e791bbc2f1fe4", "score": "0.5481693", "text": "func mergeParams(urlParams, oauth map[string]string) map[string]string {\n\tresult := make(map[string]string)\n\tfor key, value := range urlParams {\n\t\tresult[key] = value\n\t}\n\n\tfor key, value := range oauth {\n\t\tresult[key] = value\n\t}\n\treturn result;\n}", "title": "" }, { "docid": "1373c5192e830622a1a5f9200aeaffb9", "score": "0.5452311", "text": "func makeURLArgs(options NewsAPIOptions) url.Values {\n\turlArgs := url.Values{}\n\tvalues := reflect.ValueOf(options)\n\n\tfor i := 0; i < values.NumField(); i++ {\n\t\targName := values.Type().Field(i).Name\n\t\targValue := values.Field(i)\n\t\targType := argValue.Kind()\n\n\t\tswitch argType {\n\n\t\tcase reflect.String:\n\t\t\tif len(argValue.String()) > 0 {\n\t\t\t\turlArgs.Add(strings.ToLower(string(argName)), argValue.String())\n\t\t\t}\n\n\t\tcase reflect.Int:\n\t\t\tintString := strconv.FormatInt(argValue.Int(), 10)\n\t\t\tif len(intString) > 0 {\n\t\t\t\turlArgs.Add(strings.ToLower(string(argName)), intString)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn urlArgs\n}", "title": "" }, { "docid": "df3474feb506fa30e0c56cb8f35691bc", "score": "0.5443732", "text": "func (tags KeyValueTags) URLEncode() string {\n\tvalues := url.Values{}\n\n\tfor k, v := range tags {\n\t\tif v == nil || v.Value == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tvalues.Add(k, *v.Value)\n\t}\n\n\treturn values.Encode()\n}", "title": "" }, { "docid": "6caee0cfb386ea3bacdaf1226ed6b2f5", "score": "0.54333264", "text": "func (f TaskFieldSet) EncodeValues(key string, v *url.Values) error {\n\treturn jsonAsURLParams(f, key, v)\n}", "title": "" }, { "docid": "6ed233010861b5071a4b848d08316318", "score": "0.5426089", "text": "func appendParams(url_str string, action_name string, err error, cont map[string]interface{}) string {\n\tp := strings.Split(url_str, \"?\")\n\tvar inp string\n\tif len(p) > 1 {\n\t\tinp = p[1]\n\t} else {\n\t\tinp = \"\"\n\t}\n\tv, parserr := url.ParseQuery(inp)\n\tif parserr == nil {\n\t\t// Delete outdated information from url.\n\t\tfor i := range v {\n\t\t\tif strings.HasPrefix(i, \"-\") {\n\t\t\t\tv.Del(i)\n\t\t\t}\n\t\t}\n\t\t// Write all data in cont into the url.\n\t\tfor key, val := range cont {\n\t\t\tif key[0] == '!' {\n\t\t\t\tv.Set(key[1:], fmt.Sprint(val))\n\t\t\t} else {\n\t\t\t\tv.Set(\"-\"+key, fmt.Sprint(val))\n\t\t\t}\n\t\t}\n\t\tv.Del(\"error\")\n\t\tv.Del(\"ok\") // See *1\n\t\tv.Del(\"action\")\n\t\tif len(action_name) > 0 { // runDebug calls this function with an empty action name.\n\t\t\tv.Set(\"action\", action_name)\n\t\t}\n\t\tif err == nil {\n\t\t\tv.Set(\"ok\", \"true\") // This could be left out, but hey. *1\n\t\t} else {\n\t\t\tv.Set(\"error\", err.Error())\n\t\t}\n\t\tquer := v.Encode()\n\t\tif len(quer) > 0 {\n\t\t\treturn p[0] + \"?\" + quer\n\t\t}\n\t}\n\treturn p[0]\n}", "title": "" }, { "docid": "4c27e93d9a9f5e2e4661a288e17fc5eb", "score": "0.5409482", "text": "func getPathParamMap(c *gin.Context) map[string]string {\n\tpm := make(map[string]string)\n\tfor _, p := range c.Params {\n\t\tpm[p.Key] = p.Value\n\t}\n\treturn pm\n}", "title": "" }, { "docid": "8a7331ff15fb09a7cca0b899274675a5", "score": "0.54081815", "text": "func FormMarshal(o interface{}) url.Values {\n\tvs := url.Values{}\n\ttyp, v := reflect.TypeOf(o), reflect.ValueOf(o)\n\tif typ.Kind() == reflect.Ptr {\n\t\tv = v.Elem()\n\t\ttyp = typ.Elem()\n\t}\n\n\tfor i, fc := 0, typ.NumField(); i < fc; i++ {\n\t\tf, fv := typ.Field(i), v.Field(i)\n\t\tn := f.Tag.Get(\"json\")\n\t\tif n == \"-\" {\n\t\t\tcontinue\n\t\t}\n\t\tvs[n] = stringMarshal(fv)\n\t}\n\treturn vs\n}", "title": "" }, { "docid": "9d1b9643bebea63ae7964d8ec2bc6f23", "score": "0.5390628", "text": "func paramsToArguments(api string, params url.Values) (string, error) {\n\tvar b strings.Builder\n\n\tkeys := make([]string, 0, len(params))\n\tfor k := range params {\n\t\tkeys = append(keys, k)\n\t}\n\n\tsort.Strings(keys)\n\tfor _, k := range keys {\n\t\tvar (\n\t\t\tname string\n\t\t\tvalue string\n\t\t)\n\n\t\tvalue = strings.Join(params[k], \",\")\n\n\t\tswitch k {\n\t\tcase \"q\":\n\t\t\tname = \"Query\"\n\t\tdefault:\n\t\t\tname = utils.NameToGo(k)\n\t\t}\n\n\t\tswitch k {\n\t\tcase \"timeout\", \"scroll\": // duration\n\t\t\tif params[k][0] == \"\" {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tdur, err := time.ParseDuration(params[k][0])\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", fmt.Errorf(\"error parsing duration [%s]: %s\", params[k][0], err)\n\t\t\t}\n\t\t\tvalue = fmt.Sprintf(\"time.Duration(%d)\", time.Duration(dur))\n\t\tcase \"from\", \"size\", \"terminate_after\", \"version\", \"requests_per_second\", \"scroll_size\", \"max_num_segments\": // numeric\n\t\t\tvalue = fmt.Sprintf(\"%s\", value)\n\t\tcase \"pretty\", \"error_trace\":\n\t\t\tvalue = \"\" // Helper methods don't take any value\n\t\tcase \"refresh\":\n\t\t\tswitch api {\n\t\t\tcase \"Index\":\n\t\t\t\tif params[k][0] == \"\" {\n\t\t\t\t\tvalue = `\"true\"` // WithRefresh() needs a string\n\t\t\t\t} else {\n\t\t\t\t\tvalue = strconv.Quote(value)\n\t\t\t\t}\n\t\t\tcase \"Reindex\", \"DeleteByQuery\", \"UpdateByQuery\":\n\t\t\t\tif params[k][0] == \"\" {\n\t\t\t\t\tvalue = \"true\" // WithRefresh() needs a boolean\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tvalue = strconv.Quote(value)\n\t\t\t}\n\t\tcase \"detailed\", \"flat_settings\": // bool\n\t\t\tvalue = string(value)\n\t\tcase \"v\": // Blank bool\n\t\t\tvalue = \"true\"\n\t\tdefault:\n\t\t\tvalue = strconv.Quote(value)\n\t\t}\n\t\tfmt.Fprintf(&b, \"\\tes.%s.With%s(%s),\\n\", api, name, value)\n\t}\n\n\treturn b.String(), nil\n}", "title": "" }, { "docid": "39fc7cc2499a6ed8fec700c772e31784", "score": "0.53812313", "text": "func cleanParams(p map[string]interface{}) map[string]interface{} {\n\tc := make(map[string]interface{})\n\n\tfor k, v := range p {\n\t\tswitch x := v.(type) {\n\t\tcase string:\n\t\t\tif x == \"\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tc[k] = v\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "8f0cbb9fed4ce0bc5dfd26594e366abc", "score": "0.5375301", "text": "func parseParams(s string) (objx.Map, error) {\n\treturn objx.FromURLQuery(s)\n}", "title": "" }, { "docid": "38e62c792ff6efcc02dad1158a39f00d", "score": "0.5352247", "text": "func addQueryParamsToUrl(url *nurl.URL, params QueryParam) {\n\t// Pass along the query parameters\n\tfor key, values := range params {\n\t\tfor _, value := range values {\n\t\t\turl.Query().Add(key, value)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ff2b9c656871d32edeb86fc7d01ffd6b", "score": "0.53516114", "text": "func (f *DateOrRange) EncodeValues(key string, v *url.Values) error {\n\treturn jsonAsURLParams(f, key, v)\n}", "title": "" }, { "docid": "d88855a760e3ff91c5c06d49fd07496a", "score": "0.5344589", "text": "func FormatMap(m map[string]string) (fmtStr string) {\n\tfor k, v := range m {\n\t\tfmtStr += fmt.Sprintf(\"%v=%q\\n\", k, v)\n\t}\n\tfmtStr = strings.TrimSuffix(fmtStr, \"\\n\")\n\n\treturn\n}", "title": "" }, { "docid": "78801eacb20976ccbb005c01179d6e46", "score": "0.53343314", "text": "func encodeParameterAmazonStyle(params url.Values) string {\n\tencodedValues := params.Encode()\n\treturn strings.Replace(encodedValues, \"+\", \"%20\", -1)\n}", "title": "" }, { "docid": "d7e6ddaf992efc3e6eacb8a29ab6fd92", "score": "0.53310233", "text": "func arrangeParams(qs Options) string {\n\tif qs == nil {\n\t\tif APIKey == \"\" {\n\t\t\treturn \"\"\n\t\t}\n\t\tqs = Options{}\n\t}\n\tif APIKey != \"\" {\n\t\tqs.Set(\"api_key\", APIKey)\n\t}\n\treturn url.Values(qs).Encode()\n}", "title": "" }, { "docid": "a4be084b618abd6e2a4f34a387d9e2ac", "score": "0.53265727", "text": "func (p GroupOnSystemAdditionalQueryParams) EncodeValues(key string, v *url.Values) error {\n\treturn additionalQueryParamsUrlEncoder(p, key, v)\n}", "title": "" }, { "docid": "9cdb26524e813c86960856faf08f2b9b", "score": "0.53149265", "text": "func BuildParams(values []string) (map[string]string, error) {\n\tp := map[string]string{}\n\tfor _, value := range values {\n\t\tparts := strings.SplitN(value, \"=\", 2)\n\t\tif len(parts) != 2 {\n\t\t\treturn nil, fmt.Errorf(\"expected key=value got '%s'\", value)\n\t\t}\n\t\tif parts[1] == \"\" {\n\t\t\tmsg := fmt.Sprintf(\"missing value for key '%s'\", parts[0])\n\t\t\treturn nil, errors.New(msg)\n\t\t}\n\t\tif parts[0] == \"\" {\n\t\t\tmsg := fmt.Sprintf(\"missing key for value '%s'\", parts[1])\n\t\t\treturn nil, errors.New(msg)\n\t\t}\n\t\tp[parts[0]] = parts[1]\n\t}\n\treturn p, nil\n}", "title": "" }, { "docid": "f2bbd00134a2ce2e4bdb37e33ba19e71", "score": "0.5307363", "text": "func (this *DynMap) UnmarshalUrlValues(values url.Values) error {\n\tfor k := range values {\n\t\tvar v = values[k]\n\t\tkey := strings.Replace(k, \"[\", \".\", -1)\n\t\tkey = strings.Replace(key, \"]\", \"\", -1)\n\n\t\tif len(v) == 1 {\n\t\t\tthis.PutWithDot(key, v[0])\n\t\t} else {\n\t\t\tthis.PutWithDot(key, v)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "43643fe48faabc65d60fe81e7ce6fab7", "score": "0.53054523", "text": "func valsFromQuery(vals neturl.Values) map[string]string {\n\tresult := map[string]string{}\n\tfor k, v := range vals {\n\t\tresult[strings.ToLower(k)] = v[0]\n\t}\n\treturn result\n}", "title": "" }, { "docid": "349748bcf506fcce3fa47433ad26179b", "score": "0.5305269", "text": "func (mo *StatOpts) toValues() url.Values {\n\tvalues := toValues(*mo)\n\tvalues.Del(\"tags\")\n\tfor _, tag := range mo.Tags {\n\t\tvalues.Add(string(tag), \"true\")\n\t}\n\treturn values\n}", "title": "" }, { "docid": "b5565ee2d16dec09996b9130dc75fc59", "score": "0.5293056", "text": "func (f TaskDates) EncodeValues(key string, v *url.Values) error {\n\treturn jsonAsURLParams(f, key, v)\n}", "title": "" }, { "docid": "df4f1e0e9ded47f79630bf40e52915bc", "score": "0.5286028", "text": "func MapIntoQueryParams(object any) (values []Value, fieldNames, inserts []string, err error) {\n\tobjectValue, err := reflectTargetStruct(reflect.ValueOf(object))\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\tif objectValue.Kind() != reflect.Map {\n\t\treturn nil, nil, nil, errInvalidMapValue\n\t}\n\tdata, err := gocast.TryMap[string, string](object)\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\torderedData := make([][2]string, 0, len(data))\n\tfor target, value := range data {\n\t\torderedData = append(orderedData, [2]string{target, value})\n\t}\n\tsort.Slice(orderedData, func(i, j int) bool { return orderedData[i][0] < orderedData[j][0] })\n\tfor _, item := range orderedData {\n\t\ttarget, value := item[0], item[1]\n\t\tfieldValues, fieldValue, insertValue := prepareOneFieldByString(target + `=` + value)\n\t\tif len(fieldValues) != 0 {\n\t\t\tvalues = append(values, fieldValues...)\n\t\t}\n\t\tif len(fieldValue) != 0 {\n\t\t\tfieldNames = append(fieldNames, fieldValue)\n\t\t}\n\t\tif len(insertValue) != 0 {\n\t\t\tinserts = append(inserts, insertValue)\n\t\t}\n\t}\n\treturn values, fieldNames, inserts, nil\n}", "title": "" }, { "docid": "78c694e565050d35d4543a9fec08d0ba", "score": "0.5281453", "text": "func (self *URLSpec) ParseUrlParams(url string) (args map[string][]string) {\n\tparamValues := self.Regex.FindStringSubmatch(url)[1:]\n\targs = make(map[string][]string, 0)\n\tparamNameRegexp, _ := regexp.Compile(`(:\\w+)`)\n\tparttens := strings.Split(self.Pattern, \"/\")\n\tvar index int = 0\n\tfor _, p := range parttens {\n\t\tif strings.HasPrefix(p, \":\") {\n\t\t\tpName := paramNameRegexp.FindStringSubmatch(p)[1]\n\t\t\targs[strings.TrimPrefix(pName, \":\")] = []string{paramValues[index]}\n\t\t\tindex++\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7d33b8cbade98ad160fb1a21479cbc97", "score": "0.52788186", "text": "func PackURL(addr string, values url.Values) (string, error) {\n\tu, err := url.Parse(addr)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tq := u.Query()\n\tfor k, vs := range values {\n\t\tfor _, v := range vs {\n\t\t\tq.Add(k, v)\n\t\t}\n\t}\n\tu.RawQuery = q.Encode()\n\n\treturn u.String(), nil\n}", "title": "" }, { "docid": "014e375d9345a8bda41d2cf7eca32c43", "score": "0.52769685", "text": "func getParams(req *http.Request) map[string]string {\n\n\tvar mapa = make(map[string]string)\n\n\tfirstCut := strings.Split(req.URL.RequestURI(), \"?\")\n\n\tif len(firstCut) > 1 {\n\t\tvalues := strings.Split(firstCut[1], \"&\")\n\n\t\tfor _, value := range values {\n\t\t\tkeyValue := strings.Split(value, \"=\")\n\t\t\tmapa[keyValue[0]] = keyValue[1]\n\t\t}\n\t}\n\treturn mapa\n}", "title": "" }, { "docid": "448ec9a24fad433d5970548514fab8a5", "score": "0.52738696", "text": "func Encode(values map[string][]string) string {\n\tif values == nil {\n\t\treturn \"\"\n\t}\n\tvar buf strings.Builder\n\tkeys := make([]string, 0, len(values))\n\tfor k := range values {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Strings(keys)\n\tfor _, k := range keys {\n\t\tvs := values[k]\n\n\t\tfor _, v := range vs {\n\t\t\tif buf.Len() > 0 {\n\t\t\t\tbuf.WriteByte('&')\n\t\t\t}\n\t\t\tbuf.WriteString(k)\n\t\t\tbuf.WriteByte('=')\n\t\t\tbuf.WriteString(v)\n\t\t}\n\t}\n\treturn buf.String()\n}", "title": "" }, { "docid": "956023ef19dc63a193d2997bcd227794", "score": "0.52725077", "text": "func SplitParamsToMap(param string, splitBy string) []string {\n\tres := []string{}\n\n\tsplt := strings.Split(param, splitBy)\n\n\tfor _, v := range splt {\n\t\tres = append(res, v)\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "cc025f64470b32b460125f9b7ecd6a99", "score": "0.52654845", "text": "func paramsForMessage(params *Params) (*url.Values, error) {\n\turlParams := &url.Values{}\n\n\tif params.Body == \"\" && params.MediaUrls == nil {\n\t\treturn nil, errors.New(\"Body or MediaUrls is required\")\n\t}\n\tif params.Body != \"\" {\n\t\turlParams.Set(\"body\", params.Body)\n\t}\n\tif params.MediaUrls != nil {\n\t\turlParams.Set(\"mediaUrls[]\", strings.Join(params.MediaUrls, \",\"))\n\t}\n\tif params.Subject != \"\" {\n\t\turlParams.Set(\"subject\", params.Subject)\n\t}\n\tif params.Reference != \"\" {\n\t\turlParams.Set(\"reference\", params.Reference)\n\t}\n\tif params.ScheduledDatetime.Unix() > 0 {\n\t\turlParams.Set(\"scheduledDatetime\", params.ScheduledDatetime.Format(time.RFC3339))\n\t}\n\n\treturn urlParams, nil\n}", "title": "" }, { "docid": "ebdaaeb4ba0c9521f09c1026b850ae8a", "score": "0.5264963", "text": "func ToQueryString2(param map[string]string) string {\n\tvar args string\n\tfor k, v := range param {\n\t\targs += fmt.Sprintf(\"&%s=%s\", k, v)\n\t}\n\n\treturn args\n}", "title": "" }, { "docid": "40d27aacc3f62ab5ef5e4dd56c374cdb", "score": "0.52616006", "text": "func urlEncode(options map[string]interface{}) string {\n\tn := len(options)\n\tif n == 0 {\n\t\treturn \"\"\n\t}\n\tvar buf bytes.Buffer\n\tbuf.WriteString(`?`)\n\tfor k, v := range options {\n\t\tvar s string\n\t\tswitch v.(type) {\n\t\tcase string:\n\t\t\ts = fmt.Sprintf(`%s=%s&`, k, url.QueryEscape(v.(string)))\n\t\tcase uint8, uint16, uint32, uint64, int8, int16, int32, int64, float32, float64, complex64, complex128, uint, int, bool:\n\t\t\ts = fmt.Sprintf(`%s=%v&`, k, v)\n\t\t}\n\t\tbuf.WriteString(s)\n\t}\n\tbuf.Truncate(buf.Len() - 1)\n\treturn buf.String()\n}", "title": "" }, { "docid": "962e061ea799f8c487c8ced383a3fda3", "score": "0.52291983", "text": "func encodeParams(p map[string]string) []byte {\n\tid := tiling.TraceIDFromParams(p)\n\treturn []byte(id)\n}", "title": "" }, { "docid": "6ec4c6328a63c1d65bcaefd6ce705581", "score": "0.5221383", "text": "func (r *RESTSendSMS) ToURL() url.Values {\n\tresult := url.Values{}\n\tval := reflect.ValueOf(r).Elem()\n\tfieldsCount := val.NumField()\n\n\tfor i := 0; i < fieldsCount; i++ {\n\t\tvalueField := val.Field(i)\n\t\ttypeField := val.Type().Field(i)\n\t\ttag := typeField.Tag\n\n\t\tname := tag.Get(\"url\")\n\t\tempty := \"\"\n\t\tif name == \"\" || name == \"-\" {\n\t\t\tcontinue\n\t\t}\n\t\telems := strings.Split(name, \",\")\n\t\tswitch len(elems) {\n\t\tcase 0:\n\t\t\tcontinue\n\t\tcase 2:\n\t\t\tempty = elems[1]\n\t\t\tfallthrough\n\t\tcase 1:\n\t\t\tname = elems[0]\n\t\t}\n\n\t\tomitEmpty := empty == \"omitempty\"\n\t\tif name == \"\" || name == \"-\" {\n\t\t\tcontinue\n\t\t}\n\t\tif omitEmpty {\n\t\t\tcontinue\n\t\t}\n\t\tswitch valueField.Interface().(type) {\n\t\tcase string:\n\t\t\tval := valueField.String()\n\t\t\tif val == \"\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tresult.Add(name, val)\n\t\tcase Recipients:\n\t\t\tval := valueField.Interface().(Recipients)\n\t\t\tresult.Add(name, val.String())\n\t\tcase Bool:\n\t\t\tval := Bool(valueField.Bool())\n\t\t\tresult.Add(name, strconv.Itoa(val.Int()))\n\t\tcase bool:\n\t\t\tval := valueField.Bool()\n\t\t\tif val {\n\t\t\t\tresult.Add(name, \"1\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tresult.Add(name, \"0\")\n\t\tcase MessageType:\n\t\t\tval := valueField.Interface().(MessageType)\n\t\t\tresult.Add(name, val.String())\n\t\tcase SchedulerDateTime:\n\t\t\tval := valueField.Interface().(SchedulerDateTime)\n\t\t\tif !val.IsValid() {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tresult.Add(name, val.String())\n\t\t}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "08b019a08b58ad8ef39d512028aae4ed", "score": "0.5219366", "text": "func encodeQueryString(queryValues url.Values) string {\n\tvar encodedVals = make(map[string]string, len(queryValues))\n\tvar keys = make([]string, len(queryValues))\n\n\ti := 0\n\n\tfor k, _ := range queryValues {\n\t\tkeys[i] = urlEncode(k, false)\n\t\tencodedVals[keys[i]] = k\n\t\ti++\n\t}\n\n\tcaseInsensitiveSort(keys)\n\n\tvar queryStr StringBuilder\n\tfor i, k := range keys {\n\t\tif i > 0 {\n\t\t\tqueryStr.Write(\"&\")\n\t\t}\n\n\t\tqueryStr.Write(k).Write(\"=\").Write(urlEncode(queryValues.Get(encodedVals[k]), false))\n\t}\n\n\treturn queryStr.ToString()\n}", "title": "" }, { "docid": "a27ecf6bf0ee43d8f20811db39b2706f", "score": "0.52185404", "text": "func phcParamsToMap(s string) map[string]string {\n\tparameters := strings.Split(s, \",\")\n\tm := make(map[string]string, len(parameters))\n\tfor _, p := range parameters {\n\t\tsubs := strings.SplitN(p, \"=\", 2)\n\t\tif len(subs) == 2 {\n\t\t\tm[subs[0]] = subs[1]\n\t\t} else {\n\t\t\tm[subs[0]] = \"\"\n\t\t}\n\t}\n\treturn m\n}", "title": "" }, { "docid": "ff014f98267ba7b9e8fbd0e1bdd18b1b", "score": "0.5212736", "text": "func (request PaymentRequest) ToValuesSpecial(values url.Values) {\n\tif request.ForwardDestination != nil {\n\t\tvalues.Add(\"forward_destination[domain]\", request.ForwardDestination.Domain)\n\t\tfor key := range request.ForwardDestination.Fields {\n\t\t\tvalues.Add(fmt.Sprintf(\"forward_destination[fields][%s]\", key), request.ForwardDestination.Fields.Get(key))\n\t\t}\n\t}\n\n\tfor i, asset := range request.Path {\n\t\tvalues.Set(fmt.Sprintf(protocols.PathCodeField, i), asset.Code)\n\t\tvalues.Set(fmt.Sprintf(protocols.PathIssuerField, i), asset.Issuer)\n\t}\n}", "title": "" }, { "docid": "9c8cd2a947994097813a12e50a2634e6", "score": "0.5209298", "text": "func (opts GetHistoryParams) Map() map[string]string {\n\tvar params = make(map[string]string)\n\n\tif opts.From > 0 {\n\t\tparams[\"from\"] = strconv.FormatInt(opts.From, 10)\n\t}\n\tif opts.To > 0 {\n\t\tparams[\"to\"] = strconv.FormatInt(opts.To, 10)\n\t}\n\tif opts.ServerName != \"\" {\n\t\tparams[\"serverName\"] = opts.ServerName\n\t}\n\tif opts.Offset > 0 {\n\t\tparams[\"offset\"] = strconv.Itoa(opts.Offset)\n\t}\n\tif opts.Limit > 0 {\n\t\tparams[\"limit\"] = strconv.Itoa(opts.Limit)\n\t}\n\n\treturn params\n}", "title": "" }, { "docid": "3fadd0688982fb4bd26147801f646edd", "score": "0.52073693", "text": "func parseParam(param interface{}) string {\n\tswitch v := param.(type) {\n\tcase string:\n\t\treturn v\n\tcase fmt.Stringer:\n\t\treturn v.String()\n\tcase url.Values:\n\t\treturn v.Encode()\n\tcase *url.Values:\n\t\treturn v.Encode()\n\tdefault:\n\t\tvalue := convertToURLValue(tagName, param)\n\t\treturn value.Encode()\n\t}\n}", "title": "" }, { "docid": "f6501da6cfa2756436eda8439888310f", "score": "0.5206424", "text": "func formatURL(key string, args ...string) string {\n\targsJoined := strings.Join(args, \"/\")\n\treturn fmt.Sprintf(\"%s%s.json?key=%s\", URLPrefix, argsJoined, key)\n}", "title": "" }, { "docid": "8b528e0a8b8c75c505f0cb2ac462df50", "score": "0.5205563", "text": "func URLParam(r *http.Request, key string) string {\n return chi.URLParam(r, key)\n}", "title": "" }, { "docid": "67864f0df6b81b8d5f0d7f9456070838", "score": "0.51791435", "text": "func (u URLParams) Set(key, value string) {\n\tu[key] = []string{value}\n}", "title": "" }, { "docid": "5d92ebe475d7cd7830a1730029b290c5", "score": "0.51782197", "text": "func (c *ScalesListCall) P(key string, values ...string) *ScalesListCall {\n\tc.urlParams[key] = values\n\treturn c\n}", "title": "" }, { "docid": "d1604a3fec7d7f58d0862e4ed05dc439", "score": "0.51720476", "text": "func Params(r *http.Request, in interface{}) error {\n\tvars := mux.Vars(r)\n\n\tinElem := reflect.ValueOf(in).Elem()\n\tinType := inElem.Type()\n\n\tfor i := 0; i < inType.NumField(); i++ {\n\t\tfield := ParamsStructField(inType.Field(i))\n\t\toptions, err := field.Options()\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tvar value string\n\n\t\tif options.Source.Is(Path) {\n\t\t\tvalue = vars[options.Key]\n\t\t} else {\n\t\t\tvalue = r.URL.Query().Get(options.Key)\n\t\t}\n\n\t\tif len(value) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tfieldValue := inElem.Field(i)\n\n\t\tswitch kind := fieldValue.Kind(); kind {\n\t\tcase reflect.String:\n\t\t\tfieldValue.SetString(value)\n\t\tcase reflect.Int, reflect.Int64:\n\t\t\tintValue, err := strconv.ParseInt(value, 10, 64)\n\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"invalid field value format: %w\", err)\n\t\t\t}\n\n\t\t\tfieldValue.SetInt(intValue)\n\t\tcase reflect.Float32:\n\t\t\tfloatValue, err := strconv.ParseFloat(value, 32)\n\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"invalid float value: %w\", err)\n\t\t\t}\n\n\t\t\tfieldValue.SetFloat(floatValue)\n\t\tcase reflect.Float64:\n\t\t\tfloatValue, err := strconv.ParseFloat(value, 64)\n\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"invalid float value: %w\", err)\n\t\t\t}\n\n\t\t\tfieldValue.SetFloat(floatValue)\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"unsupported field kind %s\", kind)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cc72f5d7faf3a3b9aca68c9555b83ece", "score": "0.5169234", "text": "func validateParams(params []string, query url.Values) error {\n\tparamsMap := make(map[string]bool, len(params))\n\tfor _, param := range params {\n\t\tparamsMap[param] = true\n\t}\n\tfor k := range query {\n\t\tif _, ok := paramsMap[k]; !ok {\n\t\t\treturn fmt.Errorf(`Unknown query parameter \"%s\"`, k)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2e334f442c5430fb81238f2c2952e0d6", "score": "0.51626855", "text": "func (p *TouchCmd) ToURLParam() url.Values {\n\tparameters := url.Values{}\n\tparameters.Add(\"method\", p.Method)\n\tparameters.Add(\"path\", p.Path)\n\n\tstr := fmt.Sprint(p.FileSize)\n\tparameters.Add(\"path\", str)\n\n\treturn parameters\n}", "title": "" }, { "docid": "23138edce314268e0c1875b689739136", "score": "0.516069", "text": "func (params Values) Encode() string {\n\treturn strings.Replace(params.Values.Encode(), \"+\", \"%20\", -1)\n}", "title": "" }, { "docid": "eb7054929a0a242665c6ec097103e61f", "score": "0.51604396", "text": "func SerializeParams(params []Param, delim string) []string {\n\tvar parameters []string\n\n\tfor _, p := range params {\n\t\tif p.Key == \"\" && p.Value == \"\" {\n\t\t\tcontinue\n\t\t} else if p.Key == \"\" {\n\t\t\tparameters = append(parameters, fmt.Sprint(p.Value))\n\t\t} else if p.Value == \"\" {\n\t\t\tparameters = append(parameters, fmt.Sprint(p.Key))\n\t\t} else if delim == \"\" {\n\t\t\tparameters = append(parameters, fmt.Sprint(p.Key))\n\t\t\tparameters = append(parameters, fmt.Sprint(p.Value))\n\t\t} else {\n\t\t\tparameters = append(parameters, fmt.Sprintf(\"%s%s%s\", p.Key, delim, p.Value))\n\t\t}\n\t}\n\n\treturn parameters\n}", "title": "" }, { "docid": "7ec2c8d8a77f83e956a88b1ccd29bc4e", "score": "0.5159442", "text": "func parseQueryParam(params url.Values, key string) (string, bool, error) {\n\n\tif len(params[key]) == 1 {\n\t\treturn params[key][0], true, nil\n\t}\n\tif len(params[key]) > 1 {\n\t\treturn \"\", true, errors.New(\"too many values specified for parameter: \" + key)\n\t}\n\treturn \"\", false, nil\n}", "title": "" }, { "docid": "caa7797452058fc693f5c662711cc43f", "score": "0.51566494", "text": "func toQueryParams(ps []Point) string {\n\tvar qs strings.Builder\n\n\tlast := len(ps) - 1\n\tfor i, p := range ps {\n\t\tqs.WriteString(fmt.Sprintf(\"%f,%f\", p.Lat(), p.Lng()))\n\t\tif i < last {\n\t\t\tqs.WriteString(\";\")\n\t\t}\n\t}\n\n\treturn qs.String()\n}", "title": "" }, { "docid": "317867cc8ac08d1956c2197d9ded4da5", "score": "0.51510495", "text": "func insertUrlParam(url_, newParamName, newParamValue string) string {\n\tpr(\"insertUrlParam\")\n\n\taddrParts := strings.Split(url_, \"#\") // Just work on the part before the hash.\n\n\tif !strings.Contains(addrParts[0], \"?\") {\n\t\taddrParts[0] += \"?\"\n\t} else {\n\t\taddrParts[0] += \"&\"\n\t}\n\n\t// Add the new name, value pair. Must escape the value.\n\taddrParts[0] += (newParamName + \"=\" + url.QueryEscape(newParamValue))\n\n\treturn strings.Join(addrParts, \"#\") // Re-join the hash.\n}", "title": "" }, { "docid": "30347d5d28c83a3794f4629b70a2abcd", "score": "0.5149874", "text": "func (u AnnounceRequest) ToValues() url.Values {\n\t// Initialize query map\n\tquery := url.Values{}\n\tquery.Set(\"udp\", \"1\")\n\n\t// Copy all fields into query map\n\tquery.Set(\"info_hash\", string(u.InfoHash))\n\n\t// Integer fields\n\tquery.Set(\"downloaded\", strconv.FormatUint(u.Downloaded, 10))\n\tquery.Set(\"left\", strconv.FormatUint(u.Left, 10))\n\tquery.Set(\"uploaded\", strconv.FormatUint(u.Uploaded, 10))\n\n\t// Event, converted to actual string\n\tswitch u.Event {\n\tcase 0:\n\t\tquery.Set(\"event\", \"\")\n\tcase 1:\n\t\tquery.Set(\"event\", \"completed\")\n\tcase 2:\n\t\tquery.Set(\"event\", \"started\")\n\tcase 3:\n\t\tquery.Set(\"event\", \"stopped\")\n\t}\n\n\t// IP\n\tquery.Set(\"ip\", strconv.FormatUint(uint64(u.IP), 10))\n\n\t// Key\n\tquery.Set(\"key\", strconv.FormatUint(uint64(u.Key), 10))\n\n\t// Numwant\n\tquery.Set(\"numwant\", strconv.FormatUint(uint64(u.Numwant), 10))\n\n\t// Port\n\tquery.Set(\"port\", strconv.FormatUint(uint64(u.Port), 10))\n\n\t// Return final query map\n\treturn query\n}", "title": "" } ]
3112504065238938398abd192ee7c0fd
Query is our entry point for queries
[ { "docid": "3be3143b46586bc94640d627d5b0f3c8", "score": "0.0", "text": "func (t *SimpleChaincode) Query(stub shim.ChaincodeStubInterface, function string, args []string) ([]byte, error) {\r\n\tfmt.Println(\"query is running \" + function)\r\n\r\n\t// Handle different functions\r\n\tif function == \"read\" { //read a variable\r\n\t\treturn t.read(stub, args)\r\n\t}\r\n\tif function == \"readAssign\" { //read a variable\r\n\t\treturn t.readAssign(stub, args)\r\n\t}\r\n\tfmt.Println(\"query did not find func: \" + function)\r\n\r\n\treturn nil, errors.New(\"Received unknown function query: \" + function)\r\n}", "title": "" } ]
[ { "docid": "f890a995f3bf1b3069bd79b2ce6858f4", "score": "0.76263976", "text": "func (c *Client) Query(ctx context.Context, q interface{}, variables map[string]interface{}) {\n\n}", "title": "" }, { "docid": "b9f716e38e9897023193ba1aa564f892", "score": "0.7557773", "text": "func (hds *Datastore) Query(q query.Query) (query.Results, error) {\n\tif hds.options.BeforeQuery != nil {\n\t\tq = hds.options.BeforeQuery(q)\n\t}\n\tres, err := hds.ds.Query(q)\n\tif hds.options.AfterQuery != nil {\n\t\tres, err = hds.options.AfterQuery(q, res, err)\n\t}\n\treturn res, err\n}", "title": "" }, { "docid": "2a460aec1053623df039c4760ee2669d", "score": "0.7415913", "text": "func (c *Client) Query(ctx context.Context, q interface{}, variables map[string]interface{}) error {\n\treturn c.do(ctx, queryOperation, q, variables)\n}", "title": "" }, { "docid": "9010bb8950b385e4c36ea7f23dc106dd", "score": "0.73998374", "text": "func (s *Stmtx) Query(args ...interface{}) (*sql.Rows, error) {\n\treturn s.QueryContext(context.Background(), args...)\n}", "title": "" }, { "docid": "d1212d14b33d501b526d9defefc6074f", "score": "0.7397019", "text": "func (db *DB) Query(q interface{}, args ...interface{}) (*Rows, error) {\n\treturn db.QueryContext(db.Context(), q, args...)\n}", "title": "" }, { "docid": "75d8f42bb6b7c0754e741b77aa06fbce", "score": "0.7378153", "text": "func (c *Client) Query(query string, args ...interface{}) (Result, error) {\n\treturn c.getr().Query(query, args...)\n}", "title": "" }, { "docid": "b20194e5cfa297248a06b45969adf7b2", "score": "0.7368321", "text": "func (q queryEngine) Query(query string, args ...interface{}) (*sql.Rows, error) {\n\treturn q.db.Query(query, args...)\n}", "title": "" }, { "docid": "2e79404769bfb0e21315ffc78a4910d9", "score": "0.73549616", "text": "func (c *Core) Query(ctx context.Context, sql string, args ...interface{}) (result Result, err error) {\n\treturn c.db.DoQuery(ctx, nil, sql, args...)\n}", "title": "" }, { "docid": "f006014dab87b92e7b34253e94b8df33", "score": "0.73108023", "text": "func (c *ClickHouseGateway) Query(q string) (*sql.Rows, error) {\n\treturn c.db.Query(q)\n}", "title": "" }, { "docid": "4736688ab758aaa80721303c460f40bf", "score": "0.7302152", "text": "func (d *dispatcher) Query(query query.Query) ([]query.Entry, error) {\n\tresult, err := d.store.Query(query)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.Rest()\n}", "title": "" }, { "docid": "475c579fe3a59bb2aba60d3da8e0b1bd", "score": "0.72848487", "text": "func (p *psql) Query(model interface{}, query interface{}, params ...interface{}) (res orm.Result, err error) {\n\treturn p.DB().Query(model, query, params)\n}", "title": "" }, { "docid": "35265f90a112f63e98bc25f9c559b65e", "score": "0.7284437", "text": "func (e *StackdriverExecutor) Query(ctx context.Context, dsInfo *models.DataSource, tsdbQuery *tsdb.TsdbQuery) (*tsdb.Response, error) {\n\tvar result *tsdb.Response\n\tvar err error\n\tqueryType := tsdbQuery.Queries[0].Model.Get(\"type\").MustString(\"\")\n\n\tswitch queryType {\n\tcase \"annotationQuery\":\n\t\tresult, err = e.executeAnnotationQuery(ctx, tsdbQuery)\n\tcase \"getProjectsListQuery\":\n\t\tresult, err = e.getProjectList(ctx, tsdbQuery)\n\tcase \"getGCEDefaultProject\":\n\t\tresult, err = e.getGCEDefaultProject(ctx, tsdbQuery)\n\tcase \"timeSeriesQuery\":\n\t\tfallthrough\n\tdefault:\n\t\tresult, err = e.executeTimeSeriesQuery(ctx, tsdbQuery)\n\t}\n\n\treturn result, err\n}", "title": "" }, { "docid": "e4c14b85842c3ae18072d6435038b933", "score": "0.72813094", "text": "func (c *Context) Query() string { return c.query }", "title": "" }, { "docid": "777f1b308504170647ef7f6748841efb", "score": "0.7253673", "text": "func (app *PersistentApplication) Query(reqQuery types.RequestQuery) types.ResponseQuery {\n\treturn app.app.Query(reqQuery)\n}", "title": "" }, { "docid": "eb69a47b17913ab5968ce3c82fdbee2a", "score": "0.7242799", "text": "func (r *Resolver) Query() graphql1.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "3d05eb4aae24fc0455be34af58a8ec58", "score": "0.7238203", "text": "func (r *Resolver) Query() graphql_models.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "cb8a29f2fbad9510fd9cef73d79d14d7", "score": "0.7214272", "text": "func (db *MyDb) Query(query string, args ...any) (*sql.Rows, error) {\n\tlog.Println(\"[SQL]\", \"[\"+db.dbType+\"]\", query, args)\n\treturn db.Db.Query(query, args...)\n}", "title": "" }, { "docid": "90ab1a5503473f3d9899a0a68c746337", "score": "0.7189787", "text": "func (c *Client) Query(req *QueryRequest) (*QueryResult, error) {\n\tif req == nil {\n\t\treturn nil, errNilRequest\n\t}\n\n\tres, err := c.execute(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif res, ok := res.(*QueryResult); ok {\n\t\treturn res, nil\n\t}\n\n\treturn nil, errUnexpectedResult\n}", "title": "" }, { "docid": "bf00432db6510cdff48336679e6a1a95", "score": "0.718857", "text": "func (r *Resolver) Query() gen.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "68d3962a0334eb418407c6c181485523", "score": "0.71816427", "text": "func (c *Client) Query(q interface{}, variables map[string]interface{}) error {\n\treturn c.client.Query(c.ctx, q, variables)\n}", "title": "" }, { "docid": "9e848894cba496cb3baca251f24a6260", "score": "0.7168966", "text": "func (c *Controller) Query(ctx context.Context, req *query.Request) (query.Query, error) {\n\tq := c.createQuery(ctx, req.OrganizationID)\n\tif err := c.compileQuery(q, req.Compiler); err != nil {\n\t\tq.parentSpan.Finish()\n\t\treturn nil, err\n\t}\n\tif err := c.enqueueQuery(q); err != nil {\n\t\tq.parentSpan.Finish()\n\t\treturn nil, err\n\t}\n\treturn q, nil\n}", "title": "" }, { "docid": "79e4f3a1bbd2bfdccb1e667ad432536b", "score": "0.71604973", "text": "func (r *Resolver) Query() generated1.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "37f0a4ffb849d70812fbf6cfbe58d92b", "score": "0.7158774", "text": "func (r *Resolver) Query() resolver.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "de5dd008f864a460cbca2a551fedf1e8", "score": "0.7132303", "text": "func (r *Resolver) Query() generated.QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "053f6f10bb70cb96bdabb15de43ff0d0", "score": "0.71261865", "text": "func Query(query string, args ...interface{}) (*sql.Rows, error) {\n\trows, err := db.Query(query, args...)\n\t/*if err != nil && !debug {\n\t\tlog.Println(err)\n\t}*/\n\tif err != nil{\n\t\tlog.Println(err)\n\t}\n\treturn rows, err\n}", "title": "" }, { "docid": "c751549bc3abd8e2dafd9448be6edd97", "score": "0.7125954", "text": "func (tx *Tx) Query(q interface{}, args ...interface{}) (*Rows, error) {\n\treturn tx.QueryContext(tx.Context(), q, args...)\n}", "title": "" }, { "docid": "ad57e5108ee3c345bb6b4ee39c9319ab", "score": "0.71118987", "text": "func (db *database) Query(query string, args... interface{}) (*sql.Rows, error) {\n\trows, err := db.Db.Query(query, args...)\n\tif err != nil{\n\t\tlog.Println(err)\n\t\treturn &sql.Rows{}, err\n\t}\n\treturn rows, nil\n}", "title": "" }, { "docid": "726cdffc186e14695fe99565c067ce01", "score": "0.7104933", "text": "func Query(c *cli.Context) error {\n\tif c.NArg() != 1 {\n\t\tlog.Fatal(\"only one argument expected\")\n\t}\n\tkey := c.Args().First()\n\tremark := c.String(\"remark\")\n\tdb := model.Conn\n\tdefer db.Close()\n\tstuffs := []model.Stuff{}\n\tdb = db.Where(\"name LIKE ?\", strings.Join([]string{\"%\", key, \"%\"}, \"\"))\n\tif remark != \"\" {\n\t\tdb = db.Where(\"remark = ?\", remark)\n\t}\n\tdb.Find(&stuffs)\n\tfmt.Println(len(stuffs))\n\tfor _, stuff := range stuffs {\n\t\tfmt.Println(stuff.Name)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "33598e9e2d738532e217bbcc1b9ce2e7", "score": "0.70930827", "text": "func (d *Driver) Query(qp *hqi.QueryParam, res interface{}) error {\n\te := executor{driver: d}\n\te.where(qp.Samples)\n\te.sort(qp.Sort)\n\te.limit(qp.Skip, qp.Max)\n\n\treturn e.retrieve(res)\n}", "title": "" }, { "docid": "2a072f9022d3f69324687745ad22f368", "score": "0.70830834", "text": "func (s *StoreApp) Query(reqQuery abci.RequestQuery) (resQuery abci.ResponseQuery) {\n\n\t// find the handler\n\tpath, mod := splitPath(reqQuery.Path)\n\tqh := s.queryRouter.Handler(path)\n\tif qh == nil {\n\t\tcode, _ := errors.ABCIInfo(errors.ErrNotFound, false)\n\t\tresQuery.Code = code\n\t\tresQuery.Log = fmt.Sprintf(\"Unexpected Query path: %v\", reqQuery.Path)\n\t\treturn\n\t}\n\n\t// TODO: support historical queries by getting old read-only\n\t// height := reqQuery.Height\n\t// if height == 0 {\n\t// \twithProof := s.CommittedHeight() - 1\n\t// \tif tree.Tree.VersionExists(uint64(withProof)) {\n\t// \t\theight = withProof\n\t// \t} else {\n\t// \t\theight = s.CommittedHeight()\n\t// \t}\n\t// }\n\tinfo, err := s.store.CommitInfo()\n\tif err != nil {\n\t\treturn queryError(err)\n\t}\n\tresQuery.Height = info.Version\n\t// TODO: better version handling!\n\tdb := s.store.committed.CacheWrap()\n\n\t// make the query\n\tmodels, err := qh.Query(db, mod, reqQuery.Data)\n\tif err != nil {\n\t\treturn queryError(err)\n\t}\n\n\t// set the info as ResultSets....\n\tresQuery.Key, err = ResultsFromKeys(models).Marshal()\n\tif err != nil {\n\t\treturn queryError(err)\n\t}\n\tresQuery.Value, err = ResultsFromValues(models).Marshal()\n\tif err != nil {\n\t\treturn queryError(err)\n\t}\n\n\t// TODO: support proofs given this info....\n\t// if reqQuery.Prove {\n\t// value, proof, err := tree.GetVersionedWithProof(key, height)\n\t// if err != nil {\n\t// resQuery.Log = err.Error()\n\t// break\n\t// }\n\t// resQuery.Value = value\n\t// resQuery.Proof = proof.Bytes()\n\n\treturn resQuery\n}", "title": "" }, { "docid": "830a906a72f71684772cba7c9efe3d99", "score": "0.7075259", "text": "func (s *service) Query(db *sqlx.DB, tr *sql.Tx, query string, args ...interface{}) (*sql.Rows, error) {\n\tif tr == nil {\n\t\treturn s.QueryNoTr(db, query, args...)\n\t}\n\treturn s.QueryWithTr(tr, query, args...)\n}", "title": "" }, { "docid": "6dd1dd06f5ad1d33bb659ec6e1e520ed", "score": "0.70603836", "text": "func (c *Conn) Query(query string, args []driver.Value) (driver.Rows, error) {\n\treturn c.QueryContext(context.Background(), query, valuesToNamedValues(args))\n}", "title": "" }, { "docid": "c6f9b48a92d67cfc7d373da71c2d07c5", "score": "0.70574826", "text": "func (r *Resolver) Query() QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "c6f9b48a92d67cfc7d373da71c2d07c5", "score": "0.70574826", "text": "func (r *Resolver) Query() QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "c6f9b48a92d67cfc7d373da71c2d07c5", "score": "0.70574826", "text": "func (r *Resolver) Query() QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "c6f9b48a92d67cfc7d373da71c2d07c5", "score": "0.70574826", "text": "func (r *Resolver) Query() QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "c6f9b48a92d67cfc7d373da71c2d07c5", "score": "0.70574826", "text": "func (r *Resolver) Query() QueryResolver { return &queryResolver{r} }", "title": "" }, { "docid": "2ae5e8f12779021ecb8a6a7ac7a6ebf5", "score": "0.7055248", "text": "func (client *Client) Query(ctx context.Context, q interface{}, variables map[string]interface{}) error {\n\treturn client.graphqlClient.Query(ctx, q, variables)\n}", "title": "" } ]
be0e05ba1cff1613a9432590c02abff5
NewTCPWithConfigFile needs to be documented.
[ { "docid": "5cdc87dd9c08803a57db858c3ad3130f", "score": "0.71934867", "text": "func NewTCPWithConfigFile(from, to, configFilename string) (Proxy, error) {\n\tvar config *Config\n\tvar err error\n\tif configFilename == \"\" {\n\t\treturn nil, errors.New(\"no filename given\")\n\t}\n\tconfig, err = NewConfigFromFile(configFilename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsetupConfig(config)\n\tsetupLogger(config)\n\treturn &TCP{\n\t\tConfig: config,\n\t\tdone: make(chan struct{}),\n\t\tjobChannel: make(chan *net.TCPConn, runtime.NumCPU()),\n\t\tquit: make(chan bool),\n\t}, nil\n}", "title": "" } ]
[ { "docid": "6e41cac79dafcf2e8e9efe5255f48b59", "score": "0.5913353", "text": "func (this *OnionPath) CreatePacketTCP(dest net.Addr, data []byte) (packet []byte, err error) {\n\treturn\n}", "title": "" }, { "docid": "ce2a020de8ebcc21bdbaa8c3562a3693", "score": "0.5850748", "text": "func createTCPServer(network, address string, protocol Protocol, sendChanSize int, mode MsgHandlerModeType, dispatcher PackDispatcherInf, agentHandler SessionHandler) (*TCPServer, error) {\n\tlistener, err := net.Listen(network, address)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn newTCPServer(network, listener, protocol, sendChanSize, mode, dispatcher, agentHandler), nil\n}", "title": "" }, { "docid": "ae2fa4155dc3996ff3ff3c643141b13f", "score": "0.5816994", "text": "func NewTCP(config *Config) Proxy {\n\tsetupConfig(config)\n\tsetupLogger(config)\n\treturn &TCP{\n\t\tConfig: config,\n\t\tdone: make(chan struct{}),\n\t\tjobChannel: make(chan *net.TCPConn, runtime.NumCPU()),\n\t\tquit: make(chan bool, runtime.NumCPU()),\n\t}\n}", "title": "" }, { "docid": "bc9451474fb4067c5c384a55c83e29c8", "score": "0.578324", "text": "func NewTCP(conf *config.Configuration) LogReader {\n\treturn &TCP{conf: conf, logger: conf.Logger(\"reader: UDP\")}\n}", "title": "" }, { "docid": "b6eb3f92dcd79f146854284782a12631", "score": "0.57436484", "text": "func newConfig(prefix, certFile, keyFile string, extra []string,\n\tcustomExePath string) (*nodeConfig, error) {\n\n\tvar btcdPath string\n\tif customExePath != \"\" {\n\t\tbtcdPath = customExePath\n\t} else {\n\t\tvar err error\n\t\tbtcdPath, err = btcdExecutablePath()\n\t\tif err != nil {\n\t\t\tbtcdPath = \"btcd\"\n\t\t}\n\t}\n\n\ta := &nodeConfig{\n\t\tlisten: \"127.0.0.1:18555\",\n\t\trpcListen: \"127.0.0.1:18556\",\n\t\trpcUser: \"user\",\n\t\trpcPass: \"pass\",\n\t\textra: extra,\n\t\tprefix: prefix,\n\t\texe: btcdPath,\n\t\tendpoint: \"ws\",\n\t\tcertFile: certFile,\n\t\tkeyFile: keyFile,\n\t}\n\tif err := a.setDefaults(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn a, nil\n}", "title": "" }, { "docid": "0cc391c3b8de3733e6984e502ae47314", "score": "0.56441116", "text": "func newTCPServer(port string) Server {\n\tsrv := &TCPServer{port: port}\n\tsrv.log = log.New(\"server\")\n\tsrv.log.SetLevel(log.LevelInfo)\n\n\t// TODO - create and configure http.Server\n\ts := &http.Server{}\n\t// configure http server\n\ts.WriteTimeout = 500 * time.Millisecond\n\ts.ReadTimeout = 1000 * time.Millisecond\n\ts.Addr = fmt.Sprintf(\":%v\", srv.port) // listen on all interfaces\n\ts.Handler = srv\n\tsrv.s = s // store a reference to the http.Server\n\treturn srv\n}", "title": "" }, { "docid": "d2117645f3b3f55b8abf687dc00952ce", "score": "0.56176734", "text": "func NewTcpServer(optionFuncSet []OptionFunc) *tcpServer {\n\tserver := &tcpServer{}\n\n\t// set server options\n\tserver.options = &Options{}\n\tfor _, optionFunc := range optionFuncSet {\n\t\toptionFunc(server.options)\n\t}\n\n\t// initialize\n\tserver.serviceMap = make(map[string]Service, 0)\n\n\treturn server\n}", "title": "" }, { "docid": "7383b25eda780f67e98105608a8989d0", "score": "0.56069183", "text": "func NewTcp(p protos.Protocols) (*Tcp, error) {\n\tisDebug = logp.IsDebug(\"tcp\")\n\n\tportMap, err := buildPortsMap(p.GetAllTcp())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttcp := &Tcp{\n\t\tprotocols: p,\n\t\tportMap: portMap,\n\t\tstreams: common.NewCache(\n\t\t\tprotos.DefaultTransactionExpiration,\n\t\t\tprotos.DefaultTransactionHashSize),\n\t}\n\ttcp.streams.StartJanitor(protos.DefaultTransactionExpiration)\n\tif isDebug {\n\t\tdebugf(\"tcp\", \"Port map: %v\", portMap)\n\t}\n\n\treturn tcp, nil\n}", "title": "" }, { "docid": "62a7e3ada7cabf8583274df49681c703", "score": "0.5554017", "text": "func createTCPClient(network, address string, protocol Protocol, sendChanSize int,\n\tmode MsgHandlerModeType, dispatcher PackDispatcherInf, agent SessionHandler) (*TCPClient, error) {\n\tconn, err := net.Dial(network, address)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcodec, err := protocol.NewSocketCodec(conn)\n\tif err != nil {\n\t\tconn.Close()\n\t\treturn nil, err\n\t}\n\treturn newTCPClient(conn, codec, sendChanSize, mode, dispatcher, agent), nil\n}", "title": "" }, { "docid": "15f30d2897868876d3d1d4b50d1efa27", "score": "0.5517346", "text": "func TCP(parameters []string) (exitCode int, exitMessage string) {\n\treturn getConnectionWorker(parameters[0], \"TCP\", \"0ns\")\n}", "title": "" }, { "docid": "108b69f730340e9245803463256c3e81", "score": "0.54795015", "text": "func New(address string, opts ...Option) checker.Checker {\n\tt := &TCP{\n\t\taddress: address,\n\t\ttimeout: DefaultConnectionTimeout,\n\t}\n\n\t// apply the list of options to TCP\n\tfor _, opt := range opts {\n\t\topt(t)\n\t}\n\n\treturn t\n}", "title": "" }, { "docid": "05c16ac2188c6383086a02b58e4bc1d3", "score": "0.54675555", "text": "func NewTCPTransport(config TCPTransportConfig, logger log.Logger) (*TCPTransport, error) {\n\tif len(config.BindAddrs) == 0 {\n\t\tconfig.BindAddrs = []string{zeroZeroZeroZero}\n\t}\n\n\t// Build out the new transport.\n\tvar ok bool\n\tt := TCPTransport{\n\t\tcfg: config,\n\t\tlogger: log.With(logger, \"component\", \"memberlist TCPTransport\"),\n\t\tpacketCh: make(chan *memberlist.Packet),\n\t\tconnCh: make(chan net.Conn),\n\t}\n\n\tvar err error\n\tif config.TLSEnabled {\n\t\tt.tlsConfig, err = config.TLS.GetTLSConfig()\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"unable to create TLS config\")\n\t\t}\n\t}\n\n\tt.registerMetrics(config.MetricsRegisterer)\n\n\t// Clean up listeners if there's an error.\n\tdefer func() {\n\t\tif !ok {\n\t\t\t_ = t.Shutdown()\n\t\t}\n\t}()\n\n\t// Build all the TCP and UDP listeners.\n\tport := config.BindPort\n\tfor _, addr := range config.BindAddrs {\n\t\tip := net.ParseIP(addr)\n\n\t\ttcpAddr := &net.TCPAddr{IP: ip, Port: port}\n\n\t\tvar tcpLn net.Listener\n\t\tif config.TLSEnabled {\n\t\t\ttcpLn, err = tls.Listen(\"tcp\", tcpAddr.String(), t.tlsConfig)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, errors.Wrapf(err, \"failed to start TLS TCP listener on %q port %d\", addr, port)\n\t\t\t}\n\t\t} else {\n\t\t\ttcpLn, err = net.ListenTCP(\"tcp\", tcpAddr)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, errors.Wrapf(err, \"failed to start TCP listener on %q port %d\", addr, port)\n\t\t\t}\n\t\t}\n\n\t\tt.tcpListeners = append(t.tcpListeners, tcpLn)\n\n\t\t// If the config port given was zero, use the first TCP listener\n\t\t// to pick an available port and then apply that to everything\n\t\t// else.\n\t\tif port == 0 {\n\t\t\tport = tcpLn.Addr().(*net.TCPAddr).Port\n\t\t}\n\t}\n\n\t// Fire them up now that we've been able to create them all.\n\tfor i := 0; i < len(config.BindAddrs); i++ {\n\t\tt.wg.Add(1)\n\t\tgo t.tcpListen(t.tcpListeners[i])\n\t}\n\n\tok = true\n\treturn &t, nil\n}", "title": "" }, { "docid": "0b7cf283f379602d04446c40c132f1e2", "score": "0.5464642", "text": "func (j *ServiceTestJig) CreateTCPServiceWithPort(namespace string, tweak func(svc *v1.Service), port int32) *v1.Service {\n\tsvc := j.newServiceTemplate(namespace, v1.ProtocolTCP, port)\n\tif tweak != nil {\n\t\ttweak(svc)\n\t}\n\tresult, err := j.Client.Core().Services(namespace).Create(svc)\n\tif err != nil {\n\t\tFailf(\"Failed to create TCP Service %q: %v\", svc.Name, err)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "a038b2247dc95383b29e643c4c0028e2", "score": "0.54640573", "text": "func tcp(parameters []string) (exitCode int, exitMessage string) {\n\treturn getConnectionWorker(parameters[0], \"TCP\", \"0ns\")\n}", "title": "" }, { "docid": "5cc6ac5d9468f506c010de52df68b095", "score": "0.53840524", "text": "func init() {\n\ttrntCfg.PeerId = generatePeerId()\n\ttrntCfg.Port = 6882\n\ttrntCfg.WaitForListener = make(chan bool)\n\tstr := fmt.Sprintf(\":%d\", trntCfg.Port)\n\ttrntCfg.MyTCPAddr, _ = net.ResolveTCPAddr(\"tcp\", str)\n\ttrntCfg.PeerConnectTimeout = 2 * time.Second\n\ttrntCfg.PieceBlockLen = 0x4000 // 16KB\n\tfmt.Println(DebugGetFuncName(), \"My address: \", trntCfg.MyTCPAddr)\n}", "title": "" }, { "docid": "c3a441efb40c809aa379a64f7bae3356", "score": "0.53706646", "text": "func newFilePeers(c config.Config) Peers {\n\treturn &filePeers{\n\t\tc: c,\n\t}\n}", "title": "" }, { "docid": "a8e42b10d612d3e557034186d1d486b3", "score": "0.5353812", "text": "func (cfg tcpListenerCfg) Run() error {\n\taddress := fmt.Sprintf(\"%s:%d\", cfg.BindAddr, cfg.Port)\n\ttlscfg, err := netceptor.MainInstance.GetServerTLSConfig(cfg.TLS)\n\tif err != nil {\n\t\treturn err\n\t}\n\tb, err := NewTCPListener(address, tlscfg)\n\tif err != nil {\n\t\tlogger.Error(\"Error creating listener %s: %s\\n\", address, err)\n\n\t\treturn err\n\t}\n\terr = netceptor.MainInstance.AddBackend(b,\n\t\tnetceptor.BackendConnectionCost(cfg.Cost),\n\t\tnetceptor.BackendNodeCost(cfg.NodeCost),\n\t\tnetceptor.BackendAllowedPeers(cfg.AllowedPeers))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e351223c9df50a1477a40bb04fa4f0c7", "score": "0.5351008", "text": "func NewTcp(p protos.Protocols) (*Tcp, error) {\n\tportMap, err := buildPortsMap(p.GetAllTcp())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttcp := &Tcp{protocols: p, portMap: portMap}\n\ttcp.streamsMap = make(map[common.HashableIpPortTuple]*TcpStream, TCP_STREAM_HASH_SIZE)\n\tlogp.Debug(\"tcp\", \"Port map: %v\", portMap)\n\n\treturn tcp, nil\n}", "title": "" }, { "docid": "fb955e0ffef6513d11356b21a09710c7", "score": "0.5348298", "text": "func MakeTCPListener(listenerName string, address model.Address, clusterName string, statPrefix string, logfileDir string, logfileName string) (*v2.Listener, error) {\n\t// access log service configuration\n\talsConfig := &accesslog.FileAccessLog{\n\t\tPath: logfileDir + \"/\" + logfileName,\n\t}\n\talsConfigPbst, err := util.MessageToStruct(alsConfig)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"listnere FileAccessLog generation failed(name=%s, cluste=%s, addr=%+v, log=%s:%s)\", listenerName, address, clusterName, logfileDir, logfileName)\n\t}\n\t// TCP filter configuration\n\tconfig := &tcp.TcpProxy{\n\t\tStatPrefix: statPrefix,\n\t\tCluster: clusterName,\n\t\tAccessLog: []*accesslog.AccessLog{{\n\t\t\tName: \"envoy.file_access_log\",\n\t\t\tConfig: alsConfigPbst,\n\t\t}},\n\t}\n\tpbst, err := util.MessageToStruct(config)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"tcp proxy generation failed(name=%s, addr=%+v, cluster=%s)\", listenerName, address, clusterName)\n\t}\n\treturn &v2.Listener{\n\t\tName: listenerName,\n\t\tAddress: core.Address{\n\t\t\tAddress: &core.Address_SocketAddress{\n\t\t\t\tSocketAddress: &core.SocketAddress{\n\t\t\t\t\tProtocol: core.TCP,\n\t\t\t\t\tAddress: address.Hostname,\n\t\t\t\t\tPortSpecifier: &core.SocketAddress_PortValue{\n\t\t\t\t\t\tPortValue: address.Port,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tFilterChains: []listener.FilterChain{{\n\t\t\tFilters: []listener.Filter{{\n\t\t\t\tName: cache.TCPProxy,\n\t\t\t\tConfig: pbst,\n\t\t\t}},\n\t\t}},\n\t}, nil\n}", "title": "" }, { "docid": "8cddd43148482f40f7f0a228285a1349", "score": "0.5345197", "text": "func (cfg tcpDialerCfg) Run() error {\n\tlogger.Debug(\"Running TCP peer connection %s\\n\", cfg.Address)\n\thost, _, err := net.SplitHostPort(cfg.Address)\n\tif err != nil {\n\t\treturn err\n\t}\n\ttlscfg, err := netceptor.MainInstance.GetClientTLSConfig(cfg.TLS, host, netceptor.ExpectedHostnameTypeDNS)\n\tif err != nil {\n\t\treturn err\n\t}\n\tb, err := NewTCPDialer(cfg.Address, cfg.Redial, tlscfg)\n\tif err != nil {\n\t\tlogger.Error(\"Error creating peer %s: %s\\n\", cfg.Address, err)\n\n\t\treturn err\n\t}\n\terr = netceptor.MainInstance.AddBackend(b,\n\t\tnetceptor.BackendConnectionCost(cfg.Cost),\n\t\tnetceptor.BackendAllowedPeers(cfg.AllowedPeers))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "52763981cc3dd7d4e68e6fedf3de6528", "score": "0.53087384", "text": "func NewTCPWriter(addr string, tlsCfg *tls.Config) (*TCPWriter, error) {\n\tw := new(TCPWriter)\n\n\tconst dialTimeout = 5 * time.Second\n\n\t// If TLS configuration is specified, try to connect with it\n\tif tlsCfg != nil {\n\t\tw.connect = func() (net.Conn, error) {\n\t\t\treturn tls.DialWithDialer(&net.Dialer{Timeout: dialTimeout}, \"tcp\", addr, tlsCfg)\n\t\t}\n\t} else {\n\t\tw.connect = func() (net.Conn, error) { return net.DialTimeout(\"tcp\", addr, dialTimeout) }\n\t}\n\n\t// Get Hostname if possible, otherwise just set to localhost\n\tvar err error\n\tif w.Hostname, err = os.Hostname(); err != nil {\n\t\tw.Hostname = \"localhost\"\n\t}\n\n\t// Set facility to binary name\n\tw.Facility = path.Base(os.Args[0])\n\n\treturn w, nil\n}", "title": "" }, { "docid": "213b61a013f1f2d4f2dac6031dffa4a8", "score": "0.52797425", "text": "func NewConnectionTCP(t *Task) (net.Conn, error) {\n\tindex := strings.Index(t.ServerAddress, \":\")\n\tip := t.ServerAddress[0:index]\n\tvalue := t.ServerAddress[index+1 : len(t.ServerAddress)-1]\n\tport, _ := (strconv.Atoi(value))\n\tports := (uint16)(port)\n\tbr := &ConnectionTCP{\n\t\tIP: ip,\n\t\tPort: ports,\n\t\tServerAddress: t.ServerAddress,\n\t\tTask: t,\n\t}\n\tif ParseServerIPAndPort(br.ServerAddress) != nil {\n\t\treturn nil, fmt.Errorf(\"server ip or port find error\")\n\t}\n\tconn, err := net.Dial(\"tcp\", br.ServerAddress)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"connect failed: %v\", err)\n\t}\n\treturn conn, nil\n}", "title": "" }, { "docid": "4e228333a4133436e0d2b50e8f1bc60b", "score": "0.5264325", "text": "func TCPDo(ctx context.Context, config TCPConfig) (net.Conn, error) {\n\tif config.Dialer != nil {\n\t\treturn config.Dialer.DialContext(ctx, \"tcp\", config.Endpoint)\n\t}\n\tresolver := config.Resolver\n\tif resolver == nil {\n\t\tresolver = &netxlite.ResolverSystem{}\n\t}\n\tdialer := NewDialerResolver(resolver)\n\treturn dialer.DialContext(ctx, \"tcp\", config.Endpoint)\n}", "title": "" }, { "docid": "6f8c4c2291ea2f00cb3de50c2478cfcd", "score": "0.52450246", "text": "func CreateTCPListener(t *testing.T) net.Listener {\n\tt.Helper()\n\tlis, err := net.Listen(\"tcp\", \"localhost:0\")\n\tif err != nil {\n\t\tt.Fatalf(\"Failed to create listener: %v\", err)\n\t}\n\treturn lis\n}", "title": "" }, { "docid": "4bdaee7e86dbf01f203e67c4d6644925", "score": "0.52394384", "text": "func newStreamConf() *streamConf {\n\treturn &streamConf{\n\t\tWorkers: 1,\n\t\tBufSize: 0,\n\t\tContinueOnError: false,\n\t}\n}", "title": "" }, { "docid": "a8a2d27aa37ba7feeb9ab4188eeddfd7", "score": "0.52349186", "text": "func tcpSet(c *TCPConn) Trigger {\n\ttcp := &c.TCP\n\tSet := tcp.Set()\n\tif c.TCP.Source() != c.port {\n\t\tSet.Destination(tcp.Source())\n\t\tSet.Source(c.port)\n\t}\n\t// First TCP packet received clause\n\tif tcp.HasFlags(grams.TCPHEADER_FLAG_SYN) {\n\t\t// const startSeq = 2560\n\t\t_log(\"tcpSet [SYN,ACK]\")\n\t\t// adds some entropy to sequence number so for loops don't get false positive packets\n\t\tvar rand uint32 = 2560 //uint32(0x0062&c.IPv4.ID()) + uint32(0x00af&tcp.Checksum())\n\t\tSet.Seq(rand)\n\t\tSet.UrgentPtr(0)\n\t\tSet.Flags(grams.TCPHEADER_FLAG_ACK | grams.TCPHEADER_FLAG_SYN)\n\t\t// set Maximum segment size (option 0x02) length 4 (0x04) to 1280 (0x0500)\n\t\tSet.Options([]byte{0x02, 0x04, 0x05, 0x00})\n\t\tSet.Offset(5 + 1) // Nominal length + options.\n\n\t\tSet.Ack(tcp.Ack() + 1)\n\t\tSet.WindowSize(1400) // this is what EtherCard does?\n\t\treturn nil\n\t}\n\n\t// Default TCP settings\n\t{\n\t\tSet.Offset(5)\n\t\tSet.Options(nil)\n\t\tSet.WindowSize(1024) // TODO assign meaningful value to window size (or not?)\n\t}\n\n\t_log(\"tcpSet <NOP>\")\n\treturn nil\n}", "title": "" }, { "docid": "14c440b9982f9d2a2b6176b212962e3a", "score": "0.5231901", "text": "func InitTCP(server *Server) (err error) {\n\tvar (\n\t\tlistener net.Listener\n\t)\n\tfor _, bind := range Conf.TCPBind {\n\t\tif listener, err = net.Listen(\"tcp\", bind); err != nil {\n\t\t\tlog.Error(\"net.ListenTCP(\\\"tcp4\\\", \\\"%s\\\") error(%v)\", bind, err)\n\t\t\treturn\n\t\t}\n\t\t// split N core accept\n\t\tfor i := 0; i < Conf.MaxProc; i++ {\n\t\t\tlog.Info(\"start tcp accept[goroutine %d]: \\\"%s\\\"\", i, bind)\n\t\t\tgo server.Accept(listener)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "9dcc4b63e8238f77f6080e5f73e12c57", "score": "0.5214527", "text": "func NewTCPServer(p string, l lock.Manager) TCPServer {\n\treturn TCPServer{\n\t\tport: p,\n\t\tManager: l,\n\t}\n}", "title": "" }, { "docid": "dc139068e5d46990511b0552e11cd4e5", "score": "0.521275", "text": "func NewTCP(anon anonymize.IPAnonymizer, dataDir string, uuidWaitDuration, maxFlowDuration time.Duration, maxIdleRAM bytecount.ByteCount, stream bool, maxHeap uint64) *TCP {\n\tuuidc := make(chan UUIDEvent, 100)\n\treturn &TCP{\n\t\tUUIDChan: uuidc,\n\t\tuuidReadChan: uuidc,\n\n\t\tcurrentFlows: make(map[FlowKey]*saver.TCP),\n\t\toldFlows: make(map[FlowKey]*saver.TCP),\n\t\tmaxIdleRAM: maxIdleRAM,\n\t\tstatus: promStatus{},\n\n\t\tanon: anon,\n\t\tdataDir: dataDir,\n\t\tmaxDuration: maxFlowDuration,\n\t\tuuidWaitDuration: uuidWaitDuration,\n\t\tstream: stream,\n\t\tmaxHeap: maxHeap,\n\t}\n}", "title": "" }, { "docid": "f3577923070242738b0b8f9c11d0c0c6", "score": "0.5169991", "text": "func NewTransport(opts ...interface{}) nano.Transport {\n\tt := &tcpTransport{opts: make(map[string]interface{})}\n\tif len(opts)%2 != 0 {\n\t\treturn nil\n\t}\n\tfor i := 0; i+1 < len(opts); i += 2 {\n\t\tname := opts[i].(string)\n\t\tif _, present := validOpts[name]; !present {\n\t\t\t// invalid option\n\t\t\treturn nil\n\t\t}\n\n\t\tt.opts[name] = opts[i+1]\n\t}\n\n\treturn t\n}", "title": "" }, { "docid": "8cb826143978cee3692b9313eded2665", "score": "0.5162067", "text": "func newTCPSession(conn net.Conn, closeChan chan struct{}) *TCPSession {\n\tts := &TCPSession{\n\t\tconn: conn,\n\t\tframer: framer.New(),\n\t\tcloseChan: closeChan,\n\t\tcloseChanCloser: sync.Once{},\n\t}\n\n\treturn ts\n}", "title": "" }, { "docid": "3209a95cd15b47e41dc4dfef7fff09ba", "score": "0.5160021", "text": "func newTLSConfig(certfile string, privateKey string) (*tls.Config, error) {\n\t// Import client certificate/key pair\n\tcert, err := tls.LoadX509KeyPair(certfile, privateKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create tls.Config with desired tls properties\n\treturn &tls.Config{\n\t\t// ClientAuth = whether to request cert from server.\n\t\t// Since the server is set up for SSL, this happens\n\t\t// anyways.\n\t\tClientAuth: tls.NoClientCert,\n\t\t// ClientCAs = certs used to validate client cert.\n\t\tClientCAs: nil,\n\t\t// InsecureSkipVerify = verify that cert contents\n\t\t// match server. IP matches what is in cert etc.\n\t\tInsecureSkipVerify: true,\n\t\t// Certificates = list of certs client sends to server.\n\t\tCertificates: []tls.Certificate{cert},\n\t}, nil\n}", "title": "" }, { "docid": "172a3f342494677c3c4c2c9e2e6c8610", "score": "0.5157513", "text": "func NewTCPGrpcControlListener(s control.ControlServer, controlAddr string) ControlListener {\n\tlis, err := net.Listen(controlListenAddr(controlAddr))\n\tif err != nil {\n\t\tlog.DefaultLogger().Error(\"grpc listener\", \"failure\", \"err\", err)\n\t\treturn ControlListener{}\n\t}\n\tgrpcServer := grpc.NewServer()\n\tcontrol.RegisterControlServer(grpcServer, s)\n\treturn ControlListener{conns: grpcServer, lis: lis}\n}", "title": "" }, { "docid": "e9a9935c75367b54455e4571cca68297", "score": "0.51547545", "text": "func NewConfig() *Config {\n cfg := &Config{\n Table: &TableConfig{\n Ttl: 3600 * 12, // 12 hours\n Period: 60 * 2, // 2 mins\n },\n Api: &ApiConfig{\n ApiAddr: \"127.0.0.1:8080\",\n },\n Receiver: &ReceiverConfig{\n TcpAddr: \":3000\",\n },\n }\n return cfg\n}", "title": "" }, { "docid": "87a603e7922dc5e0721c0a3343176193", "score": "0.51295584", "text": "func (cons *Socket) Configure(conf core.PluginConfigReader) {\n\tif len(cons.acknowledge) > 0 && cons.protocol == \"udp\" {\n\t\tconf.Errors.Pushf(\"UDP sockets do not support acknowledgment.\")\n\t}\n\n\taddress := conf.GetString(\"Address\", \"tcp://0.0.0.0:5880\")\n\tcons.protocol, cons.address = tnet.ParseAddress(address, \"tcp\")\n\tcons.flags = 0\n\n\tpartitioner := conf.GetString(\"Partitioner\", \"delimiter\")\n\tswitch strings.ToLower(partitioner) {\n\tcase \"binary_be\":\n\t\tcons.flags |= tio.BufferedReaderFlagBigEndian\n\t\tfallthrough\n\n\tcase \"binary\", \"binary_le\":\n\t\tcons.flags |= tio.BufferedReaderFlagEverything\n\t\tswitch conf.GetInt(\"Size\", 4) {\n\t\tcase 1:\n\t\t\tcons.flags |= tio.BufferedReaderFlagMLE8\n\t\tcase 2:\n\t\t\tcons.flags |= tio.BufferedReaderFlagMLE16\n\t\tcase 4:\n\t\t\tcons.flags |= tio.BufferedReaderFlagMLE32\n\t\tcase 8:\n\t\t\tcons.flags |= tio.BufferedReaderFlagMLE64\n\t\tdefault:\n\t\t\tconf.Errors.Pushf(\"Size only supports the value 1,2,4 and 8\")\n\t\t}\n\n\tcase \"fixed\":\n\t\tcons.flags |= tio.BufferedReaderFlagMLEFixed\n\t\tcons.offset = int(conf.GetInt(\"Size\", 1))\n\n\tcase \"ascii\":\n\t\tcons.flags |= tio.BufferedReaderFlagMLE\n\n\tcase \"delimiter\":\n\t\t// Nothing to add\n\n\tdefault:\n\t\tconf.Errors.Pushf(\"Unknown partitioner: %s\", partitioner)\n\t}\n}", "title": "" }, { "docid": "cc2334fd588e2e144d2eed0e50ddfd7b", "score": "0.51278883", "text": "func (j *ServiceTestJig) CreateTCPServiceOrFail(namespace string, tweak func(svc *v1.Service)) *v1.Service {\n\tsvc := j.newServiceTemplate(namespace, v1.ProtocolTCP, 80)\n\tif tweak != nil {\n\t\ttweak(svc)\n\t}\n\tresult, err := j.Client.Core().Services(namespace).Create(svc)\n\tif err != nil {\n\t\tFailf(\"Failed to create TCP Service %q: %v\", svc.Name, err)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "089aa1a44df21506f3dd636f048b81a1", "score": "0.51179016", "text": "func initTCPConnectionPool() (*sql.DB, error) {\n\t// [START cloud_sql_mysql_databasesql_create_tcp]\n\tvar (\n\t\tdbUser = mustGetenv(\"DB_USER\") // e.g. 'my-db-user'\n\t\tdbPwd = mustGetenv(\"DB_PASS\") // e.g. 'my-db-password'\n\t\tdbTCPHost = mustGetenv(\"DB_HOST\") // e.g. '127.0.0.1' ('172.17.0.1' if deployed to GAE Flex)\n\t\tdbPort = mustGetenv(\"DB_PORT\") // e.g. '3306'\n\t\tdbName = mustGetenv(\"DB_NAME\") // e.g. 'my-database'\n\t)\n\n\tvar dbURI string\n\tdbURI = fmt.Sprintf(\"%s:%s@tcp(%s:%s)/%s?parseTime=true\", dbUser, dbPwd, dbTCPHost, dbPort, dbName)\n\n\t// dbPool is the pool of database connections.\n\tdbPool, err := sql.Open(\"mysql\", dbURI)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"sql.Open: %v\", err)\n\t}\n\n\t// [START_EXCLUDE]\n\tconfigureConnectionPool(dbPool)\n\t// [END_EXCLUDE]\n\n\treturn dbPool, nil\n\t// [END cloud_sql_mysql_databasesql_create_tcp]\n}", "title": "" }, { "docid": "6587c4923f50da67e80ee66c16f81338", "score": "0.5102555", "text": "func newConfig(filePath string, obfuscate bool,\n\tfactory func() interface{}) Config {\n\tcfg := &config{\n\t\tfilePath: filePath,\n\t\tobfuscate: obfuscate,\n\t\tsaveChan: make(chan interface{}),\n\t\tfactory: factory,\n\t}\n\n\t// Start separate go routine that saves newly fetched proxies to disk.\n\tgo cfg.save()\n\treturn cfg\n}", "title": "" }, { "docid": "48819bba77cc99865ba28f10bf3d6769", "score": "0.5100049", "text": "func TCPClient(fileName string,\n\tpacketSize uint64, address string, blockSize uint64, maxBuff uint64) {\n\tconn, err := EstablishConnection(address)\n\tsendFileInfos(fileName, conn, packetSize)\n\tif err != nil {\n\t\tfmt.Println(\"impossible to connect to remote host\")\n\t\treturn\n\t}\n\tprivateKey := security.ReadPrivateKeyFromFile(\"rsa.pem\")\n\taesKey := doChallenge(privateKey, conn)\n\tfmt.Println(\"the key is: \" + hex.EncodeToString(aesKey))\n\tbuff := make([]byte, 4)\n\t_, err = conn.Read(buff)\n\tif err != nil {\n\t\tfmt.Println(\"reading from the connection to get the udp port failed\")\n\t}\n\n\tudpPort := binary.LittleEndian.Uint32(buff)\n\tfmt.Println(\"the udp port is: \", udpPort)\n\n\tremoteAddressUDP, _ := net.ResolveUDPAddr(\"udp\", strings.Split(address, \":\")[0]+\":\"+strconv.Itoa(int(udpPort)))\n\tudpConn, err := net.DialUDP(\"udp\", nil, remoteAddressUDP)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\tudpConn.SetWriteBuffer(0)\n\tif err != nil {\n\t\tfmt.Println(\"error while trying to dial server\")\n\t\tfmt.Println(err)\n\t}\n\tvar keyAsArray [aes.BlockSize]byte\n\tcopy(keyAsArray[:], aesKey)\n\tSendFile(fileName, keyAsArray, blockSize, udpConn, packetSize, conn, maxBuff)\n\t// SendChunksToChannel(filename string, channel chan []byte, buffsize int, key [16]byte)\n\t//TODO open udp dial with the port\n\t// add channel, and write files to channel\n\t// readFrom file and encrypt it\n\t//ADD loop for ACK\n}", "title": "" }, { "docid": "26b9665e55fa4ed65531fbcc8bf8fac9", "score": "0.5097862", "text": "func NewTCPConn(wq *waiter.Queue, ep tcpip.Endpoint) *TCPConn {\n\tc := &TCPConn{\n\t\twq: wq,\n\t\tep: ep,\n\t}\n\tc.deadlineTimer.init()\n\treturn c\n}", "title": "" }, { "docid": "a099e39429959b85b9f010831bb02c13", "score": "0.5091732", "text": "func NewTCPClient(rawaddr string, protocol int, framed bool) (client *HClient, err error) {\r\n\ttcpAddr, err := net.ResolveTCPAddr(\"tcp\", rawaddr)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\tvar trans thrift.TTransport\r\n\t\r\n\ttrans, err = thrift.NewTSocket(net.JoinHostPort(tcpAddr.IP.String(), strconv.Itoa(tcpAddr.Port)))\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\tif framed {\r\n\t\ttrans = thrift.NewTFramedTransport(trans)\r\n\t}else {\r\n\t\ttrans = thrift.NewTBufferedTransport(trans, 8192)\r\n\t}\r\n\r\n\treturn newClient(tcpAddr.String(), protocol, trans)\r\n}", "title": "" }, { "docid": "c393020e90fee66409e68e4509fae6ad", "score": "0.5079696", "text": "func TestTCP(t *testing.T) {\n\tpack := Setup(t)\n\tevilUser, _ := pack.CreateUser(t)\n\n\trootWs, err := pack.tc.CreateAppSession(context.Background(), types.CreateAppSessionRequest{\n\t\tUsername: pack.tc.Username,\n\t\tPublicAddr: pack.rootTCPPublicAddr,\n\t\tClusterName: pack.rootAppClusterName,\n\t})\n\trequire.NoError(t, err)\n\tleafWs, err := pack.tc.CreateAppSession(context.Background(), types.CreateAppSessionRequest{\n\t\tUsername: pack.tc.Username,\n\t\tPublicAddr: pack.leafTCPPublicAddr,\n\t\tClusterName: pack.leafAppClusterName,\n\t})\n\trequire.NoError(t, err)\n\n\ttests := []struct {\n\t\tdescription string\n\t\taddress string\n\t\toutMessage string\n\t\twantReadErr error\n\t}{\n\t\t{\n\t\t\tdescription: \"TCP app in root cluster\",\n\t\t\taddress: pack.startLocalProxy(t,\n\t\t\t\tpack.makeTLSConfig(t, rootWs.GetName(), rootWs.GetUser(), pack.rootTCPPublicAddr, pack.rootAppClusterName, \"\")),\n\t\t\toutMessage: pack.rootTCPMessage,\n\t\t},\n\t\t{\n\t\t\tdescription: \"TCP app in leaf cluster\",\n\t\t\taddress: pack.startLocalProxy(t,\n\t\t\t\tpack.makeTLSConfig(t, leafWs.GetName(), leafWs.GetUser(), pack.leafTCPPublicAddr, pack.leafAppClusterName, \"\")),\n\t\t\toutMessage: pack.leafTCPMessage,\n\t\t},\n\t\t{\n\t\t\tdescription: \"TCP app in root cluster, invalid session owner\",\n\t\t\taddress: pack.startLocalProxy(t,\n\t\t\t\tpack.makeTLSConfig(t, rootWs.GetName(), evilUser.GetName(), pack.rootTCPPublicAddr, pack.rootAppClusterName, \"\")),\n\t\t\twantReadErr: io.EOF, // access denied errors should close the tcp conn\n\t\t},\n\t\t{\n\t\t\tdescription: \"TCP app in leaf cluster, invalid session owner\",\n\t\t\taddress: pack.startLocalProxy(t,\n\t\t\t\tpack.makeTLSConfig(t, leafWs.GetName(), evilUser.GetName(), pack.leafTCPPublicAddr, pack.leafAppClusterName, \"\")),\n\t\t\twantReadErr: io.EOF, // access denied errors should close the tcp conn\n\t\t},\n\t}\n\n\tfor _, test := range tests {\n\t\ttest := test\n\t\tt.Run(test.description, func(t *testing.T) {\n\t\t\tt.Parallel()\n\t\t\tconn, err := net.Dial(\"tcp\", test.address)\n\t\t\trequire.NoError(t, err)\n\n\t\t\tbuf := make([]byte, 1024)\n\t\t\tn, err := conn.Read(buf)\n\t\t\tif test.wantReadErr != nil {\n\t\t\t\trequire.Error(t, err)\n\t\t\t\trequire.ErrorIs(t, err, test.wantReadErr)\n\t\t\t\treturn\n\t\t\t}\n\t\t\trequire.NoError(t, err)\n\n\t\t\tresp := strings.TrimSpace(string(buf[:n]))\n\t\t\trequire.Equal(t, test.outMessage, resp)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "4902a2f16afa6bea6974f03a561bcf05", "score": "0.5073925", "text": "func OpenTCP(rm vi.Session, ip string, mode, timeout uint32) (*Driver, vi.Status) {\r\n\tif len(ip) == 0 {\r\n\t\tfmt.Println(\"Error, empty ip address string.\")\r\n\t\tos.Exit(0)\r\n\t}\r\n\tname := fmt.Sprintf(\"TCPIP::%s::INSTR\", ip)\r\n\tinstr, status := rm.Open(name, mode, timeout)\r\n\tif status < vi.SUCCESS {\r\n\t\tfmt.Println(\"Error, OpenGpib failed with error: \", status)\r\n\t\tos.Exit(0)\r\n\t}\r\n\treturn &Driver{instr}, status\r\n}", "title": "" }, { "docid": "8f93911fa255a2cdf4ca50b0f738b58e", "score": "0.50729483", "text": "func NewSocketTCP(name, bind string, fesl bool) (*Socket, error) {\n\tsocket := newSocket(name, bind, fesl)\n\tlistener, err := socket.listenTCP()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsocket.listen = listener\n\tgo socket.run(socket.createClientTCP)\n\n\treturn socket, nil\n}", "title": "" }, { "docid": "c0eadb85ddb331480de999cc7cee36a6", "score": "0.5070144", "text": "func New(network, addr string) *Config {\n\tif network == \"\" || addr == \"\" {\n\t\tutil.Debugf(\"empty network or address detected %s %s, setting defaults: tcp :3000\\n\", network, addr)\n\t\tnetwork = \"tcp\"\n\t\taddr = \":3000\"\n\t}\n\tc := &Config{\n\t\tNetwork: network,\n\t\tAddress: addr,\n\t\tSymbol: \"Plugin\",\n\t}\n\treturn c\n}", "title": "" }, { "docid": "4002104d6aa9970f1efc72962c41b8ee", "score": "0.50662935", "text": "func (cf *ConnectionFactory) NewTcpConnect(addr string, i int) (conn *common.Conn, err error) {\n\ttcpConn, err := net.Dial(\"tcp\", addr)\n\n\tif err == nil {\n\t\tconn = common.NewConn(tcpConn, cf.config, i)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "ae02756edc72fefef52992781610d8b9", "score": "0.5064507", "text": "func newTcpRuleMutation(c config, op Op, opts ...tcpruleOption) *TcpRuleMutation {\n\tm := &TcpRuleMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeTcpRule,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "fec753c2340bc8c00ce68395039e6e53", "score": "0.5057748", "text": "func ClientTcpInit(Id uint32, ProxyIp string) *ClientTCP {\n\tc := &ClientTCP{\n\t\tId: Id,\n\t\tWg: &sync.WaitGroup{},\n\t\tDone: make(chan struct{}),\n\n\t\tProxyAddr: ProxyIp,\n\t\tRecvChan: make(chan Command, Conf.LenChannel),\n\t\tSendChan: make(chan Command, Conf.LenChannel),\n\t}\n\treturn c\n}", "title": "" }, { "docid": "cba0f14ed557c843f1ad1218c8abe5d7", "score": "0.50559545", "text": "func (g *GatewayAction) CreateTCPRule(tx *gorm.DB, req *apimodel.AddTCPRuleStruct) error {\n\t// add tcp rule\n\ttcpRule := &model.TCPRule{\n\t\tUUID: req.TCPRuleID,\n\t\tServiceID: req.ServiceID,\n\t\tContainerPort: req.ContainerPort,\n\t\tIP: req.IP,\n\t\tPort: req.Port,\n\t}\n\tif err := g.dbmanager.TCPRuleDaoTransactions(tx).AddModel(tcpRule); err != nil {\n\t\treturn err\n\t}\n\t// add rule extensions\n\tfor _, ruleExtension := range req.RuleExtensions {\n\t\tre := &model.RuleExtension{\n\t\t\tUUID: util.NewUUID(),\n\t\t\tRuleID: tcpRule.UUID,\n\t\t\tValue: ruleExtension.Value,\n\t\t}\n\t\tif err := g.dbmanager.RuleExtensionDaoTransactions(tx).AddModel(re); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4136f3774e32dcfc74b5cfde7bba0959", "score": "0.50544196", "text": "func testTCPConnection(testNr int, test Configuration) ResponseDetails {\n\tfmt.Printf(\"[%d] Target: %s (%s)... \", (testNr + 1), test.Host, strings.ToUpper(test.Proto))\n\n\tif test.Timeout == 0 {\n\t\ttest.Timeout = timeout\n\t}\n\n\tstartTime := time.Now()\n\trespDetails := ResponseDetails{Request: test, Success: false}\n\t_, err := net.DialTimeout(\"tcp\", net.JoinHostPort(test.Host, strconv.Itoa(test.Port)), time.Duration(test.Timeout)*time.Second)\n\n\tif err != nil {\n\t\tfmt.Printf(\"[%sFAILED%s]\\nUnable to access host via TCP: %s\\n\", CLR_RED, CLR_N, err.Error())\n\t\trespDetails.FailureMessage = err.Error()\n\t} else {\n\t\trespDetails.Success = true\n\t\tfmt.Printf(\"[%sOK%s]\\n\", CLR_GREEN, CLR_N)\n\t}\n\n\trespDetails.Time = time.Since(startTime).String()\n\treturn respDetails\n}", "title": "" }, { "docid": "ccafdb0408d69aced5df3e5c944bb6d8", "score": "0.5046471", "text": "func newTLSConfig() *tls.Config {\n\tcertpool := x509.NewCertPool()\n\tpwd, err := os.Getwd()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tfullPath := filepath.Join(pwd, dataFolder, caFile)\n\tca, err := ioutil.ReadFile(fullPath)\n\tif err != nil {\n\t\tlog.Fatal(\"error reading the ca cert\")\n\t}\n\tcertpool.AppendCertsFromPEM(ca)\n\treturn &tls.Config{\n\t\tRootCAs: certpool,\n\t}\n}", "title": "" }, { "docid": "894593b345140a69d3f649d2e58363a8", "score": "0.5041505", "text": "func InitTCP(server *Server, addrs []string, accept int) (err error) {\n\tvar (\n\t\tbind string\n\t\tlistener *net.TCPListener\n\t\taddr *net.TCPAddr\n\t)\n\n\t// 启动多个地址上的 TCP 监听\n\tfor _, bind = range addrs {\n\n\t\tif addr, err = net.ResolveTCPAddr(\"tcp\", bind); err != nil {\n\t\t\tlog.Errorf(\"net.ResolveTCPAddr(tcp, %s) error(%v)\", bind, err)\n\t\t\treturn\n\t\t}\n\n\t\tif listener, err = net.ListenTCP(\"tcp\", addr); err != nil {\n\t\t\tlog.Errorf(\"net.ListenTCP(tcp, %s) error(%v)\", bind, err)\n\t\t\treturn\n\t\t}\n\n\t\tlog.Infof(\"start tcp listen: %s\", bind)\n\n\t\t// split N core accept\n\t\tfor i := 0; i < accept; i++ {\n\t\t\tgo acceptTCP(server, listener)\n\t\t}\n\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "16fe019356c49b14d3474e637c6c44c6", "score": "0.5032827", "text": "func tcpSetCtl(c *TCPConn) Trigger {\n\t_log(\"tcpSetCtl\")\n\tvar trigErr Trigger\n\t// If reading data this function is not needed\n\tif c.read {\n\t\treturn etherCtl\n\t}\n\n\t// We go about setting responses and frame lengths.\n\tswitch c.Ethernet.EtherType() {\n\tcase grams.EtherTypeARP:\n\t\tif trigErr = arpSet(c); trigErr != nil {\n\t\t\treturn trigErr\n\t\t}\n\n\tcase grams.EtherTypeIPv4:\n\t\t// TCP frame is set first to know it's length so that IPv4 length data can be set next\n\t\tif trigErr = tcpSet(c); trigErr != nil {\n\t\t\treturn trigErr\n\t\t}\n\t\tif trigErr = ipv4Set(c); trigErr != nil {\n\t\t\treturn trigErr\n\t\t}\n\t}\n\n\tif trigErr = etherSet(c); trigErr != nil {\n\t\treturn trigErr\n\t}\n\n\treturn etherCtl\n}", "title": "" }, { "docid": "87d8bcb19b34e6355d16b8e109a59950", "score": "0.5016257", "text": "func initTcpConnectionPool() (*sql.DB, error) {\n\t// [START cloud_sql_mysql_databasesql_create_tcp]\n\tvar (\n\t\tdbUser = mustGetenv(\"DB_USER\")\n\t\tdbPwd = mustGetenv(\"DB_PASS\")\n\t\tdbTcpHost = mustGetenv(\"DB_TCP_HOST\")\n\t\tdbName = mustGetenv(\"DB_NAME\")\n\t)\n\n\tvar dbURI string\n\tdbURI = fmt.Sprintf(\"%s:%s@tcp(%s)/%s\", dbUser, dbPwd, dbTcpHost, dbName)\n\n\t// dbPool is the pool of database connections.\n\tdbPool, err := sql.Open(\"mysql\", dbURI)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"sql.Open: %v\", err)\n\t}\n\n\t// [START_EXCLUDE]\n\tconfigureConnectionPool(dbPool)\n\t// [END_EXCLUDE]\n\n\treturn dbPool, nil\n\t// [END cloud_sql_mysql_databasesql_create_tcp]\n}", "title": "" }, { "docid": "59c7b70e61c4540305bf51cf806405d4", "score": "0.50069946", "text": "func (c *Config) newCONNREQ(clientID []byte) []byte {\n\tsize := 12 + len(clientID)\n\tvar flags uint\n\n\t// Supply an empty user name when the password is set to comply with “If\n\t// the User Name Flag is set to 0, the Password Flag MUST be set to 0.”\n\t// — MQTT Version 3.1.1, conformance statement MQTT-3.1.2-22\n\tif c.UserName != \"\" || c.Password != nil {\n\t\tsize += 2 + len(c.UserName)\n\t\tflags |= 1 << 7\n\t}\n\tif c.Password != nil {\n\t\tsize += 2 + len(c.Password)\n\t\tflags |= 1 << 6\n\t}\n\n\tif c.Will.Message != nil {\n\t\tsize += 4 + len(c.Will.Topic) + len(c.Will.Message)\n\t\tif c.Will.Retain {\n\t\t\tflags |= 1 << 5\n\t\t}\n\t\tswitch {\n\t\tcase c.Will.ExactlyOnce:\n\t\t\tflags |= exactlyOnceLevel << 3\n\t\tcase c.Will.AtLeastOnce:\n\t\t\tflags |= atLeastOnceLevel << 3\n\t\t}\n\t\tflags |= 1 << 2\n\t}\n\n\tif c.CleanSession {\n\t\tflags |= 1 << 1\n\t}\n\n\t// encode packet\n\tpacket := make([]byte, 0, size+2)\n\tpacket = append(packet, typeCONNECT<<4)\n\tl := uint(size)\n\tfor ; l > 0x7f; l >>= 7 {\n\t\tpacket = append(packet, byte(l|0x80))\n\t}\n\tpacket = append(packet, byte(l),\n\t\t0, 4, 'M', 'Q', 'T', 'T', 4, byte(flags),\n\t\tbyte(c.KeepAlive>>8), byte(c.KeepAlive),\n\t\tbyte(len(clientID)>>8), byte(len(clientID)),\n\t)\n\tpacket = append(packet, clientID...)\n\tif c.Will.Message != nil {\n\t\tpacket = append(packet, byte(len(c.Will.Topic)>>8), byte(len(c.Will.Topic)))\n\t\tpacket = append(packet, c.Will.Topic...)\n\t\tpacket = append(packet, byte(len(c.Will.Message)>>8), byte(len(c.Will.Message)))\n\t\tpacket = append(packet, c.Will.Message...)\n\t}\n\tif c.UserName != \"\" || c.Password != nil {\n\t\tpacket = append(packet, byte(len(c.UserName)>>8), byte(len(c.UserName)))\n\t\tpacket = append(packet, c.UserName...)\n\t}\n\tif c.Password != nil {\n\t\tpacket = append(packet, byte(len(c.Password)>>8), byte(len(c.Password)))\n\t\tpacket = append(packet, c.Password...)\n\t}\n\treturn packet\n}", "title": "" }, { "docid": "1f5411f3738bac175acd350373be7114", "score": "0.50040174", "text": "func NewTCPServer(ctx context.Context, server jsonrpc2.StreamServer, framer jsonrpc2.Framer) *TCPServer {\n\tln, err := net.Listen(\"tcp\", \"127.0.0.1:0\")\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"servertest: failed to listen: %v\", err))\n\t}\n\n\tif framer == nil {\n\t\tframer = jsonrpc2.NewStream\n\t}\n\n\tgo jsonrpc2.Serve(ctx, ln, server, 0)\n\n\treturn &TCPServer{\n\t\tconnList: &connList{},\n\t\tAddr: ln.Addr().String(),\n\t\tln: ln,\n\t\tframer: framer,\n\t}\n}", "title": "" }, { "docid": "12839db7a258846d43371ef64657bcec", "score": "0.49945337", "text": "func NewTCPConnPool(userspbuf bool, pid, address string, p *util.FixedBufferPool) *TCPConnPool {\n\tret := &TCPConnPool{\n\t\tpid: pid,\n\t\taddress: address,\n\t\tlastUsed: time.Now(),\n\t\tconnChan: make(chan *ProxyConnData, MAX_CONN_NUM),\n\t\tused: 0,\n\t\tuseRspBuf: userspbuf,\n\t}\n\tret.bufPool = p\n\tif ret.bufPool == nil {\n\t\tret.bufPool = util.NewFixedBufferPool(RSP_BUF_SIZE, BUF_MAX_NUM, false)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "1ffdf8cf114433afca45088d690cdd29", "score": "0.4982409", "text": "func createConfigFile() {\n\tconfigFile, err := os.OpenFile(F_CONFFILE, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0666)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tfileContent := configFileContent()\n\tif _, err := configFile.Write(fileContent); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer configFile.Close()\n}", "title": "" }, { "docid": "d90289e74a20611965841144921bb4aa", "score": "0.49813578", "text": "func NewTCPListener(inner *net.TCPListener, optFuncs ...ListenerOpt) net.Listener {\n\topts := &listenerOpts{\n\t\tname: defaultName,\n\t\tmonitoring: true,\n\t}\n\tfor _, f := range optFuncs {\n\t\tf(opts)\n\t}\n\tif opts.monitoring {\n\t\tpreRegisterListenerMetrics(opts.name, opts.labels)\n\t}\n\treturn &connTrackTCPListener{\n\t\tListener: inner,\n\t\topts: opts,\n\t}\n}", "title": "" }, { "docid": "5be75b736f1f8ba687ecd10525a2ce78", "score": "0.49732256", "text": "func RemoteTlsSetupTCP(address string, mrenclave unsafe.Pointer, mrsigner unsafe.Pointer) error {\n\taddr := address\n\tif addr == \"\" {\n\t\taddr = defaulttcpAddress\n\t}\n\n\tconn, err := net.Dial(\"tcp\", addr)\n\tfmt.Printf(\"net dail tcp socket.\\n\")\n\tif err != nil {\n\t\treturn fmt.Errorf(\"tcp connection failed with err %s.\\n\", err)\n\t}\n\tdefer conn.Close()\n\n\ttcpConn, ok := conn.(*net.TCPConn)\n\tif !ok {\n\t\treturn fmt.Errorf(\"casting to UnixConn failed.\\n\")\n\t}\n\n\tsockfd, err := tcpConn.File()\n\tif err != nil {\n\t\treturn err\n\t}\n\tC.ra_tls_echo(C.int(sockfd.Fd()), (*C.uchar)(mrenclave), (*C.uchar)(mrsigner))\n\treturn nil\n}", "title": "" }, { "docid": "6e2dac325a354e3324632c931fbd036d", "score": "0.49603105", "text": "func newTestConn(t testing.TB) *Conn {\n\tt.Helper()\n\tport := pickPort(t)\n\tconn, err := NewConn(Options{\n\t\tLogf: t.Logf,\n\t\tPort: port,\n\t\tTestOnlyPacketListener: localhostListener{},\n\t\tEndpointsFunc: func(eps []tailcfg.Endpoint) {\n\t\t\tt.Logf(\"endpoints: %q\", eps)\n\t\t},\n\t})\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\treturn conn\n}", "title": "" }, { "docid": "86acc09f788ec1323f7798e922b8134d", "score": "0.495973", "text": "func NewTCPBackend(dialerTimeout time.Duration) Backend {\n\treturn Backend{dialerTimeout: dialerTimeout}\n}", "title": "" }, { "docid": "46da11ed1956096c0f520741a4af7401", "score": "0.49571848", "text": "func TestNew_direct(t *testing.T) {\n\tl, err := newTCPListener()\n\trequire.NoError(t, err)\n\tdefer l.Close()\n\n\thandler, err := New(\"tcp\", l.Addr, DAEMON, \"\")\n\trequire.NoError(t, err)\n\tassert.NotNil(t, handler)\n}", "title": "" }, { "docid": "1393c0f5c79f38b814d9693b19e3c10b", "score": "0.49557433", "text": "func NewTCPService(host string, port int) *Service {\n\treturn &Service{\n\t\thost: host,\n\t\tport: port,\n\t\treconnectTime: time.Second,\n\t\tError: make(chan error),\n\t\tWriteChan: make(chan string),\n\t}\n}", "title": "" }, { "docid": "a5c2c74d7bc57c6dff81b433b2c09e47", "score": "0.4951118", "text": "func newConfig() (*hosts.Config, error) {\n\thosts.SetLogLevel(logLevel)\n\n\tif baseDir == \"\" {\n\t\tvar err error\n\t\tif baseDir, err = hosts.DefaultConfigDir(); err != nil {\n\t\t\tlog.Fatalf(\"error finding default base-dir: %s\", err)\n\t\t}\n\t}\n\tconfigPath := path.Join(baseDir, hosts.ConfigFile)\n\tlog.Debugf(\"Using configuration file at '%s'\", configPath)\n\n\treturn hosts.NewConfig(configPath)\n}", "title": "" }, { "docid": "e2810f8eb62c2fcaa07b601796a58532", "score": "0.49466735", "text": "func NewP2PTCP(service factory.ServiceFactory, addr string, opts ...ServerOption) factory.AppServerFactory {\n\tsrv := new(p2pTCP)\n\tsrv.bufferSize = 1024\n\tsrv.maxConcurrentClient = 100\n\tsrv.enableTracing = true\n\n\tfor _, opt := range opts {\n\t\topt(&srv.option)\n\t}\n\n\tsrv.semaphore = make(chan struct{}, srv.maxConcurrentClient)\n\tsrv.handlers = make(map[string]HandlerFunc)\n\n\tvar err error\n\tsrv.listener, err = net.Listen(\"tcp\", addr)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tfor _, m := range service.GetModules() {\n\t\tif h := m.ServerHandler(P2PTCP); h != nil {\n\t\t\tvar handlers HandlerGroup\n\t\t\th.MountHandlers(&handlers)\n\t\t\tfor _, handler := range handlers.Handlers {\n\t\t\t\tsrv.handlers[handler.Prefix] = handler.HandlerFunc\n\t\t\t\tlogger.LogYellow(fmt.Sprintf(`[P2P_TCP] (route): %-15s --> (module): \"%s\"`, `\"`+handler.Prefix+`\"`, m.Name()))\n\t\t\t}\n\t\t}\n\t}\n\n\tfmt.Printf(\"\\x1b[34;1m⇨ P2P TCP running with %d route and port [::]%s\\x1b[0m\\n\\n\", len(srv.handlers), addr)\n\treturn srv\n}", "title": "" }, { "docid": "921cc91779a043d7b7f94b153afc05e7", "score": "0.4929024", "text": "func newCommandConn(args []string, cli *client.Client) (command, error) {\n\t// Create a flag set.\n\tvar flg flag.FlagSet\n\n\t// Define the flags.\n\tnetwork := flg.String(\"n\", defaultNetwork, \"network on which the Client connects to the Server\")\n\thost := flg.String(\"h\", defaultHost, \"host name of the Server which the Client connects to\")\n\tport := flg.Uint(\"p\", defaultPort, \"port number of the Server which the Client connects to\")\n\tcrtPath := flg.String(\"crt\", \"\", \"the path of the certificate authority file to verify the server connection\")\n\tconnackTimeout := flg.Uint(\n\t\t\"ct\",\n\t\tdefaultCONNACKTimeout,\n\t\t\"Timeout in seconds for the Client to wait for receiving the CONNACK Packet after sending the CONNECT Packet\",\n\t)\n\tpingrespTimeout := flg.Uint(\n\t\t\"pt\",\n\t\tdefaultPINGRESPTimeout,\n\t\t\"Timeout in seconds for the Client to wait for receiving the PINGRESP Packet after sending the PINGREQ Packet\",\n\t)\n\tclientID := flg.String(\"i\", \"\", \"Client identifier for the Client\")\n\tuserName := flg.String(\"u\", \"\", \"User Name\")\n\tpassword := flg.String(\"P\", \"\", \"Password\")\n\tcleanSession := flg.Bool(\"c\", defaultCleanSession, \"Clean Session\")\n\tkeepAlive := flg.Uint(\"k\", defaultKeepAlive, \"Keep Alive measured in seconds\")\n\twillTopic := flg.String(\"wt\", \"\", \"Will Topic\")\n\twillMessage := flg.String(\"wm\", \"\", \"Will Message\")\n\twillQoS := flg.Uint(\"wq\", uint(mqtt.QoS0), \"Will QoS\")\n\twillRetain := flg.Bool(\"wr\", false, \"Will Retain\")\n\n\t// Parse the flag.\n\tif err := flg.Parse(args); err != nil {\n\t\treturn nil, errCmdArgsParse\n\t}\n\n\tvar tlsConfig *tls.Config\n\n\t// Parse the certificate authority file.\n\tif *crtPath != \"\" {\n\t\tb, err := ioutil.ReadFile(*crtPath)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\troots := x509.NewCertPool()\n\t\tif ok := roots.AppendCertsFromPEM(b); !ok {\n\t\t\treturn nil, errParseCrtFailure\n\t\t}\n\n\t\ttlsConfig = &tls.Config{\n\t\t\tRootCAs: roots,\n\t\t}\n\t}\n\n\t// Create a conn command.\n\tcmd := &commandConn{\n\t\tcli: cli,\n\t\tconnectOpts: &client.ConnectOptions{\n\t\t\tNetwork: *network,\n\t\t\tAddress: *host + \":\" + strconv.Itoa(int(*port)),\n\t\t\tTLSConfig: tlsConfig,\n\t\t\tCONNACKTimeout: time.Duration(*connackTimeout),\n\t\t\tPINGRESPTimeout: time.Duration(*pingrespTimeout),\n\t\t\tClientID: []byte(*clientID),\n\t\t\tUserName: []byte(*userName),\n\t\t\tPassword: []byte(*password),\n\t\t\tCleanSession: *cleanSession,\n\t\t\tKeepAlive: uint16(*keepAlive),\n\t\t\tWillTopic: []byte(*willTopic),\n\t\t\tWillMessage: []byte(*willMessage),\n\t\t\tWillQoS: byte(*willQoS),\n\t\t\tWillRetain: *willRetain,\n\t\t},\n\t}\n\n\t// Return the command.\n\treturn cmd, nil\n}", "title": "" }, { "docid": "99cc855f649161fad5ac9c08273453be", "score": "0.49290133", "text": "func createConn(server string) *tls.Conn {\n\tconn, err := tls.Dial(\"tcp\", server+port, &tls.Config{})\n\tif err != nil {\n\t\tfmt.Println(Red(\"Connection failed\"))\n\t\tpanic(err)\n\t}\n\tfmt.Println(\"Connection successful open\")\n\treturn conn\n}", "title": "" }, { "docid": "13a1a8d175cf4cbd847687bc09bafd39", "score": "0.49288234", "text": "func TCPServer(config *Config) (*tcputil.Server, error) {\n\tvar (\n\t\terr error\n\n\t\treadWriteHandler *broadcast.ReadWriteHandler\n\t\ttcpHandler tcputil.Handler\n\t)\n\n\tif readWriteHandler, err = GetReadWriterHandler(config); err != nil {\n\t\treturn nil, err\n\t}\n\n\ttcpHandler = &broadcast.TCPHandlerProxy{\n\t\tReadWriteHandler: readWriteHandler,\n\t}\n\n\treturn &tcputil.Server{\n\t\tAddr: config.ServerAddr,\n\t\tHandler: tcpHandler,\n\t}, nil\n}", "title": "" }, { "docid": "a702609b555d8e5a8cb108c5bc985011", "score": "0.4928317", "text": "func newConn(conn *net.TCPConn, srv *Server) *Conn {\n\treturn &Conn{\n\t\tsrv: srv,\n\t\tconn: conn,\n\t\textraData: make(map[string]interface{}),\n\t\tcloseChan: make(chan struct{}),\n\t\tpacketSendChan: make(chan Packet, srv.config.PacketSendChanLimit),\n\t\tpacketReceiveChan: make(chan Packet, srv.config.PacketReceiveChanLimit),\n\t}\n}", "title": "" }, { "docid": "37dea81d998a666d5b1432e43c142966", "score": "0.4923548", "text": "func (ch *serveChild) StartTcp() error {\n\tif len(ch.conf.TCPSource) == 0 {\n\t\treturn nil\n\t}\n\tcertfiles := ch.conf.GetCertificateFiles()[\"tcpsource\"]\n\tcertpaths := ch.conf.GetCertificatePaths()[\"tcpsource\"]\n\n\tctl := ch.controllers[base.TCP]\n\terr := ctl.Create(\n\t\tservices.DumpableOpt(DumpableFlag),\n\t\tservices.CertFilesOpt(certfiles),\n\t\tservices.CertPathsOpt(certpaths),\n\t)\n\n\tif err != nil {\n\t\treturn eerrors.Wrap(err, \"Error creating TCP controller\")\n\t}\n\tctl.SetConf(*ch.conf)\n\ttcpinfos, err := ctl.Start()\n\tif err == services.NOLISTENER {\n\t\tch.logger.Info(\"TCP plugin not started\")\n\t} else if err != nil {\n\t\treturn eerrors.Wrap(err, \"Error starting TCP controller\")\n\t} else if len(tcpinfos) == 0 {\n\t\tch.logger.Info(\"TCP plugin not started\")\n\t} else {\n\t\tch.logger.Debug(\"TCP plugin has been started\", \"listeners\", len(tcpinfos))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0549bef04e78bfa5f4e40f6430a5c5f1", "score": "0.492082", "text": "func newProxyTCPConn(conn net.Conn) *ProxyTCPConn {\n\treturn &ProxyTCPConn{Conn: conn}\n}", "title": "" }, { "docid": "cb607e926885a5518ffdb9db46800897", "score": "0.49171683", "text": "func NewTCPType(value string) TCPType {\n\tswitch strings.ToLower(value) {\n\tcase \"active\":\n\t\treturn TCPTypeActive\n\tcase \"passive\":\n\t\treturn TCPTypePassive\n\tcase \"so\":\n\t\treturn TCPTypeSimultaneousOpen\n\tdefault:\n\t\treturn TCPTypeUnspecified\n\t}\n}", "title": "" }, { "docid": "5d43272b4e18b8d69e780de72053cd1c", "score": "0.49160555", "text": "func NewTransport(opts ...transport.Option) transport.Transport {\n\tvar options transport.Options\n\tfor _, o := range opts {\n\t\to(&options)\n\t}\n\treturn &tcpTransport{opts: options}\n}", "title": "" }, { "docid": "91e5202bb88bd7ad427fb5d9e9dedd5a", "score": "0.49093643", "text": "func (ftp *FTP) newConnection(port int) (conn net.Conn, err error) {\n\taddr := fmt.Sprintf(\"%s:%d\", strings.Split(ftp.addr, \":\")[0], port)\n\n\tif ftp.debug {\n\t\tlog.Printf(\"Connecting to %s\\n\", addr)\n\t}\n\n\tif conn, err = net.Dial(\"tcp\", addr); err != nil {\n\t\treturn\n\t}\n\n\tif ftp.tlsconfig != nil {\n\t\tconn = tls.Client(conn, ftp.tlsconfig)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "91e5202bb88bd7ad427fb5d9e9dedd5a", "score": "0.49093643", "text": "func (ftp *FTP) newConnection(port int) (conn net.Conn, err error) {\n\taddr := fmt.Sprintf(\"%s:%d\", strings.Split(ftp.addr, \":\")[0], port)\n\n\tif ftp.debug {\n\t\tlog.Printf(\"Connecting to %s\\n\", addr)\n\t}\n\n\tif conn, err = net.Dial(\"tcp\", addr); err != nil {\n\t\treturn\n\t}\n\n\tif ftp.tlsconfig != nil {\n\t\tconn = tls.Client(conn, ftp.tlsconfig)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "3d09bcf9c577083b60746326cb5eb2a8", "score": "0.49062794", "text": "func TestNewNATSServerConfig(t *testing.T) {\n\tmsg, seg, err := capnp.NewMessage(capnp.SingleSegment(nil))\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tcfg, err := config.NewRootNATSServerConfig(seg)\n\tcfg.SetClusterName(\"oysterpack\")\n\n\troutes, err := capnp.NewTextList(seg, 1)\n\tcheckError(t, err)\n\troutes.Set(0, \"tls://localhost:5222\")\n\tcfg.SetRoutes(routes)\n\tcfg.SetClusterX509KeyPair(readCertKeyPairFiles(t, \"cluster.nats.dev.oysterpack.com\", seg))\n\tcfg.SetServerX509KeyPair(readCertKeyPairFiles(t, \"nats.dev.oysterpack.com\", seg))\n\n\t_, serverHostPortSeg, err := capnp.NewMessage(capnp.SingleSegment(nil))\n\tserverHostPort, err := config.NewNATSServerConfig_HostPort(serverHostPortSeg)\n\tserverHostPort.SetHost(\"node-1\")\n\tserverHostPort.SetPort(8080)\n\tcfg.SetServer(serverHostPort)\n\n\tbuf := new(bytes.Buffer)\n\tencoder := capnp.NewEncoder(buf)\n\tif err := encoder.Encode(msg); err != nil {\n\t\tt.Fatal(err)\n\t}\n\tt.Logf(\"encoded buf len = %d\", len(buf.Bytes()))\n\n\tdecoder := capnp.NewDecoder(buf)\n\tmsg2, err := decoder.Decode()\n\tcheckError(t, err)\n\n\tcfg2, err := config.ReadRootNATSServerConfig(msg2)\n\tcheckError(t, err)\n\n\tcluster, err := cfg2.ClusterName()\n\tcheckError(t, err)\n\n\tcluster2, err := cfg2.ClusterName()\n\tcheckError(t, err)\n\n\tserverHostPort2, err := cfg2.Server()\n\tcheckError(t, err)\n\tserverHost, err := serverHostPort2.Host()\n\tcheckError(t, err)\n\tif serverHost != \"node-1\" {\n\t\tt.Errorf(\"Host did not match : %v\", serverHostPort2)\n\t}\n\tif serverHostPort2.Port() != serverHostPort.Port() {\n\t\tt.Errorf(\"Port did not match : %v\", serverHostPort2)\n\t}\n\n\tif cluster != cluster2 {\n\t\tt.Errorf(\"cluster did not match : %s != %s\", cluster, cluster2)\n\t}\n\n\tbuf.Reset()\n\tpackedEncoder := capnp.NewPackedEncoder(buf)\n\tif err := packedEncoder.Encode(msg); err != nil {\n\t\tt.Fatal(err)\n\t}\n\tt.Logf(\"packed encoded buf len = %d\", len(buf.Bytes()))\n\n\tpackedDecoder := capnp.NewPackedDecoder(buf)\n\n\tmsg3, err := packedDecoder.Decode()\n\tcheckError(t, err)\n\n\tcfg3, err := config.ReadRootNATSServerConfig(msg3)\n\tcheckError(t, err)\n\n\tcluster3, err := cfg3.ClusterName()\n\tcheckError(t, err)\n\n\tif cluster3 != cluster2 {\n\t\tt.Errorf(\"cluster did not match : %s != %s\", cluster, cluster3)\n\t}\n}", "title": "" }, { "docid": "e25548923ec531f3d56d00d37244b667", "score": "0.49029943", "text": "func NewTCPConn(key []byte, peer string) (conn net.Conn, err error) {\n\treturn spipe.Dial(key, \"tcp\", peer)\n}", "title": "" }, { "docid": "950096a561e5ddf410a3b31908d0124b", "score": "0.49000475", "text": "func newRPCService(ctx context.Context, host string, port int, manager jasper.Manager, credsFilePath string) (util.CloseFunc, error) {\n\taddr, err := net.ResolveTCPAddr(\"tcp\", fmt.Sprintf(\"%s:%d\", host, port))\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"resolving RPC address\")\n\t}\n\n\tcloseService, err := remote.StartRPCServiceWithFile(ctx, manager, addr, credsFilePath)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"starting RPC service\")\n\t}\n\treturn closeService, nil\n}", "title": "" }, { "docid": "849f4898aecce8f1525b86dae794ee44", "score": "0.48959607", "text": "func NewTCPCommunicator(conn net.Conn, readInt, writeInt int) *TCPCommunicator {\n\treadTimeout := time.Duration(readInt) * time.Second\n\twriteTimeout := time.Duration(writeInt) * time.Second\n\treturn &TCPCommunicator{\n\t\tbufio.NewReader(conn),\n\t\tbufio.NewWriter(conn),\n\t\tconn,\n\t\treadTimeout,\n\t\twriteTimeout}\n}", "title": "" }, { "docid": "32b2fb23d78a88789507a16a8dd98d56", "score": "0.48950103", "text": "func main() {\n\nraddr,err := net.ResolveTCPAddr(\"tcp\", adr) //(*TCPAddr, error)\n\nserv,err2 := net.DialTCP(\"tcp\", nil, raddr) //(*TCPConn, error)\n\nif err !=nil...\n\n\n\n}", "title": "" }, { "docid": "40ca59b695c0472f1c6fe290b2da186b", "score": "0.48841643", "text": "func tcpServer(addr string) (io.ReadCloser, error) {\n\treturn listenServer(\"tcp\", addr)\n}", "title": "" }, { "docid": "ae4d7aa1c939c0452d1cbd5509681e18", "score": "0.4883138", "text": "func NewClient(path ...string) (*client, error) {\n\tcfg := \"../config/system.config\"\n\n\tif path != nil && path[0] != \"\" {\n\t\tcfg = path[0]\n\t}\n\tbytes, err := ioutil.ReadFile(cfg)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Read configuration file failed, \" + err.Error())\n\t}\n\tftp := new(client)\n\tif err = json.Unmarshal(bytes, ftp); err != nil {\n\t\treturn nil, err\n\t}\n\t//the tcp connection address must be added to port 21\n\tif !strings.HasSuffix(ftp.Addr, \":21\") {\n\t\tftp.Addr += \":21\"\n\t}\n\tconn, err := Dial(ftp.Addr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Connection FTP failed,%s\", err)\n\t}\n\terr = conn.Login(ftp.User, ftp.Pass)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Login FTP failed,%s\", err)\n\t}\n\treturn conn, nil\n}", "title": "" }, { "docid": "11d744270291ba9b4e038db74774fc99", "score": "0.488096", "text": "func (i *smaInitiatorNvmfTCP) Connect(ctx context.Context, params *ConnectParams) error {\n\t// CreateDevice for SMA NvmfTCP\n\tcreateReq := &smarpc.CreateDeviceRequest{\n\t\tVolume: nil,\n\t\tParams: &smarpc.CreateDeviceRequest_NvmfTcp{\n\t\t\tNvmfTcp: &nvmf_tcp.DeviceParameters{\n\t\t\t\tSubnqn: xpuNvmfTCPSubNqnPref + i.volumeContext[\"model\"],\n\t\t\t\tAdrfam: xpuNvmfTCPAdrFam,\n\t\t\t\tTraddr: xpuNvmfTCPTargetAddr,\n\t\t\t\tTrsvcid: params.tcpTargetPort,\n\t\t\t\tAllowAnyHost: true,\n\t\t\t},\n\t\t},\n\t}\n\tif err := i.CreateDevice(ctx, createReq); err != nil {\n\t\treturn err\n\t}\n\n\t// AttachVolume for SMA NvmfTCP\n\tattachReq := &smarpc.AttachVolumeRequest{\n\t\tVolume: &smarpc.VolumeParameters{\n\t\t\tVolumeId: i.volumeID,\n\t\t\tConnectionParams: i.nvmfVolumeParameters(),\n\t\t},\n\t\tDeviceHandle: i.deviceHandle,\n\t}\n\tif err := i.AttachVolume(ctx, attachReq); err != nil {\n\t\t// Call DeleteDevice to clean up if AttachVolume failed, while CreateDevice succeeded\n\t\tklog.Errorf(\"SMA.NvmfTCP calling DeleteDevice to clean up as AttachVolume error: %s\", err)\n\t\tdeleteReq := &smarpc.DeleteDeviceRequest{\n\t\t\tHandle: i.deviceHandle,\n\t\t}\n\t\tif errx := i.DeleteDevice(ctx, deleteReq); errx != nil {\n\t\t\tklog.Errorf(\"SMA.NvmfTCP calling DeleteDevice to clean up error: %s\", errx)\n\t\t}\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "993cb50b6bc9f4e9eba8095e5dca7839", "score": "0.48680994", "text": "func MakeZeroConf(hash string, port int) {\n\tif server, err := zeroconf.Register(hash, \"_share._http._tcp\", \"local.\", port, nil, nil); err != nil {\n\t\tpanic(err)\n\t} else {\n\t\t<-quit\n\t\tserver.Shutdown()\n\t}\n\n}", "title": "" }, { "docid": "af56bd4e73b8c8a26c5ce1524b9f820f", "score": "0.4868095", "text": "func New(err error) error {\n\tif err == nil {\n\t\treturn nil\n\t}\n\treturn &Error{appName: \"SoupBinTcpClient\", oriErr: err}\n}", "title": "" }, { "docid": "a4020d2fe4f404c64defaf2a438a8f32", "score": "0.48663265", "text": "func NewTCPProxy(cfg config.Server) *TCPProxy {\n\tt := new(TCPProxy)\n\tt.MgmtAddress = cfg.TCPProxyMgmtAddress\n\tt.HTTPClient = NewHTTPClient(cfg.TCPProxyConnectTimeout*time.Second, cfg.TCPProxyReadTimeout*time.Second)\n\treturn t\n}", "title": "" }, { "docid": "22defec06b6aef1ed9ccba093a9be8af", "score": "0.48610395", "text": "func StartTCPConnection(masterIP string) {\n\n\tconnection, err := net.Dial(\"tcp\", masterIP)\n\n\tif err != nil {\n\t\tfmt.Println(\"Master is not online....\")\n\t\tpanic(err)\n\t}\n\tfmt.Println(\"Connected to master.... Now waiting for files to render\\n\")\n\n\tdefer connection.Close()\n\n\t//4Eva Loop for the TCP Reading and writing\n\tfor {\n\t\tconnection.Read(bufferFileSize)\n\t\tfileSize, _ := strconv.ParseInt(strings.Trim(string(bufferFileSize), \":\"), 10, 64)\n\n\t\tconnection.Read(bufferFileName)\n\t\tfileName := strings.Trim(string(bufferFileName), \":\")\n\n\t\tnewFile, err := os.Create(fileName)\n\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tdefer newFile.Close()\n\t\tvar receivedBytes int64\n\n\t\tfor {\n\n\t\t\tif (fileSize - receivedBytes) < BUFFERSIZE {\n\t\t\t\tio.CopyN(newFile, connection, (fileSize - receivedBytes))\n\t\t\t\tconnection.Read(make([]byte, (receivedBytes+BUFFERSIZE)-fileSize))\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tio.CopyN(newFile, connection, BUFFERSIZE)\n\t\t\treceivedBytes += BUFFERSIZE\n\t\t}\n\t\tfmt.Println(\"Received file completely ! \" + fileName)\n\t\t// renderFile()\n\t}\n\n}", "title": "" }, { "docid": "21725c506e6a76bb27bdc338e860994b", "score": "0.48556712", "text": "func newConfig(databaseUrl, sqlDir string) (conf config) {\n\tconf = config{databaseUrl: databaseUrl, sqlDirPath: sanitizeSqlPath(sqlDir)}\n\treturn\n}", "title": "" }, { "docid": "77dfff4d72ac158e760e4d12cceff9ff", "score": "0.48526412", "text": "func newGELFTCPWriter(address string, info logger.Info) (gelf.Writer, error) {\n\tgelfWriter, err := gelf.NewTCPWriter(address)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"gelf: cannot connect to GELF endpoint: %s %v\", address, err)\n\t}\n\n\tif v, ok := info.Config[\"gelf-tcp-max-reconnect\"]; ok {\n\t\ti, err := strconv.Atoi(v)\n\t\tif err != nil || i < 0 {\n\t\t\treturn nil, fmt.Errorf(\"gelf-tcp-max-reconnect must be a positive integer\")\n\t\t}\n\t\tgelfWriter.MaxReconnect = i\n\t}\n\n\tif v, ok := info.Config[\"gelf-tcp-reconnect-delay\"]; ok {\n\t\ti, err := strconv.Atoi(v)\n\t\tif err != nil || i < 0 {\n\t\t\treturn nil, fmt.Errorf(\"gelf-tcp-reconnect-delay must be a positive integer\")\n\t\t}\n\t\tgelfWriter.ReconnectDelay = time.Duration(i)\n\t}\n\n\treturn gelfWriter, nil\n}", "title": "" }, { "docid": "58896731ae1cc02da0682521a08c16ae", "score": "0.48506242", "text": "func TCPProbe(config TCPProbeConfigOptions) error {\n\tconn, err := net.DialTimeout(\"tcp\", config.Address, config.SocketTimeout)\n\tif err != nil {\n\t\treturn err\n\t}\n\tconn.Close()\n\treturn nil\n}", "title": "" }, { "docid": "ff1a1a0dbf4554d3680c8e9bf614719e", "score": "0.4849293", "text": "func TestConnCreateExpect(t *testing.T) {\n\tc, _, err := makeNSConn()\n\trequire.NoError(t, err)\n\n\tf := NewFlow(6, 0, net.IPv4(1, 2, 3, 4), net.IPv4(5, 6, 7, 8), 42000, 21, 120, 0)\n\n\terr = c.Create(f)\n\trequire.NoError(t, err, \"unexpected error creating flow\", f)\n\n\tex := Expect{\n\t\tTimeout: 300,\n\t\tTupleMaster: f.TupleOrig,\n\t\tTuple: Tuple{\n\t\t\tIP: IPTuple{\n\t\t\t\tSourceAddress: net.IPv4(1, 2, 3, 4),\n\t\t\t\tDestinationAddress: net.IPv4(5, 6, 7, 8),\n\t\t\t},\n\t\t\tProto: ProtoTuple{\n\t\t\t\tProtocol: 6,\n\t\t\t\tSourcePort: 0,\n\t\t\t\tDestinationPort: 30000,\n\t\t\t},\n\t\t},\n\t\tMask: Tuple{\n\t\t\tIP: IPTuple{\n\t\t\t\tSourceAddress: net.IPv4(255, 255, 255, 255),\n\t\t\t\tDestinationAddress: net.IPv4(255, 255, 255, 255),\n\t\t\t},\n\t\t\tProto: ProtoTuple{\n\t\t\t\tProtocol: 6,\n\t\t\t\tSourcePort: 0,\n\t\t\t\tDestinationPort: 65535,\n\t\t\t},\n\t\t},\n\t\tHelpName: \"ftp\",\n\t\tClass: 0x30,\n\t}\n\n\trequire.ErrorIs(t, c.CreateExpect(ex), unix.EINVAL)\n}", "title": "" }, { "docid": "2f37a3a6e9980d1a049de362ba132e29", "score": "0.484494", "text": "func NewTCPContext(conn net.Conn, marshaller Marshaller) *Context {\n\treturn NewContext(conn, marshaller)\n}", "title": "" }, { "docid": "65ca4bc0eed293edefa619c8416dee5e", "score": "0.4844414", "text": "func setDefaultSocketOptions(fd int) error {\n\t// specifies the maximum amount of time in milliseconds that transmitted data may remain\n\t// unacknowledged before TCP will forcibly close the corresponding connection and return ETIMEDOUT to the application\n\ttcpUserTimeoutInMilliSeconds := int(25 * time.Second / time.Millisecond)\n\n\t// specifies the interval at which probes are sent in seconds\n\ttcpKeepIntvl := int(roundDuration(5*time.Second, time.Second))\n\n\t// specifies the threshold for sending the first KEEP ALIVE probe in seconds\n\ttcpKeepIdle := int(roundDuration(2*time.Second, time.Second))\n\n\t// enable keep-alive probes\n\tif err := syscall.SetsockoptInt(int(fd), syscall.SOL_SOCKET, syscall.SO_KEEPALIVE, 1); err != nil {\n\t\treturn wrapSyscallError(\"setsockopt\", err)\n\t}\n\n\tif err := syscall.SetsockoptInt(int(fd), syscall.IPPROTO_TCP, unix.TCP_USER_TIMEOUT, tcpUserTimeoutInMilliSeconds); err != nil {\n\t\treturn wrapSyscallError(\"setsockopt\", err)\n\t}\n\n\tif err := syscall.SetsockoptInt(int(fd), syscall.IPPROTO_TCP, syscall.TCP_KEEPINTVL, tcpKeepIntvl); err != nil {\n\t\treturn wrapSyscallError(\"setsockopt\", err)\n\t}\n\n\tif err := syscall.SetsockoptInt(int(fd), syscall.IPPROTO_TCP, syscall.TCP_KEEPIDLE, tcpKeepIdle); err != nil {\n\t\treturn wrapSyscallError(\"setsockopt\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "46bef9adbc593d2567007b846788d63b", "score": "0.48424825", "text": "func NewHostTCP(clusterName string, mainCfg conf.Main, hostCfg conf.Host, lg *zap.Logger, ms *metrics.Prom) *HostTCP {\n\treturn &HostTCP{*ConstructHost(clusterName, mainCfg, hostCfg, lg, ms)}\n}", "title": "" }, { "docid": "4c4244e1aa3b81ce0cd7c70f785eb1e2", "score": "0.4842416", "text": "func netconfNewSession(\n\tctx context.Context,\n\thost string,\n\tauth *sshAuthMethod,\n\topenSSH *openSSHOptions,\n) (\n\t*Session, error,\n) {\n\tclientConfig, err := genSSHClientConfig(auth)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn netconfNewSessionWithConfig(ctx, host, &sshOptions{openSSH, clientConfig})\n}", "title": "" }, { "docid": "cd8e1f1af8b1a7e87499fc94a77bb955", "score": "0.483965", "text": "func (te *TemplateExecutor) ExecuteTCPServerConfigTemplate(cfg *TCPServerConf) ([]byte, error) {\n\tvar configBuffer bytes.Buffer\n\terr := te.tcpServerTemplate.Execute(&configBuffer, cfg)\n\n\treturn configBuffer.Bytes(), err\n}", "title": "" }, { "docid": "817c803cc52919e067a3e332289eb67e", "score": "0.48335937", "text": "func (s *TcpServiceImpl) SetConf(c conf.BaseConfig) {\n\ts.StreamingService.SetConf(c.TCPSource, c.Parsers, c.Main.InputQueueSize, c.Main.MaxInputMessageSize)\n\ts.rawMessagesQueue = tcp.NewRing(c.Main.InputQueueSize)\n\ts.parserEnv = decoders.NewParsersEnv(s.ParserConfigs, s.Logger)\n}", "title": "" }, { "docid": "cc8041c899522a444a2fce488b5e58f4", "score": "0.4821044", "text": "func New(fd int, name string) (*Conn, error) {\n\t// All Conn I/O is nonblocking for integration with Go's runtime network\n\t// poller. Depending on the OS this might already be set but it can't hurt\n\t// to set it again.\n\tif err := unix.SetNonblock(fd, true); err != nil {\n\t\treturn nil, os.NewSyscallError(\"setnonblock\", err)\n\t}\n\n\t// os.NewFile registers the non-blocking file descriptor with the runtime\n\t// poller, which is then used for most subsequent operations except those\n\t// that require raw I/O via SyscallConn.\n\t//\n\t// See also: https://golang.org/pkg/os/#NewFile\n\tf := os.NewFile(uintptr(fd), name)\n\trc, err := f.SyscallConn()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc := &Conn{\n\t\tname: name,\n\t\tfd: f,\n\t\trc: rc,\n\t}\n\n\t// Probe the file descriptor for socket settings.\n\tsotype, err := c.GetsockoptInt(unix.SOL_SOCKET, unix.SO_TYPE)\n\tswitch {\n\tcase err == nil:\n\t\t// File is a socket, check its properties.\n\t\tc.facts = facts{\n\t\t\tisStream: sotype == unix.SOCK_STREAM,\n\t\t\tzeroReadIsEOF: sotype != unix.SOCK_DGRAM && sotype != unix.SOCK_RAW,\n\t\t}\n\tcase errors.Is(err, unix.ENOTSOCK):\n\t\t// File is not a socket, treat it as a regular file.\n\t\tc.facts = facts{\n\t\t\tisStream: true,\n\t\t\tzeroReadIsEOF: true,\n\t\t}\n\tdefault:\n\t\treturn nil, err\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "0410600e404ee97d52bc5b23d422c513", "score": "0.48008046", "text": "func WithTCP() OpFunc {\n\treturn func(op *EntryOp) { op.TCP = true }\n}", "title": "" } ]
e7f130f2ff490a9acf1eb2ff02f59803
SendHostEvent mocks base method.
[ { "docid": "2121025f99deb87431b2ad101bc4c638", "score": "0.80735356", "text": "func (m *MockSender) SendHostEvent(ctx context.Context, event HostEvent) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendHostEvent\", ctx, event)\n}", "title": "" } ]
[ { "docid": "26e37972cd00ed32a8721ac64c184fe4", "score": "0.819932", "text": "func (m *MockHandler) SendHostEvent(ctx context.Context, event HostEvent) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendHostEvent\", ctx, event)\n}", "title": "" }, { "docid": "e4a699b70bef06231a7f05b0a776383d", "score": "0.7333374", "text": "func (m *MockHandler) SendHostEventAtTime(ctx context.Context, event HostEvent, eventTime time.Time) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendHostEventAtTime\", ctx, event, eventTime)\n}", "title": "" }, { "docid": "6f9ed59b78fc86d402b85c2274019b39", "score": "0.717742", "text": "func (m *MockSender) SendHostEventAtTime(ctx context.Context, event HostEvent, eventTime time.Time) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendHostEventAtTime\", ctx, event, eventTime)\n}", "title": "" }, { "docid": "739ed64a204744c9d0e04366b252dc48", "score": "0.67306215", "text": "func (m *MockConn) Send(arg0 event.Event) {\n\tm.ctrl.Call(m, \"Send\", arg0)\n}", "title": "" }, { "docid": "f6a4304c54c7988682d87a85ae6bbb2e", "score": "0.63087565", "text": "func (client *Client) sendFakeEventToAddress(\n\tsenderName string,\n\turl string,\n\tevent *base.CloudEvent,\n) error {\n\tnamespace := client.Namespace\n\tclient.T.Logf(\"Sending fake CloudEvent\")\n\tpod := base.EventSenderPod(senderName, url, event)\n\tclient.CreatePodOrFail(pod)\n\tif err := pkgTest.WaitForPodRunning(client.Kube, senderName, namespace); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "00e467eb33882712db36dfc5bf7a8241", "score": "0.6265732", "text": "func (m *MockHandler) SendInfraEnvEvent(ctx context.Context, event InfraEnvEvent) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendInfraEnvEvent\", ctx, event)\n}", "title": "" }, { "docid": "cd5b19475148ccfd878d8a22a8662cac", "score": "0.61377287", "text": "func (m *MockSender) SendInfraEnvEvent(ctx context.Context, event InfraEnvEvent) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendInfraEnvEvent\", ctx, event)\n}", "title": "" }, { "docid": "60d181d7bb673d206484165dbf66a937", "score": "0.60123384", "text": "func (m *MockMachine_ExecuteServer) Send(arg0 *machine.Result) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "c307cbe481675a29cac2c9e8d04c3aee", "score": "0.5973557", "text": "func (mr *MockHandlerMockRecorder) SendHostEvent(ctx, event interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SendHostEvent\", reflect.TypeOf((*MockHandler)(nil).SendHostEvent), ctx, event)\n}", "title": "" }, { "docid": "e281fe552592eb1f17e805c6a8e23df7", "score": "0.5960924", "text": "func (m *MockProc) OnSvcHostAdd(arg0 []*host.Host) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"OnSvcHostAdd\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "61ba3f9403ae9100720efdfda7716709", "score": "0.5957664", "text": "func (m *MockAPI) HostMonitoring() {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"HostMonitoring\")\n}", "title": "" }, { "docid": "cb4a20ebc14a2f8412d1da28af88deb2", "score": "0.59547013", "text": "func TestAllowedHostsEvent(t *testing.T) {\n\tvar err error\n\terr = testcert.GenerateCert(\"mail2.guerrillamail.com\", \"\", 365*24*time.Hour, false, 2048, \"P256\", \"../../tests/\")\n\tif err != nil {\n\t\tt.Error(\"failed to generate a test certificate\", err)\n\t\tt.FailNow()\n\t}\n\tdefer cleanTestArtifacts(t)\n\tmainlog, err = getTestLog()\n\tif err != nil {\n\t\tt.Error(\"could not get logger,\", err)\n\t\tt.FailNow()\n\t}\n\tif err := ioutil.WriteFile(\"configJsonD.json\", []byte(configJsonD), 0644); err != nil {\n\t\tt.Error(err)\n\t\tt.FailNow()\n\t}\n\t// start the server by emulating the serve command\n\n\tconf := &guerrilla.AppConfig{} // blank one\n\tif err = conf.Load([]byte(configJsonD)); err != nil { // load configJsonD\n\t\tt.Error(err)\n\t}\n\tcmd := &cobra.Command{}\n\tconfigPath = \"configJsonD.json\"\n\n\tgo func() {\n\t\tserve(cmd, []string{})\n\t}()\n\t// wait for start\n\tif _, err := grepTestlog(\"Listening on TCP 127.0.0.1:2552\", 0); err != nil {\n\t\tt.Error(\"server didn't start\")\n\t}\n\n\t// now connect and try RCPT TO with an invalid host\n\tif conn, buffin, err := test.Connect(conf.Servers[1], 20); err != nil {\n\t\tt.Error(\"Could not connect to new server\", conf.Servers[1].ListenInterface, err)\n\t} else {\n\t\tif result, err := test.Command(conn, buffin, \"HELO example.com\"); err == nil {\n\t\t\texpect := \"250 secure.test.com Hello\"\n\t\t\tif strings.Index(result, expect) != 0 {\n\t\t\t\tt.Error(\"Expected\", expect, \"but got\", result)\n\t\t\t} else {\n\t\t\t\tif result, err = test.Command(conn, buffin, \"RCPT TO:<test@grr.la>\"); err == nil {\n\t\t\t\t\texpect := \"454 4.1.1 Error: Relay access denied: grr.la\"\n\t\t\t\t\tif strings.Index(result, expect) != 0 {\n\t\t\t\t\t\tt.Error(\"Expected:\", expect, \"but got:\", result)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\t_ = conn.Close()\n\t}\n\n\t// now change the config by adding a host to allowed hosts\n\n\tnewConf := conf\n\tnewConf.AllowedHosts = append(newConf.AllowedHosts, \"grr.la\")\n\tif jsonbytes, err := json.Marshal(newConf); err == nil {\n\t\tif err = ioutil.WriteFile(\"configJsonD.json\", jsonbytes, 0644); err != nil {\n\t\t\tt.Error(err)\n\t\t}\n\t} else {\n\t\tt.Error(err)\n\t}\n\t// send a sighup signal to the server to reload config\n\tsigHup()\n\n\tif _, err := grepTestlog(\"allowed_hosts config changed\", 0); err != nil {\n\t\tt.Error(\"allowed_hosts config not changed\")\n\t\tt.FailNow()\n\t}\n\n\t// now repeat the same conversion, RCPT TO should be accepted\n\tif conn, buffin, err := test.Connect(conf.Servers[1], 20); err != nil {\n\t\tt.Error(\"Could not connect to new server\", conf.Servers[1].ListenInterface, err)\n\t} else {\n\t\tif result, err := test.Command(conn, buffin, \"HELO example.com\"); err == nil {\n\t\t\texpect := \"250 secure.test.com Hello\"\n\t\t\tif strings.Index(result, expect) != 0 {\n\t\t\t\tt.Error(\"Expected\", expect, \"but got\", result)\n\t\t\t} else {\n\t\t\t\tif result, err = test.Command(conn, buffin, \"RCPT TO:<test@grr.la>\"); err == nil {\n\t\t\t\t\texpect := \"250 2.1.5 OK\"\n\t\t\t\t\tif strings.Index(result, expect) != 0 {\n\t\t\t\t\t\tt.Error(\"Expected:\", expect, \"but got:\", result)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\t_ = conn.Close()\n\t}\n\n\t// shutdown wait for exit\n\td.Shutdown()\n\n\t// wait for shutdown\n\tif _, err := grepTestlog(\"Backend shutdown completed\", 0); err != nil {\n\t\tt.Error(\"server didn't stop\")\n\t}\n\n}", "title": "" }, { "docid": "e1d1c4ba244175657057894b87098b53", "score": "0.5923965", "text": "func (m *MockHandler) SendClusterEvent(ctx context.Context, event ClusterEvent) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendClusterEvent\", ctx, event)\n}", "title": "" }, { "docid": "019a712845de34cd8cbe5aa5da963737", "score": "0.59228456", "text": "func (mr *MockSenderMockRecorder) SendHostEvent(ctx, event interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SendHostEvent\", reflect.TypeOf((*MockSender)(nil).SendHostEvent), ctx, event)\n}", "title": "" }, { "docid": "08c7073eea7695c0eb2c4ef9ca7a6f5b", "score": "0.5888897", "text": "func (m *MockHandler) SendInfraEnvEventAtTime(ctx context.Context, event InfraEnvEvent, eventTime time.Time) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendInfraEnvEventAtTime\", ctx, event, eventTime)\n}", "title": "" }, { "docid": "e5f3931644fe142e95a76d36bba5619a", "score": "0.5883706", "text": "func (m *MockAnonymous) PublishWebSocketEvent(arg0 string, arg1 map[string]interface{}, arg2 *model.WebsocketBroadcast) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"PublishWebSocketEvent\", arg0, arg1, arg2)\n}", "title": "" }, { "docid": "7b237e43df386f1c7492ead3df8381b6", "score": "0.5857573", "text": "func TestMockOnEvent(t *testing.T) {\n\tmockServer := &MockRailsServer{T: t, Behaviour: MockEvent}\n\n\tdialer := wstest.NewDialer(mockServer)\n\tdialer.HandshakeTimeout = time.Second * 2\n\n\tclient := NewClient(fakeEndpoint).WithDialer(dialer)\n\n\tcalled := make(chan struct{})\n\n\tclient.OnEvent(\"AgentChannel\", func(conn *websocket.Conn, payload *Payload, error error) {\n\t\tcalled <- struct{}{}\n\t\treturn\n\t})\n\n\terr := client.Serve()\n\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\treceiveSleepMs(2000, called, t)\n}", "title": "" }, { "docid": "0e2863d4cb1a2880ac6f27573e96d5dd", "score": "0.5845439", "text": "func (m *MockWerftService_ListenServer) Send(arg0 *v1.ListenResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "37f42c2982a379e1ae1efd603d36c43b", "score": "0.58262444", "text": "func (m *MockMachine_ExecuteClient) Send(arg0 *machine.Instruction) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "d2cf360c41af37fbff14b56f50e2d90d", "score": "0.58152705", "text": "func (m *MockTopo_WatchServer) Send(arg0 *topo.WatchResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "3641d8f754e514a0d4ad53e27cd1f85a", "score": "0.5794655", "text": "func (m *MockAPI) BindHost(arg0 context.Context, arg1 *models.Host, arg2 strfmt.UUID, arg3 *gorm.DB) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"BindHost\", arg0, arg1, arg2, arg3)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "48e821cdade410e6a886dadcadb85de4", "score": "0.57827526", "text": "func NewMockHostEvent(ctrl *gomock.Controller) *MockHostEvent {\n\tmock := &MockHostEvent{ctrl: ctrl}\n\tmock.recorder = &MockHostEventMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "7799512a2b4c882d09e83774763ad6b6", "score": "0.5765413", "text": "func (m *MockServer) HandleEvent(event sdk.Event) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"HandleEvent\", event)\n}", "title": "" }, { "docid": "6f140dd11d2767a277ba368b8cd58414", "score": "0.57547224", "text": "func (e *Event) Send(host string) error {\n\tvar payload postBody\n\tpayload.Body = *e\n\tbody, err := json.Marshal(e)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\turl := fmt.Sprintf(\"%s/event\", host)\n\terr = post(body, url)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "abaf5075b82245e70df614b08203e6eb", "score": "0.57404095", "text": "func (m *MockSender) SendInfraEnvEventAtTime(ctx context.Context, event InfraEnvEvent, eventTime time.Time) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendInfraEnvEventAtTime\", ctx, event, eventTime)\n}", "title": "" }, { "docid": "9ba5269d1de58eef924d90d763a87576", "score": "0.5721152", "text": "func (m *MockSender) SendClusterEvent(ctx context.Context, event ClusterEvent) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendClusterEvent\", ctx, event)\n}", "title": "" }, { "docid": "ead36e1b7bce8a3da8713b06e989ef21", "score": "0.5697338", "text": "func Test2Send(t *testing.T) {\n\tt.Parallel()\n\t//TestListener.TestListener()\n\taddrs, err := net.LookupHost(\"www.google.com\")\n\tif err != nil {\n\t\tt.Log(\"Test2Send: LookupHost err.Error(): \", err.Error())\n\t\tt.Fail()\n\t}\n\n\ttest, err := newProbe(\"\", addrs[0], 2003, 80)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Fatal error: \", err.Error())\n\t\tt.Fatalf(\"Fatal error: %s\", err.Error())\n\t}\n\n\ttest.Timeout = 3 * time.Second\n\terr = test.Send()\n\tif err != nil {\n\t\tt.Log(\"Test2Send: test failed to run\")\n\t\tt.Fail()\n\t}\n\tif test.Result.Raw != nil {\n\t\tt.Log(\"test.Result != nil, expected == nil\")\n\t\tt.Fail()\n\t}\n\n}", "title": "" }, { "docid": "5846529f91b6c75a671c1d7f7b678f86", "score": "0.5697332", "text": "func (_m *mockTransportChannel) Send(_a0 *contracts.Envelope) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "710d6035cf7806181ccc2dbcbe517293", "score": "0.56767917", "text": "func (m *MockEngine) AttachHostVethInterfaceToBridge(arg0 string, arg1 *netlink.Bridge) (*current.Interface, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"AttachHostVethInterfaceToBridge\", arg0, arg1)\n\tret0, _ := ret[0].(*current.Interface)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "b3f5bd192a66176daaf6efc716b54c28", "score": "0.5653393", "text": "func (rst *watcherSyncerTester) sendEvent(r watchersyncer.ResourceType, event api.WatchEvent) {\n\tname := model.ListOptionsToDefaultPathRoot(r.ListInterface)\n\tlog.WithField(\"Name\", name).Infof(\"Sending event\")\n\n\t// The test framework uses a single results channel for each resource, so to send the\n\t// results deterministically we need to wait for a terminating watcher to finish\n\t// terminating (so we know exactly which mock watcher invocation the result will be sent\n\t// from).\n\tlog.Info(\"Waiting for previous watcher to terminate (if any)\")\n\trst.lws[name].termWg.Wait()\n\tlog.Info(\"Previous watcher terminated (if any)\")\n\n\tif event.Type == api.WatchError {\n\t\t// Watch errors are treated as a terminating event. Our test framework will shut down the previous\n\t\t// watcher as part of the creation of the new one. Increment the init wait group\n\t\t// in the watcher which will be decremented once the old one has fully terminated.\n\t\tlog.WithField(\"Name\", name).Info(\"Watcher error will trigger restart - increment termination count\")\n\t\trst.lws[name].termWg.Add(1)\n\n\t}\n\n\tlog.WithField(\"Name\", name).Info(\"Sending event\")\n\trst.lws[name].results <- event\n\n\tif event.Type == api.WatchError {\n\t\t// Finally, since this is a terminating event then we expect a corresponding Stop()\n\t\t// invocation (now that the event has been sent).\n\t\tlog.WithField(\"Name\", name).Info(\"Expecting a stop invocation\")\n\t\trst.expectStop(r)\n\t\tlog.WithField(\"Name\", name).Info(\"Stop invoked\")\n\t}\n}", "title": "" }, { "docid": "3846f33f3f6072123fa1688ba1056eb6", "score": "0.5638812", "text": "func (m *MockMachine_ExecuteServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4068a51ed7fe06ca62a0d71914de1317", "score": "0.5631464", "text": "func (f *fakeDiskUpdateWatchServer) Send(event *vosinternalprotos.DiskUpdate) error {\n\ttestChannel <- event\n\treturn nil\n}", "title": "" }, { "docid": "e929ec4e7d5f43bdb57c93ce37a4a17b", "score": "0.56268936", "text": "func (m *MockWerftService_ListenServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a3b8cc2fe639954e8f2f9004051d7227", "score": "0.562291", "text": "func (m *MockAnonymous) SendEphemeralPost(arg0 string, arg1 *model.Post) *model.Post {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendEphemeralPost\", arg0, arg1)\n\tret0, _ := ret[0].(*model.Post)\n\treturn ret0\n}", "title": "" }, { "docid": "085dc3034ea9a4d7ad2893d5297da8fb", "score": "0.56226796", "text": "func (m *MockProc) OnSvcAllHostReplace(arg0 []*host.Host) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"OnSvcAllHostReplace\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "6fb5cbf53442b212ab7915cf897bb18d", "score": "0.5622151", "text": "func (_m *SinkEventer) Send(m frizzle.Msg, dest string) error {\n\tret := _m.Called(m, dest)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(frizzle.Msg, string) error); ok {\n\t\tr0 = rf(m, dest)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "f1971c579395f0bf32b5ae2feb1d596e", "score": "0.5591574", "text": "func (m *MockConnectionPool) Host() types.Host {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Host\")\n\tret0, _ := ret[0].(types.Host)\n\treturn ret0\n}", "title": "" }, { "docid": "f1ff506a86d9992bc1be2a225b431430", "score": "0.55771977", "text": "func (m *MockAgentSecure_WorkloadmetaStreamEntitiesServer) Send(arg0 *core.WorkloadmetaStreamResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "c152e1bed6a9bb7e49421fdd2e741e07", "score": "0.55728155", "text": "func (m *MockHostNode) Notify(notifee network.Notifiee) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Notify\", notifee)\n}", "title": "" }, { "docid": "8708ba989ee331f2e724e19f7ce9d804", "score": "0.5571663", "text": "func (m *MockHost) EventBus() event.Bus {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"EventBus\")\n\tret0, _ := ret[0].(event.Bus)\n\treturn ret0\n}", "title": "" }, { "docid": "35399960c4da8675e6cf22fd7f580e6c", "score": "0.55474657", "text": "func Test4Send(t *testing.T) {\n\tt.Parallel()\n\t//TestListener.TestListener()\n\taddrs, err := net.LookupHost(\"www.google.com\")\n\tif err != nil {\n\t\tt.Log(\"Test4Send: LookupHost err.Error(): \", err.Error())\n\t\tt.Fail()\n\t}\n\n\ttest, err := newProbe(\"\", addrs[0], 2003, 80)\n\ttest.Timeout = 3 * time.Second\n\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Fatal error: \", err.Error())\n\t\tt.Fatalf(\"Fatal error: %s\", err.Error())\n\t}\n\n\terr = test.Send()\n\tif err != nil {\n\t\tt.Log(\"Test4Send: test failed to run\")\n\t\tt.Fail()\n\t}\n\tif test.Result.Raw != nil {\n\t\tt.Log(\"test.Result != nil, expected == nil\")\n\t\tt.Fail()\n\t}\n\n}", "title": "" }, { "docid": "2ca28bb0490b436b5d957bbaae8e2e17", "score": "0.55336696", "text": "func (m *MockHandler) SendClusterEventAtTime(ctx context.Context, event ClusterEvent, eventTime time.Time) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendClusterEventAtTime\", ctx, event, eventTime)\n}", "title": "" }, { "docid": "9f6f5ad38bd8cb0a97d23b74b446609f", "score": "0.5497345", "text": "func (m *MockAgentSecure_TaggerStreamEntitiesServer) Send(arg0 *core.StreamTagsResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "e6dd5b654fd941b94a0bc441fd508a12", "score": "0.5496233", "text": "func testSendCommand(t *testing.T, addr string, args []string, status int,\n\tout, err string, outbuf, errbuf *bytes.Buffer) {\n\tioCmp(t, \"sendCommand\", sendCommand(addr, args...), status, out, err,\n\t\toutbuf, errbuf)\n}", "title": "" }, { "docid": "2b7f23c3b850a6c00ae32abcc89c96fc", "score": "0.549504", "text": "func (m *MockBasic_PrimeServer) Send(arg0 *pb.Resp) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a936969f7116dba3de8ed7f8b663dfa8", "score": "0.5494766", "text": "func (client *Client) SendFakeEventToBroker(senderName, brokerName string, event *base.CloudEvent) error {\n\turl, err := client.GetBrokerURL(brokerName)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn client.sendFakeEventToAddress(senderName, url, event)\n}", "title": "" }, { "docid": "e18cb339be73767fdbaba64e5b5cb9e9", "score": "0.54911816", "text": "func (m *MockMembers) DispatchEvent(arg0 members.Event) error {\n\tret := m.ctrl.Call(m, \"DispatchEvent\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "6de1c91fa7f6ead708fb41279aee1eb3", "score": "0.5490992", "text": "func (m *MockHostEvent) EXPECT() *MockHostEventMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "884b9fd5dbd00b2655e3019587c87c75", "score": "0.5476485", "text": "func (m *MockHostEvent) GetHostId() strfmt.UUID {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetHostId\")\n\tret0, _ := ret[0].(strfmt.UUID)\n\treturn ret0\n}", "title": "" }, { "docid": "9a7efccb5703742a494d76a55980fabf", "score": "0.5475732", "text": "func (m *MockHub) Broadcast(message []byte) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Broadcast\", message)\n}", "title": "" }, { "docid": "1d160a52ee0168a6f4a43489e936df81", "score": "0.5472394", "text": "func (m *MockCandidatePropertyGetter) Host() *models.SHost {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Host\")\n\tret0, _ := ret[0].(*models.SHost)\n\treturn ret0\n}", "title": "" }, { "docid": "3dd7e332e4fb5f03fdba67783d03600b", "score": "0.5469293", "text": "func (m *MockSender) AddEvent(ctx context.Context, clusterID strfmt.UUID, hostID *strfmt.UUID, severity, msg string, eventTime time.Time, props ...interface{}) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{ctx, clusterID, hostID, severity, msg, eventTime}\n\tfor _, a := range props {\n\t\tvarargs = append(varargs, a)\n\t}\n\tm.ctrl.Call(m, \"AddEvent\", varargs...)\n}", "title": "" }, { "docid": "e88145dfe36acaa28940c6a56b9e758a", "score": "0.54660916", "text": "func (t *Test) Send(time.Time, []byte) {}", "title": "" }, { "docid": "70831404892f0c4c25e6a094ea7a2de2", "score": "0.54594076", "text": "func (m *MockEventBus) DispatchEvent(arg0 members.Event) error {\n\tret := m.ctrl.Call(m, \"DispatchEvent\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "5dfe47c2ec7a05d9a9cca0344d1fa92b", "score": "0.5448657", "text": "func TestSendToCloud(t *testing.T) {\n\tmockCtrl := gomock.NewController(t)\n\tdefer mockCtrl.Finish()\n\tmockAdapter := edgehub.NewMockAdapter(mockCtrl)\n\n\tmsg := model.NewMessage(\"\").BuildHeader(\"test_id\", \"\", 1)\n\tmsg.Header.Sync = true\n\ttests := []struct {\n\t\tname string\n\t\thub *EdgeHub\n\t\tmessage model.Message\n\t\texpectedError error\n\t\tmockError error\n\t\tHeartbeatPeriod int32\n\t}{\n\t\t{\n\t\t\tname: \"send to cloud with proper input\",\n\t\t\thub: &EdgeHub{\n\t\t\t\tchClient: mockAdapter,\n\t\t\t},\n\t\t\tHeartbeatPeriod: 6,\n\t\t\tmessage: *msg,\n\t\t\texpectedError: nil,\n\t\t\tmockError: nil,\n\t\t},\n\t\t{\n\t\t\tname: \"Wait Error in send to cloud\",\n\t\t\thub: &EdgeHub{\n\t\t\t\tchClient: mockAdapter,\n\t\t\t},\n\t\t\tHeartbeatPeriod: 3,\n\t\t\tmessage: *msg,\n\t\t\texpectedError: nil,\n\t\t\tmockError: nil,\n\t\t},\n\t\t{\n\t\t\tname: \"Send Failure in send to cloud\",\n\t\t\thub: &EdgeHub{\n\t\t\t\tchClient: mockAdapter,\n\t\t\t},\n\t\t\tHeartbeatPeriod: 3,\n\t\t\tmessage: model.Message{},\n\t\t\texpectedError: fmt.Errorf(\"failed to send message, error: Connection Refused\"),\n\t\t\tmockError: errors.New(\"Connection Refused\"),\n\t\t},\n\t}\n\tfor _, tt := range tests {\n\t\tt.Run(tt.name, func(t *testing.T) {\n\t\t\tmockAdapter.EXPECT().Send(gomock.Any()).Return(tt.mockError).Times(1)\n\t\t\tconfig.Config.Heartbeat = tt.HeartbeatPeriod\n\t\t\terr := tt.hub.sendToCloud(tt.message)\n\t\t\tif !reflect.DeepEqual(err, tt.expectedError) {\n\t\t\t\tt.Errorf(\"SendToCloud() error = %v, wantErr %v\", err, tt.expectedError)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "4bdfa015e6d655c5e0e08c259ba11c66", "score": "0.5447337", "text": "func (m *MockProc) OnSvcHostRemove(arg0 []*host.Host) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"OnSvcHostRemove\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "5573dfb3ee83a22e450a469ce85a6628", "score": "0.5447269", "text": "func (m *MockOobService) RegisterMsgEvent(arg0 chan<- service.StateMsg) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"RegisterMsgEvent\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "26f0010908451c186367d01f5dd6d6f4", "score": "0.5441762", "text": "func (m_2 *MockWerftService_ListenServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a754b7ac97f713e8fa290eb1b921223f", "score": "0.5438399", "text": "func TestProcessEventHandling(t *testing.T) {\n\tctx := context.Background()\n\n\tclient := mocks.NewEventMonitoringModuleClient(t)\n\tstream := mocks.NewEventMonitoringModule_GetProcessEventsClient(t)\n\tclient.On(\"GetProcessEvents\", ctx, &api.GetProcessEventParams{TimeoutSeconds: 1}).Return(stream, nil)\n\n\tevents := make([]*model.ProcessEvent, 0)\n\tevents = append(events, model.NewMockedExecEvent(time.Now().Add(-10*time.Second), 32, \"/usr/bin/ls\", []string{\"ls\", \"-lah\"}))\n\tevents = append(events, model.NewMockedExitEvent(time.Now().Add(-9*time.Second), 32, \"/usr/bin/ls\", []string{\"ls\", \"-lah\"}, 0))\n\tevents = append(events, model.NewMockedExecEvent(time.Now().Add(-5*time.Second), 32, \"/usr/bin/ls\", []string{\"ls\", \"invalid-path\"}))\n\tevents = append(events, model.NewMockedExitEvent(time.Now().Add(-5*time.Second), 32, \"/usr/bin/ls\", []string{\"ls\", \"invalid-path\"}, 2))\n\n\tfor _, e := range events {\n\t\tdata, err := e.MarshalMsg(nil)\n\t\trequire.NoError(t, err)\n\n\t\tstream.On(\"Recv\").Once().Return(&api.ProcessEventMessage{Data: data}, nil)\n\t}\n\tstream.On(\"Recv\").Return(nil, io.EOF)\n\n\trcvMessage := make(chan bool)\n\ti := 0\n\thandler := func(e *model.ProcessEvent) {\n\t\tif i > len(events)-1 {\n\t\t\tt.Error(\"should not have received more process events\")\n\t\t}\n\n\t\tAssertProcessEvents(t, events[i], e)\n\t\t// all message have been consumed\n\t\tif i == len(events)-1 {\n\t\t\tclose(rcvMessage)\n\t\t}\n\n\t\ti++\n\t}\n\tl, err := NewSysProbeListener(nil, client, handler)\n\trequire.NoError(t, err)\n\tl.Run()\n\n\t<-rcvMessage\n\tl.Stop()\n\tclient.AssertExpectations(t)\n\tstream.AssertExpectations(t)\n}", "title": "" }, { "docid": "cde3379007d08b91ca5a13d65036504e", "score": "0.5419841", "text": "func testSendFunc(serv *Server, payload []byte, serverTime float64) {\n\t// send payloads to clients\n\tserv.SendPayloads(payload, serverTime)\n}", "title": "" }, { "docid": "23f7a1fddb2c4ce1f16354f78f45d11c", "score": "0.54108053", "text": "func (m *MockWebsocketClient) Send(message wspubsub.Message) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", message)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "90aea1b200589682b0e3e7de2c7c1135", "score": "0.53971493", "text": "func (m *MockMachine_ExecuteServer) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "8ed02fb18b4b4e9a49fc85c456943b46", "score": "0.5385321", "text": "func (m *MockWerftService_StartLocalJobServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "432a075e8595d14ea4fbf4318669c335", "score": "0.5384488", "text": "func (m *MockClient) Send() chan []byte {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\")\n\tret0, _ := ret[0].(chan []byte)\n\treturn ret0\n}", "title": "" }, { "docid": "bcf53b8a4356d593b94ffe1102c0f486", "score": "0.5383417", "text": "func (m *MockRepo) Host() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Host\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "e9eacb573cf509878321076b11f1463c", "score": "0.53750604", "text": "func (m *MockCommand) SendNotification(event dockercontroller.Event) {\n\tm.ctrl.Call(m, \"SendNotification\", event)\n}", "title": "" }, { "docid": "ba9fbad1024cfe3e6a5392150a7b3985", "score": "0.5370819", "text": "func (m_2 *MockTopo_WatchServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "c3b39b867850e365af2085b2f5a4b518", "score": "0.5368479", "text": "func (s *socket) sendEvent(e *Event, identity string) error {\n\tb, err := e.packBytes()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Printf(\"ZeroRPC socket sent event %s\", e.Header.Id)\n\n\ti, err := s.zmqSocket.SendMessage(identity, \"\", b)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Printf(\"ZeroRPC socket sent %d bytes\", i)\n\n\treturn nil\n}", "title": "" }, { "docid": "10dc2cae93253c36e6b93ae6d905662a", "score": "0.53626084", "text": "func (client *MockClient) Event(object runtime.Object, eventType string, reason string, message string) {\n\tclient.createEvent(buildEvent(object, eventType, reason, message))\n}", "title": "" }, { "docid": "ffd1ae5fb6ac469d37a79c65dd9d9ab2", "score": "0.53565586", "text": "func (m *MockNodeAttestor_FetchAttestationData_Stream) Send(arg0 *nodeattestor.FetchAttestationDataRequest) error {\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "3b54b51cb087d6f4020413ed10ab71b8", "score": "0.5344413", "text": "func sendEvent(client runner.RunnerClient, token string, key string) {\n\tlog.Println(\"sending event:\", key)\n\tif _, err := client.Event(context.Background(), &runner.EventRequest{\n\t\tKey: key,\n\t}); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "df809e0e34d477424cde4dcac77f9020", "score": "0.5340984", "text": "func (r *Results) send(host string) error {\n\tvar payload postBody\n\tpayload.Body = *r\n\tbody, err := json.Marshal(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\turl := fmt.Sprintf(\"%s/event\", host)\n\terr = post(body, url)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1a1cf898ac53ed27b49d86895f15de77", "score": "0.5336638", "text": "func (m *MockSender) SendClusterEventAtTime(ctx context.Context, event ClusterEvent, eventTime time.Time) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendClusterEventAtTime\", ctx, event, eventTime)\n}", "title": "" }, { "docid": "a51f77b522959dad0672db554c816f42", "score": "0.53322816", "text": "func (m *MockWerftService_SubscribeServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "2133e9b6c5d71ea81fc48e3dda5659af", "score": "0.53204906", "text": "func (m *MockAgentSecure_WorkloadmetaStreamEntitiesServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "ed6f76cd6db37a456e1b1b326f798bc9", "score": "0.53194386", "text": "func (m *MockGenerator) UpdateEtcHosts(arg0 string) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UpdateEtcHosts\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "fceb57521dd6efe7fe75bf6ca43b71db", "score": "0.5304421", "text": "func (client *Client) SendFakeEventToChannel(senderName, channelName string, event *base.CloudEvent) error {\n\turl, err := client.GetChannelURL(channelName)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn client.sendFakeEventToAddress(senderName, url, event)\n}", "title": "" }, { "docid": "2598995262cff6d85423aeb3ae4ec587", "score": "0.5304226", "text": "func (m *MockTaskManager) Send(task *task.Task) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", task)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a95e6551be86f20d455230b5b1569fb2", "score": "0.5304092", "text": "func (m *MockNodeAttestor_FetchAttestationDataClient) Send(arg0 *nodeattestor.FetchAttestationDataRequest) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "3ec96e21d1aef8a23eec7291bb98b1d9", "score": "0.5301424", "text": "func (m *MockTopo_WatchServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "57423d0e2de079c35603b8d486b283f6", "score": "0.52940434", "text": "func (m *MockVendor) Send(ctx context.Context, p interface{}) (interface{}, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", ctx, p)\n\tret0, _ := ret[0].(interface{})\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "27c7b5c2194dd4fea4cdae191d83e9dd", "score": "0.5289083", "text": "func (m *MockWerftService_SubscribeServer) Send(arg0 *v1.SubscribeResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "7f503783837374276596135b54a9b4a6", "score": "0.5288051", "text": "func (m *MockConfigAdminService_ListSnapshotsServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "bbe50e9eb9774407bec9863f2b539b19", "score": "0.5285058", "text": "func (m *MockHandler) AddEvent(ctx context.Context, clusterID strfmt.UUID, hostID *strfmt.UUID, severity, msg string, eventTime time.Time, props ...interface{}) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{ctx, clusterID, hostID, severity, msg, eventTime}\n\tfor _, a := range props {\n\t\tvarargs = append(varargs, a)\n\t}\n\tm.ctrl.Call(m, \"AddEvent\", varargs...)\n}", "title": "" }, { "docid": "d5397e81b2c96a0482dfaff5aa4aca91", "score": "0.5274885", "text": "func (m *MockHostEvent) GetName() string {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetName\")\n\tret0, _ := ret[0].(string)\n\treturn ret0\n}", "title": "" }, { "docid": "3be6674dd44dc77736bf5c19643dde33", "score": "0.5272667", "text": "func (m *MockAgentSecure_TaggerStreamEntitiesServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "217dce11e8efe981e3850536c3b18e7d", "score": "0.52719563", "text": "func (m *MockCommand) SubscribeEvent(body string) (map[string]interface{}, error) {\n\tret := m.ctrl.Call(m, \"SubscribeEvent\", body)\n\tret0, _ := ret[0].(map[string]interface{})\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "93d1ea5c68b7380b379597ffbc17e80b", "score": "0.5258546", "text": "func (m *MockAergoRPCService_ListBlockStreamServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "be2749d7c80cdba9bdc41e9c28cf5a73", "score": "0.5257719", "text": "func (m *MockBasic_PrimeServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4c70663f18978407a4f7cf12b1ffe22e", "score": "0.5257336", "text": "func (m *MockWerftService_StartLocalJobServer) SendAndClose(arg0 *v1.StartJobResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendAndClose\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a73cb1a4234136ce31cf723a99375e0a", "score": "0.5240749", "text": "func (m_2 *MockWerftService_ListenClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4f01440ffffecc2f075f70dba0162e00", "score": "0.5237558", "text": "func (m *MockConfigAdminService_ListSnapshotsServer) Send(arg0 *device.Snapshot) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "ed6a2474de13c18a593da76efad403ea", "score": "0.5236807", "text": "func (m_2 *MockAgentSecure_WorkloadmetaStreamEntitiesServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "e5b8742233c9bf6101607c787a609cd2", "score": "0.52247137", "text": "func (m *MockProvisioner_ProvisionResourceServer) Send(arg0 *tfplugin5.ProvisionResource_Response) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "5da919d589ab4b0750f53cbf88cdd7c4", "score": "0.5223621", "text": "func (m *MockMachine_ExecuteClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "64e1ad0740a4165bf310e522211d1034", "score": "0.5222891", "text": "func (_m *NSenterEventIface) SendRequest() error {\n\tret := _m.Called()\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func() error); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "1f0f91f5936c2aa68aa7f90db7cf7100", "score": "0.522226", "text": "func (s *NullEventSpool) Send() {\n}", "title": "" }, { "docid": "9fa206f83f550b872dbff94f79a1039b", "score": "0.5221041", "text": "func (m *MockMessageBus_SubscribeServer) Send(arg0 *proto.SubscribeResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "cb746939a107c97e0f8d21d9bb635750", "score": "0.522011", "text": "func TestSendMessage(t *testing.T) {\n\tmessage := &api.BaseMessage{\n\t\tBody: fmt.Sprintf(\"%s send 'hello test'\", testHosts[0].ID()),\n\t\tFlag: api.FlagGenericMessage,\n\t}\n\n\tsendData, err := json.Marshal(message)\n\tif err != nil {\n\t\tt.Fatal(\"Error occurred when marshalling message object\")\n\t}\n\n\terr = testPubsubs[0].Publish(serviceTag, sendData)\n\tif err != nil {\n\t\tt.Fatal(\"Error occurred when publishing\")\n\t}\n}", "title": "" }, { "docid": "685b43b34c3b99b471913032b9fd7ce4", "score": "0.52154374", "text": "func (_m *MockDataReceiverService_PutMetricServer) SendAndClose(_a0 *Void) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*Void) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" } ]
1c9f70c2fe233d2221ee507767083a17
Load clones a template into a directory
[ { "docid": "9565f66292a9245da38826da3a42ae4a", "score": "0.61673146", "text": "func Load(uri, ref, targetFolder string) error {\n\tif !strings.HasPrefix(uri, \"http\") && !strings.HasPrefix(uri, \"git\") {\n\t\t// no valid url, try prefixing with default btrfaas template url\n\t\turi = \"https://github.com/trusch/btrfaas.git/templates/\" + uri\n\t}\n\trepo := uri\n\tpath := \".\"\n\tif gitIdx := strings.Index(uri, \".git\"); gitIdx != -1 {\n\t\trepo = uri[:gitIdx+4]\n\t\tpath = uri[gitIdx+4:]\n\t}\n\ttmpDir := filepath.Join(os.TempDir(), \"btrfaas-work\")\n\tdefer os.RemoveAll(tmpDir)\n\tif err := os.MkdirAll(tmpDir, 0755); err != nil {\n\t\treturn err\n\t}\n\t_, err := git.PlainClone(tmpDir, false, &git.CloneOptions{\n\t\tURL: repo,\n\t\tDepth: 1,\n\t\tSingleBranch: true,\n\t\tProgress: os.Stdout,\n\t\tReferenceName: plumbing.ReferenceName(ref),\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err = copyDir(filepath.Join(tmpDir, path), targetFolder); err != nil {\n\t\treturn err\n\t}\n\tif err = replaceFunctionName(filepath.Join(targetFolder, \"function.yaml\"), filepath.Base(targetFolder)); err != nil {\n\t\treturn err\n\t}\n\treturn replaceFunctionName(filepath.Join(targetFolder, \"Dockerfile\"), filepath.Base(targetFolder))\n}", "title": "" } ]
[ { "docid": "4cc5b8c3060bf1abce38cc44525520a2", "score": "0.7087602", "text": "func loadTemplate(t *template.Template, path string) (*template.Template, error) {\n\ttemplateContent, err := Asset(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar tmpl *template.Template\n\tif t == nil {\n\t\t// if template wasn't yet initialized do it here\n\t\tt = template.New(path)\n\t}\n\n\tif path == t.Name() {\n\t\ttmpl = t\n\t} else {\n\t\t// if we already have an instance of template.Template then\n\t\t// add a new file to it\n\t\ttmpl = t.New(path)\n\t}\n\n\t_, err = tmpl.Parse(string(templateContent))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn t, nil\n}", "title": "" }, { "docid": "eaf58cad64818c517dc906add06d4e1f", "score": "0.69005287", "text": "func loadTemplate() (*template.Template, error) {\n\tt := template.New(\"\")\n\tfor name, file := range Assets.Files {\n\t\tif file.IsDir() || !strings.HasSuffix(name, \".gohtml\") {\n\t\t\tcontinue\n\t\t}\n\t\th, err := ioutil.ReadAll(file)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tt, err = t.New(name).Parse(string(h))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn t, nil\n}", "title": "" }, { "docid": "c83ffe8f34df5ba053e7af6336c8fb16", "score": "0.66814977", "text": "func (t *Template) Load() error {\n\tif t.Template == nil && t.Type != Directory {\n\t\tswitch {\n\t\tcase t.TemplatePath != \"\":\n\t\t\tfilename := step.Abs(t.TemplatePath)\n\t\t\tb, err := os.ReadFile(filename)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrapf(err, \"error reading %s\", filename)\n\t\t\t}\n\t\t\treturn t.LoadBytes(b)\n\t\tdefault:\n\t\t\treturn t.LoadBytes(t.Content)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "969d42086ade6d0cc895b1535c348955", "score": "0.6676204", "text": "func (t *templater) loadTemplate(name string) (tmpl *template.Template, err error) {\n\tif tmpl, ok := t.cache[name]; ok {\n\t\treturn tmpl, nil\n\t}\n\n\tlog.Debug().Msgf(\"templater: loading template %s\", name)\n\tlayouts, err := t.loadLayouts()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlayouts, err = layouts.Clone()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttmpl, err = layouts.ParseFiles(filepath.Join(\"templates\", name))\n\n\tif t.cacheTemplates {\n\t\tt.cache[name] = tmpl\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "cbd17c0547b9fab65e22b8453cecf103", "score": "0.66416293", "text": "func loadTemplate(templateName string) *template.Template {\n\tif templateName == \"\" { // no template is needed\n\t\treturn nil\n\t}\n\tdeps, ok := templateDependencies[templateName]\n\tif !ok { // error\n\t\tdeps = templateDependencies[\"error.html\"]\n\t\ttemplateName = \"error.html\"\n\t}\n\tnewDeps := make([]string, len(deps))\n\tcopy(newDeps, deps)\n\tdeps = newDeps\n\tfor i := range deps {\n\t\tdeps[i] = Conf.Server.Dirs.Templates + \"/\" + deps[i]\n\t}\n\tdeps = append(deps, Conf.Server.Dirs.Templates+\"/\"+templateName)\n\tt, err := template.ParseFiles(deps...)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\treturn t\n}", "title": "" }, { "docid": "9dbbfbf4aab5652915698e26fcde1009", "score": "0.6611596", "text": "func (t *Template) load(dir string) error {\n\tt.m.Lock()\n\tdefer t.m.Unlock()\n\tt.tmpls = template.New(\"\")\n\treturn filepath.Walk(t.folder, func(path string, info os.FileInfo, err error) error {\n\t\tif info.IsDir() {\n\t\t\treturn nil\n\t\t}\n\t\tif !strings.HasSuffix(info.Name(), t.ext) {\n\t\t\treturn nil\n\t\t}\n\n\t\tf, err := os.Open(path)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer f.Close()\n\n\t\tdata, err := ioutil.ReadAll(f)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tname, _ := filepath.Rel(t.folder, path)\n\t\tname = name[:len(name)-len(t.ext)]\n\t\t_, err = t.tmpls.New(name).Parse(string(data))\n\t\treturn err\n\t})\n}", "title": "" }, { "docid": "9092122cb4c4274e40a345e4d74560c7", "score": "0.6606896", "text": "func loadTemplate(paths ...string) *template.Template {\n\tt := template.New(strings.Join(paths, \",\"))\n\tt.Funcs(template.FuncMap{\n\t\t\"eq\": reflect.DeepEqual,\n\t\t// see template_functions.go.\n\t\t\"DaysUntil\": DaysUntil,\n\t\t\"ExtractPageContent\": ExtractPageContent,\n\t})\n\t_, err := t.ParseFiles(paths...)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn t\n}", "title": "" }, { "docid": "281ca0ee3181eedc791718c55c875ed6", "score": "0.65179586", "text": "func Load(replayDir,templateName string){\n\n}", "title": "" }, { "docid": "2174607d13ce234f164b379080f43f16", "score": "0.6504233", "text": "func LoadTemplate(filename string) (string, error) {\n\tlog.Debug(\" <-- loadtemplate entry\")\n\tbs, err := ioutil.ReadFile(filename)\n\treturn string(bs), err\n}", "title": "" }, { "docid": "25103e4ff09c1973fe183567f5f7a267", "score": "0.6385241", "text": "func loadStoryTemplate(filepath string) (*template.Template, error) {\n\treturn template.New(\"story-template\").ParseFiles(filepath)\n}", "title": "" }, { "docid": "11206aec4eb039440bf2d198dbbf77d8", "score": "0.63653195", "text": "func (t *templates) loadTemplates() {\n\ttemp := template.New(\"templates\")\n\n\terr := t.parseTemplates(t.root, temp)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tt.Lock()\n\tt.template = temp\n\tt.Unlock()\n}", "title": "" }, { "docid": "02306002efb9dd5b8258c7069b59e7c2", "score": "0.6363576", "text": "func loadTemplates() *template.Template {\n dir, err := filepath.Abs(filepath.Dir(os.Args[0]))\n if err != nil {\n Dbg(\"Can't determine current path\")\n }\n\n var templates *template.Template\n var allFiles []string\n files, err := ioutil.ReadDir(dir + \"/../templates\")\n if err != nil {\n fmt.Println(err)\n }\n for _, file := range files {\n fileName := file.Name()\n if strings.HasSuffix(fileName, \".tpl\") {\n allFiles = append(allFiles, dir + \"/../templates/\" + fileName)\n }\n }\n\n tplFuncMap := make(template.FuncMap)\n tplFuncMap[\"Split\"] = Split\n tplFuncMap[\"Trim\"] = Trim\n tplFuncMap[\"Replace\"] = Replace\n tplFuncMap[\"Code\"] = Code\n tplFuncMap[\"Nobr\"] = Nobr\n tplFuncMap[\"Br\"] = Br\n tplFuncMap[\"ByteFormat\"] = ByteFormat\n tplFuncMap[\"UnitValue\"] = UnitValue\n tplFuncMap[\"RawIntUnitValue\"] = RawIntUnitValue\n tplFuncMap[\"RoundUp\"] = Round\n tplFuncMap[\"LimitStr\"] = LimitStr\n tplFuncMap[\"Add\"] = Add\n tplFuncMap[\"Sub\"] = Sub\n tplFuncMap[\"Mul\"] = Mul\n tplFuncMap[\"Div\"] = Div\n tplFuncMap[\"NumFormat\"] = NumFormat\n tplFuncMap[\"MsFormat\"] = MsFormat\n tplFuncMap[\"DtFormat\"] = DtFormat\n tplFuncMap[\"RawIntFormat\"] = RawIntFormat\n tplFuncMap[\"RawFloatFormat\"] = RawFloatFormat\n tplFuncMap[\"Int\"] = Int\n tplFuncMap[\"EscapeQuery\"] = EscapeQuery\n tplFuncMap[\"WordWrap\"] = WordWrap\n\n templates, err = template.New(\"\").Funcs(tplFuncMap).ParseFiles(allFiles...)\n if err != nil {\n log.Fatal(\"Can't load templates\", err)\n return nil\n }\n\n return templates\n}", "title": "" }, { "docid": "96535f57cb83f635105869e674550cc4", "score": "0.6363509", "text": "func (s *ViewStruct) load(dir string) (View, error) {\n\n // supported is the list of file extensions that will be parsed as templates\n supported := map[string]bool{\".tpl\": true, \".html\": true, \".tmpl\": true}\n\n werr := filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {\n if err != nil {\n return err\n }\n if info.IsDir() {\n return nil\n }\n\n extension := filepath.Ext(path)\n if _, ok := supported[extension]; !ok {\n return nil\n }\n\n data, err := ioutil.ReadFile(path)\n if err != nil {\n return err\n }\n\n // We remove the directory name from the path\n // this means if we have directory foo, with file bar.tpl\n // full path for bar file foo/bar.tpl\n // we trim the foo part and remain with /bar.tpl\n //\n // NOTE we don't account for the opening slash, when dir ends with /.\n name := path[len(dir):]\n\n name = filepath.ToSlash(name)\n\n name = strings.TrimPrefix(name, \"/\") // case we missed the opening slash\n\n name = strings.TrimSuffix(name, extension) // remove extension\n grpclog.Info(name)\n t := s.tmpl.New(name)\n if _, err = t.Parse(string(data)); err != nil {\n return err\n }\n return nil\n })\n\n if werr != nil {\n return nil, werr\n }\n\n return s, nil\n}", "title": "" }, { "docid": "5ab210537aa3c7e614768c02d206daf6", "score": "0.63187325", "text": "func LoadTemplate(path string) (*template.Template, error) {\n\tvar (\n\t\tfileReader http.File\n\t\tdata []byte\n\t\terr error\n\t)\n\n\tif fileReader, err = pkger.Open(path); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to open template: %v\", err)\n\t}\n\n\tif data, err = ioutil.ReadAll(fileReader); err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to read template: %v\", err)\n\t}\n\n\treturn template.New(filepath.Base(path)).Parse(string(data))\n}", "title": "" }, { "docid": "b1aba43f2eb6a626c40fc8b04095d84e", "score": "0.63003486", "text": "func (tpl Templates) Load() (Templates, error) {\n\ttpl.templates = template.New(\"\").Funcs(tpl.funcmap)\n\terr := filepath.Walk(tpl.dir, func(path string, info os.FileInfo, err error) error {\n\t\tif !info.IsDir() {\n\t\t\tb, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\ttpl.templates, err = tpl.templates.\n\t\t\t\tNew(strings.TrimPrefix(path, tpl.dir)).\n\t\t\t\tParse(string(b))\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n\n\treturn tpl, err\n}", "title": "" }, { "docid": "c1e0c24394088730fe79239faf45b59f", "score": "0.62779224", "text": "func (i *gatewayHandler) loadTemplate() error {\n\tt, err := template.New(\"dir\").Parse(listingTemplate)\n\tif err != nil {\n\t\treturn err\n\t}\n\ti.dirList = t\n\treturn nil\n}", "title": "" }, { "docid": "f9105a81d7560a169c7d203f71893883", "score": "0.6275735", "text": "func (h *OperatorTemplateHelper) loadTemplate(name string) ([]byte, error) {\n\tpath := fmt.Sprintf(\"%s/%s.yaml\", h.TemplatePath, name)\n\n\ttpl, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tparsed, err := template.New(\"CICD\").Parse(string(tpl))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar buffer bytes.Buffer\n\terr = parsed.Execute(&buffer, h.Parameters)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn buffer.Bytes(), nil\n}", "title": "" }, { "docid": "f709ca64d961fa4a648eb2d37cd2a990", "score": "0.62516767", "text": "func (t *Loader) LoadTemplate(e Template) error {\n\tif t.IsBinary() {\n\t\treturn e.LoadAssets(t.Directory, t.Extension, t.AssetFunc, t.NamesFunc)\n\t} else if t.Directory != \"\" {\n\t\treturn e.LoadDirectory(t.Directory, t.Extension)\n\t}\n\treturn errMissingDirectoryOrAssets\n}", "title": "" }, { "docid": "0ab92200b2b381389c6cc99d4ef8a0c9", "score": "0.6206311", "text": "func (temp Template) LoadRemoteTemplateIntoMemory() (*git.Repository, error) {\n\treturn git.Clone(memory.NewStorage(), nil, &git.CloneOptions{\n\t\tURL: temp.GetSafeRemote(),\n\t\tRemoteName: \"origin\",\n\t})\n}", "title": "" }, { "docid": "5f40ed6a22750fb81aee8a6fe900d698", "score": "0.61946595", "text": "func (t *TemplateChain) Reload() (*TemplateChain, error) {\n\tif t.InMemory {\n\t\treturn t, nil\n\t}\n\tdup := TemplateChain{\n\t\tParts: [][]byte{},\n\t\tKeys: []string{},\n\t\tModTime: t.ModTime,\n\t\tFilename: t.Filename,\n\t\tAutoRefresh: t.AutoRefresh,\n\t\tPrintDebug: t.PrintDebug,\n\t}\n\t// check for changes\n\tinfo, err := os.Stat(dup.Filename)\n\tbase := filepath.Base(dup.Filename)\n\terrinfo := `failed to stat the template: ` + base\n\t//L.Print(t.Filename, err)\n\tif L.IsError(err, errinfo, dup.Filename) {\n\t\tdup.Parts = [][]byte{[]byte(errinfo)}\n\t\tL.Print(dup.Filename)\n\t\treturn &dup, errors.New(errinfo)\n\t}\n\t// when not modified\n\tmodTime := info.ModTime()\n\tif dup.ModTime.Sub(modTime).Nanoseconds() == 0 && modTime.UnixNano() != 0 {\n\t\treturn t, nil\n\t}\n\t// when modified\n\tdup.ModTime = modTime\n\t// read the actual file\n\tbs, err := os.ReadFile(dup.Filename)\n\terrinfo = `template not found: ` + base\n\tif L.IsError(err, errinfo, dup.Filename) {\n\t\tdup.Parts = [][]byte{[]byte(errinfo)}\n\t\tL.Print(dup.Filename)\n\t\treturn &dup, errors.New(errinfo)\n\t}\n\tdup.ParseTemplate(bs)\n\treturn &dup, nil\n}", "title": "" }, { "docid": "3f9d01f7c2d5466fd56de378d167debc", "score": "0.616751", "text": "func populateTemplate() *template.Template {\n\t// Name will be a container to load template in\n\tresult := template.New(\"Templates\")\n\n\t// Where the template is on the file system\n\tconst basePath = \"templates\"\n\n\t// Parse those template in the context or result template\n\t// with the must function, he takes and a `Template` and an `error`\n\t// and return a template if succeed or fails if anything fails\n\t// `ParseGlob` takes a file pattern with the base path\n\ttemplate.Must(result.ParseGlob(basePath + \"/*.html\"))\n\n\treturn result\n}", "title": "" }, { "docid": "8f6e8cf56b3a5a3b4b2d8339895414d9", "score": "0.61503017", "text": "func LoadTemplates() {\n\tTemplates[\"index.html\"] = ParseTemplate(\"index.html\")\n}", "title": "" }, { "docid": "6b3b11a2f5a7b166df1309361bce204a", "score": "0.6143947", "text": "func (ui *GUI) loadTemplates() error {\n\tvar templates []string\n\tfindTemplate := func(path string, f os.FileInfo, err error) error {\n\t\t// If path doesn't exist, or other error with path, return error so\n\t\t// that Walk will quit and return the error to the caller.\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif !f.IsDir() && strings.HasSuffix(f.Name(), \".html\") {\n\t\t\ttemplates = append(templates, path)\n\t\t}\n\t\treturn nil\n\t}\n\n\terr := filepath.Walk(ui.cfg.GUIDir, findTemplate)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\thttpTemplates := template.New(\"template\").Funcs(template.FuncMap{\n\t\t\"hashString\": hashString,\n\t\t\"upper\": strings.ToUpper,\n\t\t\"ratToPercent\": ratToPercent,\n\t\t\"floatToPercent\": floatToPercent,\n\t\t\"time\": formatUnixTime,\n\t\t\"truncateAccountID\": truncateAccountID,\n\t\t\"blockURL\": blockURL,\n\t\t\"txURL\": txURL,\n\t})\n\n\t// Since template.Must panics with non-nil error, it is much more\n\t// informative to pass the error to the caller to log it and exit\n\t// gracefully.\n\thttpTemplates, err = httpTemplates.ParseFiles(templates...)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tui.templates = template.Must(httpTemplates, nil)\n\treturn nil\n}", "title": "" }, { "docid": "509043d91335eaad6cc6e7cd818a9470", "score": "0.61311233", "text": "func LoadTemplate(category, file, builtin string) (string, error) {\n\tdir, err := GetTemplateDir(category)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tfile = filepath.Join(dir, file)\n\tif !FileExists(file) {\n\t\treturn builtin, nil\n\t}\n\n\tcontent, err := ioutil.ReadFile(file)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn string(content), nil\n}", "title": "" }, { "docid": "facdcc84730859f81ccd829a70cf86ba", "score": "0.61012024", "text": "func (h *MonitoringTemplateHelper) loadTemplate(name string) ([]byte, error) {\n\ttemplatePath, err := getTemplatePath(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpath := fmt.Sprintf(\"%s.yaml\", templatePath)\n\ttpl, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Use [[ ]] as delimiters because {{ }} is extensively used in the\n\t// prometheus rules and grafana dashboard\n\tparsed, err := template.New(\"monitoring\").Delims(\"[[\", \"]]\").Parse(string(tpl))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar buffer bytes.Buffer\n\terr = parsed.Execute(&buffer, h.Parameters)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn buffer.Bytes(), nil\n}", "title": "" }, { "docid": "5036bfc7aa940c17ec32787a31fc52e2", "score": "0.6098021", "text": "func (cf *ConfigFormat) loadTemplates() error {\n\tif cf.templates != nil {\n\t\treturn nil\n\t}\n\tt := template.New(\"\")\n\tt.Funcs(cf.funcMap())\n\tbox := packr.NewBox(\"./templates\")\n\terr := box.Walk(func(name string, f packr.File) error {\n\t\tif !strings.HasSuffix(name, \".gotmpl\") {\n\t\t\treturn nil\n\t\t}\n\t\ts := f.String()\n\t\tif len(s) == 0 {\n\t\t\treturn errors.Errorf(\"zero length template %s\", name)\n\t\t}\n\t\t_, err := t.New(name).Parse(s)\n\t\treturn err\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tcf.templates = t\n\treturn nil\n}", "title": "" }, { "docid": "4ed05870fcd1347b5a8093a8cd392cde", "score": "0.6054513", "text": "func loadTemplates() {\n\t// Read in all the templates. (./www/*html)\n\tvar allFiles []string\n\tfiles, err := ioutil.ReadDir(\"./www\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tfor _, file := range files {\n\t\tfilename := file.Name()\n\t\tfmt.Printf(\"Grabbing file: %s\\n\", filename)\n\t\tif strings.HasSuffix(filename, \".html\") {\n\t\t\tallFiles = append(allFiles, \"./www/\"+filename)\n\t\t}\n\t}\n\n\tfmt.Printf(\"allFiles is: %v\\n\", allFiles)\n\tt, err = template.ParseFiles(allFiles...) // parses all .tmpl or ./html files in the 'www' folder\n}", "title": "" }, { "docid": "c3d82cb50bb23890aebbcba96eb52c69", "score": "0.60469496", "text": "func loadGoTemplate(path string) (tmpl *template.Template, err error) {\n\tfile, err := openStream(path)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer closeStream(file)\n\n\trawTmpl, err := ioutil.ReadAll(file)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// explicitly parse the raw string rather than using ParseFiles\n\t// ParseFiles creates templates whose names are those of the files\n\t// and associates them with the parent template\n\t// this creates some confusing behavior in Template.Parse\n\t// see http://stackoverflow.com/questions/11805356/text-template-issue-parse-vs-parsefiles\n\t// also note: functions have to be added before the template is parsed\n\ttmpl, err = template.New(\"root\").Funcs(tmplFuncs).Parse(string(rawTmpl))\n\treturn // again, whether err==nil or not, this is finished\n}", "title": "" }, { "docid": "5d45d93d6c0e3816c507e1146d306f5f", "score": "0.60113513", "text": "func (tce *templateCacheEntry) load(filename string) error {\n\trawTemplate, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn tce.parse(string(rawTemplate))\n}", "title": "" }, { "docid": "0db16b869fee30d8dbcf5335fe0715f9", "score": "0.59087265", "text": "func LoadTemplates() {\n\tindexTemplate = template.Must(template.ParseFiles(\"./templates/index.html\"))\n}", "title": "" }, { "docid": "0badff96247009f2868fb43971b43a13", "score": "0.58944917", "text": "func ReadTemplate(dir string, buildDir string) (*Template, error) {\n\tprj := &Template{\n\t\tdir: dir,\n\t\thtml: html.New(\"/html/\"),\n\t\ttext: text.New(\"/text/\"),\n\t\tbuildDir: buildDir,\n\t}\n\tprj.text.Funcs(text.FuncMap{\n\t\t\"escapeLatex\": EscapeLatex,\n\t\t\"typeOf\": typeOfName,\n\t\t\"isType\": is,\n\t\t\"str\": strOf,\n\t})\n\n\terr := filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to walk path %s: %w\", path, err)\n\t\t}\n\t\tif info.IsDir() && strings.HasPrefix(info.Name(), \".\") || path == buildDir {\n\t\t\treturn filepath.SkipDir\n\t\t}\n\t\tif !info.IsDir() {\n\t\t\tif info.Name() == \".DS_Store\" {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tfile, err := NewFile(prj, path)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"failed to scan file: %w\", err)\n\t\t\t}\n\t\t\tprj.files = append(prj.files, file)\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn prj, fmt.Errorf(\"failed to list template files: %w\", err)\n\t}\n\treturn prj, nil\n}", "title": "" }, { "docid": "826d16a62442fb15953190785b69b468", "score": "0.58932984", "text": "func New(folder, ext string) (*Template, error) {\n\tt := &Template{\n\t\tfolder: folder,\n\t\text: ext,\n\t\tstop: make(chan struct{}),\n\t}\n\terr := t.load(\"\")\n\treturn t, err\n}", "title": "" }, { "docid": "f16e039c086685ab9019e5056dece1f2", "score": "0.5880327", "text": "func (tc *templateCache) loadAndParse(id, fn, ct string) error {\n\tt, err := ioutil.ReadFile(fn)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn tc.parse(id, string(t), ct)\n}", "title": "" }, { "docid": "0686a7ebe666efb7e0881ac10766c4bf", "score": "0.5877949", "text": "func LoadTemplates(rootTemp string, childTemps []string) {\n\trootTemplate = rootTemp\n\tchildTemplates = childTemps\n}", "title": "" }, { "docid": "99e51ea82bfa3adc325a739976c26ebc", "score": "0.58723646", "text": "func Load() error {\n\tfor name, template := range k8sTemplates {\n\t\ttmpl, err := text_template.New(name).Parse(template)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\ttemplates[name] = tmpl\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6374a7ff4cd5bce8643998481eeba621", "score": "0.58647716", "text": "func Load() *template.Template {\n\ttpls := template.New(\"\")\n\n\tfile, err := ReadFile(\"index.html\")\n\n\tif err != nil {\n\t\tlogrus.Warnf(\"Failed to read builtin index template. %s\", err)\n\t} else {\n\t\ttpls.New(\n\t\t\t\"index.html\",\n\t\t).Parse(\n\t\t\tstring(file),\n\t\t)\n\t}\n\n\tif config.Server.Assets != \"\" && com.IsDir(config.Server.Assets) {\n\t\tcustomIndex := path.Join(\n\t\t\tconfig.Server.Assets,\n\t\t\t\"index.html\",\n\t\t)\n\n\t\tif com.IsFile(customIndex) {\n\t\t\tcontent, err := ioutil.ReadFile(customIndex)\n\n\t\t\tif err != nil {\n\t\t\t\tlogrus.Warnf(\"Failed to read custom index template. %s\", err)\n\t\t\t} else {\n\t\t\t\ttpls.New(\n\t\t\t\t\t\"index.html\",\n\t\t\t\t).Parse(\n\t\t\t\t\tstring(content),\n\t\t\t\t)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn tpls\n}", "title": "" }, { "docid": "4999aeaac76a1bdb8867878b6b5eeee3", "score": "0.58617944", "text": "func parseTemplate(filename string) *appTemplate {\n\ttmpl := template.Must(template.ParseFiles(\"tools/templates/base.html\"))\n\n\t// Put the named file into a template called \"body\"\n\tpath := filepath.Join(\"tools/templates\", filename)\n\tb, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\tpanic(fmt.Errorf(\"could not read template: %v\", err))\n\t}\n\ttemplate.Must(tmpl.New(\"body\").Parse(string(b)))\n\n\treturn &appTemplate{tmpl.Lookup(\"base.html\")}\n}", "title": "" }, { "docid": "09b65723dbec03287d52565ba5fdc0de", "score": "0.5855971", "text": "func copyTemplate(doc *Doc) error {\n\tasset, err := template.Asset(templates[doc.Theme.Template] + \"/index.html.tmpl\")\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tformat, err := tmpl.New(\"doc\").Funcs(tmpl.FuncMap{\n\t\t\"readContent\": func(path string) string {\n\t\t\tcontent, err := ioutil.ReadFile(path)\n\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"An error occured generating documentation: \\n\\t%v.\", err)\n\t\t\t}\n\n\t\t\treturn string(github_flavored_markdown.Markdown(content))\n\t\t},\n\t\t\"idFrom\": func(name string) string {\n\t\t\treturn strings.Replace(strings.ToLower(name), \" \", \"-\", -1)\n\t\t},\n\t}).Parse(string(asset))\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdst, err := os.Create(doc.Build.Dir + \"/index.html\")\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer dst.Close()\n\n\treturn format.Execute(dst, doc)\n}", "title": "" }, { "docid": "1a290d786a54af668c8b06ca58839d3b", "score": "0.58547163", "text": "func (h *HttpHandler) loadTemplates() {\n\th.templates = template.Must(template.ParseFiles(\"templates/home.html\"))\n}", "title": "" }, { "docid": "911cae5b2ae79788e5c282758a94dc0c", "score": "0.58248734", "text": "func LoadTemplates(t *tmpl) error {\n\t// Walk over the views directory\n\terr := filepath.Walk(\"views/\", func(path string, info os.FileInfo, err error) error {\n\n\t\t// Check if file has .html extesnion\n\t\tif strings.HasSuffix(info.Name(), \".html\") {\n\t\t\tif t.tmpl, err = t.tmpl.ParseFiles(path); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t})\n\n\treturn err\n}", "title": "" }, { "docid": "d6dc940be26cdb37a460eaf6be68bfc2", "score": "0.58108103", "text": "func loadTemplates(templateDir string) multitemplate.Renderer {\n\tr := multitemplate.NewRenderer()\n\n\tr.AddFromFiles(\"allmaps\", templateDir+\"/layouts/base.html\", templateDir+\"/includes/maps/maps.html\")\n\tr.AddFromFiles(\"singlemap\", templateDir+\"/layouts/base.html\", templateDir+\"/includes/maps/singlemap.html\")\n\tr.AddFromFiles(\"login\", templateDir+\"/layouts/base.html\", templateDir+\"/includes/auth/login.html\")\n\tr.AddFromFiles(\"register\", templateDir+\"/layouts/base.html\", templateDir+\"/includes/auth/register.html\")\n\n\treturn r\n}", "title": "" }, { "docid": "f29fdbc92d15d03598d1cf2757b098e1", "score": "0.57987326", "text": "func PopulateTemplates() {\n\tvar allFiles []string\n\ttemplatesDir := \"./dist/\"\n\tfiles, err := ioutil.ReadDir(templatesDir)\n\tif err != nil {\n\t\tfmt.Println(\"Error reading template dir\")\n\t}\n\tfor _, file := range files {\n\t\tfilename := file.Name()\n\t\tif strings.HasSuffix(filename, \".html\") {\n\t\t\tallFiles = append(allFiles, templatesDir+filename)\n\t\t}\n\t}\n\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\ttemplates = template.Must(template.ParseFiles(allFiles...))\n\n\tindexTemplate = templates.Lookup(\"index.html\")\n\n}", "title": "" }, { "docid": "c14ccaa0e2400bd4a6d7436c83d8d1cb", "score": "0.5791447", "text": "func LoadTemplates(path string) error {\n\tt := template.New(\"\")\n\tt = t.Funcs(template.FuncMap{\n\t\t\"isPID\": isPID,\n\t\t\"isURL\": isURL,\n\t\t\"isCompound\": isCompound,\n\t\t\"splitCompound\": splitCompound,\n\t\t\"decodeUnicode\": decodeUnicode,\n\t\t\"AttachedFiles\": AttachedFiles,\n\t\t\"CollectionMembers\": CollectionMembers,\n\t\t\"FirstField\": firstField,\n\t\t\"AllFields\": allFields,\n\t\t\"ConfigValue\": configValue,\n\t\t\"add\": add0,\n\t\t\"sub\": sub0,\n\t\t\"Join\": join,\n\t\t\"dict\": dict0,\n\t})\n\tt, err := t.ParseGlob(filepath.Join(path, \"*\"))\n\tTemplates = t\n\treturn err\n}", "title": "" }, { "docid": "aece6eb8aeda5b752b779f5d038440cc", "score": "0.57702273", "text": "func Load() {\n\tif err := commonTemplates(); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tif err := parseHTMLTemplates([][]string{{\"ui.html\", \"layout.html\", \"scripts.html\"}}, nil); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "943e3f779cb63db3c04d9de7696ce9a1", "score": "0.57606345", "text": "func PopulateTemplates() {\n\tvar allFiles []string\n\ttemplatesDir := \"./templates/\"\n\tfiles, err := ioutil.ReadDir(templatesDir)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1) // No point in running app if templates aren't read\n\t}\n\tfor _, file := range files {\n\t\tfilename := file.Name()\n\t\tif strings.HasSuffix(filename, \".html\") {\n\t\t\tallFiles = append(allFiles, templatesDir+filename)\n\t\t}\n\t}\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1)\n\t}\n\ttemplates, err = template.ParseFiles(allFiles...)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1)\n\t}\n\thomeTemplate = templates.Lookup(\"home.html\")\n\tdeletedTemplate = templates.Lookup(\"deleted.html\")\n\n\teditTemplate = templates.Lookup(\"edit.html\")\n\tsearchTemplate = templates.Lookup(\"search.html\")\n\tcompletedTemplate = templates.Lookup(\"completed.html\")\n\tloginTemplate = templates.Lookup(\"login.html\")\n\n}", "title": "" }, { "docid": "4c4ac472d977d5c2c031e64409542586", "score": "0.57571214", "text": "func makeTemplate(path string) *template.Template {\n\tfiles := []string{path, \"templates/footer.html\", \"templates/base.html\"}\n\treturn template.Must(template.ParseFiles(files...))\n}", "title": "" }, { "docid": "8b894445ec015307dde86d9bb7dd538e", "score": "0.57570845", "text": "func (c *Cfg) loadTemplates() error {\n\tif len(c.Templates) > 0 {\n\t\treturn errors.New(\"templates are already loaded\")\n\t}\n\tpages := map[string]string{\n\t\t\"index\": page.Index,\n\t\t\"error\": page.Error,\n\t\t\"result\": page.Result,\n\t\t\"read\": page.Read,\n\t}\n\tc.Templates = make(map[string]*template.Template, len(pages))\n\tfor name, content := range pages {\n\t\ttpl, err := template.New(name).Parse(content)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tc.Templates[name] = tpl\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9af0f5797abffa85341fa854aa16bc27", "score": "0.57364196", "text": "func PopulateTemplates() {\n\tvar allFiles []string\n\ttemplatesDir := \"./templates/\"\n\tfiles, err := ioutil.ReadDir(templatesDir)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1) // No point in running app if templates aren't read\n\t}\n\tfor _, file := range files {\n\t\tfilename := file.Name()\n\t\tif strings.HasSuffix(filename, \".html\") {\n\t\t\tallFiles = append(allFiles, templatesDir+filename)\n\t\t}\n\t}\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1)\n\t}\n\ttemplates, err = template.ParseFiles(allFiles...)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1)\n\t}\n\thomeTemplate = templates.Lookup(\"home.html\")\n\tloginTemplate = templates.Lookup(\"login.html\")\n\tsignupTemplate = templates.Lookup(\"signup.html\")\n\taddnewsTemplate = templates.Lookup(\"addnews.html\")\n\tuserlistTemplate = templates.Lookup(\"userlist.html\")\n\tshownewsTemplate = templates.Lookup(\"shownews.html\")\n\teditnewsTemplate = templates.Lookup(\"editnews.html\")\n\t// deletedTemplate = templates.Lookup(\"deleted.html\")\n\t// editTemplate = templates.Lookup(\"edit.html\")\n\t// searchTemplate = templates.Lookup(\"search.html\")\n\t// completedTemplate = templates.Lookup(\"completed.html\")\n\n}", "title": "" }, { "docid": "ba867a3aaf48a7009261a5076b4044db", "score": "0.5722127", "text": "func loadTemplates(dir string) *template.Template {\n\n\tfuncMap := template.FuncMap{\n\t\t\"numVotes\": func(maimais []UserMaimai) []int {\n\t\t\tv := voteCount(len(maimais))\n\t\t\tvotes := make([]int, v)\n\t\t\tfor i := range votes {\n\t\t\t\tvotes[i] = i\n\t\t\t}\n\t\t\treturn votes\n\t\t},\n\t\t\"add\": func(a, b int) string {\n\t\t\treturn fmt.Sprintf(\"%02d\", a+b)\n\t\t},\n\t\t\"formatCW\": func(cw int) string {\n\t\t\treturn fmt.Sprintf(\"CW_%02d\", cw)\n\t\t},\n\t\t\"pathPrefix\": func(s string) string {\n\t\t\treturn filepath.Join(\"mm\", s)\n\t\t},\n\t\t\"toJson\": func(i interface{}) string {\n\t\t\tb, err := json.Marshal(i)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err)\n\t\t\t\treturn \"\"\n\t\t\t}\n\t\t\treturn base64.RawStdEncoding.EncodeToString(b)\n\t\t},\n\t\t\"formatTime\": func(t time.Time) string {\n\t\t\tw := t.Weekday()\n\n\t\t\tweekdays := []string{\"So\", \"Mo\", \"Di\", \"Mi\", \"Do\", \"Fr\", \"Sa\"}\n\t\t\treturn fmt.Sprintf(\"%s %s\", weekdays[w], t.Format(\"15:04\"))\n\t\t},\n\t}\n\n\treturn template.Must(template.New(\"templates\").Funcs(funcMap).ParseGlob(filepath.Join(dir, \"*.html\")))\n\n}", "title": "" }, { "docid": "130a8bec4d68cc1829f8bd643eae644e", "score": "0.5685581", "text": "func LoadTemplates(templatesDir string) multitemplate.Renderer {\r\n\tr := multitemplate.NewRenderer()\r\n\r\n\tlayouts, err := filepath.Glob(templatesDir + \"/layouts/*\") //! mengeload semua folder yang ada di dalam forlder template\r\n\tif err != nil {\r\n\t\tpanic(err.Error())\r\n\t}\r\n\r\n\tincludes, err := filepath.Glob(templatesDir + \"/**/*\") //! mengeload semua folder yang ada di dalam forlder template selain layouts\r\n\tif err != nil {\r\n\t\tpanic(err.Error())\r\n\t}\r\n\r\n\t//? Generate our templates map from our layouts/ and includes/ directories\r\n\tfor _, include := range includes {\r\n\t\tlayoutCopy := make([]string, len(layouts))\r\n\t\tcopy(layoutCopy, layouts)\r\n\t\tfiles := append(layoutCopy, include)\r\n\t\tr.AddFromFiles(filepath.Base(include), files...)\r\n\t}\r\n\treturn r\r\n}", "title": "" }, { "docid": "582d257c1d38c21989ada74b48f07366", "score": "0.56815106", "text": "func (e *Enforcer) LoadTemplates(cuCfg prowplugins.ConfigUpdater) {\n\ttemplates := sets.New[string]()\n\ttemplatePathPrefix := \"ci-operator/templates/\"\n\tfor pattern, cmSpec := range cuCfg.Maps {\n\t\tif strings.HasPrefix(pattern, templatePathPrefix) {\n\t\t\ttemplates.Insert(cmSpec.Name)\n\t\t}\n\t}\n\n\te.existingTemplates = templates\n}", "title": "" }, { "docid": "b6e1e268ff9fbf723a946d3be96956e5", "score": "0.5677814", "text": "func readTemplate(path string) string {\n\tif !config.IsDev && config.AssetFunc != nil {\n\t\tb, err := config.AssetFunc(path)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Asset error\", err)\n\t\t\treturn \"\"\n\t\t}\n\t\treturn convertTemplate(b)\n\t}\n\tb, err := ioutil.ReadFile(\"v/\" + path)\n\tif err != nil {\n\t\tlog.Println(\"Reading template error\", err)\n\t\treturn \"\"\n\t}\n\treturn convertTemplate(b)\n}", "title": "" }, { "docid": "1ef0c4529351ca20f2e614f9562daf82", "score": "0.5675378", "text": "func (s *server) loadTemplates() {\n\ts.templates = template.Must(template.New(\"\").Delims(\"{%\", \"%}\").ParseGlob(\n\t\tfilepath.Join(*baseapp.ResourcesDir, \"*.html\"),\n\t))\n}", "title": "" }, { "docid": "f9773e19c16d2f9652ea2eaa66ab68ca", "score": "0.5672162", "text": "func loadTemplates(filenames ...string) (*template.Template, error) {\n\tif len(filenames) == 0 {\n\t\t// Not really a problem, but be consistent.\n\t\treturn nil, fmt.Errorf(\"template: no files named in call to loadTemplates\")\n\t}\n\tvar t *template.Template\n\tfor _, filename := range filenames {\n\t\tb, err := Asset(filename)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ts := string(b)\n\t\tname := filepath.Base(filename)\n\t\t// First template becomes return value if not already defined,\n\t\t// and we use that one for subsequent New calls to associate\n\t\t// all the templates together. Also, if this file has the same name\n\t\t// as t, this file becomes the contents of t, so\n\t\t// t, err := New(name).Funcs(xxx).ParseFiles(name)\n\t\t// works. Otherwise we create a new template associated with t.\n\t\tvar tmpl *template.Template\n\t\tif t == nil {\n\t\t\tt = template.New(name)\n\t\t}\n\t\tif name == t.Name() {\n\t\t\ttmpl = t\n\t\t} else {\n\t\t\ttmpl = t.New(name)\n\t\t}\n\t\t_, err = tmpl.Parse(s)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn t, nil\n}", "title": "" }, { "docid": "6933b41b1f2910fc45825951caf5dd1c", "score": "0.5670809", "text": "func (pong *Pong) LoadTemplateGlob(path string) {\n\thtmlTemplate, err := template.ParseGlob(path)\n\tif err != nil {\n\t\tfmt.Errorf(\"pong:%v\", err)\n\t}\n\tpong.htmlTemplate = htmlTemplate\n}", "title": "" }, { "docid": "98f1a5333034c564e5805d494c3afaf6", "score": "0.565766", "text": "func LoadTemplates(tt *Templates, p string) error {\n\tvar err error\n\n\tif tt.BaseEmail, err = t.ParseFiles(fp.Join(p, \"email/base.txt.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\tif tt.BasePage, err = t.ParseFiles(fp.Join(p, \"page/base.html.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\tif tt.ActivateAuthTokenEmail, err = ExtendTemplate(tt.BaseEmail, fp.Join(p, \"email/activate-auth-token.txt.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\tif tt.DeprecatedVersionEmail, err = ExtendTemplate(tt.BaseEmail, fp.Join(p, \"email/deprecated-version.txt.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\tif tt.ErrorPage, err = ExtendTemplate(tt.BasePage, fp.Join(p, \"page/error.html.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\tif tt.LoginPage, err = ExtendTemplate(tt.BasePage, fp.Join(p, \"page/login.html.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\tif tt.Dashboard, err = ExtendTemplate(tt.BasePage, fp.Join(p, \"page/dashboard.html.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "91349d5ec0b9a895014a0123c30804e0", "score": "0.5645186", "text": "func loadTemplate(template string, selector string, data interface{}) error {\n\tw := dom.GetWindow()\n\tdoc := w.Document()\n\n\tt, err := GetTemplate(template)\n\tif t == nil {\n\t\tprint(\"Failed to load template\", template)\n\t\treturn errors.New(\"Invalid template\")\n\t}\n\tif err != nil {\n\t\tprint(err.Error())\n\t\treturn err\n\t}\n\n\tel := doc.QuerySelector(selector)\n\t// print(\"loadtemplate\", template, \"into\", selector, \"=\", el)\n\tif el == nil {\n\t\tprint(\"Could not find selector\", selector)\n\t\treturn errors.New(\"Invalid selector\")\n\t}\n\t// print(\"looks ok adding template\", t, \"to\", el, \"with\", data)\n\tif err := t.ExecuteEl(el, data); err != nil {\n\t\tprint(err.Error())\n\t\treturn err\n\t}\n\tSession.Router.InterceptLinks()\n\treturn nil\n}", "title": "" }, { "docid": "5ae94d3b702378174293f25a174f4aac", "score": "0.56448054", "text": "func LoadTemplates(o Options) {\n\tt = &templates{Options:o}\n\n\tcwd, err := os.Getwd()\n\tif err != nil {\n\t\t// The situation where err is not nil is beyond me now\n\t\tpanic(err)\n\t}\n\tt.root = path.Join(cwd, t.root)\n\n\tt.reload = time.Tick(t.interval)\n\tt.loadTemplates()\n}", "title": "" }, { "docid": "3f22797c8975011c40928e6cddeb0be2", "score": "0.5636678", "text": "func Make(path string, filename string, templateName string, source interface{}, overwrite bool) {\n\terr := MakePath(path)\n\tif err != nil {\n\t\tfmt.Println(\"ERROR \", err)\n\t}\n\n\tif _, err := os.Stat(path + \"/\" + filename); os.IsNotExist(err) || overwrite {\n\t\ttemplates.Make(path+\"/\"+filename, templateName, source)\n\t\tfmt.Println(chalk.Green.Color(\"writing \" + path + \"/\" + filename))\n\t} else {\n\t\tfmt.Println(chalk.Yellow.Color(\"skipping \" + path + \"/\" + filename))\n\t}\n}", "title": "" }, { "docid": "809ecd0fb0830015121231556ac1116d", "score": "0.56348276", "text": "func (self *Template) LoadTemplates(name ...string) {\n\tself.mu.Lock()\n\tdefer self.mu.Unlock()\n\tfor i := 0; i < len(name); i++ {\n\t\tt := template.New(self.base).Funcs(self.funcs)//Funcs(template.FuncMap{\"safe\": safe, \"flash\": flash})\n\t\tt = template.Must(t.ParseFiles(self.dir+\"/\"+self.base, self.dir+\"/\"+name[i]))\t\n\t\tself.cached[name[i]] = t\n\t}\n}", "title": "" }, { "docid": "37d96cfa12e6b130eb95f314aab96ef6", "score": "0.563117", "text": "func PopulateTemplates() map[string]*template.Template {\n const basePath = \"templates\"\n result := make(map[string]*template.Template)\n\n layout := template.Must(template.ParseFiles(basePath + \"/_base.html\"))\n dir, err := os.Open(basePath + \"/content\")\n if err != nil {\n panic(\"Failed to open template blocks directory: \" + err.Error())\n }\n fis, err := dir.Readdir(-1)\n if err != nil {\n panic(\"Failed to read contents of content directory: \" + err.Error())\n }\n for _, fi := range fis {\n f, err := os.Open(basePath + \"/content/\" + fi.Name())\n if err != nil {\n panic(\"Failed to open template '\" + fi.Name() + \"'\")\n }\n content, err := ioutil.ReadAll(f)\n if err != nil {\n panic(\"Failed to read content from file '\" + fi.Name() + \"'\")\n }\n f.Close()\n tmpl := template.Must(layout.Clone())\n _, err = tmpl.Parse(string(content))\n if err != nil {\n panic(\"Failed to parse contents of '\" + fi.Name() + \"' as template\")\n }\n result[fi.Name()] = tmpl\n }\n return result\n}", "title": "" }, { "docid": "94e4c77bef062ea5459dec4a9569d55b", "score": "0.56210035", "text": "func LoadTemplates(tt *Templates, p string) error {\n\tvar err error\n\n\t// if tt.Dashboard, err = pc.ExtendTemplate(\n\t// \ttt.Templates.Dashboard,\n\t// \tfp.Join(p, \"page/dashboard.html\"),\n\t// ); err != nil {\n\t// \treturn err\n\t// }\n\n\tfuncs := t.FuncMap{\n\t\t\"formatTimeStamp\": func(timestamp int64) string {\n\t\t\treturn time.Unix(timestamp, 0).Format(\"02 Jan 2006\")\n\t\t},\n\t\t\"formatCurrency\": func(amount int64, currency stripe.Currency) string {\n\t\t\treturn fmt.Sprintf(\"%.2f %s\", float64(amount)/100.00, strings.ToUpper(string(currency)))\n\t\t},\n\t}\n\n\tif tt.Invoice, err = t.New(\"invoice.html.tmpl\").Funcs(funcs).ParseFiles(fp.Join(p, \"page/invoice.html.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\n\tif tt.InvoiceList, err = t.New(\"invoice-list.html.tmpl\").Funcs(funcs).ParseFiles(fp.Join(p, \"page/invoice-list.html.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0f864e4577ff1eda91f1859fdf86f0d5", "score": "0.56110674", "text": "func Make(expandDir fs.Directory, template string) Template {\n\tvar templateDir fs.Directory\n\ttemplateConfig := Template{\n\t\tFrom: template,\n\t\tDirectory: expandDir,\n\t}\n\n\tif templateConfig.IsTemplateAvailableLocally() {\n\t\ttemplateDir, _ = fs.MakeDirectory(path.Join(GetLocalPath(), template))\n\t}\n\n\tsafeRemote := templateConfig.GetSafeRemote()\n\tif !templateConfig.IsTemplateAvailableRemotely(safeRemote) {\n\t\tcmdutil.ExitWithMessage(\"The remote template provided is not available.\")\n\t}\n\n\ttemplateDir, _ = fs.MakeDirectory(path.Join(GetCachePath(), templateConfig.GetLocalPathByRemote()))\n\ttemplateConfig.TemplateDirectory = templateDir\n\n\treturn templateConfig\n}", "title": "" }, { "docid": "3addbb06616a47452b7fc46782ad50f0", "score": "0.5597961", "text": "func (s *Stencil) Load(r *http.Request) (*Stencil, error) {\n\t// If there is a base, reload it (will reload this as part of it's children)\n\tif s.base != nil && s.base.isStale {\n\t\treturn s.base.Load(r)\n\t}\n\n\t// Get template text\n\tb, err := s.store.Read(r)\n\tif err != nil {\n\t\treturn s, err\n\t}\n\n\t// Store text, create template\n\ts.text = string(b)\n\tt := template.New(s.name)\n\n\t// Add template funcs\n\tif len(s.fm) > 0 {\n\t\tt.Funcs(s.fm)\n\t}\n\n\t// Load full templates (traverse parents)\n\tif t, err = t.Parse(data(s)); err != nil {\n\t\treturn s, err\n\t}\n\ts.Template = t\n\ts.isStale = false\n\n\t// Load children\n\treturn s, Reload(r, s.children...)\n}", "title": "" }, { "docid": "558c414cf0a930728ea06b86b95b8fc4", "score": "0.5593147", "text": "func Load(opt Options) (map[string]*template.Template, error) {\n\tbasePath = opt.Directory\n\texts = opt.Extensions\n\treturn loadTemplates(nil)\n}", "title": "" }, { "docid": "b5fb3b9faa621bf28f7aca2fc84f5d86", "score": "0.55872107", "text": "func newTemplateCache(dir string) (map[string]*template.Template, error) {\n\n\t// Initialize a new map to act as the cache\n\tcache := map[string]*template.Template{}\n\n\t// Build a slice of all the 'page' templates\n\tpages, err := filepath.Glob(filepath.Join(dir, \"*.page.tmpl\"))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Loop through the pages\n\tfor _, page := range pages {\n\n\t\t// Extract the file name from the full path\n\t\tname := filepath.Base(page)\n\n\t\t// Parse the page tempate file\n\t\tts, err := template.New(name).Funcs(functions).ParseFiles(page)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Add any layouts to the template set\n\t\tts, err = ts.ParseGlob(filepath.Join(dir, \"*.layout.tmpl\"))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Add any partial templates to the template set\n\t\tts, err = ts.ParseGlob(filepath.Join(dir, \"*.partial.tmpl\"))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Add the teamplate set to the cache using the page name as the key\n\t\tcache[name] = ts\n\t}\n\n\treturn cache, nil\n}", "title": "" }, { "docid": "d4168c7b9b6ccbff6bd527ebae9b0778", "score": "0.5586175", "text": "func (fn TemplateLoaderFn) LoadTemplate(ctx context.Context, dm discoverymapper.DiscoveryMapper, c client.Reader, capName string, capType types.CapType) (*Template, error) {\n\treturn fn(ctx, dm, c, capName, capType)\n}", "title": "" }, { "docid": "34523ddf0a8d30332f4ca61364974577", "score": "0.5586025", "text": "func init() {\n\ttmp = template.Must(template.ParseFiles(\"tpl.txt\"))\n}", "title": "" }, { "docid": "fe27b040c0356045a65305478cd5429d", "score": "0.55794376", "text": "func TemplateFromFile(name, path string) (*template.Template, error) {\n\tb, err := srcutil.LoadFile(path)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"srcutil.LoadFile(%s) failed: %v\", path, err)\n\t}\n\n\tt := template.New(name)\n\tt, err = t.Parse(string(b))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"template.Parse() failed: %v\", err)\n\t}\n\n\treturn t, nil\n}", "title": "" }, { "docid": "3dde9043b0b0eb7dfa42863f3537e095", "score": "0.55735964", "text": "func LoadFromData(templateData [][]byte) {\n\tinitEmptyTmpls()\n\tfor _, d := range templateData {\n\t\ttmpls = template.Must(tmpls.Parse(string(d)))\n\t}\n}", "title": "" }, { "docid": "ff8e927ecb6785fec4808632d1f304a0", "score": "0.5567961", "text": "func assembleSingleTemplate(w http.ResponseWriter, r *http.Request, templateName, page, parameter string) (int, error) {\n\tlp := filepath.Join(config.TEMPLATE_PATH, templateName)\n\ttmpl, err := template.New(\"mainContent\").ParseFiles(lp)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn 500, err\n\t}\n\tentries := getPageVars(page, r, parameter)\n\ttmpl.Execute(w, entries)\n\treturn 0, nil\n}", "title": "" }, { "docid": "48d2ed21ceed7e6553adef28edabbae8", "score": "0.5562802", "text": "func NewFromTemplate(r io.Reader) (Generator, error) {\n\tvar config rspec.Spec\n\tif err := json.NewDecoder(r).Decode(&config); err != nil {\n\t\treturn Generator{}, err\n\t}\n\n\tenvCache := map[string]int{}\n\tif config.Process != nil {\n\t\tenvCache = createEnvCacheMap(config.Process.Env)\n\t}\n\n\treturn Generator{\n\t\tConfig: &config,\n\t\tenvMap: envCache,\n\t}, nil\n}", "title": "" }, { "docid": "789de8b34c11307c9e25eafcb8d7a203", "score": "0.5562666", "text": "func LoadTmpl(aPath string) (f *ForjfileTmpl, loaded bool, err error) {\n\tvar (\n\t\tyaml_data []byte\n\t)\n\n\tvar forj_path string\n\tforj_path, err = utils.Abs(aPath)\n\tif err != nil {\n\t\treturn\n\t}\n\tif forj_path != \".\" {\n\t\tif fi, e := os.Stat(forj_path); e != nil {\n\t\t\terr = e\n\t\t\treturn\n\t\t} else {\n\t\t\tif !fi.Mode().IsDir() {\n\t\t\t\treturn f, loaded, fmt.Errorf(\"'%s' must be a path to '%s'.\", aPath, forjfileName)\n\t\t\t}\n\t\t}\n\t}\n\n\tfile := path.Join(forj_path, forjfileName)\n\n\tif _, e := os.Stat(file); os.IsNotExist(e) {\n\t\treturn\n\t}\n\n\tif fi, d, e := loadFile(file); e != nil {\n\t\terr = e\n\t\treturn\n\t} else {\n\t\tyaml_data = d\n\t\tfile = fi\n\t}\n\n\tf = new(ForjfileTmpl)\n\n\tf.file_loaded = file\n\tif e := yaml.Unmarshal(yaml_data, &f.yaml); e != nil {\n\t\terr = fmt.Errorf(\"Unable to load %s. %s\", file, e)\n\t\treturn\n\t}\n\n\tf.Workspace = f.yaml.ForjCore.LocalSettings\n\t// Setting internals and some predefined objects\n\tf.yaml.set_defaults()\n\tloaded = true\n\n\t// Setting default values found in Forjfile/forj-settings/default/...\n\tf.yaml.defineDefaults(false) // Do not warn if default are set.\n\n\tgotrace.Trace(\"Forjfile template '%s' has been loaded.\", file)\n\treturn\n}", "title": "" }, { "docid": "61aa6eb53b34418e603025dea03dd5f8", "score": "0.55586773", "text": "func LoadBinTemplates() {\n log.Printf(\"loading base layout\")\n baseBytes, err := layoutsBaseHtmlBytes()\n if err != nil {\n log.Panicf(\"Unable to read base template: err=%s\", err)\n }\n\n baseTemplate.New(\"layouts/base.html\").Parse(string(baseBytes))\n templates = make(map[string]*template.Template)\n\n for _, path := range AssetNames() {\n\tif strings.HasPrefix(\"/layouts/\", path) {\n\t\tcontinue\n\t}\n\tlog.Printf(\"Loading template %s\\n\", path)\n bytes, err := Asset(path)\n if err != nil {\n log.Panicf(\"Unable to read template: path=%s, err=%s\", path, err)\n }\n\ttemplates[path], err = baseTemplate.Clone()\n\ttemplates[path] = template.Must(templates[path].Parse(string(bytes)))\n }\n}", "title": "" }, { "docid": "56ffaa9b027fc4a66b6dc463ed30c3d8", "score": "0.5555225", "text": "func init() {\n\ttpl = template.Must(template.ParseFiles(\"tpl.gohtml\"))\n}", "title": "" }, { "docid": "36bd66adeabd9b0498ea0ad4eec9b6a1", "score": "0.5549689", "text": "func loadTemplates() *template.Template {\n\ttmpl = template.New(\"\").Funcs(template.FuncMap{\n\t\t\"SubmitAndBackTitle\": submitAndBackTitle,\n\t\t\"SubmitAndViewTitle\": submitAndViewTitle,\n\t\t\"SiteTitle\": siteTitle,\n\t\t\"SiteName\": siteName,\n\t\t\"SignUpEnabled\": signUpEnabled,\n\t\t\"SidebarCategories\": sidebarCategories,\n\t\t\"SidebarTags\": sidebarTags,\n\t\t\"SearchDepartments\": searchDepartments,\n\t\t\"Truncate\": truncate,\n\t\t\"GetPriceData\": getPriceData,\n\t\t\"EqIDParentID\": eqIDParentID,\n\t\t\"FormatDateTime\": formatDateTime,\n\t\t\"Now\": now,\n\t\t\"SuperSaverURL\": superSaverURL,\n\t\t\"PrivacyPolicyURL\": privacyPolicyURL,\n\t\t\"AgreementURL\": agreementURL,\n\t\t\"DisclaimerURL\": disclaimerURL,\n\t\t\"WeAreSorryURL\": weAreSorryURL,\n\t\t\"PaymentMethodsURL\": paymentMethodsURL,\n\t\t\"ContactsURL\": contactsURL,\n\t\t\"AboutURL\": aboutURL,\n\t\t\"TotalProducts\": totalProducts,\n\t\t\"NoEscape\": noEscape,\n\t\t\"GenerateColor\": generateColor,\n\t\t\"AccountRoles\": accountRoles,\n\t\t\"PriceRanges\": PriceRanges,\n\t\t\"DiscountRanges\": DiscountRanges,\n\t\t\"NoItemsMessage\": noItemsMessage,\n\t\t\"StringSliceContains\": utility.StringSliceContains,\n\t\t\"NotEmpty\": notEmpty,\n\t\t\"NotEmptyDim\": notEmptyDim,\n\t\t\"ItemDimensions\": itemDimensions,\n\t\t\"PackageDimensions\": packageDimensions,\n\t\t\"ItemWeight\": itemWeight,\n\t\t\"PackageWeight\": packageWeight,\n\t\t\"ManufacturerRecommendedAge\": manufacturerRecommendedAge,\n\t\t\"ItemDate\": itemDate,\n\t\t\"UTCTime\": utcTimeStr,\n\t})\n\n\tfn := func(path string, f os.FileInfo, err error) error {\n\t\tif f.IsDir() != true && strings.HasSuffix(f.Name(), \".gohtml\") {\n\t\t\tvar err error\n\t\t\ttmpl, err = tmpl.ParseFiles(path)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%s: %s\", path, err.Error())\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\n\terr := filepath.Walk(path.Join(config.AppPath, \"views\"), fn)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\treturn tmpl\n}", "title": "" }, { "docid": "a13e00ac70747c606c702dae9cf6a2ae", "score": "0.5545335", "text": "func LoadTemplates(folder string) (*template.Template, error) {\n\tf, err := os.Open(folder)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to open target folder\")\n\t}\n\tinfos, err := f.Readdir(-1)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to read target folder\")\n\t}\n\tvar templates []string\n\tfor _, info := range infos {\n\t\tp := filepath.Join(folder, info.Name())\n\t\tif info.IsDir() {\n\t\t\tlog.Warnf(\"ignore sub folder: %s\", p)\n\t\t\tcontinue\n\t\t}\n\t\ttemplates = append(templates, p)\n\t}\n\tt, err := template.ParseFiles(templates...)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to parse templates\")\n\t}\n\treturn t, nil\n}", "title": "" }, { "docid": "05ce401a8b2cdac873199edaee68a6b7", "score": "0.55230314", "text": "func Template(w http.ResponseWriter, tmpl string, p interface{}) {\n\t// err := templates.ExecuteTemplate(w, \"templates/\"+tmpl+\".html\", p)\n\tt, err := template.ParseFiles(getTmplName(\"base\"), getTmplName(tmpl))\n\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\treturn\n\t}\n\n\terr = t.Execute(w, p)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "ddc88439c859a560bee3700d929a2d21", "score": "0.5514919", "text": "func mustLoadBoxedTemplate(box packr.Box) *template.Template {\n\tt := template.New(\"\").Funcs(template.FuncMap{\"N\": N})\n\terr := box.Walk(func(path string, f packr.File) error {\n\t\tif path == \"\" {\n\t\t\treturn nil\n\t\t}\n\t\tvar err error\n\t\tvar size int64\n\t\tif info, err := f.FileInfo(); err != nil {\n\t\t\treturn err\n\t\t} else {\n\t\t\tsize = info.Size()\n\t\t}\n\n\t\t// Normalize template name\n\t\tnormalizedPath := path\n\t\tif strings.HasPrefix(path, \"\\\\\") || strings.HasPrefix(path, \"/\") {\n\t\t\t// don't want template name to start with / ie. /index.tmpl\n\t\t\tnormalizedPath = normalizedPath[1:]\n\t\t}\n\n\t\tvar h = make([]byte, 0, size)\n\n\t\tif h, err = box.Find(path); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif _, err = t.New(normalizedPath).Parse(string(h)); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tpanic(\"error loading template\")\n\t}\n\treturn t\n}", "title": "" }, { "docid": "f80ba101db57d6118d9046a35665ec57", "score": "0.55101156", "text": "func (temp Template) LoadManifest() Template {\n\tprogress := util.Spin(\"Fetching template manifest\")\n\n\tbytes, err := ioutil.ReadFile(temp.CachedPath())\n\tcmdutil.CheckCommandError(err, \"loading manifest\")\n\n\terr = yaml.Unmarshal(bytes, &temp.Manifest)\n\tcmdutil.CheckCommandError(err, \"converting manifest\")\n\n\ttemp.Manifest.Prompt.Name = temp.Manifest.Name\n\n\tprogress.Done()\n\n\treturn temp\n}", "title": "" }, { "docid": "39edb3bc190bc0dd6b3829503712c3bd", "score": "0.5507876", "text": "func addTemplates(templates *template.Template) {\n\t// Load specified file.\n\tloadFile := func(fname string) string {\n\t\tdata, err := embeddedFiles.ReadFile(fname)\n\t\tif err != nil {\n\t\t\tfmt.Fprintf(os.Stderr, \"internal/driver: embedded file %q not found\\n\",\n\t\t\t\tfname)\n\t\t\tos.Exit(1)\n\t\t}\n\t\treturn string(data)\n\t}\n\tloadCSS := func(fname string) string {\n\t\treturn `<style type=\"text/css\">` + \"\\n\" + loadFile(fname) + `</style>` + \"\\n\"\n\t}\n\tloadJS := func(fname string) string {\n\t\treturn `<script>` + \"\\n\" + loadFile(fname) + `</script>` + \"\\n\"\n\t}\n\n\t// Define a named template with specified contents.\n\tdef := func(name, contents string) {\n\t\tsub := template.New(name)\n\t\ttemplate.Must(sub.Parse(contents))\n\t\ttemplate.Must(templates.AddParseTree(name, sub.Tree))\n\t}\n\n\t// Pre-packaged third-party files.\n\tdef(\"d3flamegraphscript\", d3flamegraph.JSSource)\n\tdef(\"d3flamegraphcss\", d3flamegraph.CSSSource)\n\n\t// Embeded files.\n\tdef(\"css\", loadCSS(\"html/common.css\"))\n\tdef(\"header\", loadFile(\"html/header.html\"))\n\tdef(\"graph\", loadFile(\"html/graph.html\"))\n\tdef(\"script\", loadJS(\"html/common.js\"))\n\tdef(\"top\", loadFile(\"html/top.html\"))\n\tdef(\"sourcelisting\", loadFile(\"html/source.html\"))\n\tdef(\"plaintext\", loadFile(\"html/plaintext.html\"))\n\tdef(\"flamegraph\", loadFile(\"html/flamegraph.html\"))\n\tdef(\"stacks\", loadFile(\"html/stacks.html\"))\n\tdef(\"stacks_css\", loadCSS(\"html/stacks.css\"))\n\tdef(\"stacks_js\", loadJS(\"html/stacks.js\"))\n}", "title": "" }, { "docid": "0b9730735ab27be54fe76c102984d37c", "score": "0.55012363", "text": "func NewTemplate(root string) *Template {\n\treturn &Template{\n\t\tLayoutDir: filepath.Join(root, \"layout\"),\n\t\tPartDir: filepath.Join(root, \"part\"),\n\t\tPageDir: filepath.Join(root, \"page\"),\n\t}\n}", "title": "" }, { "docid": "108f51d08ed0a2e6bd593d0f32462bef", "score": "0.54970723", "text": "func LoadTemplates(path string, root ...string) {\n\t// Add trailing \"/\" to path\n\tif path[len(path)-1:] != \"/\" {\n\t\tpath += \"/\"\n\t}\n\t// Initialize root path\n\tif len(root) == 0 {\n\t\troot = append(root, path)\n\t}\n\t// List directory files\n\tfiles, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfor _, file := range files {\n\t\tok := true\n\t\tfor _, ignored := range ignoredFiles {\n\t\t\tif ignored == file.Name() {\n\t\t\t\tok = false\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif ok {\n\t\t\tif file.IsDir() {\n\t\t\t\tLoadTemplates(path+file.Name(), root[0])\n\t\t\t} else {\n\t\t\t\t// Cuts off root path from left side of the string\n\t\t\t\ttname := (path + file.Name())[len(root[0]):]\n\t\t\t\ttemplates[tname] =\n\t\t\t\t\ttemplate.Must(template.ParseFiles(path + file.Name()))\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "030fe50d10e71f80ba40c93c6e1f934d", "score": "0.5494312", "text": "func cloneTemplates(repositoryURL, branch, dir string) error {\n\tif exists, err := dirExists(dir + \"/.git\"); err == nil && !exists {\n\t\treturn clone(repositoryURL, branch, dir)\n\t} else {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn pull(dir)\n}", "title": "" }, { "docid": "2b37bf36c4efbe093177161d37656cf3", "score": "0.5493499", "text": "func ToFileWithTemplate() {\n\n}", "title": "" }, { "docid": "2a9805fad6abc16b46d6f3bde5869bfb", "score": "0.5468174", "text": "func (l *EmbedLoader) LoadTemplates(filename string) (string, error) {\n\tdirectory := filepath.Base(filepath.Dir(filename))\n\tfile := filepath.Base(filename)\n\tfileBytes, err := templateFiles.ReadFile(directory + \"/\" + file)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"error reading and returning contents of embedded file: %v\", err)\n\t}\n\treturn string(fileBytes), nil\n}", "title": "" }, { "docid": "6cfa7120e2f65bfe5d3aca1bb223d349", "score": "0.54598945", "text": "func LoadTemplate(ctx context.Context, namespacedName types.NamespacedName) (*corev1.ConfigMap, error) {\n\tcm := &corev1.ConfigMap{}\n\tif err := kclient.CtlClient().Get(ctx, namespacedName, cm); err != nil {\n\t\treturn nil, err\n\t}\n\treturn cm, nil\n}", "title": "" }, { "docid": "8b22890d72f760a99ad06cc0e03caec1", "score": "0.5454756", "text": "func (tc *Collection) LoadFromEtree(element *etree.Element) {\n\txmlBytes, err := xmlutils.ElementToXMLNoIndent(element)\n\tif err != nil {\n\t\tlog.Panic(\"Unable to convert element to XML\", \"error\", err)\n\t}\n\tvar templateXML TemplateXML\n\tif err = xml.Unmarshal(xmlBytes, &templateXML); err != nil {\n\t\tlog.Panic(\"Unable to unmarshal element\", \"error\", err, \"bytes\", string(xmlBytes))\n\t}\n\tif templateXML.InheritID != \"\" {\n\t\t// Update an existing template.\n\t\t// Put in raw inherited templates for now, as the base template may not exist yet.\n\t\ttc.rawInheritedTemplates = append(tc.rawInheritedTemplates, &templateXML)\n\t\treturn\n\t}\n\t// Create a new template\n\ttc.createNewTemplateFromXML(&templateXML)\n}", "title": "" }, { "docid": "391de16cfbda36db3258e2e6782d721a", "score": "0.54526055", "text": "func init() {\n\t//tmpl = template.Must(template.ParseGlob(\"template/*.tmpl\")\n}", "title": "" }, { "docid": "db09baf3a74cd6e397cd806df9efd2ed", "score": "0.5437677", "text": "func newpage(o *Template, layout string) (*page, error) {\n\tfilename := filepath.Join(o.LayoutDir, layout)\n\tt, err := template.ParseFiles(filename)\n\tif cerr := checkErr(err, filename); cerr != nil {\n\t\treturn nil, errors.WithStack(cerr)\n\t}\n\n\tparts := []string{}\n\twalkparts := func(path string, f os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"parts file walk failed\")\n\t\t}\n\t\tif f.IsDir() {\n\t\t\treturn nil\n\t\t}\n\n\t\tparts = append(parts, path)\n\t\treturn nil\n\t}\n\tif err = filepath.Walk(o.PartDir, walkparts); err != nil {\n\t\treturn nil, errors.WithStack(err)\n\t}\n\n\tt, err = t.ParseFiles(parts...)\n\tif cerr := checkErr(err, o.PartDir+\"...\"); cerr != nil {\n\t\treturn nil, errors.WithStack(cerr)\n\t}\n\n\t// Execution stops immediately with an error.\n\tt.Option(\"missingkey=error\")\n\n\treturn &page{template: t, pagedir: o.PageDir}, nil\n}", "title": "" }, { "docid": "0b16def8659e4685ae3b7558e75d5adc", "score": "0.54326457", "text": "func readTemplate(tplFile string) (io.Reader, error) {\n\tfile, err := os.Open(tplFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer file.Close()\n\n\tbuf := bytes.NewBuffer(nil)\n\tif _, err = io.Copy(buf, file); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn buf, nil\n}", "title": "" }, { "docid": "0b16def8659e4685ae3b7558e75d5adc", "score": "0.54326457", "text": "func readTemplate(tplFile string) (io.Reader, error) {\n\tfile, err := os.Open(tplFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer file.Close()\n\n\tbuf := bytes.NewBuffer(nil)\n\tif _, err = io.Copy(buf, file); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn buf, nil\n}", "title": "" }, { "docid": "b98b098d8489f2be7840084c19ad7c16", "score": "0.5430477", "text": "func init() {\n\ttmpl = template.Must(template.ParseGlob(\"template/*.tmpl\"))\n}", "title": "" }, { "docid": "b84678a6a268a45c0b70b2c8d52430da", "score": "0.5412058", "text": "func init() {\n tpl, _ = template.ParseGlob(\"*.html\")\n}", "title": "" }, { "docid": "01bcfd103632546d3977873b3efb6b45", "score": "0.5404795", "text": "func init() {\n\tpackr.PackJSONBytes(\"./tmpl\", \"model.html\", \"\\\"e3tkZWZpbmUgIm1vZGVsIn19CnBhY2thZ2Uge3sgLlBhY2thZ2VOYW1lIH19CgovKi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLSsKfCBDb2RlIGdlbmVyYXRlZCBieSBtb2RlbGdlbiB8CnwgICAgICAgIERPIE5PVCBFRElULiAgICAgICAgfAorLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tKi8KCi8vIElmIHlvdSB3YW50IHRvIGV4dGVuZCBiZWhhdmlvdXI6Ci8vIFBsZWFzZSBjcmVhdGUgYSBjdXN0b20gZmlsZSBpbiB0aGlzIGRpcmVjdG9yeQovLyBhbmQgY3JlYXRlIHRoZSBtZXRob2RzIHRoZXJlIHRvIGF2b2lkIG92ZXJ3cml0aW5nIHlvdXIgY29kZSB3aXRoIHRoZSBnZW5lcmF0ZWQgb25lLgoKaW1wb3J0ICgKImZtdCIKICAgIHt7IHJhbmdlICRrLCAkdjo9IC5Nb2RlbC5JbXBvcnRzIH19CiAgICAie3ska319IgogICAge3stIGVuZCB9fQopCgovLyB7ey5Nb2RlbC5OYW1lfX0gcmVwcmVzZW50cyBhIHJvdyBpbiB0aGUge3suTW9kZWwuVGFibGVOYW1lfX0gdGFibGUKdHlwZSB7ey5Nb2RlbC5OYW1lfX0gc3RydWN0IHsKICAgIHt7IHJhbmdlICRrLCAkdjo9IC5Nb2RlbC5GaWVsZHMgfX0KICAgICAgICB7eyAkdi5OYW1lIH19IHt7ICR2LlR5cGUgfX0gYGpzb246Int7JHYuQ29sdW1uTmFtZX19ImAKICAgIHt7LSBlbmQgfX0Kb2Zmc2V0IGludApsaW1pdCBpbnQKfQoKLy8gSW5zZXJ0IGEgbmV3IHt7Lk1vZGVsLk5hbWV9fSByb3cgaW4gdGhlIHt7Lk1vZGVsLlRhYmxlTmFtZX19IHRhYmxlCmZ1bmMgKHt7LlJlY2VpdmVyfX0gKnt7Lk1vZGVsLk5hbWV9fSkgSW5zZXJ0KHF1IFF1ZXJ5ZXIpIChsYXN0SW5zZXJ0SUQgaW50NjQsIGVyciBlcnJvcikgewogICAgY29uc3Qgc3RtdCA9ICJJTlNFUlQgSU5UTyB7ey5Nb2RlbC5UYWJsZU5hbWV8YmFja3RpY2t9fSAoe3suTW9kZWwuRmllbGRzIHwgaW5zZXJ0X2ZpZWxkc319KSBWQUxVRVMgKHt7Lk1vZGVsLkZpZWxkcyB8IGluc2VydF92YWx1ZXN9fSkiCiAgICByZXMsIGVyciA6PSBxdS5FeGVjKHN0bXR7eyAuIHwgaW5zZXJ0X2FyZ3MgfX0pCiAgICBpZiBlcnIgIT0gbmlsIHsKICAgICAgICByZXR1cm4gMCwgZXJyCiAgICB9CiAgICByZXR1cm4gcmVzLkxhc3RJbnNlcnRJZCgpCn0KCi8vIFVwZGF0ZSBhbiBleGlzdGluZyB7ey5Nb2RlbC5OYW1lfX0gcm93IGluIHRoZSB7ey5Nb2RlbC5UYWJsZU5hbWV9fSB0YWJsZS4KZnVuYyAoe3suUmVjZWl2ZXJ9fSAqe3suTW9kZWwuTmFtZX19KSBVcGRhdGUocXUgUXVlcnllciwgaWQgaW50NjQpIChpbnQ2NCwgZXJyb3IpIHsKICAgIGNvbnN0IHN0bXQgPSAiVVBEQVRFIHt7Lk1vZGVsLlRhYmxlTmFtZXxiYWNrdGlja319IFNFVCB7eyAuIHwgdXBkYXRlX3ZhbHVlcyB9fSBXSEVSRSBpZCA9ID8iCiAgICByZXN1bHQsIGVyciA6PSBxdS5FeGVjKHN0bXQsIHt7IC4gfCB1cGRhdGVfYXJncyB9fSBpZCkKICAgIGlmIGVyciAhPSBuaWwgewogICAgICAgIHJldHVybiAwLCBlcnIKICAgIH0KICAgIHJldHVybiByZXN1bHQuUm93c0FmZmVjdGVkKCkKfQoKLy8gVXBzZXJ0IGluc2VydHMgYSBuZXcge3suTW9kZWwuTmFtZX19IHJvdyBpbiB0aGUge3suTW9kZWwuVGFibGVOYW1lfX0gdGFibGUKLy8gaWYgdGhlIHVuaXF1ZSBjb25zdHJhaW50cyBhcmUgbm90IGZvdW5kLCBvdGhlcndpc2UgaXQgdXBkYXRlcyBpdC4KZnVuYyAoe3suUmVjZWl2ZXJ9fSAqe3suTW9kZWwuTmFtZX19KSBVcHNlcnQocXUgUXVlcnllcikgKGxhc3RJbnNlcnRJRCBpbnQ2NCwgZXJyIGVycm9yKSB7CiAgICBjb25zdCBzdG10ID0gIklOU0VSVCBJTlRPIHt7Lk1vZGVsLlRhYmxlTmFtZXxiYWNrdGlja319ICh7ey5Nb2RlbC5GaWVsZHMgfCB1cHNlcnRfZmllbGRzfX0pIFZBTFVFUyAoe3suTW9kZWwuRmllbGRzIHwgdXBzZXJ0X3ZhbHVlc319KSBPTiBEVVBMSUNBVEUgS0VZIFVQREFURSB7eyAuIHwgdXBzZXJ0X29uX2R1cGxpY2F0ZSB9fSIKICAgIHJlcywgZXJyIDo9IHF1LkV4ZWMoc3RtdCwge3sgLiB8IHVwc2VydF9hcmdzIH19KQogICAgaWYgZXJyICE9IG5pbCB7CiAgICAgICAgcmV0dXJuIDAsIGVycgogICAgfQogICAgcmV0dXJuIHJlcy5MYXN0SW5zZXJ0SWQoKQp9CgovLyBGaW5kIGFuIGV4aXN0aW5nIHt7Lk1vZGVsLk5hbWV9fSByb3cgaW4gdGhlIHt7Lk1vZGVsLlRhYmxlTmFtZX19IHRhYmxlCmZ1bmMgKHt7LlJlY2VpdmVyfX0gKnt7Lk1vZGVsLk5hbWV9fSkgRmluZChxdSBRdWVyeWVyLCBpZCBpbnQ2NCkgZXJyb3IgewogICAgY29uc3Qgc3RtdCA9ICJTRUxFQ1QgKiBGUk9NIHt7Lk1vZGVsLlRhYmxlTmFtZXxiYWNrdGlja319IFdIRVJFIGlkID0gPyIKICAgIHJvdyA6PSBxdS5RdWVyeVJvdyhzdG10LCBpZCkKICAgIHJldHVybiByb3cuU2Nhbih7eyAuIHwgc2Nhbl9maWVsZHN9fSkKfQoKLy8gTG9hZCBhbGwsIG9yIGEgc3Vic2V0IG9mIHt7Lk1vZGVsLk5hbWV9fSByb3dzIGZyb20gdGhlIHt7Lk1vZGVsLlRhYmxlTmFtZX19IHRhYmxlCmZ1bmMgKHt7LlJlY2VpdmVyfX0gKnt7Lk1vZGVsLk5hbWV9fSkgTG9hZChxdSBRdWVyeWVyKSAoc2V0IFtde3suTW9kZWwuTmFtZX19LCBlcnIgZXJyb3IpIHsKICAgIHN0bXQgOj0gIlNFTEVDVCAqIEZST00ge3suTW9kZWwuVGFibGVOYW1lfGJhY2t0aWNrfX0iCgogICAgaWYge3suUmVjZWl2ZXJ9fS5saW1pdCA9PSAwICYmIHt7LlJlY2VpdmVyfX0ub2Zmc2V0ID4gMCB7CiAgICAgICAgcmV0dXJuIHNldCwgZm10LkVycm9yZigiY2Fubm90IHF1ZXJ5IHdpdGggb2Zmc2V0IGJ1dCBubyBsaW1pdCIpCiAgICB9CgogICAgaWYge3suUmVjZWl2ZXJ9fS5saW1pdCA+IDAgewogICAgICAgIHN0bXQgKz0gZm10LlNwcmludGYoIiBMSU1JVCAlZCIsIHt7LlJlY2VpdmVyfX0ubGltaXQpCiAgICB9CiAgICBpZiB7ey5SZWNlaXZlcn19Lm9mZnNldCA+IDAgewogICAgICAgIHN0bXQgKz0gZm10LlNwcmludGYoIiBPRkZTRVQgJWQiLCB7ey5SZWNlaXZlcn19Lm9mZnNldCkKICAgIH0KICAgIGRlZmVyIGZ1bmMoKSB7CiAgICAgICAge3suUmVjZWl2ZXJ9fS5saW1pdCA9IDAKICAgICAgICB7ey5SZWNlaXZlcn19Lm9mZnNldCA9IDAKICAgIH0oKQogICAgcm93cywgZXJyIDo9IHF1LlF1ZXJ5KHN0bXQpCiAgICBpZiBlcnIgIT0gbmlsIHsKICAgICAgICByZXR1cm4KICAgIH0KICAgIGRlZmVyIHJvd3MuQ2xvc2UoKQogICAgICAgIGZvciByb3dzLk5leHQoKSB7CiAgICAgICAgICAgIHZhciB7ey5SZWNlaXZlcn19IHt7Lk1vZGVsLk5hbWV9fQogICAgICAgICAgICBpZiBlcnIgPSByb3dzLlNjYW4oe3suIHwgc2Nhbl9maWVsZHN9fSk7IGVyciAhPSBuaWwgewogICAgICAgICAgICByZXR1cm4KICAgICAgICB9CiAgICAgICAgc2V0ID0gYXBwZW5kKHNldCwge3suUmVjZWl2ZXJ9fSkKICAgIH0KCiAgICByZXR1cm4KfQoKLy8gRGVsZXRlIGFuIGV4aXN0aW5nIHt7Lk1vZGVsLk5hbWV9fSByb3cgZnJvbSB0aGUge3suTW9kZWwuVGFibGVOYW1lfX0gdGFibGUKZnVuYyAoe3suUmVjZWl2ZXJ9fSAqe3suTW9kZWwuTmFtZX19KSBEZWxldGUocXUgUXVlcnllciwgaWQgaW50NjQpIChyb3dzQWZmZWN0ZWQgaW50NjQsIGVyciBlcnJvcikgewogICAgY29uc3Qgc3RtdCA9ICJERUxFVEUgRlJPTSB7ey5Nb2RlbC5UYWJsZU5hbWV8YmFja3RpY2t9fSBXSEVSRSBpZCA9ID8iCiAgICByZXN1bHQsIGVyciA6PSBxdS5FeGVjKHN0bXQsIGlkKQoJaWYgZXJyICE9IG5pbCB7CgkJcmV0dXJuCgl9CgoJcmV0dXJuIHJlc3VsdC5Sb3dzQWZmZWN0ZWQoKQp9CgovLyBDb3VudCB0aGUgbnVtYmVyIG9mIHJvd3MgZnJvbSB0aGUge3suTW9kZWwuVGFibGVOYW1lfX0gdGFibGUKZnVuYyh7ey5SZWNlaXZlcn19ICp7ey5Nb2RlbC5OYW1lfX0pIENvdW50KHF1IFF1ZXJ5ZXIpIChjb3VudCBpbnQ2NCwgZXJyIGVycm9yKSB7CiAgICBjb25zdCBzdG10ID0gIlNFTEVDVCBDT1VOVCgqKSBGUk9NIHt7Lk1vZGVsLlRhYmxlTmFtZXxiYWNrdGlja319IgogICAgcm93IDo9IHF1LlF1ZXJ5Um93KHN0bXQpCiAgICBpZiBlcnIgPSByb3cuU2NhbigmY291bnQpOyBlcnIgIT0gbmlsIHsKICAgICAgICByZXR1cm4KICAgIH0KICAgIHJldHVybgp9CgovLyBFeGlzdHMgY2hlY2tzIGZvciB0aGUgaXRlbXMgZXhpc3RlbmNlIGluIHRoZSBkYXRhYmFzZSwgYmFzZWQgb24gaXQncyBpZC4KLy8gQW4gZXJyb3Igd2lsbCBvbmx5IGJlIHJldHVybmVkIGlmIGEgU1FMIHJlbGF0ZWQgZmFpbHVyZSBoYXBwZW5zLgovLyBJbiBhbGwgb3RoZXIgY2FzZXMsIGEgYm9vbCBhbmQgbmlsIHdpbGwgcmV0dXJuLgpmdW5jKHt7LlJlY2VpdmVyfX0gKnt7Lk1vZGVsLk5hbWV9fSkgRXhpc3RzKHF1IFF1ZXJ5ZXIsIGlkIGludDY0KSAoZXhpc3RzIGJvb2wsIGVyciBlcnJvcikgewogICAgY29uc3Qgc3RtdCA9ICJTRUxFQ1QgRVhJU1RTKFNFTEVDVCAxIEZST00ge3suTW9kZWwuVGFibGVOYW1lfGJhY2t0aWNrfX0gV0hFUkUgaWQgPSA/IExJTUlUIDEpIEFTIGBleGlzdHNgIgogICAgdmFyIGNvdW50IGludAogICAgcm93IDo9IHF1LlF1ZXJ5Um93KHN0bXQsIGlkKQogICAgaWYgZXJyID0gcm93LlNjYW4oJmNvdW50KTsgZXJyICE9IG5pbCB7CiAgICAgICAgcmV0dXJuCiAgICB9CiAgICByZXR1cm4gY291bnQgPiAwLCBuaWwKfQoKLy8gVGFibGVOYW1lIHJldHVybnMgdGhlIHRhYmxlIG5hbWUKZnVuYyAoe3suUmVjZWl2ZXJ9fSAqe3suTW9kZWwuTmFtZX19KSBUYWJsZU5hbWUoKSBzdHJpbmcgewpyZXR1cm4gInt7Lk1vZGVsLlRhYmxlTmFtZX19Igp9CgovLyBTZXRMaW1pdCBzZXRzIHRoZSBxdWVyeSBsaW1pdApmdW5jICh7ey5SZWNlaXZlcn19ICp7ey5Nb2RlbC5OYW1lfX0pIFNldExpbWl0KGxpbWl0IGludCkgKnt7Lk1vZGVsLk5hbWV9fSB7Cnt7LlJlY2VpdmVyfX0ubGltaXQgPSBsaW1pdApyZXR1cm4ge3suUmVjZWl2ZXJ9fQp9CgovLyBTZXRPZmZzZXQgc2V0cyB0aGUgcXVlcnkgb2Zmc2V0CmZ1bmMgKHt7LlJlY2VpdmVyfX0gKnt7Lk1vZGVsLk5hbWV9fSkgU2V0T2Zmc2V0KG9mZnNldCBpbnQpICp7ey5Nb2RlbC5OYW1lfX0gewp7ey5SZWNlaXZlcn19Lm9mZnNldCA9IG9mZnNldApyZXR1cm4ge3suUmVjZWl2ZXJ9fQp9Cnt7ZW5kfX0K\\\"\")\n\tpackr.PackJSONBytes(\"./tmpl\", \"tmpl.go\", \"\\\"cGFja2FnZSB0bXBsCgppbXBvcnQgKAoJImZtdCIKCSJodG1sL3RlbXBsYXRlIgoJInN0cmluZ3MiCikKCnZhciBGdW5jTWFwID0gdGVtcGxhdGUuRnVuY01hcHsKCSJpbnNlcnRfZmllbGRzIjogICAgICAgR2V0SW5zZXJ0RmllbGRzLAoJImluc2VydF92YWx1ZXMiOiAgICAgICBHZXRJbnNlcnRWYWx1ZXMsCgkiaW5zZXJ0X2FyZ3MiOiAgICAgICAgIEdldEluc2VydEFyZ3MsCgkic2Nhbl9maWVsZHMiOiAgICAgICAgIEdldFNjYW5GaWVsZHMsCgkidXBkYXRlX2FyZ3MiOiAgICAgICAgIEdldFVwZGF0ZUFyZ3MsCgkidXBkYXRlX3ZhbHVlcyI6ICAgICAgIEdldFVwZGF0ZVZhbHVlcywKCSJ1cHNlcnRfZmllbGRzIjogICAgICAgR2V0VXBzZXJ0RmllbGRzLAoJInVwc2VydF92YWx1ZXMiOiAgICAgICBHZXRVcHNlcnRWYWx1ZXMsCgkidXBzZXJ0X29uX2R1cGxpY2F0ZSI6IEdldFVwc2VydE9uRHVwbGljYXRlLAoJInVwc2VydF9hcmdzIjogICAgICAgICBHZXRVcHNlcnRBcmdzLAoJImJhY2t0aWNrIjogICAgICAgICAgICBCYWNrdGljaywKfQoKZnVuYyBCYWNrdGljayhzIHN0cmluZykgc3RyaW5nIHsKCXJldHVybiAiYCIgKyBzICsgImAiCn0KCmZ1bmMgR2V0SW5zZXJ0RmllbGRzKGZpZWxkcyBbXVRtcGxGaWVsZCkgc3RyaW5nIHsKCXZhciBwYXJ0cyBbXXN0cmluZwoJZm9yIF8sIGZsIDo9IHJhbmdlIGZpZWxkcyB7CgkJaWYgZmwuQ29sdW1uTmFtZSA9PSAiaWQiIHsKCQkJY29udGludWUKCQl9CgkJcGFydHMgPSBhcHBlbmQocGFydHMsICJgIitmbC5Db2x1bW5OYW1lKyJgIikKCX0KCXJldHVybiBzdHJpbmdzLkpvaW4ocGFydHMsICIsICIpCn0KCmZ1bmMgR2V0SW5zZXJ0VmFsdWVzKGZpZWxkcyBbXVRtcGxGaWVsZCkgc3RyaW5nIHsKCXZhciBwYXJ0cyBbXXN0cmluZwoJZm9yIF8sIGZsIDo9IHJhbmdlIGZpZWxkcyB7CgkJc3dpdGNoIGZsLkNvbHVtbk5hbWUgewoJCWNhc2UgImlkIjoKCQkJY29udGludWUKCQljYXNlICJjcmVhdGVkX2F0IjoKCQkJcGFydHMgPSBhcHBlbmQocGFydHMsICJOT1coKSIpCgkJCWNvbnRpbnVlCgkJZGVmYXVsdDoKCQkJcGFydHMgPSBhcHBlbmQocGFydHMsICI/IikKCQl9Cgl9CglyZXR1cm4gc3RyaW5ncy5Kb2luKHBhcnRzLCAiLCAiKQp9CgpmdW5jIEdldEluc2VydEFyZ3MobSBTdHJ1Y3RUbXBsRGF0YSkgc3RyaW5nIHsKCXZhciBwYXJ0cyBbXXN0cmluZwoJZm9yIF8sIGZsIDo9IHJhbmdlIG0uTW9kZWwuRmllbGRzIHsKCQlzd2l0Y2ggZmwuTmFtZSB7CgkJY2FzZSAiSUQiLCAiQ3JlYXRlZEF0IjoKCQkJY29udGludWUKCQl9CgkJcGFydHMgPSBhcHBlbmQocGFydHMsIGZtdC5TcHJpbnRmKCIlcy4lcyIsIG0uUmVjZWl2ZXIsIGZsLk5hbWUpKQoJfQoJaWYgbGVuKHBhcnRzKSA+IDAgewoJCXJldHVybiAiLCAiICsgc3RyaW5ncy5Kb2luKHBhcnRzLCAiLCAiKQoJfQoJcmV0dXJuICIiCn0KCmZ1bmMgR2V0U2NhbkZpZWxkcyhtIFN0cnVjdFRtcGxEYXRhKSB0ZW1wbGF0ZS5IVE1MIHsKCXZhciBwYXJ0cyBbXXN0cmluZwoJZm9yIF8sIGZsIDo9IHJhbmdlIG0uTW9kZWwuRmllbGRzIHsKCQlwYXJ0cyA9IGFwcGVuZChwYXJ0cywgZm10LlNwcmludGYoIiYlcy4lcyIsIG0uUmVjZWl2ZXIsIGZsLk5hbWUpKQoJfQoJcmV0dXJuIHRlbXBsYXRlLkhUTUwoc3RyaW5ncy5Kb2luKHBhcnRzLCAiLCAiKSkKfQoKZnVuYyBHZXRVcGRhdGVBcmdzKG0gU3RydWN0VG1wbERhdGEpIHRlbXBsYXRlLkhUTUwgewoJdmFyIHBhcnRzIFtdc3RyaW5nCglmb3IgXywgZmwgOj0gcmFuZ2UgbS5Nb2RlbC5GaWVsZHMgewoJCXN3aXRjaCBmbC5OYW1lIHsKCQljYXNlICJJRCIsICJDcmVhdGVkQXQiLCAiVXBkYXRlZEF0IjoKCQkJY29udGludWUKCQl9CgkJcGFydHMgPSBhcHBlbmQocGFydHMsIGZtdC5TcHJpbnRmKCIlcy4lcyIsIG0uUmVjZWl2ZXIsIGZsLk5hbWUpKQoJfQoJaWYgbGVuKHBhcnRzKSA+IDAgewoJCXJldHVybiB0ZW1wbGF0ZS5IVE1MKHN0cmluZ3MuSm9pbihwYXJ0cywgIiwgIikgKyAiLCAiKQoJfQoJcmV0dXJuICIiCn0KCmZ1bmMgR2V0VXBkYXRlVmFsdWVzKG0gU3RydWN0VG1wbERhdGEpIHN0cmluZyB7Cgl2YXIgcGFydHMgW11zdHJpbmcKCWZvciBfLCBmbCA6PSByYW5nZSBtLk1vZGVsLkZpZWxkcyB7CgkJc3dpdGNoIGZsLk5hbWUgewoJCWNhc2UgIklEIiwgIkNyZWF0ZWRBdCI6CgkJCWNvbnRpbnVlCgkJY2FzZSAiVXBkYXRlZEF0IjoKCQkJcGFydHMgPSBhcHBlbmQocGFydHMsIGZtdC5TcHJpbnRmKCJgJXNgPVVUQ19USU1FU1RBTVAoKSIsIGZsLkNvbHVtbk5hbWUpKQoJCWRlZmF1bHQ6CgkJCXBhcnRzID0gYXBwZW5kKHBhcnRzLCBmbXQuU3ByaW50ZigiYCVzYD0/IiwgZmwuQ29sdW1uTmFtZSkpCgkJfQoJfQoJcmV0dXJuIHN0cmluZ3MuSm9pbihwYXJ0cywgIiwgIikKfQoKZnVuYyBHZXRVcHNlcnRGaWVsZHMoZmllbGRzIFtdVG1wbEZpZWxkKSBzdHJpbmcgewoJdmFyIHBhcnRzIFtdc3RyaW5nCglmb3IgXywgZmwgOj0gcmFuZ2UgZmllbGRzIHsKCQlwYXJ0cyA9IGFwcGVuZChwYXJ0cywgImAiK2ZsLkNvbHVtbk5hbWUrImAiKQoJfQoJcmV0dXJuIHN0cmluZ3MuSm9pbihwYXJ0cywgIiwgIikKfQoKZnVuYyBHZXRVcHNlcnRWYWx1ZXMoZmllbGRzIFtdVG1wbEZpZWxkKSBzdHJpbmcgewoJdmFyIHBhcnRzIFtdc3RyaW5nCglmb3IgXywgZmwgOj0gcmFuZ2UgZmllbGRzIHsKCQlzd2l0Y2ggZmwuQ29sdW1uTmFtZSB7CgkJY2FzZSAiY3JlYXRlZF9hdCI6CgkJCXBhcnRzID0gYXBwZW5kKHBhcnRzLCAiTk9XKCkiKQoJCQljb250aW51ZQoJCWRlZmF1bHQ6CgkJCXBhcnRzID0gYXBwZW5kKHBhcnRzLCAiPyIpCgkJfQoJfQoJcmV0dXJuIHN0cmluZ3MuSm9pbihwYXJ0cywgIiwgIikKfQoKZnVuYyBHZXRVcHNlcnRPbkR1cGxpY2F0ZShtIFN0cnVjdFRtcGxEYXRhKSBzdHJpbmcgewoJdmFyIHBhcnRzIFtdc3RyaW5nCglmb3IgXywgZmwgOj0gcmFuZ2UgbS5Nb2RlbC5GaWVsZHMgewoJCXN3aXRjaCBmbC5OYW1lIHsKCQljYXNlICJDcmVhdGVkQXQiOgoJCQljb250aW51ZQoJCWNhc2UgIklEIjoKCQkJcGFydHMgPSBhcHBlbmQocGFydHMsIGZtdC5TcHJpbnRmKCJgJXNgPUxBU1RfSU5TRVJUX0lEKGAlc2ApIiwgZmwuQ29sdW1uTmFtZSwgZmwuQ29sdW1uTmFtZSkpCgkJY2FzZSAiVXBkYXRlZEF0IjoKCQkJcGFydHMgPSBhcHBlbmQocGFydHMsIGZtdC5TcHJpbnRmKCJgJXNgPVVUQ19USU1FU1RBTVAoKSIsIGZsLkNvbHVtbk5hbWUpKQoJCWRlZmF1bHQ6CgkJCXBhcnRzID0gYXBwZW5kKHBhcnRzLCBmbXQuU3ByaW50ZigiYCVzYD1WQUxVRVMoYCVzYCkiLCBmbC5Db2x1bW5OYW1lLCBmbC5Db2x1bW5OYW1lKSkKCQl9Cgl9CglyZXR1cm4gc3RyaW5ncy5Kb2luKHBhcnRzLCAiLCAiKQp9CgpmdW5jIEdldFVwc2VydEFyZ3MobSBTdHJ1Y3RUbXBsRGF0YSkgc3RyaW5nIHsKCXZhciBwYXJ0cyBbXXN0cmluZwoJZm9yIF8sIGZsIDo9IHJhbmdlIG0uTW9kZWwuRmllbGRzIHsKCQlzd2l0Y2ggZmwuTmFtZSB7CgkJY2FzZSAiQ3JlYXRlZEF0IjoKCQkJY29udGludWUKCQl9CgkJcGFydHMgPSBhcHBlbmQocGFydHMsIGZtdC5TcHJpbnRmKCIlcy4lcyIsIG0uUmVjZWl2ZXIsIGZsLk5hbWUpKQoJfQoJcmV0dXJuIHN0cmluZ3MuSm9pbihwYXJ0cywgIiwgIikKfQo=\\\"\")\n\tpackr.PackJSONBytes(\"./tmpl\", \"types.go\", \"\\\"cGFja2FnZSB0bXBsCgovLyBUbXBsU3RydWN0cyBpcyBhIGNvbGxlY3Rpb24gb24gVG1wbFN0cnVjdAp0eXBlIFRtcGxTdHJ1Y3RzIFtdVG1wbFN0cnVjdAoKLy8gVG1wbFN0cnVjdCBkZWZpbmVzIHRoZSB0YWJsZSBkYXRhIHRvIHBhc3MgdG8gdGhlIG1vZGVscwp0eXBlIFRtcGxTdHJ1Y3Qgc3RydWN0IHsKCU5hbWUgICAgICBzdHJpbmcKCVRhYmxlTmFtZSBzdHJpbmcKCUZpZWxkcyAgICBbXVRtcGxGaWVsZAoJSW1wb3J0cyAgIG1hcFtzdHJpbmddc3RydWN0e30KfQoKLy8gVG1wbEZpZWxkIGRlZmluZXMgYSB0YWJsZSBmaWVsZCB0ZW1wbGF0ZQp0eXBlIFRtcGxGaWVsZCBzdHJ1Y3QgewoJTmFtZSAgICAgICBzdHJpbmcKCVR5cGUgICAgICAgc3RyaW5nCglDb2x1bW5OYW1lIHN0cmluZwoJTnVsbGFibGUgICBib29sCn0KCi8vIFN0cnVjdFRtcGxEYXRhIGRlZmluZXMgdGhlIHRvcCBsZXZlbCBzdHJ1Y3QgZGF0YSB0byBwYXNzIHRvIHRoZSBtb2RlbHMKdHlwZSBTdHJ1Y3RUbXBsRGF0YSBzdHJ1Y3QgewoJTW9kZWwgICAgICAgVG1wbFN0cnVjdAoJUmVjZWl2ZXIgICAgc3RyaW5nCglQYWNrYWdlTmFtZSBzdHJpbmcKfQo=\\\"\")\n\tpackr.PackJSONBytes(\"./tmpl\", \"x_helpers.html\", \"\\\"{{define "helpers"}}

package {{ .PackageName }}

/*---------------------------+
| Code generated by modelgen |
|        DO NOT EDIT.        |
+---------------------------*/

import (
	"bytes"
	"context"
	"database/sql"
	"database/sql/driver"
	"encoding/json"
	"fmt"
	"log"
	"reflect"
	"strings"
	"time"

	"github.com/go-sql-driver/mysql"
)

// StdTime provides default SQL TIME format
const StdTime = "15:04:05"

// emptyTime allows default times to be considered
// null for insertion into the database.
var emptyTime = time.Time{}

// nullLiteral is helpful for checking
// for nulls, as they won't cause errors,
// yet we need the content of the file to change anyway
var nullLiteral = []byte("null")

/********
* Types *
********/

// Queryer allows sql.DB and sql.Tx to be used interchangeably, allowing you
// to use any of the model methods inside transactions or standalone calls.
type Queryer interface {
	Query(query string, args ...interface{}) (*sql.Rows, error)
	QueryRow(query string, args ...interface{}) *sql.Row
	Exec(query string, args ...interface{}) (sql.Result, error)
}

/*-------------+
| Type aliases |
+-------------*/

// NullFloat64 aliases sql.NullFloat64
type NullFloat64 sql.NullFloat64

// NullString aliases sql.NullString
type NullString sql.NullString

// NullBool aliases sql.NullBool
type NullBool sql.NullBool

// NullInt64 aliases sql.NullInt64
type NullInt64 sql.NullInt64

// NullTime aliases sql.NullTime
type NullTime mysql.NullTime

// RawJSON aliases json.RawMessage
type RawJSON json.RawMessage

/*---------------------------+
| NullString implementations |
+---------------------------*/

// MarshalJSON for NullString
func (n NullString) MarshalJSON() ([]byte, error) {
	var a *string
	if n.Valid {
		a = &n.String
	}
	return json.Marshal(a)
}

// UnmarshalJSON for NullString
func (n *NullString) UnmarshalJSON(b []byte) error {
	if bytes.EqualFold(b, nullLiteral) {
		n.Valid = false
		return nil
	}
	err := json.Unmarshal(b, &n.String)
	n.Valid = err == nil
	return err
}

// Value for NullString
func (n NullString) Value() (driver.Value, error) {
	if !n.Valid {
		return nil, nil
	}
	return n.String, nil
}

// Scan for NullString
func (n *NullString) Scan(src interface{}) error {
	var a sql.NullString
	if err := a.Scan(src); err != nil {
		return err
	}
	n.String = a.String
	if reflect.TypeOf(src) != nil {
		n.Valid = true
	}
	return nil
}

/*----------------------------+
| NullFloat64 implementations |
+----------------------------*/

// MarshalJSON for NullFloat64
func (n NullFloat64) MarshalJSON() ([]byte, error) {
	var a *float64
	if n.Valid {
		a = &n.Float64
	}
	return json.Marshal(a)
}

// Value for NullFloat64
func (n NullFloat64) Value() (driver.Value, error) {
	if !n.Valid {
		return nil, nil
	}
	return n.Float64, nil
}

// UnmarshalJSON for NullFloat64
func (n *NullFloat64) UnmarshalJSON(b []byte) error {
	if bytes.EqualFold(b, nullLiteral) {
		n.Valid = false
		return nil
	}
	err := json.Unmarshal(b, &n.Float64)
	n.Valid = err == nil
	return err
}

// Scan for NullFloat64
func (n *NullFloat64) Scan(src interface{}) error {
	var a sql.NullFloat64
	if err := a.Scan(src); err != nil {
		return err
	}
	n.Float64 = a.Float64
	if reflect.TypeOf(src) != nil {
		n.Valid = true
	}
	return nil
}

/*--------------------------+
| NullInt64 implementations |
+--------------------------*/

// MarshalJSON for NullInt64
func (n NullInt64) MarshalJSON() ([]byte, error) {
	var a *int64
	if n.Valid {
		a = &n.Int64
	}
	return json.Marshal(a)
}

// Value for NullInt64
func (n NullInt64) Value() (driver.Value, error) {
	if !n.Valid {
		return nil, nil
	}
	return n.Int64, nil
}

// UnmarshalJSON for NullInt64
func (n *NullInt64) UnmarshalJSON(b []byte) error {
	if bytes.EqualFold(b, nullLiteral) {
		n.Valid = false
		return nil
	}
	err := json.Unmarshal(b, &n.Int64)
	n.Valid = err == nil
	return err
}

// Scan for NullInt64
func (n *NullInt64) Scan(src interface{}) error {
	// Set initial state for subsequent scans.
	n.Valid = false

	var a sql.NullInt64
	if err := a.Scan(src); err != nil {
		return err
	}
	n.Int64 = a.Int64
	if reflect.TypeOf(src) != nil {
		n.Valid = true
	}
	return nil
}

/*-------------------------+
| NullBool implementations |
+-------------------------*/

// MarshalJSON for NullBool
func (n NullBool) MarshalJSON() ([]byte, error) {
	var a *bool
	if n.Valid {
		a = &n.Bool
	}
	return json.Marshal(a)
}

// Value for NullBool
func (n NullBool) Value() (driver.Value, error) {
	if !n.Valid {
		return nil, nil
	}
	return n.Bool, nil
}

// UnmarshalJSON for NullBool
func (n *NullBool) UnmarshalJSON(b []byte) error {
	var field *bool
	err := json.Unmarshal(b, &field)
	if field != nil {
		n.Valid = true
		n.Bool = *field
	}
	return err
}

// Scan for NullBool
func (n *NullBool) Scan(src interface{}) error {
	var a sql.NullBool
	if err := a.Scan(src); err != nil {
		return err
	}
	n.Bool = a.Bool
	if reflect.TypeOf(src) != nil {
		n.Valid = true
	}
	return nil
}

/*-------------------------+
| NullTime implementations |
+-------------------------*/

// MarshalJSON for NullTime
func (n NullTime) MarshalJSON() ([]byte, error) {
	var a *time.Time
	if n.Valid {
		a = &n.Time
	}
	return json.Marshal(a)
}

// Value for NullTime
func (n NullTime) Value() (driver.Value, error) {
	if !n.Valid {
		return nil, nil
	}
	return n.Time, nil
}

// UnmarshalJSON for NullTime
func (n *NullTime) UnmarshalJSON(b []byte) error {
    s := string(b)
    s = strings.Trim(s, `"`)

    var (
        zeroTime time.Time
        tim      time.Time
        err      error
    )

    if strings.EqualFold(s, "null") {
        return nil
    }

    if tim, err = time.Parse(time.RFC3339, s); err != nil {
        n.Valid = false
        return err
    }

    if tim == zeroTime {
        return nil
    }

    n.Time = tim
    n.Valid = true
    return nil
}

// Scan for NullTime
func (n *NullTime) Scan(src interface{}) error {
	// Set initial state for subsequent scans.
	n.Valid = false

	var a mysql.NullTime
	if err := a.Scan(src); err != nil {
		return err
	}
	n.Time = a.Time
	if reflect.TypeOf(src) != nil {
		n.Valid = true
	}
	return nil
}

/*------------------------+
| RawJSON implementations |
+------------------------*/

// MarshalJSON for NullString
func (n RawJSON) MarshalJSON() ([]byte, error) {
	if len(n) == 0 {
		return []byte("null"), nil
	}
	a := json.RawMessage(n)
	return a.MarshalJSON()
}

// Value for NullString
func (n RawJSON) Value() (driver.Value, error) {
	return string(n), nil
}

// UnmarshalJSON for NullString
func (n *RawJSON) UnmarshalJSON(b []byte) error {
	var a json.RawMessage
	if err := json.Unmarshal(b, &a); err != nil {
		return err
	}
	c := RawJSON(a)
	*n = c
	return nil
}

// Scan for NullString
func (n *RawJSON) Scan(src interface{}) error {
	var a sql.NullString
	if err := a.Scan(src); err != nil {
		return err
	}
	jsn := RawJSON([]byte(a.String))
	*n = jsn
	return nil
}

/*-----------------+
| Helper functions |
+-----------------*/

// ToNullString returns a new NullString
func ToNullString(s *string) NullString {
	if s == nil {
		return NullString(sql.NullString{Valid: false})
	}
	return NullString(sql.NullString{String: *s, Valid: true})
}

// ToNullInt64 returns a new NullInt64
func ToNullInt64(i *int64) NullInt64 {
	if i == nil {
		return NullInt64(sql.NullInt64{Valid: false})
	}
	return NullInt64(sql.NullInt64{Int64: *i, Valid: true})
}

// ToNullFloat64 returns a new NullFloat64
func ToNullFloat64(i *float64) NullFloat64 {
	if i == nil {
		return NullFloat64(sql.NullFloat64{Valid: false})
	}
	return NullFloat64(sql.NullFloat64{Float64: *i, Valid: true})
}

// ToNullBool creates a new NullBool
func ToNullBool(b *bool) NullBool {
	if b == nil {
		return NullBool(sql.NullBool{Valid: false})
	}
	return NullBool(sql.NullBool{Bool: *b, Valid: true})
}

// ToNullTime creates a new NullTime
func ToNullTime(t time.Time) NullTime {
	if t == emptyTime {
		return NullTime(mysql.NullTime{Valid: false})
	}
	return NullTime(mysql.NullTime{Time: t, Valid: true})
}

// TxOptions defines an option type for configuring
// transations. This may only be used with the ExecuteTransaction wrapper.
type TxOptions struct {
	Timeout   time.Duration
	Isolation sql.IsolationLevel
	ReadOnly  bool
}

// ExecuteTransaction closes over a transaction and automatically commits
// or rollbacks depending on whether errors were encountered.
// In the case where nil is passed for opt (*TxOption), the following defaults are used:
//  &TxOptions{
//  	Timeout:   5 * time.Second,
//  	Isolation: sql.LevelSerializable,
//  	ReadOnly:  false,
//  }
func ExecuteTransaction(db *sql.DB, opt *TxOptions, actions func(*sql.Tx) error) (err error) {
	// Provide safe defaults in case none were given.
	if opt == nil {
		opt = &TxOptions{
			Timeout:   5 * time.Second,
			Isolation: sql.LevelSerializable,
			ReadOnly:  false,
		}
	}

	// Build the context with the provided timeout.
	// This will be used to define the total time the transaction may take,
	// past this time, it will be cancelled, rollback, then throw an error.
	ctx, cancel := context.WithTimeout(context.Background(), opt.Timeout)
	defer cancel()

	var tx *sql.Tx
	if tx, err = db.BeginTx(ctx, &sql.TxOptions{
		Isolation: opt.Isolation,
		ReadOnly:  opt.ReadOnly,
	}); err != nil {
		return err
	}

	defer func() {
		if r := recover(); r != nil {
			// Only need to log here because panic won't report whether
			// the rollback was successful or not.
			if txerr := tx.Rollback(); txerr != nil {
				log.Println("db rollback error:", txerr)
			}

			log.Printf("rolled back transaction")
			panic(r)
		} else if err != nil {
			// If we run into issues rolling back, keep track of the error that
			// caused the issue and provide some context on the rollback failure.
			if rerr := tx.Rollback(); rerr != nil {
				err = fmt.Errorf("db error: %v rollback error: %v", err, rerr)
			}
		} else {
			if cerr := tx.Commit(); cerr != nil {
				err = fmt.Errorf("commit error: %v", cerr)
			}
		}
	}()

	err = actions(tx)
	return err
}
{{end}}
\\\"\")\n\tpackr.PackJSONBytes(\"./tmpl\", \"x_helpers_test.html\", \"\\\"{{define "helperstest"}}
//+build !helpers

package {{ .PackageName }}

/*---------------------------+
| Code generated by modelgen |
|        DO NOT EDIT.        |
+---------------------------*/

import (
	"database/sql/driver"
	"encoding/json"
	"reflect"
	"testing"
	"time"
)

func TestStructEmbedding(t *testing.T) {
	tim := time.Date(2017, 1, 1, 0, 0, 0, 0, time.UTC)
	expected := []byte(`{"a":123,"b":true,"c":123.123,"d":"string","e":"2017-01-01T00:00:00Z","f":[1,2,3]}`)
	type embed struct {
		A NullInt64   `json:"a,omitempty"`
		B NullBool    `json:"b,omitempty"`
		C NullFloat64 `json:"c,omitempty"`
		D NullString  `json:"d,omitempty"`
		E NullTime    `json:"e,omitempty"`
		F RawJSON     `json:"f,omitempty"`
	}
	em := embed{
		A: NullInt64{Valid: true, Int64: 123},
		B: NullBool{Valid: true, Bool: true},
		C: NullFloat64{Valid: true, Float64: 123.123},
		D: NullString{Valid: true, String: "string"},
		E: NullTime{Valid: true, Time: tim},
		F: RawJSON(`[1,2,3]`),
	}
	b, err := json.Marshal(em)
	if err != nil {
		t.Fatal(err)
	}
	if !reflect.DeepEqual(expected, b) {
		t.Fatal("not the same JSON!")
	}
	if !(string(b) == string(expected)) {
		t.Fatal("not the same!")
	}

	var em2 embed
	if err := json.Unmarshal(expected, &em2); err != nil {
		t.Fatal(err)
	}
	if !reflect.DeepEqual(em2, em) {
		t.Fatal("not correct")
	}
}

func TestNullString_UnmarshalJSON(t *testing.T) {
	tests := []struct {
		name    string
		n       NullString
		source  []byte
		wantErr bool
	}{
		{
			name:    "explicit null",
			source:  []byte(`null`),
			wantErr: false,
		},
		{
			name:    "string null",
			source:  []byte(`"null"`),
			wantErr: false, // this one SHOULD be valid
		},
		{
			name:    "valid",
			source:  []byte(`"hello"`),
			wantErr: false,
		},
		{
			name:    "invalid",
			source:  []byte(`{"key":"value"}`),
			wantErr: true,
		},
		{
			name:    "empty",
			source:  []byte{},
			wantErr: true,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.UnmarshalJSON(tt.source); (err != nil) != tt.wantErr {
				t.Errorf("NullString.UnmarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
			}
		})
	}
}

func TestNullString_Value(t *testing.T) {
	tests := []struct {
		name    string
		n       NullString
		want    driver.Value
		wantErr bool
	}{
		{
			name: "valid",
			n: NullString{
				Valid:  true,
				String: "hello",
			},
			want:    driver.Value("hello"),
			wantErr: false,
		},
		{
			name: "invalid",
			n: NullString{
				Valid: false,
			},
			want:    nil,
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.Value()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullString.Value() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullString.Value() = %v, want %v", got, tt.want)
			}
		})
	}
}

func TestNullString_Scan(t *testing.T) {
	tests := []struct {
		name    string
		n       *NullString
		wantErr bool
		src     interface{}
	}{
		{
			name: "valid",
			n: &NullString{
				String: "hello",
				Valid:  true,
			},
			src:     "",
			wantErr: false,
		},
		{
			name: "nil value",
			n: &NullString{
				String: "hello",
				Valid:  false,
			},
			src:     nil,
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.Scan(tt.src); (err != nil) != tt.wantErr {
				t.Errorf("NullString.Scan() error = %v, wantErr %v", err, tt.wantErr)
			}
			if !tt.n.Valid && tt.src != nil {
				t.Errorf("should return null")
			}
			if tt.n.Valid && tt.src != tt.n.String {
				t.Errorf("invalid value")
			}
		})
	}
}

func TestNullString_MarshalJSON(t *testing.T) {
	tests := []struct {
		name    string
		n       *NullString
		want    []byte
		wantErr bool
	}{
		{
			name: "valid",
			n: &NullString{
				String: "hello",
				Valid:  true,
			},
			want:    []byte(`"hello"`),
			wantErr: false,
		},
		{
			name: "valid null",
			n: &NullString{
				String: "",
				Valid:  false,
			},
			want:    []byte(`null`),
			wantErr: false,
		},
		{
			name: "invalid",
			n: &NullString{
				Valid: true,
			},
			want:    []byte(`""`),
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.MarshalJSON()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullString.MarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullString.MarshalJSON() = %v, want %v", got, tt.want)
			}
		})
	}
}

func TestNullBool_UnmarshalJSON(t *testing.T) {
	tests := []struct {
		name         string
		n            NullBool
		source       []byte
		wantErr      bool
		wantValidity bool
	}{
		{
			name:         "explicit null",
			source:       []byte(`null`),
			wantErr:      false,
			wantValidity: false,
		},
		{
			name:         "valid",
			source:       []byte(`false`),
			wantErr:      false,
			wantValidity: true,
		},
		{
			name:         "invalid",
			source:       []byte(`{"key":"value"}`),
			wantErr:      true,
			wantValidity: false,
		},
		{
			name:         "empty",
			source:       []byte{},
			wantErr:      true,
			wantValidity: false,
		},
		{
			name:         "explicit null",
			source:       []byte("null"),
			wantErr:      false,
			wantValidity: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.UnmarshalJSON(tt.source); (err != nil) != tt.wantErr && tt.n.Valid == tt.wantValidity {
				t.Errorf("NullBool.UnmarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
			}
		})
	}
}

func TestNullBool_Value(t *testing.T) {
	tests := []struct {
		name    string
		n       NullBool
		want    driver.Value
		wantErr bool
	}{
		{
			name: "valid",
			n: NullBool{
				Valid: true,
				Bool:  true,
			},
			want:    driver.Value(true),
			wantErr: false,
		},
		{
			name: "invalid",
			n: NullBool{
				Valid: false,
			},
			want:    nil,
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.Value()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullBool.Value() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullBool.Value() = %v, want %v", got, tt.want)
			}
		})
	}
}

func TestNullBool_Scan(t *testing.T) {
	tests := []struct {
		name    string
		n       *NullBool
		wantErr bool
		src     interface{}
	}{
		{
			name: "valid",
			n: &NullBool{
				Bool:  true,
				Valid: true,
			},
			src:     true,
			wantErr: false,
		},
		{
			name: "nil value",
			n: &NullBool{
				Bool:  true,
				Valid: false,
			},
			src:     false,
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.Scan(tt.src); (err != nil) != tt.wantErr {
				t.Errorf("NullBool.Scan() error = %v, wantErr %v", err, tt.wantErr)
			}
			if !tt.n.Valid && tt.src != nil {
				t.Errorf("should return null")
			}
			if tt.n.Valid && tt.src != tt.n.Bool {
				t.Errorf("invalid value")
			}
		})
	}
}

func TestNullBool_MarshalJSON(t *testing.T) {
	tests := []struct {
		name    string
		n       *NullBool
		want    []byte
		wantErr bool
	}{
		{
			name: "valid",
			n: &NullBool{
				Valid: true,
			},
			want:    []byte(`false`),
			wantErr: false,
		},
		{
			name: "valid null",
			n: &NullBool{
				Valid: false,
			},
			want:    []byte(`null`),
			wantErr: false,
		},
		{
			name: "invalid",
			n: &NullBool{
				Valid: true,
			},
			want:    []byte(`false`),
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.MarshalJSON()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullBool.MarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullBool.MarshalJSON() = %v, want %v", got, tt.want)
			}
		})
	}
}

func TestNullTime_UnmarshalJSON(t *testing.T) {
	tests := []struct {
		name    string
		n       NullTime
		source  []byte
		wantErr bool
	}{
		{
			name:    "valid",
			source:  []byte(`"2017-11-24T00:00:00Z"`),
			wantErr: false,
		},
		{
			name:    "invalid",
			source:  []byte(`{"key":"value"}`),
			wantErr: true,
		},
		{
			name:    "empty",
			source:  []byte{},
			wantErr: true,
		},
		{
			name:    "explicit null",
			source:  []byte(`null`),
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.UnmarshalJSON(tt.source); (err != nil) != tt.wantErr {
				t.Errorf("NullBool.UnmarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
			}
		})
	}
}

func TestNullTime_Value(t *testing.T) {
	tim := time.Now()
	tests := []struct {
		name    string
		n       NullTime
		want    driver.Value
		wantErr bool
	}{
		{
			name: "valid",
			n: NullTime{
				Valid: true,
				Time:  tim,
			},
			want:    driver.Value(tim),
			wantErr: false,
		},
		{
			name: "invalid",
			n: NullTime{
				Valid: false,
			},
			want:    nil,
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.Value()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullTime.Value() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullTime.Value() = %v, want %v", got, tt.want)
			}
		})
	}
}

func TestNullTime_Scan(t *testing.T) {
	tim := time.Now()
	tests := []struct {
		name    string
		n       *NullTime
		wantErr bool
		src     interface{}
	}{
		{
			name: "valid",
			n: &NullTime{
				Time:  tim,
				Valid: true,
			},
			src:     tim,
			wantErr: false,
		},
		{
			name: "nil value",
			n: &NullTime{
				Time:  tim,
				Valid: false,
			},
			src:     time.Now(),
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.Scan(tt.src); (err != nil) != tt.wantErr {
				t.Errorf("NullTime.Scan() error = %v, wantErr %v", err, tt.wantErr)
			}
			if !tt.n.Valid && tt.src != nil {
				t.Errorf("should return null")
			}
			if tt.n.Valid && tt.src != tt.n.Time {
				t.Errorf("invalid value")
			}
		})
	}
}

func TestNullTime_MarshalJSON(t *testing.T) {
	tests := []struct {
		name    string
		n       *NullTime
		want    []byte
		wantErr bool
	}{
		{
			name: "valid",
			n: &NullTime{
				Time:  time.Date(2017, 11, 24, 0, 0, 0, 0, time.UTC),
				Valid: true,
			},
			want:    []byte(`"2017-11-24T00:00:00Z"`),
			wantErr: false,
		},
		{
			name: "valid null",
			n: &NullTime{
				Valid: false,
			},
			want:    []byte(`null`),
			wantErr: false,
		},
		{
			name: "invalid",
			n: &NullTime{
				Valid: true,
			},
			want:    []byte(`"0001-01-01T00:00:00Z"`),
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.MarshalJSON()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullTime.MarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullTime.MarshalJSON() = %v, want %v", got, tt.want)
			}
		})
	}
}

func TestNullInt64_UnmarshalJSON(t *testing.T) {
	tests := []struct {
		name    string
		n       NullInt64
		source  []byte
		wantErr bool
	}{
		{
			name:    "valid",
			source:  []byte(`123`),
			wantErr: false,
		},
		{
			name:    "invalid",
			source:  []byte(`{"key":"value"}`),
			wantErr: true,
		},
		{
			name:    "empty",
			source:  []byte{},
			wantErr: true,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.UnmarshalJSON(tt.source); (err != nil) != tt.wantErr {
				t.Errorf("NullInt64.UnmarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
			}
		})
	}
}

func TestNullInt64_Value(t *testing.T) {
	tests := []struct {
		name    string
		n       NullInt64
		want    driver.Value
		wantErr bool
	}{
		{
			name: "valid",
			n: NullInt64{
				Valid: true,
				Int64: 123,
			},
			want:    driver.Value(int64(123)),
			wantErr: false,
		},
		{
			name: "invalid",
			n: NullInt64{
				Valid: false,
			},
			want:    nil,
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.Value()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullInt64.Value() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullInt64.Value() = %v, want %v", got, tt.want)
			}
		})
	}
}

func TestNullInt64_Scan(t *testing.T) {
	tests := []struct {
		name    string
		n       *NullInt64
		wantErr bool
		src     interface{}
	}{
		{
			name: "valid",
			n: &NullInt64{
				Int64: 123,
				Valid: true,
			},
			src:     int64(123),
			wantErr: false,
		},
		{
			name: "nil value",
			n: &NullInt64{
				Valid: false,
			},
			src:     int64(123),
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.Scan(tt.src); (err != nil) != tt.wantErr {
				t.Errorf("NullInt64.Scan() error = %v, wantErr %v", err, tt.wantErr)
			}
			if !tt.n.Valid && tt.src != nil {
				t.Errorf("should return null")
			}
			if tt.n.Valid && tt.src != tt.n.Int64 {
				t.Errorf("invalid value")
			}
		})
	}
}

func TestNullInt64_MarshalJSON(t *testing.T) {
	tests := []struct {
		name    string
		n       *NullInt64
		want    []byte
		wantErr bool
	}{
		{
			name: "valid",
			n: &NullInt64{
				Int64: 123,
				Valid: true,
			},
			want:    []byte(`123`),
			wantErr: false,
		},
		{
			name: "valid null",
			n: &NullInt64{
				Valid: false,
			},
			want:    []byte(`null`),
			wantErr: false,
		},
		{
			name: "invalid",
			n: &NullInt64{
				Valid: true,
			},
			want:    []byte(`0`),
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.MarshalJSON()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullInt64.MarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullInt64.MarshalJSON() = %v, want %v", got, tt.want)
			}
		})
	}
}
func TestNullFloat64_UnmarshalJSON(t *testing.T) {
	tests := []struct {
		name    string
		n       NullFloat64
		source  []byte
		wantErr bool
	}{
		{
			name:    "explicit null",
			source:  []byte(`null`),
			wantErr: false,
		},
		{
			name:    "valid",
			source:  []byte(`123.123`),
			wantErr: false,
		},
		{
			name:    "invalid",
			source:  []byte(`{"key":"value"}`),
			wantErr: true,
		},
		{
			name:    "empty",
			source:  []byte{},
			wantErr: true,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.UnmarshalJSON(tt.source); (err != nil) != tt.wantErr {
				t.Errorf("NullFloat64.UnmarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
			}
		})
	}
}

func TestNullFloat64_Value(t *testing.T) {
	tests := []struct {
		name    string
		n       NullFloat64
		want    driver.Value
		wantErr bool
	}{
		{
			name: "valid",
			n: NullFloat64{
				Valid:   true,
				Float64: 123.123,
			},
			want:    driver.Value(float64(123.123)),
			wantErr: false,
		},
		{
			name: "invalid",
			n: NullFloat64{
				Valid: false,
			},
			want:    nil,
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.Value()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullFloat64.Value() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullFloat64.Value() = %v, want %v", got, tt.want)
			}
		})
	}
}

func TestNullFloat64_Scan(t *testing.T) {
	tests := []struct {
		name    string
		n       *NullFloat64
		wantErr bool
		src     interface{}
	}{
		{
			name: "valid",
			n: &NullFloat64{
				Float64: 123.123,
				Valid:   true,
			},
			src:     float64(123),
			wantErr: false,
		},
		{
			name: "nil value",
			n: &NullFloat64{
				Valid: false,
			},
			src:     float64(123.123),
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			if err := tt.n.Scan(tt.src); (err != nil) != tt.wantErr {
				t.Errorf("NullFloat64.Scan() error = %v, wantErr %v", err, tt.wantErr)
			}
			if !tt.n.Valid && tt.src != nil {
				t.Errorf("should return null")
			}
			if tt.n.Valid && tt.src != tt.n.Float64 {
				t.Errorf("invalid value")
			}
		})
	}
}

func TestNullFloat64_MarshalJSON(t *testing.T) {
	tests := []struct {
		name    string
		n       *NullFloat64
		want    []byte
		wantErr bool
	}{
		{
			name: "valid",
			n: &NullFloat64{
				Float64: 123.123,
				Valid:   true,
			},
			want:    []byte(`123.123`),
			wantErr: false,
		},
		{
			name: "valid null",
			n: &NullFloat64{
				Valid: false,
			},
			want:    []byte(`null`),
			wantErr: false,
		},
		{
			name: "invalid",
			n: &NullFloat64{
				Valid: true,
			},
			want:    []byte(`0`),
			wantErr: false,
		},
	}
	for _, tt := range tests {
		t.Run(tt.name, func(t *testing.T) {
			got, err := tt.n.MarshalJSON()
			if (err != nil) != tt.wantErr {
				t.Errorf("NullFloat64.MarshalJSON() error = %v, wantErr %v", err, tt.wantErr)
				return
			}
			if !reflect.DeepEqual(got, tt.want) {
				t.Errorf("NullFloat64.MarshalJSON() = %v, want %v", got, tt.want)
			}
		})
	}
}

func TestToNullBool(t *testing.T) {
	b := true
	bb := ToNullBool(&b)
	if !bb.Valid {
		t.Errorf("expected valid, got %v", bb.Valid)
	}
	if !bb.Bool {
		t.Errorf("expected true, got %v", bb.Bool)
	}

	var b2 *bool
	bb2 := ToNullBool(b2)
	if bb2.Valid {
		t.Errorf("expected not valid, got %v", bb2.Valid)
	}
	if bb2.Bool {
		t.Errorf("expected false, got %v", bb2.Bool)
	}
}
func TestToNullInt64(t *testing.T) {
	b := int64(123)
	bb := ToNullInt64(&b)
	if !bb.Valid {
		t.Errorf("expected valid, got %v", bb.Valid)
	}
	if bb.Int64 != 123 {
		t.Errorf("expected 123, got %v", bb.Int64)
	}

	var b2 *int64
	bb2 := ToNullInt64(b2)
	if bb2.Valid {
		t.Errorf("expected not valid, got %v", bb2.Valid)
	}
	if bb2.Int64 != 0 {
		t.Errorf("expected 0, got %v", bb2.Int64)
	}
}

func TestToNullFloat64(t *testing.T) {
	b := float64(123.123)
	bb := ToNullFloat64(&b)
	if !bb.Valid {
		t.Errorf("expected valid, got %v", bb.Valid)
	}
	if bb.Float64 != 123.123 {
		t.Errorf("expected 123.123, got %v", bb.Float64)
	}

	var b2 *float64
	bb2 := ToNullFloat64(b2)
	if bb2.Valid {
		t.Errorf("expected not valid, got %v", bb2.Valid)
	}
	if bb2.Float64 != 0 {
		t.Errorf("expected 0, got %v", bb2.Float64)
	}
}
func TestToNullString(t *testing.T) {
	b := "qwe"
	bb := ToNullString(&b)
	if !bb.Valid {
		t.Errorf("expected valid, got %v", bb.Valid)
	}
	if bb.String != "qwe" {
		t.Errorf("expected qwe, got %v", bb.String)
	}

	var b2 *string
	bb2 := ToNullString(b2)
	if bb2.Valid {
		t.Errorf("expected not valid, got %v", bb2.Valid)
	}
	if bb2.String != "" {
		t.Errorf("expected <empty string>, got %v", bb2.String)
	}
}
func TestToNullTime(t *testing.T) {
	tim := time.Now()
	bb := ToNullTime(tim)
	if !bb.Valid {
		t.Errorf("expected valid, got %v", bb.Valid)
	}
	if bb.Time != tim {
		t.Errorf("expected %v, got %v", tim, bb.Time)
	}

	tim = time.Time{}
	bb = ToNullTime(tim)
	if bb.Valid {
		t.Errorf("expected invalid, got %v", bb.Valid)
	}
	if bb.Time != tim {
		t.Errorf("expected %v, got %v", tim, bb.Time)
	}
}

func TestRawJSON_MarshalJSON(t *testing.T) {
	cases := []struct {
		name string
		data []byte
		exp  string
	}{
		{
			name: "empty data",
			data: []byte{},
			exp:  "null",
		},
	}

	for _, c := range cases {
		t.Run(c.name, func(t *testing.T) {
			rj := RawJSON(c.data)
			b, err := rj.MarshalJSON()
			if err != nil {
				t.Fatalf("unexpected error: %v", err)
			}
			if string(b) != c.exp {
				t.Fatalf("\nexp: %q\ngot: %q", c.exp, string(b))
			}
		})
	}
}
{{end}}
\\\"\")\n}", "title": "" }, { "docid": "58680437f9f938fd82f881ab320c62e9", "score": "0.5401117", "text": "func (tc *Collection) createNewTemplateFromXML(templateXML *TemplateXML) {\n\tpriority := uint8(16)\n\tif templateXML.Priority != 0 {\n\t\tpriority = templateXML.Priority\n\t}\n\toptional := templateXML.Optional != \"\"\n\toptionalDefault := templateXML.Optional == \"enabled\"\n\tpage, _ := strconv.ParseBool(templateXML.Page)\n\ttmpl := Template{\n\t\tID: templateXML.ID,\n\t\tPriority: priority,\n\t\tPage: page,\n\t\tOptional: optional,\n\t\tOptionalDefault: optionalDefault,\n\t\thWebContent: templateXML.Content,\n\t\tp2Contents: make(map[string][]byte),\n\t}\n\ttc.Add(&tmpl)\n}", "title": "" }, { "docid": "014f3559302da4eb97de994a707beb5a", "score": "0.53981674", "text": "func BuildTemplate(w http.ResponseWriter, r *http.Request, ColorTxt string, FontSize string, ColorBG string) {\n\tp := Page{ColorTxt, FontSize, ColorBG} // Associates the elements of ascii-art.html with main.go\n\tparsedTemplate, _ := template.ParseFiles(\"templates/ascii-art.html\") // States the files that requires a modification\n\n\tparsedTemplate.Execute(w, p) // Executes the modification\n\t// The variable p will be depicted as \".\" inside the layout\n\t// Exemple : {{.}} == p\n}", "title": "" }, { "docid": "c4b07cb8661b9a63c512c0f60055b570", "score": "0.539281", "text": "func compileTemplate(templateName string) *eventPlannerTemplate {\n\tsLog(fmt.Sprintf(\"templates.go: compileTemplate(): template name: %v\", templateName))\n\n\t// Add the main template file.\n\tmain := template.Must(template.ParseFiles(filePath + \"/templates/main.html\"))\n\n\t// Add the body.\n\tbody := readFile(templateName)\n\tif templateName == \"login.html\" {\n\t\t// Head and footer are emptry for login.html.\n\t\ttemplate.Must(main.New(\"header\").Parse(string(\"\")))\n\t\ttemplate.Must(main.New(\"body\").Parse(string(body)))\n\t\ttemplate.Must(main.New(\"footer\").Parse(string(\"\")))\n\t\treturn &eventPlannerTemplate{main.Lookup(\"main.html\")}\n\t}\n\tif templateName == \"register.html\" {\n\t\t// Head and footer are empty for login.html.\n\t\ttemplate.Must(main.New(\"header\").Parse(string(\"\")))\n\t\ttemplate.Must(main.New(\"body\").Parse(string(body)))\n\t\ttemplate.Must(main.New(\"footer\").Parse(string(\"\")))\n\t\treturn &eventPlannerTemplate{main.Lookup(\"main.html\")}\n\t}\n\n\t// Add the header.\n\theader := readFile(\"header.html\")\n\n\t// Add the footer.\n\tfooter := readFile(\"footer.html\")\n\n\t// Combine header, body, and footer and return template.\n\ttemplate.Must(main.New(\"header\").Parse(string(header)))\n\ttemplate.Must(main.New(\"body\").Parse(string(body)))\n\ttemplate.Must(main.New(\"footer\").Parse(string(footer)))\n\tsLog(fmt.Sprintf(\"templates.go: compileTemplate(): template parse successful return: %v\", templateName))\n\treturn &eventPlannerTemplate{main.Lookup(\"main.html\")}\n}", "title": "" }, { "docid": "e7549a6248e1485e975c7cd79f9ca4de", "score": "0.5379678", "text": "func Download(t *Template, dst string) error {\n\tpath, err := ioutil.TempDir(\"\", \"mesg-\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer os.RemoveAll(path)\n\n\tif err = xgit.Clone(t.URL, path); err != nil {\n\t\treturn err\n\t}\n\n\treturn xos.CopyDir(filepath.Join(path, \"template\"), dst)\n}", "title": "" }, { "docid": "b5f16fac6d36f78dbb7cf90a4d922154", "score": "0.53696835", "text": "func (l *Loader) Add(path string, template *Template) {\n\tl.cache[path] = template\n}", "title": "" } ]
11934720064e2b111ebec2191ad5df96
Warnf formats the given string with the given values, if logger level is warn or finer.
[ { "docid": "50983095cc2bc7e5d21c933b25240c6d", "score": "0.8118119", "text": "func (la LogAdaptor) Warnf(format string, values ...interface{}) {\n\tla.Log(logger.WeightWarn, func() string {\n\t\treturn fmt.Sprintf(format, values...)\n\t})\n}", "title": "" } ]
[ { "docid": "131287ba77fbce0229192ff0bc446fb6", "score": "0.83509016", "text": "func Warnf(format string, values ...interface{}) {\n\tlogger.Warn(fmt.Sprintf(format, values...))\n}", "title": "" }, { "docid": "90dc871c49b6399fa739e9bea06d6d5c", "score": "0.81004125", "text": "func (l *Logger) Warnf(f string, a ...interface{}) { l.Lwarn.Printf(f, a...) }", "title": "" }, { "docid": "52d8b2ea1cb4af54f714d98ce93a6ba2", "score": "0.80229086", "text": "func Warnf(format string, a ...interface{}) {\n\tlog(WarnLevel, \"WARNING: \"+fmt.Sprintf(format, a...))\n}", "title": "" }, { "docid": "c5d7dc419bd32118602ec5f5901bdb5a", "score": "0.7905894", "text": "func Warnf(format string, v ...interface{}) {\n\tif globalLevel >= WarnLevel {\n\t\twarnLog.Output(2, fmt.Sprintf(format, v...))\n\t}\n}", "title": "" }, { "docid": "b3ee0618bba5f4363af13e6c6bed3f00", "score": "0.7900872", "text": "func (l logger) Warnf(format string, v ...interface{}) {\n\tl.printLog(fmt.Sprintf(format, v...), WARNING)\n}", "title": "" }, { "docid": "655ca7ec5abe346ad5885d73d0034e50", "score": "0.78969353", "text": "func Warnf(format string, args ...interface{}) {\n\tdefaultLogger.log(WarnLevel, fmt.Sprintf(format, args...))\n}", "title": "" }, { "docid": "1e8f8b30ed5d6b235e11020e19f0d120", "score": "0.7882913", "text": "func Warnf(fmt string, v ...interface{}) { logrus.StandardLogger().Warnf(fmt, v...) }", "title": "" }, { "docid": "bd4d0c45bd9c9d5a47fd6bd529061ed3", "score": "0.7876754", "text": "func Warnf(format string, a ...interface{}) {\n\tWarn(fmt.Sprintf(format, a...))\n}", "title": "" }, { "docid": "cadd6a9ebad13b3d2c9876a5be24f98a", "score": "0.78736675", "text": "func Warnf(format string, args ...interface{}) { logger.Warnf(format, args...) }", "title": "" }, { "docid": "f2141e54fea16240e25daad408c02c5f", "score": "0.7863816", "text": "func Warnf(f string, v ...interface{}) {\n\tLog(PRINTF, defaultLogger, WARN, f, v...)\n}", "title": "" }, { "docid": "3301fd1de2ac69b0bbc7ac96cd579f0c", "score": "0.78286695", "text": "func (l *Logger) Warnf(f string, v ...interface{}) {\n\tLog(PRINTF, l, WARN, f, v...)\n}", "title": "" }, { "docid": "050c3625b5565ec0d0647cd5012dcbd9", "score": "0.7814104", "text": "func Warnf(format string, v ...interface{}) {\n\twarnLogger.Warnf(format, v...)\n}", "title": "" }, { "docid": "98ebf13495e4192a4657730f29c27c51", "score": "0.78010684", "text": "func Warnf(format string, args ...interface{}) {\n\tlog(\"warning\", fmt.Sprintf(format, args...))\n}", "title": "" }, { "docid": "f16ba78d0dde6a50e35401be7d93b00b", "score": "0.7778637", "text": "func Warnf(format string, args ...interface{}) {\r\n\tlogger.Output(2, LevelWarn, fmt.Sprintf(format, args...))\r\n}", "title": "" }, { "docid": "2dabef58b71495a45c1f203242566938", "score": "0.77633756", "text": "func (l Logger) Warnf(format string, v ...any) {\n\tl.log.Warnf(format, v...)\n}", "title": "" }, { "docid": "cfbb4c500d1a48434245f813bb056b88", "score": "0.77466035", "text": "func (l *LeveledLogger) Warnf(format string, v ...interface{}) {\n\tif l.Level >= LevelWarn {\n\t\tfmt.Fprintf(l.stderr(), \"[WARN] \"+format+\"\\n\", v...)\n\t}\n}", "title": "" }, { "docid": "9b0af2b95a92fa4c8e047e0bb3d4bcd1", "score": "0.7745145", "text": "func Warnf(format string, v ...interface{}) {\n\tlog.Warnf(format, v...)\n}", "title": "" }, { "docid": "3ba88e67e3c9499bcc0ca52506017d1a", "score": "0.7743063", "text": "func Warnf(msg string, v ...interface{}) {\n\tLog.Warnf(msg, v...)\n}", "title": "" }, { "docid": "fc510b3cb4eac4cc3d074051bd979b51", "score": "0.7718563", "text": "func (l *Logger) Warnf(format string, v ...interface{}) {\n\tl.logf(WARN, format, v...)\n}", "title": "" }, { "docid": "6c129a325c20880caebd0ec0e832cedf", "score": "0.7715852", "text": "func (l *Logger) Warnf(format string, args ...interface{}) {\n l.logger.Warnf(format, args...)\n}", "title": "" }, { "docid": "4c3243d2e1fadf9fd3a3c010896e0769", "score": "0.77107936", "text": "func (l *Log) Warnf(format string, v ...interface{}) {\n\tl.logger.Warnf(format, v...)\n}", "title": "" }, { "docid": "916b3e0afc601586d2f32abf130f3ae8", "score": "0.7707206", "text": "func (e *Entry) Warnf(format string, v ...interface{}) {\n\tif e.logger.level >= LevelWarn {\n\t\te.output(LevelWarn, fmt.Sprintf(format, v...))\n\t}\n}", "title": "" }, { "docid": "066eff62b5bf25067e5d2ff47be1c6f7", "score": "0.7699506", "text": "func Warnf(format string, v ...interface{}) {\n\tf := extractFields(&v)\n\tstd.OutputF(LevelWarn, 2, fmt.Sprintf(format, v...), f)\n}", "title": "" }, { "docid": "6e1e3342e25b436ec3fad25c0fe11203", "score": "0.7697377", "text": "func Warnf(f string, a ...interface{}) {\n Warn(fmt.Sprintf(f, a...), nil, nil)\n}", "title": "" }, { "docid": "268ce97c422ec8a54e73630308abd8d1", "score": "0.76940244", "text": "func (l *Logger) Warnf(format string, v ...interface{}) {\n\tl.Output(2, LevelWarn, format, v...)\n}", "title": "" }, { "docid": "19079b1489557a25b0696f3e4bc1cb16", "score": "0.7681914", "text": "func Warningf(ctx context.Context, msg string, fields ...interface{}) {\n\tlogger(ctx).Warn(fmt.Sprintf(msg, fields...))\n}", "title": "" }, { "docid": "453ead0e9f606d76a4a2cd04bc6c35e0", "score": "0.767822", "text": "func Warnf(format string, params ...interface{}) error {\n\treturn log.Warnf(format, params...)\n}", "title": "" }, { "docid": "2f8df683bcb90c75f09db60c8670305a", "score": "0.7674802", "text": "func (l *Log) Warnf(format string, v ...interface{}) {\n\tl.output(WARN, format, v...)\n}", "title": "" }, { "docid": "70ca0b76135c289cdb45a8bdb37d4f5b", "score": "0.7673303", "text": "func Warnf(s string, v ...interface{}) {\n\tstd.Warnf(s, v...)\n}", "title": "" }, { "docid": "cb0d1f10b6cbd2e4791e554f6a235cc8", "score": "0.7672556", "text": "func (l *Lumberjack) Warnf(text string, args ...interface{}) {\n\ttext = fmt.Sprintf(text, args...)\n\tl.Log(1, text)\n}", "title": "" }, { "docid": "25c040412c70f3abc68028eece99fd59", "score": "0.7669668", "text": "func Warnf(format string, args ...interface{}) {\n\tLogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "b5e9471a66ef2b9ee340431f990eb51b", "score": "0.7661194", "text": "func (e *Entry) Warnf(msg string, v ...interface{}) {\n\te.Warn(fmt.Sprintf(msg, v...))\n}", "title": "" }, { "docid": "d948f338a0f85c29def63acfd4c033b4", "score": "0.7656637", "text": "func (l *Logger) Warnf(format string, a ...interface{}) {\n\tif l.LogWarn() {\n\t\tl.writef(LevelWarn, format, a...)\n\t}\n}", "title": "" }, { "docid": "dfb1aa5d1defed522dc920e911de969d", "score": "0.7650192", "text": "func (m *Log) Warnf(msg string, v ...interface{}) {\n\tm.logger.Warn().Msgf(msg, v...)\n}", "title": "" }, { "docid": "d93f2f9c48b43a254d83007055671bbd", "score": "0.76460814", "text": "func Warnf(format string, args ...interface{}) {\n\tif level < WarnLevel {\n\t\treturn\n\t}\n\tout.WriteString(color.YellowString(\"WARN \"))\n\tout.WriteString(fmt.Sprintf(format, args...))\n\tout.WriteString(\"\\n\")\n}", "title": "" }, { "docid": "6824866b3b8f121860961f483b48a587", "score": "0.7645339", "text": "func Warnf(format string, i ...interface{}) {\n\tlogger.Warnf(format, i...)\n}", "title": "" }, { "docid": "8432f10e2efd72b301755bb26bc1d83a", "score": "0.76369005", "text": "func Warnf(format string, args ...interface{}) {\n\tlogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "8432f10e2efd72b301755bb26bc1d83a", "score": "0.76369005", "text": "func Warnf(format string, args ...interface{}) {\n\tlogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "8432f10e2efd72b301755bb26bc1d83a", "score": "0.76369005", "text": "func Warnf(format string, args ...interface{}) {\n\tlogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "8432f10e2efd72b301755bb26bc1d83a", "score": "0.76369005", "text": "func Warnf(format string, args ...interface{}) {\n\tlogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "375d1fe3e1da090543a3d727c6bba6ed", "score": "0.761678", "text": "func Warnf(format string, args ...interface{}) {\n\tdefaultLogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "7635eddaa0241a888245924fd1db93c4", "score": "0.7606932", "text": "func Warnf(format string, a ...interface{}) {\n\tbasicLog(levelWarn, format, \"\", a...)\n}", "title": "" }, { "docid": "2c03466632be63428d97881e9d6f4118", "score": "0.7603656", "text": "func Warnf(format string, args ...interface{}) {\n\tLog.Warnf(format, args...)\n}", "title": "" }, { "docid": "98274c8a24507465687f441e90784365", "score": "0.7601107", "text": "func Warnf(format string, args ...interface{}) {\n\tlog.Warnf(format, args...)\n}", "title": "" }, { "docid": "98274c8a24507465687f441e90784365", "score": "0.7601107", "text": "func Warnf(format string, args ...interface{}) {\n\tlog.Warnf(format, args...)\n}", "title": "" }, { "docid": "978e3c87df43316f6eda0f0aa62be368", "score": "0.75916165", "text": "func Warnf(format string, v ...interface{}) {\n\tprintf(lblWarn, format, v...)\n}", "title": "" }, { "docid": "8797ea6dbebe7118fedec2631f68b275", "score": "0.7589844", "text": "func Warnf(format string, args ...interface{}) {\n\tglobalLogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "b87174b54c4b63a74eba477161257e4f", "score": "0.75809073", "text": "func WarnF(format string, v ...interface{}) {\n\tif config.level <= WARN {\n\t\twriteLog(newMessage(WARN, fmt.Sprintf(format, v...)))\n\t}\n}", "title": "" }, { "docid": "8c48f23137b47d62d0e807e8d98685aa", "score": "0.75775015", "text": "func Warnf(format string, v ...interface{}) {\n\tstd().logf(WARN, format, v...)\n}", "title": "" }, { "docid": "ac1f28735e9c9941d26c7b005b3f29d5", "score": "0.7570326", "text": "func (l *Logger) Warnf(format string, args ...interface{}) {\n\tl.logger().Warnf(format, args...)\n}", "title": "" }, { "docid": "cd17c9f638d4ab6033e3b96231c087a2", "score": "0.7564805", "text": "func Warnf(format string, args ...interface{}) {\n\tlog().Warnf(format, args...)\n}", "title": "" }, { "docid": "110600b0de96939085cb8e10dfcb0a67", "score": "0.7562472", "text": "func (l *Logger) Warnf(msg string, v ...interface{}) {\n\tl.Logf(WarnLevel, msg, v...)\n}", "title": "" }, { "docid": "713e7c13a04a8ec52dae87716f72cf31", "score": "0.7558946", "text": "func Warnf(msg string, args ...interface{}) {\n\tlogger.Warnf(msg, args...)\n}", "title": "" }, { "docid": "750d14a7f06d54a42728a7fb67853d1a", "score": "0.7557667", "text": "func Warnf(format string, args ...interface{}) {\n\tLoglf(\"warning\", format, args...)\n}", "title": "" }, { "docid": "2fedddf9f9b733ab57905686dcd74a73", "score": "0.7534506", "text": "func (l *SysLogger) Warnf(format string, v ...interface{}) {\n\tl.writer.Info(1, formatMsg(\"WARN\", format, v...))\n}", "title": "" }, { "docid": "5ec2cb42de2d518f7fcedf29b58630f9", "score": "0.75233203", "text": "func Warnf(format string, v ...interface{}) {\n\tstdPrintf(WARN, format, v...)\n}", "title": "" }, { "docid": "6deb9038058ef0440bfabcd5a661ec98", "score": "0.7519527", "text": "func Warnf(msg string, args ...interface{}) { config.Logging.Warnf(msg, args...) }", "title": "" }, { "docid": "85b4079f9736c5ecfaa084ea236371e5", "score": "0.7518357", "text": "func (l MultiLogger) Warningf(format string, values ...interface{}) {\n\tl.printf(Warning, format, values...)\n}", "title": "" }, { "docid": "bd74445c15f3a2036432819abc8d307c", "score": "0.7510933", "text": "func (l *defaultLogger) Warnf(format string, args ...interface{}) {\n\tl.prefixPrint(\"WARN\", format, args...)\n}", "title": "" }, { "docid": "703091462ed75b12757699656b9c3846", "score": "0.7505309", "text": "func (l *MyLogger) Warnf(format string, args ...interface{}) {\n\tl.Logger.Warnf(format, args...)\n}", "title": "" }, { "docid": "35656ef3aadcfb31065bec02b3aa5fc4", "score": "0.7501641", "text": "func (g *GlogReplacement) Warnf(format string, args ...interface{}) {\n\tfmt.Printf(\"[WARN] \"+format, args...)\n}", "title": "" }, { "docid": "30d8576c2d3451c58f6aa96cb50c7de2", "score": "0.7476449", "text": "func Warnf(format string, v ...interface{}) {\n\tlogger.zapLogger.Sugar().Warnf(format, v...)\n}", "title": "" }, { "docid": "9d1700a991765434cd696017bb15a7d0", "score": "0.7466801", "text": "func (std *LogrusLogger) Warnf(format string, args ...interface{}) {\n\tstd.internalLogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "3c61c21874a471d573d67d9e2d517647", "score": "0.746386", "text": "func (l *Log) Warnf(template string, args ...interface{}) {\n\tl.stdLogger.Sugar().Warnf(template, args...)\n}", "title": "" }, { "docid": "874de26d149ed1dbc8a1eab16986b59a", "score": "0.7462496", "text": "func Warnf(format string, args ...interface{}) {\n\tif logger == nil {\n\t\treturn\n\t}\n\tlogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "31de8ab171b132f007c8fcac9d664408", "score": "0.7455373", "text": "func Warnf(msg string, args ...interface{}) {\n\tlogrus.Warnf(msg, args...)\n}", "title": "" }, { "docid": "785aa85df3800cfa706e7e204426ac9d", "score": "0.7454142", "text": "func Warnf(format string, params ...interface{}) error {\n\tif logLevel < LevelWarn {\n\t\treturn nil\n\t}\n\tseelog.Warnf(format, params...)\n\treturn nil\n}", "title": "" }, { "docid": "f7a5d97763008dd469fa86171ddb20dc", "score": "0.74517995", "text": "func (logger *DefaultLogger) Warnf(format string, args ...interface{}) {\n\tlogger.loggerImpl.Warnf(format, args...)\n}", "title": "" }, { "docid": "6fe0170d5d0b90c785a7e6e56b82d93a", "score": "0.74501896", "text": "func Warnf(template string, args ...interface{}) {\n\tinternalv2compat.GlobalLogger().Warnf(template, args...)\n}", "title": "" }, { "docid": "6cb4f65c6b53a085e75b28e823133550", "score": "0.7448622", "text": "func (l *Logger) Warningf(format string, a ...interface{}) {\n\tl.internalLog(WarningLevel, false, fmt.Sprintf(format, a...))\n}", "title": "" }, { "docid": "c8f5c58ca9b44e4097e4479cb6c66452", "score": "0.7430878", "text": "func Warnf(format string, a ...interface{}) {\n\tdefaultNoti.Warnf(format, a...)\n}", "title": "" }, { "docid": "86607a05aa98f2c5dde0ae41acccc6c6", "score": "0.74103874", "text": "func Warnf(ctx context.Context, format string, args ...interface{}) {\n\tif false {\n\t\t// Enable printf checking in go vet.\n\t\t_ = fmt.Sprintf(format, args...)\n\t}\n\tlogf(ctx, Default(), Warn, format, args)\n}", "title": "" }, { "docid": "5cda96b03b1c3d4b2108ba13b8c4f2d4", "score": "0.74082154", "text": "func (p *prettyLogger) Warnf(format string, args ...interface{}) {\n\tp.internal.Warnf(format, args...)\n\treturn\n}", "title": "" }, { "docid": "49226034a770862e24ee28f3a83a139a", "score": "0.7403331", "text": "func Warnf(template string, args ...interface{}) {\n\tdefaultLogger.Warnf(template, args...)\n}", "title": "" }, { "docid": "a43389b87ff5fa304d0f1ca3bb253f49", "score": "0.74022347", "text": "func Warnf(format string, args ...interface{}) {\n\tlogncore.Warnf(format, args...)\n}", "title": "" }, { "docid": "5a22b6a025fd5a0ee51c38ce51d8964b", "score": "0.74022084", "text": "func (s Sugar) Warnf(format string, args ...interface{}) {\n\ts.Logf(Warn, format, args...)\n}", "title": "" }, { "docid": "7825470f3982e56a302184cfa9cf4022", "score": "0.7395432", "text": "func Warnf(format string, args ...interface{}) {\n\tif IsLevelEnabled(WarnLevel) {\n\t\trArgs := resolvePointers(args)\n\t\tlogger.Warnf(format, rArgs...)\n\t}\n}", "title": "" }, { "docid": "2cdd95ad309ce49582643305d980824a", "score": "0.7392108", "text": "func Warnf(format string, args ...interface{}) {\n\tzap.L().Warn(fmt.Sprintf(format, args...))\n\t_, _ = fmt.Fprintf(os.Stderr, format+\"\\n\", args...)\n}", "title": "" }, { "docid": "77ef34ef118d9f2d9b5cd70aac063093", "score": "0.73637986", "text": "func Warnf(format string, args ...interface{}) {\n\tDefault.Warnf(format, args...)\n}", "title": "" }, { "docid": "7aae36ad63ea4cdab7d23390f789bee8", "score": "0.7361335", "text": "func (log *logrusLogger) Warnf(f string, v ...interface{}) {\n\tlog.entry().Warnf(f, v...)\n}", "title": "" }, { "docid": "03ca17e17e6e475b850fe1108184b28b", "score": "0.73580307", "text": "func (l *StdLogger) Warnf(format string, args ...interface{}) {\n\tl.Printf(format, args...)\n}", "title": "" }, { "docid": "b2bb2ad159b8a3db8907bbb6f44cd8bc", "score": "0.73567945", "text": "func (fl *fmtLogger) Warnf(msg string, args ...interface{}) {\n\tIncreaseWarnCounter()\n\tfmt.Printf(appendNewLine(msg), args...)\n}", "title": "" }, { "docid": "0d8b25ac75731dd99e12b364afae1ec8", "score": "0.7356648", "text": "func Warnf(format string, args ...interface{}) {\n\tstd.Warnf(format, args...)\n}", "title": "" }, { "docid": "49c8f811c916ae4c0af793e624b761a7", "score": "0.7356349", "text": "func Warnf(ctx context.Context, format string, args ...interface{}) {\n\tif level >= LevelWarn {\n\t\twithFields(contextFields(ctx)).Warnf(format, args...)\n\t}\n}", "title": "" }, { "docid": "7c7c5bcd1c677a16e29751bb15ee2f5f", "score": "0.7354973", "text": "func Warnf(template string, args ...interface{}) {\n\tlogger.Warnf(template, args...)\n}", "title": "" }, { "docid": "6529ae634b46d41a744bc7ed9366b1c4", "score": "0.7354506", "text": "func Warnf(format string, args ...interface{}) {\n\tSharedLogger.Warnf(format, args...)\n}", "title": "" }, { "docid": "84f6a165574dd27981ba4e529a529a0f", "score": "0.73539466", "text": "func Warnf(template string, args ...interface{}) {\n\tglobalLogger.Warnf(template, args...)\n}", "title": "" }, { "docid": "9a0d1893505fbcf23bc62c735b479112", "score": "0.73527306", "text": "func Warnf(format string, a ...interface{}) {\n\tbasicLog(levelWarn, notATrace, false, format, \"\", a...)\n}", "title": "" }, { "docid": "76a8f65fdfc6f7f2c516e0c120e1abc2", "score": "0.73419815", "text": "func Warnf(format string, v ...interface{}) {\n\tfmt.Printf(color.Yellow(\"Warn\") + \": \")\n\tfmt.Printf(format, v...)\n}", "title": "" }, { "docid": "83e9ea566254bf260193b0734be6c3e2", "score": "0.73394316", "text": "func Warnf(format string, v ...interface{}) error {\n\treturn outputf(os.Stdout, LevelWarn, format, v...)\n}", "title": "" }, { "docid": "58ecb6d2ee507bcf35139641113b4a35", "score": "0.73272496", "text": "func (s DefaultLogger) Warnf(template string, args ...interface{}) {\n\tlog.Printf(template, args...)\n}", "title": "" }, { "docid": "f8de9981c277b9a918c633cba032f789", "score": "0.7327017", "text": "func FWarnf(format string, v ...interface{}) {\n\n\tif isUninitFileLogger() {\n\t\tWarnf(format, v)\n\t\treturn\n\t}\n\n\tmessage := fmt.Sprintf(format, v...)\n\tif level <= LevelWarning {\n\t\tflogger.logger.Printf(\"[WARN] %s\", fmt.Sprintln(message))\n\t}\n}", "title": "" }, { "docid": "cfca5c0602c5e8347174c5a86e6112a8", "score": "0.73160166", "text": "func Warnf(format string, args ...interface{}) {\n\tif level < WarnLevel {\n\t\treturn\n\t}\n\tfmt.Fprint(out, color.YellowString(\"WARN \"))\n\tfmt.Fprintf(out, format, args...)\n\tfmt.Fprint(out, \"\\n\")\n}", "title": "" }, { "docid": "b697f7afa15144b127b7bdfbc3a94080", "score": "0.730934", "text": "func (l DefaultLogger) Warnf(format string, args ...interface{}) {\n\tl.entry.Warnf(format, args...)\n}", "title": "" }, { "docid": "51b2430b3443a66df76aed6725a3fb0e", "score": "0.73042333", "text": "func Warningf(format string, v ...interface{}) error {\n\treturn Warning(fmt.Sprintf(format, v...))\n}", "title": "" }, { "docid": "4cfc3bd158fa508278ff5535b09e0998", "score": "0.7302906", "text": "func (s *SugaredLogger) Warnf(template string, args ...interface{}) {\n\ts.log(WarnLevel, template, args, nil)\n}", "title": "" }, { "docid": "40d5d4de74d8eb50e6312ea1285755dd", "score": "0.72829664", "text": "func Warnf(format string, args ...interface{}) {\n\tprintWith(warn, format, args...)\n}", "title": "" }, { "docid": "e16977ced57eba1d2402ced940eb4985", "score": "0.72773534", "text": "func Warningf(format string, v ...interface{}) {\n\tlogger.Warningf(format, v...)\n}", "title": "" }, { "docid": "069fd8d62dec57b839dd592c583f87f7", "score": "0.72746116", "text": "func (l *loggerWrapper) Warningf(format string, args ...interface{}) {\n\tl.logger.Warn(sprintf(format, args...))\n}", "title": "" }, { "docid": "2897a5d6cc3f4ffe41b7a59047425b08", "score": "0.72645056", "text": "func (r *TerminalLine) Warnf(format string, args ...interface{}) Line {\n\treturn r.Warn(fmt.Sprintf(format, args...))\n}", "title": "" } ]
21a8c2768d790d8f5b45c4b69328bca2
Size always returns 0 (implementing os.FileInfo)
[ { "docid": "991390028dd5ebffd159ba7c3ad7eec5", "score": "0.0", "text": "func (ed *embeddedDirInfo) Size() int64 {\n\treturn 0\n}", "title": "" } ]
[ { "docid": "14b09404d200c9a922ae2bda6151b8b2", "score": "0.84004897", "text": "func (fi *FileInfo) Size() int64 { return fi.FSize }", "title": "" }, { "docid": "5b819e188f4dc53ddc62aaacb57f91c4", "score": "0.83598536", "text": "func (f *FileInfo) Size() int64 { return f.SizeVar }", "title": "" }, { "docid": "f86416164ea2cbcdbdd2084a2621bffc", "score": "0.82273024", "text": "func (self File) Size() int64 { return self.Path().Size() }", "title": "" }, { "docid": "8b8286d89beb38a03cbfa4bbf5813b1c", "score": "0.8072589", "text": "func (f *FileInfo) Size() int64 {\n\treturn f.size\n}", "title": "" }, { "docid": "28e34f04fbfe243ffcf46bf7149e0864", "score": "0.8070793", "text": "func (f DumFileInfo) Size() int64 {\n\treturn 13\n}", "title": "" }, { "docid": "056156ab4a44c50b0d8b5a31d15cec47", "score": "0.80528224", "text": "func (fi FileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "3145f50e8e67d4f313e3d0bafcd3f819", "score": "0.8045158", "text": "func (fi *fileInfo) Size() int64 { return fi.meta.Size }", "title": "" }, { "docid": "450e99a92d7835c7107bf09149ea223c", "score": "0.80122703", "text": "func (fi *fileInfo) Size() int64 { return int64(len(fi.content)) }", "title": "" }, { "docid": "0888ceee55e460872b3c347bbf686969", "score": "0.79984295", "text": "func (fi *FileInfo) Size() int64 {\n\treturn fi.FileSize\n}", "title": "" }, { "docid": "b1ca0e707ae20ea72ab0ffdbef960619", "score": "0.79568267", "text": "func (f *File) Size() int64 { return f.size }", "title": "" }, { "docid": "73ca1bcd61f7953e436dae4c6d0134d1", "score": "0.7951234", "text": "func (i *FileInfo) Size() int64 {\n\treturn i.item.Size\n}", "title": "" }, { "docid": "a78323095825e0758c3d16dc7b57f527", "score": "0.793276", "text": "func (fi *FileInfo) Size() int64 {\n\treturn fi.inode.Size\n}", "title": "" }, { "docid": "d5b19a18b53ec7d16a5e142f33d5bae5", "score": "0.78699213", "text": "func (i *_FileInfo) Size() int64 {\n\treturn i.innerFile.FileSize\n}", "title": "" }, { "docid": "26d0bc82cef42813216f937d7beaa3f7", "score": "0.7840631", "text": "func (s *VFileInfo) Size() int64 {\n\treturn s.FileSize\n}", "title": "" }, { "docid": "1a1c0559e37252abcf9afc06c885b40c", "score": "0.77022004", "text": "func (ef *embeddedFileInfo) Size() int64 {\n\treturn int64(len(ef.Content))\n}", "title": "" }, { "docid": "d87cb91fc03d347c0da5931adb913061", "score": "0.77008", "text": "func size(f *os.File) int64 {\n\tinfo, err := f.Stat()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn info.Size()\n}", "title": "" }, { "docid": "128c2113f044523cf4ca97f40776fda7", "score": "0.7655168", "text": "func (fi bindataFileInfo) Size() int64 {\r\n\treturn fi.size\r\n}", "title": "" }, { "docid": "baeb26512ad17ceea1ac75fd063b19a7", "score": "0.7626149", "text": "func size(f *os.File) int64 {\n\tfi, err := f.Stat()\n\tif err != nil {\n\t\treturn -1\n\t}\n\treturn fi.Size()\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" }, { "docid": "72061f4130b300cffbcf74ee5629133f", "score": "0.761663", "text": "func (fi bindataFileInfo) Size() int64 {\n\treturn fi.size\n}", "title": "" } ]
1e2dc7e8051436861e736a12d1f8ff8f
returns true if pin is HIGH and false if pin is LOW i.e. HIGH/LOW signal on input pin note that SetActiveLow inverts return value internal note: in contrast to SysFS we need to query two different registers depending on the pin direction
[ { "docid": "cac1f120be6f8ac5cb3cece3b6176c3a", "score": "0.5662669", "text": "func (gpio *MMappedGPIO) GetState() (state bool, err error) {\n\tmmapreg := getgpiommap()\n\tvar register uint\n\tif mmapreg.memgpiochipreg[gpio.chipid][intgpio_output_enabled_+(gpio.gpioid/8)]&(1<<(gpio.gpioid%8)) > 0 {\n\t\tregister = intgpio_datain_ // if DIRECTION==IN\n\t} else {\n\t\tregister = intgpio_dataout_ // if DIRECTION==OUT\n\t}\n\tstate = gpio.activelow != (mmapreg.memgpiochipreg[gpio.chipid][register+(gpio.gpioid/8)]&(1<<(gpio.gpioid%8)) > 0)\n\treturn\n}", "title": "" } ]
[ { "docid": "cf23d30551ce31415438384848a4fd9c", "score": "0.6954686", "text": "func WithPinActiveLow() func(gobot.DigitalPinOptioner) bool {\n\treturn func(d gobot.DigitalPinOptioner) bool { return d.SetActiveLow() }\n}", "title": "" }, { "docid": "34c781c4d64d0654c7bf6ffb326a8f37", "score": "0.6494677", "text": "func (gpio *MMappedGPIO) SetActiveLow(activelow bool) error {\n\tif gpio == nil {\n\t\tpanic(\"gpio == nil\")\n\t}\n\tprev_state, err := gpio.GetState()\n\tif err != nil {\n\t\treturn err\n\t}\n\tgpio.activelow = activelow\n\treturn gpio.SetState(prev_state)\n}", "title": "" }, { "docid": "177930f3436425fbae44aac72d28e2b5", "score": "0.63671035", "text": "func (d *digitalPinConfig) SetActiveLow() bool {\n\tif d.activeLow {\n\t\treturn false\n\t}\n\td.activeLow = true\n\treturn true\n}", "title": "" }, { "docid": "e2dccdadccd8335d639bd060cacf5dae", "score": "0.5725701", "text": "func Set(pin OutputPin, high bool) {\n\tpin.Output()\n\tif high {\n\t\tpin.High()\n\t} else {\n\t\tpin.Low()\n\t}\n}", "title": "" }, { "docid": "75ad934b0155f1af39de3f3bf745d286", "score": "0.5418968", "text": "func (ds DoorSensor) IsOpen() bool {\n\treturn pin.Read() == rpio.Low\n}", "title": "" }, { "docid": "02ec1abbd856dc3054079c710e527cde", "score": "0.53866976", "text": "func IsInverted(line int) bool {\n\tvalueString, _ := shell(\"cat /sys/class/gpio/gpio\" + strconv.Itoa(line) + \"/active_low\")\n\treturn valueString != \"0\"\n}", "title": "" }, { "docid": "8c147ac9f0ea48b9825cfb4edc953f2f", "score": "0.53726286", "text": "func (b *Button) IsActive() bool {\n\tif b.pin.Read() == 0 {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "f2b807e347414e2a8cfdcd220fce6bfa", "score": "0.5359611", "text": "func (d *Driver) UsePin(pin gpio.Pin, s Signal) {\n\tswitch s {\n\tcase TXD, RTSn:\n\t\tpin.Set()\n\t\tpin.Setup(gpio.ModeOut)\n\tdefault:\n\t\tpin.Setup(gpio.ModeIn)\n\t}\n\td.p.StorePSEL(s, pin.PSEL(), true)\n}", "title": "" }, { "docid": "a74c8db8b03a50dec78e496b1d296c12", "score": "0.53468657", "text": "func (node *BinarySensor) IsActive() (bool, error) {\n\tvar response *ApplicationCommandData\n\tvar err error\n\n\tif response, err = node.zwSendDataWaitForResponse(\n\t\tCommandClassBinarySensor, []uint8{binarySensorCommandGet},\n\t\tbinarySensorCommandReport, nil); err != nil {\n\t\treturn false, err\n\t}\n\n\tisActive, _, err := node.ParseReport(response)\n\treturn isActive, err\n}", "title": "" }, { "docid": "ae09f367d0b8f172932d4956b0a1ed3f", "score": "0.5238058", "text": "func (m *Modem) PinLockStatus() bool {\n\tif ok, err := m.devices.CPIN(); err != nil {\n\t\treturn false\n\t} else {\n\t\treturn ok\n\t}\n}", "title": "" }, { "docid": "e6110adc38a3d911b1a927ac13343d06", "score": "0.5176112", "text": "func (act *ActiveCalculator) Active() bool { return act.active.IsStart }", "title": "" }, { "docid": "17ccfa8dba11ad3af64693a99fd747c0", "score": "0.51331127", "text": "func (s *Sniffer) Active() bool {\n\treturn s.state\n}", "title": "" }, { "docid": "025a0f39305db38b18ed73c0e2f5325e", "score": "0.51045877", "text": "func (_this *WakeLock) Active() bool {\n\tvar ret bool\n\tvalue := _this.Value_JS.Get(\"active\")\n\tret = (value).Bool()\n\treturn ret\n}", "title": "" }, { "docid": "82f1af2c4eeb706ce3959c5a9f975f43", "score": "0.5034763", "text": "func (p *PumpGPIO) IsOn() bool {\n\treturn p.relay.IsOn()\n}", "title": "" }, { "docid": "6392d294e0de5dfda79dca6ea001d3f0", "score": "0.49579906", "text": "func (p *physicalDevice) active() bool {\n\treturn util.FileExists(p.file)\n}", "title": "" }, { "docid": "c35b5db6c1003b8c5a03d3616b3284c2", "score": "0.49528795", "text": "func turnOnL7() { l7 = true }", "title": "" }, { "docid": "f767dae32908845249e5aa7932a279d0", "score": "0.49397892", "text": "func (p Pin) Set(high bool) {\n\tgroup, pin_in_group := p.getPinGrouping()\n\tif high {\n\t\tsam.PORT.GROUP[group].OUTSET.Set(1 << pin_in_group)\n\t} else {\n\t\tsam.PORT.GROUP[group].OUTCLR.Set(1 << pin_in_group)\n\t}\n}", "title": "" }, { "docid": "3a8c8111a15bbb8b8f2a1f437eadf6fa", "score": "0.4919398", "text": "func procPin() {\n}", "title": "" }, { "docid": "ba51851672263eb26ea660293cbbfb52", "score": "0.49160048", "text": "func (p LinuxPin) Read() (PinLevel, error) {\n\tlevel, err := p.pin.Read()\n\tif err != nil {\n\t\treturn Low, fmt.Errorf(\"Could not read from GPIO pin. Error: %v\", err)\n\t}\n\n\treturn PinLevel(level), nil\n}", "title": "" }, { "docid": "f2a7f3080d1955ca26b35f029bd779f1", "score": "0.49129283", "text": "func (_Room *RoomCaller) Active(opts *bind.CallOpts) (bool, error) {\n\tvar out []interface{}\n\terr := _Room.contract.Call(opts, &out, \"active\")\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "ff13135fb1d6e171d942918fc72b4d09", "score": "0.4883038", "text": "func (opts *WriteOptions) IsLowPri() bool {\n\treturn charToBool(C.rocksdb_writeoptions_get_low_pri(opts.c))\n}", "title": "" }, { "docid": "e8cc9ec7b2dc3574a93fdafe0bd52e9e", "score": "0.48501542", "text": "func (s *BaseSystem) Active() bool {\n\treturn s.active\n}", "title": "" }, { "docid": "6d4797447544259aee3ebcdd518054e3", "score": "0.4834584", "text": "func (_Unit_Interface *Unit_InterfaceCaller) Active(opts *bind.CallOpts) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _Unit_Interface.contract.Call(opts, out, \"active\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "8c93ba36dbdf4af7dc18a4442d2721a0", "score": "0.4812056", "text": "func Active(unit string) (bool, error) {\n\targs := []string{\"is-active\", unit}\n\tif err := exec.Command(\"systemctl\", args...).Run(); err != nil {\n\t\tswitch v := err.(type) {\n\t\tcase *exec.Error:\n\t\t\treturn false, fmt.Errorf(\"failed to run command %q: %s\", v.Name, v.Err)\n\t\tcase *exec.ExitError:\n\t\t\treturn false, nil\n\t\tdefault:\n\t\t\treturn false, err\n\t\t}\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "768bb4e8bc8580b8181558f30dd2e48b", "score": "0.48038158", "text": "func monitorPin(pin rpio.Pin, alertState rpio.State, shouldDebounce bool, coolDownPeriod time.Duration, state chan int, ctl chan int) {\n\tlastTrig := time.Now().Add(-coolDownPeriod)\n\n\tfor {\n\t\tselect {\n\t\tcase <-ctl:\n\t\t\tctl <- 0\n\t\t\treturn\n\t\tdefault:\n\t\t\tif debounce(shouldDebounce, coolDownPeriod, lastTrig) && pin.Read() == alertState {\n\t\t\t\tlastTrig = time.Now()\n\t\t\t\tstate <- 1\n\t\t\t}\n\n\t\t\t// Sample time is each 10ms\n\t\t\ttime.Sleep(10 * time.Millisecond)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7b65877f72f940d282d7ab462d2f7519", "score": "0.47803268", "text": "func (m *ServiceNowNotificationConfig) Active() *bool {\n\treturn m.activeField\n}", "title": "" }, { "docid": "832bf4cc300fb2db367d9b691531aec3", "score": "0.47720066", "text": "func (l *ZteDriver) State() bool {\n\treturn l.high\n}", "title": "" }, { "docid": "c38ae62afcbbea66e36c86188d270358", "score": "0.4765431", "text": "func (_Activatable *ActivatableCaller) Active(opts *bind.CallOpts) (bool, error) {\n\tvar out []interface{}\n\terr := _Activatable.contract.Call(opts, &out, \"active\")\n\n\tif err != nil {\n\t\treturn *new(bool), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(bool)).(*bool)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "29dee1df2658e8db358dca3d4a4deee3", "score": "0.4764175", "text": "func (p Pin) Get() bool {\n\tgroup, pin_in_group := p.getPinGrouping()\n\treturn (sam.PORT.GROUP[group].IN.Get()>>pin_in_group)&1 > 0\n}", "title": "" }, { "docid": "08938f65bf4fff8e20dabdf638346d73", "score": "0.476338", "text": "func (led *LED) On() {\n\tled.pin.High()\n}", "title": "" }, { "docid": "493d06a6040696a158488cae405decc2", "score": "0.473961", "text": "func On() bool {\n\treturn atomic.CompareAndSwapInt32(on, 1, 1)\n}", "title": "" }, { "docid": "9a55927ff375a8fec095ad94f96d5dff", "score": "0.47206122", "text": "func (pwm PWM) getPinCfg() uint8 {\n\treturn pwm.Pin.getPinCfg()\n}", "title": "" }, { "docid": "85859c4294781cec4935d429bc563686", "score": "0.4719226", "text": "func (b *MakeyButtonDriver) Pin() string { return b.pin }", "title": "" }, { "docid": "9d2a97f1e68ac6366c8640f09d5caf78", "score": "0.47139525", "text": "func (gpio *MMappedGPIO) SetState(state bool) error {\n\tmmapreg := getgpiommap()\n\tif state != gpio.activelow {\n\t\tmmapreg.memgpiochipreg[gpio.chipid][intgpio_setdataout_+(gpio.gpioid/8)] = 1 << (gpio.gpioid % 8)\n\t} else {\n\t\tmmapreg.memgpiochipreg[gpio.chipid][intgpio_cleardataout_+(gpio.gpioid/8)] = 1 << (gpio.gpioid % 8)\n\t}\n\n\t//sync / flush memory\n\t// _, _, errno := syscall.Syscall(syscall.SYS_MSYNC, *(*uintptr)(unsafe.Pointer(&mmapreg.memgpiochipreg[gpio.chipid])), uintptr(len(mmapreg.memgpiochipreg[gpio.chipid])), syscall.MS_SYNC)\n\t// if errno != 0 {\n\t// \treturn syscall.Errno(errno)\n\t// }\n\treturn nil\n}", "title": "" }, { "docid": "9de1d364e9fbdf1a392197101ed608a6", "score": "0.46907622", "text": "func (s QMStatus) ActiveQM() bool { return s == StatusActiveQM }", "title": "" }, { "docid": "5c9d304ea2ab77e696b68e8c58d3f809", "score": "0.46778727", "text": "func (ir *ReceiverDevice) pinChange(pin machine.Pin) {\n\t/* Currently TinyGo is sending machine.NoPin (0xff) for all pins, at least on RP2040\n\tif pin != ir.pin {\n\t\treturn // This is not the pin you're looking for\n\t}\n\t*/\n\tnow := time.Now()\n\tduration := now.Sub(ir.lastTime)\n\tir.lastTime = now\n\tswitch ir.necState {\n\tcase lead_pulse_start:\n\t\tif !ir.pin.Get() {\n\t\t\t// IR is 'on' (pin is pulled high and sent low when IR is received)\n\t\t\tir.necState = lead_space_start // move to next state\n\t\t}\n\tcase lead_space_start:\n\t\tif duration > time.Microsecond*9500 || duration < time.Microsecond*8500 {\n\t\t\t// Invalid interval for 9ms lead pulse. Reset\n\t\t\tir.resetStateMachine()\n\t\t} else {\n\t\t\t// 9ms lead pulse detected, move to next state\n\t\t\tir.necState = lead_space_end\n\t\t}\n\tcase lead_space_end:\n\t\tif duration > time.Microsecond*5000 || duration < time.Microsecond*1750 {\n\t\t\t// Invalid interval for 4.5ms lead space OR 2.25ms repeat space. Reset\n\t\t\tir.resetStateMachine()\n\t\t} else {\n\t\t\t// 4.5ms lead space OR 2.25ms repeat space detected\n\t\t\tif duration > time.Microsecond*3000 {\n\t\t\t\t// 4.5ms lead space detected, new code incoming, move to next state\n\t\t\t\tir.resetStateMachine()\n\t\t\t\tir.necState = bit_read_start\n\t\t\t} else {\n\t\t\t\t// 2.25ms repeat space detected.\n\t\t\t\tif ir.data.Code != 0 {\n\t\t\t\t\t// Valid repeat code. Invoke client callback with repeat flag set\n\t\t\t\t\tir.data.Flags |= DataFlagIsRepeat\n\t\t\t\t\tif ir.ch != nil {\n\t\t\t\t\t\tir.ch(ir.data)\n\t\t\t\t\t}\n\t\t\t\t\tir.necState = lead_pulse_start\n\t\t\t\t} else {\n\t\t\t\t\t// ir.data is not in a valid state for a repeat. Reset\n\t\t\t\t\tir.resetStateMachine()\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tcase bit_read_start:\n\t\tif duration > time.Microsecond*700 || duration < time.Microsecond*400 {\n\t\t\t// Invalid interval for 562.5µs pulse. Reset\n\t\t\tir.resetStateMachine()\n\t\t} else {\n\t\t\t// 562.5µs pulse detected, move to next state\n\t\t\tir.necState = bit_read_end\n\t\t}\n\tcase bit_read_end:\n\t\tif duration > time.Microsecond*1800 || duration < time.Microsecond*400 {\n\t\t\t// Invalid interval for 562.5µs space OR 1687.5µs space. Reset\n\t\t\tir.resetStateMachine()\n\t\t} else {\n\t\t\t// 562.5µs OR 1687.5µs space detected\n\t\t\tmask := uint32(1 << ir.bitIndex)\n\t\t\tif duration > time.Microsecond*1000 {\n\t\t\t\t// 1687.5µs space detected (logic 1) - Set bit\n\t\t\t\tir.data.Code |= mask\n\t\t\t} else {\n\t\t\t\t// 562.5µs space detected (logic 0) - Clear bit\n\t\t\t\tir.data.Code &^= mask\n\t\t\t}\n\n\t\t\tir.bitIndex++\n\t\t\tif ir.bitIndex > 31 {\n\t\t\t\t// We've read all bits for this code, move to next state\n\t\t\t\tir.necState = trail_pulse_end\n\t\t\t} else {\n\t\t\t\t// Read next bit\n\t\t\t\tir.necState = bit_read_start\n\t\t\t}\n\t\t}\n\tcase trail_pulse_end:\n\t\tif duration > time.Microsecond*700 || duration < time.Microsecond*400 {\n\t\t\t// Invalid interval for trailing 562.5µs pulse. Reset\n\t\t\tir.resetStateMachine()\n\t\t} else {\n\t\t\t// 562.5µs trailing pulse detected. Decode & validate data\n\t\t\terr := ir.decode()\n\t\t\tif err == irDecodeErrorNone {\n\t\t\t\t// Valid data, invoke client callback\n\t\t\t\tif ir.ch != nil {\n\t\t\t\t\tir.ch(ir.data)\n\t\t\t\t}\n\t\t\t\t// around we go again. Note: we don't resetStateMachine() since repeat codes are now possible\n\t\t\t\tir.necState = lead_pulse_start\n\t\t\t} else {\n\t\t\t\tir.resetStateMachine()\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "890b8b0fb4fc067b992884153aeba808", "score": "0.4671172", "text": "func (s *OpenRC) Active(svc string) bool {\n\t_, err := s.r.RunCmd(exec.Command(\"sudo\", \"service\", svc, \"status\"))\n\treturn err == nil\n}", "title": "" }, { "docid": "3f8fdac42f528d2bc49483d591e7b4fa", "score": "0.46641386", "text": "func (hs *Hotstreak) IsActive() bool {\n\tif hs == nil {\n\t\treturn false\n\t}\n\treturn hs.active\n}", "title": "" }, { "docid": "7b58a483ec97c6db54ea79bcf4dd7f32", "score": "0.46608886", "text": "func monitorPin5() error {\n\t// open memory space\n\tif err := rpio.Open(); err != nil {\n\t\treturn err\n\t}\n\n\tpin := rpio.Pin(3)\n\tpin.Input()\n\tpin.PullUp()\n\tpin.Detect(rpio.FallEdge)\n\n\tlog.Print(\"Starting monitoring of BCM03\")\n\n\tgo func() {\n\t\tdefer rpio.Close()\n\t\tvar detected bool\n\n\t\tfor !detected {\n\t\t\tdetected = pin.EdgeDetected()\n\t\t\ttime.Sleep(100 * time.Millisecond)\n\t\t}\n\n\t\tpin.Detect(rpio.NoEdge)\n\t\tpin.PullDown()\n\n\t\t// halt\n\t\tcmd := exec.Command(\"halt\")\n\t\tlog.Print(\"Stopping\")\n\t\tif err := cmd.Run(); err != nil {\n\t\t\tlog.Printf(\"failed to issue halt command: %s\", err.Error())\n\t\t}\n\t\tos.Exit(0)\n\t}()\n\n\treturn nil\n}", "title": "" }, { "docid": "f8ce9c8104a4ad33bbc074a99deb8fd9", "score": "0.46539512", "text": "func (l *ZteDriver) Pin() string { return l.pin }", "title": "" }, { "docid": "e6d29db0dc1dba8bd36be50c568b9ad2", "score": "0.46527684", "text": "func (m *SlackNotificationConfig) Active() *bool {\n\treturn m.activeField\n}", "title": "" }, { "docid": "8e3a1613cc45aa9a9e82ca7d46189efd", "score": "0.46513835", "text": "func (s HassState) IsON() bool {\n\treturn strings.ToLower(s.State) == strings.ToLower(StateON)\n}", "title": "" }, { "docid": "80341db9ecd623c19e4c02a3b0090919", "score": "0.46429235", "text": "func (p Pin) Toggle() {\n\tgroup, pin_in_group := p.getPinGrouping()\n\tsam.PORT.GROUP[group].OUTTGL.Set(1 << pin_in_group)\n}", "title": "" }, { "docid": "f5da0b3bd61278fd348065c132a50007", "score": "0.463966", "text": "func (c *cpu) shouldWakeFromLowPowerMode() bool {\n\tinterruptEnabled := c.Memory.Read8(0xFFFF)\n\tinterruptPending := c.Memory.Read8(0xFF0F)\n\n\treturn (interruptEnabled & interruptPending) > 0\n}", "title": "" }, { "docid": "f74d1b45cd9f018534e726c4a356b889", "score": "0.4639149", "text": "func (mb *monitorBase) IsActivated() bool {\n\treturn mb.activated\n}", "title": "" }, { "docid": "9f970b256905a606a90fbd60fb551034", "score": "0.46382675", "text": "func (cons *SimpleConsumer) IsActive() bool {\n\treturn cons.GetState() <= PluginStatePrepareStop\n}", "title": "" }, { "docid": "bb5ac3fd68813256f3cfcb28448a5054", "score": "0.4637081", "text": "func (outputPin *OutputPinDummy) Enable() error {\n\tnextError := outputPin.NextEnableError\n\tif nextError != nil {\n\t\toutputPin.NextEnableError = nil\n\t\treturn nextError\n\t}\n\n\toutputPin.Value = true\n\treturn nil\n}", "title": "" }, { "docid": "1dd37d3423534bbadd992c48d7c0dcd0", "score": "0.46076563", "text": "func (w *Watcher) IsInActive() bool {\n\tt, err := w.TimeSinceLastInput()\n\tif err != nil {\n\t\treturn true\n\t}\n\treturn t > w.activeThreshold\n}", "title": "" }, { "docid": "e4b67867ea4ae98c41120a2c3845ead5", "score": "0.46031812", "text": "func gpioGet(name string) (bool, error) {\n\tpin, found := gpio.Pins[name]\n\tif !found {\n\t\treturn false, fmt.Errorf(\"%s: not found\")\n\t}\n\treturn pin.Value()\n}", "title": "" }, { "docid": "176daf34e5d81d0d2f6a9be646010b8d", "score": "0.4601691", "text": "func (ps *Jitter) IsActive() bool {\n\treturn ps.localConfig.Config.UtilsConf.ServicesSignal.Jitter == \"active\"\n}", "title": "" }, { "docid": "b87f22106330c3395145dcaed57a9d5c", "score": "0.45876095", "text": "func (m *WebHookNotificationConfig) Active() *bool {\n\treturn m.activeField\n}", "title": "" }, { "docid": "a1869fae2f45e6f396c09d21999ed7b9", "score": "0.4584286", "text": "func (m MonitorsInfo) InPrimaryRegion(x int) bool {\n\treturn x <= m.primary.Width()\n}", "title": "" }, { "docid": "a3fb8a5702ec4ba629fbfa124053b980", "score": "0.45841125", "text": "func (b *Board) Active(c Coord) bool {\n\tif active, ok := b.grid[c.Pack()]; ok {\n\t\treturn active\n\t}\n\treturn false\n}", "title": "" }, { "docid": "b9fe28bdee66df4a119100336002c2d8", "score": "0.45651838", "text": "func Invert(line int, invert bool) {\n\tvar active_low string\n\tif invert {\n\t\tactive_low = \"1\"\n\t} else {\n\t\tactive_low = \"0\"\n\t}\n\tshell(\"echo \" + active_low + \" >/sys/class/gpio/gpio\" + strconv.Itoa(line) + \"/active_low\")\n}", "title": "" }, { "docid": "c38baf31e96b7e24eb5ffb0a303decb7", "score": "0.45631465", "text": "func (w *Watcher) IsActive() bool {\n\tt, err := w.TimeSinceLastInput()\n\tif err != nil {\n\t\treturn false\n\t}\n\treturn t < w.activeThreshold\n}", "title": "" }, { "docid": "d6f8dce94832c1d302cc5ba661b39bf4", "score": "0.45576575", "text": "func (pwm PWM) setPinCfg(val uint8) {\n\tpwm.Pin.setPinCfg(val)\n}", "title": "" }, { "docid": "60fc8689998bd79ada1928cbf72b385d", "score": "0.45493406", "text": "func (self *Pointer) Active() bool{\n return self.Object.Get(\"active\").Bool()\n}", "title": "" }, { "docid": "61f6457ff9b0b9b3d5286a48ace473e5", "score": "0.45484373", "text": "func (me TxsdPhysicalVerificationCredentialLevel) IsPrimary() bool { return me.String() == \"primary\" }", "title": "" }, { "docid": "ba7248907859fe42c1b4dbde84486b31", "score": "0.45365056", "text": "func (m *Windows10EndpointProtectionConfiguration) GetDefenderEnableLowCpuPriority()(*bool) {\n val, err := m.GetBackingStore().Get(\"defenderEnableLowCpuPriority\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "title": "" }, { "docid": "d2403559ea0d9c0e0bafa68cc1d14b5e", "score": "0.45180306", "text": "func signal(pin int) {\n\n\tsignalPin, err := embd.NewDigitalPin(pin)\n\tif err = signalPin.SetDirection(embd.Out); err != nil {\n\t\tpanic(err)\n\t}\n\tif err = signalPin.Write(embd.Low); err != nil {\n\t\tpanic(err)\n\t}\n\tif err := signalPin.Write(embd.High); err != nil {\n\t\tpanic(err)\n\t}\n\ttime.Sleep(300 * time.Millisecond)\n\tif err := signalPin.Write(embd.Low); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d60fd9e9032833854ad42538e7ae60db", "score": "0.4511874", "text": "func (s *Systemd) Active(svc string) bool {\n\t_, err := s.r.RunCmd(exec.Command(\"sudo\", \"systemctl\", \"is-active\", \"--quiet\", \"service\", svc))\n\treturn err == nil\n}", "title": "" }, { "docid": "3776c354d50d87f6214198a611b74cc6", "score": "0.45036224", "text": "func (b *BitmapReader) Set() bool {\n\treturn (b.current & (1 << b.bitOffset)) != 0\n}", "title": "" }, { "docid": "4773f1b5d232f913afa3881ddfb30dad", "score": "0.45030063", "text": "func Lock(engaged bool) {\n\tLockEngaged = engaged\n\tif engaged {\t// Lock\n\t\tlockPin.Low()\n\t} else {\t\t// Unlock\n\t\tlockPin.High()\n\t}\n}", "title": "" }, { "docid": "00ac867026296d0343726d20476bbb4e", "score": "0.44986612", "text": "func IsOn() bool {\n\tif C.ison() == 1 {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "297893beaf47a6411f9a45e7b3edb0fd", "score": "0.44983637", "text": "func (s *Switch) get() bool {\n\ts.Mtx.RLock()\n\tdefer s.Mtx.RUnlock()\n\n\treturn s.State\n}", "title": "" }, { "docid": "016645198e8bb28fc11afa603c0936de", "score": "0.4493912", "text": "func (f Bitfield) IsOn(b int) bool {\n\ti := b / BitsPerField\n\ts := uint16(b) % BitsPerField\n\tif (f[i] & (1 << s)) == 0 {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "6b3e67d9fa231b3e3eece28802909377", "score": "0.4480345", "text": "func (hom HeatOMatic) IsOn() bool {\n\tvar b bool\n\n\treturn b\n}", "title": "" }, { "docid": "90d32d1be53bd80d5e1512368abaa201", "score": "0.4468922", "text": "func (node *BinarySensor) IsActiveV2(sensorType uint8) (bool, error) {\n\tvar response *ApplicationCommandData\n\tvar err error\n\n\tfilter := func(response *ApplicationCommandData) bool {\n\t\treturn len(response.Command.Data) > 1 && response.Command.Data[1] == sensorType\n\t}\n\n\tif response, err = node.zwSendDataWaitForResponse(\n\t\tCommandClassBinarySensor, []uint8{binarySensorCommandGet, sensorType},\n\t\tbinarySensorCommandReport, filter); err != nil {\n\t\treturn false, err\n\t}\n\n\tisActive, _, err := node.ParseReport(response)\n\treturn isActive, err\n}", "title": "" }, { "docid": "dca9f96443dbef5ab22ed14c0d56d6d1", "score": "0.44616005", "text": "func (a Keeper) IsActive(ctx sdk.Context, txID txtypes.TxID) (bool, error) {\n\t// TODO add timeout support to initiator?\n\t_, found := a.getTxState(ctx, txID)\n\tif !found {\n\t\treturn false, nil\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "b0baa267b104253e63b60da6f687a121", "score": "0.4456921", "text": "func findPinPadMapping(sercom uint8, pin Pin) (pinMode PinMode, pad uint32, ok bool) {\n\tbytes := pinPadMapping[pin/2]\n\tupper := byte(bytes >> 8)\n\tlower := byte(bytes & 0xff)\n\n\tif upper != 0 {\n\t\t// SERCOM\n\t\tif (upper>>4)-1 == sercom {\n\t\t\tpinMode = PinSERCOM\n\t\t\tpad |= uint32(upper % 4)\n\t\t\tok = true\n\t\t}\n\t}\n\tif lower != 0 {\n\t\t// SERCOM-ALT\n\t\tif (lower>>4)-1 == sercom {\n\t\t\tpinMode = PinSERCOMAlt\n\t\t\tpad |= uint32(lower % 4)\n\t\t\tok = true\n\t\t}\n\t}\n\n\tif ok {\n\t\t// If the pin is uneven, toggle the lowest bit of the pad number.\n\t\tif pin&1 != 0 {\n\t\t\tpad ^= 1\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7d5e14d475f456ae2692e2c42f4aee55", "score": "0.44454545", "text": "func (*OpenconfigSystem_System_Cpus_Cpu_State_Idle) IsYANGGoStruct() {}", "title": "" }, { "docid": "cb3d61f9ea9024500aa7aaa6f8d355e7", "score": "0.44306448", "text": "func (m MonitorsInfo) IsDualSetup() bool {\n\treturn m.dual\n}", "title": "" }, { "docid": "ce282502dc28d5bc7b896905060cf237", "score": "0.44304177", "text": "func isActiveModule(module android.Module) bool {\n\tif !module.Enabled() {\n\t\treturn false\n\t}\n\treturn android.IsModulePreferred(module)\n}", "title": "" }, { "docid": "7aa72cbe5f7991417678b1515983e7e6", "score": "0.44276035", "text": "func (d *BMP280Driver) Pressure() (press float32, err error) {\n\td.mutex.Lock()\n\tdefer d.mutex.Unlock()\n\n\tvar rawT, rawP int32\n\tif rawT, err = d.rawTemp(); err != nil {\n\t\treturn 0.0, err\n\t}\n\n\tif rawP, err = d.rawPressure(); err != nil {\n\t\treturn 0.0, err\n\t}\n\t_, tFine := d.calculateTemp(rawT)\n\treturn d.calculatePress(rawP, tFine), nil\n}", "title": "" }, { "docid": "a3b5e54f8078248fccdc71c11c7325c2", "score": "0.4416454", "text": "func (outputPin *OutputPinDummy) Enable() error {\n\tlog.Println(\"Return Error on 'OutputPin.Enable' (y/n)\")\n\tscanner := bufio.NewScanner(os.Stdin)\n\tif !scanner.Scan() {\n\t\tscanErr := scanner.Err()\n\t\tpanic(scanErr)\n\t}\n\n\tif strings.EqualFold(scanner.Text(), \"y\") {\n\t\treturn fmt.Errorf(\"error enabling output pin %d\", outputPin.port)\n\t}\n\n\toutputPin.Value = true\n\treturn nil\n}", "title": "" }, { "docid": "55cfc3c6ad9cbdbc4e1750dd76391723", "score": "0.4409399", "text": "func (mp *MessageProcessor) IsActive() bool {\n\treturn mp.active\n}", "title": "" }, { "docid": "4b49840998125287069d77dc245dafbb", "score": "0.44046772", "text": "func (i *IDrac9) IsOn() (status bool, err error) {\n\toutput, err := i.sshClient.Run(\"racadm serveraction powerstatus\")\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"output: %q: %w\", output, err)\n\t}\n\n\tif strings.Contains(output, \"Server power status: ON\") {\n\t\treturn true, nil\n\t}\n\n\tif strings.Contains(output, \"Server power status: OFF\") {\n\t\treturn false, nil\n\t}\n\n\treturn status, fmt.Errorf(output)\n}", "title": "" }, { "docid": "4677ee318fee725e452c0431d53a2cac", "score": "0.44015542", "text": "func (o *UpdateBoundDeviceRequest) GetActive() bool {\n\tif o == nil || o.Active == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Active\n}", "title": "" }, { "docid": "2a8761b535850af24552f2bf9e741403", "score": "0.43948644", "text": "func (inputPin *InputPinDummy) GetValue() (bool, error) {\n\tnextError := inputPin.NextGetValueError\n\tif nextError != nil {\n\t\tinputPin.NextGetValueError = nil\n\t\treturn false, nextError\n\t}\n\n\treturn inputPin.Value, nil\n}", "title": "" }, { "docid": "2d93927dd4e199cdbe478ea8d8d0b564", "score": "0.4393712", "text": "func (r *CRIO) Active() bool {\n\treturn r.Init.Active(\"crio\")\n}", "title": "" }, { "docid": "5fbc640d9b980dc8bd72df7f6d41fa60", "score": "0.43844756", "text": "func (p *PWM) Set(pin int, value int) error {\n\toff := int(float32(value) * 40.96)\n\tp.values[pin] = off\n\treturn p.conn.SetPwm(pin, 0, off)\n}", "title": "" }, { "docid": "b2ca4c97c733b65d3613e56585b852b6", "score": "0.43811536", "text": "func (wb *KSE) Enabled() (bool, error) {\n\tb, err := wb.conn.ReadHoldingRegisters(kseRegSetMaxCurrent, 1)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\tcur := binary.BigEndian.Uint16(b)\n\n\treturn cur != 0, nil\n}", "title": "" }, { "docid": "faea7c54ea787327260ec657c11fe691", "score": "0.43776137", "text": "func (r *SDRFullSensor) IsThresholdBaseSensor() bool {\n\treturn r.EventReadingType == 0x01\n}", "title": "" }, { "docid": "5fa44b645c3d305915b1bfd001ad6a21", "score": "0.4372431", "text": "func ReadPin(pin uint) int {\n\treturn gpio_read(pi, pin)\n}", "title": "" }, { "docid": "2b4bdc29dd604f043a8f94496b4099e6", "score": "0.43668592", "text": "func lowbit(x int) int {\n\treturn x & -x\n}", "title": "" }, { "docid": "84b888ffa8fd2a02e9c760d861607c8a", "score": "0.4366298", "text": "func (o BackupConfigurationOutput) PointInTimeRecoveryEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v BackupConfiguration) *bool { return v.PointInTimeRecoveryEnabled }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "3a55f6070358ec21949be43714716063", "score": "0.43646595", "text": "func (m *ServiceNowNotificationConfig) SetActive(val *bool) {\n\tm.activeField = val\n}", "title": "" }, { "docid": "2868bae93e3ee9a5154236830172da97", "score": "0.43613118", "text": "func wantPress(fsm *FSM, m *terminalapi.Mouse) (bool, State, stateFn) {\n\tif m.Button != fsm.button || !m.Position.In(fsm.area) {\n\t\treturn false, Up, wantPress\n\t}\n\treturn false, Down, wantRelease\n}", "title": "" }, { "docid": "816f65bdc1287d21aa79d38eb7ae467b", "score": "0.43559805", "text": "func (cpu *CPU) C() bool {\n\treturn cpu.AF.HiLo()>>4&1 == 1\n}", "title": "" }, { "docid": "ba745d8c341da42a0813e92230d2bf2b", "score": "0.4353857", "text": "func (_Unit_Interface *Unit_InterfaceCallerSession) Active() (bool, error) {\n\treturn _Unit_Interface.Contract.Active(&_Unit_Interface.CallOpts)\n}", "title": "" }, { "docid": "483eab3eff9606f46be968704f7f6cbc", "score": "0.43524414", "text": "func (wb *wbec) Enabled() (bool, error) {\n\tif wb.current != 0 {\n\t\treturn true, nil\n\t} \n\treturn false, nil\n}", "title": "" }, { "docid": "1dae7caff694d0feed771c4402a722af", "score": "0.43515807", "text": "func (wb *Vestel) Enabled() (bool, error) {\n\tb, err := wb.conn.ReadHoldingRegisters(vestelRegMaxCurrent, 1)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\treturn binary.BigEndian.Uint16(b) > 0, nil\n}", "title": "" }, { "docid": "39d32d1fea28a7fe21c4f3aaaf0255a9", "score": "0.43507507", "text": "func (sw *SW420) Detected() bool {\n\treturn sw.pin.Read() == rpio.High\n}", "title": "" }, { "docid": "2475a6b4086b78076001696cc4c8665b", "score": "0.43484333", "text": "func (c *Computer) defineSoftSwitches() {\n\tc.MapRange(0x0, 0x200, zeroPageRead, zeroPageWrite)\n\tc.MapRange(0x0400, 0x0800, displayRead, displayWrite)\n\tc.MapRange(0x2000, 0x4000, displayRead, displayWrite)\n\tc.MapRange(0xC100, 0xD000, pcRead, pcWrite)\n\tc.MapRange(0xD000, 0x10000, bankRead, bankWrite)\n\n\tmsc := newMemorySwitchCheck()\n\tc.RMap[0xC013] = msc.IsSetter(MemReadAux)\n\tc.RMap[0xC014] = msc.IsSetter(MemWriteAux)\n\tc.RMap[0xC018] = msc.IsSetter(Mem80Store)\n\tc.RMap[0xC01C] = msc.IsSetter(MemPage2)\n\tc.RMap[0xC01D] = msc.IsSetter(MemHires)\n\tc.RMap[0xC054] = msc.UnSetterR(MemPage2)\n\tc.RMap[0xC055] = msc.ReSetterR(MemPage2)\n\tc.RMap[0xC056] = msc.UnSetterR(MemHires)\n\tc.RMap[0xC057] = msc.ReSetterR(MemHires)\n\tc.WMap[0xC000] = msc.UnSetterW(Mem80Store)\n\tc.WMap[0xC001] = msc.ReSetterW(Mem80Store)\n\tc.WMap[0xC002] = msc.UnSetterW(MemReadAux)\n\tc.WMap[0xC003] = msc.ReSetterW(MemReadAux)\n\tc.WMap[0xC004] = msc.UnSetterW(MemWriteAux)\n\tc.WMap[0xC005] = msc.ReSetterW(MemWriteAux)\n\tc.WMap[0xC054] = msc.UnSetterW(MemPage2)\n\tc.WMap[0xC055] = msc.ReSetterW(MemPage2)\n\tc.WMap[0xC056] = msc.UnSetterW(MemHires)\n\tc.WMap[0xC057] = msc.ReSetterW(MemHires)\n\n\tbsc := newBankSwitchCheck()\n\tc.RMap[0xC080] = bsc.SetterR(BankRAM | BankRAM2)\n\tc.RMap[0xC081] = bsc.SetterR(BankWrite | BankRAM2)\n\tc.RMap[0xC082] = bsc.SetterR(BankRAM2)\n\tc.RMap[0xC083] = bsc.SetterR(BankRAM | BankWrite | BankRAM2)\n\tc.RMap[0xC088] = bsc.SetterR(BankRAM)\n\tc.RMap[0xC089] = bsc.SetterR(BankWrite)\n\tc.RMap[0xC08A] = bsc.SetterR(BankDefault)\n\tc.RMap[0xC08B] = bsc.SetterR(BankRAM | BankWrite)\n\tc.RMap[0xC011] = bsc.IsSetter(BankRAM2)\n\tc.RMap[0xC012] = bsc.IsSetter(BankRAM)\n\tc.RMap[0xC016] = bsc.IsSetter(BankAuxiliary)\n\tc.WMap[0xC008] = bsc.UnSetterW(BankAuxiliary)\n\tc.WMap[0xC009] = bsc.ReSetterW(BankAuxiliary)\n\n\tpsc := newPCSwitchCheck()\n\tc.RMap[0xC015] = psc.IsSetter(PCSlotCxROM)\n\tc.RMap[0xC017] = psc.IsSetter(PCSlotC3ROM)\n\tc.WMap[0xC006] = psc.ReSetterW(PCSlotCxROM)\n\tc.WMap[0xC007] = psc.UnSetterW(PCSlotCxROM)\n\tc.WMap[0xC00A] = psc.UnSetterW(PCSlotC3ROM)\n\tc.WMap[0xC00B] = psc.ReSetterW(PCSlotC3ROM)\n\n\tdsc := newDisplaySwitchCheck()\n\tc.RMap[0xC01A] = dsc.IsSetter(DisplayText)\n\tc.RMap[0xC01B] = dsc.IsSetter(DisplayMixed)\n\tc.RMap[0xC01E] = dsc.IsSetter(DisplayAltCharset)\n\tc.RMap[0xC01F] = dsc.IsSetter(Display80Col)\n\tc.RMap[0xC050] = dsc.UnSetterR(DisplayText)\n\tc.RMap[0xC051] = dsc.ReSetterR(DisplayText)\n\tc.RMap[0xC052] = dsc.UnSetterR(DisplayMixed)\n\tc.RMap[0xC053] = dsc.ReSetterR(DisplayMixed)\n\t// Technically DHires should only be reset/unset if IOU is set; I'm\n\t// not sure if this is necessary in practice.\n\tc.RMap[0xC05E] = dsc.ReSetterR(DisplayDHires)\n\tc.RMap[0xC05F] = dsc.UnSetterR(DisplayDHires)\n\t// --\n\tc.RMap[0xC07E] = dsc.IsSetter(DisplayIOU)\n\tc.RMap[0xC07F] = dsc.IsSetter(DisplayDHires)\n\tc.WMap[0xC00C] = dsc.UnSetterW(Display80Col)\n\tc.WMap[0xC00D] = dsc.ReSetterW(Display80Col)\n\tc.WMap[0xC00E] = dsc.UnSetterW(DisplayAltCharset)\n\tc.WMap[0xC00F] = dsc.ReSetterW(DisplayAltCharset)\n\tc.WMap[0xC050] = dsc.UnSetterW(DisplayText)\n\tc.WMap[0xC051] = dsc.ReSetterW(DisplayText)\n\tc.WMap[0xC052] = dsc.UnSetterW(DisplayMixed)\n\tc.WMap[0xC053] = dsc.ReSetterW(DisplayMixed)\n\tc.WMap[0xC05E] = dsc.ReSetterW(DisplayDHires)\n\tc.WMap[0xC05F] = dsc.UnSetterW(DisplayDHires)\n\tc.WMap[0xC07E] = dsc.ReSetterW(DisplayIOU)\n\tc.WMap[0xC07F] = dsc.UnSetterW(DisplayIOU)\n}", "title": "" }, { "docid": "a538bdf63bc964b1343710aefe797dc5", "score": "0.4348259", "text": "func (h *Handle) SetMonitorMode(monitor bool) error {\n var rfmon_int C.int\n\n if monitor {\n rfmon_int = 1\n } else {\n rfmon_int = 0\n }\n\n err := C.pcap_set_rfmon(h.pcap, rfmon_int)\n if err < 0 {\n return fmt.Errorf(\"Handle already active\")\n }\n\n return nil\n}", "title": "" }, { "docid": "21f55bc6a3f456b3d900c4439e7d6fe5", "score": "0.43414804", "text": "func (wb *PhoenixEMEth) Enabled() (bool, error) {\n\tb, err := wb.conn.ReadCoils(phxEMEthRegEnable, 1)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\treturn b[0] == 1, nil\n}", "title": "" }, { "docid": "a5880c4fa8464811198791f6ff258f78", "score": "0.4331604", "text": "func (s *SensorStateArg) IsOpen() bool {\n\tif ret, ok := s.args[\"open\"].(bool); ok {\n\t\treturn ret\n\t}\n\treturn false\n}", "title": "" }, { "docid": "b3479cdfe79d786f95551128a67bc50b", "score": "0.43219274", "text": "func (s *SensorConfigArg) IsOn() bool {\n\tif ret, ok := s.args[\"on\"].(bool); ok {\n\t\treturn ret\n\t}\n\treturn false\n}", "title": "" }, { "docid": "a1d40f8f5ea240a911e4d3419445d171", "score": "0.4321279", "text": "func (l *ZteDriver) Off() (err error) {\n\tif err = l.connection.DigitalWrite(l.Pin(), 0); err != nil {\n\t\treturn\n\t}\n\tl.high = false\n\treturn\n}", "title": "" }, { "docid": "788634f40c02a76f74a7c83a80ca7272", "score": "0.43174872", "text": "func (m *WebHookNotificationConfig) SetActive(val *bool) {\n\tm.activeField = val\n}", "title": "" } ]
0cdd8bc40fe5046b7249e98899a74974
Refresh causes this object to be redrawn in it's current state
[ { "docid": "0ddb4b25eeb5cdf05bb5eea8f24dceb2", "score": "0.7389192", "text": "func (l *Line) Refresh() {\n\tRefresh(l)\n}", "title": "" } ]
[ { "docid": "a22bde3b7b4387f62a4f53c586c65eab", "score": "0.73626226", "text": "func (p *Panel) Refresh() {\n\tp.sendData(nil, nil, true)\n}", "title": "" }, { "docid": "2a348c5aac1b3cb8ded5217a5667fe08", "score": "0.735691", "text": "func (r *mapRender) Refresh() {\n\tr.dirty = true\n\tcanvas.Refresh(r.render)\n}", "title": "" }, { "docid": "45652b65c4831348c35261bfb42a0e53", "score": "0.7190996", "text": "func (r *mapEditorRender) Refresh() {\n\tcanvas.Refresh(r.render)\n}", "title": "" }, { "docid": "61c5f72ba70a88780de01a3358ee9531", "score": "0.71294135", "text": "func (g *RadialGradient) Refresh() {\n\tRefresh(g)\n}", "title": "" }, { "docid": "905a5a34dca1eb7608994c541c791bee", "score": "0.7082338", "text": "func (r *spinnerRenderer) Refresh() {\n\tr.s.Refresh()\n}", "title": "" }, { "docid": "7f6495e33b8beb710f522de95b24751f", "score": "0.6863439", "text": "func (c *Connection) Refresh() {\n\tupdateDefaultConnection(c)\n}", "title": "" }, { "docid": "99660fb305773558c7753928bc2c4668", "score": "0.6838729", "text": "func (t *Table) Refresh() {\n\t// BOZO!! Really want to tell model reload now. Refactor!\n\tt.Update(t.model.Peek())\n}", "title": "" }, { "docid": "47fe9ba8992bbf03e787e037550919bf", "score": "0.67989427", "text": "func (g *LinearGradient) Refresh() {\n\tRefresh(g)\n}", "title": "" }, { "docid": "30476b2041dcc8915c0b134cbc675c2f", "score": "0.67710125", "text": "func (widget *OutputWidget) Refresh(g *gocui.Gui) (*gocui.View, error) {\n\treturn widget.Layout(g, widget.X, widget.Y, widget.W, widget.H)\n}", "title": "" }, { "docid": "94748a98395b18be79ebb7e903cc0c48", "score": "0.67593145", "text": "func (h *HatcherySwarm) Refresh() error {\n\treturn nil\n}", "title": "" }, { "docid": "b7ebd939054470f62fdfcc7c79642b7e", "score": "0.67563313", "text": "func (b *BaseContainer) Refresh() {\n\t// get dimensions\n\td := b.Dimensions()\n\tw := d.X\n\th := d.Y\n\n\t// create canvas printer\n\tp := draw.BlankPrinter(w, h)\n\tp.Bg = b.style.Colors.Bg\n\tp.Fg = b.style.Colors.Fg\n\tp.Fill(' ')\n\n\t// draw border\n\tif b.style.Border.Size > 0 {\n\t\tp.Bg = b.style.Border.Colors.Bg\n\t\tp.Fg = b.style.Border.Colors.Fg\n\n\t\t// print border\n\t\tp.Write(0, 0, \"╔\")\n\t\tp.Write(w-1, 0, \"╗\")\n\t\tp.Write(0, h-1, \"╚\")\n\t\tp.Write(w-1, h-1, \"╝\")\n\t\tp.Write(1, 0, strings.Repeat(\"═\", w-2))\n\t\tp.Write(1, h-1, strings.Repeat(\"═\", w-2))\n\t\tp.WriteHorizontalDown(0, 1, strings.Repeat(\"║\", h-2))\n\t\tp.WriteHorizontalDown(w-1, 1, strings.Repeat(\"║\", h-2))\n\t}\n\n\t// draw all components\n\toffsetX := b.style.Padding.Left + b.style.Border.Size\n\toffsetY := b.style.Padding.Top + b.style.Border.Size\n\tfor _, c := range b.components {\n\t\t// potential first time redraw of this component\n\t\tif c.Canvas() == nil {\n\t\t\tc.Refresh()\n\t\t}\n\t\tp.Draw(c.Position().X+offsetX, c.Position().Y+offsetY, c.Canvas())\n\t}\n\n\t// change canvas\n\tb.SetCanvas(p.Canvas)\n}", "title": "" }, { "docid": "1239560d4201a03d982eb50e52b2c610", "score": "0.67183954", "text": "func (w *ListWidget) Refresh() {\n\n\tif w.isRefreshing {\n\t\t// already refreshing!\n\t\treturn\n\t}\n\tw.refreshLock.Lock()\n\tif w.isRefreshing {\n\t\treturn\n\t}\n\t// Mark refresh as in-progress and disable UI update\n\tw.isRefreshing = true\n\tw.SetShouldRender(false)\n\n\tcurrentExpandedItem := w.CurrentExpandedItem()\n\tcurrentSelection := w.CurrentSelection()\n\tdone := w.statusView.Status(\"Refreshing\", true)\n\n\t// capture current state\n\tsorted := false\n\tfilterString := \"\"\n\tif w.currentPage != nil {\n\t\tif w.currentPage.Sorted {\n\t\t\tsorted = true\n\t\t}\n\t\tif w.currentPage.FilterString != \"\" {\n\t\t\tfilterString = w.currentPage.FilterString\n\t\t\tw.ClearFilter() // clear filter so that `GoBack` actually navigates back\n\t\t}\n\t}\n\n\tw.GoBack()\n\tw.expandItem(currentExpandedItem)\n\n\t// wait for navigation before resetting previous selection\n\tgo func() {\n\t\tdefer errorhandling.RecoveryWithCleanup()\n\t\tnavigatedChannel := eventing.SubscribeToTopic(\"list.navigated\")\n\t\t<-navigatedChannel\n\t\teventing.Unsubscribe(navigatedChannel)\n\n\t\tw.ChangeSelection(currentSelection)\n\n\t\tw.ClearFilter()\n\n\t\t// reapply state\n\t\tif sorted {\n\t\t\tw.SortItems()\n\t\t}\n\t\tif filterString != \"\" {\n\t\t\tw.SetFilter(filterString)\n\t\t}\n\n\t\t// Clear isRefreshing and re-enable UI updates\n\t\tw.SetShouldRender(true)\n\t\tw.isRefreshing = false\n\t\tw.refreshLock.Unlock()\n\t\tdone()\n\t}()\n}", "title": "" }, { "docid": "654e8c5c0db3d059f8b137438c3a05b4", "score": "0.666807", "text": "func (m *Module) Refresh() {\n\tm.notifyFn()\n}", "title": "" }, { "docid": "12b2a3db062b1171ba43b46fe22d98f0", "score": "0.6644714", "text": "func (kb *KBState) Refresh() {\n\tfor i, v := range kb.state {\n\t\tkb.state1[i] = v\n\t}\n\tkb.state = sdl.GetKeyboardState()\n}", "title": "" }, { "docid": "b1776061e7338c26b75b28379c469cf7", "score": "0.6521962", "text": "func (b *Button) Refresh() {\n\tp := draw.BlankPrinter(len([]rune(b.Text)), 1)\n\tp.Fg = b.Colors.Standard.Fg\n\tp.Bg = b.Colors.Standard.Bg\n\tif b.focus {\n\t\tp.Fg = b.Colors.Focus.Fg\n\t\tp.Bg = b.Colors.Focus.Bg\n\t}\n\tp.Write(0, 0, b.Text)\n\tb.highlightActionKey(p.Canvas)\n\tb.SetCanvas(p.Canvas)\n}", "title": "" }, { "docid": "a87b25d610bc522327fe85c4dab26009", "score": "0.6502494", "text": "func (c *Canvas) Draw() {\n\tc.refresh = true\n}", "title": "" }, { "docid": "72593e054b42ff8dfb853f49d22e431a", "score": "0.64865655", "text": "func (b *MenuBar) Refresh() {\n\tb.refresh(b)\n}", "title": "" }, { "docid": "e88f31fb5b0cb31a22aef80e2114fa5d", "score": "0.64446014", "text": "func (m *CoreOSMachine) Refresh() {\n\tm.RLock()\n\tcs := m.currentState()\n\tm.RUnlock()\n\tif cs == nil {\n\t\tlog.Warning(\"Unable to refresh machine state\")\n\t} else {\n\t\tm.Lock()\n\t\tm.dynamicState = cs\n\t\tm.Unlock()\n\t}\n}", "title": "" }, { "docid": "9fee5d96fa02facf4925ba30e7f8afb7", "score": "0.6426535", "text": "func (dd *DeviceDetail) Refresh(client bridge.BridgeServiceClient, device *bridge.Device) {\n\tdd.app.QueueUpdateDraw(func() {\n\t\tdd.devicesClient = client\n\t\tdd.device = device\n\n\t\tdd.SetTitle(dd.device.Config.Name)\n\t\tif dd.device.State.Binary != nil {\n\t\t\tdd.isOnCheckbox.SetChecked(dd.device.State.Binary.IsOn)\n\t\t} else {\n\t\t\tdd.isOnCheckbox.SetChecked(false)\n\t\t}\n\t\tdd.descriptionText.SetText(dd.device.Config.Description)\n\n\t\t// TODO: do not allow/show values for fields that aren't supported.\n\t\tif dd.device.State.Range != nil {\n\t\t\tdd.levelInput.SetText(fmt.Sprintf(\"%2d\", dd.device.State.Range.Value))\n\t\t} else if dd.device.State.Audio != nil {\n\t\t\tdd.levelInput.SetText(fmt.Sprintf(\"%2d\", dd.device.State.Audio.Volume))\n\t\t}\n\t\tif dd.device.State.ColorRgb != nil {\n\t\t\tdd.redInput.SetText(fmt.Sprintf(\"%3d\", dd.device.State.ColorRgb.Red))\n\t\t\tdd.greenInput.SetText(fmt.Sprintf(\"%3d\", dd.device.State.ColorRgb.Green))\n\t\t\tdd.blueInput.SetText(fmt.Sprintf(\"%3d\", dd.device.State.ColorRgb.Blue))\n\t\t}\n\t})\n}", "title": "" }, { "docid": "88953d810cffd620d70fb08f0dd1babb", "score": "0.63961565", "text": "func (u *User) Refresh() {\n\tu.LastHit = time.Now().Unix()\n}", "title": "" }, { "docid": "47e52a70c9e1b8c3f855b7ee951c7b24", "score": "0.633439", "text": "func (m *McmManager) Refresh() error {\n\treturn nil\n}", "title": "" }, { "docid": "de02e0c40a1b648d4a48d8c6b4416a05", "score": "0.6307017", "text": "func (s *Selector) redraw() {\n\ts.fill = NewRectangle(s.position, s.position.Add(pixel.V(s.size.W(), s.size.H())), s.fillColor)\n}", "title": "" }, { "docid": "cdfbb2fedef84402725bf94e33642ada", "score": "0.6295359", "text": "func Refresh() {\n\n}", "title": "" }, { "docid": "3a69354ee3bfc0ec230262b6e1b25a2a", "score": "0.6272146", "text": "func (v *Vehicles) Refresh() error {\n\treturn v.refresh()\n}", "title": "" }, { "docid": "f2c88ebcbed0e185e02f11ad3c9146cb", "score": "0.62363845", "text": "func (wf *WeatherForecast) Refresh(forecast *weather.GetForecastResponse) {\n\twf.app.QueueUpdateDraw(func() {\n\t\tfor i := 0; i < len(wf.records); i++ {\n\t\t\tif forecast == nil || i >= len(forecast.ForecastRecords) {\n\t\t\t\twf.records[i].dateText.Clear()\n\t\t\t\twf.records[i].tempText.Clear()\n\t\t\t\twf.records[i].detailsText.Clear()\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\trecord := forecast.ForecastRecords[i]\n\t\t\tforecastedFor, _ := ptypes.Timestamp(record.ForecastedFor)\n\n\t\t\twf.records[i].detailsText.SetText(weatherIconToEmoji(record.Conditions.SummaryIcon))\n\n\t\t\t// This gives us our 'low' temperature\n\t\t\tif forecastedFor.Hour() == 23 {\n\t\t\t\twf.records[i].tempText.SetText(fmt.Sprintf(\" Low %2.f C\", record.Conditions.Temperature))\n\t\t\t\twf.records[i].dateText.SetText(forecastedFor.Format(\"Monday\") + \" evening\")\n\t\t\t} else {\n\t\t\t\twf.records[i].tempText.SetText(fmt.Sprintf(\" High %2.f C\", record.Conditions.Temperature))\n\t\t\t\twf.records[i].dateText.SetText(forecastedFor.Format(\"Monday\"))\n\t\t\t}\n\t\t}\n\t})\n}", "title": "" }, { "docid": "ee658b3b0c521e366b7f00d17334e789", "score": "0.62241775", "text": "func (s *MgetService) Refresh(refresh string) *MgetService {\r\n\ts.refresh = refresh\r\n\treturn s\r\n}", "title": "" }, { "docid": "f9a5af379af7da5a19e662b942e4aba0", "score": "0.6202915", "text": "func (m *MesosMonitor) Refresh() {\n\n\tm.mesosCache.tasks = m.getTasks()\n\tm.mesosCache.frameworks = m.getProtectedFrameworks()\n\tm.mesosCache.slaves = m.getSlaves()\n}", "title": "" }, { "docid": "517069fccb48bb782176805723f18909", "score": "0.6174016", "text": "func ReDraw() {\n\tgui.Update(func(g *gocui.Gui) error {\n\t\tdrawMainTop(g)\n\t\tdrawMainOverview(g)\n\t\tdrawMainBottom(g)\n\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "757429a6c1dd9217b78fc1559308eb2c", "score": "0.61738086", "text": "func (b *Board) Refresh() error {\n\terr := b.scan4Treads()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = b.updateThreadsPosts()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "90327fca1742554b8da8b73bbd6f848c", "score": "0.61544865", "text": "func (d *Driver) Refresh(buf []rune) error {\n\tif d.dev.rows == 1 {\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "56ef0b9f0ef51c0ecbce2959b5563d42", "score": "0.61462605", "text": "func (lb *LoadBalanceWithClientDiscovery) Refresh() error {\n\treturn nil\n}", "title": "" }, { "docid": "1483e0dc76e49d592b3f7acd98c70362", "score": "0.6131787", "text": "func (v *value) Refresh(ctx context.Context) error {\n\tif nil == v.New {\n\t\treturn nil\n\t}\n\tnv, er := v.New(ctx)\n\tif er != nil {\n\t\treturn er\n\t}\n\tnow := timestamp()\n\tem := elemPool.Get().(*elem)\n\tem.Init(nv)\n\tem.expireAt = now + v.TTL\n\tem.refreshAt = now + v.RefreshInterval\n\tif v.RefreshInterval <= 0 {\n\t\tem.refreshAt = em.expireAt\n\t}\n\tv.setElem(em)\n\treturn nil\n}", "title": "" }, { "docid": "e77a550d550c604c2ad168f007fcb0a0", "score": "0.6129795", "text": "func (s *Store) Refresh() {\n\ts.mu.Lock()\n\ts.entries = make(map[string]entry)\n\ts.mu.Unlock()\n}", "title": "" }, { "docid": "49e1e8b608a826e65fe64a638d8c6beb", "score": "0.6117077", "text": "func (a *Allocation) Refresh(lifetime time.Duration) {\n\tif !a.lifetimeTimer.Reset(lifetime) {\n\t\ta.log.Errorf(\"Failed to reset allocation timer for %v\", a.fiveTuple)\n\t}\n}", "title": "" }, { "docid": "49e1e8b608a826e65fe64a638d8c6beb", "score": "0.6117077", "text": "func (a *Allocation) Refresh(lifetime time.Duration) {\n\tif !a.lifetimeTimer.Reset(lifetime) {\n\t\ta.log.Errorf(\"Failed to reset allocation timer for %v\", a.fiveTuple)\n\t}\n}", "title": "" }, { "docid": "b08a982170d895b86d617a1882763f77", "score": "0.6105373", "text": "func (c *Credentials) Refresh() {\n\tc.mu.Lock()\n\tdefer c.mu.Unlock()\n\n\tc.forceRefresh = true\n}", "title": "" }, { "docid": "f02359655f7ea63db01e1cdc6e0eb12d", "score": "0.6096483", "text": "func (s *Session) Refresh() {\n\ts.m.Lock()\n\ts.slaveOk = s.consistency != Strong\n\ts.unsetSocket()\n\ts.m.Unlock()\n}", "title": "" }, { "docid": "25294b2e79837a771ecd4ed020244ead", "score": "0.60852814", "text": "func (p *Panel) Refresh() error {\n\tif len(p.Entries) == 0 {\n\t\treturn p.Reset(p.Cwd, \"\")\n\t}\n\tvar selection = make(map[string]bool)\n\ttop := p.Top\n\tcursor := p.Entries[p.Cursor].Name()\n\tcursorIndex := p.Cursor\n\tfor k := range p.Selected {\n\t\tselection[p.Entries[k].Name()] = true\n\t}\n\terr := p.Reset(p.Cwd, cursor)\n\tif len(p.Entries) == 0 {\n\t\treturn err\n\t}\n\tp.Top = top\n\tif err != nil {\n\t\treturn err\n\t}\n\tif p.Entries[p.Cursor].Name() != cursor {\n\t\tif cursorIndex < len(p.Entries) {\n\t\t\tp.Cursor = cursorIndex\n\t\t} else {\n\t\t\tp.Cursor = len(p.Entries) - 1\n\t\t}\n\t}\n\tfor k, v := range p.Entries {\n\t\tif selection[v.Name()] {\n\t\t\tp.Selected[k] = true\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e7e7aaca773c693e530ffae71559b806", "score": "0.6076246", "text": "func (s *UpdateService) Refresh(refresh string) *UpdateService {\n\ts.refresh = refresh\n\treturn s\n}", "title": "" }, { "docid": "f6f4330f6b82d32f9e52ee6219455cf8", "score": "0.6065333", "text": "func (v *AppChooser) Refresh() {\n\tC.gtk_app_chooser_refresh(v.native())\n}", "title": "" }, { "docid": "84108b6ae680a25c5d7dc6bfcdfce3d0", "score": "0.60554874", "text": "func (c *ChainReadOnly) Refresh() *ChainReadOnly {\n\tresponse, err := parse(c.Path)\n\tif err != nil {\n\t\tlog.Errorf(\"error reading the chain: %s\\n\", c.Path)\n\t}\n\tc.Chain = loadFromStorage(response)\n\treturn c\n}", "title": "" }, { "docid": "57c53794c1e876cf3508e450570a4b36", "score": "0.6006086", "text": "func Refresh() {\n\tfmt.Printf(\"%s[2J\", ESC)\n\tMoveCursor(Position{0, 0})\n}", "title": "" }, { "docid": "dd797b9b5e8df3d9cb754bd41b310bb9", "score": "0.5991229", "text": "func Refresh() error {\n\tmux.Lock()\n\tdefer mux.Unlock()\n\tdata, err := NewOpencontrolData(\"master\", \"/var/tmp/ocdb/masonry_cache\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tinstance = data\n\treturn nil\n}", "title": "" }, { "docid": "f1e1c548dc8c26ef90e52a569d25b74e", "score": "0.59802455", "text": "func (g *Game) Refresh(ctx context.Context) error {\n\tc, err := g.Client.ContainerInspect(ctx, g.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tg.Addr = c.NetworkSettings.DefaultNetworkSettings.IPAddress\n\treturn nil\n}", "title": "" }, { "docid": "042163d35a759b443e89d50e277143fc", "score": "0.59405077", "text": "func (h *Harness) Refresh() (err *revel.Error) {\n\tif h.app != nil {\n\t\th.app.Kill()\n\t}\n\n\trevel.TRACE.Println(\"Rebuild\")\n\th.app, err = Build()\n\tif err != nil {\n\t\treturn\n\t}\n\n\th.app.Port = h.port\n\tif err2 := h.app.Cmd().Start(); err2 != nil {\n\t\treturn &revel.Error{\n\t\t\tTitle: \"App failed to start up\",\n\t\t\tDescription: err2.Error(),\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "7e03dcbc10f5b691195de126915e2b71", "score": "0.5921172", "text": "func (self *Client) Refresh() error {\n\toperation := NewOperation(self.conn)\n\tdefer operation.Destroy()\n\n\toperation.paOper = C.pa_context_get_client_info(\n\t\tself.conn.context,\n\t\tC.uint32_t(self.Index),\n\t\t(C.pa_client_info_cb_t)(C.pulse_get_client_info_callback),\n\t\toperation.Userdata(),\n\t)\n\n\t// wait for the operation to finish and handle success and error cases\n\treturn operation.WaitSuccess(func(op *Operation) error {\n\t\tif l := len(op.Payloads); l == 1 {\n\t\t\tpayload := operation.Payloads[0]\n\n\t\t\tif err := self.Initialize(payload.Properties); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\treturn fmt.Errorf(\"Invalid client response: expected 1 payload, got %d\", l)\n\t\t}\n\n\t\treturn nil\n\n\t})\n}", "title": "" }, { "docid": "f32c85aa7a24d22427e08ddcbfc097ad", "score": "0.592108", "text": "func (ali *aliCloudProvider) Refresh() error {\n\treturn nil\n}", "title": "" }, { "docid": "3dc555d699dfafae3ee711c0db6c7494", "score": "0.5914096", "text": "func (s *ReindexService) Refresh(refresh bool) *ReindexService {\r\n\ts.refresh = &refresh\r\n\treturn s\r\n}", "title": "" }, { "docid": "25df4b5e6df7d3f519439caaa33fa9b5", "score": "0.5910288", "text": "func Refresh() {\n\tconfigdir.Refresh()\n}", "title": "" }, { "docid": "41956108f9b9a94472ed36e3e202e7a2", "score": "0.58991015", "text": "func (s *spinner) Refresh() {\n\tincrement := math.Pi * 2 / float64(s.n)\n\thalfW := float64(s.w) / 2\n\trDots := halfW * 0.65\n\tr0 := rDots * math.Sin(increment/2) * 0.90\n\trps := 1.0\n\trotator := float64(time.Now().UnixNano()) / 1e9 * rps\n\tphi := (rotator - math.Floor(rotator)) * 2 * math.Pi\n\n\tfor i, dot := range s.dots {\n\t\tangle := float64(i) * increment\n\t\tcx := round(math.Cos(angle)*rDots + halfW)\n\t\tcy := round(math.Sin(angle)*rDots + halfW)\n\t\tr := r0 - ((math.Cos(angle-phi) + 1) / 2 * r0 * 0.80)\n\t\t// We must apply the rounding to the radius and take the diameter as\n\t\t// twice ri, because the intregral diameter must be a multiple of two in\n\t\t// order to keep the dot center fixed, preventing the dots from\n\t\t// appearing to jump around as they change size.\n\t\tri := round(r)\n\t\tdi := 2 * ri\n\t\tdot.Resize(fyne.NewSize(di, di))\n\n\t\tdot.Move(fyne.NewPos(cx-ri, cy-ri))\n\t}\n}", "title": "" }, { "docid": "f9df7b1be5329641adbd7aec129a3c8e", "score": "0.5848965", "text": "func (uptr *UserPtr) Refresh() {\n\tuptr.Expired = time.Now().Add(time.Minute * 5)\n}", "title": "" }, { "docid": "ed904c565f2db92e19522c0d973482df", "score": "0.5844519", "text": "func (p *Page) PushRedraw() {\n\tmessageServer.SendMessage(\"form-\" + p.stateId, map[string]interface{}{\"grup\":true})\n}", "title": "" }, { "docid": "8085315d3cba038ac219962d1df6e2ce", "score": "0.58230066", "text": "func (server *Server) Refresh() {\n\tserver.providerWorkers.Broadcast(eventCatalogRefresh, nil)\n\tserver.Library.Refresh()\n}", "title": "" }, { "docid": "cfbb52d632b9e49f78d2571e9c49ff05", "score": "0.5817481", "text": "func (s *IndexService) Refresh(refresh string) *IndexService {\r\n\ts.refresh = refresh\r\n\treturn s\r\n}", "title": "" }, { "docid": "b39992cd67b3d30792ce3ac5bd66ad1c", "score": "0.58134365", "text": "func (gs *GrentonSet) Refresh() {\n\tif gs.waitingAnswer {\n\t\tgs.Debugf(\"GrentonSet [%v] Refresh: already waiting for answer, skipping\\n\", &gs)\n\t\treturn\n\t}\n\tgs.waitingAnswer = true\n\n\tquery := []ReqObject{}\n\tfor _, clu := range gs.Clus {\n\t\tfor _, light := range clu.Lights {\n\t\t\tif light != nil {\n\t\t\t\tquery = append(query, light.Req)\n\t\t\t}\n\t\t}\n\t\tfor _, thermo := range clu.Therms {\n\t\t\tif thermo != nil {\n\t\t\t\tquery = append(query, thermo.Req)\n\t\t\t}\n\t\t}\n\t}\n\n\tfor ix := 0; ix * gs.QueryLimit < len(query); ix++ {\n\n\t\tstart := ix * gs.QueryLimit\n\t\tstop := (ix + 1) * gs.QueryLimit\n\t\t\n\t\tgs.Debugf(\"GrentonSet Refresh doing pass from %d until %d.\\n\", start, stop)\n\n\t\tif stop > len(query) {\n\t\t\tstop = len(query)\n\t\t}\n\n\t\terr := gs.RequestAndUpdate(query[start:stop])\n\n\t\tif err != nil {\n\t\t\tgs.Error((fmt.Errorf(\"GrentonSet [%v] Refresh: request failed: %v\\n\", &gs, err)))\n\t\t\tgs.waitingAnswer = false\n\t\t\treturn\n\t\t}\n\t}\n\n\tgs.lastUpdated = time.Now()\n\tgs.waitingAnswer = false\n\tgs.Debugf(\"GrentonSet [%v] Refresh finished\\n\", &gs)\n}", "title": "" }, { "docid": "09225ee93e77b643201f5e5734742002", "score": "0.5805453", "text": "func (q *LazyQueue) Refresh() {\n\tq.maxUntil = q.clock.Now() + mclock.AbsTime(q.period)\n\tfor q.queue[0].Len() != 0 {\n\t\tq.Push(heap.Pop(q.queue[0]).(*item).value)\n\t}\n\tq.queue[0], q.queue[1] = q.queue[1], q.queue[0]\n\tq.indexOffset = 1 - q.indexOffset\n\tq.maxUntil += mclock.AbsTime(q.period)\n}", "title": "" }, { "docid": "d01575ebaf989a89f288c202a7b672c7", "score": "0.5790605", "text": "func (c *ClientManager) Refresh(obj apis.KeyableObject, cluster *v1alpha1.Cluster) bool {\n\tc.mu.Lock()\n\tdefer c.mu.Unlock()\n\n\tclusterRef := clusterRef{clusterKey: apis.Key(cluster), objKey: apis.Key(obj)}\n\tobjRevision, knownForObj := c.revisions[clusterRef]\n\n\tif knownForObj && timecmp.Equal(cluster.Status.ConnectedAt, objRevision) {\n\t\t// regardless of if there's a new client, state from the perspective\n\t\t// of this caller is in sync because the client its tracking matches\n\t\t// the cluster object it passed in, so having it potentially reset state\n\t\t// (assuming an updated client exists) will be more harmful than helpful\n\t\t// as it won't be able to fetch it\n\t\treturn false\n\t}\n\n\t_, err := c.getK8sClient(obj, cluster)\n\tif err != nil {\n\t\tdelete(c.revisions, clusterRef)\n\t\treturn knownForObj\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "a8eb505286b358b95eab2ca9ea0e26f6", "score": "0.57836604", "text": "func (p *Poller) Refresh() {\n\tlogger.Info(\"poller\", \"refreshing poller catalog\")\n\n\tfor _, w := range p.Workers {\n\t\tw.Refresh()\n\t}\n}", "title": "" }, { "docid": "692fc108c642d5a11fb9dd0b62fed7c2", "score": "0.5767384", "text": "func (wd *WorkingDir) Refresh() error {\n\treturn wd.tf.Refresh(context.Background(), tfexec.Reattach(wd.reattachInfo), tfexec.State(filepath.Join(wd.baseDir, \"terraform.tfstate\")), tfexec.Dir(wd.configDir))\n}", "title": "" }, { "docid": "c1407db77633f2822e6255281180052b", "score": "0.57214665", "text": "func (fetcher *Fetcher) Refresh() {\n\tif fetcher.Client == nil {\n\t\tfetcher.Client = &http.Client{}\n\t}\n\terrPagemonitor := fetcher.FetchAllPages()\n\tif errPagemonitor != nil {\n\t\tlog.Error(\"Failed to fetch at least one page\")\n\t} else {\n\t\tlog.Debug(\"Pages fetched successfully\")\n\t}\n\terrFeed := fetcher.FetchAllFeeds()\n\tif errFeed != nil {\n\t\tlog.Error(\"Failed to fetch at least one feed\")\n\t} else {\n\t\tlog.Debug(\"Feeds fetched successfully\")\n\t}\n}", "title": "" }, { "docid": "642c4e732c26e91453baa3849b5ca965", "score": "0.57098603", "text": "func (k *Kiz) RefreshStates() error {\n\treturn k.clt.RefreshStates()\n}", "title": "" }, { "docid": "ca8c9f4591d9a82ad0ac02936c900d87", "score": "0.5663826", "text": "func (self *secretSynchronizer) Refresh() {\n\tself.mux.Lock()\n\tdefer self.mux.Unlock()\n\n\tsecret, err := self.client.CoreV1().Secrets(self.namespace).Get(context.TODO(), self.name, metaV1.GetOptions{})\n\tif err != nil {\n\t\tlog.Printf(\"Secret synchronizer %s failed to refresh secret\", self.Name())\n\t\treturn\n\t}\n\n\tself.secret = secret\n}", "title": "" }, { "docid": "12a6242643d1f8879ad3620e77a716bd", "score": "0.5652664", "text": "func (r *Lun) Refresh() error {\n\n\tif r.Id == \"\" && r.Name == \"\" {\n\t\treturn fmt.Errorf(\n\t\t\t\"cannot refresh on lun without Id nor Name, resource:%v\", r,\n\t\t)\n\t}\n\n\tvar (\n\t\tlatest *Lun\n\t\terr error\n\t)\n\n\tswitch r.Id {\n\n\tcase \"\":\n\t\tif latest, err = r.Unity.GetLunByName(r.Name); err != nil {\n\t\t\treturn err\n\t\t}\n\t\t*r = *latest\n\tdefault:\n\t\tif latest, err = r.Unity.GetLunById(r.Id); err != nil {\n\t\t\treturn err\n\t\t}\n\t\t*r = *latest\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9b7e1e815103ff3ead32c1a621a32e2e", "score": "0.5647238", "text": "func (d *Device) RefreshSize() error {\n\tif err := d.ensureOpen(); err != nil {\n\t\treturn err\n\t}\n\treturn unix.IoctlSetInt(int(d.dev.Fd()), unix.LOOP_SET_CAPACITY, 0)\n}", "title": "" }, { "docid": "fdc28d54f28a697735557b0cbf485f36", "score": "0.56415886", "text": "func (earc *ExchangeAPIRequestCounter) Refresh() {\n\tearc.SetCounter(earc.refresher.Refresh(earc.counter))\n}", "title": "" }, { "docid": "e4ebbd1b50b8ed8b1ad4e31b8c17669e", "score": "0.562865", "text": "func (m *menu) Update() {\n\tm.w.Refresh()\n}", "title": "" }, { "docid": "bfe84374848c2d1b2743e02318242284", "score": "0.56158894", "text": "func Redraw() {\n\tselect {\n\tcase redrawch <- struct{}{}:\n\tdefault:\n\t}\n}", "title": "" }, { "docid": "ac6577f09cf744f639e5146927044e7e", "score": "0.5559137", "text": "func (am *accountManager) Refresh() {\n\treq := accountRequestRefresh{make(chan struct{})}\n\tam.requests <- req\n\t<-req.done\n}", "title": "" }, { "docid": "b83a3e0399a7f1d456e3fbfb6fbd3b6f", "score": "0.5545042", "text": "func ExecuteRefresh(cfg *config.Config) {\n core.Refresh(cfg)\n}", "title": "" }, { "docid": "2965c150effe545a0bbe1fd7e552f01f", "score": "0.5521863", "text": "func (a Artifact) Refresh() error {\n\t// for now lets only do it for checksums, as we know for a fact that\n\t// they are the only ones that support this right now.\n\tif a.Type != Checksum {\n\t\treturn nil\n\t}\n\tif err := ExtraOr(a, ExtraRefresh, noRefresh)(); err != nil {\n\t\treturn fmt.Errorf(\"failed to refresh %q: %w\", a.Name, err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9fd9c821933d6d7cc797e38d1a618d8b", "score": "0.5511025", "text": "func (gui *Gui) refreshMain(g *gocui.Gui) error {\n\tmainView, err := g.View(mainViewFeature.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tmainView.Clear()\n\tfor _, r := range gui.State.Repositories {\n\t\tfmt.Fprintln(mainView, gui.displayString(r))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4f91f163d3b9b4cf5c4381f3850cd685", "score": "0.5507521", "text": "func (r *Repo) refreshed() {\n\tselect {\n\tcase r.C <- struct{}{}:\n\tdefault:\n\t}\n}", "title": "" }, { "docid": "9cdb0610141178e2e722591a30444bb5", "score": "0.5493413", "text": "func (r *Routes) Refresh() error {\n\treturn r.refresh()\n}", "title": "" }, { "docid": "3351f03677ce1d4f3f4b77d5c20bd9e3", "score": "0.5487111", "text": "func (m *gceManagerImpl) Refresh() error {\n\tm.cache.InvalidateAllMigInstances()\n\tm.cache.InvalidateAllMigTargetSizes()\n\tm.cache.InvalidateAllMigBasenames()\n\tm.cache.InvalidateAllMigInstanceTemplateNames()\n\tif m.lastRefresh.Add(refreshInterval).After(time.Now()) {\n\t\treturn nil\n\t}\n\treturn m.forceRefresh()\n}", "title": "" }, { "docid": "4e740cef6dacad3092fdc0e8b0acd78a", "score": "0.54865265", "text": "func (mr *MockExpiringHashInterfaceMockRecorder) Refresh(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Refresh\", reflect.TypeOf((*MockExpiringHashInterface)(nil).Refresh), arg0)\n}", "title": "" }, { "docid": "1cae3d53d2ec5f3e11a5a79d8f0d00f0", "score": "0.5469827", "text": "func (s *MarkdownHandler) Refresh() {\n\tmarkdown, err := ioutil.ReadFile(s.Filename)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ts.Markdown = string(markdown)\n\thtml := blackfriday.Run([]byte(s.Markdown))\n\ts.HTML = template.HTML(html)\n}", "title": "" }, { "docid": "78ba06e9d628738998b54a69618495f2", "score": "0.54279023", "text": "func Refresh() {\n\tqueues, err := egress.QueuesForShard()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor _, q := range queues {\n\t\tif q.Count() == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tupdateQueueData(q)\n\t}\n}", "title": "" }, { "docid": "7f57e3b6e483384f2fc21080162495bb", "score": "0.542373", "text": "func (g *Gui) flush() error {\n\t// pretty sure we don't need this, but keeping it here in case we get weird visual artifacts\n\t// g.clear(g.FgColor, g.BgColor)\n\n\tmaxX, maxY := Screen.Size()\n\t// if GUI's size has changed, we need to redraw all views\n\tif maxX != g.maxX || maxY != g.maxY {\n\t\tfor _, v := range g.views {\n\t\t\tv.clearViewLines()\n\t\t}\n\t}\n\tg.maxX, g.maxY = maxX, maxY\n\n\tfor _, m := range g.managers {\n\t\tif err := m.Layout(g); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tfor _, v := range g.views {\n\t\tif err := g.draw(v); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tScreen.Show()\n\treturn nil\n}", "title": "" }, { "docid": "132d00515a87b78c3063bd5d362ad137", "score": "0.54194975", "text": "func (j *RunState) Refresh() error {\n\tjobRun := Run{}\n\ttx := j.db.Where(\"id = ? OR origin_id = ?\", j.OriginID, j.OriginID).Order(\"created_at DESC\").First(&jobRun)\n\tif tx.Error != nil {\n\t\treturn tx.Error\n\t}\n\n\tj.Name = jobRun.Name\n\tj.RunSuccessCount = jobRun.RunSuccessCount\n\tj.RetriesOnErrorCount = jobRun.RetriesOnErrorCount\n\tj.RetriesOnTimeoutCount = jobRun.RetriesOnTimeoutCount\n\tj.CreatedAt = jobRun.CreatedAt\n\tj.CreatedBy = jobRun.CreatedBy\n\n\tj.RunStartedAt = nil\n\tif jobRun.RunStartedAt.Valid {\n\t\tj.RunStartedAt = &jobRun.RunStartedAt.Time\n\t}\n\tj.RunStartedBy = nil\n\tif jobRun.RunStartedBy.Valid {\n\t\tj.RunStartedBy = &jobRun.RunStartedBy.Int64\n\t}\n\tj.RunCompletedAt = nil\n\tif jobRun.RunCompletedAt.Valid {\n\t\tj.RunCompletedAt = &jobRun.RunCompletedAt.Time\n\t}\n\tj.RunCompletedError = nil\n\tif jobRun.RunCompletedError.Valid {\n\t\tj.RunCompletedError = &jobRun.RunCompletedError.String\n\t}\n\tj.Schedule = nil\n\tif jobRun.Schedule.Valid {\n\t\tj.Schedule = &jobRun.Schedule.String\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1b415158452b5647388622cc517532b5", "score": "0.540825", "text": "func (w *Window) Reload() {\n\tu := w.history.Current()\n\n\tif len(u) == 0 {\n\t\tw.SetErr(errors.New(\"no component loaded\"))\n\t\treturn\n\t}\n\n\tw.Load(u)\n}", "title": "" }, { "docid": "89561991176919cfba82eabd9a7201a6", "score": "0.54010475", "text": "func (c *ClusterInfo) Refresh() {\n\tdata := NewClusterMeta()\n\tif c.factory.Client().ConnectionOK() {\n\t\tdata.Context = c.cluster.ContextName()\n\t\tdata.Cluster = c.cluster.ClusterName()\n\t\tdata.User = c.cluster.UserName()\n\t\tdata.K8sVer = c.cluster.Version()\n\t\tctx, cancel := context.WithTimeout(context.Background(), c.cluster.factory.Client().Config().CallTimeout())\n\t\tdefer cancel()\n\t\tvar mx client.ClusterMetrics\n\t\tif err := c.cluster.Metrics(ctx, &mx); err == nil {\n\t\t\tdata.Cpu, data.Mem, data.Ephemeral = mx.PercCPU, mx.PercMEM, mx.PercEphemeral\n\t\t} else {\n\t\t\tlog.Warn().Err(err).Msgf(\"Cluster metrics failed\")\n\t\t}\n\t}\n\tdata.K9sVer = c.version\n\tv1 := NewSemVer(data.K9sVer)\n\n\tvar latestRev string\n\tif !c.skipLatestRevCheck {\n\t\tlatestRev = c.fetchK9sLatestRev()\n\t}\n\tv2 := NewSemVer(latestRev)\n\n\tdata.K9sVer, data.K9sLatest = v1.String(), v2.String()\n\tif v1.IsCurrent(v2) {\n\t\tdata.K9sLatest = \"\"\n\t}\n\n\tif c.data.Deltas(data) {\n\t\tc.fireMetaChanged(c.data, data)\n\t} else {\n\t\tc.fireNoMetaChanged(data)\n\t}\n\tc.data = data\n}", "title": "" }, { "docid": "92385f6aa7fd7dca7dcf409dfc9b3fa9", "score": "0.5383905", "text": "func (s *AutoScalerServerApp) Refresh(ctx context.Context, request *apigrpc.CloudProviderServiceRequest) (*apigrpc.RefreshReply, error) {\n\tglog.V(5).Infof(\"Call server Refresh: %v\", request)\n\n\tif request.GetProviderID() != s.Configuration.ProviderID {\n\t\tglog.Errorf(constantes.ErrMismatchingProvider)\n\t\treturn nil, fmt.Errorf(constantes.ErrMismatchingProvider)\n\t}\n\n\tfor _, ng := range s.Groups {\n\t\tng.refresh()\n\t}\n\n\tif phSaveState {\n\t\tif err := s.Save(phSavedState); err != nil {\n\t\t\tglog.Errorf(constantes.ErrFailedToSaveServerState, err)\n\t\t}\n\t}\n\n\treturn &apigrpc.RefreshReply{\n\t\tError: nil,\n\t}, nil\n}", "title": "" }, { "docid": "ad2515c52d10fe685a8cdbb77c68bb01", "score": "0.53817433", "text": "func (s *Sandbox) refresh() error {\n\tr, err := s.client.GetSandbox(s.ID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t*s = *r\n\n\treturn nil\n}", "title": "" }, { "docid": "260f7c7ebef67d6ad211bd11ba96d400", "score": "0.537468", "text": "func (vt *VFile) Refresh() error {\n\tif vt.builder == nil {\n\t\tvar bs strings.Builder\n\t\tvt.builder = &bs\n\t}\n\tvar file, fileErr = os.Open(vt.targetFile)\n\tif fileErr != nil {\n\t\treturn nerror.WrapOnly(fileErr)\n\t}\n\tif _, copyErr := io.Copy(vt.builder, file); copyErr != nil && copyErr != io.EOF {\n\t\treturn nerror.WrapOnly(copyErr)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "08092d32d2e7dae65b44163086b37888", "score": "0.5360665", "text": "func (tcp *TestCloudProvider) Refresh() error {\n\treturn nil\n}", "title": "" }, { "docid": "0c3ff07ae1243cab167e663ff2f16f62", "score": "0.5354994", "text": "func (ms *models) refresh(dts float64) {\n\tms.queueLoads()\n\n\t// Process ongoing activity on active models.\n\t// FUTURE Don't traverse all active models. Have separate\n\t// lists for animated models and particle models.\n\tfor _, m := range ms.active {\n\n\t\tif m.effect != nil {\n\t\t\t// udpate and rebind particle effects first since\n\t\t\t// they change mesh data and then need rebinding.\n\t\t\tm.effect.update(m, dt.Seconds())\n\t\t}\n\t\tif m.anm != nil {\n\t\t\t// animations update the bone position matricies.\n\t\t\t// These are bound as uniforms at draw time.\n\t\t\tm.animate(dts)\n\t\t}\n\n\t\t// handle any data updates with rebind requests.\n\t\tif len(m.rebinds) > 0 {\n\t\t\tms.rebinds = append(ms.rebinds, m.rebinds...)\n\t\t\tm.rebinds = m.rebinds[:0] // reset keeping memory.\n\t\t}\n\t}\n\n\t// handle all rebind requests at once.\n\tif len(ms.rebinds) > 0 {\n\t\tms.eng.rebind(ms.rebinds)\n\t\tms.rebinds = ms.rebinds[:0] // reset keeping memory.\n\t}\n}", "title": "" }, { "docid": "7a4fb0c620ea1850e31c9c40a81cfba6", "score": "0.5350744", "text": "func (s *Context) Refresh() error {\n\treturn s.importDirectory()\n}", "title": "" }, { "docid": "1f98604386573dd188bfb1c2091995e7", "score": "0.5345141", "text": "func (task *Task) Refresh() error {\n\n\tif task.Task == nil {\n\t\treturn fmt.Errorf(\"cannot refresh, Object is empty\")\n\t}\n\n\trefreshUrl := urlParseRequestURI(task.Task.HREF)\n\n\treq := task.client.NewRequest(map[string]string{}, http.MethodGet, *refreshUrl, nil)\n\n\tresp, err := checkResp(task.client.Http.Do(req))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"%s: %s\", errorRetrievingTask, err)\n\t}\n\n\t// Empty struct before a new unmarshal, otherwise we end up with duplicate\n\t// elements in slices.\n\ttask.Task = &types.Task{}\n\n\tif err = decodeBody(types.BodyTypeXML, resp, task.Task); err != nil {\n\t\treturn fmt.Errorf(\"error decoding task response: %s\", task.getErrorMessage(err))\n\t}\n\n\t// The request was successful\n\treturn nil\n}", "title": "" }, { "docid": "876b604d04a399c3ce45b8d6b7571b6d", "score": "0.5335388", "text": "func (m *ConstructionMutation) SetNeedRefresh(b bool) {\n\tm.need_refresh = &b\n}", "title": "" }, { "docid": "d8caa1e993d0f94302f9bd78212069de", "score": "0.5330734", "text": "func (c *Connector) Refresh(ctx context.Context, s connector.Scopes, identity connector.Identity) (connector.Identity, error) {\n\t// TODO - do we want a refresh mechanism?\n\tconn, ok := c.wrapped.(connector.RefreshConnector)\n\tif !ok {\n\t\tpanic(\"internal error - wrapped is not a refresh connector\")\n\t}\n\treturn conn.Refresh(ctx, s, identity)\n}", "title": "" }, { "docid": "13036b9c40d4f5f4afaaddd66407146d", "score": "0.532337", "text": "func (di *DriverInterface) RefreshStats() {\n\tticker := time.NewTicker(10 * time.Second)\n\tdefer ticker.Stop()\n\tfor {\n\t\tselect {\n\t\tcase <-ticker.C:\n\t\t\tdi.driverFlowHandle.RefreshStats()\n\n\t\t\tdi.closedBufferLock.Lock()\n\t\t\tdriverTelemetry.closedBufferSize.Set(float64(cap(di.closedBuffer)))\n\t\t\tdi.closedBufferLock.Unlock()\n\n\t\t\tdi.openBufferLock.Lock()\n\t\t\tdriverTelemetry.openBufferSize.Set(float64(cap(di.openBuffer)))\n\t\t\tdi.openBufferLock.Unlock()\n\t\tcase <-di.exitTelemetry:\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0085c24afe1c4b43c1d92806072b8179", "score": "0.53212523", "text": "func (m *MockPopularRefresher) Refresh(view comic.MaterializedView) error {\n\tret := m.ctrl.Call(m, \"Refresh\", view)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "56c9b458bec2db1307b9371d3ca5dc3b", "score": "0.53144", "text": "func (xs *XSettings) Refresh() error {\n\txs.props = make(map[string]*XSetting)\n\n\tgso := xproto.GetSelectionOwner(xs.X.Conn(), atomXSettings)\n\n\treply, err := gso.Reply()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tprop, err := xprop.GetProperty(xs.X, reply.Owner, \"_XSETTINGS_SETTINGS\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdata := bytes.NewReader(prop.Value)\n\n\tvar endian binary.ByteOrder\n\n\tvar tmp byte\n\n\tif tmp, err = data.ReadByte(); err != nil {\n\t\treturn err\n\t}\n\n\tif tmp == 0 {\n\t\tendian = binary.LittleEndian\n\t} else {\n\t\tendian = binary.BigEndian\n\t}\n\n\tbuff := make([]byte, 3, 3)\n\n\tif n, err := data.Read(buff); n != 3 || err != nil {\n\t\treturn err\n\t}\n\n\tif err = binary.Read(data, endian, &xs.Serial); err != nil {\n\t\treturn err\n\t}\n\n\tvar num uint32\n\n\tif err = binary.Read(data, endian, &num); err != nil {\n\t\treturn err\n\t}\n\n\tfor i := uint32(0); i < num; i++ {\n\t\tsetting, name, err := xs.readSetting(data, endian)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\txs.props[name] = setting\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "23bc0642a6dbb30c92519d7b63f4e57f", "score": "0.5303896", "text": "func (dfw *NsxvDistributedFirewall) Refresh() error {\n\tif dfw.VdcId == \"\" {\n\t\treturn fmt.Errorf(\"no AdminVdc set for this NsxvDistributedFirewall\")\n\t}\n\n\t_, err := dfw.GetServices(true)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = dfw.GetServiceGroups(true)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = dfw.GetConfiguration()\n\treturn err\n}", "title": "" }, { "docid": "230147e6bc0d71ed9878d52760054187", "score": "0.5293023", "text": "func (store *sqlStore) Refresh() error {\n\tif err := store.cache.Reset(); err != nil {\n\t\treturn err\n\t}\n\treturn store.populateCache()\n}", "title": "" }, { "docid": "6b74de95ae6bb9a90a918ffd15310b2c", "score": "0.52500546", "text": "func (file FileMetaInfo) Refresh() FileMetaInfo {\n\treturn Stat(file.path)\n}", "title": "" }, { "docid": "fc5bc76666144191d1de38f47484c247", "score": "0.52497375", "text": "func (m *MockSessionManager) Refresh() {\n\tm.ctrl.Call(m, \"Refresh\")\n}", "title": "" }, { "docid": "0dc3d8fd59a8953706d224f50bc9c576", "score": "0.5249049", "text": "func RefreshInterval(interval time.Duration) {\n\tconstruct()\n\tupdater.Every(interval)\n}", "title": "" }, { "docid": "a1379bbff3719aa59bc318e8f3605332", "score": "0.52393085", "text": "func RedrawAll(show bool) {\n\tif freeze {\n\t\treturn\n\t}\n\n\tmessenger.Clear()\n\n\tw, h := screen.Size()\n\tfor x := 0; x < w; x++ {\n\t\tfor y := 0; y < h; y++ {\n\t\t\tscreen.SetContent(x, y, ' ', nil, defStyle)\n\t\t}\n\t}\n\n\tfor _, v := range tabs[curTab].Views {\n\t\tv.Display()\n\t}\n\tDisplayTabs()\n\tmessenger.Display()\n\n\tif show {\n\t\tscreen.Show()\n\t}\n\n\tif numRedraw%50 == 0 {\n\t\truntime.GC()\n\t}\n\tnumRedraw++\n}", "title": "" }, { "docid": "c263b620b4bbe66cc0897b06c77c1ce8", "score": "0.5231104", "text": "func (s *Service) Refresh(ctx context.Context) {\n\tif err := s.refreshAccounts(ctx); err != nil {\n\t\tlog.Error().Err(err).Msg(\"Failed to refresh accounts\")\n\t}\n\tif err := s.refreshValidators(ctx); err != nil {\n\t\tlog.Error().Err(err).Msg(\"Failed to refresh validators\")\n\t}\n}", "title": "" } ]
a6b330005fe6636d51a7b712e9e379fb
List all the files that belong to a tag
[ { "docid": "072eed31b55bed278dbcad9ae64c5912", "score": "0.5943378", "text": "func apiTag(res http.ResponseWriter, req *http.Request) {\n\ttag := req.URL.Query().Get(\"tag\")\n\n\tf := finder.FindByTag(tag)\n\tfiles := make([]apiFile, 0, len(f))\n\n\tfor _, file := range f {\n\t\tfiles = append(files, apiFile{\n\t\t\tFinderFile: file,\n\t\t\tThumbs: file.GetThumbnails(\".gollery/thumbs\"),\n\t\t})\n\t}\n\n\tjsonRes(res, files)\n}", "title": "" } ]
[ { "docid": "16a530d15957083e9bd4de0fd533dbd4", "score": "0.6930061", "text": "func TagListForFiles(w http.ResponseWriter, r *http.Request) {\n\tauthUserOk, userInfo := CheckApiAuth(w, r)\n\tif !authUserOk {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\t// get file list from JSON body\n\t// FIXME validate\n\tdecoder := json.NewDecoder(r.Body)\n\tvar tagList []model.FileTagList\n\tdecoder.Decode(&tagList)\n\n\t// get info from DB\n\ttagList = model.FileTagsList(tagList, int(userInfo.Id))\n\t// prevent returning 'null' in JSON by using empty array\n\tif len(tagList) < 1 {\n\t\ttagList = []model.FileTagList{}\n\t}\n\n\t// prepare JSON result\n\tres, err := json.MarshalIndent(tagList, \"\", \" \")\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// all ok, return list\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(res)\n}", "title": "" }, { "docid": "40458e240bc665eb0b6afd742d8a385c", "score": "0.6210008", "text": "func tagFile(name string) string {\r\n\treturn name + \".tags\"\r\n}", "title": "" }, { "docid": "fa979030fbdaa7034d5c815ef6ef2a64", "score": "0.61273324", "text": "func (rfs *RootFileSystem) GetTags(fileName string) ([]string, error) {\n\tfn, err := rfs.retrieveFn(fileName, false)\n\n\tif err == nil {\n\t\tret := make([]string, len(fn.AlternateRoutes), len(fn.AlternateRoutes))\n\t\tfor k, _ := range fn.AlternateRoutes {\n\t\t\tret = append(ret, k)\n\t\t}\n\t\treturn ret, nil\n\t}\n\treturn nil, err\n}", "title": "" }, { "docid": "1134238ad56d841b82e66cf7c8c5c3af", "score": "0.6127075", "text": "func (v *vcsCmd) tags(dir string) ([]string, error) {\n\tvar tags []string\n\tfor _, tc := range v.tagCmd {\n\t\tout, err := v.runOutput(dir, tc.cmd)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tre := regexp.MustCompile(`(?m-s)` + tc.pattern)\n\t\tfor _, m := range re.FindAllStringSubmatch(string(out), -1) {\n\t\t\ttags = append(tags, m[1])\n\t\t}\n\t}\n\treturn tags, nil\n}", "title": "" }, { "docid": "87bbf35dc289c623dd2c65fc66b0a08c", "score": "0.60693717", "text": "func ProcessTagCmd(tags string, recursive bool, args []string) {\n\t//Check for errors\n\tif tags == \"\" && len(args) <= 1 { //no flag, not enough args\n\t\tfmt.Println(\"Need at least one tag and one file.\")\n\t\treturn\n\t} else if tags != \"\" && len(args) < 1 { //flag, not enough args\n\t\tfmt.Println(\"No file entered.\")\n\t\treturn\n\t}\n\n\t//if tag flag not used, assume first arg is flag\n\tif tags == \"\" {\n\t\ttags = args[0]\n\t\targs = args[1:]\n\t}\n\n\t//Slit tags into actual tags\n\ttaglist := strings.Fields(tags)\n\n\t//handle each file\n\tfor _, filePath := range args {\n\t\t//Check if directory (also checks if file exists)\n\t\tfile, fileInfo, err := OpenFile(filePath)\n\t\tif err != nil {\n\t\t\tfmt.Println(filePath+\": \", err)\n\t\t\tcontinue\n\t\t}\n\t\tdefer file.Close()\n\n\t\tif fileInfo.IsDir() {\n\t\t\tif recursive {\n\t\t\t\t//Get the files in the directory\n\t\t\t\tsubFiles, err := file.Readdir(-1)\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Println(filePath+\": \", err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tsubFilePaths := make([]string, 0)\n\t\t\t\tfor _, subFileInfo := range subFiles {\n\t\t\t\t\tsubFilePaths = append(subFilePaths, filepath.Join(filePath, subFileInfo.Name()))\n\t\t\t\t}\n\n\t\t\t\t//Send directory to be processed if directory is non-empty\n\t\t\t\tif len(subFilePaths) > 0 {\n\t\t\t\t\tProcessTagCmd(tags, recursive, subFilePaths)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tfmt.Println(filePath + \": cannot tag a directory. Use -r flag to tag the files in the directory.\")\n\t\t\t}\n\n\t\t\t//Since file is directory, it is handled\n\t\t\t//Continue to next file\n\t\t\tcontinue\n\t\t}\n\n\t\t//File is not a directory, so tag it\n\t\tAddFile(filePath)\n\t\tfid, err := GetFile(filePath)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn\n\t\t}\n\n\t\t//add tags to file\n\t\ttidlist, err := GetOrCreateTags(taglist...)\n\t\tTagFile(fid, tidlist...)\n\t}\n\n}", "title": "" }, { "docid": "5e8c12876d06c996a6efbc99f1a2a549", "score": "0.60598284", "text": "func (g *GitLocal) Tags(dir string) ([]string, error) {\n\treturn g.GitCLI.Tags(dir)\n}", "title": "" }, { "docid": "637b215ad5b7f1847d78a076a12bda95", "score": "0.5970262", "text": "func (c APIClient) ListTag(f func(*pfs.ListTagsResponse) error) error {\n\tlistTagClient, err := c.ObjectAPIClient.ListTags(c.Ctx(), &pfs.ListTagsRequest{IncludeObject: true})\n\tif err != nil {\n\t\treturn grpcutil.ScrubGRPC(err)\n\t}\n\tfor {\n\t\tlistTagResponse, err := listTagClient.Recv()\n\t\tif err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn grpcutil.ScrubGRPC(err)\n\t\t}\n\t\tif err := f(listTagResponse); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9b122e9629e953d5e4ae88f1fca69e96", "score": "0.5914589", "text": "func Get(tags []string, databaseFile string) ([]string, error) {\n\t// Open DB File\n\traw, err := ioutil.ReadFile(databaseFile)\n\tif err != nil {\n\t\treturn []string{}, err\n\t}\n\n\tvar data []object\n\tjson.Unmarshal(raw, &data)\n\n\tfileList := []string{}\n\n\tfor _, d := range data {\n\t\tif len(tags) == 0 { // tags are empty\n\t\t\tfileList = append(fileList, d.FilePath)\n\t\t} else {\n\t\t\t// append result if tags in data contains all of request tags\n\t\t\tmatched := true\n\t\t\tfor _, tag := range tags {\n\t\t\t\tif !contains(d.Tags, tag) {\n\t\t\t\t\tmatched = false\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif matched {\n\t\t\t\tfileList = append(fileList, d.FilePath)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn fileList, nil\n}", "title": "" }, { "docid": "6273a3f72e66aba0428cdb2601781434", "score": "0.5909498", "text": "func TestGetFilesWithTags(t *testing.T) {\n\tdb := getDb(t)\n\tdefer db.Close()\n\tbaseName := \"nameBase\"\n\tpath := \"tmp\"\n\tfileCount := 100\n\ttags, _, err := createFilesAndTags(db, baseName, path, fileCount, 2)\n\tif err != nil {\n\t\tt.Errorf(\"Could not create files for test %s\", err)\n\t}\n\n\tconditions := []struct {\n\t\ttags []metadata.TagInfo\n\t\tname string\n\t\texpectedCount int\n\t}{\n\t\t// get all the files we creates\n\t\t{tags[:2],\n\t\t\t\"\",\n\t\t\tfileCount,\n\t\t},\n\t\t// try checking a path that should have no files\n\t\t{\n\t\t\ttags,\n\t\t\t\"\",\n\t\t\t0,\n\t\t},\n\t\t// filter on exact name within the path\n\t\t{\n\t\t\ttags[:2],\n\t\t\tfmt.Sprintf(\"%s%d\", baseName, 1),\n\t\t\t1,\n\t\t},\n\t\t// filter on wildcard name within the path\n\t\t{\n\t\t\ttags[:2],\n\t\t\tfmt.Sprintf(\"%s%d*\", baseName, 1),\n\t\t\t11,\n\t\t},\n\t\t// filter that doesn't match should yield nothing\n\t\t{\n\t\t\ttags[:2],\n\t\t\t\"junk\",\n\t\t\t0,\n\t\t},\n\t\t// Parent path should still list files\n\t\t{\n\t\t\ttags[:1],\n\t\t\t\"\",\n\t\t\tfileCount,\n\t\t},\n\t}\n\n\t// test lookup conditions\n\tfor _, condition := range conditions {\n\t\tfoundFiles, err := GetFilesWithTags(db, condition.tags, condition.name)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Could not list tags in path: %s\", err)\n\t\t} else if len(foundFiles) != condition.expectedCount {\n\t\t\tt.Errorf(\"Expected to find %d files but got %d\", condition.expectedCount, len(foundFiles))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d2c91a16bde3c2a735aa111659fc60f0", "score": "0.5745891", "text": "func FetchByTag(ctx context.Context, client *s3.Client, dstDir string, bucket, tag string) ([]string, error) {\n\ttaggedPrefix := tagPrefix(tag)\n\n\tobjectKeys, err := listKeysWithPrefix(ctx, client, bucket, taggedPrefix)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\tif len(objectKeys) == 0 {\n\t\treturn nil, nil\n\t}\n\n\tdownloader := manager.NewDownloader(client)\n\tresult := make([]string, 0, len(objectKeys))\n\n\tfor _, key := range objectKeys {\n\t\tfilename, err := fetchObject(ctx, downloader, dstDir, bucket, key, taggedPrefix)\n\t\tif err != nil {\n\t\t\treturn nil, trace.Wrap(err)\n\t\t}\n\t\tresult = append(result, filename)\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "5d781bb958c85a40bf7fd02d70321039", "score": "0.57213914", "text": "func Find(tag string) {\n\tvar dat = make(map[string][]string)\n\tvar (\n\t\tfp *os.File\n\t\tfileList []string\n\t\tinput string\n\t)\n\n\tif stat, statErr := os.Stat(STORAGE_FILE); statErr != nil {\n\t\tfp, _ = os.Create(STORAGE_FILE)\n\t\tdefer fp.Close()\n\t} else {\n\t\tfp, _ := os.Open(STORAGE_FILE)\n\t\tbuffer := make([]byte, stat.Size())\n\t\tdefer fp.Close()\n\t\tif _, readErr := fp.Read(buffer); readErr != nil {\n\t\t\tlog.Fatalf(\"FileRead Error: %v\", readErr)\n\t\t}\n\t\tjson.Unmarshal(buffer, &dat)\n\t}\n\n\tif len(tag) == 0 {\n\t\tfor k, v := range dat {\n\t\t\tfmt.Println(\"Tag: \" + k)\n\t\t\tfor i, f := range v {\n\t\t\t\tfmt.Printf(\"[%d] %s\", i, f)\n\t\t\t\tfileList = append(fileList, f)\n\t\t\t}\n\t\t}\n\t} else if v, ok := dat[tag]; ok {\n\t\tfmt.Println(\"Tag: \" + tag)\n\t\tfor i, f := range v {\n\t\t\tfmt.Printf(\"[%d] %s\", i, f)\n\t\t\tfileList = append(fileList, f)\n\t\t}\n\t} else {\n\t\tfmt.Println(\"Tag \" + tag + \" not found\")\n\t}\n\n\t// Getting file input\n\tfmt.Printf(\"\\nGetting file? [0-%d]:\", len(fileList)-1)\n\tfmt.Scanln(&input)\n\n\tnum, _ := strconv.Atoi(input)\n\tif num >= 0 && num < len(fileList) {\n\t\tDownload([]string{strings.Trim(fileList[num], \"\\n\")}, false)\n\t} else {\n\t\tfmt.Println(\"Index not found.\")\n\t}\n}", "title": "" }, { "docid": "01945e2e54eb4a811b6b0b96dbe2be94", "score": "0.5701704", "text": "func (g *gcs) List(ctx context.Context, remotePath string) (files []interface{}, err error) {\n\titer := g.bucket.Objects(g.context, nil)\n\tfor {\n\t\tattributes, err := iter.Next()\n\t\tif err == iterator.Done {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfiles = append(files, attributes.Name)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "afd84629fa4df27b026ba2be0656642b", "score": "0.5647909", "text": "func (c *TagsCollection) List() ([]string, error) {\n\tvar strC C.git_strarray\n\n\truntime.LockOSThread()\n\tdefer runtime.UnlockOSThread()\n\n\tecode := C.git_tag_list(&strC, c.repo.ptr)\n\truntime.KeepAlive(c)\n\tif ecode < 0 {\n\t\treturn nil, MakeGitError(ecode)\n\t}\n\tdefer C.git_strarray_dispose(&strC)\n\n\ttags := makeStringsFromCStrings(strC.strings, int(strC.count))\n\treturn tags, nil\n}", "title": "" }, { "docid": "3b7d769d14c9b7ee645908a9c0eede68", "score": "0.5564965", "text": "func (g *gcs) List(ctx context.Context, prefix string) ([]*fs.FileInfo, error) {\n\tvar files []*fs.FileInfo\n\tit := g.bucket.Objects(ctx, &storage.Query{\n\t\tPrefix: prefix,\n\t})\n\tfor {\n\t\tattrs, err := it.Next()\n\t\tif err == iterator.Done {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfiles = append(files, fileinfo(attrs))\n\t}\n\treturn files, nil\n}", "title": "" }, { "docid": "cffc29e5f3aa564862147b96cdb214e5", "score": "0.5525752", "text": "func listAllTags() {\n\tvar nextToken string\n\tfmt.Println(\"tag list: \")\n\tfor {\n\t\trespTags, respNextToken, err := util.Client.ListTagResources(util.ProjectName, \"project\", []string{util.ProjectName}, []sls.ResourceFilterTag{}, nextToken)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tfor _, tag := range respTags {\n\t\t\tfmt.Printf(\" resourceType : %s, resourceID : %s, tagKey : %s, tagValue : %s\\n\",\n\t\t\t\ttag.ResourceType,\n\t\t\t\ttag.ResourceID,\n\t\t\t\ttag.TagKey,\n\t\t\t\ttag.TagValue)\n\t\t}\n\t\tnextToken = respNextToken\n\t\tif nextToken == \"\" {\n\t\t\tbreak\n\t\t}\n\t}\n}", "title": "" }, { "docid": "72424f404e988d01254649838b1b757d", "score": "0.5498333", "text": "func files(d interface{}) ([]namedFile, error) {\n\ts, _, err := unpackDirectory(d)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"argument could not be parsed as *Directory: %w\", err)\n\t}\n\n\tvar res []namedFile\n\tfor i := 0; i < s.NumField(); i++ {\n\t\ttf := s.Type().Field(i)\n\t\tfileTag := tf.Tag.Get(\"file\")\n\t\tif fileTag == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\t_, f, err := unpackFile(s.Field(i).Addr().Interface())\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"file %q could not be parsed as *File: %w\", tf.Name, err)\n\t\t}\n\t\tres = append(res, namedFile{fileTag, f})\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "e7a4577ccff26faf4470fa0f40ff1755", "score": "0.5488992", "text": "func (t *TagsService) List(ctx context.Context, repository string, options *ListTagsOptions) (*TagList, *http.Response, error) {\n\tu := fmt.Sprintf(\"repository/%v/tag\", repository)\n\tu, err := addOptions(u, options)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treq, err := t.client.NewRequest(\"GET\", u, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\ttags := new(TagList)\n\tresp, err := t.client.Do(ctx, req, tags)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn tags, resp, err\n}", "title": "" }, { "docid": "22c632ba03b6648409cc9880c49be360", "score": "0.5477086", "text": "func listGoFiles(magePath, goCmd, tag string, envStr []string) ([]string, error) {\n\torigMagePath := magePath\n\tif !filepath.IsAbs(magePath) {\n\t\tcwd, err := os.Getwd()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"can't get current working directory: %v\", err)\n\t\t}\n\t\tmagePath = filepath.Join(cwd, magePath)\n\t}\n\n\tenv, err := internal.SplitEnv(envStr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error parsing environment variables: %v\", err)\n\t}\n\n\tbctx := build.Default\n\tbctx.BuildTags = []string{tag}\n\n\tif _, ok := env[\"GOOS\"]; ok {\n\t\tbctx.GOOS = env[\"GOOS\"]\n\t}\n\n\tif _, ok := env[\"GOARCH\"]; ok {\n\t\tbctx.GOARCH = env[\"GOARCH\"]\n\t}\n\n\tpkg, err := bctx.Import(\".\", magePath, 0)\n\tif err != nil {\n\t\tif _, ok := err.(*build.NoGoError); ok {\n\t\t\treturn []string{}, nil\n\t\t}\n\n\t\t// Allow multiple packages in the same directory\n\t\tif _, ok := err.(*build.MultiplePackageError); !ok {\n\t\t\treturn nil, fmt.Errorf(\"failed to parse go source files: %v\", err)\n\t\t}\n\t}\n\n\tgoFiles := make([]string, len(pkg.GoFiles))\n\tfor i := range pkg.GoFiles {\n\t\tgoFiles[i] = filepath.Join(origMagePath, pkg.GoFiles[i])\n\t}\n\n\tdebug.Printf(\"found %d go files with build tag %s (files: %v)\", len(goFiles), tag, goFiles)\n\treturn goFiles, nil\n}", "title": "" }, { "docid": "ad48313acb53e0851a204fe6952d57b4", "score": "0.546037", "text": "func list(args []string, v *blob.InfluxVolume) error {\n\tif l := len(args); l != 2 && l != 3 {\n\t\treturn fmt.Errorf(\"Usage: %s inspect [/path/prefix]\", args[0])\n\t}\n\n\tpattern := \"/\"\n\tif len(args) == 3 {\n\t\tpattern = args[2]\n\t}\n\tfiles, err := v.ListFiles(pattern, blob.ListOptions{\n\t\tListMatch: blob.ByPrefix,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, f := range files {\n\t\tfmt.Println(f)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0c310df392e2e5a7475cb99f6184d89b", "score": "0.54568774", "text": "func getFilesInDir(directory string) ([]os.FileInfo,error) {\n\tentries, err := ioutil.ReadDir(directory)\n\tif err != nil {\n\t\tlog.Printf(\"getFilesInDir(): Error reading directory: %s\",directory)\n\t\treturn nil,err\n\t}\n\tvar files []os.FileInfo\n\tfor _,entry := range entries {\n\t\tif entry.Mode().IsRegular() {\n\t\t\tmatch,_ := regexp.Match(\"f-[0-9]+\",[]byte(entry.Name()))\n\t\t\tif match {\n\t\t\t\tfiles = append(files,entry)\n\t\t\t}\n\t\t}\n\t}\n\treturn files,nil\n}", "title": "" }, { "docid": "5f811a38e14f89e51ea1995cb172636f", "score": "0.5454183", "text": "func TestUntagFiles(t *testing.T) {\n\tdb := getDb(t)\n\tdefer db.Close()\n\tfileCount := 20\n\ttags, _, err := createFilesAndTags(db, \"baseName\", \"xxx\", fileCount, 3)\n\tif err != nil {\n\t\tt.Errorf(\"Could not create files for test %s\", err)\n\t}\n\t// remove tags\n\terr = UntagFiles(db, tags)\n\tif err != nil {\n\t\tt.Errorf(\"Could not untag file: %s\", err)\n\t}\n\t// now make sure we can't find any files with all 3 tags\n\tfoundFiles, err := GetFilesWithTags(db, tags, \"\")\n\tif len(foundFiles) != 0 {\n\t\tt.Errorf(\"Should have found 0 files but found %d\", len(foundFiles))\n\t}\n\t// make sure they're still searchable, though\n\tfoundFiles, err = GetFilesWithTags(db, tags[:2], \"\")\n\tif len(foundFiles) != fileCount {\n\t\tt.Errorf(\"Expected to find %d files but found %d\", fileCount, len(foundFiles))\n\t}\n}", "title": "" }, { "docid": "77a7d4e9ba5f5c59d885909463e14edf", "score": "0.54384804", "text": "func List(otaZIP string) ([]os.FileInfo, error) {\n\tzr, err := zip.OpenReader(otaZIP)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to open ota zip\")\n\t}\n\tdefer zr.Close()\n\treturn parseBOM(&zr.Reader, `post.bom$`)\n}", "title": "" }, { "docid": "4884be0568959346b2bba0da01dcf2e8", "score": "0.5428968", "text": "func getList(baseurl string, resolution string, subdir string) []string {\n\tvar list []string\n\n\t// fetch the list of srtm files\n\turl := baseurl + \"/\" + resolution + \"/\" + subdir\n\n\tresp, err := http.Get(url)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\troot, err := html.Parse(resp.Body)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tfiles := scrape.FindAll(root, scrape.ByTag(atom.A))\n\n\tfor _, file := range files {\n\t\tfileurl := url + \"/\" + scrape.Attr(file, \"href\")\n\n\t\tif strings.Contains(fileurl, \".zip\") {\n\t\t\t// fmt.Printf(\"%2d %s (%s)\\n\", i, scrape.Text(file), fileurl)\n\t\t\tlist = append(list, fileurl)\n\t\t}\n\t}\n\n\treturn list\n}", "title": "" }, { "docid": "fcea42e149529de35f73c2818859236e", "score": "0.54191697", "text": "func (p *Package) FilesMatching(tags ...string) (files []string) {\n\tif len(tags) == 0 {\n\t\treturn nil\n\t}\n\tfor file, tag := range p.tags {\n\t\tif tag.match(tags) {\n\t\t\tfiles = append(files, file)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "1325c15d5466dabb0f79cb6636b1474d", "score": "0.54133654", "text": "func TestTagFile(t *testing.T) {\n\tdb := getDb(t)\n\tdefer db.Close()\n\n\ttags, files, err := createFilesAndTags(db, \"myfile\", \"mypath\", 1, 2)\n\tif err != nil {\n\t\tt.Errorf(\"Could not create files for test %s\", err)\n\t}\n\t// ensure we can't find the file when looking with the 3rd tag\n\tfoundFiles, err := GetFilesWithTags(db, tags, \"\")\n\tif isFileFound(foundFiles, files[0]) {\n\t\tt.Errorf(\"File %d found when it should no have been\", files[0].Id)\n\t}\n\n\t// now tag it and ensure we can find the file\n\terr = TagFile(db, files[0].Id, tags[2:])\n\tif err != nil {\n\t\tt.Errorf(\"Could not tag file: %s\", err)\n\t} else {\n\t\tfoundFiles, err = GetFilesWithTags(db, tags, \"\")\n\t\tif !isFileFound(foundFiles, files[0]) {\n\t\t\tt.Errorf(\"Expected to find tag id %d but it was not there\", files[0].Id)\n\t\t}\n\t}\n\n\t// Check error conditions\n\tconditions := []struct {\n\t\ttags []metadata.TagInfo\n\t}{\n\t\t{tags},\n\t\t{nil},\n\t\t{make([]metadata.TagInfo, 0)},\n\t}\n\tfor _, condition := range conditions {\n\t\terr = TagFile(db, files[0].Id, condition.tags)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Should not get error, but got %s\", err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e4930efa713e445abf5d15dd1ded5709", "score": "0.5388033", "text": "func ListFilenames(path string) []os.FileInfo {\n Trace.Println(\"listFilenames(\" + path + \")\")\n\n files, err := ioutil.ReadDir(path)\n if err != nil {\n Error.Println(err)\n os.Exit(1)\n }\n\n return files\n}", "title": "" }, { "docid": "1f462b8212afe3c9c22787938971a0ea", "score": "0.5383997", "text": "func listArchive() {\n files, err := ioutil.ReadDir(settings.PATH_ARCHIVE)\n utils.CheckError(err)\n\n fmt.Printf(\"| %s:\\n\", settings.User.Hash)\n for _, file := range files {\n fmt.Println(\"|\", file.Name())\n }\n}", "title": "" }, { "docid": "6134fce8f79009fd4352c6e5ba72b406", "score": "0.5358594", "text": "func listFiles(svc *storage.Service, bucketName string, filePrefix string) ([]string, error) {\n\t// List all objects in a bucket using pagination\n\tvar files []string\n\ttoken := \"\"\n\tfor {\n\t\tcall := svc.Objects.List(bucketName)\n\t\tcall.Prefix(filePrefix)\n\t\tif token != \"\" {\n\t\t\tcall = call.PageToken(token)\n\t\t}\n\t\tres, err := call.Do()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor _, object := range res.Items {\n\t\t\tfiles = append(files, object.Name)\n\t\t}\n\t\tif token = res.NextPageToken; token == \"\" {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn files, nil\n}", "title": "" }, { "docid": "77389b702adcf6b8e6d9160af2814c4c", "score": "0.53554904", "text": "func (*GetTagListRequest) Descriptor() ([]byte, []int) {\n\treturn file_tag_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "51566563ee6ed904a9788446834ef260", "score": "0.5336438", "text": "func list() {\n\tcmd := exec.Command(\"git\", \"ls-remote\", \"--tags\", remote, \"go1*\")\n\tout, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tscan := bufio.NewScanner(bytes.NewReader(out))\n\tfor scan.Scan() {\n\t\tline := scan.Text()\n\t\tff := strings.Fields(line)\n\t\tif len(ff) != 2 {\n\t\t\tlog.Fatalf(\"unexpected git ls-remote line %q\", line)\n\t\t}\n\t\tfmt.Println(strings.TrimPrefix(ff[1], \"refs/tags/\"))\n\t}\n}", "title": "" }, { "docid": "21a4ea85163c8c40d0acce21e64c2458", "score": "0.5336433", "text": "func (o DatastoreFileshareOutput) Tags() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v *DatastoreFileshare) pulumi.StringMapOutput { return v.Tags }).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "6b3217b11bca6d0b493d8e2cb8d2a2e9", "score": "0.5334953", "text": "func (p *servicePackage) ListTags(ctx context.Context, meta any, identifier string) error {\n\ttags, err := ListTags(ctx, meta.(*conns.AWSClient).InspectorConn(ctx), identifier)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif inContext, ok := tftags.FromContext(ctx); ok {\n\t\tinContext.TagsOut = types.Some(tags)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c2598f1eaba5212fa2a18685e696071b", "score": "0.53327596", "text": "func readFile(file, path string) ([]string, error) {\n\tinFile, err := os.Open(path + file)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer inFile.Close()\n\ttags := []string{}\n\tscanner := bufio.NewScanner(inFile)\n\tscanner.Split(bufio.ScanLines)\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\tindexStart := strings.Index(line, \"<\")\n\t\tindexEnd := strings.Index(line, \">\")\n\t\tif (indexStart != -1) && (indexEnd != -1) {\n\t\t\ttags = append(tags, line[indexStart:indexEnd+1])\n\t\t}\n\t}\n\treturn tags, nil\n}", "title": "" }, { "docid": "ee257f6afddad9b86af7c7dcc9429675", "score": "0.5328994", "text": "func (g *GitLocal) FilterTags(dir string, filter string) ([]string, error) {\n\treturn g.GitCLI.FilterTags(dir, filter)\n}", "title": "" }, { "docid": "221a32607930534072221a97807d50e9", "score": "0.5313795", "text": "func ListImagesFile(inFiles []string, selectedPages []string, conf *model.Configuration) ([]string, error) {\n\tif len(selectedPages) == 0 {\n\t\tlog.CLI.Printf(\"pages: all\\n\")\n\t}\n\tss := []string{}\n\tfor _, fn := range inFiles {\n\t\tf, err := os.Open(fn)\n\t\tif err != nil {\n\t\t\tif len(inFiles) > 1 {\n\t\t\t\tss = append(ss, fmt.Sprintf(\"\\ncan't open %s: %v\", fn, err))\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\t\tdefer f.Close()\n\t\toutput, err := ListImages(f, selectedPages, conf)\n\t\tif err != nil {\n\t\t\tif len(inFiles) > 1 {\n\t\t\t\tss = append(ss, fmt.Sprintf(\"\\n%s: %v\", fn, err))\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\t\tss = append(ss, \"\\n\"+fn)\n\t\tss = append(ss, output...)\n\t}\n\treturn ss, nil\n}", "title": "" }, { "docid": "d40b48169ad22538f5d8d0414483f89d", "score": "0.5312958", "text": "func (server *RepositoriesService) ListTags(ctx context.Context, project string, repo string, opt *ListOpts) (*Tags, *http.Response, error) {\n\tu := fmt.Sprintf(\"rest/api/1.0/projects/%s/repos/%s/tags\", project, repo)\n\treq, err := server.v1Client.NewRequest(http.MethodGet, u, nil, opt)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tvar tags Tags\n\tresp, err := server.v1Client.Do(req, &tags)\n\treturn &tags, resp, err\n}", "title": "" }, { "docid": "5a99b4f4d860325541f383f95e27fc9d", "score": "0.53129506", "text": "func TestCountFilesWithTag(t *testing.T) {\n\tdb := getDb(t)\n\tdefer db.Close()\n\tfileCount := 10\n\ttags, _, err := createFilesAndTags(db, \"baseName\", \"xxx\", fileCount, 3)\n\tif err != nil {\n\t\tt.Errorf(\"Could not create files for test %s\", err)\n\t}\n\t_, _, err = createFilesAndTags(db, \"baseName\", \"yyy\", fileCount, 2)\n\tif err != nil {\n\t\tt.Errorf(\"Could not create files for test %s\", err)\n\t}\n\textraTag, err := AddTag(db, \"zzzz\", nil)\n\tconditions := []struct {\n\t\ttag metadata.TagInfo\n\t\texpectedCount int\n\t}{\n\t\t{tags[0], fileCount * 2},\n\t\t{extraTag, 0},\n\t\t{tags[2], fileCount},\n\t}\n\tfor _, condition := range conditions {\n\t\tcount, err := CountFilesWithTag(db, condition.tag)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Could not count files: %s\", err)\n\t\t}\n\t\tif count != condition.expectedCount {\n\t\t\tt.Errorf(\"Searching for %s yielded %d files but expected %d\",\n\t\t\t\tcondition.tag.Text, count, condition.expectedCount)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "34145e59210abbb76d7f044ea42d9b32", "score": "0.53013927", "text": "func ListTags() []string {\n\treturn _tags\n}", "title": "" }, { "docid": "ff766ef6f904051c22cd8293c7033981", "score": "0.52920705", "text": "func getTagDocuments(p config.Config, swagger *openapi3.Swagger, allDocuments docs.Index) docs.Index {\n\tio.WriteString(os.Stdout, fmt.Sprintf(\"\\033[1m %s\\033[0m (%v tags)\\n\", \"Tags\", len(swagger.Tags)))\n\tfor _, tag := range swagger.Tags {\n\n\t\tvar document docs.Document\n\n\t\t// Basics.\n\t\tdocument.Site = p.Name\n\t\tdocument.Title = tag.Name\n\t\tdocument.Section = \"\"\n\t\tdocument.Subsection = \"\"\n\n\t\t// URLs.\n\t\trel_url := fmt.Sprintf(\"#tag/%s\", strings.Replace(tag.Name, \" \", \"-\", -1))\n\t\tfull_url := fmt.Sprintf(\"%s%s\", p.URL, rel_url)\n\t\tdocument.URL = full_url\n\t\tdocument.RelativeURL = fmt.Sprintf(\"/%s\", rel_url)\n\n\t\t// DocumentID hash.\n\t\th := sha1.New()\n\t\th.Write([]byte(full_url))\n\t\tdocument.DocumentID = fmt.Sprintf(\"%x\", h.Sum(nil))\n\n\t\t// Match `config.yaml` rank, and use React primary/secondary designation.\n\t\tdocument.Rank = p.Rank\n\t\tif p.Rank == 1 {\n\t\t\tdocument.Source = \"primary\"\n\t\t} else {\n\t\t\tdocument.Source = \"secondary\"\n\t\t}\n\n\t\t// Document body text.\n\t\tdocument.Text = strings.Replace(tag.Description, \"\\n\", \" \", -1)\n\n\t\t// Document description.\n\t\tdocument.Description = strings.Replace(tag.Description, \"\\n\", \" \", -1)\n\n\t\t// Append the document.\n\t\tallDocuments.Documents = append(allDocuments.Documents, document)\n\t}\n\n\treturn allDocuments\n}", "title": "" }, { "docid": "f29b022fdcfadf5456a9f1573744dbc0", "score": "0.5291335", "text": "func (adp *s3Storage) Files(ctx context.Context, ptn string) ([]string, error) {\n\tg, err := glob.Compile(strings.TrimLeft(adp.dsn.Join(ptn), \"/\"))\n\tif err != nil {\n\t\treturn []string{}, err\n\t}\n\n\ti, files := 0, []string{}\n\terr = s3.New(adp.dsn.Sess).ListObjectsPages(&s3.ListObjectsInput{\n\t\tBucket: aws.String(adp.dsn.Bucket),\n\t}, func(p *s3.ListObjectsOutput, last bool) (shouldContinue bool) {\n\t\ti++\n\n\t\tfor _, obj := range p.Contents {\n\t\t\tif g.Match(*obj.Key) {\n\t\t\t\tfiles = append(files, fmt.Sprintf(\"s3://%s/%s\", *p.Name, *obj.Key))\n\t\t\t}\n\t\t}\n\n\t\treturn true\n\t})\n\tif err != nil {\n\t\tlogger.Printf(\"Failed to retrieve list objects %s\", err)\n\t\treturn []string{}, err\n\t}\n\n\treturn files, nil\n}", "title": "" }, { "docid": "11faf4e6626918bd5f13178b0fa0c19d", "score": "0.5291052", "text": "func (f *flags) Tags() []string {\n\tif f.opt.Tags == modeFlagUnUsed {\n\t\treturn nil\n\t}\n\treturn f.exclude(f.getvalue(f.opt.Tags, \"tags\", \"t\"),\n\t\tf.getvalue(f.opt.ExcludeTags, \"nt\", \"\"))\n\n}", "title": "" }, { "docid": "76fcd7ba303ec26d4151e426cd4e07d1", "score": "0.52785474", "text": "func tag() string {\n\tbuf := &bytes.Buffer{}\n\t_, _ = sh.Exec(nil, buf, nil, \"git\", \"describe\", \"--tags\")\n\treturn buf.String()\n}", "title": "" }, { "docid": "a3e70628f05642942b7c46eb7d1af7ca", "score": "0.5277449", "text": "func (c Client) ListTags(repo string) ([]string, error) {\n\tif c.isHub {\n\t\ttags, err := c.HubClient.QueryImageTags(repo)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvar res []string\n\t\tfor _, t := range tags {\n\t\t\tres = append(res, t.Name)\n\t\t}\n\t\treturn res, nil\n\t}\n\n\tif c.version == \"v1\" {\n\t\tauth, err := c.RegClient.Hub.GetReadToken(repo)\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"GetReadToken failed:%s\\n\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\ttagMap, err := c.RegClient.Repository.ListTags(repo, auth)\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"ListTags failed, error info:%s\\n\", err)\n\t\t\treturn nil, err\n\t\t}\n\t\tglog.V(6).Infof(\"ListTags v1 succeeds, repo:%s, results: %v\\n\", repo, tagMap)\n\t\ttags := make([]string, 0, 64)\n\t\tfor key := range tagMap {\n\t\t\ttags = append(tags, key)\n\t\t}\n\t\treturn tags, nil\n\t}\n\n\t// use v2 version api\n\ttags, err := c.RegClientV2.Tags(repo)\n\tif err != nil {\n\t\tglog.Errorf(\"ListTags failed, error info: %s\\n\", err)\n\t\treturn nil, err\n\t}\n\tglog.V(6).Infof(\"ListTags v2 succeeds, repo: %s, results: %v\\n\", repo, tags)\n\treturn tags, nil\n}", "title": "" }, { "docid": "20d3807d199ee89d0236314186ab9fc7", "score": "0.5276648", "text": "func TestGetFileCountWithSingleTag(t *testing.T) {\n\tdb := getDb(t)\n\tdefer db.Close()\n\tfileCount := 10\n\ttags, _, err := createFilesAndTags(db, \"baseName\", \"xxx\", fileCount, 3)\n\tif err != nil {\n\t\tt.Errorf(\"Could not create files for test %s\", err)\n\t}\n\tfor _, tag := range tags {\n\t\tcount, err := GetFileCountWithSingleTag(db, tag)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Could not count files: %s\", err)\n\t\t}\n\t\tif count != 0 {\n\t\t\tt.Errorf(\"Could should have been 0 but was %d\", count)\n\t\t}\n\t}\n\t_, _, err = createFilesAndTags(db, \"baseName2\", \"xxx\", fileCount, 1)\n\tif err != nil {\n\t\tt.Errorf(\"Could not create files for test %s\", err)\n\t}\n\tcount, err := GetFileCountWithSingleTag(db, tags[0])\n\tif err != nil {\n\t\tt.Errorf(\"Could not count files: %s\", err)\n\t}\n\tif count != fileCount {\n\t\tt.Errorf(\"Could should have been %d but was %d\", fileCount, count)\n\t}\n}", "title": "" }, { "docid": "411e94e96c4c18202be7d35b4ca3790f", "score": "0.5272246", "text": "func (rfs *RootFileSystem) ReadFileTag(fileName string, tagName string) ([]byte, error) {\n\t// Traverse the directory node system to find the BlockNode for the FileNode\n\t// Load that up, and read from the Blocks, appending to a single bytebuffer and then return that\n\t// If the ContinuationNode is set, load that one and carry on there\n\n\tfn, err := rfs.retrieveFn(fileName, false)\n\n\tif err == nil {\n\t\trouteBlock, ok := fn.AlternateRoutes[tagName]\n\t\tif !ok {\n\t\t\treturn nil, errors.New(\"That tag does not exist\")\n\t\t}\n\t\troute := rfs.getRoute(routeBlock)\n\t\tbuffer := new(bytes.Buffer)\n\t\tfor _, i := range route.DataBlockNames {\n\t\t\tdata := rfs.BlockHandler.GetRawBlock(fn.DataBlocks[i])\n\t\t\tbuffer.Write(data)\n\t\t}\n\t\treturn buffer.Bytes(), nil\n\t} else {\n\t\treturn nil, err\n\t}\n}", "title": "" }, { "docid": "51ae39b5e0f3491ec27ccfca91455476", "score": "0.52686393", "text": "func RecognizeEtag(tag string) bool {\n\tfor _, file := range allFiles {\n\t\tif file.Etag == tag {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d95bb51e9287c11253245d9f2441bf90", "score": "0.5260646", "text": "func (lv *LogicalVolume) Tags() ([]string, error) {\n\tresult := new(lvsOutput)\n\tif err := run(\"lvs\", result, \"--options=lv_tags\", lv.vg.name+\"/\"+lv.name); err != nil {\n\t\tif IsLogicalVolumeNotFound(err) {\n\t\t\treturn nil, ErrLogicalVolumeNotFound\n\t\t}\n\t\treturn nil, err\n\t}\n\tfor _, report := range result.Report {\n\t\tfor _, lv := range report.Lv {\n\t\t\treturn lv.tagList(), nil\n\t\t}\n\t}\n\treturn nil, ErrLogicalVolumeNotFound\n}", "title": "" }, { "docid": "fab5f2c1cb27d954016dc979e3a91330", "score": "0.52572733", "text": "func (*GetTagListReply) Descriptor() ([]byte, []int) {\n\treturn file_tag_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "6ad8f8da79fa5511aabf04784ef23545", "score": "0.52570707", "text": "func (r *RepositoryV2) Tags() (out []struct {\n\tName string\n\tImage string\n}, err error) {\n\turl := fmt.Sprintf(\"https://%s/v2/%s/tags/list\", r.Registry, r.Image)\n\treq, err := http.NewRequest(http.MethodGet, url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar apiResp struct {\n\t\tTags []string `json:\"tags\"`\n\t}\n\terr = json.NewDecoder(resp.Body).Decode(&apiResp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, tagName := range apiResp.Tags {\n\t\tout = append(out, struct {\n\t\t\tName string\n\t\t\tImage string\n\t\t}{\n\t\t\tName: tagName,\n\t\t\tImage: fmt.Sprintf(\"%s/%s:%s\", r.Registry, r.Image, tagName),\n\t\t})\n\t}\n\treturn out, nil\n}", "title": "" }, { "docid": "717b7887bf5ab5314ff02d2511450d50", "score": "0.5255835", "text": "func fetchTags(c *gin.Context) {\n\tbody, err := ioutil.ReadAll(c.Request.Body)\n\n\tif err != nil {\n\t\tfmt.Printf(\"Error--read file: %s\", err)\n\t}\n\tvar request struct {\n\t\tImage string `json:\"image\"`\n\t}\n\terr = json.Unmarshal(body, &request)\n\tif err != nil {\n\t\tfmt.Printf(\"Error--parse json: %s\", err)\n\t}\n\n\t// TODO: somehow refresh token before it expires, without waiting for a request on an expired token\n\tif !CLFclient.isAccessible() {\n\t\tCLFclient.refreshToken()\n\t}\n\tclarifaiTags, err := CLFclient.getImageTags(request.Image)\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\ttags, err := getPxTags(clarifaiTags)\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, tags)\n}", "title": "" }, { "docid": "be17056821941ea9407983ef066dbd1d", "score": "0.5245064", "text": "func TagList() {\n\tfmt.Println(\"Shortcut command configured are below:\")\n\tfor tg, cmd := range C.Tags {\n\t\tfmt.Println(\" \", tg, \":\", cmd)\n\t}\n\tos.Exit(0)\n}", "title": "" }, { "docid": "ed064fea6fcdc66af871b603881c6b4a", "score": "0.52450365", "text": "func (c *FakeImageTags) List(ctx context.Context, opts v1.ListOptions) (result *imagev1.ImageTagList, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewListAction(imagetagsResource, imagetagsKind, c.ns, opts), &imagev1.ImageTagList{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\n\tlabel, _, _ := testing.ExtractFromListOptions(opts)\n\tif label == nil {\n\t\tlabel = labels.Everything()\n\t}\n\tlist := &imagev1.ImageTagList{ListMeta: obj.(*imagev1.ImageTagList).ListMeta}\n\tfor _, item := range obj.(*imagev1.ImageTagList).Items {\n\t\tif label.Matches(labels.Set(item.Labels)) {\n\t\t\tlist.Items = append(list.Items, item)\n\t\t}\n\t}\n\treturn list, err\n}", "title": "" }, { "docid": "78380c80bff5344c66a71184116d6723", "score": "0.52388406", "text": "func FilesFor(ext string) []string {\n return assets[ext]\n}", "title": "" }, { "docid": "59241168e0134deab383cb7c61401406", "score": "0.52305895", "text": "func (h *handler) ListTags(ctx context.Context) ([]string, error) {\n\treturn h.setting.TagsList(ctx)\n}", "title": "" }, { "docid": "b582cf5a5179f59ce07f45caf6d7d7fc", "score": "0.5226975", "text": "func CommandShowTags(conf Config, ctx, query Query) error {\n\tts, err := LoadTaskSet(conf.Repo, conf.IDsFile, false)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tquery = query.Merge(ctx)\n\tts.Filter(query)\n\n\tfor tag := range ts.GetTags() {\n\t\tfmt.Println(tag)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a900709bab59bace7c3b7346cdc04bcc", "score": "0.52174026", "text": "func (r *TagRepository) List(onlyActive bool) []models.Tag {\n\tvar data []models.Tag\n\n\tquery := r.Conn.Order(\"name ASC\")\n\tif onlyActive {\n\t\tquery = query.\n\t\t\tJoins(\"INNER JOIN bookmarks_tags ON bookmarks_tags.tag_id = tags.id\").\n\t\t\tJoins(\"INNER JOIN bookmarks ON bookmarks.id = bookmarks_tags.bookmark_id\")\n\t}\n\n\tquery.Select(\"DISTINCT tags.*\").Find(&data)\n\n\treturn data\n}", "title": "" }, { "docid": "369faf1f528e08cba2cb489759bb3f92", "score": "0.5202987", "text": "func (storage *B2Storage) ListFiles(threadIndex int, dir string) (files []string, sizes []int64, err error) {\n for len(dir) > 0 && dir[len(dir) - 1] == '/' {\n dir = dir[:len(dir) - 1]\n }\n length := len(dir) + 1\n\n includeVersions := false\n if dir == \"chunks\" {\n includeVersions = true\n }\n\n entries, err := storage.clients[threadIndex].ListFileNames(dir, false, includeVersions)\n if err != nil {\n return nil, nil, err\n }\n\n if dir == \"snapshots\" {\n\n subDirs := make(map[string]bool)\n\n for _, entry := range entries {\n name := entry.FileName[length:]\n subDir := strings.Split(name, \"/\")[0]\n subDirs[subDir + \"/\"] = true\n }\n\n for subDir, _ := range subDirs {\n files = append(files, subDir)\n }\n } else if dir == \"chunks\" {\n lastFile := \"\"\n for _, entry := range entries {\n if entry.FileName == lastFile {\n continue\n }\n lastFile = entry.FileName\n if entry.Action == \"hide\" {\n files = append(files, entry.FileName[length:] + \".fsl\")\n } else {\n files = append(files, entry.FileName[length:])\n }\n sizes = append(sizes, entry.Size)\n }\n } else {\n for _, entry := range entries {\n files = append(files, entry.FileName[length:])\n }\n }\n\n return files, sizes, nil\n}", "title": "" }, { "docid": "e6f0333f1f4b79568ff1b8bd8f7e80ed", "score": "0.51988757", "text": "func (u *App) List(c echo.Context, p *model.Pagination) ([]model.File, string, string, int64, int64, error) {\n\tau := u.rbac.User(c)\n\tq, err := query.List(au, model.ResourceFile)\n\tif err != nil {\n\t\treturn nil, \"\", \"\", 0, 0, err\n\t}\n\n\treturn u.udb.List(u.db, q, p)\n}", "title": "" }, { "docid": "9833b1760c47a23f7fdcf26c6c8b7c64", "score": "0.51981646", "text": "func Tag(name string, events ...imageapi.TagEvent) namedTagEventList {\n\treturn namedTagEventList{\n\t\tname: name,\n\t\tevents: imageapi.TagEventList{\n\t\t\tItems: events,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "f751d1bbcc77b379932d4304c5dcb4cf", "score": "0.51970005", "text": "func (client IdentityClient) listTags(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/tagNamespaces/{tagNamespaceId}/tags\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListTagsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "a10b6610d9b89337202460669be18f22", "score": "0.51807535", "text": "func (a *edenScraper) fileList() ([]string, error) {\n\t// Get homepage.\n\tres, err := httpGet(edenHome, nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to get homepage: %v\", err)\n\t}\n\tdefer res.Body.Close()\n\tbody, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to read homepage: %v\", err)\n\t}\n\n\t// Parse links.\n\tresult := []string{}\n\tfiles := regexp.MustCompile(\"<a href=\\\"(.*?)\\\"\").FindAllSubmatch(body, -1)\n\tif len(files) == 0 {\n\t\treturn nil, fmt.Errorf(\"Got 0 files.\")\n\t}\n\n\tfor _, file := range files {\n\t\t// All links should end with '.zip'. A change in that condition means\n\t\t// that the homepage had changed.\n\t\tif !bytes.HasSuffix(file[1], []byte(\".zip\")) {\n\t\t\treturn nil, fmt.Errorf(\"Found a link that's not a zip file: %s\",\n\t\t\t\tfile[1])\n\t\t}\n\n\t\tresult = append(result, string(file[1]))\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "e1990b8440a0267f3a4f47d202757c17", "score": "0.5180427", "text": "func findfiles(dir string) []string {\n\tfiles, _ := ioutil.ReadDir(dir)\n\tnames := make([]string, 0)\n\tfor _, f := range files {\n\t\tvar filename string\n\t\tfilename = f.Name()\n\t\tif strings.HasSuffix(filename, \".md\") {\n\t\t\tnames = append(names, dir+filename)\n\t\t}\n\t}\n\treturn names\n}", "title": "" }, { "docid": "083a5d5fd2df54146b21a27639ce8d16", "score": "0.51789904", "text": "func (s *ReleaseTagService) List(ctx context.Context, releaseID int64) ([]*ReleaseTagResponse, error) {\n\tquery := \"%24filter=release/id+eq+%27\" + strconv.FormatInt(releaseID, 10) + \"%27\"\n\treturn s.GetWithQuery(ctx, query)\n}", "title": "" }, { "docid": "75f3cfcabf9e426bd238de6c2ce23654", "score": "0.51531726", "text": "func createFilesAndTags(db *sql.DB, baseName string, path string, fileCount int, tagCount int) ([]metadata.TagInfo, []metadata.FileInfo, error) {\n\ttags, err := createTags(db, \"a\", 3)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tfiles := make([]metadata.FileInfo, fileCount)\n\tfor i := 0; i < fileCount; i++ {\n\t\tfiles[i], err = CreateFileInPath(db, fmt.Sprintf(\"%s%d\", baseName, i), path, tags[:tagCount])\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\t}\n\treturn tags, files, nil\n}", "title": "" }, { "docid": "1cc86708afe62b8bea77ba94da9c55bb", "score": "0.51429933", "text": "func (svc *GCSclient) list(bucketName string, filePrefix string) ([]string, error) {\n\tctx, cancel := context.WithTimeout(context.Background(), 300*time.Second)\n\tdefer cancel()\n\t// List all objects in a bucket using pagination\n\tvar files []string\n\tit := svc.Bucket(bucketName).Objects(ctx, &storage.Query{Prefix: filePrefix})\n\tfor {\n\t\tobj, err := it.Next()\n\t\tif err == iterator.Done {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfiles = append(files, obj.Name)\n\t}\n\tsort.Strings(files)\n\treturn files, nil\n}", "title": "" }, { "docid": "88f168cb7310d5c3aabeaac39c0e6ba8", "score": "0.512958", "text": "func (a Artifacts) List() ([]string, error) {\n\tswitch a.Files.(type) {\n\tcase string:\n\t\t// TODO: Apply glob-pattern here\n\t\treturn []string{a.Files.(string)}, nil\n\tcase []string:\n\t\treturn a.Files.([]string), nil\n\t}\n\n\treturn []string{}, nil\n}", "title": "" }, { "docid": "d9fa839bf099a2a5b5f09f4a26650d3d", "score": "0.5118634", "text": "func (p *BaseProcessor) ListTags() ([]*RepoTags, error) {\n\tprojects, err := p.Client.AllProjects(\"\", \"\")\n\tif err != nil {\n\t\tlogrus.Errorf(\"List projects error: %v\", err)\n\t\treturn nil, err\n\t}\n\n\tif len(p.Cfg.Projects) != 0 {\n\t\tprojectsMap := make(map[string]*harbor.Project)\n\t\tfor _, p := range projects {\n\t\t\tprojectsMap[p.Name] = p\n\t\t}\n\n\t\tvar configuredProjects []*harbor.Project\n\t\tfor _, p := range p.Cfg.Projects {\n\t\t\tif pinfo, ok := projectsMap[p]; ok {\n\t\t\t\tconfiguredProjects = append(configuredProjects, pinfo)\n\t\t\t} else {\n\t\t\t\treturn nil, fmt.Errorf(\"project %s not found\", p)\n\t\t\t}\n\t\t}\n\t\tprojects = configuredProjects\n\t}\n\n\tvar results []*RepoTags\n\tfor _, pinfo := range projects {\n\t\tlogrus.Infof(\"Start to collect images for project '%s'\", pinfo.Name)\n\t\trepos, err := p.Client.ListAllRepositories(pinfo.ProjectID)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"list repos for project '%s' error: %v\", pinfo.Name, err)\n\t\t}\n\n\t\tfor _, repo := range repos {\n\t\t\tproj, r := utils.ParseRepository(repo.Name)\n\t\t\ttags, err := p.Client.ListTags(proj, r)\n\t\t\tif err != nil {\n\t\t\t\tlogrus.Errorf(\"List tags for '%s/%s' error: %v\", proj, r, err)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tvar tagsInfo []Tag\n\t\t\tfor _, tag := range tags {\n\t\t\t\ttagsInfo = append(tagsInfo, Tag{\n\t\t\t\t\tName: tag.Name,\n\t\t\t\t\tDigest: tag.Digest,\n\t\t\t\t\tCreated: tag.Created,\n\t\t\t\t})\n\t\t\t}\n\n\t\t\tresults = append(results, &RepoTags{Project: pinfo.Name, Repo: r, Tags: tagsInfo})\n\t\t}\n\t}\n\n\treturn results, nil\n}", "title": "" }, { "docid": "208c4943de0f8c4b48d3041f59f8c56f", "score": "0.511782", "text": "func List(xRefTable *types.XRefTable) (list []string, err error) {\n\n\tlog.Debug.Println(\"List begin\")\n\n\tif !xRefTable.Valid && xRefTable.EmbeddedFiles == nil {\n\t\txRefTable.EmbeddedFiles, err = xRefTable.LocateNameTree(\"EmbeddedFiles\", false)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif xRefTable.EmbeddedFiles == nil {\n\t\treturn nil, nil\n\t}\n\n\tlist, err = listAttachedFiles(xRefTable)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlog.Debug.Println(\"List end\")\n\n\treturn list, nil\n}", "title": "" }, { "docid": "84b6f010e2c308da7ede85649e63647b", "score": "0.51058644", "text": "func Tags(ctx context.Context, repo Repository) ([]string, error) {\n\tvar res []string\n\tif err := repo.Tags(ctx, func(tags []string) error {\n\t\tres = append(res, tags...)\n\t\treturn nil\n\t}); err != nil {\n\t\treturn nil, err\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "ae51dc501d281c7d7994bdc50a58a899", "score": "0.51018393", "text": "func dirList(path string) ([]string, error) {\n\tnames := []string{}\n\tfiles, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\tlog.Printf(\"Template error: %v\", err)\n\t\treturn names, nil\n\t}\n\tfor _, f := range files {\n\t\tnames = append(names, f.Name())\n\t}\n\treturn names, nil\n}", "title": "" }, { "docid": "d663f4b5ee0df62c022c517160d5dfca", "score": "0.509174", "text": "func (fs *IPfsfs) List(path string) (items []string, err error) {\n\tli, err := fs.fullListing(path)\n\tref := li.Arguments[\"/ipfs/\"+fs.base+\"/\"+path]\n\tfor _, it := range li.Objects[ref].Links {\n\t\titems = append(items, it.Name)\n\t}\n\treturn items, nil\n}", "title": "" }, { "docid": "bc5f343c91c2f330bb495a45a3784f9d", "score": "0.5090438", "text": "func (a *API) Tags(ctx context.Context, params TagsParams) (*TagsResult, error) {\n\tres := &TagsResult{}\n\t_, err := a.get(ctx, api.BuildPath(tags, params.AssetType), params, res)\n\n\treturn res, err\n}", "title": "" }, { "docid": "fac6374ea6ab892c917d8768c918b4a0", "score": "0.50777113", "text": "func ListTags(ctx context.Context, conn inspectoriface.InspectorAPI, identifier string) (tftags.KeyValueTags, error) {\n\tinput := &inspector.ListTagsForResourceInput{\n\t\tResourceArn: aws.String(identifier),\n\t}\n\n\toutput, err := conn.ListTagsForResourceWithContext(ctx, input)\n\n\tif err != nil {\n\t\treturn tftags.New(ctx, nil), err\n\t}\n\n\treturn KeyValueTags(ctx, output.Tags), nil\n}", "title": "" }, { "docid": "80542b8f73c7ab1f9790a542d12e255e", "score": "0.50657517", "text": "func (gc *GokuyamaClient) GetKeysByTag(tag string) ([]string, error) {\n\n\tfmt.Fprintf(gc.conn, fmt.Sprintf(\"3,%s,False\\n\", base64.StdEncoding.EncodeToString([]byte(tag))))\n\n\tret, err := bufio.NewReader(gc.conn).ReadString('\\n')\n\tif ret == \"\" {\n\t\tfmt.Println(err)\n\t}\n\n\trets := strings.Split(ret, \",\")\n\n\tif rets[1] == \"true\" {\n\n\t\ttags := strings.Split(rets[2], \":\")\n\n\t\tfor i, tag := range tags {\n\t\t\tdata, err := base64.StdEncoding.DecodeString(tag)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err)\n\t\t\t}\n\t\t\ttags[i] = string(data)\n\t\t}\n\n\t\treturn tags, err\n\t} else {\n\t\treturn nil, nil\n\t}\n}", "title": "" }, { "docid": "5bf707f61f1b18c33f641e77de48661e", "score": "0.50633025", "text": "func (vg *VolumeGroup) Tags() ([]string, error) {\n\tresult := new(vgsOutput)\n\tif err := run(\"vgs\", result, \"--options=vg_tags\", vg.name); err != nil {\n\t\tif IsVolumeGroupNotFound(err) {\n\t\t\treturn nil, ErrVolumeGroupNotFound\n\t\t}\n\n\t\treturn nil, err\n\t}\n\tfor _, report := range result.Report {\n\t\tfor _, vg := range report.Vg {\n\t\t\tvar tags []string\n\t\t\tfor _, tag := range strings.Split(vg.VgTags, \",\") {\n\t\t\t\ttag = strings.TrimSpace(tag)\n\t\t\t\tif tag != \"\" {\n\t\t\t\t\ttags = append(tags, tag)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn tags, nil //nolint: staticcheck\n\t\t}\n\t}\n\treturn nil, ErrVolumeGroupNotFound\n}", "title": "" }, { "docid": "f883874b87f1d0b17f66f45744cfa6a1", "score": "0.504677", "text": "func list_file(p string,id int,pid int) (string,bool,int) {\n file, err := os.Stat(p)\n if err != nil {\n return \"\", false, 1\n }\n\n filemode := file.Mode()\n\n link_parent := \"-\"\n\n if filemode&os.ModeSymlink != 0 {\n link, err := os.Readlink(file.Name())\n if err == nil {\n link_parent = link\n }\n }\n\n uid, gid, inode, is_hardlink,ctime, atime, mtime := file_info(file)\n\n ret_val := fmt.Sprintf(\"%d^%d^%s^%s^%d^%o^%t^%t^%d^%d^%d^%d^%d^%d\",id,pid,file.Name(),link_parent,inode,filemode.Perm(),filemode.IsDir(),is_hardlink,uid,gid,file.Size(),ctime,atime,mtime)\n return ret_val, filemode.IsDir(), 0\n}", "title": "" }, { "docid": "0581b296e0a49b4294a0f6868765ba62", "score": "0.50461525", "text": "func (gw2 *GW2Api) Files() (res []string, err error) {\n\tver := \"v2\"\n\ttag := \"files\"\n\terr = gw2.fetchEndpoint(ver, tag, nil, &res)\n\treturn\n}", "title": "" }, { "docid": "3eb7e77843729b23f563a7eda4f5294f", "score": "0.50444925", "text": "func (f Fess) GetTags() []string {\n\ttags := []string{\n\t\t\"full size\",\n\t\t\"ordinary\",\n\t}\n\treturn tags\n}", "title": "" }, { "docid": "47db81123cf9c660a46b7e45e9d0e365", "score": "0.50428104", "text": "func tag() string {\n\ts, _ := sh.Output(\"git\", \"describe\", \"--tags\")\n\tprint(s)\n\treturn s\n}", "title": "" }, { "docid": "61b2121ad1e1bf92f9eed358f7ac3a30", "score": "0.504206", "text": "func (hdr RPMHeader) Tag(tagname string) []string {\n\tfor _, tag := range hdr.Tags {\n\t\tif tag.Name == tagname {\n\t\t\treturn tag.Values\n\t\t}\n\t}\n\treturn []string{\"\"}\n}", "title": "" }, { "docid": "631b2656f893c3d9460d7ad11264ae7d", "score": "0.50375366", "text": "func (t tagger) deleteTags(modFullTags []string) error {\n\tfor _, modFullTag := range modFullTags {\n\t\tfmt.Printf(\"Deleting tag %v\\n\", modFullTag)\n\t\tcmd := exec.Command(\"git\", \"tag\", \"-d\", modFullTag)\n\t\tif output, err := cmd.CombinedOutput(); err != nil {\n\t\t\treturn fmt.Errorf(\"could not delete tag %v:\\n%v (%v)\", modFullTag, string(output), err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a863f8e3fc2482e91244f23ebd103983", "score": "0.5032705", "text": "func (repo *PostgresRepo) ListFiles(filter earthworks.FileFilter) ([]earthworks.File, error) {\n\n\tvar files []earthworks.File\n\n\tpsql := sq.StatementBuilder.PlaceholderFormat(sq.Dollar)\n\tq := psql.Select(`\n\t\t\tid, filename, created_by, created_at, category\t\n\t\t`).\n\t\tFrom(\"project_file\")\n\n\tif filter.Category != \"\" {\n\t\tq = q.Where(sq.Eq{\"category\": filter.Category})\n\t}\n\n\tif filter.Project != 0 {\n\t\tq = q.Where(sq.Eq{\"project\": filter.Project})\n\t}\n\n\t// filter out archived/deleted files. This is the default.\n\tif !filter.Archived {\n\t\tq = q.Where(sq.Eq{\"expired_at\": nil})\n\t}\n\n\tq = q.OrderBy(\"filename ASC, created_at DESC\")\n\n\tfileQuery, queryArgs, err := q.ToSql()\n\n\tif err != nil {\n\t\treturn files, err\n\t}\n\n\terr = repo.db.Select(&files, fileQuery, queryArgs...)\n\n\treturn files, err\n\n}", "title": "" }, { "docid": "3dd9633085f2f4b260c4978a4868487d", "score": "0.5030128", "text": "func ReadF(Directory string) []string {\n\tfiles, err := ioutil.ReadDir(Directory)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tvar blogs []string\n\tfor _, file := range files {\n\t\t//x, _ := ioutil.ReadFile(Directory + \"/\" + file.Name())//lee el texto\n\t\tblogs = append(blogs, file.Name())\n\t\t//fmt.Println(\"\\n\",\"number:\",split[0])\n\t\t//fmt.Println(file.Name())\n\t}\n\treturn blogs\n}", "title": "" }, { "docid": "a006af0fda3222d8fae225e69f6d1ee3", "score": "0.50296426", "text": "func (a *app) List(w http.ResponseWriter, request provider.Request, message rendererModel.Message) {\n\tfiles, err := a.storage.List(request.GetFilepath(\"\"))\n\tif err != nil {\n\t\ta.renderer.Error(w, request, provider.NewError(http.StatusInternalServerError, err))\n\t\treturn\n\t}\n\n\turi := request.GetURI(\"\")\n\n\titems := make([]provider.RenderItem, len(files))\n\tfor index, file := range files {\n\t\titems[index] = provider.RenderItem{\n\t\t\tID: sha.Sha1(file.Name),\n\t\t\tURI: uri,\n\t\t\tStorageItem: file,\n\t\t}\n\t}\n\n\tcontent := map[string]interface{}{\n\t\t\"Paths\": getPathParts(uri),\n\t\t\"Files\": items,\n\t\t\"Cover\": a.getCover(files),\n\t}\n\n\tif request.CanShare {\n\t\tcontent[\"Shares\"] = a.metadatas\n\t}\n\n\ta.renderer.Directory(w, request, content, message)\n}", "title": "" }, { "docid": "6226958221e011a53c3b4d6797a619f3", "score": "0.5028251", "text": "func (l Util) List(root string, buff []string, rec bool, ext string) (r []string, err error) {\n\tr = buff\n\tentries, err := l.ReadDir(l.path(root))\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor _, e := range entries {\n\t\tp := path.Join(root, e.Name())\n\t\tif e.IsDir() {\n\t\t\tif rec {\n\t\t\t\tr, err = l.List(p, r, true, ext)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tidx := strings.LastIndex(e.Name(), \".\")\n\t\t\tif idx == -1 {\n\t\t\t\tif ext == \"\" {\n\t\t\t\t\tr = append(r, p)\n\t\t\t\t}\n\t\t\t} else if ext == \"\" || e.Name()[idx+1:] == ext {\n\t\t\t\tr = append(r, p)\n\t\t\t}\n\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "821ce765a108407026febdbcff404d27", "score": "0.50253546", "text": "func (r *RefsService) ListTags(owner, repoSlug string, opts ...interface{}) (*Refs, *Response, error) {\n\tresult := new(Refs)\n\turlStr := r.client.requestURL(\"/repositories/%s/%s/refs/tags\", owner, repoSlug)\n\turlStr, addOptErr := addQueryParams(urlStr, opts...)\n\tif addOptErr != nil {\n\t\treturn nil, nil, addOptErr\n\t}\n\n\tresponse, err := r.client.execute(\"GET\", urlStr, result, nil)\n\n\treturn result, response, err\n}", "title": "" }, { "docid": "2f16f13137518bd2317b2e514cb78dde", "score": "0.50197345", "text": "func listFiles(root string) ([]string, error) {\n var paths = make([]string, 0)\n var walker filepath.WalkFunc = func(path string, info os.FileInfo, err error) error {\n if err != nil {\n return err\n } else {\n if ! info.IsDir() {\n path, _ = filepath.Rel(root, path)\n paths = append(paths, path)\n }\n }\n return nil\n }\n err := filepath.Walk(root, walker)\n\n return paths, err\n}", "title": "" }, { "docid": "9b1ec339130174dc632a388a39fef3ca", "score": "0.50197077", "text": "func (c *Client) ListTagsForResource(ctx context.Context, params *ListTagsForResourceInput, optFns ...func(*Options)) (*ListTagsForResourceOutput, error) {\n\tif params == nil {\n\t\tparams = &ListTagsForResourceInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"ListTagsForResource\", params, optFns, addOperationListTagsForResourceMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*ListTagsForResourceOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "acd294c4792a7d85802ce63111c35c83", "score": "0.5014167", "text": "func appShowTags(win *gtk.Window, tagList *[]lib.TagEnt) {\n\tgrid, err := gtk.GridNew()\n\tif err != nil {\n\t\tlog(ERR, fmt.Sprintf(\" creating grid: %s\\n\", err.Error()))\n\t\treturn\n\t}\n\tgrid.SetRowSpacing(10)\n\tgrid.SetColumnSpacing(10)\n\n\tfor i, ent := range *tagList {\n\t\tlabel, err := gtk.LabelNew(ent.Content)\n\t\tif err != nil {\n\t\t\tlog(ERR, fmt.Sprintf(\" creating label: %s\\n\", err.Error()))\n\t\t\treturn\n\t\t}\n\n\t\tlabel.SetHAlign(gtk.ALIGN_START)\n\t\tgrid.Attach(label, 0, i, 1, 1)\n\n\t\thboxTag, err := gtk.BoxNew(gtk.ORIENTATION_HORIZONTAL, 10)\n\t\tif err != nil {\n\t\t\tlog(ERR, fmt.Sprintf(\" creating hboxTag: %s\", err.Error()))\n\t\t\treturn\n\t\t}\n\n\t\tfor _, tag := range ent.Tags {\n\t\t\tbut, err := gtk.ButtonNew()\n\t\t\tif err != nil {\n\t\t\t\tlog(ERR, fmt.Sprintf(\" creating button: %s\", err.Error()))\n\t\t\t\treturn\n\t\t\t}\n\t\t\tbut.SetLabel(tag)\n\t\t\thboxTag.Add(but)\n\t\t}\n\n\t\tgrid.Attach(hboxTag, 1, i, 1, 1)\n\t}\n\n\tvbox, err := gtk.BoxNew(gtk.ORIENTATION_VERTICAL, 10)\n\tif err != nil {\n\t\tlog(ERR, fmt.Sprintf(\" creating vbox: %s\\n\", err.Error()))\n\t\treturn\n\t}\n\tvbox.Add(grid)\n\n\tbtn, err := gtk.ButtonNewWithLabel(\"Try again\")\n\tif err != nil {\n\t\tlog(ERR, fmt.Sprintf(\" creating file reload button: %s\\n\", err.Error()))\n\t\treturn\n\t}\n\tbtn.Connect(\"clicked\", handleFiles, win)\n\n\tvbox.Add(btn)\n\twin.Add(vbox)\n\twin.ShowAll()\n}", "title": "" }, { "docid": "fb9ac886f767ceb5cb2f133d1b0ebc4f", "score": "0.5006294", "text": "func Tag(app *kingpin.Application, cfg *config) {\n\tc := app.Command(\"tag\", \"adds a tag to a file\")\n\tc.Action(func(_ *kingpin.ParseContext) error {\n\t\treturn tag.Tag(cfg)\n\t})\n\tc.Arg(\"file\", \"path to the file\").\n\t\tRequired().\n\t\tExistingFileVar(&cfg.path)\n\tc.Arg(\"tag\", \"a list of tag names or `=` delimited key value pairs\").\n\t\tRequired().\n\t\tStringsVar(&cfg.tags)\n}", "title": "" }, { "docid": "0fd230bb2332326da1e905e9da2da9dc", "score": "0.500153", "text": "func (is *ObjectStorage) GetImageTags(repo string) ([]string, error) {\n\tvar lockLatency time.Time\n\n\tdir := path.Join(is.rootDir, repo)\n\tif fi, err := is.store.Stat(context.Background(), dir); err != nil || !fi.IsDir() {\n\t\treturn nil, zerr.ErrRepoNotFound\n\t}\n\n\tis.RLock(&lockLatency)\n\tdefer is.RUnlock(&lockLatency)\n\n\tindex, err := common.GetIndex(is, repo, is.log)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn common.GetTagsByIndex(index), nil\n}", "title": "" }, { "docid": "b37ef22bb43c2111b4e9ec15761e3f06", "score": "0.49994147", "text": "func ListFilesInVersion(ctx context.Context, base string) ([]string, error) {\n\tlist := make([]string, 0)\n\n\t// check if the version is hidden\n\tif isHidden(base) {\n\t\tlog.Printf(\"ignoring hidden version %s\\n\", base)\n\t\treturn list, nil\n\t}\n\n\t// walk the files recursively within the cdnjs package version directory\n\terr := godirwalk.Walk(base, &godirwalk.Options{\n\t\tCallback: func(fp string, de *godirwalk.Dirent) error {\n\t\t\t// trim a full path to a path relative to the base directory (inside package version dir)\n\t\t\t// trim any leading '/' for consistency with legacy ListFilesGlob implementation\n\t\t\tfp = strings.TrimLeft(strings.TrimPrefix(fp, base), \"/\")\n\t\t\t// path must not be a directory, not be hidden, and not be empty\n\t\t\tif !de.IsDir() && !isHidden(fp) && fp != \"\" {\n\t\t\t\tlist = append(list, fp)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t\tFollowSymbolicLinks: true,\n\t})\n\n\treturn list, err\n}", "title": "" }, { "docid": "86297b2eab18532124e649e0a19f7eeb", "score": "0.49988803", "text": "func (i *Iterator) Tags() ([]newstorage.Tag, error) {\n\treturn nil, errors.New(\"tags failure\")\n}", "title": "" }, { "docid": "6c42dfd557c5ed49260bc8ad87042267", "score": "0.49911594", "text": "func getFilelist(path string, e *error) []string {\n\tfileV := []string{}\n\tfilepath.Walk(path, func(path string, f os.FileInfo, err error) error {\n\t\tif f == nil {\n\t\t\t*e = err\n\t\t\treturn nil\n\t\t}\n\t\tif f.IsDir() {\n\t\t\treturn nil\n\t\t}\n\t\tfileV = append(fileV, path)\n\t\treturn nil\n\t})\n\treturn fileV\n}", "title": "" }, { "docid": "316f346ce3acb8b3fe69e56bafb34909", "score": "0.4986696", "text": "func (req *request) Files() []*File {\n return req.files\n}", "title": "" }, { "docid": "41f8a8510938817be7be290160ae929a", "score": "0.49834487", "text": "func (s *s3) List(key string) ([]string, error) {\n\tif key != \"\" && !strings.HasSuffix(key, \"/\") {\n\t\tkey += \"/\"\n\t}\n\n\tresult, err := s.client.ListObjectsV2(&awss3.ListObjectsV2Input{\n\t\tPrefix: aws.String(key),\n\t\tBucket: aws.String(s.bucket),\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfiles := []string{}\n\tfor _, obj := range result.Contents {\n\t\t_, file := path.Split(*obj.Key)\n\t\tfiles = append(files, file)\n\t}\n\treturn files, nil\n}", "title": "" }, { "docid": "a25e1fbf7b63bbbe54d71d2f1dc8c235", "score": "0.49820063", "text": "func (d *DiskStore) list() ([]string, error) {\n\terr := d.initOnce()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn speedwalk.AllFiles(d.blobDir, true)\n}", "title": "" }, { "docid": "24174d3d02947197ae17834456511c76", "score": "0.49814418", "text": "func (e *Extractor) NamesFromTag(tag string) (out []string, err error) {\n\n\tif err := e.isValidStruct(); err != nil {\n\t\treturn nil, err\n\t}\n\n\ts := reflect.ValueOf(e.StructAddr).Elem()\n\tfields := e.fields(s)\n\n\tfor _, field := range fields {\n\t\tif val, ok := field.tags.Lookup(tag); ok {\n\t\t\tkey, omit := e.parseOmitempty(val, field.value)\n\t\t\tif omit {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tout = append(out, key)\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "ed241b21384102217c6d9b32a1adccd6", "score": "0.497873", "text": "func listFiles(prefix, delimiter, marker string, maxKeys int, b *s3.Bucket) (files []s3.Key, err error) {\n\tresp, err := b.List(prefix, delimiter, marker, maxKeys)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// append to files\n\tfor _, fl := range resp.Contents {\n\t\tif strings.Contains(fl.Key, \"index.html\") || strings.Contains(fl.Key, \"static\") || strings.Contains(fl.Key, \"logs\") {\n\t\t\tcontinue\n\t\t}\n\n\t\tfiles = append(files, fl)\n\t}\n\n\t// recursion for the recursion god\n\tif resp.IsTruncated && resp.NextMarker != \"\" {\n\t\tf, err := listFiles(resp.Prefix, resp.Delimiter, resp.NextMarker, resp.MaxKeys, b)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// append to files\n\t\tfiles = append(files, f...)\n\t}\n\n\treturn files, nil\n}", "title": "" }, { "docid": "2f218fbb74a3be4cce4fa49ad78c019f", "score": "0.49778074", "text": "func (a *Artifact) Files() []string {\n\treturn []string{a.image}\n}", "title": "" } ]
cb886dbd82a4ae1c7dd7d3799f61a5ff
Malloc n bytes sequentially in the writer buffer.
[ { "docid": "71fa960c540b528312e2fbcaeb588df8", "score": "0.67191833", "text": "func (b *netpollByteBuffer) Malloc(n int) (buf []byte, err error) {\n\tif b.status&remote.BitWritable == 0 {\n\t\treturn nil, errors.New(\"unwritable buffer, cannot support Malloc\")\n\t}\n\treturn b.writer.Malloc(n)\n}", "title": "" } ]
[ { "docid": "db9424071165d3f4e99058b399e29da5", "score": "0.6658403", "text": "func (b *Buffer) Alloc(n int) []byte {\n\tif n < 0 {\n\t\tpanic(\"leveldb/util.Buffer.Alloc: negative count\")\n\t}\n\tm := b.grow(n)\n\treturn b.buf[m:]\n}", "title": "" }, { "docid": "fb9317e9d3c31f594740fb706b123a03", "score": "0.6585554", "text": "func _alloc(n int) []byte {\n\t// If the make fails, give a known error.\n\tdefer func() {\n\t\tif recover() != nil {\t\t\t\n\t\t\tpanic(\"Size too large\")\n\t\t}\n\t}()\n\t\n\treturn make([]byte, n)\n}", "title": "" }, { "docid": "9ec482ed2a31a720d1766508855817b8", "score": "0.63958436", "text": "func NewBuffer(n int) *Buffer {\n\treturn &Buffer{\n\t\tsize: n,\n\t\tbuf: make([]byte, n),\n\t\tvalid: 0,\n\t\treadHead: 0,\n\t\twriteHead: 0,\n\t}\n}", "title": "" }, { "docid": "0b0eae445a30e810f96413fc6d71a457", "score": "0.6314417", "text": "func NewWriterSize(w io.Writer, n int) *Writer {\n\treturn NewWriterBuffer(w, make([]byte, 0, n))\n}", "title": "" }, { "docid": "4462f2ac3b8cfeaa6b06dcd2fd1ddd10", "score": "0.61539316", "text": "func New(n int64) BufferAt {\n\treturn &memory{\n\t\tN: n,\n\t\tBuffer: bytes.NewBuffer(nil),\n\t}\n}", "title": "" }, { "docid": "5929acae67d4f8a10a73b0f4efc6a107", "score": "0.61235344", "text": "func (b *ByteBuf) Expansion(n int) {\n\tif free := b.Writeable(); free < n {\n\t\tnewBuf := b.pool.Alloc(b.Capacity() + n)\n\t\toffset := b.writerIndex - b.readerIndex\n\t\tcopy(newBuf, b.buf[b.readerIndex:b.writerIndex])\n\t\tb.readerIndex = 0\n\t\tb.writerIndex = offset\n\t\tb.pool.Free(b.buf)\n\t\tb.buf = newBuf\n\t}\n}", "title": "" }, { "docid": "9938a460614355d2661ecbc81f3720e7", "score": "0.61190075", "text": "func (w *Writer) allocateBlocks(n uint32) (uint32, error) {\n\tif _, err := w.w.Seek(int64(w.blockAllocatorIndex)*BlockSize, io.SeekStart); err != nil {\n\t\treturn 0, fmt.Errorf(\"cannot seek to end of last block, check write alignment: %w\", err)\n\t}\n\tfirstBlock := w.blockAllocatorIndex\n\tw.blockAllocatorIndex += n\n\treturn firstBlock, nil\n}", "title": "" }, { "docid": "9dfe12c4f8cb576a018d7f0f9b7656e1", "score": "0.6036508", "text": "func (b *mp4Buffer) Grow(n uint) {\n\tm := b.grow(int(n))\n\tb.buf = b.buf[:m]\n}", "title": "" }, { "docid": "0c96e3d841da05ed40391ce780d72257", "score": "0.5964801", "text": "func (b *Buffer) grow(n int) int {\n\tm := b.Len()\n\t// If buffer is empty, reset to recover space.\n\tif m == 0 && b.off != 0 {\n\t\tb.Truncate(0)\n\t}\n\tif len(b.buf)+n > cap(b.buf) {\n\t\tvar buf []byte\n\t\tif b.buf == nil && n <= len(b.bootstrap) {\n\t\t\tbuf = b.bootstrap[0:]\n\t\t} else if m+n <= cap(b.buf)/2 {\n\t\t\t// We can slide things down instead of allocating a new\n\t\t\t// slice. We only need m+n <= cap(b.buf) to slide, but\n\t\t\t// we instead let capacity get twice as large so we\n\t\t\t// don't spend all our time copying.\n\t\t\tcopy(b.buf[:], b.buf[b.off:])\n\t\t\tbuf = b.buf[:m]\n\t\t} else {\n\t\t\t// not enough space anywhere\n\t\t\tbuf = makeSlice(2*cap(b.buf) + n)\n\t\t\tcopy(buf, b.buf[b.off:])\n\t\t}\n\t\tb.buf = buf\n\t\tb.off = 0\n\t}\n\tb.buf = b.buf[0 : b.off+m+n]\n\treturn b.off + m\n}", "title": "" }, { "docid": "b2995d1626da154afba01d2abeac1398", "score": "0.59197587", "text": "func (b *Buffer) grow(n int) int {\n\tm := b.Len()\n\t// If buffer is empty, reset to recover space.\n\tif m == 0 && b.off != 0 {\n\t\tb.Truncate(0)\n\t}\n\tif b.buf.Len()+n > b.buf.Cap() {\n\t\tnewLength := 2*b.buf.Cap() + n\n\t\tbuf := b.buf.Make(newLength, newLength)\n\t\tb.buf.Slice(b.off, b.buf.Len()).CopyTo(buf)\n\t\tb.buf = buf\n\t\tb.off = 0\n\t}\n\tb.buf = b.buf.Slice(0, b.off+m+n)\n\treturn b.off + m\n}", "title": "" }, { "docid": "56d490e980cc4f0fdeb3a1a1c11ea495", "score": "0.59090984", "text": "func (b *Buffer) Grow(n int) {\n\tif n < 0 {\n\t\tpanic(\"flexbuf.Buffer.Grow: negative count\")\n\t}\n\n\tl := len(b.buf)\n\tif l+n <= cap(b.buf) {\n\t\treturn\n\t}\n\n\t// Allocate bigger buffer.\n\ttmp := makeSlice(l + n)\n\tcopy(tmp, b.buf)\n\tb.buf = tmp\n\tb.buf = b.buf[:l]\n}", "title": "" }, { "docid": "3700c940c8f9d1a4e00fd1c576cedd52", "score": "0.5897518", "text": "func (b *byteRWSBuffer) grow(n int) {\n\tif n > cap(b.buf) {\n\t\t//buf := make([]byte, n, 2*cap(b.buf)+n)\n\t\tbuf := make([]byte, 2*cap(b.buf)+n)\n\t\tcopy(buf, b.buf[0:b.sz])\n\t\tb.buf = buf\n\t}\n\tif n > b.sz {\n\t\tb.sz = n\n\t}\n}", "title": "" }, { "docid": "e360b2e63ae947769ed438699b5f0945", "score": "0.5875051", "text": "func NewWrapN(n int, delim string, w io.Writer) io.Writer {\n\treturn &wrapn{w: w, delim: []byte(delim), n: n}\n}", "title": "" }, { "docid": "327b7b7a97714f7e7ed43ff03ac1e985", "score": "0.5835947", "text": "func (z *bytesEncWriter) growNoAlloc(n int) (oldcursor int, allocNeeded bool) {\n\toldcursor = z.c\n\tz.c = z.c + n\n\tif z.c > len(z.b) {\n\t\tif z.c > cap(z.b) {\n\t\t\tallocNeeded = true\n\t\t} else {\n\t\t\tz.b = z.b[:cap(z.b)]\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "6946f5fda07620aa95a2ee4704fb32bf", "score": "0.57907635", "text": "func New(n int) (io.WriteCloser, []io.Reader) {\n\treturn NewWithMaxsize(n, 0)\n}", "title": "" }, { "docid": "be32fcec806b209704aa9e0ea7ce47b0", "score": "0.57890314", "text": "func (b *Buffer) Grow(n int) {\n\tif n < 0 {\n\t\tpanic(\"leveldb/util.Buffer.Grow: negative count\")\n\t}\n\tm := b.grow(n)\n\tb.buf = b.buf[0:m]\n}", "title": "" }, { "docid": "c837c7f52ae676bb09a61699c6f39045", "score": "0.57866806", "text": "func NewWriter(file string, n int) *Writer {\n\tos.Remove(file)\n\treturn &Writer{file, n, make([]byte, 0, n)}\n}", "title": "" }, { "docid": "bba3cea21a77d6dc8b76476ac6d44e94", "score": "0.57651556", "text": "func newLimitWriter(n int) *limitWriter {\n\treturn &limitWriter{n: n}\n}", "title": "" }, { "docid": "4c0710c3d6c3b1eb51b62cc4e0e83b14", "score": "0.5742141", "text": "func (b *Buffer) Grow(n int) {\n\tif n < 0 {\n\t\tpanic(\"audio.Buffer.Grow: negative count\")\n\t}\n\tm := b.grow(n)\n\tb.buf = b.buf.Slice(0, m)\n}", "title": "" }, { "docid": "de8aa9dbc9ba1e5e0f5638fa12613ab2", "score": "0.57412374", "text": "func (b *Buffer) ResetN(n int) {\n\tb.Buf = append(b.Buf[:0], make([]byte, n)...)\n}", "title": "" }, { "docid": "fb7e61c21e1836899d0b4432c06f09c7", "score": "0.5724651", "text": "func (b *Buffer) Expand(n int) {\n\tb.Buf = append(b.Buf, make([]byte, n)...)\n}", "title": "" }, { "docid": "91156a782dd398fb47c3abdc41319041", "score": "0.57031834", "text": "func alloc(n int, size, align uintptr) unsafe.Pointer {\n\tsize = alignUp(size, align) * uintptr(n)\n\n\thm.Lock()\n\th := uintptr(unsafe.Pointer(&Heap[0]))\n\tp := alignUp(h, align)\n\tm := size + (p - h)\n\tif m > uintptr(len(Heap)) {\n\t\tpanic(\"out of memory\")\n\t}\n\tHeap = Heap[m:]\n\thm.Unlock()\n\n\tbuiltin.Memset(unsafe.Pointer(p), 0, size)\n\treturn unsafe.Pointer(p)\n}", "title": "" }, { "docid": "38a360560883ae92e9c40cb0049e98f6", "score": "0.56963944", "text": "func (b *mp4Buffer) grow(n int) int {\n\tm := b.Len()\n\t// If mp4Buffer is empty, reset to recover space.\n\tif m == 0 && b.off != 0 {\n\t\tb.Reset()\n\t}\n\t// Try to grow by means of a reslice.\n\tif i, ok := b.tryGrowByReslice(n); ok {\n\t\treturn i\n\t}\n\tif b.buf == nil && n <= smallBufferSize {\n\t\tb.buf = make([]byte, n, smallBufferSize)\n\t\treturn 0\n\t}\n\tc := cap(b.buf)\n\tif n <= c/2-m {\n\t\t// We can slide things down instead of allocating a new\n\t\t// slice. We only need m+n <= c to slide, but\n\t\t// we instead let capacity get twice as large so we\n\t\t// don't spend all our time copying.\n\t\tcopy(b.buf, b.buf[b.off:])\n\t} else if c > maxInt-c-n {\n\t\tpanic(ErrTooLarge)\n\t} else {\n\t\t// Not enough space anywhere, we need to allocate.\n\t\tbuf := makeSlice(2*c + n)\n\t\tcopy(buf, b.buf[b.off:])\n\t\tb.buf = buf\n\t}\n\t// Restore b.off and len(b.buf).\n\tb.off = 0\n\tb.buf = b.buf[:m+n]\n\treturn m\n}", "title": "" }, { "docid": "e7063ca34937174a382b548fbfa6478f", "score": "0.56822425", "text": "func (b *Buffer) grow(n int) {\n\t// Try to grow by means of a reslice.\n\tif ok := b.tryGrowByReslice(n); ok {\n\t\treturn\n\t}\n\tif b.buf == nil && n <= smallBufferSize {\n\t\tb.buf = make([]byte, n, smallBufferSize)\n\t\treturn\n\t}\n\t// Allocate bigger buffer.\n\ttmp := makeSlice(cap(b.buf)*2 + n) // cap(b.buf) may be zero.\n\tcopy(tmp, b.buf)\n\tb.buf = tmp\n}", "title": "" }, { "docid": "51a1dd7d60b05e137a39dd5472e0fe0c", "score": "0.5663265", "text": "func allocPoolByteArrayWriteAccessMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPoolByteArrayWriteAccessValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "11e34cfcfd0882cf08a0429f1211d9c1", "score": "0.5647141", "text": "func newSequenceBuffer(numEntries int) *sequenceBuffer {\n\tsb := &sequenceBuffer{\n\t\tNumEntries: numEntries,\n\t\tEntrySequence: make([]uint32, numEntries),\n\t}\n\tsb.Reset()\n\treturn sb\n}", "title": "" }, { "docid": "94cd132b43f676cfe6372fac9e17512c", "score": "0.5626261", "text": "func (b *Buffer) Grow(n int) {\n\t// possible: panic(\"bytes.Buffer.Grow: negative count\")\n}", "title": "" }, { "docid": "3b83f6211628a15e17124cceb511b250", "score": "0.55824584", "text": "func newArena(n int64) *Arena {\n\t// Don't store data at position 0 in order to reserve offset=0 as a kind\n\t// of nil pointer.\n\tout := &Arena{\n\t\tn: 1,\n\t\tbuf: make([]byte, n),\n\t}\n\treturn out\n}", "title": "" }, { "docid": "29bbc2f7465394dbcf6ed488d04fb5db", "score": "0.5575392", "text": "func (b *Buffer) ensureLen(n int) {\n\tdelta := n - b.available\n\tif delta <= 0 {\n\t\t// no additional space required:\n\t\treturn\n\t}\n\n\t// newly available bytes\n\tb.available += delta\n\n\ttotal := len(b.data) + delta\n\tif total <= cap(b.data) {\n\t\t// enough space in slice -> grow it\n\t\tb.data = b.data[0:total]\n\t\treturn\n\t}\n\n\ttmp := make([]byte, total)\n\tcopy(tmp, b.data)\n\tb.data = tmp\n}", "title": "" }, { "docid": "33bae4949220f67fc48e141cf8c381b4", "score": "0.5569683", "text": "func NewWithMaxsize(n int, m int) (io.WriteCloser, []io.Reader) {\n\tw := new(buffer)\n\tw.maxsize = m\n\tw.lock = new(sync.RWMutex)\n\tw.newData = sync.NewCond(w.lock.RLocker())\n\trs := make([]io.Reader, n)\n\tw.readers = make([]*bufferReader, n)\n\tfor i := 0; i < n; i++ {\n\t\tw.readers[i] = &bufferReader{\n\t\t\tbuffer: w,\n\t\t}\n\t\trs[i] = w.readers[i]\n\t}\n\treturn w, rs\n}", "title": "" }, { "docid": "ff0652e27125fc9c1a1b2178225cb577", "score": "0.5551524", "text": "func (b *Buffer) grow(n int) int {\n\tif b.off > cap(b.buf) {\n\t\tpanic(\"Buffer is used after Put\")\n\t}\n\tm := b.Len()\n\t// If buffer is empty, reset to recover space.\n\tif m == 0 && b.off != 0 {\n\t\tb.Reset()\n\t}\n\t// Try to grow by means of a reslice.\n\tif i, ok := b.tryGrowByReslice(n); ok {\n\t\treturn i\n\t}\n\tif b.buf == nil && n <= smallBufferSize {\n\t\tb.buf = make([]byte, n, smallBufferSize)\n\t\treturn 0\n\t}\n\tc := cap(b.buf)\n\tif n <= c/2-m {\n\t\t// We can slide things down instead of allocating a new\n\t\t// slice. We only need m+n <= c to slide, but\n\t\t// we instead let capacity get twice as large so we\n\t\t// don't spend all our time copying.\n\t\tcopy(b.buf, b.buf[b.off:])\n\t} else if c > maxInt-c-n {\n\t\tpanic(bytes.ErrTooLarge)\n\t} else {\n\t\t// Not enough space anywhere, we need to allocate.\n\t\ttmp := Get(2*c + n)\n\t\tcopy(tmp.buf, b.buf[b.off:])\n\t\tb.buf, tmp.buf = tmp.buf, b.buf\n\t\tPut(tmp)\n\t}\n\t// Restore b.off and len(b.buf).\n\tb.off = 0\n\tb.buf = b.buf[:m+n]\n\treturn m\n}", "title": "" }, { "docid": "fa58ad04935eca01d2a5aade82cbf863", "score": "0.5472818", "text": "func (b *Buffer) Next(n int) []byte {}", "title": "" }, { "docid": "7d05fd8925e497279c9170ab18210739", "score": "0.54681385", "text": "func allocSignalMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfSignalValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "ec9d518610eda0918e6a06cc3c62d365", "score": "0.5418992", "text": "func allocStreamMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfStreamValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "f41f3f20463949a1d5c8563869bc23bc", "score": "0.5390803", "text": "func allocPatternMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPatternValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "f49fc4b332d0d09a649fbaedd6974738", "score": "0.53573805", "text": "func newBuffer(size int, maxPos int) *buffer {\n\treturn &buffer{\n\t\tbuf: make([]byte, size),\n\t\tsize: size,\n\t\tmaxPos: maxPos,\n\t}\n}", "title": "" }, { "docid": "76cd33fc65e011a4174e81fb36ac3f5d", "score": "0.5342266", "text": "func (w *chunkWriter) fillAvailableBufferSpace(payload []byte) ([]byte, error) {\n\tavailable := w.buf.Cap() - w.buf.Len()\n\tif available > len(payload) {\n\t\tavailable = len(payload)\n\t}\n\tif _, err := w.buf.Write(payload[:available]); err != nil {\n\t\treturn nil, err\n\t}\n\treturn payload[available:], nil\n}", "title": "" }, { "docid": "da993b7bb173ff010ccb517492700fc2", "score": "0.5341021", "text": "func newBitWriter(n int) *bitWriter {\n\tnbyte := n / 8\n\tif n%8 != 0 {\n\t\tnbyte++\n\t}\n\tdata := make([]byte, nbyte)\n\treturn &bitWriter{\n\t\tdata: data,\n\t\ti: 0,\n\t\tn: n,\n\t}\n}", "title": "" }, { "docid": "79c357d7623133cbc7a8ae8fcd0ffb41", "score": "0.53330183", "text": "func (pa *PageAllocator) ChunksN() int { return len(pa.allocators) }", "title": "" }, { "docid": "d07d10679e207f6762330d88300cbc91", "score": "0.53302824", "text": "func newNonBuffer(rs io.ReaderAt, offset, size int64) writeBuffer {\n\treturn &nonBuffer{\n\t\tr: io.NewSectionReader(rs, offset, size),\n\t\tsize: int(size),\n\t\thsh: sha1.New(),\n\t}\n}", "title": "" }, { "docid": "41374ae25e4ebe438d99c88362f0dc63", "score": "0.5328589", "text": "func (c *Chunker) fillBuffer() (n int, err error) {\n\tif c.hitEOF { // We won't get anymore here, no need for more allocations\n\t\treturn\n\t}\n\tsize := 10 * c.max\n\tbuf := make([]byte, int(size)) // Make a new slice large enough\n\tn = copy(buf, c.buf) // copy the remaining bytes from the old buffer\n\tfor uint64(n) < size && err == nil { // read until the buffer is at max or we get an EOF\n\t\tvar nn int\n\t\tnn, err = c.r.Read(buf[n:])\n\t\tn += nn\n\t}\n\tc.buf = buf[:n] // we are not going to get any more, resize the buffer\n\tif err == io.EOF {\n\t\tc.hitEOF = true\n\t\terr = nil\n\t}\n\treturn\n}", "title": "" }, { "docid": "d1847be120c89c3cdaa1c59fd78b5eaa", "score": "0.5325392", "text": "func (b *Builder) Grow(n int) {\n\tb.buf.Grow(n)\n}", "title": "" }, { "docid": "ea98452b96f07a93da2ff83a3a400766", "score": "0.5324678", "text": "func (b *Buffer) Next(n int) []byte {\n\tm := b.Len()\n\tif n > m {\n\t\tn = m\n\t}\n\tdata := b.buf[b.off : b.off+n]\n\tb.off += n\n\treturn data\n}", "title": "" }, { "docid": "d5b94a6c08b0d29379d54780c3eb7178", "score": "0.5318345", "text": "func (sb *StrBldr) Grow(n uint) {\n\tm := sb.doGrow(int(n))\t\n\tsb.buf = sb.buf[0:m]\n}", "title": "" }, { "docid": "6496812cd5fbd845884a92ed011d53c7", "score": "0.53073657", "text": "func allocPoolStringArrayWriteAccessMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPoolStringArrayWriteAccessValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "2f2892d20d817fe149ae4b32b163d10c", "score": "0.5301936", "text": "func (r *Buffer) Reserve(n int) {\n\tif n < r.Len() {\n\t\tpanic(\"reserving fewer elements than current length\")\n\t} else if n > cap(r.buffer) {\n\t\tr.grow(n)\n\t}\n}", "title": "" }, { "docid": "a15723238aa89584827a5ea85d97f702", "score": "0.5300748", "text": "func allocGlyphMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfGlyphValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "182330fa331a8ec97d8c66501497de7e", "score": "0.5283953", "text": "func WriterBufNew() *Writer {\n\tb := bytes.NewBuffer([]byte{})\n\treturn &Writer{Writer: bufio.NewWriterSize(b, writersize), Buffer: b, FileBool: false}\n}", "title": "" }, { "docid": "54e38eed68bd498a70ebbbf7fa119a46", "score": "0.5283607", "text": "func reserveBuffer(buf []byte, appendSize int) []byte {\n\tnewSize := len(buf) + appendSize\n\tif cap(buf) < newSize {\n\t\t// Grow buffer exponentially\n\t\tnewBuf := make([]byte, len(buf)*2+appendSize)\n\t\tcopy(newBuf, buf)\n\t\tbuf = newBuf\n\t}\n\treturn buf[:newSize]\n}", "title": "" }, { "docid": "54e38eed68bd498a70ebbbf7fa119a46", "score": "0.5283607", "text": "func reserveBuffer(buf []byte, appendSize int) []byte {\n\tnewSize := len(buf) + appendSize\n\tif cap(buf) < newSize {\n\t\t// Grow buffer exponentially\n\t\tnewBuf := make([]byte, len(buf)*2+appendSize)\n\t\tcopy(newBuf, buf)\n\t\tbuf = newBuf\n\t}\n\treturn buf[:newSize]\n}", "title": "" }, { "docid": "54e38eed68bd498a70ebbbf7fa119a46", "score": "0.5283607", "text": "func reserveBuffer(buf []byte, appendSize int) []byte {\n\tnewSize := len(buf) + appendSize\n\tif cap(buf) < newSize {\n\t\t// Grow buffer exponentially\n\t\tnewBuf := make([]byte, len(buf)*2+appendSize)\n\t\tcopy(newBuf, buf)\n\t\tbuf = newBuf\n\t}\n\treturn buf[:newSize]\n}", "title": "" }, { "docid": "54e38eed68bd498a70ebbbf7fa119a46", "score": "0.5283607", "text": "func reserveBuffer(buf []byte, appendSize int) []byte {\n\tnewSize := len(buf) + appendSize\n\tif cap(buf) < newSize {\n\t\t// Grow buffer exponentially\n\t\tnewBuf := make([]byte, len(buf)*2+appendSize)\n\t\tcopy(newBuf, buf)\n\t\tbuf = newBuf\n\t}\n\treturn buf[:newSize]\n}", "title": "" }, { "docid": "cc102a5fecceddaba8114cec28b9a33e", "score": "0.52789795", "text": "func allocPoolArrayWriteAccessMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPoolArrayWriteAccessValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "843f4edfb9fb6ab7747b2f7589a1f60b", "score": "0.5277101", "text": "func allocGlyphPositionMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfGlyphPositionValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "99141fdc7c20ea2e7801f998d8b6da83", "score": "0.5273428", "text": "func (a ByteAllocator) Alloc(n int) (ByteAllocator, []byte) {\n\tif cap(a)-len(a) < n {\n\t\ta = a.reserve(n)\n\t}\n\tp := len(a)\n\tr := a[p : p+n : p+n]\n\ta = a[:p+n]\n\treturn a, r\n}", "title": "" }, { "docid": "f441230c8a9c2ee1e58a6d3f82d26d5d", "score": "0.52659595", "text": "func (b *Buffer) Next(n int) Slice {\n\tm := b.Len()\n\tif n > m {\n\t\tn = m\n\t}\n\tdata := b.buf.Slice(b.off, b.off+n)\n\tb.off += n\n\treturn data\n}", "title": "" }, { "docid": "fe288e202d7f91bc48e48f2e24989599", "score": "0.52629465", "text": "func allocQuatMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfQuatValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "6e88796c14c3c635d512442260ddfbd4", "score": "0.52613944", "text": "func idxMalloc(tls *libc.TLS, pRc uintptr, nByte int32) uintptr { /* sqlite3expert.c:158:13: */\n\tvar pRet uintptr\n\n\tpRet = sqlite3.Xsqlite3_malloc(tls, nByte)\n\tif pRet != 0 {\n\t\tlibc.Xmemset(tls, pRet, 0, uint64(nByte))\n\t} else {\n\t\t*(*int32)(unsafe.Pointer(pRc)) = SQLITE_NOMEM\n\t}\n\treturn pRet\n}", "title": "" }, { "docid": "0b5a5a78808236847afadd760cff91dd", "score": "0.5240857", "text": "func allocTextExtentsMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfTextExtentsValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "3b5d95afcc5b58b2fa9bf2a9c7ea22de", "score": "0.5235001", "text": "func allocPWcharTMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPWcharTValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "f11d6eb60b8ff55f3ffad7517672fc84", "score": "0.52336216", "text": "func makeSlice(n int) []byte {\n\t// If the make fails, give a known error.\n\tdefer func() {\n\t\tif recover() != nil {\n\t\t\tpanic(bytes.ErrTooLarge)\n\t\t}\n\t}()\n\treturn make([]byte, n)\n}", "title": "" }, { "docid": "f11d6eb60b8ff55f3ffad7517672fc84", "score": "0.52336216", "text": "func makeSlice(n int) []byte {\n\t// If the make fails, give a known error.\n\tdefer func() {\n\t\tif recover() != nil {\n\t\t\tpanic(bytes.ErrTooLarge)\n\t\t}\n\t}()\n\treturn make([]byte, n)\n}", "title": "" }, { "docid": "a2fdbda17a6a3db91a76d14ecb1a4a8a", "score": "0.5193772", "text": "func allocPCharMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPCharValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "a2fdbda17a6a3db91a76d14ecb1a4a8a", "score": "0.5193772", "text": "func allocPCharMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPCharValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "4d0c8dc0397329350a77e3cde77b368d", "score": "0.5190878", "text": "func (s Stream) Buffer(n int) Stream {\n\tif n < 0 {\n\t\tn = 0\n\t}\n\n\tsource := make(chan interface{}, n)\n\tgo func() {\n\t\tfor item := range s.source {\n\t\t\tsource <- item\n\t\t}\n\t\tclose(source)\n\t}()\n\n\treturn Range(source)\n}", "title": "" }, { "docid": "226997512353d1756c110ce8d6a5b241", "score": "0.51875", "text": "func allocFontExtentsMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfFontExtentsValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "dd886e78d7d5bf39a2e71ac33940ef7b", "score": "0.51630735", "text": "func NewMessageBuffer(n int) *MessageBuffer {\n\treturn &MessageBuffer{ringBuf: ring.New(n)}\n}", "title": "" }, { "docid": "946ff0aa79f431fe45565f93fcd189ed", "score": "0.5160739", "text": "func allocPoolIntArrayWriteAccessMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPoolIntArrayWriteAccessValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "da375cfa39c805b3fa4f2a5902f7a038", "score": "0.5152995", "text": "func (b *ByteBuf) MarkN(n int) error {\n\treturn b.MarkIndex(b.readerIndex + n)\n}", "title": "" }, { "docid": "9399122b42cf857a66b91eea77a0082a", "score": "0.51468205", "text": "func CopyN(dst *bytes.Buffer, src io.Reader, n int64) (written int64, err error) {\n\t//var tmp = GetBuffer(int(n))\n\tdst.Grow(int(n))\n\twritten, err = io.CopyBuffer(dst, io.LimitReader(src, n), dst.Bytes()[:n]) // [:n] - expanding slice to needed capacity\n\t//ReleaseBuffer(tmp)\n\tif written == n {\n\t\treturn n, nil\n\t}\n\tif written < n && err == nil {\n\t\t// src stopped early; must have been EOF.\n\t\terr = io.EOF\n\t}\n\treturn\n}", "title": "" }, { "docid": "2db04b71143b5ea305c0f57a17f5add1", "score": "0.51331466", "text": "func TestMemFileWriteAllocs(t *testing.T) {\n\tif runtime.Compiler == \"gccgo\" {\n\t\tt.Skip(\"gccgo allocates here\")\n\t}\n\tctx := context.Background()\n\tfs := NewMemFS()\n\tf, err := fs.OpenFile(ctx, \"/xxx\", os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0666)\n\tif err != nil {\n\t\tt.Fatalf(\"OpenFile: %v\", err)\n\t}\n\tdefer f.Close()\n\n\txxx := make([]byte, 1024)\n\tfor i := range xxx {\n\t\txxx[i] = 'x'\n\t}\n\n\ta := testing.AllocsPerRun(100, func() {\n\t\tf.Write(xxx)\n\t})\n\t// AllocsPerRun returns an integral value, so we compare the rounded-down\n\t// number to zero.\n\tif a > 0 {\n\t\tt.Fatalf(\"%v allocs per run, want 0\", a)\n\t}\n}", "title": "" }, { "docid": "83102a8208b65c2815f57e2efd8a63f4", "score": "0.5108779", "text": "func allocPoolVector3ArrayWriteAccessMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPoolVector3ArrayWriteAccessValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "5c83c01c7f5ac5472bece84cb7ba3023", "score": "0.50925815", "text": "func allocSignalArgumentMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfSignalArgumentValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "d2f783d2c87be58a2f8e741fb53ef1be", "score": "0.50776917", "text": "func (n *NetIO) PrepWriteBuffer() {\n\ts := n.writeBuffer.String()\n\tn.writeBuffer.Reset()\n\tn.PushInt(int32(len(s)))\n\tn.PushByte(0)\n\tn.writeBuffer.WriteString(s) //To prevent null terminating char that is in push string func\n}", "title": "" }, { "docid": "d17141a88a13be009cc71c5f52517c56", "score": "0.50747466", "text": "func (p *Parser) CreateBuffer(bufferSize int) {\n\tp.Row = make(chan []string, bufferSize)\n}", "title": "" }, { "docid": "9e15e21557fd9658f4fa0abaa08c966b", "score": "0.507055", "text": "func allocPoolByteArrayMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPoolByteArrayValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "77b3eec9f814a415b1b4e74430953d2f", "score": "0.5062569", "text": "func makeSlice(n int) []byte {\n\t// If the make fails, give a known error.\n\tdefer func() {\n\t\tif recover() != nil {\n\t\t\tpanic(ErrTooLarge)\n\t\t}\n\t}()\n\treturn make([]byte, n)\n}", "title": "" }, { "docid": "74e35083f5f4f7630656513a55e540ff", "score": "0.5058197", "text": "func (wr *journalWriter) getBytes(n int) (buf []byte, err error) {\n\tc, l := cap(wr.buf), len(wr.buf)\n\tif n > c {\n\t\terr = fmt.Errorf(\"requested bytes (%d) exceeds capacity (%d)\", n, c)\n\t\treturn\n\t} else if n > c-l {\n\t\tif err = wr.flush(); err != nil {\n\t\t\treturn\n\t\t}\n\t}\n\tl = len(wr.buf)\n\twr.buf = wr.buf[:l+n]\n\tbuf = wr.buf[l : l+n]\n\treturn\n}", "title": "" }, { "docid": "8a7f400ad309364b84634db6fb7236b9", "score": "0.50557715", "text": "func (b *netpollByteBuffer) MallocLen() (length int) {\n\tif b.status&remote.BitWritable == 0 {\n\t\treturn -1\n\t}\n\treturn b.writer.MallocLen()\n}", "title": "" }, { "docid": "66b153651a7c940f610cbc274b0e8a66", "score": "0.5045665", "text": "func X__malloc_donate(tls TLS, _start uintptr /* *int8 */, _end uintptr /* *int8 */) {\n\tvar (\n\t\t_align_start_up uint64\n\t\t_align_end_down uint64\n\t\t_c uintptr // *Schunk\n\t\t_n uintptr // *Schunk\n\t)\n\t_align_start_up = uint64(31) & (-uint64(_start) - uint64(16))\n\t_align_end_down = uint64(31) & uint64(_end)\n\tif !(uint64(int64(_end-_start)) <= uint64(16)+_align_start_up+_align_end_down) {\n\t\tgoto _1\n\t}\n\n\treturn\n\n_1:\n\t_start += uintptr(_align_start_up + uint64(16))\n\t_end -= uintptr(_align_end_down)\n\t_c = _start - uintptr(16)\n\t_n = _end - uintptr(16)\n\t*(*uint64)(unsafe.Pointer(_c)) = set600((*uint64)(unsafe.Pointer(_n+8)), uint64(1))\n\t*(*uint64)(unsafe.Pointer(_c + 8)) = set600((*uint64)(unsafe.Pointer(_n)), uint64(1)|uint64(int64(_end-_start)))\n\tX__bin_chunk(tls, _c)\n}", "title": "" }, { "docid": "5748ed81a7b2ff8542d369bf575bbc62", "score": "0.5037775", "text": "func newChunk(size int) *chunk {\n\tchunk_id.Lock()\n\tdefer chunk_id.Unlock()\n\tchunk_id.val++\n\treturn &chunk{id: chunk_id.val, vals: make([]value, 0, size)}\n}", "title": "" }, { "docid": "83d8c798d4ceb2b1f565c35e13bc0f8b", "score": "0.5037421", "text": "func x__simple_malloc(tls TLS, _n uint64) (r uintptr /* *void */) {\n\tesc := MustMalloc(8)\n\tvar (\n\t\t_align uint64\n\t\t_pad uint64\n\t\t_p uintptr // *void\n\t\t_m = esc // *Tsize_t = uint64\n\t\t_new uintptr // *int8\n\t)\n\tdefer Free(esc)\n\t_align = uint64(1)\n\tif !(_n == 0) {\n\t\tgoto _1\n\t}\n\n\t_n++\n_1:\n_2:\n\tif !((_align < _n) && (_align < uint64(16))) {\n\t\tgoto _3\n\t}\n\n\t_align = _align + _align\n\tgoto _2\n\n_3:\n\tX__lock(tls, x597lock)\n\t_pad = -uint64(x598cur) & (_align - uint64(1))\n\tif !(_n <= uint64(9223372036854775823)) {\n\t\tgoto _4\n\t}\n\n\t_n = _n + _pad\n_4:\n\tif !(_n > uint64(int64(x599end-x598cur))) {\n\t\tgoto _5\n\t}\n\n\t*(*uint64)(unsafe.Pointer(_m)) = _n\n\t_new = X__expand_heap(tls, _m)\n\tif !(_new == 0) {\n\t\tgoto _6\n\t}\n\n\tX__unlock(tls, x597lock)\n\treturn null\n\n_6:\n\tif !(_new != x599end) {\n\t\tgoto _7\n\t}\n\n\tx598cur = _new\n\t_n = _n - _pad\n\t_pad = uint64(0)\n_7:\n\tx599end = _new + uintptr(*(*uint64)(unsafe.Pointer(_m)))\n_5:\n\t_p = x598cur + uintptr(_pad)\n\tx598cur += uintptr(_n)\n\tX__unlock(tls, x597lock)\n\treturn _p\n}", "title": "" }, { "docid": "1b9b02b06b63bffaf78653483ef08045", "score": "0.5032453", "text": "func NewWriter(size int) *Writer {\n\treturn &Writer{buf: make([]byte, size)}\n}", "title": "" }, { "docid": "ee19b63b1dcad24ab8af69e0bee9ec08", "score": "0.5018676", "text": "func allocPoolRealArrayWriteAccessMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPoolRealArrayWriteAccessValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "a09d1b7370fed37387ffb9c019660db3", "score": "0.50148296", "text": "func (a A) Alloc(n int) (A, []byte) {\n\tif cap(a)-len(a) < n {\n\t\ta = a.reserve(n)\n\t}\n\tp := len(a)\n\tr := a[p : p+n : p+n]\n\ta = a[:p+n]\n\treturn a, r\n}", "title": "" }, { "docid": "e9330465b113274185b72c5daad5408c", "score": "0.5014315", "text": "func (i *Index) allocInfos(n int) {\n\tif n > maxIndexEntries {\n\t\tpanic(\"n > maxIndexEntries\")\n\t}\n\ti.info = make([]struct {\n\t\tcompressedOffset int64\n\t\tuncompressedOffset int64\n\t}, 0, n)\n}", "title": "" }, { "docid": "b09813496b096fd1be1a6d604177f647", "score": "0.4978849", "text": "func ChanBuffSize(n uint) Arg {\n\treturn func(rpc *rpcHandler) {\n\t\trpc.ops = make(chan operation, n)\n\t}\n}", "title": "" }, { "docid": "849763ed46d59218946cbb84fdfa5b1b", "score": "0.49650192", "text": "func makeSlice(n int) (slice []byte, err error) {\n\t// If the make fails, give a known error.\n\tdefer func() {\n\t\tif recover() != nil {\n\t\t\tslice = nil\n\t\t\terr = ErrTooLarge\n\t\t\treturn\n\t\t}\n\t}()\n\tslice = make([]byte, n)\n\treturn\n}", "title": "" }, { "docid": "33e1b13a33f746bf2109e4bc25848b06", "score": "0.49474365", "text": "func unsafe_NewArray(typ *rt.GoType, n int) unsafe.Pointer", "title": "" }, { "docid": "3801bde155aa8ae3a2257c8ec5488fc8", "score": "0.49392736", "text": "func NewBuffer(size int) *Buffer {\n\treturn &Buffer{\n\t\tdata: make([]byte, size),\n\t}\n}", "title": "" }, { "docid": "dfb3550c12cd2d36abfc895985beb7be", "score": "0.49376082", "text": "func NewSize(w io.Writer, maxSize int64) *W {\n\tqw := &W{\n\t\tw: w,\n\t\tout: new(bytes.Buffer),\n\t\tmaxSize: maxSize,\n\t}\n\n\tif f, ok := w.(flusher); ok {\n\t\tqw.f = f\n\t}\n\n\tqw.cond.L = &qw.lock\n\n\tqw.wg.Add(1)\n\tgo qw.proc()\n\treturn qw\n}", "title": "" }, { "docid": "ae8dafadd8c7ba3604d7ec3bdc5da366", "score": "0.4936824", "text": "func allocTextRowMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfTextRowValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "79feb7ef431ee159618d863c264c1b62", "score": "0.49265555", "text": "func allocPGlyphMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPGlyphValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "16572f59184c34e1465d6097a5cf751b", "score": "0.49254888", "text": "func (b *LazyBuffer) Bytes(n int) []byte {\n\tif *b == nil || len(*b) < n {\n\t\t*b = make([]byte, n)\n\t}\n\treturn (*b)[:n]\n}", "title": "" }, { "docid": "971ccd47be207663f1bb20b9688bde11", "score": "0.492281", "text": "func padblock(buf []byte, n int) []byte {\n\tmissing := n - len(buf)\n\tif missing <= 0 {\n\t\treturn buf\n\t}\n\tif missing == 1 {\n\t\treturn append(buf, 0x80) // 0x80 = 10000000b\n\t}\n\treturn append(append(buf, 0x80), make([]byte, missing-1)...)\n}", "title": "" }, { "docid": "a3496e9670f64d5d03ee4abde10358a6", "score": "0.4919731", "text": "func (b *Buffer) ConsumeN(target []byte, n int) error {\n\tif err := b.PeekN(target, n); err != nil {\n\t\treturn err\n\t}\n\tb.Buf = b.Buf[n:]\n\treturn nil\n}", "title": "" }, { "docid": "baef7c5e940e1db03a832aad6b1d9b18", "score": "0.49190113", "text": "func allocPaintMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfPaintValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "d86d2f0c21de5cf6e0da465bd0b7b8d8", "score": "0.4899186", "text": "func allocDeviceMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfDeviceValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "0e5dea38fe50ee02e6429a68e66e7081", "score": "0.48943317", "text": "func allocExprInfoMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfExprInfoValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "eac9b8f005be23f8a13f06a99eba3ab3", "score": "0.48919287", "text": "func allocStringMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfStringValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" } ]
e8f63158429b8e5f9d7ad54ab84d08b9
Set AuroraJob Key Role.
[ { "docid": "538ac5cb56e5decf7b9d8c962099461d", "score": "0.6578882", "text": "func (j *AuroraJob) Role(role string) *AuroraJob {\n\tj.jobConfig.Key.Role = role\n\n\t// Will be deprecated\n\tidentity := &aurora.Identity{User: role}\n\tj.jobConfig.Owner = identity\n\tj.jobConfig.TaskConfig.Owner = identity\n\n\treturn j\n}", "title": "" } ]
[ { "docid": "55cc10b55cb2caaad1cd79e303dbaee7", "score": "0.6436691", "text": "func (a *Job) Role(role string) *Job {\n\ta.jobConfig.Key.Role = role\n\n\t//Will be deprecated\n\tidentity := &aurora.Identity{role}\n\ta.jobConfig.Owner = identity\n\ta.jobConfig.TaskConfig.Owner = identity\n\treturn a\n}", "title": "" }, { "docid": "2bf97edb179d8ac4a7c1dd6874f71b53", "score": "0.60185736", "text": "func setWorkloadRole(client *api.Client, rolePath string, maxTtl string, keyBits int) error {\n\tm := map[string]interface{}{\n\t\t\"max_ttl\": maxTtl,\n\t\t\"key_bits\": keyBits,\n\t\t\"enforce_hostnames\": false,\n\t\t\"allow_any_name\": true,\n\t}\n\n\t_, err := client.Logical().Write(rolePath, m)\n\tif err != nil {\n\t\tfmt.Errorf(\"Write() failed (error %v)\", err)\n\t\treturn err\n\t} else {\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "70f16469cfce4bb495417e6706e4b97a", "score": "0.5959188", "text": "func (s *CreateWorkspaceApiKeyInput) SetKeyRole(v string) *CreateWorkspaceApiKeyInput {\n\ts.KeyRole = &v\n\treturn s\n}", "title": "" }, { "docid": "ac161c62ecf66ef13d9c6c394920b8a9", "score": "0.5936856", "text": "func (a *APIKey) SetRole(value string) error {\n\tswitch strings.ToLower(value) {\n\tcase strings.ToLower(RoleAdmin):\n\t\ta.Role = RoleAdmin\n\tcase strings.ToLower(RoleEditor):\n\t\ta.Role = RoleEditor\n\tcase strings.ToLower(RoleMetricsPublisher):\n\t\ta.Role = RoleMetricsPublisher\n\tcase strings.ToLower(RoleViewer):\n\t\ta.Role = RoleViewer\n\tdefault:\n\t\treturn fmt.Errorf(\"invalid Role value: %s\", value)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "12a27bdc3ca08e988af44d4239faf83e", "score": "0.57315505", "text": "func (b *backend) setRoleEntry(ctx context.Context, s logical.Storage, roleName string, role *roleStorageEntry, previousRoleID string) error {\n\tif roleName == \"\" {\n\t\treturn fmt.Errorf(\"missing role name\")\n\t}\n\n\tif role == nil {\n\t\treturn fmt.Errorf(\"nil role\")\n\t}\n\n\t// Check if role constraints are properly set\n\tif err := validateRoleConstraints(role); err != nil {\n\t\treturn err\n\t}\n\n\t// Create a storage entry for the role\n\tentry, err := logical.StorageEntryJSON(\"role/\"+strings.ToLower(roleName), role)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif entry == nil {\n\t\treturn fmt.Errorf(\"failed to create storage entry for role %q\", roleName)\n\t}\n\n\t// Check if the index from the role_id to role already exists\n\troleIDIndex, err := b.roleIDEntry(ctx, s, role.RoleID)\n\tif err != nil {\n\t\treturn errwrap.Wrapf(\"failed to read role_id index: {{err}}\", err)\n\t}\n\n\t// If the entry exists, make sure that it belongs to the current role\n\tif roleIDIndex != nil && roleIDIndex.Name != roleName {\n\t\treturn fmt.Errorf(\"role_id already in use\")\n\t}\n\n\t// When role_id is getting updated, delete the old index before\n\t// a new one is created\n\tif previousRoleID != \"\" && previousRoleID != role.RoleID {\n\t\tif err = b.roleIDEntryDelete(ctx, s, previousRoleID); err != nil {\n\t\t\treturn errwrap.Wrapf(\"failed to delete previous role ID index: {{err}}\", err)\n\t\t}\n\t}\n\n\t// Save the role entry only after all the validations\n\tif err = s.Put(ctx, entry); err != nil {\n\t\treturn err\n\t}\n\n\t// If previousRoleID is still intact, don't create another one\n\tif previousRoleID != \"\" && previousRoleID == role.RoleID {\n\t\treturn nil\n\t}\n\n\t// Create a storage entry for reverse mapping of RoleID to role.\n\t// Note that secondary index is created when the roleLock is held.\n\treturn b.setRoleIDEntry(ctx, s, role.RoleID, &roleIDStorageEntry{\n\t\tName: roleName,\n\t})\n}", "title": "" }, { "docid": "e1e02622d351bf69aabbe3fc34eeda94", "score": "0.55890805", "text": "func (b *backend) setRoleIDEntry(ctx context.Context, s logical.Storage, roleID string, roleIDEntry *roleIDStorageEntry) error {\n\tlock := b.roleIDLock(roleID)\n\tlock.Lock()\n\tdefer lock.Unlock()\n\n\tsalt, err := b.Salt(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\tentryIndex := \"role_id/\" + salt.SaltID(roleID)\n\n\tentry, err := logical.StorageEntryJSON(entryIndex, roleIDEntry)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err = s.Put(ctx, entry); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ff26a15ce6d3f459a912092ec1bc4a6e", "score": "0.5586534", "text": "func (j *AuroraJob) JobKey() aurora.JobKey {\n\treturn *j.jobConfig.Key\n}", "title": "" }, { "docid": "7b0d3a4523b8cc61bfe5686638339100", "score": "0.5374785", "text": "func SetKey(conn redis.Conn, key string, value []byte, expire int) error {\n _ , err := conn.Do(\"SETEX\", key, expire, value)\n return err\n}", "title": "" }, { "docid": "31af33c380f94ee384f0f6596cf4e848", "score": "0.5270206", "text": "func (mc *MetaCreate) SetKey(s string) *MetaCreate {\n\tmc.mutation.SetKey(s)\n\treturn mc\n}", "title": "" }, { "docid": "878d48678550ecc05171d387a79b3133", "score": "0.52136207", "text": "func SetKey(key string, value interface{}){\n\tconn:=RedisPool.Get()\n\tdefer conn.Close()\n\tconn.Do(\"SET\",key, value)\n}", "title": "" }, { "docid": "59a533d8c4c455502afdb391380502be", "score": "0.5206362", "text": "func (j *AuroraJob) Environment(env string) *AuroraJob {\n\tj.jobConfig.Key.Environment = env\n\treturn j\n}", "title": "" }, { "docid": "cd2a0b3942b972061e1819bae006ab2b", "score": "0.5195765", "text": "func (agent *Agent) SetKeyStatus(status rewire.AgentKeyStatus) error {\n\n\t// get current status\n\tcurrentStatus := agent.KeyStatus()\n\n\t// ignore if status doesn't change\n\tif currentStatus == status {\n\t\treturn nil\n\t}\n\n\t// get current path to key\n\tcpath := \"\"\n\tswitch currentStatus {\n\tcase rewire.AgentRegistered:\n\t\tcpath = KeyPath(AcceptedAgentKeyDir, agent.ID)\n\tcase rewire.AgentPending:\n\t\tcpath = KeyPath(PendingAgentKeyDir, agent.ID)\n\tcase rewire.AgentBlacklist:\n\t\tcpath = KeyPath(BlacklistAgentKeyDir, agent.ID)\n\t}\n\n\t// remove old reference\n\tif cpath != \"\" {\n\t\tif err := os.Remove(cpath); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// create new status path\n\tnpath := \"\"\n\tswitch status {\n\tcase rewire.AgentRegistered:\n\t\tnpath = KeyPath(AcceptedAgentKeyDir, agent.ID)\n\tcase rewire.AgentPending:\n\t\tnpath = KeyPath(PendingAgentKeyDir, agent.ID)\n\tcase rewire.AgentBlacklist:\n\t\tnpath = KeyPath(BlacklistAgentKeyDir, agent.ID)\n\t}\n\n\t// create a blank file at the new path\n\tif npath != \"\" {\n\t\tif _, err := os.Create(npath); err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\treturn errors.New(\"unknown target key status specified\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "409d61ae0e261ea39b340f811c5504db", "score": "0.5195163", "text": "func (a *updatableAEAD) SetReadKey(suite cipherSuite, trafficSecret []byte) {\n\ta.rcvAEAD = createAEAD(suite, trafficSecret)\n\ta.hpDecrypter = createHeaderProtector(suite, trafficSecret)\n\tif a.suite == nil {\n\t\ta.nonceBuf = make([]byte, a.rcvAEAD.NonceSize())\n\t\ta.hpMask = make([]byte, a.hpDecrypter.BlockSize())\n\t\ta.suite = suite\n\t}\n\n\ta.nextRcvTrafficSecret = a.getNextTrafficSecret(suite.Hash(), trafficSecret)\n\ta.nextRcvAEAD = createAEAD(suite, a.nextRcvTrafficSecret)\n}", "title": "" }, { "docid": "2ebfb3d68c30f94ea04cae0f5872a0c9", "score": "0.5192491", "text": "func (s *Server) SetKey(q *Query, r *Response) error {\n\n\terr := s.DB.Update(func(tx *bolt.Tx) error {\n\t\tb := NestedBucket(tx, q.Bucket)\n\t\tif b == nil {\n\t\t\treturn ErrorBucketNotFound\n\t\t}\n\t\treturn b.Put(q.Key, q.Value)\n\t})\n\tif err != nil {\n\t\tr.Error = err.Error()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "72d37ee057dd009d07fe21e464b9e904", "score": "0.5190841", "text": "func (a *Attribute) SetKey(v string) {\n\t(*object.Attribute)(a).SetKey(v)\n}", "title": "" }, { "docid": "6f2164382ab01525433f01ab977ff171", "score": "0.5190549", "text": "func (a *Job) JobKey() *aurora.JobKey {\n\treturn a.jobConfig.Key\n}", "title": "" }, { "docid": "6d5fe5d2292a2e3fd1b49a14220ef417", "score": "0.51235443", "text": "func SetKey(index int, key []byte) (err error) {\n\treturn setKeyData(index, key, 0)\n}", "title": "" }, { "docid": "32c97c17948a685f167206e9d78a028c", "score": "0.5088306", "text": "func (a *AESEncryption) SetKey(key []byte) error {\n\tvar err error\n\tblock, err := aes.NewCipher(key)\n\tif nil != err {\n\t\treturn err\n\t}\n\tgcm, err := cipher.NewGCM(block)\n\tif nil != err {\n\t\treturn err\n\t}\n\ta.key = key\n\ta.block = block\n\ta.gcm = gcm\n\treturn nil\n}", "title": "" }, { "docid": "2d254dad4e861c5a3a9aa1e3a941502b", "score": "0.5072817", "text": "func (rotKey *RotationKeys) SetRotKey(rotType Rotation, k uint64, evakey [][2]*ring.Poly) {\n\n\tswitch rotType {\n\tcase RotationLeft:\n\n\t\tif rotKey.evakeyRotColLeft == nil {\n\t\t\trotKey.evakeyRotColLeft = make(map[uint64]*SwitchingKey)\n\t\t}\n\n\t\tif rotKey.evakeyRotColLeft[k] == nil && k != 0 {\n\n\t\t\trotKey.evakeyRotColLeft[k] = new(SwitchingKey)\n\t\t\trotKey.evakeyRotColLeft[k].evakey = make([][2]*ring.Poly, len(evakey))\n\t\t\tfor j := range evakey {\n\t\t\t\trotKey.evakeyRotColLeft[k].evakey[j][0] = evakey[j][0].CopyNew()\n\t\t\t\trotKey.evakeyRotColLeft[k].evakey[j][1] = evakey[j][1].CopyNew()\n\t\t\t}\n\t\t}\n\n\tcase RotationRight:\n\n\t\tif rotKey.evakeyRotColRight == nil {\n\t\t\trotKey.evakeyRotColRight = make(map[uint64]*SwitchingKey)\n\t\t}\n\n\t\tif rotKey.evakeyRotColRight[k] == nil && k != 0 {\n\n\t\t\trotKey.evakeyRotColRight[k] = new(SwitchingKey)\n\t\t\trotKey.evakeyRotColRight[k].evakey = make([][2]*ring.Poly, len(evakey))\n\t\t\tfor j := range evakey {\n\t\t\t\trotKey.evakeyRotColRight[k].evakey[j][0] = evakey[j][0].CopyNew()\n\t\t\t\trotKey.evakeyRotColRight[k].evakey[j][1] = evakey[j][1].CopyNew()\n\t\t\t}\n\t\t}\n\n\tcase RotationRow:\n\n\t\tif rotKey.evakeyRotRow == nil {\n\n\t\t\trotKey.evakeyRotRow = new(SwitchingKey)\n\t\t\trotKey.evakeyRotRow.evakey = make([][2]*ring.Poly, len(evakey))\n\t\t\tfor j := range evakey {\n\t\t\t\trotKey.evakeyRotRow.evakey[j][0] = evakey[j][0].CopyNew()\n\t\t\t\trotKey.evakeyRotRow.evakey[j][1] = evakey[j][1].CopyNew()\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0a2a5d54620faf5a1328c5fa966a7b0d", "score": "0.5051549", "text": "func (c *Client) SetNodeRole(id, r string) error {\n\n\t// Cast the string to a swarm.NodeAvailability type (string)\n\trole := swarm.NodeRole(r)\n\n\t//check that the state is a known type\n\tif role != swarm.NodeRoleManager && role != swarm.NodeRoleWorker {\n\t\treturn fmt.Errorf(\"Unknown node role [%s]\", role)\n\t}\n\n\tlog.Debugln(\"Retrieving information about existing configuration\")\n\tnode, err := c.GetNode(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog.Debugf(\"Current Node role [%s], desired role [%s]\", node.Spec.Role, role)\n\n\t// Update the Node Role\n\tnode.Spec.Role = role\n\n\tb, err := json.Marshal(node.Spec)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog.Debugf(\"%s\", b)\n\turl := fmt.Sprintf(\"%s/nodes/%s/update?version=%d\", c.UCPURL, id, node.Version.Index)\n\n\tresponse, err := c.postRequest(url, b)\n\tif err != nil {\n\t\tParseUCPError(response)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3ad4f8da02255f61b3ee5721e9225092", "score": "0.5041508", "text": "func (dbs *dbStore) SaveKey(role string, key data.PrivateKey) error {\n\tjsonBytes, err := json.Marshal(key)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not JSON Marshal Key\")\n\t}\n\ttx, err := dbs.db.Begin()\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\treturn err\n\t}\n\t_, err = tx.Exec(\"INSERT INTO `keys` (`namespace`, `role`, `key`) VALUES (?,?,?);\", dbs.imageName, role, string(jsonBytes))\n\ttx.Commit()\n\treturn err\n}", "title": "" }, { "docid": "1cb9cd97cdc6a64304a529d7fdae2910", "score": "0.5018485", "text": "func (r *repository) RotateKey(role data.RoleName, serverManagesKey bool, keyList []string) error {\n\tif err := checkRotationInput(role, serverManagesKey); err != nil {\n\t\treturn err\n\t}\n\n\tpubKeyList, err := r.pubKeyListForRotation(role, serverManagesKey, keyList)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcl := changelist.NewMemChangelist()\n\tif err := r.rootFileKeyChange(cl, role, changelist.ActionCreate, pubKeyList); err != nil {\n\t\treturn err\n\t}\n\treturn r.publish(cl)\n}", "title": "" }, { "docid": "2492287b692199e99dfbfc1c67d722b3", "score": "0.49660313", "text": "func (b *Builder) Role(role string) *Builder {\n\tif role == MANAGER {\n\t\tb.employee.MinSalary = 140000\n\t\tb.employee.MaxSalary = 250000\n\t}\n\tb.employee.Role = role\n\treturn b\n}", "title": "" }, { "docid": "bb81a6d1c4dee8cd9ff327331811ccca", "score": "0.49107674", "text": "func (m *AppCredentialSignInActivity) SetKeyId(value *string)() {\n err := m.GetBackingStore().Set(\"keyId\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "f083059d9a5abcdf63d4f8a857d6871f", "score": "0.48992065", "text": "func (v *Window) SetRole(s string) {\n\tcstr := (*C.gchar)(C.CString(s))\n\tdefer C.free(unsafe.Pointer(cstr))\n\tC.gtk_window_set_role(v.native(), cstr)\n}", "title": "" }, { "docid": "3fe5f78182e255a7311434e11470b6e0", "score": "0.48873946", "text": "func (s TiKVSpec) Role() string {\n\treturn RoleTiKV\n}", "title": "" }, { "docid": "b06960b5d45afc0f1e90892d81d00d4c", "score": "0.48802918", "text": "func (d *DataPlane) SetKey(key []byte) error {\n\td.mtx.Lock()\n\tdefer d.mtx.Unlock()\n\tif d.running {\n\t\treturn modifyExisting\n\t}\n\tif len(key) == 0 {\n\t\treturn emptyValue\n\t}\n\tif d.macFactory != nil {\n\t\treturn alreadySet\n\t}\n\t// First check for MAC creation errors.\n\tif _, err := scrypto.InitMac(key); err != nil {\n\t\treturn err\n\t}\n\td.macFactory = func() hash.Hash {\n\t\tmac, _ := scrypto.InitMac(key)\n\t\treturn mac\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6ee175a1670f15d9fbf10b203dbff44c", "score": "0.48737866", "text": "func SetRoleTag(value string) error {\n\n\ttag := make(map[string]string)\n\ttag[\"role\"] = value\n\treturn setSerfTag(tag)\n}", "title": "" }, { "docid": "ff020935c43ecb927ae414195f2cb512", "score": "0.48692474", "text": "func (m *AppCredentialSignInActivity) SetKeyType(value *ApplicationKeyType)() {\n err := m.GetBackingStore().Set(\"keyType\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "2f36344ed61ec57e89c13fd831151d2a", "score": "0.48676798", "text": "func (c *Cypher) SetKey(key string) {\n\tvar keyLength = len(key)\n\tvar j uint8\n\n\tfor i := range c.key {\n\t\tc.key[i] = uint8(i)\n\t}\n\tfor i := range c.key {\n\t\tj = (j + c.key[i] + key[i%keyLength])\n\t\tc.key.swap(uint8(i), j)\n\t}\n\tc.i, c.j = 0, 0\n}", "title": "" }, { "docid": "4a2aba5efa94f4cf24489eea6a8fb56a", "score": "0.4853742", "text": "func (a *NodeAttribute) SetKey(key string) {\n\t(*netmap.Attribute)(a).\n\t\tSetKey(key)\n}", "title": "" }, { "docid": "e7e41cbe73ae90c7c028a8110ff0f043", "score": "0.48445618", "text": "func (t *TLSRenewer) SetExpectedRole(role string) {\n\tt.mu.Lock()\n\tt.expectedRole = role\n\tt.mu.Unlock()\n}", "title": "" }, { "docid": "8f8f0d805607e2c6648b4bc82fa6699e", "score": "0.4843387", "text": "func (ewhu *EmployeeWorkingHoursUpdate) SetRole(r *Role) *EmployeeWorkingHoursUpdate {\n\treturn ewhu.SetRoleID(r.ID)\n}", "title": "" }, { "docid": "7c2ab42593282d3e9154b406f1c24bb1", "score": "0.4841808", "text": "func SetResourceID(identifier string, key string) string {\n\tparts := []string{identifier, key}\n\tresourceID := strings.Join(parts, resourceIDSeparator)\n\n\treturn resourceID\n}", "title": "" }, { "docid": "918e39f4e565d4c9c16f8a01c1396ed2", "score": "0.48313868", "text": "func ResourceKey(r *auth.Resource) string {\n\tif r.Type == auth.ResourceType_CLUSTER {\n\t\treturn auth.ClusterRoleBindingKey\n\t}\n\treturn fmt.Sprintf(\"%s:%s\", r.Type, r.Name)\n}", "title": "" }, { "docid": "5146e7503c2064106adf8ff5aaa80dfe", "score": "0.48290232", "text": "func (m *ChangeScreenSharingRolePostRequestBody) SetRole(value *iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.ScreenSharingRole)() {\n m.role = value\n}", "title": "" }, { "docid": "7a8795a81141746b452f37303a56ee38", "score": "0.48276657", "text": "func EditRole(anode map[string]string) (err error) {\n //check if role name already exists\n roles, err := ndb.GetUserRoles()\n for x := range roles {\n if roles[x][\"role\"] == anode[\"role\"] && x != anode[\"id\"] {\n return errors.New(\"This role already exists\")\n }\n }\n\n //update name\n err = ndb.UpdateUserRole(anode[\"id\"], \"role\", anode[\"role\"])\n if err != nil {\n logs.Error(\"master/EditRole Error updating role name: \" + err.Error())\n return err\n }\n //update permissions\n rolePerm, err := ndb.GetRolePermissions()\n if err != nil {\n logs.Error(\"master/EditRole Error getting all role permissions: \" + err.Error())\n return err\n }\n\n for x := range rolePerm {\n if rolePerm[x][\"role\"] == anode[\"id\"] {\n err = ndb.UpdateRolePermissions(x, \"permissions\", anode[\"permissions\"])\n if err != nil {\n logs.Error(\"master/EditRole Error updating role permissions: \" + err.Error())\n return err\n }\n err = ndb.UpdateRolePermissions(x, \"desc\", anode[\"desc\"])\n if err != nil {\n logs.Error(\"master/EditRole Error updating role description: \" + err.Error())\n return err\n }\n }\n }\n\n return nil\n}", "title": "" }, { "docid": "1bd901de79965d13770a69e3cace3ccc", "score": "0.48107615", "text": "func (o *Profile) SetRole(ctx context.Context, exec boil.ContextExecutor, insert bool, related *Role) error {\n\tvar err error\n\tif insert {\n\t\tif err = related.Insert(ctx, exec, boil.Infer()); err != nil {\n\t\t\treturn errors.Wrap(err, \"failed to insert into foreign table\")\n\t\t}\n\t}\n\n\tupdateQuery := fmt.Sprintf(\n\t\t\"UPDATE \\\"profiles\\\" SET %s WHERE %s\",\n\t\tstrmangle.SetParamNames(\"\\\"\", \"\\\"\", 1, []string{\"role_id\"}),\n\t\tstrmangle.WhereClause(\"\\\"\", \"\\\"\", 2, profilePrimaryKeyColumns),\n\t)\n\tvalues := []interface{}{related.ID, o.ID}\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, updateQuery)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\n\tif _, err = exec.ExecContext(ctx, updateQuery, values...); err != nil {\n\t\treturn errors.Wrap(err, \"failed to update local table\")\n\t}\n\n\tqueries.Assign(&o.RoleID, related.ID)\n\tif o.R == nil {\n\t\to.R = &profileR{\n\t\t\tRole: related,\n\t\t}\n\t} else {\n\t\to.R.Role = related\n\t}\n\n\tif related.R == nil {\n\t\trelated.R = &roleR{\n\t\t\tProfiles: ProfileSlice{o},\n\t\t}\n\t} else {\n\t\trelated.R.Profiles = append(related.R.Profiles, o)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "191561a70fe30dc0d2afd71f2d55bd42", "score": "0.47860146", "text": "func SetKey(k string) func(*Options) {\n\treturn func(e *Options) {\n\t\te.Key = k\n\t}\n}", "title": "" }, { "docid": "a9e093d8fd99c30fcb35751d8c6a5dfe", "score": "0.47820207", "text": "func (ewhuo *EmployeeWorkingHoursUpdateOne) SetRole(r *Role) *EmployeeWorkingHoursUpdateOne {\n\treturn ewhuo.SetRoleID(r.ID)\n}", "title": "" }, { "docid": "e46da9adc917d4394f4c7e04ceae6bbf", "score": "0.47793016", "text": "func SetKey(ctx *context.Context, key string) {\n\tctx.Values().Set(entryKeyContextKey, key)\n}", "title": "" }, { "docid": "ef508d1f3010a0acdb8342c7c8079525", "score": "0.4776059", "text": "func (e RBACValidationError) Key() bool { return e.key }", "title": "" }, { "docid": "5dd012a82317e248448f0ea1bada32b0", "score": "0.477055", "text": "func SetAccessKey(accessKey string) error {\n\treturn setEnv(accessKey, \"AWS_ACCESS_KEY_ID\")\n}", "title": "" }, { "docid": "b34877045ad0839e6589e377857e368f", "score": "0.47545362", "text": "func SetNewRebrandAPIKey(arg string) string {\n\terr := rebrandly.ChangeAPIKey(arg)\n\tif err != nil {\n\t\treturn err.Error()\n\t}\n\treturn fmt.Sprintf(\"Change API key successfully : %d links left\", 500-rebrandly.CountLink())\n}", "title": "" }, { "docid": "ad35ebfe59e3fc5bb9eb6684ee288c3b", "score": "0.47529086", "text": "func (e *Increment) SetKey(key string) {\n\te.Name = key\n}", "title": "" }, { "docid": "d87ee1b341190389cef9bb5cf34e1603", "score": "0.4751261", "text": "func (hm *HeartbeatMonitor) ChangeRole(follower Role, view uint64, leaderID uint64) {\n\thm.runOnce.Do(func() {\n\t\thm.follower = follower\n\t\thm.start()\n\t})\n\n\trole := \"leader\"\n\tif follower {\n\t\trole = \"follower\"\n\t}\n\n\thm.logger.Infof(\"Changing to %s role, current view: %d, current leader: %d\", role, view, leaderID)\n\tselect {\n\tcase hm.commandChan <- roleChange{\n\t\tleaderID: leaderID,\n\t\tview: view,\n\t\tfollower: follower,\n\t}:\n\tcase <-hm.stopChan:\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "776b9debc3b70a9fd42e6da787bb22f8", "score": "0.47459087", "text": "func (p *MediaPlaylist) SetKey(method, uri, iv, keyformat, keyformatversions string) error {\n\tif p.count == 0 {\n\t\treturn errors.New(\"playlist is empty\")\n\t}\n\n\t// A Media Playlist MUST indicate a EXT-X-VERSION of 5 or higher if it\n\t// contains:\n\t// - The KEYFORMAT and KEYFORMATVERSIONS attributes of the EXT-X-KEY tag.\n\tif keyformat != \"\" || keyformatversions != \"\" {\n\t\tcheckVersion(&p.ver, 5)\n\t}\n\n\tp.Segments[p.last()].Key = &Key{method, uri, iv, keyformat, keyformatversions}\n\treturn nil\n}", "title": "" }, { "docid": "4b776c758414b21633f335f663a1bd9a", "score": "0.4745386", "text": "func (r *Role) Set(v string) error {\n\tval := Role(strings.Title(v))\n\tif err := val.Check(); err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\t*r = val\n\treturn nil\n}", "title": "" }, { "docid": "3e293e8e918aab426471163245603d51", "score": "0.47451904", "text": "func (a *Job) Environment(env string) *Job {\n\ta.jobConfig.Key.Environment = env\n\treturn a\n}", "title": "" }, { "docid": "70c1e68d48d6ff51c4dc696ce577ee7c", "score": "0.47447282", "text": "func (r *repo) Set(key string, value Runner) {\n\tr.c.Set(key, value)\n}", "title": "" }, { "docid": "deaa1863cfc857b34a10562ee6bcee05", "score": "0.4732885", "text": "func (roleCreate AerospikeRoleCreateUpdate) updateRole(client *as.Client, adminPolicy *as.AdminPolicy, role *as.Role, logger Logger) error {\n\t// Update the role.\n\tlogger.Info(\"Updating role\", log.Ctx{\"rolename\": roleCreate.name})\n\n\t// Find the privileges to drop.\n\tcurrentPrivileges, err := aerospikePrivilegeToPrivilegeString(role.Privileges)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not update role %s: %v\", roleCreate.name, err)\n\t}\n\n\tdesiredPrivileges := roleCreate.privileges\n\tprivilegesToRevoke := sliceSubtract(currentPrivileges, desiredPrivileges)\n\tprivilegesToGrant := sliceSubtract(desiredPrivileges, currentPrivileges)\n\n\tif len(privilegesToRevoke) > 0 {\n\t\taerospikePrivileges, err := privilegeStringtoAerospikePrivilege(privilegesToRevoke)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Could not update role %s: %v\", roleCreate.name, err)\n\t\t}\n\n\t\terr = client.RevokePrivileges(adminPolicy, roleCreate.name, aerospikePrivileges)\n\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Error revoking privileges for role %s: %v\", roleCreate.name, err)\n\t\t}\n\n\t\tlogger.Info(\"Revoked privileges for role\", log.Ctx{\"rolename\": roleCreate.name, \"privileges\": privilegesToRevoke})\n\t}\n\n\tif len(privilegesToGrant) > 0 {\n\t\taerospikePrivileges, err := privilegeStringtoAerospikePrivilege(privilegesToGrant)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Could not update role %s: %v\", roleCreate.name, err)\n\t\t}\n\n\t\terr = client.GrantPrivileges(adminPolicy, roleCreate.name, aerospikePrivileges)\n\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Error granting privileges for role %s: %v\", roleCreate.name, err)\n\t\t}\n\n\t\tlogger.Info(\"Granted privileges to role\", log.Ctx{\"rolename\": roleCreate.name, \"privileges\": privilegesToGrant})\n\t}\n\n\tif !reflect.DeepEqual(role.Whitelist, roleCreate.whitelist) {\n\t\t// Set whitelist.\n\t\terr = client.SetWhitelist(adminPolicy, roleCreate.name, roleCreate.whitelist)\n\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Error setting whitelist for role %s: %v\", roleCreate.name, err)\n\t\t}\n\n\t}\n\n\tlogger.Info(\"Updated role\", log.Ctx{\"rolename\": roleCreate.name})\n\treturn nil\n}", "title": "" }, { "docid": "b4ab0b57992d280a752b9c7a82365371", "score": "0.4731029", "text": "func SetIDKey(key string) {\n\tidKey = key\n}", "title": "" }, { "docid": "358195c160ff5e82ef423cf79345ce27", "score": "0.47176677", "text": "func (p *Proxy) Role(account, role string) arn.ARN {\n\tif account == \"\" {\n\t\taccount = p.Ident.Account\n\t}\n\treturn arn.New(p.Ident.Partition(), \"iam\", \"\", account, \"role\",\n\t\tpath.Clean(\"/\"+role))\n}", "title": "" }, { "docid": "d8d0f70f4089b0a13eecb087c6012ae3", "score": "0.47120708", "text": "func SetKey() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\trecord, res := store.GetKey(\n\t\t\tc,\n\t\t\tc.Param(\"key\"),\n\t\t)\n\n\t\tif res.Error != nil || res.RecordNotFound() {\n\t\t\tc.JSON(\n\t\t\t\thttp.StatusNotFound,\n\t\t\t\tgin.H{\n\t\t\t\t\t\"status\": http.StatusNotFound,\n\t\t\t\t\t\"message\": \"Failed to find key\",\n\t\t\t\t},\n\t\t\t)\n\n\t\t\tc.Abort()\n\t\t} else {\n\t\t\tc.Set(KeyContextKey, record)\n\t\t\tc.Next()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "cc3489649da41ecb98f13d5a9cde2ad8", "score": "0.47052008", "text": "func (z *ZetabaseClient) SetIdKey(priv *ecdsa.PrivateKey, pub *ecdsa.PublicKey) {\n\tz.privKey = priv\n\tz.pubKey = pub\n}", "title": "" }, { "docid": "3bc8e7b1c46dd4f5e64787b548166a55", "score": "0.46922413", "text": "func (t *PatientChaincode) checkRole(key string) string {\n\treturn ROLE_ADMIN\n}", "title": "" }, { "docid": "5943707a47c7a427d0391c7f540510b9", "score": "0.46915448", "text": "func (r Network_Subnet) GetRoleKeyName() (resp string, err error) {\n\terr = r.Session.DoRequest(\"SoftLayer_Network_Subnet\", \"getRoleKeyName\", nil, &r.Options, &resp)\n\treturn\n}", "title": "" }, { "docid": "08eca9b31bf515b1d49c3f1d70c97ca5", "score": "0.46884656", "text": "func (m *Notebook) SetUserRole(value *OnenoteUserRole)() {\n m.userRole = value\n}", "title": "" }, { "docid": "c607e6a26c4be3d9f0034eece38d798f", "score": "0.46808252", "text": "func SetRoleGetter(rg RoleGetter) {\n\tm := new(sync.Mutex)\n\tm.Lock()\n\troleGetter = rg\n\tm.Unlock()\n}", "title": "" }, { "docid": "913eae4dc9ccea87a5e5f3d76326d400", "score": "0.46775404", "text": "func (o *RoleCommand) SetRoleGroup(exec boil.Executor, insert bool, related *RoleGroup) error {\n\tvar err error\n\tif insert {\n\t\tif err = related.Insert(exec); err != nil {\n\t\t\treturn errors.Wrap(err, \"failed to insert into foreign table\")\n\t\t}\n\t}\n\n\tupdateQuery := fmt.Sprintf(\n\t\t\"UPDATE \\\"role_commands\\\" SET %s WHERE %s\",\n\t\tstrmangle.SetParamNames(\"\\\"\", \"\\\"\", 1, []string{\"role_group_id\"}),\n\t\tstrmangle.WhereClause(\"\\\"\", \"\\\"\", 2, roleCommandPrimaryKeyColumns),\n\t)\n\tvalues := []interface{}{related.ID, o.ID}\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, updateQuery)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\n\tif _, err = exec.Exec(updateQuery, values...); err != nil {\n\t\treturn errors.Wrap(err, \"failed to update local table\")\n\t}\n\n\to.RoleGroupID.Int64 = related.ID\n\to.RoleGroupID.Valid = true\n\n\tif o.R == nil {\n\t\to.R = &roleCommandR{\n\t\t\tRoleGroup: related,\n\t\t}\n\t} else {\n\t\to.R.RoleGroup = related\n\t}\n\n\tif related.R == nil {\n\t\trelated.R = &roleGroupR{\n\t\t\tRoleCommands: RoleCommandSlice{o},\n\t\t}\n\t} else {\n\t\trelated.R.RoleCommands = append(related.R.RoleCommands, o)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ebd81e4d25c14bb8493d6faddc25629c", "score": "0.46693125", "text": "func (self *CMenuModelT) SetAccelerator(\n\tcommand_id int,\n\tkey_code int,\n\tshift_pressed int,\n\tctrl_pressed int,\n\talt_pressed int,\n) (ret bool) {\n\n\tcRet := C.cefingo_menu_model_set_accelerator((*C.cef_menu_model_t)(self.pc_menu_model), (C.int)(command_id), (C.int)(key_code), (C.int)(shift_pressed), (C.int)(ctrl_pressed), (C.int)(alt_pressed))\n\n\tret = cRet == 1\n\treturn ret\n}", "title": "" }, { "docid": "a2eaba3ada0769811cd34ef6affeee03", "score": "0.4666765", "text": "func (e *UserChannel) SetKey(key Key) {\n\te.Key = key\n}", "title": "" }, { "docid": "e42667b2c3b5ed3e71ad2764460ea549", "score": "0.4651273", "text": "func (s *Surface) SetColorKey(key color.RGBA) {\n\tp := C.SDL_MapRGB(s.Native.format, C.Uint8(key.R), C.Uint8(key.G), C.Uint8(key.B))\n\tC.SDL_SetColorKey(s.Native, C.SDL_TRUE, p)\n}", "title": "" }, { "docid": "7d5c293b68485828c60d82bfa15da3d7", "score": "0.4648193", "text": "func (mar *MidAdminRole) Delete(ctx context.Context, key ...interface{}) error {\n\tvar err error\n\tvar dbConn *sql.DB\n\n\t// if deleted, bail\n\tif mar._deleted {\n\t\treturn nil\n\t}\n\n\ttx, err := components.M.GetConnFromCtx(ctx)\n\tif err != nil {\n\t\tdbConn, err = components.M.GetMasterConn()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\ttableName, err := GetMidAdminRoleTableName(key...)\n\tif err != nil {\n\t\treturn err\n\t}\n\t//1\n\n\t// sql query with composite primary key\n\tsqlstr := `UPDATE ` + tableName + ` SET is_del = 1 WHERE id = ?`\n\n\t// run query\n\tutils.GetTraceLog(ctx).Debug(\"DB\", zap.String(\"SQL\", fmt.Sprint(sqlstr, mar.ID)))\n\tif tx != nil {\n\t\t_, err = tx.Exec(sqlstr, mar.ID)\n\t} else {\n\t\t_, err = dbConn.Exec(sqlstr, mar.ID)\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// set deleted\n\tmar._deleted = true\n\n\treturn nil\n}", "title": "" }, { "docid": "ae5251b64a5d4dcafccb60cdb9c01392", "score": "0.4643961", "text": "func (d *DataPlane) SetColibriKey(key []byte) error {\n\td.mtx.Lock()\n\tdefer d.mtx.Unlock()\n\tif d.running {\n\t\treturn modifyExisting\n\t}\n\tif d.colibriKey != nil {\n\t\treturn alreadySet\n\t}\n\n\tkeyColibri, err := libcolibri.InitColibriKey(key)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\td.colibriKey = keyColibri\n\treturn nil\n}", "title": "" }, { "docid": "3b508a549775ae5c4f417ecfab1002d5", "score": "0.4643302", "text": "func (r *red) Set(key, value string, expiration time.Duration) error {\n\tif r.r == nil {\n\t\treturn errorConnection\n\t}\n\n\treturn r.r.Set(r.prefixed(key), value, expiration).Err()\n}", "title": "" }, { "docid": "6465d428472ea28a6151c6feac56efa2", "score": "0.46343264", "text": "func (self *TraitDevice) SetKey(index_ uint, keyval uint, modifiers C.GdkModifierType) {\n\tC.gdk_device_set_key(self.CPointer, C.guint(index_), C.guint(keyval), modifiers)\n\treturn\n}", "title": "" }, { "docid": "e81ee1f64f421d3379836c4db1af544f", "score": "0.46265945", "text": "func (uie *UniversalIndexElement) SetKey(key interface{}) {\n\tuie.key = key\n}", "title": "" }, { "docid": "50ce55a73d72fc57d772fdbdc9d7ac9b", "score": "0.46237785", "text": "func (roleCreate AerospikeRoleCreateUpdate) createRole(client *as.Client, adminPolicy *as.AdminPolicy, logger Logger) error {\n\tlogger.Info(\"Creating role\", log.Ctx{\"rolename\": roleCreate.name})\n\n\taerospikePrivileges, err := privilegeStringtoAerospikePrivilege(roleCreate.privileges)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not create role %s: %v\", roleCreate.name, err)\n\t}\n\n\terr = client.CreateRole(adminPolicy, roleCreate.name, aerospikePrivileges, roleCreate.whitelist)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not create role %s: %v\", roleCreate.name, err)\n\t}\n\tlogger.Info(\"Created role\", log.Ctx{\"rolename\": roleCreate.name})\n\n\treturn nil\n}", "title": "" }, { "docid": "600b4751fd5971580cbe58fd86263bfa", "score": "0.46205372", "text": "func SetKey(w http.ResponseWriter, r *http.Request){\n\tpathParams := mux.Vars(r)\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tkeyName := pathParams[\"key\"]\n\tvalue := pathParams[\"value\"]\n\tresult := rdb.Set(keyName, value, 0)\n\t// Bad\n\tif result.Err() != nil {\n\t\tresponse := Response{\n\t\t\tMessage: result.Err().Error(),\n\t\t}\n\t\tjson.NewEncoder(w).Encode(response)\n\t// Good\n\t} else {\n\t\tvalue, _ := strconv.ParseInt(value, 10, 64)\n\t\tresponse := Response{\n\t\t\tMessage: \"key set\",\n\t\t\tKeyName: keyName,\n\t\t\tValue: value,\n\t\t}\n\t\tjson.NewEncoder(w).Encode(response)\n\t}\n\n}", "title": "" }, { "docid": "8f2b9cc02214ba26bb747aa8b1482398", "score": "0.46197632", "text": "func (res *roleBase) SetRole(argRole *types.Role) {\n\tres.role = argRole\n}", "title": "" }, { "docid": "8d6ffc7ac56b1b5267d394c6102b2ad3", "score": "0.46102962", "text": "func (r *Robot) setOrientationKey() {\n\t// Reset the key, if it was already set\n\tr.orientationKey = 0\n\n\tfor k, allowedOrientation := range allowedOrientations {\n\t\tif allowedOrientation == r.Orientation {\n\t\t\tr.orientationKey = k\n\t\t\tbreak\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0ebec0e744730aea73277d865941724a", "score": "0.46029335", "text": "func (backend *JwtBackend) setKeyEntry(storage logical.Storage, key KeyStorageEntry) error {\n\tif key.Name == \"\" {\n\t\treturn fmt.Errorf(\"Unable to save key, invalid name\")\n\t}\n\n\tkeyName := strings.ToLower(key.Name)\n\n\t// TODO : put in all the validation for the key\n\n\t// TODO : create the key if not set\n\n\tlock := backend.keyLock(keyName)\n\tlock.RLock()\n\tdefer lock.RUnlock()\n\n\tentry, err := logical.StorageEntryJSON(fmt.Sprintf(\"keys/%s\", keyName), key)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error converting key to JSON: %#v\", err)\n\t}\n\n\tif err := storage.Put(entry); err != nil {\n\t\treturn fmt.Errorf(\"Error saving key: %#v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f3de4ce57819a0df6acf2b2ea66bc0c5", "score": "0.45973474", "text": "func (r *RedisConn) Set(key string, args ...interface{}) (interface{}, error) {\n\targsP := go_helper.Prepend(&args, key)\n\treturn r.conn.Do(\"SET\", *(argsP)...)\n}", "title": "" }, { "docid": "3889c46596acda443ca87b898fe920aa", "score": "0.45930183", "text": "func (p *PostPolicy) SetKey(key string) error {\n\tif strings.TrimSpace(key) == \"\" || key == \"\" {\n\t\treturn NewInvalidArgumentError(\"object name is empty\")\n\t}\n\tpolicyCond := policyCondition{\n\t\tmatchType: \"eq\",\n\t\tcondition: \"$key\",\n\t\tvalue: key,\n\t}\n\tif err := p.addNewPolicy(policyCond); err != nil {\n\t\treturn err\n\t}\n\tp.formData[\"key\"] = key\n\treturn nil\n}", "title": "" }, { "docid": "add311d16be11dc7afec9b4073979210", "score": "0.45877755", "text": "func changeRole(ctx *fiber.Ctx) error {\n\t// check data\n\tvar body ChangeRoleRequest\n\tbodyParsingError := ctx.BodyParser(&body)\n\tif bodyParsingError != nil {\n\t\treturn utilities.Response(utilities.ResponseParams{\n\t\t\tCtx: ctx,\n\t\t\tInfo: configuration.ResponseMessages.InternalServerError,\n\t\t\tStatus: fiber.StatusInternalServerError,\n\t\t})\n\t}\n\trole := body.Role\n\tuserId := body.UserId\n\tif role == \"\" || userId == \"\" {\n\t\treturn utilities.Response(utilities.ResponseParams{\n\t\t\tCtx: ctx,\n\t\t\tInfo: configuration.ResponseMessages.MissingData,\n\t\t\tStatus: fiber.StatusBadRequest,\n\t\t})\n\t}\n\ttrimmedRole := strings.TrimSpace(role)\n\ttrimmedUserId := strings.TrimSpace(userId)\n\tif trimmedRole == \"\" || trimmedUserId == \"\" {\n\t\treturn utilities.Response(utilities.ResponseParams{\n\t\t\tCtx: ctx,\n\t\t\tInfo: configuration.ResponseMessages.MissingData,\n\t\t\tStatus: fiber.StatusBadRequest,\n\t\t})\n\t}\n\n\t// check role validity\n\troles := utilities.Values(configuration.Roles)\n\tif !utilities.IncludesString(roles, trimmedRole) {\n\t\treturn utilities.Response(utilities.ResponseParams{\n\t\t\tCtx: ctx,\n\t\t\tInfo: configuration.ResponseMessages.InvalidData,\n\t\t\tStatus: fiber.StatusBadRequest,\n\t\t})\n\t}\n\n\t// parse user ID into an ObjectID\n\tparsedId, parsingError := primitive.ObjectIDFromHex(userId)\n\tif parsingError != nil {\n\t\treturn utilities.Response(utilities.ResponseParams{\n\t\t\tCtx: ctx,\n\t\t\tInfo: configuration.ResponseMessages.InvalidData,\n\t\t\tStatus: fiber.StatusNotFound,\n\t\t})\n\t}\n\n\t// update User role\n\tnow := utilities.MakeTimestamp()\n\tUserCollection := Instance.Database.Collection(Collections.User)\n\t_, updateError := UserCollection.UpdateOne(\n\t\tctx.Context(),\n\t\tbson.D{{Key: \"_id\", Value: parsedId}},\n\t\tbson.D{{\n\t\t\tKey: \"$set\",\n\t\t\tValue: bson.D{\n\t\t\t\t{\n\t\t\t\t\tKey: \"role\",\n\t\t\t\t\tValue: trimmedRole,\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tKey: \"updated\",\n\t\t\t\t\tValue: now,\n\t\t\t\t},\n\t\t\t},\n\t\t}},\n\t)\n\tif updateError != nil {\n\t\treturn utilities.Response(utilities.ResponseParams{\n\t\t\tCtx: ctx,\n\t\t\tInfo: configuration.ResponseMessages.InternalServerError,\n\t\t\tStatus: fiber.StatusInternalServerError,\n\t\t})\n\t}\n\n\treturn utilities.Response(utilities.ResponseParams{\n\t\tCtx: ctx,\n\t})\n}", "title": "" }, { "docid": "70e57582386bfe8c768ec2801ea079d1", "score": "0.45750415", "text": "func CreateOrUpdateRole(r *RoleReconciler, role *securityv1alpha1.Role, jsonRole []byte) error {\n\t_, responseResult, responseBody, err := MakeAPIRequest(\"PUT\", config.AppConfig.ElasticsearchRoleAPIPath+\"/\"+role.Name, jsonRole)\n\tif err != nil {\n\t\treturn errors.New(\"Error when creating new role: \" + err.Error())\n\t}\n\tif err := SetRoleStatus(r, role, responseResult, responseBody); err != nil {\n\t\treturn err\n\t}\n\troleControllerLogger.Infof(\"Updated role: %v\", role.Name)\n\treturn nil\n}", "title": "" }, { "docid": "fafa6162c154cc9a030f2e84efcfba62", "score": "0.4566578", "text": "func SetExitKey(key int32) {\n\tckey := (C.int)(key)\n\tC.SetExitKey(ckey)\n}", "title": "" }, { "docid": "d5e78a4ff1e05ffa1893f65c35bd8273", "score": "0.4564442", "text": "func (obj *contact) SetKey(key public.Key) {\n\tobj.key = key\n}", "title": "" }, { "docid": "65fc3b6d397f84ee218c694da221943e", "score": "0.4534701", "text": "func (j *AuroraJob) Name(name string) *AuroraJob {\n\tj.jobConfig.Key.Name = name\n\treturn j\n}", "title": "" }, { "docid": "f2e7ca444e7cdb43c770e39a0ff26541", "score": "0.45312795", "text": "func (key *SK3Key) Set(keyStr string) error {\n\treturn key.payload().SetWithPrefix(keyStr, key.PrefixString())\n}", "title": "" }, { "docid": "c30889933e50164b41fb09144a698d10", "score": "0.45281726", "text": "func (b *backend) roleEntry(ctx context.Context, s logical.Storage, roleName string) (*roleStorageEntry, error) {\n\tif roleName == \"\" {\n\t\treturn nil, fmt.Errorf(\"missing role_name\")\n\t}\n\n\tvar role roleStorageEntry\n\n\tif entry, err := s.Get(ctx, \"role/\"+strings.ToLower(roleName)); err != nil {\n\t\treturn nil, err\n\t} else if entry == nil {\n\t\treturn nil, nil\n\t} else if err := entry.DecodeJSON(&role); err != nil {\n\t\treturn nil, err\n\t}\n\n\tneedsUpgrade := false\n\n\tif role.BoundCIDRListOld != \"\" {\n\t\trole.SecretIDBoundCIDRs = strutil.ParseDedupAndSortStrings(role.BoundCIDRListOld, \",\")\n\t\trole.BoundCIDRListOld = \"\"\n\t\tneedsUpgrade = true\n\t}\n\n\tif len(role.BoundCIDRList) != 0 {\n\t\trole.SecretIDBoundCIDRs = role.BoundCIDRList\n\t\trole.BoundCIDRList = nil\n\t\tneedsUpgrade = true\n\t}\n\n\tif role.SecretIDPrefix == \"\" {\n\t\trole.SecretIDPrefix = secretIDPrefix\n\t\tneedsUpgrade = true\n\t}\n\n\tif needsUpgrade && (b.System().LocalMount() || !b.System().ReplicationState().HasState(consts.ReplicationPerformanceSecondary|consts.ReplicationPerformanceStandby)) {\n\t\tentry, err := logical.StorageEntryJSON(\"role/\"+strings.ToLower(roleName), &role)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif err := s.Put(ctx, entry); err != nil {\n\t\t\t// Only perform upgrades on replication primary\n\t\t\tif !strings.Contains(err.Error(), logical.ErrReadOnly.Error()) {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\n\trole.name = roleName\n\tif role.LowerCaseRoleName {\n\t\trole.name = strings.ToLower(roleName)\n\t}\n\n\treturn &role, nil\n}", "title": "" }, { "docid": "bc3262d4c89844270b57ba87c55329e6", "score": "0.45148444", "text": "func (key *ID3Key) Set(keyStr string) error {\n\treturn key.payload().SetWithPrefix(keyStr, key.PrefixString())\n}", "title": "" }, { "docid": "2a4d5050207cf862a8c84d860dc41b33", "score": "0.4514058", "text": "func (role *roleImpl) accessViewKey() string {\n\treturn ch.RoleAccessPrefix + role.Name_\n}", "title": "" }, { "docid": "fb95546643fbaa7524a77156b3abd131", "score": "0.4508307", "text": "func (f *Frame) SetiKey(k string, v int) {\n\te, ok := f.elements[k]\n\tif !ok {\n\t\treturn\n\t}\n\te.iKey = v\n}", "title": "" }, { "docid": "02377ee33382194b6e6f69a25f7c58ab", "score": "0.45060995", "text": "func (c *CPU) SetKeys() {\n\n}", "title": "" }, { "docid": "a0b5c3e071d0d12cd4d512b538ba33ff", "score": "0.45030206", "text": "func (job *Job) setID() {\n\tjob.ID = uuid.New()\n\treturn\n}", "title": "" }, { "docid": "aa659082a696d94ea1ef83a50100416d", "score": "0.45016432", "text": "func chooseRole(conn connection) roles {\n\tres, err := conn.SetNX(masterKey, \"hereiam\", masterExpire).Result()\n\tif err != nil {\n\t\tfmt.Println(\"chooseRole: error redis.setnx\")\n\t\treturn undefined\n\t}\n\n\tif res == true {\n\t\treturn master\n\t}\n\treturn slave\n}", "title": "" }, { "docid": "080bd9ad1c9288c59ea7698b53fdd1c2", "score": "0.4498728", "text": "func (r *RedigoDB) SignalModifyKey(key []byte) {\n\n}", "title": "" }, { "docid": "66c167fb4eb07f704e5bbb0a40a5b920", "score": "0.44940472", "text": "func CreateOrUpdateRole(client kubernetes.Interface, role *rbacv1.Role) error {\n\tif _, err := client.RbacV1().Roles(role.Namespace).Create(context.TODO(), role, metav1.CreateOptions{}); err != nil {\n\t\tif !apierrors.IsAlreadyExists(err) {\n\t\t\treturn fmt.Errorf(\"unable to create RBAC role: %v\", err)\n\t\t}\n\n\t\texistRole, err := client.RbacV1().Roles(role.Namespace).Get(context.TODO(), role.Name, metav1.GetOptions{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\trole.ResourceVersion = existRole.ResourceVersion\n\n\t\tif _, err := client.RbacV1().Roles(role.Namespace).Update(context.TODO(), role, metav1.UpdateOptions{}); err != nil {\n\t\t\treturn fmt.Errorf(\"unable to update RBAC role: %v\", err)\n\t\t}\n\t}\n\tklog.V(2).Infof(\"Role %s/%s has been created or updated.\", role.Namespace, role.Name)\n\n\treturn nil\n}", "title": "" }, { "docid": "a2d700a2f04f30a45f8a95f7674adfde", "score": "0.44927317", "text": "func (d *Dao) UpdateAuthorityTaskRole(id int64, update map[string]interface{}) (err error) {\n\treturn d.db.Table(TableRole).Where(\"id = ? AND is_deleted = 0\", id).Updates(update).Error\n}", "title": "" }, { "docid": "c212994a228d9b0d5bc16be38223fade", "score": "0.44924", "text": "func (o *ListClusterHostsParams) SetRole(role *string) {\n\to.Role = role\n}", "title": "" }, { "docid": "5203214131e6658d46ebb4ca74c99aae", "score": "0.4489427", "text": "func (e SetClusterResourceQuotasRequestValidationError) Key() bool { return e.key }", "title": "" }, { "docid": "2cfd4cf730c1b786adb23f28c8a75382", "score": "0.44864833", "text": "func robinSetupRevokekeyCmd(cmd *cobra.Command, args []string) {\n\tfmt.Println(\"revoke-key is not yet implemented\")\n}", "title": "" }, { "docid": "0db066eb766b4e28ab7b47d2f983ecdb", "score": "0.44829434", "text": "func (c *CacheService) SetTTLOnKey(key, field string, ttl int) {\n\tif resp := c.redisClient.Cmd(\"EXPIRE\", key+\":\"+field, ttl); resp.Err != nil {\n\t\tcommon.CreateFailureResponse(resp.Err, \"SetTTLOnKey\", 500)\n\t}\n}", "title": "" }, { "docid": "5027262adbd498faa299dd7e4346b910", "score": "0.44642887", "text": "func storeRole(ctx context.Context, store logical.Storage, role Role) error {\n\troleBytes, err := json.Marshal(role)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to marshal role for storage: %w\", err)\n\t}\n\n\tentry := &logical.StorageEntry{\n\t\tKey: fmt.Sprintf(\"roles/%s\", role.Name()),\n\t\tValue: roleBytes,\n\t}\n\treturn store.Put(ctx, entry)\n}", "title": "" }, { "docid": "9cefe61ebf8875b18ac5eacb8eb07312", "score": "0.4463576", "text": "func (c *Client) EnableKey(request *EnableKeyRequest) (response *EnableKeyResponse, err error) {\n if request == nil {\n request = NewEnableKeyRequest()\n }\n response = NewEnableKeyResponse()\n err = c.Send(request, response)\n return\n}", "title": "" }, { "docid": "7c8b43ca7ae511f63583245eb79bf638", "score": "0.44557133", "text": "func (e *UserDevice) SetKey(key Key) {\n\te.Key = key\n}", "title": "" }, { "docid": "dd1619f77bcf33b6f1d60e7d2b2054d2", "score": "0.4450782", "text": "func Set(key string, value interface{}) {\n\tr.Set(context.Background(), key, value, DefaultExpiration)\n}", "title": "" }, { "docid": "455b9a3429a8b76fa7eaeb13b8b6aae4", "score": "0.44476432", "text": "func robinSetupAddkeyCmd(cmd *cobra.Command, args []string) {\n\tfmt.Println(\"add-key is not yet implemented\")\n}", "title": "" } ]
c48e88b6070caf30c1a1fa14e6b4768e
Returns the integer value of the winner, if it exists Returns 0 if NO Winner
[ { "docid": "a73bed11e20f274a517c2d8009052c49", "score": "0.73207414", "text": "func (board *SubBoard) GetWinner() int {\n\t//Indeces to check if same\n\t//0 1 2\n\t//3 4 5\n\t//6 7 8\n\t//\n\t//0 3 6\n\t//1 4 7\n\t//2 5 8\n\t//\n\t//2 4 6\n\t//0 4 8\n\n\t//Iterate over all the possible combinations of winning indices\n\tfor i, _ := range iWin{\n\t\tsquare1 := board[iWin[i][0]]\n\t\tsquare2 := board[iWin[i][1]]\n\t\tsquare3 := board[iWin[i][2]]\n\t\t\n\t\tif square1 != 0 && //Value must be played on\n\t\t\tsquare1 == square2 && //Check if 1 == 2\n\t\t\tsquare2 == square3{ //Check if 2 == 3\n\t\t\treturn square1 //Return the player that won\n\t\t}\n\t}\n\treturn NO_WINNER //No Winner\n}", "title": "" } ]
[ { "docid": "10710915d97b76770975d41feb9ead06", "score": "0.7424042", "text": "func (board *UltimateBoard) GetWinner() int {\n\tfor i, _ := range iWin{\n\t\tsubboard1 := board[iWin[i][0]]\n\t\tsubboard2 := board[iWin[i][1]]\n\t\tsubboard3 := board[iWin[i][2]]\n\n\t\tsquare1 := subboard1.GetWinner()\n\t\tsquare2 := subboard2.GetWinner()\n\t\tsquare3 := subboard3.GetWinner()\n\n\t\tif square1 != 0 &&\n\t\t\tsquare1 == square2 &&\n\t\t\tsquare2 == square3{\n\t\t\treturn square1\n\t\t}\n\t}\n\t\n\treturn NO_WINNER\n}", "title": "" }, { "docid": "fb4563992fbcb988d9b1e7888a0a6391", "score": "0.7331946", "text": "func (game *Game) findWinner() {\n\tif game.BlackCount > game.WhiteCount {\n\t\tgame.outcome = -1\n\t} else if game.BlackCount < game.WhiteCount {\n\t\tgame.outcome = 1\n\t} else {\n\t\tgame.outcome = 0\n\t}\n}", "title": "" }, { "docid": "a73fe24b4047ade1704c6fc36438d502", "score": "0.71077865", "text": "func (game *Game) Winner() int {\n\tfor i := 0; i < len(game.Players); i++ {\n\t\tif len(game.Players[i].Hand) == 0 {\n\t\t\treturn i\n\t\t}\n\t}\n\n\treturn -1\n}", "title": "" }, { "docid": "dd68e6433b6c194edf8c17243cc9fa56", "score": "0.70126265", "text": "func WinnerResult(playerCount, lastStone int) int {\n\tplayerResults := simulateGame(playerCount, lastStone)\n\n\tmax := 0\n\tfor _, v := range playerResults {\n\t\tif v > max {\n\t\t\tmax = v\n\t\t}\n\t}\n\n\treturn max\n}", "title": "" }, { "docid": "587b3b4caf830d9b09794c40d5c36431", "score": "0.6881834", "text": "func (p *MCTS3) FindWinner() int {\n\treturn findWinner(&(p.board))\n}", "title": "" }, { "docid": "9eb80c1416400b93335c6c1ca8fc5182", "score": "0.6781498", "text": "func victoryScore(winner bool) int {\n\tif winner {\n\t\treturn 5\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "b4fb5aeeacd3e933fd461e15e3ce0813", "score": "0.67444247", "text": "func BoardValue(board Board) int {\n\treturn int(FindWinner(board))\n}", "title": "" }, { "docid": "5fa9a942c5072d3a4ea2e9667f29d47c", "score": "0.67386097", "text": "func findWinner(board *[25]int) int {\n\tfor _, i := range importantCells {\n\t\tif (*board)[i] != UNSET {\n\t\t\tfor _, quad := range winningQuads[i] {\n\t\t\t\tsum := (*board)[quad[0]] + (*board)[quad[1]] + (*board)[quad[2]] + (*board)[quad[3]]\n\t\t\t\tswitch sum {\n\t\t\t\tcase 4:\n\t\t\t\t\treturn MAXIMIZER\n\t\t\t\tcase -4:\n\t\t\t\t\treturn MINIMIZER\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tfor _, i := range importantCells {\n\t\tif (*board)[i] != UNSET {\n\t\t\tfor _, triplet := range losingTriplets[i] {\n\t\t\t\tsum := (*board)[triplet[0]] + (*board)[triplet[1]] + (*board)[triplet[2]]\n\t\t\t\tswitch sum {\n\t\t\t\tcase 3:\n\t\t\t\t\treturn MINIMIZER\n\t\t\t\tcase -3:\n\t\t\t\t\treturn MAXIMIZER\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn UNSET\n}", "title": "" }, { "docid": "04d897a60142731757afab96ba5aa1ed", "score": "0.67381424", "text": "func WinScore(player Player) int {\n\treturn int(player * 3)\n}", "title": "" }, { "docid": "ff4b962fad7c3f2191085622bbe28c1e", "score": "0.67036265", "text": "func getWinnerStatus(cell rune) int {\n\tif cell == 'x' {\n\t\treturn X_WON\n\t} else if cell == 'o' {\n\t\treturn O_WON\n\t} else {\n\t\treturn NO_WINNER\n\t}\n}", "title": "" }, { "docid": "62b30af9340b1a619f5477bb95222ea1", "score": "0.66545504", "text": "func (n *Noughts) GetWinner() int {\n // Checks if winner exists on rows\n for r := 0; r < BOARDROWS; r++ {\n rowWinner := 0\n for c := 0; c < BOARDCOLS; c++ {\n if c == 0 && n.board[r][c] != 0 {\n rowWinner = n.board[r][c]\n } else if n.board[r][c] != rowWinner {\n rowWinner = 0\n break\n }\n }\n if rowWinner != 0 {\n fmt.Println(\"rowWinner\")\n return rowWinner\n }\n }\n\n // Checks if winner exists on cols\n for c := 0; c < BOARDCOLS; c++ {\n colWinner := 0\n for r := 0; r < BOARDROWS; r++ {\n if r == 0 && n.board[r][c] != 0 {\n colWinner = n.board[r][c]\n } else if n.board[r][c] != colWinner {\n colWinner = 0\n break\n }\n }\n if colWinner != 0 {\n fmt.Println(\"colWinner\")\n return colWinner\n }\n }\n\n // Checks if winner exists on diags\n if BOARDCOLS == BOARDROWS {\n diagWinner := 0\n for c := 0; c < BOARDCOLS; c++ {\n if c == 0 && n.board[c][c] != 0 {\n fmt.Printf(\"n.board[%v][%v]=%v\", c, c, n.board[c][c])\n diagWinner = n.board[c][c]\n } else if n.board[c][c] != diagWinner {\n fmt.Printf(\"n.board[%v][%v]=%v != %v\", c, c, n.board[c][c], diagWinner)\n diagWinner = 0\n break\n }\n }\n if diagWinner != 0 {\n fmt.Println(\"diagwinner\")\n return diagWinner\n }\n diagWinner = 0\n for c := 0; c < BOARDCOLS; c++ {\n d := BOARDCOLS - 1 - c\n\n if c == 0 && n.board[d][c] != 0 {\n diagWinner = n.board[d][c]\n } else if n.board[d][c] != diagWinner {\n diagWinner = 0\n break\n }\n }\n if diagWinner != 0 {\n fmt.Println(\"diagwinner2\")\n return diagWinner\n }\n }\n return 0\n}", "title": "" }, { "docid": "ca8d5c2723e2ac7bcd9eb8119abe314e", "score": "0.663233", "text": "func FindWinner(board Board) Player {\n\tfor row := 0; row < 3; row++ {\n\t\tsum := 0\n\t\tfor col := 0; col < 3; col++ {\n\t\t\tsum += int(BoardPull(Position{row, col}, board))\n\t\t}\n\n\t\tif sum == WinScore(X) {\n\t\t\treturn X\n\t\t} else if sum == WinScore(O) {\n\t\t\treturn O\n\t\t}\n\t}\n\n\tfor col := 0; col < 3; col++ {\n\t\tsum := 0\n\t\tfor row := 0; row < 3; row++ {\n\t\t\tsum += int(BoardPull(Position{row, col}, board))\n\t\t}\n\n\t\tif sum == WinScore(X) {\n\t\t\treturn X\n\t\t} else if sum == WinScore(O) {\n\t\t\treturn O\n\t\t}\n\t}\n\n\tdiags := [][]Position{\n\t\t[]Position{\n\t\t\tPosition{0, 0},\n\t\t\tPosition{1, 1},\n\t\t\tPosition{2, 2},\n\t\t},\n\n\t\t[]Position{\n\t\t\tPosition{0, 2},\n\t\t\tPosition{1, 1},\n\t\t\tPosition{2, 0},\n\t\t},\n\t}\n\n\tfor i := 0; i < len(diags); i++ {\n\t\tsum := 0\n\t\tfor p := 0; p < len(diags[i]); p++ {\n\t\t\tsum += int(BoardPull(diags[i][p], board))\n\t\t}\n\n\t\tif sum == WinScore(X) {\n\t\t\treturn X\n\t\t} else if sum == WinScore(O) {\n\t\t\treturn O\n\t\t}\n\t}\n\n\treturn Nil\n}", "title": "" }, { "docid": "1ee88adf210091ba43e5a14b0f4f5c3c", "score": "0.65777534", "text": "func determineRoundWinner(playerMove string, opponentMove string, playerScore int, opponentScore int, round int) {\n\tround += 1\n\tif playerMove == opponentMove {\n\t\tfmt.Println(\"Draw! An extra game will be played!\")\n\t\tround -= 1\n\t} else if (playerMove == \"R\" && opponentMove == \"S\") || (playerMove == \"S\" && opponentMove == \"P\") || (playerMove == \"P\" && opponentMove == \"R\") {\n\t\tfmt.Println(\"Player wins this round!\")\n\t\tplayerScore += 1\n\t} else {\n\t\tfmt.Println(\"Opponent wins this round!\")\n\t\topponentScore += 1\n\t}\n}", "title": "" }, { "docid": "48427c1de4d9df52681d0b886c63f2ea", "score": "0.6492425", "text": "func (g *Game) Winner() Color {\n\tif !g.Finished() {\n\t\treturn None\n\t}\n\n\tscore := g.board.Score()\n\tswitch {\n\tcase score[0] < score[1]:\n\t\treturn White\n\tcase score[1] < score[0]:\n\t\treturn Black\n\t}\n\treturn None\n}", "title": "" }, { "docid": "ff49f0101f37b1d89e885e5cc782e343", "score": "0.64483786", "text": "func (r round) result() int {\n\tmatrix := [3][3]int{\n\t\t{draw, win, lose},\n\t\t{lose, draw, win},\n\t\t{win, lose, draw},\n\t}\n\treturn matrix[r.opponent-1][r.player-1] + r.player\n}", "title": "" }, { "docid": "76048793fe56dacf6d25992d9b8ca999", "score": "0.63873446", "text": "func (g *Game) Winner() (Winner, error) {\n\tif !g.Over() {\n\t\treturn 0, ErrGameNotOver\n\t}\n\n\tif g.tie {\n\t\treturn Tie, nil\n\t}\n\n\t// As we toggle the player at the end of a turn we determine\n\t// the winner to be the person who the current player isn't.\n\tvar winner Winner\n\tif !g.currentPlayer().IsWhite() {\n\t\twinner = WhitePlayer\n\t} else {\n\t\twinner = BlackPlayer\n\t}\n\n\treturn winner, nil\n}", "title": "" }, { "docid": "e7df21690954f190c39bf0c099470deb", "score": "0.63747734", "text": "func getWinner(p1, p2 Move) (int, error) {\n\t// first see who has advantage and fight index\n\tadvantageIndex := getIndex(p1.Type, p2.Type)\n\tfightIndex := getIndex(p1.Type, p2.Type)\n\n\tswitch advantage := advantageArray[advantageIndex]; advantage {\n\tcase TIE:\n\t\treturn tieFightArray[fightIndex], nil\n\tcase P1:\n\t\treturn p1FightArray[fightIndex], nil\n\tcase P2:\n\t\treturn p2FightArray[fightIndex], nil\n\tdefault:\n\t\treturn INVALID, errors.New(\"invalid advantage. arguments might be invalid\")\n\t}\n}", "title": "" }, { "docid": "adc47f0e0a34cf4dcc03e4e267d7bf1e", "score": "0.6360187", "text": "func findwinner(b *Board) color {\n\tif color := winHorizontal(b); none != color {\n\t\treturn color\n\t}\n\tif color := winVertical(b); none != color {\n\t\treturn color\n\t}\n\tif color := winDiagonal(b); none != color {\n\t\treturn color\n\t}\n\n\treturn none\n}", "title": "" }, { "docid": "4623e893d5c950c798291c0b2353994c", "score": "0.63554704", "text": "func winner(userchoice, computerchoice string) (int, string) {\n\twinner := \"Draw\"\n\tswitch {\n\tcase userchoice == computerchoice:\n\t\treturn 3, \"draw\"\n\tcase userchoice == \"scissors\" && computerchoice == \"paper\":\n\t\treturn 1, \"User Wins: Scissors cut Paper\"\n\tcase computerchoice == \"scissors\" && userchoice == \"paper\":\n\t\treturn 2, \"Computer Wins: Scissors cut Paper\"\n\tcase userchoice == \"paper\" && computerchoice == \"rock\":\n\t\treturn 1, \"User Wins: Paper covers Rock\"\n\tcase computerchoice == \"paper\" && userchoice == \"rock\":\n\t\treturn 2, \"Computer Wins: Paper covers Rock\"\n\tcase userchoice == \"rock\" && computerchoice == \"lizard\":\n\t\treturn 1, \"User Wins: Rock crushes Lizard\"\n\tcase computerchoice == \"rock\" && userchoice == \"lizard\":\n\t\treturn 2, \"Computer Wins: Rock crushes Lizard\"\n\tcase userchoice == \"lizard\" && computerchoice == \"spock\":\n\t\treturn 1, \"User Wins: Lizard poisons Spock\"\n\tcase computerchoice == \"lizard\" && userchoice == \"spock\":\n\t\treturn 2, \"Computer Wins: Lizard poisons Spock\"\n\tcase userchoice == \"spock\" && computerchoice == \"scissors\":\n\t\treturn 1, \"User Wins: Spock smashes Scissors\"\n\tcase computerchoice == \"spock\" && userchoice == \"scissors\":\n\t\treturn 2, \"Computer Wins: Spock smashes Scissors\"\n\tcase userchoice == \"scissors\" && computerchoice == \"lizard\":\n\t\treturn 1, \"User Wins: Scissors decapitate Lizard\"\n\tcase computerchoice == \"scissors\" && userchoice == \"lizard\":\n\t\treturn 2, \"Computer Wins: Scissors decapitate Lizard\"\n\tcase userchoice == \"lizard\" && computerchoice == \"paper\":\n\t\treturn 1, \"User Wins: Lizard eats Paper\"\n\tcase computerchoice == \"lizard\" && userchoice == \"paper\":\n\t\treturn 2, \"Computer Wins: Lizard eats Paper\"\n\tcase userchoice == \"paper\" && computerchoice == \"spock\":\n\t\treturn 1, \"User Wins: Paper disproves Spock\"\n\tcase computerchoice == \"paper\" && userchoice == \"spock\":\n\t\treturn 2, \"Computer Wins: Paper disproves Spock\"\n\tcase userchoice == \"spock\" && computerchoice == \"rock\":\n\t\treturn 1, \"User Wins: Spock vaporizes Rock\"\n\tcase computerchoice == \"spock\" && userchoice == \"rock\":\n\t\treturn 2, \"Computer Wins: Spock vaporizes Rock\"\n\tcase userchoice == \"rock\" && computerchoice == \"scissors\":\n\t\treturn 1, \"User Wins: Rock crushes Scissors\"\n\tcase computerchoice == \"rock\" && userchoice == \"scissors\":\n\t\treturn 2, \"Computer Wins: Rock crushes Scissors\"\n\tdefault:\n\t\treturn 3, winner\n\t}\n}", "title": "" }, { "docid": "38a5ae3b84dd66b93c762df0a2b59e23", "score": "0.6274628", "text": "func (m *IRVMethod) GetWinner() int {\n\treturn m.Winner\n}", "title": "" }, { "docid": "8c92babc094a30e535aa86e433d6806a", "score": "0.62686944", "text": "func (m *IRVMethod) checkForWinner() (bool, int) {\n\t//fmt.Println(\"checking for winner\")\n\tleader := -1\n\thighVotes := 0\n\tloser := -1\n\tlowVotes := len(m.Ballots)\n\n\tfor k := range m.Buckets {\n\t\t//fmt.Println(k, len(b))\n\n\t\tif len(m.Buckets[k]) > highVotes {\n\t\t\tleader = k\n\t\t\thighVotes = len(m.Buckets[k])\n\n\t\t\t//if the leading candidate has a majority, they are the winner\n\t\t\tif highVotes > len(m.Ballots)/2 {\n\t\t\t\treturn true, leader\n\t\t\t}\n\t\t}\n\n\t\tif len(m.Buckets[k]) <= lowVotes {\n\t\t\tloser = k\n\t\t\tlowVotes = len(m.Buckets[k])\n\t\t}\n\t}\n\n\t//if there are only 2 candidates left, there is a winner\n\tif len(m.Buckets) == 2 {\n\t\t//fmt.Println(\"winner found\", len(m.Buckets), len(m.Electorate.Candidates))\n\t\treturn true, leader\n\t}\n\n\t//fmt.Println(\"no winner\")\n\treturn false, loser\n}", "title": "" }, { "docid": "25a4d74751c7304fc6d4323cfeba4e28", "score": "0.6231783", "text": "func Win(score, expected float64) float64 {\n\treturn score + ELO_K*(1.0-expected)\n}", "title": "" }, { "docid": "be60ff2afd1f52b677ee21c7a0e6041d", "score": "0.6212449", "text": "func (message *Message) getWinner(letter [][]float64, prevWinners []bool) int {\n\twinner := 0\n\ttop := 99999.9\n\tfor i := range message.NeuralNet { //i := 0; i < NUMLETTERS; i++ {\n\t\tdistance := 0.0\n\t\tif !prevWinners[i] {\n\t\t\tfor j := range (message.NeuralNet)[i] { //0; j < NUMPIXELS; j++ {\n\t\t\t\tfor k := range (message.NeuralNet)[i][j] {\n\t\t\t\t\tdistance += (letter[j][k] - (message.NeuralNet)[i][j][k]) * (letter[j][k] - (message.NeuralNet)[i][j][k])\n\t\t\t\t}\n\t\t\t}\n\t\t\tif math.Sqrt(distance) < top {\n\t\t\t\ttop = math.Sqrt(distance)\n\t\t\t\twinner = i\n\t\t\t}\n\t\t}\n\t}\n\t//fmt.Println(winner)\n\treturn winner\n}", "title": "" }, { "docid": "6579126cc42c8492afe3097d3b9c6411", "score": "0.6208143", "text": "func (g Game) Winner() (byte, error) {\n\tif !g.IsTerminalState() {\n\t\treturn '_', ErrGameNotOver\n\t}\n\n\t//Draw\n\tif g.turnTimer == TurnsBeforeDraw {\n\t\treturn '_', nil\n\t}\n\n\txCount, oCount := g.pieceCounts()\n\tif xCount == 0 {\n\t\treturn 'o', nil\n\t} else if oCount == 0 {\n\t\treturn 'x', nil\n\t}\n\n\t//If the current player cannot move, then they lost\n\tif len(g.GetActions()) == 0 {\n\t\tif g.oTurn {\n\t\t\treturn 'o', nil\n\t\t}\n\t\treturn 'x', nil\n\t}\n\n\treturn '_', ErrInvalidGameState\n}", "title": "" }, { "docid": "ac17c584244062c4e0e551d284183b1b", "score": "0.6167881", "text": "func (it *VRR) get(winner, loser int) int {\n\tvar out int\n\tif winner > loser {\n\t\tout = it.counts[winner][loser]\n\t} else {\n\t\tout = it.counts[loser][loser + winner]\n\t}\n\treturn out\n}", "title": "" }, { "docid": "0e18cec5f2323d0983365ee882a34d9d", "score": "0.6128321", "text": "func (g *Game) GetWinner() (playerName string, playerTotal int) {\n\tif g.status == finished {\n\t\tplayerName = g.winner.Name\n\t\tplayerTotal = g.winner.TotalDots()\n\t}\n\treturn\n}", "title": "" }, { "docid": "db9209287acaa565432b32d40e78eeea", "score": "0.6099634", "text": "func (b *Board) win() color {\n\tb.mutex.Lock()\n\tdefer b.mutex.Unlock()\n\tif winner := b.winner; none != winner {\n\t\treturn winner\n\t}\n\tb.winner = findwinner(b)\n\n\treturn b.winner\n}", "title": "" }, { "docid": "3b0a0a644b81f71c560e4932cc297e56", "score": "0.6055601", "text": "func (b Board) Winner() string {\n\tif b.BlackPieces[0].IsTaken() {\n\t\treturn fmt.Sprintf(\"%v\", aurora.BgGray(aurora.Black(\"White\")))\n\t} else if b.WhitePieces[0].IsTaken() {\n\t\treturn fmt.Sprintf(\"%v\", aurora.BgBlack(aurora.Gray(\"Black\")))\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "538b03b0fe944ba99eb7891cbc876d39", "score": "0.6035518", "text": "func (r *DisplayableScoreResolver) Winner() bool {\n\treturn r.score.Winner\n}", "title": "" }, { "docid": "bf25c19db502f12dfa3520a70cb3ec38", "score": "0.5975342", "text": "func (g *Game) Winner() *Player {\n\treturn g.winChecker.Winner()\n}", "title": "" }, { "docid": "ddfa35ecd87f2e5f5c6bcdeffc06121a", "score": "0.59584045", "text": "func (game *Game) playerWins(playerScore int) {\n\tprintln(\"Вы победили!\")\n\tgame.winsPlayerCounter++\n\tgame.treshold = (game.treshold + playerScore) / 2\n}", "title": "" }, { "docid": "46e0d359219b39318b70f9a78a9c91ea", "score": "0.5931149", "text": "func (w *wallet) CheckWinner(timestamp int64, bsparam BSParameters) int {\n\tvar biggestamoutwon uint64\n\tvar result int\n\tresult = -1\n\tfor index, utxo := range w.UTXOs {\n\t\tif BlockCreation(bsparam.stakemodifier, utxo.blockHeight, utxo.index, timestamp, utxo.amount, &bsparam.difficulty) {\n\t\t\tif biggestamoutwon < utxo.amount {\n\t\t\t\tresult = index\n\t\t\t\tbiggestamoutwon = utxo.amount\n\t\t\t}\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "29e7c3e2d9dd8ac2ec62d96c26608c64", "score": "0.59162575", "text": "func (g *Game) DetermineWinnerAndScoreboard() {\n\tmax := -1\n\tfor key, value := range g.Scoreboard {\n\t\tif value > max {\n\t\t\tmax = value\n\t\t\tg.Winner = key\n\t\t}\n\t}\n}", "title": "" }, { "docid": "abfb104903fec083b41c7d1c0cdbcc90", "score": "0.5907888", "text": "func tournament(config *Configuration, rng *rand.Rand) int {\n\tpayout, err := selectPayout(&config.Payouts, config.Denominator, rng)\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn 0\n\t}\n\n\tif isWin(config.WinRate, rng) {\n\t\treturn payout.Win\n\t}\n\n\treturn payout.Lose\n}", "title": "" }, { "docid": "cab21cb441b1653119b9daa3a6852ddc", "score": "0.5892621", "text": "func WhoWon(state *State) int {\n\t// Check row-wise\n\tfor i := 0; i < 3; i++ {\n\t\tif state.Cells[i][0] == VOID {\n\t\t\tcontinue\n\t\t}\n\t\tflagWon := true\n\t\tplayer := state.Cells[i][0]\n\t\tfor j := 1; j < 3; j++ {\n\t\t\tif player != state.Cells[i][j] {\n\t\t\t\tflagWon = false\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif flagWon {\n\t\t\treturn player\n\t\t}\n\t}\n\t// Check col-wise\n\tfor i := 0; i < 3; i++ {\n\t\tif state.Cells[0][i] == VOID {\n\t\t\tcontinue\n\t\t}\n\t\tflagWon := true\n\t\tplayer := state.Cells[0][i]\n\t\tfor j := 1; j < 3; j++ {\n\t\t\tif player != state.Cells[j][i] {\n\t\t\t\tflagWon = false\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif flagWon {\n\t\t\treturn player\n\t\t}\n\t}\n\t// Check diagonal\n\tplayerLeft := state.Cells[0][0]\n\tplayerRight := state.Cells[2][0]\n\tif playerLeft == state.Cells[1][1] && playerLeft == state.Cells[2][2] {\n\t\treturn playerLeft\n\t}\n\tif playerRight == state.Cells[1][1] && playerRight == state.Cells[0][2] {\n\t\treturn playerRight\n\t}\n\tif state.TimesUpdated == 9 {\n\t\treturn TIE\n\t}\n\treturn VOID\n}", "title": "" }, { "docid": "08db2783871d15bef884d5f9b8bf9877", "score": "0.5880641", "text": "func (g *Game) Winner() Player {\n\treturn g.winner\n}", "title": "" }, { "docid": "919f3969b6e804348daf5f540e022f49", "score": "0.58791006", "text": "func (b board) checkWin() int {\n\twinConditions := []int{}\n\n\t// checking rows\n\tfor _, val := range b {\n\t\twinConditions = append(winConditions, checkThrees(val))\n\t}\n\n\t// Transpose to get columns\n\ttb := transpose(b)\n\n\tfor _, val := range tb {\n\t\twinConditions = append(winConditions, checkThrees(val))\n\t}\n\n\t// Checking diagonals\n\td1 := []string{b[0][0], b[1][1], b[2][2]}\n\td2 := []string{b[0][2], b[1][1], b[2][0]}\n\twinConditions = append(winConditions, checkThrees(d1))\n\twinConditions = append(winConditions, checkThrees(d2))\n\n\tmaxVal := 0\n\n\t// if there is a winner, the value would 1, which is larger maxVal = 0\n\t// we return that value to indicate if there is a winner or not\n\tfor _, val := range winConditions {\n\t\tif val > maxVal {\n\t\t\tmaxVal = val\n\t\t}\n\t}\n\n\treturn maxVal\n}", "title": "" }, { "docid": "001ebfcd8256f7bda582db023522e364", "score": "0.58692724", "text": "func (p *Player) CheckWinner(score int) bool {\n if p.distance >= score {\n return true\n } else {\n return false\n }\n}", "title": "" }, { "docid": "255926f76ab39204d08b84e254c6aa74", "score": "0.58058417", "text": "func rank(ctx context.Context, winner *Player, loser *Player) (int, int) {\n\t// winnerOpponent is the loser (the opponent of the winner)\n\twinnerOpponent := []glicko2.Opponent{newOpponent(*loser, win)}\n\tloserOpponent := []glicko2.Opponent{newOpponent(*winner, loss)}\n\n\twa := rankPlayer(winner, winnerOpponent)\n\tla := rankPlayer(loser, loserOpponent)\n\n\treturn wa, la\n}", "title": "" }, { "docid": "fac3517a9f7c38bb12eb91be79dd1316", "score": "0.5802199", "text": "func findWinnerBetweenTeams(tm1, tm2 *Team) (*Team, float32, error) {\n\t// tally gets incremented for a tm1 win, decremented for a tm2 win\n\tvar tm1votes, tm2votes float32\n\tfor _, v := range m.jam.Votes {\n\t\tfor _, chc := range v.Choices {\n\t\t\tif chc.Team == tm1.UUID {\n\t\t\t\ttm1votes++\n\t\t\t\tbreak\n\t\t\t} else if chc.Team == tm2.UUID {\n\t\t\t\ttm2votes++\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\tttlVotes := tm1votes + tm2votes\n\tif tm1votes > tm2votes {\n\t\treturn tm1, 100 * (tm1votes / ttlVotes), nil\n\t} else if tm1votes < tm2votes {\n\t\treturn tm2, 100 * (tm2votes / ttlVotes), nil\n\t}\n\treturn nil, 50, errors.New(\"Unable to determine a winner\")\n}", "title": "" }, { "docid": "d3eefedf9a3d790cb74d7c6429988972", "score": "0.5749548", "text": "func (b *TicTacToe) GetResult(playerJM Player) Result {\n\tfor _, line := range b.resultLines {\n\t\tif winner := b.evaluateLines(line, playerJM); winner != NoWinner {\n\t\t\treturn winner\n\t\t}\n\t}\n\n\tfor _, value := range b.pos {\n\t\tif value == NoPlayer {\n\t\t\treturn NoWinner // there are still available moves\n\t\t}\n\t}\n\n\treturn Draw // there is no winner but also no available moves -> Draw\n}", "title": "" }, { "docid": "d65a15bed3b5c8d0b1003f98b195d28d", "score": "0.5746469", "text": "func isWinner(gameboard [][]int, player int) bool {\n\tbitboard := \"\"\n\tfor y := 0; y < 7; y++ {\n\t\tfor x := 5; x >= 0; x-- {\n\t\t\tif gameboard[x][y] == player {\n\t\t\t\tbitboard = bitboard + \"1\"\n\t\t\t} else {\n\t\t\t\tbitboard = bitboard + \"0\"\n\t\t\t}\n\t\t}\n\t\tbitboard = bitboard + \"0\"\n\t}\n\n\t// Messy way to fill in bits\n\tbitboard = bitboard + \"000000000000000\"\n\n\tboard, err := strconv.ParseUint(bitboard, 2, 64)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tfmt.Println(\"Something's gone terribly wrong!\")\n\t}\n\t// check \\ diagonal\n\ty := board & (board >> 6)\n\tif y&(y>>(2*6)) != 0 {\n\t\treturn true\n\t}\n\n\t// check horizontal\n\ty = board & (board >> 7)\n\tif y&(y>>(2*7)) != 0 {\n\t\treturn true\n\t}\n\n\t// check / diagonal\n\ty = board & (board >> 8)\n\tif y&(y>>(2*8)) != 0 {\n\t\treturn true\n\t}\n\n\t// check vertical\n\ty = board & (board >> 1)\n\tif y&(y>>(2*1)) != 0 {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "3d5e644864849dd23172ddffaead85ab", "score": "0.572644", "text": "func (e *Electorate) findUtilityWinner() {\n\tnumVoters := len(e.Voters)\n\n\twinner := -1\n\tvar winnerUtil float64\n\n\tvar util float64\n\n\tfor i := range e.Candidates {\n\t\tutil = 0.0\n\n\t\tfor _, v := range e.Voters {\n\t\t\tutil += v.Utilities[i]\n\t\t}\n\n\t\tutil = util / float64(numVoters)\n\t\tif util > winnerUtil {\n\t\t\twinner = i\n\t\t\twinnerUtil = util\n\t\t}\n\n\t}\n\n\te.UtilityWinner = winner\n\te.MaxUtility = winnerUtil\n}", "title": "" }, { "docid": "b16ae8b8925f8dfc21de6eed17602110", "score": "0.5702386", "text": "func (f frame) score() (int, bool, bool) {\n\tif len(f.rolls) == 0 {\n\t\treturn 0, false, false\n\t}\n\tif len(f.rolls) == 1 {\n\t\treturn f.rolls[0], f.rolls[0] == 10, false\n\t}\n\tscore := 0\n\tfor _, roll := range f.rolls {\n\t\tscore += roll\n\t}\n\treturn score, false, score == 10\n}", "title": "" }, { "docid": "3383fdf1f0c6db319fb7852a83715773", "score": "0.5688919", "text": "func (e *Experiment) WinnerFound() bool {\n\tif e == nil {\n\t\treturn false\n\t}\n\tif a := e.Status.Analysis; a != nil {\n\t\tif w := a.WinnerAssessment; w != nil {\n\t\t\treturn w.Data.WinnerFound\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "a8a0089ae46d61ee87072b0dab798487", "score": "0.567324", "text": "func (_ChallengeTester *ChallengeTesterCaller) Winner(opts *bind.CallOpts) (common.Address, error) {\n\tvar out []interface{}\n\terr := _ChallengeTester.contract.Call(opts, &out, \"winner\")\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "76fcc4ec0aabc80004450b29229b7db9", "score": "0.5669585", "text": "func getWLDTally(coach string, round int, year int) (int, int, int) {\n\twins, losses, draws := 0, 0, 0\n\topponents := getOpponents(coach, year)\n\tfor _, opponent := range opponents {\n\t\toutcome, _, _ := getMatchOutcome(coach, opponent.ID, round, year)\n\t\tif outcome == WIN {\n\t\t\twins++\n\t\t} else if outcome == LOSS {\n\t\t\tlosses++\n\t\t} else {\n\t\t\tdraws++\n\t\t}\n\t}\n\treturn wins, losses, draws\n}", "title": "" }, { "docid": "8ccbea05d88555078fa046ae0b26785c", "score": "0.566124", "text": "func matchWon(score *Score) (bool, bool, int32, int32, []int32, []int32, int32, int32) {\n\thomeWon, awayWon := int32(0), int32(0)\n\thomeSets, awaySets := make([]int32, 0), make([]int32, 0)\n\thomePoints, awayPoints := int32(0), int32(0)\n\tfor _, set := range score.Sets {\n\t\tif won, winner, home, away, lghp, lgap := setWon(set); won {\n\t\t\tif winner {\n\t\t\t\thomeWon++\n\t\t\t} else {\n\t\t\t\tawayWon++\n\t\t\t}\n\t\t\thomeSets = append(homeSets, home)\n\t\t\tawaySets = append(awaySets, away)\n\t\t\thomePoints = lghp\n\t\t\tawayPoints = lgap\n\t\t}\n\t}\n\n\tif homeWon == 3 {\n\t\treturn true, true, homeWon, awayWon, homeSets, awaySets, 0, 0\n\t} else if awayWon == 3 {\n\t\treturn true, false, homeWon, awayWon, homeSets, awaySets, 0, 0\n\t} else {\n\t\treturn false, false, homeWon, awayWon, homeSets, awaySets, homePoints, awayPoints\n\t}\n}", "title": "" }, { "docid": "3408b13f4cd34e9187e227ed5ad655d9", "score": "0.56483257", "text": "func (game *Game) isGameOver() (bool, string) {\n\n\tplayer1Count, player2Count := 0, 0\n\tplayer1TotalCount, player2TotalCount := 0, 0\n\n\t// check columns\n\tfor col := 0; col < game.columns; col++ {\n\t\tplayer1Count, player2Count = game.getPlayerCount(0, col, 1, 0, game.rows, col)\n\t\tif player1Count == game.rows {\n\t\t\treturn true, game.players[0]\n\t\t}\n\t\tif player2Count == game.rows {\n\t\t\treturn true, game.players[1]\n\t\t}\n\t\tplayer1TotalCount += player1Count\n\t\tplayer2TotalCount += player2Count\n\t}\n\n\t// check rows\n\tfor row := 0; row < game.rows; row++ {\n\t\tplayer1Count, player2Count = game.getPlayerCount(row, 0, 0, 1, row, game.columns)\n\t\tif player1Count == game.columns {\n\t\t\treturn true, game.players[0]\n\t\t}\n\t\tif player2Count == game.columns {\n\t\t\treturn true, game.players[1]\n\t\t}\n\t}\n\n\t// check diagonals\n\tplayer1Count, player2Count = game.getPlayerCount(0, 0, 1, 1, game.rows, game.columns)\n\tif player1Count == game.columns {\n\t\treturn true, game.players[0]\n\t}\n\tif player2Count == game.columns {\n\t\treturn true, game.players[1]\n\t}\n\n\tplayer1Count, player2Count = game.getPlayerCount(game.rows-1, 0, -1, 1, -1, game.columns)\n\tif player1Count == game.columns {\n\t\treturn true, game.players[0]\n\t}\n\tif player2Count == game.columns {\n\t\treturn true, game.players[1]\n\t}\n\n\t// None of the players won outright, check for a draw\n\tif player1TotalCount+player2TotalCount == game.rows*game.columns {\n\t\treturn true, \"null\"\n\t}\n\n\treturn false, \"\"\n}", "title": "" }, { "docid": "8582448623e32ca6c6e86640c7c98af9", "score": "0.5635721", "text": "func (p Position) Score() int {\n return popcount(computeWinningPosition(p.currentPosition ^ p.mask, p.mask))\n}", "title": "" }, { "docid": "a74481e4c5237e2885c966595cc08ae2", "score": "0.5623175", "text": "func (m *FromMongo) Winner() (Politician, error) {\n\tsession, err := mgo.Dial(m.Server)\n\tif err != nil {\n\t\treturn Politician{}, err\n\t}\n\tdefer session.Close()\n\n\tc := session.DB(m.DbName).C(m.VotesCollection)\n\tresp := bson.M{}\n\n\t// db.votes.aggregate([{$group:{_id: \"$politician_id\", count: {$sum: 1}}},{$sort: {count: -1}},{$limit:1}])\n\tpipe := c.Pipe([]bson.M{{\"$group\": bson.M{\"_id\": \"$politician_id\", \"count\": bson.M{\"$sum\": 1}}}, bson.M{\"$sort\": bson.M{\"count\": -1}}, bson.M{\"$limit\": 1}})\n\tif err = pipe.One(&resp); err != nil {\n\t\treturn Politician{}, err\n\t}\n\n\t// Now that we have the ID, we need to perform another query to find the actual politician\n\tp, err := m.PoliticianFromID(resp[\"_id\"].(int))\n\tif err != nil {\n\t\treturn Politician{}, err\n\t}\n\n\treturn p, nil\n}", "title": "" }, { "docid": "13e75062b1797d40346f97a8f37ed736", "score": "0.56135756", "text": "func decideWinner(s []Participant) string {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn s[i].score() > s[j].score()\n\t})\n\tif s[0].score() != s[1].score() {\n\t\treturn s[0].getName()\n\t}\n\treturn gameIsDrawn\n}", "title": "" }, { "docid": "fa68a48a45952804f4927e80add77690", "score": "0.56133795", "text": "func (game *Game) calcScore() {\n\tb := 0\n\tw := 0\n\n\t//Iterate over game board\n\tfor i := 0; i < 8; i++ {\n\t\tfor j := 0; j < 8; j++ {\n\t\t\tif game.board[i][j] == -1 {\n\t\t\t\tb++\n\t\t\t} else if game.board[i][j] == 1 {\n\t\t\t\tw++\n\t\t\t}\n\t\t}\n\t}\n\n\tgame.BlackCount = b\n\tgame.WhiteCount = w\n}", "title": "" }, { "docid": "92de98821aab6423570261c125b22068", "score": "0.5586239", "text": "func isGameOver(board [][]int) int {\r\n\tif (board[0][0] != 0) {\r\n\t\tif ((board[0][0] == board[0][1] && board[0][1] == board[0][2]) ||\r\n\t\t\t(board[0][0] == board[1][0] && board[1][0] == board[2][0])) {\r\n\t\t\treturn board[0][0]\r\n\t\t}\r\n\t}\r\n\tif (board[1][1] != 0) {\r\n\t\tif ((board[0][1] == board[1][1] && board[1][1] == board[2][1]) ||\r\n\t\t\t(board[1][0] == board[1][1] && board[1][1] == board[1][2]) ||\r\n\t\t\t(board[0][0] == board[1][1] && board[1][1] == board[2][2]) ||\r\n\t\t\t(board[2][0] == board[1][1] && board[1][1] == board[0][2])) {\r\n\t\t\treturn board[1][1]\r\n\t\t}\r\n\t}\r\n\tif(board[2][2] != 0) {\r\n\t\tif ((board[2][0] == board[2][1] && board[2][1] == board[2][2]) ||\r\n\t\t\t(board[2][0] == board[2][1] && board[2][1] == board[2][2])) {\r\n\t\t\treturn board[2][2]\r\n\t\t}\r\n\t}\r\n\tif (isBoardFull(board)) {\r\n\t\t// No winner.\r\n\t\treturn 0\r\n\t}\r\n\t// Game not over.\r\n\treturn -1\r\n}", "title": "" }, { "docid": "50a48d74ee58aa0eaa22ee3b3c3e7ded", "score": "0.55724144", "text": "func (f *FileSystemPlayerStore) GetPlayerScore(name string) (int, bool) {\n\tplayer := f.league.Find(name)\n\n\tif player != nil {\n\t\treturn player.Wins, true\n\t}\n\n\treturn 0, false\n}", "title": "" }, { "docid": "b7a209d31e4225ca7b0361cd5590b469", "score": "0.55687606", "text": "func getWinner(competitionName string, year int) string {\n\twinnerRespo := &WinnerResponse{}\n\tbaseUrl, err := url.Parse(\"https://jsonmock.hackerrank.com/api/football_competitions\")\n\tif err != nil {\n\t\tlog.Fatalf(\"Malformed URL: %s\", err.Error())\n\t}\n\tparams := url.Values{}\n\tparams.Add(\"name\", competitionName)\n\tparams.Add(\"year\", fmt.Sprintf(\"%d\", year))\n\tbaseUrl.RawQuery = params.Encode()\n\tresp, err := http.Get(baseUrl.String())\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer resp.Body.Close()\n\tdec := json.NewDecoder(resp.Body)\n\tif err := dec.Decode(winnerRespo); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn winnerRespo.Data[0].Winner // may be guard for zero length data\n}", "title": "" }, { "docid": "f43bdbfc07079278ec3c4554d11207a8", "score": "0.55422294", "text": "func (v1 *V1BlockGrader) WinnerAmount() int {\n\treturn 10\n}", "title": "" }, { "docid": "260bbd5afa8559f97bc7b8e0328a12a9", "score": "0.55183464", "text": "func playerStrategy(player *Player, players []Player, reader io.Reader) int {\n\tinput := readRune(reader)\n\tsc := score(player.cards)\n\tfor input == \"h\" {\n\t\thit(player, true)\n\t\tboard(players)\n\t\tsc = score(player.cards)\n\t\tm := mins(sc)\n\t\tswitch {\n\t\tcase m == BUST: // Shortcut : player wins\n\t\t\treturn BUST\n\t\tcase m > BUST:\n\t\t\treturn -1\n\t\t}\n\t\tinput = readRune(reader)\n\t}\n\treturn maxs(sc)\n}", "title": "" }, { "docid": "c7968df35e8e8f50d8b509b82072d3c9", "score": "0.5501548", "text": "func evaluate(position position) int {\n\tvar score int\n\n\tvar direction int\n\tif position.toMove == White {\n\t\tdirection = 1\n\t} else {\n\t\tdirection = -1\n\t}\n\n\t// Loop through the board, finding the score for each piece present. If the\n\t// piece is white, add it to the total; if black, subtract it.\n\tfor i := 0; i < BoardSize; i++ {\n\n\t\tpiece := position.board[i]\n\t\tif isOnBoard(i) && position.board[i].exists() {\n\t\t\tvar increment int\n\t\t\tif piece.color() == White {\n\t\t\t\tincrement = 1\n\t\t\t} else {\n\t\t\t\tincrement = -1\n\t\t\t}\n\n\t\t\tpiecemapIndex := map0x88ToPiecemap(i, increment)\n\n\t\t\tswitch piece.identity() {\n\t\t\tcase King:\n\t\t\t\tscore += (kingWeight + kingPositions[piecemapIndex]) * increment\n\t\t\tcase Queen:\n\t\t\t\tscore += (queenWeight + queenPositions[piecemapIndex]) * increment\n\t\t\tcase Bishop:\n\t\t\t\tscore += (bishopWeight + bishopPositions[piecemapIndex]) * increment\n\t\t\tcase Rook:\n\t\t\t\tscore += (rookWeight + rookPositions[piecemapIndex]) * increment\n\t\t\tcase Knight:\n\t\t\t\tscore += (knightWeight + knightPositions[piecemapIndex]) * increment\n\t\t\tcase Pawn:\n\t\t\t\tscore += (pawnWeight + pawnPositions[piecemapIndex]) * increment\n\t\t\t}\n\t\t}\n\t}\n\n\treturn score * direction\n\n}", "title": "" }, { "docid": "a24a7c03c5466df718b6242325ea8d59", "score": "0.5496926", "text": "func Evaluate(b *Board) int {\n\tresult := 0\n\tblackMaterial := 0\n\twhiteMaterial := 0\n\tsideToMove := BLACK\n\tif b.whiteToMove {\n\t\tsideToMove = WHITE\n\t}\n\tvar kingPosition int\n\tvar opponentColour int\n\tif sideToMove == WHITE {\n\t\tkingPosition = b.whiteKing\n\t\topponentColour = BLACK\n\t} else { // Assume calling code is correct to avoid extra if\n\t\tkingPosition = b.blackKing\n\t\topponentColour = WHITE\n\t}\n\n\t// Test for checkmate.\n\tif IsCheck(b, sideToMove) {\n\t\tescapeSquareFound := false\n\t\tfor _, offset := range DIAGONALSANDLINES {\n\t\t\tif square := kingPosition + offset; LegalSquareIndex(square) && !IsAttacked(b, square, opponentColour) {\n\t\t\t\tescapeSquareFound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !escapeSquareFound {\n\t\t\treturn -30000\n\t\t}\n\t}\n\n\tfor rank := 0; rank < 8; rank++ {\n\t\tfor file := 0; file < 8; file++ {\n\t\t\tsquare := rank<<4 | file\n\t\t\tif !LegalSquareIndex(square) {\n\t\t\t\tfmt.Printf(\"Illegal square %X\\n\", square)\n\t\t\t\treturn result // TODO: Get rid of this test stuff\n\t\t\t}\n\t\t\tif b.squares[square] == EMPTY {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tpieceType := GetPieceType(b.squares[square])\n\t\t\tvalue := pieceValues[pieceType]\n\t\t\tcolour := GetColour(b.squares[square])\n\t\t\tif colour == WHITE {\n\t\t\t\twhiteMaterial += value\n\t\t\t} else {\n\t\t\t\tblackMaterial += value\n\t\t\t}\n\n\t\t\t// Add piece square bonuses.\n\t\t\tpieceSquareIndex := rank*8 + file\n\t\t\tcolourIndex := colour >> 3\n\t\t\tswitch pieceType {\n\t\t\tcase KNIGHT:\n\t\t\t\tresult += pieceSquareKnight[0][colourIndex][pieceSquareIndex]\n\t\t\tcase BISHOP:\n\t\t\t\tresult += pieceSquareBishop[0][colourIndex][pieceSquareIndex]\n\t\t\tcase QUEEN:\n\t\t\t\tresult += pieceSquareQueen[0][colourIndex][pieceSquareIndex]\n\t\t\tcase PAWN:\n\t\t\t\tresult += pieceSquarePawn[colourIndex][pieceSquareIndex]\n\t\t\t}\n\n\t\t}\n\t}\n\n\tif b.whiteToMove {\n\t\tresult += whiteMaterial - blackMaterial\n\t} else {\n\t\tresult += blackMaterial - whiteMaterial\n\t}\n\treturn result\n\n}", "title": "" }, { "docid": "e1e51ac2f0527b4b9e7c408549626b97", "score": "0.5486698", "text": "func (m *MajorityMethod) Winner() []uuid.UUID {\n\treturn m.winners\n}", "title": "" }, { "docid": "ba806774dfd7e40c0e661774518d3587", "score": "0.54763126", "text": "func verifyWin() string {\t\n\tfor i := 0; i < 8; i++ {\n\t\tif pos[winCombo1[i]] == \"x\" && pos[winCombo2[i]] == \"x\" && pos[winCombo3[i]] == \"x\" {\n\t\t\treturn \"player\"\n\t\t} else if pos[winCombo1[i]] == \"o\" && pos[winCombo2[i]] == \"o\" && pos[winCombo3[i]] == \"o\" {\n\t\t\treturn \"computer\"\n\t\t} else if plays > 8 {\n\t\t\treturn \"tied\"\n\t\t}\n\t}\n\treturn \"None\"\n}", "title": "" }, { "docid": "ac3a6a47bb6fdbac252e03cf35213858", "score": "0.54366595", "text": "func predictTheWinner(nums []int) bool {\n\treturn pick(nums, 0, len(nums)-1, map[string]int{}) >= 0\n}", "title": "" }, { "docid": "f1db2772a2a471437db39815d3a86611", "score": "0.543594", "text": "func seeScore(m Move) int32 {\n\tscore := seeBonus[m.Capture().Figure()]\n\tif m.MoveType() == Promotion {\n\t\tscore -= seeBonus[Pawn]\n\t\tscore += seeBonus[m.Target().Figure()]\n\t}\n\treturn score\n}", "title": "" }, { "docid": "53db271174a4616c67a70b182e870f5c", "score": "0.54190624", "text": "func checkWinner(gameData []string) (bool, string) {\n\n // bs == boardSize\n bs, _ := strconv.Atoi(gameData[0])\n\n // bi == boardIndex\n bri := 1\n\n // Check horizontal win conditions\n for i := 1; i <= bs; i++ {\n\n if i != 1 {\n bri += bs\n }\n\n // br == boardRow == slice of strings with boardsize items\n br := []string{}\n for c := 0; c < bs; c++ {\n br = append(br, gameData[bri+c])\n }\n\n isWinner, winnerToken := checkIfWinCondition(br, bs)\n if isWinner {\n return isWinner, winnerToken\n }\n }\n\n // Check vertical win conditions\n for i := 1; i <= bs; i++ {\n\n // bc == boardColumn == slice of strings with boardsize items\n bc := []string{}\n bci := i\n for c := 0; c < bs; c++ {\n if c != 0 {\n bci += bs\n }\n bc = append(bc, gameData[bci])\n }\n\n isWinner, winnerToken := checkIfWinCondition(bc, bs)\n if isWinner {\n return isWinner, winnerToken\n }\n }\n\n // Check diagonal from left to right\n {\n bdl := []string{}\n bdli := 1\n for c := 0; c < bs; c++ {\n if c != 0 {\n bdli += bs + 1\n }\n bdl = append(bdl, gameData[bdli])\n }\n\n isWinner, winnerToken := checkIfWinCondition(bdl, bs)\n if isWinner {\n return isWinner, winnerToken\n }\n }\n\n // Check diagonal from right to left\n {\n bdr := []string{}\n bdri := bs\n for c := 0; c < bs; c++ {\n if c != 0 {\n bdri += bs - 1\n }\n bdr = append(bdr, gameData[bdri])\n }\n\n isWinner, winnerToken := checkIfWinCondition(bdr, bs)\n if isWinner {\n return isWinner, winnerToken\n }\n }\n\n return false, \"null\"\n}", "title": "" }, { "docid": "f227d6e66b5c554d766bb938e7a69f94", "score": "0.54184186", "text": "func (p Player) Int() int {\n\treturn int(p)\n}", "title": "" }, { "docid": "7240630fff1c60ae10f8bf61550a18f7", "score": "0.5417161", "text": "func setWon(set *Set) (bool, bool, int32, int32, int32, int32) {\n\tawayWon, homeWon := int32(0), int32(0)\n\tfor _, game := range set.Games {\n\t\tif won, winner := gameWon(game); won {\n\t\t\tif winner {\n\t\t\t\thomeWon++\n\t\t\t} else {\n\t\t\t\tawayWon++\n\t\t\t}\n\t\t}\n\t}\n\n\tlastGameHomePoints := set.Games[len(set.Games)-1].HomePoints\n\tlastGameAwayPoints := set.Games[len(set.Games)-1].AwayPoints\n\n\tif homeWon < 6 && awayWon < 6 {\n\t\treturn false, false, homeWon, awayWon, lastGameHomePoints, lastGameAwayPoints\n\t}\n\n\tdiff := homeWon - awayWon\n\n\tif diff < 2 && diff > -2 {\n\t\treturn false, false, homeWon, awayWon, lastGameHomePoints, lastGameAwayPoints\n\t}\n\n\tif homeWon > 5 || awayWon > 5 {\n\t\treturn true, diff > 0, homeWon, awayWon, 0, 0\n\t}\n\n\treturn false, false, homeWon, awayWon, lastGameHomePoints, lastGameAwayPoints\n}", "title": "" }, { "docid": "d05d7a81c7abdc529c51f6dc2ad85443", "score": "0.5408519", "text": "func (game *Game) CheckWinner(player int, col int, row int) bool {\n\tsymbol := game.PlayerSymbols[player]\n\tnumToWin := 3\n\n\t//check horiz\n\t// check to the left\n\tfor i := 1; col-i >= 0; i++ {\n\t\tif game.GameBoard[row][col-i].Symbol == symbol {\n\t\t\tnumToWin--\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\t//check to the right\n\tfor j := 1; col+j <= BoardWidth-1; j++ {\n\n\t\tif game.GameBoard[row][col+j].Symbol == symbol {\n\t\t\tnumToWin--\n\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif numToWin <= 0 {\n\t\treturn true\n\t}\n\tnumToWin = 3\n\t//reset numToWin\n\t//check vertical\n\t//only need to check the 3 tokens below\n\tfor i := 1; i <= 3; i++ {\n\n\t\tif row+i < 6 {\n\t\t\tif game.GameBoard[row+i][col].Symbol == symbol {\n\t\t\t\tnumToWin--\n\t\t\t}\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\tif numToWin <= 0 {\n\n\t\treturn true\n\t}\n\tnumToWin = 3\n\t//reset numToWin\n\t//check diagonol\n\t//first check top to bottom left to right\n\t//check top left\n\tfor i := 1; col-i >= 0 && row-i >= 0; i++ {\n\t\tif game.GameBoard[row-i][col-i].Symbol == symbol {\n\t\t\tnumToWin--\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\t//check bottom right\n\tfor j := 1; col+j <= BoardWidth-1 && row+j <= BoardHeight-1; j++ {\n\t\tif game.GameBoard[row+j][col+j].Symbol == symbol {\n\t\t\tnumToWin--\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif numToWin <= 0 {\n\n\t\treturn true\n\t}\n\tnumToWin = 3\n\t//check top right direction\n\tfor i := 1; col+i <= BoardWidth-1 && row-i >= 0; i++ {\n\n\t\tif game.GameBoard[row-i][col+i].Symbol == symbol {\n\t\t\tnumToWin--\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\t//check bottom left direction\n\tfor j := 1; col-j >= 0 && row+j <= BoardHeight-1; j++ {\n\n\t\tif game.GameBoard[row+j][col-j].Symbol == symbol {\n\t\t\tnumToWin--\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\tif numToWin <= 0 {\n\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "9a370fafb74fdf5eb81e39db8684746b", "score": "0.5385678", "text": "func (g *Game) Move(num int, p Player) int {\n roll := 0\n switch num {\n case 1:\n // dice roll + (position of leading player - players position) / 2\n roll = (Roll() + (g.scorecard.Front().Value.(Player).distance - p.distance) / 2)\n case 2:\n // if roll is even, multiply by 3, else use roll\n if roll := Roll(); roll % 2 == 0 {\n roll = roll * 3\n }\n case 3:\n // roll + (players position - position of trailing player) / 2\n trailingPosition := 0\n for e := g.scorecard.Front(); e != nil; e = e.Next() {\n f := e.Value.(Player)\n if f.name == p.name {\n trailingPosition = e.Next().Value.(Player).distance\n break\n }\n }\n roll = (Roll() + (p.distance - trailingPosition) / 2)\n }\n return roll\n}", "title": "" }, { "docid": "56ef373449a0a92b3f1c7f4e426ade3e", "score": "0.538217", "text": "func (b *Board) findPlayer() (int, int) {\n\treturn b.pRow, b.pCol\n}", "title": "" }, { "docid": "c043c35b7e7411195e192557a0fb76bb", "score": "0.537997", "text": "func Evaluate(pos *Position) int32 {\n\t///////////////////////////////////////////////////\n\t// NEW\n\tif IS_Racing_Kings {\n\t\tevalw := EvaluateSideRk(pos, White)\n\t\tevalb := EvaluateSideRk(pos, Black)\n\n\t\teval := evalw - evalb\n\n\t\tscore := eval*128\n\n\t\treturn score\n\t}\n\t///////////////////////////////////////////////////\n\teval := EvaluatePosition(pos)\n\tscore := eval.Feed(Phase(pos))\n\tif KnownLossScore >= score || score >= KnownWinScore {\n\t\tpanic(fmt.Sprintf(\"score %d should be between %d and %d\",\n\t\t\tscore, KnownLossScore, KnownWinScore))\n\t}\n\treturn score\n}", "title": "" }, { "docid": "4dc05d9f8ad1193afd8740ba7969b356", "score": "0.53541523", "text": "func WinnerAmt(version uint8) int {\n\tswitch version {\n\tcase 1:\n\t\treturn 10\n\tcase 2, 3, 4, 5:\n\t\treturn 25\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "5136a9cbfc7bb1ed6de1f04b994f7da3", "score": "0.53462124", "text": "func (w *Worker) getResult() int {\n\tif w.cheat != 0 {\n\t\tp := random.Intn(100)\n\t\tif p < w.cheat {\n\t\t\tif w.isConspirator {\n\t\t\t\treturn 2\n\t\t\t} else {\n\t\t\t\treturn 0\n\t\t\t}\n\t\t}\n\t}\n\n\treturn 1\n}", "title": "" }, { "docid": "f5048af1533ea5c4400592f17ef09cc6", "score": "0.53164726", "text": "func BenchmarkGetWinnerRank(b *testing.B) {\n\tzerolog.SetGlobalLevel(zerolog.DebugLevel)\n\tsd := getData()\n\tc := sd.get(testChannel)\n\tlimit := getTargetScore()\n\n\tfor _, u := range c.Users {\n\t\tu.setScore(limit)\n\t\tu.setLastEntry(time.Now())\n\t\tu.lock()\n\t}\n\n\trank := 0\n\t// b.ResetTimer()\n\tfor i := 0; i < b.N; i++ {\n\t\tfor nick := range c.Users {\n\t\t\trank = c.getWinnerRank(nick)\n\t\t}\n\t}\n\tintVar = rank\n}", "title": "" }, { "docid": "71a1e2fe9e69239a79364c9b7b638c92", "score": "0.5294845", "text": "func PlayCrapsOnce() (IsWinner, IsWinner) {\n\tcomeOutRoll := SumTwoDice()\n\tswitch comeOutRoll {\n\tcase 7, 11:\n\t\treturn WIN, LOSE\n\tcase 2, 3:\n\t\treturn LOSE, WIN\n\tcase 12:\n\t\treturn LOSE, PUSH\n\t}\n\tfor true {\n\t\tpointRoll := SumTwoDice()\n\t\tif pointRoll == comeOutRoll {\n\t\t\t// Winner\n\t\t\treturn WIN, LOSE\n\t\t} else if pointRoll == 7 {\n\t\t\t// Loser\n\t\t\treturn LOSE, WIN\n\t\t}\n\t}\n\tpanic(\"Unreachable code!\")\n\treturn PUSH, PUSH\n}", "title": "" }, { "docid": "1d724f2adc5392ccbfa0bd049ea879fa", "score": "0.52814466", "text": "func (w *War) Result() game.Result {\n\tfmt.Printf(\"Turn Wins: %+v\\n\", w.turnWins)\n\n\twinner := w.players[0]\n\tfor _, player := range w.players[1:] {\n\t\tif w.turnWins[player] > w.turnWins[winner] {\n\t\t\twinner = player\n\t\t}\n\t}\n\n\treturn game.Result{\n\t\tWinners: []game.Player{winner},\n\t}\n}", "title": "" }, { "docid": "1b08464e710d6d8a418fbe7343fc04f4", "score": "0.5269422", "text": "func getScore(handCards []deck.Card) int{\n score := getMinScore(handCards)\n if(score > 11){\n return(score)\n }\n for _,cd := range(handCards){\n if(cd.Rank == 1){\n score = score + 10\n }\n }\n //fmt.Println(\"score in function\",score)\n return(score)\n}", "title": "" }, { "docid": "4f7d3628af9acd4709f7d14417ffcc70", "score": "0.52679765", "text": "func (m *MonLeaderDetector) Leader() int {\n\t// TODO(student): Implement\n\t// https://golang.org/pkg/sort/#Reverse\n\tsort.Sort(sort.Reverse(sort.IntSlice(m.nodeIDs)))\n\tfor _, id := range m.nodeIDs {\n\t\tif id > UnknownID && !m.suspected[id] {\n\t\t\treturn id\n\t\t}\n\t}\n\treturn UnknownID\n}", "title": "" }, { "docid": "3a7767875e46d197a7067214953d0883", "score": "0.52674985", "text": "func bidWinner(m map[seat.Seat]bid.Bid) (s seat.Seat, b bid.Bid) {\n\tfor seat, bid := range m {\n\t\tif bid >= b {\n\t\t\tb = bid\n\t\t\ts = seat\n\t\t}\n\t}\n\treturn s, b\n}", "title": "" }, { "docid": "778dbbe368b3f6b1ab37a7302a0d94fb", "score": "0.524616", "text": "func GetWinProbability(ratingA int, ratingB int) (float64, float64) {\n\tprobabilityA := getIndividualProbability(ratingB, ratingA)\n\tprobabilityB := 1.0 - probabilityA\n\treturn probabilityA, probabilityB\n}", "title": "" }, { "docid": "7100bd9fdfbf83e57fdf716b3171e361", "score": "0.5245867", "text": "func scoreNameToValue(name string) (int) {\n\t\tif(strings.EqualFold(name, \"Love\")) {\n\t\t\treturn 0;\n\t\t}\n\n\t\tif(strings.EqualFold(name, \"Fifteen\")) {\n\t\t\treturn 1;\n\t\t}\n\n\t\tif(strings.EqualFold(name, \"Thirty\")) {\n\t\t\treturn 2;\n\t\t}\n\n\t\tif(strings.EqualFold(name, \"Forty\")) {\n\t\t\treturn 3\n\t\t}\n\n\t\t//Else return 4 for advantage\n\t\treturn 4\n\t}", "title": "" }, { "docid": "3e13585c44154389400c5f4078c17525", "score": "0.52347404", "text": "func (_ChallengeTester *ChallengeTesterSession) Winner() (common.Address, error) {\n\treturn _ChallengeTester.Contract.Winner(&_ChallengeTester.CallOpts)\n}", "title": "" }, { "docid": "be8ea5d9333fd9cfd22d8c483e8950c5", "score": "0.5228435", "text": "func guess(num int) int{\n return -1\n}", "title": "" }, { "docid": "0b2d7a39b519bac9149bdf70ffccf8a5", "score": "0.5227478", "text": "func PlayerWins(playerHand string, dealerHand string) bool {\n\tplayerHandTotal := handTotal(playerHand)\n\tdealerHandTotal := handTotal(dealerHand)\n\tif playerHandTotal > dealerHandTotal {\n\t\treturn true\n\t}\n\treturn false\n\n}", "title": "" }, { "docid": "5f1c10fcccc41e65019348d8983c84a8", "score": "0.52253896", "text": "func (b Board) Evaluate() float32 {\n\tif b.IsCheckmate() {\n\t\tif b.turn == white {\n\t\t\treturn -1000\n\t\t} else {\n\t\t\treturn 1000\n\t\t}\n\t}\n\n\twhiteMaterial := b.Material(white)\n\tblackMaterial := b.Material(black)\n\n\tmaterial := whiteMaterial - blackMaterial\n\n\tcenterControlWhite := float32(b.HowManyAttack(xy{4, 4}, white)+\n\t\tb.HowManyAttack(xy{4, 5}, white)+\n\t\tb.HowManyAttack(xy{5, 4}, white)+\n\t\tb.HowManyAttack(xy{5, 5}, white)) / 4\n\n\tcenterControlBlack := float32(b.HowManyAttack(xy{4, 4}, black)+\n\t\tb.HowManyAttack(xy{4, 5}, black)+\n\t\tb.HowManyAttack(xy{5, 4}, black)+\n\t\tb.HowManyAttack(xy{5, 5}, black)) / 4\n\n\tcenterControl := centerControlWhite - centerControlBlack\n\n\tdoubledPawnsWhite := float32(b.FilesWithDoubledPawns(white)) * 0.3\n\tdoubledPawnsBlack := float32(b.FilesWithDoubledPawns(black)) * 0.3\n\n\tdoubledPawns := doubledPawnsWhite - doubledPawnsBlack\n\n\treturn material + float32(centerControl)*2 + float32(doubledPawns)*0.3\n}", "title": "" }, { "docid": "78e2ff9279dbeea461bba263e05d18d4", "score": "0.52207553", "text": "func getCondorcetResult() []Ranking {\n\ttype teamPair struct {\n\t\twinner *Team\n\t\tloser *Team\n\t\tmajority float32\n\t}\n\tvar allPairs []teamPair\n\tvar ret []Ranking\n\tfor i := 0; i < len(m.jam.Teams); i++ {\n\t\tfor j := i + 1; j < len(m.jam.Teams); j++ {\n\t\t\t// For each pairing find a winner\n\t\t\twinner, pct, _ := findWinnerBetweenTeams(&m.jam.Teams[i], &m.jam.Teams[j])\n\t\t\tnewPair := new(teamPair)\n\t\t\tif winner != nil {\n\t\t\t\tnewPair.winner = winner\n\t\t\t\tif winner.UUID == m.jam.Teams[i].UUID {\n\t\t\t\t\tnewPair.loser = &m.jam.Teams[j]\n\t\t\t\t} else {\n\t\t\t\t\tnewPair.loser = &m.jam.Teams[i]\n\t\t\t\t}\n\t\t\t\tnewPair.majority = pct\n\t\t\t} else {\n\t\t\t\tnewPair.winner = &m.jam.Teams[i]\n\t\t\t\tnewPair.loser = &m.jam.Teams[j]\n\t\t\t\tnewPair.majority = 50\n\t\t\t}\n\t\t\tallPairs = append(allPairs, *newPair)\n\t\t}\n\t}\n\t// initialize map of team wins\n\tteamWins := make(map[string]int)\n\tfor i := range m.jam.Teams {\n\t\tteamWins[m.jam.Teams[i].UUID] = 0\n\t}\n\t// Figure out how many wins each team has\n\tfor i := range allPairs {\n\t\tif allPairs[i].majority != 50 {\n\t\t\tteamWins[allPairs[i].winner.UUID]++\n\t\t}\n\t}\n\n\t// Rank them by wins\n\trankedWins := make(map[int][]string)\n\tfor k, v := range teamWins {\n\t\trankedWins[v] = append(rankedWins[v], k)\n\t}\n\tcurrRank := 1\n\tfor len(rankedWins) > 0 {\n\t\ttopWins := 0\n\t\tfor k, _ := range rankedWins {\n\t\t\tif k > topWins {\n\t\t\t\ttopWins = k\n\t\t\t}\n\t\t}\n\t\tnR := new(Ranking)\n\t\tnR.Rank = currRank\n\t\tfor i := range rankedWins[topWins] {\n\t\t\ttm, _ := m.jam.GetTeamById(rankedWins[topWins][i])\n\t\t\tif tm != nil {\n\t\t\t\tnR.Teams = append(nR.Teams, *tm)\n\t\t\t}\n\t\t}\n\t\tret = append(ret, *nR)\n\t\tdelete(rankedWins, topWins)\n\t\tcurrRank++\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "d92dc797123d0653767753d50971dec3", "score": "0.5214287", "text": "func (g *Game) checkRoundWinner() {\n\n\twinner := g.rounds[g.currentRound].GetWinner()\n\n\tg.winnerLastRound = winner\n\tg.GameState.WinnerPair = winner.InternPair\n}", "title": "" }, { "docid": "5a21df7ac56fd27715919323b11e320d", "score": "0.5209136", "text": "func (currentCup *Cup) findAvailablePlayer(nth int) int {\n\tnumActive := currentCup.activePlayerCount()\n\tif nth < 0 || nth > numActive {\n\t\treturn -1\n\t}\n\tfor i := 0; i < numActive; i++ {\n\t\tplayer := &currentCup.Players[i]\n\t\tif player.Team == -1 {\n\t\t\tif nth == 0 {\n\t\t\t\treturn i\n\t\t\t}\n\t\t\tnth--\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "2659eeb56f8c79737926a0e1323e1658", "score": "0.5192263", "text": "func (p *Player) CalculateScore() int {\n\tscore := 0\n\tfor _, c := range p.tricks {\n\t\tif c.GetSuit() == card.Heart {\n\t\t\tscore += 1\n\t\t} else if c.GetSuit() == card.Spade && c.GetFace() == card.Queen {\n\t\t\tscore += 13\n\t\t}\n\t}\n\treturn score\n}", "title": "" }, { "docid": "65f0e22a9694c259a1ef0ac9b7f9ccf7", "score": "0.5182435", "text": "func (g *Game) GetWinningPair() (winningPair uint32, winningPoints int, losingPair uint32, losingPoints int) {\n\tpA := g.GameState.Players.All[0]\n\tpB := g.GameState.Players.All[1]\n\n\tif g.GameState.WinnerPair == pA.Pair {\n\t\twinningPair = pA.InternPair\n\t\twinningPoints = g.GetTeamPoints(int(pA.Pair))\n\t\tlosingPair = pB.InternPair\n\t\tlosingPoints = g.GetTeamPoints(int(pB.Pair))\n\n\t} else {\n\n\t\twinningPair = pB.InternPair\n\t\twinningPoints = g.GetTeamPoints(int(pB.Pair))\n\t\tlosingPair = pA.InternPair\n\t\tlosingPoints = g.GetTeamPoints(int(pA.Pair))\n\t}\n\n\treturn winningPair, winningPoints, losingPair, losingPoints\n}", "title": "" }, { "docid": "9671b454a6fb680f23c934bddb409c25", "score": "0.5181743", "text": "func (game *Game) CheckResult() {\n\tprintln(\"Рука противника:\", game.aiHand.GetRepresentation())\n\tuserScore := game.userHand.Calculate()\n\taiScore := game.aiHand.Calculate()\n\n\tswitch {\n\t// both has 21 !\n\tcase userScore == aiScore && aiScore == 21:\n\t\tif game.isAiMove {\n\t\t\tgame.playerLost()\n\t\t} else {\n\t\t\tgame.playerWins(21)\n\t\t}\n\n\t// user lost\n\tcase userScore > 21 && aiScore <= 21:\n\t\tgame.playerLost()\n\t// user wins\n\tcase userScore <= 21 && aiScore > 21:\n\t\tgame.playerWins(userScore)\n\t// draw\n\tcase userScore > 21 && aiScore > 21:\n\t\tprintln(\"Ничья.\")\n\n\t// user lost\n\tcase userScore < aiScore:\n\t\tgame.playerLost()\n\t// user wins\n\tcase userScore > aiScore:\n\t\tgame.playerWins(userScore)\n\t// draw\n\tdefault:\n\t\tprintln(\"Ничья.\")\n\t}\n\n\tgame.isAiMove = !game.isAiMove\n\tgame.deck.Shuffle()\n}", "title": "" }, { "docid": "ea0daa5cf4d8d75a878d51cbf1435454", "score": "0.5173928", "text": "func stateHeuristic(board [][]int, player int) int {\n\tscore := 0\n\n\tcheckWindow := func(window []int, player int) int {\n\t\tscore, playerCount, otherPlayerCount, emptyCount := 0, 0, 0, 0\n\t\tfor i := 0; i < len(window); i++ {\n\t\t\tif window[i] == player {\n\t\t\t\tplayerCount++\n\t\t\t} else if window[i] == BLANK {\n\t\t\t\temptyCount++\n\t\t\t} else {\n\t\t\t\totherPlayerCount++\n\t\t\t}\n\t\t}\n\t\tif playerCount == 4 {\n\t\t\tscore = 100\n\t\t} else if playerCount == 3 && emptyCount == 1 {\n\t\t\tscore = 5\n\t\t} else if playerCount == 2 && emptyCount == 2 {\n\t\t\tscore = 2\n\t\t}\n\t\tif otherPlayerCount == 3 && emptyCount == 1 {\n\t\t\tscore -= 4\n\t\t}\n\t\treturn score\n\t}\n\n\t//score horizontal\n\tfor i := 0; i < len(board); i++ {\n\t\tfor j := 0; j < len(board[i])-3; j++ {\n\t\t\twindow := make([]int, 4)\n\t\t\tfor k := j; k < j+4; k++ {\n\t\t\t\twindow[k-j] = board[i][k]\n\t\t\t}\n\t\t\tscore += checkWindow(window, player)\n\t\t}\n\t}\n\n\t//score vertical\n\tfor j := 0; j < len(board[0]); j++ {\n\t\tfor i := 0; i < len(board)-3; i++ {\n\t\t\twindow := make([]int, 4)\n\t\t\tfor k := i; k < i+4; k++ {\n\t\t\t\twindow[k-i] = board[k][j]\n\t\t\t}\n\t\t\tscore += checkWindow(window, player)\n\t\t}\n\t}\n\n\t//score diagonals\n\tfor i := 0; i < len(board); i++ {\n\t\tfor j := 0; j < len(board[i]); j++ {\n\n\t\t\t//check positive sloped line\n\t\t\twindow := make([]int, 0)\n\t\t\tfor diagI, diagJ := i, j; diagI >= 0 && diagJ < len(board[0]); diagI, diagJ = diagI-1, diagJ+1 {\n\t\t\t\twindow = append(window, board[diagI][diagJ])\n\t\t\t}\n\t\t\tif len(window) == 4 {\n\t\t\t\tscore += checkWindow(window, player)\n\t\t\t}\n\t\t\twindow = make([]int, 0)\n\t\t\tfor diagI, diagJ := i, j; diagI < len(board) && diagJ < len(board[0]); diagI, diagJ = diagI+1, diagJ+1 {\n\t\t\t\twindow = append(window, board[diagI][diagJ])\n\t\t\t}\n\t\t\tif len(window) == 4 {\n\t\t\t\tscore += checkWindow(window, player)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn score\n}", "title": "" }, { "docid": "00cf6c298b8d9b5efc2fa467b9b92e0e", "score": "0.51714647", "text": "func (s System) WinChance(r, ro rating.Rating) float64 {\n\treturn expectedScore(r[0], ro[0])\n}", "title": "" }, { "docid": "0e1e83dd21d993a88774269d5aa8e0d2", "score": "0.51649994", "text": "func (m *MonLeaderDetector) Leader() int {\n\n\treturn m.currentLeader\n}", "title": "" }, { "docid": "fb724e9763e3db077c413c9ab2e56120", "score": "0.5152482", "text": "func (c Chessboard) negaMax(depth int) int {\n score, move := c.negaMaxHelper(depth)\n\n fmt.Println(move)\n\n if c.turn {\n return -score\n }\n\n return score\n}", "title": "" }, { "docid": "e2ac8fbef7db0e84c324099b4e5b4c60", "score": "0.5150475", "text": "func LookForLeader(Peerset []network.Peer, Sid int, Conn []*net.Conn, Response []*net.Conn, cR chan network.NetMessage) int {\n\trand.Seed(int64(Sid) + time.Now().UnixNano())\n\txid := rand.Intn(100000)\n\t//choose oneself as leader as initialization\n\tvar vote []int\n\tnetwork.Winner = -1\n\tnowVote := -1\n\tcC := make(chan int)\n\tcCt := make(chan int)\n\tgo ListenCount(cC)\n\t//nowState=1 : listening to others\n\t//nowState=2 : electing myself\n\t//nowState=3 : winner is decided\n\tnowState := 1\n\tfor {\n\t\tselect {\n\t\tcase <-cC:\n\t\t\tif nowState == 1 {\n\t\t\t\tnowState = 2\n\t\t\t\tnowVote = Sid\n\t\t\t\tfor i := 0; i < len(Conn); i++ {\n\t\t\t\t\tnetwork.SendMessage(Conn[i], Sid, 1, xid)\n\t\t\t\t}\n\t\t\t\tfmt.Println(\"begin elect myself\")\n\t\t\t\tvote = []int{}\n\t\t\t\tgo ListenCountTally(cCt)\n\t\t\t}\n\t\tcase <-cCt:\n\t\t\tif nowState == 2 {\n\t\t\t\tvar tally [3]int\n\t\t\t\ttally[nowVote] = tally[nowVote] + 1\n\t\t\t\tfor i := 0; i < len(vote); i++ {\n\t\t\t\t\ttally[vote[i]] = tally[vote[i]] + 1\n\t\t\t\t\t//fmt.Printf(\"*%d \", tally[vote[i]])\n\t\t\t\t}\n\t\t\t\tfor i := 0; i < len(tally); i++ {\n\t\t\t\t\tif tally[i] >= 2 {\n\t\t\t\t\t\tnowVote = i\n\t\t\t\t\t\tnetwork.Winner = i\n\t\t\t\t\t}\n\t\t\t\t\tfmt.Printf(\"%d:%d \", i, tally[i])\n\t\t\t\t}\n\t\t\t\tfmt.Printf(\"\\n\")\n\t\t\t\tif network.Winner == -1 {\n\t\t\t\t\tfmt.Printf(\"still looking for winner\\n\")\n\t\t\t\t\tnowState = 1\n\t\t\t\t\tfmt.Println(\"begin count down\")\n\t\t\t\t\tgo ListenCount(cC)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tfmt.Printf(\"winner is %d\\n\", network.Winner)\n\t\t\t\tif network.Winner == Sid {\n\t\t\t\t\t//become leader\n\t\t\t\t\tfmt.Println(\"i become leader\")\n\t\t\t\t\tfor i := 0; i < len(Conn); i++ {\n\t\t\t\t\t\tnetwork.SendMessage(Conn[i], Sid, 3, Sid)\n\t\t\t\t\t}\n\t\t\t\t\tnowState = 3\n\t\t\t\t\treturn network.Winner\n\t\t\t\t} /*else {\n\t\t\t\t\t//become follower\n\t\t\t\t\tfmt.Println(\"i become follower\")\n\t\t\t\t\tnowState = 3\n\t\t\t\t\treturn winner\n\t\t\t\t}*/\n\t\t\t} else {\n\t\t\t\tnowState = 1\n\t\t\t\tfmt.Println(\"begin count down\")\n\t\t\t\tnowVote = -1\n\t\t\t\tgo ListenCount(cC)\n\t\t\t}\n\t\tcase Message := <-cR:\n\t\t\tif Message.Type == 1 {\n\t\t\t\tif nowState == 1 {\n\t\t\t\t\tif nowVote == -1 {\n\t\t\t\t\t\tnowVote = Peerset[Message.Id].Sid //translate from relative id to absolute id\n\t\t\t\t\t}\n\t\t\t\t\tfmt.Printf(\"vote for %d\\n\", nowVote)\n\t\t\t\t\tnetwork.SendMessage(Conn[Message.Id], Sid, 2, nowVote)\n\t\t\t\t} else if nowState == 2 {\n\t\t\t\t\tfmt.Printf(\"vote for %d\\n\", nowVote)\n\t\t\t\t\tnetwork.SendMessage(Conn[Message.Id], Sid, 2, nowVote)\n\t\t\t\t} else if nowState == 3 {\n\t\t\t\t\tfmt.Printf(\"vote for %d\\n\", network.Winner)\n\t\t\t\t\tnetwork.SendMessage(Conn[Message.Id], Sid, 2, network.Winner)\n\t\t\t\t}\n\t\t\t} else if Message.Type == 2 {\n\t\t\t\tif nowState == 2 {\n\t\t\t\t\tvote = append(vote, Message.Info)\n\t\t\t\t}\n\n\t\t\t} else if Message.Type == 3 {\n\t\t\t\tnowState = 3\n\t\t\t\tnowVote = Message.Info\n\t\t\t\tnetwork.Winner = Message.Info\n\t\t\t\tfmt.Println(\"i become follower\")\n\t\t\t\treturn network.Winner\n\t\t\t}\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "ccc9af8088090e9f9cb42ab0643888a5", "score": "0.51462275", "text": "func getScore(advacned int32, works int32, stages []string) float64 {\n\tprodutivity := float64(advacned) / float64(works)\n\tepsilon := math.Min(1/float64(works), .0001)\n\tnoFetchBonus := epsilon\n\tif hasStage(\"FETCH\", stages) &&\n\t\t(hasStage(\"PROJECTION_DEFAULT\", stages) || hasStage(\"PROJECTION_COVERED\", stages) || hasStage(\"PROJECTION_SIMPLE\", stages)) {\n\t\tnoFetchBonus = 0\n\t}\n\tnoSortBonus := epsilon\n\tif hasStage(\"SORT\", stages) {\n\t\tnoSortBonus = 0\n\t}\n\tnoIxisectBonus := epsilon\n\tif hasStage(\"AND_HASH\", stages) || hasStage(\"AND_SORTED\", stages) {\n\t\tnoIxisectBonus = 0\n\t}\n\ttieBreakers := noFetchBonus + noSortBonus + noIxisectBonus\n\tscore := 1 + produtivity + tieBreakers\n\treturn score\n}", "title": "" }, { "docid": "34d1474bd015a36a41c141198c2c07e7", "score": "0.51308197", "text": "func ChooseNonWinningPiece(currentState state.State) int {\n\tr := rand.New(rand.NewSource(time.Now().UnixNano()))\n\tpiecesList := GetNonWinningPiecesListFromState(currentState)\n\tif len(piecesList) == 0 {\n\t\treturn 0\n\t}\n\treturn piecesList[r.Intn(len(piecesList))]\n}", "title": "" }, { "docid": "992917f8e0c31e58341517b8eb360601", "score": "0.5126277", "text": "func diff(winnerRating int, loserRating int) int {\n outcome := 1.0\n expected := 1.0 / (1 + math.Pow(10, float64(loserRating - winnerRating) / 400.0))\n return int(K_FACTOR * (outcome - expected))\n}", "title": "" }, { "docid": "c5499af52caf4191eb13d54f5e246f32", "score": "0.51254684", "text": "func isWinner(in int) bool {\n\tfor _, template := range winTemplates {\n\t\tmask, err := strconv.ParseInt(template, 2, 64)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t\tif int64(in)&mask == mask {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" } ]
6d7833c272339c41c38e600471501b38
NewTokenManager initialize the tokens pool
[ { "docid": "e07f8102764a1ea7add8da536ad07cae", "score": "0.7638169", "text": "func NewTokenManager(keys []string) *Tokens {\n\tpool := []Token{}\n\tfor _, key := range keys {\n\t\tt := Token{Hash: key, ExceededTime: time.Time{}, RetryAfter: 0}\n\t\tpool = append(pool, t)\n\t}\n\n\treturn &Tokens{\n\t\tcurrent: 0,\n\t\tpool: pool,\n\t}\n}", "title": "" } ]
[ { "docid": "5fa9d739a11e67f0c139db533459c312", "score": "0.64559317", "text": "func NewManager(config configuration) (Manager, error) {\n\n\t// Load public keys from Auth service and add them to the manager\n\ttm := &tokenManager{\n\t\tpublicKeysMap: map[string]*rsa.PublicKey{},\n\t}\n\ttm.config = config\n\n\tkeysEndpoint := fmt.Sprintf(\"%s%s\", config.GetAuthServiceURL(), config.GetAuthKeysPath())\n\tremoteKeys, err := jwk.FetchKeys(keysEndpoint)\n\tif err != nil {\n\t\tlog.Error(nil, map[string]interface{}{\n\t\t\t\"err\": err,\n\t\t\t\"keys_url\": keysEndpoint,\n\t\t}, \"unable to load public keys from auth service\")\n\t\treturn nil, errors.New(\"unable to load public keys from auth service\")\n\t}\n\tfor _, remoteKey := range remoteKeys {\n\t\ttm.publicKeysMap[remoteKey.KeyID] = remoteKey.Key\n\t\ttm.publicKeys = append(tm.publicKeys, &jwk.PublicKey{KeyID: remoteKey.KeyID, Key: remoteKey.Key})\n\t\tlog.Info(nil, map[string]interface{}{\n\t\t\t\"kid\": remoteKey.KeyID,\n\t\t}, \"Public key added\")\n\t}\n\n\tdevModePrivateKey := config.GetDevModePrivateKey()\n\tif devModePrivateKey != nil {\n\t\t// Add the public key which will be used to verify tokens generated in Dev Mode\n\t\trsaKey, err := jwt.ParseRSAPrivateKeyFromPEM(devModePrivateKey)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttm.publicKeysMap[\"test-key\"] = &rsaKey.PublicKey\n\t\ttm.publicKeys = append(tm.publicKeys, &jwk.PublicKey{KeyID: \"test-key\", Key: &rsaKey.PublicKey})\n\t\tlog.Info(nil, map[string]interface{}{\n\t\t\t\"kid\": devModeKeyID,\n\t\t}, \"Public key added\")\n\t}\n\treturn tm, nil\n}", "title": "" }, { "docid": "ac8fb8f19c4324330f7ecc8bbff0c544", "score": "0.62592554", "text": "func InitPoolToken(poolTokenName string) token.Token {\n\treturn token.Token{\n\t\tDescription: poolTokenName,\n\t\tSymbol: poolTokenName,\n\t\tOriginalSymbol: poolTokenName,\n\t\tWholeName: poolTokenName,\n\t\tOriginalTotalSupply: sdk.NewDec(0),\n\t\tOwner: supply.NewModuleAddress(ModuleName),\n\t\tType: GenerateTokenType,\n\t\tMintable: true,\n\t}\n}", "title": "" }, { "docid": "507ac6cac8706618b5695386e32ca263", "score": "0.61745316", "text": "func NewManager(config tokenManagerConfiguration) (Manager, error) {\n\t// Load public keys from Auth service and add them to the manager\n\ttm := &tokenManager{\n\t\tpublicKeysMap: map[string]*rsa.PublicKey{},\n\t}\n\n\tkeysEndpoint := fmt.Sprintf(\"%s%s\", config.GetAuthServiceURL(), authservice.KeysTokenPath())\n\tremoteKeys, err := authclient.FetchKeys(keysEndpoint)\n\tif err != nil {\n\t\tlog.Error(nil, map[string]interface{}{\n\t\t\t\"err\": err,\n\t\t\t\"keys_url\": keysEndpoint,\n\t\t}, \"unable to load public keys from remote service\")\n\t\treturn nil, errors.New(\"unable to load public keys from remote service\")\n\t}\n\tfor _, remoteKey := range remoteKeys {\n\t\ttm.publicKeysMap[remoteKey.KeyID] = remoteKey.Key\n\t\ttm.publicKeys = append(tm.publicKeys, &PublicKey{KeyID: remoteKey.KeyID, Key: remoteKey.Key})\n\t\tlog.Info(nil, map[string]interface{}{\n\t\t\t\"kid\": remoteKey.KeyID,\n\t\t}, \"Public key added\")\n\t}\n\n\tdevModeURL := config.GetKeycloakDevModeURL()\n\tif devModeURL != \"\" {\n\t\tremoteKeys, err = authclient.FetchKeys(fmt.Sprintf(\"%s/protocol/openid-connect/certs\", devModeURL))\n\t\tif err != nil {\n\t\t\tlog.Error(nil, map[string]interface{}{\n\t\t\t\t\"err\": err,\n\t\t\t\t\"keys_url\": devModeURL,\n\t\t\t}, \"unable to load public keys from remote service in Dev Mode\")\n\t\t\treturn nil, errors.New(\"unable to load public keys from remote service in Dev Mode\")\n\t\t}\n\t\tfor _, remoteKey := range remoteKeys {\n\t\t\ttm.publicKeysMap[remoteKey.KeyID] = remoteKey.Key\n\t\t\ttm.publicKeys = append(tm.publicKeys, &PublicKey{KeyID: remoteKey.KeyID, Key: remoteKey.Key})\n\t\t\tlog.Info(nil, map[string]interface{}{\n\t\t\t\t\"kid\": remoteKey.KeyID,\n\t\t\t}, \"Public key added\")\n\t\t}\n\t\t// Add the public key which will be used to verify tokens generated in dev mode\n\t\trsaKey, err := jwt.ParseRSAPrivateKeyFromPEM([]byte(configuration.DevModeRsaPrivateKey))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttm.publicKeysMap[\"test-key\"] = &rsaKey.PublicKey\n\t\ttm.publicKeys = append(tm.publicKeys, &PublicKey{KeyID: \"test-key\", Key: &rsaKey.PublicKey})\n\t\tlog.Info(nil, map[string]interface{}{\n\t\t\t\"kid\": \"test-key\",\n\t\t}, \"Public key added\")\n\t}\n\n\treturn tm, nil\n}", "title": "" }, { "docid": "3b83b5f9d4ddf3adbf24c091dfcb27ad", "score": "0.60138124", "text": "func (i *TokenInteractor) New() (*domain.Token, error) {\n\tvar maxAttempt = 20\n\tfor a := 0; a < maxAttempt; a++ {\n\t\tv := generateToken()\n\t\tif _, err := i.FindByValue(v); err != nil {\n\t\t\tif err == domain.ErrNotFoundToken {\n\t\t\t\ttoken := &domain.Token{Value: v}\n\t\t\t\treturn i.save(token)\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn nil, errors.New(\"failed to attempt for create a new token\")\n}", "title": "" }, { "docid": "c788d08619fc15f31eb3385e140ec45f", "score": "0.5849864", "text": "func NewTokenManager(config TokenManagerConfiguration) (TokenManager, error) {\n\ttm := &tokenManager{\n\t\tpublicKeysMap: map[string]*rsa.PublicKey{},\n\t}\n\ttm.config = config\n\n\t// Load the user account private key and add it to the manager.\n\t// Extract the public key from it and add it to the map of public keys.\n\tvar err error\n\tkey, kid := config.GetUserAccountPrivateKey()\n\tdeprecatedKey, deprecatedKid := config.GetDeprecatedUserAccountPrivateKey()\n\ttm.userAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid)\n\tif err != nil {\n\t\tlog.Error(nil, map[string]interface{}{\"err\": err}, \"unable to load user account private keys\")\n\t\treturn nil, err\n\t}\n\t// Load the service account private key and add it to the manager.\n\t// Extract the public key from it and add it to the map of public keys.\n\tkey, kid = config.GetServiceAccountPrivateKey()\n\tdeprecatedKey, deprecatedKid = config.GetDeprecatedServiceAccountPrivateKey()\n\ttm.serviceAccountPrivateKey, err = tm.loadPrivateKey(tm, key, kid, deprecatedKey, deprecatedKid)\n\tif err != nil {\n\t\tlog.Error(nil, map[string]interface{}{\"err\": err}, \"unable to load service account private keys\")\n\t\treturn nil, err\n\t}\n\n\t// Load Keycloak public key if run in dev mode.\n\tdevMode, key, kid := config.GetDevModePublicKey()\n\tif devMode {\n\t\trsaKey, err := jwt.ParseRSAPublicKeyFromPEM(key)\n\t\tif err != nil {\n\t\t\tlog.Error(nil, map[string]interface{}{\"err\": err}, \"unable to load dev mode public key\")\n\t\t\treturn nil, err\n\t\t}\n\t\ttm.publicKeysMap[kid] = rsaKey\n\t\ttm.publicKeys = append(tm.publicKeys, &token.PublicKey{KeyID: kid, Key: rsaKey})\n\t\tlog.Info(nil, map[string]interface{}{\"kid\": kid}, \"dev mode public key added\")\n\t}\n\n\t// Convert public keys to JWK format\n\tjsonWebKeys, err := tm.toJSONWebKeys(tm.publicKeys)\n\tif err != nil {\n\t\tlog.Error(nil, map[string]interface{}{\"err\": err}, \"unable to convert public keys to JSON Web Keys\")\n\t\treturn nil, errors.New(\"unable to convert public keys to JSON Web Keys\")\n\t}\n\ttm.jsonWebKeys = jsonWebKeys\n\n\t// Convert public keys to PEM format\n\tjsonKeys, err := tm.toPemKeys(tm.publicKeys)\n\tif err != nil {\n\t\tlog.Error(nil, map[string]interface{}{\"err\": err}, \"unable to convert public keys to PEM Keys\")\n\t\treturn nil, errors.New(\"unable to convert public keys to PEM Keys\")\n\t}\n\ttm.pemKeys = jsonKeys\n\n\ttm.initServiceAccountToken()\n\n\treturn tm, nil\n}", "title": "" }, { "docid": "df93c957de1cc240f28ad083fafa0bc9", "score": "0.5828529", "text": "func NewPool(tokens sdk.BigInt) Pool {\n\treturn Pool{\n\t\tTokens: tokens,\n\t}\n}", "title": "" }, { "docid": "862424efcbdc5e3b5dc6647a8759d5a0", "score": "0.5789076", "text": "func NewTokenStore(opt *dao.Options) (token.Store, error) {\n\tunprepared := map[string]string{\n\t\tSaveToken: `\n\t\t\tINSERT INTO tokens (access_token, refresh_token, grant_type, token_type, user_id, domain_id, project_id, service_id, application_id, name, scope, create_at, expire_at, description) \n\t\t\tVALUES (?,?,?,?,?,?,?,?,?,?,?,?,?,?);\n\t\t`,\n\t\tFindToken: `\n\t\t\tSELECT access_token, refresh_token, grant_type, token_type, user_id, domain_id, project_id, service_id, application_id, name, scope, create_at, expire_at, description \n\t\t\tFROM tokens \n\t\t\tWHERE access_token = ?;\n\t\t`,\n\t\tFindUserCurrentToken: `\n\t\t\tSELECT access_token, refresh_token, grant_type, token_type, user_id, domain_id, project_id, service_id, application_id, name, scope, create_at, expire_at, description \n\t\t\tFROM tokens \n\t\t\tWHERE user_id = ? \n\t\t\tAND application_id = ? \n\t\t\tAND grant_type = ? \n\t\t\tORDER BY create_at \n\t\t\tDESC \n\t\t\tLIMIT 1;\n\t\t`,\n\t\tDeleteToken: `\n\t\t\tDELETE FROM tokens \n\t\t\tWHERE access_token = ?;\n\t\t`,\n\t\tDeleteTokenByRefresh: `\n\t\t DELETE FROM tokens \n\t\t WHERE refresh_token = ?;\n\t\t`,\n\t\tFindTokenByRefresh: `\n\t\t SELECT access_token, refresh_token, grant_type, token_type, user_id, domain_id, project_id, service_id, application_id, name, scope, create_at, expire_at, description \n\t\t FROM tokens \n\t\t WHERE refresh_token = ?;\n\t\t`,\n\t\tUpdateTokenScope: `\n\t\t\tUPDATE tokens \n\t\t\tSET scope = ? \n\t\t\tWHERE access_token = ?;\n\t\t`,\n\t}\n\n\t// prepare all statements to verify syntax\n\tstmts, err := tools.PrepareStmts(opt.DB, unprepared)\n\tif err != nil {\n\t\treturn nil, exception.NewInternalServerError(\"prepare token store query statment error, %s\", err)\n\t}\n\n\ts := store{\n\t\tdb: opt.DB,\n\t\tstmts: stmts,\n\t}\n\n\treturn &s, nil\n}", "title": "" }, { "docid": "b9e8e0aba89d3da79bb3a100ef67262f", "score": "0.57521135", "text": "func New(keys map[string]string, audience string) (tm *TokenManager, err error) {\n\ttm = &TokenManager{\n\t\taudience: audience,\n\t\tverificationKeys: make(map[ksuid.KSUID]*rsa.PublicKey),\n\t}\n\n\tfor kid, path := range keys {\n\t\tvar keyID ksuid.KSUID\n\t\tif keyID, err = ksuid.Parse(kid); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not parse kid %q for path %s: %s\", kid, path, err)\n\t\t}\n\n\t\tvar data []byte\n\t\tif data, err = ioutil.ReadFile(path); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not read kid %s from %s: %s\", kid, path, err)\n\t\t}\n\n\t\tvar key *rsa.PrivateKey\n\t\tif key, err = jwt.ParseRSAPrivateKeyFromPEM(data); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not parse RSA private key kid %s from %s: %s\", kid, path, err)\n\t\t}\n\n\t\ttm.verificationKeys[keyID] = &key.PublicKey\n\n\t\tif tm.privateKey == nil || keyID.Time().After(tm.keyID.Time()) {\n\t\t\ttm.keyID = keyID\n\t\t\ttm.privateKey = key\n\t\t}\n\t}\n\n\treturn tm, nil\n}", "title": "" }, { "docid": "cdbc3f6566e5fc60e1f43070ed7d6e49", "score": "0.57124984", "text": "func LoadTokenManagers(crud *db.CRUD) {\n\tfor i, mgr := range TokenManagers {\n\t\tmgr.AccountID = Accounts[i].ID\n\n\t\t//create refresh token\n\t\trefresh, err := utils.CreateRefreshToken(Accounts[i].ID.Hex())\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Mock token_manager[%v] : %s\", i, err.Error())\n\t\t\tbreak\n\t\t}\n\t\tmgr.RefreshToken = refresh\n\n\t\t// validate before insertion\n\t\tif err := mgr.OK(); err != nil {\n\t\t\tfmt.Printf(\"Mock tokenManagers[%v] : %s\", i, err.Error())\n\t\t\tbreak\n\t\t}\n\n\t\tTokenManagers[i] = mgr\n\t\tcrud.Insert(config.TokenManagersCollection, mgr)\n\t}\n}", "title": "" }, { "docid": "f57564bff902c35db262738bc2306019", "score": "0.5660168", "text": "func DefaultManager(config TokenManagerConfiguration) (TokenManager, error) {\n\tdefaultOnce.Do(func() {\n\t\tdefaultManager, defaultErr = NewTokenManager(config)\n\t})\n\treturn defaultManager, defaultErr\n}", "title": "" }, { "docid": "bcb8169c086bec204842f6086dffa2bc", "score": "0.56247765", "text": "func (r *TokenReconciler) SetupWithManager(mgr ctrl.Manager) error {\n\n\tr.authTkn = os.Getenv(\"AUTH_TKN\")\n\n\treturn ctrl.NewControllerManagedBy(mgr).\n\t\tFor(&argoprojlabsv1.Token{}).\n\t\tWatches(&source.Kind{Type: &corev1.Secret{}},\n\t\t\t&handler.EnqueueRequestsFromMapFunc{\n\t\t\t\tToRequests: handler.ToRequestsFunc(func(a handler.MapObject) []reconcile.Request {\n\n\t\t\t\t\tctx := context.Background()\n\t\t\t\t\tvar allTkns argoprojlabsv1.TokenList\n\t\t\t\t\ttknMatches := make([]argoprojlabsv1.Token, 0)\n\n\t\t\t\t\terr := r.List(ctx, &allTkns)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn []reconcile.Request{}\n\t\t\t\t\t}\n\n\t\t\t\t\tfor _, token := range allTkns.Items {\n\t\t\t\t\t\tif a.Meta.GetName() == token.Spec.SecretRef.Name {\n\t\t\t\t\t\t\ttknMatches = append(tknMatches, token)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\trequests := make([]reconcile.Request, 0)\n\n\t\t\t\t\tfor _, token := range tknMatches {\n\t\t\t\t\t\tnamespaceName := types.NamespacedName{\n\t\t\t\t\t\t\tName: token.Name,\n\t\t\t\t\t\t\tNamespace: token.Namespace,\n\t\t\t\t\t\t}\n\t\t\t\t\t\trequests = append(requests, reconcile.Request{NamespacedName: namespaceName})\n\t\t\t\t\t}\n\n\t\t\t\t\treturn requests\n\t\t\t\t}),\n\t\t\t}).\n\t\tComplete(r)\n}", "title": "" }, { "docid": "457eaf1bd0c1808bc5bfa0d9f2e741c8", "score": "0.56107116", "text": "func NewTokenStore(ctx context.Context, logger log.Logger, core *Core, config *logical.BackendConfig) (*TokenStore, error) {\n\t// Create a sub-view\n\tview := core.systemBarrierView.SubView(tokenSubPath)\n\n\t// Initialize the store\n\tt := &TokenStore{\n\t\tactiveContext: ctx,\n\t\tcore: core,\n\t\tbatchTokenEncryptor: core.barrier,\n\t\tbaseBarrierView: view,\n\t\tidBarrierView: view.SubView(idPrefix),\n\t\taccessorBarrierView: view.SubView(accessorPrefix),\n\t\tparentBarrierView: view.SubView(parentPrefix),\n\t\trolesBarrierView: view.SubView(rolesPrefix),\n\t\tcubbyholeDestroyer: destroyCubbyhole,\n\t\tlogger: logger,\n\t\ttokenLocks: locksutil.CreateLocks(),\n\t\ttokensPendingDeletion: &sync.Map{},\n\t\tsaltLock: sync.RWMutex{},\n\t\ttidyLock: new(uint32),\n\t\tquitContext: core.activeContext,\n\t\tsalts: make(map[string]*salt.Salt),\n\t}\n\n\t// Setup the framework endpoints\n\tt.Backend = &framework.Backend{\n\t\tAuthRenew: t.authRenew,\n\n\t\tPathsSpecial: &logical.Paths{\n\t\t\tRoot: []string{\n\t\t\t\t\"revoke-orphan/*\",\n\t\t\t\t\"accessors*\",\n\t\t\t},\n\n\t\t\t// Most token store items are local since tokens are local, but a\n\t\t\t// notable exception is roles\n\t\t\tLocalStorage: []string{\n\t\t\t\tidPrefix,\n\t\t\t\taccessorPrefix,\n\t\t\t\tparentPrefix,\n\t\t\t\tsalt.DefaultLocation,\n\t\t\t},\n\t\t},\n\t\tBackendType: logical.TypeCredential,\n\t}\n\n\tt.Backend.Paths = append(t.Backend.Paths, t.paths()...)\n\n\tt.Backend.Setup(ctx, config)\n\n\treturn t, nil\n}", "title": "" }, { "docid": "80e54498fb0a26a4d2b24d7ad246717e", "score": "0.55925924", "text": "func new(minutes time.Duration, kind string) (*tokenList, error) {\n\tlist := &tokenList{\n\t\tnil,\n\t\ttime.NewTicker(time.Minute * minutes),\n\t\tmake(chan bool, 1),\n\t\tkind,\n\t}\n\n\tvar err error\n\tlist.Db, err = datastore.NewClient(context.Background(), \"boardsandwater\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlist.purger()\n\n\treturn list, nil\n}", "title": "" }, { "docid": "0d4167e9afb77299982ea152effda40b", "score": "0.55650026", "text": "func init() {\n\tReadTokens()\n}", "title": "" }, { "docid": "c962c20f330964956f7615ecd79c817a", "score": "0.55445015", "text": "func initTokenMap() {\n\tfor i := 0; i < tokenMapSize; i++ {\n\t\ttokenMap[i] = make(map[*pattern]bool)\n\t}\n}", "title": "" }, { "docid": "cd054dd5400b5afa1ab53e18ec725a5b", "score": "0.55300385", "text": "func (ta *authenticator) Init(jsonconf, name string) error {\n\tif ta.name != \"\" {\n\t\treturn errors.New(\"auth_token: already initialized as \" + ta.name + \"; \" + name)\n\t}\n\n\ttype configType struct {\n\t\t// Key for signing tokens\n\t\tKey []byte `json:\"key\"`\n\t\t// Datatabase or other serial number, to invalidate all issued tokens at once.\n\t\tSerialNum int `json:\"serial_num\"`\n\t\t// Token expiration time\n\t\tExpireIn int `json:\"expire_in\"`\n\t}\n\tvar config configType\n\tif err := json.Unmarshal([]byte(jsonconf), &config); err != nil {\n\t\treturn errors.New(\"auth_token: failed to parse config: \" + err.Error() + \"(\" + jsonconf + \")\")\n\t}\n\n\tif len(config.Key) < sha256.Size {\n\t\treturn errors.New(\"auth_token: the key is missing or too short\")\n\t}\n\tif config.ExpireIn <= 0 {\n\t\treturn errors.New(\"auth_token: invalid expiration value\")\n\t}\n\n\tta.name = name\n\tta.hmacSalt = config.Key\n\tta.lifetime = time.Duration(config.ExpireIn) * time.Second\n\tta.serialNumber = config.SerialNum\n\n\tdisabledUserIDs = &sync.Map{}\n\n\t// Load UIDs which were disabled within token lifetime.\n\tdisabled, err := store.Users.GetDisabled(time.Now().Add(-ta.lifetime))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, uid := range disabled {\n\t\tdisabledUserIDs.Store(uid, struct{}{})\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6f99866f23a5e1a47168d60d8d61058c", "score": "0.55070573", "text": "func init() {\n\tvar err error\n\ttokenizer, err = NewHashidTokenizer(&config.HashidTokenizerConfig{\n\t\tSalt: \"ecafbaf0-1bcc-11ec-9621-0242ac130002\",\n\t\tMinLength: 5,\n\t\tAlphabet: \"0123456789_abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ\",\n\t})\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n}", "title": "" }, { "docid": "902125af8b799bd5fa72ebb788331dcc", "score": "0.54656607", "text": "func initPool(ac *atmi.ATMICtx) error {\n\n\tM_freechan = make(chan int, M_workers)\n\n\tfor i := 0; i < M_workers; i++ {\n\n\t\tctx, err := atmi.NewATMICtx()\n\n\t\tif err != nil {\n\t\t\tac.TpLogError(\"Failed to create context: %s\", err.Message())\n\t\t\treturn err\n\t\t}\n\n\t\tM_ctxs = append(M_ctxs, ctx)\n\n\t\t//Submit the free ATMI context\n\t\tM_freechan <- i\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bd3bb858a1953637bfbd8d928c8eb606", "score": "0.544788", "text": "func New(m map[string]interface{}) (group.Manager, error) {\n\tc, err := parseConfig(m)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tc.init()\n\n\tredisPool := initRedisPool(c.RedisAddress, c.RedisUsername, c.RedisPassword)\n\tapiTokenManager := utils.InitAPITokenManager(c.TargetAPI, c.OIDCTokenEndpoint, c.ClientID, c.ClientSecret)\n\treturn &manager{\n\t\tconf: c,\n\t\tredisPool: redisPool,\n\t\tapiTokenManager: apiTokenManager,\n\t}, nil\n}", "title": "" }, { "docid": "0a155d5237f658ed79d3e69c5b6c2c12", "score": "0.54255354", "text": "func newTokenGraph(tokenID *chainhash.Hash) *tokenGraph {\n\treturn &tokenGraph{\n\t\tgraph: make(map[chainhash.Hash]*wire.MsgTx),\n\t\tTokenID: tokenID,\n\t}\n}", "title": "" }, { "docid": "17959e4f2c6fe186b1199fa51bf82b5b", "score": "0.5421531", "text": "func (p *fileTokenProvider) Run() error {\n\tp.logger.Info(\"Generating Vault tokens\")\n\n\tprivilegedToken, err := p.tokenProvider.Load(p.tokenConfig.PrivilegedTokenPath)\n\tif err != nil {\n\t\tp.logger.Errorf(\"failed to read privileged access token: %s\", err.Error())\n\t\treturn err\n\t}\n\n\ttokenConfEnv, err := GetTokenConfigFromEnv()\n\tif err != nil {\n\t\tp.logger.Errorf(\"failed to get token config from environment variable %s with error: %s\", addSecretstoreTokensEnvKey, err.Error())\n\t\treturn err\n\t}\n\n\tvar tokenConf TokenConfFile\n\tif err := LoadTokenConfig(p.fileOpener, p.tokenConfig.ConfigFile, &tokenConf); err != nil {\n\t\tp.logger.Errorf(\"failed to read token configuration file %s: %s\", p.tokenConfig.ConfigFile, err.Error())\n\t\treturn err\n\t}\n\n\t// merge the additional token configuration list from environment variable\n\t// note that the configuration file takes precedence, as the tokenConf will override\n\t// the tokenConfEnv with same duplicate keys\n\t// The tokenConfEnv only uses default settings.\n\ttokenConf = tokenConfEnv.mergeWith(tokenConf)\n\n\tfor serviceName, serviceConfig := range tokenConf {\n\t\tp.logger.Infof(\"generating policy/token defaults for service %s\", serviceName)\n\n\t\tservicePolicy := make(map[string]interface{})\n\t\tcreateTokenParameters := make(map[string]interface{})\n\n\t\tif serviceConfig.UseDefaults {\n\t\t\tp.logger.Infof(\"using policy/token defaults for service %s\", serviceName)\n\t\t\tservicePolicy = makeDefaultTokenPolicy(serviceName)\n\t\t\tdefaultPolicyPaths := servicePolicy[\"path\"].(map[string]interface{})\n\t\t\tfor pathKey, policy := range defaultPolicyPaths {\n\t\t\t\tservicePolicy[\"path\"].(map[string]interface{})[pathKey] = policy\n\t\t\t}\n\t\t\tcreateTokenParameters = makeDefaultTokenParameters(serviceName, p.tokenConfig.DefaultTokenTTL, p.tokenConfig.DefaultTokenTTL)\n\t\t}\n\n\t\tif serviceConfig.CustomPolicy != nil {\n\t\t\tcustomPolicy := serviceConfig.CustomPolicy\n\t\t\tif customPolicy[\"path\"] != nil {\n\t\t\t\tcustomPaths := customPolicy[\"path\"].(map[string]interface{})\n\t\t\t\tif servicePolicy[\"path\"] == nil {\n\t\t\t\t\tservicePolicy[\"path\"] = make(map[string]interface{})\n\t\t\t\t}\n\t\t\t\tfor k, v := range customPaths {\n\t\t\t\t\t(servicePolicy[\"path\"]).(map[string]interface{})[k] = v\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif serviceConfig.CustomTokenParameters != nil {\n\t\t\t// Custom token parameters override the defaults\n\t\t\tcreateTokenParameters = mergeMaps(createTokenParameters, serviceConfig.CustomTokenParameters)\n\t\t}\n\n\t\t// Set a meta property that consuming serices can use to automatically scope secret queries\n\t\tcreateTokenParameters[\"meta\"] = map[string]interface{}{\n\t\t\t\"edgex-service-name\": serviceName,\n\t\t}\n\n\t\t// Always create a policy with this name\n\t\tpolicyName := \"edgex-service-\" + serviceName\n\n\t\tpolicyBytes, err := json.Marshal(servicePolicy)\n\t\tif err != nil {\n\t\t\tp.logger.Errorf(\"failed encode service policy for %s: %s\", serviceName, err.Error())\n\t\t\treturn err\n\t\t}\n\n\t\tif err := p.secretStoreClient.InstallPolicy(privilegedToken, policyName, string(policyBytes)); err != nil {\n\t\t\tp.logger.Errorf(\"failed to install policy %s: %s\", policyName, err.Error())\n\t\t\treturn err\n\t\t}\n\n\t\tvar createTokenResponse interface{}\n\n\t\tif createTokenResponse, err = p.secretStoreClient.CreateToken(privilegedToken, createTokenParameters); err != nil {\n\t\t\tp.logger.Errorf(\"failed to create vault token for service %s: %s\", serviceName, err.Error())\n\t\t\treturn err\n\t\t}\n\n\t\toutputTokenDir := filepath.Join(p.tokenConfig.OutputDir, serviceName)\n\t\toutputTokenFilename := filepath.Join(outputTokenDir, p.tokenConfig.OutputFilename)\n\t\tif err := p.fileOpener.MkdirAll(outputTokenDir, os.FileMode(0700)); err != nil {\n\t\t\tp.logger.Errorf(\"failed to create base directory path(s) %s: %s\", outputTokenDir, err.Error())\n\t\t\treturn err\n\t\t}\n\n\t\tp.logger.Infof(\"creating token file %s\", outputTokenFilename)\n\t\twriteCloser, err := p.fileOpener.OpenFileWriter(outputTokenFilename, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, os.FileMode(0600))\n\t\tif err != nil {\n\t\t\tp.logger.Errorf(\"failed open token file for writing %s: %s\", outputTokenFilename, err.Error())\n\t\t\treturn err\n\t\t}\n\t\t// writeCloser is writable file -- explicitly close() to ensure we catch errors writing to it\n\n\t\tpermissionable, ok := writeCloser.(permissionable)\n\t\tif ok {\n\t\t\tif serviceConfig.FilePermissions != nil &&\n\t\t\t\t(serviceConfig.FilePermissions).ModeOctal != nil {\n\t\t\t\tmode, err := strconv.ParseInt(*(serviceConfig.FilePermissions).ModeOctal, 8, 32)\n\t\t\t\tif err != nil {\n\t\t\t\t\t_ = writeCloser.Close()\n\t\t\t\t\tp.logger.Errorf(\"invalid file mode %s: %s\", *(serviceConfig.FilePermissions).ModeOctal, err.Error())\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tif err := permissionable.Chmod(os.FileMode(mode)); err != nil {\n\t\t\t\t\t_ = writeCloser.Close()\n\t\t\t\t\tp.logger.Errorf(\"failed to set file mode on %s: %s\", outputTokenFilename, err.Error())\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t\tif serviceConfig.FilePermissions != nil &&\n\t\t\t\t(serviceConfig.FilePermissions).Uid != nil &&\n\t\t\t\t(serviceConfig.FilePermissions).Gid != nil {\n\t\t\t\terr := permissionable.Chown(*(serviceConfig.FilePermissions).Uid, *(serviceConfig.FilePermissions).Gid)\n\t\t\t\tif err != nil {\n\t\t\t\t\t_ = writeCloser.Close()\n\t\t\t\t\tp.logger.Errorf(\"failed to set file user/group on %s: %s\", outputTokenFilename, err.Error())\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Write resulting token\n\t\tif err := json.NewEncoder(writeCloser).Encode(createTokenResponse); err != nil {\n\t\t\t_ = writeCloser.Close()\n\t\t\tp.logger.Errorf(\"failed to write token file: %s\", err.Error())\n\t\t\treturn err\n\t\t}\n\n\t\tif err := writeCloser.Close(); err != nil {\n\t\t\tp.logger.Errorf(\"failed to close %s: %s\", outputTokenFilename, err.Error())\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b75fc03b5c8d26f528185b473afd2d15", "score": "0.5380238", "text": "func (lp *Lex) NewTokens(offset int, tokens ...int) {\n\tfor _, token := range tokens {\n\t\tlp.Tokens = append(lp.Tokens, Token{Type: int32(token), Offset: offset, Length: 1})\n\t}\n}", "title": "" }, { "docid": "6e52491bb307e7f6425adee0d13ee82c", "score": "0.53475446", "text": "func NewManager() *Manager {\n\tret := new(Manager)\n\tret.ks = new(tinkpb.Keyset)\n\treturn ret\n}", "title": "" }, { "docid": "a727e56bea403d047658c027ecbac818", "score": "0.532498", "text": "func newParserFromTokens(t []token) *parser {\n\treturn &parser{l: &tokens{t: t}, peekQueue: newQueue(2)}\n}", "title": "" }, { "docid": "f368823ef41314998bd650a89d8fa430", "score": "0.5289109", "text": "func newContextManager(label string) *contextManager {\n\tc := &contextManager{\n\t\tlabel: label,\n\t\tcontextIDToAbstractSyntaxNameMap: make(map[byte]*contextManagerEntry),\n\t\tabstractSyntaxNameToContextIDMap: make(map[string]*contextManagerEntry),\n\t\tpeerMaxPDUSize: 16384, // The default value used by Osirix & pynetdicom.\n\t\ttmpRequests: make(map[byte]*pdu.PresentationContextItem),\n\t}\n\treturn c\n}", "title": "" }, { "docid": "7e98542e0f52b6e527bdf108cd0a3bb0", "score": "0.5286261", "text": "func (token *Token) InitToken(lastLId uint32) {\n\ttoken.LastLId = lastLId\n}", "title": "" }, { "docid": "7b5445215d61fd4121f1f7643d63cb88", "score": "0.52836096", "text": "func New() token {\n\treturn token{}\n}", "title": "" }, { "docid": "c18f19a338636f784a826bb6772e4b1b", "score": "0.5246615", "text": "func NewTokenTicker(tokens, maxTokens int64) *TokenTicker {\n\treturn &TokenTicker{\n\t\ttokens: *atomic.NewInt64(tokens),\n\t\tmaxTokens: maxTokens,\n\t}\n}", "title": "" }, { "docid": "f87e89651913239eb46bf6915c197479", "score": "0.5212867", "text": "func NewManager(modules ...AppModule) *Manager {\n\tmoduleMap := make(map[string]interface{})\n\tmodulesStr := make([]string, 0, len(modules))\n\tfor _, module := range modules {\n\t\tmoduleMap[module.Name()] = module\n\t\tmodulesStr = append(modulesStr, module.Name())\n\t}\n\n\treturn &Manager{\n\t\tModules: moduleMap,\n\t\tOrderInitGenesis: modulesStr,\n\t\tOrderExportGenesis: modulesStr,\n\t\tOrderBeginBlockers: modulesStr,\n\t\tOrderPrepareCheckStaters: modulesStr,\n\t\tOrderPrecommiters: modulesStr,\n\t\tOrderEndBlockers: modulesStr,\n\t}\n}", "title": "" }, { "docid": "b4537f8ae93900eecc7204bf7761726c", "score": "0.5188301", "text": "func setupTokenGenerator(serverName string, serverHome string) (*jwx.Generator, error) {\n\tkeyPEM, err := ioutil.ReadFile(filepath.Clean(filepath.Join(serverHome, \"root-ca.pem\")))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tkey, err := jwx.NewGeneratorKey(\"master\", jwx.KeyTypeEC, keyPEM)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn jwx.NewGenerator(serverName, *key)\n}", "title": "" }, { "docid": "d901fb123f8ee26cdacb509a15d8e190", "score": "0.5181214", "text": "func bindTokenManager(address common.Address, caller bind.ContractCaller, transactor bind.ContractTransactor, filterer bind.ContractFilterer) (*bind.BoundContract, error) {\n\tparsed, err := abi.JSON(strings.NewReader(TokenManagerABI))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn bind.NewBoundContract(address, parsed, caller, transactor, filterer), nil\n}", "title": "" }, { "docid": "b957496090af4b91ab24d765882eb528", "score": "0.5165343", "text": "func NewManager(providerAPIToken string) (core.VMManager, error) {\n\n\tmanager := new(Manager)\n\n\t// make sure we have an api token\n\tif len(providerAPIToken) == 0 {\n\t\t// check places provider CLI tools store token\n\t\tproviderAPIToken := manager.FindAuthToken()\n\t\tif len(providerAPIToken) == 0 {\n\t\t\t// log.Error(\"no linode api token set\")\n\t\t\treturn manager, errors.New(\"no linode api token set\")\n\t\t}\n\t\t// ok we found a token\n\t}\n\n\tmanager.APIToken = providerAPIToken\n\ttokenSource := oauth2.StaticTokenSource(&oauth2.Token{AccessToken: manager.APIToken})\n\n\toauth2Client := &http.Client{\n\t\tTransport: &oauth2.Transport{\n\t\t\tSource: tokenSource,\n\t\t},\n\t}\n\n\tmanager.api = linodego.NewClient(oauth2Client)\n\n\treturn manager, nil\n}", "title": "" }, { "docid": "856f014c56274bc154db6875d09753f4", "score": "0.51650435", "text": "func init() {\n\trechargeObject = new(RechargeTokens) // Creating the object for first time so we don't get nil pointer\n\t// execption when we're accessing flag variable in New() function.\n\t_ = rechargeObject.New() // Initializing 100Rs everytime program restarts.\n}", "title": "" }, { "docid": "44589d485bd4e361451d23057e6b815c", "score": "0.5153478", "text": "func NewTokensAPI(ctx context.Context, m any) TokensAPI {\n\treturn TokensAPI{m.(*common.DatabricksClient), ctx}\n}", "title": "" }, { "docid": "402f758a7819aa7885bc5faeaf598471", "score": "0.5148142", "text": "func init() {\n\tAppToken = lygo_rnd.Uuid()\n}", "title": "" }, { "docid": "2e4d59095590d59b14c787dfd4510a43", "score": "0.51473624", "text": "func New() *Mgr { return &Mgr{} }", "title": "" }, { "docid": "a0fa9b210c5a019a824d55c21f493988", "score": "0.51224595", "text": "func NewManager(l Logger) *Manager {\n\tm := &Manager{\n\t\tloggers: make(map[string]*managedLogger),\n\t}\n\n\tnewLogger := &managedLogger{Manager: m, Logger: l}\n\tm.loggers[\"\"] = newLogger\n\treturn m\n}", "title": "" }, { "docid": "a3c97db37782735c0efba8d2ec82160b", "score": "0.51207525", "text": "func setup(CONF *config.Config) {\n\tctx := context.Background()\n\tHost = CONF.Host\n\tPort = CONF.Port\n\tadminPort := CONF.AdminPort\n\n\t// Flush redis DB\n\tfor _, poolConf := range CONF.Pool {\n\t\tconn := helper.NewRedisClient(&poolConf, nil)\n\t\terr := conn.Ping(ctx).Err()\n\t\tif err != nil {\n\t\t\tpanic(fmt.Sprintf(\"Failed to ping: %s\", err))\n\t\t}\n\t\terr = conn.FlushDB(ctx).Err()\n\t\tif err != nil {\n\t\t\tpanic(fmt.Sprintf(\"Failed to flush db: %s\", err))\n\t\t}\n\t}\n\n\t// Create the token first\n\treq, err := http.NewRequest(http.MethodPost, fmt.Sprintf(\"http://127.0.0.1:%d/token/%s?description=client\", adminPort, Namespace), nil)\n\tif err != nil {\n\t\tpanic(\"Failed to create testing token\")\n\t}\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\tpanic(\"Failed to create testing token\")\n\t}\n\tif resp.StatusCode != http.StatusCreated {\n\t\tpanic(\"Failed to create testing token\")\n\t}\n\trespBytes, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tpanic(\"Failed to create testing token\")\n\t}\n\tvar respData struct {\n\t\tToken string `json:\"token\"`\n\t}\n\terr = json.Unmarshal(respBytes, &respData)\n\tif err != nil {\n\t\tpanic(\"Failed to create testing token\")\n\t}\n\tToken = respData.Token\n}", "title": "" }, { "docid": "7309e1ce0ba967eb077e83738786b31d", "score": "0.51177925", "text": "func New(tokens map[string]user.User) *TokenAuthenticator {\n\treturn &TokenAuthenticator{\n\t\ttokens: tokens,\n\t}\n}", "title": "" }, { "docid": "5d24958c3d8132bf27b2a5aac1f38627", "score": "0.51053995", "text": "func (t *GroupTokenBucket) init(now time.Time) {\n\tif t.Settings.FillRate == 0 {\n\t\tt.Settings.FillRate = defaultRefillRate\n\t}\n\tif t.Tokens < defaultInitialTokens {\n\t\tt.Tokens = defaultInitialTokens\n\t}\n\tt.LastUpdate = &now\n\tt.Initialized = true\n}", "title": "" }, { "docid": "29931097a2217acfead7875b6539295d", "score": "0.51025134", "text": "func newTokenReviews(c *AuthenticationClient) *tokenReviews {\n\treturn &tokenReviews{\n\t\tclient: c,\n\t}\n}", "title": "" }, { "docid": "d3b34d35e117abfeff0df149c5e22952", "score": "0.5092525", "text": "func (s HackSessionContext_obsoleteListApiTokens_Results) NewTokens(n int32) (HackSessionContext_TokenInfo_List, error) {\n\tl, err := NewHackSessionContext_TokenInfo_List(capnp.Struct(s).Segment(), n)\n\tif err != nil {\n\t\treturn HackSessionContext_TokenInfo_List{}, err\n\t}\n\terr = capnp.Struct(s).SetPtr(0, l.ToPtr())\n\treturn l, err\n}", "title": "" }, { "docid": "4b4e5b99fd20e90d22314d7472815594", "score": "0.50925136", "text": "func init() {\n\tfile, err := os.Open(\".tokens\")\n\tif err != nil {\n\t\tfmt.Printf(\"Cannot read .tokens file: %v\\n\", err)\n\t\treturn\n\t}\n\tdefer file.Close()\n\n\tscanner := bufio.NewScanner(bufio.NewReader(file))\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\n\t\tif strings.HasPrefix(line, \"#\") {\n\t\t\tcontinue\n\t\t}\n\n\t\tvalues := strings.Split(line, \"=\")\n\t\ttokens[values[0]] = values[1]\n\t}\n}", "title": "" }, { "docid": "3a322985542a137d4c99aefd84d61b03", "score": "0.5090248", "text": "func NewPoolManager(t mockConstructorTestingTNewPoolManager) *PoolManager {\n\tmock := &PoolManager{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "e8d75e952670383ee14de0535172d01b", "score": "0.50849277", "text": "func NewManager(superctx context.Context, wg *sync.WaitGroup) *Manager {\n\tctx, cancel := context.WithCancel(superctx)\n\tif wg == nil {\n\t\twg = &sync.WaitGroup{}\n\t}\n\tmnger := &Manager{\n\t\tCancel: cancel,\n\t\tCtx: ctx,\n\t\tWG: wg,\n\t\tInterupt: make(chan os.Signal),\n\t\tdoneC: make(chan struct{}, 1),\n\t\t// LogFile: json.NewEncoder(f),\n\t}\n\treturn mnger\n}", "title": "" }, { "docid": "753d5b8b876fcfd4d006424e0f73dac3", "score": "0.50834745", "text": "func (ap ApiToken) NewToken(owner string, level string) (status bool, token string) {\n\tap.owner = owner\n\tap.level = level\n\tap.token = uuid.New()\n\tap.requests = 0\n\t// insert it into database here\n\t// check for errors\n\t// if err {\n\t// \t\treturn (false, message)\n\t// } else {\n\t// \t\treturn (true, token)\n\t// }\n\ttoken = ap.token\n\tstatus = true\n\treturn\n}", "title": "" }, { "docid": "0fc1527c2efa07a716150f27663b2019", "score": "0.50729907", "text": "func (this *managerStruct) CreateToken(token []byte) Token {\n\tbuf := [LENGTH]byte{}\n\tcopy(buf[:], token)\n\n\t/*\n\t * Create session token.\n\t */\n\tt := tokenStruct{\n\t\ttoken: buf,\n\t}\n\n\treturn &t\n}", "title": "" }, { "docid": "849c7da59a9dbe23e009757a431069b0", "score": "0.5072125", "text": "func (store MemoryStore) New() (*string, error) {\n\tvar raw [rawTokenSize]byte\n\n\tfor i := 0; i < maxAttempts; i++ {\n\t\tif _, err := rand.Read(raw[:]); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Could not generate token: %s\\n\", err.Error())\n\t\t}\n\n\t\ttoken := fmt.Sprintf(\"%X\", raw)\n\t\tif _, exists := store[token]; !exists {\n\t\t\tstore[token] = true\n\t\t\treturn &token, nil\n\t\t}\n\t}\n\n\treturn nil, fmt.Errorf(\"Could not generate token after %d attempts.\\n\", maxAttempts)\n}", "title": "" }, { "docid": "826e63a74abe59fa5756c23fc1fe85ff", "score": "0.5064727", "text": "func CreateTokenManagerPlugin(trustDomain, gcpProjectNumber, gkeClusterURL string, enableCache bool) (*Plugin, error) {\n\tcaCertPool, err := x509.SystemCertPool()\n\tif err != nil {\n\t\tpluginLog.Errorf(\"Failed to get SystemCertPool: %v\", err)\n\t\treturn nil, err\n\t}\n\tp := &Plugin{\n\t\thttpClient: &http.Client{\n\t\t\tTimeout: httpTimeOutInSec * time.Second,\n\t\t\tTransport: &http.Transport{\n\t\t\t\tTLSClientConfig: &tls.Config{\n\t\t\t\t\tRootCAs: caCertPool,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\ttrustDomain: trustDomain,\n\t\tgcpProjectNumber: gcpProjectNumber,\n\t\tgkeClusterURL: gkeClusterURL,\n\t\tenableCache: enableCache,\n\t}\n\treturn p, nil\n}", "title": "" }, { "docid": "f3eeb1ffa14afbd05f3d6bc1bc5200fc", "score": "0.50553185", "text": "func New(name string, initialState StateFn, input string) *Tokenizer {\n\tt := &Tokenizer{\n\t\tname: name,\n\t\tinput: input,\n\t\ttokens: make(chan Token),\n\t\tstate: initialState,\n\t}\n\n\tgo t.run()\n\treturn t\n}", "title": "" }, { "docid": "2037b6c2ce980b021466bda6a51f1cd4", "score": "0.5054907", "text": "func TestTokenGeneration(t *testing.T) {\n\tt.Run(\"Generate one time token for Runtime\", func(t *testing.T) {\n\t\t//GIVEN\n\t\tctx := context.TODO()\n\t\truntime := registerRuntime(t, ctx, \"test\")\n\t\tdefer unregisterRuntime(t, runtime.ID)\n\t\ttokenRequestNumber := 3\n\n\t\t//WHEN\n\t\tfor i := 0; i < tokenRequestNumber; i++ {\n\t\t\ttoken := requestOneTimeTokenForRuntime(t, ctx, runtime.ID)\n\t\t\tassert.NotEmpty(t, token.Token)\n\t\t\tassert.NotEmpty(t, token.ConnectorURL)\n\t\t}\n\t\t//THEN\n\t\truntimeExt := getRuntime(t, ctx, runtime.ID)\n\t\tassert.Len(t, runtimeExt.Auths, tokenRequestNumber)\n\t})\n\n\tt.Run(\"Generate one time token for Application\", func(t *testing.T) {\n\t\t//GIVEN\n\t\tctx := context.TODO()\n\t\tapp := registerApplication(t, ctx, \"test\")\n\t\tdefer unregisterApplication(t, app.ID)\n\t\ttokenRequestNumber := 3\n\n\t\t//WHEN\n\t\tfor i := 0; i < tokenRequestNumber; i++ {\n\t\t\ttoken := requestOneTimeTokenForApplication(t, ctx, app.ID)\n\t\t\tassert.NotEmpty(t, token.Token)\n\t\t\tassert.NotEmpty(t, token.ConnectorURL)\n\t\t\tassert.NotEmpty(t, token.LegacyConnectorURL)\n\t\t}\n\n\t\t//THEN\n\t\tappExt := getApplication(t, ctx, app.ID)\n\t\tassert.Len(t, appExt.Auths, tokenRequestNumber)\n\t})\n}", "title": "" }, { "docid": "9e347a3b9e118fdf6dc9941f44f3b346", "score": "0.5041274", "text": "func NewManager(n *snet.Network, config *ManagerConfig) (*Manager, error) {\n\tnets := make(map[string]struct{})\n\tfor _, netType := range n.TransportNetworks() {\n\t\tnets[netType] = struct{}{}\n\t}\n\ttm := &Manager{\n\t\tLogger: logging.MustGetLogger(\"tp_manager\"),\n\t\tconf: config,\n\t\tnets: nets,\n\t\ttps: make(map[uuid.UUID]*ManagedTransport),\n\t\tn: n,\n\t\treadCh: make(chan routing.Packet, 20),\n\t\tdone: make(chan struct{}),\n\t}\n\treturn tm, nil\n}", "title": "" }, { "docid": "ccb5e5528e3bb7dc581eef8d1cf70080", "score": "0.5032054", "text": "func newTagMgr(ctx context.Context, c *govmomi.Client) *tags.Manager {\n\treturn tags.NewManager(newVapiRestClient(ctx, c))\n}", "title": "" }, { "docid": "87e63c1b7e23db19af1995ccf0ce4177", "score": "0.5029387", "text": "func newKeyManager() *keyManager {\n\treturn &keyManager{\n\t\tcache: newCache(time.Hour * 10),\n\t\tclient: &http.Client{},\n\t}\n}", "title": "" }, { "docid": "bff55c8280437ac8b76f809a97434aa2", "score": "0.5025033", "text": "func New(configInfo *Config, store *Store) *Manager {\n\tif store == nil && configInfo != nil && configInfo.Store != nil {\n\t\tstore = NewStoreWithConfig(configInfo.Store)\n\t}\n\n\tif store == nil {\n\t\tfmt.Println(\"pool.New: using the default Store...\")\n\t\tstore = NewStore(nil)\n\t}\n\tpool := Manager{\n\t\tstore: store,\n\t\tpoolBlockSize: defaultPoolBlockSize,\n\t\tstartRange: defaultStartRange,\n\t\tendRange: defaultEndRange,\n\t}\n\n\tif configInfo != nil {\n\t\tif configInfo.StartRange != \"\" {\n\t\t\tpool.startRange = configInfo.StartRange\n\t\t}\n\n\t\tif configInfo.EndRange == \"\" {\n\t\t\tpool.endRange = configInfo.EndRange\n\t\t}\n\n\t\tif configInfo.PoolBlockSize == 0 {\n\t\t\tpool.poolBlockSize = configInfo.PoolBlockSize\n\t\t}\n\t}\n\n\tfmt.Printf(\"pool.New: manager => %+v\\n\", pool)\n\n\tpool.init()\n\treturn &pool\n}", "title": "" }, { "docid": "008357951ade231d067b569834a11152", "score": "0.50143206", "text": "func NewManager() *Manager {\n\tm := &Manager{}\n\tm.KillChan = make(chan struct{})\n\tm.Providers = make(map[string]provider.Provider)\n\tm.allWorkers = make(map[uint64]worker.Worker)\n\tm.readyWorkers = make(map[string]chan worker.Worker)\n\tm.currentWorkers = make(map[string]int)\n\tm.statsServer = http.NewServeMux()\n\treturn m\n}", "title": "" }, { "docid": "958e467b2256d49eda503601cf995aa0", "score": "0.50050247", "text": "func newManagerClient(config *config_benchmark.ZPDBenchmarkConfig, ID int) *ManagerClient {\n\tmanager := &ManagerClient{\n\t\thost: config.ZPDService[ID].Host,\n\t\tpoolSize: config.Bridge.PoolSize,\n\t\ttimeOut: config.Bridge.TimeOut,\n\t}\n\n\tp, err := grpcpool.New(manager.NewFactoryClient, manager.poolSize, manager.poolSize, time.Duration(manager.timeOut)*time.Second)\n\tif err != nil {\n\t\tlog.Fatal(\"Do not init connection pool\")\n\t}\n\n\tmanager.pool = p\n\n\treturn manager\n}", "title": "" }, { "docid": "b727f50773b540291330fd895e73b94d", "score": "0.49992722", "text": "func init() {\n\tglobalSessions, _ = session.NewManager(\"memory\", \"gosessionid\", 3600)\n\tgo globalSessions.GC()\n}", "title": "" }, { "docid": "e8f7c51d64a9d193d4acbbb40cd6c7d3", "score": "0.49970683", "text": "func NewManager() Manager {\n\treturn Manager{}\n}", "title": "" }, { "docid": "c885c8bc1ef8db5ef42fd12acc2e69e7", "score": "0.4994172", "text": "func NewManager(self string, start int64, alpha int64, in <-chan Packet, out chan<- Packet, ops chan<- store.Op, propSeqns chan<- int64, props <-chan *Prop, w <-chan store.Event, fillDelay int64, st *store.Store) Manager {\n\truns := make(chan *run)\n\tt := run{\n\t\tself: self,\n\t\tout: out,\n\t\tops: ops,\n\t\tbound: initialWaitBound,\n\t}\n\tgo generateRuns(alpha, w, runs, t)\n\treturn newManager(self, start, propSeqns, in, runs, props, time.Tick(10e6), fillDelay, st, out)\n}", "title": "" }, { "docid": "2abb35f7c4e0b29c1cbc24aedd6c1453", "score": "0.49924585", "text": "func newCertManagers(c *OperatorV1alpha1Client) *certManagers {\n\treturn &certManagers{\n\t\tclient: c.RESTClient(),\n\t}\n}", "title": "" }, { "docid": "9d16ac4e97d202f42f753dc58a3371fe", "score": "0.4990497", "text": "func NewManager(cfg Config) (m *Manager, err error) {\n\tm = &Manager{\n\t\tcfg: cfg,\n\t\tsessions: newSyncMap(cfg.MaxSessions),\n\t\tchecker: mqtt.NewTopicChecker(cfg.SysTopics),\n\t\texch: exchange.NewExchange(cfg.SysTopics),\n\t\tauth: NewAuthenticator(cfg.Principals),\n\t\tlog: log.With(log.Any(\"session\", \"manager\")),\n\t}\n\tm.sstore, err = NewBackend(cfg)\n\tif err != nil {\n\t\tm.Close()\n\t\treturn\n\t}\n\tm.mstore, err = m.sstore.NewRetainBackend()\n\tif err != nil {\n\t\tm.Close()\n\t\treturn\n\t}\n\t// load stored sessions from backend database\n\tss, err := m.sstore.List()\n\tif err != nil {\n\t\tm.Close()\n\t\treturn\n\t}\n\tfor _, i := range ss {\n\t\tsi := i.(*Info)\n\t\tm.checkSubscriptions(si)\n\t\t_, _, err = m.initSession(*si)\n\t\tif err != nil {\n\t\t\tm.Close()\n\t\t\treturn\n\t\t}\n\t}\n\tm.log.Info(\"session manager has initialized\")\n\treturn m, nil\n}", "title": "" }, { "docid": "855c09240d4be08ee9125afc71505cab", "score": "0.49834388", "text": "func NewManager(key []byte, c connection.Connection) (*Manager, error) {\n\t//c.Open()\n\tm := new(Manager)\n\tm.c = c\n\tm.key = key\n\tm.mode = 1\n\taead, err := chacha20poly1305.NewX(m.key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tm.aead = aead\n\treturn m, nil\n}", "title": "" }, { "docid": "d0629a65db1693108d7ed9f0dc89dee4", "score": "0.4982404", "text": "func NewManager() Manager {\n\tengine := gin.Default()\n\tengine.Use(CORSMiddleware())\n\tm := Manager{\n\t\tEngine: engine,\n\t}\n\treturn m\n}", "title": "" }, { "docid": "0443ac1476de893a7dc1e1dcd4c87a13", "score": "0.49820983", "text": "func (_Token *TokenSession) Initialize(_token0 common.Address, _token1 common.Address) (*types.Transaction, error) {\n\treturn _Token.Contract.Initialize(&_Token.TransactOpts, _token0, _token1)\n}", "title": "" }, { "docid": "f995c6e5f5d8997435484adc037ed234", "score": "0.49769828", "text": "func newMockTokenAccessor(tokens []string) *mockTokenAccessor {\n\treturn &mockTokenAccessor{\n\t\ttokens: tokens,\n\t}\n}", "title": "" }, { "docid": "2ca2b0f7baed1b6552c4ea84a4d92f21", "score": "0.4976948", "text": "func NewTargetManager(m *modes.Modes) *TargetManager {\n ret := &TargetManager{ targets: nil, targetCmds: nil, modes: m }\n //clog.Debug(\"Adding internal mode target...\")\n //ret.Add(\"mode\", \"mode\", nil)\n ret.Stop()\n return ret\n}", "title": "" }, { "docid": "5e2da72dda24ae3fb0c31a7bc9580925", "score": "0.49656853", "text": "func NewManager(root string, debug bool) (pkg.IdentityManager, error) {\n\tst, err := NewStore(root, !debug)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to create key store\")\n\t}\n\tlog.Info().Str(\"kind\", st.Kind()).Msg(\"key store loaded\")\n\tkey, err := st.Get()\n\tvar pair KeyPair\n\tif errors.Is(err, store.ErrKeyDoesNotExist) {\n\t\tpair, err = GenerateKeyPair()\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to generate key pair\")\n\t\t}\n\t\tif err := st.Set(pair.PrivateKey); err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to persist key seed\")\n\t\t}\n\t} else if err != nil {\n\t\tlog.Error().Err(err).Msg(\"failed to load key. to recover the key data will be deleted and regenerated\")\n\t\tif err := st.Annihilate(); err != nil {\n\t\t\tlog.Error().Err(err).Msg(\"failed to clean up key store\")\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"failed to load seed\")\n\t} else {\n\t\tpair = KeyPairFromKey(key)\n\t}\n\n\tsub, err := environment.GetSubstrate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tenv, err := environment.Get()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &identityManager{\n\t\tkind: st.Kind(),\n\t\tkey: pair,\n\t\tsub: sub,\n\t\tenv: env,\n\t}, nil\n}", "title": "" }, { "docid": "4a3af6c9c8fc079b9773462849f1d032", "score": "0.49643773", "text": "func NewTokenMaker(config Config) (*TokenMaker, error) {\n\t// Get db connection\n\tdb, err := db.GetDb()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error getting database connection: %s\", err.Error())\n\t}\n\n\t// Get config\n\tconfig, err := config.GetConfig()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error getting configuration: %s\", err.Error())\n\t}\n\n\treturn DefaultTokenMaker{\n\t\tdb: db,\n\t\tconfig: config,\n\t}, nil\n}", "title": "" }, { "docid": "8c1d6327a47d6b6f7445410791907fe9", "score": "0.49637142", "text": "func NewManager(\n\tnextHandler http.Handler,\n\tdynamicJWKSProvider jwks.DynamicJWKSProvider,\n\tupstreamIDPs oidc.UpstreamIdentityProvidersLister,\n\tsecretCache *secret.Cache,\n\tsecretsClient corev1client.SecretInterface,\n\toidcClientsClient v1alpha1.OIDCClientInterface,\n) *Manager {\n\treturn &Manager{\n\t\tproviderHandlers: make(map[string]http.Handler),\n\t\tnextHandler: nextHandler,\n\t\tdynamicJWKSProvider: dynamicJWKSProvider,\n\t\tupstreamIDPs: upstreamIDPs,\n\t\tsecretCache: secretCache,\n\t\tsecretsClient: secretsClient,\n\t\toidcClientsClient: oidcClientsClient,\n\t}\n}", "title": "" }, { "docid": "2f43da327dbfc6e4626da0a7eaac4a84", "score": "0.49587008", "text": "func NewTokenGenerator() *tokenGenerator {\n\tclient := httpclient.NewHttpClient(\"\")\n\ttokenGenerator := newTokenGenerator(client)\n\treturn tokenGenerator\n}", "title": "" }, { "docid": "67ddaca7a543f6548d6cd7e33828b91e", "score": "0.49565122", "text": "func NewManager() (manager *Manager) {\n\tmanager = &Manager{\n\t\trunning: map[string]*Running{},\n\t\tlocker: sync.RWMutex{},\n\t}\n\treturn\n}", "title": "" }, { "docid": "90ef4e8462bcbc626d99b8019a24df0c", "score": "0.49440745", "text": "func newLockedPasspharseSecretsManager(state json.RawMessage) secrets.Manager {\n\treturn &localSecretsManager{\n\t\tstate: state,\n\t\tcrypter: &errorCrypter{},\n\t}\n}", "title": "" }, { "docid": "31721d791491b64511dd83b6127c23dc", "score": "0.49432778", "text": "func NewManager(nextHandler http.Handler, dynamicJWKSProvider jwks.DynamicJWKSProvider) *Manager {\n\treturn &Manager{\n\t\tproviderHandlers: make(map[string]http.Handler),\n\t\tnextHandler: nextHandler,\n\t\tdynamicJWKSProvider: dynamicJWKSProvider,\n\t}\n}", "title": "" }, { "docid": "74a4bf7e5a33624eca532887ef9f8436", "score": "0.49372432", "text": "func (_Token *TokenTransactor) Initialize(opts *bind.TransactOpts, _token0 common.Address, _token1 common.Address) (*types.Transaction, error) {\n\treturn _Token.contract.Transact(opts, \"initialize\", _token0, _token1)\n}", "title": "" }, { "docid": "b6280df50a2577c85d90a113b2367c88", "score": "0.49366015", "text": "func NewManager() *Manager {\n\treturn &Manager{\n\t\tsubscriptions: make(map[Topic][]Callback),\n\t\tqueue: make(map[Topic][]interface{}),\n\t}\n}", "title": "" }, { "docid": "49fb52bfba3da44df1dcc8acc8fc82fd", "score": "0.49338466", "text": "func (_Token *TokenTransactorSession) Initialize(_token0 common.Address, _token1 common.Address) (*types.Transaction, error) {\n\treturn _Token.Contract.Initialize(&_Token.TransactOpts, _token0, _token1)\n}", "title": "" }, { "docid": "ee7fdd1be474fc4d6cc69e7216a18e4d", "score": "0.49336275", "text": "func NewManager() Manager {\n\treturn nil\n}", "title": "" }, { "docid": "6f6861769c34f09317aaa4d1279d3345", "score": "0.49273175", "text": "func NewManager(generators map[string][]Generator, client api.Client) *Manager {\n\treturn &Manager{\n\t\tcollector: newCollector(generators[\"ser\"]),\n\t\tgenerators: &generators,\n\t\tsender: newSender(client),\n\t}\n}", "title": "" }, { "docid": "53d8ebc3b3146fbd6d220b95f50ce7c0", "score": "0.49136934", "text": "func WithNewManagedToken(t thread.Token) NewManagedOption {\n\treturn func(o *NewManagedOptions) {\n\t\to.Token = t\n\t}\n}", "title": "" }, { "docid": "302451cd57d1132307d9758a0064183c", "score": "0.49067536", "text": "func LoadTokenFromKeyring(config *config.Config) {\n\tfor i, item := range config.JenkinsServers {\n\t\tif item.Token != PlaceHolder {\n\t\t\tcontinue\n\t\t}\n\t\tif token, err := keyring.Get(fmt.Sprintf(\"%s-%s\", KeyTokenPrefix, item.Name), item.UserName); err == nil {\n\t\t\t(&item).Token = token\n\t\t\tconfig.JenkinsServers[i] = item\n\t\t}\n\t}\n}", "title": "" }, { "docid": "22b8853de6b7af7e322385e046ccbd31", "score": "0.49062222", "text": "func NewManager(apiClient api.Client, targetExchanges, targetIndexGroups, notQuoteStockList []string) *ManagerImpl {\n\treturn &ManagerImpl{\n\t\tAPIClient: apiClient, TargetExchanges: targetExchanges, TargetIndexGroups: targetIndexGroups,\n\t\tNotQuoteStockList: sliceToMap(notQuoteStockList),\n\t\tIdentifiers: map[string][]string{}, IndexIdentifiers: map[string][]string{},\n\t}\n}", "title": "" }, { "docid": "d34fd9782cd4aabf5369deda6d046585", "score": "0.49059403", "text": "func New(config Config) (*Token, error) {\n\tcStore := Token{config: &config}\n\n\tcStore.context = pkcs11.New(config.Module)\n\tif err := cStore.context.Initialize(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tslots, err := cStore.context.GetSlotList(true)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tslot, err := config.SelectSlot(cStore.context, slots)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar sessionBitmask uint = pkcs11.CKF_SERIAL_SESSION // | pkcs11.CKF_RW_SESSION\n\tsession, err := cStore.context.OpenSession(slot, sessionBitmask)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcStore.session = &session\n\n\tif config.PIN != nil {\n\t\tif err := cStore.context.Login(session, pkcs11.CKU_USER, *config.PIN); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &cStore, err\n}", "title": "" }, { "docid": "c444911c57abde38e2e947edc2cf9896", "score": "0.49039772", "text": "func NewTokenTxs(\n\tacc *acc.Account, toAddr string, amountT uint64, count int, tHashStr string,\n\ttIdx uint32, conn *grpc.ClientConn,\n) ([]*types.Transaction, error) {\n\t// get utxos\n\tamount := maxTokenFee * uint64(count)\n\tboxUtxos, err := fetchUtxos(conn, acc.Addr(), amount, \"\", 0)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttokenUtxos, err := fetchUtxos(conn, acc.Addr(), amountT, tHashStr, tIdx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tutxos := append(boxUtxos, tokenUtxos...)\n\t// tid\n\ttHash := new(crypto.HashType)\n\tif err := tHash.SetString(tHashStr); err != nil {\n\t\treturn nil, err\n\t}\n\ttid := (*types.TokenID)(types.NewOutPoint(tHash, tIdx))\n\t//\n\tvar txs []*types.Transaction\n\tunitT := amountT / uint64(count)\n\tchangeAmt := amount\n\tfor i := 0; i < count; i++ {\n\t\tif i == count-1 {\n\t\t\tunitT = amountT - unitT*uint64(i)\n\t\t}\n\t\tchangeAmt -= maxTokenFee\n\t\ttx, change, changeT, err := txlogic.NewTokenTransferTxWithUtxos(acc, []string{toAddr},\n\t\t\t[]uint64{unitT}, tid, changeAmt, utxos...)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttxs = append(txs, tx)\n\t\tutxos = []*rpcpb.Utxo{change, changeT}\n\t\tif change == nil {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn txs, nil\n}", "title": "" }, { "docid": "494ab1f78b9ff4f3b0ae6f016bbc55f3", "score": "0.48939", "text": "func (t *Token) Init(user, pass string) error {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\treturn err\n\t}\n\treq, err := http.NewRequest(\n\t\t\"POST\",\n\t\t\"https://api.github.com/authorizations\",\n\t\tstrings.NewReader(fmt.Sprintf(`{\"note\":\"gfm-viewer@%s\"}`, hostname)),\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.SetBasicAuth(user, pass)\n\tres, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer res.Body.Close()\n\tif res.StatusCode/100 != 2 {\n\t\tbody, _ := ioutil.ReadAll(res.Body)\n\t\treturn fmt.Errorf(string(body))\n\t}\n\n\tjson.NewDecoder(res.Body).Decode(t)\n\treturn t.SaveFile()\n}", "title": "" }, { "docid": "83ca23b7f55500c00cb3d652ffd7ab31", "score": "0.48873648", "text": "func NewTokenOptions(opts ...TokenOption) TokenOptions {\n\tvar options TokenOptions\n\tfor _, o := range opts {\n\t\to(&options)\n\t}\n\n\t// set defualt expiry of token\n\tif options.Expiry == 0 {\n\t\toptions.Expiry = time.Minute\n\t}\n\n\treturn options\n}", "title": "" }, { "docid": "feef3f12be5e581bd1c65c885e41a817", "score": "0.4886803", "text": "func (c *XChatHTTPClient) newToken() (string, error) {\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{\n\t\t\"ns\": \"\",\n\t\t\"is_admin\": true,\n\t\t\"exp\": time.Now().Add(30 * 24 * time.Hour).Unix(),\n\t})\n\treturn token.SignedString(c.userKey)\n}", "title": "" }, { "docid": "7c93d91b89e11a1c07ba5a7e2c13f25a", "score": "0.48858163", "text": "func NewToken() string {\n\treturn RandomString(32)\n}", "title": "" }, { "docid": "d6ddceb43e321187300e41a41f6da1c2", "score": "0.4884187", "text": "func New() *Manager {\n\treturn &Manager{\n\t\tindexIDs: map[int]struct{}{},\n\t}\n}", "title": "" }, { "docid": "76182a4def4169c0e63bfa216dd2681c", "score": "0.48773286", "text": "func NewTokenManager(address common.Address, backend bind.ContractBackend) (*TokenManager, error) {\n\tcontract, err := bindTokenManager(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TokenManager{TokenManagerCaller: TokenManagerCaller{contract: contract}, TokenManagerTransactor: TokenManagerTransactor{contract: contract}, TokenManagerFilterer: TokenManagerFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "d06b8addf02375e084cea32ad298afdf", "score": "0.4876223", "text": "func (_Poolbindings *PoolbindingsTransactor) SetMaxPoolTokens(opts *bind.TransactOpts, maxPoolTokens *big.Int) (*types.Transaction, error) {\n\treturn _Poolbindings.contract.Transact(opts, \"setMaxPoolTokens\", maxPoolTokens)\n}", "title": "" }, { "docid": "9c18b9a2ee8665790d99e331b6bb4a6b", "score": "0.4874438", "text": "func (sc *SyncContext) PopulateTokens() error {\n\tfor _, rc := range sc.RegistryContexts {\n\t\ttoken, err := GetServiceAccountToken(rc.ServiceAccount, sc.UseServiceAccount)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttokenName := RootRepo(string(rc.Name))\n\t\tsc.Tokens[tokenName] = token\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "17c3df8605abfe3f2114889c28ab053d", "score": "0.4873654", "text": "func (self *Lexer) createToken(token_type int, content string) {\n\ttoken := &Token{}\n\ttoken.token_type = token_type\n\ttoken.content = content\n\ttoken.line_number = self.line_number\n\ttoken.char_number = self.char_number\n\tfmt.Printf(\"adding token type %d and content %s to stream\\n\", token.token_type, token.content)\n\tself.token_stream.PushBack(token)\n}", "title": "" }, { "docid": "a20c0ca49e1754a83cda00f59e13cf9a", "score": "0.4855196", "text": "func NewManager(configs map[string]*runtime.ServiceInfo, metricsRegistry metrics.Registry, routinePool *safe.Pool, roundTripperManager RoundTripperGetter) *Manager {\n\treturn &Manager{\n\t\troutinePool: routinePool,\n\t\tmetricsRegistry: metricsRegistry,\n\t\tbufferPool: newBufferPool(),\n\t\troundTripperManager: roundTripperManager,\n\t\tservices: make(map[string]http.Handler),\n\t\tconfigs: configs,\n\t\thealthCheckers: make(map[string]*healthcheck.ServiceHealthChecker),\n\t\trand: rand.New(rand.NewSource(time.Now().UnixNano())),\n\t}\n}", "title": "" }, { "docid": "1a0ee1459a8593dd82cb86ea3b5ab9e4", "score": "0.48543066", "text": "func NewToken(token string) *lisp {\n\treturn &lisp{nil, token}\n}", "title": "" }, { "docid": "699d96d847618827eb150d45dd3ced9d", "score": "0.48532346", "text": "func FetchTokens() {\n\terr := GetUToken()\n\tif err != nil {\n\t\tlogs.Warningf(\"HTTP requests may be slower: %s\", err.Error())\n\t\thi.uToken = \"\"\n\t\treturn\n\t}\n\n\tprojects, err := GetProjects()\n\tif err != nil {\n\t\tlogs.Warningf(\"HTTP requests may be slower: %s\", err.Error())\n\t\thi.sTokens = map[string]SToken{}\n\t}\n\n\tfor i := range projects {\n\t\terr = GetSToken(projects[i].Name)\n\t\tif err != nil {\n\t\t\tlogs.Warning(err)\n\t\t\tdelete(hi.sTokens, projects[i].Name)\n\t\t}\n\t}\n\n\tlogs.Info(\"Fetched tokens\")\n}", "title": "" }, { "docid": "dfce7350f78fd27229dc6b6bd25b63db", "score": "0.48493686", "text": "func NewHydraTokenManager(hydraAdminURL, issuer string, clients func(tx storage.Tx) (map[string]*cpb.Client, error)) *Hydra {\n\treturn &Hydra{\n\t\thydraAdminURL: hydraAdminURL,\n\t\tissuer: issuer,\n\t\tclients: clients,\n\t}\n}", "title": "" }, { "docid": "e6eafc3c0e387ab8b7037b050b7b161b", "score": "0.48448154", "text": "func NewManager(o *Options, cf ConnectionFactory) Manager {\n\tif cf == nil {\n\t\tcf = NewConnectionFactory(o)\n\t}\n\n\tm := &manager{\n\t\tlogger: o.logger(),\n\n\t\tconnectionFactory: cf,\n\t\tkeyFunc: o.keyFunc(),\n\t\tregistry: newRegistry(o.initialCapacity()),\n\t\tdeviceMessageQueueSize: o.deviceMessageQueueSize(),\n\t\tpingPeriod: o.pingPeriod(),\n\t\tauthDelay: o.authDelay(),\n\n\t\tlisteners: o.listeners(),\n\t}\n\n\treturn m\n}", "title": "" }, { "docid": "318461a16b55891edbdd4a62d568d2de", "score": "0.48398778", "text": "func newToken(sessID string, expires time.Time) (*corev1beta1.UserToken, *accessToken, error) {\n\tb := make([]byte, tokenLen)\n\tif _, err := rand.Read(b); err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"error reading random data: %w\", err)\n\t}\n\n\tbc, err := bcrypt.GenerateFromPassword(b, bcrypt.DefaultCost)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"failed to hash password: %w\", err)\n\t}\n\n\tut := &corev1beta1.UserToken{\n\t\tToken: b,\n\t\tSessionId: sessID,\n\t}\n\n\tst := &accessToken{\n\t\tBcrypted: bc,\n\t\tExpiry: expires,\n\t}\n\n\treturn ut, st, nil\n}", "title": "" }, { "docid": "c66b370f8b10f22eda81d77c4c5ae51b", "score": "0.48356473", "text": "func InitNewLsm(bufferSize int, sorted bool, fileName string) *Lsm {\n\n\tvar tree Lsm\n\ttree.blockSize = bufferSize\n\ttree.k = 2\n\ttree.nextEmtpy = 0\n\tvar temp node\n\tvar size = int(unsafe.Sizeof(temp))\n\ttree.nodeSize = size\n\ttree.block = make([]node, tree.blockSize)\n\ttree.disk1 = fileName\n\ttree.sorted = sorted\n\n\treturn &tree\n\n}", "title": "" } ]
58e53525ffcef7c157387b24f838f3c4
Less returns true if the number of parts (a/b/c would be 3 parts) in the mount indexed by parameter 1 is less than that of the mount indexed by parameter 2. Used in sorting.
[ { "docid": "8eccc633e2fa441067a7f5332de473d2", "score": "0.7856105", "text": "func (m mounts) Less(i, j int) bool {\n\treturn m.parts(i) < m.parts(j)\n}", "title": "" } ]
[ { "docid": "d4695895d6d082e1c206b9dc6ef3d7a9", "score": "0.6698618", "text": "func (s BlobList) Less(i, j int) bool {\n\tleftValues := strings.Split(s[i].Key, \"/\")\n\trightValues := strings.Split(s[j].Key, \"/\")\n\tleft, _ := strconv.ParseInt(leftValues[len(leftValues)-1], 0, 10)\n\tright, _ := strconv.ParseInt(rightValues[len(rightValues)-1], 0, 10)\n\treturn left < right\n}", "title": "" }, { "docid": "3143a7de683c4831ab3de099f736fc8c", "score": "0.6693289", "text": "func (p Path) Less(p2 Path) bool {\n\tfor x := 0; x < len(p) && x < len(p2); x++ {\n\t\tif p[x] < p2[x] {\n\t\t\treturn true\n\t\t}\n\t\tif p[x] > p2[x] {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn len(p) < len(p2)\n}", "title": "" }, { "docid": "70658d2206a16a8c6ec17509f24c21ed", "score": "0.6310564", "text": "func (m *Manifest) Less(i, j int) bool {\n\treturn m.Vendors[i].Path < m.Vendors[j].Path\n}", "title": "" }, { "docid": "f21a2d17de8a211d9e178581c84458c3", "score": "0.62763035", "text": "func (n ByMobileBytes) Less(i, j int) bool {\n\treturn n[i].MobileMegaBytes > n[j].MobileMegaBytes\n}", "title": "" }, { "docid": "b1b09856c9c5c7e0999d30367e1b8e47", "score": "0.6275289", "text": "func (s StoreDescriptor) Less(b util.Ordered) bool {\n\treturn s.Capacity.PercentAvail() < b.(StoreDescriptor).Capacity.PercentAvail()\n}", "title": "" }, { "docid": "a2656e14e765654fcb384a7a0ee93fad", "score": "0.62686884", "text": "func (l asLogRotateTool) Less(i, j int) bool {\n\t// Use path names\n\tpathA := l[i]\n\tpathB := l[j]\n\n\t// Grab integer value of each filename by parsing the extension (without dot)\n\ta, err1 := strconv.ParseInt(path.Ext(pathA)[1:], 10, 64)\n\tb, err2 := strconv.ParseInt(path.Ext(pathB)[1:], 10, 64)\n\n\t// If any were not numbers sort by reverse-lexicographically\n\tif err1 != nil || err2 != nil {\n\t\treturn pathA > pathB\n\t}\n\n\t// Which integer is greater?\n\treturn a > b\n}", "title": "" }, { "docid": "1705439499860d620ef24c28ea303da0", "score": "0.62462133", "text": "func (f openFileList) Less(i, j int) bool {\n\treturn f[i].lastAccess.Before(f[j].lastAccess)\n}", "title": "" }, { "docid": "d9dbaa8eaefb45f1695908b84fd5cda1", "score": "0.6237911", "text": "func (ps prefixSorter) Less(i, j int) bool {\n\treturn len(ps[i].prefix) > len(ps[j].prefix)\n}", "title": "" }, { "docid": "2c9ef1cad7048177d8875a98042dba3f", "score": "0.6227354", "text": "func (r *PartitionItem) Less(other btree.Item) bool {\n\tleft := r.partition.StartSlot\n\tright := other.(*PartitionItem).partition.StartSlot\n\t//return bytes.Compare(left, right) > 0\n\treturn left > right\n}", "title": "" }, { "docid": "f87f07615808be14a4f588f8c1a7aef2", "score": "0.62271255", "text": "func (s EntitySlice) Less(i, j int) bool {\n\treturn s[i].GetEntityData().SegmentPath < s[j].GetEntityData().SegmentPath\n}", "title": "" }, { "docid": "33990812aee70194f8aca53db77e79b9", "score": "0.62260777", "text": "func (n ByWifiBytes) Less(i, j int) bool {\n\treturn n[i].WifiMegaBytes > n[j].WifiMegaBytes\n}", "title": "" }, { "docid": "7de24ab9c521c7d377d46c60fb81caaf", "score": "0.6217556", "text": "func (pool mempool) Less(i, j int) bool {\n\tT_i := strings.Split(pool[i], \" \")[1]\n\tT_j := strings.Split(pool[j], \" \")[1]\n\tT_i_num, _ := strconv.ParseFloat(T_i, 64)\n\tT_j_num, _ := strconv.ParseFloat(T_j, 64)\n\treturn T_i_num < T_j_num\n}", "title": "" }, { "docid": "10fd45aa88714f0157e8135408fa38a7", "score": "0.62125856", "text": "func lt(p1 PropNum, p2 PropNum) bool {\n\treturn p1.Num < p2.Num || (p1.Num == p2.Num && p1.Srv < p2.Srv)\n}", "title": "" }, { "docid": "ebb24b9610cf3bb5830465996348f612", "score": "0.62100685", "text": "func (ds DirEntries) Less(i, j int) bool {\n\treturn CompareDirEntries(ds[i], ds[j]) < 0\n}", "title": "" }, { "docid": "13a7ac8d8af62d51e1b3a099fa8c92fb", "score": "0.6207564", "text": "func (s *fileSorter) Less(i, j int) bool {\n return s.by(&s.files[i], &s.files[j])\n}", "title": "" }, { "docid": "7d0bee68f860a2b2a807640ea6a849c3", "score": "0.61992455", "text": "func (s listSorter) less(i, j int) bool {\n\treturn s.compare(i, j) < 0\n}", "title": "" }, { "docid": "224da13b9bb7f33b7d54dabdb9f1a5ad", "score": "0.6185133", "text": "func (s ByLesser) Less(i, j int) bool { return s.Lesser.Less(s.Slice[i], s.Slice[j]) }", "title": "" }, { "docid": "5ca62a2752b0b3d7cfd004e56ea0fa9e", "score": "0.6184462", "text": "func (r1 RevisionSpecifier) Less(r2 RevisionSpecifier) bool {\n\tif r1.RevSpec != r2.RevSpec {\n\t\treturn r1.RevSpec < r2.RevSpec\n\t}\n\tif r1.RefGlob != r2.RefGlob {\n\t\treturn r1.RefGlob < r2.RefGlob\n\t}\n\treturn r1.ExcludeRefGlob < r2.ExcludeRefGlob\n}", "title": "" }, { "docid": "16b108ad8e3817fb6177ed76193a0d56", "score": "0.6142242", "text": "func (s LeafList) Less(i, j int) bool {\n\treturn strings.Compare(s[i].Property, s[j].Property) == -1\n}", "title": "" }, { "docid": "83d4ca434b3d4c3474747ef8df77a9b7", "score": "0.61113805", "text": "func (fm FileList) Less(i, j int) bool {\n\treturn fm[i] < fm[j]\n}", "title": "" }, { "docid": "3b8497f15971b7147797da2ea9b81e63", "score": "0.61032784", "text": "func (n nodes) Less(i, j int) bool {\n\treturn n[i].Count < n[j].Count\n}", "title": "" }, { "docid": "09eccc10dacf8eb198aef70639482eba", "score": "0.6075191", "text": "func Less(a, b string) bool {\n\tif r := Compare(a, b); r == 0 {\n\t\treturn a < b\n\t} else {\n\t\treturn r < 0\n\t}\n}", "title": "" }, { "docid": "7c80fef541136ed2bc7a16f1b4109f3d", "score": "0.60695684", "text": "func (path xNodePath) Less(i, j int) bool {\n\treturn path.nodePath[i].bbox.MinX < path.nodePath[j].bbox.MinX\n}", "title": "" }, { "docid": "479934e93f390a01ae97d49e22fb89c2", "score": "0.60692936", "text": "func (s SpecList) Less(i, j int) bool {\n\tb := s[i].SortNum < s[j].SortNum\n\treturn b || !b && s[i].ID < s[j].ID\n}", "title": "" }, { "docid": "8dc7b49c7835f7867fbfa1364335cb6b", "score": "0.6054395", "text": "func (a Chunk) Less(bt btree.Item) bool {\n\tb := bt.(Chunk)\n\tif a.mtime < b.mtime {\n\t\treturn true\n\t} else if a.mtime == b.mtime && string(a.sum) < string(b.sum) {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "0bade5e3928791d20df8f40fcc9c90f8", "score": "0.6048572", "text": "func (rl RouteList) Less(i, j int) bool {\n\tif rl[i].Id == \"DROP\" {\n\t\treturn false\n\t}\n\tif rl[j].Id == \"DROP\" {\n\t\treturn true\n\t}\n\treturn rl[i].Name < rl[j].Name\n}", "title": "" }, { "docid": "e977978fea1195e1c315ae9a33967f1d", "score": "0.6048278", "text": "func (s Stanza) Less(i, j int) bool {\n\treturn len(s[i]) < len(s[j])\n}", "title": "" }, { "docid": "4d3ace8d6ffe604978293b9924e43df1", "score": "0.603877", "text": "func (z CleanZones) Less(a, b int) bool {\n\treturn z[a].Total < z[b].Total\n}", "title": "" }, { "docid": "702b77900079639f53e38bcad0a926c4", "score": "0.6030233", "text": "func (c Collection) Less(i, j int) bool {\n\treturn c[i].GetVersionNumber().LessThan(c[j].GetVersionNumber())\n}", "title": "" }, { "docid": "37e59540b06fd0512d314e6f5401d660", "score": "0.6023097", "text": "func less(value1 int32, value2 int32) bool {\n\treturn value1 < value2\n}", "title": "" }, { "docid": "8971c3abcf1c7c0f982c631919594d56", "score": "0.60150963", "text": "func (c Collection) Less(i, j int) bool {\n\treturn c[i].Ver.LessThan(c[j].Ver)\n}", "title": "" }, { "docid": "4aaa5353f27fab6816c13e183b9a503b", "score": "0.6010702", "text": "func (s SpecItemList) Less(i, j int) bool {\n\tb := s[i].SortNum < s[j].SortNum\n\treturn b || !b && s[i].ID < s[j].ID\n}", "title": "" }, { "docid": "0b380a15dd7984ce9453089955db1bbb", "score": "0.6006985", "text": "func (n nodeDistances) Less(i, j int) bool {\n\t// compare size of byte arrays\n\tif len(n[i].distance) < len(n[j].distance) {\n\t\treturn false\n\t}\n\t// bitwise comparison\n\tfor a := range n[i].distance {\n\t\tif n[i].distance[a] < n[j].distance[a] {\n\t\t\treturn true\n\t\t}\n\t\tif n[i].distance[a] < n[i].distance[a] {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "efc4502d526d8e1737de47d15b2b1be8", "score": "0.5986408", "text": "func (k *Key) Less(an *Key) bool {\n\treturn k.cmp < an.cmp\n}", "title": "" }, { "docid": "a7b58b2683dfd8502a1ab77da19b49ca", "score": "0.5983985", "text": "func (comps PricingComponents) Less(i, j int) bool { return comps[i].Name < comps[j].Name }", "title": "" }, { "docid": "27b911991dde5195aed75e43ec01122e", "score": "0.5971566", "text": "func (i *Info) Less(right *Info) bool {\n\tif i.Major != right.Major {\n\t\treturn i.Major < right.Major\n\t}\n\tif i.Minor != right.Minor {\n\t\treturn i.Minor < right.Minor\n\t}\n\tif i.Patch != right.Patch {\n\t\treturn i.Patch < right.Patch\n\t}\n\n\t// Pre-release versions have a lower precedence than the associated normal version.\n\tif i.Rest == \"\" && right.Rest != \"\" {\n\t\treturn true\n\t}\n\tif i.Rest != \"\" && right.Rest == \"\" {\n\t\treturn false\n\t}\n\n\t// For now, we ignore proper parsing and comparision of pre-release versions.\n\treturn false\n}", "title": "" }, { "docid": "fb7392bbfb083c5ca30f3f81a7ed8491", "score": "0.59505117", "text": "func (s srcSetElements) Less(i int, j int) bool {\n\tre := regexp.MustCompile(`\\d+`)\n\twi, err := strconv.ParseInt(re.FindString(s[i].intrinsicWidth), 10, 32)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\twj, err := strconv.ParseInt(re.FindString(s[j].intrinsicWidth), 10, 32)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn wi > wj\n}", "title": "" }, { "docid": "6764e8c3174f337e43836021356813c7", "score": "0.5948406", "text": "func (fi fileInfo) Less(i, j int) bool {\n\treturn fi[i].ModTime().Unix() < fi[j].ModTime().Unix()\n}", "title": "" }, { "docid": "b326f7b392331242d717c0094ab8e76a", "score": "0.5944426", "text": "func (n RootDirSorter) Less(i, j int) bool {\n\treturn n[i].RootDir < n[j].RootDir\n}", "title": "" }, { "docid": "fd2c03986460351890d527fe6930feee", "score": "0.59349364", "text": "func (list *ArtifactList) Less(i, j int) bool {\n\treturn list.Results[i].TotalDownloads() < list.Results[j].TotalDownloads()\n}", "title": "" }, { "docid": "238913b7c374c5bed09f10e006ecbd72", "score": "0.5918539", "text": "func (context *Context) Less(a Quad, b Quad) bool {\n\tvar result C.Ret_uint32_t\n\tassert_sane(context)\n\n\tresult = C.mdq_compare(a.val, b.val, context.set)\n\n\tcontext.set = result.set\n\tif CmpFlag(result.val)&CmpLess != 0 {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d4ca6d32ba517ebb2d1114fe0be41888", "score": "0.5911929", "text": "func (s _bypack) Less(i, j int) bool {\n\treturn s[i].letter < s[j].letter\n}", "title": "" }, { "docid": "064d25b76473bd82a96e0f57304f5179", "score": "0.5903425", "text": "func (s *FileStatusSorter) Less(i, j int) bool {\n\treturn s.by(&s.fs[i], &s.fs[j])\n}", "title": "" }, { "docid": "8ba4b1c4af1232546d7e10247fa2429c", "score": "0.5902294", "text": "func (nInf) Less(Item) bool {\n\treturn true\n}", "title": "" }, { "docid": "1a032731e96659140a62e1ee1328a67c", "score": "0.5902171", "text": "func less(a []byte, b []byte) bool {\n\t// adapted from bytes.Compare in stdlib\n\tm := len(a)\n\tif m > len(b) {\n\t\tm = len(b)\n\t}\n\tfor i, ac := range a[0:m] {\n\t\t// do a case-insensitive comparison\n\t\tai, bi := unicode.ToLower(int(ac)), unicode.ToLower(int(b[i]))\n\t\tswitch {\n\t\tcase ai > bi:\n\t\t\treturn false\n\t\tcase ai < bi:\n\t\t\treturn true\n\t\t}\n\t}\n\tswitch {\n\tcase len(a) < len(b):\n\t\treturn true\n\tcase len(a) > len(b):\n\t\treturn false\n\t}\n\treturn false\n}", "title": "" }, { "docid": "4b9f87d5a05e3036eff052032b1e1b1e", "score": "0.58920324", "text": "func Less(l, r string) bool {\n\tif l == \"\" || r == \"\" {\n\t\treturn l < r\n\t}\n\ti, j := firstVerIndex(l), firstVerIndex(r)\n\tlprefix, rprefix := l, r\n\tlsuffix, rsuffix := \"\", \"\"\n\tif i != -1 {\n\t\tlprefix, lsuffix = l[:i], l[i+1:]\n\t}\n\tif j != -1 {\n\t\trprefix, rsuffix = r[:j], r[j+1:]\n\t}\n\tif result := vercmp(lprefix, rprefix); result != 0 {\n\t\treturn result < 0\n\t}\n\treturn Less(lsuffix, rsuffix)\n}", "title": "" }, { "docid": "a7dfa91f440803dcc07aff5f473e8fac", "score": "0.58883274", "text": "func (s byLength) Less(i, j int) bool {\n\treturn len(s[i]) < len(s[j])\n}", "title": "" }, { "docid": "e7b688cbf41c42a259ad386d9a0bc575", "score": "0.5883864", "text": "func (s sortByLength) Less(i, j int) bool {\n\treturn len(s[i]) < len(s[j])\n}", "title": "" }, { "docid": "c58046ff602c44fd885f4c71ff0dfd3c", "score": "0.5879304", "text": "func (a ByNumber) Less(i, j int) bool {\n\treturn (a.Counters[i].Count > a.Counters[j].Count)\n}", "title": "" }, { "docid": "3c50ee4050e2dedecdd0e9d4069472f0", "score": "0.5878715", "text": "func (p byCOMBINATION) Less(i, j int) bool {\n\tif p[i].FreeCapInBytes > p[j].FreeCapInBytes {\n\t\treturn true\n\t}\n\tif (p[i].FreeCapInBytes == p[j].FreeCapInBytes) && (p[i].Name < p[j].Name) {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "97a76cc04aefb29bc4220140cbeb0cbb", "score": "0.5869369", "text": "func (v Version) Less(other Version) bool {\n\tif v.Major != other.Major {\n\t\treturn v.Major < other.Major\n\t}\n\tif v.Minor != other.Minor {\n\t\treturn v.Minor < other.Minor\n\t}\n\tif v.Patch != other.Patch {\n\t\treturn v.Patch < other.Patch\n\t}\n\treturn v.Unstable && !other.Unstable\n}", "title": "" }, { "docid": "af72ef3b70b5a9572e057b8073075ce1", "score": "0.58509034", "text": "func (bs bySize) Less(i, j int) bool {\n\treturn bs[i].Size > bs[j].Size\n}", "title": "" }, { "docid": "f23e54b696ef930aec37e4bc3d1d0cbf", "score": "0.5847075", "text": "func (c Elements) Less(i, j int) bool {\n\treturn c[i].Size > c[j].Size\n}", "title": "" }, { "docid": "8d5dcd8ec0c25abb242a439bd1b0289e", "score": "0.5846939", "text": "func (ms *MultiSorter) Less(i, j int) bool {\n\tp, q := ms.nodes[i], ms.nodes[j]\n\t// Try all but the last comparison.\n\tvar k int\n\tfor k = 0; k < len(ms.less)-1; k++ {\n\t\tless := ms.less[k]\n\t\tswitch {\n\t\tcase less(p, q):\n\t\t\t// p < q, so we have a decision.\n\t\t\treturn true\n\t\tcase less(q, p):\n\t\t\t// p > q, so we have a decision.\n\t\t\treturn false\n\t\t}\n\t\t// p == q; try the next comparison.\n\t}\n\t// All comparisons to here said \"equal\", so just return whatever\n\t// the final comparison reports.\n\treturn ms.less[k](p, q)\n}", "title": "" }, { "docid": "8d5dcd8ec0c25abb242a439bd1b0289e", "score": "0.5846939", "text": "func (ms *MultiSorter) Less(i, j int) bool {\n\tp, q := ms.nodes[i], ms.nodes[j]\n\t// Try all but the last comparison.\n\tvar k int\n\tfor k = 0; k < len(ms.less)-1; k++ {\n\t\tless := ms.less[k]\n\t\tswitch {\n\t\tcase less(p, q):\n\t\t\t// p < q, so we have a decision.\n\t\t\treturn true\n\t\tcase less(q, p):\n\t\t\t// p > q, so we have a decision.\n\t\t\treturn false\n\t\t}\n\t\t// p == q; try the next comparison.\n\t}\n\t// All comparisons to here said \"equal\", so just return whatever\n\t// the final comparison reports.\n\treturn ms.less[k](p, q)\n}", "title": "" }, { "docid": "8d5dcd8ec0c25abb242a439bd1b0289e", "score": "0.5846939", "text": "func (ms *MultiSorter) Less(i, j int) bool {\n\tp, q := ms.nodes[i], ms.nodes[j]\n\t// Try all but the last comparison.\n\tvar k int\n\tfor k = 0; k < len(ms.less)-1; k++ {\n\t\tless := ms.less[k]\n\t\tswitch {\n\t\tcase less(p, q):\n\t\t\t// p < q, so we have a decision.\n\t\t\treturn true\n\t\tcase less(q, p):\n\t\t\t// p > q, so we have a decision.\n\t\t\treturn false\n\t\t}\n\t\t// p == q; try the next comparison.\n\t}\n\t// All comparisons to here said \"equal\", so just return whatever\n\t// the final comparison reports.\n\treturn ms.less[k](p, q)\n}", "title": "" }, { "docid": "143a2b1fb3b114b7cfe8b381c2ca357f", "score": "0.5842887", "text": "func Less(isNumber, isDuration bool, id1, id2, v1, v2 string) bool {\n\tvar less bool\n\tswitch {\n\tcase isNumber:\n\t\tv1, v2 = strings.Replace(v1, \",\", \"\", -1), strings.Replace(v2, \",\", \"\", -1)\n\t\tless = sortorder.NaturalLess(v1, v2)\n\tcase isDuration:\n\t\td1, d2 := durationToSeconds(v1), durationToSeconds(v2)\n\t\tless = d1 <= d2\n\tdefault:\n\t\tless = sortorder.NaturalLess(v1, v2)\n\t}\n\tif v1 == v2 {\n\t\treturn sortorder.NaturalLess(id1, id2)\n\t}\n\n\treturn less\n}", "title": "" }, { "docid": "ec5d7cd3487d41049df07c3e001d7988", "score": "0.5821831", "text": "func (rs *routeSorter) Less(i, j int) bool {\n\treturn rs.by(rs.routes[i], rs.routes[j])\n}", "title": "" }, { "docid": "6137112ae47c238c9b890a525e16c31e", "score": "0.58180594", "text": "func (is Spans) Less(i, j int) bool {\n\treturn bytes.Compare(is[i].Start, is[j].Start) < 0\n}", "title": "" }, { "docid": "12819e3585ffc253fd21e6d9919c282e", "score": "0.5809274", "text": "func (c *resultContainer) Less(i, j int) bool {\n\treturn c.Pages[i].relevance <= c.Pages[j].relevance\n}", "title": "" }, { "docid": "6fa13518ae6bb6fce18871ee4b248697", "score": "0.5800322", "text": "func (s *simpleBucketItem) Less(than RangeItem) bool {\n\treturn bytes.Compare(s.GetStartKey(), than.GetStartKey()) < 0\n}", "title": "" }, { "docid": "1533342313b6f4c661808ca79b258671", "score": "0.5799306", "text": "func lessThan(b BGPCommunity, c BGPCommunity) bool {\n\tvar bl BGPCommunityLarge\n\tvar cl BGPCommunityLarge\n\tswitch v := b.(type) {\n\tcase BGPCommunityLegacy:\n\t\tbl = BGPCommunityLarge{\n\t\t\tglobalAdministrator: v.ToUint32(),\n\t\t\tlocalDataPart1: 0,\n\t\t\tlocalDataPart2: 0,\n\t\t}\n\tcase BGPCommunityLarge:\n\t\tbl = v\n\t}\n\n\tswitch v := c.(type) {\n\tcase BGPCommunityLegacy:\n\t\tcl = BGPCommunityLarge{\n\t\t\tglobalAdministrator: v.ToUint32(),\n\t\t\tlocalDataPart1: 0,\n\t\t\tlocalDataPart2: 0,\n\t\t}\n\tcase BGPCommunityLarge:\n\t\tcl = v\n\t}\n\treturn bl.globalAdministrator < cl.globalAdministrator ||\n\t\t(bl.globalAdministrator == cl.globalAdministrator && (bl.localDataPart1 < cl.localDataPart1 ||\n\t\t\t(bl.localDataPart1 == cl.localDataPart1 && bl.localDataPart2 < cl.localDataPart2)))\n}", "title": "" }, { "docid": "e788af2879c3d1f025275270822a65e0", "score": "0.5783179", "text": "func lessFileName(a, b string) bool {\n\tas := strings.Split(a, sep)\n\tbs := strings.Split(b, sep)\n\n\tmin := len(as)\n\tif len(bs) < min {\n\t\tmin = len(bs)\n\t}\n\n\tfor i := 0; i < min; i++ {\n\t\tif len(as[i]) < len(bs[i]) {\n\t\t\treturn true\n\t\t} else if len(as[i]) > len(bs[i]) {\n\t\t\treturn false\n\t\t}\n\n\t\tswitch strings.Compare(as[i], bs[i]) {\n\t\tcase -1:\n\t\t\treturn true\n\t\tcase 1:\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn len(as) < len(bs)\n}", "title": "" }, { "docid": "a3c222db4717b8939f3bbe662ecdf128", "score": "0.57717013", "text": "func (t Slice) Less(i, j int) bool {\n\treturn t[i].weight < t[j].weight\n}", "title": "" }, { "docid": "88624ad042b71f1942381353896749cf", "score": "0.57673377", "text": "func (nm *nmVertex) less(config NelderMeadConfiguration, other *nmVertex) bool {\n\tif config.Target == min { // looking for a min\n\t\treturn nm.result < other.result\n\t}\n\tif config.Target == max { // looking for a max\n\t\treturn nm.result > other.result\n\t}\n\n\treturn nm.distance < other.distance\n}", "title": "" }, { "docid": "152ab453b6a6e432b89c9b0738735611", "score": "0.57638896", "text": "func (n NumOps) Less(n1, n2 anyvec.Numeric) bool {\n\treturn n1.(float64) < n2.(float64)\n}", "title": "" }, { "docid": "5937649b2e9a3087b5a020e2a9329215", "score": "0.57517415", "text": "func (a ByCount) Less(i, j int) bool { return a[i].Count > a[j].Count }", "title": "" }, { "docid": "85036a2d5a3bbd34d624d51ac673af52", "score": "0.5744789", "text": "func (v versions) Less(i int, j int) bool {\n\treturn v[i].semver.LT(v[j].semver)\n}", "title": "" }, { "docid": "2803c5160376db88b80e4254e595d8aa", "score": "0.57428926", "text": "func (f fieldSlice) Less(i, j int) bool {\n\treturn f[i].Line < f[j].Line || f[i].Line == f[j].Line && f[i].ID < f[j].ID\n}", "title": "" }, { "docid": "bfc4272718dda683a76ac85a55ed15cc", "score": "0.5741871", "text": "func (s Versions) Less(i, j int) bool {\r\n\treturn s[i].LT(s[j])\r\n}", "title": "" }, { "docid": "bef69bf3276f8454b95aff20ac09358b", "score": "0.57395774", "text": "func (b byName) Less(i, j int) bool {\n\treturn (b[i].Last < b[j].Last)\n}", "title": "" }, { "docid": "474782f6cf82054ecb0c5e3083eec56f", "score": "0.57355887", "text": "func (p nameLeafDataList) Less(i, j int) bool {\n\treturn p[i].Name < p[j].Name\n}", "title": "" }, { "docid": "e1c09fed52bc945342d0f80606d0b759", "score": "0.57267153", "text": "func (ms Multiaddrs) Less(i, j int) bool { return bytes.Compare(ms[i].Bytes(), ms[j].Bytes()) < 0 }", "title": "" }, { "docid": "b9de41fafd9527d93fff271e4b404c4f", "score": "0.5723698", "text": "func (flights flight_list) Less(i, j int) bool {\n\treturn flights[i].price < flights[j].price\n}", "title": "" }, { "docid": "bc970e5889e6f423e10ab1c906c12991", "score": "0.5714041", "text": "func (s SyntaxItems) Less(i, j int) bool {\n\ta, b := len(s[i].Text), len(s[j].Text)\n\tif a == b {\n\t\treturn s[i].Text < s[j].Text\n\t}\n\treturn a > b\n}", "title": "" }, { "docid": "af16b0277a27a3eaba9c3538005e9e27", "score": "0.5709926", "text": "func (a byPercent) Less(i, j int) bool {\n\tif a[i].Name == bspb.BatteryStats_System_PowerUseItem_OVERCOUNTED.String() || a[i].Name == bspb.BatteryStats_System_PowerUseItem_UNACCOUNTED.String() {\n\t\treturn true\n\t}\n\tif a[j].Name == bspb.BatteryStats_System_PowerUseItem_OVERCOUNTED.String() || a[j].Name == bspb.BatteryStats_System_PowerUseItem_UNACCOUNTED.String() {\n\t\treturn false\n\t}\n\n\tif x, y := a[i].Percent, a[j].Percent; x != y {\n\t\treturn x > y\n\t}\n\treturn a[i].Name < a[j].Name\n}", "title": "" }, { "docid": "4203896d03a70e00c7d0c099f0ff0663", "score": "0.5697973", "text": "func (us *UnitSorter) Less(i, j int) bool {\n\tp, q := us.Units[i], us.Units[j]\n\tvar k int\n\tfor k = 0; k < len(us.less)-1; k++ {\n\t\tless := us.less[k]\n\t\tswitch {\n\t\tcase less(p, q):\n\t\t\treturn true\n\t\tcase less(q, p):\n\t\t\treturn false\n\t\t}\n\t}\n\treturn us.less[k](p, q)\n}", "title": "" }, { "docid": "8241cad1ea73e7f9e5b9029d9fdb54c4", "score": "0.56937325", "text": "func (v *Vm) lt() error {\n\treturn v.cmpOp(func(mode int, t, t1 interface{}) (bool, error) {\n\t\tswitch mode {\n\t\tcase section.SymNumId:\n\t\t\treturn -1 == t.(*big.Rat).Cmp(t1.(*big.Rat)), nil\n\t\tcase section.SymIntId:\n\t\t\treturn t.(int) < t1.(int), nil\n\t\t}\n\t\treturn false, fmt.Errorf(\"invalid < mode %v\", mode)\n\t})\n}", "title": "" }, { "docid": "c51a4973d5ed37a47b40cb4187b2f2dd", "score": "0.5687893", "text": "func (p EndpointList) Less(i, j int) bool { return p.items[i].key < p.items[j].key }", "title": "" }, { "docid": "3129fbea2315d67cb061ea8355800530", "score": "0.56867164", "text": "func (a AuthFailures) Less(i, j int) bool {\n\treturn a[i].Failures > a[j].Failures\n}", "title": "" }, { "docid": "20e3d0c44ab30ac489307de2954861c3", "score": "0.5671612", "text": "func (r *recordList) Less(i, j int) bool {\n\tif r.recs[i].Difficulty == r.recs[j].Difficulty {\n\t\treturn r.recs[i].Lvl < r.recs[j].Lvl\n\t}\n\treturn r.recs[i].Difficulty < r.recs[j].Difficulty\n}", "title": "" }, { "docid": "8e1f2e6bc6bc83dab09c25809ea0eced", "score": "0.56695426", "text": "func (h helpList) Less(i, j int) bool {\n\tif h[i].Namespace == h[j].Namespace {\n\t\treturn h[i].Name < h[j].Name\n\t}\n\n\treturn h[i].Namespace < h[j].Namespace\n}", "title": "" }, { "docid": "a28c205d73818a47d50db21e358fcef8", "score": "0.56519496", "text": "func (slice ProbTuples) Less(i, j int) bool {\n\tif slice[i].LogProb == slice[j].LogProb {\n\t\treturn strings.Join(slice[i].Tokens, \"\") < strings.Join(slice[j].Tokens, \"\")\n\t}\n\treturn slice[i].LogProb < slice[j].LogProb\n\n}", "title": "" }, { "docid": "8883fa5965b9928e4f2025cb8f81907b", "score": "0.5648485", "text": "func (sorter sorter) Less(i, j int) bool {\n\treturn sorter.vertices[i].less(sorter.config, sorter.vertices[j])\n}", "title": "" }, { "docid": "2f41024d4091e611a9eb6d408184ea07", "score": "0.56448317", "text": "func (n Nums) Less(i, j int) bool {\n\ti, j = n[i], n[j]\n\tipow, jpow := 10, 10\n\tfor (i / ipow) > 0 {\n\t\tipow *= 10\n\t}\n\tfor (j / jpow) > 0 {\n\t\tjpow *= 10\n\t}\n\ti, j = i*jpow+j, j*ipow+i\n\treturn i > j\n}", "title": "" }, { "docid": "827dfc0e8dd587b4b0875776865b2468", "score": "0.5642913", "text": "func (s *SortedDistance) Less(i, j int) bool {\n\tif s.Dist[i] < s.Dist[j] {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "cebda87bed6f6f1d24e330b2cd79b6a1", "score": "0.56398976", "text": "func (versions Versions) Less(i, j int) bool {\n\treturn versions[i].Less(versions[j])\n}", "title": "" }, { "docid": "da6ca05b50d1c9209a7f1b0844b9ad83", "score": "0.5639707", "text": "func (n *NodeInfo) Less(rl v1.ResourceList) bool {\n\tfor k, v := range n.RequestedResource {\n\t\tif vl, ok := rl[k]; ok {\n\t\t\tif v.Cmp(vl) >= 0 {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "5253fb2bd94b4502824badd067f1c7c3", "score": "0.5632784", "text": "func (ms *multiSorter) Less(i, j int) bool {\n\tp, q := ms.models[i], ms.models[j]\n\t// Try all but the last comparison.\n\tvar k int\n\tfor k = 0; k < len(ms.less)-1; k++ {\n\t\tless := ms.less[k]\n\t\tswitch {\n\t\tcase less(p, q):\n\t\t\t// p < q, so we have a decision.\n\t\t\treturn true\n\t\tcase less(q, p):\n\t\t\t// p > q, so we have a decision.\n\t\t\treturn false\n\t\t}\n\t\t// p == q; try the next comparison.\n\t}\n\t// All comparisons to here said \"equal\", so just return whatever\n\t// the final comparison reports.\n\treturn ms.less[k](p, q)\n}", "title": "" }, { "docid": "f07f7491e3d8720ddb90da08b5d94876", "score": "0.56303", "text": "func (path yNodePath) Less(i, j int) bool {\n\treturn path.nodePath[i].bbox.MinY < path.nodePath[j].bbox.MinY\n}", "title": "" }, { "docid": "d2b0b7cb0df1e7ded67b798b58137249", "score": "0.56299114", "text": "func (v Version) Less(other Version) bool {\n\tfor i, a := range v {\n\t\tif a == other[i] {\n\t\t\tcontinue\n\t\t}\n\t\treturn a < other[i]\n\t}\n\treturn false\n}", "title": "" }, { "docid": "a6533a6bf54c3464aa8c4971b449154a", "score": "0.5626521", "text": "func (c Channel) Less(comp Channel) bool {\n\n\tswitch {\n\tcase strings.ToLower(c.Make) < strings.ToLower(comp.Make):\n\t\treturn true\n\tcase strings.ToLower(c.Make) > strings.ToLower(comp.Make):\n\t\treturn false\n\tcase strings.ToLower(c.Model) < strings.ToLower(comp.Model):\n\t\treturn true\n\tcase strings.ToLower(c.Model) > strings.ToLower(comp.Model):\n\t\treturn false\n\tcase c.Number < comp.Number:\n\t\treturn true\n\tcase c.Number > comp.Number:\n\t\treturn false\n\tcase c.SamplingRate < comp.SamplingRate:\n\t\treturn true\n\tcase c.SamplingRate > comp.SamplingRate:\n\t\treturn false\n\tdefault:\n\t\treturn true\n\t}\n}", "title": "" }, { "docid": "f45654add0dd0364b469514f31e1ef21", "score": "0.5625081", "text": "func (l List) Less(i, j int) bool { return l[i].Name < l[j].Name }", "title": "" }, { "docid": "2b0434b7c536e9074b2c0ff38fbb193e", "score": "0.5618947", "text": "func (sorter *DataItemSorter) Less(i, j int) bool {\n\n\tif sorter.dataItems[i].MajorType() != sorter.dataItems[j].MajorType() {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"i\": sorter.dataItems[i].MajorType(),\n\t\t\t\"j\": sorter.dataItems[j].MajorType(),\n\t\t}).Debug(\"Unable to compare items of different majorType for sorting\")\n\t\treturn false\n\t}\n\n\tif sorter.dataItems[i].MajorType() == MajorTypePositiveInt || sorter.dataItems[j].MajorType() == MajorTypePositiveInt {\n\t\treturn reflect.ValueOf(sorter.dataItems[i].Value()).Uint() < reflect.ValueOf(sorter.dataItems[j].Value()).Uint()\n\t} else if sorter.dataItems[i].MajorType() == MajorTypeNegativeInt || sorter.dataItems[j].MajorType() == MajorTypeNegativeInt {\n\t\treturn reflect.ValueOf(sorter.dataItems[i].Value()).Int() < reflect.ValueOf(sorter.dataItems[j].Value()).Int()\n\t} else if sorter.dataItems[i].MajorType() == MajorTypeByteString || sorter.dataItems[j].MajorType() == MajorTypeByteString {\n\t\treturn bytes.Compare(sorter.dataItems[i].(*ByteString).ValueAsBytes(), sorter.dataItems[j].(*ByteString).ValueAsBytes()) == -1\n\t} else if sorter.dataItems[i].MajorType() == MajorTypeTextString || sorter.dataItems[j].MajorType() == MajorTypeTextString {\n\t\treturn strings.Compare(sorter.dataItems[i].(*TextString).ValueAsString(), sorter.dataItems[j].(*TextString).ValueAsString()) == -1\n\t} else {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"i\": sorter.dataItems[i].String(),\n\t\t\t\"j\": sorter.dataItems[j].String(),\n\t\t}).Debug(\"Unexpected major types not handled for sorting\")\n\t}\n\n\t// TBD: need to handle for other major types\n\treturn false\n}", "title": "" }, { "docid": "f617065f76e2dc1bfa570ae6eafd3bc0", "score": "0.5613567", "text": "func (e Edges) Less(i, j int) bool {\n\treturn e[i].Prefix[0] < e[j].Prefix[0]\n}", "title": "" }, { "docid": "a6a27f555edc8a6ff63d4f3a05a3eb46", "score": "0.56111246", "text": "func (s StringList) Less(i, j int) bool { return s[i] < s[j] }", "title": "" }, { "docid": "7664bd2f2c7988b5cfd2f3b1f8c9ef7c", "score": "0.5610662", "text": "func (hl HandlerList) Less(i, j int) bool {\n\treturn hl[i].Priority > hl[j].Priority\n}", "title": "" }, { "docid": "805384a5ec7f6c25155f7f910aadb1d5", "score": "0.56036335", "text": "func (hs *Sorter) Less(i, j int) bool {\n\treturn bytes.Compare([]byte(hs.Keys[i]), []byte(hs.Keys[j])) < 0\n}", "title": "" }, { "docid": "1b5c8f0d320425eb7b0393e4fc6f7fba", "score": "0.56009567", "text": "func (sr SortRelays) Less(i int, j int) bool {\n\treturn sr.Bandwidths[i] < sr.Bandwidths[j]\n}", "title": "" }, { "docid": "98c183a7ff0b4b23bf8cf61cf8b22da9", "score": "0.55951583", "text": "func (l1 Lattice) Less(l2 lattice.Latticer) (bool, error) {\n\tl2taint, err := getTaintLattice(l2)\n\tif err != nil {\n\t\treturn false, errors.Wrap(err, \"failed less get taint lattice\")\n\t}\n\tfor ssaValL1, valL1 := range l1 {\n\t\t// Iterating over l2 to have the chance to compare the ssa.Values.\n\t\tvar visited bool\n\t\tvisited = false\n\t\tfor ssaValL2, valL2 := range l2taint {\n\t\t\t// Comparising with Name () - but its propably not unique\n\t\t\t// TODO better solution\n\t\t\tif ssaValL2.Name() == ssaValL1.Name() {\n\t\t\t\tless, err := valL1.Less(valL2)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn false, errors.Wrap(err, \"failed less of taint values\")\n\t\t\t\t}\n\t\t\t\tif !less {\n\t\t\t\t\treturn false, nil\n\t\t\t\t}\n\t\t\t\tvisited = true\n\t\t\t}\n\t\t}\n\t\tif !visited && valL1 != Uninitialized {\n\t\t\treturn false, nil\n\t\t}\n\t}\n\treturn true, nil\n}", "title": "" } ]
5985593259f80895f74eab70667f53af
NewGrpcRoute registers a new resource with the given unique name, arguments, and options.
[ { "docid": "b852b15c6520d54a552ba2de20f202ad", "score": "0.7334594", "text": "func NewGrpcRoute(ctx *pulumi.Context,\n\tname string, args *GrpcRouteArgs, opts ...pulumi.ResourceOption) (*GrpcRoute, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Hostnames == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Hostnames'\")\n\t}\n\tif args.Rules == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Rules'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource GrpcRoute\n\terr := ctx.RegisterResource(\"gcp:networkservices/grpcRoute:GrpcRoute\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" } ]
[ { "docid": "e0c67afabcedab21093f40b7ef4d6ec4", "score": "0.6496812", "text": "func NewRoute(ctx *pulumi.Context,\n\tname string, args *RouteArgs, opts ...pulumi.ResourceOption) (*Route, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.DestinationAddress == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'DestinationAddress'\")\n\t}\n\tif args.DisplayName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'DisplayName'\")\n\t}\n\tif args.PrivateConnectionId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'PrivateConnectionId'\")\n\t}\n\tif args.RouteId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'RouteId'\")\n\t}\n\treplaceOnChanges := pulumi.ReplaceOnChanges([]string{\n\t\t\"location\",\n\t\t\"privateConnectionId\",\n\t\t\"project\",\n\t\t\"routeId\",\n\t})\n\topts = append(opts, replaceOnChanges)\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Route\n\terr := ctx.RegisterResource(\"google-native:datastream/v1:Route\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "a6811c7b34686b29de940eb750c159db", "score": "0.63554895", "text": "func NewRoute(ctx *pulumi.Context,\n\tname string, args *RouteArgs, opts ...pulumi.ResourceOption) (*Route, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Name == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Name'\")\n\t}\n\tif args.Network == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Network'\")\n\t}\n\tvar resource Route\n\terr := ctx.RegisterResource(\"f5bigip:net/route:Route\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "7988fb79a3cbdf43ad7ebda7caa78061", "score": "0.5895755", "text": "func NewRoute(ctx *pulumi.Context,\n\tname string, args *RouteArgs, opts ...pulumi.ResourceOption) (*Route, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ClientVpnEndpointId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ClientVpnEndpointId'\")\n\t}\n\tif args.DestinationCidrBlock == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'DestinationCidrBlock'\")\n\t}\n\tif args.TargetVpcSubnetId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'TargetVpcSubnetId'\")\n\t}\n\tvar resource Route\n\terr := ctx.RegisterResource(\"aws:ec2clientvpn/route:Route\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "8163a8018333c7e08e1f3c184d6e792c", "score": "0.5796869", "text": "func (p *PushCli) AddRoute(ctx context.Context, req *pb.AddRouteReq) (*pb.AddRouteResp, error) {\n\tif !p.Ready() {\n\t\treturn nil, ErrNoEndpoints\n\t}\n\topts := p.GrpcOptions()\n\tstart := time.Now()\n\tresp, err := p.PushServiceClient.AddRoute(ctx, req, opts...)\n\tcost := time.Since(start)\n\tp.slowTopicLog(\"grpc addroute slow log\", req.Topic, req.TraceID, req.Service, cost)\n\tmetrics.GetMetrics().GrpcHistogramVec.WithLabelValues(\"AddRoute\").Observe(cost.Seconds())\n\treturn resp, err\n}", "title": "" }, { "docid": "e8f30f7f1ec1468bceed6d17876f5644", "score": "0.5674362", "text": "func NewRoute(rc rb.RouterCore) (string, jet.Func) {\n\tconst name = \"rb_route\"\n\treturn name, func(args jet.Arguments) (v reflect.Value) {\n\t\targs.RequireNumOfArguments(name, 0, 0)\n\t\tw, r, err := respReq(args)\n\t\tif err != nil {\n\t\t\targs.Panicf(\"failed to read response and request: %v\", err)\n\t\t}\n\n\t\treturn reflect.ValueOf(rc.Route(w, r))\n\t}\n}", "title": "" }, { "docid": "2d1e2e87ab4303f73d671e51349cbbdd", "score": "0.56056684", "text": "func (r *routes) CreateRoute(ctx context.Context, clusterName string, nameHint string, route *cloudprovider.Route) error {\n\tconst op = \"hcloud/CreateRoute\"\n\tmetrics.OperationCalled.WithLabelValues(op).Inc()\n\n\tsrv, err := r.serverCache.ByName(string(route.TargetNode))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"%s: %v\", op, err)\n\t}\n\n\tprivNet, ok := findServerPrivateNetByID(srv, r.network.ID)\n\tif !ok {\n\t\tr.serverCache.InvalidateCache()\n\t\tsrv, err = r.serverCache.ByName(string(route.TargetNode))\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"%s: %v\", op, err)\n\t\t}\n\n\t\tprivNet, ok = findServerPrivateNetByID(srv, r.network.ID)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"%s: server %v: network with id %d not attached to this server \", op, route.TargetNode, r.network.ID)\n\t\t}\n\t}\n\tip := privNet.IP\n\n\t_, cidr, err := net.ParseCIDR(route.DestinationCIDR)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"%s: %w\", op, err)\n\t}\n\n\tdoesRouteAlreadyExist, err := r.checkIfRouteAlreadyExists(ctx, route)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"%s: %w\", op, err)\n\t}\n\n\tif !doesRouteAlreadyExist {\n\t\topts := hcloud.NetworkAddRouteOpts{\n\t\t\tRoute: hcloud.NetworkRoute{\n\t\t\t\tDestination: cidr,\n\t\t\t\tGateway: ip,\n\t\t\t},\n\t\t}\n\t\taction, _, err := r.client.Network.AddRoute(ctx, r.network, opts)\n\t\tif err != nil {\n\t\t\tif hcloud.IsError(err, hcloud.ErrorCodeLocked) || hcloud.IsError(err, hcloud.ErrorCodeConflict) {\n\t\t\t\tretryDelay := time.Second * 5\n\t\t\t\tklog.InfoS(\"retry due to conflict or lock\",\n\t\t\t\t\t\"op\", op, \"delay\", fmt.Sprintf(\"%v\", retryDelay), \"err\", fmt.Sprintf(\"%v\", err))\n\t\t\t\ttime.Sleep(retryDelay)\n\n\t\t\t\treturn r.CreateRoute(ctx, clusterName, nameHint, route)\n\t\t\t}\n\t\t\treturn fmt.Errorf(\"%s: %w\", op, err)\n\t\t}\n\n\t\tif err := hcops.WatchAction(ctx, &r.client.Action, action); err != nil {\n\t\t\treturn fmt.Errorf(\"%s: %w\", op, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "77ebc1d25942232e389b2f738a97f87d", "score": "0.5538373", "text": "func NewRoute(router *gin.Engine, handler *handler.HandlersImpl) {\n\trouter.POST(\"/bookcab\", handler.BookCab)\n\trouter.GET(\"/history/:id\", handler.RideHistory)\n}", "title": "" }, { "docid": "af029c00c147b31de4954ad4c6f6b7a5", "score": "0.55117536", "text": "func createRoute(params *routeCreateParams) *routev3.Route {\n\t// func createRoute(title string, apiType string, xWso2Basepath string, version string, endpointBasepath string,\n\t// \tresourcePathParam string, resourceMethods []string, prodClusterName string, sandClusterName string,\n\t// \tcorsPolicy *routev3.CorsPolicy) *routev3.Route {\n\ttitle := params.title\n\tversion := params.version\n\tvHost := params.vHost\n\txWso2Basepath := params.xWSO2BasePath\n\tapiType := params.apiType\n\tcorsPolicy := getCorsPolicy(params.corsPolicy)\n\tresourcePathParam := params.resourcePathParam\n\tresourceMethods := params.resourceMethods\n\tprodClusterName := params.prodClusterName\n\tsandClusterName := params.sandClusterName\n\tendpointBasepath := params.endpointBasePath\n\trequestInterceptor := params.requestInterceptor\n\tresponseInterceptor := params.responseInterceptor\n\tconfig, _ := config.ReadConfigs()\n\n\tlogger.LoggerOasparser.Debug(\"creating a route....\")\n\tvar (\n\t\trouter routev3.Route\n\t\taction *routev3.Route_Route\n\t\tmatch *routev3.RouteMatch\n\t\tdecorator *routev3.Decorator\n\t\tresourcePath string\n\t\tresponseHeadersToRemove []string\n\t)\n\n\t// OPTIONS is always added even if it is not listed under resources\n\t// This is required to handle CORS preflight request fail scenario\n\tmethodRegex := strings.Join(resourceMethods, \"|\")\n\tif !strings.Contains(methodRegex, \"OPTIONS\") {\n\t\tmethodRegex = methodRegex + \"|OPTIONS\"\n\t}\n\theaderMatcherArray := routev3.HeaderMatcher{\n\t\tName: httpMethodHeader,\n\t\tHeaderMatchSpecifier: &routev3.HeaderMatcher_SafeRegexMatch{\n\t\t\tSafeRegexMatch: &envoy_type_matcherv3.RegexMatcher{\n\t\t\t\tEngineType: &envoy_type_matcherv3.RegexMatcher_GoogleRe2{\n\t\t\t\t\tGoogleRe2: &envoy_type_matcherv3.RegexMatcher_GoogleRE2{\n\t\t\t\t\t\tMaxProgramSize: nil,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tRegex: \"^(\" + methodRegex + \")$\",\n\t\t\t},\n\t\t},\n\t}\n\tresourcePath = resourcePathParam\n\troutePath := generateRoutePaths(xWso2Basepath, endpointBasepath, resourcePath)\n\n\tmatch = &routev3.RouteMatch{\n\t\tPathSpecifier: &routev3.RouteMatch_SafeRegex{\n\t\t\tSafeRegex: &envoy_type_matcherv3.RegexMatcher{\n\t\t\t\tEngineType: &envoy_type_matcherv3.RegexMatcher_GoogleRe2{\n\t\t\t\t\tGoogleRe2: &envoy_type_matcherv3.RegexMatcher_GoogleRE2{\n\t\t\t\t\t\tMaxProgramSize: nil,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tRegex: routePath,\n\t\t\t},\n\t\t},\n\t\tHeaders: []*routev3.HeaderMatcher{&headerMatcherArray},\n\t}\n\n\thostRewriteSpecifier := &routev3.RouteAction_AutoHostRewrite{\n\t\tAutoHostRewrite: &wrapperspb.BoolValue{\n\t\t\tValue: true,\n\t\t},\n\t}\n\tif apiType == mgw.WS {\n\t\tdecorator = &routev3.Decorator{\n\t\t\tOperation: endpointBasepath,\n\t\t}\n\t} else if apiType == mgw.HTTP || apiType == mgw.WEBHOOK {\n\t\tdecorator = &routev3.Decorator{\n\t\t\tOperation: resourcePath,\n\t\t}\n\t}\n\n\tvar contextExtensions = make(map[string]string)\n\tcontextExtensions[pathContextExtension] = resourcePath\n\tcontextExtensions[vHostContextExtension] = vHost\n\tif xWso2Basepath != \"\" {\n\t\tcontextExtensions[basePathContextExtension] = xWso2Basepath\n\t} else {\n\t\tcontextExtensions[basePathContextExtension] = endpointBasepath\n\t}\n\tcontextExtensions[methodContextExtension] = strings.Join(resourceMethods, \" \")\n\tcontextExtensions[apiVersionContextExtension] = version\n\tcontextExtensions[apiNameContextExtension] = title\n\t// One of these values will be selected and added as the cluster-header http header\n\t// from enhancer\n\t// Even if the routing is based on direct cluster, these properties needs to be populated\n\t// to validate the key type component in the token.\n\tcontextExtensions[\"prodClusterName\"] = prodClusterName\n\tcontextExtensions[\"sandClusterName\"] = sandClusterName\n\n\textAuthPerFilterConfig := extAuthService.ExtAuthzPerRoute{\n\t\tOverride: &extAuthService.ExtAuthzPerRoute_CheckSettings{\n\t\t\tCheckSettings: &extAuthService.CheckSettings{\n\t\t\t\tContextExtensions: contextExtensions,\n\t\t\t},\n\t\t},\n\t}\n\n\tb := proto.NewBuffer(nil)\n\tb.SetDeterministic(true)\n\t_ = b.Marshal(&extAuthPerFilterConfig)\n\textAuthzFilter := &any.Any{\n\t\tTypeUrl: extAuthzPerRouteName,\n\t\tValue: b.Bytes(),\n\t}\n\n\tvar luaPerFilterConfig lua.LuaPerRoute\n\tif !requestInterceptor.Enable && !responseInterceptor.Enable {\n\t\tluaPerFilterConfig = lua.LuaPerRoute{\n\t\t\tOverride: &lua.LuaPerRoute_Disabled{Disabled: true},\n\t\t}\n\t} else {\n\t\tluaPerFilterConfig = lua.LuaPerRoute{\n\t\t\tOverride: &lua.LuaPerRoute_SourceCode{\n\t\t\t\tSourceCode: &corev3.DataSource{\n\t\t\t\t\tSpecifier: &corev3.DataSource_InlineString{\n\t\t\t\t\t\tInlineString: getInlineLuaScript(requestInterceptor, responseInterceptor),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t}\n\n\tluaMarshelled := proto.NewBuffer(nil)\n\tluaMarshelled.SetDeterministic(true)\n\t_ = luaMarshelled.Marshal(&luaPerFilterConfig)\n\n\tluaFilter := &any.Any{\n\t\tTypeUrl: luaPerRouteName,\n\t\tValue: luaMarshelled.Bytes(),\n\t}\n\n\tif xWso2Basepath != \"\" {\n\t\taction = &routev3.Route_Route{\n\t\t\tRoute: &routev3.RouteAction{\n\t\t\t\tHostRewriteSpecifier: hostRewriteSpecifier,\n\t\t\t\t// TODO: (VirajSalaka) Provide prefix rewrite since it is simple\n\t\t\t\tRegexRewrite: &envoy_type_matcherv3.RegexMatchAndSubstitute{\n\t\t\t\t\tPattern: &envoy_type_matcherv3.RegexMatcher{\n\t\t\t\t\t\tEngineType: &envoy_type_matcherv3.RegexMatcher_GoogleRe2{\n\t\t\t\t\t\t\tGoogleRe2: &envoy_type_matcherv3.RegexMatcher_GoogleRE2{\n\t\t\t\t\t\t\t\tMaxProgramSize: nil,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tRegex: xWso2Basepath,\n\t\t\t\t\t},\n\t\t\t\t\tSubstitution: endpointBasepath,\n\t\t\t\t},\n\t\t\t\tUpgradeConfigs: getUpgradeConfig(apiType),\n\t\t\t\tMaxStreamDuration: getMaxStreamDuration(apiType),\n\t\t\t\tTimeout: ptypes.DurationProto(config.Envoy.Upstream.Timeouts.RouteTimeoutInSeconds * time.Second),\n\t\t\t\tIdleTimeout: ptypes.DurationProto(config.Envoy.Upstream.Timeouts.RouteIdleTimeoutInSeconds * time.Second),\n\t\t\t},\n\t\t}\n\t} else {\n\t\taction = &routev3.Route_Route{\n\t\t\tRoute: &routev3.RouteAction{\n\t\t\t\tHostRewriteSpecifier: hostRewriteSpecifier,\n\t\t\t},\n\t\t}\n\t}\n\n\tif prodClusterName != \"\" && sandClusterName != \"\" {\n\t\theaderBasedClusterSpecifier := &routev3.RouteAction_ClusterHeader{\n\t\t\tClusterHeader: clusterHeaderName,\n\t\t}\n\t\taction.Route.ClusterSpecifier = headerBasedClusterSpecifier\n\t\tlogger.LoggerOasparser.Debug(\"adding cluster header\")\n\t} else if prodClusterName != \"\" {\n\t\tdirectClusterSpecifier := &routev3.RouteAction_Cluster{\n\t\t\tCluster: prodClusterName,\n\t\t}\n\t\taction.Route.ClusterSpecifier = directClusterSpecifier\n\t\tlogger.LoggerOasparser.Debugf(\"adding cluster: %v\", prodClusterName)\n\t} else {\n\t\tdirectClusterSpecifier := &routev3.RouteAction_Cluster{\n\t\t\tCluster: sandClusterName,\n\t\t}\n\t\taction.Route.ClusterSpecifier = directClusterSpecifier\n\t\tlogger.LoggerOasparser.Debugf(\"adding cluster: %v\", sandClusterName)\n\t}\n\n\tif corsPolicy != nil {\n\t\taction.Route.Cors = corsPolicy\n\t}\n\t// remove the 'x-envoy-upstream-service-time' from the response.\n\tresponseHeadersToRemove = append(responseHeadersToRemove, upstreamServiceTimeHeader)\n\n\tlogger.LoggerOasparser.Debug(\"adding route \", resourcePath)\n\trouter = routev3.Route{\n\t\tName: xWso2Basepath, //Categorize routes with same base path\n\t\tMatch: match,\n\t\tAction: action,\n\t\tMetadata: nil,\n\t\tDecorator: decorator,\n\t\tTypedPerFilterConfig: map[string]*any.Any{\n\t\t\twellknown.HTTPExternalAuthorization: extAuthzFilter,\n\t\t\twellknown.Lua: luaFilter,\n\t\t},\n\t\tResponseHeadersToRemove: responseHeadersToRemove,\n\t}\n\treturn &router\n}", "title": "" }, { "docid": "53d99f410c458eb3b2eeb50d967f8fa3", "score": "0.5481725", "text": "func (a AppModuleBasic) RegisterGRPCRoutes(clientCtx client.Context, mux *runtime.ServeMux) {\n}", "title": "" }, { "docid": "a5e67573a6fb5422e21fcbb4e01b355b", "score": "0.54644346", "text": "func (h *HWSCloud) CreateRoute(ctx context.Context, clusterName string, nameHint string, route *cloudprovider.Route) error {\n\treturn nil\n}", "title": "" }, { "docid": "dd77bb15b118d668e2117e571bbdfced", "score": "0.54466397", "text": "func (AppModuleBasic) RegisterGRPCGatewayRoutes(_ client.Context, _ *runtime.ServeMux) {}", "title": "" }, { "docid": "59cc4df155769737735b2ec31f4cdab6", "score": "0.5421376", "text": "func NewRoute(name string, level string, points int, information string) Route {\n\treturn Route{\n\t\tName: name,\n\t\tLevel: level,\n\t\tPoints: points,\n\t\tInformation: information,\n\t}\n}", "title": "" }, { "docid": "2139b00d25e881bdbcf87fabbf2d5fbd", "score": "0.54117996", "text": "func (a AppModuleBasic) RegisterGRPCGatewayRoutes(_ client.Context, _ *runtime.ServeMux) {}", "title": "" }, { "docid": "b2b49b11a090278f99e1842650383246", "score": "0.5369195", "text": "func NewHttpRoute(ctx *pulumi.Context,\n\tname string, args *HttpRouteArgs, opts ...pulumi.ResourceOption) (*HttpRoute, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Hostnames == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Hostnames'\")\n\t}\n\tif args.Rules == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Rules'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource HttpRoute\n\terr := ctx.RegisterResource(\"gcp:networkservices/httpRoute:HttpRoute\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "fedfbcf44b87610d13defbf8c3bff8dc", "score": "0.5337885", "text": "func NewRoute(method, path string, handler http.Handler, opts ...RouteOption) Route {\n\tr := Route{\n\t\tMethod: method,\n\t\tPattern: path,\n\t\tHandler: handler,\n\t}\n\n\tfor _, o := range opts {\n\t\to(&r)\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "8144f15fb6f5a35a8e751a414f8f83cb", "score": "0.52710783", "text": "func NewRoute(pfx *net.Prefix, p *Path) *Route {\n\tr := &Route{\n\t\tpfx: pfx,\n\t}\n\n\tif p == nil {\n\t\tr.paths = make([]*Path, 0, 2)\n\t\treturn r\n\t}\n\n\tr.paths = append(r.paths, p)\n\treturn r\n}", "title": "" }, { "docid": "548a1f9cd6c1b1db2050adf29a94a123", "score": "0.52187777", "text": "func RouteSpec_Grpc(options *GrpcRouteSpecOptions) RouteSpec {\n\t_init_.Initialize()\n\n\tvar returns RouteSpec\n\n\t_jsii_.StaticInvoke(\n\t\t\"monocdk.aws_appmesh.RouteSpec\",\n\t\t\"grpc\",\n\t\t[]interface{}{options},\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "d37116ee6769fcde2fd6e6509e0ea081", "score": "0.5202755", "text": "func (r *Mediator) RegisterGRPCGateway(_ *runtime.ServeMux, _ string, _ ...grpc.DialOption) {\n}", "title": "" }, { "docid": "e21fed9e5b11ba6f810b21644c90167c", "score": "0.51945865", "text": "func NewCmdCreatePassthroughRoute(f kcmdutil.Factory, streams genericclioptions.IOStreams) *cobra.Command {\n\to := &CreatePassthroughRouteOptions{\n\t\tCreateRouteSubcommandOptions: NewCreateRouteSubcommandOptions(streams),\n\t}\n\tcmd := &cobra.Command{\n\t\tUse: \"passthrough [NAME] --service=SERVICE\",\n\t\tShort: \"Create a route that uses passthrough TLS termination\",\n\t\tLong: passthroughRouteLong,\n\t\tExample: passthroughRouteExample,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tkcmdutil.CheckErr(o.Complete(f, cmd, args))\n\t\t\tkcmdutil.CheckErr(o.Run())\n\t\t},\n\t}\n\tcmd.Flags().StringVar(&o.Hostname, \"hostname\", o.Hostname, \"Set a hostname for the new route\")\n\tcmd.Flags().StringVar(&o.Port, \"port\", o.Port, \"Name of the service port or number of the container port the route will route traffic to\")\n\tcmd.Flags().StringVar(&o.InsecurePolicy, \"insecure-policy\", o.InsecurePolicy, \"Set an insecure policy for the new route\")\n\tcmd.Flags().StringVar(&o.Service, \"service\", o.Service, \"Name of the service that the new route is exposing\")\n\tcmd.MarkFlagRequired(\"service\")\n\tcmd.Flags().StringVar(&o.WildcardPolicy, \"wildcard-policy\", o.WildcardPolicy, \"Sets the WilcardPolicy for the hostname, the default is \\\"None\\\". valid values are \\\"None\\\" and \\\"Subdomain\\\"\")\n\n\tkcmdutil.AddValidateFlags(cmd)\n\to.CreateRouteSubcommandOptions.AddFlags(cmd)\n\tkcmdutil.AddDryRunFlag(cmd)\n\n\treturn cmd\n}", "title": "" }, { "docid": "2e23504f01fb009e0c0d10a03c895733", "score": "0.5159006", "text": "func NewRoute(url string, h BoneHandler) *Route {\n\tr := &Route{Path: url, Handler: h}\n\tr.save()\n\treturn r\n}", "title": "" }, { "docid": "f8c6f2d3a1a418ca869384a397860e57", "score": "0.51494604", "text": "func RPCNew(_ *cobra.Command, args []string) error {\n\trpcname := args[0]\n\text := filepath.Ext(rpcname)\n\tif len(ext) > 0 {\n\t\treturn fmt.Errorf(\"unexpected ext: %s\", ext)\n\t}\n\tstyle := VarStringStyle\n\thome := VarStringHome\n\tremote := VarStringRemote\n\tbranch := VarStringBranch\n\tverbose := VarBoolVerbose\n\tif len(remote) > 0 {\n\t\trepo, _ := util.CloneIntoGitHome(remote, branch)\n\t\tif len(repo) > 0 {\n\t\t\thome = repo\n\t\t}\n\t}\n\tif len(home) > 0 {\n\t\tpathx.RegisterGoctlHome(home)\n\t}\n\n\tprotoName := rpcname + \".proto\"\n\tfilename := filepath.Join(\".\", rpcname, protoName)\n\tsrc, err := filepath.Abs(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = generator.ProtoTmpl(src)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar ctx generator.ZRpcContext\n\tctx.Src = src\n\tctx.GoOutput = filepath.Dir(src)\n\tctx.GrpcOutput = filepath.Dir(src)\n\tctx.IsGooglePlugin = true\n\tctx.Output = filepath.Dir(src)\n\tctx.ProtocCmd = fmt.Sprintf(\"protoc -I=%s %s --go_out=%s --go-grpc_out=%s\", filepath.Dir(src), filepath.Base(src), filepath.Dir(src), filepath.Dir(src))\n\tctx.IsGenClient = VarBoolClient\n\n\tgrpcOptList := VarStringSliceGoGRPCOpt\n\tif len(grpcOptList) > 0 {\n\t\tctx.ProtocCmd += \" --go-grpc_opt=\" + strings.Join(grpcOptList, \",\")\n\t}\n\n\tgoOptList := VarStringSliceGoOpt\n\tif len(goOptList) > 0 {\n\t\tctx.ProtocCmd += \" --go_opt=\" + strings.Join(goOptList, \",\")\n\t}\n\n\tg := generator.NewGenerator(style, verbose)\n\treturn g.Generate(&ctx)\n}", "title": "" }, { "docid": "d948e6a8ed4e40097a3ab0d9b161c5c5", "score": "0.51260275", "text": "func NewRoute(method string, path string, h http.HandlerFunc) Route {\n\tformat := formatRegex.ReplaceAllString(path, \"%s\")\n\tformat = strings.Trim(format, \"/\")\n\treturn Route{method, path, format, h}\n}", "title": "" }, { "docid": "72587df47738a9f31babd39984dcc03c", "score": "0.51075095", "text": "func (d *SDKSteps) RegisterRoute(agentID, varName, routerID string) error {\n\tgo d.ApproveRequest(routerID, nil)\n\n\terr := d.bddContext.RouteClients[agentID].Register(d.bddContext.Args[varName])\n\tif err != nil {\n\t\treturn fmt.Errorf(\"register route : %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "70543fefd1d3cec60c99ccf78d14940f", "score": "0.5096284", "text": "func NewRoute(method, path string, handler httputils.APIFunc) Route {\n\treturn route{method, path, handler}\n}", "title": "" }, { "docid": "6411c661d1e91f1a5685938baab6b895", "score": "0.50921327", "text": "func NewRoute(method, path string, handler ServiceHandler) Route {\n\treturn Route{\n\t\tMethod: method,\n\t\tPath: path,\n\t\tHandler: handler,\n\t}\n}", "title": "" }, { "docid": "fc49e8e7c690e6d5f958cad8a3e68813", "score": "0.50776786", "text": "func NewRoute(url string, h http.Handler) *Route {\n\tr := &Route{Path: url, Handler: h}\n\tr.save()\n\treturn r\n}", "title": "" }, { "docid": "e7059b3b66d7e6e610cc2f4495377123", "score": "0.50683695", "text": "func (ø *Router) NewRoute() *Route { return &Route{ø.Router.NewRoute()} }", "title": "" }, { "docid": "fa9ffa1e823662c10672c7137db688b4", "score": "0.5043494", "text": "func New(o Options) *Routing {\n\tr := &Routing{}\n\tinitialMatcher, _ := newMatcher(nil, MatchingOptionsNone)\n\tr.matcher.Store(initialMatcher)\n\tr.startReceivingUpdates(o)\n\treturn r\n}", "title": "" }, { "docid": "833acd82e982ad7b74ca1a70f7a84597", "score": "0.50278014", "text": "func NewRoute() *Route {\n\treturn &Route{}\n}", "title": "" }, { "docid": "1641e244b675c7a53f4cc36e90687c69", "score": "0.5027385", "text": "func NewRouteForCR(m *v1alpha1.Interconnect, listener v1alpha1.Listener) *routev1.Route {\n\ttarget := listener.Name\n\tif target == \"\" {\n\t\ttarget = strconv.Itoa(int(listener.Port))\n\t}\n\tlabels := selectors.LabelsForInterconnect(m.Name)\n\troute := &routev1.Route{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"Route\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tLabels: labels,\n\t\t\tName: m.Name + \"-\" + target,\n\t\t\tNamespace: m.Namespace,\n\t\t},\n\t\tSpec: routev1.RouteSpec{\n\t\t\tPath: \"\",\n\t\t\tPort: &routev1.RoutePort{\n\t\t\t\tTargetPort: intstr.FromInt(int(listener.Port)),\n\t\t\t},\n\t\t\tTo: routev1.RouteTargetReference{\n\t\t\t\tKind: \"Service\",\n\t\t\t\tName: m.Name,\n\t\t\t},\n\t\t},\n\t}\n\tif listener.SslProfile != \"\" {\n\t\troute.Spec.TLS = &routev1.TLSConfig{\n\t\t\tTermination: routev1.TLSTerminationPassthrough,\n\t\t\tInsecureEdgeTerminationPolicy: routev1.InsecureEdgeTerminationPolicyNone,\n\t\t}\n\t} else {\n\t\troute.Spec.TLS = &routev1.TLSConfig{\n\t\t\tTermination: routev1.TLSTerminationEdge,\n\t\t\tInsecureEdgeTerminationPolicy: routev1.InsecureEdgeTerminationPolicyRedirect,\n\t\t}\n\t}\n\treturn route\n}", "title": "" }, { "docid": "d197862a4a96afefc6f1fa871b8186a4", "score": "0.5000342", "text": "func NewRoute(in *NewRouteInput) *Route {\n\t// TODO: validate\n\troute := Route{in.Path, in.StaticHandlerFunc, nil}\n\troute.HandlerFunc = func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Write(route.StaticHandlerFunc(r))\n\t\tin.Callback(w)\n\t}\n\treturn &route\n}", "title": "" }, { "docid": "d1d689c9d0ca669cdb5601cf23ef5587", "score": "0.4986397", "text": "func (registry *Etcd) CreateRoute(route *api.Route) error {\n\terr := registry.CreateObj(makeRouteKey(route.ID), route, 0)\n\treturn etcderr.InterpretCreateError(err, \"route\", route.ID)\n}", "title": "" }, { "docid": "ac7bdcff5c33db857185d23a4a5588c9", "score": "0.4955091", "text": "func (r *HttpRouter) GenerateRoute(client client.Client, scheme *runtime.Scheme, virtualEnv *envv1alpha2.VirtualEnvironment,\n\tnamespace string, svcName string, availableLabels []string, relatedDeployments []string) error {\n\tshouldBeDeleted, err := r.reconcileVirtualService(client, scheme, virtualEnv, namespace, svcName, availableLabels, relatedDeployments)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn r.reconcileDestinationRule(client, scheme, virtualEnv, namespace, svcName, relatedDeployments, shouldBeDeleted)\n}", "title": "" }, { "docid": "b6e3ecf442ee0895a92585017bd1ae3a", "score": "0.49325174", "text": "func New(opts Options) (*RouteServer, error) {\n\trs := &RouteServer{}\n\n\topentracingOpts := opts.OpenTracing\n\tif len(opentracingOpts) == 0 {\n\t\topentracingOpts = []string{\"noop\"}\n\t}\n\ttracer, err := tracing.InitTracer(opentracingOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tb := &eskipBytes{tracer: tracer}\n\tbs := &eskipBytesStatus{b: b}\n\thandler := http.NewServeMux()\n\thandler.Handle(\"/health\", bs)\n\thandler.Handle(\"/routes\", b)\n\thandler.Handle(\"/metrics\", promhttp.Handler())\n\trs.server = &http.Server{Addr: opts.Address, Handler: handler}\n\n\tdataclient, err := kubernetes.New(kubernetes.Options{\n\t\tAllowedExternalNames: opts.KubernetesAllowedExternalNames,\n\t\tBackendNameTracingTag: opts.OpenTracingBackendNameTag,\n\t\tDefaultFiltersDir: opts.DefaultFiltersDir,\n\t\tKubernetesInCluster: opts.KubernetesInCluster,\n\t\tKubernetesURL: opts.KubernetesURL,\n\t\tKubernetesNamespace: opts.KubernetesNamespace,\n\t\tKubernetesEnableEastWest: opts.KubernetesEnableEastWest,\n\t\tKubernetesEastWestDomain: opts.KubernetesEastWestDomain,\n\t\tKubernetesEastWestRangeDomains: opts.KubernetesEastWestRangeDomains,\n\t\tKubernetesEastWestRangePredicates: opts.KubernetesEastWestRangePredicates,\n\t\tHTTPSRedirectCode: opts.KubernetesHTTPSRedirectCode,\n\t\tIngressClass: opts.KubernetesIngressClass,\n\t\tOnlyAllowedExternalNames: opts.KubernetesOnlyAllowedExternalNames,\n\t\tOriginMarker: opts.OriginMarker,\n\t\tPathMode: opts.KubernetesPathMode,\n\t\tProvideHealthcheck: opts.KubernetesHealthcheck,\n\t\tProvideHTTPSRedirect: opts.KubernetesHTTPSRedirect,\n\t\tReverseSourcePredicate: opts.ReverseSourcePredicate,\n\t\tRouteGroupClass: opts.KubernetesRouteGroupClass,\n\t\tWhitelistedHealthCheckCIDR: opts.WhitelistedHealthCheckCIDR,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\trs.poller = &poller{\n\t\tclient: dataclient,\n\t\ttimeout: opts.SourcePollTimeout,\n\t\tb: b,\n\t\tquit: make(chan struct{}),\n\t\ttracer: tracer,\n\t}\n\n\trs.wg = &sync.WaitGroup{}\n\n\treturn rs, nil\n}", "title": "" }, { "docid": "82d96b227943a48cec26587a175f6136", "score": "0.49278396", "text": "func (r Resource) createOpenshiftRoute(serviceName string) error {\n\tannotations := make(map[string]string)\n\tannotations[\"haproxy.router.openshift.io/timeout\"] = \"2m\"\n\n\troute := &routesv1.Route{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: serviceName,\n\t\t\tAnnotations: annotations,\n\t\t},\n\t\tSpec: routesv1.RouteSpec{\n\t\t\tTo: routesv1.RouteTargetReference{\n\t\t\t\tKind: \"Service\",\n\t\t\t\tName: serviceName,\n\t\t\t},\n\t\t\tTLS: &routesv1.TLSConfig{\n\t\t\t\tTermination: \"edge\",\n\t\t\t\tInsecureEdgeTerminationPolicy: \"Redirect\",\n\t\t\t},\n\t\t},\n\t}\n\t_, err := r.RoutesClient.RouteV1().Routes(r.Defaults.Namespace).Create(route)\n\treturn err\n}", "title": "" }, { "docid": "52992b22a3e6fc715f62c382a4518de5", "score": "0.49170893", "text": "func CreateFlightsRoute(w http.ResponseWriter, r *http.Request) {\n\n\targs := os.Args[1:]\n\tif len(args) == 0 {\n\t\tfmt.Println(\"Please specify the file name: input-routes.csv\")\n\t\tos.Exit(0)\n\t}\n\n\trequestBody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponses.Error(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tvar flight models.Flight\n\tif err = json.Unmarshal(requestBody, &flight); err != nil {\n\t\tresponses.Error(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\trepository, _ := repositories.FlightRepository(models.PathFile + args[0])\n\tflightRoutes := models.FlightRoute(repository)\n\n\tif err = flightRoutes.CreateFlight(&flight); err != nil {\n\t\tresponses.Error(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tresponses.JSON(w, http.StatusCreated, flight)\n}", "title": "" }, { "docid": "294e68571b44fdc3ec55dc72b1b6fcae", "score": "0.4915849", "text": "func createRoute(route string) string {\n\treturn filepath.Join(BaseRoute, route)\n}", "title": "" }, { "docid": "ade53717788e1dc3fd4949557c6dd2d1", "score": "0.49050277", "text": "func (h Handler) AddRocket(ctx context.Context, req *rkt.AddRocketRequest) (*rkt.AddRocketResponse, error) {\n\tlog.Print(\"Add Rocket gRPC endpoint hit\")\n\n\tif _, err := uuid.Parse(req.Rocket.Id); err != nil {\n\t\terrorStatus := status.Error(codes.InvalidArgument, \"UUID is not valid\")\n\t\tlog.Print(\"Given UUID is not valid\")\n\t\treturn &rkt.AddRocketResponse{}, errorStatus\n\t}\n\n\tnewRkt, err := h.RocketService.InsertRocket(ctx, rocket.Rocket{\n\t\tID: req.Rocket.Id,\n\t\tType: req.Rocket.Type,\n\t\tName: req.Rocket.Name,\n\t})\n\tif err != nil {\n\t\tlog.Print(\"failed to insert rocket into database\")\n\t\treturn &rkt.AddRocketResponse{}, err\n\t}\n\treturn &rkt.AddRocketResponse{\n\t\tRocket: &rkt.Rocket{\n\t\t\tId: newRkt.ID,\n\t\t\tType: newRkt.Type,\n\t\t\tName: newRkt.Name,\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "ca9c3d6c9ed1ed7a05fda4d620c2a5df", "score": "0.49032822", "text": "func New(config *Config) *RoutingListener {\n\tobservers = make(map[string]Observer)\n\tforwardsInFlight = make(map[uint64]*Event)\n\n\tmacaroonBytes, err := ioutil.ReadFile(config.MacaroonPath)\n\tif err != nil {\n\t\tlog.Fatal(\"Cannot read macaroon file\", err)\n\t}\n\n\tmac := &macaroon.Macaroon{}\n\tif err = mac.UnmarshalBinary(macaroonBytes); err != nil {\n\t\tlog.Fatal(\"Cannot unmarshal macaroon\", err)\n\t}\n\n\terr = os.Setenv(\"GRPC_SSL_CIPHER_SUITES\", \"HIGH+ECDSA\")\n\tif err != nil {\n\t\tlog.Fatal(\"Cannot set environment variable GRPC_SSL_CIPHER_SUITES\")\n\t}\n\n\tcreds, err := credentials.NewClientTLSFromFile(config.CertPath, \"\")\n\tif err != nil {\n\t\tlog.Fatal(\"Cannot load credentials from CertPath: \", config.CertPath)\n\t}\n\n\topts := []grpc.DialOption{\n\t\tgrpc.WithTransportCredentials(creds),\n\t\tgrpc.WithPerRPCCredentials(macaroons.NewMacaroonCredential(mac)),\n\t}\n\n\tconn, err := grpc.Dial(config.RpcHost, opts...)\n\tif err != nil {\n\t\tlog.Fatalf(\"Cannot connect to %s with cert %s\\n\", config.RpcHost, config.CertPath)\n\t}\n\n\trouter = routerrpc.NewRouterClient(conn)\n\tlndcli = lnrpc.NewLightningClient(conn)\n\n\treturn &RoutingListener{}\n}", "title": "" }, { "docid": "67b9eb78a0b235ffa78cdfd90d774d86", "score": "0.48924854", "text": "func (AppModuleBasic) RegisterGRPCGatewayRoutes(clientCtx client.Context, mux *runtime.ServeMux) {\n\t// this line is used by starport scaffolding # 2\n}", "title": "" }, { "docid": "630a71aedd424d005cc8816fd2d4fd91", "score": "0.48761168", "text": "func NewCfnRoute(scope awscdk.Construct, id *string, props *CfnRouteProps) CfnRoute {\n\t_init_.Initialize()\n\n\tj := jsiiProxy_CfnRoute{}\n\n\t_jsii_.Create(\n\t\t\"monocdk.aws_appmesh.CfnRoute\",\n\t\t[]interface{}{scope, id, props},\n\t\t&j,\n\t)\n\n\treturn &j\n}", "title": "" }, { "docid": "4e628f150109e139ec61985a2f77d848", "score": "0.48739445", "text": "func (c *Cloud) CreateRoute(clusterName string, nameHint string, tableid string, route *cloudprovider.Route) error {\n\tglog.V(2).Infof(\"Alicloud.CreateRoute(\\\"%s, %+v\\\")\", clusterName, route)\n\tins, err := c.climgr.Instances().findInstanceByProviderID(string(route.TargetNode))\n\tif err != nil {\n\t\treturn err\n\t}\n\tcRoute := &cloudprovider.Route{\n\t\tName: fmt.Sprintf(\"%s.%s\", ins.RegionId, ins.InstanceId),\n\t\tDestinationCIDR: route.DestinationCIDR,\n\t\tTargetNode: types.NodeName(ins.InstanceId),\n\t}\n\treturn c.climgr.Routes().CreateRoute(tableid, cRoute, ins.RegionId, ins.VpcAttributes.VpcId)\n}", "title": "" }, { "docid": "c465ab1731dc319166b252192cfee063", "score": "0.4873546", "text": "func GatewayRouteSpec_Grpc(options *GrpcGatewayRouteSpecOptions) GatewayRouteSpec {\n\t_init_.Initialize()\n\n\tvar returns GatewayRouteSpec\n\n\t_jsii_.StaticInvoke(\n\t\t\"monocdk.aws_appmesh.GatewayRouteSpec\",\n\t\t\"grpc\",\n\t\t[]interface{}{options},\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "859fd27b17a414e6e581eb3dced11f20", "score": "0.4863319", "text": "func NewRoute(method, path string, handler http.HandlerFunc) *Route {\n\tr := &Route{\n\t\tMethod: method,\n\t\tPath: path,\n\t\tHandler: handler,\n\t}\n\treturn r\n}", "title": "" }, { "docid": "926cc9a0c553066b3c94159937df1cea", "score": "0.48471186", "text": "func newGateway(ctx context.Context, serverPort int) (http.Handler, error) {\n\tlogrus.Info(\"Instantiating gRPC Gateway\")\n\n\t// gRPC dial up options\n\topts := []grpc.DialOption{\n\t\t//grpc.WithBlock(),\n\t\tgrpc.WithInsecure(),\n\t}\n\t// Create gRPC connection\n\tconn, err := grpc.Dial(fmt.Sprintf(\"%s:%d\", grpcServerAddr, serverPort), opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Changes json serializer to include empty fields with default values\n\tgwMux := runtime.NewServeMux(\n\t\truntime.WithMarshalerOption(runtime.MIMEWildcard, &runtime.JSONPb{OrigName: true, EmitDefaults: true}),\n\t\truntime.WithProtoErrorHandler(runtime.DefaultHTTPProtoErrorHandler),\n\t)\n\n\t// Register Gateway endpoints\n\t// If Rancher adapter enabled\n\tif viper.GetBool(common.EnvApphcAdaptersRancherEnabled) {\n\t\t// Register Application manager service\n\t\tlogrus.Info(\"Registering HTTP handlers for service AppManager\")\n\t\tif err := pbappmgr.RegisterAppManagerHandler(ctx, gwMux, conn); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// Register AppHoster Controller manager service\n\tif err := apphcmanager.RegisterApphcManagerHandler(ctx, gwMux, conn); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Register AppHoster Cluster manager service\n\tif err := clustermanager.RegisterClusterManagerHandler(ctx, gwMux, conn); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn gwMux, nil\n}", "title": "" }, { "docid": "25f84d4c1159373af8b53f487fc7ceb1", "score": "0.4839128", "text": "func NewRoute(pattern string, handler http.Handler, opts ...RouteOption) *Route {\n\tif !strings.HasPrefix(pattern, \"/\") {\n\t\tpattern = \"/\" + pattern\n\t}\n\tr := &Route{\n\t\tpattern: pattern,\n\t\tmethods: make(map[string]struct{}),\n\t\tmiddleware: make([]func(http.Handler) http.Handler, 0),\n\t}\n\tfor _, option := range opts {\n\t\toption(r)\n\t}\n\tr.build(handler)\n\treturn r\n}", "title": "" }, { "docid": "3c82aae27cc336dc606d133a2c4bfa6e", "score": "0.48387462", "text": "func NewRoute(addr string) *Route {\n\troute := Route{engine: gin.Default(), groups: map[string]*gin.RouterGroup{},\n\t\tserver: &http.Server{Addr: addr}, Address: addr}\n\troute.server.Handler = route.engine\n\treturn &route\n}", "title": "" }, { "docid": "6f263f1b2615349377a6f828c86fcb64", "score": "0.48234123", "text": "func (r *RoutesClient) CreateRoute(ctx context.Context, tabid string, route *cloudprovider.Route, region common.Region, vpcid string) error {\n\tdescribeRouteEntryListArgs := &ecs.DescribeRouteEntryListArgs{\n\t\tRegionId: r.region,\n\t\tRouteTableId: tabid,\n\t\tRouteEntryType: string(ecs.RouteTableCustom),\n\t\tDestinationCidrBlock: route.DestinationCIDR,\n\t\tNextHopId: string(route.TargetNode),\n\t}\n\tresponse, err := r.client.DescribeRouteEntryList(ctx, describeRouteEntryListArgs)\n\tif err != nil || response == nil {\n\t\treturn fmt.Errorf(\"describe table %s RouteEntry list error, %v\", tabid, err)\n\t}\n\n\tif len(response.RouteEntrys.RouteEntry) > 0 {\n\t\tklog.Infof(\"CreateRoute: skip exist route, %s -> %s\", route.DestinationCIDR, route.TargetNode)\n\t\treturn nil\n\t}\n\n\targs := &ecs.CreateRouteEntryArgs{\n\t\tClientToken: \"\",\n\t\tRouteTableId: tabid,\n\t\tDestinationCidrBlock: route.DestinationCIDR,\n\t\tNextHopType: ecs.NextHopInstance,\n\t\tNextHopId: string(route.TargetNode),\n\t}\n\tklog.Infof(\"CreateRoute:[%s] start to create route, %s -> %s\", tabid, route.DestinationCIDR, route.TargetNode)\n\treturn WaitCreate(ctx, r, tabid, args)\n}", "title": "" }, { "docid": "b038c4fb96df87366aa5ad8bcf19a327", "score": "0.48127526", "text": "func addRoute(devName string, r *net.IPNet) error {\n\tcmd := exec.Command(\"ip\", \"r\", \"add\", r.String(), \"dev\", devName)\n\treturn cmd.Run()\n}", "title": "" }, { "docid": "4f724a0bc5e1daceba1486b4c8abce7c", "score": "0.47953144", "text": "func AddRoute(name, method, pattern string, handler http.HandlerFunc) {\n route := Route{\n Name: name,\n Method: strings.ToUpper(method),\n Pattern: pattern,\n Handler: handler,\n }\n\n allRoutes = append(allRoutes, route)\n}", "title": "" }, { "docid": "1eadfc3ca3679630edb76f4407f5fed5", "score": "0.47932455", "text": "func NewServer(address string) *Grpc {\n\treturn &Grpc{\n\t\taddress: address,\n\t}\n}", "title": "" }, { "docid": "1d25aa706b4180bf6930fd226f726d82", "score": "0.47791192", "text": "func CreateUploadRoute(userInput userinput.UserInput) {\n\tvar ip string\n\tif userInput.LocalIP == \"\" {\n\t\tip, _ = netutils.GetLocalIP()\n\t\tif ip == \"\" {\n\t\t\tlog.Error().Msg(\"Unable to get local IP address\")\n\t\t}\n\t} else {\n\t\tip = userInput.LocalIP\n\t}\n\tif _, err := os.Stat(\"keys\"); os.IsNotExist(err) {\n\t\tsystem.CreateDirectories([]string{\"keys\"})\n\t}\n\n\thttp.HandleFunc(\"/upload\", fileUploader)\n\thttp.HandleFunc(\"/org\", orgUpload)\n\tproto := \"http\"\n\tif userInput.ServeSSL {\n\t\tproto = \"https\"\n\t}\n\tmoseutils.ColorMsgf(\"Listener being served at %s://%s:%d/%s-%s for %d seconds\", proto, ip, userInput.ExfilPort, userInput.CMTarget, userInput.OSTarget, userInput.TimeToServe)\n\tsrv := netutils.StartServer(userInput.ExfilPort, \"\", userInput.ServeSSL, userInput.SSLCertPath, userInput.SSLKeyPath, time.Duration(userInput.TimeToServe)*time.Second, false)\n\n\tlog.Info().Msg(\"Web server shutting down...\")\n\n\tif err := srv.Shutdown(context.Background()); err != nil {\n\t\tlog.Fatal().Err(err).Msg(\"\")\n\t}\n}", "title": "" }, { "docid": "551bbed60b118b54e3d2802e021e7038", "score": "0.47571576", "text": "func (o *Ocelot) Register(method string, path string, h HandlerFunc) {\r\n\tm := strings.ToUpper(method)\r\n\r\n\to.routes[m+path] = route{\r\n\t\tmethod: m,\r\n\t\tpath: path,\r\n\t\thandler: h,\r\n\t}\r\n}", "title": "" }, { "docid": "b5802ffde39108d5f613c1d2371a194d", "score": "0.47388652", "text": "func (wss *WSServer) NewRoute(path string) *wsRoute {\n\twsr := newWSRoute()\n\tif wss.countConnection {\n\t\twsr.SetCountConnection(wss.countConnection, wss.instanceId)\n\t}\n\twss.routing[path] = wsr\n\n\t// bind this coordinator to path\n\twss.mux.Handle(path, websocket.Handler(func(conn *websocket.Conn) {\n\t\tcon := newConnection(wss.genConId(), conn, wss.Timeout)\n\t\tif wss.ConnectionTimeout != 0 {\n\t\t\tcon.timeout = wss.ConnectionTimeout\n\t\t}\n\t\twsr.addCon(con)\n\n\t\t// setup handler\n\t\tif wsr.OnConnected != nil {\n\t\t\twsr.OnConnected(con)\n\t\t}\n\n\t\t// chatting with client\n\t\twsr.transferring(con)\n\t}))\n\n\treturn wsr\n}", "title": "" }, { "docid": "f98552f994ba0b00b3f632e381a6cb57", "score": "0.47229552", "text": "func NewRoute(path string, Handler http.HandlerFunc, method ...string) Route {\n\tpg := PropertyGroup{\n\t\tproperties: make(map[string]Props),\n\t}\n\treturn Route{\n\t\tpath: path,\n\t\tmethod: method,\n\t\thandler: Handler,\n\t\tprops: pg,\n\t}\n}", "title": "" }, { "docid": "2f2b0f8326b4a85397cacb1f3cc3b516", "score": "0.47218156", "text": "func NewGatewayRoute(ctx *pulumi.Context,\n\tname string, args *GatewayRouteArgs, opts ...pulumi.ResourceOption) (*GatewayRoute, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.MeshName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'MeshName'\")\n\t}\n\tif args.Spec == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Spec'\")\n\t}\n\tif args.VirtualGatewayName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'VirtualGatewayName'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource GatewayRoute\n\terr := ctx.RegisterResource(\"aws-native:appmesh:GatewayRoute\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "b33fdcb35997598a5adc1b70e2669a8c", "score": "0.47181863", "text": "func (api *API) addRoute(w http.ResponseWriter, req *http.Request) {\n\n\tdefer req.Body.Close()\n\tbody, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tapi.respondError(w, apiError{typ: errorBadData, err: err}, nil)\n\t\treturn\n\t}\n\n\treceiver := config.Receiver{}\n\tif err := json.Unmarshal(body, &receiver); err != nil {\n\t\tapi.respondError(w, apiError{typ: errorBadData, err: err}, nil)\n\t\treturn\n\t}\n\tif receiver.Name == \"\" {\n\t\tapi.respondError(w, apiError{typ: errorBadData, err: fmt.Errorf(\"missing receiver name \")}, nil)\n\t\treturn\n\t}\n\n\tcr := config.ConfigChangeRequest{\n\t\tAction: config.AddRouteAction,\n\t\tReceiver: &receiver,\n\t\tRoute: &config.Route{\n\t\t\tReceiver: receiver.Name,\n\t\t\tContinue: true,\n\t\t},\n\t}\n\n\tif err := cr.Validate(); err != nil {\n\t\tapi.respondError(w, apiError{err: err, typ: errorInternal}, fmt.Sprintf(\"failed to update channel (%s)\", receiver.Name))\n\t\treturn\n\t}\n\n\t// write Route to disk\n\tapi.updateConfigCh <- &cr\n\n\tif err := <-api.updateConfigErrCh; err != nil {\n\t\tapi.respondError(w, apiError{err: err, typ: errorInternal}, fmt.Sprintf(\"failed to update channel (%s)\", receiver.Name))\n\t\treturn\n\t}\n\n\tapi.respond(w, nil)\n}", "title": "" }, { "docid": "8853ca80bf64bcfda0f8bd84bfe990e0", "score": "0.471214", "text": "func NewRoute(router *Router) RouteInterface {\n\treturn &Route{\n\t\trouter: router,\n\t\tms: Matchers([]Matcher{}),\n\t\tvarIndexies: make(map[string]int),\n\t}\n}", "title": "" }, { "docid": "f44671822be6a928ddd94ba337f596ab", "score": "0.47088036", "text": "func (s *RouteCRUD) Create(arg ...crud.Arg) (crud.Arg, error) {\n\tevent := eventFromArg(arg[0])\n\troute := routeFromStuct(event)\n\tprint.CreatePrintln(\"creating route\", route.Identifier())\n\treturn route, nil\n}", "title": "" }, { "docid": "747c3be541d9f6ea0c0315903e0cc9e6", "score": "0.47072703", "text": "func New(r *chi.Mux, svc *user.Service) {\n}", "title": "" }, { "docid": "20e12f497f2dd6b09d21c2715fa3a0a0", "score": "0.4706171", "text": "func (r *reconciler) createCanaryRoute(route *routev1.Route) error {\n\tif err := r.client.Create(context.TODO(), route); err != nil {\n\t\treturn fmt.Errorf(\"failed to create canary route %s/%s: %v\", route.Namespace, route.Name, err)\n\t}\n\n\tlog.Info(\"created canary route\", \"namespace\", route.Namespace, \"name\", route.Name)\n\treturn nil\n}", "title": "" }, { "docid": "5ca572a730d8f25aaa20efe509689290", "score": "0.46971327", "text": "func NewRouter(lc fx.Lifecycle, config *utils.GraphQLConfig) chi.Router {\n\tlog.Infof(\"proto %v\", config.ApproveGrantProtoHost)\n\tport := strconv.Itoa(config.GqlPort)\n\tif port == \"\" {\n\t\tport = defaultPort\n\t}\n\trouter := chi.NewRouter()\n\n\t// Some middleware bits for tracking\n\trouter.Use(middleware.RequestID)\n\trouter.Use(middleware.RealIP)\n\trouter.Use(middleware.Logger)\n\trouter.Use(middleware.Recoverer)\n\n\tcors := cors.New(cors.Options{\n\t\tAllowedOrigins: validCorsOrigins,\n\t\tAllowedMethods: []string{\"GET\", \"POST\", \"PUT\", \"DELETE\", \"OPTIONS\"},\n\t\tAllowedHeaders: []string{\"Accept\", \"Authorization\", \"Content-Type\"},\n\t\tAllowCredentials: true,\n\t\tMaxAge: 300,\n\t\tDebug: true,\n\t})\n\trouter.Use(cors.Handler)\n\n\tlc.Append(fx.Hook{\n\t\tOnStart: func(context.Context) error {\n\t\t\tlog.Info(\"Starting HTTP server.\")\n\t\t\tgo func() {\n\t\t\t\terr := http.ListenAndServe(\":\"+port, router)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorf(\"Error starting HTTP server, %v\", err)\n\t\t\t\t}\n\t\t\t}()\n\t\t\treturn nil\n\t\t},\n\t\tOnStop: func(ctx context.Context) error {\n\t\t\tlog.Info(\"Stopping HTTP server.\")\n\t\t\treturn nil\n\t\t},\n\t})\n\n\treturn router\n}", "title": "" }, { "docid": "d869424c357f67dd6bec1a22611dd81e", "score": "0.46961844", "text": "func NewUserRoute(router *gin.Engine, deps *shared.Deps) {\n\tbindRoutes(router, deps)\n}", "title": "" }, { "docid": "69df60553f42954f4fba780bcd6a4a37", "score": "0.4693716", "text": "func (p *politeiawww) addRoute(method string, routeVersion string, route string, handler http.HandlerFunc, perm permission) {\n\tfullRoute := routeVersion + route\n\n\tswitch perm {\n\tcase permissionAdmin:\n\t\thandler = logging(p.isLoggedInAsAdmin(handler))\n\tcase permissionLogin:\n\t\thandler = logging(p.isLoggedIn(handler))\n\tdefault:\n\t\thandler = logging(handler)\n\t}\n\n\t// All handlers need to close the body\n\thandler = closeBody(handler)\n\n\tif method == \"\" {\n\t\t// Websocket\n\t\tlog.Tracef(\"Adding websocket: %v\", fullRoute)\n\t\tp.router.StrictSlash(true).HandleFunc(fullRoute, handler)\n\t} else {\n\t\tp.router.StrictSlash(true).HandleFunc(fullRoute, handler).Methods(method)\n\t}\n}", "title": "" }, { "docid": "a00870ee9a820bd7bc3e225591907c88", "score": "0.46896252", "text": "func (bot *Bot) Route(trigger string, call TriggerCall, description string, info BotInfo) {\n\tbot.router.Add(trigger, call, description, info)\n}", "title": "" }, { "docid": "9336ff045330ad813c3ac4a64ded93a6", "score": "0.46857983", "text": "func broadcastNewRoute(g *Gossiper) {\n\t// broadcast a new route message to all known peers\n\tpeers := g.peerSet.ToPeerArray()\n\tfor _, peer := range peers {\n\n\t\tnextSeq := g.vectorClock.Get(g.Parameters.Identifier)\n\n\t\trouterumor := RumorMessage{\n\t\t\tOrigin: g.Parameters.Identifier,\n\t\t\tID: nextSeq,\n\t\t\tText: \"\",\n\t\t}\n\n\t\tcommon.Log(*routerumor.MongeringString(peer.Address), common.LOG_MODE_FULL)\n\n\t\t// update status vector\n\t\tg.vectorClock.Update(g.Parameters.Identifier)\n\n\t\t// update messages\n\t\tg.messages.Add(&routerumor)\n\n\t\t// send route rumor packet\n\t\tg.gossipOutputQueue <- &Packet{\n\t\t\tGossipPacket: GossipPacket{\n\t\t\t\tRumor: &routerumor,\n\t\t\t},\n\t\t\tDestination: peer.Address,\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e2cf79e5ceb225c14c97c8063df6f802", "score": "0.46822286", "text": "func Routes(name string, services *cli.Services) *cobra.Command {\n\troutes := &cobra.Command{\n\t\tUse: \"routes\",\n\t\tShort: \"Loadbalancer routes\",\n\t}\n\n\tls := &cobra.Command{\n\t\tUse: \"ls\",\n\t\tShort: \"List loadbalancer routes\",\n\t}\n\n\tpublish := &cobra.Command{\n\t\tUse: \"add <frontend_port> <backend_port>\",\n\t\tShort: \"Publish a loadbalancer route\",\n\t}\n\tunpublish := &cobra.Command{\n\t\tUse: \"rm <frontend_port>, ....\",\n\t\tShort: \"Unpublish a loadbalancer route\",\n\t}\n\n\troutes.AddCommand(ls, publish, unpublish)\n\n\tprotocol := publish.Flags().String(\"protocol\", \"tcp\", \"Protocol: http|https|tcp|udp|ssl\")\n\tloadbalancerProtocol := publish.Flags().String(\"loadbalancerprotocol\", \"tcp\", \"Protocol: http|https|tcp|udp|ssl\")\n\n\tcert := publish.Flags().String(\"cert\", \"\", \"Certificate\")\n\n\tpublish.RunE = func(cmd *cobra.Command, args []string) error {\n\n\t\tif len(args) != 2 {\n\t\t\tcmd.Usage()\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tfrontendPort, err := strconv.Atoi(args[0])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbackendPort, err := strconv.Atoi(args[1])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tl4, err := services.Scope.L4(name)\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t\tcli.MustNotNil(l4, \"L4 not found\", \"name\", name)\n\n\t\troute := loadbalancer.Route{\n\t\t\tLoadBalancerPort: frontendPort,\n\t\t\tLoadBalancerProtocol: loadbalancer.Protocol(*loadbalancerProtocol),\n\t\t\tPort: backendPort,\n\t\t\tProtocol: loadbalancer.Protocol(*protocol),\n\t\t}\n\t\tif *cert != \"\" {\n\t\t\tcopy := *cert\n\t\t\troute.Certificate = &copy\n\t\t}\n\t\tres, err := l4.Publish(route)\n\t\tfmt.Println(res)\n\t\treturn err\n\t}\n\n\tunpublish.RunE = func(cmd *cobra.Command, args []string) error {\n\n\t\tif len(args) != 1 {\n\t\t\tcmd.Usage()\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tl4, err := services.Scope.L4(name)\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t\tcli.MustNotNil(l4, \"L4 not found\", \"name\", name)\n\n\t\ttargets := []int{}\n\t\tfor _, a := range args {\n\t\t\tv, err := strconv.Atoi(a)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\ttargets = append(targets, v)\n\t\t}\n\n\t\tfor _, t := range targets {\n\t\t\tres, err := l4.Unpublish(t)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfmt.Println(res)\n\t\t}\n\t\treturn err\n\t}\n\n\tls.Flags().AddFlagSet(services.OutputFlags)\n\tls.RunE = func(cmd *cobra.Command, args []string) error {\n\t\tif len(args) != 0 {\n\t\t\tcmd.Usage()\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tl4, err := services.Scope.L4(name)\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t\tcli.MustNotNil(l4, \"L4 not found\", \"name\", name)\n\n\t\tlist, err := l4.Routes()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn services.Output(os.Stdout, list,\n\t\t\tfunc(w io.Writer, v interface{}) error {\n\n\t\t\t\tfmt.Printf(\"%-15v %-20v %-15v %-20v %-20v\\n\", \"FRONTEND PORT\", \"FRONTEND PROTOCOL\", \"BACKEND PORT\", \"BACKEND PROTOCOL\", \"CERT\")\n\t\t\t\tfor _, r := range list {\n\t\t\t\t\tcert := \"\"\n\t\t\t\t\tif r.Certificate != nil {\n\t\t\t\t\t\tcert = *r.Certificate\n\t\t\t\t\t}\n\t\t\t\t\tfmt.Printf(\"%-15v %-20v %-15v %-20v %-20v\\n\", r.LoadBalancerPort, r.LoadBalancerProtocol, r.Port, r.Protocol, cert)\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t})\n\t}\n\treturn routes\n}", "title": "" }, { "docid": "50c1b030a918a8a8a86f386eddeb6f20", "score": "0.46748316", "text": "func RoutesAdd(host, localIp, remoteHost string, remotePort, priority int, user, mailFrom, smtpAuthLogin, smtpAuthPasswd string) error {\n\treturn core.AddRoute(host, localIp, remoteHost, remotePort, priority, user, mailFrom, smtpAuthLogin, smtpAuthPasswd)\n}", "title": "" }, { "docid": "95b422d96973f57d183cd1b6d33290ab", "score": "0.46729892", "text": "func NewCmdExpose(fullName string, f kcmdutil.Factory, streams genericclioptions.IOStreams) *cobra.Command {\n\to := NewExposeOptions()\n\n\tcmd := kcmd.NewCmdExposeService(f, streams)\n\tcmd.Short = \"Expose a replicated application as a service or route\"\n\tcmd.Long = exposeLong\n\tcmd.Example = fmt.Sprintf(exposeExample, fullName)\n\t// Default generator to an empty string so we can get more flexibility\n\t// when setting defaults based on input resources\n\tcmd.Flags().Set(\"generator\", \"\")\n\tcmd.Flag(\"generator\").Usage = \"The name of the API generator to use. Defaults to \\\"route/v1\\\". Available generators include \\\"service/v1\\\", \\\"service/v2\\\", and \\\"route/v1\\\". \\\"service/v1\\\" will automatically name the port \\\"default\\\", while \\\"service/v2\\\" will leave it unnamed.\"\n\tcmd.Flag(\"generator\").DefValue = \"\"\n\t// Default protocol to an empty string so we can get more flexibility\n\t// when validating the use of it (invalid for routes)\n\tcmd.Flags().Set(\"protocol\", \"\")\n\tcmd.Flag(\"protocol\").DefValue = \"\"\n\tcmd.Flag(\"protocol\").Changed = false\n\tcmd.Flag(\"port\").Usage = \"The port that the resource should serve on.\"\n\tdefRun := cmd.Run\n\tcmd.Run = func(cmd *cobra.Command, args []string) {\n\t\tkcmdutil.CheckErr(o.Complete(cmd, f, args))\n\t\tkcmdutil.CheckErr(o.Validate(cmd))\n\t\tdefRun(cmd, args)\n\t}\n\n\tcmd.Flags().StringVar(&o.Hostname, \"hostname\", o.Hostname, \"Set a hostname for the new route\")\n\tcmd.Flags().StringVar(&o.Path, \"path\", o.Path, \"Set a path for the new route\")\n\tcmd.Flags().StringVar(&o.WildcardPolicy, \"wildcard-policy\", o.WildcardPolicy, \"Sets the WildcardPolicy for the hostname, the default is \\\"None\\\". Valid values are \\\"None\\\" and \\\"Subdomain\\\"\")\n\n\treturn cmd\n}", "title": "" }, { "docid": "c1762d74161b812a1b2bf5dd8ed69083", "score": "0.46611297", "text": "func newRouter(opts ...Option) Router {\n\t// TODO: we need to add default GW entry here\n\t// Should default GW be part of router options?\n\n\t// get default options\n\toptions := DefaultOptions()\n\n\t// apply requested options\n\tfor _, o := range opts {\n\t\to(&options)\n\t}\n\n\treturn &router{\n\t\topts: options,\n\t\texit: make(chan struct{}),\n\t\twg: &sync.WaitGroup{},\n\t}\n}", "title": "" }, { "docid": "704fd7e0492e3c5f100623c52657dc7b", "score": "0.46566382", "text": "func (c *Client) CreateRoute(ctx context.Context, params *CreateRouteInput, optFns ...func(*Options)) (*CreateRouteOutput, error) {\n\tif params == nil {\n\t\tparams = &CreateRouteInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"CreateRoute\", params, optFns, c.addOperationCreateRouteMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*CreateRouteOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "2f36e45feba3ab21ed0f5078e9096b22", "score": "0.4653928", "text": "func NewCreateCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Creates a l3 router on a VPC\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tvpcs, _ := cmd.Flags().GetIntSlice(\"vpc\")\n\t\t\tport, _ := cmd.Flags().GetUint(\"port\")\n\n\t\t\tfor _, vpcID := range vpcs {\n\t\t\t\tif vpcID > 16777215 {\n\t\t\t\t\tfmt.Printf(\"VPC %d id out of range\\n\", vpcID)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tl2conn, err := grpc.Dial(fmt.Sprintf(\"127.0.0.1:%d\", port), grpc.WithInsecure())\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tdefer l2conn.Close()\n\n\t\t\t\tl2cli := l2API.NewL2ServiceClient(l2conn)\n\n\t\t\t\tctx := context.Background()\n\n\t\t\t\tvar resp *l2API.StackResponse\n\n\t\t\t\tresp, err = l2cli.GetStack(ctx, &l2API.StackRequest{VpcId: int32(vpcID)})\n\t\t\t\tif err != nil {\n\t\t\t\t\tif strings.Contains(err.Error(), \"Stack not created\") {\n\t\t\t\t\t\tresp, err = l2cli.AddStack(ctx, &l2API.StackRequest{VpcId: int32(vpcID)})\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlog.Println(\"Failed to create stack: \", err)\n\t\t\t\t\t\t\treturn\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\tlog.Println(\"Failed to fetch stack: \", err)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tstack, err := l3.L2APIToStack(resp.Stack)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"Failed to convert stack: \", err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tid := l3.NewID()\n\n\t\t\t\tr, err := l3.CreateRouter(l2cli, stack, id)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"Failed to create router: \", err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tdefer func() {\n\t\t\t\t\tr.Delete()\n\t\t\t\t}()\n\n\t\t\t\tfmt.Printf(\"Created Router %s on %d\\n\", r.ID, vpcID)\n\t\t\t}\n\n\t\t\twaitForExit()\n\t\t},\n\t}\n\n\tcmd.Flags().IntSlice(\"vpc\", []int{}, \"VPC to add local router too\")\n\tcmd.Flags().UintP(\"port\", \"p\", 18254, \"GRPC port\")\n\tcmd.Flags().StringP(\"bridge\", \"b\", \"virbr0\", \"bridge for public network\")\n\tcmd.Flags().Bool(\"dhcp\", false, \"Enable DHCP\")\n\tcmd.Flags().Bool(\"nat\", true, \"Enable NAT\")\n\tcmd.Flags().StringSlice(\"dhcpdns\", []string{\"1.1.1.1\", \"1.0.0.1\"}, \"DHCP DNS servers\")\n\tcmd.Flags().StringSlice(\"bgp\", []string{\"192.168.222.1\"}, \"BGP peers\")\n\tcmd.Flags().StringSlice(\"ip\", []string{\"10.4.0.1/24:5\", \"10.4.1.1/24:6\"}, `Subnets/IPs (format \"cidr:vlan\" e.g. \"10.4.0.1/24:5)`)\n\n\tviper.BindPFlag(\"br\", cmd.Flags().Lookup(\"bridge\"))\n\tviper.BindPFlag(\"bgp\", cmd.Flags().Lookup(\"bgp\"))\n\tviper.BindPFlag(\"dhcp\", cmd.Flags().Lookup(\"dhcp\"))\n\tviper.BindPFlag(\"ips\", cmd.Flags().Lookup(\"ip\"))\n\n\tcmd.MarkFlagRequired(\"vpc\")\n\n\treturn cmd\n}", "title": "" }, { "docid": "7162a75fc8676488b03eb16ec131974d", "score": "0.46436575", "text": "func NewRoute(pattern string, handlers []Handler) *Route {\n\tmatches := routeRegex.FindStringSubmatch(pattern)\n\tif len(matches) != 3 {\n\t\tpanic(RoutePatternError(pattern))\n\t}\n\n\troute := Route{\n\t\tMethods: make(map[string]bool),\n\t\tPattern: matches[2],\n\t}\n\n\tif len(matches[1]) > 0 {\n\t\tfor _, method := range strings.Split(matches[1], \",\") {\n\t\t\troute.Methods[method] = true\n\t\t}\n\t}\n\n\tvalidateHandlers(handlers)\n\troute.Handlers = append(route.Handlers, handlers...)\n\n\tif !literalRegex.MatchString(route.Pattern) {\n\t\troute.regex = regexp.MustCompile(\"^\" + parseParamPattern(route.Pattern) + \"$\")\n\t}\n\n\treturn &route\n}", "title": "" }, { "docid": "cb03a7ed4cec9aecb9ffc5bfe966c435", "score": "0.46391243", "text": "func GenerateRoute(s *v1.Service) *routev1.Route {\n\tlabels := make(map[string]string)\n\tfor k, v := range s.ObjectMeta.Labels {\n\t\tlabels[k] = v\n\t}\n\n\treturn &routev1.Route{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"Route\",\n\t\t\tAPIVersion: \"route.openshift.io/v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: s.ObjectMeta.Name,\n\t\t\tNamespace: s.ObjectMeta.Namespace,\n\t\t\tLabels: labels,\n\t\t},\n\t\tSpec: routev1.RouteSpec{\n\t\t\tTo: routev1.RouteTargetReference{\n\t\t\t\tKind: \"Service\",\n\t\t\t\tName: s.ObjectMeta.Name,\n\t\t\t},\n\t\t\tPort: &routev1.RoutePort{\n\t\t\t\tTargetPort: s.Spec.Ports[0].TargetPort,\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "6ce8009c81f0f0adc700dbf8c209dac5", "score": "0.4638773", "text": "func runGrpcGateway(address string, opts ...runtime.ServeMuxOption) error {\n\tctx := context.Background()\n\tctx, cancel := context.WithCancel(ctx)\n\tdefer cancel()\n\n\tmux := http.NewServeMux()\n\tmux.HandleFunc(\"/swagger/\", func(w http.ResponseWriter, r *http.Request) {\n\t\tif !strings.HasSuffix(r.URL.Path, \".swagger.json\") {\n\t\t\tglog.Errorf(\"Not Found: %s\", r.URL.Path)\n\t\t\thttp.NotFound(w, r)\n\t\t\treturn\n\t\t}\n\n\t\tglog.Infof(\"Serving %s\", r.URL.Path)\n\t\tp := strings.TrimPrefix(r.URL.Path, \"/swagger/\")\n\t\tp = path.Join(swaggerDir, p)\n\t\thttp.ServeFile(w, r, p)\n\t})\n\n\tgw, err := newGateway(ctx, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tmux.Handle(\"/\", gw)\n\n\tservice.Usrs.ContextBase = ctx\n\tservice.Usrs.HttpMuxs = []*http.ServeMux{mux}\n\tservice.Usrs.GatewayMux = gw.(*runtime.ServeMux)\n\n\tfmt.Printf(\"Starting grpc gateway on %s\\n\", address)\n\n\treturn http.ListenAndServe(address, allowCORS(mux))\n}", "title": "" }, { "docid": "6c156f58b057ccfe11e2cf6dc60ebc3b", "score": "0.4632077", "text": "func New(route string) (listener.Listener, error) {\n\tvar id, err = uuid.NewRandom()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Echo{\n\t\tid: id.String(),\n\t\troute: route,\n\t}, nil\n}", "title": "" }, { "docid": "1e9b54e36d3879b50c3e68c9801452bf", "score": "0.46278825", "text": "func New(o *Options) *Handler {\n\trouter := route.New()\n\n\tcwd, err := os.Getwd()\n\n\tif err != nil {\n\t\tcwd = \"<error retrieving current working directory>\"\n\t}\n\n\th := &Handler{\n\t\trouter: router,\n\t\tlistenErrCh: make(chan error),\n\t\tquitCh: make(chan struct{}),\n\t\treloadCh: make(chan chan error),\n\t\toptions: o,\n\t\tbirth: time.Now(),\n\t\tcwd: cwd,\n\t\tflagsMap: o.Flags,\n\n\t\tcontext: o.Context,\n\t\ttargetManager: o.TargetManager,\n\t\tqueryEngine: o.QueryEngine,\n\t\tapiV1: api_v1.NewAPI(o.QueryEngine, o.TargetManager),\n\n\t\tnow: model.Now,\n\t}\n\n\tif o.RoutePrefix != \"/\" {\n\t\t// If the prefix is missing for the root path, prepend it.\n\t\trouter.Get(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\t\thttp.Redirect(w, r, o.RoutePrefix, http.StatusFound)\n\t\t})\n\t\tfmt.Println(\"prepend register /\")\n\t\trouter = router.WithPrefix(o.RoutePrefix)\n\t}\n\n\t//instrh := prometheus.InstrumentHandler\n\t//instrf := prometheus.InstrumentHandlerFunc\n\tfmt.Println(\"routeprefix:\", o.RoutePrefix)\n\n\trouter.Get(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\thttp.Redirect(w, r, path.Join(o.ExternalURL.Path, \"/graph\"), http.StatusFound)\n\t})\n\n\t//router.Get(o.MetricsPath, prometheus.Handler().ServeHTTP)\n\n\t/*\n\t\trouter.Get(\"/alerts\", instrf(\"alerts\", h.alerts))\n\t\trouter.Get(\"/graph\", instrf(\"graph\", h.graph))\n\t\trouter.Get(\"/status\", instrf(\"status\", h.status))\n\t\trouter.Get(\"/flags\", instrf(\"flags\", h.flags))\n\t\trouter.Get(\"/config\", instrf(\"config\", h.config))\n\t\trouter.Get(\"/rules\", instrf(\"rules\", h.rules))\n\t\trouter.Get(\"/targets\", instrf(\"targets\", h.targets))\n\t\trouter.Get(\"/version\", instrf(\"version\", h.version))\n\n\t\trouter.Get(\"/heap\", instrf(\"heap\", dumpHeap))\n\n\n\t\trouter.Get(\"/federate\", instrh(\"federate\", httputil.CompressionHandler{\n\t\t\tHandler: http.HandlerFunc(h.federation),\n\t\t}))\n\t*/\n\n\th.apiV1.Register(router.WithPrefix(\"/api/v1\"))\n\n\t/*\n\t\t\trouter.Get(\"/consoles/*filepath\", instrf(\"consoles\", h.consoles))\n\n\t\t\trouter.Get(\"/static/*filepath\", instrf(\"static\", serveStaticAsset))\n\n\t\tif o.UserAssetsPath != \"\" {\n\t\t\trouter.Get(\"/user/*filepath\", instrf(\"user\", route.FileServe(o.UserAssetsPath)))\n\t\t}\n\t*/\n\n\tif o.EnableQuit {\n\t\trouter.Post(\"/-/quit\", h.quit)\n\t}\n\n\trouter.Post(\"/-/reload\", h.reload)\n\trouter.Get(\"/-/reload\", func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t\tfmt.Fprintf(w, \"This endpoint requires a POST request.\\n\")\n\t})\n\n\t/*\n\t\trouter.Get(\"/debug/*subpath\", http.DefaultServeMux.ServeHTTP)\n\t\trouter.Post(\"/debug/*subpath\", http.DefaultServeMux.ServeHTTP)\n\t*/\n\n\treturn h\n}", "title": "" }, { "docid": "3c0bc0a77d0f4771e34db6366b4ca1f2", "score": "0.46173254", "text": "func (i *Instance) Register(r Route) {\n\tpath := r.Path\n\tif i.prefix != \"\" {\n\t\tpath = i.prefix + path\n\t}\n\ti.routes[path] = r\n}", "title": "" }, { "docid": "ef18adcebe319eb92f29e13f2f4bb077", "score": "0.46117234", "text": "func (v *Verto) Add(\n\tmethod, path string,\n\trf ResourceFunc) *Endpoint {\n\n\thandlerFunc := func(w http.ResponseWriter, r *http.Request) {\n\t\tv.mutex.RLock()\n\t\tc := NewContext(w, r, func() Injections { return v.icloneMap[r] }, v.Logger)\n\t\tv.mutex.RUnlock()\n\n\t\tresponse, err := rf(c)\n\t\tif err != nil {\n\t\t\tv.ErrorHandler.Handle(err, c)\n\t\t} else {\n\t\t\tv.ResponseHandler.Handle(response, c)\n\t\t}\n\t}\n\n\treturn &Endpoint{v.muxer.AddFunc(method, path, handlerFunc), v}\n}", "title": "" }, { "docid": "70ef47959712b9e226cef9fe98efd655", "score": "0.4596763", "text": "func (GrpcRoute) Create(data string) []byte {\n\tvar all models.ProjectAll\n\tvar resp models.Rest\n\tvar msq sendMsql\n\n\tv := validator.New()\n\terr := json.Unmarshal([]byte(data), &all)\n\tprojectModel := models.ProjectModels{}\n\n\terr = v.Struct(all)\n\tif err != nil {\n\t\tfor _, e := range err.(validator.ValidationErrors) {\n\t\t\tif e != nil {\n\t\t\t\tresp.Code = 400\n\t\t\t\tresp.Message = \"Data `\" + e.Field() + \"` doesn't exist\"\n\t\t\t\tdata, _ := json.Marshal(resp)\n\t\t\t\treturn data\n\t\t\t}\n\t\t}\n\t}\n\n\t// insert project and get ID project\n\tdataProject, err := projectModel.InsertProject(all.Project)\n\tif err != nil {\n\n\t}\n\n\tall.ProjectDetail.ProjectID = int(dataProject.ID)\n\terr = projectModel.InsertProjectDetail(all.ProjectDetail)\n\n\tmsq.userBY = all.CreatedBy\n\tmsq.data = all\n\tdataSend, err := json.Marshal(&msq)\n\tconfigs.Publish(\"PROJECT_MESSAGING\", dataSend)\n\n\tresp.Code = 200\n\tresp.Message = \"Success\"\n\n\treturn nil\n}", "title": "" }, { "docid": "dfc15ac08edde943dcef069e9beba094", "score": "0.45957467", "text": "func (r *Route) New(path string) *Route {\n\troute := NewRoute(path)\n\tr.addRoute(route)\n\treturn route\n}", "title": "" }, { "docid": "8addb9ded4c0077d0b3035c100eecc5a", "score": "0.45946413", "text": "func (ks *Services) CreateRoute(body Route) *Route {\n\n\treturn NewRoutes(ks.service, ks.kong).Create(body).AsRaw()\n}", "title": "" }, { "docid": "75b52a7f6bd4e44157babc10556c219a", "score": "0.45929524", "text": "func createServer() {\n\tlistener, err := net.Listen(\"tcp\", \"localhost:8080\")\n\tif err != nil {\n\t\tlog.Fatalf(\"unable to listen on 8080 port: %v\", err)\n\t}\n\tlog.Println(\"listening on port 8080\")\n\tsrv := grpc.NewServer()\n\tRegisterServerRequestsServer(srv, &server{})\n\treflection.Register(srv)\n\terr = srv.Serve(listener)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to serve: %v\", err)\n\t}\n\n}", "title": "" }, { "docid": "6eb2395952460f20608dbc1b02625e21", "score": "0.4573718", "text": "func RouteRegister(rg *gin.RouterGroup, prefixOptions ...string) {\n\tprefix := getPrefix(prefixOptions...)\n\n\tprefixRouter := rg.Group(prefix)\n\t{\n\t\tprefixRouter.GET(\"/\", gin.WrapF(pprof.Index))\n\t\tprefixRouter.GET(\"/cmdline\", gin.WrapF(pprof.Cmdline))\n\t\tprefixRouter.GET(\"/profile\", gin.WrapF(pprof.Profile))\n\t\tprefixRouter.POST(\"/symbol\", gin.WrapF(pprof.Symbol))\n\t\tprefixRouter.GET(\"/symbol\", gin.WrapF(pprof.Symbol))\n\t\tprefixRouter.GET(\"/trace\", gin.WrapF(pprof.Trace))\n\t\tprefixRouter.GET(\"/allocs\", gin.WrapH(pprof.Handler(\"allocs\")))\n\t\tprefixRouter.GET(\"/block\", gin.WrapH(pprof.Handler(\"block\")))\n\t\tprefixRouter.GET(\"/goroutine\", gin.WrapH(pprof.Handler(\"goroutine\")))\n\t\tprefixRouter.GET(\"/heap\", gin.WrapH(pprof.Handler(\"heap\")))\n\t\tprefixRouter.GET(\"/mutex\", gin.WrapH(pprof.Handler(\"mutex\")))\n\t\tprefixRouter.GET(\"/threadcreate\", gin.WrapH(pprof.Handler(\"threadcreate\")))\n\t}\n}", "title": "" }, { "docid": "64618666b82a8fe5b9910164ea5edaca", "score": "0.4556921", "text": "func (r *Route) NewRoute(prefix string) *Route {\n\treturn &Route{router: r.router, prefix: cleanPath(r.prefix + prefix)}\n}", "title": "" }, { "docid": "34ad3b4bc301d4e73fedc8b476ae2271", "score": "0.45561385", "text": "func NewServer(host, route string, headers map[string]string) *Server {\n\ts := &Server{\n\t\tHost: host,\n\t\tRoute: route,\n\t\tMethods: make(map[string]MethodWithContext),\n\t\tHeaders: headers,\n\t}\n\n\ts.Methods[\"jrpc2.register\"] = MethodWithContext{Method: s.RegisterRPC}\n\n\treturn s\n}", "title": "" }, { "docid": "d94d417043d89b81ee5afae5d6fcd4b5", "score": "0.45548365", "text": "func NewHttpRoute(props HttpRouteProps) *HttpRoute {\n\tmethods := make([]string, 0, len(props.Handlers))\n\n\tfor method := range props.Handlers {\n\t\tmethods = append(methods, method)\n\t}\n\n\treturn &HttpRoute{\n\t\tlogger: props.Logger,\n\t\thandlers: props.Handlers,\n\t\tpreProcessors: props.PreProcessors,\n\t\ttracker: stats.NewMethodTrackerWithResult(&stats.MethodTrackerProps{\n\t\t\tMethods: methods,\n\t\t\tResults: []string{\"200\", \"204\", \"400\", \"401\", \"403\", \"405\", \"409\", \"500\", \"error\", \"preprocessor\"},\n\t\t\tWindowSize: 64,\n\t\t}),\n\t\tencoder: props.Encoder,\n\t}\n}", "title": "" }, { "docid": "ca2cc2166fda0f7e8c6e26d8b6e2856e", "score": "0.45366788", "text": "func NewRouteFn(method, path string, handler http.HandlerFunc) Route {\n\treturn Route{\n\t\tMethod: method,\n\t\tPath: path,\n\t\tHandlerFunc: handler,\n\t}\n}", "title": "" }, { "docid": "8daace50051b8a8537b85b5120257f6a", "score": "0.45357078", "text": "func (a *VpnConnectionApiService) CreateVpnConnectionRoute(ctx _context.Context, localVarOptionals *CreateVpnConnectionRouteOpts) (CreateVpnConnectionRouteResponse, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CreateVpnConnectionRouteResponse\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/CreateVpnConnectionRoute\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tif localVarOptionals != nil && localVarOptionals.CreateVpnConnectionRouteRequest.IsSet() {\n\t\tlocalVarOptionalCreateVpnConnectionRouteRequest, localVarOptionalCreateVpnConnectionRouteRequestok := localVarOptionals.CreateVpnConnectionRouteRequest.Value().(CreateVpnConnectionRouteRequest)\n\t\tif !localVarOptionalCreateVpnConnectionRouteRequestok {\n\t\t\treturn localVarReturnValue, nil, reportError(\"createVpnConnectionRouteRequest should be CreateVpnConnectionRouteRequest\")\n\t\t}\n\t\tlocalVarPostBody = &localVarOptionalCreateVpnConnectionRouteRequest\n\t}\n\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CreateVpnConnectionRouteResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "9c3776fa28eac5acc28883151016c4a2", "score": "0.45285127", "text": "func NewIPAMRoute(r *net.IPNet) IPAMRoute { //nolint:interfacer\n\treturn IPAMRoute{Dest: r.String()}\n}", "title": "" }, { "docid": "123d7f167cb8be0feace6579b360546c", "score": "0.45266727", "text": "func (r *Route) Add() error {\n\tcmd := []string{r.Family, \"route\", \"add\"}\n\tif r.Table != \"\" {\n\t\tcmd = append(cmd, \"table\", r.Table)\n\t}\n\n\tif r.Via != \"\" {\n\t\tcmd = append(cmd, \"via\", r.Via)\n\t}\n\n\tcmd = append(cmd, r.Route, \"dev\", r.DevName)\n\tif r.Src != \"\" {\n\t\tcmd = append(cmd, \"src\", r.Src)\n\t}\n\n\tif r.Proto != \"\" {\n\t\tcmd = append(cmd, \"proto\", r.Proto)\n\t}\n\n\t_, err := shared.RunCommand(\"ip\", cmd...)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "623cdcff9cfc3fb163c1afdfb660109b", "score": "0.45259762", "text": "func New(endpoint *url.URL, options ...Option) *GRPC {\n\tg := &GRPC{\n\t\tbase: endpoint,\n\t\tclient: &http.Client{},\n\t\theader: DefaultHeaders(),\n\t\tdecompressHandlers: map[string]Decompressor{\n\t\t\t\"gzip\": gzipDecompress,\n\t\t\t\"deflate\": defalteDecompress,\n\t\t},\n\t}\n\n\tfor _, o := range options {\n\t\to(g)\n\t}\n\n\tfor _, enc := range g.acceptEncoding {\n\t\tg.header.Add(\"Accept-Encoding\", enc)\n\t}\n\t// These are here so that if they provided custom decoding that we are giving the server\n\t// preference for them over gzip/deflate.\n\tg.header.Add(\"Accept-Encoding\", \"gzip\")\n\tg.header.Add(\"Accept-Encoding\", \"deflate\")\n\n\treturn g\n}", "title": "" }, { "docid": "f3de3416878cf268743646a3431d9358", "score": "0.45066595", "text": "func NewTraceRouteHop()(*TraceRouteHop) {\n m := &TraceRouteHop{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "title": "" }, { "docid": "8f42e7f4213f853bea00eb6641443b44", "score": "0.45057827", "text": "func (a *RoutesApiService) CreateDispatchRoute(ctx context.Context, accessToken string, createDispatchRouteParams DispatchRouteCreate) (DispatchRoute, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Post\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue DispatchRoute\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/fleet/dispatch/routes\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\tlocalVarQueryParams.Add(\"access_token\", parameterToString(accessToken, \"\"))\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &createDispatchRouteParams\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\tif err == nil {\n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v DispatchRoute\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 0 {\n\t\t\tvar v ErrorResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "title": "" }, { "docid": "27cc03bc50bfbbfc16bbfa67d49865a9", "score": "0.4502237", "text": "func (in *GRPCRoute) DeepCopy() *GRPCRoute {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(GRPCRoute)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "27cc03bc50bfbbfc16bbfa67d49865a9", "score": "0.4502237", "text": "func (in *GRPCRoute) DeepCopy() *GRPCRoute {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(GRPCRoute)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "27cc03bc50bfbbfc16bbfa67d49865a9", "score": "0.4502237", "text": "func (in *GRPCRoute) DeepCopy() *GRPCRoute {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(GRPCRoute)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "291ef0d3e5cb99a247d3062dcc96f7ae", "score": "0.45021495", "text": "func AddRoute(router *dynamicRouter) func(path, pathPrefix string, methods []string, handler http.Handler) (string, error) {\n\treturn func(path, pathPrefix string, methods []string, handler http.Handler) (string, error) {\n\t\troute := Route{\n\t\t\tPath: path,\n\t\t\tPathPrefix: pathPrefix,\n\t\t\tMethods: methods,\n\t\t\thandler: handler,\n\t\t\tUID: uuid.NewV4().String(),\n\t\t}\n\n\t\troute.matcher = router.routeMatcher(route)\n\t\terr := validateRoute(router, route)\n\t\tif err != nil {\n\t\t\trouter.logger.Error(\"invalid route\", zap.Error(err))\n\t\t\treturn \"\", err\n\t\t}\n\n\t\trouter.routes.Store(route.UID, route)\n\t\trouter.logger.Info(fmt.Sprintf(\"DynamicRouter: Added new route: id: %s; pathPrefix: %s; path %s\", route.UID, route.PathPrefix, route.Path))\n\t\treturn route.UID, nil\n\t}\n}", "title": "" }, { "docid": "4c5c1393d352ee9968ca9724de8ae4a8", "score": "0.4499505", "text": "func (c *Client) CreateRoutes(request *CreateRoutesRequest) (response *CreateRoutesResponse, err error) {\n if request == nil {\n request = NewCreateRoutesRequest()\n }\n response = NewCreateRoutesResponse()\n err = c.Send(request, response)\n return\n}", "title": "" }, { "docid": "11d557ac4e2f12689fd29d94ba62d723", "score": "0.44982398", "text": "func (rtr *Router) newRoute(tpl string, hlr http.Handler, mtds ...string) *Route {\n\trtr.mu.RLock()\n\tdefer rtr.mu.RUnlock()\n\n\tr := &Route{\n\t\tTemplate: tpl,\n\t\tHandler: hlr,\n\t}\n\n\tfor _, method := range mtds {\n\t\trts, ok := rtr.routes[method]\n\t\tif ok {\n\t\t\trts = append(rts, r)\n\t\t\trtr.routes[method] = rts\n\t\t} else {\n\t\t\trts = []*Route{r}\n\t\t\trtr.routes[method] = rts\n\t\t}\n\t}\n\n\treturn r\n}", "title": "" } ]
9304f859b8b4f440999ca775db410176
ResetEmail resets all changes to the "email" field.
[ { "docid": "cdd29f079cfa12bf81b356541abc6ce9", "score": "0.7678431", "text": "func (m *UserMutation) ResetEmail() {\n\tm.email = nil\n}", "title": "" } ]
[ { "docid": "ff15d820ad4409cad6cb3f1f8108434c", "score": "0.7942884", "text": "func (m *UserMutation) ResetEmail() {\n\tm.email = nil\n\tdelete(m.clearedFields, user.FieldEmail)\n}", "title": "" }, { "docid": "852f189d914c79f943d9a21d141a78e3", "score": "0.7681445", "text": "func (m *UserMutation) ResetEmail() {\n\tm._Email = nil\n}", "title": "" }, { "docid": "4054bf315a79ca28e32fea757c24d33d", "score": "0.7664212", "text": "func (m *MedicalRecordMutation) ResetEmail() {\n\tm.email = nil\n}", "title": "" }, { "docid": "f29f1b4ffc1246489ebc889932a7d99c", "score": "0.75418913", "text": "func (m *PatientrecordMutation) ResetEmail() {\n\tm._Email = nil\n}", "title": "" }, { "docid": "40c01cab6136a721e674e8358c19bf47", "score": "0.74093527", "text": "func (m *CustomerMutation) ResetEmail() {\n\tm._Email = nil\n}", "title": "" }, { "docid": "ece5f150e935ae4be5a4b3d75226c871", "score": "0.7092965", "text": "func (m *SurveyQuestionMutation) ResetEmailData() {\n\tm.email_data = nil\n\tdelete(m.clearedFields, surveyquestion.FieldEmailData)\n}", "title": "" }, { "docid": "bd9f140e99bbd16dab8f733f9074ca5c", "score": "0.7035532", "text": "func (uuo *UserUpdateOne) ClearEmail() *UserUpdateOne {\n\tuuo.mutation.ClearEmail()\n\treturn uuo\n}", "title": "" }, { "docid": "d791547003ba9a00c650278e261588ca", "score": "0.6946592", "text": "func (o *Entidade) UnsetEmail() {\n\to.Email.Unset()\n}", "title": "" }, { "docid": "f0f5dbdd87f583b76ec333bc5201e1cd", "score": "0.68338174", "text": "func (uu *UserUpdate) ClearEmail() *UserUpdate {\n\tuu.mutation.ClearEmail()\n\treturn uu\n}", "title": "" }, { "docid": "c354dfd017a589d3fc50dc3dbcc5bea9", "score": "0.67962986", "text": "func (m *UserMutation) ClearEmail() {\n\tm.email = nil\n\tm.clearedFields[user.FieldEmail] = struct{}{}\n}", "title": "" }, { "docid": "dd04a5db5f3d8ecf88370f4b86be4dfd", "score": "0.66372156", "text": "func (uuo *UserUpdateOne) SetEmail(s string) *UserUpdateOne {\n\tuuo.mutation.SetEmail(s)\n\treturn uuo\n}", "title": "" }, { "docid": "f6cdd14d8d688ed82ae800b5b1a75a19", "score": "0.6530607", "text": "func (auo *AdminUpdateOne) SetEmail(s string) *AdminUpdateOne {\n\tauo.mutation.SetEmail(s)\n\treturn auo\n}", "title": "" }, { "docid": "09712f0360d46afa9a312f5828d98389", "score": "0.65244275", "text": "func (c *Client) SetEmail(email string) {\n\tif c.Email != email {\n\t\tc.EmailPrevious = email\n\t}\n\tc.Email = email\n}", "title": "" }, { "docid": "64e5eafbad9c1ddea5f47562308430e9", "score": "0.64542186", "text": "func (uu *UserUpdate) SetEmail(s string) *UserUpdate {\n\tuu.mutation.SetEmail(s)\n\treturn uu\n}", "title": "" }, { "docid": "713e9a1aee7f9601431f819743fa9794", "score": "0.638155", "text": "func (m *MedicalRecordMutation) SetEmail(s string) {\n\tm.email = &s\n}", "title": "" }, { "docid": "774e2e801d521b95a953b373550fdfa7", "score": "0.6376983", "text": "func (au *AdminUpdate) SetEmail(s string) *AdminUpdate {\n\tau.mutation.SetEmail(s)\n\treturn au\n}", "title": "" }, { "docid": "c70aa66f86de797f48af56189b32f7f6", "score": "0.6362308", "text": "func (p *AccountPasswordInputSettings) SetEmail(value string) {\n\tp.Flags.Set(1)\n\tp.Email = value\n}", "title": "" }, { "docid": "33d97d88b352215f57e9f3e7ebfe8722", "score": "0.6341907", "text": "func (m *PatientrecordMutation) SetEmail(s string) {\n\tm._Email = &s\n}", "title": "" }, { "docid": "868001ce6cda8511e27c65fda1b388a9", "score": "0.6337004", "text": "func (in *ActionUserRequestChangeCreateInput) SetEmail(value string) *ActionUserRequestChangeCreateInput {\n\tin.Email = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin._selectedParameters[\"Email\"] = nil\n\treturn in\n}", "title": "" }, { "docid": "7afabdedb7488c91f8fea6523bf7f37b", "score": "0.632577", "text": "func (m *UserMutation) SetEmail(s string) {\n\tm.email = &s\n}", "title": "" }, { "docid": "7afabdedb7488c91f8fea6523bf7f37b", "score": "0.632577", "text": "func (m *UserMutation) SetEmail(s string) {\n\tm.email = &s\n}", "title": "" }, { "docid": "7afabdedb7488c91f8fea6523bf7f37b", "score": "0.632577", "text": "func (m *UserMutation) SetEmail(s string) {\n\tm.email = &s\n}", "title": "" }, { "docid": "7afabdedb7488c91f8fea6523bf7f37b", "score": "0.632577", "text": "func (m *UserMutation) SetEmail(s string) {\n\tm.email = &s\n}", "title": "" }, { "docid": "7afabdedb7488c91f8fea6523bf7f37b", "score": "0.632577", "text": "func (m *UserMutation) SetEmail(s string) {\n\tm.email = &s\n}", "title": "" }, { "docid": "7afabdedb7488c91f8fea6523bf7f37b", "score": "0.632577", "text": "func (m *UserMutation) SetEmail(s string) {\n\tm.email = &s\n}", "title": "" }, { "docid": "7afabdedb7488c91f8fea6523bf7f37b", "score": "0.632577", "text": "func (m *UserMutation) SetEmail(s string) {\n\tm.email = &s\n}", "title": "" }, { "docid": "2d3c77f38438335fb398d7acf52875a4", "score": "0.6289141", "text": "func (m *UserMutation) SetEmail(s string) {\n\tm._Email = &s\n}", "title": "" }, { "docid": "127c4bee1540ae08d3b1dd5c7f9e3674", "score": "0.62731344", "text": "func (o *OnboardingToken) SetEmail(v string) {\n\to.Email = v\n}", "title": "" }, { "docid": "8d7f79b9bcc092a5ba541f9cd436c741", "score": "0.6251713", "text": "func (m *CustomerMutation) SetEmail(s string) {\n\tm._Email = &s\n}", "title": "" }, { "docid": "6d2fff3533cf5d6ea37af8627b7e0712", "score": "0.6200332", "text": "func (myUser *User) SetEmail(val string) {\n\tmyUser.Emailvar = val\n}", "title": "" }, { "docid": "cbe41d0ca7e4828257c1dec0237a4849", "score": "0.6171186", "text": "func (options *PostEmailDispatcherTestOptions) SetEmail(email string) *PostEmailDispatcherTestOptions {\n\toptions.Email = core.StringPtr(email)\n\treturn options\n}", "title": "" }, { "docid": "2dfee60addc7a0784b8cdcd457d148b9", "score": "0.6163574", "text": "func (uc *UserCreate) SetEmail(s string) *UserCreate {\n\tuc.mutation.SetEmail(s)\n\treturn uc\n}", "title": "" }, { "docid": "7fccbf01b7f9e615aa59ddab9ba45a14", "score": "0.6114714", "text": "func (u *User) ChangeEmail(newEmail string) error {\n\tu.Email = strings.ToLower(strings.Trim(newEmail, \" \\n\\r\"))\n\treturn db.Debug().Model(&u).Exec(\"update users set verified = 0, email=? where id = ? limit 1 \", u.Email, u.ID).Error\n}", "title": "" }, { "docid": "20804c6a0f5f94e5c0243b66be87e64e", "score": "0.60769325", "text": "func (e *SendEmailInfo) ResetPassword(email string, resetPassToken string) error {\n\turl := fmt.Sprintf(\"%s://%s/api/reset-password/%s\", e.Scheme, e.ServerDomain, resetPassToken)\n\tmg := mailgun.NewMailgun(e.EmailDomain, e.EmailAPIKey)\n\tm := mg.NewMessage(\n\t\t\"Crypto Tracker<mailgun@\"+e.EmailDomain+\">\",\n\t\t\"Reset Your Password\",\n\t\t\"You've requested a password reset.\\n To change your password, click on the link below: \\n\"+url,\n\t\temail,\n\t)\n\t_, _, err := mg.Send(context.Background(), m)\n\tif err != nil {\n\t\treturn ResetPasswordError\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1891d5842a8289d38ec4ddb1b2280d60", "score": "0.60446", "text": "func (o *Entidade) SetEmail(v string) {\n\to.Email.Set(&v)\n}", "title": "" }, { "docid": "3d9101c12b224d50c298eaa8a06f7af4", "score": "0.6040613", "text": "func (o *AccountIdentityMatchScore) UnsetEmailAddress() {\n\to.EmailAddress.Unset()\n}", "title": "" }, { "docid": "f250064e5aa2e879753a714e13549e9a", "score": "0.60397357", "text": "func (u *userService) ResetPassword(data users.UserChangePasswordRequest) rest_err.APIError {\n\n\tdata.Email = strings.ToLower(data.Email)\n\n\tnewPasswordHash, err := crypt.Obj.GenerateHash(data.NewPassword)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdata.NewPassword = newPasswordHash\n\n\terr = users.UserDao.ChangePassword(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cd176d9d6136964091c82f575f9e1bbc", "score": "0.6037941", "text": "func (m *SurveyQuestionMutation) ClearEmailData() {\n\tm.email_data = nil\n\tm.clearedFields[surveyquestion.FieldEmailData] = struct{}{}\n}", "title": "" }, { "docid": "118aa6756dd0ee3c210573daa3cfc1e6", "score": "0.6028513", "text": "func (o *Entidade) SetEmailNil() {\n\to.Email.Set(nil)\n}", "title": "" }, { "docid": "acc4b366c104158ee476f1f0ca4960ee", "score": "0.6023107", "text": "func (s *SqlUserStore) UnverifyEmail(id, email string) error {\n\tcurrentTime := model.GetMillis()\n\t_, err := s.execBuilder(\n\t\ts.db,\n\t\tsq.Update(\"\").Table(s.getUserTable()).\n\t\t\tWhere(\"id = ?\", id).\n\t\t\tSet(\"update_at\", currentTime).\n\t\t\tSet(\"email_verified\", false).\n\t\t\tSet(\"email\", email),\n\t)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to set user email as unverified\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "65db9593b26dc492f42a39134de7941e", "score": "0.601877", "text": "func (o *WorkflowWorkflowInfoAllOf) SetEmail(v string) {\n\to.Email = &v\n}", "title": "" }, { "docid": "318f402f2dd9e653f904c06e4e379952", "score": "0.6011782", "text": "func (u *user) changeEmail(email string) {\n\tu.email = email\n}", "title": "" }, { "docid": "f758a42138a45dcde39a2ad2ab6b9e73", "score": "0.6009734", "text": "func (options *UsersSearchUserProfileOptions) SetEmail(email string) *UsersSearchUserProfileOptions {\n\toptions.Email = core.StringPtr(email)\n\treturn options\n}", "title": "" }, { "docid": "22220fd8ecc61ef14bca511e9859b8b1", "score": "0.5997919", "text": "func (o *CompleteSelfServiceRecoveryFlowWithLinkMethod) SetEmail(v string) {\n\to.Email = &v\n}", "title": "" }, { "docid": "f99191731f457dc8f96271289feac871", "score": "0.5996861", "text": "func (o *AddPartnerTenantRequest) SetEmail(v string) {\n\to.Email = v\n}", "title": "" }, { "docid": "e06770f85ad95115e8472fa65b0d7af5", "score": "0.5995545", "text": "func ResetPassword(email string) error {\n\tres, err := http.Get(Host + strings.Replace(ResetPasswordPath, \"{email}\", email, -1))\n\n\tif err != nil {\n\t\treturn errors.NewStackError(err)\n\t}\n\tdefer res.Body.Close()\n\n\tresetRes := new(responses.Res)\n\tdecoder := json.NewDecoder(res.Body)\n\terr = decoder.Decode(resetRes)\n\tif err != nil {\n\t\treturn errors.NewStackError(err)\n\t}\n\n\tif resetRes.Status == \"success\" {\n\t\treturn nil\n\t}\n\n\tif strings.Contains(resetRes.Error(), \"not found\") {\n\t\treturn errors.ErrInvalidEmail\n\t}\n\n\treturn errors.NewStackError(errors.ErrResetRequest)\n}", "title": "" }, { "docid": "fcbbdc64d515c2500ea265a3f2c2a0fd", "score": "0.5993545", "text": "func (m *Message) SetEmail(email string) {\n\tm.Email = append(m.Email, []byte(email))\n}", "title": "" }, { "docid": "75cc73bfed39679e65a95430e58aa109", "score": "0.59871984", "text": "func (o *RequestsInvitationAccountRequest) SetEmail(v string) {\n\to.Email = v\n}", "title": "" }, { "docid": "2835fbafda297c15137efd875b95625f", "score": "0.5943469", "text": "func (o *AccountIdentityMatchScoreAllOf) UnsetEmailAddress() {\n\to.EmailAddress.Unset()\n}", "title": "" }, { "docid": "a7d5e44e28d258ce1d5eb1634656988b", "score": "0.59385335", "text": "func (u *user) changeEmail(email string) {\r\n\tu.email = email\r\n}", "title": "" }, { "docid": "1d88aaf6eef0809f1dc03ff22aecde9c", "score": "0.5936082", "text": "func (m *DataSubject) SetEmail(value *string)() {\n m.email = value\n}", "title": "" }, { "docid": "1bd8c25f4c7a9e8d6abf006baba19ee3", "score": "0.59312373", "text": "func (c *Updater) Email(email string) *Updater {\n\tc.email = email\n\treturn c\n}", "title": "" }, { "docid": "afb5cdef46f62a17e95e0ccc5e8171d6", "score": "0.593042", "text": "func SendPasswordResetEmail(emailAddress, urlEndpoint string) error {\n\tvar email = NewEmail(emailAddress, resetPasswordSubject, resetPasswordTemplate, urlEndpoint)\n\n\treturn email.Send()\n}", "title": "" }, { "docid": "9ab4514732a0f3fe43dec6743b20d6a5", "score": "0.5904538", "text": "func (uuo *UserUpdateOne) SetNillableEmail(s *string) *UserUpdateOne {\n\tif s != nil {\n\t\tuuo.SetEmail(*s)\n\t}\n\treturn uuo\n}", "title": "" }, { "docid": "59b9358be3e5a2832f682a810dcdec27", "score": "0.5901811", "text": "func (tc *TechnicianCreate) SetEmail(s string) *TechnicianCreate {\n\ttc.email = &s\n\treturn tc\n}", "title": "" }, { "docid": "59b9358be3e5a2832f682a810dcdec27", "score": "0.5901811", "text": "func (tc *TechnicianCreate) SetEmail(s string) *TechnicianCreate {\n\ttc.email = &s\n\treturn tc\n}", "title": "" }, { "docid": "0692b91ac4bbd0430ee703c06eb551d9", "score": "0.589879", "text": "func (s Student) changeEmail (email string) {\n\ts.Email = email\n}", "title": "" }, { "docid": "24553e7da00bf6380e63b4ba4ba06cf1", "score": "0.588517", "text": "func (o *UserWithTicket) SetEmail(v string) {\n\to.Email = v\n}", "title": "" }, { "docid": "3062168091189f8537f062abbcd3a292", "score": "0.5877059", "text": "func SendPasswordResetEmail(email string) error {\n\ttoken := string(genRandBytes())\n\tvalidTokens = append(validTokens, token)\n\tresetLink := \"http://localhost:3000/reset?user=\" + email + \"&token=\" + token\n\n\tusername := os.Getenv(\"GMAIL_USERNAME\")\n\tpassword := os.Getenv(\"GMAIL_PASSWORD\")\n\n\tauth := smtp.PlainAuth(\"smtp.gmail.com:587\", username, password, \"smtp.gmail.com\")\n\treturn smtp.SendMail(\"smtp.gmail.com:587\", auth, username,\n\t\t[]string{email}, []byte(\"Click here to reset your password\"+resetLink))\n}", "title": "" }, { "docid": "e09ee45f087af5dbcc528ad0de7641f0", "score": "0.5872226", "text": "func (o *Subscriber) SetEmail(v string) {\n\to.Email = &v\n}", "title": "" }, { "docid": "e27a1523476ae6f80feb332cb0380256", "score": "0.58704716", "text": "func (o *PostAttendanceParams) SetEmail(email string) {\n\to.Email = email\n}", "title": "" }, { "docid": "0412c504ed086453551781f4cb784de1", "score": "0.58580273", "text": "func (o *Register) SetEmail(v string) {\n\to.Email = v\n}", "title": "" }, { "docid": "432742d603ab7d81be87d99f5952354d", "score": "0.58573925", "text": "func (o *ApiKeyResponse) SetEmail(v string) {\n\to.Email = v\n}", "title": "" }, { "docid": "3599a757436a3b4bdc91b37b323fc12a", "score": "0.5855999", "text": "func (o *CreateWorkspaceInvitation) SetEmail(v string) {\n\to.Email = v\n}", "title": "" }, { "docid": "e348100c2a4a859c7e36af0baa5a5e51", "score": "0.58491015", "text": "func (uu *UserUpdate) SetNillableEmail(s *string) *UserUpdate {\n\tif s != nil {\n\t\tuu.SetEmail(*s)\n\t}\n\treturn uu\n}", "title": "" }, { "docid": "76aa84bf1399d4499624ba55b9af1678", "score": "0.584518", "text": "func (m *UserManager) ChangeEmail(username, email string) error {\n\tuser, err := m.Get(username)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error getting user %v\", err)\n\t}\n\tif email != user.Email {\n\t\tif err := m.DB.Model(&user).Update(\"email\", email).Error; err != nil {\n\t\t\treturn fmt.Errorf(\"Update %v\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b698f2660631dbf6c2f78c8292a9ca7d", "score": "0.5835117", "text": "func (a *Developer) SetEmail(value string) {\n\tcopy := value\n\ta.Email = &copy\n\n}", "title": "" }, { "docid": "f115718d9f2bf40c4074fdd57c452c01", "score": "0.58126485", "text": "func (s *UserData) SetEmail(v string) *UserData {\n\ts.Email = &v\n\treturn s\n}", "title": "" }, { "docid": "b5a02f99f8759bf59078091646cedeab", "score": "0.5799459", "text": "func (m *UserMutation) EmailCleared() bool {\n\t_, ok := m.clearedFields[user.FieldEmail]\n\treturn ok\n}", "title": "" }, { "docid": "23c81b08c0755f2ea802a643c236ed5c", "score": "0.5793778", "text": "func SendForgotEmail(email string, userCompleteName string, username string, password string) {\n\temailArray := []string{email}\n\twelcomeEmailReq := NewRequest(emailArray, \"Password Restore\", \"\")\n\tforgotData := map[string]interface{}{\n\t\t\"Name\": userCompleteName,\n\t\t\"Username\": username,\n\t\t\"Password\": password,\n\t}\n\twelcomeEmailReq.ParseTemplate(\"ForgotPass.html\", forgotData)\n\twelcomeEmailReq.SendEmail()\n}", "title": "" }, { "docid": "39e025088cab50c9fce75f042107329c", "score": "0.57749146", "text": "func (o *RegisterDetails) SetEmail(v string) {\n\to.Email = &v\n}", "title": "" }, { "docid": "1edd0028bfb38774c4042d9de4b926be", "score": "0.5765684", "text": "func (s *Service) AccountChangeEmail(o struct {\n\tEmail string `json:\"email\"` // unique email address of account\n\tPassword string `json:\"password\"` // current password on the account\n}) (*Account, error) {\n\tvar account Account\n\treturn &account, s.Patch(&account, fmt.Sprintf(\"/account\"), o)\n}", "title": "" }, { "docid": "862640105a4345e703312736f94f6e20", "score": "0.5760936", "text": "func (s *CreateUserInput) SetEmail(v string) *CreateUserInput {\n\ts.Email = &v\n\treturn s\n}", "title": "" }, { "docid": "4f6def4917017165e962df131e032eb0", "score": "0.5747455", "text": "func (this *ForgotController) Reset() {\n\tthis.TplName = \"auth/reset.html\"\n\n\tcode := this.GetString(\":code\")\n\tthis.Data[\"Code\"] = code\n\n\tvar user user.User\n\n\tif this.UserService.VerifyUserResetPwdCode(&user, code) {\n\t\tthis.Data[\"Success\"] = true\n\t\tform := ResetPwdModel{}\n\t\tthis.SetFormSets(&form)\n\t} else {\n\t\tthis.Data[\"Success\"] = false\n\t}\n}", "title": "" }, { "docid": "67af2cd1f09f1a8392d87de9f0577659", "score": "0.5726817", "text": "func (a *Contributor) SetEmail(value string) {\n\tcopy := value\n\ta.Email = &copy\n\n}", "title": "" }, { "docid": "810be8be2494bff9370b38d6e68f3d20", "score": "0.57102317", "text": "func (s *UserService) RequestResetPassword(ctx context.Context, email string, ip string) error {\n\tq := datastore.NewQuery(UserKind).Filter(\"Email =\", email)\n\tt := q.Run(ctx)\n\tvar user goparent.User\n\t_, err := t.Next(&user)\n\tif err != nil {\n\t\treturn ErrInvalidEmail\n\t}\n\n\t// log.Println(\"password reset requested for user\", user.Email)\n\n\t// userKey := datastore.NewKey(ctx, UserKind, user.ID, 0, nil)\n\tresetKey := datastore.NewIncompleteKey(ctx, ResetKind, nil)\n\n\tresetRequest := &goparent.UserReset{\n\t\tTimestamp: time.Now(),\n\t\tRequestAddr: ip,\n\t\tEmail: email,\n\t}\n\n\tkey, err := datastore.Put(ctx, resetKey, resetRequest)\n\tif err != nil {\n\t\treturn err\n\t}\n\t//this key needs to be emailed to the user. should eventually make this a jwt reset.\n\tcode := encodeInt(key.IntID())\n\tlog.Println(\"password reset key is\", key.IntID(), code)\n\n\tresetMessage := mail.Message{\n\t\tSender: \"noreply@goparent-181120.appspotmail.com\",\n\t\tTo: []string{user.Email},\n\t\tSubject: \"GoParent password reset\",\n\t\tBody: fmt.Sprintf(\"your password reset code is: %s\", code),\n\t}\n\n\terr = mail.Send(ctx, &resetMessage)\n\tif err != nil {\n\t\tlog.Printf(\"error sending mail: %#v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "acd072d7a7cb25e305e8ddcf6741d12e", "score": "0.5707899", "text": "func (s *userMethodsrvc) ChangeEmail(ctx context.Context, p *usermethod.ChangeEmailPayload) (res *usermethod.ResponseResult, err error) {\n\tuser, err := TokenToUser(p.Token)\n\tif err != nil {\n\t\treturn &usermethod.ResponseResult{}, ErrInvalidToken\n\t}\n\tupdataInfo := map[string]interface{}{\n\t\t\"password\": p.Email,\n\t\t\"activate\": false,\n\t}\n\t_, err = pg.UpdateUser(user, updataInfo)\n\tif err != nil {\n\t\treturn &usermethod.ResponseResult{}, err\n\t}\n\tresMsg := \"success to change email,please send email to activate your account\"\n\tres = &usermethod.ResponseResult{\n\t\tCode:http.StatusOK,\n\t\tMessage: &resMsg,\n\t}\n\treturn res,nil\n}", "title": "" }, { "docid": "3862f60e8fd5d51225079acf806f26d3", "score": "0.5702069", "text": "func (uc *UserCreate) SetEmail(s string) *UserCreate {\n\tuc.email = &s\n\treturn uc\n}", "title": "" }, { "docid": "8b9dde43bb50695937a9ba908ccf0aa4", "score": "0.57006633", "text": "func (store *MongoDBWrapper) ResetLastCodeRequest(mail string) error {\n\treturn store.ChangeFieldValue(mail, \"LastCodeRequest\", time.Now().Unix())\n}", "title": "" }, { "docid": "2d5a8b2cc86f490e8945537f2d3961b5", "score": "0.56636864", "text": "func ResetPassword(opt ResetPasswordModel) (string, error) {\n\thermes := opt.Hermes\n\temail := opt.Email\n\tswitch opt.MimeType {\n\tcase MimeTypeHTML:\n\t\temailBody, err := hermes.GenerateHTML(email)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\treturn emailBody, nil\n\tdefault:\n\t\temailText, err := hermes.GeneratePlainText(email)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\n\t\treturn emailText, nil\n\t}\n}", "title": "" }, { "docid": "1798452317d0092656179b6c44a76f37", "score": "0.5645967", "text": "func (u *user) updateEmail(email string) {\n\tu.email = email\n}", "title": "" }, { "docid": "94b2cd56cc7205ab9fbed62cd5670bb5", "score": "0.56408906", "text": "func (o *User) SetEmail(v string) {\n\to.Email = &v\n}", "title": "" }, { "docid": "3067d7ee92c1c52bbd5e28a4d37e950c", "score": "0.56350356", "text": "func (s *DeveloperInfo) SetEmail(v string) *DeveloperInfo {\n\ts.Email = &v\n\treturn s\n}", "title": "" }, { "docid": "2d775dd449aa1e549b574ad3e3a55b8c", "score": "0.5575705", "text": "func ResetUser(email string) bool {\n\tctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)\n\tdefer cancel()\n\tfilter := bson.D{\n\t\t{\"email\", email},\n\t}\n\tupdate := bson.D{\n\t\t{\n\t\t\t\"$set\", bson.D{{\"epass_issued\", false}},\n\t\t},\n\t}\n\tupdateResult, err := userCl.UpdateOne(ctx, filter, update)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn false\n\t}\n\tfmt.Printf(\"Matched %v documents and updated %v documents.\\n\", updateResult.MatchedCount, updateResult.ModifiedCount)\n\treturn true\n}", "title": "" }, { "docid": "59cfad115a1f1c36c577a6863021cb38", "score": "0.557535", "text": "func (a *AntibruteforceUsecase) Reset(ctx context.Context, login string, ip string) error {\n\tctx, cancel := context.WithTimeout(ctx, time.Duration(a.config.ContextTimeout)*time.Millisecond)\n\tdefer cancel()\n\n\tif login == \"\" {\n\t\treturn errors.ErrLoginRequired\n\t}\n\n\tif net.ParseIP(ip) == nil {\n\t\treturn errors.ErrWrongIP\n\t}\n\n\treturn a.bucketRepo.Reset(ctx, []string{consts.LoginPrefix + login, consts.IPPrefix + ip})\n}", "title": "" }, { "docid": "48106fc6f5e1f7868095be2a3e7d8a52", "score": "0.55717534", "text": "func (client *Client) SetRecoveryEmailAddress(req *SetRecoveryEmailAddressRequest) (*PasswordState, error) {\n\tresult, err := client.Send(Request{\n\t\tmeta: meta{\n\t\t\tType: \"setRecoveryEmailAddress\",\n\t\t},\n\t\tData: map[string]interface{}{\n\t\t\t\"password\": req.Password,\n\t\t\t\"new_recovery_email_address\": req.NewRecoveryEmailAddress,\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif result.Type == \"error\" {\n\t\treturn nil, buildResponseError(result.Data)\n\t}\n\n\treturn UnmarshalPasswordState(result.Data)\n}", "title": "" }, { "docid": "fc3f921764fe9c1502fffdb2d83eda80", "score": "0.5543081", "text": "func EditSelfEmail(uuid string, email string) (err error) {\n\t_, err = db.Exec(\"UPDATE users SET email=? WHERE uuid=?\", email, uuid)\n\treturn\n}", "title": "" }, { "docid": "e9eb02e0b91921a87cf6c9acf2c49129", "score": "0.5542262", "text": "func (m *UserMutation) ResetPasswordChangedAt() {\n\tm.password_changed_at = nil\n}", "title": "" }, { "docid": "c1a1ec02c20ff88f18b7b867642323f1", "score": "0.55389684", "text": "func (r *AccountsService) ResetPassword(googlecloudidentitytoolkitv1resetpasswordrequest *GoogleCloudIdentitytoolkitV1ResetPasswordRequest) *AccountsResetPasswordCall {\n\tc := &AccountsResetPasswordCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.googlecloudidentitytoolkitv1resetpasswordrequest = googlecloudidentitytoolkitv1resetpasswordrequest\n\treturn c\n}", "title": "" }, { "docid": "aa46d232e2266d5424aadedc3e1e2705", "score": "0.55235404", "text": "func (uc *UserCreate) SetNillableEmail(s *string) *UserCreate {\n\tif s != nil {\n\t\tuc.SetEmail(*s)\n\t}\n\treturn uc\n}", "title": "" }, { "docid": "1e91392f437e880e3c81af9c7aa29ed5", "score": "0.5512433", "text": "func (*Git) UnsetLocalUserEmail() error {\n\tcmd := exec.Command(\"git\", \"config\", \"--local\", \"--unset-all\", \"user.email\")\n\treturn cmd.Run()\n}", "title": "" }, { "docid": "41f286c90da17638aa05dd70ff422a8c", "score": "0.55078924", "text": "func Email(email string) {\n\tif c, ok := contactDefinition(); ok {\n\t\tc.Email = email\n\t}\n}", "title": "" }, { "docid": "fe62cc876c92981a089317f415f9fe24", "score": "0.5490439", "text": "func (r ApiApiAccountsIdUsersGetRequest) Email(email string) ApiApiAccountsIdUsersGetRequest {\n\tr.email = &email\n\treturn r\n}", "title": "" }, { "docid": "48932d4b2c33fd5e5df50248c4af069a", "score": "0.54881835", "text": "func clear_mail(email string) bool{\n\texpression := regexp.MustCompile(\"^[a-zA-Z0-9.!#$%&'*+/=?^_`{|}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$\")\n\tresult := expression.MatchString(email)\n\treturn result\n}", "title": "" }, { "docid": "412d34485103f3c902d2b958a54f41dd", "score": "0.54759294", "text": "func (u *User) ChangeEmailAddress(ctx context.Context, email EmailAddress) error {\n\te := EmailAddressWasChanged{\n\t\tID: u.id,\n\t\tEmail: email,\n\t}\n\n\tif err := u.transition(e); err != nil {\n\t\treturn apperrors.Wrap(err)\n\t}\n\n\tdomainEvent, err := domain.NewEventFromRawEvent(u.id, StreamName, u.version, e)\n\tif err != nil {\n\t\treturn apperrors.Wrap(err)\n\t}\n\n\tif err := u.trackChange(ctx, domainEvent); err != nil {\n\t\treturn apperrors.Wrap(err)\n\t}\n\n\treturn nil\n}", "title": "" } ]
6dd54d9fd9098660dc4adcf95eb3aa92
ConstructCompositeKey builds the History Key of: "namespace key blocknum trannum"", with namespace being the chaincode id
[ { "docid": "69e9029f4aa22b5e02844dcb30b51d06", "score": "0.76262563", "text": "func ConstructCompositeKey(ns string, key string, blocknum uint64, trannum uint64) string {\n\t// TODO - We will likely want sortable varint encoding, rather then a simple number, in order to support sorted key scans\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(ns)\n\tbuffer.WriteByte(0)\n\tbuffer.WriteString(key)\n\tbuffer.WriteByte(0)\n\tbuffer.WriteString(strconv.Itoa(int(blocknum)))\n\tbuffer.WriteByte(0)\n\tbuffer.WriteString(strconv.Itoa(int(trannum)))\n\n\treturn buffer.String()\n}", "title": "" } ]
[ { "docid": "870dbde8bdd77e4e2f420c2bef01ebb9", "score": "0.692337", "text": "func ConstructCompositeKey(prefix string, key string) string {\n\treturn strings.Join([]string{prefix, key}, stateKeyDelimiter)\n}", "title": "" }, { "docid": "870dbde8bdd77e4e2f420c2bef01ebb9", "score": "0.692337", "text": "func ConstructCompositeKey(prefix string, key string) string {\n\treturn strings.Join([]string{prefix, key}, stateKeyDelimiter)\n}", "title": "" }, { "docid": "8270a8f8b1903582966a64c13e13030f", "score": "0.6913456", "text": "func ConstructCompositeKey(chaincodeID string, key string) []byte {\n\treturn bytes.Join([][]byte{[]byte(chaincodeID), []byte(key)}, stateKeyDelimiter)\n}", "title": "" }, { "docid": "f0e491d46921247e4fe6d5add22c7ec6", "score": "0.6039779", "text": "func ConstructPartialCompositeKey(ns string, key string, endkey bool) []byte {\n\tcompositeKey := []byte(ns)\n\tcompositeKey = append(compositeKey, compositeKeySep...)\n\tcompositeKey = append(compositeKey, []byte(key)...)\n\tif endkey {\n\t\tcompositeKey = append(compositeKey, []byte(\"1\")...)\n\t}\n\treturn compositeKey\n}", "title": "" }, { "docid": "2ae1116ccf0d75893b512320cf41ead5", "score": "0.60372996", "text": "func MakeCompositeKey(vals ...tree.Datum) Key {\n\tswitch len(vals) {\n\tcase 0:\n\t\treturn Key{}\n\tcase 1:\n\t\treturn Key{firstVal: vals[0]}\n\t}\n\treturn Key{firstVal: vals[0], otherVals: vals[1:]}\n}", "title": "" }, { "docid": "a178a7365bf6f9bb18fbe845c1a33861", "score": "0.6016236", "text": "func createCompositeKey(objectType string, attributes []string) (string, error) {\n\tif err := validateCompositeKeyAttribute(objectType); err != nil {\n\t\treturn \"\", err\n\t}\n\tck := compositeKeyNamespace + objectType + string(minUnicodeRuneValue)\n\tfor _, att := range attributes {\n\t\tif err := validateCompositeKeyAttribute(att); err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tck += att + string(minUnicodeRuneValue)\n\t}\n\treturn ck, nil\n}", "title": "" }, { "docid": "a178a7365bf6f9bb18fbe845c1a33861", "score": "0.6016236", "text": "func createCompositeKey(objectType string, attributes []string) (string, error) {\n\tif err := validateCompositeKeyAttribute(objectType); err != nil {\n\t\treturn \"\", err\n\t}\n\tck := compositeKeyNamespace + objectType + string(minUnicodeRuneValue)\n\tfor _, att := range attributes {\n\t\tif err := validateCompositeKeyAttribute(att); err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tck += att + string(minUnicodeRuneValue)\n\t}\n\treturn ck, nil\n}", "title": "" }, { "docid": "57324101557f2fe5ab64ccd86ef56ca6", "score": "0.5791094", "text": "func ConstructLegacyKey(height uint64) hash.Hash160 {\n\theightInBytes := byteutil.Uint64ToBytes(height)\n\tk := []byte(CandidatesPrefix)\n\tk = append(k, heightInBytes...)\n\treturn hash.Hash160b(k)\n}", "title": "" }, { "docid": "c65df93cc2546b99620d9f0fa9b47e97", "score": "0.56050134", "text": "func (stub *CustomMockStub) CreateCompositeKey(objectType string, attributes []string) (string, error) {\n\tbaseMockStub := new(shim.MockStub)\n\treturn baseMockStub.CreateCompositeKey(objectType, attributes)\n}", "title": "" }, { "docid": "06e032ba4d9a2ccc4bd8e1648221faea", "score": "0.559334", "text": "func CreateUnivocalCompositeKey(keyPrefix string, number string, stub shim.ChaincodeStubInterface) (univocalCompositeKey string, err error) {\n\tunivocalCompositeKey = keyPrefix+number\n\tif err != nil {\n\t\treturn univocalCompositeKey, err\n\t}\n\tfmt.Println(len(univocalCompositeKey))\n\treturn univocalCompositeKey, nil\n}", "title": "" }, { "docid": "b7bb651560bf3c596902e132a54677af", "score": "0.5559394", "text": "func CompositeKeyOf(key string) CompositeKey {\n\treturn CompositeKey{keyRegex.FindStringSubmatch(key)}\n}", "title": "" }, { "docid": "dd0a5a6c9ced8e9ebe5d46496aff0780", "score": "0.5546061", "text": "func SplitCompositeKey(stub shim.ChaincodeStubInterface, key string) (*CompositeKey, error) {\n\tif !IsCompositeKey(key) {\n\t\treturn nil, errors.New(\"key value is not a composite key\")\n\t}\n\n\tname, attrs, err := stub.SplitCompositeKey(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(attrs) == 0 {\n\t\treturn nil, errors.New(\"key value contains no attributes\")\n\t}\n\n\t// the last composite attribute must be the state key\n\tstateKey := attrs[len(attrs)-1]\n\treturn &CompositeKey{\n\t\tName: name,\n\t\tFields: attrs,\n\t\tKey: stateKey,\n\t}, nil\n}", "title": "" }, { "docid": "253cdb07b7c927c4187dca6737de71df", "score": "0.5522829", "text": "func BuildKey(bucket Bucket, key []byte) (bkey []byte) {\n\tfor {\n\t\tbkey = append(key, byte(bucket)|0x80)\n\t\tif bucket == 0 {\n\t\t\treturn bkey\n\t\t}\n\t\tbucket = bucket >> 7\n\t}\n}", "title": "" }, { "docid": "f98a1fe5cfd17c6564f8e39396179e04", "score": "0.548033", "text": "func createTxKey(txID string) (string, error) {\n\treturn createCompositeKey(tokenTx, []string{txID})\n}", "title": "" }, { "docid": "796c67b30a1a1d9dbd2a9937d3fc1f04", "score": "0.54676825", "text": "func ConstructCreateKey(owner uint32, pcr_nums []int, parent_password string, owner_password string,\n\tparms RsaParams) ([]byte, error) {\n\tcmdHdr, err := MakeCommandHeader(tagSESSIONS, 0, cmdCreate)\n\tif err != nil {\n\t\treturn nil, errors.New(\"ConstructCreateKey failed\")\n\t}\n\tvar empty []byte\n\tb1 := SetHandle(Handle(owner))\n\tb2, _ := pack([]interface{}{&empty})\n\tb3 := CreatePasswordAuthArea(parent_password, Handle(OrdTPM_RS_PW))\n\tt1 := SetPasswordData(owner_password)\n\tb4 := CreateSensitiveArea(t1[2:], empty)\n\tb5 := CreateRsaParams(parms)\n\tb6, _ := pack([]interface{}{&empty})\n\tb7 := CreateLongPcr(uint32(1), pcr_nums)\n\targ_bytes := append(b1, b2...)\n\targ_bytes = append(arg_bytes, b3...)\n\targ_bytes = append(arg_bytes, b4...)\n\targ_bytes = append(arg_bytes, b5...)\n\targ_bytes = append(arg_bytes, b6...)\n\targ_bytes = append(arg_bytes, b7...)\n\tcmd_bytes := packWithBytes(cmdHdr, arg_bytes)\n\treturn cmd_bytes, nil\n}", "title": "" }, { "docid": "8138291ce30a332758be626be26626cc", "score": "0.54257965", "text": "func ConstructKey(key string) hash.Hash256 {\n\tbytesKey := []byte(key)\n\treturn hash.Hash256b(bytesKey)\n}", "title": "" }, { "docid": "43f2eebd7a5317887edbb25a5d49fef0", "score": "0.5409201", "text": "func buildNewKey(origKey string) string {\n\tpieces := btSplitter(origKey)\n\n\tret := origKey[len(pieces[0])+1:]\n\tret = ret[:len(pieces[1])] + ret[len(pieces[1])+1:]\n\treturn ret\n}", "title": "" }, { "docid": "83a70c8182a542c5355929e1499a23e9", "score": "0.53388387", "text": "func newKey(kind, stringID string, intID int64, datasetID, name string, namespace string) *Key {\n\treturn &Key{\n\t\tkind: kind,\n\t\tstringID: stringID,\n\t\tname: name,\n\t\tintID: intID,\n\t\tdatasetID: datasetID,\n\t\tnamespace: namespace,\n\t}\n}", "title": "" }, { "docid": "f4f577a554274208159bb34463980513", "score": "0.5291021", "text": "func toKey(branch, target, buildID string) ([]byte, error) {\n\tid, err := strconv.Atoi(buildID)\n\tif err != nil {\n\t\treturn []byte{}, err\n\t}\n\tpaddedID := []byte(fmt.Sprintf(\"%020d\", id))\n\treturn append([]byte(fmt.Sprintf(\"%s:%s:\", branch, target)), invertBSlice(paddedID)...), nil\n}", "title": "" }, { "docid": "9f21d6bb74a33399161ecbb742b1919a", "score": "0.52607095", "text": "func CreateNamespaceKey(prefix, thID string) (string, error) {\n\tkey, err := computeHash([]byte(thID))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn getNamespaceKeyPrefix(prefix)(key), nil\n}", "title": "" }, { "docid": "9418504b6d4f021d5a9d83680eb402b2", "score": "0.52224964", "text": "func makeKey(prefix []byte, key []byte, timestamp time.Time) []byte {\n\tv := make([]byte, 8)\n\tbinary.BigEndian.PutUint64(v, uint64(timestamp.UnixNano()))\n\treturn append(append(prefix, key...), v...)\n}", "title": "" }, { "docid": "01a95eec8a25c84398bb65f7a38a3ec8", "score": "0.5161295", "text": "func key_creator(primary_hash_key string) *dynamodb.Key {\n key := &dynamodb.Key{\n HashKey: msid}\n\n return key\n}", "title": "" }, { "docid": "7b2526a931ae1c75a7ca3b47fa1061d5", "score": "0.5161259", "text": "func (l4netlb *L4NetLB) createKey(name string) (*meta.Key, error) {\n\treturn composite.CreateKey(l4netlb.cloud, name, l4netlb.scope)\n}", "title": "" }, { "docid": "7b2526a931ae1c75a7ca3b47fa1061d5", "score": "0.5161259", "text": "func (l4netlb *L4NetLB) createKey(name string) (*meta.Key, error) {\n\treturn composite.CreateKey(l4netlb.cloud, name, l4netlb.scope)\n}", "title": "" }, { "docid": "bede593227d49179a609ac256340cf49", "score": "0.5158081", "text": "func MakeCompositeKey(stub shim.ChaincodeStubInterface, keyName string, attributes []string, keyValue string, value interface{}) (string, bool) {\n\tif len(keyName) == 0 || len(attributes) == 0 {\n\t\tlogger.Debugf(\"invalid composite key definition: name %s attributes %+v\\n\", keyName, attributes)\n\t\treturn \"\", false\n\t}\n\tattrValues := ExtractDataAttributes(attributes, value)\n\tif len(attrValues) == 0 {\n\t\tlogger.Infof(\"no field specified for composite key %s in data %+v\\n\", keyName, value)\n\t\treturn \"\", false\n\t}\n\n\tif len(attrValues) >= len(attributes)-1 {\n\t\t// append the key value if at most 1 attribute missing and key value is not included\n\t\tif len(keyValue) > 0 && keyValue != attrValues[len(attrValues)-1] {\n\t\t\tattrValues = append(attrValues, keyValue)\n\t\t}\n\t}\n\n\tcompositeKey, err := stub.CreateCompositeKey(keyName, attrValues)\n\tif err != nil {\n\t\tlogger.Warnf(\"failed to create composite key %s with values %+v\\n\", keyName, attrValues)\n\t\treturn \"\", false\n\t}\n\treturn compositeKey, len(attrValues) >= len(attributes)\n}", "title": "" }, { "docid": "5721805593ad81e3a1ad13c3d298fe6e", "score": "0.5122873", "text": "func Key(grp, ver, typ, name, namespace string) string {\n\treturn grp + \"/\" + ver + \"/\" + typ + \"/\" + namespace + \"/\" + name // Format: %s/%s/%s/%s/%s\n}", "title": "" }, { "docid": "203a552f000218a88eb2f4fd76ad7e57", "score": "0.50877213", "text": "func headerHashKey(number uint64) []byte {\r\n return append(append(headerPrefix, encodeBlockNumber(number)...), headerHashSuffix...)\r\n}", "title": "" }, { "docid": "fdbf58b50f8000d4b4f456d250b8808b", "score": "0.5072479", "text": "func headerKey(number uint64, hash common.Hash) []byte {\r\n return append(append(headerPrefix, encodeBlockNumber(number)...), hash.Bytes()...)\r\n}", "title": "" }, { "docid": "ce65c7a0a2ff8b97aaf0ff13fa6be5df", "score": "0.50715524", "text": "func makeKey(id storage.ContractID, field string) (key []byte, err error) {\n\t// validate the contract id\n\tif len(id) == 0 {\n\t\terr = errors.New(\"the storage contract id cannot be empty\")\n\t\treturn\n\t}\n\n\t// make the key\n\tkey = append(key, append(id[:], field...)...)\n\treturn\n}", "title": "" }, { "docid": "de5b63534cf84f4a686e66e9b514e77a", "score": "0.5013233", "text": "func newPrimaryKey(table string, parentKey *datastore.Key) *datastore.Key {\n\tif parentKey != nil && ((parentKey.Kind == table && parentKey.Name != \"\") ||\n\t\t(parentKey.Kind == table && parentKey.ID > 0)) {\n\t\treturn parentKey\n\t}\n\n\trand.Seed(time.Now().UnixNano())\n\tstrID := strconv.FormatInt(time.Now().Unix(), 10) + strconv.FormatInt(rand.Int63n(maxSeed-minSeed)+minSeed, 10)\n\tid, _ := strconv.ParseInt(strID, 10, 64)\n\tif parentKey != nil && parentKey.Kind == table {\n\t\tparentKey.ID = id\n\t\treturn parentKey\n\t}\n\n\tkey := new(datastore.Key)\n\tkey.Kind = table\n\tkey.ID = id\n\tif parentKey != nil {\n\t\tkey.Parent = parentKey\n\t}\n\treturn key\n}", "title": "" }, { "docid": "464413e8e04dd27fbf8d0e316da97b61", "score": "0.4996683", "text": "func CreateCompositKeyAndPut(stub shim.ChaincodeStubInterface, keytype string, keycode []string, data []byte) (*string, error) {\n\t// create composite key\n\tcompositeKey, err := stub.CreateCompositeKey(keytype, keycode)\n\tif err != nil {\n\t\treturn nil, model.NewCustomError(model.CreateCompositeKeyErrorType, \"compositeKey\", err.Error())\n\t}\n\t// save data\n\terr = stub.PutState(compositeKey, data)\n\tif err != nil {\n\t\treturn nil, model.NewCustomError(model.PutStateErrorType, compositeKey, err.Error())\n\t}\n\treturn &compositeKey, nil\n}", "title": "" }, { "docid": "e5bd9a73223f6f61576f4117e02f979f", "score": "0.49945804", "text": "func CtxKey() any {\n\treturn struct{ name string }{name: \"colima_config\"}\n}", "title": "" }, { "docid": "8b13fdb6698e32a05cd6506bae0f23b8", "score": "0.49925965", "text": "func createKeyTemplate(curve bbspb.BBSCurveType, group bbspb.GroupField, hash commonpb.HashType) *tinkpb.KeyTemplate {\n\tformat := &bbspb.BBSKeyFormat{\n\t\tParams: &bbspb.BBSParams{\n\t\t\tHashType: hash,\n\t\t\tCurve: curve,\n\t\t\tGroup: group,\n\t\t},\n\t}\n\n\tserializedFormat, err := proto.Marshal(format)\n\tif err != nil {\n\t\tpanic(\"failed to marshal BBSKeyFormat proto\")\n\t}\n\n\treturn &tinkpb.KeyTemplate{\n\t\tTypeUrl: bbsSignerKeyTypeURL,\n\t\tValue: serializedFormat,\n\t\tOutputPrefixType: tinkpb.OutputPrefixType_RAW,\n\t}\n}", "title": "" }, { "docid": "39a4163ee5105cc7cd2659a36f79fffb", "score": "0.49554384", "text": "func (m *Module) generateHistoryKey() (key string) {\n\t// Generate key\n\tvar runType string\n\tif m.RunOnce {\n\t\trunType = \"RunOnce\"\n\t}\n\tif m.RunPerInstance {\n\t\trunType = \"RunPerInstance\"\n\t}\n\tif m.RunPerBoot {\n\t\trunType = \"RunPerBoot\"\n\t}\n\treturn strconv.Itoa(m.PriorityGroup) + \"_\" + runType + \"_\" + m.Type + \"_\" + m.Name\n}", "title": "" }, { "docid": "bed0abdbdedad646320a8366ab2f5507", "score": "0.4954702", "text": "func RuleChainKey(name string) string {\n\treturn models.Key(&RuleChain{\n\t\tName: name,\n\t})\n}", "title": "" }, { "docid": "d34b97d15ce78029daccffdea78fc56d", "score": "0.49355307", "text": "func createOutputKey(txID string, index int) (string, error) {\n\treturn createCompositeKey(tokenOutput, []string{txID, strconv.Itoa(index)})\n}", "title": "" }, { "docid": "8f33f635d6af8c7ca22cca0b101fad59", "score": "0.49162197", "text": "func IsCompositeKey(key string) bool {\n\treturn key[0] == compositeKeyNamespace[0]\n}", "title": "" }, { "docid": "7b915fc6e226d7193ed0bfbc399ddd26", "score": "0.4914854", "text": "func createKey(name, version, nodeID string) string {\n\treturn fmt.Sprintf(\"%s:%s:%s\", nodeID, name, version)\n}", "title": "" }, { "docid": "496a29965510efd3dba8f9f943d5a00c", "score": "0.48910186", "text": "func (this *LanguageDAOBolt) buildKey(code string) string {\n\treturn code\n}", "title": "" }, { "docid": "f9cf26dda38a37e5cdad28b20c4ee1ab", "score": "0.48521605", "text": "func CreateKey(prefix bool, sep string, visual string, args ...interface{}) Key {\n\tvar output string\n\n\tif prefix {\n\t\tpc, file, line, ok := runtime.Caller(1)\n\t\tif !ok {\n\t\t\treturn Key(fmt.Sprint(args...))\n\t\t}\n\t\tdetails := runtime.FuncForPC(pc)\n\t\toutput = fmt.Sprintf(\"%s_%s_%d_\", details.Name(), file, line)\n\t}\n\n\tif sep == \"\" {\n\t\toutput = output + fmt.Sprint(args...)\n\t} else {\n\t\tfor i, v := range args {\n\t\t\tif i != 0 {\n\t\t\t\toutput = output + sep\n\t\t\t}\n\t\t\toutput = output + fmt.Sprint(v)\n\t\t}\n\t}\n\n\treturn Key(output)\n}", "title": "" }, { "docid": "a0df913852e8438610e2ab488135649d", "score": "0.4850868", "text": "func ConstructTxSetKey(txSetID string) []byte {\n\treturn []byte(txSetID)\n}", "title": "" }, { "docid": "134da6b8554b9bc31a9e4a1713d6fd11", "score": "0.4843726", "text": "func (rt *rangeTree) makeKey(r Range) rangeKey {\n\trt.idCount++\n\treturn rangeKey{\n\t\tr: r,\n\t\tid: rt.idCount,\n\t}\n}", "title": "" }, { "docid": "9109a320b69e8d4bfdc414016184d900", "score": "0.48435527", "text": "func mvccEncodeKey(key Key, timestamp proto.Timestamp) Key {\n\tif timestamp.WallTime < 0 || timestamp.Logical < 0 {\n\t\tpanic(fmt.Sprintf(\"negative values disallowed in timestamps: %+v\", timestamp))\n\t}\n\tk := append([]byte{}, key...)\n\tk = encoding.EncodeUint64Decreasing(k, uint64(timestamp.WallTime))\n\tk = encoding.EncodeUint32Decreasing(k, uint32(timestamp.Logical))\n\treturn k\n}", "title": "" }, { "docid": "fc7abc8a3e87c781cf7436fd8dc5fc2c", "score": "0.4838578", "text": "func newKey(rawK string) (*Matrix, error) {\n\tbs, err := upperOnly(rawK)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"effective key is empty\")\n\t}\n\tsqr := math.Sqrt(float64(len(bs)))\n\tif sqr-math.Floor(sqr) != 0 {\n\t\treturn nil, fmt.Errorf(\"effective key size must be a square number, got %d\", len(bs))\n\t}\n\tif int(sqr) < 2 {\n\t\treturn nil, fmt.Errorf(\"cannot create key of order %d < 2\", int(sqr))\n\t}\n\tis := make([]int, len(bs))\n\tfor i, b := range bs {\n\t\tis[i] = int(b) - 'A'\n\t}\n\tkey, _ := NewMatrix(int(sqr), is) // Error is neglected since order is square\n\tif !key.IsInvertibleMod(mod) {\n\t\treturn nil, fmt.Errorf(\"key is not invertible modulo %d\", mod)\n\t}\n\treturn key, nil\n}", "title": "" }, { "docid": "53c98c93a42a72c8beb0dd79bc4022dc", "score": "0.48178577", "text": "func NewKey(comps ...string) *Key {\n\treturn &Key{Comp: comps}\n}", "title": "" }, { "docid": "4102fa6fbbd646dee7215da9e78fc355", "score": "0.4797452", "text": "func FactoidNewTransaction(key string) error {\n\t// Make sure we have a key\n\tif len(key) == 0 {\n\t\treturn fmt.Errorf(\"Missing transaction key\")\n\t}\n\n\tok := Utility.IsValidKey(key)\n\tif !ok {\n\t\treturn fmt.Errorf(\"Invalid name for transaction\")\n\t}\n\n\t// Make sure we don't already have a transaction in process with this key\n\tt, err := wallet.GetDB().Get([]byte(constants.DB_BUILD_TRANS), []byte(key), new(factoid.Transaction))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif t != nil {\n\t\treturn fmt.Errorf(\"Duplicate key: '%s'\", key)\n\t}\n\t// Create a transaction\n\tt = wallet.CreateTransaction(interfaces.GetTimeMilli())\n\t// Save it with the key\n\treturn wallet.GetDB().Put([]byte(constants.DB_BUILD_TRANS), []byte(key), t)\n}", "title": "" }, { "docid": "09269b9f5171d97afb0423dfb983cc7a", "score": "0.4784888", "text": "func MakeKey(prefix string, key interface{}) ([]byte, error) {\n\tkeyBytes, err := rlp.EncodeToBytes(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresult := []byte(prefix)\n\tresult = append(result, keyBytes...)\n\treturn result, nil\n}", "title": "" }, { "docid": "b643a507d8c810701e5046a20c2fa588", "score": "0.4771512", "text": "func MakeKey(val tree.Datum) Key {\n\treturn Key{firstVal: val}\n}", "title": "" }, { "docid": "b4efb7cbfff6fe98942de908601901fe", "score": "0.47447422", "text": "func (i18n *I18N) BuildI18nKey(mod string, str string) string {\n\treturn fmt.Sprintf(\"%s_%s\", mod, str)\n}", "title": "" }, { "docid": "6bf9d1ddb22d2b2e7ff7c8ab498dab3f", "score": "0.4743881", "text": "func (blockID BlockID) Key() string {\n\tbz, err := ser.EncodeToBytes(blockID.PartsHeader)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn blockID.Hash.String() + string(bz)\n}", "title": "" }, { "docid": "8df93cd35a433ef9fd50672c4e525d81", "score": "0.4743056", "text": "func (a AckID) ConstructCombinedID(sessionID uint64, ackMgrID uint64, index uint64) CombinedID {\n\treturn CombinedID(((sessionID << 48) & sessionIDMask) | ((ackMgrID << 32) & ackMgrIDMask) | (index & indexMask))\n}", "title": "" }, { "docid": "2736b55604b92722fe1bbd0e4e242ee6", "score": "0.47363317", "text": "func newKey(keys ...string) string {\n\tfinal := \"\"\n\tfor index, key := range keys {\n\t\tif index < 1 {\n\t\t\tfinal = key\n\t\t} else {\n\t\t\tfinal += \":\" + key\n\t\t}\n\t}\n\treturn final\n}", "title": "" }, { "docid": "bc638a8517431e31731d28bf53adff78", "score": "0.47309166", "text": "func (u *Unit) MakeKey(i int) string {\n\tu.ID = join(bitcoinEncoding[i/58], bitcoinEncoding[i%58])\n\treturn u.ID\n}", "title": "" }, { "docid": "e48fb09134bd6a7f2e39e848de9792d5", "score": "0.47198975", "text": "func NewKey(id *anypb.Any) (Key, error) {\n\tdata, err := protojson.Marshal(id)\n\tif err != nil {\n\t\treturn \"\", util.StatusWrap(err, \"Failed to marshal invocation ID\")\n\t}\n\treturn Key(data), nil\n}", "title": "" }, { "docid": "4d73cbec063634cbf86481800d7ae991", "score": "0.4706735", "text": "func (o *OperationManager) BuildCurrOpKey() string {\n\treturn fmt.Sprintf(\"opmanager:%s:current\", o.schedulerName)\n}", "title": "" }, { "docid": "ac5b064c7230b6f660f488606db39064", "score": "0.47062355", "text": "func (b burrow) toCacheKey() string {\n\ts := strings.Builder{}\n\tfor c := 1; c <= 11; c++ {\n\t\tp := pos{1, c}\n\t\ts.WriteByte(b[p])\n\t}\n\tfor _, c := range corridors {\n\t\tfor r := 2; r <= corridorBottom; r++ {\n\t\t\tp := pos{r, c}\n\t\t\ts.WriteByte(b[p])\n\t\t}\n\t}\n\treturn s.String()\n}", "title": "" }, { "docid": "79a5db432b4f164cd9ac8db165495eb9", "score": "0.47055078", "text": "func btRowKey(stream string, ts time.Time) string {\n\treturn fmt.Sprintf(\"%s#%s\", stream, ts.UTC().Format(util.SAFE_TIMESTAMP_FORMAT))\n}", "title": "" }, { "docid": "724a03c707c51d9d79905dfe0c99a037", "score": "0.47045106", "text": "func generateKey(endRangeKey string) ( string , int ) { \n result := strings.Split(endRangeKey, \":\")\n keyNumber, _ := strconv.Atoi(result[1])\n if keyNumber == 0 {\n keyNumber = 101\n } else {\n keyNumber += 1\n\t}\n\tkey := getKeyByRecordType(result[0] , keyNumber)\n\treturn key , keyNumber\n}", "title": "" }, { "docid": "6e68c80631a718bb4d96da5492be575a", "score": "0.4701959", "text": "func newKeybasePacket(body Packetable, doHash bool) (*keybasePacket, error) {\n\ttag, version := body.GetTagAndVersion()\n\tret := keybasePacket{\n\t\tBody: body,\n\t\tTag: tag,\n\t\tVersion: version,\n\t}\n\tif doHash {\n\t\tret.Hash = &keybasePacketHash{\n\t\t\tType: SHA256Code,\n\t\t\tValue: []byte{},\n\t\t}\n\t\thashBytes, hashErr := ret.hashSum()\n\t\tif hashErr != nil {\n\t\t\treturn nil, hashErr\n\t\t}\n\t\tret.Hash.Value = hashBytes\n\t}\n\treturn &ret, nil\n}", "title": "" }, { "docid": "9fc14c223934b183a6bdf23b620d5e58", "score": "0.4701956", "text": "func parentKey(parent, child uint64) []byte {\n\tb := make([]byte, binary.Size([]uint64{parent, child})+1)\n\ti := binary.PutUvarint(b, parent)\n\tj := binary.PutUvarint(b[i+1:], child)\n\treturn b[0 : i+j+1]\n}", "title": "" }, { "docid": "3907cb3b87ad1e9c6f44b089cf3847c9", "score": "0.470178", "text": "func ChainKey(chainID string) []byte {\n\tbkey := state.MakeBKey([]byte(chainID))\n\treturn stack.PrefixedKey(prefixChains, bkey)\n}", "title": "" }, { "docid": "dee9f4c068a2fb64b5fe3a0306186545", "score": "0.46937343", "text": "func NewKeybase() *Keybase {\n\tkb := Keybase{}\n\tkb.history = make(map[string][]message)\n\treturn &kb\n}", "title": "" }, { "docid": "cb8544a805e955ae12ff318b337d2d91", "score": "0.4692192", "text": "func parentPrefixKey(parent uint64) []byte {\n\tb := make([]byte, binary.Size(parent)+1)\n\ti := binary.PutUvarint(b, parent)\n\treturn b[0 : i+1]\n}", "title": "" }, { "docid": "0a2f054d9213e5b31bf24aedf633c088", "score": "0.4688296", "text": "func (b *Base) BaseKey(c context.Context, collection string) *datastore.Key {\n\tif b.Id == 0 {\n\t\treturn datastore.NewIncompleteKey(c, collection, nil)\n\t}\n\treturn datastore.NewKey(c, collection, \"\", b.Id, nil)\n}", "title": "" }, { "docid": "b3d4ff6ca15dcf647cd3bff0a441dd13", "score": "0.46865404", "text": "func CreateNewBitcoinKey(rootChainID string, subChainID string, btcKeyLevel int, btcType int, btcKey []byte, privateKey []byte, ec *factom.ECAddress) (string, string, error) {\n\t// priv key\n\tvar priv [64]byte\n\tcopy(priv[:32], privateKey[:32])\n\t_ = ed.GetPublicKey(&priv)\n\n\tbk, err := identity.MakeBitcoinKey(rootChainID, subChainID, btcKeyLevel, btcType, btcKey, &priv)\n\tif err != nil {\n\t\treturn \"error\", \"error\", err\n\t}\n\n\te := bk.GetEntry()\n\tstrCom, err := identity.GetEntryCommitString(e, ec)\n\tif err != nil {\n\t\treturn \"error\", \"error\", err\n\t}\n\n\tstrRev, err := identity.GetEntryRevealString(e)\n\tif err != nil {\n\t\treturn \"error\", \"error\", err\n\t}\n\n\treturn CurlWrapPOST(strCom), CurlWrapPOST(strRev), nil\n}", "title": "" }, { "docid": "494df778bace2c92c28c41382aa9749e", "score": "0.4685078", "text": "func newKeyTable(owner string, key rsa.PublicKey) keyTable {\n\ttable := newEmptyKeyTable()\n\ttable.add(TrustedKeyRecord{\n\t\tKeyRecord: KeyRecord{\n\t\t\tOwner: owner,\n\t\t\tKeyPub: key,\n\t\t},\n\t\tConfidence: 1.0, // confidence 100%\n\t})\n\n\treturn table\n}", "title": "" }, { "docid": "88db7983d64442fbb4feeeb4db007bc7", "score": "0.4674459", "text": "func CreateMetaNamespaceKey(obj runtime.Object) (string, error) {\n\tnamespace, err := GetNamespaceFromRuntimeObject(obj)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"retrieving namespace error: %v\", err)\n\t}\n\tname, err := GetNameFromRuntimeObject(obj)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"retrieving name error: %v\", err)\n\t}\n\treturn namespace + \"/\" + name, nil\n}", "title": "" }, { "docid": "80ca8e8b64ebdc1849cf18cb77911e8e", "score": "0.46666166", "text": "func DailyChainKeyGenerate() {\n\tfor {\n\t\ttm := time.Now().Format(time.RFC3339)\n\t\tfmt.Println(\"TIMEFORCHAINKEY==\" + tm)\n\t\ttm = strings.Split(tm, \"T\")[0]\n\t\tfmt.Println(\"db==\" + mongod_truck_db + \"+coll==\" + mongod_coll_name_key_chain)\n\t\tcoll := sessionGrouping.DB(mongod_truck_db).C(mongod_coll_name_key_chain)\n\t\tupperpart := \"\"\n\t\tjudge, _ := strconv.Atoi(tm[9:])\n\t\tif judge >= 0 && judge < 3 {\n\t\t\tupperpart += \"dexter\"\n\t\t} else if judge >= 3 && judge < 6 {\n\t\t\tupperpart += \"eliminate\"\n\t\t} else if judge >= 6 && judge < 8 {\n\t\t\tupperpart += \"foreign\"\n\t\t} else if judge >= 8 && judge < 10 {\n\t\t\tupperpart += \"goremegadon\"\n\t\t} else {\n\t\t\tupperpart += \"hallucinate\"\n\t\t}\n\t\tyearVal, _ := strconv.Atoi(tm[0:4])\n\t\tmonthVal, _ := strconv.Atoi(tm[5:7])\n\t\tdayVal, _ := strconv.Atoi(tm[8:])\n\t\tupperpart += strconv.Itoa(yearVal+monthVal+dayVal) + \"jamesbond\"\n\t\tfmt.Println(\"UPPERPART==\" + upperpart)\n\t\tdailyChainKey := &DailyChainKey{Date: tm, Key: upperpart}\n\t\tcheck := &DailyChainKey{}\n\t\terrCheck := coll.Find(bson.M{\"date\": dailyChainKey.Date}).One(&check)\n\t\tif errCheck != nil {\n\t\t\tcoll.Insert(dailyChainKey)\n\t\t}\n\t\ttime.Sleep(time.Hour * 1 / 6)\n\t}\n}", "title": "" }, { "docid": "d3c1f58d157f4580c724f2821df9a0ca", "score": "0.4657346", "text": "func NewKey(namespace string) Key {\n\treturn &key{\n\t\tnamespace: namespace,\n\t}\n}", "title": "" }, { "docid": "fa63afd6d63c6dc5a926cef2620bba88", "score": "0.46537408", "text": "func makeStacktraceKey(sample *profile.Sample) stacktraceKey {\n\tids := make([]string, len(sample.Location))\n\tfor i, l := range sample.Location {\n\t\tids[i] = strconv.FormatUint(l.ID, 16)\n\t}\n\n\tlabels := make([]string, 0, len(sample.Label))\n\tfor k, v := range sample.Label {\n\t\tlabels = append(labels, fmt.Sprintf(\"%q%q\", k, v))\n\t}\n\tsort.Strings(labels)\n\n\tnumlabels := make([]string, 0, len(sample.NumLabel))\n\tfor k, v := range sample.NumLabel {\n\t\tnumlabels = append(numlabels, fmt.Sprintf(\"%q%x%x\", k, v, sample.NumUnit[k]))\n\t}\n\tsort.Strings(numlabels)\n\n\treturn stacktraceKey{\n\t\tlocations: strings.Join(ids, \"|\"),\n\t\tlabels: strings.Join(labels, \"\"),\n\t\tnumlabels: strings.Join(numlabels, \"\"),\n\t}\n}", "title": "" }, { "docid": "e05d72c87eef0ea25e7df09355c0e56f", "score": "0.4652844", "text": "func SplitCompositeKey(compositePartialKey []byte, compositeKey []byte) (string, string) {\n\tsplit := bytes.SplitN(compositeKey, compositePartialKey, 2)\n\treturn string(split[0]), string(split[1])\n}", "title": "" }, { "docid": "027a8ff53430843d5f8593c1ce965776", "score": "0.46449435", "text": "func (m *Object) MakeKey(prefix string) string {\n\treturn fmt.Sprint(globals.ConfigRootPrefix, \"/\", prefix, \"/\", \"objects/\", m.Tenant, \"/\", m.Namespace, \"/\", m.Name)\n}", "title": "" }, { "docid": "a7e8e2a0e7fac3af7b200208e5830cf5", "score": "0.46424824", "text": "func BrokerKey(namespace, name string) string {\n\treturn namespace + \"/\" + name\n}", "title": "" }, { "docid": "6ca0d05530ad05243b1c25b87681e19a", "score": "0.4636506", "text": "func deriveChildKey(parentKey []byte, chainCode []byte, index uint32) ([]byte, []byte) {\n\th := hmac.New(sha512.New, chainCode)\n\n\tinput := make([]byte, 37)\n\n\t// 0x00 + parentKey + index(BE)\n\tinput[0] = 0\n\n\tcopy(input[1:37], parentKey)\n\n\tbinary.BigEndian.PutUint32(input[33:37], index)\n\n\t// harden the input\n\tinput[33] |= 128\n\n\th.Write(input)\n\tdigest := h.Sum(nil)\n\n\treturn digest[0:32], digest[32:len(digest)]\n}", "title": "" }, { "docid": "02ddf67c34361c3547d081e86f2e1c12", "score": "0.46364185", "text": "func CreateNewTorrentKey(client *redis.Client, key string) {\n\tclient.SAdd(key, \"complete\", \"incomplete\")\n\n}", "title": "" }, { "docid": "07b94036f8a4708cd8c213dcca6db585", "score": "0.4629413", "text": "func Key(typ, name, namespace string) string {\n\treturn fmt.Sprintf(\"%s/%s/%s\", typ, namespace, name)\n}", "title": "" }, { "docid": "c73eaed124d78cc1d3d3fb8faf51abad", "score": "0.46287504", "text": "func GenerateCacheKey(paramns string) string {\n\tvar hash = sha1.New()\n\n\thash.Write([]byte(paramns))\n\n\tboot.Log.Debugf(\"Gerando chave de cache para parametros [ %s ] \", paramns)\n\n\thashKey := fmt.Sprintf(\"%x\", hash.Sum(nil))\n\n\tboot.Log.Debugf(\"-------------------------Chave gerada [ %s ]\", hashKey)\n\thash.Reset()\n\treturn hashKey\n}", "title": "" }, { "docid": "d97e80c502fc9cd7dd1f9a328b20f799", "score": "0.46166757", "text": "func (l4 *L4) CreateKey(name string) (*meta.Key, error) {\n\treturn composite.CreateKey(l4.cloud, name, l4.scope)\n}", "title": "" }, { "docid": "40af56d54edbc45f05c68d487d75bd3c", "score": "0.46147648", "text": "func (m *Bucket) MakeKey(prefix string) string {\n\treturn fmt.Sprint(globals.ConfigRootPrefix, \"/\", prefix, \"/\", \"buckets/\", m.Name)\n}", "title": "" }, { "docid": "79c11d742adcc1d7f40c9c470de77b39", "score": "0.46116093", "text": "func computeKey(u ApplyableObject) objectKey {\n\tgvk := u.GroupVersionKind()\n\treturn objectKey{\n\t\tGroup: gvk.Group,\n\t\tVersion: gvk.Version,\n\t\tKind: gvk.Kind,\n\t\tNamespace: u.GetNamespace(),\n\t\tName: u.GetName(),\n\t}\n}", "title": "" }, { "docid": "a365dc600499418f705e711dc4585da7", "score": "0.4596867", "text": "func (l *L4) CreateKey(name string) (*meta.Key, error) {\n\treturn composite.CreateKey(l.cloud, name, l.scope)\n}", "title": "" }, { "docid": "ad8826f4ee62b84af913101c05edc92b", "score": "0.45915118", "text": "func formLayer(nodeTable map[string]string, nodeID string) (map[string]string, string){\n\tfmt.Println(\"grouping...\")\n\tfmt.Println(\"nodeID: \", nodeID)\n\tfmt.Println(\"current nodetable: \", nodeTable)\n\tnewNodeTable := make(map[string]string)\n\t//allocating slice for arrangement\n\tkeys := make([]string, 0)\n\toneDigitKeys := make([]string, 0)\n\ttwoDigitKeys := make([]string, 0)\n\tthreeDigitKeys := make([]string, 0)\n\t\n\tb := 0 \n\tc := 0\n\td := 0\n\n\tcount :=0\n\tmatch := false\n\tdone := false\n\n\tfor a:= range nodeTable{\n\t\tif len(a) == 2{\n\t\t\toneDigitKeys = append(oneDigitKeys, a)\n\t\t\tb++\n\t\t} else if len(a) == 3{\n\t\t\ttwoDigitKeys = append(twoDigitKeys, a)\n\t\t\tc++\n\t\t} else{\n\t\t\tthreeDigitKeys = append(threeDigitKeys, a)\n\t\t\td++\n\t\t}\n\t}\n\tsort.Strings(oneDigitKeys)\n\tsort.Strings(twoDigitKeys)\n\tsort.Strings(threeDigitKeys)\n\n\tfmt.Println(\"oneDigitArrays: \", oneDigitKeys)\n\tfmt.Println(\"twoDigitArrays: \", twoDigitKeys)\n\tfmt.Println(\"threeDigitArrays: \", threeDigitKeys)\n\n\tkeys = append(keys, oneDigitKeys...)\n\tfmt.Println(\"first append: \", keys)\n\tkeys = append(keys, twoDigitKeys...)\n\tkeys = append(keys, threeDigitKeys...)\n\n\tfmt.Println(\"sorted nodetable: \", keys)\n\n\tfor _, a := range keys{\n\t\tif a != \"C0\"{\n\t\tif count == 0 && !done{\n\t\t\tnewNodeTable = make(map[string]string)\n\t\t}\n\t\t\n\t\tkeyArr = append(keyArr, a)\n\t\tvalArr = append(valArr, nodeTable[a])\n\n\t\tif(a == nodeID){ \n\t\t\tmatch = true\n\t\t}\n\t\t\n\t\tcount++\n\t\tif count == 4 {\n\t\t\tcount = 0\n\t\t\tif(match){\n\t\t\t\tfor p := 0; p <= 3; p++{\n\t\t\t\t\tnewNodeTable[keyArr[p]] = valArr[p]\n\t\t\t\t\tnewNodeCount++\n\t\t\t\t\tprimary = keyArr[0]\n\t\t\t\t\tdone = true\n\t\t\t\t\tmatch = false \n\t\t\t\t}\n\t\t\t}\n\t\t\tkeyArr = nil\n\t\t\tvalArr = nil\n\t\t} \n\t}\n}\n\treturn newNodeTable, primary\n}", "title": "" }, { "docid": "ddb0e08991efd1d65bf044837e218028", "score": "0.45903763", "text": "func (m *Version) MakeKey(prefix string) string {\n\treturn fmt.Sprint(globals.ConfigRootPrefix, \"/\", prefix, \"/\", \"version\", \"/Singleton\")\n}", "title": "" }, { "docid": "5a17e3728b1584f5553aa57e6f862953", "score": "0.45885625", "text": "func newKey(b []byte) (datastruct.Key, error) {\n\tif len(b) != datastruct.KeyLen {\n\t\treturn datastruct.Key{}, fmt.Errorf(\"wiregaurd: incorrect key size: %d\", len(b))\n\t}\n\n\tvar k datastruct.Key\n\tcopy(k[:], b)\n\n\treturn k, nil\n}", "title": "" }, { "docid": "2ff1fb4a921ddb8fda592690d3793664", "score": "0.45824772", "text": "func (r *pebbleMap) makeKeyWithSequence(k []byte) []byte {\n\tbyteKey := r.makeKey(k)\n\tif r.allowDuplicates {\n\t\tr.keyID++\n\t\tbyteKey = encoding.EncodeUint64Ascending(byteKey, uint64(r.keyID))\n\t}\n\treturn byteKey\n}", "title": "" }, { "docid": "69a055af57978572df62f6dd297a9942", "score": "0.45720705", "text": "func NewMVCCTimeKey(k Key, ts Timestamp) MVCCKey {\n\tkey := encoding.EncodeBytes(nil, k)\n\tkey = encoding.EncodeUint64Decreasing(key, uint64(ts.WallTime))\n\tkey = encoding.EncodeUint32Decreasing(key, uint32(ts.Logical))\n\treturn key\n}", "title": "" }, { "docid": "6d0e766a4cf166916fdefb499624ebbb", "score": "0.45615205", "text": "func NewRelKey(name string, type_ string, ) *RelKey {\n\tthis := RelKey{}\n\tthis.Name = name\n\tthis.Type = type_\n\treturn &this\n}", "title": "" }, { "docid": "d67bc84fe4b16d94f35f64d3c5c2a445", "score": "0.45573035", "text": "func MakeKey(name []byte, tags Tags) []byte {\n\treturn AppendMakeKey(nil, name, tags)\n}", "title": "" }, { "docid": "7edab2d3976b2c8f2dc708247545d06e", "score": "0.45534694", "text": "func generateChainID(layers []*descriptor.Descriptor) digest.Digest {\n\tvar digests []digest.Digest\n\tfor _, layer := range layers {\n\t\tdigests = append(digests, layer.Digest)\n\t}\n\tparent := identity.ChainID(digests)\n\treturn parent\n}", "title": "" }, { "docid": "2925a7a40215166d73b47eaca3b5f48a", "score": "0.45483145", "text": "func makeKey(pluginName string, pluginVersion string, pluginObject string) string {\n\treturn pluginName + \"-\" + pluginVersion + \"-\" + pluginObject\n}", "title": "" }, { "docid": "7eff72a2aa787bba91a01367498da9b9", "score": "0.45423347", "text": "func computeAggregateKey(s stats.Stat) string {\n\tvar sb strings.Builder\n\n\tsb.WriteString(s.Component)\n\tsb.WriteString(s.StatName)\n\tsb.WriteString(string(s.StatType))\n\tsb.WriteString(s.Unit)\n\n\treturn sb.String()\n}", "title": "" }, { "docid": "bef5c875d219a767cdce5725102f9d15", "score": "0.45410386", "text": "func (m *Cluster) MakeKey(prefix string) string {\n\treturn fmt.Sprint(globals.ConfigRootPrefix, \"/\", prefix, \"/\", \"cluster\", \"/Singleton\")\n}", "title": "" }, { "docid": "16c39343c26ec4fe086d4ae74edce6b0", "score": "0.45336416", "text": "func (b *CompositeKeyBag) AddCompositeKey(k *CompositeKey) (*CompositeKeyBag, error) {\n\tif b.Name != k.Name {\n\t\treturn b, errors.Errorf(\"key name %s does not match bag name %s\", k.Name, b.Name)\n\t}\n\t// save memory by removing redundant data\n\tk.Name = \"\"\n\tk.Fields = k.Fields[:len(k.Fields)-1]\n\tb.Keys = append(b.Keys, k)\n\treturn b, nil\n}", "title": "" }, { "docid": "5814534b2f8df36be2045cb06113bad4", "score": "0.45283225", "text": "func cacheKey(id string, create int64) string {\n\treturn fmt.Sprintf(\"%s-%d\", id, create)\n}", "title": "" }, { "docid": "85bee8188f881d2872f227293626202d", "score": "0.45190296", "text": "func BuildKey(pod *v1.Pod) string {\n\tif pod.Namespace == \"\" {\n\t\treturn pod.Name\n\t}\n\treturn fmt.Sprintf(\"%s-%s\", pod.Namespace, pod.Name)\n}", "title": "" }, { "docid": "315bf517b72004a3707bd8ee28238762", "score": "0.45158723", "text": "func blockIndexKey(blockHash *daghash.Hash, blueScore uint64) []byte {\n\tindexKey := make([]byte, daghash.HashSize+8)\n\tbinary.BigEndian.PutUint64(indexKey[0:8], blueScore)\n\tcopy(indexKey[8:daghash.HashSize+8], blockHash[:])\n\treturn indexKey\n}", "title": "" }, { "docid": "b5acdc2a8ca91d6ac3eedbc982359f56", "score": "0.45140275", "text": "func Key(keyType string, name string, namespace string) string {\n\treturn KeyPrefix(keyType) + name + \"/\" + NamespaceID + \"/\" + namespace\n}", "title": "" }, { "docid": "64202b837481bfba959f85b3f3e29562", "score": "0.45046017", "text": "func AppendMakeKey(dst []byte, name []byte, tags Tags) []byte {\n\t// unescape the name and then re-escape it to avoid double escaping.\n\t// The key should always be stored in escaped form.\n\tdst = append(dst, EscapeMeasurement(unescapeMeasurement(name))...)\n\tdst = tags.AppendHashKey(dst)\n\treturn dst\n}", "title": "" }, { "docid": "a767dbd31670ce12d1731cd6ecb48167", "score": "0.4498267", "text": "func makeUint160Key(prefix byte, h util.Uint160) []byte {\n\tk := make([]byte, util.Uint160Size+1)\n\tk[0] = prefix\n\tcopy(k[1:], h.BytesBE())\n\treturn k\n}", "title": "" }, { "docid": "3cfc2a9b65a89cb6d34a477d6b3068fd", "score": "0.44972166", "text": "func generateCacheKey(operation Operation, x, y float64) string {\n\tif operation == add || operation == multiply {\n\t\tif y > x {\n\t\t\treturn fmt.Sprintf(\"%s_%v_%v\", operation, y, x)\n\t\t}\n\t\treturn fmt.Sprintf(\"%s_%v_%v\", operation, x, y)\n\t}\n\treturn fmt.Sprintf(\"%s_%v_%v\", operation, x, y)\n}", "title": "" } ]
05e2a74ada107ff38475b10fc9a482b3
function New creates and returns the value of the unexported identifier => type alert
[ { "docid": "d7a45e1487aa39f34dd5591bd6b5c464", "score": "0.58188975", "text": "func New(value int) alertCounter {\n\treturn alertCounter(value)\n}", "title": "" } ]
[ { "docid": "2a9682ac6f49bf7c02579dddb0cfac14", "score": "0.60993207", "text": "func New() string {\n\treturn GenerateReasonableCode(6)\n}", "title": "" }, { "docid": "2a33ccaccf01b36731155cb019e78c67", "score": "0.6073578", "text": "func NewType() Type {}", "title": "" }, { "docid": "5e8977f98c9feaa9f1c5d1c31c004938", "score": "0.58988225", "text": "func NewAlert(input string) (Alert, error) {\n\tvar alert Alert\n\tvalues := strings.Split(input, \" \")\n\n\tif len(values) != 4 {\n\t\terr := errors.New(\"input not valid\")\n\t\treturn alert, err\n\t}\n\n\tname := fmt.Sprintf(\"BTC_%s\", strings.ToUpper(values[1]))\n\tcompare := values[2]\n\tvalue, err := strconv.ParseFloat(values[3], 64)\n\n\tif err != nil {\n\t\treturn alert, err\n\t}\n\n\talert = Alert{\n\t\tID: bson.NewObjectId(),\n\t\tName: name,\n\t\tCompare: compare,\n\t\tValue: value,\n\t}\n\n\treturn alert, nil\n}", "title": "" }, { "docid": "4426de860d33f2035ba697345382572c", "score": "0.5866622", "text": "func (v Value) New(args ...interface{}) Value {\n\tpanic(message)\n}", "title": "" }, { "docid": "36d25656926e3dccdc1b5d56c9672ab9", "score": "0.58095586", "text": "func (correlation) New() string {\n\treturn utils.NewUUID()\n}", "title": "" }, { "docid": "15e52b1f490131ad3cfea565189b5daf", "score": "0.5786063", "text": "func New(msg string) error {\n\treturn &basic{msg}\n}", "title": "" }, { "docid": "a188eb158721c57eaf4ab284a736bec0", "score": "0.5749594", "text": "func New(v interface{}) Record {\n\tt := reflect.TypeOf(v)\n\treturn Record{\n\t\tv: reflect.ValueOf(v),\n\t\tt: t,\n\t\t//\tlen: numExported(t),\n\t}\n}", "title": "" }, { "docid": "27a6b3fd1fe0809bb02b6666a1cd470b", "score": "0.57150847", "text": "func New() Type {\n\treturn Type(0)\n}", "title": "" }, { "docid": "82623b8f2220fe5311fbf1c66c7ce24a", "score": "0.56773734", "text": "func New() {\n\tfmt.Println(POLICY_TEMPLATE_OBJECT)\n}", "title": "" }, { "docid": "692982193b376c102792f8a3ca666773", "score": "0.56164193", "text": "func New(msg string) error {\n\treturn customError{errorType: NoType, originalError: errors.New(msg)}\n}", "title": "" }, { "docid": "68bc8e5db8c2cc20370856ffb3adbacb", "score": "0.5603595", "text": "func New(msg string) error {\n\treturn &fundamental{\n\t\tmsg: msg,\n\t\tstack: callers(2),\n\t}\n}", "title": "" }, { "docid": "630259dbf2088bb2ff397a38660586c2", "score": "0.55960256", "text": "func newVar(v interface{}) (*interface{}, error) {\n\tx := interface{}(v)\n\treturn &x, nil\n}", "title": "" }, { "docid": "7d601411752b21e77e96d93dfdeafa18", "score": "0.5577803", "text": "func New(msg string) error {\n\treturn customError{errorType: Unknown, originalError: errors.New(msg)}\n}", "title": "" }, { "docid": "4783c3312a7c7b89ff5f0c746cd60265", "score": "0.55770683", "text": "func New() Go { return Go{} }", "title": "" }, { "docid": "e33181fac66247c37b92f2504f877cef", "score": "0.55661875", "text": "func New() Object {\n\treturn Object{}\n}", "title": "" }, { "docid": "acd115afd1d1ad2e4cb0b423b4957e04", "score": "0.5546739", "text": "func (f *testIDService) New() (string, error) {\n\treturn \"new-ID\", nil\n}", "title": "" }, { "docid": "5635773e84ca8d4b8d81d5b03e5236d7", "score": "0.5530716", "text": "func New() error {\n\treturn &errorMessage{\"Find the bug\"}\n}", "title": "" }, { "docid": "a1969b35729b27e759ba1df3f2d2acd8", "score": "0.5524413", "text": "func New() (admission.Interface, error) {\n\treturn &disallowAlert{\n\t\tHandler: admission.NewHandler(admission.Create),\n\t}, nil\n}", "title": "" }, { "docid": "1f3c3c27c4fc93f0935d76d44b7b13a8", "score": "0.547045", "text": "func New() {\n\ttypeOfProject()\n}", "title": "" }, { "docid": "ce03fae7e73e1544bf8fddf848c66022", "score": "0.54497844", "text": "func New(v interface{}) Value {\n\treturn Value{v}\n}", "title": "" }, { "docid": "38ee6f51cf051bba8821a6155521f4cf", "score": "0.54388344", "text": "func New() string {\n\treturn shortuuid.New()\n}", "title": "" }, { "docid": "36681780c6ced1aeee1351f102e62b78", "score": "0.54300374", "text": "func New(keyName, sigType string, hash crypto.Hash) *Info {\n\tnow := time.Now().UTC()\n\ta := make(map[string]interface{})\n\ta[\"sig.type\"] = sigType\n\ta[\"sig.keyname\"] = keyName\n\ta[\"sig.hash\"] = x509tools.HashNames[hash]\n\ta[\"sig.timestamp\"] = now\n\tif hostname, _ := os.Hostname(); hostname != \"\" {\n\t\ta[\"sig.hostname\"] = hostname\n\t}\n\treturn &Info{Attributes: a, StartTime: now}\n}", "title": "" }, { "docid": "3f1b2ad30513ee432fa82d3bb16b9f96", "score": "0.5425552", "text": "func New(message string) error {\n\treturn &fundamental{\n\t\tmsg: message,\n\t\tstack: callers(),\n\t}\n}", "title": "" }, { "docid": "5b8a8a91233f20fd4da8c10d12466867", "score": "0.5420024", "text": "func New(label ...string) (result Metadata) {\n\tresult = &metadata{\n\t\tactions: map[string]Action{},\n\t}\n\n\t// global debug\n\tif debugEnabled {\n\t\tresult.Debug()\n\t}\n\n\tif len(label) > 0 {\n\t\tresult.Name(label[0])\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "c1f43dcb47588b5bc44d966d027def7f", "score": "0.54164034", "text": "func New(data []byte) (v Info, err error) {\n\terr = json.Unmarshal(data, &v)\n\treturn v, VerError.Wrap(err)\n}", "title": "" }, { "docid": "51987bff34073dc0a9a844c9b223bc5e", "score": "0.5397699", "text": "func New(eventType Type, srv server.Server, bootType, script string, params map[string]interface{}) Event {\n\tvar event Event\n\n\tevent.Type = eventType\n\tevent.Date = time.Now()\n\tevent.Server = srv\n\tevent.BootType = bootType\n\tevent.Script = script\n\tevent.Params = params\n\n\tevent.setMessage()\n\n\treturn event\n}", "title": "" }, { "docid": "3e2933be06e2847838b40bf8ee358c6b", "score": "0.53967756", "text": "func New() (UUID, error) {\n\treturn globalSource.new()\n}", "title": "" }, { "docid": "20d5b97d5ddc60af6f081f8f1a75cdbf", "score": "0.5393302", "text": "func New(status int, msg string) error {\n\treturn Wrap(status, errors.New(msg))\n}", "title": "" }, { "docid": "2050d9ae7f819b278e48414a586244b0", "score": "0.5378253", "text": "func (err *ErrDescriptor) New(attributes Attributes) Error {\n\tif err.Code != NoCode && !err.registered {\n\t\tpanic(fmt.Errorf(\"Error descriptor with code %v was not registered\", err.Code))\n\t}\n\n\treturn &impl{\n\t\tmessage: Format(err.MessageFormat, attributes),\n\t\tcode: err.Code,\n\t\ttyp: err.Type,\n\t\tattributes: attributes,\n\t}\n}", "title": "" }, { "docid": "6b6339b24a4fb1fea2622f8babfa9d3f", "score": "0.53653663", "text": "func New(text string) error {\n\treturn &errorString{text}\n}", "title": "" }, { "docid": "c2b32f3859a7c35b5523dd876ff7bdf4", "score": "0.53644663", "text": "func new(c int, msg string) *Status {\n\treturn &Status{s: &spb.Status{Code: int32(c), Message: msg, Details: make([]*anypb.Any, 0)}}\n}", "title": "" }, { "docid": "5a64953cba7c027aed19802c594513ed", "score": "0.5349769", "text": "func New(msg string) error {\n\treturn errors.New(msg)\n}", "title": "" }, { "docid": "5a64953cba7c027aed19802c594513ed", "score": "0.5349769", "text": "func New(msg string) error {\n\treturn errors.New(msg)\n}", "title": "" }, { "docid": "5a64953cba7c027aed19802c594513ed", "score": "0.5349769", "text": "func New(msg string) error {\n\treturn errors.New(msg)\n}", "title": "" }, { "docid": "7877d6a444c0cf830b26715187339308", "score": "0.5344548", "text": "func (c ErrorCode) New(msg string) error {\n\treturn apperrors.WithStatusCode(apperrors.New(msg), int(c))\n}", "title": "" }, { "docid": "4650ea5b0cd3d9ba80e3b22edbcee464", "score": "0.53439015", "text": "func New(_err string) error {\n\treturn errors.New(_err)\n\t// pc, fn, line, _ := runtime.Caller(1)\n\t// errorX := fmt.Sprintf(\"[error] in %s[%s:%d] %v\", runtime.FuncForPC(pc).Name(), fn, line, err.Error())\n}", "title": "" }, { "docid": "9cb7ebfc04c8c8d2d0c3766d10d044e1", "score": "0.5341535", "text": "func (f *testErrorIDService) New() (string, error) {\n\treturn \"\", maskAny(invalidConfigError)\n}", "title": "" }, { "docid": "54157ac69222457d65b8e83d651a0cd5", "score": "0.5293653", "text": "func newEvent(name string, args ...interface{}) (*Event, error) {\n\tid, err := uuid.NewV4()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\theader := &EventHeader{Id: id.String(), Version: ProtocolVersion}\n\n\te := Event{\n\t\tHeader: header,\n\t\tName: name,\n\t\tArgs: args,\n\t}\n\n\treturn &e, nil\n}", "title": "" }, { "docid": "0516929efbcda5ce04ac81490ed9476d", "score": "0.5285359", "text": "func New(t uint8, p []byte) *IE {\n\ti := &IE{Type: t, Payload: p}\n\ti.SetLength()\n\treturn i\n}", "title": "" }, { "docid": "9fc1878d9c6ca4d0fe6c4946cd99e205", "score": "0.52841395", "text": "func NewIdent(name string) *Ident { return &Ident{token.NoPos, name} }", "title": "" }, { "docid": "3ae6840b5e77d7fa9736e43179cb4647", "score": "0.5283851", "text": "func New(namespace string, name string) (t TupleType) {\n\thash := syncHash.Hash([]byte(name))\n\tns_hash := syncHash.Hash([]byte(namespace))\n\tt = TupleType{namespace, name, ns_hash, hash, make([][]Field, 0), make(map[string]int)}\n\treturn\n}", "title": "" }, { "docid": "b8dd02a6c8e92c4b7253769766bf1128", "score": "0.528224", "text": "func New() string {\n\treturn uuid.NewV4().String()\n}", "title": "" }, { "docid": "9beff17f7e22d82ccb1821e3a5a93e26", "score": "0.52763337", "text": "func New(text string) error {\n\treturn errorString(text)\n}", "title": "" }, { "docid": "6ce363c813d7555c328913338ca92910", "score": "0.527444", "text": "func hackedNew(t reflect.Type) reflect.Value {\n\treturn reflect.New(unhackType(t))\n}", "title": "" }, { "docid": "39ff69f364d09c9500b30f27c4dc4c5e", "score": "0.52611506", "text": "func New(w driver.Watcher) *Variable {\n\treturn &Variable{watcher: w}\n}", "title": "" }, { "docid": "a9001ffdb67b98341a4c42dde11aee64", "score": "0.5255901", "text": "func New(status int, message string) *Error {\n\tfmt.Printf(\"[%d] %s\\n\", status, message)\n\treturn &Error{status, message}\n}", "title": "" }, { "docid": "4aae6981ed5a8211629b7bfe88e3d3f9", "score": "0.5236738", "text": "func execNewTypeName(_ int, p *gop.Context) {\n\targs := p.GetArgs(4)\n\tret := types.NewTypeName(token.Pos(args[0].(int)), args[1].(*types.Package), args[2].(string), args[3].(types.Type))\n\tp.Ret(4, ret)\n}", "title": "" }, { "docid": "4b01a5064049ffa51e0d0e4aeedd2cfa", "score": "0.5231688", "text": "func New(value interface{}) error {\n\tif value == nil {\n\t\treturn nil\n\t}\n\treturn NewText(gconv.String(value))\n}", "title": "" }, { "docid": "9a5bad564fd0dc19042fad5de728c6cf", "score": "0.5224539", "text": "func New() ID {\n\treturn dgen.New()\n}", "title": "" }, { "docid": "9f9845e35a458a61457b95552ecb2d2f", "score": "0.52121735", "text": "func New(w http.ResponseWriter, r *http.Request) {\r\n\ttmpl.ExecuteTemplate(w, \"New\", nil)\r\n}", "title": "" }, { "docid": "9f9845e35a458a61457b95552ecb2d2f", "score": "0.52121735", "text": "func New(w http.ResponseWriter, r *http.Request) {\r\n\ttmpl.ExecuteTemplate(w, \"New\", nil)\r\n}", "title": "" }, { "docid": "c01f5017d73903faf7bde587f5b7a95e", "score": "0.519941", "text": "func newSymbol(name string, thing interface{}) *Symbol {\n\treturn &Symbol{\n\t\tName: name,\n\t\tprops: makeProps(),\n\t\tValue: Atomize(thing),\n\t}\n}", "title": "" }, { "docid": "2416bcb5b0f0e9da41e286ca7bd373c8", "score": "0.51993465", "text": "func New(id string, name string, ip string, agentType string) *Type1 {\n\ta := agent.New(id, name, ip, agentType)\n\n\treturn &Type1{\n\t\tAgent: *a,\n\t}\n}", "title": "" }, { "docid": "77894aa2cb7279b43f81c7ad41764b40", "score": "0.51928097", "text": "func New(message string) error {\n\treturn pkgerrors.New(message)\n}", "title": "" }, { "docid": "00bcbc3ef913428519fbf5aa059eab62", "score": "0.5191087", "text": "func NewAlertInstance(\n\tversion string,\n\tnodeID string,\n\tclusterID string,\n\tkvdbName string,\n\tkvdbBase string,\n\tkvdbMachines []string,\n\tkvdbOptions map[string]string,\n) {\n\tkva, err := Get(Name)\n\tif err != nil {\n\t\tkva, err = New(Name, kvdbName, kvdbBase, kvdbMachines, clusterID, kvdbOptions)\n\t\tif err != nil {\n\t\t\tdlog.Errorf(\"Failed to initialize an AlertInstance \")\n\t\t}\n\t}\n\tnewAlertInstance(nodeID, clusterID, version, kva)\n}", "title": "" }, { "docid": "f11e3e2d95abce7b0175448e9d5d8796", "score": "0.51855874", "text": "func CreateAlert(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\tauth := r.Header.Get(\"X-Vault-Auth\")\n\tif tokens.Search(String(auth)) == nil {\n\t\tlog.Printf(\" [x] Token not found\")\n\t\tw.WriteHeader(http.StatusForbidden)\n\t\treturn\n\t}\n\tif len(params[\"id\"]) > 0 {\n\t\tvar alert Alert\n\t\t_ = json.NewDecoder(r.Body).Decode(&alert)\n\t\talert.ID = params[\"id\"]\n\t\tamqpCaller(alert)\n\t}\n}", "title": "" }, { "docid": "a5359556806ed85f0ec4d007340fbc79", "score": "0.51815474", "text": "func newProtonInstance(proton core.Protoner) reflect.Value {\n\tbaseValue := reflect.ValueOf(proton)\n\n\t// try to create new value of proton\n\tmethod := baseValue.MethodByName(\"New\")\n\tif method.IsValid() {\n\t\treturns := method.Call(emptyParameters)\n\t\tif len(returns) <= 0 {\n\t\t\tpanic(fmt.Sprintf(\"Method New must has at least 1 returns. now %d\", len(returns)))\n\t\t}\n\t\treturn returns[0]\n\t} else {\n\t\t// return reflect.New(reflect.TypeOf(proton).Elem())\n\t\treturn newInstance(reflect.TypeOf(proton))\n\t}\n}", "title": "" }, { "docid": "cf0f08022aa4d0003b186527cb490aee", "score": "0.5165617", "text": "func New(w http.ResponseWriter, r *http.Request) {\n\tgetTemplates().ExecuteTemplate(w, \"New\", nil)\n}", "title": "" }, { "docid": "e006b56f9a2f55939aec73c9cefd2cd1", "score": "0.5152776", "text": "func newIdentifier(req messages.Alias, c *models.Customer) (m *models.Identifier, err error) {\n\tm = models.NewIdentifier(c)\n\tm.AliasName = req.AliasName\n\tm.IP, err = newIp(req.Ip)\n\tif err != nil {\n\t\treturn\n\t}\n\tm.Prefix, err = newPrefix(req.Prefix)\n\tif err != nil {\n\t\treturn\n\t}\n\tm.PortRange, err = newPortRange(req.PortRange)\n\tif err != nil {\n\t\treturn\n\t}\n\tm.TrafficProtocol.AddList(req.TrafficProtocol)\n\tm.FQDN.AddList(req.FQDN)\n\tm.URI.AddList(req.URI)\n\n\treturn\n}", "title": "" }, { "docid": "e05fd64d941e1b2bad8abd403afff944", "score": "0.5150322", "text": "func newPiName(n string) Name {\n\treturn &piName{name: n, t: NewUnTyped()}\n}", "title": "" }, { "docid": "85e7d53af5ae329d97b5040e16f7d3d9", "score": "0.5150072", "text": "func NewMsg(typ string) Msg {\n\treturn Msg{\n\t\tID: uuid.New().String(),\n\t\tType: typ,\n\t\tTimestamp: time.Now().UTC(),\n\t}\n}", "title": "" }, { "docid": "26d232afc808da8578ba2b907665ef9c", "score": "0.51415837", "text": "func New(msg string) error {\n\tstack := callers(3) // callers(3) skips this method, stack.callers, and runtime.Callers\n\treturn &rootError{\n\t\tglobal: stack.isGlobal(),\n\t\tmsg: msg,\n\t\tstack: stack,\n\t}\n}", "title": "" }, { "docid": "bebb4e6a6a31170e04788a8c58c90096", "score": "0.5141545", "text": "func NewValue() *Value { return &Value{} }", "title": "" }, { "docid": "4c8b91b1f61813b8834b34bedcc9ed05", "score": "0.5139962", "text": "func (s *staticUUIDProvider) New() string {\n\treturn s.staticID\n}", "title": "" }, { "docid": "f6c98d908d6d2ecf4fcdffb42c32d497", "score": "0.5136689", "text": "func New(errs string) error {\n\treturn errors.New(errs)\n}", "title": "" }, { "docid": "e4d3e12ad59ae3665e52d664efca68a0", "score": "0.51356274", "text": "func New(statusCode int, err error) error {\n\treturn Value{\n\t\tStatusCode: statusCode,\n\t\tErr: err,\n\t}\n}", "title": "" }, { "docid": "61bdafe1f4af2ea41824c2ae0c46c821", "score": "0.51305485", "text": "func New(message string) error {\n\treturn root.New(message)\n}", "title": "" }, { "docid": "0198b1a3fed998ea88382e656c6377b3", "score": "0.5124937", "text": "func New(text string) error {\n\treturn errors.New(text)\n}", "title": "" }, { "docid": "0198b1a3fed998ea88382e656c6377b3", "score": "0.5124937", "text": "func New(text string) error {\n\treturn errors.New(text)\n}", "title": "" }, { "docid": "0198b1a3fed998ea88382e656c6377b3", "score": "0.5124937", "text": "func New(text string) error {\n\treturn errors.New(text)\n}", "title": "" }, { "docid": "bf30461072fbf98e2611f89f9fad59e2", "score": "0.5124016", "text": "func Factory() interface{} {\n\tinstance := new(components.Greeter)\n\tfmt.Println(\"Type\", reflect.TypeOf(instance))\n\treflect.New()\n\treturn instance\n}", "title": "" }, { "docid": "6b0974c61c1deeafd70567b12fc82e53", "score": "0.5110195", "text": "func New() Event {\n\treturn Event{}\n}", "title": "" }, { "docid": "b02d9b5b3cb1caa0c58d61d78529f8d0", "score": "0.5108235", "text": "func ValueNew(typ Type) *Value {\n\tvar gvalue C.GValue\n\tvalue := ValueNewFromC(unsafe.Pointer(&gvalue))\n\tvalue.Init(typ)\n\n\treturn value\n}", "title": "" }, { "docid": "ef4d190f87d4f62574d1e7c1a8f1075c", "score": "0.5103504", "text": "func (s SecureValueTypePersonalDetails) construct() SecureValueTypeClass { return &s }", "title": "" }, { "docid": "10e6cce1f24257ca4ea20346ae00445a", "score": "0.51017", "text": "func New() Info {\n\treturn &hardwareInfo{}\n}", "title": "" }, { "docid": "0d2e660aeb3bf184d9637aad477196f1", "score": "0.51001966", "text": "func New(text string) error {\n\treturn &Error{Message: text}\n}", "title": "" }, { "docid": "8b809bfb0dbfb0b718f52baeb5d3b2fb", "score": "0.5100062", "text": "func NewAlert(title string, caption string, alertType string, dismissible bool) *gowd.Element {\n\talertClass := \"alert \" + alertType\n\talert := NewElement(\"div\", alertClass)\n\talert.SetAttribute(\"role\", \"alert\")\n\tif dismissible {\n\t\tspan := gowd.NewElement(\"span\")\n\t\tspan.SetAttribute(\"aria-hidden\", \"true\")\n\t\tspan.SetText(\"X\")\n\t\tbtn := NewElement(\"button\", \"close\")\n\t\tbtn.SetAttribute(\"type\", \"button\")\n\t\tbtn.OnEvent(gowd.OnClick, alertClose)\n\t\tbtn.AddElement(span)\n\t\talert.AddElement(btn)\n\t}\n\tif title != \"\" {\n\t\talert.AddElement(gowd.NewStyledText(title+\" \", gowd.StrongText))\n\t}\n\talert.AddElement(gowd.NewText(caption))\n\treturn alert\n}", "title": "" }, { "docid": "c320085c1036d66c09b991177e05bc6e", "score": "0.5092313", "text": "func New(message string) error {\n\treturn errors.New(message)\n}", "title": "" }, { "docid": "c320085c1036d66c09b991177e05bc6e", "score": "0.5092313", "text": "func New(message string) error {\n\treturn errors.New(message)\n}", "title": "" }, { "docid": "fbce4559ca24bed22bf5d50f7a57df6e", "score": "0.50858945", "text": "func NewPortalNotification()(*PortalNotification) {\n m := &PortalNotification{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "title": "" }, { "docid": "a4d2bade97e6260bb229850b43160a06", "score": "0.50849354", "text": "func New(kind string, result metadata.Contract) *instance {\n\treturn &instance{\n\t\tkind: kind,\n\t\tresult: result,\n\t}\n}", "title": "" }, { "docid": "e6be100f2c74f42544b5c1ad041544cb", "score": "0.50727797", "text": "func newSound(name string) *sound {\n\treturn &sound{name: name, tag: snd + stringHash(name)<<32, data: &audio.Data{}}\n}", "title": "" }, { "docid": "367af3f9a65c6c156005e50429495000", "score": "0.5070172", "text": "func NewIdentifier(t token.Token) *Identifier {\n\treturn &Identifier{\n\t\tToken: t,\n\t\tValue: t.Literal,\n\t}\n}", "title": "" }, { "docid": "1a1ef61c93f4be23558b1f39f4b7ec2f", "score": "0.5069536", "text": "func (wds *WeaponAISystem) New(w *ecs.World) {\n\n}", "title": "" }, { "docid": "7bf676f08b91dbc150768d453420a0e1", "score": "0.5060355", "text": "func tNewUser(lbl string) *tUser {\n\tintBytes := make([]byte, 4)\n\tbinary.BigEndian.PutUint32(intBytes, acctCounter)\n\tacctID := account.AccountID{}\n\tcopy(acctID[:], acctTemplate[:])\n\tcopy(acctID[account.HashSize-4:], intBytes)\n\taddr := strconv.Itoa(int(acctCounter))\n\tsig := []byte{0xab} // Just to differentiate from the addr.\n\tsig = append(sig, intBytes...)\n\tsigHex := hex.EncodeToString(sig)\n\tacctCounter++\n\treturn &tUser{\n\t\tsig: sig,\n\t\tsigHex: sigHex,\n\t\tacct: acctID,\n\t\taddr: addr,\n\t\tlbl: lbl,\n\t}\n}", "title": "" }, { "docid": "42b78cd84c0c0da8c8e27c19df0e2fb8", "score": "0.5059654", "text": "func newWarnEvent(pkg *pkg) (*WarnEvent, error) {\n\tvar result WarnEvent\n\terr := msgpack.Unmarshal(pkg.data, &result)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &result, nil\n}", "title": "" }, { "docid": "3e6ee89ea925de8dcafd16ae54ee907c", "score": "0.5058719", "text": "func New(v interface{}) (x *TVar) {\n\tx = &TVar{}\n\tx.value.Store(v)\n\treturn x\n}", "title": "" }, { "docid": "6afdd4321d0c6dce48724ac8c31c849d", "score": "0.5058116", "text": "func New(msg string, code ...int) error {\n\tstt := http.StatusInternalServerError\n\tif len(code) > 0 {\n\t\tstt = code[0]\n\t}\n\treturn &CError{\n\t\tCode: stt,\n\t\tMessage: msg,\n\t\tcallStack: util.Callers(),\n\t}\n}", "title": "" }, { "docid": "282914bd1249f8aa0e2e65264835716b", "score": "0.5050961", "text": "func New(msg string) error {\n\treturn &Error{msg: msg}\n}", "title": "" }, { "docid": "69f25a9ff52664f71e4a4ede5fc5c9b6", "score": "0.5050865", "text": "func PtrNewSaiyan(name string, power int) *Saiyan {\n\treturn &Saiyan{\n\t\tName: name,\n\t\tPower: power,\n\t}\n}", "title": "" }, { "docid": "66fd0da35124f19171fc4329bbffdc52", "score": "0.5046018", "text": "func (s *session) newID() (interface{}, error) {\n\tvar b [32]byte\n\t_, err := rand.Read(b[:])\n\treturn hex.EncodeToString(b[:]), err\n}", "title": "" }, { "docid": "c551ef3446442f754b10fa2e0b889dff", "score": "0.5043906", "text": "func WindowNew(t WindowType) *Window {\n\tid := Candy().Guify(\"gtk_window_new\", t).String()\n\treturn NewWindow(Candy(), id)\n}", "title": "" }, { "docid": "2d9841596c1cee30b71a9a5d8ce2c8ae", "score": "0.5042942", "text": "func NewFoo() *Foo {\n return &Foo{}\n}", "title": "" }, { "docid": "3d658f2222f540282a421aacbb9432b9", "score": "0.5037146", "text": "func NewLuaObject(L *lua.State, idx int) *LuaObject {\n tp := L.LTypename(idx)\n L.PushValue(idx)\n ref := L.Ref(lua.LUA_REGISTRYINDEX)\n return &LuaObject{L, ref, tp}\n}", "title": "" }, { "docid": "86098e348f430ae1707b90292b5e83c4", "score": "0.50267655", "text": "func (registry TypeRegistry) New(typeName string) (interface{}, error) {\n\tstructType, exists := registry.namedType[typeName]\n\tif exists {\n\t\treturn reflect.New(structType).Interface(), nil\n\t}\n\treturn nil, fmt.Errorf(\"Unknown class: %s\", typeName)\n}", "title": "" }, { "docid": "8fad4d103d3409c6ad6955fb0ab42588", "score": "0.5025998", "text": "func NewID() string {\n\treturn idFunc()\n}", "title": "" }, { "docid": "8029a523248376fa86afcb74a57c637f", "score": "0.5023204", "text": "func NewIskratelMsan() *IskratelMsan {\r\n var t = &IskratelMsan{}\r\n\r\n return t\r\n}", "title": "" }, { "docid": "0a290dea42d4ce156fad90d1ff4fb37b", "score": "0.50083214", "text": "func (*dynamicUUIDProvider) New() string {\n\treturn uuid.New()\n}", "title": "" }, { "docid": "70f8243323084c508b9d88df23c564b7", "score": "0.5006772", "text": "func (o *FakeObject) New(args ...interface{}) Object { return o.Invoke(args) }", "title": "" } ]
a3a29cac88b34c7c396ff96dcaeecb39
The StorageClass name that PVs will be created with.
[ { "docid": "8c92b42ea1daeab04b9f0aa2d802a5be", "score": "0.6853402", "text": "func (o BareMetalClusterStorageLvpShareConfigLvpConfigOutput) StorageClass() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BareMetalClusterStorageLvpShareConfigLvpConfig) string { return v.StorageClass }).(pulumi.StringOutput)\n}", "title": "" } ]
[ { "docid": "e55a0a5f06ea496a0967c952bad54d52", "score": "0.73685056", "text": "func (o CSIStorageCapacityOutput) StorageClassName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *CSIStorageCapacity) pulumi.StringOutput { return v.StorageClassName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "67915f51a251813b7eb03d5f5cc2ba96", "score": "0.68359774", "text": "func (o BareMetalAdminClusterStorageLvpShareConfigLvpConfigOutput) StorageClass() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BareMetalAdminClusterStorageLvpShareConfigLvpConfig) string { return v.StorageClass }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2c94b24d00adc04d548ef38e2b3c372f", "score": "0.6615243", "text": "func (o PipelineContentConfigOutput) StorageClass() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PipelineContentConfig) *string { return v.StorageClass }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c1fb83b609a7442cfbf05b37988bef73", "score": "0.6605935", "text": "func (o BareMetalClusterStorageLvpNodeMountsConfigOutput) StorageClass() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BareMetalClusterStorageLvpNodeMountsConfig) string { return v.StorageClass }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "a2faab86e628ea28eca21270478b62fa", "score": "0.65804034", "text": "func (o BareMetalAdminClusterStorageLvpNodeMountsConfigOutput) StorageClass() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BareMetalAdminClusterStorageLvpNodeMountsConfig) string { return v.StorageClass }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "e87713938deff775a30b15d8a73d982d", "score": "0.6574485", "text": "func (o PipelineThumbnailConfigOutput) StorageClass() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PipelineThumbnailConfig) *string { return v.StorageClass }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "1aa2c23128f54bff2e4965809b50e8e7", "score": "0.65256757", "text": "func GetStorageClassNameFromPVC(pvc *v1.PersistentVolumeClaim) *string {\n\t// Use beta annotation first\n\tclass, found := pvc.Annotations[betaStorageClassAnnotation]\n\tif found {\n\t\treturn &class\n\t}\n\treturn pvc.Spec.StorageClassName\n}", "title": "" }, { "docid": "229babdc9e9dac29d85e0f0147629972", "score": "0.6506401", "text": "func StorageClassByV1Resource(resourceName corev1.ResourceName) string {\n\treturn strings.Split(resourceName.String(), \".\")[0]\n}", "title": "" }, { "docid": "132f0f7a23f58546c4a40731474c12cb", "score": "0.64597934", "text": "func (o CheClusterSpecStorageOutput) PostgresPVCStorageClassName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CheClusterSpecStorage) *string { return v.PostgresPVCStorageClassName }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "479aad1d81fe5235d23af2747b57a1e2", "score": "0.64350814", "text": "func (o BareMetalClusterStorageLvpShareConfigLvpConfigPtrOutput) StorageClass() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BareMetalClusterStorageLvpShareConfigLvpConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.StorageClass\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2be798b837b8afe14d3033cee976d1f0", "score": "0.642023", "text": "func (o BareMetalAdminClusterStorageLvpShareConfigLvpConfigPtrOutput) StorageClass() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BareMetalAdminClusterStorageLvpShareConfigLvpConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.StorageClass\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2080942e0054e79da638bb1eece46556", "score": "0.6399104", "text": "func (o PipelineContentConfigPtrOutput) StorageClass() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *PipelineContentConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.StorageClass\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f7d02aaa1cb423409a92c86af7ee2044", "score": "0.6389539", "text": "func (o PipelineThumbnailConfigPtrOutput) StorageClass() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *PipelineThumbnailConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.StorageClass\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "e9564beaa5c7e3cdde99a23503a426fa", "score": "0.6362158", "text": "func GetStorageClassNameForPVC(pvc *v1.PersistentVolumeClaim) (string, error) {\n\tvar scName string\n\tif pvc.Spec.StorageClassName != nil && len(*pvc.Spec.StorageClassName) > 0 {\n\t\tscName = *pvc.Spec.StorageClassName\n\t} else {\n\t\tscName = pvc.Annotations[v1.BetaStorageClassAnnotation]\n\t}\n\n\tif len(scName) == 0 {\n\t\treturn \"\", fmt.Errorf(\"PVC: %s does not have a storage class\", pvc.Name)\n\t}\n\treturn scName, nil\n}", "title": "" }, { "docid": "d05e180692842d4415749a834b2b9bc7", "score": "0.628149", "text": "func (o BareMetalClusterStorageLvpNodeMountsConfigPtrOutput) StorageClass() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BareMetalClusterStorageLvpNodeMountsConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.StorageClass\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "82c4b5c60bd0d4a37462a3d24649ff34", "score": "0.62778187", "text": "func generatePVCNameFromStorageName(storage string) string {\n\treturn fmt.Sprintf(\"%v-pvc\", storage)\n}", "title": "" }, { "docid": "ef9bac44b47b44b3c68aa022636a805b", "score": "0.62751937", "text": "func (o CheClusterSpecStorageOutput) WorkspacePVCStorageClassName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CheClusterSpecStorage) *string { return v.WorkspacePVCStorageClassName }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "21d0604e06557343f0eeff62bcff68cc", "score": "0.6273124", "text": "func getStorageClassName(rule lifecycle.Rule) string {\n\tstorageClass := blankCell\n\ttransitionSet := !rule.Transition.IsNull()\n\tstorageClassAvail := transitionSet && (rule.Transition.StorageClass != \"\")\n\tif storageClassAvail {\n\t\tstorageClass = rule.Transition.StorageClass\n\t}\n\treturn storageClass\n}", "title": "" }, { "docid": "bdc950ae61d9261ebd73d8ce07ef8a8f", "score": "0.6258369", "text": "func (o BareMetalAdminClusterStorageLvpNodeMountsConfigPtrOutput) StorageClass() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BareMetalAdminClusterStorageLvpNodeMountsConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.StorageClass\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c85e5149f71ea7ad120557067800c8ba", "score": "0.6194105", "text": "func (o StorageClassV2Output) Name() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *StorageClassV2) pulumi.StringOutput { return v.Name }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "1f319faf4bc7dccc22f895cd5a1aac3e", "score": "0.6139387", "text": "func (ds *DeployableStorage) GetStorageClass(stype grpc_application_go.StorageType, organizationId string, appInstanceId string, serviceInstanceId string) string {\n\tsc := \"\"\n\t// Get the right class based on cluster hosting environment\n\tswitch config.GetConfig().TargetPlatform {\n\tcase grpc_installer_go.Platform_AZURE:\n\t\t// use azure provided storage class. By default managed-premium is local replicated PVs\n\t\t// TODO: if we want we can create nalej storage class for azure to allocate PVs from non replicated pool\n\t\tswitch stype {\n\t\tcase grpc_application_go.StorageType_CLUSTER_LOCAL:\n\t\t\tsc = STORAGE_CLASS_AZURE_CLUSTER_LOCAL\n\t\tcase grpc_application_go.StorageType_CLUSTER_REPLICA:\n\t\t\tsc = STORAGE_CLASS_AZURE_CLUSTER_REPLICA\n\t\tcase grpc_application_go.StorageType_EXPERIMENTAL_CLUSTER_REPLICA:\n\t\t\tsc = ds.createExperimentalStorageClassName(organizationId, appInstanceId, serviceInstanceId)\n\t\tdefault:\n\t\t\tsc = \"\"\n\t\t}\n\tcase grpc_installer_go.Platform_MINIKUBE:\n\t\tswitch stype {\n\t\tcase grpc_application_go.StorageType_CLUSTER_LOCAL:\n\t\t\tsc = STORAGE_CLASS_NALEJ_CLUSTER_LOCAL\n\t\tcase grpc_application_go.StorageType_CLUSTER_REPLICA:\n\t\t\tif ds.nodes < 3 {\n\t\t\t\tlog.Debug().Interface(\"Nodes\", ds.nodes).Msg(\"Less than minimum 3 required for Storage Type CLUSTER_REPLICA\")\n\t\t\t}\n\t\t\tsc = STORAGE_CLASS_NALEJ_CLUSTER_REPLICA\n\t\tdefault:\n\t\t\tsc = \"\"\n\t\t}\n\tdefault:\n\t\tsc = \"\"\n\t}\n\treturn sc\n}", "title": "" }, { "docid": "56f31e45020ae1e4f795c9db6aa8e511", "score": "0.6006987", "text": "func (o CheClusterSpecStoragePtrOutput) PostgresPVCStorageClassName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *CheClusterSpecStorage) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.PostgresPVCStorageClassName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4965c8719f8da43b7c60ccbd81f7e281", "score": "0.5992297", "text": "func (o *Storage) GetClass() string {\n\treturn o.Class\n}", "title": "" }, { "docid": "1f3def5018e9461f7fb73f5de3121277", "score": "0.590993", "text": "func (o StorageClassOutput) Kind() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *StorageClass) pulumi.StringOutput { return v.Kind }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "7b53bb06693ce672f15aa0f5bcf2ffa2", "score": "0.58276314", "text": "func (s *WebSphereLibertyApplicationStorage) GetClassName() string {\n\treturn s.ClassName\n}", "title": "" }, { "docid": "634172b955c9022b608d3ddbc01c23ff", "score": "0.5793355", "text": "func (o CheClusterSpecStoragePtrOutput) WorkspacePVCStorageClassName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *CheClusterSpecStorage) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.WorkspacePVCStorageClassName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "dcb0025d4dbfac18269d089bedde36a4", "score": "0.5772346", "text": "func (o GetInstanceClassesResultOutput) StorageType() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GetInstanceClassesResult) *string { return v.StorageType }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "8977b92d6456210b50f19081a9ca9438", "score": "0.5762453", "text": "func (o GetInstancesInstanceOutput) StorageType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetInstancesInstance) string { return v.StorageType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "623bffdb4314f407b18debf6e346caa6", "score": "0.5734862", "text": "func StorageServiceName(undermoonName string) string {\n\treturn fmt.Sprintf(\"%s-stg-svc\", undermoonName)\n}", "title": "" }, { "docid": "623bffdb4314f407b18debf6e346caa6", "score": "0.5734862", "text": "func StorageServiceName(undermoonName string) string {\n\treturn fmt.Sprintf(\"%s-stg-svc\", undermoonName)\n}", "title": "" }, { "docid": "6d085d97157983a72068f38eeec9ea7e", "score": "0.5721966", "text": "func (s *Storage) String() string { return s.Name }", "title": "" }, { "docid": "742799efe55a2199171717392ecfbbe5", "score": "0.5635795", "text": "func GenerateStoragePVC(storageClass, name, size string, labels map[string]string) (*corev1.PersistentVolumeClaim, error) {\n\tstorage, err := resource.ParseQuantity(size)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar sc *string\n\tif storageClass != \"\" {\n\t\tsc = &storageClass\n\t}\n\n\treturn &corev1.PersistentVolumeClaim{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tLabels: labels,\n\t\t},\n\t\tSpec: corev1.PersistentVolumeClaimSpec{\n\t\t\tStorageClassName: sc,\n\t\t\tAccessModes: []corev1.PersistentVolumeAccessMode{corev1.ReadWriteOnce},\n\t\t\tResources: corev1.ResourceRequirements{\n\t\t\t\tRequests: corev1.ResourceList{\"storage\": storage},\n\t\t\t},\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "95d4bb77fa2a6278b9627a981bc82122", "score": "0.5608344", "text": "func NewStorageType(s string) (stgType StorageType, err error) {\n\tswitch s {\n\tcase \"JSON\":\n\t\tstgType = JSON\n\tcase \"Zabbix\":\n\t\tstgType = Zabbix\n\tdefault:\n\t\terr = fmt.Errorf(\"STORAGE_TYPE is not supported: %s\", s)\n\t}\n\treturn\n}", "title": "" }, { "docid": "dcb8257eda48187ada0dac90c7d223f7", "score": "0.55185086", "text": "func createStorageClassJSONFile(newVolumeCreateRequest *VolumeCreateRequest, storageClassJSONFileName string, path string) error {\n\tsc := StorageClass{\n\t\tApiversion: \"storage.k8s.io/v1\",\n\t\tKind: \"StorageClass\",\n\t\tMetadata: MetadataSC{\n\t\t\tName: strings.ToLower(newVolumeCreateRequest.ServiceLevel) + \"-sc\",\n\t\t},\n\t\tProvisioner: Csiprovisioner,\n\t\tReclaimPolicy: \"Delete\",\n\t\tParameters: ParametersSC{\n\t\t\tSymid: newVolumeCreateRequest.SYMID,\n\t\t\tSrp: newVolumeCreateRequest.SRP,\n\t\t\tServiceLevel: newVolumeCreateRequest.ServiceLevel,\n\t\t},\n\t}\n\n\terr := jsonMarshal(sc, storageClassJSONFileName, path)\n\treturn err\n}", "title": "" }, { "docid": "d33a76de1536fb6501bae63d00e415de", "score": "0.5427839", "text": "func (o LookupInstanceResultOutput) StorageType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupInstanceResult) string { return v.StorageType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "c5657c64bf11139c0d4873080cd27057", "score": "0.5420208", "text": "func (s *Storage) Name() string {\n\treturn s.storage.Name()\n}", "title": "" }, { "docid": "6d6caa9d724957ff811896dc62fd0f34", "score": "0.541964", "text": "func (dev *Dev) PersistentVolumeStorageClass() string {\n\tif dev.PersistentVolumeInfo == nil {\n\t\treturn \"\"\n\t}\n\treturn dev.PersistentVolumeInfo.StorageClass\n}", "title": "" }, { "docid": "b6a7b91335b61fc71343237a924878c2", "score": "0.5394169", "text": "func MkStorageClass(scName string, scReplicas int, protocol ShareProto) error {\n\tlogf.Log.Info(\"Creating storage class\", \"name\", scName, \"replicas\", scReplicas, \"protocol\", protocol)\n\tcreateOpts := &storagev1.StorageClass{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: scName,\n\t\t\tNamespace: \"default\",\n\t\t},\n\t\tProvisioner: CSIProvisioner,\n\t}\n\tcreateOpts.Parameters = make(map[string]string)\n\tcreateOpts.Parameters[\"protocol\"] = string(protocol)\n\tcreateOpts.Parameters[\"repl\"] = strconv.Itoa(scReplicas)\n\n\tScApi := gTestEnv.KubeInt.StorageV1().StorageClasses\n\t_, createErr := ScApi().Create(context.TODO(), createOpts, metav1.CreateOptions{})\n\treturn createErr\n}", "title": "" }, { "docid": "4a8d5ecd3be166f197dbb669a98d60ac", "score": "0.5366837", "text": "func getStorageClassFromStr(str string) (string, BosCliErrorCode) {\n\tswitch strings.ToUpper(str) {\n\tcase \"\":\n\t\treturn \"\", BOSCLI_OK\n\tcase api.STORAGE_CLASS_STANDARD:\n\t\treturn api.STORAGE_CLASS_STANDARD, BOSCLI_OK\n\tcase api.STORAGE_CLASS_STANDARD_IA:\n\t\treturn api.STORAGE_CLASS_STANDARD_IA, BOSCLI_OK\n\tcase api.STORAGE_CLASS_COLD:\n\t\treturn api.STORAGE_CLASS_COLD, BOSCLI_OK\n\t}\n\treturn \"\", BOSCLI_UNSUPPORT_STORAGE_CLASS\n}", "title": "" }, { "docid": "9555449d13400118f6ad71e0c2888dfe", "score": "0.5361591", "text": "func (f Field) StorageKey() string {\n\tif f.def != nil && f.def.StorageKey != \"\" {\n\t\treturn f.def.StorageKey\n\t}\n\treturn snake(f.Name)\n}", "title": "" }, { "docid": "b410cb5a130aae631258e0955b3ce86d", "score": "0.5342685", "text": "func (s *S3Storage) Type() string {\n\treturn \"s3\"\n}", "title": "" }, { "docid": "886f90bbf0068e6ebb4617c8df83e842", "score": "0.5260853", "text": "func (c *CloudFrontRWStore) Name() string { return nameCloudFrontRW }", "title": "" }, { "docid": "206be143561d79eab2bb9ca95079d7c8", "score": "0.5255689", "text": "func StorageClass_Values() []string {\n\treturn []string{\n\t\tStorageClassStandard,\n\t\tStorageClassReducedRedundancy,\n\t\tStorageClassStandardIa,\n\t}\n}", "title": "" }, { "docid": "3267423dd909ed9f6c1334e755d883d5", "score": "0.5249038", "text": "func (gke *GoogleProvider) CreateStorageClass(pvc *v1.PersistentVolumeClaim) error {\n\tlogrus.Info(\"Creating new storage class\")\n\tprovisioner, err := gke.determineProvisioner(pvc)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlogrus.Info(\"Determining provisioner succeeded\")\n\tparameter, err := gke.determineParameters(pvc)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlogrus.Info(\"Determining parameter succeeded\")\n\treturn sdk.Create(&storagev1.StorageClass{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"StorageClass\",\n\t\t\tAPIVersion: \"storage.k8s.io/v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: *pvc.Spec.StorageClassName,\n\t\t\tAnnotations: nil,\n\t\t\tOwnerReferences: nil,\n\t\t},\n\t\tProvisioner: provisioner,\n\t\tMountOptions: nil,\n\t\tParameters: parameter,\n\t})\n}", "title": "" }, { "docid": "d836e18515d99a95cea246efa3e2fb36", "score": "0.5247202", "text": "func (s *GobusterGCS) Name() string {\n\treturn \"GCS bucket enumeration\"\n}", "title": "" }, { "docid": "d63f18663b26f5c8cd0bf21d45634715", "score": "0.52314174", "text": "func (o VmStoragePolicyOutput) Name() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *VmStoragePolicy) pulumi.StringOutput { return v.Name }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b262b05eba643396a29d2cae8546caea", "score": "0.5222877", "text": "func GetDefaultStorageClassName(c clientset.Interface) (string, error) {\n\tlist, err := c.StorageV1().StorageClasses().List(context.TODO(), metav1.ListOptions{})\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Error listing storage classes: %v\", err)\n\t}\n\tvar scName string\n\tfor _, sc := range list.Items {\n\t\tif isDefaultAnnotation(sc.ObjectMeta) {\n\t\t\tif len(scName) != 0 {\n\t\t\t\treturn \"\", fmt.Errorf(\"Multiple default storage classes found: %q and %q\", scName, sc.Name)\n\t\t\t}\n\t\t\tscName = sc.Name\n\t\t}\n\t}\n\tif len(scName) == 0 {\n\t\treturn \"\", fmt.Errorf(\"No default storage class found\")\n\t}\n\tLogf(\"Default storage class: %q\", scName)\n\treturn scName, nil\n}", "title": "" }, { "docid": "e130e28d6c72e5c6370d019796bd5656", "score": "0.521954", "text": "func getStorageFromPVC(pvc corev1.PersistentVolumeClaim) string {\n\tif _, ok := pvc.Labels[storagelabels.StorageLabel]; !ok {\n\t\treturn \"\"\n\t}\n\treturn pvc.Labels[storagelabels.StorageLabel]\n}", "title": "" }, { "docid": "cecea39100012a521557cf0a00b4ef9d", "score": "0.5205092", "text": "func (b *blobRef) StorageSource() string {\n\treturn StoreType\n}", "title": "" }, { "docid": "a6822f010802c3a646f314cddfd63ce6", "score": "0.52020913", "text": "func (e *Entity) Classname() string {\n\treturn e.class\n}", "title": "" }, { "docid": "8e85afd0498c58908d6bb3afb101ebb8", "score": "0.5198681", "text": "func (kvs *KeyValueStore) Name() string {\n\treturn \"github.com/wailsapp/wails/v3/plugins/kvstore\"\n}", "title": "" }, { "docid": "0f3770d11d0ce8f0c896759441dd38df", "score": "0.5188133", "text": "func GetPersistentVolumeClaimClass(claim *core.PersistentVolumeClaim) string {\n\t// Use beta annotation first\n\tif class, found := claim.Annotations[core.BetaStorageClassAnnotation]; found {\n\t\treturn class\n\t}\n\n\tif claim.Spec.StorageClassName != nil {\n\t\treturn *claim.Spec.StorageClassName\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "517a41ae7af50503f2451ef3cab18918", "score": "0.51580197", "text": "func (self Class) Name() string { return names[int(self)] }", "title": "" }, { "docid": "c2244d6a73f092cb81d9f01517fb2ecc", "score": "0.515461", "text": "func (o *StoragePurePort) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "title": "" }, { "docid": "95674a1d96f61e38b0d52c9d0ba76c98", "score": "0.51462805", "text": "func (f *Framework) CreateVariationOfStorageClass(sc *storagev1.StorageClass, mutationFunc func(*storagev1.StorageClass)) (*storagev1.StorageClass, error) {\n\tscCopy := sc.DeepCopy()\n\tmutationFunc(sc)\n\tif reflect.DeepEqual(sc, scCopy) {\n\t\treturn sc, nil\n\t}\n\tsc.ObjectMeta = metav1.ObjectMeta{\n\t\tGenerateName: fmt.Sprintf(\"%s-temp-variation\", sc.Name),\n\t\tLabels: map[string]string{\n\t\t\t\"cdi.kubevirt.io/testing\": \"\",\n\t\t},\n\t}\n\n\treturn f.K8sClient.StorageV1().StorageClasses().Create(context.TODO(), sc, metav1.CreateOptions{})\n}", "title": "" }, { "docid": "c5ffd646bc67c597d3249aa8698123eb", "score": "0.51428866", "text": "func GetStorage() string {\n\treturn \"STORAGE: 5050505\"\n}", "title": "" }, { "docid": "5f59540c8c177e8e367745c3b1940f83", "score": "0.51410085", "text": "func (o DatasetBlobStorageOutput) Name() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *DatasetBlobStorage) pulumi.StringOutput { return v.Name }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "e28ca463e915942480a6440090ffcad6", "score": "0.5110692", "text": "func NewStorageClass(ctx *pulumi.Context,\n\tname string, args *StorageClassArgs, opts ...pulumi.ResourceOption) (*StorageClass, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Provisioner == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Provisioner'\")\n\t}\n\targs.ApiVersion = pulumi.StringPtr(\"storage.k8s.io/v1\")\n\targs.Kind = pulumi.StringPtr(\"StorageClass\")\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"kubernetes:storage.k8s.io/v1beta1:StorageClass\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource StorageClass\n\terr := ctx.RegisterResource(\"kubernetes:storage.k8s.io/v1:StorageClass\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "dc955a18b26bde76356958ba270baee5", "score": "0.5094213", "text": "func (o *StorageStorageUtilization) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "title": "" }, { "docid": "3d8a18152ae91b667afb53a3e97b418b", "score": "0.50874186", "text": "func StoragePublicServiceName(undermoonName string) string {\n\treturn undermoonName\n}", "title": "" }, { "docid": "3d8a18152ae91b667afb53a3e97b418b", "score": "0.50874186", "text": "func StoragePublicServiceName(undermoonName string) string {\n\treturn undermoonName\n}", "title": "" }, { "docid": "5009d0466c89c39bd4aa7198fcd3c214", "score": "0.5086891", "text": "func (o OutputBlobOutput) StorageContainerName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *OutputBlob) pulumi.StringOutput { return v.StorageContainerName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2dac3be82a3daa049a4f33f5d6b40147", "score": "0.5086883", "text": "func (o WindowsFileSystemOutput) StorageType() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WindowsFileSystem) pulumi.StringPtrOutput { return v.StorageType }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9d58e97380ae2aab679ecfde883c6cab", "score": "0.50858784", "text": "func NewStorage(s string) (*Storage, error) {\n\tfor _, d := range drivers {\n\t\tif s == d.Name {\n\t\t\treturn d, nil\n\t\t}\n\t}\n\treturn nil, fmt.Errorf(\"entc/gen: invalid storage driver %q\", s)\n}", "title": "" }, { "docid": "768ed28d47c3f174545b24c012e0fb8b", "score": "0.50852627", "text": "func (o *StorageNetAppStorageVmAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "title": "" }, { "docid": "8db05dcf34020b44a499ba3d28146091", "score": "0.50574595", "text": "func (o VolumeResponseOutput) StorageType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v VolumeResponse) string { return v.StorageType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b231d40f632c9e6c25f6b46fba53597f", "score": "0.502744", "text": "func (o *StorageVirtualDrive) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "title": "" }, { "docid": "240c91876ecedf44c11f7e521cfd3847", "score": "0.5025663", "text": "func createShortClassname(classname string) string {\n\tparts := strings.Split(classname, \".\")\n\tif len(parts) > 0 {\n\t\treturn parts[len(parts)-1]\n\t}\n\treturn classname\n}", "title": "" }, { "docid": "16e300bcc795959e5e077430c4518521", "score": "0.5022361", "text": "func (msg MsgSetStorageCurrent) Type() string { return SetStorageCurrentConst }", "title": "" }, { "docid": "93e68dbdefcf9aae039b6b3622534a38", "score": "0.5022181", "text": "func (f *Framework) newStorageClassTemplate(name string, provisionerType string, parameters map[string]string, testLabels map[string]string) *storagev1beta1.StorageClass {\n\treturn &storagev1beta1.StorageClass{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"StorageClass\",\n\t\t\tAPIVersion: \"storage.k8s.io/v1beta1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tLabels: testLabels,\n\t\t},\n\t\tProvisioner: provisionerType,\n\t\tParameters: parameters,\n\t}\n}", "title": "" }, { "docid": "6428910d3542845f6dca758fa364acf9", "score": "0.5018797", "text": "func GetPersistentVolumeClaimClass(claim *v1.PersistentVolumeClaim) string {\n\t// Use beta annotation first\n\tif class, found := claim.Annotations[v1.BetaStorageClassAnnotation]; found {\n\t\treturn class\n\t}\n\n\tif claim.Spec.StorageClassName != nil {\n\t\treturn *claim.Spec.StorageClassName\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "6428910d3542845f6dca758fa364acf9", "score": "0.5018797", "text": "func GetPersistentVolumeClaimClass(claim *v1.PersistentVolumeClaim) string {\n\t// Use beta annotation first\n\tif class, found := claim.Annotations[v1.BetaStorageClassAnnotation]; found {\n\t\treturn class\n\t}\n\n\tif claim.Spec.StorageClassName != nil {\n\t\treturn *claim.Spec.StorageClassName\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "94f0eae348eb830d6f33f5aaaca5b778", "score": "0.49905983", "text": "func (class apexFileClass) nameInMake() string {\n\tswitch class {\n\tcase etc:\n\t\treturn \"ETC\"\n\tcase nativeSharedLib:\n\t\treturn \"SHARED_LIBRARIES\"\n\tcase nativeExecutable, shBinary, pyBinary, goBinary:\n\t\treturn \"EXECUTABLES\"\n\tcase javaSharedLib:\n\t\treturn \"JAVA_LIBRARIES\"\n\tcase nativeTest:\n\t\treturn \"NATIVE_TESTS\"\n\tcase app, appSet:\n\t\t// b/142537672 Why isn't this APP? We want to have full control over\n\t\t// the paths and file names of the apk file under the flattend APEX.\n\t\t// If this is set to APP, then the paths and file names are modified\n\t\t// by the Make build system. For example, it is installed to\n\t\t// /system/apex/<apexname>/app/<Appname>/<apexname>.<Appname>/ instead of\n\t\t// /system/apex/<apexname>/app/<Appname> because the build system automatically\n\t\t// appends module name (which is <apexname>.<Appname> to the path.\n\t\treturn \"ETC\"\n\tdefault:\n\t\tpanic(fmt.Errorf(\"unknown class %d\", class))\n\t}\n}", "title": "" }, { "docid": "e8d66538ef715cdc739aba1e98a095ba", "score": "0.49875104", "text": "func getStorageEndpointSuffix(environmentName string) string {\n\tswitch environmentName {\n\tcase azure.USGovernmentCloud.Name:\n\t\treturn azure.USGovernmentCloud.StorageEndpointSuffix\n\tcase azure.ChinaCloud.Name:\n\t\treturn azure.ChinaCloud.StorageEndpointSuffix\n\tcase azure.GermanCloud.Name:\n\t\treturn azure.GermanCloud.StorageEndpointSuffix\n\tdefault:\n\t\treturn azure.PublicCloud.StorageEndpointSuffix\n\t}\n}", "title": "" }, { "docid": "519a1cd6d1c3b9ade88b95cfeb9a40a9", "score": "0.49781725", "text": "func (o *Options) Name() string { return \"k3s\" }", "title": "" }, { "docid": "e5daa6e33ea934ac54fabb721784da6f", "score": "0.49738708", "text": "func (o VMwareClusterVcenterOutput) StoragePolicyName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v VMwareClusterVcenter) *string { return v.StoragePolicyName }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "69987aa8d07a5ed681066a27c878000f", "score": "0.49436793", "text": "func (obj RValue) Classname() string {\n\treturn C.GoString(C.mrb_obj_classname(obj.mrb.p, obj.v))\n}", "title": "" }, { "docid": "08a52b570dbc742d76b3f20552ae7209", "score": "0.49413213", "text": "func (r *ReconcileStorageClusterInitialization) newStorageClasses(initData *ocsv1.StorageClusterInitialization) ([]storagev1.StorageClass, error) {\n\tpersistentVolumeReclaimDelete := corev1.PersistentVolumeReclaimDelete\n\tret := []storagev1.StorageClass{\n\t\tstoragev1.StorageClass{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: generateNameForCephFilesystemSC(initData),\n\t\t\t},\n\t\t\tProvisioner: fmt.Sprintf(\"%s.cephfs.csi.ceph.com\", initData.Namespace),\n\t\t\tReclaimPolicy: &persistentVolumeReclaimDelete,\n\t\t\tParameters: map[string]string{\n\t\t\t\t\"clusterID\": initData.Namespace,\n\t\t\t\t\"fsName\": fmt.Sprintf(\"%s-cephfilesystem\", initData.Name),\n\t\t\t\t\"csi.storage.k8s.io/provisioner-secret-name\": \"rook-ceph-csi\",\n\t\t\t\t\"csi.storage.k8s.io/provisioner-secret-namespace\": initData.Namespace,\n\t\t\t\t\"csi.storage.k8s.io/node-stage-secret-name\": \"rook-ceph-csi\",\n\t\t\t\t\"csi.storage.k8s.io/node-stage-secret-namespace\": initData.Namespace,\n\t\t\t},\n\t\t},\n\t\tstoragev1.StorageClass{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: generateNameForCephBlockPoolSC(initData),\n\t\t\t},\n\t\t\tProvisioner: fmt.Sprintf(\"%s.rbd.csi.ceph.com\", initData.Namespace),\n\t\t\tReclaimPolicy: &persistentVolumeReclaimDelete,\n\t\t\tParameters: map[string]string{\n\t\t\t\t\"clusterID\": initData.Namespace,\n\t\t\t\t\"pool\": generateNameForCephBlockPool(initData),\n\t\t\t\t\"imageFeatures\": \"layering\",\n\t\t\t\t\"csi.storage.k8s.io/fstype\": \"ext4\",\n\t\t\t\t\"imageFormat\": \"2\",\n\t\t\t\t\"csi.storage.k8s.io/provisioner-secret-name\": \"rook-ceph-csi\",\n\t\t\t\t\"csi.storage.k8s.io/provisioner-secret-namespace\": initData.Namespace,\n\t\t\t\t\"csi.storage.k8s.io/node-stage-secret-name\": \"rook-ceph-csi\",\n\t\t\t\t\"csi.storage.k8s.io/node-stage-secret-namespace\": initData.Namespace,\n\t\t\t},\n\t\t},\n\t}\n\treturn ret, nil\n}", "title": "" }, { "docid": "730f081258e44444da827ce9ae16b211", "score": "0.49335185", "text": "func (b *builder) className() string {\n\treturn b.f.UniqueName + b.driver.NameSuffix + \"-class\"\n}", "title": "" }, { "docid": "4065c0f67fe6bbda717e3e83bddb5e36", "score": "0.49290648", "text": "func (css ComponentCSSClass) ClassName() string {\n\treturn css.ID\n}", "title": "" }, { "docid": "b24a829a4f79bf0436b502d793d351dd", "score": "0.49283177", "text": "func (s *StorjStorage) Type() string {\n\treturn \"storj\"\n}", "title": "" }, { "docid": "e26ec9f4a2361bba6f0449357fa56e66", "score": "0.49253494", "text": "func (instance ObjectStorageBucket) GetName() string {\n\treturn instance.Name\n}", "title": "" }, { "docid": "fbbf6ff91857de631397f7b9719a5c6b", "score": "0.49249807", "text": "func (o DatadogAgentSpecClusterChecksRunnerConfigVolumesVsphereVolumeOutput) StoragePolicyName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v DatadogAgentSpecClusterChecksRunnerConfigVolumesVsphereVolume) *string {\n\t\treturn v.StoragePolicyName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6d6d7a3c1c4fa8771b8cb0a2ff05d893", "score": "0.49238428", "text": "func (o *Storage) GetName() string {\n\treturn o.Name\n}", "title": "" }, { "docid": "0c878d91707776363fdfb94a83bc35e7", "score": "0.48999354", "text": "func (g *grpc) typeName(str string) string {\n\treturn g.gen.TypeName(g.objectNamed(str))\n}", "title": "" }, { "docid": "0c878d91707776363fdfb94a83bc35e7", "score": "0.48999354", "text": "func (g *grpc) typeName(str string) string {\n\treturn g.gen.TypeName(g.objectNamed(str))\n}", "title": "" }, { "docid": "95fd8412dac737722ca3df7c336fd842", "score": "0.48924237", "text": "func (cp *VSphereParavirtual) ProviderName() string {\n\treturn ProviderName\n}", "title": "" }, { "docid": "d13e2f62e9b78b16ffd62505cfcc7a7b", "score": "0.48903823", "text": "func (o LunResponseOutput) StorageType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LunResponse) string { return v.StorageType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "7f0bdc6205a37a425cdf2b341104b782", "score": "0.48822218", "text": "func StorageStatefulSetName(undermoonName string) string {\n\treturn fmt.Sprintf(\"%s-stg-ss\", undermoonName)\n}", "title": "" }, { "docid": "7f0bdc6205a37a425cdf2b341104b782", "score": "0.48822218", "text": "func StorageStatefulSetName(undermoonName string) string {\n\treturn fmt.Sprintf(\"%s-stg-ss\", undermoonName)\n}", "title": "" }, { "docid": "9b8cbe9360bb31def816592a67098388", "score": "0.48621136", "text": "func GetStorageClass(contextName string, name string) (*storagev1.StorageClass, error) {\n\n\tclientset, err := context.GetClientset(contextName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif results := event.GetStorageClasses(contextName); results != nil {\n\t\tfor _, storageClass := range results {\n\t\t\tif storageClass.Name == name {\n\t\t\t\treturn &storageClass, nil\n\t\t\t}\n\t\t}\n\t\treturn nil, nil\n\t}\n\n\treturn connector.GetStorageClass(clientset, name)\n}", "title": "" }, { "docid": "426cfbf9e0448636bd4028f2140f1aea", "score": "0.48609856", "text": "func (o DatadogAgentSpecAgentConfigVolumesVsphereVolumeOutput) StoragePolicyName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v DatadogAgentSpecAgentConfigVolumesVsphereVolume) *string { return v.StoragePolicyName }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b900cec39404a4f7913536f3de5eabe2", "score": "0.48596802", "text": "func (o *StorageKmipServer) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "title": "" }, { "docid": "9b36bcf3b6cd3db17fcb6b5cb15ad43c", "score": "0.48573238", "text": "func (o DatadogAgentSpecClusterAgentConfigVolumesVsphereVolumeOutput) StoragePolicyName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v DatadogAgentSpecClusterAgentConfigVolumesVsphereVolume) *string { return v.StoragePolicyName }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3950cb50d10a09586581579bf04521d7", "score": "0.48493418", "text": "func (m *CephManifestsMaster) GetBucketStorageClass(storeName, storageClassName, reclaimPolicy string) string {\n\treturn `apiVersion: storage.k8s.io/v1\nkind: StorageClass\nmetadata:\n name: ` + storageClassName + `\nprovisioner: ` + m.settings.Namespace + `.ceph.rook.io/bucket\nreclaimPolicy: ` + reclaimPolicy + `\nparameters:\n objectStoreName: ` + storeName + `\n objectStoreNamespace: ` + m.settings.Namespace\n}", "title": "" }, { "docid": "d88f1313d9cf3d4f4e017ad730590bcd", "score": "0.4847064", "text": "func (vs *VSphere) ProviderName() string {\n\treturn ProviderName\n}", "title": "" }, { "docid": "d854bb63bb8b3ef68b48c12634cfe032", "score": "0.48457402", "text": "func (f *Framework) CreateStorageClassOrFail(name string, provisionerType string, parameters map[string]string, testLabels map[string]string) string {\n\tclassTemp := f.newStorageClassTemplate(name, provisionerType, parameters, testLabels)\n\n\tclass, err := f.ClientSet.StorageV1beta1().StorageClasses().Create(classTemp)\n\tif err != nil {\n\t\tif apierrors.IsAlreadyExists(err) {\n\t\t\tLogf(\"Storage Class already exists. Updating exisiting storage class.\")\n\t\t\tf.ClientSet.StorageV1beta1().StorageClasses().Update(f.newStorageClassTemplate(name, provisionerType, parameters, testLabels))\n\t\t\treturn name\n\t\t}\n\t\tFailf(\"Failed to create storage class %q: %v\", name, err)\n\t}\n\tf.StorageClasses = append(f.StorageClasses, class.Name)\n\treturn class.Name\n}", "title": "" }, { "docid": "32656bba7b69da1729aaa989dab6242a", "score": "0.48425382", "text": "func (sk segmentStoreDataKind) GetName() string {\n\treturn \"segments\"\n}", "title": "" }, { "docid": "95ad26b7ee3e45dd697aebf04272935e", "score": "0.48406333", "text": "func (o *StorageVirtualDriveExtensionAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "title": "" }, { "docid": "dc4b2abbc90288ceed0d7ca180af0034", "score": "0.48324144", "text": "func (o *DiskPlan) GetStorageClass() string {\n\treturn o.StorageClass\n}", "title": "" } ]
833bc632196b0cbd7909c9f76667a053
Validate validates the User media type instance.
[ { "docid": "617bbac039dab089c0a12063de3a653f", "score": "0.51235545", "text": "func (mt *User) Validate() (err error) {\n\tif mt.ID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"id\"))\n\t}\n\tif mt.Name == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"name\"))\n\t}\n\tif mt.Mail == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"mail\"))\n\t}\n\tif mt.Tel == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"tel\"))\n\t}\n\tif utf8.RuneCountInString(mt.ID) < 4 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.id`, mt.ID, utf8.RuneCountInString(mt.ID), 4, true))\n\t}\n\tif utf8.RuneCountInString(mt.ID) > 15 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.id`, mt.ID, utf8.RuneCountInString(mt.ID), 15, false))\n\t}\n\tif err2 := goa.ValidateFormat(goa.FormatEmail, mt.Mail); err2 != nil {\n\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`response.mail`, mt.Mail, goa.FormatEmail, err2))\n\t}\n\tif utf8.RuneCountInString(mt.Name) < 1 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.name`, mt.Name, utf8.RuneCountInString(mt.Name), 1, true))\n\t}\n\tif utf8.RuneCountInString(mt.Name) > 50 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.name`, mt.Name, utf8.RuneCountInString(mt.Name), 50, false))\n\t}\n\treturn\n}", "title": "" } ]
[ { "docid": "43ea2fcdb2dad7f62aabb7b85ea6c370", "score": "0.59376943", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "8c6653a72299b39326147fb681517843", "score": "0.59166014", "text": "func (mt *User) Validate() (err error) {\n\n\tif mt.Href == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"href\"))\n\t}\n\tif mt.Name == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"name\"))\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "e814a405c820cb07fc7222dcde95bae0", "score": "0.58481103", "text": "func (object User) Validate() error {\n\terrs := validate.Struct(object)\n\tif errs != nil {\n\t\treturn fmt.Errorf(\"%v\", errs)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "bbb84878a76a692f350b3ba2dd837f9a", "score": "0.5843508", "text": "func (m *UserView) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAnonymous(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateAvatar(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLogins(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateOrganizations(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateVerified(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "38432a97b8e461b2caef0aadbca39f46", "score": "0.58134085", "text": "func (mt *User) Validate() (err error) {\n\tif mt.Href == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"href\"))\n\t}\n\tif mt.Email == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"email\"))\n\t}\n\n\tif err2 := goa.ValidateFormat(goa.FormatEmail, mt.Email); err2 != nil {\n\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`response.email`, mt.Email, goa.FormatEmail, err2))\n\t}\n\treturn err\n}", "title": "" }, { "docid": "2270a597dc69e70ecdb963bc7f794fbe", "score": "0.57965857", "text": "func (mt *UserProfile) Validate() (err error) {\n\tif mt.UserID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"userId\"))\n\t}\n\n\tif mt.Email != nil {\n\t\tif err2 := goa.ValidateFormat(goa.FormatEmail, *mt.Email); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`response.email`, *mt.Email, goa.FormatEmail, err2))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "ea92271a53c73c96d226d61b0869ff18", "score": "0.57577056", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAcls(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateAncestors(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateApplications(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateAuthType(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateContext(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCreated(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCustomer(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateDetails(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLock(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateNameServerGroups(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateParent(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateProfiles(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRestrictions(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateServiceProfiles(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSubscriptions(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUpdated(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUser(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "02a6cde6286b760ccfb577abd54418db", "score": "0.571301", "text": "func (ut *UserPayload) Validate() (err error) {\n\tif ut.Name == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"name\"))\n\t}\n\tif ut.Email == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"email\"))\n\t}\n\tif ut.Password == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"password\"))\n\t}\n\tif err2 := goa.ValidateFormat(goa.FormatEmail, ut.Email); err2 != nil {\n\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`type.email`, ut.Email, goa.FormatEmail, err2))\n\t}\n\tif utf8.RuneCountInString(ut.Name) < 2 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`type.name`, ut.Name, utf8.RuneCountInString(ut.Name), 2, true))\n\t}\n\tif utf8.RuneCountInString(ut.Password) < 8 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`type.password`, ut.Password, utf8.RuneCountInString(ut.Password), 8, true))\n\t}\n\treturn\n}", "title": "" }, { "docid": "77c4499d5e66bb93d362f432ad5e75dc", "score": "0.5710908", "text": "func (ut *UserPayload) Validate() (err error) {\n\tif ut.Bio != nil {\n\t\tif len(*ut.Bio) > 500 {\n\t\t\terr = goa.InvalidLengthError(`response.bio`, *ut.Bio, len(*ut.Bio), 500, false, err)\n\t\t}\n\t}\n\tif ut.Email != nil {\n\t\tif err2 := goa.ValidateFormat(goa.FormatEmail, *ut.Email); err2 != nil {\n\t\t\terr = goa.InvalidFormatError(`response.email`, *ut.Email, goa.FormatEmail, err2, err)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "e16d0d215d0f3832f658c511989f31ba", "score": "0.5707125", "text": "func (mt *User) Validate() (err error) {\n\tif mt.Data == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"data\"))\n\t}\n\tif mt.Data != nil {\n\t\tif err2 := mt.Data.Validate(); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, err2)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "4c828a71fe0e1b0d3b2ca5a8b8bb50fc", "score": "0.56168354", "text": "func (m *UeType) Validate() error {\n\treturn m.validate(false)\n}", "title": "" }, { "docid": "e1fca01d510d5309569fa3bfc8577be5", "score": "0.56142306", "text": "func (m UserRolePreset) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateUserRolePresetEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2d49450144c17a9fee958cb208f31f29", "score": "0.5605415", "text": "func (o *PostUserOKBody) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := o.validateID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "67e73737aa1a09824915ce1e24d4a99a", "score": "0.55753416", "text": "func (result *FetchMedia) Validate() (err error) {\n\tswitch result.View {\n\tcase \"default\", \"\":\n\t\terr = result.Projected.Validate()\n\tdefault:\n\t\terr = goa.InvalidEnumValueError(\"view\", result.View, []interface{}{\"default\"})\n\t}\n\treturn\n}", "title": "" }, { "docid": "2be04b00183fb27f2282d559ce6ccd62", "score": "0.5551785", "text": "func (mt *User) Validate() (err error) {\n\tif mt.UserName == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"user_name\"))\n\t}\n\tif mt.Email == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"email\"))\n\t}\n\tif mt.ID != nil {\n\t\tif *mt.ID < 1 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidRangeError(`response.id`, *mt.ID, 1, true))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "c72dbd21f8cebd6ea309917622bc3025", "score": "0.5511473", "text": "func (m *UserResponse) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "6bd6dcaa7b7c3c8b321c6e8673a65620", "score": "0.5506565", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateEmail(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateName(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4a49c52626f5a3619dcb1ae1ea14f73b", "score": "0.5502391", "text": "func (m *UserView) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Id\n\n\t// no validation rules for State\n\n\tif v, ok := interface{}(m.GetCreationDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserViewValidationError{\n\t\t\t\tfield: \"CreationDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\tif v, ok := interface{}(m.GetChangeDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserViewValidationError{\n\t\t\t\tfield: \"ChangeDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\t// no validation rules for Sequence\n\n\t// no validation rules for PreferredLoginName\n\n\tif v, ok := interface{}(m.GetLastLogin()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserViewValidationError{\n\t\t\t\tfield: \"LastLogin\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\t// no validation rules for ResourceOwner\n\n\t// no validation rules for UserName\n\n\tswitch m.User.(type) {\n\n\tcase *UserView_Human:\n\n\t\tif v, ok := interface{}(m.GetHuman()).(interface{ Validate() error }); ok {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn UserViewValidationError{\n\t\t\t\t\tfield: \"Human\",\n\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\tcause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\tcase *UserView_Machine:\n\n\t\tif v, ok := interface{}(m.GetMachine()).(interface{ Validate() error }); ok {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn UserViewValidationError{\n\t\t\t\t\tfield: \"Machine\",\n\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\tcause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\tdefault:\n\t\treturn UserViewValidationError{\n\t\t\tfield: \"User\",\n\t\t\treason: \"value is required\",\n\t\t}\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "99afef3f1476ba311e2c892c1df33472", "score": "0.5488065", "text": "func Validate(img *multipart.FileHeader) error {\n\tif img == nil || img.Header == nil {\n\t\treturn ErrInvalidType\n\t}\n\n\tct, _, _ := mime.ParseMediaType(img.Header.Get(header.ContentType))\n\tif !allowImageType[ct] {\n\t\treturn ErrInvalidType\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3996d31201087b8423d5c5a0708a16c5", "score": "0.5476986", "text": "func (m UserAgent) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "5c22a4138093824d7b51e5da3d609998", "score": "0.5465394", "text": "func (user *User) Validate() error {\n\tvalidate := validator.New()\n\treturn validate.Struct(user)\n}", "title": "" }, { "docid": "39c217c7b722ef963bb0e3d7a178f846", "score": "0.54620504", "text": "func (m *UserPayload) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateEmail(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePassword(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUserName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUserType(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a4f23ee0e395ca2b7d6d62e15f38ee6b", "score": "0.54552025", "text": "func (m *UserInfo) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "bcbbca4b3c090a594e87afd7a22b4fde", "score": "0.54331976", "text": "func (ut *UserResourceData) Validate() (err error) {\n\tif ut.ID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"id\"))\n\t}\n\tif ut.Type == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"type\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "ececc25ab6a42a044bad11e56b73c9bc", "score": "0.54318416", "text": "func (mt *UserTiny) Validate() (err error) {\n\n\tif mt.Href == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"href\"))\n\t}\n\tif mt.Name == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"name\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "f9b58e1725450f3d1d4d0e82cb9ec523", "score": "0.5426481", "text": "func (o *UserGetOKBody) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := o.validateAvatarURL(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateEmail(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateFullName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateLanguage(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateUserName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "44a3f0156d4667b1461563555314efa4", "score": "0.54235023", "text": "func (ut *userResourceData) Validate() (err error) {\n\tif ut.ID == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"id\"))\n\t}\n\tif ut.Type == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"type\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "fd3f2e8a7755c8ab6852425c497bd61b", "score": "0.54169595", "text": "func (m Type) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "84b182037c239b91fe47ab02432c134b", "score": "0.5415308", "text": "func (mt *Usercomany) Validate() (err error) {\n\n\tif mt.Href == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"href\"))\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "3c0707b26e0ff00459569e9e6a4e22fe", "score": "0.54089695", "text": "func (ut *UserData) Validate() (err error) {\n\tif ut.Type == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"type\"))\n\t}\n\tif ut.Attributes == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"attributes\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "beba1de11688516453806f7fee10c7a6", "score": "0.5406199", "text": "func (m *PluginConfigUser) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "3c66c655088fbd6d247cda2d1238a4da", "score": "0.5392818", "text": "func (m *S3User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateComment(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSvm(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ba82800749614cad1015dbeb508ade3b", "score": "0.53900504", "text": "func (m *UserProfile) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Id\n\n\t// no validation rules for FirstName\n\n\t// no validation rules for LastName\n\n\t// no validation rules for NickName\n\n\t// no validation rules for DisplayName\n\n\t// no validation rules for PreferredLanguage\n\n\t// no validation rules for Gender\n\n\t// no validation rules for Sequence\n\n\tif v, ok := interface{}(m.GetCreationDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserProfileValidationError{\n\t\t\t\tfield: \"CreationDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\tif v, ok := interface{}(m.GetChangeDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserProfileValidationError{\n\t\t\t\tfield: \"ChangeDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d1a36e98d65628e17a804edacb50a422", "score": "0.5388713", "text": "func Validate(c *gin.Context, field string, width int, height int) error {\n\tfile, _, _ := c.Request.FormFile(field)\n\n\timage, _, err := image.DecodeConfig(file)\n\tif err != nil {\n\t\treturn errors.New(\"Extension must be jpg, gif or png\")\n\t}\n\n\tif image.Width != width || image.Height != height {\n\t\treturn errors.New(\"Size must be \" + strconv.Itoa(width) + \"px x \" + strconv.Itoa(height) + \"px\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7ce3d6db15caecd46b29a0f43c2e3ba0", "score": "0.5378084", "text": "func (mt *CreateUser) Validate() (err error) {\n\tif mt.Data == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"data\"))\n\t}\n\tif mt.Data != nil {\n\t\tif err2 := mt.Data.Validate(); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, err2)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7365f914e6df1abc18082829eb037c2a", "score": "0.5377809", "text": "func (m ValidationType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateValidationTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "35e5544cd22eb6bb7c56a2ab7b2dc6b7", "score": "0.5374872", "text": "func (ut *userPayload) Validate() (err error) {\n\tif ut.Name == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"name\"))\n\t}\n\tif ut.Email == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"email\"))\n\t}\n\tif ut.Password == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"password\"))\n\t}\n\tif ut.Email != nil {\n\t\tif err2 := goa.ValidateFormat(goa.FormatEmail, *ut.Email); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`request.email`, *ut.Email, goa.FormatEmail, err2))\n\t\t}\n\t}\n\tif ut.Name != nil {\n\t\tif utf8.RuneCountInString(*ut.Name) < 2 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`request.name`, *ut.Name, utf8.RuneCountInString(*ut.Name), 2, true))\n\t\t}\n\t}\n\tif ut.Password != nil {\n\t\tif utf8.RuneCountInString(*ut.Password) < 8 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`request.password`, *ut.Password, utf8.RuneCountInString(*ut.Password), 8, true))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "6be44785dfd392e8d0ad1009ddb37600", "score": "0.53657144", "text": "func ValidateRegistration(c *gin.Context) {\n\trequestBody := getBodyFromContext(c)\n\tuser := &types.User{}\n\tif err := json.Unmarshal(requestBody, user); err != nil {\n\t\tc.AbortWithStatusJSON(400, gin.H{\n\t\t\t\"success\": false,\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\n\tif result, err := validator.ValidateStruct(user); !result {\n\t\tc.AbortWithStatusJSON(400, gin.H{\n\t\t\t\"success\": false,\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tc.Next()\n}", "title": "" }, { "docid": "2b4277c1db016809ed604a16c129cfb1", "score": "0.5356829", "text": "func (u User) Validate() interface{} {\n\tfmt.Println(\"Validating User\")\n\tif u.Role == nil {\n\t\tu.Role = &UserRole{}\n\t}\n\treturn u\n}", "title": "" }, { "docid": "9f22af07572b22bdec09d275ad06182e", "score": "0.5355666", "text": "func (ut *userData) Validate() (err error) {\n\tif ut.Type == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"type\"))\n\t}\n\tif ut.Attributes == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"attributes\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "2d1f7a4bda1e512aa2b2c1114ea5e0cc", "score": "0.5355599", "text": "func handleValidation(w http.ResponseWriter, r *http.Request) bool {\n\tb, bodyReaderErr := ioutil.ReadAll(r.Body)\n\tif bodyReaderErr != nil {\n\t\tRespondWithError(w, http.StatusInternalServerError, \"Error reading request body\")\n\t}\n\tvar user User\n\tr.Body = ioutil.NopCloser(bytes.NewBuffer(b))\n\tif err := json.NewDecoder(r.Body).Decode(&user); err != nil {\n\t\tRespondWithError(w, http.StatusBadRequest, \"Invalid request payload\")\n\t\treturn false\n\t}\n\t// re insert the data read from r.body because r.Body is a read once byte stream\n\tr.Body = ioutil.NopCloser(bytes.NewBuffer(b))\n\tvalidate := validator.New()\n err := validate.Struct(user)\n var valerrors = []string{}\n if err != nil {\n\t if strings.Contains(err.Error(), \"Description\") {\n\t\t valerrors= append(valerrors, \"Description is invalid\")\n\t }\n\t RespondWithError(w, http.StatusBadRequest, err.Error())\n\t return false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "f4ddae10dd2e04a148be6ebd8bdfdc70", "score": "0.5353459", "text": "func (m *UserUserInfoCard) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateMembershipType(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f3b68225538c9dd660b348d3f613bd4f", "score": "0.53389776", "text": "func (p *Profile) Validate() error {\n\treturn nil\n\t//return validation.ValidateStruct(p,\n\t//validation.Field(&p.Theme, validation.Required, validation.In(\"default\", \"dark\")),\n\t//)\n}", "title": "" }, { "docid": "140d6ccba6f4a1574d766a0916228e2b", "score": "0.5330491", "text": "func (mt *UserTiny) Validate() (err error) {\n\tif mt.Href == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"href\"))\n\t}\n\tif mt.Email == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"email\"))\n\t}\n\n\tif err2 := goa.ValidateFormat(goa.FormatEmail, mt.Email); err2 != nil {\n\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`response.email`, mt.Email, goa.FormatEmail, err2))\n\t}\n\treturn err\n}", "title": "" }, { "docid": "e58efe79cff90cd6db203a7384b82d52", "score": "0.5300108", "text": "func (m *Usm) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateLinks(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateAuthenticationPassword(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateAuthenticationProtocol(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePrivacyPassword(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePrivacyProtocol(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "64a3942cca18d49c3d8e9589840bad1f", "score": "0.5292474", "text": "func (mt *UserLink) Validate() (err error) {\n\n\tif mt.Href == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"href\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "3f1bf38fcc6829efe8c2f2c3319a56a8", "score": "0.5290824", "text": "func (user User) Validate() error {\n\treturn validation.ValidateStruct(&user,\n\t\tvalidation.Field(&user.GivenName, validation.Required, validation.Length(1, 50)),\n\t\tvalidation.Field(&user.FamilyName, validation.Required, validation.Length(1, 50)),\n\t\tvalidation.Field(&user.Email, validation.Required, is.Email, validation.Length(1, 256)),\n\t)\n}", "title": "" }, { "docid": "aa0083c83bb7e1e7ee88a849f546f71e", "score": "0.5283892", "text": "func (mt *UserLink) Validate() (err error) {\n\tif mt.Href == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"href\"))\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "b7facea65a158aba337005fb831173c9", "score": "0.52813464", "text": "func (user *User) Validate() *errors.RestError {\n\tuser.Email = strings.TrimSpace(strings.ToLower(user.Email))\n\tif user.Email == \"\" {\n\t\treturn RestErrors.BadRequestError(\"Invalid email\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2992641a5e12c3063d9519640c08622c", "score": "0.52804697", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateActive(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateAudit(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateBalance(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateCreatedAt(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateEmail(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRedirect(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUpdatedAt(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3206aa0b11072b4c1f430076f08fe4b3", "score": "0.5257161", "text": "func (m *MovieInstance) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateLinks(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateClassification(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateClassificationBody(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateClassificationDetail(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateDirectors(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateGenres(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateMovieID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRunTime(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSessions(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSourceAttributionText(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSourceAttributionURI(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSynopsis(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTimeZone(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTitle(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTopCast(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUpdatedAt(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "09b700e7b36190ca69a08395e9a3d51b", "score": "0.5252401", "text": "func (m *UserMultiFactor) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Type\n\n\t// no validation rules for State\n\n\treturn nil\n}", "title": "" }, { "docid": "74307103c8bd38c8da6fd66054980693", "score": "0.5237798", "text": "func (m CreateUserMsg) Validate() error {\n\tvar errs error\n\n\terrs = errors.AppendField(errs, \"Metadata\", m.Metadata.Validate())\n\tif !validUsername(m.Username) {\n\t\terrs = errors.AppendField(errs, \"Username\", errors.ErrModel)\n\t}\n\n\tif m.Bio != \"\" && !validBio(m.Bio) {\n\t\terrs = errors.AppendField(errs, \"Bio\", errors.ErrModel)\n\t}\n\n\treturn errs\n}", "title": "" }, { "docid": "29891250943e438c8a9971b2885f38c9", "score": "0.52350193", "text": "func (m *UserUserMembership) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateMembershipType(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bf13944b92318995b877a728e411de26", "score": "0.52001166", "text": "func (user User) Validate() *errors.RestError {\n\tisValid := isEmailValid(user.Email)\n\tisPasswordValid := isPasswordValid(user.Password)\n\n\tif !isValid {\n\t\treturn errors.NewBadRequestError(\"Invalid Email Address\")\n\t}\n\tif !isPasswordValid {\n\t\treturn errors.NewBadRequestError(\"Invalid Password\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3e0d9c672aac0c94a33ab0fa11940d70", "score": "0.5194552", "text": "func (result *FetchMediaView) Validate() (err error) {\n\tif result.Status == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"status\", \"result\"))\n\t}\n\tif result.ArchiveHref == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"archive_href\", \"result\"))\n\t}\n\tif result.Status != nil {\n\t\tif *result.Status < 0 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidRangeError(\"result.status\", *result.Status, 0, true))\n\t\t}\n\t}\n\tif result.ArchiveHref != nil {\n\t\terr = goa.MergeErrors(err, goa.ValidatePattern(\"result.archive_href\", *result.ArchiveHref, \"^/archive/[0-9]+$\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "4cfef5284aef436034d4470f2d0cea75", "score": "0.5192028", "text": "func (ut *UpdateUserID) Validate() (err error) {\n\tif ut.Type == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"type\"))\n\t}\n\tif ut.ID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"id\"))\n\t}\n\tif !(ut.Type == \"identities\") {\n\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(`type.type`, ut.Type, []interface{}{\"identities\"}))\n\t}\n\treturn\n}", "title": "" }, { "docid": "df222b190e6cb8758121d2222c127f55", "score": "0.51873034", "text": "func (m ActivityOwnerType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateActivityOwnerTypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e8b3f7a11e949a8b9dafe0cd057ffc21", "score": "0.5183211", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateEmail(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateIsAdmin(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateName(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePassword(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTeams(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "da3f4b289446d8d08d70adba68965dba", "score": "0.5179767", "text": "func IsValidUserRegistrationPayload(payload *model.User) *wrapper.Property {\n\tvalidate := validator.New()\n\tvalidate.RegisterValidation(\"idn-mobile-number\", validIDNMobileNumber)\n\tvalidate.RegisterValidation(\"password\", validPassword)\n\n\terr := validate.Struct(payload)\n\tif err != nil {\n\t\terrField := err.(validator.ValidationErrors)[0].Field()\n\t\treturn wrapper.Error(http.StatusBadRequest, fmt.Sprintf(\"invalid %s\", strcase.ToLowerCamel(errField)))\n\t}\n\treturn wrapper.Data(http.StatusOK, nil, \"is valid payload\")\n}", "title": "" }, { "docid": "3aa3556772e9447de25a24bc7c166b29", "score": "0.51699317", "text": "func (m *UserResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Id\n\n\t// no validation rules for State\n\n\tif v, ok := interface{}(m.GetCreationDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserResponseValidationError{\n\t\t\t\tfield: \"CreationDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\tif v, ok := interface{}(m.GetChangeDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserResponseValidationError{\n\t\t\t\tfield: \"ChangeDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\t// no validation rules for Sequence\n\n\t// no validation rules for UserName\n\n\tswitch m.User.(type) {\n\n\tcase *UserResponse_Human:\n\n\t\tif v, ok := interface{}(m.GetHuman()).(interface{ Validate() error }); ok {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn UserResponseValidationError{\n\t\t\t\t\tfield: \"Human\",\n\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\tcause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\tcase *UserResponse_Machine:\n\n\t\tif v, ok := interface{}(m.GetMachine()).(interface{ Validate() error }); ok {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn UserResponseValidationError{\n\t\t\t\t\tfield: \"Machine\",\n\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\tcause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\tdefault:\n\t\treturn UserResponseValidationError{\n\t\t\tfield: \"User\",\n\t\t\treason: \"value is required\",\n\t\t}\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "85042d4ca6dedc00f97a4d847da60428", "score": "0.51610947", "text": "func (ut *CreateUserData) Validate() (err error) {\n\tif ut.Type == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"type\"))\n\t}\n\tif ut.Attributes == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"attributes\"))\n\t}\n\tif ut.Attributes != nil {\n\t\tif err2 := ut.Attributes.Validate(); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, err2)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "5f35b0e97bef499538d9331ac14bf979", "score": "0.5160596", "text": "func (m *InviteUser) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateEmail(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateHomeScreen(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRole(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUsername(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3794e68428751ea9431b624488f026d5", "score": "0.51529425", "text": "func (ut *userListMeta) Validate() (err error) {\n\tif ut.TotalCount == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"totalCount\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "67827adcda1574075fcf2dea24458c07", "score": "0.5146229", "text": "func (m Monitor) Validate() (err error) {\n\tif m.URL == \"\" {\n\t\terr = errors.New(\"missing url\")\n\t}\n\tif m.FriendlyName == \"\" {\n\t\terr = errors.New(\"missing friendly_name\")\n\t}\n\tif m.Type == 0 {\n\t\terr = errors.New(\"missing type\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "f35893a075f6b246cbeb4be173ffb049", "score": "0.5119119", "text": "func (mt *CryptopagesUser) Validate() (err error) {\n\tif mt.Username == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"username\"))\n\t}\n\tif mt.Href == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"href\"))\n\t}\n\tif mt.Name == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"name\"))\n\t}\n\tif mt.JobCategory == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"jobCategory\"))\n\t}\n\tif !(mt.JobCategory == \"hardware\" || mt.JobCategory == \"software\" || mt.JobCategory == \"writing\" || mt.JobCategory == \"legal\" || mt.JobCategory == \"labor\" || mt.JobCategory == \"automotive\" || mt.JobCategory == \"services\" || mt.JobCategory == \"others\") {\n\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(`response.jobCategory`, mt.JobCategory, []interface{}{\"hardware\", \"software\", \"writing\", \"legal\", \"labor\", \"automotive\", \"services\", \"others\"}))\n\t}\n\tif mt.Password != nil {\n\t\tif utf8.RuneCountInString(*mt.Password) < 8 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.password`, *mt.Password, utf8.RuneCountInString(*mt.Password), 8, true))\n\t\t}\n\t}\n\tif utf8.RuneCountInString(mt.Username) < 2 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.username`, mt.Username, utf8.RuneCountInString(mt.Username), 2, true))\n\t}\n\treturn\n}", "title": "" }, { "docid": "f3dd772509428bb944464e987c2c44d3", "score": "0.5118573", "text": "func (m *UserPhone) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Id\n\n\t// no validation rules for Phone\n\n\t// no validation rules for IsPhoneVerified\n\n\t// no validation rules for Sequence\n\n\tif v, ok := interface{}(m.GetCreationDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserPhoneValidationError{\n\t\t\t\tfield: \"CreationDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\tif v, ok := interface{}(m.GetChangeDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserPhoneValidationError{\n\t\t\t\tfield: \"ChangeDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5b077389b37683ac23388be57989430e", "score": "0.51135796", "text": "func (u *User) Valid() error {\n\tif u.DocType != UserDocType {\n\t\treturn fmt.Errorf(\"user docType not set to '%s'\", UserDocType)\n\t}\n\tif u.ID == \"\" {\n\t\treturn fmt.Errorf(\"missing user ID\")\n\t}\n\n\tif u.Name == \"\" {\n\t\treturn fmt.Errorf(\"missing user name\")\n\t}\n\tif u.RemainingCoffee < 0 {\n\t\treturn errors.New(\"user has negative number of remaining coffees\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b79417f271ffc6e0dc41e8fa3cb2d3b9", "score": "0.5099537", "text": "func (ut *createUserData) Validate() (err error) {\n\tif ut.Type == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"type\"))\n\t}\n\tif ut.Attributes == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"attributes\"))\n\t}\n\tif ut.Attributes != nil {\n\t\tif err2 := ut.Attributes.Validate(); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, err2)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "fe6158d44e20eac2ff6a8917448c5634", "score": "0.5093008", "text": "func IsValidMediaType(filename string) bool {\n\tmimeType := getMimeType(filename)\n\t_, isPhoto := photoTypes[mimeType]\n\t_, isVideo := videoTypes[mimeType]\n\n\treturn isPhoto || isVideo\n}", "title": "" }, { "docid": "fa3a8de762a7f1fdf867f4d866761705", "score": "0.5091165", "text": "func (user UserModel) Validate() (errs []string) {\n\tif user.FirstName == \"\" {\n\t\terrs = append(errs, \"FirstName is not specified!\")\n\t}\n\n\tif user.LastName == \"\" {\n\t\terrs = append(errs, \"LastName is not specified!\")\n\t}\n\n\tif user.Email == \"\" {\n\t\terrs = append(errs, \"Email is not specified!\")\n\t} else if !validateEmail(user.Email) {\n\t\terrs = append(errs, \"Invalid Email specified!\")\n\t}\n\n\tif user.Telephone == \"\" {\n\t\terrs = append(errs, \"Telephone is not specified!\")\n\t} else if !validateTelephone(user.Telephone) {\n\t\terrs = append(errs, \"Invalid Telephone specified! Accepts (###) ###-####[[ ]x#####]\")\n\t}\n\n\tif user.Username == \"\" {\n\t\terrs = append(errs, \"Username is not specified!\")\n\t} else if !validateUsername(user.Username) {\n\t\terrs = append(errs, \"Invalid Username: must be between 5 and 25 characters and be only alphanumeric\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "b483b96eb773296ab9821c3152ee37c2", "score": "0.5088632", "text": "func (mt *UpdateUser) Validate() (err error) {\n\tif mt.Data == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"data\"))\n\t}\n\tif mt.Data != nil {\n\t\tif err2 := mt.Data.Validate(); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, err2)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "a25c33757dd2511948d02853b9b19ac9", "score": "0.5071722", "text": "func (u *User) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: u.Email, Name: \"Email\"},\n\t\t&validators.StringIsPresent{Field: u.FirstName, Name: \"FirstName\"},\n\t\t&validators.StringIsPresent{Field: u.LastName, Name: \"LastName\"},\n\t\t&validators.StringIsPresent{Field: u.Nickname, Name: \"Nickname\"},\n\t\t&validators.UUIDIsPresent{Field: u.UUID, Name: \"UUID\"},\n\t\t&NullsStringIsURL{Field: u.AuthPhotoURL, Name: \"AuthPhotoURL\"},\n\t\t&domain.StringIsVisible{Field: u.Nickname, Name: \"Nickname\"},\n\t), nil\n}", "title": "" }, { "docid": "fb4504f289fdf24d83ea57f12cc54eee", "score": "0.5067705", "text": "func (v UserProfileView) Valid() bool { return v.ж != nil }", "title": "" }, { "docid": "9e9a257e65de7e626a08228b7afda207", "score": "0.50626564", "text": "func (mt MetadataType) Valid() bool {\n\tswitch mt {\n\tcase MetadataDummy, MetadataBreachedPassword, MetadataSimilarPassword, MetadataBreachedUsername:\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e09c0ea4f92a1705d3734f41ceb07689", "score": "0.50494146", "text": "func (u streamServerURI) Validate() (err error) {\n\t_, err = u.Parse()\n\treturn\n}", "title": "" }, { "docid": "0efb9c1388380f44851d9fe4bf67847b", "score": "0.5041987", "text": "func (u *User) validate() error {\n\treturn nil\n}", "title": "" }, { "docid": "91fac229cf901f03feb47d862b0118cd", "score": "0.5034654", "text": "func ContentTypeValidator(response http.ResponseWriter, request *http.Request) {\n\n\t// check for content type existence and check for json validity\n\tif request.Header.Get(\"Content-Type\") != \"\" {\n\t\tvalue, _ := header.ParseValueAndParams(request.Header, \"Content-Type\")\n\t\tif value != \"application/json\" {\n\t\t\tmsg := \"Content-Type header is not application/json\"\n\t\t\thttp.Error(response, msg, http.StatusUnsupportedMediaType)\n\t\t\treturn\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "605ee9eea8fd0f967cd1450bee1b605b", "score": "0.50325555", "text": "func (u *User) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.NewErrors(), nil\n}", "title": "" }, { "docid": "a065b3b360c93dc7db95836c5bb73ba9", "score": "0.5028185", "text": "func (ut *updateUserID) Validate() (err error) {\n\tif ut.Type == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"type\"))\n\t}\n\tif ut.ID == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"id\"))\n\t}\n\tif ut.Type != nil {\n\t\tif !(*ut.Type == \"identities\") {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(`request.type`, *ut.Type, []interface{}{\"identities\"}))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "42924c4c44acb753830e3c75d8dd430e", "score": "0.5026442", "text": "func (p *Picture) Validate() error {\n\tif p.Title == \"\" {\n\t\treturn errors.New(\"Title cannot be empty\")\n\t}\n\tif p.User == \"\" {\n\t\treturn errors.New(\"Picture must be owned by a user\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "88fa2274300cdd7c994c778988e919e1", "score": "0.50241137", "text": "func (c UserInfoClaims) Valid() error {\n\treturn nil\n}", "title": "" }, { "docid": "399a075c663ad16b5594ca2c792ca01c", "score": "0.502395", "text": "func (o *PostUsersBody) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := o.validateEmail(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := o.validateName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "28d3af3aed04d5f88d0aea59faf447de", "score": "0.50208026", "text": "func (payload *createUserHyUserPayload) Validate() (err error) {\n\tif payload.UserName == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`raw`, \"user_name\"))\n\t}\n\tif payload.Email == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`raw`, \"email\"))\n\t}\n\tif payload.Password == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`raw`, \"password\"))\n\t}\n\tif payload.Email != nil {\n\t\tif err2 := goa.ValidateFormat(goa.FormatEmail, *payload.Email); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`raw.email`, *payload.Email, goa.FormatEmail, err2))\n\t\t}\n\t}\n\tif payload.Password != nil {\n\t\tif utf8.RuneCountInString(*payload.Password) < 8 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`raw.password`, *payload.Password, utf8.RuneCountInString(*payload.Password), 8, true))\n\t\t}\n\t}\n\tif payload.Password != nil {\n\t\tif utf8.RuneCountInString(*payload.Password) > 20 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`raw.password`, *payload.Password, utf8.RuneCountInString(*payload.Password), 20, false))\n\t\t}\n\t}\n\tif payload.UserName != nil {\n\t\tif utf8.RuneCountInString(*payload.UserName) < 2 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`raw.user_name`, *payload.UserName, utf8.RuneCountInString(*payload.UserName), 2, true))\n\t\t}\n\t}\n\tif payload.UserName != nil {\n\t\tif utf8.RuneCountInString(*payload.UserName) > 20 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`raw.user_name`, *payload.UserName, utf8.RuneCountInString(*payload.UserName), 20, false))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "94f1755fbcce3a9ca1e4a72572f098b4", "score": "0.5015367", "text": "func (v *requiredRule) Validate(value interface{}) error {\n\tj, ok := value.(URL)\n\tif !ok {\n\t\treturn errors.New(\"invalid type\")\n\t}\n\treturn j.Validate()\n}", "title": "" }, { "docid": "1372972f863a523656ae4056b823be8e", "score": "0.5013097", "text": "func (m *User) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif utf8.RuneCountInString(m.GetId()) > 36 {\n\t\treturn UserValidationError{\n\t\t\tfield: \"Id\",\n\t\t\treason: \"value length must be at most 36 runes\",\n\t\t}\n\t}\n\n\tif l := utf8.RuneCountInString(m.GetName()); l < 2 || l > 10 {\n\t\treturn UserValidationError{\n\t\t\tfield: \"Name\",\n\t\t\treason: \"value length must be between 2 and 10 runes, inclusive\",\n\t\t}\n\t}\n\n\tif val := m.GetAge(); val <= 0 || val > 180 {\n\t\treturn UserValidationError{\n\t\t\tfield: \"Age\",\n\t\t\treason: \"value must be inside range (0, 180]\",\n\t\t}\n\t}\n\n\tif _, ok := _User_Gender_InLookup[m.GetGender()]; !ok {\n\t\treturn UserValidationError{\n\t\t\tfield: \"Gender\",\n\t\t\treason: \"value must be in list [0 1 2]\",\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6211bc912c2ee1935bf472d634627891", "score": "0.5011543", "text": "func (payload *refreshUserPayload) Validate() (err error) {\n\tif payload.RefreshToken == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`raw`, \"refresh_token\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "1cc959146f9423f0334126ca379097f6", "score": "0.50100416", "text": "func (userdata *UserData) Validate() error {\n\tvar v revel.Validation\n\n\tv.Match(userdata.MailAddr, regexp.MustCompile(`([a-zA-Z0-9])+@mediba.jp`))\n\tif v.HasErrors() {\n\t\treturn errors.New(\"mail address is validate error\")\n\t}\n\n\tv.Check(\n\t\tuserdata.Password,\n\t\trevel.Required{},\n\t\trevel.MinSize{4},\n\t)\n\tif v.HasErrors() {\n\t\treturn errors.New(\"password is validate error\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "348398b5ef855837c4476d6cd9ccde1a", "score": "0.50083447", "text": "func (c AuthJWTClaims) Valid() error {\n\tif err := c.StandardClaims.Valid(); err != nil {\n\t\treturn err\n\t}\n\n\tif c.UserID == \"\" {\n\t\treturn errors.New(\"Must provide a user ID\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cb3149691844fb07ef7fe4f1f1c20615", "score": "0.5006927", "text": "func (u *User) Validate() *errors.RestError {\n\tu.Email = strings.TrimSpace(strings.ToLower(u.Email))\n\tif u.Email == \"\" {\n\t\treturn errors.NewBadRequestError(\"Invalid User Email Address\")\n\t}\n\n\tu.Password = strings.TrimSpace(u.Password)\n\tif u.Password == \"\" {\n\t\treturn errors.NewBadRequestError(\"Invalid User Password\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "650eb431791f8e6d713e4cb3e60a889d", "score": "0.5005782", "text": "func (m *ResponseObject) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateUserGUID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "290244797938e3470c348f4c4fce9919", "score": "0.50014895", "text": "func (m *userOpResponse) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "0f9bfea66922727a228c98fd39af515f", "score": "0.50013995", "text": "func (t HandlerType) Validate() error {\n\tswitch t {\n\tcase AggregateHandlerType,\n\t\tProcessHandlerType,\n\t\tIntegrationHandlerType,\n\t\tProjectionHandlerType:\n\t\treturn nil\n\tdefault:\n\t\treturn validation.Errorf(\"invalid handler type: %s\", string(t))\n\t}\n}", "title": "" }, { "docid": "a97a2786ad45105b453898c76e204baf", "score": "0.49967316", "text": "func (m *UserAllOf1) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateContactMethods(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateEmail(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateJobTitle(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateNotificationRules(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRole(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTeams(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "02480b3971dca6f07ead0a51a69057c8", "score": "0.49945226", "text": "func (o *MeasureFamiliesGetUnauthorizedBody) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "e6ac21729cd898344f114209736bd65c", "score": "0.49932173", "text": "func (payload *CreateUserHyUserPayload) Validate() (err error) {\n\tif payload.UserName == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`raw`, \"user_name\"))\n\t}\n\tif payload.Email == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`raw`, \"email\"))\n\t}\n\tif payload.Password == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`raw`, \"password\"))\n\t}\n\tif err2 := goa.ValidateFormat(goa.FormatEmail, payload.Email); err2 != nil {\n\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`raw.email`, payload.Email, goa.FormatEmail, err2))\n\t}\n\tif utf8.RuneCountInString(payload.Password) < 8 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`raw.password`, payload.Password, utf8.RuneCountInString(payload.Password), 8, true))\n\t}\n\tif utf8.RuneCountInString(payload.Password) > 20 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`raw.password`, payload.Password, utf8.RuneCountInString(payload.Password), 20, false))\n\t}\n\tif utf8.RuneCountInString(payload.UserName) < 2 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`raw.user_name`, payload.UserName, utf8.RuneCountInString(payload.UserName), 2, true))\n\t}\n\tif utf8.RuneCountInString(payload.UserName) > 20 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`raw.user_name`, payload.UserName, utf8.RuneCountInString(payload.UserName), 20, false))\n\t}\n\treturn\n}", "title": "" }, { "docid": "e92d7f7f7d62731b44c910a53d4f3a09", "score": "0.4990803", "text": "func (payload *RefreshUserPayload) Validate() (err error) {\n\tif payload.RefreshToken == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`raw`, \"refresh_token\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "1138ad1cba9e97eaf6049cf889fcee1e", "score": "0.49901494", "text": "func (m *UserProfileView) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Id\n\n\t// no validation rules for FirstName\n\n\t// no validation rules for LastName\n\n\t// no validation rules for NickName\n\n\t// no validation rules for DisplayName\n\n\t// no validation rules for PreferredLanguage\n\n\t// no validation rules for Gender\n\n\t// no validation rules for Sequence\n\n\tif v, ok := interface{}(m.GetCreationDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserProfileViewValidationError{\n\t\t\t\tfield: \"CreationDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\tif v, ok := interface{}(m.GetChangeDate()).(interface{ Validate() error }); ok {\n\t\tif err := v.Validate(); err != nil {\n\t\t\treturn UserProfileViewValidationError{\n\t\t\t\tfield: \"ChangeDate\",\n\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\tcause: err,\n\t\t\t}\n\t\t}\n\t}\n\n\t// no validation rules for PreferredLoginName\n\n\treturn nil\n}", "title": "" }, { "docid": "2a3374044d55533410fec69f6f667447", "score": "0.49900204", "text": "func (o *AssociationTypesPatchUnauthorizedBody) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "af79c6ced585a3f06e52c570bb82dba6", "score": "0.49729112", "text": "func (mt *UserID) Validate() (err error) {\n\tif mt.ID != nil {\n\t\tif *mt.ID < 1 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidRangeError(`response.id`, *mt.ID, 1, true))\n\t\t}\n\t}\n\treturn\n}", "title": "" } ]
9647b873210526979d097a3177472b54
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be nonnil.
[ { "docid": "f749a1dcd413189b0e489e07116c3706", "score": "0.0", "text": "func (in *StatefulguardianSpec) DeepCopyInto(out *StatefulguardianSpec) {\n\t*out = *in\n\tin.Lifecycle.DeepCopyInto(&out.Lifecycle)\n\tin.AppMonitor.DeepCopyInto(&out.AppMonitor)\n\tin.App.DeepCopyInto(&out.App)\n\tif in.Resources != nil {\n\t\tin, out := &in.Resources, &out.Resources\n\t\tif *in == nil {\n\t\t\t*out = nil\n\t\t} else {\n\t\t\t*out = new(Resources)\n\t\t\t(*in).DeepCopyInto(*out)\n\t\t}\n\t}\n\treturn\n}", "title": "" } ]
[ { "docid": "1f57ffc651711a9d4e3c2aaf2c3fe0af", "score": "0.82304025", "text": "func (in *Result) DeepCopyInto(out *Result) {\n\t*out = *in\n}", "title": "" }, { "docid": "ad305ab191366a9506e5a265e8f598f7", "score": "0.8201859", "text": "func (in *Alibaba) DeepCopyInto(out *Alibaba) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "a42f3277ccfd7290dba1d5fd8d6526a4", "score": "0.81997156", "text": "func (in *Memory) DeepCopyInto(out *Memory) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "da106d983b586b057f03d7a4a40c0ad7", "score": "0.8176168", "text": "func (in *Info) DeepCopyInto(out *Info) {\n\t*out = *in\n}", "title": "" }, { "docid": "c49029c90a1c585ff59e9b461126fd3a", "score": "0.81664026", "text": "func (in *ExtractResults) DeepCopyInto(out *ExtractResults) {\n\t*out = *in\n}", "title": "" }, { "docid": "e0815fd5cf43267b351cded80677d403", "score": "0.81589115", "text": "func (in *MongosNode) DeepCopyInto(out *MongosNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "e0815fd5cf43267b351cded80677d403", "score": "0.81589115", "text": "func (in *MongosNode) DeepCopyInto(out *MongosNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "dc68efae3bbd1db624ff48f44f17a2a9", "score": "0.811768", "text": "func (in *Oss) DeepCopyInto(out *Oss) {\n\t*out = *in\n}", "title": "" }, { "docid": "c956ce3bd090743986ccc6cc2f33bdfd", "score": "0.81082815", "text": "func (in *Cerebro) DeepCopyInto(out *Cerebro) {\n\t*out = *in\n}", "title": "" }, { "docid": "294d32b697fb9265d694200a92e867f9", "score": "0.8103162", "text": "func (in *Swift) DeepCopyInto(out *Swift) {\n\t*out = *in\n}", "title": "" }, { "docid": "43bb5416c56822147844c8d692c5ce59", "score": "0.81024987", "text": "func (in *Arg) DeepCopyInto(out *Arg) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "02b911176a8121b528f5a1355f4f7b15", "score": "0.808476", "text": "func (in *Step) DeepCopyInto(out *Step) {\n\t*out = *in\n\tif in.Args != nil {\n\t\tin, out := &in.Args, &out.Args\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Env != nil {\n\t\tin, out := &in.Env, &out.Env\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.SecretEnv != nil {\n\t\tin, out := &in.SecretEnv, &out.SecretEnv\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Volumes != nil {\n\t\tin, out := &in.Volumes, &out.Volumes\n\t\t*out = make([]Volumes, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.WaitFor != nil {\n\t\tin, out := &in.WaitFor, &out.WaitFor\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\treturn\n}", "title": "" }, { "docid": "3c45d4691bffdd429c620d809132e9c6", "score": "0.8079251", "text": "func (in *MemNode) DeepCopyInto(out *MemNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "9880d223d20120d641e38948a479e267", "score": "0.80629224", "text": "func (in *Curator) DeepCopyInto(out *Curator) {\n\t*out = *in\n}", "title": "" }, { "docid": "d86cd832a6b2a900f25a9926245ddc0c", "score": "0.80617553", "text": "func (in *CockroachDBNode) DeepCopyInto(out *CockroachDBNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "41475496763ae4276f7015dae332c81a", "score": "0.8058953", "text": "func (in *MX) DeepCopyInto(out *MX) {\n\t*out = *in\n}", "title": "" }, { "docid": "a4140474dca433b376cb006f53ce01b8", "score": "0.80548596", "text": "func (in *FlavorNode) DeepCopyInto(out *FlavorNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "d4907b7e87f96cc9f592e887afb9927d", "score": "0.80513793", "text": "func (in *Node) DeepCopyInto(out *Node) {\n\t*out = *in\n}", "title": "" }, { "docid": "9b47e574bb5be9efb098214692f31714", "score": "0.80500704", "text": "func (in *FilesystemInfo) DeepCopyInto(out *FilesystemInfo) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "675bd2d929e6a218a6d73beb70c865e1", "score": "0.80485696", "text": "func (in *ExistPvc) DeepCopyInto(out *ExistPvc) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "8efd0808623d9b730fb7e61f70087c8f", "score": "0.80483013", "text": "func (in *Container) DeepCopyInto(out *Container) {\n\t*out = *in\n}", "title": "" }, { "docid": "8bde41186e7e61e4e7741184e3d389ed", "score": "0.8039166", "text": "func (in *ResultRef) DeepCopyInto(out *ResultRef) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "58f001a58f43a3e8e30a09873185f4d3", "score": "0.80366516", "text": "func (in *Results) DeepCopyInto(out *Results) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "7e85ead0c8c714d276f5fb9452635d0d", "score": "0.8035343", "text": "func (in *Fake) DeepCopyInto(out *Fake) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "9f8b8a23dcf73e6ba1910cae5ae70043", "score": "0.8034441", "text": "func (in *Value) DeepCopyInto(out *Value) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "12aba946684ce7a45759b3de900e843d", "score": "0.8033727", "text": "func (d *Date) DeepCopyInto(out *Date) {\n\t*out = *d\n}", "title": "" }, { "docid": "bb11c9a990e7f490126a74be357aff79", "score": "0.80313784", "text": "func (in *ValueSelection) DeepCopyInto(out *ValueSelection) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "685326535d53e4ba6971d394916fb76a", "score": "0.8028889", "text": "func (in *OutputRef) DeepCopyInto(out *OutputRef) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "f484f0844458e8a703a8694a29b0e407", "score": "0.8020036", "text": "func (in *Var) DeepCopyInto(out *Var) {\n\t*out = *in\n}", "title": "" }, { "docid": "071025652c9144e1aceac0a90f385353", "score": "0.80165744", "text": "func (in *ACPI) DeepCopyInto(out *ACPI) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "e9cb500ebbcbb1ec1b2276e4a6ad7c35", "score": "0.80160326", "text": "func (in *FileSystemInfo) DeepCopyInto(out *FileSystemInfo) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "81b3fe61ed28b4b0fdd14116c4b2d1f5", "score": "0.801332", "text": "func (in *PandaproxyAPITLS) DeepCopyInto(out *PandaproxyAPITLS) {\n\t*out = *in\n}", "title": "" }, { "docid": "95970938421b1288bad93724e6d86347", "score": "0.80132526", "text": "func (in *HiddenNode) DeepCopyInto(out *HiddenNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "e79a12a89d645ee17265ac1e9220920d", "score": "0.8011956", "text": "func (in *KeystoneDebug) DeepCopyInto(out *KeystoneDebug) {\n\t*out = *in\n}", "title": "" }, { "docid": "30324ad038726659a523150f3368d0f5", "score": "0.8010361", "text": "func (in *Container) DeepCopyInto(out *Container) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "7c8c47fb388e239b1f56b93f3c3fcd75", "score": "0.80064476", "text": "func (in *FilesystemTarget) DeepCopyInto(out *FilesystemTarget) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "24891879c3796e85357de6b6d3986a17", "score": "0.80022174", "text": "func (in *Empty) DeepCopyInto(out *Empty) {\n\t*out = *in\n}", "title": "" }, { "docid": "0e55f7e85b58f091b4c56d054b1a0f01", "score": "0.8002043", "text": "func (in *BIOS) DeepCopyInto(out *BIOS) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "afb583f9d5ea7e3b6b4ab0c26a4563bd", "score": "0.799358", "text": "func (in *KubeovnCfg) DeepCopyInto(out *KubeovnCfg) {\n\t*out = *in\n}", "title": "" }, { "docid": "bd76d0c812c11347dc0586c794e13bbb", "score": "0.79911625", "text": "func (in *ObjectID) DeepCopyInto(out *ObjectID) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "87cf7c6678a506b2791e1c30d1d4540c", "score": "0.7987149", "text": "func (in *ObjectRef) DeepCopyInto(out *ObjectRef) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "b484ecb198d3d15da23105d7d1e0fce9", "score": "0.7982483", "text": "func (in *HostMemory) DeepCopyInto(out *HostMemory) {\n\t*out = *in\n}", "title": "" }, { "docid": "ac7c801f87efa15912e469730d600335", "score": "0.7981367", "text": "func (in *NUMACell) DeepCopyInto(out *NUMACell) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "992d147304d6bad233da2be02fc7619d", "score": "0.79796785", "text": "func (in *Struct_ObjectAndObject) DeepCopyInto(out *Struct_ObjectAndObject) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "083852392c5e9f16679610351c913068", "score": "0.7977777", "text": "func (in *Entry) DeepCopyInto(out *Entry) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "55c1000e8c0cd2b29bcfd858b2050c26", "score": "0.7975866", "text": "func (in *ContainerInfo) DeepCopyInto(out *ContainerInfo) {\n\t*out = *in\n}", "title": "" }, { "docid": "308c47eab2a45025e0d70b6f63a70745", "score": "0.7971048", "text": "func (in *View) DeepCopyInto(out *View) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "dc25f670b9ab6635efd1a7f707841646", "score": "0.7969739", "text": "func (in *ObjectReference) DeepCopyInto(out *ObjectReference) {\n\t*out = *in\n}", "title": "" }, { "docid": "dc25f670b9ab6635efd1a7f707841646", "score": "0.7969739", "text": "func (in *ObjectReference) DeepCopyInto(out *ObjectReference) {\n\t*out = *in\n}", "title": "" }, { "docid": "1f29957ddd8a3d29eefd9952908cbb3a", "score": "0.7966434", "text": "func (in *CleanupOptions) DeepCopyInto(out *CleanupOptions) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "cc4346b3e9aec199385bc90140def4e1", "score": "0.7965026", "text": "func (in *Replicas) DeepCopyInto(out *Replicas) {\n\t*out = *in\n}", "title": "" }, { "docid": "cc4346b3e9aec199385bc90140def4e1", "score": "0.7965026", "text": "func (in *Replicas) DeepCopyInto(out *Replicas) {\n\t*out = *in\n}", "title": "" }, { "docid": "a7b378d1a6bd8758e11892764d752257", "score": "0.79637235", "text": "func (in *AccessRule) DeepCopyInto(out *AccessRule) {\n\t*out = *in\n\tif in.Services != nil {\n\t\tin, out := &in.Services, &out.Services\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Methods != nil {\n\t\tin, out := &in.Methods, &out.Methods\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Paths != nil {\n\t\tin, out := &in.Paths, &out.Paths\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\treturn\n}", "title": "" }, { "docid": "b6a38c245c68cf0a952d8cd3035f414b", "score": "0.7961561", "text": "func (in *Filesystem) DeepCopyInto(out *Filesystem) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "cecf0e759895b3677c7ac21129d95d32", "score": "0.7959489", "text": "func (in *FederatedIdentity) DeepCopyInto(out *FederatedIdentity) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "fcd61e82f34db96b76efba6276644908", "score": "0.7957314", "text": "func (in *ObjectSelector) DeepCopyInto(out *ObjectSelector) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "fcd61e82f34db96b76efba6276644908", "score": "0.7957314", "text": "func (in *ObjectSelector) DeepCopyInto(out *ObjectSelector) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "4cc4474c2a1333bf5f947b2294d0b027", "score": "0.79531795", "text": "func (in *Interface) DeepCopyInto(out *Interface) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "39a471f5aadbdab5d9516ba227972d8a", "score": "0.7952031", "text": "func (in *Kubevirt) DeepCopyInto(out *Kubevirt) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "2e969070a96b8b6d99bd7c0c3b07add8", "score": "0.79511935", "text": "func (in *K8sNode) DeepCopyInto(out *K8sNode) {\n\t*out = *in\n}", "title": "" }, { "docid": "3a50ec1b7050b7c2c74ee0d6b2e48f87", "score": "0.79469675", "text": "func (in *Kustomize) DeepCopyInto(out *Kustomize) {\n\t*out = *in\n}", "title": "" }, { "docid": "7dba8e650f835283d56250f2cdab85d5", "score": "0.79462737", "text": "func (in *Nats) DeepCopyInto(out *Nats) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "62fdf0e0bb9afa2bdeb473e8512e55b9", "score": "0.7946217", "text": "func (in *MemoryBackingSource) DeepCopyInto(out *MemoryBackingSource) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "3c51337658fc0e9d2966273bd3459022", "score": "0.7945869", "text": "func (in *ObjectReference) DeepCopyInto(out *ObjectReference) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "98b9c2ac35cd52c9ce36fa4ac31a3620", "score": "0.79445064", "text": "func (in *Struct_Empty) DeepCopyInto(out *Struct_Empty) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "1d3bd808397fc4e42919ba414a38653f", "score": "0.7944283", "text": "func (in *ExpectedNICS) DeepCopyInto(out *ExpectedNICS) {\n\t*out = *in\n}", "title": "" }, { "docid": "ef3955bb9c23ccc542ce27babb3ea911", "score": "0.79437953", "text": "func (in *Hetzner) DeepCopyInto(out *Hetzner) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "c46e3263bd358d3ca2901f5e8dd6924d", "score": "0.7941932", "text": "func (in *InstancetemplateNodeAffinities) DeepCopyInto(out *InstancetemplateNodeAffinities) {\n\t*out = *in\n\tif in.Value != nil {\n\t\tin, out := &in.Value, &out.Value\n\t\t*out = new(InstancetemplateValue)\n\t\t**out = **in\n\t}\n\treturn\n}", "title": "" }, { "docid": "d138525ab73c7f982261d224991bb588", "score": "0.79410547", "text": "func (in *TestingSpec) DeepCopyInto(out *TestingSpec) {\n\t*out = *in\n}", "title": "" }, { "docid": "a62d2491925276d66a89576351b7bdb4", "score": "0.79405445", "text": "func (in *Replicas) DeepCopyInto(out *Replicas) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "49f50463535cd497282b2d6d54eb1245", "score": "0.79376817", "text": "func (in *Notary) DeepCopyInto(out *Notary) {\n\t*out = *in\n}", "title": "" }, { "docid": "6ea8837cf2211c399b0e39da6ff0bb57", "score": "0.79356486", "text": "func (in *StepOutputConfig) DeepCopyInto(out *StepOutputConfig) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "9823e89e5f174980848afc03c8a265ae", "score": "0.79354686", "text": "func (in *Reprovision) DeepCopyInto(out *Reprovision) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "bf95c140cc2b3cece4116f02fe1e5066", "score": "0.7932914", "text": "func (in *ActionInfo) DeepCopyInto(out *ActionInfo) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "6b8379fb1e79e083218be9b00ee3baf3", "score": "0.7930824", "text": "func (in *TaskResult) DeepCopyInto(out *TaskResult) {\n\t*out = *in\n\tif in.Properties != nil {\n\t\tin, out := &in.Properties, &out.Properties\n\t\t*out = make(map[string]PropertySpec, len(*in))\n\t\tfor key, val := range *in {\n\t\t\t(*out)[key] = val\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "cd8c19e9524321e2465ead0ebac86284", "score": "0.79304063", "text": "func (in *FilesFrom) DeepCopyInto(out *FilesFrom) {\n\t*out = *in\n}", "title": "" }, { "docid": "cd8c19e9524321e2465ead0ebac86284", "score": "0.79304063", "text": "func (in *FilesFrom) DeepCopyInto(out *FilesFrom) {\n\t*out = *in\n}", "title": "" }, { "docid": "59f6a3f0b5460ec14888a0e8c4a79965", "score": "0.79289705", "text": "func (in *FilesystemBinaryCache) DeepCopyInto(out *FilesystemBinaryCache) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "4b6d2bbc6df0bd972bb04594e79b6919", "score": "0.7920473", "text": "func (in *Dependency) DeepCopyInto(out *Dependency) {\n\t*out = *in\n\tout.Locator = in.Locator\n\treturn\n}", "title": "" }, { "docid": "08470e00ca7aec496a2eb8d78ea93dc5", "score": "0.7918501", "text": "func (in *Struct_NonPointerExplicitObject) DeepCopyInto(out *Struct_NonPointerExplicitObject) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "7cedeb486714dca831a785712c66168d", "score": "0.7918211", "text": "func (in *HugePage) DeepCopyInto(out *HugePage) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "b60094f2df75404ce1882420fe3681dd", "score": "0.791726", "text": "func (in *Buildpack) DeepCopyInto(out *Buildpack) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "5d6676976741906b273edf03cf097f8d", "score": "0.7914521", "text": "func (in *Identity) DeepCopyInto(out *Identity) {\n\t*out = *in\n}", "title": "" }, { "docid": "e0bb2ad74bf9d1068a03f6f414650b67", "score": "0.7912297", "text": "func (in *ConfigFile) DeepCopyInto(out *ConfigFile) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "a22fa5fa094406e0db8b6a0f3a49d59b", "score": "0.79098386", "text": "func (in *Flavor) DeepCopyInto(out *Flavor) {\n\t*out = *in\n\tif in.Nodes != nil {\n\t\tin, out := &in.Nodes, &out.Nodes\n\t\t*out = make([]FlavorNode, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\treturn\n}", "title": "" }, { "docid": "faa35b0f75770678ed636bddaa5d5721", "score": "0.7909532", "text": "func (in *NumaTuneMemory) DeepCopyInto(out *NumaTuneMemory) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "f9ad912684ce7e3a3c56efaef710a7c5", "score": "0.79094714", "text": "func (in *Cleanup) DeepCopyInto(out *Cleanup) {\n\t*out = *in\n}", "title": "" }, { "docid": "353e8c0b6635af77f678a667b1cbf124", "score": "0.7909399", "text": "func (in *MemoryBackingAccess) DeepCopyInto(out *MemoryBackingAccess) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "fa4eb90516f66dd6b17c28b9f3cab1cf", "score": "0.79093784", "text": "func (in *Openshift) DeepCopyInto(out *Openshift) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "4c1282e68f39e312cb76684584edbb7f", "score": "0.7906816", "text": "func (in *Step) DeepCopyInto(out *Step) {\n\t*out = *in\n\tif in.Command != nil {\n\t\tin, out := &in.Command, &out.Command\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Args != nil {\n\t\tin, out := &in.Args, &out.Args\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.DeprecatedPorts != nil {\n\t\tin, out := &in.DeprecatedPorts, &out.DeprecatedPorts\n\t\t*out = make([]corev1.ContainerPort, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.EnvFrom != nil {\n\t\tin, out := &in.EnvFrom, &out.EnvFrom\n\t\t*out = make([]corev1.EnvFromSource, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n\tif in.Env != nil {\n\t\tin, out := &in.Env, &out.Env\n\t\t*out = make([]corev1.EnvVar, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n\tin.Resources.DeepCopyInto(&out.Resources)\n\tif in.VolumeMounts != nil {\n\t\tin, out := &in.VolumeMounts, &out.VolumeMounts\n\t\t*out = make([]corev1.VolumeMount, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n\tif in.VolumeDevices != nil {\n\t\tin, out := &in.VolumeDevices, &out.VolumeDevices\n\t\t*out = make([]corev1.VolumeDevice, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.DeprecatedLivenessProbe != nil {\n\t\tin, out := &in.DeprecatedLivenessProbe, &out.DeprecatedLivenessProbe\n\t\t*out = new(corev1.Probe)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.DeprecatedReadinessProbe != nil {\n\t\tin, out := &in.DeprecatedReadinessProbe, &out.DeprecatedReadinessProbe\n\t\t*out = new(corev1.Probe)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.DeprecatedStartupProbe != nil {\n\t\tin, out := &in.DeprecatedStartupProbe, &out.DeprecatedStartupProbe\n\t\t*out = new(corev1.Probe)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.DeprecatedLifecycle != nil {\n\t\tin, out := &in.DeprecatedLifecycle, &out.DeprecatedLifecycle\n\t\t*out = new(corev1.Lifecycle)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.SecurityContext != nil {\n\t\tin, out := &in.SecurityContext, &out.SecurityContext\n\t\t*out = new(corev1.SecurityContext)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.Timeout != nil {\n\t\tin, out := &in.Timeout, &out.Timeout\n\t\t*out = new(v1.Duration)\n\t\t**out = **in\n\t}\n\tif in.Workspaces != nil {\n\t\tin, out := &in.Workspaces, &out.Workspaces\n\t\t*out = make([]WorkspaceUsage, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.StdoutConfig != nil {\n\t\tin, out := &in.StdoutConfig, &out.StdoutConfig\n\t\t*out = new(StepOutputConfig)\n\t\t**out = **in\n\t}\n\tif in.StderrConfig != nil {\n\t\tin, out := &in.StderrConfig, &out.StderrConfig\n\t\t*out = new(StepOutputConfig)\n\t\t**out = **in\n\t}\n\treturn\n}", "title": "" }, { "docid": "d2390e63ffae78df49dbee0849af5c53", "score": "0.79063445", "text": "func (in *ImageBuild) DeepCopyInto(out *ImageBuild) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "3e72237bf229a54bf5fbc6a3bdab658f", "score": "0.7904928", "text": "func (in *MatchEntry) DeepCopyInto(out *MatchEntry) {\n\t*out = *in\n\tif in.Processes != nil {\n\t\tin, out := &in.Processes, &out.Processes\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.ExcludedNamespaces != nil {\n\t\tin, out := &in.ExcludedNamespaces, &out.ExcludedNamespaces\n\t\t*out = make([]wildcard.Wildcard, len(*in))\n\t\tcopy(*out, *in)\n\t}\n}", "title": "" }, { "docid": "a2c3ef4679aaffcf7bbbc9eca2211d29", "score": "0.79044276", "text": "func (in *Grafana) DeepCopyInto(out *Grafana) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "bcf09a71293c9cee0c34c2fa367e656b", "score": "0.7904371", "text": "func (in *Path) DeepCopyInto(out *Path) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "9b20ecbd2e5206a3078e0160815c4797", "score": "0.790394", "text": "func (in *CASpec) DeepCopyInto(out *CASpec) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "846892e66bde8639901c45cc7e147cf9", "score": "0.79034203", "text": "func (in *Runtime) DeepCopyInto(out *Runtime) {\n\t*out = *in\n\tout.Locator = in.Locator\n\treturn\n}", "title": "" }, { "docid": "b969c40ddd2a12fda1ad0bcb52dedb0c", "score": "0.7900441", "text": "func (in *Db) DeepCopyInto(out *Db) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "776b0984cdaf45a4f28e7a136be20e7a", "score": "0.789801", "text": "func (u *ULID) DeepCopyInto(out *ULID) {\n\t*out = *u\n}", "title": "" }, { "docid": "6eedbcd9f73915f1ee6c8e6061a288dd", "score": "0.78971326", "text": "func (in *DataCleanStrategy) DeepCopyInto(out *DataCleanStrategy) {\n\t*out = *in\n\tvar fields []Fields\n\tfor _, v := range in.Fields {\n\t\tfields = append(fields, v)\n\t}\n\tout.Fields = fields\n}", "title": "" }, { "docid": "8c510e4af6c6902777e1353712eb8de8", "score": "0.78962827", "text": "func (in *ComputevpntunnelValueFrom) DeepCopyInto(out *ComputevpntunnelValueFrom) {\n\t*out = *in\n\tout.SecretKeyRef = in.SecretKeyRef\n\treturn\n}", "title": "" }, { "docid": "564805f323fbadde55f67e46f75ac865", "score": "0.7895045", "text": "func (in *Destination) DeepCopyInto(out *Destination) {\n\t*out = *in\n}", "title": "" } ]
1befdade4603d5918071fd64fa9abc6e
InitTestSuiteWithMetadata initializes test suite to use cassandra given options and metadata
[ { "docid": "646d01d03f0ec582b9fa1396e5fe0352", "score": "0.78490657", "text": "func InitTestSuiteWithMetadata(tb *persistencetests.TestBase, options *persistencetests.TestBaseOptions, metadata cluster.Metadata) {\n\tif metadata == nil {\n\t\tpanic(\"nil metadata\")\n\t}\n\tif options.SchemaDir == \"\" {\n\t\toptions.SchemaDir = testSchemaDir\n\t}\n\tlog := bark.NewLoggerFromLogrus(log.New())\n\ttb.PersistenceTestCluster = &TestCluster{\n\t\tOptions: options,\n\t}\n\ttb.ClusterMetadata = metadata\n\tcurrentClusterName := tb.ClusterMetadata.GetCurrentClusterName()\n\t// Setup Workflow keyspace and deploy schema for tests\n\ttb.PersistenceTestCluster.SetupTestDatabase(options)\n\tshardID := 0\n\tdatabaseName := tb.PersistenceTestCluster.DatabaseName()\n\tvar err error\n\ttb.ShardMgr, err = NewShardPersistence(options.DBHost, options.DBPort, options.DBUser,\n\t\toptions.DBPassword, databaseName, currentClusterName, log)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ttb.ExecutionMgrFactory, err = NewExecutionManagerFactory(options.DBHost, options.DBPort,\n\t\toptions.DBUser, options.DBPassword, databaseName, options.Datacenter, log)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t// Create an ExecutionManager for the shard for use in unit tests\n\ttb.ExecutionManager, err = tb.ExecutionMgrFactory.CreateExecutionManager(shardID)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ttb.TaskMgr, err = NewTaskPersistence(options.DBHost, options.DBPort, options.DBUser, options.DBPassword,\n\t\tdatabaseName, log)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\thistoryPs, err := NewHistoryPersistence(options.DBHost, options.DBPort, options.DBUser,\n\t\toptions.DBPassword, databaseName, log)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\ttb.HistoryMgr = p.NewHistoryManagerImpl(historyPs, log)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ttb.MetadataManager, err = NewMetadataPersistenceV2(options.DBHost, options.DBPort, options.DBUser,\n\t\toptions.DBPassword, databaseName, currentClusterName, log)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ttb.MetadataProxy = tb.MetadataManager\n\ttb.MetadataManagerV2 = tb.MetadataManager\n\t//tb.VisibilityMgr, err = NewVisibilityPersistence(options.DBHost, options.DBPort,\n\t//\toptions.DBUser, options.DBPassword, options.Datacenter, databaseName, log)\n\t//if err != nil {\n\t//\tlog.Fatal(err)\n\t//}\n\t// Create a shard for test\n\ttb.ReadLevel = 0\n\ttb.ReplicationReadLevel = 0\n\ttb.ShardInfo = &p.ShardInfo{\n\t\tShardID: shardID,\n\t\tRangeID: 0,\n\t\tTransferAckLevel: 0,\n\t\tReplicationAckLevel: 0,\n\t\tTimerAckLevel: time.Time{},\n\t\tClusterTimerAckLevel: map[string]time.Time{currentClusterName: time.Time{}},\n\t\tClusterTransferAckLevel: map[string]int64{currentClusterName: 0},\n\t}\n\ttb.TaskIDGenerator = &persistencetests.TestTransferTaskIDGenerator{}\n\terr1 := tb.ShardMgr.CreateShard(&p.CreateShardRequest{\n\t\tShardInfo: tb.ShardInfo,\n\t})\n\tif err1 != nil {\n\t\tlog.Fatal(err1)\n\t}\n}", "title": "" } ]
[ { "docid": "c6fdeab312de64aee12350a9a2cb46ca", "score": "0.65559125", "text": "func InitTestSuite(tb *persistencetests.TestBase) {\n\toptions := &persistencetests.TestBaseOptions{\n\t\tSchemaDir: testSchemaDir,\n\t\tDBHost: testWorkflowClusterHosts,\n\t\tDBPort: testPort,\n\t\tDBUser: testUser,\n\t\tDBPassword: testPassword,\n\t\tDropDatabase: true,\n\t\tEnableGlobalDomain: false,\n\t\tDatacenter: \"foo\",\n\t}\n\tInitTestSuiteWithOptions(tb, options)\n}", "title": "" }, { "docid": "8b5bf87b722897e0c0a68ea417d387f9", "score": "0.63385975", "text": "func InitTestSuiteWithOptions(tb *persistencetests.TestBase, options *persistencetests.TestBaseOptions) {\n\tInitTestSuiteWithMetadata(tb, options, cluster.GetTestClusterMetadata(\n\t\toptions.EnableGlobalDomain,\n\t\toptions.IsMasterCluster,\n\t))\n}", "title": "" }, { "docid": "9db04e41af8f99a7b7b03eaf376c677d", "score": "0.5548381", "text": "func init() {\n\trand.Seed(time.Now().UnixNano())\n\tconfig := &Config{\n\t\tCassandraConn: &CassandraConn{\n\t\t\tContactPoints: []string{\"127.0.0.1\"},\n\t\t\tPort: 9043,\n\t\t\tCQLVersion: \"3.4.2\",\n\t\t\tMaxGoRoutines: 1000,\n\t\t},\n\t\tStoreName: \"peloton_test\",\n\t}\n\n\tsession, err := CreateStoreSession(\n\t\tconfig.CassandraConn, config.StoreName)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\ttestTableName1 = fmt.Sprintf(\"test_table_%d\", rand.Intn(1000))\n\ttestTableName2 = fmt.Sprintf(\"test_table_%d\", rand.Intn(1000))\n\ttestTableName3 = fmt.Sprintf(\"test_table_%d\", rand.Intn(1000))\n\n\t// create a test table\n\ttable1 := fmt.Sprintf(\"CREATE TABLE peloton_test.%s\"+\n\t\t\" (id int, name text, data text, PRIMARY KEY (id))\", testTableName1)\n\n\tif err := session.Query(table1).Exec(); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// create a test table with partition key \"id\" and clustering key \"ck\"\n\ttable2 := fmt.Sprintf(\"CREATE TABLE peloton_test.%s\"+\n\t\t\" (id int, ck int, name text, data text, PRIMARY KEY ((id), ck))\",\n\t\ttestTableName2)\n\n\tif err := session.Query(table2).Exec(); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// create a test table with partition key of type string \"name\"\n\ttable3 := fmt.Sprintf(\"CREATE TABLE peloton_test.%s\"+\n\t\t\" (name text, data text, PRIMARY KEY ((name)))\",\n\t\ttestTableName3)\n\n\tif err := session.Query(table3).Exec(); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\ttestScope := tally.NewTestScope(\"\", map[string]string{})\n\tconn, err := NewCassandraConnector(config, testScope)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tconnector = conn.(*cassandraConnector)\n}", "title": "" }, { "docid": "4179a075abc01525d7e39fa30f71e4f6", "score": "0.5490733", "text": "func TestTestSuite(t *testing.T) {\n\t// model.DebugQuery = false\n\t// model.DebugSchema = false\n\tvar ctx context.Context //:= plush.NewContext()\n\ttestS := new(TestSuite)\n\n\trootPath := \"..\"\n\tconfig := g.LoadConfig(rootPath + \"/Config.toml\")\n\n\tvar err error\n\tif ctx, err = g.SetupContext(config, rootPath); err != nil {\n\t\tpanic(err)\n\t}\n\n\ttestS.Logger = *ctx.Value(\"log\").(*lib.Logger)\n\tdbConn := ctx.Value(\"db\").(*grpc.ClientConn)\n\ttestS.DBCon = dbConn\n\ttestS.DBClient = dgo.NewDgraphClient(api.NewDgraphClient(dbConn))\n\n\ttestS.Context = plush.NewContextWithContext(ctx)\n\t// fmt.Printf(\"testSuite %#v\\n\", testS)\n\tsuite.Run(t, testS)\n}", "title": "" }, { "docid": "b544b1e6c56d827ef8b3a62931e8f455", "score": "0.53969437", "text": "func SetupTest(t *testing.T) *StringMetadata {\n // Create a new DefaultLoader\n m := multiconfig.New()\n // Create an empty struct for my configuration\n stringMetadata := new(StringMetadata)\n // Load the configuration data\n m.MustLoad(stringMetadata)\n\n return stringMetadata\n}", "title": "" }, { "docid": "5dccb6d399c80e992e5d3047028879f0", "score": "0.539532", "text": "func MakeTPCHCatalog() *testcat.Catalog {\n\tcat := testcat.New()\n\n\tif err := cat.ExecuteMultipleDDL(`\nCREATE TABLE public.region (\n r_regionkey INT8 PRIMARY KEY,\n r_name CHAR(25) NOT NULL,\n r_comment VARCHAR(152)\n);\n\nALTER TABLE region INJECT STATISTICS '[\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"r_regionkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 5,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 5\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"r_name\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 5,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 5\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"r_comment\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 5,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 5\n\t}\n]';\n\nCREATE TABLE public.nation (\n n_nationkey INT8 PRIMARY KEY,\n n_name CHAR(25) NOT NULL,\n n_regionkey INT8 NOT NULL,\n n_comment VARCHAR(152),\n INDEX n_rk (n_regionkey ASC),\n CONSTRAINT nation_fkey_region FOREIGN KEY (n_regionkey) REFERENCES public.region (r_regionkey)\n);\n\nALTER TABLE nation INJECT STATISTICS '[\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"n_nationkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 25,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 25\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"n_regionkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 5,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 25\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"n_name\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 25,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 25\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"n_comment\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 25,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 25\n\t}\n]';\n\nCREATE TABLE public.supplier (\n s_suppkey INT8 PRIMARY KEY,\n s_name CHAR(25) NOT NULL,\n s_address VARCHAR(40) NOT NULL,\n s_nationkey INT8 NOT NULL,\n s_phone CHAR(15) NOT NULL,\n s_acctbal FLOAT8 NOT NULL,\n s_comment VARCHAR(101) NOT NULL,\n INDEX s_nk (s_nationkey ASC),\n CONSTRAINT supplier_fkey_nation FOREIGN KEY (s_nationkey) REFERENCES public.nation (n_nationkey)\n);\n\nALTER TABLE supplier INJECT STATISTICS '[\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"s_suppkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 10034,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 10000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"s_nationkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 25,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 10000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"s_name\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 9990,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 10000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"s_address\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 10027,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 10000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"s_phone\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 10021,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 10000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"s_acctbal\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 9967,\n\t\t\t\"histo_col_type\": \"float\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 10000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"s_comment\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 9934,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 10000\n\t}\n]';\n\nCREATE TABLE public.part (\n p_partkey INT8 PRIMARY KEY,\n p_name VARCHAR(55) NOT NULL,\n p_mfgr CHAR(25) NOT NULL,\n p_brand CHAR(10) NOT NULL,\n p_type VARCHAR(25) NOT NULL,\n p_size INT8 NOT NULL,\n p_container CHAR(10) NOT NULL,\n p_retailprice FLOAT8 NOT NULL,\n p_comment VARCHAR(23) NOT NULL\n);\n\nALTER TABLE part INJECT STATISTICS '[\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"p_partkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 199810,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 200000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"p_name\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 198131,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 200000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"p_mfgr\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 5,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 200000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"p_brand\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 25,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 200000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"p_type\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 150,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 200000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"p_size\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 50,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 200000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"p_container\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 40,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 200000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"p_retailprice\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 20831,\n\t\t\t\"histo_col_type\": \"float\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 200000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"p_comment\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 132344,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 200000\n\t}\n]';\n\nCREATE TABLE public.partsupp (\n ps_partkey INT8 NOT NULL,\n ps_suppkey INT8 NOT NULL,\n ps_availqty INT8 NOT NULL,\n ps_supplycost FLOAT8 NOT NULL,\n ps_comment VARCHAR(199) NOT NULL,\n PRIMARY KEY (ps_partkey, ps_suppkey),\n INDEX ps_sk (ps_suppkey ASC),\n CONSTRAINT partsupp_fkey_part FOREIGN KEY (ps_partkey) REFERENCES public.part (p_partkey),\n CONSTRAINT partsupp_fkey_supplier FOREIGN KEY (ps_suppkey) REFERENCES public.supplier (s_suppkey)\n);\n\nALTER TABLE partsupp INJECT STATISTICS '[\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"ps_partkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 199810,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 800000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"ps_suppkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 10034,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 800000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"ps_availqty\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 10032,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 800000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"ps_supplycost\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 100379,\n\t\t\t\"histo_col_type\": \"float\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 800000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"ps_comment\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 799641,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 800000\n\t}\n]';\n\nCREATE TABLE public.customer (\n c_custkey INT8 PRIMARY KEY,\n c_name VARCHAR(25) NOT NULL,\n c_address VARCHAR(40) NOT NULL,\n c_nationkey INT8 NOT NULL,\n c_phone CHAR(15) NOT NULL,\n c_acctbal FLOAT8 NOT NULL,\n c_mktsegment CHAR(10) NOT NULL,\n c_comment VARCHAR(117) NOT NULL,\n INDEX c_nk (c_nationkey ASC),\n CONSTRAINT customer_fkey_nation FOREIGN KEY (c_nationkey) REFERENCES public.nation (n_nationkey)\n);\n\nALTER TABLE customer INJECT STATISTICS '[\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"c_custkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 150097,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 150000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"c_nationkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 25,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 150000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"c_name\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 151126,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 150000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"c_address\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 149937,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 150000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"c_phone\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 150872,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 150000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"c_acctbal\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 140628,\n\t\t\t\"histo_col_type\": \"float\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 150000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"c_mktsegment\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 5,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 150000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"c_comment\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 149323,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 150000\n\t}\n]';\n\nCREATE TABLE public.orders (\n o_orderkey INT8 PRIMARY KEY,\n o_custkey INT8 NOT NULL,\n o_orderstatus CHAR NOT NULL,\n o_totalprice FLOAT8 NOT NULL,\n o_orderdate DATE NOT NULL,\n o_orderpriority CHAR(15) NOT NULL,\n o_clerk CHAR(15) NOT NULL,\n o_shippriority INT8 NOT NULL,\n o_comment VARCHAR(79) NOT NULL,\n INDEX o_ck (o_custkey ASC),\n INDEX o_od (o_orderdate ASC),\n CONSTRAINT orders_fkey_customer FOREIGN KEY (o_custkey) REFERENCES public.customer (c_custkey)\n);\n\nALTER TABLE orders INJECT STATISTICS '[\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"o_orderkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 1508717,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 1500000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"o_custkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 99837,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 1500000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"o_orderdate\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 2406,\n\t\t\t\"histo_col_type\": \"date\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 1500000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"o_orderstatus\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 3,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 1500000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"o_totalprice\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 1459167,\n\t\t\t\"histo_col_type\": \"float\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 1500000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"o_orderpriority\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 5,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 1500000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"o_clerk\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 1000,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 1500000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"o_shippriority\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 1,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 1500000\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"o_comment\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 1469402,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 1500000\n\t}\n]';\n\nCREATE TABLE public.lineitem (\n l_orderkey INT8 NOT NULL,\n l_partkey INT8 NOT NULL,\n l_suppkey INT8 NOT NULL,\n l_linenumber INT8 NOT NULL,\n l_quantity FLOAT8 NOT NULL,\n l_extendedprice FLOAT8 NOT NULL,\n l_discount FLOAT8 NOT NULL,\n l_tax FLOAT8 NOT NULL,\n l_returnflag CHAR NOT NULL,\n l_linestatus CHAR NOT NULL,\n l_shipdate DATE NOT NULL,\n l_commitdate DATE NOT NULL,\n l_receiptdate DATE NOT NULL,\n l_shipinstruct CHAR(25) NOT NULL,\n l_shipmode CHAR(10) NOT NULL,\n l_comment VARCHAR(44) NOT NULL,\n PRIMARY KEY (l_orderkey, l_linenumber),\n INDEX l_ok (l_orderkey ASC),\n INDEX l_pk (l_partkey ASC),\n INDEX l_sk (l_suppkey ASC),\n INDEX l_sd (l_shipdate ASC),\n INDEX l_cd (l_commitdate ASC),\n INDEX l_rd (l_receiptdate ASC),\n INDEX l_pk_sk (l_partkey ASC, l_suppkey ASC),\n INDEX l_sk_pk (l_suppkey ASC, l_partkey ASC),\n CONSTRAINT lineitem_fkey_orders FOREIGN KEY (l_orderkey) REFERENCES public.orders (o_orderkey),\n CONSTRAINT lineitem_fkey_part FOREIGN KEY (l_partkey) REFERENCES public.part (p_partkey),\n CONSTRAINT lineitem_fkey_supplier FOREIGN KEY (l_suppkey) REFERENCES public.supplier (s_suppkey),\n CONSTRAINT lineitem_fkey_partsupp FOREIGN KEY (l_partkey, l_suppkey) REFERENCES public.partsupp (ps_partkey, ps_suppkey)\n);\n\nALTER TABLE lineitem INJECT STATISTICS '[\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_orderkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 1508717,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_partkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 199810,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_suppkey\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 10034,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_shipdate\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 2526,\n\t\t\t\"histo_col_type\": \"date\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_commitdate\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 2466,\n\t\t\t\"histo_col_type\": \"date\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_receiptdate\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 2554,\n\t\t\t\"histo_col_type\": \"date\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_linenumber\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 7,\n\t\t\t\"histo_col_type\": \"int\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_quantity\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 50,\n\t\t\t\"histo_col_type\": \"float\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_extendedprice\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 925955,\n\t\t\t\"histo_col_type\": \"float\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_discount\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 11,\n\t\t\t\"histo_col_type\": \"float\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_tax\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 9,\n\t\t\t\"histo_col_type\": \"float\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_returnflag\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 3,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_linestatus\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 2,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_shipinstruct\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 4,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_shipmode\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 7,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t},\n\t{\n\t\t\t\"columns\": [\n\t\t\t\t\t\"l_comment\"\n\t\t\t],\n\t\t\t\"created_at\": \"2018-01-01 1:00:00.00000+00:00\",\n\t\t\t\"distinct_count\": 4643303,\n\t\t\t\"histo_col_type\": \"string\",\n\t\t\t\"name\": \"_\",\n\t\t\t\"null_count\": 0,\n\t\t\t\"row_count\": 6001215\n\t}\n]';\n`); err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn cat\n}", "title": "" }, { "docid": "3dbbf2f07e7f372c584ad5be7a5e17f4", "score": "0.5381014", "text": "func doSetup() (*gocql.ClusterConfig, error) {\n\turl := os.Getenv(\"CQLSTORE_URL\")\n\tkeyspace := os.Getenv(\"CQLSTORE_KEYSPACE\")\n\tif url == \"\" || keyspace == \"\" {\n\t\tmsg := \"Missing required environment vars. Tests requires a running \" +\n\t\t\t\"Cassandra instance with the environment vars CQLSTORE_URL and \" +\n\t\t\t\"CQLSTORE_KEYSPACE defined\"\n\t\treturn nil, errors.New(msg)\n\t}\n\n\tcluster := gocql.NewCluster(url)\n\n\tsess, err := cluster.CreateSession()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcreate := fmt.Sprintf(`\n\t\tCREATE KEYSPACE %q WITH REPLICATION = {\n\t\t\t'class' : 'SimpleStrategy',\n\t\t\t'replication_factor' : 1\n\t\t}`,\n\t\tkeyspace,\n\t)\n\tif err := sess.Query(create, cluster.Keyspace).Exec(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tcluster.Keyspace = keyspace\n\n\treturn cluster, nil\n}", "title": "" }, { "docid": "52a3bd0404d061b816b1546dc8251ac4", "score": "0.52504027", "text": "func init() { //nolint\n\ttestSample := TestCase{\n\t\tName: \"should load descriptions from a custom server [E2E-CLI-052]\",\n\t\tArgs: args{\n\t\t\tArgs: []cmdArgs{\n\t\t\t\t[]string{\"scan\", \"--queries-path\", \"../assets/queries\",\n\t\t\t\t\t\"-p\", \"fixtures/samples/terraform.tf\", \"--no-color\",\n\t\t\t\t\t\"--include-queries\", \"487f4be7-3fd9-4506-a07a-eae252180c08,cfdcabb0-fc06-427c-865b-c59f13e898ce\",\n\t\t\t\t\t\"-o\", \"output\", \"--output-name\", \"output/E2E_CLI_052_RESULTS_ALL_HAVE_CIS.json\"},\n\n\t\t\t\t[]string{\"scan\", \"--queries-path\", \"../assets/queries\",\n\t\t\t\t\t\"-p\", \"fixtures/samples/terraform.tf\", \"--no-color\",\n\t\t\t\t\t\"-o\", \"output\", \"--output-name\", \"output/E2E_CLI_052_RESULTS_SOME_HAVE_CIS.json\"},\n\t\t\t},\n\t\t\tUseMock: []bool{true, true},\n\t\t\tExpectedResult: []ResultsValidation{\n\t\t\t\t{\n\t\t\t\t\tResultsFile: \"E2E_CLI_052_RESULTS_ALL_HAVE_CIS\",\n\t\t\t\t\tResultsFormats: []string{\"json-cis\"},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tResultsFile: \"E2E_CLI_052_RESULTS_SOME_HAVE_CIS\",\n\t\t\t\t\tResultsFormats: []string{\"json\"},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tWantStatus: []int{50, 50},\n\t}\n\n\tTests = append(Tests, testSample)\n}", "title": "" }, { "docid": "85dc16a6f31890635ed1372874e8b03a", "score": "0.51938564", "text": "func (dt *DaoTest) SetUpSuite(c *C) {\n\n\tconfig.LoadOptions(config.Options{\n\t\tIsvcsPath: c.MkDir(),\n\t})\n\n\tdt.Port = 9202\n\tisvcs.Init(isvcs.DEFAULT_ES_STARTUP_TIMEOUT_SECONDS, \"json-file\", map[string]string{\"max-file\": \"5\", \"max-size\": \"10m\"}, nil, true, false)\n\tisvcs.Mgr.SetVolumesDir(c.MkDir())\n\tesServicedClusterName, _ := utils.NewUUID36()\n\tif err := isvcs.Mgr.SetConfigurationOption(\"elasticsearch-serviced\", \"cluster\", esServicedClusterName); err != nil {\n\t\tc.Fatalf(\"Could not set elasticsearch-serviced clustername: %s\", err)\n\t}\n\tesLogstashClusterName, _ := utils.NewUUID36()\n\tif err := isvcs.Mgr.SetConfigurationOption(\"elasticsearch-logstash\", \"cluster\", esLogstashClusterName); err != nil {\n\t\tc.Fatalf(\"Could not set elasticsearch-logstash clustername: %s\", err)\n\t}\n\tif err := isvcs.Mgr.Start(); err != nil {\n\t\tc.Fatalf(\"Could not start es container: %s\", err)\n\t}\n\tdt.MappingsFile = \"controlplane.json\"\n\tdt.FacadeIntegrationTest.SetUpSuite(c)\n\n\tdsn := coordzk.NewDSN([]string{\"127.0.0.1:2181\"},\n\t\ttime.Second*15,\n\t\t1*time.Second,\n\t\t0,\n\t\t1*time.Second,\n\t\t1*time.Second,\n\t).String()\n\tglog.Infof(\"zookeeper dsn: %s\", dsn)\n\tzClient, err := coordclient.New(\"zookeeper\", dsn, \"\", nil)\n\tif err != nil {\n\t\tglog.Fatalf(\"Could not start es container: %s\", err)\n\t}\n\n\tzzk.InitializeLocalClient(zClient)\n\n\tdt.zkConn, err = zzk.GetLocalConnection(\"/\")\n\tif err != nil {\n\t\tc.Fatalf(\"could not get zk connection %v\", err)\n\t}\n\n\ttmpdir := c.MkDir()\n\terr = volume.InitDriver(volume.DriverTypeRsync, tmpdir, []string{})\n\tc.Assert(err, IsNil)\n\n\tdt.Dao, err = NewControlSvc(\"localhost\", int(dt.Port), dt.Facade, \"\", 4979)\n\tif err != nil {\n\t\tglog.Fatalf(\"Could not start es container: %s\", err)\n\t} else {\n\t\tfor i := 0; i < 10; i += 1 {\n\t\t\tid := strconv.Itoa(i)\n\t\t\tdt.Dao.RemoveService(id, &unused)\n\t\t}\n\t\tfor i := 100; i < 110; i += 1 {\n\t\t\tid := strconv.Itoa(i)\n\t\t\tdt.Dao.RemoveService(id, &unused)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1baf09fcee158356f60eb7da8f5f436b", "score": "0.5154169", "text": "func TestInit(t *testing.T) {\n\tvar err error\n\tdb, err = sql.Open(config.MysqlConf.DriverName, config.MysqlConf.Conn)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer db.Close()\n\tdb.SetMaxOpenConns(config.MysqlConf.MaxOpenConns)\n\tdb.SetMaxIdleConns(config.MysqlConf.MaxIdleConns)\n\tdb.SetConnMaxLifetime(time.Duration(config.MysqlConf.ConnMaxLifetime))\n\tfor _, name := range dbNames {\n\t\tlog.Println(\"begin to initialize Schema \" + name)\n\t\texecSql(\"Schema\", name) //init schema\n\t\tlog.Println(\"begin to initialize data \" + name)\n\t\texecSql(\"InitData\", name) //init data\n\t\tlog.Println(\"begin to initialize test Data \" + name)\n\t\texecSql(\"InitData\", name + \"_Test\") //init test data\n\t}\n}", "title": "" }, { "docid": "6075fed58f1457aff076cc780c1e8516", "score": "0.5099514", "text": "func TestMetadataProvider(t *testing.T) {\n\n\tlogging.SetLogLevel(logging.Trace)\n\n\tcfg := common.SystemConfig.SectionConfig(\"indexer\", true /*trim*/)\n\tcfg.Set(\"storage_dir\", common.ConfigValue{\"./data/\", \"metadata file path\", \"./\"})\n\tos.MkdirAll(\"./data/\", os.ModePerm)\n\n\tlogging.Infof(\"Start Index Manager *********************************************************\")\n\n\tvar msgAddr = \"localhost:9884\"\n\tvar httpAddr = \"localhost:9885\"\n\tfactory := new(util.TestDefaultClientFactory)\n\tenv := new(util.TestDefaultClientEnv)\n\tadmin := manager.NewProjectorAdmin(factory, env, nil)\n\taddrPrv := util.NewFakeAddressProvider(msgAddr, httpAddr)\n\tmgr, err := manager.NewIndexManagerInternal(addrPrv, admin, cfg)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer mgr.Close()\n\tgMgr = mgr\n\n\tlogging.Infof(\"Cleanup Test *********************************************************\")\n\n\tcleanupTest(mgr, t)\n\n\tlogging.Infof(\"Setup Initial Data *********************************************************\")\n\n\tsetupInitialData(mgr, t)\n\n\tlogging.Infof(\"Start Provider *********************************************************\")\n\n\tvar providerId = \"TestMetadataProvider\"\n\tprovider, err := client.NewMetadataProvider(providerId)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer provider.Close()\n\tprovider.SetTimeout(int64(time.Second) * 15)\n\tindexerId, err := provider.WatchMetadata(msgAddr)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// the gometa server is running in the same process as MetadataProvider (client). So sleep to\n\t// make sure that the server has a chance to finish off initialization, since the client may\n\t// be ready, but the server is not.\n\ttime.Sleep(time.Duration(1000) * time.Millisecond)\n\n\tlogging.Infof(\"Verify Initial Data *********************************************************\")\n\n\tmeta := lookup(provider, common.IndexDefnId(100))\n\tif meta == nil {\n\t\tt.Fatal(\"Cannot find Index Defn 100 from MetadataProvider\")\n\t}\n\tlogging.Infof(\"found Index Defn 100\")\n\tif len(meta.Instances) == 0 || meta.Instances[0].State != common.INDEX_STATE_READY {\n\t\tt.Fatal(\"Index Defn 100 state is not ready\")\n\t}\n\tif meta.Instances[0].IndexerId != indexerId {\n\t\tt.Fatal(\"Index Defn 100 state is not ready\")\n\t}\n\n\tmeta = lookup(provider, common.IndexDefnId(101))\n\tif meta == nil {\n\t\tt.Fatal(\"Cannot find Index Defn 101 from MetadataProvider\")\n\t}\n\tlogging.Infof(\"found Index Defn 101\")\n\tif len(meta.Instances) == 0 || meta.Instances[0].State != common.INDEX_STATE_READY {\n\t\tt.Fatal(\"Index Defn 101 state is not ready\")\n\t}\n\tif meta.Instances[0].IndexerId != indexerId {\n\t\tt.Fatal(\"Index Defn 100 state is not ready\")\n\t}\n\n\tlogging.Infof(\"Change Data *********************************************************\")\n\n\tnotifier := &notifier{hasCreated: false, hasDeleted: false}\n\tmgr.RegisterNotifier(notifier)\n\n\t// Create Index with deployment plan (deferred)\n\tplan := make(map[string]interface{})\n\tplan[\"nodes\"] = []interface{}{msgAddr}\n\tplan[\"defer_build\"] = true\n\tnewDefnId, err := provider.CreateIndexWithPlan(\"metadata_provider_test_102\", \"Default\", common.ForestDB,\n\t\tcommon.N1QL, \"Testing\", \"TestingWhereExpr\", []string{\"Testing\"}, false, plan)\n\tif err != nil {\n\t\tt.Fatal(\"Cannot create Index Defn 102 through MetadataProvider\" + err.Error())\n\t}\n\tinput := make([]common.IndexDefnId, 1)\n\tinput[0] = newDefnId\n\tif err := provider.BuildIndexes(input); err != nil {\n\t\tt.Fatal(\"Cannot build Index Defn : %v\", err)\n\t}\n\tlogging.Infof(\"done creating index 102\")\n\n\t// Drop a seeded index (created during setup step)\n\tif err := provider.DropIndex(common.IndexDefnId(101)); err != nil {\n\t\tt.Fatal(\"Cannot drop Index Defn 101 through MetadataProvider\")\n\t}\n\tlogging.Infof(\"done dropping index 101\")\n\n\t// Create Index (immediate).\n\tnewDefnId2, err := provider.CreateIndexWithPlan(\"metadata_provider_test_103\", \"Default\", common.ForestDB,\n\t\tcommon.N1QL, \"Testing\", \"TestingWhereExpr\", []string{\"Testing\"}, false, nil)\n\tif err != nil {\n\t\tt.Fatal(\"Cannot create Index Defn 103 through MetadataProvider\")\n\t}\n\tlogging.Infof(\"done creating index 103\")\n\n\t// Update instance (set state to ACTIVE)\n\tif err := mgr.UpdateIndexInstance(\"Default\", newDefnId2, common.INDEX_STATE_ACTIVE, common.StreamId(100), \"\", nil); err != nil {\n\t\tt.Fatal(\"Fail to update index instance\")\n\t}\n\tlogging.Infof(\"done updating index 103\")\n\n\t// Update instance (set error string)\n\tif err := mgr.UpdateIndexInstance(\"Default\", newDefnId2, common.INDEX_STATE_NIL, common.NIL_STREAM, \"testing\", nil); err != nil {\n\t\tt.Fatal(\"Fail to update index instance\")\n\t}\n\tlogging.Infof(\"done updating index 103\")\n\n\t// Create Index (immediate). This index is supposed to fail by OnIndexBuild()\n\tif _, err := provider.CreateIndexWithPlan(\"metadata_provider_test_104\", \"Default\", common.ForestDB,\n\t\tcommon.N1QL, \"Testing\", \"Testing\", []string{\"Testing\"}, false, nil); err == nil {\n\t\tt.Fatal(\"Error does not propage for create Index Defn 104 through MetadataProvider\")\n\t}\n\tlogging.Infof(\"done creating index 104\")\n\n\tlogging.Infof(\"Verify Changed Data *********************************************************\")\n\n\tif lookup(provider, common.IndexDefnId(100)) == nil {\n\t\tt.Fatal(\"Cannot find Index Defn 100 from MetadataProvider\")\n\t}\n\tlogging.Infof(\"found Index Defn 100\")\n\n\tif lookup(provider, common.IndexDefnId(101)) != nil {\n\t\tt.Fatal(\"Found Deleted Index Defn 101 from MetadataProvider\")\n\t}\n\tlogging.Infof(\"cannot found deleted Index Defn 101\")\n\n\tif meta = lookup(provider, newDefnId); meta == nil {\n\t\tt.Fatal(fmt.Sprintf(\"Cannot Found Index Defn %d from MetadataProvider\", newDefnId))\n\t} else {\n\t\tlogging.Infof(\"Found Index Defn %d\", newDefnId)\n\t\tlogging.Infof(\"meta.Instance %v\", meta.Instances)\n\t\tif meta.Instances[0].IndexerId != indexerId {\n\t\t\tt.Fatal(fmt.Sprintf(\"Index Defn %v has incorrect endpoint\", newDefnId))\n\t\t}\n\t\tif meta.Definition.WhereExpr != \"TestingWhereExpr\" {\n\t\t\tt.Fatal(fmt.Sprintf(\"WhereExpr is missing in Index Defn %v\", newDefnId))\n\t\t}\n\t\tif meta.Instances[0].State != common.INDEX_STATE_INITIAL {\n\t\t\tt.Fatal(fmt.Sprintf(\"Index Defn %v has incorrect state\", newDefnId))\n\t\t}\n\t}\n\n\tif meta = lookup(provider, newDefnId2); meta == nil {\n\t\tt.Fatal(fmt.Sprintf(\"Cannot Found Index Defn %d from MetadataProvider\", newDefnId2))\n\t} else {\n\t\tlogging.Infof(\"Found Index Defn %d\", newDefnId2)\n\t\tlogging.Infof(\"meta.Instance %v\", meta.Instances)\n\t\tif meta.Instances[0].IndexerId != indexerId {\n\t\t\tt.Fatal(fmt.Sprintf(\"Index Defn %v has incorrect endpoint\", newDefnId2))\n\t\t}\n\t\tif meta.Definition.WhereExpr != \"TestingWhereExpr\" {\n\t\t\tt.Fatal(fmt.Sprintf(\"WhereExpr is missing in Index Defn %v\", newDefnId2))\n\t\t}\n\t\tif meta.Instances[0].State != common.INDEX_STATE_ACTIVE {\n\t\t\tt.Fatal(fmt.Sprintf(\"Index Defn %v has incorrect state\", newDefnId2))\n\t\t}\n\t\tif meta.Instances[0].Error != \"testing\" {\n\t\t\tt.Fatal(fmt.Sprintf(\"Index Defn %v has incorrect error string\", newDefnId2))\n\t\t}\n\t\tif meta.Instances[0].BuildTime[10] != 33 {\n\t\t\tt.Fatal(fmt.Sprintf(\"Index Defn %v has incorrect buildtime\", newDefnId2))\n\t\t}\n\t}\n\n\tif !notifier.hasCreated {\n\t\tt.Fatal(fmt.Sprintf(\"Does not recieve notification for creating index %s\", newDefnId))\n\t}\n\tlogging.Infof(fmt.Sprintf(\"Recieve notification for creating index %v\", newDefnId))\n\n\tif !notifier.hasDeleted {\n\t\tt.Fatal(\"Does not recieve notification for deleting index 101\")\n\t}\n\tlogging.Infof(\"Recieve notification for deleting index 101\")\n\n\ttime.Sleep(time.Duration(1000) * time.Millisecond)\n\n\tlogging.Infof(\"Verify Cleanup / Timeout *********************************************************\")\n\n\t// Create Index (immediate).\n\n\tnewDefnId105, err := provider.CreateIndexWithPlan(\"metadata_provider_test_105\", \"Default\", common.ForestDB,\n\t\tcommon.N1QL, \"Testing\", \"TestingWhereExpr\", []string{\"Testing\"}, false, nil)\n\tif err == nil {\n\t\tt.Fatal(\"Does not receive timeout error for create Index Defn 105 through MetadataProvider\")\n\t}\n\tlogging.Infof(\"recieve expected timeout error when creating index 105\")\n\tclose(metadata_provider_test_done)\n\n\tlogging.Infof(\"Cleanup Test *********************************************************\")\n\n\tprovider.UnwatchMetadata(indexerId)\n\tcleanupTest(mgr, t)\n\tcleanSingleIndex(mgr, t, newDefnId)\n\tcleanSingleIndex(mgr, t, newDefnId2)\n\tcleanSingleIndex(mgr, t, newDefnId105)\n\ttime.Sleep(time.Duration(1000) * time.Millisecond)\n}", "title": "" }, { "docid": "65a19920eb2bf41ec5fbb9de8d057845", "score": "0.49864736", "text": "func (suite *DBTestSuite) SetupTest() {\n}", "title": "" }, { "docid": "2060ab9d7d110bc4dc779780e787b3bc", "score": "0.49467763", "text": "func prepare(s indexer.Interface, size string, t *testing.T) {\n\ttestFile := fmt.Sprint(testDataDir, size, testDataExt)\n\tfile, err := os.OpenFile(testFile, os.O_RDONLY, 0644)\n\tif err != nil {\n\t\t// If the file does not exist then skip and do not fail test\n\t\tif os.IsNotExist(err) {\n\t\t\tt.Skipf(\"Test file %q not found, needs to be generated)\", testFile)\n\t\t}\n\t\tt.Fatalf(\"could not open input file: %v\", err)\n\t}\n\tdefer file.Close()\n\n\tp, _ := peer.Decode(\"12D3KooWKRyzVWW6ChFjQjK4miCty85Niy48tpPV95XdKu1BcvMA\")\n\n\tout := make(chan multihash.Multihash)\n\terrOut := make(chan error, 1)\n\tgo ReadCids(file, out, errOut)\n\n\tmetadataBytes := []byte(\"dummy-metadata\")\n\tfor mh := range out {\n\t\tvalue := indexer.Value{\n\t\t\tProviderID: p,\n\t\t\tContextID: []byte(mh),\n\t\t\tMetadataBytes: metadataBytes,\n\t\t}\n\t\terr = s.Put(value, mh)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t}\n\terr = <-errOut\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n}", "title": "" }, { "docid": "5c0a0c342b38bcf2c2844eb376cf73e2", "score": "0.4945614", "text": "func (ds dataDistribution) setupTest(\n\tt testing.TB, eng storage.Engine, desc roachpb.RangeDescriptor,\n) enginepb.MVCCStats {\n\tctx := context.Background()\n\tvar maxTs hlc.Timestamp\n\tvar ms enginepb.MVCCStats\n\tfor {\n\t\tkv, txn, ok := ds()\n\t\tif !ok {\n\t\t\tbreak\n\t\t}\n\t\tif txn == nil {\n\t\t\tif kv.Key.Timestamp.IsEmpty() {\n\t\t\t\trequire.NoError(t, eng.PutUnversioned(kv.Key.Key, kv.Value))\n\t\t\t} else {\n\t\t\t\trequire.NoError(t, eng.PutMVCC(kv.Key, kv.Value))\n\t\t\t}\n\t\t} else {\n\t\t\t// TODO(ajwerner): Decide if using MVCCPut is worth it.\n\t\t\tts := kv.Key.Timestamp\n\t\t\tif txn.ReadTimestamp.IsEmpty() {\n\t\t\t\ttxn.ReadTimestamp = ts\n\t\t\t}\n\t\t\tif txn.WriteTimestamp.IsEmpty() {\n\t\t\t\ttxn.WriteTimestamp = ts\n\t\t\t}\n\t\t\terr := storage.MVCCPut(ctx, eng, &ms, kv.Key.Key, ts,\n\t\t\t\troachpb.Value{RawBytes: kv.Value}, txn)\n\t\t\trequire.NoError(t, err)\n\t\t}\n\t\tif !kv.Key.Timestamp.Less(maxTs) {\n\t\t\tmaxTs = kv.Key.Timestamp\n\t\t}\n\t}\n\trequire.NoError(t, eng.Flush())\n\tsnap := eng.NewSnapshot()\n\tdefer snap.Close()\n\tms, err := rditer.ComputeStatsForRange(&desc, snap, maxTs.WallTime)\n\trequire.NoError(t, err)\n\treturn ms\n}", "title": "" }, { "docid": "0d78bdc8cd3872adea2ab0e55253763e", "score": "0.49249545", "text": "func (db *database) initMetadata() error {\n\t// FIXME: close kv store if err??\n\tmetaStore, err := kv.GetStoreManager().CreateStore(tagMetaIndicator(db.name), kv.DefaultStoreOption())\n\tif err != nil {\n\t\treturn err\n\t}\n\ttagMetaFamily, err := metaStore.CreateFamily(\n\t\ttagValueDir,\n\t\tkv.FamilyOption{\n\t\t\tCompactThreshold: 0,\n\t\t\tMerger: string(tagkeymeta.MergerName)})\n\tif err != nil {\n\t\treturn err\n\t}\n\tdb.metaStore = metaStore\n\tmetadata, err := newMetadataFunc(context.TODO(), db.name, metricsMetaPath(db.name), tagMetaFamily)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdb.metadata = metadata\n\treturn nil\n}", "title": "" }, { "docid": "6b20911ee4b0785bb1205d76aa6887cf", "score": "0.48930633", "text": "func (suite *hbaseTestSuite) SetupTest() {\n\n\tlog.SetOutput(ioutil.Discard)\n\n\tconst testConfig = `\n [server]\n bindip = \"\"\n port = 8080\n maxprocs = 4\n cache = false\n lrucache = 700000000\n gzip = true\n [mongodb]\n host = \"127.0.0.1\"\n port = 27017\n db = \"argo_core_test_mongo\"\n [hbase]\n zkquorum=\"localhost\"\n `\n\n\t_ = gcfg.ReadStringInto(&suite.cfg, testConfig)\n\n}", "title": "" }, { "docid": "df635cd88e9c0e72b1752f70ae4eb49c", "score": "0.4886508", "text": "func VerifyInitContinerData(t *testing.T, containers []k8score.Container, options *helm.Options) {\n\n\tif len(containers) == 0 {\n\t\tprintln(\"no init containers\")\n\t}\n\n\tfor i := 0; i < len(containers); i++ {\n\t\tcontainer := containers[i]\n\t\tname := container.Name\n\t\tif name == \"wait-for-pegainstall\" {\n\t\t\trequire.Equal(t, \"dcasavant/k8s-wait-for\", container.Image)\n\t\t\trequire.Equal(t, []string{\"job\", \"pega-db-install\"}, container.Args)\n\t\t} else if name == \"wait-for-pegasearch\" {\n\t\t\trequire.Equal(t, \"busybox:1.31.0\", container.Image)\n\t\t\trequire.Equal(t, []string{\"sh\", \"-c\", \"until $(wget -q -S --spider --timeout=2 -O /dev/null http://pega-search); do echo Waiting for search to become live...; sleep 10; done;\"}, container.Command)\n\t\t} else if name == \"wait-for-cassandra\" {\n\t\t\trequire.Equal(t, \"cassandra:3.11.3\", container.Image)\n\t\t\trequire.Equal(t, []string{\"sh\", \"-c\", \"until cqlsh -u \\\"dnode_ext\\\" -p \\\"dnode_ext\\\" -e \\\"describe cluster\\\" release-name-cassandra 9042 ; do echo Waiting for cassandra to become live...; sleep 10; done;\"}, container.Command)\n\t\t} else if name == \"wait-for-cassandra\" {\n\t\t\trequire.Equal(t, \"cassandra:3.11.3\", container.Image)\n\t\t\trequire.Equal(t, []string{\"sh\", \"-c\", \"until cqlsh -u \\\"dnode_ext\\\" -p \\\"dnode_ext\\\" -e \\\"describe cluster\\\" release-name-cassandra 9042 ; do echo Waiting for cassandra to become live...; sleep 10; done;\"}, container.Command)\n\t\t} else if name == \"wait-for-pegaupgrade\" {\n\t\t\trequire.Equal(t, \"dcasavant/k8s-wait-for\", container.Image)\n\t\t\trequire.Equal(t, []string{\"job\", \"pega-db-upgrade\"}, container.Args)\n\t\t\taksSpecificUpgraderDeployEnvs(t, options, container)\n\t\t} else if name == \"wait-for-pre-dbupgrade\" {\n\t\t\trequire.Equal(t, \"dcasavant/k8s-wait-for\", container.Image)\n\t\t\trequire.Equal(t, []string{\"job\", \"pega-pre-upgrade\"}, container.Args)\n\t\t} else if name == \"wait-for-rolling-updates\" {\n\t\t\trequire.Equal(t, \"dcasavant/k8s-wait-for\", container.Image)\n\t\t\trequire.Equal(t, []string{\"sh\", \"-c\", \" kubectl rollout status deployment/pega-web --namespace default && kubectl rollout status deployment/pega-batch --namespace default && kubectl rollout status statefulset/pega-stream --namespace default\"}, container.Command)\n\t\t} else {\n\t\t\tfmt.Println(\"invalid init containers found.. please check the list\", name)\n\t\t\tt.Fail()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "abb018ef4240c8e0d1dc117bcbb6f833", "score": "0.48779243", "text": "func (s *OshinkoUnitTestSuite) SetUpSuite(c *check.C) {}", "title": "" }, { "docid": "e2173c0d39879519fb113a4cab411a31", "score": "0.48725778", "text": "func TestSuite(t *testing.T) {\n\ttest.StoreSuite(t,\n\t\tfunc(conf config.Storage, extHost *extension.Host) (storage.Store, func(), error) {\n\t\t\ts, _ := New(conf, extHost)\n\t\t\tdestroy := func() {}\n\t\t\treturn s, destroy, nil\n\t\t})\n}", "title": "" }, { "docid": "ae745ddec26f9635f9ba71f208cc3394", "score": "0.48696712", "text": "func (c *testCase) initialize(db *sql.DB) error {\n\tc.db = db\n\tif err := c.generateDDLOps(); err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\tif err := c.generateDMLOps(); err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\tif err := c.executeAddTable(nil); err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\tif err := c.executeAddTable(nil); err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2fd815518b0a969526ac1590accfda85", "score": "0.4857154", "text": "func ChannelCRDMetadataTestHelperWithChannelTestRunner(\n\tt *testing.T,\n\tchannelTestRunner testlib.ComponentsTestRunner,\n\toptions ...testlib.SetupClientOption,\n) {\n\n\tchannelTestRunner.RunTests(t, testlib.FeatureBasic, func(st *testing.T, channel metav1.TypeMeta) {\n\t\tclient := testlib.Setup(st, true, options...)\n\t\tdefer testlib.TearDown(client)\n\n\t\tt.Run(\"Channel is namespaced\", func(t *testing.T) {\n\t\t\tchannelIsNamespaced(st, client, channel)\n\t\t})\n\t\tt.Run(\"Channel CRD has required label\", func(t *testing.T) {\n\t\t\tchannelCRDHasRequiredLabels(client, channel)\n\t\t})\n\t\tt.Run(\"Channel CRD has required label\", func(t *testing.T) {\n\t\t\tchannelCRDHasProperCategory(st, client, channel)\n\t\t})\n\t})\n}", "title": "" }, { "docid": "862a18301b86d540020ba5d333703ab3", "score": "0.48510817", "text": "func (suite *mongoTestSuite) SetupTest() {\n\n\tlog.SetOutput(ioutil.Discard)\n\n\tconst testConfig = `\n [server]\n bindip = \"\"\n port = 8080\n maxprocs = 4\n cache = false\n lrucache = 700000000\n gzip = true\n [mongodb]\n host = \"127.0.0.1\"\n port = 27017\n db = \"argo_core_test_mongo\"\n `\n\n\t_ = gcfg.ReadStringInto(&suite.cfg, testConfig)\n\n\t//\tsuite.result = bson.M{ \"name\" : \"Westeros\", \"db_conf\" : bson.M{ \"server\" : \"localhost\", \"port\" : 27017, \"database\" : \"argo_EGI\" } }\n\n\t// seed mongo\n\tsession, err := mgo.Dial(suite.cfg.MongoDB.Host)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer session.Close()\n\n\t// Seed database with tenants\n\tc := session.DB(suite.cfg.MongoDB.Db).C(\"tenants\")\n\tc.Insert(\n\t\tbson.M{\"name\": \"Westeros\",\n\t\t\t\"db_conf\": bson.M{\n\t\t\t\t\"server\": \"localhost\",\n\t\t\t\t\"port\": 27017,\n\t\t\t\t\"database\": \"argo_GOT\",\n\t\t\t},\n\t\t\t\"users\": []bson.M{\n\t\t\t\tbson.M{\n\t\t\t\t\t\"name\": \"John Snow\",\n\t\t\t\t\t\"email\": \"J.Snow@brothers.wall\",\n\t\t\t\t\t\"api_key\": \"wh1t3_w@lk3rs\",\n\t\t\t\t},\n\t\t\t\tbson.M{\n\t\t\t\t\t\"name\": \"King Joffrey\",\n\t\t\t\t\t\"email\": \"g0dk1ng@kingslanding.gov\",\n\t\t\t\t\t\"api_key\": \"sansa3\",\n\t\t\t\t},\n\t\t\t}})\n\n\tc.Insert(\n\t\tbson.M{\"name\": \"EGI\",\n\t\t\t\"db_conf\": bson.M{\n\t\t\t\t\"server\": \"localhost\",\n\t\t\t\t\"port\": 27017,\n\t\t\t\t\"database\": \"argo_EGI\",\n\t\t\t},\n\t\t\t\"users\": []bson.M{\n\t\t\t\tbson.M{\n\t\t\t\t\t\"name\": \"Joe Complex\",\n\t\t\t\t\t\"email\": \"C.Joe@egi.eu\",\n\t\t\t\t\t\"api_key\": \"mysecretcombination\",\n\t\t\t\t},\n\t\t\t\tbson.M{\n\t\t\t\t\t\"name\": \"Josh Plain\",\n\t\t\t\t\t\"email\": \"P.Josh@egi.eu\",\n\t\t\t\t\t\"api_key\": \"itsamysterytoyou\",\n\t\t\t\t},\n\t\t\t}})\n}", "title": "" }, { "docid": "413d199d015e51333562e1a1b1367360", "score": "0.4847135", "text": "func InitDatabase(c *config.ConfigToml) *Test {\n\ttest := Test{}\n\ttest.cfg = c\n\treturn &test\n}", "title": "" }, { "docid": "a1cfa3f5463ad7d3b97797938645b99e", "score": "0.48412004", "text": "func (s *OshinkoUnitTestSuite) SetUpTest(c *check.C) {}", "title": "" }, { "docid": "6073f9e15a3968a942ed588be07de076", "score": "0.4839893", "text": "func (s *wrapperTestSuite) SetUpTest(c *C) {\n\ts.execute(\"DROP TABLE IF EXISTS test.wrapper_test\")\n\tif _, err := s.execute(`\n\tCREATE TABLE IF NOT EXISTS test.wrapper_test (\n\t\tid \t\tint \t\t\tAUTO_INCREMENT,\n\t\tname \tvarchar(100),\n\t\tbo\t\ttinyint \t\tDEFAULT 0,\n\t\tmi \t\tmediumint \t\tNOT NULL DEFAULT 0,\n\t\tumi \tmediumint \t\tUNSIGNED NOT NULL DEFAULT 0,\n\t\tsi\t\tsmallint \t\tDEFAULT 0,\n\t\tsi_u\tsmallint\t\tUNSIGNED DEFAULT 0,\n\t\tti\t\ttinyint\t\t\tDEFAULT 0,\n\t\tti_u\ttinyint\t\t\tUNSIGNED DEFAULT 0,\n\t\tbi\t\tbigint\t\t\tDEFAULT 0,\n\t\tbi_u\tbigint\t\t\tUNSIGNED DEFAULT 0,\n\t\tde\t\tdecimal(60,5) \tDEFAULT 0,\n\t\tfl\t\tfloat\t\t\tDEFAULT 0,\n\t\tfl_u\tfloat\t\t\tUNSIGNED DEFAULT 0,\n\t\tdo\t\tdouble\t\t\tDEFAULT 0,\n\t\tbit\t\tbit(64)\t\t\tDEFAULT b'0',\n\t\tdtime\tdatetime\t\tDEFAULT '2020-01-01 10:10:10',\n\t\ttstamp\ttimestamp\t\tDEFAULT '2020-01-01 12:12:12',\n\t\tdate\tdate\t\t\tDEFAULT '2019-10-01',\n\t\ttime\ttime\t\t\tDEFAULT '12:59:59',\n\t\tst\t\tset('x','y','z','t')\tDEFAULT 'x,y',\n\t\tenum\tenum('a','b')\tDEFAULT 'a',\t\t\t\n\t\tblb \tblob \t\t\tDEFAULT NULL,\t\n\t\tbnr\t\tbinary(3)\t\tDEFAULT NULL,\n\t\tjson\tjson\t\t\t,\n\t\tarray\tjson\t\t\t,\n\t\tPRIMARY KEY(id)\n\t) ENGINE=innodb;\n\t`); err != nil {\n\t\tlog.Errorln(err)\n\t}\n}", "title": "" }, { "docid": "9fa6ef0ed02f978cd9da2e99bca1ead3", "score": "0.4818914", "text": "func newNodes(\n\tt *testing.T,\n\tnumShards int,\n\tinstances []services.ServiceInstance,\n\tnspaces []namespace.Metadata,\n\tasyncInserts bool,\n) (testSetups, topology.Initializer, closeFn) {\n\tvar (\n\t\tlog = zap.L()\n\t\topts = NewTestOptions(t).\n\t\t\tSetNamespaces(nspaces).\n\t\t\tSetTickMinimumInterval(3 * time.Second).\n\t\t\tSetWriteNewSeriesAsync(asyncInserts).\n\t\t\tSetNumShards(numShards)\n\t\t// NB(bl): We set replication to 3 to mimic production. This can be made\n\t\t// into a variable if needed.\n\t\tsvc = fake.NewM3ClusterService().\n\t\t\tSetInstances(instances).\n\t\t\tSetReplication(services.NewServiceReplication().SetReplicas(3)).\n\t\t\tSetSharding(services.NewServiceSharding().SetNumShards(numShards))\n\n\t\tsvcs = fake.NewM3ClusterServices()\n\t)\n\tsvcs.RegisterService(\"m3db\", svc)\n\n\ttopoOpts := topology.NewDynamicOptions().\n\t\tSetConfigServiceClient(fake.NewM3ClusterClient(svcs, nil))\n\ttopoInit := topology.NewDynamicInitializer(topoOpts)\n\n\tnodeOpt := BootstrappableTestSetupOptions{\n\t\tDisablePeersBootstrapper: true,\n\t\tFinalBootstrapper: uninitialized.UninitializedTopologyBootstrapperName,\n\t\tTopologyInitializer: topoInit,\n\t}\n\n\tnodeOpts := make([]BootstrappableTestSetupOptions, len(instances))\n\tfor i := range instances {\n\t\tnodeOpts[i] = nodeOpt\n\t}\n\n\tnodes, closeFn := NewDefaultBootstrappableTestSetups(t, opts, nodeOpts)\n\n\tnodeClose := func() { // Clean up running servers at end of test\n\t\tlog.Debug(\"servers closing\")\n\t\tnodes.parallel(func(s TestSetup) {\n\t\t\tif s.ServerIsBootstrapped() {\n\t\t\t\trequire.NoError(t, s.StopServer())\n\t\t\t}\n\t\t})\n\t\tcloseFn()\n\t\tlog.Debug(\"servers are now down\")\n\t}\n\n\treturn nodes, topoInit, nodeClose\n}", "title": "" }, { "docid": "4ecd1289db697424122bdc38f8df516d", "score": "0.47876096", "text": "func GenerateTestCassandraConfig() *cassandra.Config {\n\treturn &cassandra.Config{\n\t\tCassandraConn: &cassandra.CassandraConn{\n\t\t\tContactPoints: []string{\"127.0.0.1\"},\n\t\t\tPort: 9043,\n\t\t\tCQLVersion: \"3.4.2\",\n\t\t\tMaxGoRoutines: 1000,\n\t\t},\n\t\tStoreName: \"peloton_test\",\n\t\tMigrations: \"migrations\",\n\t}\n}", "title": "" }, { "docid": "2f49d200a280298c04f8d85f82af0963", "score": "0.4782396", "text": "func InitTest() {\n\t// interpret synthetic input in `--ginkgo.focus` and/or `--ginkgo.skip`\n\tginkgo.BeforeEach(checkSyntheticInput)\n\n\tflag.StringVar(&syntheticSuite, \"suite\", \"\", \"DEPRECATED: Optional suite selector to filter which tests are run. Use focus.\")\n\te2e.ViperizeFlags()\n\n\tTestContext.DeleteNamespace = os.Getenv(\"DELETE_NAMESPACE\") != \"false\"\n\tTestContext.VerifyServiceAccount = true\n\tTestContext.RepoRoot = os.Getenv(\"KUBE_REPO_ROOT\")\n\tTestContext.KubeVolumeDir = os.Getenv(\"VOLUME_DIR\")\n\tif len(TestContext.KubeVolumeDir) == 0 {\n\t\tTestContext.KubeVolumeDir = \"/var/lib/origin/volumes\"\n\t}\n\tTestContext.KubectlPath = \"kubectl\"\n\tTestContext.KubeConfig = KubeConfigPath()\n\tos.Setenv(\"KUBECONFIG\", TestContext.KubeConfig)\n\n\t// load and set the host variable for kubectl\n\tclientConfig := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(&clientcmd.ClientConfigLoadingRules{ExplicitPath: TestContext.KubeConfig}, &clientcmd.ConfigOverrides{})\n\tcfg, err := clientConfig.ClientConfig()\n\tif err != nil {\n\t\tFatalErr(err)\n\t}\n\tTestContext.Host = cfg.Host\n\n\treportFileName = os.Getenv(\"TEST_REPORT_FILE_NAME\")\n\tif reportFileName == \"\" {\n\t\treportFileName = \"junit\"\n\t}\n\n\tquiet = os.Getenv(\"TEST_OUTPUT_QUIET\") == \"true\"\n\n\t// Ensure that Kube tests run privileged (like they do upstream)\n\tTestContext.CreateTestingNS = createTestingNS\n\n\tglog.Infof(\"Extended test version %s\", version.Get().String())\n}", "title": "" }, { "docid": "4ab831cf60e97e2fc3b80dbd286d37cf", "score": "0.4766718", "text": "func NewTestKitWithInit(c *check.C, store kv.Storage) *TestKit {\n\ttk := NewTestKit(c, store)\n\t// Use test and prepare a session.\n\ttk.MustExec(\"use test\")\n\treturn tk\n}", "title": "" }, { "docid": "cea2d342dc2ba0955a93befa34167c01", "score": "0.47628853", "text": "func configureTestCluster(t *testing.T, name string, https bool) *EtcdTestServer {\n\tvar err error\n\tm := &EtcdTestServer{}\n\n\tpln := newLocalListener(t)\n\tm.PeerListeners = []net.Listener{pln}\n\tm.PeerURLs, err = types.NewURLs([]string{\"http://\" + pln.Addr().String()})\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Allow test launches to control where etcd data goes, for space or performance reasons\n\tbaseDir := os.Getenv(\"TEST_ETCD_DIR\")\n\tif len(baseDir) == 0 {\n\t\tbaseDir = os.TempDir()\n\t}\n\n\tif https {\n\t\tm.CertificatesDir, err = ioutil.TempDir(baseDir, \"etcd_certificates\")\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tm.CertFile = path.Join(m.CertificatesDir, \"etcdcert.pem\")\n\t\tif err = ioutil.WriteFile(m.CertFile, []byte(testingcert.CertFileContent), 0644); err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tm.KeyFile = path.Join(m.CertificatesDir, \"etcdkey.pem\")\n\t\tif err = ioutil.WriteFile(m.KeyFile, []byte(testingcert.KeyFileContent), 0644); err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tm.CAFile = path.Join(m.CertificatesDir, \"ca.pem\")\n\t\tif err = ioutil.WriteFile(m.CAFile, []byte(testingcert.CAFileContent), 0644); err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\n\t\tcln := newSecuredLocalListener(t, m.CertFile, m.KeyFile, m.CAFile)\n\t\tm.ClientListeners = []net.Listener{cln}\n\t\tm.ClientURLs, err = types.NewURLs([]string{\"https://\" + cln.Addr().String()})\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t} else {\n\t\tcln := newLocalListener(t)\n\t\tm.ClientListeners = []net.Listener{cln}\n\t\tm.ClientURLs, err = types.NewURLs([]string{\"http://\" + cln.Addr().String()})\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t}\n\n\tm.Name = name\n\tm.DataDir, err = ioutil.TempDir(baseDir, \"etcd\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tclusterStr := fmt.Sprintf(\"%s=http://%s\", name, pln.Addr().String())\n\tm.InitialPeerURLsMap, err = types.NewURLsMap(clusterStr)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tm.InitialClusterToken = \"TestEtcd\"\n\tm.NewCluster = true\n\tm.ForceNewCluster = false\n\tm.ElectionTicks = 10\n\tm.TickMs = uint(10)\n\n\treturn m\n}", "title": "" }, { "docid": "ad5fe2530a7b60e632f8bd5f866412c5", "score": "0.47554097", "text": "func init() {\n\tflag.String(\"cassandra-config\", \"cassandra.conf\",\n\t\t\"Location of the Cassandra Client configuration file; also set via 'CASSANDRA_CONFIG' env variable.\")\n}", "title": "" }, { "docid": "dfd188ff065a581ecd33edc5021c78d2", "score": "0.47541606", "text": "func (a *App) InitalizeTest() error {\n\n\tfmt.Println(\"Intializing testdata dir...\")\n\n\tfootprint := Footprint{}\n\tfootprint.TestFootprint()\n\n\ta.Footprint.Set(&footprint)\n\n\t// Set the secret file\n\ta.Secret.Set(footprint.confDirPath)\n\terr := a.Secret.WriteSecretToFile()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif a.Secret.GetSecret() == \"\" {\n\t\treturn err\n\t}\n\n\t// Set the log file\n\ta.DmnLogFile.Set(footprint.logDirPath)\n\ta.DmnLogFile.Create()\n\n\t// Set the history file\n\ta.History.Set(footprint.confDirPath)\n\ta.History.Remove()\n\terr = a.History.WriteHistoryToFile()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "2fb9de583f148c484e2871ce06658a95", "score": "0.4749865", "text": "func (s *ONOSTopoSuite) SetupTestSuite(c *input.Context) error {\n\ts.c = c\n\treturn nil\n}", "title": "" }, { "docid": "3657404fd12fed36e851a0cd3836eb0d", "score": "0.4741199", "text": "func fnInit(in io.Reader, out io.Writer, eout io.Writer, args []string, flagSet *flag.FlagSet) int {\n\tvar (\n\t\tc *dataset.Collection\n\t\terr error\n\t)\n\n\terr = flagSet.Parse(args)\n\tif err != nil {\n\t\tfmt.Fprintf(eout, \"%s\\n\", err)\n\t\treturn 1\n\t}\n\targs = flagSet.Args()\n\n\tif len(args) == 0 {\n\t\tfmt.Fprintf(eout, \"Missing collection name\\n\")\n\t\treturn 1\n\t}\n\tfor _, cName := range args {\n\t\tc, err = dataset.InitCollection(cName)\n\t\tif err != nil {\n\t\t\tfmt.Fprintf(eout, \"%s\\n\", err)\n\t\t\treturn 1\n\t\t}\n\t\tc.Close()\n\t}\n\tif quiet == false {\n\t\tfmt.Fprintf(out, \"OK\")\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "4adcb85f0c2a2e5cebc101350c48a797", "score": "0.47408098", "text": "func setupTests(suite *AppTestSuite) {\n\tfor _, test := range tests {\n\t\ttest.Setup(suite, suite.T())\n\t}\n}", "title": "" }, { "docid": "b15a7d11e0bfcdf372a91d4646ef9ea8", "score": "0.47338915", "text": "func (suite *CassandraTestSuite) TestCassandra() {\n\twaitForCassandra()\n\n\tjaegerInstanceName := \"with-cassandra\"\n\tcleanupOptions := &framework.CleanupOptions{TestContext: ctx, Timeout: timeout, RetryInterval: retryInterval}\n\tj := getJaegerWithCassandra(jaegerInstanceName, namespace)\n\n\tlog.Infof(\"passing %v\", j)\n\terr := fw.Client.Create(goctx.TODO(), j, cleanupOptions)\n\trequire.NoError(t, err, \"Error deploying jaeger\")\n\tdefer undeployJaegerInstance(j)\n\n\terr = WaitForJob(t, fw.KubeClient, namespace, jaegerInstanceName+\"-cassandra-schema-job\", retryInterval, timeout)\n\trequire.NoError(t, err, \"Error waiting for startup\")\n\n\terr = e2eutil.WaitForDeployment(t, fw.KubeClient, namespace, jaegerInstanceName, 1, retryInterval, timeout)\n\trequire.NoError(t, err, \"Error waiting for deployment\")\n\n\tAllInOneSmokeTest(\"with-cassandra\")\n}", "title": "" }, { "docid": "fce379b4e9b11f8a063d032932f70ff9", "score": "0.47335503", "text": "func (suite *RecomputationsProfileTestSuite) SetupSuite() {\n\n\tconst testConfig = `\n\t [server]\n\t bindip = \"\"\n\t port = 8080\n\t maxprocs = 4\n\t cache = false\n\t lrucache = 700000000\n\t gzip = true\n\t\treqsizelimit = 1073741824\n\n\t [mongodb]\n\t host = \"127.0.0.1\"\n\t port = 27017\n\t db = \"AR_test_recomputations2\"\n\t `\n\n\t_ = gcfg.ReadStringInto(&suite.cfg, testConfig)\n\n\tsuite.respRecomputationsCreated = \" <root>\\n\" +\n\t\t\" <Message>A recalculation request has been filed</Message>\\n </root>\"\n\n\tsuite.respUnauthorized = \"Unauthorized\"\n\tsuite.tenantDbConf = config.MongoConfig{\n\t\tHost: \"localhost\",\n\t\tPort: 27017,\n\t\tDb: \"AR_test_recomputations2_tenant\",\n\t\tPassword: \"h4shp4ss\",\n\t\tUsername: \"dbuser\",\n\t\tStore: \"ar\",\n\t}\n\tsuite.clientkey = \"mysecretcombination\"\n\n\tsuite.confHandler = respond.ConfHandler{suite.cfg}\n\tsuite.router = mux.NewRouter().StrictSlash(false).PathPrefix(\"/api/v2\").Subrouter()\n\tHandleSubrouter(suite.router, &suite.confHandler)\n\n}", "title": "" }, { "docid": "3e0bff4d23f2a57b4f1aa9aa42aee967", "score": "0.4726044", "text": "func setupSubTest(t *testing.T, c *cat.CAT) func(t *testing.T, c *cat.CAT) {\n //Place code for common setup for subtest here\n return func(t *testing.T, c *cat.CAT) {\n //code for common teardown for the subtests\n if err := c.Teardown(); err != nil {\n t.Fatalf(\"CAT cects cleanup failed: %v\", err)\n }\n }\n}", "title": "" }, { "docid": "8ba6a2f040b05f75c402e2597b54d03d", "score": "0.4692469", "text": "func (a *TestSuite) SetupTest() {\n\tif a.DBCon == nil {\n\t\tpanic(\"db nil\")\n\t}\n\n\t//commit last transaction so we can look at data\n\tif a.Tx != nil {\n\t\tif err := a.Tx.Commit(a.Context); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\n\ta.Tx = NewDGraphTxn(a.DBCon)\n\n\tbody := strings.NewReader(`{\"drop_all\": true}`)\n\treq, err := http.NewRequest(\"POST\", \"http://\"+g.IniGet(\"db.admin.host\").(string)+\":\"+g.IniGet(\"db.admin.port\").(string)+\"/alter\", body)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\t// handle err\n\t\tpanic(err)\n\t}\n\tdefer resp.Body.Close()\n\n\tif err := dgraph.DBSchemaLoad(a.DBClient, a.Tx, a.Context); err != nil {\n\t\tpanic(err)\n\t}\n\n\tif err := a.Tx.Commit(a.Context); err != nil {\n\t\tpanic(err)\n\t}\n\n\ta.Tx = NewDGraphTxn(a.DBCon)\n}", "title": "" }, { "docid": "04421b1b3f3874dcd090828a90678823", "score": "0.46827728", "text": "func (s *configTestSuite) SetUpTest(c *C) {\n\ts.testNum++\n}", "title": "" }, { "docid": "54bd42d0f3877161545bc1f2480e6962", "score": "0.46817294", "text": "func (s *Suite) SetupSuite() {\n\tif s.TestPrefix == \"\" {\n\t\ts.TestPrefix = \"lochness-test\"\n\t}\n\n\ts.KVDir, _ = ioutil.TempDir(\"\", s.TestPrefix+\"-\"+uuid.New())\n\n\tif s.KVPort == 0 {\n\t\ts.KVPort = uint16(1024 + rand.Intn(65535-1024))\n\t}\n\n\tif s.KVCmdMaker == nil {\n\t\ts.KVCmdMaker = ConsulMaker\n\t}\n\ts.KVCmd = s.KVCmdMaker(s.KVPort, s.KVDir, s.TestPrefix)\n\n\tif testing.Verbose() {\n\t\ts.KVCmd.Stdout = os.Stdout\n\t\ts.KVCmd.Stderr = os.Stderr\n\t}\n\ts.Require().NoError(s.KVCmd.Start())\n\ttime.Sleep(2500 * time.Millisecond) // Wait for test kv to be ready\n\n\tvar err error\n\tfor i := 0; i < 10; i++ {\n\t\ts.KV, err = kv.New(\"http://127.0.0.1:\" + strconv.Itoa(int(s.KVPort)))\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t\terr = s.KV.Ping()\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t\ttime.Sleep(500 * time.Millisecond) // Wait for test kv to be ready\n\t}\n\tif s.KV == nil {\n\t\tpanic(err)\n\t}\n\n\ts.KVPrefix = \"lochness\"\n\ts.KVURL = \"http://127.0.0.1:\" + strconv.Itoa(int(s.KVPort))\n}", "title": "" }, { "docid": "37a1d4a4d15fde09dcc664c693fd67c5", "score": "0.466783", "text": "func (suite *TendermintTestSuite) TestExportMetadata() {\n\t// test intializing client and exporting metadata\n\tpath := ibctesting.NewPath(suite.chainA, suite.chainB)\n\tsuite.coordinator.SetupClients(path)\n\tclientStore := suite.chainA.App.GetIBCKeeper().ClientKeeper.ClientStore(suite.chainA.GetContext(), path.EndpointA.ClientID)\n\tclientState := path.EndpointA.GetClientState()\n\theight := clientState.GetLatestHeight()\n\n\tinitIteration := types.GetIterationKey(clientStore, height)\n\tsuite.Require().NotEqual(0, len(initIteration))\n\tinitProcessedTime, found := types.GetProcessedTime(clientStore, height)\n\tsuite.Require().True(found)\n\tinitProcessedHeight, found := types.GetProcessedHeight(clientStore, height)\n\tsuite.Require().True(found)\n\n\tgm := clientState.ExportMetadata(suite.chainA.App.GetIBCKeeper().ClientKeeper.ClientStore(suite.chainA.GetContext(), path.EndpointA.ClientID))\n\tsuite.Require().NotNil(gm, \"client with metadata returned nil exported metadata\")\n\tsuite.Require().Len(gm, 3, \"exported metadata has unexpected length\")\n\n\tsuite.Require().Equal(types.ProcessedHeightKey(height), gm[0].GetKey(), \"metadata has unexpected key\")\n\tactualProcessedHeight, err := clienttypes.ParseHeight(string(gm[0].GetValue()))\n\tsuite.Require().NoError(err)\n\tsuite.Require().Equal(initProcessedHeight, actualProcessedHeight, \"metadata has unexpected value\")\n\n\tsuite.Require().Equal(types.ProcessedTimeKey(height), gm[1].GetKey(), \"metadata has unexpected key\")\n\tsuite.Require().Equal(initProcessedTime, sdk.BigEndianToUint64(gm[1].GetValue()), \"metadata has unexpected value\")\n\n\tsuite.Require().Equal(types.IterationKey(height), gm[2].GetKey(), \"metadata has unexpected key\")\n\tsuite.Require().Equal(initIteration, gm[2].GetValue(), \"metadata has unexpected value\")\n\n\t// test updating client and exporting metadata\n\terr = path.EndpointA.UpdateClient()\n\tsuite.Require().NoError(err)\n\n\tclientState = path.EndpointA.GetClientState()\n\tupdateHeight := clientState.GetLatestHeight()\n\n\titeration := types.GetIterationKey(clientStore, updateHeight)\n\tsuite.Require().NotEqual(0, len(initIteration))\n\tprocessedTime, found := types.GetProcessedTime(clientStore, updateHeight)\n\tsuite.Require().True(found)\n\tprocessedHeight, found := types.GetProcessedHeight(clientStore, updateHeight)\n\tsuite.Require().True(found)\n\n\tgm = clientState.ExportMetadata(suite.chainA.App.GetIBCKeeper().ClientKeeper.ClientStore(suite.chainA.GetContext(), path.EndpointA.ClientID))\n\tsuite.Require().NotNil(gm, \"client with metadata returned nil exported metadata\")\n\tsuite.Require().Len(gm, 6, \"exported metadata has unexpected length\")\n\n\t// expected ordering:\n\t// initProcessedHeight, initProcessedTime, processedHeight, processedTime, initIteration, iteration\n\n\t// check init processed height and time\n\tsuite.Require().Equal(types.ProcessedHeightKey(height), gm[0].GetKey(), \"metadata has unexpected key\")\n\tactualProcessedHeight, err = clienttypes.ParseHeight(string(gm[0].GetValue()))\n\tsuite.Require().NoError(err)\n\tsuite.Require().Equal(initProcessedHeight, actualProcessedHeight, \"metadata has unexpected value\")\n\n\tsuite.Require().Equal(types.ProcessedTimeKey(height), gm[1].GetKey(), \"metadata has unexpected key\")\n\tsuite.Require().Equal(initProcessedTime, sdk.BigEndianToUint64(gm[1].GetValue()), \"metadata has unexpected value\")\n\n\t// check processed height and time after update\n\tsuite.Require().Equal(types.ProcessedHeightKey(updateHeight), gm[2].GetKey(), \"metadata has unexpected key\")\n\tactualProcessedHeight, err = clienttypes.ParseHeight(string(gm[2].GetValue()))\n\tsuite.Require().NoError(err)\n\tsuite.Require().Equal(processedHeight, actualProcessedHeight, \"metadata has unexpected value\")\n\n\tsuite.Require().Equal(types.ProcessedTimeKey(updateHeight), gm[3].GetKey(), \"metadata has unexpected key\")\n\tsuite.Require().Equal(processedTime, sdk.BigEndianToUint64(gm[3].GetValue()), \"metadata has unexpected value\")\n\n\t// check iteration keys\n\tsuite.Require().Equal(types.IterationKey(height), gm[4].GetKey(), \"metadata has unexpected key\")\n\tsuite.Require().Equal(initIteration, gm[4].GetValue(), \"metadata has unexpected value\")\n\n\tsuite.Require().Equal(types.IterationKey(updateHeight), gm[5].GetKey(), \"metadata has unexpected key\")\n\tsuite.Require().Equal(iteration, gm[5].GetValue(), \"metadata has unexpected value\")\n}", "title": "" }, { "docid": "d467faf486b86d51fcb83de87c0b3b3b", "score": "0.46634406", "text": "func populateMetadata(testInfo *TestInfo, testTime *TestTime, labels map[string]string) error {\n\ttest := labels[\"test\"]\n\n\t// Populate testInfo with the test description.\n\ttestInfo.Info[test] = labels[\"desc\"]\n\n\t// Populate testTime with the test end timestamp.\n\tt, err := strconv.ParseInt(labels[\"timestamp\"], 10, 64)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to convert timestamp %q to an int64: %v\", labels[\"timestamp\"], err)\n\t}\n\ttimestamp := time.Unix(t, 0).UTC().Format(testLogTimeFormat)\n\ttestTime.Add(test, labels[\"node\"], timestamp)\n\n\treturn nil\n}", "title": "" }, { "docid": "54f15344c6b2fae35b2abf6c2803f7ab", "score": "0.46555868", "text": "func TestBootstrapCluster(t *testing.T) {\n\tdefer leaktest.AfterTest(t)()\n\tstopper := stop.NewStopper()\n\tdefer stopper.Stop()\n\te := engine.NewInMem(roachpb.Attributes{}, 1<<20, stopper)\n\tif _, err := bootstrapCluster([]engine.Engine{e}, kv.NewTxnMetrics(metric.NewRegistry())); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Scan the complete contents of the local database directly from the engine.\n\trows, _, err := engine.MVCCScan(context.Background(), e, keys.LocalMax, roachpb.KeyMax, math.MaxInt64, hlc.MaxTimestamp, true, nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tvar foundKeys keySlice\n\tfor _, kv := range rows {\n\t\tfoundKeys = append(foundKeys, kv.Key)\n\t}\n\tvar expectedKeys = keySlice{\n\t\ttestutils.MakeKey(roachpb.Key(\"\\x02\"), roachpb.KeyMax),\n\t\ttestutils.MakeKey(roachpb.Key(\"\\x03\"), roachpb.KeyMax),\n\t\troachpb.Key(\"\\x04node-idgen\"),\n\t\troachpb.Key(\"\\x04store-idgen\"),\n\t}\n\t// Add the initial keys for sql.\n\tfor _, kv := range GetBootstrapSchema().GetInitialValues() {\n\t\texpectedKeys = append(expectedKeys, kv.Key)\n\t}\n\t// Resort the list. The sql values are not sorted.\n\tsort.Sort(expectedKeys)\n\n\tif !reflect.DeepEqual(foundKeys, expectedKeys) {\n\t\tt.Errorf(\"expected keys mismatch:\\n%s\\n -- vs. -- \\n\\n%s\",\n\t\t\tformatKeys(foundKeys), formatKeys(expectedKeys))\n\t}\n\n\t// TODO(spencer): check values.\n}", "title": "" }, { "docid": "19eda3b8b5910dd3d76ddfda8e9ae062", "score": "0.465518", "text": "func (s *TestCluster) SetupTestDatabase(options *persistencetests.TestBaseOptions) {\n\ts.dbName = options.DBName\n\tif s.dbName == \"\" {\n\t\ts.dbName = persistencetests.GenerateRandomDBName(10)\n\t}\n\n\ts.CreateDatabase(options.DropDatabase)\n\ts.CreateSession(options)\n\tcadencePackageDir, err := getCadencePackageDir()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tschemaDir := cadencePackageDir + options.SchemaDir + \"/\"\n\ts.LoadSchema([]string{\"schema.sql\"}, schemaDir)\n\t// TODO: Visibility\n\t//s.LoadVisibilitySchema([]string{\"schema.sql\"}, schemaDir)\n}", "title": "" }, { "docid": "9f0f42997a6c082a6a353a439a84dd3c", "score": "0.46527237", "text": "func (suite *TestSuite) SetupSuite() {\n\toriginalDatabaseName = os.Getenv(\"GOAN_DBNAME\")\n\t_ = os.Setenv(\"GOAN_DBNAME\", \"testing-data\")\n\n\tcon, err := LoadConfig()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tsuite.Config = con\n}", "title": "" }, { "docid": "1a569adfab53b59d2a2883ae29664db9", "score": "0.46447498", "text": "func TestSuite(t *testing.T, builder Builder) {\n\ttests := []struct {\n\t\tname string\n\t\ttest func(*testing.T, Builder)\n\t}{\n\t\t{\"Index/Set\", TestIndexSet},\n\t\t{\"Index/Delete\", TestIndexDelete},\n\t\t{\"Index/Cursor\", TestIndexCursor},\n\t}\n\n\tfor _, test := range tests {\n\t\tt.Run(test.name, func(t *testing.T) {\n\t\t\ttest.test(t, builder)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "c8f956ffb25b92dc49ca6b126e236336", "score": "0.4639312", "text": "func createTestDataset() *Dataset {\n\treturn &Dataset{\n\t\tID: \"123\",\n\t\tCollectionID: collectionID,\n\t\tContacts: []ContactDetails{\n\t\t\tcontacts,\n\t\t},\n\t\tDescription: \"census\",\n\t\tKeywords: []string{\"test\", \"test2\"},\n\t\tLicense: \"Office of National Statistics license\",\n\t\tLinks: &DatasetLinks{\n\t\t\tAccessRights: &LinkObject{\n\t\t\t\tHRef: \"http://ons.gov.uk/accessrights\",\n\t\t\t},\n\t\t},\n\t\tMethodologies: []GeneralDetails{\n\t\t\tmethodology,\n\t\t},\n\t\tNationalStatistic: &nationalStatistic,\n\t\tNextRelease: \"2016-05-05\",\n\t\tPublications: []GeneralDetails{\n\t\t\tpublications,\n\t\t},\n\t\tPublisher: &publisher,\n\t\tQMI: &qmi,\n\t\tRelatedDatasets: []GeneralDetails{\n\t\t\trelatedDatasets,\n\t\t},\n\t\tReleaseFrequency: \"yearly\",\n\t\tState: AssociatedState,\n\t\tTheme: \"population\",\n\t\tTitle: \"CensusEthnicity\",\n\t\tUnitOfMeasure: \"Pounds Sterling\",\n\t\tURI: \"http://localhost:22000/datasets/123/breadcrumbs\",\n\t\tType: \"filterable\",\n\t\tNomisReferenceURL: \"\",\n\t\tCanonicalTopic: canonicalTopic,\n\t\tSubtopics: []string{subtopic},\n\t\tSurvey: survey,\n\t\tRelatedContent: relatedContent,\n\t}\n}", "title": "" }, { "docid": "111e2e09cba706b1a291900463e19701", "score": "0.46382603", "text": "func (c *cassandraRequester) Setup() error {\n\tcluster := gocql.NewCluster(c.urls...)\n\tcluster.Keyspace = c.keyspace\n\tcluster.Consistency = c.consistency\n\tsession, err := cluster.CreateSession()\n\tif err != nil {\n\t\treturn err\n\t}\n\tc.session = session\n\treturn nil\n}", "title": "" }, { "docid": "162197953ff9ff6085217241e1ad908b", "score": "0.4635349", "text": "func (suite *CassandraConnSuite) TestCreateGetAllOptionalStringType() {\n\t// Definition stores schema information about an Object\n\tobj := &base.Definition{\n\t\tName: testTableName3,\n\t\tKey: &base.PrimaryKey{\n\t\t\tPartitionKeys: []string{\"name\"},\n\t\t},\n\t\t// Column name to data type mapping of the object\n\t\tColumnToType: map[string]reflect.Type{\n\t\t\t\"name\": reflect.TypeOf(&base.OptionalString{}),\n\t\t\t\"data\": reflect.TypeOf(\"data\"),\n\t\t},\n\t}\n\trow0 := []base.Column{\n\t\t{\n\t\t\tName: \"name\",\n\t\t\tValue: \"name0\", // already converted into string type at the stage of value as a Column.Value\n\t\t},\n\t\t{\n\t\t\tName: \"data\",\n\t\t\tValue: \"testdata0\",\n\t\t},\n\t}\n\trow1 := []base.Column{\n\t\t{\n\t\t\tName: \"name\",\n\t\t\tValue: \"name1\", // already converted into string type at the stage of value as a Column.Value\n\t\t},\n\t\t{\n\t\t\tName: \"data\",\n\t\t\tValue: \"testdata1\",\n\t\t},\n\t}\n\terr := connector.Create(context.Background(), obj, row0)\n\tsuite.NoError(err)\n\terr = connector.Create(context.Background(), obj, row1)\n\tsuite.NoError(err)\n\n\t// Calling GetAll() with no key row specified to return all rows\n\trows, err := connector.GetAll(context.Background(), obj, []base.Column{})\n\tsuite.NoError(err)\n\tsuite.Len(rows, 2)\n\n\tfor _, row := range rows {\n\t\tfor _, col := range row {\n\t\t\tval := col.Value.(*string)\n\t\t\tif col.Name == \"name\" {\n\t\t\t\tsuite.True(*val == \"name0\" || *val == \"name1\")\n\t\t\t} else { // col.Name == \"data\"\n\t\t\t\tsuite.Equal(\"data\", col.Name)\n\t\t\t\tsuite.True(*val == \"testdata0\" || *val == \"testdata1\")\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1e7d5f1200545c800c954fe315bb56b0", "score": "0.46338594", "text": "func (s *wrapperNULLTestSuite) SetUpTest(c *C) {\n\ts.execute(\"DROP TABLE IF EXISTS test.wrapper_test_nillable\")\n\tif _, err := s.execute(`\n\tCREATE TABLE IF NOT EXISTS test.wrapper_test_nillable (\n\t\tid \t\tint \t\t\tAUTO_INCREMENT,\n\t\tname \tvarchar(100),\n\t\tbo\t\ttinyint,\n\t\tmi \t\tmediumint,\n\t\tumi \tmediumint UNSIGNED,\n\t\tsi\t\tsmallint,\n\t\tsi_u\tsmallint UNSIGNED,\n\t\tti\t\ttinyint,\n\t\tti_u\ttinyint UNSIGNED,\n\t\tbi\t\tbigint,\n\t\tbi_u\tbigint UNSIGNED,\n\t\tde\t\tdecimal(60,5),\n\t\tfl\t\tfloat,\n\t\tdo\t\tdouble,\n\t\tbit\t\tbit(64),\n\t\tdtime\tdatetime,\n\t\ttstamp\ttimestamp,\n\t\tdate\tdate,\n\t\ttime\ttime,\n\t\tst\t\tset('x','y','z','t'),\n\t\tenum\tenum('a','b'),\t\t\t\n\t\tblb \tblob,\t\n\t\tPRIMARY KEY(id)\n\t) ENGINE=innodb;\n\t`); err != nil {\n\t\tlog.Errorln(err)\n\t}\n}", "title": "" }, { "docid": "368147d11ac4aa47d5c7af83b6c54c1e", "score": "0.4620839", "text": "func NewTestSetup(\n\tt *testing.T,\n\topts TestOptions,\n\tfsOpts fs.Options,\n\tstorageOptFns ...StorageOption,\n) (TestSetup, error) {\n\tif opts == nil {\n\t\topts = NewTestOptions(t)\n\t}\n\n\tnsInit := opts.NamespaceInitializer()\n\tif nsInit == nil {\n\t\tnsInit = namespace.NewStaticInitializer(opts.Namespaces())\n\t}\n\n\tzapConfig := zap.NewDevelopmentConfig()\n\tzapConfig.DisableCaller = true\n\tzapConfig.Level = zap.NewAtomicLevelAt(zapcore.InfoLevel)\n\tif level := os.Getenv(\"LOG_LEVEL\"); level != \"\" {\n\t\tvar parsedLevel zap.AtomicLevel\n\t\tif err := parsedLevel.UnmarshalText([]byte(level)); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to parse log level: %v\", err)\n\t\t}\n\t\tzapConfig.Level = parsedLevel\n\t}\n\tlogger, err := zapConfig.Build()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Schema registry is shared between database and admin client.\n\tschemaReg := namespace.NewSchemaRegistry(opts.ProtoEncoding(), nil)\n\n\tblockLeaseManager := block.NewLeaseManager(nil)\n\tstorageOpts := storage.NewOptions().\n\t\tSetNamespaceInitializer(nsInit).\n\t\tSetSchemaRegistry(schemaReg).\n\t\tSetBlockLeaseManager(blockLeaseManager)\n\n\tif opts.ProtoEncoding() {\n\t\tblockOpts := storageOpts.DatabaseBlockOptions().\n\t\t\tSetEncoderPool(prototest.ProtoPools.EncoderPool).\n\t\t\tSetReaderIteratorPool(prototest.ProtoPools.ReaderIterPool).\n\t\t\tSetMultiReaderIteratorPool(prototest.ProtoPools.MultiReaderIterPool)\n\t\tstorageOpts = storageOpts.\n\t\t\tSetDatabaseBlockOptions(blockOpts).\n\t\t\tSetEncoderPool(prototest.ProtoPools.EncoderPool).\n\t\t\tSetReaderIteratorPool(prototest.ProtoPools.ReaderIterPool).\n\t\t\tSetMultiReaderIteratorPool(prototest.ProtoPools.MultiReaderIterPool)\n\t}\n\n\tif strings.ToLower(os.Getenv(\"TEST_DEBUG_LOG\")) == \"true\" {\n\t\tzapConfig.Level = zap.NewAtomicLevelAt(zapcore.DebugLevel)\n\t\tlogger, err = zapConfig.Build()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tstorageOpts = storageOpts.SetInstrumentOptions(\n\t\t\tstorageOpts.InstrumentOptions().SetLogger(logger))\n\t}\n\n\tscope := tally.NewTestScope(\"\", nil)\n\tstorageOpts = storageOpts.SetInstrumentOptions(\n\t\tstorageOpts.InstrumentOptions().SetMetricsScope(scope))\n\n\t// Use specified series cache policy from environment if set.\n\tseriesCachePolicy := strings.ToLower(os.Getenv(\"TEST_SERIES_CACHE_POLICY\"))\n\tif seriesCachePolicy != \"\" {\n\t\tvalue, err := series.ParseCachePolicy(seriesCachePolicy)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tstorageOpts = storageOpts.SetSeriesCachePolicy(value)\n\t}\n\n\tfields := []zapcore.Field{\n\t\tzap.Stringer(\"cache-policy\", storageOpts.SeriesCachePolicy()),\n\t}\n\tlogger = logger.With(fields...)\n\tinstrumentOpts := storageOpts.InstrumentOptions().SetLogger(logger)\n\tstorageOpts = storageOpts.SetInstrumentOptions(instrumentOpts)\n\n\tindexMode := index.InsertSync\n\tif opts.WriteNewSeriesAsync() {\n\t\tindexMode = index.InsertAsync\n\t}\n\n\tplCache, err := index.NewPostingsListCache(10, index.PostingsListCacheOptions{\n\t\tInstrumentOptions: instrumentOpts,\n\t})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to create postings list cache: %v\", err)\n\t}\n\t// Ok to run immediately since it just closes the background reporting loop. Only ok because\n\t// this is a test setup, in production we would want the metrics.\n\tplCache.Start()()\n\n\tindexOpts := storageOpts.IndexOptions().\n\t\tSetInsertMode(indexMode).\n\t\tSetPostingsListCache(plCache)\n\tstorageOpts = storageOpts.SetIndexOptions(indexOpts)\n\n\truntimeOptsMgr := storageOpts.RuntimeOptionsManager()\n\truntimeOpts := runtimeOptsMgr.Get().\n\t\tSetTickMinimumInterval(opts.TickMinimumInterval()).\n\t\tSetTickCancellationCheckInterval(opts.TickCancellationCheckInterval()).\n\t\tSetMaxWiredBlocks(opts.MaxWiredBlocks()).\n\t\tSetWriteNewSeriesAsync(opts.WriteNewSeriesAsync())\n\tif err := runtimeOptsMgr.Update(runtimeOpts); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Set up shard set.\n\tshardSet, err := newTestShardSet(opts.NumShards(), opts.ShardSetOptions())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tid := *id\n\tif id == \"\" {\n\t\tid = opts.ID()\n\t}\n\n\ttchannelNodeAddr := *tchannelNodeAddr\n\tif addr := opts.TChannelNodeAddr(); addr != \"\" {\n\t\ttchannelNodeAddr = addr\n\t}\n\n\ttopoInit := opts.ClusterDatabaseTopologyInitializer()\n\tif topoInit == nil {\n\t\ttopoInit, err = newTopologyInitializerForShardSet(id, tchannelNodeAddr, shardSet)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tadminClient, verificationAdminClient, err := newClients(topoInit, opts,\n\t\tschemaReg, id, tchannelNodeAddr, instrumentOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Set up tchannel client\n\ttchanClient, err := NewTChannelClient(\"integration-test\", tchannelNodeAddr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Set up worker pool\n\tworkerPool := xsync.NewWorkerPool(opts.WorkerPoolSize())\n\tworkerPool.Init()\n\n\t// BlockSizes are specified per namespace, make best effort at finding\n\t// a value to align `now` for all of them.\n\ttruncateSize, guess := guessBestTruncateBlockSize(opts.Namespaces())\n\tif guess {\n\t\tlogger.Warn(\"unable to find a single blockSize from known retention periods\",\n\t\t\tzap.String(\"guessing\", truncateSize.String()))\n\t}\n\n\t// Set up getter and setter for now\n\tvar lock sync.RWMutex\n\tnow := xtime.Now().Truncate(truncateSize)\n\tgetNowFn := func() xtime.UnixNano {\n\t\tlock.RLock()\n\t\tt := now\n\t\tlock.RUnlock()\n\t\treturn t\n\t}\n\tclockNowFn := func() time.Time {\n\t\treturn getNowFn().ToTime()\n\t}\n\tsetNowFn := func(t xtime.UnixNano) {\n\t\tlock.Lock()\n\t\tnow = t\n\t\tlock.Unlock()\n\t}\n\tif overrideTimeNow := opts.NowFn(); overrideTimeNow != nil {\n\t\t// Allow overriding the frozen time\n\t\tstorageOpts = storageOpts.SetClockOptions(\n\t\t\tstorageOpts.ClockOptions().SetNowFn(overrideTimeNow))\n\t} else {\n\t\tstorageOpts = storageOpts.SetClockOptions(\n\t\t\tstorageOpts.ClockOptions().SetNowFn(clockNowFn))\n\t}\n\n\t// Set up file path prefix\n\tfilePathPrefix := opts.FilePathPrefix()\n\tif filePathPrefix == \"\" {\n\t\tvar err error\n\t\tfilePathPrefix, err = ioutil.TempDir(\"\", \"integration-test\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif fsOpts == nil {\n\t\tfsOpts = fs.NewOptions().\n\t\t\tSetFilePathPrefix(filePathPrefix).\n\t\t\tSetClockOptions(storageOpts.ClockOptions())\n\t}\n\n\tstorageOpts = storageOpts.SetCommitLogOptions(\n\t\tstorageOpts.CommitLogOptions().\n\t\t\tSetFilesystemOptions(fsOpts))\n\n\t// Set up persistence manager\n\tpm, err := fs.NewPersistManager(fsOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstorageOpts = storageOpts.SetPersistManager(pm)\n\n\t// Set up index claims manager\n\ticm, err := fs.NewIndexClaimsManager(fsOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstorageOpts = storageOpts.SetIndexClaimsManager(icm)\n\n\t// Set up repair options\n\tstorageOpts = storageOpts.\n\t\tSetRepairOptions(storageOpts.RepairOptions().\n\t\t\tSetAdminClients([]client.AdminClient{adminClient}))\n\n\t// Set up block retriever manager\n\tif mgr := opts.DatabaseBlockRetrieverManager(); mgr != nil {\n\t\tstorageOpts = storageOpts.SetDatabaseBlockRetrieverManager(mgr)\n\t} else {\n\t\tswitch storageOpts.SeriesCachePolicy() {\n\t\tcase series.CacheAll:\n\t\t\t// Do not need a block retriever for CacheAll policy\n\t\tdefault:\n\t\t\tblockRetrieverMgr := block.NewDatabaseBlockRetrieverManager(\n\t\t\t\tfunc(md namespace.Metadata, shardSet sharding.ShardSet) (block.DatabaseBlockRetriever, error) {\n\t\t\t\t\tretrieverOpts := fs.NewBlockRetrieverOptions().\n\t\t\t\t\t\tSetBlockLeaseManager(blockLeaseManager)\n\t\t\t\t\tretriever, err := fs.NewBlockRetriever(retrieverOpts, fsOpts)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil, err\n\t\t\t\t\t}\n\n\t\t\t\t\tif err := retriever.Open(md, shardSet); err != nil {\n\t\t\t\t\t\treturn nil, err\n\t\t\t\t\t}\n\t\t\t\t\treturn retriever, nil\n\t\t\t\t})\n\t\t\tstorageOpts = storageOpts.\n\t\t\t\tSetDatabaseBlockRetrieverManager(blockRetrieverMgr)\n\t\t}\n\t}\n\n\t// Set up wired list if required\n\tif storageOpts.SeriesCachePolicy() == series.CacheLRU {\n\t\twiredList := block.NewWiredList(block.WiredListOptions{\n\t\t\tRuntimeOptionsManager: runtimeOptsMgr,\n\t\t\tInstrumentOptions: storageOpts.InstrumentOptions(),\n\t\t\tClockOptions: storageOpts.ClockOptions(),\n\t\t\t// Use a small event channel size to stress-test the implementation\n\t\t\tEventsChannelSize: 1,\n\t\t})\n\t\tblockOpts := storageOpts.DatabaseBlockOptions().SetWiredList(wiredList)\n\t\tblockPool := block.NewDatabaseBlockPool(nil)\n\t\t// Have to manually set the blockpool because the default one uses a constructor\n\t\t// function that doesn't have the updated blockOpts.\n\t\tblockPool.Init(func() block.DatabaseBlock {\n\t\t\treturn block.NewDatabaseBlock(0, 0, ts.Segment{}, blockOpts, namespace.Context{})\n\t\t})\n\t\tblockOpts = blockOpts.SetDatabaseBlockPool(blockPool)\n\t\tstorageOpts = storageOpts.SetDatabaseBlockOptions(blockOpts)\n\t}\n\n\tstorageOpts = storageOpts.SetInstrumentOptions(\n\t\tstorageOpts.InstrumentOptions().SetReportInterval(opts.ReportInterval()))\n\n\t// Set debugging options if environment vars set\n\tif debugFilePrefix := os.Getenv(\"TEST_DEBUG_FILE_PREFIX\"); debugFilePrefix != \"\" {\n\t\topts = opts.SetVerifySeriesDebugFilePathPrefix(debugFilePrefix)\n\t}\n\n\tfor _, fn := range storageOptFns {\n\t\tif fn != nil {\n\t\t\tstorageOpts = fn(storageOpts)\n\t\t}\n\t}\n\tif storageOpts != nil && storageOpts.AdminClient() == nil {\n\t\tstorageOpts = storageOpts.SetAdminClient(adminClient)\n\t}\n\n\treturn &testSetup{\n\t\tt: t,\n\t\topts: opts,\n\t\tschemaReg: schemaReg,\n\t\tlogger: logger,\n\t\tscope: scope,\n\t\tstorageOpts: storageOpts,\n\t\tblockLeaseManager: blockLeaseManager,\n\t\tinstrumentOpts: instrumentOpts,\n\t\tfsOpts: fsOpts,\n\t\thostID: id,\n\t\torigin: newOrigin(id, tchannelNodeAddr),\n\t\ttopoInit: topoInit,\n\t\tshardSet: shardSet,\n\t\tgetNowFn: getNowFn,\n\t\tclockNowFn: clockNowFn,\n\t\tsetNowFn: setNowFn,\n\t\ttchannelClient: tchanClient,\n\t\tm3dbClient: adminClient.(client.Client),\n\t\tm3dbAdminClient: adminClient,\n\t\tm3dbVerificationAdminClient: verificationAdminClient,\n\t\tworkerPool: workerPool,\n\t\tfilePathPrefix: filePathPrefix,\n\t\tnamespaces: opts.Namespaces(),\n\t\tdoneCh: make(chan struct{}),\n\t\tclosedCh: make(chan struct{}),\n\t\tassertEqual: opts.AssertTestDataEqual(),\n\t}, nil\n}", "title": "" }, { "docid": "20bf2c312c58933095ca3aeb483e9367", "score": "0.46121228", "text": "func (s *SQLServer) Init(metadata state.Metadata) error {\n\tif val, ok := metadata.Properties[connectionStringKey]; ok && val != \"\" {\n\t\ts.connectionString = val\n\t} else {\n\t\treturn fmt.Errorf(\"missing connection string\")\n\t}\n\n\tif err := s.getTable(metadata); err != nil {\n\t\treturn err\n\t}\n\n\tif err := s.getDatabase(metadata); err != nil {\n\t\treturn err\n\t}\n\n\tif err := s.getKeyType(metadata); err != nil {\n\t\treturn err\n\t}\n\n\tif err := s.getSchema(metadata); err != nil {\n\t\treturn err\n\t}\n\n\tif err := s.getIndexedProperties(metadata); err != nil {\n\t\treturn err\n\t}\n\n\tmigration := s.migratorFactory(s)\n\tmr, err := migration.executeMigrations()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ts.itemRefTableTypeName = mr.itemRefTableTypeName\n\ts.bulkDeleteCommand = fmt.Sprintf(\"exec %s @itemsToDelete;\", mr.bulkDeleteProcFullName)\n\ts.upsertCommand = mr.upsertProcFullName\n\ts.getCommand = mr.getCommand\n\ts.deleteWithETagCommand = mr.deleteWithETagCommand\n\ts.deleteWithoutETagCommand = mr.deleteWithoutETagCommand\n\n\ts.db, err = sql.Open(\"sqlserver\", s.connectionString)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "04232ef55ed57dcc92d7e66d199cfefd", "score": "0.46025264", "text": "func InitSuite(topoName, paramsFile string, scale, scaleData bool) (*testbed.TestBed, SysModelInterface, error) {\n\t// create testbed\n\n\t// setup test params\n\tif scale {\n\t\tgomega.SetDefaultEventuallyTimeout(time.Minute * 60)\n\t\tgomega.SetDefaultEventuallyPollingInterval(time.Second * 45)\n\t} else {\n\t\tgomega.SetDefaultEventuallyTimeout(time.Minute * 10)\n\t\tgomega.SetDefaultEventuallyPollingInterval(time.Second * 10)\n\t}\n\n\ttb, err := testbed.NewTestBed(topoName, paramsFile)\n\tif err != nil {\n\t\t//Take Testbed offline if any issue with setting up testbed\n\t\tos.Exit(Constants.TBOfflineErrorCode)\n\t\treturn nil, nil, err\n\t}\n\n\t// create sysmodel\n\tmodel, err := NewSysModel(tb)\n\tif err != nil {\n\t\ttb.CollectLogs()\n\t\treturn nil, nil, err\n\t}\n\n\t// setup default config for the sysmodel\n\tctx, cancel := context.WithTimeout(context.TODO(), 60*time.Minute)\n\tdefer cancel()\n\terr = model.SetupDefaultConfig(ctx, scale, scaleData)\n\tif err != nil {\n\t\tmodel.CollectLogs()\n\t\treturn nil, nil, err\n\t}\n\n\treturn tb, model, nil\n}", "title": "" }, { "docid": "fb62ca37c428ab3ba0beb98a32959da5", "score": "0.4595335", "text": "func init() { //nolint\n\ttestSample := TestCase{\n\t\tName: \" should perform a scan and create a result and payload file [E2E-CLI-033]\",\n\t\tArgs: args{\n\t\t\tArgs: []cmdArgs{\n\t\t\t\t[]string{\"scan\",\n\t\t\t\t\t\"--output-path\", \"output\",\n\t\t\t\t\t\"--output-name\", \"E2E_CLI_033_RESULT\",\n\t\t\t\t\t\"--report-formats\", \"json,sarif,glsast\",\n\t\t\t\t\t\"--payload-path\", \"output/E2E_CLI_033_PAYLOAD.json\",\n\t\t\t\t\t\"-q\", \"../assets/queries\", \"-p\", \"fixtures/samples/terraform-single.tf\",\n\t\t\t\t},\n\t\t\t},\n\t\t\tExpectedResult: []ResultsValidation{\n\t\t\t\t{\n\t\t\t\t\tResultsFile: \"E2E_CLI_033_RESULT\",\n\t\t\t\t\tResultsFormats: []string{\"json\", \"sarif\", \"glsast\"},\n\t\t\t\t},\n\t\t\t},\n\t\t\tExpectedPayload: []string{\n\t\t\t\t\"E2E_CLI_033_PAYLOAD.json\",\n\t\t\t},\n\t\t},\n\t\tWantStatus: []int{40},\n\t}\n\n\tTests = append(Tests, testSample)\n}", "title": "" }, { "docid": "7cb90e580a885814284ccd67c622119b", "score": "0.458985", "text": "func registerMetadataFactories() {\n\tmetadata_factory.RegisterFactory(\"MetadataTest\", MetadataTestFactory{})\n\tmetadata_factory.RegisterFactory(\"Planets\", PlanetsFactory{})\n\tmetadata_factory.RegisterFactory(\"Places\", PlacesFactory{})\n}", "title": "" }, { "docid": "f235dfc943fb1327541d8a9e49f07f74", "score": "0.4573464", "text": "func (suite *RecomputationsProfileTestSuite) SetupTest() {\n\n\tlog.SetOutput(ioutil.Discard)\n\n\t// seed mongo\n\tsession, err := mgo.Dial(suite.cfg.MongoDB.Host)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer session.Close()\n\n\t// Seed database with tenants\n\t//TODO: move tests to\n\tc := session.DB(suite.cfg.MongoDB.Db).C(\"tenants\")\n\tc.Insert(\n\t\tbson.M{\"id\": \"6ac7d684-1f8e-4a02-a502-720e8f11e50c\",\n\t\t\t\"info\": bson.M{\n\t\t\t\t\"name\": \"GUARDIANS\",\n\t\t\t\t\"email\": \"email@something2\",\n\t\t\t\t\"website\": \"www.gotg.com\",\n\t\t\t\t\"created\": \"2015-10-20 02:08:04\",\n\t\t\t\t\"updated\": \"2015-10-20 02:08:04\"},\n\t\t\t\"db_conf\": []bson.M{\n\n\t\t\t\tbson.M{\n\t\t\t\t\t\"server\": \"localhost\",\n\t\t\t\t\t\"port\": 27017,\n\t\t\t\t\t\"database\": \"argo_Westeros1\",\n\t\t\t\t},\n\t\t\t\tbson.M{\n\t\t\t\t\t\"server\": \"localhost\",\n\t\t\t\t\t\"port\": 27017,\n\t\t\t\t\t\"database\": \"argo_Westeros2\",\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"users\": []bson.M{\n\n\t\t\t\tbson.M{\n\t\t\t\t\t\"name\": \"John Snow\",\n\t\t\t\t\t\"email\": \"J.Snow@brothers.wall\",\n\t\t\t\t\t\"api_key\": \"wh1t3_w@lk3rs\",\n\t\t\t\t\t\"roles\": []string{\"editor\"},\n\t\t\t\t},\n\t\t\t\tbson.M{\n\t\t\t\t\t\"name\": \"King Joffrey\",\n\t\t\t\t\t\"email\": \"g0dk1ng@kingslanding.gov\",\n\t\t\t\t\t\"api_key\": \"sansa <3\",\n\t\t\t\t\t\"roles\": []string{\"editor\"},\n\t\t\t\t},\n\t\t\t}})\n\tc.Insert(\n\t\tbson.M{\"id\": \"6ac7d684-1f8e-4a02-a502-720e8f11e50d\",\n\t\t\t\"info\": bson.M{\n\t\t\t\t\"name\": \"AVENGERS\",\n\t\t\t\t\"email\": \"email@something2\",\n\t\t\t\t\"website\": \"www.gotg.com\",\n\t\t\t\t\"created\": \"2015-10-20 02:08:04\",\n\t\t\t\t\"updated\": \"2015-10-20 02:08:04\"},\n\t\t\t\"db_conf\": []bson.M{\n\n\t\t\t\tbson.M{\n\t\t\t\t\t// \"store\": \"ar\",\n\t\t\t\t\t\"server\": suite.tenantDbConf.Host,\n\t\t\t\t\t\"port\": suite.tenantDbConf.Port,\n\t\t\t\t\t\"database\": suite.tenantDbConf.Db,\n\t\t\t\t\t\"username\": suite.tenantDbConf.Username,\n\t\t\t\t\t\"password\": suite.tenantDbConf.Password,\n\t\t\t\t},\n\t\t\t\tbson.M{\n\t\t\t\t\t\"server\": suite.tenantDbConf.Host,\n\t\t\t\t\t\"port\": suite.tenantDbConf.Port,\n\t\t\t\t\t\"database\": suite.tenantDbConf.Db,\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"users\": []bson.M{\n\n\t\t\t\tbson.M{\n\t\t\t\t\t\"name\": \"Joe Complex\",\n\t\t\t\t\t\"email\": \"C.Joe@egi.eu\",\n\t\t\t\t\t\"api_key\": suite.clientkey,\n\t\t\t\t\t\"roles\": []string{\"editor\"},\n\t\t\t\t},\n\t\t\t\tbson.M{\n\t\t\t\t\t\"name\": \"Josh Plain\",\n\t\t\t\t\t\"email\": \"P.Josh@egi.eu\",\n\t\t\t\t\t\"api_key\": \"VIEWERKEY\",\n\t\t\t\t\t\"roles\": []string{\"viewer\"},\n\t\t\t\t},\n\t\t\t}})\n\n\tc = session.DB(suite.cfg.MongoDB.Db).C(\"roles\")\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"recomputations.list\",\n\t\t\t\"roles\": []string{\"editor\", \"viewer\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"recomputations.get\",\n\t\t\t\"roles\": []string{\"editor\", \"viewer\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"recomputations.submit\",\n\t\t\t\"roles\": []string{\"editor\"},\n\t\t})\n\t// Seed database with recomputations\n\tc = session.DB(suite.tenantDbConf.Db).C(\"recomputations\")\n\tc.Insert(\n\t\tMongoInterface{\n\t\t\tID: \"6ac7d684-1f8e-4a02-a502-720e8f11e50b\",\n\t\t\tRequesterName: \"John Snow\",\n\t\t\tRequesterEmail: \"jsnow@wall.com\",\n\t\t\tStartTime: \"2015-03-10T12:00:00Z\",\n\t\t\tEndTime: \"2015-03-30T23:00:00Z\",\n\t\t\tReason: \"reasons\",\n\t\t\tReport: \"EGI_Critical\",\n\t\t\tExclude: []string{\"SITE1\", \"SITE3\"},\n\t\t\tStatus: \"pending\",\n\t\t\tTimestamp: \"2015-04-01 14:58:40\",\n\t\t},\n\t)\n\tc.Insert(\n\t\tMongoInterface{\n\t\t\tID: \"6ac7d684-1f8e-4a02-a502-720e8f11e50a\",\n\t\t\tRequesterName: \"Arya Stark\",\n\t\t\tRequesterEmail: \"astark@shadowguild.com\",\n\t\t\tStartTime: \"2015-01-10T12:00:00Z\",\n\t\t\tEndTime: \"2015-01-30T23:00:00Z\",\n\t\t\tReason: \"power cuts\",\n\t\t\tReport: \"EGI_Critical\",\n\t\t\tExclude: []string{\"SITE2\", \"SITE4\"},\n\t\t\tStatus: \"running\",\n\t\t\tTimestamp: \"2015-02-01 14:58:40\",\n\t\t},\n\t)\n\n}", "title": "" }, { "docid": "68dab0c693693b0e636adfb24371e41e", "score": "0.4539973", "text": "func setupCluster(c cluster.TestCluster, nodes int, version, runtime string) *kCluster {\n\t// start single-node etcd\n\tetcdNode, err := c.NewMachine(etcdConfig)\n\tif err != nil {\n\t\tc.Fatalf(\"error creating etcd: %v\", err)\n\t}\n\n\tif err := etcd.GetClusterHealth(c, etcdNode, 1); err != nil {\n\t\tc.Fatalf(\"error checking etcd health: %v\", err)\n\t}\n\n\t// passing cloud-config has the side effect of populating `/etc/environment`,\n\t// which the install script depends on\n\tmaster, err := c.NewMachine(conf.CloudConfig(\"\"))\n\tif err != nil {\n\t\tc.Fatalf(\"error creating master: %v\", err)\n\t}\n\n\toptions := map[string]string{\n\t\t\"HYPERKUBE_IMAGE_REPO\": \"quay.io/coreos/hyperkube\",\n\t\t\"MASTER_HOST\": master.PrivateIP(),\n\t\t\"ETCD_ENDPOINTS\": fmt.Sprintf(\"http://%v:2379\", etcdNode.PrivateIP()),\n\t\t\"CONTROLLER_ENDPOINT\": fmt.Sprintf(\"https://%v:443\", master.PrivateIP()),\n\t\t\"K8S_SERVICE_IP\": \"10.3.0.1\",\n\t\t\"K8S_VER\": version,\n\t\t\"CONTAINER_RUNTIME\": runtime,\n\t}\n\n\t// generate TLS assets on master\n\tif err := generateMasterTLSAssets(c, master, options); err != nil {\n\t\tc.Fatalf(\"error creating master tls: %v\", err)\n\t}\n\n\t// create worker nodes\n\tworkers, err := platform.NewMachines(clusterWrapper{&c}, conf.CloudConfig(\"\"), nodes)\n\tif err != nil {\n\t\tc.Fatalf(\"error creating workers: %v\", err)\n\t}\n\n\t// generate tls assets on workers by transfering ca from master\n\tif err := generateWorkerTLSAssets(c, master, workers); err != nil {\n\t\tc.Fatalf(\"error creating worker tls: %v\", err)\n\t}\n\n\t// configure nodes via generic install scripts\n\trunInstallScript(c, master, controllerInstallScript, options)\n\n\tfor _, worker := range workers {\n\t\trunInstallScript(c, worker, workerInstallScript, options)\n\t}\n\n\t// configure kubectl\n\tif err := configureKubectl(c, master, master.PrivateIP(), version); err != nil {\n\t\tc.Fatalf(\"error configuring master kubectl: %v\", err)\n\t}\n\n\t// check that all nodes appear in kubectl\n\tf := func() error {\n\t\treturn nodeCheck(c, master, workers)\n\t}\n\tif err := util.Retry(15, 30*time.Second, f); err != nil {\n\t\tc.Fatalf(\"error waiting for nodes: %v\", err)\n\t}\n\n\tcluster := &kCluster{\n\t\tetcd: etcdNode,\n\t\tmaster: master,\n\t\tworkers: workers,\n\t}\n\treturn cluster\n}", "title": "" }, { "docid": "7760166773db7593e796472e9c1f6504", "score": "0.4530866", "text": "func InitSnapshottableTestSuite() TestSuite {\n\treturn &snapshottableTestSuite{\n\t\ttsInfo: TestSuiteInfo{\n\t\t\tName: \"snapshottable\",\n\t\t\tTestPatterns: []testpatterns.TestPattern{\n\t\t\t\ttestpatterns.DynamicSnapshot,\n\t\t\t},\n\t\t\tSupportedSizeRange: e2evolume.SizeRange{\n\t\t\t\tMin: \"1Mi\",\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "2cac933e7ae0f5ed61ff3acd89c38933", "score": "0.4525913", "text": "func TestStarter(t *testing.T) {\n\ttestCreateTableJSON(t)\n}", "title": "" }, { "docid": "fa66e69ccfca68f2bb37d116b09f6b14", "score": "0.45228496", "text": "func InitForTesting(t assert.TestingT) *Entries {\n\tr := rand.New(rand.NewSource(time.Now().UnixNano()))\n\temulatorHost := os.Getenv(\"DATASTORE_EMULATOR_HOST\")\n\tif emulatorHost == \"\" {\n\t\tassert.Fail(t, `Running tests that require a running Cloud Datastore emulator.\n\nRun\n\n\t\"gcloud beta emulators datastore start --no-store-on-disk --host-port=localhost:8888\"\n\nand then run\n\n $(gcloud beta emulators datastore env-init)\n\nto set the environment variables. When done running tests you can unset the env variables:\n\n $(gcloud beta emulators datastore env-unset)\n\n`)\n\t}\n\n\t// Do a quick healthcheck against the host, which will fail immediately if it's down.\n\t_, err := http.DefaultClient.Get(\"http://\" + emulatorHost + \"/\")\n\tassert.NoError(t, err, fmt.Sprintf(\"Cloud emulator host %s appears to be down or not accessible.\", emulatorHost))\n\n\te, err := New(context.Background(), \"test-project\", fmt.Sprintf(\"test-namespace-%d\", r.Uint64()), logger.New())\n\tassert.NoError(t, err)\n\treturn e\n}", "title": "" }, { "docid": "47590cf55b0ad502c21382af732a7e4d", "score": "0.45196056", "text": "func init() { //nolint\n\ttestSample := TestCase{\n\t\tName: \"should display verbose information in the CLI [E2E-CLI-017]\",\n\t\tArgs: args{\n\t\t\tArgs: []cmdArgs{\n\t\t\t\t[]string{\"scan\", \"-v\", \"--no-progress\", \"-q\", \"../assets/queries\", \"-p\", \"fixtures/samples/terraform.tf\"},\n\t\t\t},\n\t\t},\n\t\tValidation: func(outputText string) bool {\n\t\t\tmatch1, _ := regexp.MatchString(`Inspector initialized, number of queries=\\d+`, outputText)\n\t\t\tmatch2, _ := regexp.MatchString(`Inspector stopped`, outputText)\n\t\t\treturn match1 && match2\n\t\t},\n\t\tWantStatus: []int{50},\n\t}\n\n\tTests = append(Tests, testSample)\n}", "title": "" }, { "docid": "918e25972e424ec06a0c00f3e66afdb7", "score": "0.45024624", "text": "func (s *DataSuite) SetUpSuite(c *C) {\n\t// Make a temporary testing directory that will be auto-deleted after testing.\n\ts.dir = c.MkDir()\n\n\t// Create a new storage engine.\n\tdb, err := NewStore(s.dir, true, dvid.Config{})\n\tc.Assert(err, IsNil)\n\n\ts.db = db\n}", "title": "" }, { "docid": "1d449467c0559717edeb4441bd5267f6", "score": "0.44983315", "text": "func (suite *TenantTestSuite) SetupTest() {\n\n\tlog.SetOutput(ioutil.Discard)\n\n\t// Connect to mongo testdb\n\tsession, _ := mongo.OpenSession(suite.cfg.MongoDB)\n\n\t// Add authentication token to mongo testdb\n\tseedAuth := bson.M{\"api_key\": \"S3CR3T\"}\n\tseedResAuth := bson.M{\"api_key\": \"R3STRICT3D\", \"restricted\": true}\n\tseedResAdminUI := bson.M{\"api_key\": \"ADM1NU1\", \"super_admin_ui\": true}\n\t_ = mongo.Insert(session, suite.cfg.MongoDB.Db, \"authentication\", seedAuth)\n\t_ = mongo.Insert(session, suite.cfg.MongoDB.Db, \"authentication\", seedResAuth)\n\t_ = mongo.Insert(session, suite.cfg.MongoDB.Db, \"authentication\", seedResAdminUI)\n\n\t// seed mongo\n\tsession, err := mgo.Dial(suite.cfg.MongoDB.Host)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer session.Close()\n\n\tc := session.DB(suite.cfg.MongoDB.Db).C(\"roles\")\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.list\",\n\t\t\t\"roles\": []string{\"super_admin\", \"super_admin_restricted\", \"super_admin_ui\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.get\",\n\t\t\t\"roles\": []string{\"super_admin\", \"super_admin_ui\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.create\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.delete\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.update\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.update_status\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.create_user\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.update_user\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.list_users\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.delete_user\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.get_user\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.user_refresh_token\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.get_status\",\n\t\t\t\"roles\": []string{\"super_admin\"},\n\t\t})\n\tc.Insert(\n\t\tbson.M{\n\t\t\t\"resource\": \"tenants.user_by_id\",\n\t\t\t\"roles\": []string{\"super_admin\", \"super_admin_restricted\"},\n\t\t})\n\t// seed first tenant\n\tc = session.DB(suite.cfg.MongoDB.Db).C(\"tenants\")\n\tc.Insert(bson.M{\n\t\t\"id\": \"6ac7d684-1f8e-4a02-a502-720e8f11e50b\",\n\t\t\"info\": bson.M{\n\t\t\t\"name\": \"AVENGERS\",\n\t\t\t\"email\": \"email@something\",\n\t\t\t\"description\": \"a simple tenant\",\n\t\t\t\"image\": \"url to image\",\n\t\t\t\"website\": \"www.avengers.com\",\n\t\t\t\"created\": \"2015-10-20 02:08:04\",\n\t\t\t\"updated\": \"2015-10-20 02:08:04\"},\n\t\t\"topology\": bson.M{\n\t\t\t\"type\": \"GOCDB\",\n\t\t\t\"feed\": \"gocdb.example.foo\",\n\t\t},\n\t\t\"db_conf\": []bson.M{\n\t\t\tbson.M{\n\t\t\t\t\"store\": \"ar\",\n\t\t\t\t\"server\": \"a.mongodb.org\",\n\t\t\t\t\"port\": 27017,\n\t\t\t\t\"database\": \"ar_db\",\n\t\t\t\t\"username\": \"admin\",\n\t\t\t\t\"password\": \"3NCRYPT3D\"},\n\t\t\tbson.M{\n\t\t\t\t\"store\": \"status\",\n\t\t\t\t\"server\": \"b.mongodb.org\",\n\t\t\t\t\"port\": 27017,\n\t\t\t\t\"database\": \"status_db\",\n\t\t\t\t\"username\": \"admin\",\n\t\t\t\t\"password\": \"3NCRYPT3D\"},\n\t\t},\n\t\t\"users\": []bson.M{\n\t\t\tbson.M{\n\t\t\t\t\"id\": \"acb74194-553a-11e9-8647-d663bd873d93\",\n\t\t\t\t\"name\": \"cap\",\n\t\t\t\t\"email\": \"cap@email.com\",\n\t\t\t\t\"api_key\": \"C4PK3Y\",\n\t\t\t\t\"roles\": []string{\"admin\", \"admin_ui\"}},\n\t\t\tbson.M{\n\t\t\t\t\"id\": \"acb74432-553a-11e9-8647-d663bd873d93\",\n\t\t\t\t\"name\": \"thor\",\n\t\t\t\t\"email\": \"thor@email.com\",\n\t\t\t\t\"api_key\": \"TH0RK3Y\",\n\t\t\t\t\"roles\": []string{\"admin\"}},\n\t\t}})\n\n\t// seed second tenant\n\tc.Insert(bson.M{\n\t\t\"id\": \"6ac7d684-1f8e-4a02-a502-720e8f11e50c\",\n\t\t\"info\": bson.M{\n\t\t\t\"name\": \"GUARDIANS\",\n\t\t\t\"email\": \"email@something2\",\n\t\t\t\"website\": \"www.gotg.com\",\n\t\t\t\"created\": \"2015-10-20 02:08:04\",\n\t\t\t\"updated\": \"2015-10-20 02:08:04\"},\n\t\t\"topology\": bson.M{\n\t\t\t\"type\": \"GOCDB\",\n\t\t\t\"feed\": \"gocdb.example.foo\",\n\t\t},\n\t\t\"db_conf\": []bson.M{\n\t\t\tbson.M{\n\t\t\t\t\"store\": \"ar\",\n\t\t\t\t\"server\": \"a.mongodb.org\",\n\t\t\t\t\"port\": 27017,\n\t\t\t\t\"database\": \"ar_db\",\n\t\t\t\t\"username\": \"admin\",\n\t\t\t\t\"password\": \"3NCRYPT3D\"},\n\t\t\tbson.M{\n\t\t\t\t\"store\": \"status\",\n\t\t\t\t\"server\": \"b.mongodb.org\",\n\t\t\t\t\"port\": 27017,\n\t\t\t\t\"database\": \"status_db\",\n\t\t\t\t\"username\": \"admin\",\n\t\t\t\t\"password\": \"3NCRYPT3D\"},\n\t\t},\n\t\t\"users\": []bson.M{\n\t\t\tbson.M{\n\t\t\t\t\"id\": \"acb7459a-553a-11e9-8647-d663bd873d93\",\n\t\t\t\t\"name\": \"groot\",\n\t\t\t\t\"email\": \"groot@email.com\",\n\t\t\t\t\"api_key\": \"GR00TK3Y\",\n\t\t\t\t\"roles\": []string{\"admin\"}},\n\t\t\tbson.M{\n\t\t\t\t\"id\": \"acb74702-553a-11e9-8647-d663bd873d93\",\n\t\t\t\t\"name\": \"starlord\",\n\t\t\t\t\"email\": \"starlord@email.com\",\n\t\t\t\t\"api_key\": \"ST4RL0RDK3Y\",\n\t\t\t\t\"roles\": []string{\"admin\"}},\n\t\t}})\n}", "title": "" }, { "docid": "bb4a29febb91d48867735267820eb623", "score": "0.44924766", "text": "func setup(benchmarkSuite *benchmarkpb.BenchmarkSuite, workspaceRoot string, existingSessionId string, csvLogger *CsvLogger, verbose bool) error {\n\tsessionId := existingSessionId\n\n\tsessionsRoot := filepath.Join(workspaceRoot, \"sessions\")\n\n\tif sessionId == \"\" {\n\t\tuuid, err := gouuid.NewV4()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"cannot generate UUID: %v\", err)\n\t\t}\n\t\tsessionId = fmt.Sprintf(\"%v\", uuid)\n\t}\n\n\tsessionRoot := filepath.Join(sessionsRoot, sessionId)\n\tfmt.Printf(\"Setting up session %v in %v\\n\", sessionId, sessionRoot)\n\n\tif isDirectory(sessionRoot) {\n\t\tglog.Warning(\"Session directory already exists\")\n\t} else {\n\t\terr := os.Mkdir(sessionRoot, 0755)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to create directory %s : %v\", sessionRoot, err)\n\t\t}\n\t}\n\n\tstartTime := time.Now()\n\n\tarchiveRoot := filepath.Join(workspaceRoot, \"data\")\n\n\tfor _, archive := range benchmarkSuite.Setup.Archive {\n\t\tarchivePath := filepath.Join(archiveRoot, normalizePathSeparators(archive.ArchivePath))\n\t\tglog.Infof(\"Extracting archive: %v\\n\", archivePath)\n\t\tif !isFile(archivePath) {\n\t\t\treturn fmt.Errorf(\"file %v does not exist\", archivePath)\n\t\t}\n\t\tif len(archive.Subdirectory) == 0 {\n\t\t\tif err := zip_utils.UnzipFile(archivePath, sessionRoot); err != nil {\n\t\t\t\treturn fmt.Errorf(\"failed to extract archive %s : %v\", archivePath, err)\n\t\t\t}\n\t\t} else {\n\t\t\tfor _, subdirectory := range archive.Subdirectory {\n\t\t\t\tif err := zip_utils.UnzipSubdirectoriesFromFile(archivePath, subdirectory, sessionRoot); err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"failed to extract subdirectory %s from archive %s : %v\", subdirectory, archivePath, err)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tendTime := time.Now()\n\tcsvLogger.Log(\"setup\", \"extraction\", \"\", 1, startTime, endTime, nil)\n\n\treturn nil\n}", "title": "" }, { "docid": "a75b7bc6bcc55da9c5b6584f78d69230", "score": "0.44913626", "text": "func Test_DBSuite(t *testing.T) {\n\t// e := echo.New()\n\t// util.InitLogger(e)\n\n\t// InitTestDBs()\n\t// InitServices()\n\n\t// dbSuite := new(DBTestSuite)\n\t// Injector.Apply(dbSuite)\n\t// suite.Run(t, dbSuite)\n}", "title": "" }, { "docid": "2157a10cdbf3db26f19c4097a74ce634", "score": "0.44839007", "text": "func (s *TestSuite) SetUpSuite(c *C) {\n\n\t// initialize the bootstrap configuration \n\t//bootstrap.Bootstrap()\t\t\n\tBootstrap()\n}", "title": "" }, { "docid": "331021a9af00bdf7345b2ff642c8e3f3", "score": "0.4483635", "text": "func SetUp(root string) {\n\tutil.LoadConfigurations(root)\n\tconnectors.InitializeDataBase(util.GetConfiguration().Database[\"Host\"],\n\t\tutil.GetConfiguration().Database[\"Port\"],\n\t\tutil.GetConfiguration().Database[\"Username\"],\n\t\tutil.GetConfiguration().Database[\"Password\"],\n\t\tutil.GetConfiguration().Database[\"Dbname\"])\n\n\tconnectors.InitializeCache(\"localhost:6379\")\n\n}", "title": "" }, { "docid": "f88fe852cad3f3c44a273cc76469576d", "score": "0.4482541", "text": "func init() {\n\t// get environment variables\n\tenv := func(key, defaultValue string) string {\n\t\tif value := os.Getenv(key); value != \"\" {\n\t\t\treturn value\n\t\t}\n\t\treturn defaultValue\n\t}\n\tusername = env(\"SNOWFLAKE_TEST_USER\", \"testuser\")\n\tpass = env(\"SNOWFLAKE_TEST_PASSWORD\", \"testpassword\")\n\taccount = env(\"SNOWFLAKE_TEST_ACCOUNT\", \"testaccount\")\n\tdbname = env(\"SNOWFLAKE_TEST_DATABASE\", \"testdb\")\n\tschemaname = env(\"SNOWFLAKE_TEST_SCHEMA\", \"public\")\n\trolename = env(\"SNOWFLAKE_TEST_ROLE\", \"sysadmin\")\n\twarehouse = env(\"SNOWFLAKE_TEST_WAREHOUSE\", \"testwarehouse\")\n\n\tprotocol = env(\"SNOWFLAKE_TEST_PROTOCOL\", \"https\")\n\thost = os.Getenv(\"SNOWFLAKE_TEST_HOST\")\n\tport = env(\"SNOWFLAKE_TEST_PORT\", \"443\")\n\tif host == \"\" {\n\t\thost = fmt.Sprintf(\"%s.snowflakecomputing.com\", account)\n\t} else {\n\t\thost = fmt.Sprintf(\"%s:%s\", host, port)\n\t}\n\n\tsetupPrivateKey()\n\n\tcreateDSN(\"UTC\")\n}", "title": "" }, { "docid": "61889e1b02a0824a958deae9cd353921", "score": "0.44798094", "text": "func TestKindClusterConfig(t *testing.T) {\n\tt.Parallel()\n\tctx := context.Background()\n\tsrv, err := NewTestAuthServer(TestAuthServerConfig{Dir: t.TempDir()})\n\trequire.NoError(t, err)\n\n\tgetClusterConfigResources := func(ctx context.Context, user types.User) []error {\n\t\tauthContext, err := srv.Authorizer.Authorize(authz.ContextWithUser(ctx, TestUser(user.GetName()).I))\n\t\trequire.NoError(t, err, trace.DebugReport(err))\n\t\ts := &ServerWithRoles{\n\t\t\tauthServer: srv.AuthServer,\n\t\t\talog: srv.AuditLog,\n\t\t\tcontext: *authContext,\n\t\t}\n\t\t_, err1 := s.GetClusterAuditConfig(ctx)\n\t\t_, err2 := s.GetClusterNetworkingConfig(ctx)\n\t\t_, err3 := s.GetSessionRecordingConfig(ctx)\n\t\treturn []error{err1, err2, err3}\n\t}\n\n\tt.Run(\"without KindClusterConfig privilege\", func(t *testing.T) {\n\t\tuser, err := CreateUser(srv.AuthServer, \"test-user\")\n\t\trequire.NoError(t, err)\n\t\tfor _, err := range getClusterConfigResources(ctx, user) {\n\t\t\trequire.Error(t, err)\n\t\t\trequire.True(t, trace.IsAccessDenied(err))\n\t\t}\n\t})\n\n\tt.Run(\"with KindClusterConfig privilege\", func(t *testing.T) {\n\t\trole, err := types.NewRole(\"test-role\", types.RoleSpecV6{\n\t\t\tAllow: types.RoleConditions{\n\t\t\t\tRules: []types.Rule{\n\t\t\t\t\ttypes.NewRule(types.KindClusterConfig, []string{types.VerbRead}),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\trequire.NoError(t, err)\n\t\tuser, err := CreateUser(srv.AuthServer, \"test-user\", role)\n\t\trequire.NoError(t, err)\n\t\tfor _, err := range getClusterConfigResources(ctx, user) {\n\t\t\trequire.NoError(t, err)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "6dcd7afcd7f2de3bfd09da7b57e053b3", "score": "0.4475935", "text": "func initTestContext(t *testing.T) {\n\tobjects, err := e2e.LoadObjectJSON()\n\trequire.Nil(t, err)\n\n\tfiles, err := e2e.LoadGenericFileJSON()\n\trequire.Nil(t, err)\n\n\tcontext := common.NewContext()\n\tctx = E2ECtx{\n\t\tContext: context,\n\t\tT: t,\n\t\tExpectedObjects: objects,\n\t\tExpectedFiles: files,\n\t}\n\tctx.TestInstitution = getInstitution(\"test.edu\")\n}", "title": "" }, { "docid": "55f2addc94f5c040ab4e05122b7b4aa0", "score": "0.44749063", "text": "func (suite *ZkTestSuite) SetupTest() {\n\tsuite.providerConfig = config.ConfigurationProviders{\n\t\tTemplateURL: suite.zkURL,\n\t\tTemplateDir: \"/datadog/check_configs\",\n\t}\n\tsuite.populate()\n}", "title": "" }, { "docid": "5ec084306a5272dfd6eb7932ff08c9b2", "score": "0.44746286", "text": "func TestSyncContextTestSuite(t *testing.T) {\n\tsuite.Run(t, new(SyncContextObjectTestSuite))\n\tsuite.Run(t, new(SyncContextEMDTestSuite))\n\tsuite.Run(t, new(SyncContextStreamTestSuite))\n\tsuite.Run(t, new(SyncContextCursorTestSuite))\n\tsuite.Run(t, new(SyncContextStressTestSuite))\n}", "title": "" }, { "docid": "4d119eac33fee7c4cdb3435bd07dfa08", "score": "0.4470174", "text": "func TestConfig(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "5e9a970f4f13428108455ed86c0f306d", "score": "0.44648233", "text": "func (suite *CassandraConnSuite) TestCreateGetAllIter() {\n\t// Definition stores schema information about an Object\n\tobj := &base.Definition{\n\t\tName: testTableName2,\n\t\tKey: &base.PrimaryKey{\n\t\t\tPartitionKeys: []string{\"id\"},\n\t\t\tClusteringKeys: []*base.ClusteringKey{\n\t\t\t\t{\n\t\t\t\t\tName: \"ck\",\n\t\t\t\t\tDescending: true,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\t// Column name to data type mapping of the object\n\t\tColumnToType: map[string]reflect.Type{\n\t\t\t\"id\": reflect.TypeOf(1),\n\t\t\t\"ck\": reflect.TypeOf(1),\n\t\t\t\"data\": reflect.TypeOf(\"data\"),\n\t\t\t\"name\": reflect.TypeOf(\"name\"),\n\t\t},\n\t}\n\n\t// create the test rows in C*\n\tfor _, row := range testRowsWithCK {\n\t\terr := connector.Create(context.Background(), obj, row)\n\t\tsuite.NoError(err)\n\t}\n\n\t// read the row from C* test table for given keys using iterator\n\titer, err := connector.GetAllIter(context.Background(), obj, keyRow)\n\tsuite.NoError(err)\n\n\tnumRows := 0\n\tfor {\n\t\trow, err := iter.Next()\n\t\tsuite.NoError(err)\n\n\t\tif row == nil {\n\t\t\titer.Close()\n\t\t\tsuite.Equal(2, numRows)\n\t\t\tbreak\n\t\t}\n\t\tnumRows++\n\t\tfor _, col := range row {\n\t\t\tif col.Name == \"ck\" {\n\t\t\t\tck := col.Value.(*int)\n\t\t\t\tsuite.True(*ck == 10 || *ck == 20)\n\t\t\t} else if col.Name == \"name\" {\n\t\t\t\ttestStr := \"test\"\n\t\t\t\tsuite.Equal(col.Value, &testStr)\n\t\t\t} else if col.Name == \"data\" {\n\t\t\t\tdata := col.Value.(*string)\n\t\t\t\tsuite.True(*data == \"testdata20\" || *data == \"testdata10\")\n\t\t\t} else {\n\t\t\t\tid := col.Value.(*int)\n\t\t\t\tsuite.Equal(*id, 1)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9ae53d95530ce18917b572a730b4ad9e", "score": "0.4459898", "text": "func TestInMemoryMetadataSuite(t *testing.T) {\n\tsuite.Run(t, new(InMemoryMetadataSuite))\n}", "title": "" }, { "docid": "bc5cc61e226cf04dc8028a781971b9f9", "score": "0.44556415", "text": "func createQuickstartTests(quickstartName string, batch bool) bool {\n\tdescription := \"\"\n\tif batch {\n\t\tdescription = \"[batch] \"\n\t}\n\treturn Describe(description+\"quickstart \"+quickstartName+\"\\n\", func() {\n\t\tvar T Test\n\n\t\tBeforeEach(func() {\n\t\t\tqsNameParts := strings.Split(quickstartName, \"-\")\n\t\t\tqsAbbr := \"\"\n\t\t\tfor s := range qsNameParts {\n\t\t\t\tqsAbbr = qsAbbr + qsNameParts[s][:1]\n\n\t\t\t}\n\t\t\tapplicationName := TempDirPrefix + qsAbbr + \"-\" + strconv.FormatInt(GinkgoRandomSeed(), 10)\n\t\t\tT = Test{\n\t\t\t\tApplicationName: applicationName,\n\t\t\t\tWorkDir: WorkDir,\n\t\t\t\tFactory: clients.NewFactory(),\n\t\t\t}\n\t\t\tT.GitProviderURL()\n\n\t\t\tutils.LogInfof(\"Creating application %s in dir %s\\n\", util.ColorInfo(applicationName), util.ColorInfo(WorkDir))\n\t\t})\n\n\t\tDescribe(\"Given valid parameters\", func() {\n\t\t\tContext(\"when operating on the quickstart\", func() {\n\t\t\t\tIt(\"creates a \"+quickstartName+\" quickstart and promotes it to staging\\n\", func() {\n\t\t\t\t\tc := \"jx\"\n\t\t\t\t\targs := []string{\"create\", \"quickstart\", \"-b\", \"--org\", T.GetGitOrganisation(), \"-p\", T.ApplicationName, \"-f\", quickstartName}\n\n\t\t\t\t\tgitProviderUrl, err := T.GitProviderURL()\n\t\t\t\t\tExpect(err).NotTo(HaveOccurred())\n\t\t\t\t\tif gitProviderUrl != \"\" {\n\t\t\t\t\t\tutils.LogInfof(\"Using Git provider URL %s\\n\", gitProviderUrl)\n\t\t\t\t\t\targs = append(args, \"--git-provider-url\", gitProviderUrl)\n\t\t\t\t\t}\n\t\t\t\t\tcommand := exec.Command(c, args...)\n\t\t\t\t\tcommand.Dir = T.WorkDir\n\t\t\t\t\tsession, err := gexec.Start(command, GinkgoWriter, GinkgoWriter)\n\t\t\t\t\tΩ(err).ShouldNot(HaveOccurred())\n\t\t\t\t\tsession.Wait(TimeoutAppTests)\n\t\t\t\t\tEventually(session).Should(gexec.Exit(0))\n\n\t\t\t\t\tapplicationName := T.GetApplicationName()\n\t\t\t\t\towner := T.GetGitOrganisation()\n\t\t\t\t\tjobName := owner + \"/\" + applicationName + \"/master\"\n\n\t\t\t\t\tif T.WaitForFirstRelease() {\n\t\t\t\t\t\tBy(\"wait for first release\")\n\t\t\t\t\t\t//FIXME Need to wait a little here to ensure that the build has started before asking for the log as the jx create quickstart command returns slightly before the build log is available\n\t\t\t\t\t\ttime.Sleep(30 * time.Second)\n\n\t\t\t\t\t\tT.ThereShouldBeAJobThatCompletesSuccessfully(jobName, 20*time.Minute)\n\t\t\t\t\t\tT.TheApplicationIsRunningInStaging(200)\n\n\t\t\t\t\t\tif T.TestPullRequest() {\n\t\t\t\t\t\t\tBy(\"perform a pull request on the source and assert that a preview environment is created\")\n\t\t\t\t\t\t\tT.CreatePullRequestAndGetPreviewEnvironment(200)\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\tBy(\"wait for first successful build of master\")\n\t\t\t\t\t\tT.ThereShouldBeAJobThatCompletesSuccessfully(jobName, 20*time.Minute)\n\t\t\t\t\t}\n\n\t\t\t\t\tif T.DeleteApplications() {\n\t\t\t\t\t\tBy(\"deletes the application\")\n\t\t\t\t\t\targs = []string{\"delete\", \"application\", \"-b\", T.ApplicationName}\n\t\t\t\t\t\tcommand = exec.Command(c, args...)\n\t\t\t\t\t\tcommand.Dir = T.WorkDir\n\t\t\t\t\t\tsession, err = gexec.Start(command, GinkgoWriter, GinkgoWriter)\n\t\t\t\t\t\tΩ(err).ShouldNot(HaveOccurred())\n\t\t\t\t\t\tsession.Wait(TimeoutAppTests)\n\t\t\t\t\t\tEventually(session).Should(gexec.Exit(0))\n\t\t\t\t\t}\n\n\t\t\t\t\tif T.DeleteRepos() {\n\t\t\t\t\t\tBy(\"deletes the repo\")\n\t\t\t\t\t\targs = []string{\"delete\", \"repo\", \"-b\", \"--github\", \"-o\", T.GetGitOrganisation(), \"-n\", T.ApplicationName}\n\t\t\t\t\t\tcommand = exec.Command(c, args...)\n\t\t\t\t\t\tcommand.Dir = T.WorkDir\n\t\t\t\t\t\tsession, err = gexec.Start(command, GinkgoWriter, GinkgoWriter)\n\t\t\t\t\t\tΩ(err).ShouldNot(HaveOccurred())\n\t\t\t\t\t\tsession.Wait(TimeoutAppTests)\n\t\t\t\t\t\tEventually(session).Should(gexec.Exit(0))\n\t\t\t\t\t}\n\t\t\t\t})\n\t\t\t})\n\t\t})\n\t\tDescribe(\"Given invalid parameters\", func() {\n\t\t\tContext(\"when -p param (project name) is missing\", func() {\n\t\t\t\tIt(\"exits with signal 1\\n\", func() {\n\t\t\t\t\tc := \"jx\"\n\t\t\t\t\targs := []string{\"create\", \"quickstart\", \"-b\", \"--org\", T.GetGitOrganisation(), \"-f\", quickstartName}\n\t\t\t\t\tT.ExpectCommandExecution(T.WorkDir, TimeoutAppTests, 1, c, args...)\n\t\t\t\t})\n\t\t\t})\n\t\t\tContext(\"when -f param (filter) does not match any quickstart\", func() {\n\t\t\t\tIt(\"exits with signal 1\\n\", func() {\n\t\t\t\t\tc := \"jx\"\n\t\t\t\t\targs := []string{\"create\", \"quickstart\", \"-b\", \"--org\", T.GetGitOrganisation(), \"-p\", T.ApplicationName, \"-f\", \"the_derek_zoolander_app_for_being_really_really_good_looking\"}\n\t\t\t\t\tT.ExpectCommandExecution(T.WorkDir, TimeoutAppTests, 1, c, args...)\n\t\t\t\t})\n\t\t\t})\n\t\t})\n\t})\n}", "title": "" }, { "docid": "6a27466c900f66c8cb169c64832d6c49", "score": "0.44504783", "text": "func init() {\n\tmodel.SetupTestDatabase()\n\tInitializeTokens()\n}", "title": "" }, { "docid": "620cf91c2b31072fefb49b1655f83892", "score": "0.4440985", "text": "func PrepareLocalCluster(t *testing.T) (rpccache rpc.ConnectionCache, stats chunkserver.StorageStats, fe apis.Frontend, teardown func()) {\n\tcache := &rpc.MockCache{\n\t\tFrontends: map[apis.ServerAddress]apis.Frontend{},\n\t\tChunkservers: map[apis.ServerAddress]apis.Chunkserver{},\n\t}\n\tetcds, teardown1 := etcd.PrepareSubscribeForTesting(t)\n\tvar teardowns util.MultiTeardown\n\tteardowns.Add(teardown1)\n\tvar allStats []chunkserver.StorageStats\n\tfor i := 0; i < 3; i++ {\n\t\tname := apis.ServerName(fmt.Sprintf(\"cs%d\", i))\n\t\taddress := apis.ServerAddress(fmt.Sprintf(\"cs-address-%d\", i))\n\n\t\tcs, csStats, csTeardown := chunkserver.NewTestChunkserver(t, cache)\n\t\tteardowns.Add(csTeardown)\n\t\tallStats = append(allStats, csStats)\n\t\tcache.Chunkservers[address] = cs\n\n\t\tetcd0, etcdClientTeardown := etcds(name)\n\t\tassert.NoError(t, etcd0.UpdateAddress(address, apis.CHUNKSERVER))\n\t\tteardowns.Add(etcdClientTeardown)\n\t}\n\n\tetcd0, teardown2 := etcds(\"fe0\")\n\tteardowns.Add(teardown2)\n\tfe, err := frontend.ConstructFrontend(etcd0, cache)\n\tassert.NoError(t, err)\n\tmdc0, err := metadatacache.NewCache(cache, etcd0)\n\tassert.NoError(t, err)\n\tcache.MetadataCaches = map[apis.ServerAddress]apis.MetadataCache{\n\t\t\"mdc-address-0\": mdc0,\n\t}\n\tassert.NoError(t, etcd0.UpdateAddress(\"mdc-address-0\", apis.METADATACACHE))\n\n\treturn cache, func() int {\n\t\t\t// TODO: include partial metadata usage in these stats?\n\t\t\tsum := 0\n\t\t\tfor _, statf := range allStats {\n\t\t\t\tsum += statf()\n\t\t\t}\n\t\t\treturn sum\n\t\t}, fe, teardowns.Teardown\n}", "title": "" }, { "docid": "178922e67117372b52c0a26fac96cc2d", "score": "0.44385815", "text": "func setupSubTest(t *testing.T, c *cat.CAT) func(t *testing.T, c *cat.CAT) {\n\t//Place code for common setup for subtest here\n\treturn func(t *testing.T, c *cat.CAT) {\n\t\t//code for common teardown for the subtests\n\t\tif err := c.Teardown(); err != nil {\n\t\t\tt.Fatalf(\"CAT cects cleanup failed: %v\", err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "96abdfecb5131750b02d8ea8f44aed5b", "score": "0.44384247", "text": "func buildSuite() suite {\n\treturn map[string]*testCase{\n\t\t\"if ConfigMap doesn't exist, should create a new one, with data set\": {\n\t\t\texistingConfigMap: nil,\n\t\t\texpConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"1\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t}),\n\t\t\t),\n\t\t},\n\t\t\"if ConfigMap exists, but doesn't include any data, should update with the correct data\": {\n\t\t\texistingConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"1\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(nil),\n\t\t\t),\n\t\t\texpConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"2\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t}),\n\t\t\t),\n\t\t},\n\t\t\"if ConfigMap exists, but doesn't have any labels, should update with the correct label\": {\n\t\t\texistingConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"1\"),\n\t\t\t\tgen.SetConfigMapLabels(nil),\n\t\t\t\tgen.SetConfigMapData(nil),\n\t\t\t),\n\t\t\texpConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"2\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t}),\n\t\t\t),\n\t\t},\n\t\t\"if ConfigMap exists, but the data value is wrong, should update with the correct data\": {\n\t\t\texistingConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"1\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"foo\",\n\t\t\t\t}),\n\t\t\t),\n\t\t\texpConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"2\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t}),\n\t\t\t),\n\t\t},\n\t\t\"if ConfigMap exists, but with extra data keys, should preserve those keys\": {\n\t\t\texistingConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"1\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"bar\": \"bar\",\n\t\t\t\t\t\"123\": \"456\",\n\t\t\t\t}),\n\t\t\t),\n\t\t\texpConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"2\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t\t\"bar\": \"bar\",\n\t\t\t\t\t\"123\": \"456\",\n\t\t\t\t}),\n\t\t\t),\n\t\t},\n\t\t\"if ConfigMap exists, but with wrong label value, should overrite the value\": {\n\t\t\texistingConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"1\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"false\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t}),\n\t\t\t),\n\t\t\texpConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"2\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t}),\n\t\t\t),\n\t\t},\n\t\t\"if ConfigMap exists with exact data, shouldn't update\": {\n\t\t\texistingConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"1\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\t\"foo-bar\": \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t}),\n\t\t\t),\n\t\t\texpConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"2\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t\t\"foo-bar\": \"true\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t}),\n\t\t\t),\n\t\t},\n\t\t\"if ConfigMap exists with extra data, shouldn't update\": {\n\t\t\texistingConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"1\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t\t\"foo\": \"bar\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t\t\"123\": \"456\",\n\t\t\t\t}),\n\t\t\t),\n\t\t\texpConfigMap: gen.ConfigMapFrom(baseConfigMap,\n\t\t\t\tgen.SetConfigMapResourceVersion(\"1\"),\n\t\t\t\tgen.SetConfigMapLabels(map[string]string{\n\t\t\t\t\tIstioConfigLabelKey: \"true\",\n\t\t\t\t\t\"foo\": \"bar\",\n\t\t\t\t}),\n\t\t\t\tgen.SetConfigMapData(map[string]string{\n\t\t\t\t\t\"root-cert.pem\": \"bar\",\n\t\t\t\t\t\"123\": \"456\",\n\t\t\t\t}),\n\t\t\t),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "9cf8751b648a133e6b8308acebcd52ef", "score": "0.44381967", "text": "func init() {\n\tcwd, err := os.Getwd()\n\tif err != nil {\n\t\tlog.Fatalf(\"cannot get current directory: %v\", err)\n\t}\n\ttfvBinary = filepath.Join(cwd, \"..\", \"bin\", \"terraform-validator\")\n\tproject, ok := os.LookupEnv(\"TEST_PROJECT\")\n\tif !ok {\n\t\tlog.Printf(\"Missing required env var TEST_PROJECT. Default (%s) will be used.\", defaultProject)\n\t\tproject = defaultProject\n\t}\n\tcredentials, ok := os.LookupEnv(\"TEST_CREDENTIALS\")\n\tif ok {\n\t\t// Make credentials path relative to repo root rather than\n\t\t// test/ dir if it is a relative path.\n\t\tif !filepath.IsAbs(credentials) {\n\t\t\tcredentials = filepath.Join(cwd, \"..\", credentials)\n\t\t}\n\t} else {\n\t\tlog.Printf(\"missing env var TEST_CREDENTIALS, will try to use Application Default Credentials\")\n\t}\n\tancestry, ok := os.LookupEnv(\"TEST_ANCESTRY\")\n\tif !ok {\n\t\tlog.Printf(\"Missing required env var TEST_ANCESTRY. Default (%s) will be used.\", defaultAncestry)\n\t\tancestry = defaultAncestry\n\t}\n\tproviderVersion := \"1.20\"\n\tif version.TF12 == version.LeastSupportedVersion() {\n\t\tproviderVersion = defaultProviderVersion\n\t}\n\tdata = &testData{\n\t\tTFVersion: version.LeastSupportedVersion(),\n\t\tProvider: map[string]string{\n\t\t\t\"version\": providerVersion,\n\t\t\t\"project\": project,\n\t\t\t\"credentials\": credentials,\n\t\t},\n\t\tProject: map[string]string{\n\t\t\t\"Name\": \"My Project Name\",\n\t\t\t\"ProjectId\": \"my-project-id\",\n\t\t\t\"BillingAccountName\": \"012345-567890-ABCDEF\",\n\t\t},\n\t\tAncestry: ancestry,\n\t}\n}", "title": "" }, { "docid": "475528fb1368fd0167d581ec1e842187", "score": "0.4433845", "text": "func (o ecOptions) init(t *testing.T, proxyURL string) *ecOptions {\n\to.smap = tools.GetClusterMap(t, proxyURL)\n\tif cnt := o.smap.CountActiveTs(); cnt < o.minTargets {\n\t\tt.Skipf(\"not enough targets in the cluster: expected at least %d, got %d\", o.minTargets, cnt)\n\t}\n\tif o.concurrency > 0 {\n\t\to.sema = cos.NewDynSemaphore(o.concurrency)\n\t}\n\to.seed = time.Now().UnixNano()\n\to.rnd = rand.New(rand.NewSource(o.seed))\n\tif o.dataCnt < 0 {\n\t\ttotal := o.smap.CountActiveTs() - 2\n\t\to.parityCnt = total / 2\n\t\to.dataCnt = total - o.parityCnt\n\t}\n\treturn &o\n}", "title": "" }, { "docid": "835a1d35ab05ce78245d3220eeafae06", "score": "0.44335198", "text": "func init() { //nolint\n\ttestSample := TestCase{\n\t\tName: \"should not execute secret queries [E2E-CLI-045]\",\n\t\tArgs: args{\n\t\t\tArgs: []cmdArgs{\n\t\t\t\t[]string{\"scan\", \"-q\", \"../assets/queries\", \"-p\", \"fixtures/samples/terraform.tf\",\n\t\t\t\t\t\"--include-queries\", \"487f4be7-3fd9-4506-a07a-eae252180c08\"},\n\n\t\t\t\t[]string{\"scan\", \"-q\", \"../assets/queries\", \"-p\", \"fixtures/samples/terraform.tf\",\n\t\t\t\t\t\"--include-queries\", \"487f4be7-3fd9-4506-a07a-eae252180c08\",\n\t\t\t\t\t\"--disable-secrets\"},\n\n\t\t\t\t[]string{\"scan\", \"-q\", \"../assets/queries\", \"-p\", \"fixtures/samples/terraform.tf\",\n\t\t\t\t\t\"--include-queries\", \"487f4be7-3fd9-4506-a07a-eae252180c08,e38a8e0a-b88b-4902-b3fe-b0fcb17d5c10\",\n\t\t\t\t\t\"--disable-secrets\"},\n\t\t\t},\n\t\t},\n\t\tWantStatus: []int{50, 0, 20},\n\t}\n\n\tTests = append(Tests, testSample)\n}", "title": "" }, { "docid": "dafd080332d34ca29cd7ddbddb2d1cdb", "score": "0.44191802", "text": "func init() {\n\ttesting.AddTest(&testing.Test{\n\t\tFunc: ShillCellularSimSlots,\n\t\tDesc: \"Verifies that Shill receives SimSlot information from ModemManager and can set the primary sim slot\",\n\t\tContacts: []string{\"stevenjb@google.com\", \"cros-network-health@google.com\", \"chromeos-cellular-team@google.com\"},\n\t\tAttr: []string{\"group:cellular\", \"cellular_sim_dual_active\", \"cellular_ota_avl\"},\n\t\tFixture: \"cellular\",\n\t})\n}", "title": "" }, { "docid": "bdcc4584fa88a323769177ed3cd53f96", "score": "0.4418747", "text": "func (suite *CassandraConnSuite) TestCreateGetAll() {\n\t// Definition stores schema information about an Object\n\tobj := &base.Definition{\n\t\tName: testTableName2,\n\t\tKey: &base.PrimaryKey{\n\t\t\tPartitionKeys: []string{\"id\"},\n\t\t\tClusteringKeys: []*base.ClusteringKey{\n\t\t\t\t{\n\t\t\t\t\tName: \"ck\",\n\t\t\t\t\tDescending: true,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\t// Column name to data type mapping of the object\n\t\tColumnToType: map[string]reflect.Type{\n\t\t\t\"id\": reflect.TypeOf(1),\n\t\t\t\"ck\": reflect.TypeOf(1),\n\t\t\t\"data\": reflect.TypeOf(\"data\"),\n\t\t\t\"name\": reflect.TypeOf(\"name\"),\n\t\t},\n\t}\n\n\t// create the test rows in C*\n\tfor _, row := range testRowsWithCK {\n\t\terr := connector.Create(context.Background(), obj, row)\n\t\tsuite.NoError(err)\n\t}\n\n\t// read the row from C* test table for given keys\n\trows, err := connector.GetAll(context.Background(), obj, keyRow)\n\tsuite.NoError(err)\n\tsuite.Len(rows, 2)\n\n\tfor _, row := range rows {\n\t\tfor _, col := range row {\n\t\t\tif col.Name == \"ck\" {\n\t\t\t\tck := col.Value.(*int)\n\t\t\t\tsuite.True(*ck == 10 || *ck == 20)\n\t\t\t} else if col.Name == \"name\" {\n\t\t\t\ttestStr := \"test\"\n\t\t\t\tsuite.Equal(col.Value, &testStr)\n\t\t\t} else if col.Name == \"data\" {\n\t\t\t\tdata := col.Value.(*string)\n\t\t\t\tsuite.True(*data == \"testdata20\" || *data == \"testdata10\")\n\t\t\t} else {\n\t\t\t\tid := col.Value.(*int)\n\t\t\t\tsuite.Equal(*id, 1)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2badf16f64927e261e47c04eb04fc828", "score": "0.44162098", "text": "func InitTest() *DbWrapper {\n\tdbinfo := fmt.Sprintf(\"user=%s password=%s dbname=%s sslmode=disable\", environment.DB_USER, environment.DB_PASSWORD, environment.DB_NAME)\n\tdatabase, err := sql.Open(\"postgres\", dbinfo)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn &DbWrapper{database}\n}", "title": "" }, { "docid": "560d9b9af9ae98c3c0b38616a0bf9c10", "score": "0.44117153", "text": "func InitSkewTestSuite() storageframework.TestSuite {\n\tsuite := &skewTestSuite{\n\t\ttsInfo: storageframework.TestSuiteInfo{\n\t\t\tName: \"skew\",\n\t\t},\n\t}\n\n\thaveCSIInline := false\n\thaveBlock := false\n\tfor _, volType := range volTypes {\n\t\tfor _, fs := range fsTypes {\n\t\t\tfor _, parameters := range volParameters {\n\t\t\t\tscp := driver.StorageClassParameters{\n\t\t\t\t\tFSType: fs,\n\t\t\t\t\tParameters: parameters,\n\t\t\t\t}\n\t\t\t\tfor _, volMode := range volModes {\n\t\t\t\t\tpattern := storageframework.TestPattern{\n\t\t\t\t\t\tName: driver.EncodeTestPatternName(volType, volMode, scp),\n\t\t\t\t\t\tVolType: volType,\n\t\t\t\t\t\tVolMode: volMode,\n\t\t\t\t\t\tFsType: fs,\n\t\t\t\t\t}\n\t\t\t\t\tif volType == storageframework.CSIInlineVolume {\n\t\t\t\t\t\tif haveCSIInline {\n\t\t\t\t\t\t\t// Only generate a single test pattern for inline volumes\n\t\t\t\t\t\t\t// because we don't want the number of testcases to explode.\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\thaveCSIInline = true\n\t\t\t\t\t}\n\t\t\t\t\tif volMode == v1.PersistentVolumeBlock {\n\t\t\t\t\t\tif haveBlock {\n\t\t\t\t\t\t\t// Same for raw block.\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\thaveBlock = true\n\t\t\t\t\t}\n\t\t\t\t\tsuite.tsInfo.TestPatterns = append(suite.tsInfo.TestPatterns, pattern)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn suite\n}", "title": "" }, { "docid": "4b692fcebffd57deb9889a7d6bf7d548", "score": "0.43929023", "text": "func main() {\n\tvar (\n\t\tfSheetId = flag.String(\"sheetId\", \"\", \"spreadsheetId\")\n\t\tfJunitFile = flag.String(\"junit\", \"\", \"junit file\")\n\t\tfPrNumber = flag.String(\"pr\", \"\", \"PR number\")\n\t\tfJobNumber = flag.String(\"job\", \"\", \"Job number\")\n\t\tfTestTile = flag.String(\"test\", \"\", \"Test title\")\n\t\tfLogFile = flag.String(\"logfile\", \"\", \"Log file including base\")\n\t)\n\n\tflag.Parse()\n\n\tif *fSheetId == \"\" {\n\t\tusage(\"--sheetId is missing\")\n\t}\n\tspreadsheetId := *fSheetId\n\n\tif *fJunitFile == \"\" {\n\t\tusage(\"--junit is missing\")\n\t}\n\tjunitFile := *fJunitFile\n\n\tif *fPrNumber == \"\" {\n\t\tusage(\"--pr is missing\")\n\t}\n\tprNumber := *fPrNumber\n\n\tif *fJobNumber == \"\" {\n\t\tusage(\"--job is missing\")\n\t}\n\tjobNumber := *fJobNumber\n\n\tif *fTestTile == \"\" {\n\t\tusage(\"--test is missing\")\n\t}\n\ttestTitle := *fTestTile\n\n\tif *fLogFile == \"\" {\n\t\tusage(\"--logfile is missing\")\n\t}\n\tlogFile := *fLogFile\n\n\tctx := context.Background()\n\n\tsuites, err := junit.IngestFile(junitFile)\n\tif err != nil {\n\t\tif errors.Is(err, os.ErrNotExist) {\n\t\t\tfmt.Printf(\"junit file %s not found. Exiting\\n\", junitFile)\n\t\t\treturn\n\t\t}\n\t\tpanic(err)\n\t}\n\n\tfor _, suite := range suites {\n\t\tfor _, test := range suite.Tests {\n\t\t\tif test.Error == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tcurrentTime := time.Now()\n\t\t\tdata := []interface{}{\n\t\t\t\t// Date must be set in this format, to be correctly comparable as strings\n\t\t\t\tcurrentTime.Format(\"2006-01-02\"),\n\t\t\t\ttest.Name,\n\t\t\t\ttest.Error.Error(),\n\t\t\t\tprNumber,\n\t\t\t\ttestTitle,\n\t\t\t\tlogFile,\n\t\t\t\tjobNumber,\n\t\t\t}\n\t\t\terr = db.SaveToSheet(ctx, spreadsheetId, data)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"Unable to add data to sheet: %v\", err)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b7defc2dd5e9ca46ca48af6ef55e5acd", "score": "0.43874148", "text": "func TestColumnOptions(t *testing.T) {\n\ts, err := createTestSchema()\n\tif err != nil {\n\t\tt.Fatalf(\"failed building schema: %s\", err)\n\t}\n\tif !s.byName[\"User\"].byName[\"ID\"].PrimaryKey {\n\t\tt.Errorf(\"expected User.ID to be primary key\")\n\t}\n\tif !s.byName[\"User\"].byName[\"ID\"].Scatter {\n\t\tt.Errorf(\"expected scatter option set on User.ID\")\n\t}\n\tif *s.byName[\"Photo\"].byName[\"ID\"].Auto != 10000 {\n\t\tt.Errorf(\"expected auto option starting at 10000 on Photo.ID\")\n\t}\n\tif s.byName[\"Identity\"].byName[\"UserID\"].OnDelete != \"setnull\" {\n\t\tt.Errorf(\"expected ondelete=setnull for Identity.UserID\")\n\t}\n\tif !s.byName[\"Comment\"].byName[\"PhotoStreamID\"].Interleave {\n\t\tt.Errorf(\"expected interleave for Comment.PhotoStreamID\")\n\t}\n\tif s.byName[\"Comment\"].byName[\"PhotoStreamID\"].OnDelete != \"cascade\" {\n\t\tt.Errorf(\"expected ondelete=cascade for Comment.PhotoStreamID\")\n\t}\n\tif s.byName[\"Photo\"].byName[\"Location\"].Index != \"location\" {\n\t\tt.Errorf(\"expected location index on Photo.Location\")\n\t}\n\tif s.byName[\"Photo\"].byName[\"Location\"].Index != \"location\" {\n\t\tt.Errorf(\"expected location index on Photo.Location\")\n\t}\n\tif s.byName[\"PhotoStream\"].byName[\"Title\"].Index != \"fulltext\" {\n\t\tt.Errorf(\"expected full text index on PhotoStream.Title\")\n\t}\n}", "title": "" }, { "docid": "7521fb634fdcd4a303d6d64a30e9cd57", "score": "0.43848625", "text": "func (s *Suite) SetupTest() {\n}", "title": "" }, { "docid": "8ffa2ddcd0a37a1a68ef9a698c22c752", "score": "0.43670022", "text": "func webServerTestSetup(t *testing.T) (*test.Context, *test.Framework) {\n\ttestContext := test.NewContext(t)\n\terr := testContext.InitializeClusterResources(&test.CleanupOptions{TestContext: testContext, Timeout: cleanupTimeout, RetryInterval: cleanupRetryInterval})\n\tif err != nil {\n\t\tdefer testContext.Cleanup()\n\t\tt.Fatalf(\"Failed to initialize cluster resources: %v\", err)\n\t}\n\tt.Log(\"Initialized cluster resources\")\n\tnamespace, err = testContext.GetOperatorNamespace()\n\tname = strings.ToLower(strings.Split(t.Name(), \"/\")[1])\n\tif err != nil {\n\t\tdefer testContext.Cleanup()\n\t\tt.Fatalf(\"Failed to get namespace for testing context '%v': %v\", testContext, err)\n\t}\n\tt.Logf(\"Testing in namespace %s\", namespace)\n\t// get global test variables\n\tframework := test.Global\n\treturn testContext, framework\n}", "title": "" }, { "docid": "bd790c1e24cbbc94a4b376f4b666e805", "score": "0.43642712", "text": "func init() {\n\tsess := session.Must(session.NewSessionWithOptions(session.Options{\n\t\tSharedConfigState: session.SharedConfigEnable,\n\t\tConfig: aws.Config{\n\t\t\tRegion: aws.String(\"us-east-1\"),\n\t\t},\n\t}))\n\n\tsvc := ssm.New(sess)\n\n\tparamsFromAWS := paramsByPath(svc)\n\tparamsByte, _ := json.Marshal(paramsFromAWS)\n\tctx = context.Background()\n\n\tvar err error\n\tclient, err = bigquery.NewClient(ctx, \"first-vision-305321\", option.WithCredentialsJSON(paramsByte))\n\tif err != nil {\n\t\tlog.Fatalf(\"bigquery.NewClient: %v\", err)\n\t}\n\n}", "title": "" }, { "docid": "ec20fc7fa79a231b48c261f802d25342", "score": "0.43636394", "text": "func runTestMain(m *testing.M) int {\n\tisLess, err := test_helpers.IsTarantoolVersionLess(2, 10, 0)\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to extract Tarantool version: %s\", err)\n\t}\n\n\tif isLess {\n\t\tlog.Println(\"Skipping datetime tests...\")\n\t\tisDatetimeSupported = false\n\t\treturn m.Run()\n\t} else {\n\t\tisDatetimeSupported = true\n\t}\n\n\tinstance, err := test_helpers.StartTarantool(test_helpers.StartOpts{\n\t\tInitScript: \"config.lua\",\n\t\tListen: server,\n\t\tUser: opts.User,\n\t\tPass: opts.Pass,\n\t\tWaitStart: 100 * time.Millisecond,\n\t\tConnectRetry: 10,\n\t\tRetryTimeout: 500 * time.Millisecond,\n\t})\n\tdefer test_helpers.StopTarantoolWithCleanup(instance)\n\n\tif err != nil {\n\t\tlog.Printf(\"Failed to prepare test Tarantool: %s\", err)\n\t\treturn 1\n\t}\n\n\treturn m.Run()\n}", "title": "" }, { "docid": "32180bc84e4517f7478909c207357cb1", "score": "0.43594363", "text": "func init() {\n\t// The following are required.\n\tinsertBulkRowsCmd.Flags().StringVarP(&metric, \"metric\", \"m\", \"\", \"The metric to attach to the TSD.\")\n\tinsertBulkRowsCmd.MarkFlagRequired(\"metric\")\n\tinsertBulkRowsCmd.Flags().Float64VarP(&value, \"value\", \"v\", 0.00, \"The value to attach to the TSD.\")\n\tinsertBulkRowsCmd.MarkFlagRequired(\"value\")\n\tinsertBulkRowsCmd.Flags().Int64VarP(&tsv, \"timestamp\", \"t\", 0, \"The timestamp to attach to the TSD.\")\n\tinsertBulkRowsCmd.MarkFlagRequired(\"timestamp\")\n\tinsertBulkRowsCmd.Flags().StringVarP(&iAccessToken, \"access_token\", \"a\", \"\", \"The JWT access token provided with successful authentication\")\n\tinsertBulkRowsCmd.MarkFlagRequired(\"access_token\")\n\tinsertBulkRowsCmd.Flags().StringVarP(&iRefreshToken, \"refresh_token\", \"b\", \"\", \"The JWT refresh token provided with successful authentication\")\n\tinsertBulkRowsCmd.MarkFlagRequired(\"refresh_token\")\n\n\t// The following are optional and will have defaults placed when missing.\n\tinsertBulkRowsCmd.Flags().IntVarP(&port, \"port\", \"p\", 50051, \"The port of our server.\")\n\trootCmd.AddCommand(insertBulkRowsCmd)\n}", "title": "" }, { "docid": "eac87eb7235a4b83ff0b1e1c568a9e4d", "score": "0.43549135", "text": "func (suite *TheSuite) SetUpTest(c *C) {\n\tsuite.tmpdir = c.MkDir()\n}", "title": "" }, { "docid": "8b692c4a943df220a0c2153fa642fa30", "score": "0.43547738", "text": "func New(cfg *Config) (*Suite, error) {\n\tctx := context.Background()\n\ttcOpt, err := cfg.transportDialOption()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\topts := []grpc.DialOption{\n\t\tgrpc.WithUnaryInterceptor(otgrpc.UnaryClientInterceptor()),\n\t\tgrpc.WithStreamInterceptor(otgrpc.StreamClientInterceptor()),\n\t\ttcOpt,\n\t}\n\tif cfg.OAUTH2 != nil {\n\t\thttpClient := &http.Client{Transport: &nethttp.Transport{}}\n\t\tctx := context.WithValue(context.Background(), oauth2.HTTPClient, httpClient)\n\t\tts := &oauth.TokenSource{TokenSource: cfg.OAUTH2.TokenSource(ctx)}\n\t\topts = append(opts, grpc.WithPerRPCCredentials(ts))\n\t}\n\tcc, err := grpc.Dial(cfg.Address, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar descSource grpcurl.DescriptorSource\n\tif cfg.ProtoSetPath != \"\" {\n\t\tpsPath := cfg.getFilePath(cfg.ProtoSetPath)\n\t\tdescSource, err = grpcurl.DescriptorSourceFromProtoSets(psPath)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\trefClient := grpcreflect.NewClient(ctx, reflectpb.NewServerReflectionClient(cc))\n\t\tdescSource = grpcurl.DescriptorSourceFromServer(ctx, refClient)\n\t}\n\ttests, err := cfg.genTests(cc, descSource)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Suite{tests: tests}, nil\n}", "title": "" }, { "docid": "5beb2c12bae9aa3b64e5788ee2814d8e", "score": "0.43547004", "text": "func initSqliteChannelTest() (ComponentSettings, Channel) {\n\ttemp := os.TempDir()\n\tdb := path.Join(temp, \"collect_test_db\")\n\tc := ComponentSettings{\"db\": db}\n\tsqliteChannel := NewSqliteChannel(c)\n\treturn c, sqliteChannel\n}", "title": "" }, { "docid": "484ecc65521e3710a93fab1e45bfb9cb", "score": "0.43505126", "text": "func TestMain(m *testing.M) {\n\tcfg := integration.ClusterConfig{Size: 1}\n\tclus := integration.NewClusterV3(nil, &cfg)\n\tendpoints = []string{clus.Client(0).Endpoints()[0]}\n\tv := m.Run()\n\tclus.Terminate(nil)\n\tif err := testutil.CheckAfterTest(time.Second); err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"%v\", err)\n\t\tos.Exit(1)\n\t}\n\tif v == 0 && testutil.CheckLeakedGoroutine() {\n\t\tos.Exit(1)\n\t}\n\tos.Exit(v)\n}", "title": "" }, { "docid": "5dcd3eccf1b446b99f6202d7760a5a33", "score": "0.43490043", "text": "func (suite *TestBuilderSuite) SetupSuite() {\n\tdao.PrepareTestForPostgresSQL()\n\tsuite.all = []*selector.Candidate{\n\t\t{\n\t\t\tNamespaceID: 1,\n\t\t\tNamespace: \"library\",\n\t\t\tRepository: \"harbor\",\n\t\t\tKind: \"image\",\n\t\t\tTags: []string{\"latest\"},\n\t\t\tDigest: \"latest\",\n\t\t\tPushedTime: time.Now().Unix(),\n\t\t\tLabels: []string{\"L1\", \"L2\"},\n\t\t},\n\t\t{\n\t\t\tNamespaceID: 1,\n\t\t\tNamespace: \"library\",\n\t\t\tRepository: \"harbor\",\n\t\t\tKind: \"image\",\n\t\t\tTags: []string{\"dev\"},\n\t\t\tDigest: \"dev\",\n\t\t\tPushedTime: time.Now().Unix(),\n\t\t\tLabels: []string{\"L3\"},\n\t\t},\n\t}\n\n\tindex2.Register(index2.AlgorithmOR, or.New)\n\tindex.Register(doublestar.Kind, []string{\n\t\tdoublestar.Matches,\n\t\tdoublestar.Excludes,\n\t\tdoublestar.RepoMatches,\n\t\tdoublestar.RepoExcludes,\n\t\tdoublestar.NSMatches,\n\t\tdoublestar.NSExcludes,\n\t}, doublestar.New)\n\tindex.Register(label.Kind, []string{label.With, label.Without}, label.New)\n\tindex3.Register(action.Retain, action.NewRetainAction)\n\n\tsuite.oldClient = dep.DefaultClient\n\tdep.DefaultClient = &fakeRetentionClient{}\n}", "title": "" } ]
7544e4d39b2e0789c309d299644cccd9
NewConsumer constructs a new consumer configuration. The event channel will be passed a collection of rows generated from all of the events in a single block It will be closed by the consumer when it is finished
[ { "docid": "11ed2e8bd7086caa49d626c292e9a627", "score": "0.7073962", "text": "func NewConsumer(cfg *config.VentConfig, log *logging.Logger, eventChannel chan types.EventData) *Consumer {\n\treturn &Consumer{\n\t\tConfig: cfg,\n\t\tLogger: log,\n\t\tEventsChannel: eventChannel,\n\t\tDone: make(chan struct{}),\n\t}\n}", "title": "" } ]
[ { "docid": "7486e2319138c09ee71c88c83c78a785", "score": "0.6627632", "text": "func NewConsumer(channels []<-chan *VersionedData, streamCount int64) *Consumer {\n\tc := &Consumer{\n\t\tdataChannels: channels,\n\t\tstreamCount: streamCount,\n\t\tch: make(chan *VersionedData),\n\t}\n\treturn c\n}", "title": "" }, { "docid": "5b418afcb5cfc422cc1c4d437382f2f5", "score": "0.65407264", "text": "func NewConsumer(nodeID, createTopic, executeTopic string) sarama.ConsumerGroupHandler {\n\treturn &Consumer{\n\t\tnodeID: nodeID,\n\t\tcreateTopic: createTopic,\n\t\texecuteTopic: executeTopic,\n\t}\n}", "title": "" }, { "docid": "70acb77f895535e3a25e0ac8ea7d311a", "score": "0.6408551", "text": "func NewConsumer(conf *tmq.ConfigMap) (*Consumer, error) {\n\tconfStruct, err := configMapToConfig(conf)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer confStruct.destroy()\n\tcConsumer, err := wrapper.TMQConsumerNew(confStruct.cConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconsumer := &Consumer{\n\t\tcConsumer: cConsumer,\n\t}\n\treturn consumer, nil\n}", "title": "" }, { "docid": "19873c59f924cafdaec59c0bfce5c53b", "score": "0.6278697", "text": "func NewConsumer(ring *Buffer, callback func(items []Elem, w Writer) bool, w Writer, sortByPriority bool) *Consumer {\n\tc := &Consumer{\n\t\tring: ring,\n\t\tw: w,\n\t\tconsume: callback,\n\t\tsortByPriority: sortByPriority,\n\t}\n\n\tgo c.run()\n\n\treturn c\n}", "title": "" }, { "docid": "a10d51ca14fbdc63c9e0a3e2c6489406", "score": "0.6150699", "text": "func NewConsumer(brokers, topics []string, groupID string, config *cluster.Config) (*Consumer, error) {\n\t// init consumer\n\tconsumer, err := cluster.NewConsumer(brokers, groupID, topics, config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tlog4go.Debug(\"[consumer] created, brokers:%s, topics:%s, groupID:%v\", brokers, topics, groupID)\n\treturn &Consumer{c: consumer, topics: topics, groupID: groupID, hasFunc: false,\n\t\tcloseStart: make(chan struct{}), closeEnd: make(chan struct{}),\n\t}, nil\n}", "title": "" }, { "docid": "3800514aeab4c034c19e18e9f67a2180", "score": "0.61113465", "text": "func NewConsumer(config *Configuration, connectorHandler connector.Handler,\n\tconnectionHandler ConnectionHandler) *Consumer {\n\tcon := &Consumer{Configuration: config}\n\n\tcon.connectionHandler = connectionHandler\n\tcon.connectorHandler = connectorHandler\n\n\tcon.SetTaskPayloadHandler(connectorHandler.(common.TaskPayloadHandler))\n\n\treturn con\n}", "title": "" }, { "docid": "5c84b29f8dcfd3b9fc9f00d488b83383", "score": "0.6086086", "text": "func NewConsumer(consumer *cluster.Consumer, view func(msg *sarama.ConsumerMessage) error) *Consumer {\n\treturn &Consumer{\n\t\tconsumer: consumer,\n\t\tdoneCh: make(chan struct{}),\n\t\tview: view,\n\t\tmsgs: make(chan *sarama.ConsumerMessage, msgBuffer),\n\t\twg: &sync.WaitGroup{},\n\t\tmux: &sync.Mutex{},\n\t}\n}", "title": "" }, { "docid": "974225725dbac226a284c60d0fcad5fb", "score": "0.6067284", "text": "func New(config Configuration) (*Consumer, error) {\n\trclt, err := dial(config.RedisURL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Consumer{\n\t\trclt: rclt,\n\t\thkey: config.ContexName,\n\t\techan: make(chan error, 1),\n\t\tschan: make(chan bool, 1),\n\t\tLogger: config.Logger,\n\t\tsleepDuration: config.SleepDuration,\n\t\thandler: config.Handler,\n\t}, nil\n}", "title": "" }, { "docid": "ed41366ea7f57d41de7325e4aec07db2", "score": "0.5996374", "text": "func NewConsumer(cfg Config) providers.ConsumerProvider {\n\treturn &consumer{cfg: cfg}\n}", "title": "" }, { "docid": "790b4956d5087c49d3d3edba8e37f4e7", "score": "0.5957988", "text": "func newConsumer(id string, stateProvider state.StateProvider) Consumer {\n\treturn &consumer{\n\t\tid: id,\n\t\tstateProvider: stateProvider,\n\t\tstreams: make(map[string]chan WatchResponse),\n\t\tmutex: &sync.Mutex{},\n\t}\n}", "title": "" }, { "docid": "14fe6c151cd66c59fafb91ab513ee403", "score": "0.5954303", "text": "func NewConsumer(r SizeReaderAt) *Consumer {\n\treturn &Consumer{\n\t\tr: r,\n\t\ti: 0,\n\t\tlimit: r.Size(),\n\t}\n}", "title": "" }, { "docid": "4b1ebcb9dba9256fa5660c785dc958ad", "score": "0.594612", "text": "func NewConsumer(config ConsumerConfig, handler MessageHandler, checkpoint Checkpoint, opts ...ConsumerOption) (*Consumer, error) {\n\tconfig.sanitize()\n\tif err := config.validate(); err != nil {\n\t\treturn nil, errors.Wrap(err, \"invalid kinesis configuration\")\n\t}\n\n\tif handler == nil {\n\t\treturn nil, errors.New(\"invalid handler\")\n\t}\n\n\tc := &Consumer{\n\t\tConsumerOptions: ConsumerOptions{\n\t\t\tcheckpointStrategy: AfterRecordBatch,\n\t\t\titeratorType: IteratorTypeHead,\n\t\t\titerators: make(map[string]ConsumerIterator),\n\t\t},\n\t\tstream: config.Stream,\n\t\tgroup: config.Group,\n\t\tlogger: &dumbLogger{},\n\t\teventLogger: &dumbEventLogger{},\n\t\tstats: ConsumerStats{},\n\t\tstopped: make(chan struct{}),\n\t\tshutdown: make(chan struct{}),\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(&c.ConsumerOptions)\n\t}\n\n\tif c.client == nil {\n\t\tclient, err := NewClient(config.AWS)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to create a kinesis client\")\n\t\t}\n\n\t\tc.client = client\n\t}\n\n\tc.streamWatcher = &streamWatcher{\n\t\tclient: c.client,\n\t\tconfig: config,\n\t\tlogger: c,\n\t\teventLogger: c.eventLogger,\n\t}\n\n\tf := &runnerFactory{\n\t\trunners: sync.Map{},\n\t\tclient: c.client,\n\t\tconfig: config,\n\t\toptions: c.ConsumerOptions,\n\t\tcheckpoint: checkpoint,\n\t\thandler: handler,\n\t\tlogger: c,\n\t\teventLogger: c,\n\t}\n\n\tf.factory = func(shardID string, iteratorConfig ConsumerIterator) Runner {\n\t\treturn &runner{\n\t\t\tclient: f.client,\n\t\t\thandler: f.handler,\n\t\t\tshardID: shardID,\n\t\t\toptions: f.options,\n\t\t\tconfig: f.config,\n\t\t\tcheckpoint: f.checkpoint,\n\t\t\tlogger: f.logger,\n\t\t\teventLogger: f.eventLogger,\n\t\t\tstopped: make(chan struct{}),\n\t\t\titeratorConfig: iteratorConfig,\n\t\t}\n\t}\n\n\tc.runnerFactory = f\n\n\treturn c, nil\n}", "title": "" }, { "docid": "2f7f1d5983d0310d7e3eaaa4ea3b34a8", "score": "0.5905457", "text": "func NewConsumer(r Reader, w Writer, n Notifier) *Consumer {\n\treturn &Consumer{reader: r, writer: w, notifier: n}\n}", "title": "" }, { "docid": "c12bc63ab6272ff18083ac52a2ac1073", "score": "0.5788897", "text": "func NewConsumer(opts *ConsumerOpts) *Consumer {\n\t// Required arguments\n\tif opts.Address == \"\" && opts.Client == nil {\n\t\tpanic(\"A redis client must be provided.\")\n\t}\n\n\tif opts.Queue == \"\" {\n\t\tpanic(\"A queue must be provided.\")\n\t}\n\n\t// Computed properties\n\tvar client *redis.Client\n\tif opts.Client != nil {\n\t\tclient = opts.Client\n\t} else {\n\t\tclient = redis.NewClient(&redis.Options{\n\t\t\tAddr: opts.Address,\n\t\t})\n\t}\n\n\tqueue := newQueue(&queueOpts{\n\t\tName: opts.Queue,\n\t})\n\n\terrors := make(chan error)\n\tid := uuid.Must(uuid.NewV4()).String()\n\tinflightSet := fmt.Sprintf(\"%s:%s\", queue.inflightJobsPrefix, id)\n\tonAbort := &sync.Once{}\n\tprocesses := &sync.WaitGroup{}\n\n\t// Embed Lua scripts\n\tprepScripts()\n\tackJobScript := loadLua(\"/lua/ack_job.lua\")\n\tenqueueScheduledJobsScript := loadLua(\"/lua/enqueue_scheduled_jobs.lua\")\n\tgetJobsScript := loadLua(\"/lua/get_jobs.lua\")\n\tkillJobScript := loadLua(\"/lua/kill_job.lua\")\n\treenqueueActiveJobsScript := loadLua(\"/lua/reenqueue_active_jobs.lua\")\n\treenqueueOrphanedJobsScript := loadLua(\"/lua/reenqueue_orphaned_jobs.lua\")\n\tregisterConsumerScript := loadLua(\"/lua/register_consumer.lua\")\n\tretryJobScript := loadLua(\"/lua/retry_job.lua\")\n\n\treturn &Consumer{\n\t\topts: opts.withDefaults(),\n\n\t\tclient: client,\n\t\tqueue: queue,\n\n\t\terrors: errors,\n\t\tid: id,\n\t\tinflightSet: inflightSet,\n\t\tonAbort: onAbort,\n\t\tprocesses: processes,\n\n\t\tackJobScript: ackJobScript,\n\t\tenqueueScheduledJobsScript: enqueueScheduledJobsScript,\n\t\tgetJobsScript: getJobsScript,\n\t\tkillJobScript: killJobScript,\n\t\treenqueueActiveJobsScript: reenqueueActiveJobsScript,\n\t\treenqueueOrphanedJobsScript: reenqueueOrphanedJobsScript,\n\t\tregisterConsumerScript: registerConsumerScript,\n\t\tretryJobScript: retryJobScript,\n\t}\n}", "title": "" }, { "docid": "ac601ac3c049ba3e05cc74dadbbfc973", "score": "0.5784813", "text": "func (r *RabbitMQ) NewConsumer(e Exchange, q Queue, bo BindingOptions, co ConsumerOptions) (*Consumer, error) {\n\trmq, err := r.Connect()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// getting a channel\n\tchannel, err := r.conn.Channel()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc := &Consumer{\n\t\tRabbitMQ: rmq,\n\t\tchannel: channel,\n\t\tdone: make(chan error),\n\t\tsession: Session{\n\t\t\tExchange: e,\n\t\t\tQueue: q,\n\t\t\tConsumerOptions: co,\n\t\t\tBindingOptions: bo,\n\t\t},\n\t}\n\n\terr = c.connect()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "5cf1ee95916f4a19f85f4f30a749c873", "score": "0.57769406", "text": "func New(face iface.Face, cfg Config) (c *Consumer, e error) {\n\tif e := cfg.Validate(); e != nil {\n\t\treturn nil, e\n\t}\n\n\tsocket := face.NumaSocket()\n\tc = &Consumer{\n\t\tcfg: cfg,\n\t\tsocket: socket,\n\t\trxC: eal.Zmalloc[C.TgcRx](\"TgcRx\", C.sizeof_TgcRx, socket),\n\t\ttxC: eal.Zmalloc[C.TgcTx](\"TgcTx\", C.sizeof_TgcTx, socket),\n\t}\n\n\tif e := c.rxQueue().Init(cfg.RxQueue, socket); e != nil {\n\t\tmust.Close(c)\n\t\treturn nil, fmt.Errorf(\"error initializing RxQueue %w\", e)\n\t}\n\n\tc.txC.face = (C.FaceID)(face.ID())\n\tc.txC.interestMp = (*C.struct_rte_mempool)(ndni.InterestMempool.Get(socket).Ptr())\n\tpcg32.Init(unsafe.Pointer(&c.txC.trafficRng))\n\tpcg32.Init(unsafe.Pointer(&c.txC.nonceRng))\n\n\tc.rx = &worker{\n\t\tThreadWithCtrl: ealthread.NewThreadWithCtrl(\n\t\t\tcptr.Func0.C(C.TgcRx_Run, c.rxC),\n\t\t\tunsafe.Pointer(&c.rxC.ctrl),\n\t\t),\n\t}\n\tc.tx = &worker{\n\t\tThreadWithCtrl: ealthread.NewThreadWithCtrl(\n\t\t\tcptr.Func0.C(C.TgcTx_Run, c.txC),\n\t\t\tunsafe.Pointer(&c.txC.ctrl),\n\t\t),\n\t}\n\n\tc.txC.burstInterval = C.TscDuration(eal.ToTscDuration(\n\t\tcfg.Interval.DurationOr(nnduration.Nanoseconds(defaultInterval)) * iface.MaxBurstSize))\n\tif e := c.initPatterns(); e != nil {\n\t\tmust.Close(c)\n\t\treturn nil, fmt.Errorf(\"error setting patterns %w\", e)\n\t}\n\n\tc.ClearCounters()\n\treturn c, nil\n}", "title": "" }, { "docid": "cc47644cfa06e2eef8a304e5669730d5", "score": "0.57472765", "text": "func NewConsumer(endpoints []string, watchPath string) *Consumer {\n\tcfg := etcdv3.Config{\n\t\tEndpoints: endpoints,\n\t\tDialTimeout: dialTimeout,\n\t}\n\n\tcli, err := etcdv3.New(cfg)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn nil\n\t}\n\n\tc := &Consumer{\n\t\tpath: watchPath,\n\t\tetcdAddr: endpoints,\n\t\tproviders: make(map[string]*Provider),\n\t\tclient: cli,\n\t}\n\n\tgo c.start()\n\tgo c.listen()\n\n\treturn c\n}", "title": "" }, { "docid": "a3cf1d5a4b2d7e7bba3f3d473f2749cb", "score": "0.56690884", "text": "func NewConsumer(addrs []string, topics []string, config *Config, options ...Option) (*Consumer, error) {\n\tclient, err := NewClient(addrs, config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconsumer, err := NewConsumerFromClient(client, topics, options...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconsumer.ownClient = true\n\treturn consumer, nil\n}", "title": "" }, { "docid": "d6e6480832cebf3df0ebc1a7ee51abf3", "score": "0.5656338", "text": "func NewConsumer(brokers string, poll bool) *kafka.Consumer {\n\tconsumer, err := kafka.NewConsumer(&kafka.ConfigMap{\n\t\t\"bootstrap.servers\": brokers,\n\t\t\"group.id\": fmt.Sprintf(\"group-%d\", rand.Intn(10000)),\n\t\t\"session.timeout.ms\": 10000,\n\t\t\"go.events.channel.enable\": !poll,\n\t\t\"go.application.rebalance.enable\": false,\n\t\t\"enable.auto.commit\": false,\n\t\t\"default.topic.config\": kafka.ConfigMap{\"auto.offset.reset\": \"earliest\"},\n\t})\n\tif err != nil {\n\t\tlog.WithError(err).Panic(\"Unable to start the consumer\")\n\t}\n\n\ttopic := viper.GetString(\"kafka.topic\")\n\terr = consumer.SubscribeTopics([]string{topic}, nil)\n\tif err != nil {\n\t\tlog.WithError(err).Panic(\"Unable to subscribe to the topic\")\n\t}\n\treturn consumer\n}", "title": "" }, { "docid": "1b0a9151063a138f8fc24efb532fc922", "score": "0.5604001", "text": "func (c *client) NewConsumer(config *kafka.ConsumerConfig, consumerOpts ...ConsumerOption) (kafka.Consumer, error) {\n\treturn newConsumerBuilder(config, c.resolver, c.tally, c.logger, consumerOpts...).build()\n}", "title": "" }, { "docid": "25d3cd95cf8afca3ded610480313623a", "score": "0.5562791", "text": "func NewConsumer(client *Client, config *ConsumerConfig) (*Consumer, error) {\n\t// Check that we are not dealing with a closed Client before processing any other arguments\n\tif client.Closed() {\n\t\treturn nil, ErrClosedClient\n\t}\n\n\tif config == nil {\n\t\tconfig = NewConsumerConfig()\n\t}\n\n\tif err := config.Validate(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tc := &Consumer{\n\t\tclient: client,\n\t\tconfig: *config,\n\t\tchildren: make(map[string]map[int32]*PartitionConsumer),\n\t\tbrokerConsumers: make(map[*Broker]*brokerConsumer),\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "bfa646b0fd7d6040fe810772951195f3", "score": "0.5535476", "text": "func NewConsumer(consumerGroupName, topic, zkAddress string) (Consumer, error) {\n\tc := Consumer{}\n\n\tif consumerGroupName == \"\" {\n\t\treturn c, fmt.Errorf(\" consumer group name cannot be empty\")\n\t}\n\n\tc = Consumer{\n\t\tConsumerGroupName: consumerGroupName,\n\t\tZkAddress: zkAddress,\n\t\tTopic: topic,\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "c196a4587c7d6c1b68212a883adc73a5", "score": "0.55271655", "text": "func NewConsumer(jobHandler JobHandler) *Drift {\n\treturn &Drift{\n\t\tjobHandler: jobHandler,\n\t\tchanelHandler: make(map[string]JobHandler),\n\t\tconsumers: make(map[string][]*nsq.Consumer),\n\t}\n}", "title": "" }, { "docid": "4408844f1b6de372768e3dbf0872a43c", "score": "0.5525563", "text": "func NewConsumer(\n\tqueueLogger *log.Logger,\n\tch *amqp.Channel,\n\tuserDBManager *user.DBManager,\n\tuserRedisManager *user.RedisManager,\n\tfriendRedisManager *RedisManager,\n\tcliqueDBManager *DBManager,\n\ttieStrengthPublisher *TieStrengthPublisher,\n) *Consumer {\n\tqueue, err := ch.QueueDeclare(\n\t\t\"community-detection\", // name\n\t\ttrue, // durable\n\t\tfalse, // delete when unused\n\t\tfalse, // exclusive\n\t\tfalse, // no-wait\n\t\tnil, // arguments\n\t)\n\tutils.FailOnError(err, \"Failed to declare a queue\")\n\treturn &Consumer{\n\t\tlogger: queueLogger,\n\t\tchannel: ch,\n\t\tqueue: queue,\n\t\tuserDB: userDBManager,\n\t\tuserRedis: userRedisManager,\n\t\tfriendRedis: friendRedisManager,\n\t\tcliqueDB: cliqueDBManager,\n\t\ttieStrengthPublisher: tieStrengthPublisher,\n\t}\n}", "title": "" }, { "docid": "8ac6647aee889715d95829e77547a36f", "score": "0.55135524", "text": "func IngestConsumerNew(w *websocket.Conn, q chan bool, l *RingoExpLogger, swg *sync.WaitGroup) *IngestConsumer {\n\treturn &IngestConsumer{\n\t\tIngestNew(w, q, l, swg),\n\t}\n}", "title": "" }, { "docid": "030023fd4de7c273a986f2b2c3a28bd4", "score": "0.55098933", "text": "func NewConsumer(conn *amqp.Connection, exchangeName string) (Consumer, error) {\n\tconsumer := Consumer{\n\t\tconn: conn,\n\t}\n\terr := consumer.setup(exchangeName)\n\tif err != nil {\n\t\treturn Consumer{exchangeName: exchangeName}, err\n\t}\n\n\treturn consumer, nil\n}", "title": "" }, { "docid": "e49ba47661ecbef3d8cf5e98ebab8832", "score": "0.5509208", "text": "func New(opts ...Option) (*Consumer, error) {\n\tc := &Consumer{}\n\n\tfor _, opt := range opts {\n\t\tif err := opt(c); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif err := c.validate(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := c.init(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "ea713e7a4f7bf6bd3bf5f868983610c3", "score": "0.5503051", "text": "func NewConsumer(custom *ConsumerCustomConfig) (*cluster.Consumer, error) {\n\tconf, err := NewConsumerConfig(custom)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn cluster.NewConsumer(\n\t\tcustom.Address,\n\t\tcustom.ConsumerGroup,\n\t\tcustom.Topics,\n\t\tconf)\n}", "title": "" }, { "docid": "6b45cf05f6401848d7c372b54e733081", "score": "0.5477262", "text": "func (p *KafkaPipe) NewConsumer(topic string) (Consumer, error) {\n\tl := log.WithFields(log.Fields{\"topic\": topic})\n\n\tl.Debugf(\"Registering consumer\")\n\n\tp.lock.Lock()\n\tdefer p.lock.Unlock()\n\n\t/*First consumer - initialize map, kafka consumer and state*/\n\tif p.saramaConsumer == nil {\n\t\tif err := p.Init(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t/*First consumer of this topic. Initialize*/\n\tif c := p.consumers[topic]; c == nil {\n\t\terr := p.initTopicConsumer(topic, l)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif len(p.consumers[topic].consumers) >= len(p.consumers[topic].partitions) {\n\t\treturn nil, fmt.Errorf(\"number of consumers(%v) should be less or eqaul to the number of partitions(%v)\", len(p.consumers[topic].consumers)+1, len(p.consumers[topic].partitions))\n\t}\n\n\t//FIXME: Can't use buffered channel here, because in the case, when one of\n\t//the consumer closes, messages, which are in the buffer, will be lost\n\tch := make(chan *sarama.ConsumerMessage)\n\t//ch := make(chan *sarama.ConsumerMessage, p.batchSize)\n\tp.consumers[topic].consumers = append(p.consumers[topic].consumers, ch)\n\n\tp.redistributeConsumers(p.consumers[topic])\n\n\tkc := &kafkaConsumer{pipe: p, topic: topic, ch: ch, log: l}\n\n\tkc.initBaseConsumer(kc.fetchNext)\n\n\tlog.Debugf(\"Registered consumer %v\", topic)\n\n\treturn kc, nil\n}", "title": "" }, { "docid": "fdf62aa19ea6e62b42ec10eba80a6332", "score": "0.547306", "text": "func (builder channelHandlerBuilder) createConsume() amqpmiddleware.HandlerConsume {\n\t// capture the channel into the closure\n\tchannel := builder.channel\n\t// Capture the event middleware in this closure.\n\teventMiddleware := builder.middlewares.consumeEvents\n\n\thandler := func(\n\t\tctx context.Context, args amqpmiddleware.ArgsConsume,\n\t) (results amqpmiddleware.ResultsConsume, err error) {\n\t\tcallArgs := &consumeArgs{\n\t\t\tqueue: args.Queue,\n\t\t\tconsumer: args.Consumer,\n\t\t\tautoAck: args.AutoAck,\n\t\t\texclusive: args.Exclusive,\n\t\t\tnoLocal: args.NoLocal,\n\t\t\tnoWait: args.NoWait,\n\t\t\targs: args.Args,\n\t\t\t// Make a buffered channel so we don'tb cause latency from waiting for queues\n\t\t\t// to be ready\n\t\t\tcallerDeliveryChan: make(chan internal.Delivery, 16),\n\t\t}\n\n\t\t// Create our consumer relay\n\t\trelay := newConsumeRelay(callArgs, channel, eventMiddleware)\n\n\t\t// Pass it to our relay handler.\n\t\tchannel.eventRelaySetupAndLaunch(relay)\n\n\t\tresults.DeliveryChan = callArgs.callerDeliveryChan\n\t\t// If no error, pass the channel back to the caller\n\t\treturn results, nil\n\t}\n\n\tfor _, middleware := range builder.middlewares.consume {\n\t\thandler = middleware(handler)\n\t}\n\n\treturn handler\n}", "title": "" }, { "docid": "f2947cf95cd15e80c1974c9894482b56", "score": "0.5379665", "text": "func NewConsumer(appName, streamName string) *Consumer {\n\tsvc := kinesis.New(session.New())\n\n\treturn &Consumer{\n\t\tappName: appName,\n\t\tstreamName: streamName,\n\t\tsvc: svc,\n\t}\n}", "title": "" }, { "docid": "2ca0880d08a77f8c8f33d407f4cd9355", "score": "0.53384066", "text": "func NewConsumer(params PubSubParams) *Client {\n\tvar (\n\t\tclt = new(Client)\n\t)\n\tclt.ctx, clt.cancel = context.WithCancel(params.GetContext())\n\treturn clt.BindBroker(params.GetBrokerCfg().createBroker())\n}", "title": "" }, { "docid": "ffdf28098ed90d9c4ad73d6ffc9dad57", "score": "0.5318921", "text": "func NewConcurrentConsumer(\n\tgroup string, namesrvAddrs []string, userConsumer ConcurrentlyConsumer, logger log.Logger,\n) (\n\tpc *PushConsumer, err error,\n) {\n\tpc = newPushConsumer(group, namesrvAddrs, logger)\n\n\tpc.consumerServiceBuilder = func() (consumerService, error) {\n\t\treturn newConsumeConcurrentlyService(concurrentlyServiceConfig{\n\t\t\tconsumeServiceConfig: consumeServiceConfig{\n\t\t\t\tgroup: group,\n\t\t\t\tlogger: logger,\n\t\t\t\tmessageSendBack: pc,\n\t\t\t\toffseter: pc.offseter,\n\t\t\t},\n\t\t\tconsumeTimeout: pc.ConsumeTimeout,\n\t\t\tconsumer: userConsumer,\n\t\t\tbatchSize: pc.BatchSize,\n\t\t})\n\t}\n\treturn\n}", "title": "" }, { "docid": "8f8f71e1fb7890db468a1315ce9f30e4", "score": "0.531509", "text": "func NewConsumer(host, user, origin string, intent core.Intent) (*Consumer, error) {\n\tc, err := NewClient(host, user)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Error creating a new consumer\")\n\t}\n\n\tqueueName := composeQueueName(origin, intent)\n\tkeyPattern := composeTopicExchangePattern(intent)\n\n\tif err = c.Register(string(intent), queueName, keyPattern); err != nil {\n\t\treturn nil, errors.Wrap(err, \"Error registering queue\")\n\t}\n\tconsumerName := composeConsumerName(origin, intent)\n\tlog.Println(\"Initializing the Queue Consumer... | Name:\", consumerName, \"| Queue:\", queueName)\n\treturn &Consumer{\n\t\tclient: c,\n\t\tname: consumerName,\n\t\tqueueName: queueName,\n\t}, nil\n}", "title": "" }, { "docid": "fda259877e631ce61dff216050ce50ed", "score": "0.5225404", "text": "func NewConsumerConfig() *ConsumerConfig {\n\treturn &ConsumerConfig{\n\t\tMinFetchSize: 1,\n\t\tMaxWaitTime: 250 * time.Millisecond,\n\t}\n}", "title": "" }, { "docid": "a1c4a98f77009ebfa9a26dcd479c5645", "score": "0.52085054", "text": "func consumer(conQueue string) {\n\tconn, err := amqp.Dial(\"amqp://rabbitmq:rabbitmq@localhost:5672/\")\n\tfailOnError(err, \"Failed to connect to RabbitMQ\")\n\tdefer conn.Close()\n\n\tch, err := conn.Channel()\n\tfailOnError(err, \"Failed to open a channel\")\n\tdefer ch.Close()\n\n\tq, err := ch.QueueDeclare(\n\t\tconQueue, // name\n\t\ttrue, // durable\n\t\ttrue, // delete when usused\n\t\tfalse, // exclusive\n\t\tfalse, // no-wait\n\t\tnil, // arguments\n\t)\n\tfailOnError(err, \"Failed to declare a queue\")\n\n// set QoS\n\terr = ch.Qos(\n\t\t1,\t\t//prefetch count\n\t\t0,\t\t//prefetch size\n\tfalse,\t\t//global\n\t)\n\tfailOnError(err, \"Failed to set QoS\")\n\n\t// get messages\n\tmsgs, err := ch.Consume( //kann alleine verwendet werden, da derzeit nach dem Konsumieren der Nachrichten diese gelöscht werden (bei persistenter Speicherung führt das zu Fehlerhaften Messungen)\n\t\tq.Name, // queue\n\t\t\"\", // consumer\n\t\ttrue, // auto-ack\n\t\tfalse, // exclusive\n\t\tfalse, // no-local\n\t\tfalse, // no-wait\n\t\tnil, // args\n\t)\n\n\ti := 0\n\tfor d := range msgs {\n\t\tmessageReceivedTime := time.Now().UnixNano() // --> wenn die Zeit hier genommen wird, wird die Laufzeit der Forschleife mit eingerechnet\n\t\tcsvStruct.ConsumeTimeStamps[i] = strconv.FormatInt(messageReceivedTime, 10)\n\n\t\tif i < (messages) {\n\t\t\tif i == 0 {\n\t\t\t\tlog.Printf(\"Received message %d with CorrID: %s\", i, d.CorrelationId)\n\t\t\t}\n\t\t\t// log.Printf(\"CorrID of Message %d: %s\", i, d.CorrelationId)\n\t\t\t// log.Printf(\"Received a message: %s\", d.Body)\n\t\t\t// println()\n\n\t\t\tvar jsonRecord structs.MyInfo\n\t\t\tvar endTime int64\n\t\t\t// fmt.Println(jsonRecord.TheTime)\n\n\t\t\t// check compressionType\n\t\t\tswitch compressionType {\n\t\t\tcase \"json\":\n\t\t\t\t// println(string(msg.Value))// --> falche Zeiten kommen hier bereits an !!!!!\n\t\t\t\t// startTime := time.Now().UnixNano()\n\t\t\t\tjson.Unmarshal(d.Body, &jsonRecord)\n\t\t\t\tendTime = time.Now().UnixNano()\n\t\n\t\t\tcase \"avro\":\n\t\t\t\t// println(string(msg.Value)) // --> falche Zeiten kommen hier bereits an !!!!!\n\t\t\t\tjsonRecord,endTime = encoding.DecodeAvro(0, i, d.Body)\n\t\t\tcase \"proto\":\n\t\t\t\t// println(string(msg.Value)) // --> falche Zeiten kommen hier bereits an !!!!!\n\t\t\t\tjsonRecord,endTime = encoding.DecodeProto(0, i, d.Body)\n\t\t\t}\n\n\t\t\t// write decodingTime\n\t\t\tduration:= endTime - messageReceivedTime\n\t\t\tdurationMs := float64(duration) / float64(1000000) //Nanosekunden in Milisekunden\n\t\t\tcsvStruct.DecodingTime[0][i] = strconv.FormatFloat(durationMs, 'f', 6, 64)\t\n\n\t\t\ttimevalue, err := strconv.ParseInt(jsonRecord.TheTime, 10, 64)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(\"%s\", err)\n\t\t\t}\n\t\t\t// set sessionStartTime (Time the first message (i==0) was send)\n\t\t\tif i == 0 {\n\t\t\t\tsessionStarttime = timevalue\n\t\t\t}\n\n\t\t\t// currenttime:= int64(messageReceivedTime)\n\t\t\t// fmt.Println(\"Current Time: \",messageReceivedTime)\n\n\t\t\tduration = messageReceivedTime - timevalue\n\t\t\tdurationMs = float64(duration) / float64(1000000) //Nanosekunden in Milisekunden\n\n\t\t\tcsvStruct.ConsumeTime[csvStruct.CountProdCon][i] = strconv.FormatFloat(durationMs, 'f', 6, 64)\n\t\t\t// completeTime = completeTime + durationMs\n\n\t\t\t// compute complete time\n\t\t\t// correct the complete time --> complete time for sending and receiving != sum(sendtime + receivetime of all messages)\n\t\t\tsessionEndtime := time.Now().UnixNano()\n\t\t\tsessionEndtimeMS := float64(sessionEndtime) / float64(1000000) //Nanosekunden in Milisekunden\n\t\t\tsessionStarttimeMS := float64(sessionStarttime) / float64(1000000) //Nanosekunden in Milisekunden\n\t\t\tsendReceiveDuration := sessionEndtimeMS - sessionStarttimeMS\n\t\t\tcsvStruct.CompleteTime = sendReceiveDuration\n\n\t\t\t// fmt.Printf(\"Duration of Message: %d \\n\", duration)\n\t\t\t// fmt.Printf(\"Duration of Message in ms: %f \\n\", durationMs)\n\t\t\t// fmt.Printf(\"CompleteTime: %f \\n\", completeTime)\n\n\t\t\t// println()\n\n\t\t\ti = i + 1\n\t\t}\n\t\tif i == (messages) {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tfailOnError(err, \"Failed to register a consumer\")\n\tfmt.Printf(\"Set finishedconsuming \\n\")\n\tfinishedconsumtion <- true\n}", "title": "" }, { "docid": "74a9d0b48f51205b97902edbd217685d", "score": "0.5205108", "text": "func (em *Manager) makeConsumers() {\n\tem.ch = make(chan Event, em.ChannelSize)\n\n\t// make event consumers\n\tfor i := 0; i < em.ConsumerNum; i++ {\n\t\tem.wg.Add(1)\n\n\t\tgo func() {\n\t\t\tdefer func() {\n\t\t\t\tif err := recover(); err != nil {\n\t\t\t\t\tem.err = fmt.Errorf(\"async consum event error: %v\", err)\n\t\t\t\t}\n\t\t\t\tem.wg.Done()\n\t\t\t}()\n\n\t\t\t// keep running until channel closed\n\t\t\tfor e := range em.ch {\n\t\t\t\t_ = em.FireEvent(e) // ignore async fire error\n\t\t\t}\n\t\t}()\n\t}\n}", "title": "" }, { "docid": "c542dfebb3bb703068a65e7adefba4ba", "score": "0.5175933", "text": "func MakeConsumer(brokers []string) (cstruct *Consumer) {\n\tconfiguration := sarama.NewConfig() // Create a config file to determine client attributes such as SASL\n\tconfiguration.Consumer.Return.Errors = true\n\n\tconsumer, err := sarama.NewConsumer(brokers, configuration)\n\n\tcstruct = &Consumer{\n\t\tParent: consumer,\n\t}\n\n\tif err != nil {\n\t\tfmt.Println(\"ERROR: Failed to start consumer.\")\n\t}\n\n\treturn cstruct\n}", "title": "" }, { "docid": "b70c8aad5874557ad232633693e2a6d1", "score": "0.51677", "text": "func PrepareChannel(consumer *kafka.Consumer, numMessages int) func() {\n\tlog.Infof(\"Preparing to receive %d messages\", numMessages)\n\treturn func() {\n\t\tvar counter = 0\n\t\tfor counter < numMessages {\n\t\t\tselect {\n\t\t\tcase ev := <-consumer.Events():\n\t\t\t\tswitch ev.(type) {\n\t\t\t\tcase *kafka.Message:\n\t\t\t\t\tcounter++\n\t\t\t\tcase kafka.PartitionEOF:\n\t\t\t\t\tlog.Panic(\"Reached Partition EOF: %v\", ev)\n\t\t\t\tcase kafka.Error:\n\t\t\t\t\tlog.WithError(ev.(kafka.Error)).Panic(\"Unable to consume the message\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tlog.Infof(\"Consumed %d messages successfully...\", counter)\n\t}\n}", "title": "" }, { "docid": "649072827f3825a725294e23fbcf01be", "score": "0.5135402", "text": "func NewConsumer1(sel int, in <-chan Packet,\n\tdelay time.Duration) *Consumer1 {\n\n\tc := &Consumer1{sel: sel, in: in, delay: delay}\n\tc.end = make(chan int)\n\tgo c.run()\n\treturn c\n}", "title": "" }, { "docid": "643e0bb839f4458cdc33fca5eb5c4de8", "score": "0.5135323", "text": "func NewConsumer(mock string) (*Consumer, error) {\n\tif mock == \"init_err\" {\n\t\treturn nil, errors.New(mock)\n\t}\n\n\treturn &Consumer{Mock: mock, Stats: info.Consumer{Bus: \"nop\"}}, nil\n}", "title": "" }, { "docid": "7c550a25ee6c82d10ab61515fd2e03b0", "score": "0.5084186", "text": "func (kc SaramaKafkaClient) createConsumerMessageChannel(consumer sarama.Consumer, sourceTopic string) <-chan *sarama.ConsumerMessage {\n\tkc.Logger.Debug(fmt.Sprintf(\"Finding partitions for source topic '%s'...\", sourceTopic))\n\tpartitionList := kc.getConsumerPartitions(consumer, sourceTopic)\n\tkc.Logger.Trace(fmt.Sprintf(\"Found %d partitions!\", len(partitionList)))\n\n\t// Channel to publish messages to\n\tmessageChan := make(chan *sarama.ConsumerMessage, 256)\n\n\tfor index, partition := range partitionList {\n\t\tkc.Logger.Trace(fmt.Sprintf(\"Consuming from partition %d [%d] from source topic '%s'...\", index, partition, sourceTopic))\n\t\tpc, err := consumer.ConsumePartition(sourceTopic, partition, sarama.OffsetOldest)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tgo kc.consumeMessage(pc, messageChan)\n\t}\n\n\treturn messageChan\n}", "title": "" }, { "docid": "af6da702a0bd2113a720fb2adc7196ca", "score": "0.50800794", "text": "func consume() {\n\t// catch the signals as soon as possible\n\tshutdown := make(chan os.Signal, 1)\n\tsignal.Notify(shutdown, os.Interrupt) // a.k.a ctrl+C\n\n\tconf := &kafka.ConfigMap{\n\t\t\"group.id\": \"KafkaGroupID\",\n\t\t\"bootstrap.servers\": \"localhost:9092\",\n\t\t\"session.timeout.ms\": 6000,\n\t\t\"auto.offset.reset\": \"earliest\",\n\t}\n\n\t// start_consumer_handler OMIT\n\ttopic := \"my-topic\"\n\tc, err := events.NewKafkaConsumer(\n\t\tevents.NewKafkaConsumerConfig(conf),\n\t\t[]string{topic},\n\t\tevents.HandlerFunc( // HL\n\t\t\tfunc(ctx context.Context, e events.Event) error { // HL\n\t\t\t\tlog.Printf(\"consumed event: %s\", e.Payload) // HL\n\t\t\t\treturn nil // HL\n\t\t\t}))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tlog.Printf(\"starting to consume events from %s, press CTRL+C to exit\", topic)\n\tc.Run(time.Second) // HL_run\n\n\t<-shutdown // HL_shutdown\n\tif err = c.Shutdown(context.Background()); err != nil { // HL_shutdown\n\t\tlog.Printf(\"Shutdown error: %v\", err)\n\t\tos.Exit(1)\n\t}\n\tlog.Printf(\"Shutdown successfully\")\n\t// end_consumer_handler OMIT\n\n}", "title": "" }, { "docid": "0671b20fa4164ffe2050a6102acdaa04", "score": "0.50600564", "text": "func InitConsumer(topic string) chan []byte {\n\tconsumer, err := bus.StartConsumer(topic)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\treturn consumer\n}", "title": "" }, { "docid": "2b8bef01ed7ac63f545e238a6f09dac9", "score": "0.50584453", "text": "func (rs *RabbitService) CreateConsumers(consumerConfigs map[string]*models.ConsumerConfig) error {\n\n\tfor consumerName, consumerConfig := range consumerConfigs {\n\n\t\tconsumer, err := consumer.NewConsumerFromConfig(consumerConfig, rs.ChannelPool)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\thostName, err := os.Hostname()\n\t\tif err == nil {\n\t\t\tconsumer.ConsumerName = hostName + \"-\" + consumer.ConsumerName\n\t\t}\n\n\t\trs.consumers[consumerName] = consumer\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "13989aadd40a05dce73e63da8e024612", "score": "0.5056293", "text": "func newConfigEventSink(sender events.EventSender) *configEventSink {\n\treturn &configEventSink{\n\t\teventSender: sender,\n\t}\n}", "title": "" }, { "docid": "0feb44be513cd68caee203aa56d5dbe0", "score": "0.5037972", "text": "func (c *Dialer) Consumer(opts ...consumer.Option) (*consumer.Consumer, error) {\n\topts = append([]consumer.Option{\n\t\tconsumer.WithLogger(c.logger),\n\t\tconsumer.WithContext(c.ctx),\n\t}, opts...)\n\n\treturn NewConsumer(c.ConnectionCh(), opts...)\n}", "title": "" }, { "docid": "f2689be3c19ea3ccc96c53287e0bf328", "score": "0.50039506", "text": "func (r *Rabbids) CreateConsumers() ([]*Consumer, error) {\n\tvar consumers []*Consumer\n\n\tfor name, cfg := range r.config.Consumers {\n\t\tconsumer, err := r.newConsumer(name, cfg)\n\t\tif err != nil {\n\t\t\treturn consumers, err\n\t\t}\n\n\t\tconsumers = append(consumers, consumer)\n\t}\n\n\treturn consumers, nil\n}", "title": "" }, { "docid": "ba5a73492175af71df218f0d251daf44", "score": "0.49896577", "text": "func NewConsumer(brokers []string, topic string, s docStore) *consumer {\n\tr := kafka.NewReader(kafka.ReaderConfig{\n\t\tBrokers: brokers,\n\t\tTopic: topic,\n\t})\n\tr.SetOffset(0)\n\n\treturn &consumer{r, s}\n}", "title": "" }, { "docid": "fc2a98db95f085e839fbbb5a39f50ceb", "score": "0.49588794", "text": "func (q *MPMCcGo) MultipleConsumers() {}", "title": "" }, { "docid": "414150caab16a313cb3698ee7932e5bb", "score": "0.4953843", "text": "func newSingleConsumer(client sarama.Client) *singleConsumer {\n\treturn &singleConsumer{\n\t\tclient: client,\n\t\tsignal: make(chan struct{}, 1),\n\t}\n}", "title": "" }, { "docid": "a7edfd98b18ee4a4f973d0ae904ce13e", "score": "0.49361843", "text": "func NewEventChan(size int) interface{} {\n\treturn &engine.RecordChannel{In: make(chan *engine.Record, size)}\n}", "title": "" }, { "docid": "b75b53758d002e62ab6b1b267318f767", "score": "0.4929548", "text": "func NewConsumer() *rpc.Client {\n\treturn rpc.NewClient(rwCloser{os.Stdin, os.Stdout})\n}", "title": "" }, { "docid": "5c04f517f484415eacd5ee21557512d6", "score": "0.49252796", "text": "func (rb *RowBuffer) ConsumerClosed() {\n\tstatus := execinfra.ConsumerStatus(atomic.LoadUint32((*uint32)(&rb.ConsumerStatus)))\n\tif status == execinfra.ConsumerClosed {\n\t\tlog.Fatalf(context.Background(), \"RowBuffer already closed\")\n\t}\n\tatomic.StoreUint32((*uint32)(&rb.ConsumerStatus), uint32(execinfra.ConsumerClosed))\n\tif rb.args.OnConsumerClosed != nil {\n\t\trb.args.OnConsumerClosed(rb)\n\t}\n}", "title": "" }, { "docid": "81764fd665e3d3f61b189082b6ca7757", "score": "0.49152225", "text": "func CreateConsumer(ctx context.Context, queueName, queueURL string) *Consumer {\r\n\treturn &Consumer{\r\n\t\tctx: ctx,\r\n\t\tqueueURL: queueURL,\r\n\t\tqueueName: queueName,\r\n\t}\r\n}", "title": "" }, { "docid": "94981e2d99a4b189bec21297e45d266d", "score": "0.49139115", "text": "func NewTaskChannelConsumer(\n\tctx context.Context,\n\tcreateQueue chan types.KubernetesConfigMessage,\n\tinitQueue chan types.InitRainbondConfigMessage,\n\tupdateQueue chan types.UpdateKubernetesConfigMessage,\n\tcreateHandler task.CreateKubernetesTaskHandler,\n\tinitHandler task.CloudInitTaskHandler,\n\tcloudUpdateTaskHandler task.UpdateKubernetesTaskHandler,\n) TaskConsumer {\n\treturn &taskChannelConsumer{\n\t\tctx: ctx,\n\t\tcreateQueue: createQueue,\n\t\tinitQueue: initQueue,\n\t\tupdateQueue: updateQueue,\n\t\tcreateKubernetesTaskHandler: createHandler,\n\t\tcloudInitTaskHandler: initHandler,\n\t\tcloudUpdateTaskHandler: cloudUpdateTaskHandler,\n\t}\n}", "title": "" }, { "docid": "0b590a31174689029cb0b8b98138065d", "score": "0.4882487", "text": "func (c *Consumer) StartConsumer(fn func(*sarama.ConsumerMessage) error) {\n\tif fn != nil {\n\t\tc.hasFunc = true\n\t} else {\n\t\tlog4go.Error(\"[consumer] consume failed, handler func nil, topics:%v, groupID:%v\",\n\t\t\tc.topics, c.groupID)\n\t\t// avoid high frequency output, if in infinite loop\n\t\ttime.Sleep(time.Second * 1)\n\t\treturn\n\t}\n\n\t// consume errors\n\tgo func() {\n\t\tfor err := range c.c.Errors() {\n\t\t\tlog4go.Error(\"[consumer] consume errors, topics:%v, groupID:%v, err:%v\",\n\t\t\t\tc.topics, c.groupID, err.Error())\n\t\t}\n\t}()\n\n\t// consume notifications\n\tgo func() {\n\t\tfor ntf := range c.c.Notifications() {\n\t\t\tlog4go.Debug(\"[consumer] consume notifications, topics:%v, groupID:%v, notification:%+v\",\n\t\t\t\tc.topics, c.groupID, ntf)\n\t\t}\n\t}()\n\n\tvar failures int\n\nloop:\n\tfor {\n\t\tselect {\n\t\tcase msg, ok := <-c.c.Messages():\n\t\t\tif ok {\n\t\t\t\tif err := fn(msg); err == nil {\n\t\t\t\t\t// mark message as processed\n\t\t\t\t\tc.c.MarkOffset(msg, \"\")\n\t\t\t\t} else {\n\t\t\t\t\tfailures++\n\t\t\t\t\tlog4go.Error(\"[consumer] fn errors, count:%v, topics:%v, groupID:%v, err:%v\",\n\t\t\t\t\t\tfailures, c.topics, c.groupID, err.Error())\n\t\t\t\t}\n\t\t\t}\n\t\tcase <-c.closeStart:\n\t\t\tlog4go.Warn(\"[consumer] close, topics:%v, groupID:%v, failures:%v\", c.topics, c.groupID, failures)\n\t\t\tbreak loop\n\t\t}\n\t}\n\tc.closeEnd <- struct{}{}\n\tlog4go.Info(\"[consumer] close success, topics:%v, groupID:%v\", c.topics, c.groupID)\n}", "title": "" }, { "docid": "5d34a8ffa422861cc4969a73af228f87", "score": "0.48706704", "text": "func NewBrokerConsumer(hostname string, topic string, partition int, offset uint64, maxSize uint32) *BrokerConsumer {\n\treturn &BrokerConsumer{broker: newBroker(hostname, topic, partition),\n\t\toffset: offset,\n\t\tmaxSize: maxSize,\n\t\tcodecs: DefaultCodecsMap}\n}", "title": "" }, { "docid": "48b04c597c2dcd73a957a0e784fe8fe8", "score": "0.48562884", "text": "func HistoricalConsumerCapacityDataFactory(\n\tBreakdown *CapacityBreakdownStruct,\n\tContainer string,\n\tGroup string,\n\tGroupName string,\n\tName string,\n\tParent string,\n\tTimestamp string,\n) HistoricalConsumerCapacityDataStruct {\n\treturn HistoricalConsumerCapacityDataStruct{\n\t\tType: \"HistoricalConsumerCapacityData\",\n\t\tBreakdown: Breakdown,\n\t\tContainer: Container,\n\t\tGroup: Group,\n\t\tGroupName: GroupName,\n\t\tName: Name,\n\t\tParent: Parent,\n\t\tTimestamp: Timestamp,\n\t}\n}", "title": "" }, { "docid": "3307f956c5b50947400d0d37e43050d9", "score": "0.48472625", "text": "func (c *KafkaConsumer) Consume(topics []string, signals chan os.Signal, room, ID string) {\n\tchanMessage := make(chan *sarama.ConsumerMessage, 256)\n\n\tfor _, topic := range topics {\n\t\tpartitionList, err := c.Consumer.Partitions(topic)\n\t\tif err != nil {\n\t\t\tlogrus.Errorf(\"Unable to get partition got error %v\", err)\n\t\t\tcontinue\n\t\t}\n\t\tfor _, partition := range partitionList {\n\t\t\tgo consumeMessage(c.Consumer, topic, partition, chanMessage)\n\t\t}\n\t}\n\nConsumerLoop:\n\tfor {\n\t\tselect {\n\t\tcase msg := <-chanMessage:\n\t\t\tpayloadData := &entity.PayloadStateFull{}\n\t\t\tjson.Unmarshal(msg.Value, payloadData)\n\t\t\thearChat(room, ID, payloadData)\n\t\tcase sig := <-signals:\n\t\t\tif sig == os.Interrupt {\n\t\t\t\tbreak ConsumerLoop\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3a0d954e76fec792f569a5311125ed78", "score": "0.48421597", "text": "func (l *Consumer) createConsumer(rmq *rabbitmq.RabbitMQ) (*rabbitmq.Consumer, error) {\n\texchange := rabbitmq.Exchange{\n\t\tName: l.SourceExchangeName,\n\t\tType: \"fanout\",\n\t\tDurable: true,\n\t}\n\n\tqueue := rabbitmq.Queue{\n\t\tName: fmt.Sprintf(\"%s:WorkerQueue\", l.WorkerName),\n\t\tDurable: true,\n\t}\n\n\tbinding := rabbitmq.BindingOptions{\n\t\tRoutingKey: \"\",\n\t}\n\n\tconsumerOptions := rabbitmq.ConsumerOptions{\n\t\tTag: fmt.Sprintf(\"%sWorkerConsumer\", l.WorkerName),\n\t}\n\n\tconsumer, err := rmq.NewConsumer(exchange, queue, binding, consumerOptions)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn consumer, nil\n}", "title": "" }, { "docid": "98499ff64d1285042397992eb546889b", "score": "0.4835819", "text": "func createConsumerChannels() (chUpstream chan Message, chReady, chCloser, chClosed chan struct{},\n\tchErrors chan error) {\n\tchUpstream = make(chan Message)\n\tchReady = make(chan struct{})\n\tchCloser = make(chan struct{})\n\tchClosed = make(chan struct{})\n\tchErrors = make(chan error)\n\treturn\n}", "title": "" }, { "docid": "a4e76ad36be8c0e502b2b35f72f76826", "score": "0.48005337", "text": "func newKafkaConsumer(broker string) (kafka.Consumer, error) {\n\tconfig := kafka.NewConfig()\n\tconsumer, err := kafka.NewConsumer([]string{broker}, config)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn consumer, nil\n}", "title": "" }, { "docid": "198a67032bec99f8469446682cec4bf8", "score": "0.477526", "text": "func NewOutputReceiptEventConsumer(\n\tprocess *process.ProcessContext,\n\tcfg *config.SyncAPI,\n\tjs nats.JetStreamContext,\n\tstore storage.Database,\n\tnotifier *notifier.Notifier,\n\tstream streams.StreamProvider,\n) *OutputReceiptEventConsumer {\n\treturn &OutputReceiptEventConsumer{\n\t\tctx: process.Context(),\n\t\tjetstream: js,\n\t\ttopic: cfg.Matrix.JetStream.Prefixed(jetstream.OutputReceiptEvent),\n\t\tdurable: cfg.Matrix.JetStream.Durable(\"SyncAPIReceiptConsumer\"),\n\t\tdb: store,\n\t\tnotifier: notifier,\n\t\tstream: stream,\n\t}\n}", "title": "" }, { "docid": "3ebdd7ab36db20b7cea935b67be5dea8", "score": "0.47714975", "text": "func ExampleConsumer() {\n\tconsumer, err := Join(\n\t\t\"ExampleConsumerGroup\", // name of the consumer group\n\t\tTopicSubscription(\"access_log\", \"audit_log\"), // topics to subscribe to\n\t\t\"zk1:2181,zk2:2181,zk3:2181/chroot\", // zookeeper connection string\n\t\tnil) // Set this to a *Config instance to override defaults\n\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\t// Trap the interrupt signal to cleanly shut down the consumer\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, os.Interrupt)\n\tgo func() {\n\t\t<-c\n\t\tconsumer.Interrupt()\n\t}()\n\n\teventCount := 0\n\tfor message := range consumer.Messages() {\n\t\t// Process message\n\t\tlog.Println(string(message.Value))\n\t\teventCount += 1\n\n\t\t// Acknowledge that the message has been processed\n\t\tconsumer.Ack(message)\n\t}\n\n\tlog.Printf(\"Processed %d events.\", eventCount)\n}", "title": "" }, { "docid": "72d164be14d7b0be4fa36565c3f4d8ae", "score": "0.4770026", "text": "func CreateConsumer(consumerTag string, docker DockerAPI.Docker) *Consumer {\n\tconsumer := &Consumer{\n\t\tConnection: nil,\n\t\tChannel: nil,\n\t\tDocker: docker,\n\t\tTag: consumerTag,\n\t}\n\n\treturn consumer\n}", "title": "" }, { "docid": "881f8435d5acb664868c37ff2e45b9c3", "score": "0.47442013", "text": "func New(cfg Config) (Service, error) {\n\tif len(cfg.Address) == 0 || cfg.Group == \"\" || len(cfg.Topics) == 0 || cfg.MessageHandler == nil {\n\t\treturn nil, fmt.Errorf(\"some of the values are blank. MessageHandler, Address : %v, Group : %s and Topics : %v\",\n\t\t\tcfg.Address, cfg.Group, cfg.Topics)\n\t}\n\n\tpool := workerPool{cfg: cfg}\n\terr := pool.initialize()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to create worker pool : %+v\", err)\n\t}\n\n\tconfig := cluster.NewConfig()\n\n\tconfig.Consumer.Offsets.Retention = cfg.Retention\n\tconfig.Consumer.Return.Errors = returnErrors\n\tconfig.Group.Return.Notifications = cfg.NotificationHandler != nil\n\tconfig.Consumer.Offsets.Initial = cfg.OffsetsInitial\n\tconfig.Metadata.Full = cfg.MetadataFull\n\tconfig.ClientID = \"Continuum\"\n\n\tconfig.Version = sarama.MaxVersion\n\tif cfg.ConsumerMode == PullOrdered || cfg.ConsumerMode == PullOrderedWithOffsetReplay {\n\t\tconfig.Group.Mode = cluster.ConsumerModePartitions\n\t}\n\n\tconsumer, err := cluster.NewConsumer(cfg.Address, cfg.Group, cfg.Topics, config)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to create consumer : %+v\", err)\n\t}\n\n\tsc := &saramaConsumer{\n\t\tcfg: cfg,\n\t\tconsumer: consumer,\n\t\tpool: pool,\n\t\tcanConsume: true,\n\t}\n\tsc.commitStrategy = getCommitStrategy(cfg, sc.MarkOffset)\n\tsc.consumerStrategy = getConsumerStrategy(cfg)\n\treturn sc, nil\n}", "title": "" }, { "docid": "08b279cd1121dea82d97a0cbcfa13c9b", "score": "0.47403464", "text": "func New(name string) (Consumer, error) {\n\tswitch name {\n\tcase \"google\":\n\t\treturn NewGoogleConsumer()\n\t}\n\treturn nil, fmt.Errorf(\"Unknown consumer '%s'\", name)\n}", "title": "" }, { "docid": "7774fbe859e3524c833c8b75d8acb3ea", "score": "0.47350165", "text": "func (in *Consumer) DeepCopy() *Consumer {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Consumer)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "7774fbe859e3524c833c8b75d8acb3ea", "score": "0.47350165", "text": "func (in *Consumer) DeepCopy() *Consumer {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Consumer)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "416e76112eef55cee67b3d811b3096bc", "score": "0.47279906", "text": "func StartConsume(topic string, serviceConfig *ServiceConfig, f func(*sarama.ConsumerMessage, *Room, *gorm.DB)) {\n\n\tserviceConfig.ConsumerCount++\n\t/* define channels */\n\tdoneCh := make(chan struct{})\n\n\t/* Consume Client Events */\n\tmaster, consumer, offset := OpenConsumer(topic)\n\t// initClients()\n\tgo func(signals *chan os.Signal, sw *chan struct{}, f func(*sarama.ConsumerMessage, *Room, *gorm.DB), rm *Room, db *gorm.DB) {\n\t\tif offset == 0 {\n\t\t\t*sw <- struct{}{}\n\t\t}\n\t\tfor {\n\t\t\tselect {\n\n\t\t\tcase err := <-consumer.Errors():\n\t\t\t\tfmt.Println(err)\n\t\t\t\tfmt.Println(\"ERROR CONSUMING TOPIC \", topic)\n\n\t\t\tcase msg := <-consumer.Messages():\n\t\t\t\tfmt.Println(topic, \" - \", msg.Offset+1, \" of \", offset)\n\t\t\t\t// rm.Forward <- msg.Key\n\t\t\t\tf(msg, rm, db)\n\t\t\t\t// *shared.MessageCountStart++\n\t\t\t\t// fmt.Printf(\"(%v) = %v\\n\", string(msg.Key), string(msg.Value))\n\n\t\t\t\tif msg.Offset+1 == offset {\n\t\t\t\t\t/* If we have consumed up to the offset send on the startWeb channel */\n\t\t\t\t\tfmt.Println(\"Finished consumption of \", topic, \" - \", msg.Offset+1, \" of \", offset)\n\t\t\t\t\t*sw <- struct{}{}\n\t\t\t\t}\n\t\t\tcase <-*signals:\n\t\t\t\tfmt.Println(\"Interrupt is detected in StartConsume\", topic)\n\t\t\t\tdoneCh <- struct{}{}\n\t\t\t\tos.Exit(0)\n\t\t\t}\n\t\t}\n\t}(&serviceConfig.Signals, &serviceConfig.StartWeb, f, serviceConfig.Socket, serviceConfig.DB)\n\n\t<-doneCh /* Wait until interrupt */\n\tfmt.Println(\"Closed \", topic, \" consumer\")\n\t// consumer.Close()\n\tmaster.Close()\n\ttime.Sleep(1 * time.Second)\n\n}", "title": "" }, { "docid": "1c26b9ea69762493559f40ca3b02188e", "score": "0.47256747", "text": "func (cr *ConsumerRunner) SetUpConsumers() error {\r\n\tctxCancel, cancel := context.WithCancel(cr.ctx)\r\n\tcr.cancel = cancel\r\n\r\n\tfor _, queueName := range cr.queueNames {\r\n\t\tcon := rmq.CreateConsumer(ctxCancel, queueName, cr.queueURL)\r\n\t\tif err := con.AssertQueue(); err != nil {\r\n\t\t\tdefer cr.CloseAndCleanUp()\r\n\t\t\treturn err\r\n\t\t}\r\n\r\n\t\tcr.consumers = append(cr.consumers, con)\r\n\t}\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "c99488693fe8e00a4f7fc7b16a9bd116", "score": "0.47072467", "text": "func (acm *AliveConsumersMaintainer) Start() {\n\tdefer acm.Logger.Sync()\n\n\tacm.clusterConsumerMap = &util.SyncNestedMap{}\n\tacm.clusterConsumerMap.Init()\n\n\tcontextProvider := util.ContextProvider{}\n\tcontextProvider.Init()\n\tblacklist := contextProvider.GetBlacklist()\n\n\tfor {\n\t\tclusters, clusterLink := getClusters(acm.BurrowURL)\n\t\tif clusters == nil {\n\t\t\t// Burrow server is not ready\n\t\t\tacm.Logger.Info(\"Burrow server not ready.\")\n\t\t\ttime.Sleep(1 * time.Minute)\n\t\t\tcontinue\n\t\t}\n\t\tfor _, cluster := range clusters.([]interface{}) {\n\t\t\tclusterString := cluster.(string)\n\t\t\tfmt.Println(clusterString)\n\t\t\tconsumersSet := acm.clusterConsumerMap.GetChild(clusterString, make(map[string]interface{})).(map[string]interface{})\n\n\t\t\tacm.clusterConsumerMap.SetLock(clusterString)\n\n\t\t\tconsumers, consumersLink := getConsumers(clusterLink, clusterString)\n\t\t\tfmt.Println(consumers, consumersLink)\n\n\t\t\t// create new consumer handler if it does not exist.\n\t\t\tfor _, consumer := range consumers.([]interface{}) {\n\t\t\t\tconsumerString := consumer.(string)\n\t\t\t\tif _, ok := consumersSet[consumerString]; !ok {\n\t\t\t\t\t// A new consumer found, need to: 1. create new thread 2. put it into map.\n\t\t\t\t\tconsumersSet[consumerString] = true\n\t\t\t\t\tif isInBlacklist, _ := regexp.MatchString(blacklist, consumerString); isInBlacklist {\n\t\t\t\t\t\t// if consumer name is in blacklist, put it in map and\n\t\t\t\t\t\t// skip initiating its consumer handler.\n\t\t\t\t\t\tacm.Logger.Info(\"the current consumer is in blacklist\",\n\t\t\t\t\t\t\tzap.String(\"consumer\", consumerString),\n\t\t\t\t\t\t)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tconsumerHandler := &ConsumerHandler{\n\t\t\t\t\t\tProduceQueue: acm.ProduceQueue,\n\t\t\t\t\t\tCountService: acm.CountService,\n\t\t\t\t\t\tClusterConsumerMap: acm.clusterConsumerMap,\n\t\t\t\t\t\tLogger: util.GetLogger().With(\n\t\t\t\t\t\t\tzap.String(\"module\", \"consumerHandler\"),\n\t\t\t\t\t\t),\n\t\t\t\t\t}\n\t\t\t\t\tconsumerHandler.Init(consumersLink, consumerString, clusterString)\n\t\t\t\t\tgo consumerHandler.Start()\n\t\t\t\t\tacm.Logger.Info(\"create a new consumer handler\",\n\t\t\t\t\t\tzap.String(\"consumer\", consumerString),\n\t\t\t\t\t\tzap.String(\"cluster\", clusterString),\n\t\t\t\t\t)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tacm.clusterConsumerMap.ReleaseLock(clusterString)\n\t\t}\n\t\t// AliveConsumerMaintainer refresh its alive Consumers list every 5 minutes.\n\t\ttime.Sleep(5 * time.Minute)\n\t}\n}", "title": "" }, { "docid": "ce6672c3c4a4c6b0f90530f10ed1e6c1", "score": "0.47059417", "text": "func (c *consumerClient) consume() {\n\tsigchan := make(chan os.Signal, 1)\n\tsignal.Notify(sigchan, syscall.SIGINT, syscall.SIGTERM)\n\n\tfor {\n\t\tselect {\n\t\tcase sig := <-sigchan:\n\t\t\terr := fmt.Errorf(signalError, sig)\n\t\t\tc.errHandler(nil, err)\n\t\tdefault:\n\t\t\tmsg, err := c.readMessage(time.Duration(c.pollTimeoutSeconds) * time.Second)\n\t\t\tif err != nil {\n\t\t\t\tswitch erv := err.(type) {\n\t\t\t\tcase *kafka.Error:\n\t\t\t\t\tif erv.IsFatal() {\n\t\t\t\t\t\tc.errHandler(nil, err)\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tc.errHandler(nil, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif c.validateOnConsume {\n\t\t\t\tif !c.dataIsValidFromSchema(msg.Value, c.schemas[c.topic]) {\n\t\t\t\t\terr := fmt.Errorf(schemaNotValidError, c.schemas[c.topic].Value, c.schemas[c.topic].Version, string(msg.Value))\n\t\t\t\t\tc.errHandler(msg.Value, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tc.mtx.Lock()\n\t\t\tc.filterEvent(msg.Value, c.handler, c.conditions)\n\t\t\tif c.commitOnMessage {\n\t\t\t\tif _, err := c.kc.CommitMessage(msg); err != nil {\n\t\t\t\t\tc.errHandler(msg.Value, err)\n\t\t\t\t}\n\t\t\t}\n\t\t\tc.mtx.Unlock()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4cf13499e86d7a7eba4cd084887e5b8c", "score": "0.4700908", "text": "func NewConfigInventoryOpsConsumer(size int, toConsume ConsumableStructsInventoryOpsConsumer) ConfigInventoryOpsConsumer {\n\tchOpResponse := make(chan *grpc_inventory_manager_go.AgentOpResponse, size)\n\tchECOpResponse := make(chan *grpc_inventory_manager_go.EdgeControllerOpResponse, size)\n\n\treturn ConfigInventoryOpsConsumer{\n\t\tChAgentOpResponse: chOpResponse,\n\t\tChEdgeControllerOpResponse: chECOpResponse,\n\t\tToConsume: toConsume,\n\t}\n}", "title": "" }, { "docid": "d0574bca46ee24a28cf426281d982490", "score": "0.46914446", "text": "func (n *netPipeline) Consumer() <-chan AppendFuture {\n\treturn n.doneCh\n}", "title": "" }, { "docid": "78081af50cd91a0b8917397801004eb0", "score": "0.46896753", "text": "func (n *extendedTransport) Consumer() <-chan raft.RPC {\n\treturn n.raftConsumeCh\n}", "title": "" }, { "docid": "cd22f129f8a29db2f0a8e3e0fd530fe7", "score": "0.46865687", "text": "func NewConfluentConsumer(kafkaURLs []string, topic, groupID string) (*ConfluentConsumer, error) {\n\tcsm, err := kafka.NewConsumer(&kafka.ConfigMap{\n\t\t\"bootstrap.servers\": strings.Join(kafkaURLs, \",\"),\n\t\t\"group.id\": groupID,\n\t\t\"auto.offset.reset\": \"earliest\",\n\t})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error: %w\", err)\n\t}\n\n\treturn &ConfluentConsumer{\n\t\tkafkaURLs: kafkaURLs,\n\t\ttopic: topic,\n\t\tconsumer: csm,\n\t}, nil\n}", "title": "" }, { "docid": "bc6fbd6e79018e5f2359b490137c1cf8", "score": "0.46864375", "text": "func NewConsumerGroup(ctx context.Context, log *log.Logger, store Store, streamName string, shardID string) ConsumerGroup {\n\tcg := ConsumerGroup{\n\t\tlog: log,\n\t\tnamespace: namespace{\n\t\t\tshardID: shardID,\n\t\t\tstreamName: streamName,\n\t\t},\n\t\tstore: store,\n\t}\n\n\tcg.consumers = sync.Map{}\n\tgo cg.start(ctx)\n\treturn cg\n}", "title": "" }, { "docid": "27269ef003c8a28eac1fd1563740c14f", "score": "0.46783307", "text": "func messageConsumer(ctx context.Context, id string, qc consumer.Consumer) <-chan consumer.Messages {\n\tout := make(chan consumer.Messages)\n\tgo func() {\n\t\tdefer close(out)\n\n\t\tlog.WithFields(logrus.Fields{\"consumer\": id}).Infof(\"Starting consumer\")\n\n\t\t//prometheus metrics\n\t\tmtrs.ConsumerRunning.With(prometheus.Labels{\"name\": id}).Inc()\n\n\t\t// reading from message queue\n\t\tmsgs, err := qc.Consume(id)\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\n\t\t// loop to dispatch the messages read to the channel consummed from storage workers\n\t\tfor m := range msgs {\n\t\t\tselect {\n\n\t\t\tcase out <- m: // put messages consumed into the out chan\n\t\t\t\tmtrs.ConsumerMessages.With(prometheus.Labels{\"name\": id}).Inc()\n\n\t\t\tcase <-ctx.Done(): // When main routine cancel\n\n\t\t\t\tlog.WithFields(logrus.Fields{\"consumer\": id}).Warnf(\"Stoping consumer\")\n\t\t\t\tmtrs.ConsumerRunning.With(prometheus.Labels{\"name\": id}).Dec()\n\n\t\t\t\t// closes the consumer queue and connection\n\t\t\t\tvar wg sync.WaitGroup\n\t\t\t\twg.Add(1)\n\t\t\t\tgo func() {\n\t\t\t\t\tqc.Close() // TODO: Close the consumer connection not the mq connection\n\t\t\t\t\twg.Done()\n\t\t\t\t}()\n\t\t\t\twg.Wait()\n\n\t\t\t\treturn // go out of the for loop\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn out\n}", "title": "" }, { "docid": "6877a3c1db6bc49f52896527d865a326", "score": "0.46525896", "text": "func newChannelWith(ctx context.Context, pipeline Pipeline, transport transport.Transport, executor Executor, id int64, writeQueueSize int, writeForever bool) Channel {\n\tchildCtx, cancel := context.WithCancel(ctx)\n\n\tvar (\n\t\twriteQueue chan [][]byte\n\t\twriteBuffers net.Buffers\n\t\twriteIndexes []int\n\t)\n\n\t// enable async write\n\tif writeQueueSize > 0 {\n\t\twriteQueue = make(chan [][]byte, writeQueueSize)\n\t\twriteBuffers = make(net.Buffers, 0, (writeQueueSize/5)*2+1)\n\t\twriteIndexes = make([]int, 0, writeQueueSize/5+1)\n\t}\n\n\treturn &channel{\n\t\tid: id,\n\t\tctx: childCtx,\n\t\tcancel: cancel,\n\t\tpipeline: pipeline,\n\t\ttransport: transport,\n\t\texecutor: executor,\n\t\twriteQueue: writeQueue,\n\t\twriteBuffers: writeBuffers,\n\t\twriteIndexes: writeIndexes,\n\t\twriteForever: writeForever,\n\t}\n}", "title": "" }, { "docid": "cf802b1771dcbe280520b395b5a1ffdf", "score": "0.4647095", "text": "func (km *Tester) ConsumerBuilder() kafka.ConsumerBuilder {\n\treturn func(b []string, group, clientID string) (kafka.Consumer, error) {\n\t\treturn newConsumer(km), nil\n\t}\n}", "title": "" }, { "docid": "4f81fceea46cf4f4d5b44aef88db3d17", "score": "0.46469644", "text": "func newKafkaConsumerClient(ctx context.Context, bConfig *BrokerConfig, options *ConsumerClientOptions) (Consumer, error) {\n\terr := validateKafkaConsumerBrokerConfig(bConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = validateKafkaConsumerClientConfig(options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconfigMap := &kafkapkg.ConfigMap{\n\t\t\"bootstrap.servers\": strings.Join(bConfig.Brokers, \",\"),\n\t\t\"auto.offset.reset\": \"latest\",\n\t\t\"enable.auto.commit\": false,\n\t\t\"group.id\": options.GroupID,\n\t\t\"group.instance.id\": options.GroupInstanceID,\n\t}\n\n\tlogger.Ctx(ctx).Infow(\"kafka consumer: initializing new\", \"configMap\", configMap, \"options\", options)\n\n\tif bConfig.EnableTLS {\n\t\tcerts, err := readKafkaCerts(bConfig.CertDir)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Refer : https://github.com/edenhill/librdkafka/wiki/Using-SSL-with-librdkafka#configure-librdkafka-client\n\t\tconfigMap.SetKey(\"security.protocol\", \"ssl\")\n\t\tconfigMap.SetKey(\"ssl.ca.location\", certs.caCertPath)\n\t\tconfigMap.SetKey(\"ssl.certificate.location\", certs.userCertPath)\n\t\tconfigMap.SetKey(\"ssl.key.location\", certs.userKeyPath)\n\t}\n\n\tc, err := kafkapkg.NewConsumer(configMap)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc.SubscribeTopics(options.Topics, nil)\n\n\tlogger.Ctx(ctx).Infow(\"kafka consumer: initialized\")\n\n\treturn &KafkaBroker{\n\t\tConsumer: c,\n\t\tConfig: bConfig,\n\t\tCOptions: options,\n\t}, nil\n}", "title": "" }, { "docid": "c065f8853d8535c33fcadaf7d0d3886a", "score": "0.46438217", "text": "func CreateConsumerRunner(ctx context.Context, queueURL string, messageNumber int, queueNames []string) *ConsumerRunner {\r\n\treturn &ConsumerRunner{\r\n\t\tctx: ctx,\r\n\t\tqueueURL: queueURL,\r\n\t\tmessageNumber: messageNumber,\r\n\t\tqueueNames: queueNames,\r\n\t}\r\n}", "title": "" }, { "docid": "be32729fb712eca9a531da9530abbaa1", "score": "0.46359944", "text": "func Consume(c *cli.Context, cClient ccli.Client) {\n\tvar err error\n\tif len(c.Args()) < 2 {\n\t\tExitIfError(errors.New(strNotEnoughArgs))\n\t}\n\tgOpts := newGlobalOptionsFromCLIContext(c)\n\tpath := c.Args()[0]\n\tname := c.Args()[1]\n\n\tconsumer := cClient.CreateConsumer(&ccli.CreateConsumerRequest{\n\t\tPath: path,\n\t\tConsumerGroupName: name,\n\t\tConsumerName: \"\",\n\t\tPrefetchCount: c.Int(\"prefetch_count\"),\n\t\tOptions: &ccli.ClientOptions{\n\t\t\tTimeout: time.Duration(gOpts.timeoutSecs) * time.Second,\n\t\t\tDeploymentStr: gOpts.env,\n\t\t},\n\t})\n\n\tautoAck := c.BoolT(\"autoack\")\n\tch := make(chan ccli.Delivery, common.MaxInt(c.Int(\"prefetch_count\")*2, 1))\n\tch, err = consumer.Open(ch)\n\tExitIfError(err)\n\n\tif !autoAck {\n\t\t// read ack tokens from Stdin\n\t\tgo func() {\n\t\t\tvar line []byte\n\t\t\tbio := bufio.NewReader(os.Stdin)\n\t\t\tfor err == nil {\n\t\t\t\tline, err = bio.ReadBytes('\\n')\n\t\t\t\tif len(line) > 0 {\n\t\t\t\t\tconsumer.AckDelivery(string(line))\n\t\t\t\t}\n\t\t\t}\n\t\t}()\n\t}\n\n\tvar headerOnce sync.Once\n\tfor delivery := range ch {\n\t\tmsg := delivery.GetMessage()\n\t\tif _, ok := msg.GetPayload().GetUserContext()[`topic`]; ok { // If this is a Kafka-for-Cherami message, print in a JSON blob\n\t\t\tm := msg.GetPayload().GetUserContext()\n\t\t\tvar b []byte\n\t\t\tp, _ := strconv.Atoi(m[`partition`])\n\t\t\to, _ := strconv.ParseInt(m[`offset`], 10, 63)\n\t\t\tb, err = json.Marshal(kafkaMessageJSON{\n\t\t\t\tMsg: string(msg.GetPayload().GetData()),\n\t\t\t\tEnqueueTime: time.Unix(0, msg.GetEnqueueTimeUtc()).Format(time.StampMilli),\n\t\t\t\tKey: m[`key`],\n\t\t\t\tTopic: m[`topic`],\n\t\t\t\tPartition: p,\n\t\t\t\tOffset: o,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\tif err == nil {\n\t\t\t\t_, err = fmt.Fprintf(os.Stdout, \"%s\\n\", string(b))\n\t\t\t}\n\t\t} else {\n\t\t\theaderOnce.Do(func() {\n\t\t\t\tfmt.Fprintf(os.Stdout, \"%s, %s\\n\", `Enqueue Time (nanoseconds)`, `Message Data`)\n\t\t\t})\n\t\t\t_, err = fmt.Fprintf(os.Stdout, \"%v, %s\\n\", msg.GetEnqueueTimeUtc(), string(msg.GetPayload().GetData()))\n\t\t}\n\t\tif autoAck {\n\t\t\tdelivery.Ack()\n\t\t} else {\n\t\t\tfmt.Fprintf(os.Stdout, \"%s\\n\", delivery.GetDeliveryToken())\n\t\t}\n\n\t\tif err != nil {\n\t\t\tif e, ok := err.(*os.PathError); ok {\n\t\t\t\tif ee, ok1 := e.Err.(syscall.Errno); ok1 && ee == syscall.EPIPE {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfmt.Fprintf(os.Stderr, \"%T %v\\n\", err, err)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0077e40cb6b8a12f121c54d5cc5a57eb", "score": "0.46251062", "text": "func (c *Consumer) Consume(handler func(delivery amqp.Delivery)) error {\n\tco := c.session.ConsumerOptions\n\tq := c.session.Queue\n\t// Exchange bound to Queue, starting Consume\n\tdeliveries, err := c.channel.Consume(\n\t\t// consume from real queue\n\t\tq.Name, // name\n\t\tco.Tag, // consumerTag,\n\t\tco.AutoAck, // autoAck\n\t\tco.Exclusive, // exclusive\n\t\tco.NoLocal, // noLocal\n\t\tco.NoWait, // noWait\n\t\tco.Args, // arguments\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// should we stop streaming, in order not to consume from server?\n\tc.deliveries = deliveries\n\tc.handler = handler\n\n\tc.RabbitMQ.log.Info(\"handle: deliveries channel starting\")\n\n\t// handle all consumer errors, if required re-connect\n\t// there are problems with reconnection logic for now\n\tfor delivery := range c.deliveries {\n\t\thandler(delivery)\n\t}\n\n\tc.RabbitMQ.log.Info(\"handle: deliveries channel closed\")\n\tc.done <- nil\n\treturn nil\n}", "title": "" }, { "docid": "aeacbe1718d366b8ad21d7cf30cda145", "score": "0.4624593", "text": "func (c *amqpClient) Consume(params ConsumeParams) (<-chan ConsumerMessage, error) {\n\tmsgs, err := c.r.Listen(rabbus.ListenConfig{\n\t\tExchange: params.Exchange,\n\t\tKey: params.RoutingKey,\n\t\tKind: params.Kind,\n\t\tQueue: params.Queue,\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tres := make(chan ConsumerMessage, 256)\n\n\tgo func() {\n\t\tfor {\n\t\t\tm, ok := <-msgs\n\t\t\tif !ok {\n\t\t\t\tclose(res)\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tres <- newConsumerMessage(&m)\n\t\t}\n\t}()\n\n\treturn res, nil\n}", "title": "" }, { "docid": "b242263766a18163627581ab59d60333", "score": "0.46242732", "text": "func ExampleConsumer() {\n\n\t// init (custom) config, enable errors and notifications\n\tconfig := cluster.NewConfig()\n\tconfig.Consumer.Return.Errors = true\n\tconfig.Group.Return.Notifications = true\n\n\t// init consumer\n\tbrokers := []string{\"127.0.0.1:9092\"}\n\ttopics := []string{\"my_topic\", \"other_topic\"}\n\tconsumer, err := cluster.NewConsumer(brokers, \"my-consumer-group\", topics, config)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer consumer.Close()\n\n\t// trap SIGINT to trigger a shutdown.\n\tsignals := make(chan os.Signal, 1)\n\tsignal.Notify(signals, os.Interrupt)\n\n\t// consume errors\n\tgo func() {\n\t\tfor err := range consumer.Errors() {\n\t\t\tlog.Printf(\"Error: %s\\n\", err.Error())\n\t\t}\n\t}()\n\n\t// consume notifications\n\tgo func() {\n\t\tfor ntf := range consumer.Notifications() {\n\t\t\tlog.Printf(\"Rebalanced: %+v\\n\", ntf)\n\t\t}\n\t}()\n\n\t// consume messages, watch signals\n\tfor {\n\t\tselect {\n\t\tcase msg, ok := <-consumer.Messages():\n\t\t\tif ok {\n\t\t\t\tfmt.Fprintf(os.Stdout, \"%s/%d/%d\\t%s\\t%s\\n\", msg.Topic, msg.Partition, msg.Offset, msg.Key, msg.Value)\n\t\t\t\tconsumer.MarkOffset(msg, \"\") // mark message as processed\n\t\t\t}\n\t\tcase <-signals:\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d6732eb6a3e61cf16ee9d5c82e78f77c", "score": "0.4618843", "text": "func (bm *batchManager) newEventNotifications() {\n\tl := log.L(bm.ctx).WithField(\"role\", \"batch-newmessages\")\n\tfor {\n\t\tselect {\n\t\tcase m, ok := <-bm.newMessages:\n\t\t\tif !ok {\n\t\t\t\tl.Debugf(\"Exiting due to close\")\n\t\t\t\treturn\n\t\t\t}\n\t\t\tl.Debugf(\"New message sequence notification: %d\", m)\n\t\tcase <-bm.ctx.Done():\n\t\t\tl.Debugf(\"Exiting due to cancelled context\")\n\t\t\treturn\n\t\t}\n\t\t// Do not block sending to the shoulderTap - as it can only contain one\n\t\tselect {\n\t\tcase bm.shoulderTap <- true:\n\t\tdefault:\n\t\t}\n\t}\n}", "title": "" }, { "docid": "75121bdc2bd8b63cffb632fb51f1e25d", "score": "0.46116486", "text": "func (n *netPipeline) Consumer() <-chan raft.AppendFuture {\n\treturn n.doneCh\n}", "title": "" }, { "docid": "9e9be34ffcc7a5a272f886701795cf47", "score": "0.45936456", "text": "func (c *SmartSQSQueueConsumerComponent) New(ctx context.Context, config *SmartSQSQueueConsumerConfig) (SmartSQSConsumer, error) {\n\tvar sesh = session.Must(session.NewSession())\n\tq := sqs.New(sesh, &aws.Config{\n\t\tRegion: aws.String(config.QueueRegion),\n\t\tHTTPClient: http.DefaultClient,\n\t\tEndpoint: aws.String(config.AWSEndpoint),\n\t})\n\n\treturn SmartSQSConsumer{\n\t\tLogFn: LoggerFromContext,\n\t\tQueueURL: config.QueueURL,\n\t\tQueue: q,\n\t\tNumWorkers: config.NumWorkers,\n\t\tMessagePoolSize: config.MessagePoolSize,\n\t}, nil\n}", "title": "" }, { "docid": "103f7292c5b195b64758f3a468e9967c", "score": "0.45824006", "text": "func (ag *hashAggregator) ConsumerClosed() {\n\t// The consumer is done, Next() will not be called again.\n\tag.close()\n}", "title": "" }, { "docid": "9bbf19a742418141899c237f2011bdd5", "score": "0.4579773", "text": "func New(streamName string, opts ...Option) (*Consumer, error) {\n\tif streamName == \"\" {\n\t\treturn nil, fmt.Errorf(\"must provide stream name\")\n\t}\n\n\t// new consumer with no-op checkpoint, counter, and logger\n\tc := &Consumer{\n\t\tstreamName: streamName,\n\t\tinitialShardIteratorType: \"TRIM_HORIZON\",\n\t\tcheckpoint: &noopCheckpoint{},\n\t\tcounter: &noopCounter{},\n\t\tlogger: &noopLogger{\n\t\t\tlogger: log.New(ioutil.Discard, \"\", log.LstdFlags),\n\t\t},\n\t}\n\n\t// override defaults\n\tfor _, opt := range opts {\n\t\topt(c)\n\t}\n\n\t// default client if none provided\n\tif c.client == nil {\n\t\tnewSession, err := session.NewSession(aws.NewConfig())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tc.client = kinesis.New(newSession)\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "f13fa3349d7fa8dca97a32e91c1a04fd", "score": "0.45750037", "text": "func createConfigs(r io.Reader) <-chan *Config {\n\tvar (\n\t\tcount, index = 0, 0\n\t\tscanner = bufio.NewScanner(r)\n\t\tConfigCh = make(chan *Config)\n\t\tmetadata = []byte{}\n\t\twg sync.WaitGroup\n\t)\n\n\t// we need to read each line of the file to identify each config\n\tscanner.Split(bufio.ScanLines)\n\n\tgo func() {\n\t\tfor scanner.Scan() {\n\t\t\twg.Add(1)\n\t\t\tcount++\n\n\t\t\t// the scanner will return the each line but it removes the new line so\n\t\t\t// for this reason it's putted again\n\t\t\tmetadata = append(metadata, append(scanner.Bytes(), \"\\n\"...)...)\n\n\t\t\t// for each line will determinate that's is a new configuration\n\t\t\tif count%3 == 0 {\n\t\t\t\tindex++\n\t\t\t\tConfigCh <- newConfig(index, metadata)\n\t\t\t\tmetadata = []byte{}\n\t\t\t\tcount = 0\n\t\t\t}\n\n\t\t\twg.Done()\n\t\t}\n\t\twg.Wait()\n\t\tclose(ConfigCh)\n\t}()\n\n\treturn ConfigCh\n}", "title": "" }, { "docid": "f2ab39f33fa9a1190361d4271536fa5f", "score": "0.4557475", "text": "func (sess *mqttSession) createConsumer(consConfig *ConsumerConfig) error {\n\tcfg := &CreateConsumerRequest{\n\t\tStream: mqttStreamName,\n\t\tConfig: *consConfig,\n\t}\n\t_, err := sess.jsa.createConsumer(cfg)\n\treturn err\n}", "title": "" }, { "docid": "7e0ae115a2fc995633fde228f78ea19e", "score": "0.45511845", "text": "func TestConsumerLoad(t *T) {\n\tif os.Getenv(\"BANANAQ_LOAD_TEST\") == \"\" {\n\t\treturn\n\t}\n\n\tnumEvents := 10000\n\tllog.Info(\"creating test queue\", llog.KV{\"numEvents\": numEvents})\n\tqueue, ii := newTestQueue(t, numEvents)\n\tcgroup := testutil.RandStr()\n\tllog.Info(\"test queue created\", llog.KV{\"queue\": queue, \"cgroup\": cgroup})\n\n\tgo func() {\n\t\ttime.Sleep(5 * time.Minute)\n\t\tt.Fatal(\"test took too long\")\n\t}()\n\n\tch := make(chan core.ID)\n\trand := rand.New(rand.NewSource(time.Now().UnixNano()))\n\n\tgo func() {\n\t\tfor range time.Tick(10 * time.Millisecond) {\n\t\t\trequire.Nil(t, testPeel.Clean(queue, cgroup))\n\t\t\trequire.Nil(t, testPeel.CleanAvailable(queue))\n\t\t}\n\t}()\n\n\tconsumer := func(i int) {\n\t\tfor {\n\t\t\tvar withDeadline bool\n\t\t\tvar deadline time.Time\n\t\t\tif rand.Intn(2) == 0 {\n\t\t\t\twithDeadline = true\n\t\t\t\tdeadline = time.Now().Add(10 * time.Millisecond)\n\t\t\t}\n\n\t\t\te, err := testPeel.QGet(QGetCommand{\n\t\t\t\tQueue: queue,\n\t\t\t\tConsumerGroup: cgroup,\n\t\t\t\tAckDeadline: deadline,\n\t\t\t})\n\t\t\trequire.Nil(t, err)\n\t\t\tif (e == core.Event{}) {\n\t\t\t\ttime.Sleep(1 * time.Second)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif withDeadline {\n\t\t\t\tif rand.Intn(10) == 0 {\n\t\t\t\t\t// force miss deadline\n\t\t\t\t\ttime.Sleep(10 * time.Millisecond)\n\t\t\t\t}\n\t\t\t\tacked, err := testPeel.QAck(QAckCommand{\n\t\t\t\t\tQueue: queue,\n\t\t\t\t\tConsumerGroup: cgroup,\n\t\t\t\t\tEventID: e.ID,\n\t\t\t\t})\n\t\t\t\trequire.Nil(t, err)\n\n\t\t\t\t// If the ack didn't make the deadline we pretend like we never\n\t\t\t\t// had the event at all\n\t\t\t\tif !acked {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tch <- e.ID\n\t\t}\n\t}\n\tfor i := 0; i < 1; i++ {\n\t\tgo consumer(i)\n\t}\n\n\tm := map[core.ID]bool{}\n\tfor id := range ch {\n\t\trequire.NotContains(t, m, id)\n\t\tm[id] = true\n\t\tif lm := len(m); lm == len(ii) {\n\t\t\tbreak\n\t\t} else if lm%(numEvents/20) == 0 {\n\t\t\tllog.Info(\"progress\", llog.KV{\"len(m)\": lm})\n\t\t}\n\t}\n\tclose(ch)\n\n\tllog.Info(\"checking m length\")\n\tassert.Len(t, m, len(ii))\n\tllog.Info(\"checking each id in m\")\n\tfor _, id := range ii {\n\t\tassert.Contains(t, m, id)\n\t}\n\n\tewInProg, ewRedo, _, err := queueCGroupKeys(queue, cgroup)\n\trequire.Nil(t, err)\n\n\tllog.Info(\"checking inprogress sets\")\n\tassertKey(t, ewInProg.byArb)\n\tassertKey(t, ewInProg.byExp)\n\tllog.Info(\"checking redo set\")\n\tassertKey(t, ewRedo.byArb)\n\tassertKey(t, ewRedo.byExp)\n}", "title": "" }, { "docid": "8bf1df6d6aa592385f7df838d278305a", "score": "0.45507452", "text": "func NewConsumerView(userID string, dependencyID string) ConsumerView {\n\treturn ConsumerView{\n\t\tuserID: userID,\n\t\tdependencyID: dependencyID,\n\t\t//\t\trevision: resolve.LoadRevision(),\n\t\tg: newGraph(),\n\t}\n}", "title": "" }, { "docid": "b9361331b94bba3ccd2dd99d614e3d69", "score": "0.45504683", "text": "func New(receiver chan<- interface{}) chan<- interface{} {\n\tsender := make(chan interface{})\n\n\tgo func() {\n\t\tvar (\n\t\t\tlatest interface{}\n\t\t\tok bool\n\t\t\ttemp chan<- interface{}\n\t\t)\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase latest, ok = <-sender:\n\t\t\t\tif !ok {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tif temp == nil {\n\t\t\t\t\ttemp = receiver\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\tcase temp <- latest:\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn sender\n}", "title": "" }, { "docid": "19f8a7e39a9337d87eab19ab93022d43", "score": "0.45376605", "text": "func (c *Client) NewBlockSubscribe() error {\n\tlog.Tracef(\"NewBlockSubscribe\")\n\n\treturn c.subscribe(eventNewBlock)\n}", "title": "" }, { "docid": "a1bf629f65a933637f738a92cb197ae6", "score": "0.45237854", "text": "func sub(rw http.ResponseWriter, r *http.Request) {\n\tq := r.URL.Query()\n\ttopic := q.Get(\"topic\")\n\tpartition := q.Get(\"partition\")\n\tgroup := q.Get(\"group\")\n\thost := q.Get(\"kafka_host\")\n\tport := q.Get(\"kafka_port\")\n\tvar (\n\t\tconsumer kafka.Consumer\n\t\terr error\n\t\tqueue <-chan messaging.Event\n\t)\n\tif len(group) == 0 {\n\t\tp, _ := strconv.Atoi(partition)\n\t\tconsumer, err = kafka.NewConsumerFromPartition(topic, p, kafka.WithBrokers(host+\":\"+port))\n\t\tif err != nil {\n\t\t\tlog.Panic(err)\n\t\t}\n\t\tqueue, err = consumer.Consume(context.TODO(), kafka.NewConsumerOption(kafka.OffsetNewest))\n\t\tif err != nil {\n\t\t\tlog.Panic(err)\n\t\t}\n\t\tlog.Printf(\"consuming from partition %d\\n\", p)\n\t} else {\n\t\tconsumer, err = kafka.NewConsumer(topic, group, kafka.WithBrokers(host+\":\"+port))\n\t\tif err != nil {\n\t\t\tlog.Panic(err)\n\t\t}\n\t\tqueue, err = consumer.Consume(context.TODO(), kafka.ConsumerGroupOption)\n\t\tif err != nil {\n\t\t\tlog.Panic(err)\n\t\t}\n\t\tlog.Printf(\"consuming from group %s\\n\", group)\n\t}\n\tconsumers = append(consumers, consumer)\n\t_, err = rw.Write([]byte(\"started a consumer\"))\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\tfor item := range queue {\n\t\tlog.Printf(\"ok: (%s) (%#v) (%T)\\n\", item.Payload(), item.Metadata(), item.Raw())\n\n\t}\n\tlog.Println(\"message queue has been closed\")\n}", "title": "" } ]
3d58e9dd067babffbc03e187504fe8d2
Post invoke action applyTopItemsFilter
[ { "docid": "3bba444afdc65bf55717709fa72229b5", "score": "0.66921484", "text": "func (m *ItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilder) Post(ctx context.Context, body ItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterPostRequestBodyable, requestConfiguration *ItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilderPostRequestConfiguration)(error) {\n requestInfo, err := m.ToPostRequestInformation(ctx, body, requestConfiguration);\n if err != nil {\n return err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": ia572726a95efa92ddd544552cd950653dc691023836923576b2f4bf716cf204a.CreateODataErrorFromDiscriminatorValue,\n }\n err = m.BaseRequestBuilder.RequestAdapter.SendNoContent(ctx, requestInfo, errorMapping)\n if err != nil {\n return err\n }\n return nil\n}", "title": "" } ]
[ { "docid": "1c6d854a5273eb8c09350e04c39e92b5", "score": "0.5985458", "text": "func (m *ItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilder) ToPostRequestInformation(ctx context.Context, body ItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterPostRequestBodyable, requestConfiguration *ItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilderPostRequestConfiguration)(*i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestInformation, error) {\n requestInfo := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewRequestInformation()\n requestInfo.UrlTemplate = m.BaseRequestBuilder.UrlTemplate\n requestInfo.PathParameters = m.BaseRequestBuilder.PathParameters\n requestInfo.Method = i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.POST\n err := requestInfo.SetContentFromParsable(ctx, m.BaseRequestBuilder.RequestAdapter, \"application/json\", body)\n if err != nil {\n return nil, err\n }\n if requestConfiguration != nil {\n requestInfo.Headers.AddAll(requestConfiguration.Headers)\n requestInfo.AddRequestOptions(requestConfiguration.Options)\n }\n return requestInfo, nil\n}", "title": "" }, { "docid": "1e1bbd27706d309b13f444a8925323dc", "score": "0.5974098", "text": "func (r ApiGetWorkflowServiceItemActionInstanceListRequest) Top(top int32) ApiGetWorkflowServiceItemActionInstanceListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "bc29130d64dd316a84bc73cb6244de5c", "score": "0.5793781", "text": "func (r ApiGetWorkflowServiceItemActionDefinitionListRequest) Top(top int32) ApiGetWorkflowServiceItemActionDefinitionListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "eca6e21a84411d898ee2b1b1e1308e1d", "score": "0.5579852", "text": "func (r ApiGetWorkflowServiceItemHealthCheckExecutionListRequest) Top(top int32) ApiGetWorkflowServiceItemHealthCheckExecutionListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "1bd633c924486446cbf3038ba34e43ef", "score": "0.5573244", "text": "func (r ApiGetWorkflowServiceItemOutputListRequest) Top(top int32) ApiGetWorkflowServiceItemOutputListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "319c05cd6b5115a4eefb9163c44373f5", "score": "0.5545353", "text": "func (r ApiGetWorkflowServiceItemInstanceListRequest) Top(top int32) ApiGetWorkflowServiceItemInstanceListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "f3f7ccac8f4f1482a29fedbccc120b52", "score": "0.55113894", "text": "func (r ApiGetWorkflowCatalogItemDefinitionListRequest) Top(top int32) ApiGetWorkflowCatalogItemDefinitionListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "092a87502455cdb93e5effa3c3d38168", "score": "0.54839593", "text": "func NewItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilder(rawUrl string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*ItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilder) {\n urlParams := make(map[string]string)\n urlParams[\"request-raw-url\"] = rawUrl\n return NewItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilderInternal(urlParams, requestAdapter)\n}", "title": "" }, { "docid": "7b86ba25235683545375b137024c274c", "score": "0.5482003", "text": "func (r ApiGetIaasCustomTaskInfoListRequest) Top(top int32) ApiGetIaasCustomTaskInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "8604367c808033bed4ec7d14f2783556", "score": "0.5371641", "text": "func NewItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilderInternal(pathParameters map[string]string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*ItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilder) {\n m := &ItemItemsItemWorkbookTablesItemColumnsItemFilterApplyTopItemsFilterRequestBuilder{\n BaseRequestBuilder: *i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.NewBaseRequestBuilder(requestAdapter, \"{+baseurl}/drives/{drive%2Did}/items/{driveItem%2Did}/workbook/tables/{workbookTable%2Did}/columns/{workbookTableColumn%2Did}/filter/applyTopItemsFilter\", pathParameters),\n }\n return m\n}", "title": "" }, { "docid": "edd4203c72aec3c7e1ad26f632a744ae", "score": "0.5371171", "text": "func (r ApiGetApplianceAppOpStatusListRequest) Top(top int32) ApiGetApplianceAppOpStatusListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "c3781430e2743d387f5a613342f8ea38", "score": "0.53601813", "text": "func (r ApiGetApplianceAppStatusListRequest) Top(top int32) ApiGetApplianceAppStatusListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "794e999d1621b51c6b3868d907653307", "score": "0.53568935", "text": "func uniswapActionListTopFilter(pairAddress *common.Address, cursor *string, actionType int32) (*bson.D, error) {\n\t// what is the requested ordinal index from cursor, if any\n\tvar ix uint64\n\tif cursor != nil {\n\t\tvar err error\n\n\t\t// get the ordinal index based on cursor\n\t\tix, err = strconv.ParseUint(*cursor, 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid cursor value; %s\", err.Error())\n\t\t}\n\t}\n\n\t// prep the empty filter (no cursor and any validation status)\n\tfilter := bson.D{}\n\tfilterPair := bson.D{}\n\tfilterType := bson.D{}\n\tfilterCursor := bson.D{}\n\n\t// filter for pair address\n\tif pairAddress != nil {\n\t\tfilterPair = bson.D{{Key: fiSwapPair, Value: pairAddress.String()}}\n\t}\n\n\t// filter for action type\n\tif actionType >= 0 {\n\t\tfilterType = bson.D{{Key: fiSwapType, Value: actionType}}\n\t}\n\n\t// filter for cursor\n\tif cursor != nil {\n\t\tfilterCursor = bson.D{{Key: fiSwapOrdIndex, Value: ix}}\n\t}\n\n\tfilter = bson.D{{Key: \"$and\", Value: bson.A{filterPair, filterType, filterCursor}}}\n\n\treturn &filter, nil\n}", "title": "" }, { "docid": "4b1544edb7e04ac028641ebe7fa99bfd", "score": "0.5337109", "text": "func (r ApiGetWorkflowServiceItemHealthCheckDefinitionListRequest) Top(top int32) ApiGetWorkflowServiceItemHealthCheckDefinitionListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "70269cd7553a3d527aca165ce31986c3", "score": "0.531345", "text": "func (r ApiGetWorkflowAnsibleBatchExecutorListRequest) Top(top int32) ApiGetWorkflowAnsibleBatchExecutorListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "914a1acd838df633bbda2d32797a8ad8", "score": "0.52988213", "text": "func (r ApiGetApplianceSystemInfoListRequest) Top(top int32) ApiGetApplianceSystemInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "c48e4aab1bc146141353384423a7c271", "score": "0.5284233", "text": "func (r ApiGetWorkflowServiceItemDefinitionListRequest) Top(top int32) ApiGetWorkflowServiceItemDefinitionListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "868a5324b326b9108f4db6bbf8785083", "score": "0.5274671", "text": "func (r ApiGetIaasMostRunTasksListRequest) Top(top int32) ApiGetIaasMostRunTasksListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "0511c847d6ac29300758404134a2dc36", "score": "0.5270264", "text": "func (r ApiGetWorkflowServiceItemAttributeListRequest) Top(top int32) ApiGetWorkflowServiceItemAttributeListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "d663e41942ca1396f85edaac3711c13e", "score": "0.52645504", "text": "func (r ApiGetIamPermissionListRequest) Top(top int32) ApiGetIamPermissionListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "4cbede6e022d103774860f8c2cf80588", "score": "0.52415836", "text": "func (r ApiGetApplianceClusterInfoListRequest) Top(top int32) ApiGetApplianceClusterInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "ab7def78939750e87939755b40222d73", "score": "0.5238541", "text": "func (r ApiGetIaasMostRunTasksListRequest) Filter(filter string) ApiGetIaasMostRunTasksListRequest {\n\tr.filter = &filter\n\treturn r\n}", "title": "" }, { "docid": "a97ec7e2787e3b346fdbf901b1b98946", "score": "0.5233", "text": "func (r ApiGetApplianceGroupOpStatusListRequest) Top(top int32) ApiGetApplianceGroupOpStatusListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "aaaf39fe217cfcc7cb6e85bfac041701", "score": "0.52215344", "text": "func (r ApiGetIamServiceProviderListRequest) Top(top int32) ApiGetIamServiceProviderListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "2fd4df7fd027879b69bef4febd9f5fc3", "score": "0.52187973", "text": "func (r ApiGetApplianceNodeInfoListRequest) Top(top int32) ApiGetApplianceNodeInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "8f0db1eb20912562a47480b346fa03ff", "score": "0.52179855", "text": "func (r ApiGetApplianceMetaManifestListRequest) Top(top int32) ApiGetApplianceMetaManifestListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "9697f5f9e5f1565d3a126f2c7cb6076d", "score": "0.52136403", "text": "func (r ApiGetWorkflowCatalogServiceRequestListRequest) Top(top int32) ApiGetWorkflowCatalogServiceRequestListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "c7597817bdaec559016c445cad8d72c8", "score": "0.52085966", "text": "func (r ApiGetWorkflowCatalogListRequest) Top(top int32) ApiGetWorkflowCatalogListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "c260551826caccc09c3a1cd45b59475e", "score": "0.5201341", "text": "func (r ApiGetWorkflowBatchApiExecutorListRequest) Top(top int32) ApiGetWorkflowBatchApiExecutorListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "efa10d1b23fd39dd4e7ea46fcaa5ed59", "score": "0.5187306", "text": "func (r ApiGetApplianceDataExportPolicyListRequest) Top(top int32) ApiGetApplianceDataExportPolicyListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "cc0c979b5ab11652bdfbe6911ce2c656", "score": "0.51849794", "text": "func (r ApiGetWorkflowPowerShellBatchApiExecutorListRequest) Top(top int32) ApiGetWorkflowPowerShellBatchApiExecutorListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "6d4c7181df4dd9f43739cc3a7d2f065a", "score": "0.5183096", "text": "func (r ApiGetResourceSelectionCriteriaListRequest) Top(top int32) ApiGetResourceSelectionCriteriaListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "061e98fe06df43d42b9b431f2f9ecf50", "score": "0.5177469", "text": "func (r ApiGetApplianceSetupInfoListRequest) Top(top int32) ApiGetApplianceSetupInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "204c1af88c03cb43819cb25a91803b21", "score": "0.5169978", "text": "func (r ApiGetIaasServiceRequestListRequest) Top(top int32) ApiGetIaasServiceRequestListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "2e9737e53b85139ce11a374251f8459e", "score": "0.51574904", "text": "func (r ApiGetApplianceGroupStatusListRequest) Top(top int32) ApiGetApplianceGroupStatusListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "b5e526ce82924bcfb6e95af465e53b63", "score": "0.5150535", "text": "func (r ApiGetApplianceSystemOpStatusListRequest) Top(top int32) ApiGetApplianceSystemOpStatusListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "1500937df039259d6265cf95882566a1", "score": "0.5126585", "text": "func (r ApiGetWorkflowWorkflowInfoListRequest) Top(top int32) ApiGetWorkflowWorkflowInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "0cb12fc7994b27d33397fc20e752be7b", "score": "0.51231897", "text": "func (r ApiGetWorkflowTaskInfoListRequest) Top(top int32) ApiGetWorkflowTaskInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "1d2bdbb79a69c653d49e1a32cf398761", "score": "0.5118994", "text": "func (r ApiGetWorkflowPendingDynamicWorkflowInfoListRequest) Top(top int32) ApiGetWorkflowPendingDynamicWorkflowInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "fb516c33f30e4a853d3f99b90f46cbda", "score": "0.5118757", "text": "func (c *Client) TopItems() ([]int, error) {\n\tc.defaultify()\n\tresp, err := http.Get(fmt.Sprintf(\"%s/topstories.json\", c.apiBase))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\tvar ids []int\n\tdec := json.NewDecoder(resp.Body)\n\terr = dec.Decode(&ids)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn ids, nil\n}", "title": "" }, { "docid": "6cd3834fe5fd95137cd79ecb57a6ac6d", "score": "0.5105175", "text": "func (r ApiGetApplianceSystemStatusListRequest) Top(top int32) ApiGetApplianceSystemStatusListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "4b7f78f15928481f52b608dc580ec834", "score": "0.51034874", "text": "func (r ApiGetIamResourceLimitsListRequest) Top(top int32) ApiGetIamResourceLimitsListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "68ee961f7b336033bd2f7a601bc93c44", "score": "0.5093268", "text": "func (r ApiGetFcPortChannelListRequest) Top(top int32) ApiGetFcPortChannelListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "5c928cab6a850f233f2f44f69ef66f05", "score": "0.50829315", "text": "func (r ApiGetIamUserListRequest) Top(top int32) ApiGetIamUserListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "36873f1f39f51acb5a1806cee5ada09c", "score": "0.5081937", "text": "func (r ApiGetHclHwCatalogInfoListRequest) Top(top int32) ApiGetHclHwCatalogInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "cda9af73e3edebb567a5b125b15f1761", "score": "0.5081868", "text": "func (r ApiGetIamLdapProviderListRequest) Top(top int32) ApiGetIamLdapProviderListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "50bbdcfcd7fa1724ca995938dc2b1f1e", "score": "0.5075843", "text": "func (r ApiGetHclExemptedCatalogListRequest) Top(top int32) ApiGetHclExemptedCatalogListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "46b591ab74218394ad6a7bb1651974c2", "score": "0.50751257", "text": "func (r ApiGetIamQualifierListRequest) Top(top int32) ApiGetIamQualifierListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "493aa14626b27058e1bbeb83562d997b", "score": "0.50691736", "text": "func (r ApiGetApplianceNodeOpStatusListRequest) Top(top int32) ApiGetApplianceNodeOpStatusListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "abcd01f9690820042e6d55825817fd7e", "score": "0.50634885", "text": "func TrimTop(m Matcher) Filter {\n\treturn func(entries []Entry) []Entry {\n\t\tfor i, e := range entries {\n\t\t\tif m(e) {\n\t\t\t\treturn entries[i:]\n\t\t\t}\n\t\t}\n\t\treturn []Entry{}\n\t}\n}", "title": "" }, { "docid": "e7a898524b8024d9ced67d847e3dd2f1", "score": "0.5059298", "text": "func (r ApiGetIamIdpListRequest) Top(top int32) ApiGetIamIdpListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "af544ebba1179be7c726880681969340", "score": "0.50395983", "text": "func (r ApiGetWorkflowSshBatchExecutorListRequest) Top(top int32) ApiGetWorkflowSshBatchExecutorListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "a9418f9ab000a973dba88a2738a2df5e", "score": "0.50346345", "text": "func (r ApiGetCloudTfcAgentpoolListRequest) Top(top int32) ApiGetCloudTfcAgentpoolListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "5105728667a84720c752f2071622c812", "score": "0.5034373", "text": "func (r ApiGetApplianceAutoRmaPolicyListRequest) Top(top int32) ApiGetApplianceAutoRmaPolicyListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "324818764f763ac5d4a6cc49e0761a4a", "score": "0.5032451", "text": "func (r ApiGetWorkflowCustomDataTypeDefinitionListRequest) Top(top int32) ApiGetWorkflowCustomDataTypeDefinitionListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "9d0c8c28924cc252709182588458a0e4", "score": "0.5025325", "text": "func (r ApiGetIamResourcePermissionListRequest) Top(top int32) ApiGetIamResourcePermissionListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "b13a92eb3ddd45993e6175d887f59298", "score": "0.5020008", "text": "func (r ApiGetApplianceRestoreListRequest) Top(top int32) ApiGetApplianceRestoreListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "3fb16b2ef69596d4b3e10a89bfc53ed4", "score": "0.50153565", "text": "func (r ApiGetIamEndPointUserPolicyInventoryListRequest) Top(top int32) ApiGetIamEndPointUserPolicyInventoryListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "e2f2f6b9e11cdbb23af840177e676d6f", "score": "0.50144786", "text": "func (r ApiGetWorkflowTemplateFunctionMetaListRequest) Top(top int32) ApiGetWorkflowTemplateFunctionMetaListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "5cd140a321cf6d227b1ad1a65d56d642", "score": "0.5002915", "text": "func (r ApiGetResourceLicenseResourceCountListRequest) Top(top int32) ApiGetResourceLicenseResourceCountListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "15c25904236296b59e24493557a3409c", "score": "0.49999297", "text": "func (r ApiGetHclServerHwCatalogInfoListRequest) Top(top int32) ApiGetHclServerHwCatalogInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "18a3ec43019471a3dece433821ac18ff", "score": "0.49996433", "text": "func (r ApiGetResourceGroupListRequest) Top(top int32) ApiGetResourceGroupListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "55eb3c4e2153eb8f8342d69994d10f67", "score": "0.49966908", "text": "func (r ApiGetResourceMembershipListRequest) Top(top int32) ApiGetResourceMembershipListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "ba0632b3b35b534bc414345964650efd", "score": "0.49805263", "text": "func (r ApiGetApplianceNodeStatusListRequest) Top(top int32) ApiGetApplianceNodeStatusListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "3f6e0de0b71b0b66c8e177eb6d045824", "score": "0.49734", "text": "func (r ApiGetApplianceClusterReplaceNodeListRequest) Top(top int32) ApiGetApplianceClusterReplaceNodeListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "ebc63d956ff17416ae1940afadecaf1b", "score": "0.4958295", "text": "func (r ApiGetAssetDeploymentListRequest) Top(top int32) ApiGetAssetDeploymentListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "446755ad71662e343c2cf302e1c22742", "score": "0.49577835", "text": "func (r ApiGetIamAppRegistrationListRequest) Top(top int32) ApiGetIamAppRegistrationListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "9c8e3ec298dca9721e6948cf66133685", "score": "0.4953999", "text": "func (r ApiGetIamEndPointUserInventoryListRequest) Top(top int32) ApiGetIamEndPointUserInventoryListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "24ca604290fbb0f71f084cfc8804ae91", "score": "0.4952228", "text": "func (r ApiGetLicenseIwoLicenseCountListRequest) Top(top int32) ApiGetLicenseIwoLicenseCountListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "dc5eeb8e6d293e5cdd94cce07e521374", "score": "0.49489695", "text": "func buildItemFilter(url *url.URL) defs.ItemFilter {\n\t// We can ignore the error because count=0 means disabled.\n\tvar count, _ = strconv.Atoi(url.Query().Get(\"count\"))\n\tvar skip, _ = strconv.Atoi(url.Query().Get(\"skip\"))\n\t// Build ItemFilter from query params.\n\tvar filter = defs.ItemFilter{\n\t\tQuery: url.Query().Get(\"query\"),\n\t\tCount: count,\n\t\tSkip: skip,\n\t}\n\treturn filter\n}", "title": "" }, { "docid": "61e5cf9bd4422d9021957947f72b5e1f", "score": "0.49387503", "text": "func (r ApiGetCloudTfcOrganizationListRequest) Top(top int32) ApiGetCloudTfcOrganizationListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "decf34a1c18001b05e3566d36dd8f563", "score": "0.493594", "text": "func (r ApiGetIamSystemListRequest) Top(top int32) ApiGetIamSystemListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "9b270dfa53662fd47c50ed1201b4f9ef", "score": "0.49324632", "text": "func (r ApiGetIamApiKeyListRequest) Top(top int32) ApiGetIamApiKeyListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "d0de9edb9dce96c76be10dff7e2c8830", "score": "0.49309674", "text": "func (r ApiGetFcPhysicalPortListRequest) Top(top int32) ApiGetFcPhysicalPortListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "5d5303fc849eba2324f79e5bdc3455d6", "score": "0.4918673", "text": "func (db *MongoDbBridge) uniswapActionListTop(col *mongo.Collection, pairAddress *common.Address, actionType int32, cursor *string, count int32, list *types.UniswapActionList) error {\n\t// get the filter\n\tfilter, err := uniswapActionListTopFilter(pairAddress, cursor, actionType)\n\tif err != nil {\n\t\tdb.log.Errorf(\"can not find top uniswap action for the list; %s\", err.Error())\n\t\treturn err\n\t}\n\n\t// find out the cursor ordinal index\n\tif cursor == nil && count > 0 {\n\t\t// get the highest available ordinal index (top uniswap action)\n\t\tlist.First, err = db.findUniswapActionBorderOrdinalIndex(col,\n\t\t\t*filter,\n\t\t\toptions.FindOne().SetSort(bson.D{{Key: fiSwapOrdIndex, Value: -1}}))\n\t\tlist.IsStart = true\n\n\t} else if cursor == nil && count < 0 {\n\t\t// get the lowest available ordinal index (bottom uniswap action)\n\t\tlist.First, err = db.findUniswapActionBorderOrdinalIndex(col,\n\t\t\t*filter,\n\t\t\toptions.FindOne().SetSort(bson.D{{Key: fiSwapOrdIndex, Value: 1}}))\n\t\tlist.IsEnd = true\n\n\t} else if cursor != nil {\n\t\t// get the highest available ordinal index (top uniswap action)\n\t\tlist.First, err = db.findUniswapActionBorderOrdinalIndex(col,\n\t\t\t*filter,\n\t\t\toptions.FindOne())\n\t}\n\n\t// check the error\n\tif err != nil {\n\t\tdb.log.Errorf(\"can not find the initial uniswap action\")\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6070ba57a98096cb1f8ef11960358d5f", "score": "0.4916079", "text": "func (r ApiGetIaasSystemTaskInfoListRequest) Top(top int32) ApiGetIaasSystemTaskInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "8b7673e4fd98ec9ec408db6bbb2727e5", "score": "0.49152026", "text": "func (r ApiGetCloudRegionsListRequest) Top(top int32) ApiGetCloudRegionsListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "820fbf1fc2337e18caaeedc6587d73ba", "score": "0.4912639", "text": "func (r ApiGetApplianceFileSystemOpStatusListRequest) Top(top int32) ApiGetApplianceFileSystemOpStatusListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "42c18dfa74bde8c5895051dd5ce47f34", "score": "0.49069136", "text": "func (r ApiGetIaasConnectorPackListRequest) Top(top int32) ApiGetIaasConnectorPackListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "1a4a8a938282fe1f125c919eb2135fb3", "score": "0.4906432", "text": "func (r ApiGetNetworkVrfListRequest) Top(top int32) ApiGetNetworkVrfListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "36acee9ff3295cbb4e0ce357fbb86d81", "score": "0.49060094", "text": "func (r ApiGetIamIpAccessManagementListRequest) Top(top int32) ApiGetIamIpAccessManagementListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "dc26e049142cfab4da8800ae831c5bfc", "score": "0.48994634", "text": "func (r ApiGetWorkflowWorkflowMetadataListRequest) Top(top int32) ApiGetWorkflowWorkflowMetadataListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "5590935420d9a119b5d1da855518e1d2", "score": "0.48973966", "text": "func (r ApiGetApplianceClusterInstallListRequest) Top(top int32) ApiGetApplianceClusterInstallListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "487c6a732363b16996d29a7fce9acba8", "score": "0.4894244", "text": "func (r ApiGetApplianceImageBundleListRequest) Top(top int32) ApiGetApplianceImageBundleListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "8dffe7edfd30a35f7347234f669dcb28", "score": "0.4889243", "text": "func (f *FilterHandler) Filter(w http.ResponseWriter, r *http.Request) {\n\tvar args schedulerapi.ExtenderArgs\n\n\tif r.Body == nil || r.ContentLength == 0 {\n\t\tdefaultLog.Errorf(\"Error: Empty request body\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tdata, _ := ioutil.ReadAll(r.Body)\n\tdec := json.NewDecoder(bytes.NewReader(data))\n\tdec.DisallowUnknownFields()\n\n\terr := dec.Decode(&args)\n\tif err != nil {\n\t\tdefaultLog.Errorf(\"Error marshalling json data: %v\", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tdefaultLog.Infof(\"Post received at ISecL extended scheduler, ExtenderArgs: %v\", args)\n\t//Create a binding for args passed to the POST api\n\tresult, err := algorithm.FilteredHost(&args, f.ResourceStore.IHubPubKeys, f.ResourceStore.TagPrefix)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdefaultLog.Errorf(\"Error while serving request %v\", err)\n\t\treturn\n\t}\n\tresultBytes, err := json.Marshal(result)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdefaultLog.Errorf(\"Error while json marshalling of response %v\", err)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\t_, err = bytes.NewBuffer(resultBytes).WriteTo(w)\n\tif err != nil {\n\t\tdefaultLog.Errorf(\"Error while writing response %v\", err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "dbb778220405ea6706abe8dbb5ad1ead", "score": "0.48824725", "text": "func (s *Service) UpFilters(c context.Context, arg *model.ArgUpFilters) (res []*model.UpFilter, err error) {\n\terr = s.client.Call(c, _upFilters, arg, &res)\n\treturn\n}", "title": "" }, { "docid": "21aec9e18264585e4fff2546ae76a805", "score": "0.4881722", "text": "func (r ApiGetIamLdapPolicyListRequest) Top(top int32) ApiGetIamLdapPolicyListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "83d3581d93d307a0a54e88380a7ef56b", "score": "0.48641813", "text": "func (r ApiGetResourceMembershipHolderListRequest) Top(top int32) ApiGetResourceMembershipHolderListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "d7236fce5d78cbc363515392f94b849c", "score": "0.48620185", "text": "func (m *Model) handleFiltering(msg tea.Msg) tea.Cmd {\n\tvar cmds []tea.Cmd\n\n\t// Handle keys\n\tif msg, ok := msg.(tea.KeyMsg); ok {\n\t\tswitch {\n\t\tcase key.Matches(msg, m.KeyMap.CancelWhileFiltering):\n\t\t\tm.resetFiltering()\n\t\t\tm.KeyMap.Filter.SetEnabled(true)\n\t\t\tm.KeyMap.ClearFilter.SetEnabled(false)\n\n\t\tcase key.Matches(msg, m.KeyMap.AcceptWhileFiltering):\n\t\t\tm.hideStatusMessage()\n\n\t\t\tif len(m.items) == 0 {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\th := m.VisibleItems()\n\n\t\t\t// If we've filtered down to nothing, clear the filter\n\t\t\tif len(h) == 0 {\n\t\t\t\tm.resetFiltering()\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tm.FilterInput.Blur()\n\t\t\tm.filterState = FilterApplied\n\t\t\tm.updateKeybindings()\n\n\t\t\tif m.FilterInput.Value() == \"\" {\n\t\t\t\tm.resetFiltering()\n\t\t\t}\n\t\t}\n\t}\n\n\t// Update the filter text input component\n\tnewFilterInputModel, inputCmd := m.FilterInput.Update(msg)\n\tfilterChanged := m.FilterInput.Value() != newFilterInputModel.Value()\n\tm.FilterInput = newFilterInputModel\n\tcmds = append(cmds, inputCmd)\n\n\t// If the filtering input has changed, request updated filtering\n\tif filterChanged {\n\t\tcmds = append(cmds, filterItems(*m))\n\t\tm.KeyMap.AcceptWhileFiltering.SetEnabled(m.FilterInput.Value() != \"\")\n\t}\n\n\t// Update pagination\n\tm.updatePagination()\n\n\treturn tea.Batch(cmds...)\n}", "title": "" }, { "docid": "9ad087d25dd72e9f62baad9669ed2446", "score": "0.48600283", "text": "func (r ApiGetBiosPolicyListRequest) Top(top int32) ApiGetBiosPolicyListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "a246139a5c28f3c59c214a7ed384c56a", "score": "0.48598617", "text": "func (r ApiGetIamDomainNameInfoListRequest) Top(top int32) ApiGetIamDomainNameInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "97f3a58ba36165f8b8aed88534bd7b02", "score": "0.4855659", "text": "func (r ApiGetResourceGroupMemberListRequest) Top(top int32) ApiGetResourceGroupMemberListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "870effe7b2b0f14fad2ca6f987703dbf", "score": "0.48544925", "text": "func (r ApiGetIamTrustPointListRequest) Top(top int32) ApiGetIamTrustPointListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "5c9726994c02aabebc7d68f140cfc7a0", "score": "0.48543817", "text": "func (fa *filterAction) ApplyFilters() error {\n\tif len(fa.context.ActionableList()) > 0 {\n\t\tfa.list = append([]string{}, fa.context.ActionableList()...)\n\n\t\treturn nil\n\t} else if fa.context.Options().IsSnapshot() && fa.context.Options().Exists(\"name\") {\n\t\treturn fa.setSanpshotInfo()\n\t}\n\n\tvar actionableList []string\n\tvar err error\n\n\tif fa.context.Options().IsSnapshot() {\n\t\tactionableList, err = fa.indexer.ListSnapshots(fa.context.Options().String(\"repository\"))\n\t} else {\n\t\tactionableList, err = fa.indexer.ListAllIndices()\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif fa.context.Builder().IsEmpty() {\n\t\tfa.list = actionableList\n\n\t\treturn nil\n\t}\n\n\tlist := []string{}\n\n\tfor _, element := range actionableList {\n\t\tinclude, err := fa.runFilter(element)\n\n\t\tif err != nil {\n\t\t\tfa.reporter.logFilterResults()\n\n\t\t\treturn err\n\t\t}\n\n\t\tif include {\n\t\t\tlist = append(list, element)\n\t\t}\n\t}\n\n\tif len(fa.context.Builder().AggregateCriteria()) > 0 {\n\t\tlist, err = fa.runAggregateFilters(list)\n\t}\n\n\tfa.list = list\n\n\tfa.reporter.logFilterResults()\n\n\treturn err\n}", "title": "" }, { "docid": "5fcc45a37d4b580fb148aec28daa236e", "score": "0.4852139", "text": "func (r ApiGetWorkflowServiceItemActionInstanceListRequest) Filter(filter string) ApiGetWorkflowServiceItemActionInstanceListRequest {\n\tr.filter = &filter\n\treturn r\n}", "title": "" }, { "docid": "1ce2dad043f0c358b32ebfb9bc5e1b9d", "score": "0.48503822", "text": "func (r ApiGetNetworkVlanPortInfoListRequest) Top(top int32) ApiGetNetworkVlanPortInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "0a97a82c214464158a0794a4a88b55d1", "score": "0.48435938", "text": "func (r ApiGetHclHyperflexSoftwareCompatibilityInfoListRequest) Top(top int32) ApiGetHclHyperflexSoftwareCompatibilityInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "c792c168a39c724d86a650269c7dffd0", "score": "0.48422948", "text": "func (r ApiGetWorkflowTaskMetadataListRequest) Top(top int32) ApiGetWorkflowTaskMetadataListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "b67679a1f7107c900a32a6fd2d1997f8", "score": "0.48391", "text": "func (r ApiGetIamUserGroupListRequest) Top(top int32) ApiGetIamUserGroupListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" }, { "docid": "f674f8d1f9b7a80cbc71da72bef33af8", "score": "0.48389837", "text": "func (r ApiGetNetworkFcZoneInfoListRequest) Top(top int32) ApiGetNetworkFcZoneInfoListRequest {\n\tr.top = &top\n\treturn r\n}", "title": "" } ]
75fddf290489077187bb966a54104140
CalculateDiscounts provides a mock function with given fields: items
[ { "docid": "8eda0d69fee14fa1047cfb79dadb5fac", "score": "0.71036994", "text": "func (_m *DiscountUseCase) CalculateDiscounts(items []checkout.Item) ([]checkout.Item, error) {\n\tret := _m.Called(items)\n\n\tvar r0 []checkout.Item\n\tif rf, ok := ret.Get(0).(func([]checkout.Item) []checkout.Item); ok {\n\t\tr0 = rf(items)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]checkout.Item)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func([]checkout.Item) error); ok {\n\t\tr1 = rf(items)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" } ]
[ { "docid": "2b731691dc3a28ee2086a88c78d84ef2", "score": "0.56157917", "text": "func mockCreditItem() *CreditItem {\n\tci := NewCreditItem()\n\tci.AuxiliaryOnUs = \"123456789\"\n\tci.ExternalProcessingCode = \"\"\n\tci.PostingBankRoutingNumber = \"031300012\"\n\tci.OnUs = \"5558881\"\n\tci.ItemAmount = 100000 // 1000.00\n\tci.CreditItemSequenceNumber = \"1 \"\n\tci.DocumentationTypeIndicator = \"G\"\n\tci.AccountTypeCode = \"1\"\n\tci.SourceWorkCode = \"01\"\n\tci.UserField = \" \"\n\treturn ci\n}", "title": "" }, { "docid": "aa8e98b3f9cc1e7798f30001d0720286", "score": "0.5596148", "text": "func (m *MockDiscountService) GetDiscounts() ([]domain.Discount, apierrors.ApiErr) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetDiscounts\")\n\tret0, _ := ret[0].([]domain.Discount)\n\tret1, _ := ret[1].(apierrors.ApiErr)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "9551ac123baf0312850b9e371f950fba", "score": "0.5382567", "text": "func TestItems(t *testing.T) {\n\ttestData := []*struct {\n\t\tItem *Item\n\t\tWantDiscount int64\n\t}{\n\t\t{\n\t\t\tItem: &Item{\n\t\t\t\tName: \"Honda\",\n\t\t\t\tPrice: 2300,\n\t\t\t},\n\t\t\tWantDiscount: 30,\n\t\t},\n\t\t{\n\t\t\tItem: &Item{\n\t\t\t\tName: \"Honda\",\n\t\t\t\tPrice: 1500,\n\t\t\t},\n\t\t\tWantDiscount: 0,\n\t\t},\n\t\t{\n\t\t\tItem: &Item{\n\t\t\t\tName: \"Hero\",\n\t\t\t\tPrice: 1500,\n\t\t\t},\n\t\t\tWantDiscount: 40,\n\t\t},\n\t\t{\n\t\t\tItem: &Item{\n\t\t\t\tName: \"Suziki\",\n\t\t\t\tPrice: 1500,\n\t\t\t},\n\t\t\tWantDiscount: 40,\n\t\t},\n\t}\n\n\t// Prepare knowledgebase library and load it with our rule.\n\tlib := ast.NewKnowledgeLibrary()\n\trb := builder.NewRuleBuilder(lib)\n\tbyteArr := pkg.NewBytesResource([]byte(logicalOperationsGrl))\n\terr := rb.BuildRuleFromResource(\"ItemTutorial\", \"0.0.1\", byteArr)\n\tassert.NoError(t, err)\n\n\tengine := &engine.GruleEngine{\n\t\tMaxCycle: 10,\n\t}\n\tknowledgeBase := lib.NewKnowledgeBaseInstance(\"ItemTutorial\", \"0.0.1\")\n\n\tfor i, td := range testData {\n\t\tt.Run(strconv.Itoa(i), func(t *testing.T) {\n\t\t\tdataCtx := ast.NewDataContext()\n\t\t\terr := dataCtx.Add(\"Item\", td.Item)\n\t\t\tassert.NoError(t, err)\n\n\t\t\terr = engine.Execute(dataCtx, knowledgeBase)\n\t\t\tassert.NoError(t, err)\n\t\t\tassert.Equal(t, td.WantDiscount, td.Item.Discount)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "85e0e92d8486afbe3996d854068ebd31", "score": "0.5379998", "text": "func (_m *MockManager) GetProductsWithDiscount(filters ...products.Filter) ([]Product, error) {\n\t_va := make([]interface{}, len(filters))\n\tfor _i := range filters {\n\t\t_va[_i] = filters[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 []Product\n\tif rf, ok := ret.Get(0).(func(...products.Filter) []Product); ok {\n\t\tr0 = rf(filters...)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]Product)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(...products.Filter) error); ok {\n\t\tr1 = rf(filters...)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "5b342584b166ebfe277a6bd46bb1ca67", "score": "0.53297514", "text": "func (m *MockIDatabase) CountTotalOfDisbursement(ctx context.Context, request *model.GetListDisbursement) (*int64, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CountTotalOfDisbursement\", ctx, request)\n\tret0, _ := ret[0].(*int64)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "bb4f68894db4fe75ebddc73bee3df592", "score": "0.53280437", "text": "func (m *MockThumbupRPC) ItemDislikes(c context.Context, arg *model.ArgItemLikes) ([]*model.UserLikeRecord, error) {\n\tret := m.ctrl.Call(m, \"ItemDislikes\", c, arg)\n\tret0, _ := ret[0].([]*model.UserLikeRecord)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "2f8aa5941f7cf41d4cf3e44a66ede445", "score": "0.52864236", "text": "func TestMockCreditItem(t *testing.T) {\n\tci := mockCreditItem()\n\trequire.NoError(t, ci.Validate())\n\trequire.Equal(t, \"62\", ci.recordType)\n\trequire.Equal(t, \"123456789\", ci.AuxiliaryOnUs)\n\trequire.Equal(t, \"\", ci.ExternalProcessingCode)\n\trequire.Equal(t, \"031300012\", ci.PostingBankRoutingNumber)\n\trequire.Equal(t, \"5558881\", ci.OnUs)\n\trequire.Equal(t, 100000, ci.ItemAmount)\n\trequire.Equal(t, \"1 \", ci.CreditItemSequenceNumber)\n\trequire.Equal(t, \"G\", ci.DocumentationTypeIndicator)\n\trequire.Equal(t, \"1\", ci.AccountTypeCode)\n\trequire.Equal(t, \"01\", ci.SourceWorkCode)\n\trequire.Equal(t, \" \", ci.UserField)\n}", "title": "" }, { "docid": "f714122e1b783bcc7186bfb17b7a7e93", "score": "0.51929647", "text": "func (_m *MockListService) Do(ctx context.Context, query string, filter *data.Filter, sort *data.SortCond, from int) ([]*data.Product, int64, error) {\n\tret := _m.Called(ctx, query, filter, sort, from)\n\n\tvar r0 []*data.Product\n\tif rf, ok := ret.Get(0).(func(context.Context, string, *data.Filter, *data.SortCond, int) []*data.Product); ok {\n\t\tr0 = rf(ctx, query, filter, sort, from)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]*data.Product)\n\t\t}\n\t}\n\n\tvar r1 int64\n\tif rf, ok := ret.Get(1).(func(context.Context, string, *data.Filter, *data.SortCond, int) int64); ok {\n\t\tr1 = rf(ctx, query, filter, sort, from)\n\t} else {\n\t\tr1 = ret.Get(1).(int64)\n\t}\n\n\tvar r2 error\n\tif rf, ok := ret.Get(2).(func(context.Context, string, *data.Filter, *data.SortCond, int) error); ok {\n\t\tr2 = rf(ctx, query, filter, sort, from)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "6f670140c9a157325c16e5cfbad8eea3", "score": "0.5187137", "text": "func (c *Client)GetDiscounts(filter ...Filters)(*Discounts, error){\n\to := &FilterOptions{}\n\tfor _, opt := range filter {\n\t\topt(o)\n\t}\n\tvar query string\n\tif o.Page == \"\" && o.Size == \"\"{\n\t\tquery = \"\"\n\t}\n\n\tif o.Page != \"\" && o.Size != \"\"{\n\t\tquery = \"?page=\" + o.Page + \"&size=\" + o.Size\n\t}\n\n\tif o.Page != \"\" && o.Size == \"\" {\n\t\tquery = \"?page=\" + o.Page\n\t}\n\n\tif o.Page == \"\" && o.Size != \"\" {\n\t\tquery = \"?size=\" + o.Size\n\t}\n\n\tmethod := \"GET\"\n\tclient := c.HttpClient\n\n\trequestUrl := c.BaseURL + \"/operators/commissions\" + query\n\treq, _ := http.NewRequest(method, requestUrl, nil)\n\n\treq.Header.Add(\"Authorization\", c.AuthHeader)\n\treq.Header.Add(\"Reloadly-Client\", c.telemetryHeader)\n\tres, err := client.Do(req)\n\n\tif err != nil {\n\t\treturn nil, &error2.ErrorResponse{Message: err.Error()}\n\t}\n\n\tdefer res.Body.Close()\n\n\tvar e error2.ErrorResponse\n\tvar r Discounts\n\tif res.StatusCode != http.StatusOK {\n\t\terr := json.NewDecoder(res.Body).Decode(&e)\n\t\tif err != nil {\n\t\t\treturn nil, &error2.ErrorResponse{Message: err.Error()}\n\t\t}\n\t\treturn nil, &e\n\n\t}\n\n\terr = json.NewDecoder(res.Body).Decode(&r)\n\tif err != nil {\n\t\treturn nil, &error2.ErrorResponse{Message: err.Error()}\n\t}\n\n\treturn &r, nil\n}", "title": "" }, { "docid": "6cad3bc678ea91e80da7451c0700cb2a", "score": "0.5088083", "text": "func (_m *ModifyBehaviour) UpdateItems(ctx context.Context, _a1 *cart.Cart, itemUpdateCommands []cart.ItemUpdateCommand) (*cart.Cart, cart.DeferEvents, error) {\n\tret := _m.Called(ctx, _a1, itemUpdateCommands)\n\n\tvar r0 *cart.Cart\n\tvar r1 cart.DeferEvents\n\tvar r2 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, []cart.ItemUpdateCommand) (*cart.Cart, cart.DeferEvents, error)); ok {\n\t\treturn rf(ctx, _a1, itemUpdateCommands)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, []cart.ItemUpdateCommand) *cart.Cart); ok {\n\t\tr0 = rf(ctx, _a1, itemUpdateCommands)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*cart.Cart)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, *cart.Cart, []cart.ItemUpdateCommand) cart.DeferEvents); ok {\n\t\tr1 = rf(ctx, _a1, itemUpdateCommands)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(cart.DeferEvents)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(2).(func(context.Context, *cart.Cart, []cart.ItemUpdateCommand) error); ok {\n\t\tr2 = rf(ctx, _a1, itemUpdateCommands)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "1a0adc89aa75516bdfcf8a62d4f1e328", "score": "0.4944631", "text": "func (_m *QueryResolver) Items(ctx context.Context) ([]pg.Item, error) {\n\tret := _m.Called(ctx)\n\n\tvar r0 []pg.Item\n\tif rf, ok := ret.Get(0).(func(context.Context) []pg.Item); ok {\n\t\tr0 = rf(ctx)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]pg.Item)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context) error); ok {\n\t\tr1 = rf(ctx)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "01b7ee6e60abe601f37908cb7ac70a19", "score": "0.48750654", "text": "func mockRemittanceBeneficiary() *RemittanceBeneficiary {\n\trb := NewRemittanceBeneficiary()\n\trb.RemittanceData.Name = \"Name\"\n\trb.IdentificationType = OrganizationID\n\trb.IdentificationCode = OICCustomerNumber\n\trb.IdentificationNumber = \"111111\"\n\trb.IdentificationNumberIssuer = \"Bank\"\n\trb.RemittanceData.DateBirthPlace = \"\"\n\trb.RemittanceData.AddressType = CompletePostalAddress\n\trb.RemittanceData.Department = \"Department\"\n\trb.RemittanceData.SubDepartment = \"Sub-Department\"\n\trb.RemittanceData.StreetName = \"Street Name\"\n\trb.RemittanceData.BuildingNumber = \"16\"\n\trb.RemittanceData.PostCode = \"19405\"\n\trb.RemittanceData.TownName = \"AnyTown\"\n\trb.RemittanceData.CountrySubDivisionState = \"PA\"\n\trb.RemittanceData.Country = \"UA\"\n\trb.RemittanceData.AddressLineOne = \"Address Line One\"\n\trb.RemittanceData.AddressLineTwo = \"Address Line Two\"\n\trb.RemittanceData.AddressLineThree = \"Address Line Three\"\n\trb.RemittanceData.AddressLineFour = \"Address Line Four\"\n\trb.RemittanceData.AddressLineFive = \"Address Line Five\"\n\trb.RemittanceData.AddressLineSix = \"Address Line Six\"\n\trb.RemittanceData.AddressLineSeven = \"Address Line Seven\"\n\trb.RemittanceData.CountryOfResidence = \"US\"\n\treturn rb\n}", "title": "" }, { "docid": "b236ea971361d10e37c418ffa1d2e6ae", "score": "0.4862273", "text": "func (_m *ModifyBehaviour) DeleteItem(ctx context.Context, _a1 *cart.Cart, itemID string, deliveryCode string) (*cart.Cart, cart.DeferEvents, error) {\n\tret := _m.Called(ctx, _a1, itemID, deliveryCode)\n\n\tvar r0 *cart.Cart\n\tvar r1 cart.DeferEvents\n\tvar r2 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, string, string) (*cart.Cart, cart.DeferEvents, error)); ok {\n\t\treturn rf(ctx, _a1, itemID, deliveryCode)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, string, string) *cart.Cart); ok {\n\t\tr0 = rf(ctx, _a1, itemID, deliveryCode)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*cart.Cart)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, *cart.Cart, string, string) cart.DeferEvents); ok {\n\t\tr1 = rf(ctx, _a1, itemID, deliveryCode)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(cart.DeferEvents)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(2).(func(context.Context, *cart.Cart, string, string) error); ok {\n\t\tr2 = rf(ctx, _a1, itemID, deliveryCode)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "c1a847cc76a0b00c259122eba179acd3", "score": "0.4827182", "text": "func (_m *DBDAL) GetItemPromoByItemIDs(itemIDs []string) ([]model.ItemPromo, error) {\n\tret := _m.Called(itemIDs)\n\n\tvar r0 []model.ItemPromo\n\tif rf, ok := ret.Get(0).(func([]string) []model.ItemPromo); ok {\n\t\tr0 = rf(itemIDs)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]model.ItemPromo)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func([]string) error); ok {\n\t\tr1 = rf(itemIDs)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "0923e0236696a36a14f5d199e49f7c62", "score": "0.48160917", "text": "func (_m *DBDAL) GetItemByIDs(itemIDs []string) ([]model.Item, error) {\n\tret := _m.Called(itemIDs)\n\n\tvar r0 []model.Item\n\tif rf, ok := ret.Get(0).(func([]string) []model.Item); ok {\n\t\tr0 = rf(itemIDs)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]model.Item)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func([]string) error); ok {\n\t\tr1 = rf(itemIDs)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "a86b18591b05382bef2ea4163e33e76d", "score": "0.48097634", "text": "func (_m *FluxAggregator) AvailableFunds(opts *bind.CallOpts) (*big.Int, error) {\n\tret := _m.Called(opts)\n\n\tvar r0 *big.Int\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.CallOpts) (*big.Int, error)); ok {\n\t\treturn rf(opts)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.CallOpts) *big.Int); ok {\n\t\tr0 = rf(opts)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*big.Int)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.CallOpts) error); ok {\n\t\tr1 = rf(opts)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "25e049773878f82c93b3d842fadf7104", "score": "0.47695112", "text": "func TestGetTotalPurchase(t *testing.T) {\n\ttm := time.Date(2012, time.November, 12, 15, 00, 00, 00, time.Local)\n\ttm2 := time.Date(time.Now().Year(), time.Now().Month(), 12, 15, 00, 00, 00, time.Local)\n\t// hapus database\n\to := orm.NewOrm()\n\to.Raw(\"DELETE FROM purchase_order\").Exec()\n\t// buat dummy\n\tpo1 := model.DummyPurchaseOrder()\n\tpo1.DocumentStatus = \"new\"\n\tpo1.TotalCharge = float64(21000)\n\tpo1.TotalPaid = float64(10000)\n\tpo1.IsDeleted = int8(0)\n\tpo1.RecognitionDate = tm2\n\tpo1.Save()\n\n\tpo2 := model.DummyPurchaseOrder()\n\tpo2.TotalCharge = float64(5000)\n\tpo2.TotalPaid = float64(1000)\n\tpo2.DocumentStatus = \"new\"\n\tpo2.IsDeleted = int8(1)\n\tpo2.Save()\n\n\tpo3 := model.DummyPurchaseOrder()\n\tpo3.DocumentStatus = \"new\"\n\tpo3.TotalCharge = float64(2000)\n\tpo3.TotalPaid = float64(5000)\n\tpo3.IsDeleted = int8(0)\n\tpo3.Save()\n\n\tpo4 := model.DummyPurchaseOrder()\n\tpo4.DocumentStatus = \"new\"\n\tpo4.TotalCharge = float64(100)\n\tpo4.TotalPaid = float64(500)\n\tpo4.IsDeleted = int8(0)\n\tpo4.RecognitionDate = tm\n\tpo4.Save()\n\t// test\n\ttotal, e := GetTotalPurchase(int(time.Now().Month()), time.Now().Year())\n\tassert.NoError(t, e)\n\tassert.Equal(t, int64(2), total.Total)\n\tassert.Equal(t, float64(23000), total.Charge)\n\tassert.Equal(t, float64(15000), total.Paid)\n}", "title": "" }, { "docid": "dac4f3cd64ed8a4b25644402d88cfa77", "score": "0.47657284", "text": "func (_m *mockBulkService) Do(ctx context.Context) (*elastic.BulkResponse, error) {\n\tret := _m.Called(ctx)\n\n\tvar r0 *elastic.BulkResponse\n\tif rf, ok := ret.Get(0).(func(context.Context) *elastic.BulkResponse); ok {\n\t\tr0 = rf(ctx)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*elastic.BulkResponse)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context) error); ok {\n\t\tr1 = rf(ctx)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "c136bcc61013061ec8881dca8b33d1be", "score": "0.47379684", "text": "func (_m *ModifyBehaviour) UpdateItem(ctx context.Context, _a1 *cart.Cart, itemUpdateCommand cart.ItemUpdateCommand) (*cart.Cart, cart.DeferEvents, error) {\n\tret := _m.Called(ctx, _a1, itemUpdateCommand)\n\n\tvar r0 *cart.Cart\n\tvar r1 cart.DeferEvents\n\tvar r2 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, cart.ItemUpdateCommand) (*cart.Cart, cart.DeferEvents, error)); ok {\n\t\treturn rf(ctx, _a1, itemUpdateCommand)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, cart.ItemUpdateCommand) *cart.Cart); ok {\n\t\tr0 = rf(ctx, _a1, itemUpdateCommand)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*cart.Cart)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, *cart.Cart, cart.ItemUpdateCommand) cart.DeferEvents); ok {\n\t\tr1 = rf(ctx, _a1, itemUpdateCommand)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(cart.DeferEvents)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(2).(func(context.Context, *cart.Cart, cart.ItemUpdateCommand) error); ok {\n\t\tr2 = rf(ctx, _a1, itemUpdateCommand)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "a0c298972bfd89336ea9aa3377066a27", "score": "0.47370994", "text": "func (_m *DomesticLinehaulPricer) PriceDomesticLinehaul(moveDate time.Time, distance unit.Miles, weight unit.Pound, serviceArea string) (unit.Cents, error) {\n\tret := _m.Called(moveDate, distance, weight, serviceArea)\n\n\tvar r0 unit.Cents\n\tif rf, ok := ret.Get(0).(func(time.Time, unit.Miles, unit.Pound, string) unit.Cents); ok {\n\t\tr0 = rf(moveDate, distance, weight, serviceArea)\n\t} else {\n\t\tr0 = ret.Get(0).(unit.Cents)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(time.Time, unit.Miles, unit.Pound, string) error); ok {\n\t\tr1 = rf(moveDate, distance, weight, serviceArea)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "f486c7f33df03f2319ffae313095ae02", "score": "0.47341138", "text": "func (_m *MockOperation) ForEachAdvisory(source string, pkgName string) (map[string][]byte, error) {\n\tret := _m.Called(source, pkgName)\n\n\tvar r0 map[string][]byte\n\tif rf, ok := ret.Get(0).(func(string, string) map[string][]byte); ok {\n\t\tr0 = rf(source, pkgName)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(map[string][]byte)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, string) error); ok {\n\t\tr1 = rf(source, pkgName)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "ce82b4f18bcebfa0ca1e2b15e0f86324", "score": "0.47281605", "text": "func (m *MockDataStore) GetItems(arg0 context.Context, arg1 string, arg2 datalayer.QueryMeta) ([]map[string]interface{}, datalayer.ItemsResponseInfo, error) {\n\tret := m.ctrl.Call(m, \"GetItems\", arg0, arg1, arg2)\n\tret0, _ := ret[0].([]map[string]interface{})\n\tret1, _ := ret[1].(datalayer.ItemsResponseInfo)\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "title": "" }, { "docid": "23cf4bf3e196c051471c20a9d4d1f2f5", "score": "0.47274327", "text": "func (ti *TaxItem) Calculate() {}", "title": "" }, { "docid": "8d968cac3d8301beb7ede9a2e9bf6114", "score": "0.47272554", "text": "func TestGetTotalSales(t *testing.T) {\n\ttm := time.Date(2012, time.November, 12, 15, 00, 00, 00, time.Local)\n\t// hapus database\n\to := orm.NewOrm()\n\to.Raw(\"DELETE FROM sales_order\").Exec()\n\t// buat dummy\n\tso1 := model.DummySalesOrder()\n\tso1.DocumentStatus = \"new\"\n\tso1.TotalCharge = float64(21000)\n\tso1.TotalPaid = float64(10000)\n\tso1.IsDeleted = int8(0)\n\tso1.Save()\n\n\tso2 := model.DummySalesOrder()\n\tso2.DocumentStatus = \"new\"\n\tso2.TotalCharge = float64(5000)\n\tso2.TotalPaid = float64(5000)\n\tso2.IsDeleted = int8(1)\n\tso2.Save()\n\n\tso3 := model.DummySalesOrder()\n\tso3.DocumentStatus = \"new\"\n\tso3.TotalCharge = float64(2000)\n\tso3.TotalPaid = float64(2000)\n\tso3.IsDeleted = int8(0)\n\tso3.Save()\n\n\tso4 := model.DummySalesOrder()\n\tso4.DocumentStatus = \"new\"\n\tso4.TotalCharge = float64(500)\n\tso4.TotalPaid = float64(100)\n\tso4.IsDeleted = int8(0)\n\tso4.RecognitionDate = tm\n\tso4.Save()\n\t// test\n\ttotal, e := GetTotalSales(int(time.Now().Month()), time.Now().Year())\n\tassert.NoError(t, e)\n\tassert.Equal(t, int64(2), total.Total)\n\tassert.Equal(t, float64(23000), total.Charge)\n\tassert.Equal(t, float64(12000), total.Paid)\n}", "title": "" }, { "docid": "70674400c0b99b5e93a7b02e72b2bde9", "score": "0.4722002", "text": "func (_m *QueryResolver) Item(ctx context.Context, id int64) (*pg.Item, error) {\n\tret := _m.Called(ctx, id)\n\n\tvar r0 *pg.Item\n\tif rf, ok := ret.Get(0).(func(context.Context, int64) *pg.Item); ok {\n\t\tr0 = rf(ctx, id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*pg.Item)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, int64) error); ok {\n\t\tr1 = rf(ctx, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "53ef35ed914620290533d5dcc82ee148", "score": "0.47155818", "text": "func (_m *MockRepository) List(req interface{}) (interface{}, *dberrors.Error) {\n\tret := _m.Called(req)\n\n\tvar r0 interface{}\n\tif rf, ok := ret.Get(0).(func(interface{}) interface{}); ok {\n\t\tr0 = rf(req)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(interface{})\n\t\t}\n\t}\n\n\tvar r1 *dberrors.Error\n\tif rf, ok := ret.Get(1).(func(interface{}) *dberrors.Error); ok {\n\t\tr1 = rf(req)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(*dberrors.Error)\n\t\t}\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "985f5322637cd761a1b39f617af7c741", "score": "0.47140348", "text": "func (_m *DBDAL) ReduceItemStock(tx util.Transaction, itemID string, qty int32) error {\n\tret := _m.Called(tx, itemID, qty)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(util.Transaction, string, int32) error); ok {\n\t\tr0 = rf(tx, itemID, qty)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "17acd838ab4c3e0e9019e16a1d8f6bcf", "score": "0.47107083", "text": "func createMockItem(name, description string, price float64) *models.Item {\n\tconfig.Init()\n\tmodels.Init()\n\titem := &models.Item{\n\t\tName: name,\n\t\tDescription: description,\n\t\tPrice: price,\n\t\tImageUrl: \"http://lorempixel.com/300/200/cats\",\n\t}\n\tif err := zoom.Save(item); err != nil {\n\t\tpanic(err)\n\t}\n\treturn item\n}", "title": "" }, { "docid": "6cf7e5b128c122b2e309a443bf9cf935", "score": "0.47091892", "text": "func (p *purchaseWithBonus) CalculateDiscount(ctx context.Context, payload map[string]int64) (float64, error) {\n\tif payload[p.productSKU] < p.minimalQuantity {\n\t\treturn 0, nil\n\t}\n\tproductModel, err := p.productService.Find(ctx, p.bonusProductSKU)\n\tif nil != err {\n\t\treturn 0, err\n\t}\n\tif productModel.Quantity < p.bonusQuantity && payload[p.bonusProductSKU] == 0 {\n\t\treturn 0, nil\n\t}\n\tif payload[p.bonusProductSKU] < p.bonusQuantity {\n\t\treturn 0, fmt.Errorf(\"you have unclaimed promotional product(s) (SKU: %s - %s, Quantity: %d), include your bonus before checking out\", productModel.SKU, productModel.Name, p.bonusQuantity)\n\t}\n\tcount := payload[p.productSKU] / p.minimalQuantity\n\treturn float64(count) * productModel.Price, nil\n}", "title": "" }, { "docid": "00ac5714bf388310999a99500d0fef6d", "score": "0.47065043", "text": "func (_m *TourService) Balance(playerID int) (float32, error) {\n\tret := _m.Called(playerID)\n\n\tvar r0 float32\n\tif rf, ok := ret.Get(0).(func(int) float32); ok {\n\t\tr0 = rf(playerID)\n\t} else {\n\t\tr0 = ret.Get(0).(float32)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int) error); ok {\n\t\tr1 = rf(playerID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "c3130ba2b8908424032e734d02713a83", "score": "0.46999243", "text": "func (m *MockItemsDBManager) GetAllItems() ([]data.Item, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetAllItems\")\n\tret0, _ := ret[0].([]data.Item)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "0d379de303d60e059ea8a36708a48732", "score": "0.4696683", "text": "func (_m *ModifyBehaviour) UpdatePurchaser(ctx context.Context, _a1 *cart.Cart, purchaser *cart.Person, additionalData *cart.AdditionalData) (*cart.Cart, cart.DeferEvents, error) {\n\tret := _m.Called(ctx, _a1, purchaser, additionalData)\n\n\tvar r0 *cart.Cart\n\tvar r1 cart.DeferEvents\n\tvar r2 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, *cart.Person, *cart.AdditionalData) (*cart.Cart, cart.DeferEvents, error)); ok {\n\t\treturn rf(ctx, _a1, purchaser, additionalData)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, *cart.Person, *cart.AdditionalData) *cart.Cart); ok {\n\t\tr0 = rf(ctx, _a1, purchaser, additionalData)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*cart.Cart)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, *cart.Cart, *cart.Person, *cart.AdditionalData) cart.DeferEvents); ok {\n\t\tr1 = rf(ctx, _a1, purchaser, additionalData)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(cart.DeferEvents)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(2).(func(context.Context, *cart.Cart, *cart.Person, *cart.AdditionalData) error); ok {\n\t\tr2 = rf(ctx, _a1, purchaser, additionalData)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "5702a18d34c22c3d82f3f4ad9251af4e", "score": "0.46796578", "text": "func mockBeneficiaryCustomer() *BeneficiaryCustomer {\n\tbc := NewBeneficiaryCustomer()\n\tbc.CoverPayment.SwiftFieldTag = \"Swift Field Tag\"\n\tbc.CoverPayment.SwiftLineOne = \"Swift Line One\"\n\tbc.CoverPayment.SwiftLineTwo = \"Swift Line Two\"\n\tbc.CoverPayment.SwiftLineThree = \"Swift Line Three\"\n\tbc.CoverPayment.SwiftLineFour = \"Swift Line Four\"\n\tbc.CoverPayment.SwiftLineFive = \"Swift Line Five\"\n\treturn bc\n}", "title": "" }, { "docid": "2aae9e523eccda204044e603104a3259", "score": "0.46686155", "text": "func testByIDs(t *testing.T) {\n\tcases := []struct {\n\t\targ []int // payment IDs\n\t\twantCount int // number of results\n\t\twantSum float64 // sum of payment totals\n\t}{\n\t\t{[]int{1}, 1, 108.95},\n\t\t{[]int{1, 101}, 1, 108.95},\n\t\t{[]int{2, 3, 5}, 3, 60.62},\n\t}\n\n\tfor _, c := range cases {\n\t\txp, err := payment.ByIDs(ds, c.arg)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"payment.ByIDs(%v) err = %s\", c.arg, err)\n\t\t}\n\t\tgotCount := len(xp)\n\t\tif gotCount != c.wantCount {\n\t\t\tt.Errorf(\"payment.ByIDs(%v) count = %d, want %d\", c.arg, gotCount, c.wantCount)\n\t\t}\n\t\tvar gotSum float64\n\t\tfor _, p := range xp {\n\t\t\tgotSum += p.Amount\n\t\t}\n\t\tif gotSum != c.wantSum {\n\t\t\tt.Errorf(\"payment.ByIDs(%v) sum amounts = %v, want %v\", c.arg, gotSum, c.wantSum)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0273ecf7ed47a9e5d092823da1260db1", "score": "0.46640238", "text": "func TestGetTotalSalesReturn(t *testing.T) {\n\ttm := time.Date(2012, time.November, 12, 15, 00, 00, 00, time.Local)\n\ttm2 := time.Date(time.Now().Year(), time.Now().Month(), 12, 15, 00, 00, 00, time.Local)\n\t// hapus database\n\to := orm.NewOrm()\n\to.Raw(\"DELETE FROM sales_return\").Exec()\n\t// buat dummy\n\tsr1 := model.DummySalesReturn()\n\tsr1.IsDeleted = int8(0)\n\tsr1.DocumentStatus = \"new\"\n\tsr1.RecognitionDate = tm2\n\tsr1.Save()\n\n\tsr2 := model.DummySalesReturn()\n\tsr2.IsDeleted = int8(1)\n\tsr2.DocumentStatus = \"new\"\n\tsr2.Save()\n\n\tsr3 := model.DummySalesReturn()\n\tsr3.IsDeleted = int8(0)\n\tsr3.DocumentStatus = \"new\"\n\tsr3.Save()\n\n\tsr4 := model.DummySalesReturn()\n\tsr4.IsDeleted = int8(0)\n\tsr4.DocumentStatus = \"new\"\n\tsr4.RecognitionDate = tm\n\tsr4.Save()\n\t// test\n\ttotal, e := GetTotalSalesReturn(int(time.Now().Month()), time.Now().Year())\n\tassert.NoError(t, e)\n\tassert.Equal(t, int64(2), total)\n}", "title": "" }, { "docid": "943475cae027c2e7eba43c55ffb43676", "score": "0.46504322", "text": "func (_m *AssetService) List(ctx context.Context, namespace string, labels map[string]string) ([]docstopic.CommonAsset, error) {\n\tret := _m.Called(ctx, namespace, labels)\n\n\tvar r0 []docstopic.CommonAsset\n\tif rf, ok := ret.Get(0).(func(context.Context, string, map[string]string) []docstopic.CommonAsset); ok {\n\t\tr0 = rf(ctx, namespace, labels)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]docstopic.CommonAsset)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string, map[string]string) error); ok {\n\t\tr1 = rf(ctx, namespace, labels)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "4bab638dd209fa585ef7be37bfdeb319", "score": "0.46490312", "text": "func (_m *SingleReader) Get(startDate int64, principalID string) (*usage.Usage, error) {\n\tret := _m.Called(startDate, principalID)\n\n\tvar r0 *usage.Usage\n\tif rf, ok := ret.Get(0).(func(int64, string) *usage.Usage); ok {\n\t\tr0 = rf(startDate, principalID)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*usage.Usage)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(int64, string) error); ok {\n\t\tr1 = rf(startDate, principalID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "8ed776f13e0984feae1c2fd9006c3dd3", "score": "0.46425357", "text": "func (_m *MockRepository) Count(req interface{}) (int, *dberrors.Error) {\n\tret := _m.Called(req)\n\n\tvar r0 int\n\tif rf, ok := ret.Get(0).(func(interface{}) int); ok {\n\t\tr0 = rf(req)\n\t} else {\n\t\tr0 = ret.Get(0).(int)\n\t}\n\n\tvar r1 *dberrors.Error\n\tif rf, ok := ret.Get(1).(func(interface{}) *dberrors.Error); ok {\n\t\tr1 = rf(req)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(*dberrors.Error)\n\t\t}\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "82b94f740960af0f64dac89930548c59", "score": "0.46395743", "text": "func (_m *TombstoneRepository) Update(ctx context.Context, tenant string, item *model.Tombstone) error {\n\tret := _m.Called(ctx, tenant, item)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string, *model.Tombstone) error); ok {\n\t\tr0 = rf(ctx, tenant, item)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "dd4eb0e92a170e6ed344aa03c8fd9804", "score": "0.46245477", "text": "func TestBasketAmount(t *testing.T) {\n\tvoucher := &domain.Product{\n\t\tCode: \"VOUCHER\",\n\t\tPrice: 5,\n\t}\n\ttShirt := &domain.Product{\n\t\tCode: \"TSHIRT\",\n\t\tPrice: 20,\n\t}\n\tmug := &domain.Product{\n\t\tCode: \"MUG\",\n\t\tPrice: 7.5,\n\t}\n\n\tproducts := []domain.Product{*voucher, *tShirt, *mug}\n\n\tcases := []struct {\n\t\trules []domain.Rule\n\t\tproducts []domain.Product\n\t\tcodes string\n\t\texpected float64\n\t\terror bool\n\t}{\n\t\t{\n\t\t\trules: domain.MockedRules,\n\t\t\tproducts: products,\n\t\t\tcodes: \"VOUCHER,TSHIRT,MUG\",\n\t\t\texpected: 32.5,\n\t\t\terror: false,\n\t\t},\n\t\t{\n\t\t\trules: domain.MockedRules,\n\t\t\tproducts: products,\n\t\t\tcodes: \"VOUCHER,TSHIRT,VOUCHER\",\n\t\t\texpected: 25,\n\t\t\terror: false,\n\t\t},\n\t\t{\n\t\t\trules: domain.MockedRules,\n\t\t\tproducts: products,\n\t\t\tcodes: \"TSHIRT,TSHIRT,TSHIRT,VOUCHER,TSHIRT\",\n\t\t\texpected: 81,\n\t\t\terror: false,\n\t\t},\n\t\t{\n\t\t\trules: domain.MockedRules,\n\t\t\tproducts: products,\n\t\t\tcodes: \"VOUCHER,TSHIRT,VOUCHER,VOUCHER,MUG,TSHIRT,TSHIRT\",\n\t\t\texpected: 74.5,\n\t\t\terror: false,\n\t\t},\n\t\t{\n\t\t\trules: domain.MockedRules,\n\t\t\tproducts: products,\n\t\t\tcodes: \"SHA-LALALA\",\n\t\t\texpected: 0,\n\t\t\terror: true,\n\t\t},\n\t}\n\n\tfor i, tc := range cases {\n\t\titems, err := BasketAddCode(strings.Split(tc.codes, \",\"), tc.products)\n\t\tif tc.error {\n\t\t\tif err == nil {\n\t\t\t\tt.Errorf(\"expected error but got instead nil with test case:%d\", i+1)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\tif err != nil {\n\t\t\tt.Error(\"unexpected error:\", err)\n\t\t\tcontinue\n\t\t}\n\t\tresult, err := BasketAmount(items, tc.rules)\n\t\tif result != tc.expected {\n\t\t\tt.Errorf(\"expected:%v but got instead:%v\", tc.expected, result)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "be1a205f70a6041135060f4bc47f825b", "score": "0.4618751", "text": "func (_m *Seller) List() ([]*model.Seller, error) {\n\tret := _m.Called()\n\n\tvar r0 []*model.Seller\n\tif rf, ok := ret.Get(0).(func() []*model.Seller); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]*model.Seller)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func() error); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "9010bc98deb226a8cfd4444c397c4c71", "score": "0.4617334", "text": "func (_m *ItemStorageServices) UpdateItem(_a0 context.Context, _a1 string) ([]byte, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 []byte\n\tif rf, ok := ret.Get(0).(func(context.Context, string) []byte); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]byte)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "4578d0b24646079642db6d664f6056ec", "score": "0.46048447", "text": "func (m *MockItemRepository) List(params model.Params) ([]model.Item, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"List\", params)\n\tret0, _ := ret[0].([]model.Item)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "ecb023798dc0e4f5706715dbede4e329", "score": "0.46013743", "text": "func (_m *mockBulkService) NumberOfActions() int {\n\tret := _m.Called()\n\n\tvar r0 int\n\tif rf, ok := ret.Get(0).(func() int); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(int)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "ebfab3894c3560a8f036ee8662c39371", "score": "0.46012437", "text": "func (_m *PostStore) Search(teamID string, userID string, params *model.SearchParams) (*model.PostList, error) {\n\tret := _m.Called(teamID, userID, params)\n\n\tvar r0 *model.PostList\n\tif rf, ok := ret.Get(0).(func(string, string, *model.SearchParams) *model.PostList); ok {\n\t\tr0 = rf(teamID, userID, params)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*model.PostList)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, string, *model.SearchParams) error); ok {\n\t\tr1 = rf(teamID, userID, params)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "ee0819c3dd7d39f4993fa7edc4356e51", "score": "0.4594731", "text": "func (m *ClientMock) GetOrders(accountID string, status model.OrderStatus, count int32) (*[]model.GetOrdersItem, error) {\n\tif accountID == \"test_ok\" {\n\t\treturn &[]model.GetOrdersItem{\n\t\t\t{\n\t\t\t\tAction: \"BUY\",\n\t\t\t\tComboId: \"test_id\",\n\t\t\t\tComboTickerType: \"stock\",\n\t\t\t\tComboType: \"stock\",\n\t\t\t\tLmtPrice: \"100.00\",\n\t\t\t\tOrders: []model.GetOrdersItemOrders{\n\t\t\t\t\t{\n\t\t\t\t\t\tOrderId: 12345,\n\t\t\t\t\t\tOrderType: \"LMT\",\n\t\t\t\t\t\tSymbol: \"AMZN\",\n\t\t\t\t\t\tTickerId: 54321,\n\t\t\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t\t\t\tRemainQuantity: \"9\",\n\t\t\t\t\t\tTotalQuantity: \"10\",\n\t\t\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tOutsideRegularTradingHour: true,\n\t\t\t\tQuantity: \"10\",\n\t\t\t\tStatus: \"Working\",\n\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t},\n\t\t}, nil\n\t} else if accountID == \"test_invalid_orders\" {\n\t\treturn &[]model.GetOrdersItem{\n\t\t\t{\n\t\t\t\tAction: \"BUY\",\n\t\t\t\tComboId: \"test_id\",\n\t\t\t\tComboTickerType: \"stock\",\n\t\t\t\tComboType: \"stock\",\n\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\tLmtPrice: \"100.00\",\n\t\t\t\tOrders: []model.GetOrdersItemOrders{\n\t\t\t\t\t{\n\t\t\t\t\t\tOrderId: 12345,\n\t\t\t\t\t\tOrderType: \"LMT\",\n\t\t\t\t\t\tSymbol: \"AMZN\",\n\t\t\t\t\t\tTickerId: 54321,\n\t\t\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t\t\t\tRemainQuantity: \"9\",\n\t\t\t\t\t\tTotalQuantity: \"10\",\n\t\t\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\t\t},\n\t\t\t\t\t{\n\t\t\t\t\t\tOrderId: 23456,\n\t\t\t\t\t\tOrderType: \"LMT\",\n\t\t\t\t\t\tSymbol: \"AMZN\",\n\t\t\t\t\t\tTickerId: 54321,\n\t\t\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t\t\t\tRemainQuantity: \"9\",\n\t\t\t\t\t\tTotalQuantity: \"10\",\n\t\t\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tOutsideRegularTradingHour: true,\n\t\t\t\tQuantity: \"10\",\n\t\t\t\tStatus: \"Working\",\n\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t},\n\t\t}, nil\n\t} else if accountID == \"test_invalid_remain_quantity\" {\n\t\treturn &[]model.GetOrdersItem{\n\t\t\t{\n\t\t\t\tAction: \"BUY\",\n\t\t\t\tComboId: \"test_id\",\n\t\t\t\tComboTickerType: \"stock\",\n\t\t\t\tComboType: \"stock\",\n\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\tLmtPrice: \"100.00\",\n\t\t\t\tOrders: []model.GetOrdersItemOrders{\n\t\t\t\t\t{\n\t\t\t\t\t\tOrderId: 12345,\n\t\t\t\t\t\tOrderType: \"LMT\",\n\t\t\t\t\t\tSymbol: \"AMZN\",\n\t\t\t\t\t\tTickerId: 54321,\n\t\t\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t\t\t\tRemainQuantity: \"invalid number\",\n\t\t\t\t\t\tTotalQuantity: \"10\",\n\t\t\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tOutsideRegularTradingHour: true,\n\t\t\t\tQuantity: \"10\",\n\t\t\t\tStatus: \"Working\",\n\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t},\n\t\t}, nil\n\t} else if accountID == \"test_invalid_total_quantity\" {\n\t\treturn &[]model.GetOrdersItem{\n\t\t\t{\n\t\t\t\tAction: \"BUY\",\n\t\t\t\tComboId: \"test_id\",\n\t\t\t\tComboTickerType: \"stock\",\n\t\t\t\tComboType: \"stock\",\n\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\tLmtPrice: \"100.00\",\n\t\t\t\tOrders: []model.GetOrdersItemOrders{\n\t\t\t\t\t{\n\t\t\t\t\t\tOrderId: 12345,\n\t\t\t\t\t\tOrderType: \"LMT\",\n\t\t\t\t\t\tSymbol: \"AMZN\",\n\t\t\t\t\t\tTickerId: 54321,\n\t\t\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t\t\t\tRemainQuantity: \"9\",\n\t\t\t\t\t\tTotalQuantity: \"invalid\",\n\t\t\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tOutsideRegularTradingHour: true,\n\t\t\t\tQuantity: \"10\",\n\t\t\t\tStatus: \"Working\",\n\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t},\n\t\t}, nil\n\t} else if accountID == \"test_invalid_lmt_price\" {\n\t\treturn &[]model.GetOrdersItem{\n\t\t\t{\n\t\t\t\tAction: \"BUY\",\n\t\t\t\tComboId: \"test_id\",\n\t\t\t\tComboTickerType: \"stock\",\n\t\t\t\tComboType: \"stock\",\n\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\tLmtPrice: \"invalid\",\n\t\t\t\tOrders: []model.GetOrdersItemOrders{\n\t\t\t\t\t{\n\t\t\t\t\t\tOrderId: 12345,\n\t\t\t\t\t\tOrderType: \"LMT\",\n\t\t\t\t\t\tSymbol: \"AMZN\",\n\t\t\t\t\t\tTickerId: 54321,\n\t\t\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t\t\t\tRemainQuantity: \"9\",\n\t\t\t\t\t\tTotalQuantity: \"10\",\n\t\t\t\t\t\tFilledQuantity: \"1\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tOutsideRegularTradingHour: true,\n\t\t\t\tQuantity: \"10\",\n\t\t\t\tStatus: \"Working\",\n\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t},\n\t\t}, nil\n\t} else if accountID == \"test_invalid_filled_quantity\" {\n\t\treturn &[]model.GetOrdersItem{\n\t\t\t{\n\t\t\t\tAction: \"BUY\",\n\t\t\t\tComboId: \"test_id\",\n\t\t\t\tComboTickerType: \"stock\",\n\t\t\t\tComboType: \"stock\",\n\t\t\t\tLmtPrice: \"100.00\",\n\t\t\t\tOrders: []model.GetOrdersItemOrders{\n\t\t\t\t\t{\n\t\t\t\t\t\tOrderId: 12345,\n\t\t\t\t\t\tOrderType: \"LMT\",\n\t\t\t\t\t\tSymbol: \"AMZN\",\n\t\t\t\t\t\tTickerId: 54321,\n\t\t\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t\t\t\tRemainQuantity: \"9\",\n\t\t\t\t\t\tTotalQuantity: \"10\",\n\t\t\t\t\t\tFilledQuantity: \"invalid\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tOutsideRegularTradingHour: true,\n\t\t\t\tQuantity: \"10\",\n\t\t\t\tStatus: \"Working\",\n\t\t\t\tTimeInForce: \"GTC\",\n\t\t\t},\n\t\t}, nil\n\t} else if accountID == \"test_server_error\" {\n\t\treturn nil, fmt.Errorf(\"internal server error\")\n\t} else {\n\t\treturn nil, nil\n\t}\n}", "title": "" }, { "docid": "7655caba67cc3e531b73365fd09b59a8", "score": "0.45929295", "text": "func (_m *mockBulkService) Add(requests ...elastic.BulkableRequest) *elastic.BulkService {\n\t_va := make([]interface{}, len(requests))\n\tfor _i := range requests {\n\t\t_va[_i] = requests[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 *elastic.BulkService\n\tif rf, ok := ret.Get(0).(func(...elastic.BulkableRequest) *elastic.BulkService); ok {\n\t\tr0 = rf(requests...)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*elastic.BulkService)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "18e74206b05c1763e38b5e16c385d1cb", "score": "0.45852938", "text": "func (_m *FlavorStashStore) List(_a0 uint64) ([]model.FlavorStash, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 []model.FlavorStash\n\tif rf, ok := ret.Get(0).(func(uint64) []model.FlavorStash); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]model.FlavorStash)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(uint64) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "0b2087351d4adacaad68afcfe3900ff1", "score": "0.45736304", "text": "func (_m *Service) Purchase() {\n\t_m.Called()\n}", "title": "" }, { "docid": "547861c926696845044ee85925122d34", "score": "0.45682558", "text": "func (_m *FluxAggregator) WithdrawFunds(opts *bind.TransactOpts, _recipient common.Address, _amount *big.Int) (*types.Transaction, error) {\n\tret := _m.Called(opts, _recipient, _amount)\n\n\tvar r0 *types.Transaction\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, *big.Int) (*types.Transaction, error)); ok {\n\t\treturn rf(opts, _recipient, _amount)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts, common.Address, *big.Int) *types.Transaction); ok {\n\t\tr0 = rf(opts, _recipient, _amount)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Transaction)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.TransactOpts, common.Address, *big.Int) error); ok {\n\t\tr1 = rf(opts, _recipient, _amount)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "a3929179382dc58717684d29e9231ec4", "score": "0.45612177", "text": "func (_m *CartRepository) Update(ctx context.Context, cart models.Cart) error {\n\tret := _m.Called(ctx, cart)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, models.Cart) error); ok {\n\t\tr0 = rf(ctx, cart)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "854f38901dc0cd879b1bdd70f3561efa", "score": "0.45592582", "text": "func (_m *TourService) Fund(playerID int, points float32) error {\n\tret := _m.Called(playerID, points)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(int, float32) error); ok {\n\t\tr0 = rf(playerID, points)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "89a72ad1d96a34717ef881cce661680d", "score": "0.45583302", "text": "func (m *MockThumbupRPC) ItemLikes(c context.Context, arg *model.ArgItemLikes) ([]*model.UserLikeRecord, error) {\n\tret := m.ctrl.Call(m, \"ItemLikes\", c, arg)\n\tret0, _ := ret[0].([]*model.UserLikeRecord)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d387c56e0d95a08f6062224c9b285980", "score": "0.45570725", "text": "func (_m *KubeClient) PodDisruptionBudgets(namespace string) (*v1beta1.PodDisruptionBudgetList, error) {\n\tret := _m.Called(namespace)\n\n\tvar r0 *v1beta1.PodDisruptionBudgetList\n\tif rf, ok := ret.Get(0).(func(string) *v1beta1.PodDisruptionBudgetList); ok {\n\t\tr0 = rf(namespace)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*v1beta1.PodDisruptionBudgetList)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(namespace)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "77bd1dcbf5e28a4e9715d5a117f9d439", "score": "0.45541367", "text": "func (_m *WebhookRepository) Update(ctx context.Context, tenant string, item *model.Webhook) error {\n\tret := _m.Called(ctx, tenant, item)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string, *model.Webhook) error); ok {\n\t\tr0 = rf(ctx, tenant, item)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "f9f3d2caa00a0717ed6455aa04f08594", "score": "0.45428118", "text": "func (slis *ShoppingListItemService) GetAndSetDealForShoppingListItems(dbTransaction *gorm.DB, dealsCollection []*Deal, userGUID string, shoppingListGUID string,\n\tuserShoppingListItems []*ShoppingListItem, latitude string, longitude string) ([]*ShoppingListItem, []*Deal, *systems.ErrorData) {\n\n\tfor key, userShoppingListItem := range userShoppingListItems {\n\n\t\tif userShoppingListItem.AddedFromDeal == 0 && userShoppingListItem.AddedToCart == 0 && latitude != \"\" && longitude != \"\" {\n\t\t\tdeals := slis.DealService.GetDealsBasedOnUserShoppingListItem(userGUID, shoppingListGUID, userShoppingListItem, latitude, longitude)\n\n\t\t\tdeals = slis.DealService.FilteredDealMustBeUniquePerShoppingList(deals, dealsCollection, userGUID)\n\n\t\t\tdealsCollection = append(dealsCollection, deals...)\n\n\t\t\tif len(deals) == 0 {\n\t\t\t\tdeals = nil\n\t\t\t}\n\n\t\t\tuserShoppingListItems[key].Deals = deals\n\t\t}\n\n\t\t// If user shopping list item was added from dealcheck deal expired or not\n\t\tif userShoppingListItem.AddedFromDeal == 1 {\n\t\t\tcurrentDateInGMT8 := time.Now().UTC().Add(time.Hour * 8).Format(\"2006-01-02\")\n\n\t\t\tdealExpired := slis.DealService.CheckDealExpiredOrNot(*userShoppingListItem.DealGUID, currentDateInGMT8)\n\n\t\t\tif dealExpired == true {\n\t\t\t\terror := slis.ShoppingListItemRepository.SetDealExpired(dbTransaction, userGUID, shoppingListGUID, *userShoppingListItem.DealGUID)\n\n\t\t\t\tif error != nil {\n\t\t\t\t\treturn nil, nil, error\n\t\t\t\t}\n\n\t\t\t\texpired := 1\n\n\t\t\t\tuserShoppingListItems[key].DealExpired = &expired\n\t\t\t}\n\t\t}\n\t}\n\n\treturn userShoppingListItems, dealsCollection, nil\n}", "title": "" }, { "docid": "75763cb647df8b6ffef799dabfb6e8e3", "score": "0.45417145", "text": "func mockCheckDetailAddendumA() CheckDetailAddendumA {\n\tcdAddendumA := NewCheckDetailAddendumA()\n\tcdAddendumA.RecordNumber = 1\n\tcdAddendumA.ReturnLocationRoutingNumber = \"121042882\"\n\tcdAddendumA.BOFDEndorsementDate = time.Now()\n\tcdAddendumA.BOFDItemSequenceNumber = \"1 \"\n\tcdAddendumA.BOFDAccountNumber = \"938383\"\n\tcdAddendumA.BOFDBranchCode = \"01\"\n\tcdAddendumA.PayeeName = \"Test Payee\"\n\tcdAddendumA.TruncationIndicator = \"Y\"\n\tcdAddendumA.BOFDConversionIndicator = \"1\"\n\tcdAddendumA.BOFDCorrectionIndicator = 0\n\tcdAddendumA.UserField = \"\"\n\treturn cdAddendumA\n}", "title": "" }, { "docid": "c0e2c3dee7d6c92c1465527530da361f", "score": "0.45332974", "text": "func (_m *QueryClient) Balance(ctx context.Context, in *types.QueryBalanceRequest, opts ...grpc.CallOption) (*types.QueryBalanceResponse, error) {\n\t_va := make([]interface{}, len(opts))\n\tfor _i := range opts {\n\t\t_va[_i] = opts[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, ctx, in)\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 *types.QueryBalanceResponse\n\tif rf, ok := ret.Get(0).(func(context.Context, *types.QueryBalanceRequest, ...grpc.CallOption) *types.QueryBalanceResponse); ok {\n\t\tr0 = rf(ctx, in, opts...)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.QueryBalanceResponse)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, *types.QueryBalanceRequest, ...grpc.CallOption) error); ok {\n\t\tr1 = rf(ctx, in, opts...)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "b9eb7e620c59e8d9188e1042d877d6d8", "score": "0.45207608", "text": "func (_m *ServiceManager) Update(serviceDetails model.GraphQLServiceDetailsInput) error {\n\tret := _m.Called(serviceDetails)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(model.GraphQLServiceDetailsInput) error); ok {\n\t\tr0 = rf(serviceDetails)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "88da43655c7e3c03d60768975e692abc", "score": "0.45179003", "text": "func (_m *MockOperation) GetAdvisories(source string, pkgName string) ([]types.Advisory, error) {\n\tret := _m.Called(source, pkgName)\n\n\tvar r0 []types.Advisory\n\tif rf, ok := ret.Get(0).(func(string, string) []types.Advisory); ok {\n\t\tr0 = rf(source, pkgName)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]types.Advisory)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, string) error); ok {\n\t\tr1 = rf(source, pkgName)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "52333bbf4e963f79ca199d2856c4575b", "score": "0.45158637", "text": "func (_m *DB) RemoveBlobsFromItem(id string, itemIDs []string) ([]db.DeletedBlob, error) {\n\tret := _m.Called(id, itemIDs)\n\n\tvar r0 []db.DeletedBlob\n\tif rf, ok := ret.Get(0).(func(string, []string) []db.DeletedBlob); ok {\n\t\tr0 = rf(id, itemIDs)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]db.DeletedBlob)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, []string) error); ok {\n\t\tr1 = rf(id, itemIDs)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "a82795c58962fec9a1f91d3f32b796a8", "score": "0.45157182", "text": "func mockReturnDetailAddendumD() ReturnDetailAddendumD {\n\trdAddendumD := NewReturnDetailAddendumD()\n\trdAddendumD.RecordNumber = 1\n\trdAddendumD.EndorsingBankRoutingNumber = \"121042882\"\n\trdAddendumD.BOFDEndorsementBusinessDate = time.Now()\n\trdAddendumD.EndorsingBankItemSequenceNumber = \"1 \"\n\trdAddendumD.TruncationIndicator = \"Y\"\n\trdAddendumD.EndorsingBankConversionIndicator = \"1\"\n\trdAddendumD.EndorsingBankCorrectionIndicator = 0\n\trdAddendumD.ReturnReason = \"A\"\n\trdAddendumD.UserField = \"\"\n\trdAddendumD.EndorsingBankIdentifier = 0\n\treturn rdAddendumD\n}", "title": "" }, { "docid": "866f4aeb065d585f164eb91138e6879b", "score": "0.45015934", "text": "func TestGetTotalItemTerjual(t *testing.T) {\n\ttm := time.Date(2012, time.November, 12, 15, 00, 00, 00, time.Local)\n\ttm2 := time.Date(time.Now().Year(), time.Now().Month(), 12, 15, 00, 00, 00, time.Local)\n\t// hapus database\n\to := orm.NewOrm()\n\to.Raw(\"DELETE FROM sales_order\").Exec()\n\t// buat dummy\n\tso1 := model.DummySalesOrder()\n\tso1.IsDeleted = int8(0)\n\tso1.DocumentStatus = \"new\"\n\tso1.RecognitionDate = tm2\n\tso1.Save()\n\tsoi1 := model.DummySalesOrderItem()\n\tsoi1.Quantity = float32(100)\n\tsoi1.SalesOrder = so1\n\tsoi1.Save()\n\tsoi12 := model.DummySalesOrderItem()\n\tsoi12.Quantity = float32(50)\n\tsoi12.SalesOrder = so1\n\tsoi12.Save()\n\n\tso2 := model.DummySalesOrder()\n\tso2.IsDeleted = int8(1)\n\tso2.DocumentStatus = \"new\"\n\tso2.RecognitionDate = time.Now()\n\tso2.Save()\n\tsoi2 := model.DummySalesOrderItem()\n\tsoi2.Quantity = float32(150)\n\tsoi2.SalesOrder = so2\n\tsoi2.Save()\n\n\tso3 := model.DummySalesOrder()\n\tso3.IsDeleted = int8(0)\n\tso3.DocumentStatus = \"new\"\n\tso3.RecognitionDate = time.Now()\n\tso3.Save()\n\tsoi3 := model.DummySalesOrderItem()\n\tsoi3.Quantity = float32(200)\n\tsoi3.SalesOrder = so3\n\tsoi3.Save()\n\n\tso4 := model.DummySalesOrder()\n\tso4.IsDeleted = int8(0)\n\tso4.RecognitionDate = tm\n\tso4.DocumentStatus = \"new\"\n\tso4.Save()\n\tsoi4 := model.DummySalesOrderItem()\n\tsoi4.Quantity = float32(200)\n\tsoi4.SalesOrder = so4\n\tsoi4.Save()\n\t// test\n\ttotal, e := GetTotalItemTerjual(int(time.Now().Month()), time.Now().Year())\n\tassert.NoError(t, e)\n\tassert.Equal(t, float32(350), total)\n}", "title": "" }, { "docid": "46590daa981c44726364fab75c85272a", "score": "0.44950497", "text": "func MakePaymentRequestWithServiceItems(db *pop.Connection, assertions Assertions) {\n\tpaymentRequest := MakePaymentRequest(db, Assertions{\n\t\tPaymentRequest: models.PaymentRequest{\n\t\t\tMoveTaskOrder: assertions.Move,\n\t\t\tIsFinal: false,\n\t\t\tStatus: models.PaymentRequestStatusPending,\n\t\t\tRejectionReason: nil,\n\t\t\tSequenceNumber: assertions.PaymentRequest.SequenceNumber,\n\t\t},\n\t\tMove: assertions.Move,\n\t})\n\tproofOfService := MakeProofOfServiceDoc(db, Assertions{\n\t\tPaymentRequest: paymentRequest,\n\t})\n\n\tMakePrimeUpload(db, Assertions{\n\t\tPrimeUpload: models.PrimeUpload{\n\t\t\tProofOfServiceDoc: proofOfService,\n\t\t\tProofOfServiceDocID: proofOfService.ID,\n\t\t\tContractor: models.Contractor{\n\t\t\t\tID: uuid.FromStringOrNil(\"5db13bb4-6d29-4bdb-bc81-262f4513ecf6\"), // Prime\n\t\t\t},\n\t\t\tContractorID: uuid.FromStringOrNil(\"5db13bb4-6d29-4bdb-bc81-262f4513ecf6\"),\n\t\t},\n\t\tPrimeUploader: assertions.PrimeUploader,\n\t})\n\n\tserviceItemCS := MakeMTOServiceItemBasic(db, Assertions{\n\t\tMTOServiceItem: models.MTOServiceItem{\n\t\t\tStatus: models.MTOServiceItemStatusSubmitted,\n\t\t},\n\t\tMove: assertions.Move,\n\t\tReService: models.ReService{\n\t\t\tID: uuid.FromStringOrNil(\"9dc919da-9b66-407b-9f17-05c0f03fcb50\"), // CS - Counseling Services\n\t\t},\n\t})\n\n\tserviceItemMS := MakeMTOServiceItemBasic(db, Assertions{\n\t\tMTOServiceItem: models.MTOServiceItem{\n\t\t\tStatus: models.MTOServiceItemStatusSubmitted,\n\t\t},\n\t\tMove: assertions.Move,\n\t\tReService: models.ReService{\n\t\t\tID: uuid.FromStringOrNil(\"1130e612-94eb-49a7-973d-72f33685e551\"), // MS - Move Management\n\t\t},\n\t})\n\n\tcost := unit.Cents(20000)\n\tMakePaymentServiceItem(db, Assertions{\n\t\tPaymentServiceItem: models.PaymentServiceItem{\n\t\t\tPriceCents: &cost,\n\t\t},\n\t\tPaymentRequest: paymentRequest,\n\t\tMTOServiceItem: serviceItemCS,\n\t})\n\n\tMakePaymentServiceItem(db, Assertions{\n\t\tPaymentServiceItem: models.PaymentServiceItem{\n\t\t\tPriceCents: &cost,\n\t\t},\n\t\tPaymentRequest: paymentRequest,\n\t\tMTOServiceItem: serviceItemMS,\n\t})\n}", "title": "" }, { "docid": "f872972f60e3ffdeed91d8b1ebc8ca7b", "score": "0.44946152", "text": "func (_m *FluxAggregator) FilterAvailableFundsUpdated(opts *bind.FilterOpts, amount []*big.Int) (*flux_aggregator_wrapper.FluxAggregatorAvailableFundsUpdatedIterator, error) {\n\tret := _m.Called(opts, amount)\n\n\tvar r0 *flux_aggregator_wrapper.FluxAggregatorAvailableFundsUpdatedIterator\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.FilterOpts, []*big.Int) (*flux_aggregator_wrapper.FluxAggregatorAvailableFundsUpdatedIterator, error)); ok {\n\t\treturn rf(opts, amount)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.FilterOpts, []*big.Int) *flux_aggregator_wrapper.FluxAggregatorAvailableFundsUpdatedIterator); ok {\n\t\tr0 = rf(opts, amount)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*flux_aggregator_wrapper.FluxAggregatorAvailableFundsUpdatedIterator)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.FilterOpts, []*big.Int) error); ok {\n\t\tr1 = rf(opts, amount)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "0af499af80bd30e4ab8671c4d3dbd858", "score": "0.449387", "text": "func (_m *ServiceBuilder) WithDynamoDB() *config.ServiceBuilder {\n\tret := _m.Called()\n\n\tvar r0 *config.ServiceBuilder\n\tif rf, ok := ret.Get(0).(func() *config.ServiceBuilder); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*config.ServiceBuilder)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "168fb783dfb48f0436f0018b2afbcd03", "score": "0.44904396", "text": "func (_m *StoreClient) Update(o contracts.StoredObject) error {\n\tret := _m.Called(o)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(contracts.StoredObject) error); ok {\n\t\tr0 = rf(o)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "9c719377f58b6d01fbee8953e8a907ee", "score": "0.44842073", "text": "func (_m *ItemStorageServices) GetAllItems(_a0 context.Context) ([]byte, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 []byte\n\tif rf, ok := ret.Get(0).(func(context.Context) []byte); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]byte)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "50cc836ed040efcc672b10c2af4c534f", "score": "0.44806883", "text": "func (mock *UniversalClientMock) IncrByFloatCalls() []struct {\n\tKey string\n\tValue float64\n} {\n\tvar calls []struct {\n\t\tKey string\n\t\tValue float64\n\t}\n\tlockUniversalClientMockIncrByFloat.RLock()\n\tcalls = mock.calls.IncrByFloat\n\tlockUniversalClientMockIncrByFloat.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "b404fb7f014e1348ac929acf5c37e5ba", "score": "0.44755322", "text": "func (_m *Repository) DetailSC(ctx context.Context, id int) ([]transactions.Shopping_CartDomain, error) {\n\tret := _m.Called(ctx, id)\n\n\tvar r0 []transactions.Shopping_CartDomain\n\tif rf, ok := ret.Get(0).(func(context.Context, int) []transactions.Shopping_CartDomain); ok {\n\t\tr0 = rf(ctx, id)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]transactions.Shopping_CartDomain)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, int) error); ok {\n\t\tr1 = rf(ctx, id)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "eb5043bfbfb92ea0b8a2f71cea43b981", "score": "0.4474268", "text": "func (_m *MockProxy) Query(ctx context.Context, request *milvuspb.QueryRequest) (*milvuspb.QueryResults, error) {\n\tret := _m.Called(ctx, request)\n\n\tvar r0 *milvuspb.QueryResults\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *milvuspb.QueryRequest) (*milvuspb.QueryResults, error)); ok {\n\t\treturn rf(ctx, request)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, *milvuspb.QueryRequest) *milvuspb.QueryResults); ok {\n\t\tr0 = rf(ctx, request)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*milvuspb.QueryResults)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, *milvuspb.QueryRequest) error); ok {\n\t\tr1 = rf(ctx, request)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "2e3835a0cd610e72e41d4bddfb78fc60", "score": "0.44742358", "text": "func (_m *Conn) CountDiagnosisKeys() (int64, error) {\n\tret := _m.Called()\n\n\tvar r0 int64\n\tif rf, ok := ret.Get(0).(func() int64); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(int64)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func() error); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "14a098dedc4efb8e3c14c7bff80aedf7", "score": "0.44717315", "text": "func (_m *FluxAggregator) UpdateAvailableFunds(opts *bind.TransactOpts) (*types.Transaction, error) {\n\tret := _m.Called(opts)\n\n\tvar r0 *types.Transaction\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts) (*types.Transaction, error)); ok {\n\t\treturn rf(opts)\n\t}\n\tif rf, ok := ret.Get(0).(func(*bind.TransactOpts) *types.Transaction); ok {\n\t\tr0 = rf(opts)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*types.Transaction)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(*bind.TransactOpts) error); ok {\n\t\tr1 = rf(opts)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "0b001d31aebc3acef34361f2e38ec76d", "score": "0.44716355", "text": "func calculateTotalPrice(ps []models.Decorator) float32 {\n\tvar totalPrice float32\n\tvar totalDiscount float32\n\n\tfor _, p := range ps {\n\t\tif p.GetPrice() > 0 && p.GetPrice() < 10 {\n\t\t\ttotalDiscount += 30.0\n\t\t} else if p.GetPrice() > 10 && p.GetPrice() < 100 {\n\t\t\ttotalDiscount += 20.0\n\t\t} else if p.GetPrice() > 100 {\n\t\t\ttotalDiscount += 10.0\n\t\t} else {\n\t\t\ttotalDiscount += 5\n\t\t}\n\n\t\tif strings.Contains(p.GetModel(),\"S2\") {\n\t\t\ttotalDiscount += 30.0\n\t\t} else if strings.Contains(p.GetModel(),\"N320\") {\n\t\t\ttotalDiscount += 20.0\n\t\t} else if strings.Contains(p.GetModel(),\"iPhone\") {\n\t\t\ttotalDiscount += 10.0\n\t\t} else {\n\t\t\ttotalDiscount += 5\n\t\t}\n\n\t\tif p.GetCompany() == \"Xiaomi\" {\n\t\t\ttotalDiscount += 30.0\n\t\t} else if p.GetCompany() == \"Samsung\" {\n\t\t\ttotalDiscount += 20.0\n\t\t} else if p.GetCompany() == \"Apple\" {\n\t\t\ttotalDiscount += 10.0\n\t\t} else {\n\t\t\ttotalDiscount += 5\n\t\t}\n\t\ttotalPrice = totalPrice + p.GetPrice() * (100 - totalDiscount) / 100\n\t\t// Обнуляем discount\n\t\ttotalDiscount = 0\n\t}\n\n\treturn totalPrice\n}", "title": "" }, { "docid": "210b276b0788e308ea4958131f833925", "score": "0.446854", "text": "func TestOrderRepo_FindAll_Mock(t *testing.T) {\n}", "title": "" }, { "docid": "f082d346a7630445a8f51e7080e9575f", "score": "0.4458727", "text": "func stats(\n\tgetNumOfItems func() int,\n\tgetItemCost func(int) float64) {\n\t/*\n\t\tgetNumOfItems() returns the number of items in the database\n\t\tgetItemCost(itemID) returns the cost of an item,\n\t\t where itemID is 1 to getNumOfItems(), 0.0 otherwise\n\t*/\n\tvar itemCount = getNumOfItems()\n\tvar totalCost, avgCost, maxCost, minCost float64\n\tfor x := 1; x <= itemCount; x++ {\n\t\tc := getItemCost(x)\n\t\ttotalCost += c\n\t\tif c > maxCost {\n\t\t\tmaxCost = c\n\t\t}\n\t\tif c < minCost || minCost == 0.0 {\n\t\t\tminCost = c\n\t\t}\n\t}\n\tavgCost = totalCost / float64(itemCount)\n\tfmt.Printf(\"%v items processed\\n\", itemCount)\n\tfmt.Printf(\"Total price: $%.2f\\n\", totalCost)\n\tfmt.Printf(\"Average price: $%.2f\\n\", avgCost)\n\tfmt.Printf(\"Max price: $%.2f\\n\", maxCost)\n\tfmt.Printf(\"Min price: $%.2f\\n\", minCost)\n}", "title": "" }, { "docid": "4a02748a789b6e89c4d92ef479d6ef02", "score": "0.44544798", "text": "func (_m *ICommentRepository) GetAll(payload models.CommentModel) ([]models.CommentModel, error) {\n\tret := _m.Called(payload)\n\n\tvar r0 []models.CommentModel\n\tif rf, ok := ret.Get(0).(func(models.CommentModel) []models.CommentModel); ok {\n\t\tr0 = rf(payload)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]models.CommentModel)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(models.CommentModel) error); ok {\n\t\tr1 = rf(payload)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "b401a30667a2d11cad27851417ddee0a", "score": "0.44342232", "text": "func (_m *ledgerAPIMock) ListBlocks(ctx context.Context, in *ledger.ListBlocksRequest, opts ...grpc.CallOption) (*ledger.Blocks, error) {\n\t_va := make([]interface{}, len(opts))\n\tfor _i := range opts {\n\t\t_va[_i] = opts[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, ctx, in)\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 *ledger.Blocks\n\tif rf, ok := ret.Get(0).(func(context.Context, *ledger.ListBlocksRequest, ...grpc.CallOption) *ledger.Blocks); ok {\n\t\tr0 = rf(ctx, in, opts...)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*ledger.Blocks)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, *ledger.ListBlocksRequest, ...grpc.CallOption) error); ok {\n\t\tr1 = rf(ctx, in, opts...)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "c25365ff286f7690df0ea2095adf1ca5", "score": "0.44306043", "text": "func (m *MockAdvertise) Rates() []exchange.Rate {\n\tret := m.ctrl.Call(m, \"Rates\")\n\tret0, _ := ret[0].([]exchange.Rate)\n\treturn ret0\n}", "title": "" }, { "docid": "4cae6332da8ee1d9a86f15a551877768", "score": "0.4421661", "text": "func CalculatePercentPerItem (total int) float64 {\n return float64(100 / total)\n}", "title": "" }, { "docid": "d1761f5b346f62cb1fec80226f8d4f04", "score": "0.44214457", "text": "func (_m *Repository) Checkout(ctx context.Context, userid int, shopping_cartid int) (transactions.TransactionDomain, error) {\n\tret := _m.Called(ctx, userid, shopping_cartid)\n\n\tvar r0 transactions.TransactionDomain\n\tif rf, ok := ret.Get(0).(func(context.Context, int, int) transactions.TransactionDomain); ok {\n\t\tr0 = rf(ctx, userid, shopping_cartid)\n\t} else {\n\t\tr0 = ret.Get(0).(transactions.TransactionDomain)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, int, int) error); ok {\n\t\tr1 = rf(ctx, userid, shopping_cartid)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "d1851310e70b7927c069366279cb48d5", "score": "0.4420427", "text": "func TestAccountManageFunds(t *testing.T) {\n\n\t// Load config file.\n\tenv.ReadEnv(\"../.env\")\n\n\t// Start the db connection.\n\tdb, _ := models.NewDB()\n\tdefer db.Close()\n\n\t// Create controller\n\tc := &Controller{DB: db}\n\n\t// Post data\n\tvar postStr = []byte(`{\"amount\":500.12, \"date\": \"2017-11-12\", \"note\": \"Test Note from TestAccountManageFunds\"}`)\n\n\t// Make a mock request.\n\treq, _ := http.NewRequest(\"POST\", \"/api/v1/accounts/1/funds\", bytes.NewBuffer(postStr))\n\treq.Header.Set(\"Accept\", \"application/json\")\n\n\t// Setup writer.\n\tw := httptest.NewRecorder()\n\tgin.SetMode(\"release\")\n\tgin.DisableConsoleColor()\n\tr := gin.New()\n\tr.Use(func(c *gin.Context) { c.Set(\"id\", uint(1)) })\n\n\tr.POST(\"/api/v1/accounts/:id/funds\", c.AccountManageFunds)\n\tr.ServeHTTP(w, req)\n\n\t// Parse json that returned.\n\tunits := gjson.Get(w.Body.String(), \"units\").Float()\n\tbalance := gjson.Get(w.Body.String(), \"balance\").Float()\n\taccountNumber := gjson.Get(w.Body.String(), \"account_number\").String()\n\n\t// Test accountNumber.\n\tif accountNumber != \"7af234fS\" {\n\t\tt.Errorf(\"\\n\\n...expected = %v\\n\\n...obtained = %v\\n\\n\", \"7af234fS\", accountNumber)\n\t}\n\n\t// Test units.\n\tif units != 15178.45 {\n\t\tt.Errorf(\"\\n\\n...expected = %v\\n\\n...obtained = %v\\n\\n\", 15178.45, units)\n\t}\n\n\t// Test balance.\n\tif balance != 15178.45 {\n\t\tt.Errorf(\"\\n\\n...expected = %v\\n\\n...obtained = %v\\n\\n\", 15178.45, balance)\n\t}\n}", "title": "" }, { "docid": "df605111fa3130bd6fcf5c845dafd7a8", "score": "0.44204187", "text": "func (_m *Client) DownloadPublicItem(ctx context.Context, _a1 cid.Cid) (io.ReadCloser, error) {\n\tret := _m.Called(ctx, _a1)\n\n\tvar r0 io.ReadCloser\n\tif rf, ok := ret.Get(0).(func(context.Context, cid.Cid) io.ReadCloser); ok {\n\t\tr0 = rf(ctx, _a1)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(io.ReadCloser)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, cid.Cid) error); ok {\n\t\tr1 = rf(ctx, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "461b94beeceb4bf9713c0ad9a6861863", "score": "0.44195852", "text": "func TestGetTotalStockReturn(t *testing.T) {\n\ttm := time.Date(2012, time.November, 12, 15, 00, 00, 00, time.Local)\n\ttm2 := time.Date(time.Now().Year(), time.Now().Month(), 12, 15, 00, 00, 00, time.Local)\n\t// hapus database\n\to := orm.NewOrm()\n\to.Raw(\"DELETE FROM sales_return\").Exec()\n\t// buat dummy\n\tsr1 := model.DummySalesReturn()\n\tsr1.IsDeleted = int8(0)\n\tsr1.RecognitionDate = time.Now()\n\tsr1.Save()\n\tsri1 := model.DummySalesReturnItem()\n\tsri1.Quantity = float32(50)\n\tsri1.SalesReturn = sr1\n\tsri1.Save()\n\n\tsr2 := model.DummySalesReturn()\n\tsr2.IsDeleted = int8(1)\n\tsr2.RecognitionDate = time.Now()\n\tsr2.Save()\n\tsri2 := model.DummySalesReturnItem()\n\tsri2.Quantity = float32(150)\n\tsri2.SalesReturn = sr2\n\tsri2.Save()\n\n\tsr3 := model.DummySalesReturn()\n\tsr3.IsDeleted = int8(0)\n\tsr3.RecognitionDate = tm2\n\tsr3.Save()\n\tsri3 := model.DummySalesReturnItem()\n\tsri3.Quantity = float32(100)\n\tsri3.SalesReturn = sr3\n\tsri3.Save()\n\n\tsr4 := model.DummySalesReturn()\n\tsr4.IsDeleted = int8(0)\n\tsr4.RecognitionDate = tm\n\tsr4.Save()\n\tsri4 := model.DummySalesReturnItem()\n\tsri4.Quantity = float32(50)\n\tsri4.SalesReturn = sr4\n\tsri4.Save()\n\n\t// test\n\ttotal, e := GetTotalStockReturn(int(time.Now().Month()), time.Now().Year())\n\tassert.NoError(t, e)\n\tassert.Equal(t, float32(150), total)\n}", "title": "" }, { "docid": "d72e0965f3e30539c5eb534edeb19cae", "score": "0.44155386", "text": "func (_m *ItemStorageServices) GetItem(_a0 context.Context, _a1 string) ([]byte, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 []byte\n\tif rf, ok := ret.Get(0).(func(context.Context, string) []byte); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]byte)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, string) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "124e76f4ed1a888552822e9bcd91cdbf", "score": "0.44138354", "text": "func (_m *AlbumRepository) Search(includePrivate bool, includeNoMedias bool, limit int, offset int, term string, order string) ([]album.Album, error) {\n\tret := _m.Called(includePrivate, includeNoMedias, limit, offset, term, order)\n\n\tvar r0 []album.Album\n\tif rf, ok := ret.Get(0).(func(bool, bool, int, int, string, string) []album.Album); ok {\n\t\tr0 = rf(includePrivate, includeNoMedias, limit, offset, term, order)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]album.Album)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(bool, bool, int, int, string, string) error); ok {\n\t\tr1 = rf(includePrivate, includeNoMedias, limit, offset, term, order)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "5ad2993570553ca1472be59526eb78cf", "score": "0.44128847", "text": "func TestMockReturnDetailAddendumD(t *testing.T) {\n\trdAddendumD := mockReturnDetailAddendumD()\n\tif err := rdAddendumD.Validate(); err != nil {\n\t\tt.Error(\"MockReturnDetailAddendumD does not validate and will break other tests: \", err)\n\t}\n\tif rdAddendumD.recordType != \"35\" {\n\t\tt.Error(\"recordType does not validate\")\n\t}\n\tif rdAddendumD.RecordNumber != 1 {\n\t\tt.Error(\"RecordNumber does not validate\")\n\t}\n\tif rdAddendumD.EndorsingBankRoutingNumber != \"121042882\" {\n\t\tt.Error(\"EndorsingBankRoutingNumber does not validate\")\n\t}\n\tif rdAddendumD.EndorsingBankItemSequenceNumber != \"1 \" {\n\t\tt.Error(\"EndorsingBankItemSequenceNumber does not validate\")\n\t}\n\tif rdAddendumD.TruncationIndicator != \"Y\" {\n\t\tt.Error(\"TruncationIndicator does not validate\")\n\t}\n\tif rdAddendumD.ReturnReason != \"A\" {\n\t\tt.Error(\"ReturnReason does not validate\")\n\t}\n\tif rdAddendumD.EndorsingBankConversionIndicator != \"1\" {\n\t\tt.Error(\"EndorsingBankConversionIndicator does not validate\")\n\t}\n\tif rdAddendumD.EndorsingBankCorrectionIndicator != 0 {\n\t\tt.Error(\"EndorsingBankCorrectionIndicator does not validate\")\n\t}\n\tif rdAddendumD.UserField != \"\" {\n\t\tt.Error(\"UserField does not validate\")\n\t}\n\tif rdAddendumD.EndorsingBankIdentifier != 0 {\n\t\tt.Error(\"EndorsingBankIdentifier does not validate\")\n\t}\n}", "title": "" }, { "docid": "300b1d3d886d608e58b4418b5b0bd2ee", "score": "0.44091493", "text": "func (_m *Conn) CountUnclaimedOneTimeCodes() (int64, error) {\n\tret := _m.Called()\n\n\tvar r0 int64\n\tif rf, ok := ret.Get(0).(func() int64); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Get(0).(int64)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func() error); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "446ac10e81ed4ee03d965a895653cfa3", "score": "0.44027364", "text": "func (_m *MockRepository) Update(req interface{}) *dberrors.Error {\n\tret := _m.Called(req)\n\n\tvar r0 *dberrors.Error\n\tif rf, ok := ret.Get(0).(func(interface{}) *dberrors.Error); ok {\n\t\tr0 = rf(req)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*dberrors.Error)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "cdbe585b8892b0ec3036e6a589184722", "score": "0.44009724", "text": "func (_m *Repository) Store(ctx context.Context, userInterests []user_interests.Domain) error {\n\tret := _m.Called(ctx, userInterests)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, []user_interests.Domain) error); ok {\n\t\tr0 = rf(ctx, userInterests)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "37d46579ad59fe299643d56d66156d18", "score": "0.43993086", "text": "func (_m *NewDataItemFunc) Execute(_a0 string, _a1 uint64) (dataitem.DataItem, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 dataitem.DataItem\n\tif rf, ok := ret.Get(0).(func(string, uint64) dataitem.DataItem); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(dataitem.DataItem)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, uint64) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "5a0c1da130466c0e742a33896ab0f52c", "score": "0.43974322", "text": "func (_m *Client) GetSentFiles(ctx context.Context, seek string, limit int) ([]*domain.SharedDirEntry, string, error) {\n\tret := _m.Called(ctx, seek, limit)\n\n\tvar r0 []*domain.SharedDirEntry\n\tif rf, ok := ret.Get(0).(func(context.Context, string, int) []*domain.SharedDirEntry); ok {\n\t\tr0 = rf(ctx, seek, limit)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]*domain.SharedDirEntry)\n\t\t}\n\t}\n\n\tvar r1 string\n\tif rf, ok := ret.Get(1).(func(context.Context, string, int) string); ok {\n\t\tr1 = rf(ctx, seek, limit)\n\t} else {\n\t\tr1 = ret.Get(1).(string)\n\t}\n\n\tvar r2 error\n\tif rf, ok := ret.Get(2).(func(context.Context, string, int) error); ok {\n\t\tr2 = rf(ctx, seek, limit)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "43e84b6c116465b91e3f90091d064ed6", "score": "0.4396722", "text": "func mockReturnDetailAddendumA() ReturnDetailAddendumA {\n\trdAddendumA := NewReturnDetailAddendumA()\n\trdAddendumA.RecordNumber = 1\n\trdAddendumA.ReturnLocationRoutingNumber = \"121042882\"\n\trdAddendumA.BOFDEndorsementDate = time.Now()\n\trdAddendumA.BOFDItemSequenceNumber = \"1 \"\n\trdAddendumA.BOFDAccountNumber = \"938383\"\n\trdAddendumA.BOFDBranchCode = \"01\"\n\trdAddendumA.PayeeName = \"Test Payee\"\n\trdAddendumA.TruncationIndicator = \"Y\"\n\trdAddendumA.BOFDConversionIndicator = \"1\"\n\trdAddendumA.BOFDCorrectionIndicator = 0\n\trdAddendumA.UserField = \"\"\n\treturn rdAddendumA\n}", "title": "" }, { "docid": "972f38be88535771e60e92aa6483eb7b", "score": "0.43885705", "text": "func (_m *Repository) Delivered(ctx context.Context, userid int, transid int) (transactions.Transaction_DetailDomain, error) {\n\tret := _m.Called(ctx, userid, transid)\n\n\tvar r0 transactions.Transaction_DetailDomain\n\tif rf, ok := ret.Get(0).(func(context.Context, int, int) transactions.Transaction_DetailDomain); ok {\n\t\tr0 = rf(ctx, userid, transid)\n\t} else {\n\t\tr0 = ret.Get(0).(transactions.Transaction_DetailDomain)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, int, int) error); ok {\n\t\tr1 = rf(ctx, userid, transid)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "87e25036ffcf3eded15d40b57dafd18d", "score": "0.43877542", "text": "func TestSingleBidder(t *testing.T) {\n\ttype aTest struct {\n\t\tdebugInfo *config.DebugInfo\n\t\thttpCallsLen int\n\t}\n\n\ttestCases := []*aTest{\n\t\t{&config.DebugInfo{Allow: false}, 0},\n\t\t{&config.DebugInfo{Allow: true}, 1},\n\t}\n\n\trespStatus := 200\n\trespBody := \"{\\\"bid\\\":false}\"\n\tserver := httptest.NewServer(mockHandler(respStatus, \"getBody\", respBody))\n\tdefer server.Close()\n\n\trequestHeaders := http.Header{}\n\trequestHeaders.Add(\"Content-Type\", \"application/json\")\n\n\tbidAdjustments := map[string]float64{\"test\": 2.0}\n\tfirstInitialPrice := 3.0\n\tsecondInitialPrice := 4.0\n\n\tbidderImpl := &goodSingleBidder{\n\t\thttpRequest: &adapters.RequestData{\n\t\t\tMethod: \"POST\",\n\t\t\tUri: server.URL,\n\t\t\tBody: []byte(\"{\\\"key\\\":\\\"val\\\"}\"),\n\t\t\tHeaders: http.Header{},\n\t\t},\n\t\tbidResponse: nil,\n\t}\n\n\tctx := context.Background()\n\n\tfor _, test := range testCases {\n\t\tmockBidderResponse := &adapters.BidderResponse{\n\t\t\tBids: []*adapters.TypedBid{\n\t\t\t\t{\n\t\t\t\t\tBid: &openrtb2.Bid{\n\t\t\t\t\t\tPrice: firstInitialPrice,\n\t\t\t\t\t},\n\t\t\t\t\tBidType: openrtb_ext.BidTypeBanner,\n\t\t\t\t\tDealPriority: 4,\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tBid: &openrtb2.Bid{\n\t\t\t\t\t\tPrice: secondInitialPrice,\n\t\t\t\t\t},\n\t\t\t\t\tBidType: openrtb_ext.BidTypeVideo,\n\t\t\t\t\tDealPriority: 5,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t\tbidderImpl.bidResponse = mockBidderResponse\n\n\t\tbidder := AdaptBidder(bidderImpl, server.Client(), &config.Configuration{}, &metricsConfig.NilMetricsEngine{}, openrtb_ext.BidderAppnexus, test.debugInfo, \"\")\n\t\tcurrencyConverter := currency.NewRateConverter(&http.Client{}, \"\", time.Duration(0))\n\n\t\tbidderReq := BidderRequest{\n\t\t\tBidRequest: &openrtb2.BidRequest{Imp: []openrtb2.Imp{{ID: \"impId\"}}},\n\t\t\tBidderName: \"test\",\n\t\t}\n\t\tbidReqOptions := bidRequestOptions{\n\t\t\taccountDebugAllowed: true,\n\t\t\theaderDebugAllowed: false,\n\t\t\taddCallSignHeader: false,\n\t\t\tbidAdjustments: bidAdjustments,\n\t\t}\n\t\textraInfo := &adapters.ExtraRequestInfo{}\n\t\tseatBids, extraBidderRespInfo, errs := bidder.requestBid(ctx, bidderReq, currencyConverter.Rates(), extraInfo, &adscert.NilSigner{}, bidReqOptions, openrtb_ext.ExtAlternateBidderCodes{}, &hookexecution.EmptyHookExecutor{}, nil)\n\n\t\tassert.Len(t, seatBids, 1)\n\t\tassert.False(t, extraBidderRespInfo.respProcessingStartTime.IsZero())\n\t\tseatBid := seatBids[0]\n\n\t\t// Make sure the goodSingleBidder was called with the expected arguments.\n\t\tif bidderImpl.httpResponse == nil {\n\t\t\tt.Errorf(\"The Bidder should be called with the server's response.\")\n\t\t}\n\t\tif bidderImpl.httpResponse.StatusCode != respStatus {\n\t\t\tt.Errorf(\"Bad response status. Expected %d, got %d\", respStatus, bidderImpl.httpResponse.StatusCode)\n\t\t}\n\t\tif string(bidderImpl.httpResponse.Body) != respBody {\n\t\t\tt.Errorf(\"Bad response body. Expected %s, got %s\", respBody, string(bidderImpl.httpResponse.Body))\n\t\t}\n\n\t\t// Make sure the returned values are what we expect\n\t\tif len(errortypes.FatalOnly(errs)) != 0 {\n\t\t\tt.Errorf(\"bidder.Bid returned %d errors. Expected 0\", len(errs))\n\t\t}\n\n\t\tif !test.debugInfo.Allow && len(errortypes.WarningOnly(errs)) != 1 {\n\t\t\tt.Errorf(\"bidder.Bid returned %d warnings. Expected 1\", len(errs))\n\t\t}\n\t\tif len(seatBid.Bids) != len(mockBidderResponse.Bids) {\n\t\t\tt.Fatalf(\"Expected %d bids. Got %d\", len(mockBidderResponse.Bids), len(seatBid.Bids))\n\t\t}\n\t\tfor index, typedBid := range mockBidderResponse.Bids {\n\t\t\tif typedBid.Bid != seatBid.Bids[index].Bid {\n\t\t\t\tt.Errorf(\"Bid %d did not point to the same bid returned by the Bidder.\", index)\n\t\t\t}\n\t\t\tif typedBid.BidType != seatBid.Bids[index].BidType {\n\t\t\t\tt.Errorf(\"Bid %d did not have the right type. Expected %s, got %s\", index, typedBid.BidType, seatBid.Bids[index].BidType)\n\t\t\t}\n\t\t\tif typedBid.DealPriority != seatBid.Bids[index].DealPriority {\n\t\t\t\tt.Errorf(\"Bid %d did not have the right deal priority. Expected %s, got %s\", index, typedBid.BidType, seatBid.Bids[index].BidType)\n\t\t\t}\n\t\t}\n\t\tbidAdjustment := bidAdjustments[\"test\"]\n\t\tif mockBidderResponse.Bids[0].Bid.Price != bidAdjustment*firstInitialPrice {\n\t\t\tt.Errorf(\"Bid[0].Price was not adjusted properly. Expected %f, got %f\", bidAdjustment*firstInitialPrice, mockBidderResponse.Bids[0].Bid.Price)\n\t\t}\n\t\tif mockBidderResponse.Bids[1].Bid.Price != bidAdjustment*secondInitialPrice {\n\t\t\tt.Errorf(\"Bid[1].Price was not adjusted properly. Expected %f, got %f\", bidAdjustment*secondInitialPrice, mockBidderResponse.Bids[1].Bid.Price)\n\t\t}\n\t\tif len(seatBid.HttpCalls) != test.httpCallsLen {\n\t\t\tt.Errorf(\"The bidder shouldn't log HttpCalls when request.test == 0. Found %d\", len(seatBid.HttpCalls))\n\t\t}\n\t\tfor index, bid := range seatBid.Bids {\n\t\t\tassert.NotEqual(t, mockBidderResponse.Bids[index].Bid.Price, bid.OriginalBidCPM, \"The bid price was adjusted, so the originally bid CPM should be different\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6ab3c55035c6d2ed895d738bdc45a468", "score": "0.438676", "text": "func (_m *API) NetworkList(ctx context.Context, drivers []string) ([]*types.Network, error) {\n\tret := _m.Called(ctx, drivers)\n\n\tvar r0 []*types.Network\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(context.Context, []string) ([]*types.Network, error)); ok {\n\t\treturn rf(ctx, drivers)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, []string) []*types.Network); ok {\n\t\tr0 = rf(ctx, drivers)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]*types.Network)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, []string) error); ok {\n\t\tr1 = rf(ctx, drivers)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "19979b643839011a7cb3767e2b37c20e", "score": "0.43796134", "text": "func (_m *MockProxy) Search(ctx context.Context, request *milvuspb.SearchRequest) (*milvuspb.SearchResults, error) {\n\tret := _m.Called(ctx, request)\n\n\tvar r0 *milvuspb.SearchResults\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *milvuspb.SearchRequest) (*milvuspb.SearchResults, error)); ok {\n\t\treturn rf(ctx, request)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, *milvuspb.SearchRequest) *milvuspb.SearchResults); ok {\n\t\tr0 = rf(ctx, request)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*milvuspb.SearchResults)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, *milvuspb.SearchRequest) error); ok {\n\t\tr1 = rf(ctx, request)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "d71078fb046b2a96a6b1c4b861f8b940", "score": "0.43764827", "text": "func mockRemittance() *Remittance {\n\tri := NewRemittance()\n\tri.CoverPayment.SwiftFieldTag = \"Swift Field Tag\"\n\tri.CoverPayment.SwiftLineOne = \"Swift Line One\"\n\tri.CoverPayment.SwiftLineTwo = \"Swift Line Two\"\n\tri.CoverPayment.SwiftLineThree = \"Swift Line Three\"\n\tri.CoverPayment.SwiftLineFour = \"Swift Line Four\"\n\treturn ri\n}", "title": "" }, { "docid": "c7aa758cf8de77fd3df8abab6792012e", "score": "0.4372298", "text": "func (_m *Store) List(limit int, skip int) []models.Link {\n\tret := _m.Called(limit, skip)\n\n\tvar r0 []models.Link\n\tif rf, ok := ret.Get(0).(func(int, int) []models.Link); ok {\n\t\tr0 = rf(limit, skip)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).([]models.Link)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "4ed846df422b95d3d8c6c63764ffffe9", "score": "0.43677703", "text": "func (_m *ModifyBehaviour) ApplyVoucher(ctx context.Context, _a1 *cart.Cart, couponCode string) (*cart.Cart, cart.DeferEvents, error) {\n\tret := _m.Called(ctx, _a1, couponCode)\n\n\tvar r0 *cart.Cart\n\tvar r1 cart.DeferEvents\n\tvar r2 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, string) (*cart.Cart, cart.DeferEvents, error)); ok {\n\t\treturn rf(ctx, _a1, couponCode)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, *cart.Cart, string) *cart.Cart); ok {\n\t\tr0 = rf(ctx, _a1, couponCode)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*cart.Cart)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, *cart.Cart, string) cart.DeferEvents); ok {\n\t\tr1 = rf(ctx, _a1, couponCode)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(cart.DeferEvents)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(2).(func(context.Context, *cart.Cart, string) error); ok {\n\t\tr2 = rf(ctx, _a1, couponCode)\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "title": "" } ]
cab6da0bdbd4084b87a8965a286b9b74
HasUsableActiveKeys returns true if the given CA has any usable additional trusted keys.
[ { "docid": "e0d1007f7ea57880cafd1647a2d0bded", "score": "0.7279803", "text": "func (m *Manager) HasUsableAdditionalKeys(ctx context.Context, ca types.CertAuthority) (bool, error) {\n\tusable, err := m.hasUsableKeys(ctx, ca.GetAdditionalTrustedKeys())\n\treturn usable, trace.Wrap(err)\n}", "title": "" } ]
[ { "docid": "0ca8d753e50eba2d03b47e2f5768ce30", "score": "0.81425023", "text": "func (m *Manager) HasUsableActiveKeys(ctx context.Context, ca types.CertAuthority) (bool, error) {\n\tusable, err := m.hasUsableKeys(ctx, ca.GetActiveKeys())\n\treturn usable, trace.Wrap(err)\n}", "title": "" }, { "docid": "646150409db10efad77512dc23053e9e", "score": "0.6768371", "text": "func (c *rawKeyStore) HasLocalActiveKeys(ca types.CertAuthority) bool {\n\treturn c.keySetHasLocalKeys(ca.GetActiveKeys())\n}", "title": "" }, { "docid": "4258a874d9b466e75341641361a44e17", "score": "0.6048186", "text": "func (c *rawKeyStore) HasLocalAdditionalKeys(ca types.CertAuthority) bool {\n\treturn c.keySetHasLocalKeys(ca.GetAdditionalTrustedKeys())\n}", "title": "" }, { "docid": "cf00e5f5debf52977d46b62537c72376", "score": "0.5762187", "text": "func (c TLSClientConfig) HasCA() bool {\n\treturn len(c.CAData) > 0 || len(c.CAFile) > 0\n}", "title": "" }, { "docid": "230662549dae7be195c50d70002eb167", "score": "0.57477766", "text": "func (o *DevicePolicy) HasActivationKey() bool {\n\tif o != nil && o.ActivationKey != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "8b2959ef1670a4bce760d2514ef574d4", "score": "0.5547418", "text": "func HasCertificateAuthority(packages PackageService) (bool, error) {\n\tenvelope, err := packages.ReadPackageEnvelope(loc.OpsCenterCertificateAuthority)\n\tif err != nil && !trace.IsNotFound(err) {\n\t\treturn false, trace.Wrap(err)\n\t}\n\treturn envelope != nil, nil\n}", "title": "" }, { "docid": "f9bf8d1bad19a4e899a59387f6d1796e", "score": "0.55431014", "text": "func (c *Config) HasCA() bool {\n\treturn len(c.TLS.CAData) > 0 || len(c.TLS.CAFile) > 0\n}", "title": "" }, { "docid": "3dc1becf727f3286ce9f7f9c6b9483a1", "score": "0.54793763", "text": "func (o GetKeysKeySigningKeyOutput) IsActive() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v GetKeysKeySigningKey) bool { return v.IsActive }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "e4f68c28b76f7213ebf1c90553ca2de1", "score": "0.53311515", "text": "func (s *TLSSecret) ReadyCA() bool {\n\tdata := s.secret.Data\n\n\tif _, ok := data[CaKey]; !ok {\n\t\treturn false\n\t}\n\n\tif _, ok := data[CaCert]; !ok {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "c488e693559ab7e1e6c8d31c1f730349", "score": "0.52900255", "text": "func (o *HostAgentInfo) HasActive() bool {\n\tif o != nil && o.Active != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "8f8b080db4745c2fbef06302ecc8113a", "score": "0.5287153", "text": "func (o GetKeysZoneSigningKeyOutput) IsActive() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v GetKeysZoneSigningKey) bool { return v.IsActive }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "573d2d950364d7c9a7c8540d0ce58a68", "score": "0.5277442", "text": "func (o *RuleStore) HasActive() bool {\n\tif o != nil && o.Active != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "fd59571c4e6ecb7d5e99e076a83d8dbf", "score": "0.5262939", "text": "func (o *ApiKeyResponse) HasActive() bool {\n\tif o != nil && !IsNil(o.Active) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f9dd9f93eebf15f1d9d97a0c7d5ed89b", "score": "0.5241935", "text": "func (o *PeoplePermissions) HasActive() bool {\n\tif o != nil && o.Active != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "0c017843bb4c60620ac4410548ad6fed", "score": "0.5241757", "text": "func (b *Bundle) HasX509Authority(x509Authority *x509.Certificate) bool {\n\tb.mtx.RLock()\n\tdefer b.mtx.RUnlock()\n\n\tfor _, r := range b.x509Authorities {\n\t\tif r.Equal(x509Authority) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "45924542db4304f9f2e8de0ba3a456e4", "score": "0.52356464", "text": "func IsActive(ec *apiserverconfigv1.EncryptionConfiguration) bool {\n\tif ec.Resources[0].Providers[0].AESCBC != nil {\n\t\treturn true\n\t} else {\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "9db2c58a2abdf13e8d3831830cea9984", "score": "0.5217241", "text": "func (cert *Certificate) isInstalled() bool {\n\tcmd := exec.Command(\"security\", \"find-certificate\", \"-c\", cert.X509().Subject.CommonName, OSX_SYSTEM_KEYCHAIN_PATH)\n\terr := cmd.Run()\n\n\treturn err == nil\n}", "title": "" }, { "docid": "9e04ed4a04b5e680b8333d6568d8870f", "score": "0.51774067", "text": "func IsChachaKeyValid(key []byte) bool {\n\treturn len(key) == chacha.KeySize\n}", "title": "" }, { "docid": "86fd328336ce341f447c784d06df358c", "score": "0.51676", "text": "func (k Keeper) IsApprovedCertificatesPresent(ctx sdk.Context, subject string, subjectKeyID string) bool {\n\tstore := ctx.KVStore(k.storeKey)\n\n\treturn store.Has(types.GetApprovedCertificateKey(subject, subjectKeyID))\n}", "title": "" }, { "docid": "21951469b4fd7e0112033755c4d587f2", "score": "0.5161098", "text": "func hasRootCA(cs tls.ConnectionState) (bool, string) {\n\tvar topCert *x509.Certificate\n\tif len(cs.VerifiedChains) != 0 {\n\t\tfor _, chain := range cs.VerifiedChains {\n\t\t\tfor _, cert := range chain {\n\t\t\t\ttopCert = cert\n\t\t\t}\n\t\t}\n\t} else {\n\t\tfor _, cert := range cs.PeerCertificates {\n\t\t\ttopCert = cert\n\t\t}\n\t}\n\treturn topCert.Issuer.CommonName == topCert.Subject.CommonName, topCert.Issuer.CommonName\n}", "title": "" }, { "docid": "0e10792499d0ca1c8413c205dff7dce8", "score": "0.515882", "text": "func (o *KubernetesTrustedRegistriesPolicy) HasRootCaRegistries() bool {\n\tif o != nil && o.RootCaRegistries != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "a6f9c1bdc51b5198831f00e2d5f70dba", "score": "0.5139716", "text": "func (k Keeper) IsProposedCertificatePresent(ctx sdk.Context, subject string, subjectKeyID string) bool {\n\tstore := ctx.KVStore(k.storeKey)\n\n\treturn store.Has(types.GetProposedCertificateKey(subject, subjectKeyID))\n}", "title": "" }, { "docid": "543e04aa1d950f7c6fd361ab9862c646", "score": "0.5119352", "text": "func (o *JsonMDNAUserObject) HasActivated() bool {\n\tif o != nil && o.Activated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "db7d8788982fc6e6e7d4f3bd136459e1", "score": "0.51098126", "text": "func (o *TenantTokenConfig) HasActive() bool {\n\tif o != nil && o.Active != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "7a2db85aa57b005017308e939a3cf3dc", "score": "0.5101966", "text": "func (key Key) IsValid() bool {\n\tfor _, supKey := range AllSupportedKeys {\n\t\tif supKey == key {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c7865001d619025a090d366ecf288f54", "score": "0.5083543", "text": "func (k Keeper) IsChildCertificatesPresent(ctx sdk.Context, issuer string, authorityKeyID string) bool {\n\tstore := ctx.KVStore(k.storeKey)\n\n\treturn store.Has(types.GetChildCertificatesKey(issuer, authorityKeyID))\n}", "title": "" }, { "docid": "cc558a91ccee1d04133797f9f7e9228e", "score": "0.5082703", "text": "func (o *TlsIngestProfile2) HasCiphers() bool {\n\tif o != nil && o.Ciphers != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "45adda633b777eb12615f0c403e24958", "score": "0.5066496", "text": "func (o *TlsIngestProfile2) HasCaCertificateDetails() bool {\n\tif o != nil && o.CaCertificateDetails != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "b1598bf189d3f3765e3639bf2ba776dd", "score": "0.50650454", "text": "func (o *HyperflexSummaryAllOf) HasActiveNodes() bool {\n\tif o != nil && o.ActiveNodes != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c777da635d106efdb36fdd1ea7a23ffa", "score": "0.50559473", "text": "func (m *Smap) HasActiveTs(except string) bool {\n\tfor tid, t := range m.Tmap {\n\t\tif tid == except || t.InMaintOrDecomm() {\n\t\t\tcontinue\n\t\t}\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "3cb36c05181c5effcc302bbe8db025b3", "score": "0.5040628", "text": "func (c *Config) HasCertCallback() bool {\n\treturn c.TLS.GetCertHolder != nil\n}", "title": "" }, { "docid": "8158eaa7aa97e4b6f1f60c27745e33e8", "score": "0.50375384", "text": "func (o *SyntheticsCITest) HasAllowInsecureCertificates() bool {\n\tif o != nil && o.AllowInsecureCertificates != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "b6a8937c33f90452666a85a66286bd17", "score": "0.50244695", "text": "func (cs *CipherState) HasKey() bool {\n\treturn cs.aead != nil\n}", "title": "" }, { "docid": "ecc6de0fa6a7d21e39f9cfc8fa173b53", "score": "0.50146353", "text": "func (res *VerificationResult) HasTrustedChain() bool {\n\treturn len(res.CurrentChains) > 0\n}", "title": "" }, { "docid": "52ea94a06023f9ac64d910683a4cc491", "score": "0.5012869", "text": "func (o *SyntheticsTestRequest) HasCertificateDomains() bool {\n\treturn o != nil && o.CertificateDomains != nil\n}", "title": "" }, { "docid": "26f61262cc68d454748249a408116a53", "score": "0.50115454", "text": "func (_KeyManager *KeyManagerCaller) KeyHasPurpose(opts *bind.CallOpts, _key [32]byte, _purpose *big.Int) (bool, error) {\n\tvar (\n\t\tret0 = new(bool)\n\t)\n\tout := ret0\n\terr := _KeyManager.contract.Call(opts, out, \"keyHasPurpose\", _key, _purpose)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "e61c78e3a3e3021c42f3315b6f66f2ee", "score": "0.5004165", "text": "func AuthorizedKey(givenKey []byte) bool {\n\tfor _, key := range validKeys {\n\t\tif bytes.Compare(key, givenKey) == 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "c73f1bc455aad3ea8fd75a6d997aa6a0", "score": "0.5001097", "text": "func (ss *SecretSyncer) HasActiveDevice(includeTypesSet DeviceTypeSet) (bool, error) {\n\tdevs, err := ss.ActiveDevices(includeTypesSet)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn len(devs) > 0, nil\n}", "title": "" }, { "docid": "85affe3507e5dfa525ff2cf3320b3f84", "score": "0.49901846", "text": "func (_KeyManager *KeyManagerSession) KeyHasPurpose(_key [32]byte, _purpose *big.Int) (bool, error) {\n\treturn _KeyManager.Contract.KeyHasPurpose(&_KeyManager.CallOpts, _key, _purpose)\n}", "title": "" }, { "docid": "31b83d59f8d87a0b0010f46ef6954fc9", "score": "0.4987709", "text": "func (o *V2HttpConfigurationClientCertificate) HasCaBundle() bool {\n\tif o != nil && o.CaBundle != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "188f125af53378b86807b7a544ee0fb3", "score": "0.49786815", "text": "func (o *UserSessionUserAction) HasCdnResources() bool {\n\tif o != nil && o.CdnResources != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c21865714fc18321267f791a5ea7c668", "score": "0.49784973", "text": "func (a *Attendee) IsKeyed() bool {\n\treturn a.PubKey != nil\n}", "title": "" }, { "docid": "fc6d41302e6d3cf2ad1ca6b8c2523fc1", "score": "0.49762696", "text": "func (c *LicenseV3) GetSupportsApplicationAccess() Bool {\n\t// For backward compatibility return true if app access flag isn't set,\n\t// or it will stop working for all users who are already using it and\n\t// were issued licenses without this flag.\n\tif c.Spec.SupportsApplicationAccess == nil {\n\t\treturn Bool(true)\n\t}\n\treturn *c.Spec.SupportsApplicationAccess\n}", "title": "" }, { "docid": "04bf54ea4313ec204d64e8d5826c7e02", "score": "0.49707538", "text": "func (o *TlsIngestProfile2) HasCaCertificate() bool {\n\tif o != nil && o.CaCertificate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "55d6a4a1909d6ebbcb6e678f9f44ecb7", "score": "0.49676856", "text": "func hasUsages(csr *certificates.CertificateSigningRequest, usages []certificates.KeyUsage) bool {\n\tif csr == nil || len(csr.Spec.Usages) < 2 {\n\t\treturn false\n\t}\n\tusageMap := map[certificates.KeyUsage]struct{}{}\n\tfor _, u := range usages {\n\t\tusageMap[u] = struct{}{}\n\t}\n\n\tfor _, u := range csr.Spec.Usages {\n\t\tif _, ok := usageMap[u]; !ok {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "e14c0d1c825c96ffd74d9e0073832eb6", "score": "0.4965574", "text": "func (_KeyManager *KeyManagerCallerSession) KeyHasPurpose(_key [32]byte, _purpose *big.Int) (bool, error) {\n\treturn _KeyManager.Contract.KeyHasPurpose(&_KeyManager.CallOpts, _key, _purpose)\n}", "title": "" }, { "docid": "48d689d8e57efab5c6ed9ad368e70beb", "score": "0.49595886", "text": "func (o *SyntheticsSSLCertificateIssuer) HasCn() bool {\n\tif o != nil && o.Cn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "8b67c980c830f44bd8f0382951cf5841", "score": "0.495343", "text": "func (o *SslCertDto) HasCertificateChainEncoded() bool {\n\tif o != nil && o.CertificateChainEncoded != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "bd31032899a77bb9e7b74dbc6108f1db", "score": "0.49478656", "text": "func (user IAMUser) HasAccessKeys(svc *iam.Client) bool {\n\tinput := &iam.ListAccessKeysInput{\n\t\tUserName: aws.String(user.Name),\n\t}\n\n\tresult, err := svc.ListAccessKeys(context.TODO(), input)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn len(result.AccessKeyMetadata) > 0\n}", "title": "" }, { "docid": "af52828d2ea4924da092e15f00b2518a", "score": "0.49213842", "text": "func (o *ApplicationKeyListResponse) HasApplicationKeys() bool {\n\tif o != nil && o.ApplicationKeys != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e2e99d45caf1e2f60eb9797a8bafb5ee", "score": "0.4914532", "text": "func (o *Ruleset) HasActivate() bool {\n\tif o != nil && o.Activate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "320af2c29b3aca6074b8d9aa7c842f0d", "score": "0.49016556", "text": "func (nt *notifyTracker) HasCertificate(k uint32, set *Set) bool {\n\t_, exist := nt.certificates[calcID(k, set)]\n\treturn exist\n}", "title": "" }, { "docid": "320af2c29b3aca6074b8d9aa7c842f0d", "score": "0.49016556", "text": "func (nt *notifyTracker) HasCertificate(k uint32, set *Set) bool {\n\t_, exist := nt.certificates[calcID(k, set)]\n\treturn exist\n}", "title": "" }, { "docid": "ce9cd228f7ca2172e956a0fde5839b28", "score": "0.48975995", "text": "func (o *CustconfAuthUrlSignAliCloudB) HasEnabled() bool {\n\tif o != nil && o.Enabled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f40381234c777981f86cf479f07e6094", "score": "0.48740783", "text": "func (o *Ruleset) HasActivatedAt() bool {\n\tif o != nil && o.ActivatedAt != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ae148729dfd0c555a80adda38b0a324e", "score": "0.48732755", "text": "func (o *AndroidGeneralDeviceConfiguration) HasPasswordBlockTrustAgents() bool {\n\tif o != nil && o.PasswordBlockTrustAgents != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "2a7bcea0eb24e7870f6285e0567cc979", "score": "0.48717824", "text": "func isUserAuthorizedToUseFunction(functionToAuthorize ruleStruct, usersPublicKeys []ed25519.PublicKey, userSecret [32]byte, aggregatedSignatureStoredInA3S []byte) bool {\n\n\tfor pubKeyPosistion, pubKey := range usersPublicKeys {\n\t\t// If public key exist in list then remove it from the list\n\t\tif string(pubKey) == string(functionToAuthorize.publicKey) {\n\t\t\tcopy(usersPublicKeys[pubKeyPosistion:], usersPublicKeys[pubKeyPosistion+1:])\n\t\t\tusersPublicKeys = usersPublicKeys[:len(usersPublicKeys)-1]\n\t\t\tbreak\n\t\t}\n\t}\n\n\tvalid := cosi.Verify(usersPublicKeys, nil, userSecret[:], aggregatedSignatureStoredInA3S)\n\n\treturn valid\n}", "title": "" }, { "docid": "9f6c9a0889f16d0dc5c6fbcb54d636ed", "score": "0.486329", "text": "func (o *SyntheticsSSLCertificateSubject) HasCn() bool {\n\tif o != nil && o.Cn != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "19d4b774bcff49a62c1d1951d029c8b5", "score": "0.485935", "text": "func (k Keeper) IsUniqueCertificateKeyPresent(ctx sdk.Context, issuer string, serialNumber string) bool {\n\tstore := ctx.KVStore(k.storeKey)\n\n\treturn store.Has(types.GetUniqueCertificateKey(issuer, serialNumber))\n}", "title": "" }, { "docid": "847412c439bba2f4929e5286da07f023", "score": "0.48451364", "text": "func KcovAvailable() bool {\n\treturn len(coverdata.Cover.Blocks) > 0\n}", "title": "" }, { "docid": "b1d4d6e67fe617d653399fb57ffd3a68", "score": "0.4836618", "text": "func (fw *Framework) HasCollective(collective string) bool {\n\tfor _, c := range fw.Config.Collectives {\n\t\tif c == collective {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ec0b759c91dbc7954343a90fe209aaf1", "score": "0.48209122", "text": "func (o CertificateRequestSpecOutput) IsCA() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v CertificateRequestSpec) *bool { return v.IsCA }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "90f911fe5aad8012da9f0733da6438eb", "score": "0.48194835", "text": "func (c *generalConfig) FeatureUICSAKeys() bool {\n\treturn getEnvWithFallback(c, envvar.NewBool(\"FeatureUICSAKeys\"))\n}", "title": "" }, { "docid": "5c97d1eee3dd8c6957c79f7317a3c3ba", "score": "0.4806186", "text": "func (o *InquiredMerchantMerchant) HasServiceProvLegal() bool {\n\tif o != nil && o.ServiceProvLegal != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "cf4b3b12151591a372d52986520ac754", "score": "0.4796061", "text": "func (dt *Data) CheckIfActive() bool {\n\tif dt.N > 0 {\n\t\treturn true\n\t}\n\tif dt.Sources != nil && len(dt.Sources.Items()) > 0 {\n\t\tsourceList := dt.Sources.Items()\n\t\tfor _, sourceItem := range sourceList { // Assumption is that random map runs are random enough\n\t\t\tsource := sourceItem.Object.(DataSource)\n\t\t\tif source.GetDataInfo().N > 0 {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "7a97c7847cb5e9c1df53aabab335a418", "score": "0.4780588", "text": "func CanActivate() bool {\n\tif runtime.GOOS == \"windows\" || runtime.GOARCH == \"arm\" {\n\t\treturn false\n\t}\n\n\tuid := syscall.Getuid()\n\treturn uid == 0\n}", "title": "" }, { "docid": "d3c8f9a13fc3d04313033fdff224d82a", "score": "0.47731236", "text": "func (cri *CertificateRequestInfo) SupportsCertificate(c *Certificate) error {}", "title": "" }, { "docid": "a0235a14674bc052a860452ad1cd1a05", "score": "0.47726092", "text": "func (o *SyntheticsSSLCertificateIssuer) HasC() bool {\n\tif o != nil && o.C != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "6c2f23817a99a502727c8abeef5da96f", "score": "0.47694653", "text": "func (o *SyntheticsTestRequest) HasCertificate() bool {\n\treturn o != nil && o.Certificate != nil\n}", "title": "" }, { "docid": "8adca7acc3c72b6096cc32ea04d45fb3", "score": "0.47693795", "text": "func (o *TlsIngestProfile2) HasClientTlsCertificateKey() bool {\n\tif o != nil && o.ClientTlsCertificateKey != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "dff21e4a81473a2425495b41bd929f94", "score": "0.47679332", "text": "func (o CertificateSpecOutput) IsCA() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v CertificateSpec) *bool { return v.IsCA }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "779c273e0cc08a1cbf6b20bae7e72c97", "score": "0.47665325", "text": "func (k Keeper) IsRevokedCertificatesPresent(ctx sdk.Context, subject string, subjectKeyID string) bool {\n\tstore := ctx.KVStore(k.storeKey)\n\n\treturn store.Has(types.GetRevokedCertificateKey(subject, subjectKeyID))\n}", "title": "" }, { "docid": "0d863f09f7ce11f7e4449d6188a61741", "score": "0.4766354", "text": "func (k *Key) Valid() bool {\n\treturn k.user.Valid() && k.master.Valid()\n}", "title": "" }, { "docid": "ab7bfc2e90e9f66e84bd2a71f9409d05", "score": "0.4764052", "text": "func (o *UserPreferenceAllOf) HasIsActive() bool {\n\tif o != nil && o.IsActive != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "96492ef374c290424bbd218f18b572e7", "score": "0.47608408", "text": "func (o *InquiredMerchantMerchant) HasServiceProvDBA() bool {\n\tif o != nil && o.ServiceProvDBA != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "cb28fbf7de7e72b69510193450862f2d", "score": "0.47574118", "text": "func (tc *TbtcChain) IsChaosnetActive() (bool, error) {\n\treturn tc.sortitionPool.IsChaosnetActive()\n}", "title": "" }, { "docid": "c60239b0e3e7748389cc8ef668bc96bb", "score": "0.47554082", "text": "func (o *AndroidGeneralDeviceConfiguration) HasSecurityRequireVerifyApps() bool {\n\tif o != nil && o.SecurityRequireVerifyApps != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "323e5ad13571f7bc24052bdf561fa4ea", "score": "0.47550842", "text": "func (o *MicrosoftGraphWindowsInformationProtectionPolicy) HasEnterpriseIPRangesAreAuthoritative() bool {\n\tif o != nil && o.EnterpriseIPRangesAreAuthoritative != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c222ed93c9521628f6cea552a36e8873", "score": "0.47509915", "text": "func IsUsable(usedBlockDevices map[string]int) Predicate {\n\treturn func(bd *BlockDevice) bool {\n\t\treturn bd.IsUsable(usedBlockDevices)\n\t}\n}", "title": "" }, { "docid": "13fd47800df7aa91c8f6f857139e40c4", "score": "0.47479686", "text": "func IsKeychainEnabled() bool {\n\treturn keychainEnabled\n}", "title": "" }, { "docid": "24de2437d2f0d86df4843d6314ee9f74", "score": "0.4746233", "text": "func (o *Budget) HasActive() bool {\n\tif o != nil && o.Active != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e9bcd7a7553e390074728c861399a22d", "score": "0.47422895", "text": "func (o *UserSessionUserAction) HasFirstPartyResources() bool {\n\tif o != nil && o.FirstPartyResources != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d4b18e1285c565eb100163b6597a540f", "score": "0.4736728", "text": "func IsRotationKeyActive(ec *apiserverconfigv1.EncryptionConfiguration) (bool, error) {\n\treturn false, fmt.Errorf(\"not implemented yet\")\n}", "title": "" }, { "docid": "628d71f32544661a1d325079c9cf2242", "score": "0.4736187", "text": "func tlsaSupported(rrs []*dns.TLSA) bool {\n\tfor _, rr := range rrs {\n\t\tif rr.Usage == 3 {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "87168ec2c7f77d45c96c678e4a68009c", "score": "0.4734312", "text": "func (p *Proxy) HasActiveUpstream() bool {\n\treturn !p.noActiveUpstream.Load()\n}", "title": "" }, { "docid": "bdfbdd99c57eb56c2118a883d18cc580", "score": "0.47337154", "text": "func (d *Downtime) HasActive() bool {\n\tif d != nil && d.Active != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c4a6a3c2e54d1981d71e22c8e944938c", "score": "0.47241527", "text": "func (b *ACLBuilder) HasPrincipals() bool {\n\treturn len(b.allow) > 0 ||\n\t\tb.anyAllow ||\n\t\tlen(b.deny) > 0 ||\n\t\tb.anyDeny\n}", "title": "" }, { "docid": "f8b8b9e57202d89b0b17f4c4983e07f2", "score": "0.4723935", "text": "func (ct *ConsoleTemplate) HasAuthorisationRules() bool {\n\treturn len(ct.Spec.AuthorisationRules) > 0 || ct.Spec.DefaultAuthorisationRule != nil\n}", "title": "" }, { "docid": "397db2208a564c9225413cddfe6b4509", "score": "0.47228953", "text": "func (chi *ClientHelloInfo) SupportsCertificate(c *Certificate) error {}", "title": "" }, { "docid": "705c197f829d8dc6518d0c986beb25c4", "score": "0.47130805", "text": "func (lp *LocalPKI) CertificateAuthorityExists() (bool, error) {\n\treturn tls.CertKeyPairExists(\"ca\", lp.GeneratedCertsDirectory)\n}", "title": "" }, { "docid": "ffdb22f5df15c258f4a744a62f2785c5", "score": "0.47129986", "text": "func (o *UserSessionUserAction) HasThirdPartyResources() bool {\n\tif o != nil && o.ThirdPartyResources != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d118c758d88d472f7661b14f6bb1ed71", "score": "0.47082078", "text": "func (k Keeper) HasCoins(ctx sdk.Ctx, addr sdk.Address, amt sdk.Coins) bool {\n\treturn k.GetCoins(ctx, addr).IsAllGTE(amt)\n}", "title": "" }, { "docid": "513d060c30ef6b9feb6a0cecadacc5d4", "score": "0.4704115", "text": "func (cs *KeyStore) CheckIfUserHasKey(userId, deviceId string) bool {\n\tfor i := range cs.keyStore {\n\t\tif cs.keyStore[i].DeviceId == deviceId && cs.keyStore[i].UserId == userId {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "545dca77edb91f805d9b1995e1972d19", "score": "0.47034943", "text": "func (o *TlsIngestProfile2) HasClientTlsCertificateDetails() bool {\n\tif o != nil && o.ClientTlsCertificateDetails != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f912cb4f6b72fe89d97c71f661ecf2bb", "score": "0.47019753", "text": "func AssertCertificateHasClientAuthUsage(t *testing.T, cert *x509.Certificate) {\n\tfor i := range cert.ExtKeyUsage {\n\t\tif cert.ExtKeyUsage[i] == x509.ExtKeyUsageClientAuth {\n\t\t\treturn\n\t\t}\n\t}\n\tt.Error(\"cert has not ClientAuth usage as expected\")\n}", "title": "" }, { "docid": "bec114a0cbe65c51ff102d0c5e278b27", "score": "0.47010574", "text": "func (o CertificateRequestSpecPtrOutput) IsCA() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *CertificateRequestSpec) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.IsCA\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "39e665a398162be58f45718c41062d0f", "score": "0.4694581", "text": "func (o *SummaryTimeCounterEstimateResponse) HasActiveMinsEstimated() bool {\n\tif o != nil && o.ActiveMinsEstimated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "1ce75e6534c1b387eec8d2da0ba8382d", "score": "0.4661102", "text": "func (s accountKeyService) Exists() (bool, error) {\n\t_, err := s.client.getAccountKey()\n\tif api.IsErrNotFound(err) {\n\t\treturn false, nil\n\t}\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "c216141906f0538063ccff3f1be9c47e", "score": "0.4653858", "text": "func (k *Keeper) HasSuicided(ctx sdk.Context, addr ethcmn.Address) bool {\n\treturn k.CommitStateDB.WithContext(ctx).HasSuicided(addr)\n}", "title": "" }, { "docid": "8a319d0135a02df6fc10745259651b62", "score": "0.46533218", "text": "func (c *generalConfig) FeatureUICSAKeys() bool {\n\treturn c.getWithFallback(\"FeatureUICSAKeys\", ParseBool).(bool)\n}", "title": "" } ]
55276c0ef9ae8bb48eb623a36f88f406
LastDayMonth function to get last day of the month
[ { "docid": "841215dd61bda99671447d6ae5c60677", "score": "0.8142408", "text": "func LastDayMonth(year int, month int, timezone *time.Location) time.Time {\n\tt := time.Date(year, time.Month(month)+1, 0, 0, 0, 0, 0, time.UTC)\n\treturn t\n}", "title": "" } ]
[ { "docid": "fce6a771cd5f8f30b439ab72a277786d", "score": "0.81566024", "text": "func lastDayInMonth(year int, month time.Month) int {\n\treturn time.Date(year, time.Month(month+1), 0, 0, 0, 0, 0, time.UTC).Day()\n}", "title": "" }, { "docid": "af8759c2d2a3da4a564d0f6c5bb3e117", "score": "0.79892564", "text": "func (my *AttunedMonth) MonthLastDay() int {\n\treturn my.lastDay\n}", "title": "" }, { "docid": "91d62caca9107461162a1301d621dbf2", "score": "0.69399744", "text": "func (my *AttunedMonth) IsMonthLastDay(d int) bool {\n\treturn d == my.lastDay\n}", "title": "" }, { "docid": "28c52e14ed4159e6579684bc60d99778", "score": "0.6896466", "text": "func fetchMonthEndDay(m time.Month, y int) int {\n\tif m == time.February && isLeapYear(y) {\n\t\treturn 29\n\t}\n\n\treturn monthEndDay[m]\n}", "title": "" }, { "docid": "99795b91ed45720d4bed46d9f369371b", "score": "0.6871636", "text": "func getFirstLastDayofMonth(nthMonth int) date {\n\tvar d date\n\tTime := time.Now()\n\tt1 := Time.AddDate(0, -nthMonth, 0)\n\tyear, month, _ := t1.Date()\n\td.monthIndex = strconv.Itoa(year) + \"/\" + month.String()\n\td.first = time.Date(year, month, 1, 0, 0, 0, 0, time.UTC)\n\td.last = time.Date(year, month+1, 0, 0, 0, 0, 0, time.UTC)\n\n\treturn d\n}", "title": "" }, { "docid": "cb55c4e939a82d069c7a9e335e450746", "score": "0.653217", "text": "func GetEndOfNatureMonth(timeStamp int64) (t time.Time) {\n\tdate := time.Unix(timeStamp, 0)\n\tend := time.Date(date.Year(), date.Month()+1, 1, 0, 0, 0, 0, time.UTC)\n\tend = end.Add(-time.Nanosecond)\n\treturn end\n}", "title": "" }, { "docid": "93d0513ea50ed00054a5d31b0cbb71e3", "score": "0.63552135", "text": "func (_DayLimit *DayLimitCaller) LastDay(opts *bind.CallOpts) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _DayLimit.contract.Call(opts, out, \"lastDay\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "4f8586e520a88fe45f08366775ec1509", "score": "0.6326009", "text": "func (_DayLimitMock *DayLimitMockCaller) LastDay(opts *bind.CallOpts) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _DayLimitMock.contract.Call(opts, out, \"lastDay\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "a4017a3a83e7e894b37793da0b949292", "score": "0.62493676", "text": "func (_DayLimitMock *DayLimitMockSession) LastDay() (*big.Int, error) {\n\treturn _DayLimitMock.Contract.LastDay(&_DayLimitMock.CallOpts)\n}", "title": "" }, { "docid": "f4b7fce43a47221b2342f82288a729c6", "score": "0.61813176", "text": "func (c *StatsGetSearchapplicationCall) EndDateMonth(endDateMonth int64) *StatsGetSearchapplicationCall {\n\tc.urlParams_.Set(\"endDate.month\", fmt.Sprint(endDateMonth))\n\treturn c\n}", "title": "" }, { "docid": "b870b139c172c1edeafebd84d7a83780", "score": "0.61772853", "text": "func (o ScheduledAuditOutput) DayOfMonth() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ScheduledAudit) pulumi.StringPtrOutput { return v.DayOfMonth }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6ac4f2f1a8e687ff0470b88f3269ef61", "score": "0.6150527", "text": "func (_DayLimit *DayLimitSession) LastDay() (*big.Int, error) {\n\treturn _DayLimit.Contract.LastDay(&_DayLimit.CallOpts)\n}", "title": "" }, { "docid": "bd6f298b7b417d0c2206d9633c0c78cc", "score": "0.61141634", "text": "func (_DayLimitMock *DayLimitMockCallerSession) LastDay() (*big.Int, error) {\n\treturn _DayLimitMock.Contract.LastDay(&_DayLimitMock.CallOpts)\n}", "title": "" }, { "docid": "e2c09b515f864e0cfb350d5c87c1ca45", "score": "0.5939782", "text": "func (_DayLimit *DayLimitCallerSession) LastDay() (*big.Int, error) {\n\treturn _DayLimit.Contract.LastDay(&_DayLimit.CallOpts)\n}", "title": "" }, { "docid": "9828604613912a4d3d7147434ab57f42", "score": "0.5935817", "text": "func (o InstanceDenyMaintenancePeriodEndDateOutput) Month() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v InstanceDenyMaintenancePeriodEndDate) *int { return v.Month }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "e5f523e2029766159cc4fd87dd82e2de", "score": "0.5916651", "text": "func (t Time) LastDay() Time {\n\tvar twentyFour time.Duration = 24\n\tday := twentyFour * time.Hour\n\n\treturn t.SetDate(1).AddDate(0, 1, 0).Add(-day - time.Nanosecond)\n}", "title": "" }, { "docid": "2cf3b66b397a6ee7fe1adae7d84e30b4", "score": "0.5840548", "text": "func (o TransferJobScheduleScheduleEndDatePtrOutput) Month() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *TransferJobScheduleScheduleEndDate) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Month\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "c062a3c1c14ec0d8df449181c7d0f7cf", "score": "0.5819112", "text": "func (o TransferJobScheduleScheduleEndDateOutput) Month() pulumi.IntOutput {\n\treturn o.ApplyT(func(v TransferJobScheduleScheduleEndDate) int { return v.Month }).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "f4bd0d46fb69e770f3fa6a4cc64b00a6", "score": "0.58125633", "text": "func (m *RecurrencePattern) GetDayOfMonth()(*int32) {\n return m.dayOfMonth\n}", "title": "" }, { "docid": "ff3e420166095a8411b44ed0641a492a", "score": "0.5802217", "text": "func (o InstanceDenyMaintenancePeriodEndDatePtrOutput) Month() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *InstanceDenyMaintenancePeriodEndDate) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Month\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "69466d6df1e8712140b796c71aeab209", "score": "0.56548345", "text": "func (c *Client) GetLastDateWithMonthlyInfo() (int, int, error) {\n\tmonth, year, err := c.Db.GetLastDateWithMonthlyInfo()\n\tif err != nil {\n\t\treturn 0, 0, fmt.Errorf(\"GetLastDateWithMonthlyInfo() error: %q\", err)\n\t}\n\treturn month, year, nil\n}", "title": "" }, { "docid": "83c0ba60493977b20de5538913131cf4", "score": "0.55733204", "text": "func (o RefreshScheduleMapScheduleFrequencyPropertiesRefreshOnDayPropertiesOutput) DayOfMonth() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RefreshScheduleMapScheduleFrequencyPropertiesRefreshOnDayProperties) *string {\n\t\treturn v.DayOfMonth\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0ad2c5403a9a017b48e1c201a4ba54ad", "score": "0.55641955", "text": "func (o RefreshScheduleMapScheduleFrequencyPropertiesRefreshOnDayPropertiesPtrOutput) DayOfMonth() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RefreshScheduleMapScheduleFrequencyPropertiesRefreshOnDayProperties) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.DayOfMonth\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3672967b3935535eee36603269f67366", "score": "0.55553424", "text": "func changeMonth(date time.Time, numMonths float64, returnLastMonth bool) time.Time {\n\toffsetDay := 0\n\tif returnLastMonth && date.Day() == getDaysInMonth(date.Year(), int(date.Month())) {\n\t\toffsetDay--\n\t}\n\tnewDate := date.AddDate(0, int(numMonths), offsetDay)\n\tif returnLastMonth {\n\t\tlastDay := getDaysInMonth(newDate.Year(), int(newDate.Month()))\n\t\treturn timeFromExcelTime(daysBetween(excelMinTime1900.Unix(), makeDate(newDate.Year(), newDate.Month(), lastDay))+1, false)\n\t}\n\treturn newDate\n}", "title": "" }, { "docid": "8fcfc277758a0b31c1615952e1b661e4", "score": "0.5526855", "text": "func (o InstanceDenyMaintenancePeriodOutput) EndDate() InstanceDenyMaintenancePeriodEndDateOutput {\n\treturn o.ApplyT(func(v InstanceDenyMaintenancePeriod) InstanceDenyMaintenancePeriodEndDate { return v.EndDate }).(InstanceDenyMaintenancePeriodEndDateOutput)\n}", "title": "" }, { "docid": "58bc4b2d0573fe524a4afb03bfc78a97", "score": "0.5521389", "text": "func LastSunday(t time.Time) time.Time {\n\treturn Sunday(t).AddDate(0, 0, -7)\n}", "title": "" }, { "docid": "57727638a40bc2dfaec3df2ee8605a1a", "score": "0.5493239", "text": "func (dao *Dao) GetTermEnd() time.Time {\n\n\tyear, month, _ := time.Now().Date()\n\tthisMonth := time.Date(year, month, 1, 0, 0, 0, 0, time.Local)\n\tsecond, _ := time.ParseDuration(\"-1s\")\n\treturn thisMonth.Add(second)\n}", "title": "" }, { "docid": "d4b1de539b5b8f134f34c70927893ee1", "score": "0.54336613", "text": "func (o *ViewProjectMinMaxAvailableDates) GetMaxEndDate() string {\n\tif o == nil || o.MaxEndDate == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.MaxEndDate\n}", "title": "" }, { "docid": "cd92cbe140b86b7817ad36c702bc46fb", "score": "0.531552", "text": "func (o *MaintenanceWindowRecurrence) GetDayOfMonth() int32 {\n\tif o == nil || o.DayOfMonth == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.DayOfMonth\n}", "title": "" }, { "docid": "e4dd73db3ab61c9c4dde4bdf2758f6e9", "score": "0.5281554", "text": "func LastTuesday(t time.Time) time.Time {\n\treturn Tuesday(t).AddDate(0, 0, -7)\n}", "title": "" }, { "docid": "08297c702bdec82aa53a9c715145075f", "score": "0.527675", "text": "func (o InstanceDenyMaintenancePeriodPtrOutput) EndDate() InstanceDenyMaintenancePeriodEndDatePtrOutput {\n\treturn o.ApplyT(func(v *InstanceDenyMaintenancePeriod) *InstanceDenyMaintenancePeriodEndDate {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.EndDate\n\t}).(InstanceDenyMaintenancePeriodEndDatePtrOutput)\n}", "title": "" }, { "docid": "411d6dd4a7c1591ba15922352ad9fcaa", "score": "0.5261652", "text": "func (m *RecurrencePattern) GetMonth()(*int32) {\n return m.month\n}", "title": "" }, { "docid": "0612e8f600bfffd65bcc1964ef4ad208", "score": "0.52604514", "text": "func GetFirstDayOfThisMonth() string {\n\t_, _, day := time.Now().Date()\n\tday = day - 1\n\treturn time.Now().AddDate(0, 0, -day).Format(constvar.FormatDate)\n}", "title": "" }, { "docid": "5d219b2b6e976ac0ab068225f8a7d18c", "score": "0.52542233", "text": "func LastMonday(t time.Time) time.Time {\n\treturn Monday(t).AddDate(0, 0, -7)\n}", "title": "" }, { "docid": "185fa15f2ff6efe77766d2e11792953d", "score": "0.5252186", "text": "func LastDayWeek(lastDay time.Time) time.Time {\n\tif lastDay.Weekday() != time.Sunday {\n\t\tfor lastDay.Weekday() != time.Sunday {\n\t\t\tlastDay = lastDay.AddDate(0, 0, +1)\n\t\t}\n\t\treturn lastDay\n\t}\n\treturn lastDay\n}", "title": "" }, { "docid": "a69e75fd3b13c4e00148bd7df5fe3203", "score": "0.5247992", "text": "func (s *HayaokiSheet) GetLastDate() (*time.Time, error) {\n\tret, err := s.Sheets.Values.Get(SpreadSheetID, \"hayaoki!A2\").Do()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdateStr := \"\"\n\tif len(ret.Values) > 0 {\n\t\tif len(ret.Values[0]) > 0 {\n\t\t\tdateStr = ret.Values[0][0].(string)\n\t\t}\n\t}\n\tif dateStr == \"\" {\n\t\treturn nil, errors.New(\"Read cell error\")\n\t}\n\tdate, err := time.Parse(\"2006/1/2\", dateStr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &date, nil\n}", "title": "" }, { "docid": "fc2f429d80fc4b4cf788609053a5ce6e", "score": "0.52330744", "text": "func GetEndOfDay(t time.Time) time.Time {\n\ty, m, d := t.Date()\n\ttimeBOD := time.Date(y, m, d, 23, 59, 59, 999999999, t.Location())\n\treturn timeBOD\n}", "title": "" }, { "docid": "f9a323734e9d8b8cbe5428efecd3799d", "score": "0.52201515", "text": "func DayEnd(t time.Time) time.Time {\n\ty, m, d := t.Date()\n\treturn time.Date(y, m, d, 23, 59, 59, int(time.Second-time.Nanosecond), t.Location())\n}", "title": "" }, { "docid": "6ef03ba55e0422a080d8c8896f938602", "score": "0.5182134", "text": "func (m *sdt) MonthDay() int32 {\n\treturn m.monthDayField\n}", "title": "" }, { "docid": "4ec942365693bd784320c311e0e2aae8", "score": "0.5146101", "text": "func (dt *DateTime) GetMonth() *Number {\n\treturn dt.Month()\n}", "title": "" }, { "docid": "4a45aa4badd519a19459a1a481d1ce54", "score": "0.51237804", "text": "func (m *RecurrenceRange) GetEndDate()(*i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.DateOnly) {\n val, err := m.GetBackingStore().Get(\"endDate\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.DateOnly)\n }\n return nil\n}", "title": "" }, { "docid": "4382a4da65fc2a5d8bcdb3265a0f6002", "score": "0.51143056", "text": "func monthTrunc(t time.Time) time.Time {\n\tt, _ = timeTrunc(t, \"day\")\n\treturn t.AddDate(0, 0, 1-t.Day())\n}", "title": "" }, { "docid": "fd45dc4dbb427bc116b2b33e7a5f4181", "score": "0.5077203", "text": "func (m *DateDrivenRolloutSettings) GetEndDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"endDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "5883820f131a591a231e636da046d589", "score": "0.5069954", "text": "func (ln *localen) MonthNarrow(month time.Month) string {\n\treturn ln.monthsNarrow[month]\n}", "title": "" }, { "docid": "d74813049809a7b58a5f6b5e4fa3c076", "score": "0.5069491", "text": "func (o ApplicationPasswordOutput) EndDate() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ApplicationPassword) pulumi.StringOutput { return v.EndDate }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "7a6a078057b3edd7cc93330531833279", "score": "0.5044485", "text": "func (dt DateTime) CeilMonth() DateTime {\n\ttempDateTime := dt.Copy()\n\ttempDateTime = tempDateTime.ShiftMonths(1)\n\ttempDateTime = tempDateTime.ReplaceDay(1)\n\ttempDateTime = tempDateTime.ShiftDays(-1)\n\treturn dt.Replace(dt.Year(), dt.Month(), tempDateTime.Day(), 23, 59, 59, 999999999)\n}", "title": "" }, { "docid": "a7ac3b9f728fb4578a72ff7c749dfe50", "score": "0.5024362", "text": "func (m *ManagementTemplateStepTenantSummary) GetLastActionDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"lastActionDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "409cd5fb876359c24eb2f443e3582084", "score": "0.49951008", "text": "func MonthtoDay(month float32) float32 {\n\treturn month * 730.001\n}", "title": "" }, { "docid": "661cd28c03bfb92dd8fdc6757acdd459", "score": "0.49906477", "text": "func funcDayOfMonth(vals []parser.Value, args parser.Expressions, enh *EvalNodeHelper) Vector {\n\treturn dateWrapper(vals, enh, func(t time.Time) float64 {\n\t\treturn float64(t.Day())\n\t})\n}", "title": "" }, { "docid": "97d51a178abf924de917ad34c6d3a025", "score": "0.4947766", "text": "func (o *MaintenanceWindowRecurrence) GetDayOfMonthOk() (*int32, bool) {\n\tif o == nil || o.DayOfMonth == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DayOfMonth, true\n}", "title": "" }, { "docid": "47cb67622a9c9a57d151a417a96bbd5a", "score": "0.494747", "text": "func EndDate() time.Time {\n\treturn viper.GetTime(\"end_date\")\n}", "title": "" }, { "docid": "a9c3b5d3d4e65ea619dc36a995fbcda1", "score": "0.49217185", "text": "func (m *WindowsMalwareCategoryCount) GetLastUpdateDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"lastUpdateDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "fe7bb43fb4f6c065d91db71f6aad564a", "score": "0.4916189", "text": "func (o *ViewProjectBudget) GetEndDateTime() string {\n\tif o == nil || o.EndDateTime == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.EndDateTime\n}", "title": "" }, { "docid": "ede18239855f724c4e35d134619a5e9d", "score": "0.49145228", "text": "func (o InstanceDenyMaintenancePeriodStartDatePtrOutput) Month() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *InstanceDenyMaintenancePeriodStartDate) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Month\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "67f7d84b0eae62f91eede5d3c33cf7fb", "score": "0.4904127", "text": "func LastWednesday(t time.Time) time.Time {\n\treturn Wednesday(t).AddDate(0, 0, -7)\n}", "title": "" }, { "docid": "64e99ff965c3d4076679db3f3cfb2c6c", "score": "0.49025893", "text": "func GetStartOfMonthNext(t time.Time) time.Time {\n\t//find the start of the specified month\n\ttimeBOM := GetStartOfMonth(t)\n\n\t//adjust to next month\n\tnextBOM := timeBOM.AddDate(0, 1, 0)\n\treturn nextBOM\n}", "title": "" }, { "docid": "d41f44c0daf60ece1ef4a6f959abe53c", "score": "0.48899204", "text": "func (o InstanceDenyMaintenancePeriodStartDateOutput) Month() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v InstanceDenyMaintenancePeriodStartDate) *int { return v.Month }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "6b83f03fa6bff9399d12dc3bd690d7a0", "score": "0.48668358", "text": "func (m *SimulationAutomationRun) GetEndDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"endDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "b9d0b2228b6608889823153f7d7c48af", "score": "0.48329437", "text": "func (m *ManagementTemplateStep) GetLastActionDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"lastActionDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "cb05245500c0b5fcb244c8ebe1bf885a", "score": "0.4811567", "text": "func (et ExfatTimestamp) Month() int {\n\treturn int(et&31457280) >> 21\n}", "title": "" }, { "docid": "ed5afa8afff1a5a7790258e04f91373d", "score": "0.48011485", "text": "func amendMonth(dayOrDate *string, month string) {\n\tif month != CurrentMonth {\n\t\tif isValid, monthNum, response := checkMonth(month); !isValid {\n\t\t\tCheckError(\"`-m` flag error\", errors.New(response))\n\t\t} else {\n\t\t\tif strings.Contains(*dayOrDate, \"-\") {\n\t\t\t\tupdateDFlagSection(dayOrDate, 0, monthNum)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0af96c3413f4bbb992d3d7267c676554", "score": "0.47917607", "text": "func TillNextMonth() time.Duration {\n\treturn Now().TillNextMonth()\n}", "title": "" }, { "docid": "6ab57e0133912c06975f3fc4613b03f6", "score": "0.47885916", "text": "func NextMonth() ([]Date, error) {\n\taccessID := os.Getenv(clientID)\n\tsecretKey := os.Getenv(clientSecret)\n\tif accessID == \"\" || secretKey == \"\" {\n\t\treturn nil, fmt.Errorf(\"invalid accessID or secretkey value\")\n\t}\n\turl := fmt.Sprintf(\"http://api.aerisapi.com/sunmoon/minsk,belarusmn?from=now&to=1month&limit=31&client_id=%s&client_secret=%s\",\n\t\taccessID, secretKey)\n\tvar moonPhase sunMoonResponse\n\terr := getJSON(url, &moonPhase)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot get API server: %v\", err)\n\t}\n\tif !moonPhase.Success {\n\t\treturn nil, fmt.Errorf(\"cannot succeed with API response: %v\", moonPhase.Err)\n\t}\n\tfilteredDate := Filter(moonPhase.Resp)\n\tnextEkadashi := shiftEkadashi(filteredDate)\n\treturn nextEkadashi, nil\n}", "title": "" }, { "docid": "a99ef7e63d0490df7b76a3af903dd141", "score": "0.47828734", "text": "func (o *ViewMilestone) GetLastChangedOn() string {\n\tif o == nil || o.LastChangedOn == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.LastChangedOn\n}", "title": "" }, { "docid": "42ce0465cd9d921a8b81d1b581de2f7a", "score": "0.4780353", "text": "func (se SumEntry) Month() int {\n\treturn int(se.Month())\n}", "title": "" }, { "docid": "3791394c55512bca0456b62a30b36e95", "score": "0.4778983", "text": "func (m *DeviceHealthScriptRunSummary) GetLastScriptRunDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"lastScriptRunDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "d3d8b034b6ebf0de8f92566d0f172a1c", "score": "0.47739148", "text": "func (dt DateTime) Month() int {\n\treturn int(dt.Time().Month())\n}", "title": "" }, { "docid": "f64ea2d0b8d8e6648fe8189c4e902d11", "score": "0.4756471", "text": "func (o LookupApplicationResultOutput) ApplicationLastUpdateDate() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v LookupApplicationResult) *int { return v.ApplicationLastUpdateDate }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "c99135bda21ea862130f56cdab70aa05", "score": "0.4756269", "text": "func lastSecond(t time.Time, lsw bool) int {\n\tif !lsw {\n\t\treturn 59\n\t}\n\tif t.Hour() != 23 || t.Minute() != 59 {\n\t\treturn 59\n\t}\n\tif t.Day() != lastDayInMonth(t.Year(), t.Month()) {\n\t\treturn 59\n\t}\n\treturn 60\n}", "title": "" }, { "docid": "a2cba19245a3e8c78138a3be7c8fed2a", "score": "0.47490406", "text": "func (l *Log) LastTerm() uint64 {\n\tt, err := l.Term(l.LastIndex())\n\tif err != nil {\n\t\tpanicf(\"unexpected error when getting the last term (%v)\", err)\n\t}\n\treturn t\n}", "title": "" }, { "docid": "69d7ba59a101854f80946bdbd1987b3f", "score": "0.47462723", "text": "func LastSaturday(t time.Time) time.Time {\n\treturn Saturday(t).AddDate(0, 0, -7)\n}", "title": "" }, { "docid": "34d5f304ccacfe202057ddb66eb289a4", "score": "0.47297317", "text": "func (my *AttunedMonth) Month() time.Month {\n\treturn time.Month(my.mon)\n}", "title": "" }, { "docid": "794fc4c9a3eaeb26ccf958fd7e0db55c", "score": "0.4728291", "text": "func (r *raftLog) LastIndex() (uint64, error) {\n\treturn r.getIndex(false)\n}", "title": "" }, { "docid": "23155555ead8cbe95126afa6bd16ef74", "score": "0.47190472", "text": "func (date Nakamura) Month() string {\n\treturn Month(date.date, date.format)\n}", "title": "" }, { "docid": "fb75f43e9c49330e18880c9d7f2b0f9e", "score": "0.47177452", "text": "func (o TransferJobScheduleScheduleStartDatePtrOutput) Month() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *TransferJobScheduleScheduleStartDate) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Month\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "b62801f6a99b49bad3f3bf320c4e4aef", "score": "0.4704246", "text": "func (dt DateTime) Month() time.Month {\n\treturn dt.src.Month()\n}", "title": "" }, { "docid": "1ed1efa91cb4d72f2a40d9b41580449d", "score": "0.46826228", "text": "func GetStartOfMonth(t time.Time) time.Time {\n\ttimeBOM := time.Date(t.Year(), t.Month(), 1, 0, 0, 0, 0, t.Location())\n\treturn timeBOM\n}", "title": "" }, { "docid": "8c876b30f8ab625932dfbc09fa9bd67b", "score": "0.4681982", "text": "func GetStartOfMonthPrev(t time.Time) time.Time {\n\t//find the start of the specified month\n\ttimeBOM := GetStartOfMonth(t)\n\n\t//adjust to previous month\n\tprevBOM := timeBOM.AddDate(0, -1, 0)\n\treturn prevBOM\n}", "title": "" }, { "docid": "00600decf9c86ad008be80fd779567c4", "score": "0.46749374", "text": "func (m *DeviceLocalCredentialInfo) GetLastBackupDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"lastBackupDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "b2a0416a4f1cfedcfc4d15400d15dae6", "score": "0.4667273", "text": "func LastFriday(t time.Time) time.Time {\n\treturn Friday(t).AddDate(0, 0, -7)\n}", "title": "" }, { "docid": "e1a380fad4f4a16793533b70ca1e68e5", "score": "0.4665753", "text": "func (m *TelecomExpenseManagementPartner) GetLastConnectionDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"lastConnectionDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "dd201c12bc2341c42aa2275b4a68cd62", "score": "0.46607217", "text": "func (o *InlineResponse200115) GetLastCommentDate() string {\n\tif o == nil || o.LastCommentDate == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.LastCommentDate\n}", "title": "" }, { "docid": "a84e73f1c212ad54eb8eb1b9afa8d9d5", "score": "0.46579874", "text": "func (o *AccessKey) GetLastModificationDate() string {\n\tif o == nil || o.LastModificationDate == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.LastModificationDate\n}", "title": "" }, { "docid": "4c4a1dbd553411fb4d149358caac7b9d", "score": "0.46570438", "text": "func (s UserSet) LastUpdate() dates.DateTime {\n\tres, _ := s.RecordCollection.Get(models.NewFieldName(\"LastUpdate\", \"__last_update\")).(dates.DateTime)\n\treturn res\n}", "title": "" }, { "docid": "ac07964924afc7ea7ba9574ca4abf7c8", "score": "0.4651814", "text": "func (m *LongRunningOperation) GetLastActionDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"lastActionDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "8d556a6d206ed66d05516ac2acf6abde", "score": "0.46337098", "text": "func (v *Version) LastName() string {\n\tif len(v.Names) == 0 {\n\t\treturn \"\"\n\t}\n\treturn v.Names[len(v.Names)-1]\n}", "title": "" }, { "docid": "9ac30fb24235255bb2f05274f99fb493", "score": "0.46336773", "text": "func (m *MacOSSoftwareUpdateStateSummary) GetLastUpdatedDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"lastUpdatedDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "8ca412fc7778f62451698bc69dec2e16", "score": "0.46283197", "text": "func (o TransferJobScheduleScheduleStartDateOutput) Month() pulumi.IntOutput {\n\treturn o.ApplyT(func(v TransferJobScheduleScheduleStartDate) int { return v.Month }).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "340f8fb0feb8a7ba7fb86ae088a09bfc", "score": "0.46203518", "text": "func GetEndOfNatureWeek(timeStamp int64) (t time.Time) {\n\tdate := time.Unix(timeStamp, 0)\n\tend := time.Date(date.Year(), date.Month(), date.Day(), 23, 59, 59, 999999999, time.UTC)\n\tfor end.Weekday() != time.Sunday { // iterate to Sundy\n\t\tend = end.AddDate(0, 0, 1)\n\t}\n\treturn end\n}", "title": "" }, { "docid": "d73eae72441d3b04b337899a4598d0e4", "score": "0.46192458", "text": "func (m *sdt) EndDateTime() int64 {\n\treturn m.endDateTimeField\n}", "title": "" }, { "docid": "ff5fdfd4f73304e0bc8c0ff65e4f37e8", "score": "0.46163586", "text": "func (master *MasterIndex) LastIndex() Index {\n\treturn master.indexCache[len(master.indexCache)-1]\n}", "title": "" }, { "docid": "d02f2262cec08a215d6274be6a09ae1f", "score": "0.46151933", "text": "func (d UserData) LastUpdate() dates.DateTime {\n\tval := d.ModelData.Get(models.NewFieldName(\"LastUpdate\", \"__last_update\"))\n\tif !d.Has(models.NewFieldName(\"LastUpdate\", \"__last_update\")) {\n\t\treturn *new(dates.DateTime)\n\t}\n\treturn val.(dates.DateTime)\n}", "title": "" }, { "docid": "a4a8ba21f1009c7ecf7da4a3375a1f17", "score": "0.46051794", "text": "func (schedule EomSchedule) Next(t time.Time) time.Time {\n\tmonth := t.Month()\n\tyear := t.Year()\n\tcurrentMonthEndDay := fetchMonthEndDay(month, year)\n\n\tif t.Day() >= currentMonthEndDay {\n\t\tif month == time.December {\n\t\t\treturn time.Date(year+1, time.January, fetchMonthEndDay(month, year), 0, 0, 0, 0, schedule.Location)\n\t\t}\n\n\t\tnextMonth := t.Month() + 1\n\t\tday := fetchMonthEndDay(nextMonth, year)\n\n\t\treturn time.Date(year, nextMonth, day, 0, 0, 0, 0, schedule.Location)\n\t}\n\n\treturn time.Date(year, t.Month(), currentMonthEndDay, 0, 0, 0, 0, schedule.Location)\n}", "title": "" }, { "docid": "550599e4402de2fb5d757ad39321c064", "score": "0.46002373", "text": "func (m *sdt) WeekOfMonth() string {\n\treturn m.weekOfMonthField\n}", "title": "" }, { "docid": "70d91ea5e1f95951f87feb134180ea44", "score": "0.4599178", "text": "func getDayOnBasis(y, m, d, basis int) int {\n\tif !is30BasisMethod(basis) {\n\t\treturn d\n\t}\n\tday := d\n\tdim := getDaysInMonth(y, m)\n\tif day > 30 || d >= dim || day >= dim {\n\t\tday = 30\n\t}\n\treturn day\n}", "title": "" }, { "docid": "f9ab3c70613fd4a9ef5b79f7a702ada0", "score": "0.45922357", "text": "func (m *SequentialActivationRenewalsAlertIncident) GetSequenceEndDateTime()(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time) {\n val, err := m.GetBackingStore().Get(\"sequenceEndDateTime\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)\n }\n return nil\n}", "title": "" }, { "docid": "071410e7bb09614ab4cfa755973b65a0", "score": "0.45891324", "text": "func (dt DateTime) FloorMonth() DateTime {\n\treturn dt.Replace(dt.Year(), dt.Month(), 1, 0, 0, 0, 0)\n}", "title": "" }, { "docid": "8ed4b659f393cf89600cab845ed2d9ba", "score": "0.45832142", "text": "func (o InstanceDenyMaintenancePeriodEndDateOutput) Day() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v InstanceDenyMaintenancePeriodEndDate) *int { return v.Day }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "623c8dc8c7d9e18bdb441a81932ebada", "score": "0.45790565", "text": "func (fn *formulaFuncs) MONTH(argsList *list.List) formulaArg {\n\tif argsList.Len() != 1 {\n\t\treturn newErrorFormulaArg(formulaErrorVALUE, \"MONTH requires exactly 1 argument\")\n\t}\n\targ := argsList.Front().Value.(formulaArg)\n\tnum := arg.ToNumber()\n\tif num.Type != ArgNumber {\n\t\tdateString := strings.ToLower(arg.Value())\n\t\tif !isDateOnlyFmt(dateString) {\n\t\t\tif _, _, _, _, _, err := strToTime(dateString); err.Type == ArgError {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\t_, month, _, _, err := strToDate(dateString)\n\t\tif err.Type == ArgError {\n\t\t\treturn err\n\t\t}\n\t\treturn newNumberFormulaArg(float64(month))\n\t}\n\tif num.Number < 0 {\n\t\treturn newErrorFormulaArg(formulaErrorNUM, \"MONTH only accepts positive argument\")\n\t}\n\treturn newNumberFormulaArg(float64(timeFromExcelTime(num.Number, false).Month()))\n}", "title": "" }, { "docid": "fe164ea94bc398917a23c73f2b532da7", "score": "0.4572908", "text": "func Month() int {\n\tt_start, _ := time.Parse(layout, app_start)\n\tt_now, _ := time.Parse(layout, time.Now().Format(layout))\n\ti := 0\n\tfor {\n\t\ti += 1\n\t\tif t_start.AddDate(0, i, 0).After(t_now) {\n\t\t\treturn i\n\t\t}\n\t}\n\treturn 0\n}", "title": "" } ]
fbe97c8ba91c9fc21b3672cfaceb4cfe
=============================================== readOpenTrade read a readOpenTrade from chaincode state ===============================================
[ { "docid": "b25bb0d78f9c062e3b447b62b799ebe1", "score": "0.827495", "text": "func (t *SimpleChaincode) readOpenTrade(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar jsonResp string\n\n\tvalAsbytes, err := stub.GetState(openTradesStr) //get the openTrades from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + openTradesStr + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t} else if valAsbytes == nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Marble does not exist: \" + openTradesStr + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\t\n\tvar trades AllOpenTrades\n\tjson.Unmarshal(valAsbytes, &trades)\n\tfmt.Println(trades)\n\treturn shim.Success(valAsbytes)\n}", "title": "" } ]
[ { "docid": "72712e841c8a6ad8e04b793b69786492", "score": "0.6125645", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "72712e841c8a6ad8e04b793b69786492", "score": "0.6125645", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "c3552ef5654624b2c950eec0c4862deb", "score": "0.6101609", "text": "func read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\r\n\tvar key, jsonResp string\r\n\tvar err error\r\n\tfmt.Println(\"starting read\")\r\n\r\n\tif len(args) != 1 {\r\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting key of the var to query\")\r\n\t}\r\n\r\n\tkey = args[0]\r\n\tvalAsbytes, err := stub.GetState(key) //get the var from ledger\r\n\tif err != nil {\r\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\r\n\t\treturn nil, errors.New(jsonResp)\r\n\t}\r\n\r\n\tfmt.Println(\"- end read\")\r\n\treturn valAsbytes, nil\r\n}", "title": "" }, { "docid": "62710b9cec757d27acfe4cc3c5570b5d", "score": "0.60394746", "text": "func read(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar key, jsonResp string\n\tvar err error\n\tfmt.Println(\"starting read\")\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting key of the var to query\")\n\t}\n\n\t// input sanitation\n\terr = sanitize_arguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key) //get the var from ledger\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\n\tfmt.Println(\"- end read\")\n\treturn shim.Success(valAsbytes) //send it onward\n}", "title": "" }, { "docid": "5f8eb9add960300bb43a3a94278bd4aa", "score": "0.6035804", "text": "func read(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar key, jsonResp string\n\tvar err error\n\tfmt.Println(\"starting read\")\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting key of the var to query\")\n\t}\n\n\t// input sanitation\n\terr = sanitizeArguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key) //get the var from ledger\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\n\tfmt.Println(\"- end read\")\n\treturn shim.Success(valAsbytes) //send it onward\n}", "title": "" }, { "docid": "57fc6a1019f1c9a38cdb6c06df1624c9", "score": "0.59153134", "text": "func (t *EnergyChainCode) read(stub shim.ChaincodeStubInterface, args []string) peer.Response {\r\n\r\n\tif len(args) != 1 {\r\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting id of the account to query\")\r\n\t}\r\n\r\n\tid := args[0]\r\n\r\n\t// Read the value for the ID\r\n\tif value, err := stub.GetState(id); err != nil || value == nil {\r\n\t\treturn shim.Error(\"Failed to get state for: \" + id)\r\n\t} else {\r\n\t\treturn shim.Success(value)\r\n\t}\r\n}", "title": "" }, { "docid": "d5051f5ca71bd3bce4dcf5c446215f24", "score": "0.58497435", "text": "func (t *Trades) Read() (*TradeUpdate, error) {\n\tbuf := bytebufferpool.Get()\n\t_, data, err := t.conn.ReadMessage(buf.B)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tr := &TradeUpdate{}\n\terr = json.Unmarshal(data, r)\n\tbytebufferpool.Put(buf)\n\treturn r, err\n}", "title": "" }, { "docid": "571b5f8a31127403fd4f36de36b54061", "score": "0.5838197", "text": "func (t *SimpleChaincode) read(stub *shim.ChaincodeStub, args []string) ([]byte, error) {\n\tvar name, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the var to query\")\n\t}\n\n\tname = args[0]\n\tvalAsbytes, err := stub.GetState(name)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + name + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "d0d63e32fda49dd3194aeb5d08607ba2", "score": "0.5834896", "text": "func (t *DomoChaincode) Read(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar key string\n\tvar err error\n\tLogMessage(\"starting read\")\n\n\tif len(args) != 1 {\n\t\treturn ErrorPbResponse(RESP_CODE_SYSTEM_ERROR, \"Incorrect number of arguments. Expecting key of the var to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key) //get the var from ledger\n\tif err != nil {\n\t\treturn ErrorPbResponse(RESP_CODE_SYSTEM_ERROR, \"Failed to get state for \" + key + \":\" + err.Error())\n\t}\n\n\tLogMessage(\"- end read\")\n\treturn SuccessPbResponse(valAsbytes) //send it onward\n}", "title": "" }, { "docid": "865f1a36ae6b77c8d982c0b68d9bae97", "score": "0.5745071", "text": "func (t *SimpleChaincode) initOpenTrade(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\t\n\tif len(args) < 5 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 5\")\n\t}\n\t\n\tsize1, err := strconv.Atoi(args[2])\n\tsize2, err := strconv.Atoi(args[4])\n\t\n\topen := AnOpenTrade{}\n\topen.ObjectType = \"openTrade\"\n\topen.Timestamp = makeTimestamp()\n\topen.User = args[0]\n\topen.Want.Color = args[1]\n\topen.Want.Size = size1\n\topen.Willing.Color = args[3]\n\topen.Willing.Size = size2\n\n\topenTradeKey := \"openTrade\" + strconv.FormatInt(open.Timestamp, 10)\n\n\t// ==== Check if opentrade already exists ====\n\topenTradeAsBytes, err := stub.GetState(openTradeKey)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to get opentrade: \" + err.Error())\n\t} else if openTradeAsBytes != nil {\n\t\tfmt.Println(\"This opentrade already exists: \" )\n\t\treturn shim.Error(\"This opentrade already exists: \" )\n\t}\n\n\t// ==== Create AnOpenTrade object and marshal to JSON ====\n\n\topenTradeJSONasBytes, err := json.Marshal(open)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// === Save marble to state ===\n\terr = stub.PutState(openTradeKey, openTradeJSONasBytes)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t// ==== Marble saved and indexed. Return success ====\n\tfmt.Println(\"- end init openTrade: \" + strconv.FormatInt(open.Timestamp, 10))\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "99457269e2ca5b3cdfd1655385fb3750", "score": "0.5719704", "text": "func (h *Hippy) getReadTx() (tx *ReadTx) {\n\ttx, _ = h.rtxp.Get().(*ReadTx)\n\treturn\n}", "title": "" }, { "docid": "bc1761c3f4d794e39aaf05287a7f4ee7", "score": "0.5714834", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar name, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the var to query\")\n\t}\n\n\tname = args[0]\n\tvalAsbytes, err := stub.GetState(name) //get the var from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + name + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "96b7b1e75d59b82b96e373b9fc9e3333", "score": "0.5524622", "text": "func (r *LedgerChangeReader) Read() (Change, error) {\n\t// Changes within a ledger should be read in the following order:\n\t// - fee changes of all transactions,\n\t// - transaction meta changes of all transactions,\n\t// - upgrade changes.\n\t// Because a single transaction can introduce many changes we read all the\n\t// changes from a single transaction and save them in r.pending.\n\t// When Read() is called we stream pending changes first. We also call Read()\n\t// recursively after adding some changes (what will return them from r.pending)\n\t// to not duplicate the code.\n\tif r.pendingIndex < len(r.pending) {\n\t\tnext := r.pending[r.pendingIndex]\n\t\tr.pendingIndex++\n\t\tif r.pendingIndex == len(r.pending) {\n\t\t\tr.pendingIndex = 0\n\t\t\tr.pending = r.pending[:0]\n\t\t}\n\t\treturn next, nil\n\t}\n\n\tswitch r.state {\n\tcase feeChangesState, metaChangesState:\n\t\ttx, err := r.LedgerTransactionReader.Read()\n\t\tif err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\t// If done streaming fee changes rewind to stream meta changes\n\t\t\t\tif r.state == feeChangesState {\n\t\t\t\t\tr.LedgerTransactionReader.Rewind()\n\t\t\t\t}\n\t\t\t\tr.state++\n\t\t\t\treturn r.Read()\n\t\t\t}\n\t\t\treturn Change{}, err\n\t\t}\n\n\t\tswitch r.state {\n\t\tcase feeChangesState:\n\t\t\tr.pending = append(r.pending, tx.GetFeeChanges()...)\n\t\tcase metaChangesState:\n\t\t\tmetaChanges, err := tx.GetChanges()\n\t\t\tif err != nil {\n\t\t\t\treturn Change{}, err\n\t\t\t}\n\t\t\tr.pending = append(r.pending, metaChanges...)\n\t\t}\n\t\treturn r.Read()\n\tcase evictionChangesState:\n\t\t// Get contract ledgerEntry evictions\n\t\tkeys, err := r.ledgerCloseMeta.EvictedLedgerKeys()\n\t\tif err != nil {\n\t\t\treturn Change{}, err\n\t\t}\n\t\tchanges, err := GetChangesFromLedgerEntryEvictions(keys)\n\t\tif err != nil {\n\t\t\treturn Change{}, err\n\t\t}\n\t\tr.pending = append(r.pending, changes...)\n\t\tr.state++\n\t\treturn r.Read()\n\tcase upgradeChangesState:\n\t\t// Get upgrade changes\n\t\tif r.upgradeIndex < len(r.LedgerTransactionReader.ledgerCloseMeta.UpgradesProcessing()) {\n\t\t\tchanges := GetChangesFromLedgerEntryChanges(\n\t\t\t\tr.LedgerTransactionReader.ledgerCloseMeta.UpgradesProcessing()[r.upgradeIndex].Changes,\n\t\t\t)\n\t\t\tr.pending = append(r.pending, changes...)\n\t\t\tr.upgradeIndex++\n\t\t\treturn r.Read()\n\t\t}\n\t}\n\n\treturn Change{}, io.EOF\n}", "title": "" }, { "docid": "5f5a8cbd1146833b4ca06194a40462e6", "score": "0.5504768", "text": "func (t *SimpleChaincode) removeOpenTrade(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting timestamp of the open trade\")\n\t}\n\n\tfmt.Println(\"- start remove trade\")\n\ttimestamp, err := strconv.ParseInt(args[0], 10, 64)\n\tif err != nil {\n\t\treturn shim.Error(\"1st argument must be a numeric string\")\n\t}\n\n\t//get the open trade struct\n\ttradesAsBytes, err := stub.GetState(openTradesStr)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to get opentrades\")\n\t}\n\tvar trades AllOpenTrades\n\tjson.Unmarshal(tradesAsBytes, &trades)\t\t\n\n\tfor i := range trades.OpenTrades{\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t//look for the trade\n\t\t//fmt.Println(\"looking at \" + strconv.FormatInt(trades.OpenTrades[i].Timestamp, 10) + \" for \" + strconv.FormatInt(timestamp, 10))\n\t\tif trades.OpenTrades[i].Timestamp == timestamp{\n\t\t\tfmt.Println(\"found the trade\");\n\t\t\ttrades.OpenTrades = append(trades.OpenTrades[:i], trades.OpenTrades[i+1:]...)\t\t\t\t//remove this trade\n\t\t\ttradesAsBytes, _ := json.Marshal(trades)\n\t\t\terr = stub.PutState(openTradesStr, tradesAsBytes)\t\t\t\t\t\t\t\t\t\t\t\t//rewrite open orders\n\t\t\tif err != nil {\n\t\t\t\treturn shim.Error(err.Error())\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\t\n\tfmt.Println(\"- end remove trade\")\n\tfmt.Println(trades.OpenTrades)\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "1f05514778a1be3536cb8064a508ef41", "score": "0.54892445", "text": "func (t *SimpleChaincode) matchTrade2(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\t\n\t\n\t\n\tqueryString1 := fmt.Sprintf(\"{\\\"selector\\\":{\\\"docType\\\":\\\"openTrade\\\"}}\")\n\t\t\n\tqueryResults1, err := getQueryResultForQueryStringtoMap(stub, queryString1)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tfmt.Printf(\"- matchTrade2 queryResults1:\\n%s\\n\", queryResults1)\n\tfmt.Println(queryResults1)\n\t// convert the queryResults in to a slice of AnOpenTrades\n\n\tvar openTrades []AnOpenTrade\n\tfor _, value := range queryResults1 {\n\t\tinnermap, ok := value.(map[string]interface{})\n\t\tif !ok {\n\t\t\tpanic(\"inner map is not a map!\")\n\t\t}\n\t\topen := AnOpenTrade{}\n\t\topen.ObjectType = \"openTrade\"\n\t\topen.Timestamp = innermap[\"TimeStamp\"].(int64)\n\t\topen.User = innermap[\"User\"].(string)\n\t\topen.Want.Color = innermap[\"Want\"].(map[string]interface{})[\"Color\"].(string)\n\t\topen.Want.Size = innermap[\"Want\"].(map[string]interface{})[\"Size\"].(int)\n\t\topen.Willing.Color = innermap[\"Willing\"].(map[string]interface{})[\"Color\"].(string)\n\t\topen.Willing.Size = innermap[\"Willing\"].(map[string]interface{})[\"Size\"].(int)\n\t\topenTrades = append (openTrades, open )\n\t}\n\tfmt.Println(\"matchTrade2..................\")\n\tfmt.Println(openTrades)\n\n\t// var openTradesStruct AllOpenTrades\n\t// json.Unmarshal(valAsbytes, &openTradesStruct)\n\t// fmt.Println(openTradesStruct.OpenTrades)\n\t// openTrades := openTradesStruct.OpenTrades\n\tfor i := 0; i < len(openTrades); i++ {\n\t\tfor j := i + 1; j < len(openTrades); j++ {\n\t\t\tif reflect.DeepEqual(openTrades[i].Want, openTrades[j].Willing) && reflect.DeepEqual(openTrades[i].Willing, openTrades[j].Want) {\n\t\t\t\tfmt.Println(\"swapMarbles\")\n\t\t\t\t// swapMarbles\n\t\t\t\tt.swapMarble(stub, []string{openTrades[i].User, openTrades[i].Willing.Color, strconv.Itoa(openTrades[i].Willing.Size), openTrades[j].User, openTrades[j].Willing.Color, strconv.Itoa(openTrades[j].Willing.Size)})\n\t\t\t\tfmt.Println(i)\n\t\t\t\tfmt.Println(openTrades[i])\n\t\t\t\t// delete openTrades after matching orders\n\t\t\t\t// delete from hyperledger blockchain\n\t\t\t\t// t.removeOpenTrade(stub,[]string{strconv.FormatInt(openTrades[i].Timestamp, 10)})\n\t\t\t\t// t.removeOpenTrade(stub,[]string{strconv.FormatInt(openTrades[j].Timestamp, 10)})\n\t\t\t\t// fmt.Println(strconv.FormatInt(openTrades[i].Timestamp, 10))\n\n\t\t\t\t// delete from cache so that no re-matching can happen\n\t\t\t\topenTrades = append(openTrades[:j], openTrades[j+1:]...)\n\t\t\t\topenTrades = append(openTrades[:i], openTrades[i+1:]...)\n\t\t\t\tfmt.Println(openTrades)\n\t\t\t\ti-- // redo index since the orignal has been deleted\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\t// fmt.Printf(\" Saving new state of open trades to hyperledger:\")\n\t// fmt.Println(openTrades)\n\t// openTradesStruct.OpenTrades = openTrades\n\t// tradesAsBytes, _ := json.Marshal(openTradesStruct)\n\t// err = stub.PutState(openTradesStr, tradesAsBytes)\t\t\t\t\t\t\t\t\t\t\t\t//rewrite open orders\n\t// if err != nil {\n\t// \treturn shim.Error(err.Error())\n\t// }\n\n\n\treturn shim.Success(nil)\n\n}", "title": "" }, { "docid": "bb7fc5b69f27afd8680623ce4d9ce48e", "score": "0.5479169", "text": "func getQuote(side, sellToken, buyToken string, amount float64, decimals int) (Quote, error) {\n\turl := \"https://api.0x.org/swap/v1/quote?sellToken=\" + sellToken + \"&buyToken=\" + buyToken\n\tif side == \"SELL\" {\n\t\turl += \"&buyAmount=\"\n\t} else {\n\t\turl += \"&sellAmount=\"\n\t}\n\turl += convertToSolidity(amount, decimals)\n\n\tresp, err := http.Get(url)\n\tif err != nil {\n\t\treturn Quote{}, err\n\t}\n\n\tj, err := io.ReadAll(resp.Body)\n\tresp.Body.Close()\n\n\tif err != nil {\n\t\treturn Quote{}, fmt.Errorf(\"cannot ReadAll quote from Ox: %w\", err)\n\t}\n\n\tvar result Quote\n\tif err = json.Unmarshal(j, &result); err != nil {\n\t\treturn Quote{}, fmt.Errorf(\"cannot json.Unmarshal quote from Ox: %w in: %v\", err, string(j))\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "30ecf954b2b9e5ce26dab0a8bb553756", "score": "0.5471286", "text": "func (m *MarketClient) GetOldTradeLookUp(symbol string, limit int32, formID, startTime, endTime int64) (interface{}, error) {\n\tvar err error\n\tif symbol == \"\" {\n\t\terr = errors.New(SymbolEmpty)\n\t\treturn nil, err\n\t}\n\tparams := fmt.Sprintf(\"symbol=%s\", symbol)\n\tif limit > 1000 {\n\t\tlimit = 1000\n\t}\n\tif limit > 0 {\n\t\tparams += fmt.Sprintf(\"&limit=%d\", limit)\n\t}\n\tif formID > 0 {\n\t\tparams += fmt.Sprintf(\"&formId=%d\", formID)\n\t}\n\tif startTime > 0 {\n\t\tparams += fmt.Sprintf(\"&startTime=%d\", startTime)\n\t}\n\tif endTime > 0 {\n\t\tparams += fmt.Sprintf(\"&endTime=%d\", endTime)\n\t}\n\treq, err := m.Builder.Build(http.MethodGet, \"/fapi/v1/historicalTrades\", params)\n\treq.Header.Set(\"X-MBX-APIKEY\", m.AppKey)\n\tif err != nil {\n\t\tlogger.Error(\"Failed to build url: %s\", err.Error())\n\t}\n\tres, err := binance.HttpRequest(req)\n\tvar parser map[string]interface{}\n\terr = json.Unmarshal(res, &parser)\n\tif _, ok := parser[\"code\"]; ok {\n\t\tresult := model.APIErrorResponse{}\n\t\terr = json.Unmarshal(res, &result)\n\t\treturn result, err\n\t}\n\tresult := OlderTradeLookUpResponse{}\n\terr = json.Unmarshal(res, &result)\n\treturn result, err\n}", "title": "" }, { "docid": "b8b6da9392650db69469b30e083e84a1", "score": "0.5440492", "text": "func leaseTraceRead(context *Context) (data []byte, err error) {\n\n\tbuf := make([]byte, 2048)\n\tlength, err := context.leaseTraceConn.Read(buf)\n\tif err != nil {\n\t\tif err == io.EOF {\n\t\t\t// Just a read timeout\n\t\t\treturn data, nil\n\t\t}\n\t\treturn data, err\n\t}\n\n\treturn buf[:length], nil\n\n}", "title": "" }, { "docid": "7b958741e97d173e127dba4ecaf42e05", "score": "0.5437461", "text": "func (dc *DataConsumer) GetOpenTrades() *map[string][]Trade {\n\topenTrades := make(map[string][]Trade)\n\n\tfor _, coin := range *dc.Coins {\n\t\ttableName := strings.ToLower(coin) + \"_trades\"\n\t\t// I don't know how to write this query with gorm functions so here's the raw query\n\t\trawSql := \"SELECT * FROM \" + tableName + ` WHERE timestamp > (SELECT coalesce((SELECT MAX(timestamp) FROM ` + tableName + ` WHERE type_id=2), 0)) ORDER BY timestamp ASC;`\n\t\t\n\t\ttrades := []Trade{}\n\n\t\tdc.Database.Raw(rawSql).Scan(&trades)\n\t\topenTrades[coin] = trades\n\t}\n\treturn &openTrades\n}", "title": "" }, { "docid": "25e14510b2945f287b81d28ae5f0585f", "score": "0.5429942", "text": "func (t *SimpleChaincode) matchTrade(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar jsonResp string\n\tvalAsbytes, err := stub.GetState(openTradesStr) //get the marble from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + openTradesStr + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t} else if valAsbytes == nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"opentrades does not exist: \" + openTradesStr + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\t\n\tvar openTradesStruct AllOpenTrades\n\tjson.Unmarshal(valAsbytes, &openTradesStruct)\n\tfmt.Println(\"matchTrade\")\n\tfmt.Println(openTradesStruct.OpenTrades)\n\topenTrades := openTradesStruct.OpenTrades\n\tfor i := 0; i < len(openTrades); i++ {\n\t\tfor j := i + 1; j < len(openTrades); j++ {\n\t\t\tif reflect.DeepEqual(openTrades[i].Want, openTrades[j].Willing) && reflect.DeepEqual(openTrades[i].Willing, openTrades[j].Want) {\n\t\t\t\tfmt.Println(\"swapMarbles\")\n\t\t\t\t// swapMarbles\n\t\t\t\tt.swapMarble(stub, []string{openTrades[i].User, openTrades[i].Willing.Color, strconv.Itoa(openTrades[i].Willing.Size), openTrades[j].User, openTrades[j].Willing.Color, strconv.Itoa(openTrades[j].Willing.Size)})\n\t\t\t\tfmt.Println(i)\n\t\t\t\tfmt.Println(openTrades[i])\n\t\t\t\t// delete openTrades after matching orders\n\t\t\t\t// delete from hyperledger blockchain\n\t\t\t\t// t.removeOpenTrade(stub,[]string{strconv.FormatInt(openTrades[i].Timestamp, 10)})\n\t\t\t\t// t.removeOpenTrade(stub,[]string{strconv.FormatInt(openTrades[j].Timestamp, 10)})\n\t\t\t\t// fmt.Println(strconv.FormatInt(openTrades[i].Timestamp, 10))\n\n\t\t\t\t// delete from cache so that no re-matching can happen\n\t\t\t\topenTrades = append(openTrades[:j], openTrades[j+1:]...)\n\t\t\t\topenTrades = append(openTrades[:i], openTrades[i+1:]...)\n\t\t\t\tfmt.Println(openTrades)\n\t\t\t\ti-- // redo index since the orignal has been deleted\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\tfmt.Printf(\" Saving new state of open trades to hyperledger:\")\n\tfmt.Println(openTrades)\n\topenTradesStruct.OpenTrades = openTrades\n\ttradesAsBytes, _ := json.Marshal(openTradesStruct)\n\terr = stub.PutState(openTradesStr, tradesAsBytes)\t\t\t\t\t\t\t\t\t\t\t\t//rewrite open orders\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\n\treturn shim.Success(nil)\n\n}", "title": "" }, { "docid": "8471452eb19a890a966d6ab289b7e036", "score": "0.54147255", "text": "func (o *OpenTradeReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewOpenTradeOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 401:\n\t\tresult := NewOpenTradeUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 403:\n\t\tresult := NewOpenTradeForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewOpenTradeNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "title": "" }, { "docid": "0c2f39ead288bb181fb7fcd2c0f7e3fa", "score": "0.5387082", "text": "func (h HTTPApi) GetTradeStream(symbol string) (chan []byte, chan bool) {\n\tu := requestData{\n\t\tcategory: TRADEAPICategory,\n\t\taction: tradeStreamAction,\n\t\tversion: h.getVersion(),\n\t\tpathParams: symbol,\n\t}\n\toutChan, stopChan := h.runStream(u)\n\treturn outChan, stopChan\n}", "title": "" }, { "docid": "21b2a18ac51cd0c845ac8fd9ae68d4fe", "score": "0.5383181", "text": "func ReadTransaction(db xordb.Reader, hash common.Hash) (*types.Transaction, common.Hash, uint64, uint64) {\n\t// first looks for raw Tx Data.\n\trawTxData := ReadRawTxData(db, hash)\n\tif rawTxData != nil {\n\t\ttx := new(types.Transaction)\n\t\tjson.Unmarshal(rawTxData, &tx)\n\n\t\ttxdata := tx.Data\n\t\tparticipants := make([]*(ecdsa.PublicKey), len(txdata.Participants))\n\t\tpostStates := make([]*(state.Account), len(txdata.Participants))\n\t\tfor i := 0; i < len(txdata.Participants); i++ {\n\t\t\ttxdata.Participants[i] = &ecdsa.PublicKey{Curve: elliptic.P256()}\n\t\t\ttxdata.PostStates[i] = &state.Account{PublicKey: txdata.Participants[i]}\n\t\t}\n\t\ttxdata = types.Txdata{Participants: participants, PostStates: postStates}\n\t\tjson.Unmarshal(rawTxData, &tx)\n\t\treturn tx, common.Hash{}, 0, 0\n\t}\n\n\t// if none found, looks for the block that contains the tx.\n\tblockNumber := ReadTxLookupEntry(db, hash)\n\tif blockNumber == nil {\n\t\treturn nil, common.Hash{}, 0, 0\n\t}\n\tblockHash := ReadHash(db, *blockNumber)\n\tif blockHash == (common.Hash{}) {\n\t\treturn nil, common.Hash{}, 0, 0\n\t}\n\tblock := LoadBlock(db, blockHash, *blockNumber)\n\tif block == nil {\n\t\tlog.Error(\"Transaction referenced missing\", \"number\", blockNumber, \"hash\", blockHash)\n\t\treturn nil, common.Hash{}, 0, 0\n\t}\n\tfor txIndex, tx := range block.Transactions() {\n\t\tif tx.Hash == hash {\n\t\t\treturn tx, blockHash, *blockNumber, uint64(txIndex)\n\t\t}\n\t}\n\tlog.Error(\"Transaction not found\", \"number\", blockNumber, \"hash\", blockHash, \"txhash\", hash)\n\treturn nil, common.Hash{}, 0, 0\n}", "title": "" }, { "docid": "36284ea5c919d471b8a79f8c4211236c", "score": "0.5366134", "text": "func _getReader(lom *cluster.LOM) (roc cos.ReadOpenCloser, err error) {\n\tlom.Lock(false)\n\tif err = lom.Load(false /*cache it*/, true /*locked*/); err != nil {\n\t\tlom.Unlock(false)\n\t\treturn\n\t}\n\tif lom.IsCopy() {\n\t\tlom.Unlock(false)\n\t\terr = cmn.ErrSkip\n\t\treturn\n\t}\n\tif lom.Checksum() == nil {\n\t\tif _, err = lom.ComputeSetCksum(); err != nil {\n\t\t\tlom.Unlock(false)\n\t\t\treturn\n\t\t}\n\t}\n\treturn lom.NewDeferROC()\n}", "title": "" }, { "docid": "b2de8d002694c1c2d574e96a3169a38d", "score": "0.5353422", "text": "func (rc *ResourcesContract) Read(ctx contractapi.TransactionContextInterface, key string) (string, error) {\n\texisting, err := ctx.GetStub().GetState(key)\n\n\tif err != nil {\n\t\treturn \"\", errors.New(\"Unable to interact with world state\")\n\t}\n\n\tif existing == nil {\n\t\treturn \"\", fmt.Errorf(\"Cannot read world state pair with key %s. Does not exist\", key)\n\t}\n\n\treturn string(existing), nil\n}", "title": "" }, { "docid": "6ef9c7581f1fba99186cc44ee9e44899", "score": "0.5314699", "text": "func (t *AggTrades) Read() (*AggTradeUpdate, error) {\n\tbuf := bytebufferpool.Get()\n\t_, data, err := t.conn.ReadMessage(buf.B)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tr := &AggTradeUpdate{}\n\terr = json.Unmarshal(data, r)\n\tbytebufferpool.Put(buf)\n\treturn r, err\n}", "title": "" }, { "docid": "8b966dbc84320f7f13ed8ce512411ee6", "score": "0.52881366", "text": "func (_Multishot *MultishotCallerSession) Read(txOrigin common.Address, nonce *big.Int) (*big.Int, error) {\n\treturn _Multishot.Contract.Read(&_Multishot.CallOpts, txOrigin, nonce)\n}", "title": "" }, { "docid": "0541d3b9608469b8d5852c77d4ca1b09", "score": "0.52718556", "text": "func (s *SmartContract) Get(ctx contractapi.TransactionContextInterface, key string) (string, error) {\n\tvalue, err := ctx.GetStub().GetState(key)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to get state from ledger: %w\", err)\n\t}\n\n\treturn string(value), nil\n}", "title": "" }, { "docid": "5d12a8790d582146c4492d5cd4a3ad1d", "score": "0.5235789", "text": "func (s *ShareEngine) RetrieveTradeDetails(args *GainLossRequest, reply *GainLossResponce) error{\n\tisFound:=false\n\tfmt.Print(\"Count of trades: \")\n\tfmt.Println(len(oldTradeList.tradeDetails))\n\tfor l:=0;l<len(oldTradeList.tradeDetails);l++{\n\t\t\n\t\tvar trade *ReplyForBoughtStocks\n\t\ttrade = oldTradeList.tradeDetails[l]\n\t\t\n\t\tif(trade.TradeId==args.TradeId){\n\t\t\tisFound=true\n\t\t\treply.CurrentMarketValue = 0.0\n\t\t\tfor i:=0; i< len(trade.StocksList); i++{\t\n\t\t\t\tresp, err := http.Get(\"http://finance.yahoo.com/webservice/v1/symbols/\"+trade.StocksList[i]+\"/quote?format=json\")\n\t\t\t\tif err != nil {\n\t\t\t\t\t// handle error\n\t\t\t\t\tfmt.Println(\"Error\")\n\t\t\t\t}\n\t\t\t\tdefer resp.Body.Close()\n\t\t\t\t\n\t\t\t\tbody, _ := ioutil.ReadAll(resp.Body)\n\t\t\t\t\n\t\t\t\tvar msg Response\n\t\t\t\t_ = json.Unmarshal(body, &msg)\n\t\t\t\t\n\t\t\t\treply.StocksList=append(reply.StocksList,msg.List.Resources[0].Resource.Fields.Symbol)\n\t\t\t\t\n\t\t\t\t\n\t\t\t\tstkPrice,_:= strconv.ParseFloat(msg.List.Resources[0].Resource.Fields.Price,64)\n\t\t\t\treply.StocksPrice=append(reply.StocksPrice,float32(stkPrice))\n\t\t\t\t\n\t\t\t\tif(float32(stkPrice) == trade.StocksPrice[i]){\n\t\t\t\t\treply.StocksGainLoss=append(reply.StocksGainLoss,\"\") \n\t\t\t\t}else if(float32(stkPrice)<trade.StocksPrice[i]){\n\t\t\t\t\treply.StocksGainLoss=append(reply.StocksGainLoss,\"-\") \n\t\t\t\t}else{\n\t\t\t\t\treply.StocksGainLoss=append(reply.StocksGainLoss,\"+\") \n\t\t\t\t}\n\t\t\t\treply.Count=append(reply.Count,trade.Count[i])\n\t\t\t\t\n\t\t\t\treply.CurrentMarketValue= reply.CurrentMarketValue + float32(reply.Count[i]) *reply.StocksPrice[i]\n\t\t\t}\n\t\t\treply.UnvestedAmount= trade.UnvestedAmount\n\t\t}\n\t}\n\tif(isFound==false){\n\t\tvar emptyReply *GainLossResponce\n\t\treply = emptyReply\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "145c09d4b9990e3fe49ea8b6f259943a", "score": "0.52156866", "text": "func (t *CrowdFundChaincode) Query(stub shim.ChaincodeStubInterface, function string, args []string) ([]byte, error) {\n if function != \"query\" {\n return nil, errors.New(\"Invalid query function name. Expecting \\\"query\\\".\")\n }\n\n // State variable \"account\"\n var account string\n // Any error to be reported back to the client\n var err error\n\n if len(args) != 1 {\n return nil, errors.New(\"Incorrect number of arguments. Expecting name of the state variable to query.\")\n }\n\n // Read in the name of the state variable to be returned\n account = args[0]\n information:=Info{}\n // Get the current value of the state variable\n accountValueBytes, err := stub.GetState(account)\n if err != nil {\n jsonResp := \"{\\\"Error\\\":\\\"Failed to get state for \" + account + \"\\\"}\"\n \t\t return nil, errors.New(jsonResp)\n }\n if accountValueBytes == nil {\n jsonResp := \"{\\\"Error\\\":\\\"Nil amount for \" + account + \"\\\"}\"\n return nil, errors.New(jsonResp)\n }\n errUnmarshal:=json.Unmarshal(accountValueBytes,&information)\n if errUnmarshal!=nil {\n return nil,errUnmarshal\n }\n jsonResp := \"{\\\"Name\\\":\\\"\" + account + \"\\\",\\\"qrcode\\\":\\\"\" + information.qrcode + \"\\\",\\\"count\\\":\\\"\" + information.count + \"\\\"}\"\n fmt.Printf(\"Query Response:%s\\n\", jsonResp)\n return accountValueBytes, nil\n}", "title": "" }, { "docid": "9b500e385c909a12f06865f79f315383", "score": "0.5212987", "text": "func (_Multishot *MultishotCaller) Read(opts *bind.CallOpts, txOrigin common.Address, nonce *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _Multishot.contract.Call(opts, &out, \"read\", txOrigin, nonce)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "37717d7adc986b3a6e4b25908bda8b0d", "score": "0.5184754", "text": "func readCompany(ctx contractapi.TransactionContextInterface, companyID string) (*Company, error) {\n\tcompanyBytes, err := ctx.GetStub().GetState(companyID)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get company %s: %v\", companyID, err)\n\t}\n\tif companyBytes == nil {\n\t\treturn nil, fmt.Errorf(\"company %s does not exist\", companyID)\n\t}\n\n\tvar company Company\n\terr = json.Unmarshal(companyBytes, &company)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &company, nil\n}", "title": "" }, { "docid": "5afb340792ac86ba892012ccfc1cd990", "score": "0.5167764", "text": "func (da *Accessor) ReadTransaction(hash types.Hash) types.Txi {\n\tdata, _ := da.db.Get(transactionKey(hash))\n\tif len(data) == 0 {\n\t\treturn nil\n\t}\n\tprefixLen := len(contentPrefixTransaction)\n\tprefix := data[:prefixLen]\n\tdata = data[prefixLen:]\n\tif bytes.Equal(prefix, contentPrefixTransaction) {\n\t\tvar tx types.Tx\n\t\t_, err := tx.UnmarshalMsg(data)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Warn(\"unmarshal tx error\")\n\t\t\treturn nil\n\t\t}\n\t\treturn &tx\n\t}\n\tif bytes.Equal(prefix, contentPrefixSequencer) {\n\t\tvar sq types.Sequencer\n\t\t_, err := sq.UnmarshalMsg(data)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Warn(\"unmarshal tx error\")\n\t\t\treturn nil\n\t\t}\n\t\treturn &sq\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "98e5cb82dc18e989b570cb4b8226ac8c", "score": "0.51420426", "text": "func (s *session) ReadOp() (*IncomingPayload, error) {\n\tvar msg IncomingPayload\n\terr := s.ws.ReadJSON(&msg)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn &msg, err\n}", "title": "" }, { "docid": "7e081a2d36abfc9c5b7aa0a56b45b05f", "score": "0.5138069", "text": "func (brizo *brizoChain) Read(index int64) (string, error) {\n\treturn brizo.ReadByAddress(brizo.txSigner.From, index)\n}", "title": "" }, { "docid": "776820ea0c5463e6d10380e23a6cb0d7", "score": "0.5133328", "text": "func (rf *Raft) readPersist(data []byte) {\n if data == nil || len(data) < 1 { // bootstrap without any state?\n return\n }\n // Your code here (2C).\n buf := bytes.NewBuffer(data)\n obj := RaftPersistentState{}\n // TODO check decode error?\n labgob.NewDecoder(buf).Decode(&obj)\n rf.currentTerm, rf.votedFor, rf.log = obj.CurrentTerm, obj.VotedFor, obj.Log\n}", "title": "" }, { "docid": "bfd0da60af8fa5598c2104ce0abaaae7", "score": "0.5129145", "text": "func (p *MockProtocol) ReadState(context.Context, StateManager, []byte, ...[]byte) ([]byte, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "d3bd8412eb2b775b0fe78f210d3a5221", "score": "0.5125497", "text": "func (h *Hippy) newReadTx() *ReadTx {\n\treturn &ReadTx{h}\n}", "title": "" }, { "docid": "05de82ec83c8f125edb7fdd923ed7db2", "score": "0.50985825", "text": "func readOrderInDb(orderID int64) pb.Order {\n\tvar dborder pb.Order\n\tlog.Println(\"Read db id \", orderID)\n\tlog.Println(\"Read db id 111\")\n\torderTime := time.Now()\n\tlog.Println(\"Read db id 12\")\n\tshipTime := time.Now()\n\tlog.Println(\"Read db id 1\")\n\tupdateTime := time.Now()\n\tlog.Println(\"Read db id 2\")\n\tcreateTime := time.Now()\n\tlog.Println(\"Read db id 3\")\n\tif err := dbConn.QueryRow(context.Background(), \"select orderid,userid,productid,orderdate, shipdate,updatedate,createdate from cqrs_order where orderid=$1\", orderID).Scan(&dborder.OrderId, &dborder.UserId, &dborder.ProductId, &orderTime, &shipTime, &updateTime, &createTime); err != nil {\n\t\tlog.Println(\"Read db id 1\")\n\t\tlog.Printf(\"QueryRow failed: %v\\n\", err)\n\t\treturn pb.Order{}\n\t}\n\tlog.Println(\"Read db id 4\")\n\tlog.Println(\"Read db id 5\")\n\tdborder.OrderDate = orderTime.UnixNano() / 1000000\n\tlog.Println(\"Read db id 6\")\n\tdborder.ShipDate = shipTime.UnixNano() / 1000000\n\tlog.Println(\"Read db id 7\")\n\tdborder.UpdateDate = createTime.UnixNano() / 1000000\n\tlog.Println(\"Read db id 8\")\n\tdborder.CreateDate = updateTime.UnixNano() / 1000000\n\tlog.Println(dborder)\n\tlog.Println(\"Read db id 9\")\n\treturn dborder\n}", "title": "" }, { "docid": "fcd628542e2c2a6583da978dfec29773", "score": "0.50846326", "text": "func Read(contract address.Address, amount string, bytecode []byte) (string, error) {\n\tconn, err := util.ConnectToEndpoint(config.ReadConfig.SecureConnect && !config.Insecure)\n\tif err != nil {\n\t\treturn \"\", output.NewError(output.NetworkError, \"failed to connect to endpoint\", err)\n\t}\n\tdefer conn.Close()\n\n\tctx := context.Background()\n\tjwtMD, err := util.JwtAuth()\n\tif err == nil {\n\t\tctx = metautils.NiceMD(jwtMD).ToOutgoing(ctx)\n\t}\n\n\tcallerAddr, _ := Signer()\n\tif callerAddr == \"\" {\n\t\tcallerAddr = address.ZeroAddress\n\t}\n\tres, err := iotexapi.NewAPIServiceClient(conn).ReadContract(\n\t\tctx,\n\t\t&iotexapi.ReadContractRequest{\n\t\t\tExecution: &iotextypes.Execution{\n\t\t\t\tAmount: amount,\n\t\t\t\tContract: contract.String(),\n\t\t\t\tData: bytecode,\n\t\t\t},\n\t\t\tCallerAddress: callerAddr,\n\t\t\tGasLimit: _gasLimitFlag.Value().(uint64),\n\t\t},\n\t)\n\tif err == nil {\n\t\treturn res.Data, nil\n\t}\n\tif sta, ok := status.FromError(err); ok {\n\t\treturn \"\", output.NewError(output.APIError, sta.Message(), nil)\n\t}\n\treturn \"\", output.NewError(output.NetworkError, \"failed to invoke ReadContract api\", err)\n}", "title": "" }, { "docid": "7bfb0ed3bb777beb6a4d02c731ed728d", "score": "0.50768495", "text": "func NewOpenTradeOK() *OpenTradeOK {\n\treturn &OpenTradeOK{}\n}", "title": "" }, { "docid": "097c39c821ee016330722b0e3105371d", "score": "0.50550073", "text": "func TradeOpen(player *Player) *packet.Packet {\n\treturn packet.NewOutgoingPacket(92).AddShort(uint16(player.TradeTarget()))\n}", "title": "" }, { "docid": "7b56790d082f76ab852025231f13811e", "score": "0.50463074", "text": "func (_Multishot *MultishotSession) Read(txOrigin common.Address, nonce *big.Int) (*big.Int, error) {\n\treturn _Multishot.Contract.Read(&_Multishot.CallOpts, txOrigin, nonce)\n}", "title": "" }, { "docid": "572c4bcfdbf4e9ad1261cec40dbfb718", "score": "0.5037366", "text": "func (d *decodeState) readIndex() int {\n\treturn d.off - 1\n}", "title": "" }, { "docid": "999e843e05685be815c8d2241da8dabb", "score": "0.50333714", "text": "func readTxInUndo(r io.Reader, ti *TxInUndo) error {\n\t// nCode is how height is saved to the rev files\n\tnCode, _ := deserializeVLQ(r)\n\tti.Height = int32(nCode / 2) // Height is saved as actual height * 2\n\tti.Coinbase = nCode&1 == 1 // Coinbase is odd. Saved as height * 2 + 1\n\n\t// Only TxInUndos that have the height greater than 0\n\t// Has varint that isn't 0. see\n\t// github.com/bitcoin/bitcoin/blob/9cc7eba1b5651195c05473004c00021fe3856f30/src/undo.h#L42\n\tif ti.Height > 0 {\n\t\tvarint, err := wire.ReadVarInt(r, pver)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif varint != 0 {\n\t\t\treturn fmt.Errorf(\"varint is %d\", varint)\n\t\t}\n\t\tti.Varint = varint\n\t}\n\n\tamount, _ := deserializeVLQ(r)\n\tti.Amount = decompressTxOutAmount(amount)\n\n\tti.PKScript = decompressScript(r)\n\tif ti.PKScript == nil {\n\t\tpanic(\"nil pkscript\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "623b3c3d27e876e2ec700b9f8ed97c0c", "score": "0.50319463", "text": "func (t *AutoTraceChaincode) readBankTransaction(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar jsonResp string\n\tvar err error\n\n\tbankTransactionId := strings.ToLower(args[0])\n\tvalAsbytes, err := stub.GetState(bankTransactionId) //get the bank transaction from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + bankTransactionId + \"\\\"}\"\n\t\tfmt.Println(jsonResp)\n\t\treturn shim.Error(jsonResp)\n\t} else if valAsbytes == nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Vehicle part does not exist: \" + bankTransactionId + \"\\\"}\"\n\t\tfmt.Println(jsonResp)\n\t\treturn shim.Error(jsonResp)\n\t}\n\n\treturn shim.Success(valAsbytes)\n}", "title": "" }, { "docid": "522917e84a57ea0cb907a239c46db338", "score": "0.5027468", "text": "func (s *SmartContract) ReadVote(ctx contractapi.TransactionContextInterface, id string) (*vote, error) {\r\n\tvoteJSON, err := ctx.GetStub().GetState(id)\r\n\tif err != nil {\r\n\t\treturn nil, fmt.Errorf(\"failed to read from world state: %v\", err)\r\n\t}\r\n\tif voteJSON == nil {\r\n\t\treturn nil, fmt.Errorf(\"the vote %s does not exist\", id)\r\n\t}\r\n\r\n\tvar vote vote\r\n\terr = json.Unmarshal(voteJSON, &vote)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\treturn &vote, nil\r\n}", "title": "" }, { "docid": "063cbfb930185db1e90afe08d3e8451d", "score": "0.50239646", "text": "func readOrder(id int64) pb.Order {\n\tlog.Printf(\"REad Id = %d\", id)\n\torder := getInRedis(id)\n\treturn order\n}", "title": "" }, { "docid": "76b67c3e264e3f37e9555202ccad06b0", "score": "0.502269", "text": "func (sc *LoanContract) Get(ctx contractapi.TransactionContextInterface, key string) (*LoanObj, error) {\n\t\n existingObj, err := ctx.GetStub().GetState(key)\n if err != nil {\n return nil, err\n }\n\n if existingObj == nil {\n return nil, fmt.Errorf(\"Cannot read world state pair with key %s. Does not exist\", key)\n }\n\n\tloanObj := new(LoanObj)\n\tif err := json.Unmarshal(existingObj, loanObj); err != nil {\n\t\treturn nil, fmt.Errorf(\"Data retrieved from world state for key %s was not of type LoanObj\", key)\n\t}\n return loanObj, nil\n}", "title": "" }, { "docid": "bce25feb45118e54c0d71ba9635dd54c", "score": "0.50186753", "text": "func BuildReadStateRequest(data []byte) (protocol.StateContext, error) {\n\tif len(data) < 4 {\n\t\treturn nil, errInvalidCallData\n\t}\n\n\tswitch methodSig := hex.EncodeToString(data[:4]); methodSig {\n\tcase hex.EncodeToString(_totalBalanceMethod.ID):\n\t\treturn newTotalBalanceStateContext()\n\tcase hex.EncodeToString(_availableBalanceMethod.ID):\n\t\treturn newAvailableBalanceStateContext()\n\tcase hex.EncodeToString(_unclaimedBalanceMethod.ID):\n\t\treturn newUnclaimedBalanceStateContext(data[4:])\n\tdefault:\n\t\treturn nil, errInvalidCallSig\n\t}\n}", "title": "" }, { "docid": "f3481c427cae273be631f167690fe2bc", "score": "0.5013573", "text": "func (t *SimpleChaincode) matchTriTrade(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar jsonResp string\n\tvalAsbytes, err := stub.GetState(openTradesStr) //get the marble from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + openTradesStr + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t} else if valAsbytes == nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"opentrades does not exist: \" + openTradesStr + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\t\n\tvar openTradesStruct AllOpenTrades\n\tjson.Unmarshal(valAsbytes, &openTradesStruct)\n\tfmt.Println(\"matchTrade\")\n\tfmt.Println(openTradesStruct.OpenTrades)\n\topenTrades := openTradesStruct.OpenTrades\n\tfor i := 0; i < len(openTrades); i++ {\n\t\tfor j := i + 1; j < len(openTrades); j++ {\n\t\t\tfor k := j + 1; k < len(openTrades); k++{\n\t\t\t\tfmt.Println(\"matchTriTrade : compare opentrades\")\n\t\t\t\tif (reflect.DeepEqual(openTrades[i].Want, openTrades[j].Willing) && reflect.DeepEqual(openTrades[j].Want, openTrades[k].Willing) && reflect.DeepEqual(openTrades[k].Want, openTrades[i].Willing)) ||\n\t\t\t\t(reflect.DeepEqual(openTrades[i].Want, openTrades[k].Willing) && reflect.DeepEqual(openTrades[k].Want, openTrades[j].Willing) && reflect.DeepEqual(openTrades[j].Want, openTrades[i].Willing)){\n\t\t\t\t\tfmt.Println(\"matchTriTrade - swapMarbles\")\n\t\t\t\t\t// swapMarbles\n\t\t\t\t\tif (reflect.DeepEqual(openTrades[i].Want, openTrades[j].Willing) && reflect.DeepEqual(openTrades[j].Want, openTrades[k].Willing) && reflect.DeepEqual(openTrades[k].Want, openTrades[i].Willing)){\n\t\t\t\t\t\tfmt.Println(\"matchTriTrade - first case - swapMarbleTri\")\n\t\t\t\t\t\tt.swapMarbleTri(stub, []string{openTrades[i].User, openTrades[i].Willing.Color, strconv.Itoa(openTrades[i].Willing.Size), openTrades[j].User, openTrades[j].Willing.Color, strconv.Itoa(openTrades[j].Willing.Size), openTrades[k].User, openTrades[k].Willing.Color, strconv.Itoa(openTrades[k].Willing.Size)})\n\t\t\t\t\t\t// following doesnt work......\n\t\t\t\t\t\t// t.swapMarble(stub, []string{openTrades[i].User, openTrades[i].Willing.Color, strconv.Itoa(openTrades[i].Willing.Size), openTrades[j].User, openTrades[j].Willing.Color, strconv.Itoa(openTrades[j].Willing.Size)})\n\t\t\t\t\t\t// t.swapMarble(stub, []string{openTrades[j].User, openTrades[i].Willing.Color, strconv.Itoa(openTrades[i].Willing.Size), openTrades[k].User, openTrades[k].Willing.Color, strconv.Itoa(openTrades[k].Willing.Size)})\n\t\t\t\t\t\t// fmt.Println(openTrades[i])\n\t\t\t\t\t\t\n\t\t\t\t\t}else {\n\t\t\t\t\t\tfmt.Println(\"matchTriTrade - second case - swapMarbleTri\")\n\t\t\t\t\t\tt.swapMarbleTri(stub, []string{openTrades[i].User, openTrades[i].Willing.Color, strconv.Itoa(openTrades[i].Willing.Size), openTrades[k].User, openTrades[k].Willing.Color, strconv.Itoa(openTrades[k].Willing.Size), openTrades[j].User, openTrades[j].Willing.Color, strconv.Itoa(openTrades[j].Willing.Size)})\n\t\t\t\t\t\t\n\t\t\t\t\t\t// fmt.Println(\"matchTriTrade - second case - step 1\")\n\t\t\t\t\t\t// t.swapMarble(stub, []string{openTrades[i].User, openTrades[i].Willing.Color, strconv.Itoa(openTrades[i].Willing.Size), openTrades[k].User, openTrades[k].Willing.Color, strconv.Itoa(openTrades[k].Willing.Size)})\n\t\t\t\t\t\t// fmt.Println(\"matchTriTrade - second case - step 2\")\n\t\t\t\t\t\t// fmt.Println(openTrades[k].User)\n\t\t\t\t\t\t// fmt.Println(openTrades[k].Willing.Color)\n\t\t\t\t\t\t// fmt.Println(openTrades[i].User)\n\t\t\t\t\t\t// fmt.Println(openTrades[i].Willing.Color)\n\t\t\t\t\t\t// time.Sleep(2000 * time.Millisecond)\n\t\t\t\t\t\t// t.swapMarble(stub, []string{openTrades[k].User, openTrades[i].Willing.Color, strconv.Itoa(openTrades[i].Willing.Size), openTrades[j].User, openTrades[j].Willing.Color, strconv.Itoa(openTrades[j].Willing.Size)})\n\t\t\t\t\t\t// fmt.Println(openTrades[i])\n\t\t\t\t\t}\n\t\t\t\t\t// delete openTrades after matching orders\n\t\t\t\t\t// delete from hyperledger blockchain\n\t\t\t\t\t// t.removeOpenTrade(stub,[]string{strconv.FormatInt(openTrades[i].Timestamp, 10)})\n\t\t\t\t\t// t.removeOpenTrade(stub,[]string{strconv.FormatInt(openTrades[j].Timestamp, 10)})\n\t\t\t\t\t// fmt.Println(strconv.FormatInt(openTrades[i].Timestamp, 10))\n\n\t\t\t\t\t// delete from cache so that no re-matching can happen\n\t\t\t\t\topenTrades = append(openTrades[:k], openTrades[k+1:]...)\n\t\t\t\t\topenTrades = append(openTrades[:j], openTrades[j+1:]...)\n\t\t\t\t\topenTrades = append(openTrades[:i], openTrades[i+1:]...)\n\t\t\t\t\tfmt.Println(openTrades)\n\t\t\t\t\ti-- // redo index since the orignal has been deleted\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tfmt.Printf(\" Saving new state of open trades to hyperledger:\")\n\tfmt.Println(openTrades)\n\topenTradesStruct.OpenTrades = openTrades\n\ttradesAsBytes, _ := json.Marshal(openTradesStruct)\n\terr = stub.PutState(openTradesStr, tradesAsBytes)\t\t\t\t\t\t\t\t\t\t\t\t//rewrite open orders\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\n\treturn shim.Success(nil)\n\n}", "title": "" }, { "docid": "8fe540b0d5adabce9aae647a08ad19cd", "score": "0.4999332", "text": "func (ledger *Ledger) GetState(chaincodeID string, key string, committed bool) ([]byte, error) {\n ledger.statUtil.Stats[\"ledgerget\"].Start(key)\n ledger.nReads++\n startTime := time.Now()\n res, err := ledger.state.Get(chaincodeID, key, committed)\n ledger.totalReadTime += uint64(time.Since(startTime))\n if val, ok := ledger.statUtil.Stats[\"ledgerget\"].End(key); ok {\n ledgerLogger.Infof(\"GetState latency: %v\", val)\n }\n\treturn res, err\n}", "title": "" }, { "docid": "cadd1f219908dd6d40ece70eef1d88ba", "score": "0.49936736", "text": "func (s *TradeRecordRead) Decode(d *jx.Decoder) error {\n\tif s == nil {\n\t\treturn errors.New(\"invalid: unable to decode TradeRecordRead to nil\")\n\t}\n\tvar requiredBitSet [1]uint8\n\n\tif err := d.ObjBytes(func(d *jx.Decoder, k []byte) error {\n\t\tswitch string(k) {\n\t\tcase \"id\":\n\t\t\trequiredBitSet[0] |= 1 << 0\n\t\t\tif err := func() error {\n\t\t\t\tv, err := d.Int()\n\t\t\t\ts.ID = int(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}(); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"decode field \\\"id\\\"\")\n\t\t\t}\n\t\tcase \"price\":\n\t\t\trequiredBitSet[0] |= 1 << 1\n\t\t\tif err := func() error {\n\t\t\t\tv, err := d.Float64()\n\t\t\t\ts.Price = float64(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}(); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"decode field \\\"price\\\"\")\n\t\t\t}\n\t\tcase \"timestamp\":\n\t\t\trequiredBitSet[0] |= 1 << 2\n\t\t\tif err := func() error {\n\t\t\t\tv, err := json.DecodeDateTime(d)\n\t\t\t\ts.Timestamp = v\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}(); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"decode field \\\"timestamp\\\"\")\n\t\t\t}\n\t\tcase \"volume\":\n\t\t\trequiredBitSet[0] |= 1 << 3\n\t\t\tif err := func() error {\n\t\t\t\tv, err := d.Int32()\n\t\t\t\ts.Volume = int32(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}(); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"decode field \\\"volume\\\"\")\n\t\t\t}\n\t\tcase \"time_range_id\":\n\t\t\trequiredBitSet[0] |= 1 << 4\n\t\t\tif err := func() error {\n\t\t\t\tv, err := d.Int()\n\t\t\t\ts.TimeRangeID = int(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}(); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"decode field \\\"time_range_id\\\"\")\n\t\t\t}\n\t\tdefault:\n\t\t\treturn d.Skip()\n\t\t}\n\t\treturn nil\n\t}); err != nil {\n\t\treturn errors.Wrap(err, \"decode TradeRecordRead\")\n\t}\n\t// Validate required fields.\n\tvar failures []validate.FieldError\n\tfor i, mask := range [1]uint8{\n\t\t0b00011111,\n\t} {\n\t\tif result := (requiredBitSet[i] & mask) ^ mask; result != 0 {\n\t\t\t// Mask only required fields and check equality to mask using XOR.\n\t\t\t//\n\t\t\t// If XOR result is not zero, result is not equal to expected, so some fields are missed.\n\t\t\t// Bits of fields which would be set are actually bits of missed fields.\n\t\t\tmissed := bits.OnesCount8(result)\n\t\t\tfor bitN := 0; bitN < missed; bitN++ {\n\t\t\t\tbitIdx := bits.TrailingZeros8(result)\n\t\t\t\tfieldIdx := i*8 + bitIdx\n\t\t\t\tvar name string\n\t\t\t\tif fieldIdx < len(jsonFieldsNameOfTradeRecordRead) {\n\t\t\t\t\tname = jsonFieldsNameOfTradeRecordRead[fieldIdx]\n\t\t\t\t} else {\n\t\t\t\t\tname = strconv.Itoa(fieldIdx)\n\t\t\t\t}\n\t\t\t\tfailures = append(failures, validate.FieldError{\n\t\t\t\t\tName: name,\n\t\t\t\t\tError: validate.ErrFieldRequired,\n\t\t\t\t})\n\t\t\t\t// Reset bit.\n\t\t\t\tresult &^= 1 << bitIdx\n\t\t\t}\n\t\t}\n\t}\n\tif len(failures) > 0 {\n\t\treturn &validate.Error{Fields: failures}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b835a8f0eb9437477805b0755a6a6225", "score": "0.49822196", "text": "func (g *gateio) readWs(ctx context.Context) error {\n\n\t// To avoid data race, creating a new local lookup map.\n\tcfgLookup := make(map[cfgLookupKey]cfgLookupVal, len(g.cfgMap))\n\tfor k, v := range g.cfgMap {\n\t\tcfgLookup[k] = v\n\t}\n\n\t// See influxTimeVal struct doc for details.\n\titv := influxTimeVal{}\n\tif g.influx != nil {\n\t\titv.TickerMap = make(map[string]int64)\n\t\titv.TradeMap = make(map[string]int64)\n\t}\n\n\tcd := commitData{\n\t\tterTickers: make([]storage.Ticker, 0, g.connCfg.Terminal.TickerCommitBuf),\n\t\tterTrades: make([]storage.Trade, 0, g.connCfg.Terminal.TradeCommitBuf),\n\t\tmysqlTickers: make([]storage.Ticker, 0, g.connCfg.MySQL.TickerCommitBuf),\n\t\tmysqlTrades: make([]storage.Trade, 0, g.connCfg.MySQL.TradeCommitBuf),\n\t\tesTickers: make([]storage.Ticker, 0, g.connCfg.ES.TickerCommitBuf),\n\t\tesTrades: make([]storage.Trade, 0, g.connCfg.ES.TradeCommitBuf),\n\t\tinfluxTickers: make([]storage.Ticker, 0, g.connCfg.InfluxDB.TickerCommitBuf),\n\t\tinfluxTrades: make([]storage.Trade, 0, g.connCfg.InfluxDB.TradeCommitBuf),\n\t\tnatsTickers: make([]storage.Ticker, 0, g.connCfg.NATS.TickerCommitBuf),\n\t\tnatsTrades: make([]storage.Trade, 0, g.connCfg.NATS.TradeCommitBuf),\n\t\tclickHouseTickers: make([]storage.Ticker, 0, g.connCfg.ClickHouse.TickerCommitBuf),\n\t\tclickHouseTrades: make([]storage.Trade, 0, g.connCfg.ClickHouse.TradeCommitBuf),\n\t\ts3Tickers: make([]storage.Ticker, 0, g.connCfg.S3.TickerCommitBuf),\n\t\ts3Trades: make([]storage.Trade, 0, g.connCfg.S3.TradeCommitBuf),\n\t}\n\n\tfor {\n\t\tselect {\n\t\tdefault:\n\t\t\tframe, err := g.ws.Read()\n\t\t\tif err != nil {\n\t\t\t\tif errors.Is(err, net.ErrClosed) {\n\t\t\t\t\terr = errors.New(\"context canceled\")\n\t\t\t\t} else {\n\t\t\t\t\tif err == io.EOF {\n\t\t\t\t\t\terr = errors.Wrap(err, \"connection close by exchange server\")\n\t\t\t\t\t}\n\t\t\t\t\tlogErrStack(err)\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif len(frame) == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\twr := wsRespGateio{}\n\t\t\terr = jsoniter.Unmarshal(frame, &wr)\n\t\t\tif err != nil {\n\t\t\t\tlogErrStack(err)\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif wr.ID != 0 {\n\t\t\t\tif wr.Result.Status == \"success\" {\n\t\t\t\t\tlog.Debug().Str(\"exchange\", \"gateio\").Str(\"func\", \"readWs\").Str(\"market\", g.channelIds[wr.ID][0]).Str(\"channel\", g.channelIds[wr.ID][1]).Msg(\"channel subscribed\")\n\t\t\t\t\tcontinue\n\t\t\t\t} else {\n\t\t\t\t\twsSubErr, ok := wr.Error.(wsSubErrGateio)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tlog.Error().Str(\"exchange\", \"gateio\").Str(\"func\", \"processWs\").Interface(\"error\", wr.Error).Msg(\"\")\n\t\t\t\t\t\treturn errors.New(\"cannot convert ws resp error to error field\")\n\t\t\t\t\t}\n\t\t\t\t\tlog.Error().Str(\"exchange\", \"gateio\").Str(\"func\", \"readWs\").Int(\"code\", wsSubErr.Code).Str(\"msg\", wsSubErr.Message).Msg(\"\")\n\t\t\t\t\treturn errors.New(\"gateio websocket error\")\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif wr.Channel == \"spot.tickers\" {\n\t\t\t\twr.Channel = \"ticker\"\n\t\t\t} else {\n\t\t\t\twr.Channel = \"trade\"\n\t\t\t}\n\n\t\t\t// Consider frame only in configured interval, otherwise ignore it.\n\t\t\tswitch wr.Channel {\n\t\t\tcase \"ticker\", \"trade\":\n\t\t\t\tkey := cfgLookupKey{market: wr.Result.CurrencyPair, channel: wr.Channel}\n\t\t\t\tval := cfgLookup[key]\n\t\t\t\tif val.wsConsiderIntSec == 0 || time.Since(val.wsLastUpdated).Seconds() >= float64(val.wsConsiderIntSec) {\n\t\t\t\t\tval.wsLastUpdated = time.Now()\n\t\t\t\t\twr.mktCommitName = val.mktCommitName\n\t\t\t\t\tcfgLookup[key] = val\n\t\t\t\t} else {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\terr := g.processWs(ctx, &wr, &cd, &itv)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\n\t\t// Return, if there is any error from another function or exchange.\n\t\tcase <-ctx.Done():\n\t\t\treturn ctx.Err()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "577235ed5c9cf3b959e6aa2c13580a75", "score": "0.49677014", "text": "func (bc *blockchain) ExecuteContractRead(ex *action.Execution) (*action.Receipt, error) {\n\t// use latest block as carrier to run the offline execution\n\t// the block itself is not used\n\th := bc.TipHeight()\n\tblk, err := bc.GetBlockByHeight(h)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to get block in ExecuteContractRead\")\n\t}\n\tws, err := bc.sf.NewWorkingSet()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to obtain working set from state factory\")\n\t}\n\tgasLimit := genesis.BlockGasLimit\n\treturn evm.ExecuteContract(\n\t\tblk.Height(),\n\t\tblk.HashBlock(),\n\t\tblk.PublicKey(),\n\t\tblk.Timestamp(),\n\t\tws,\n\t\tex,\n\t\tbc,\n\t\t&gasLimit,\n\t\tbc.config.Chain.EnableGasCharge,\n\t)\n}", "title": "" }, { "docid": "4d8e5fff3fa831730301e4d1c340ad5c", "score": "0.4960998", "text": "func (s *server) ReadOrder(cxt context.Context, id *pb.Id) (*pb.Order, error) {\n\tlog.Println(\"ReadOrder \", id)\n\torder := readOrder(id.Id)\n\treturn &order, nil\n}", "title": "" }, { "docid": "397949310895700f717a58988651ffd4", "score": "0.49557358", "text": "func (c *Configuration) read(ctx context.Context, a *ReadRequest) (resp *State, err error) {\n\tvar ti traceInfo\n\tif c.mgr.opts.trace {\n\t\tti.Trace = trace.New(\"gorums.\"+c.tstring()+\".Sent\", \"Read\")\n\t\tdefer ti.Finish()\n\n\t\tti.firstLine.cid = c.id\n\t\tif deadline, ok := ctx.Deadline(); ok {\n\t\t\tti.firstLine.deadline = deadline.Sub(time.Now())\n\t\t}\n\t\tti.LazyLog(&ti.firstLine, false)\n\t\tti.LazyLog(&payload{sent: true, msg: a}, false)\n\n\t\tdefer func() {\n\t\t\tti.LazyLog(&qcresult{\n\t\t\t\treply: resp,\n\t\t\t\terr: err,\n\t\t\t}, false)\n\t\t\tif err != nil {\n\t\t\t\tti.SetError()\n\t\t\t}\n\t\t}()\n\t}\n\n\texpected := c.n\n\treplyChan := make(chan internalState, expected)\n\tfor _, n := range c.nodes {\n\t\tgo callGRPCRead(ctx, n, a, replyChan)\n\t}\n\n\tvar (\n\t\treplyValues = make([]*State, 0, expected)\n\t\terrCount int\n\t\tquorum bool\n\t)\n\n\tfor {\n\t\tselect {\n\t\tcase r := <-replyChan:\n\t\t\tif r.err != nil {\n\t\t\t\terrCount++\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif c.mgr.opts.trace {\n\t\t\t\tti.LazyLog(&payload{sent: false, id: r.nid, msg: r.reply}, false)\n\t\t\t}\n\t\t\treplyValues = append(replyValues, r.reply)\n\t\t\tif resp, quorum = c.qspec.ReadQF(replyValues); quorum {\n\t\t\t\treturn resp, nil\n\t\t\t}\n\t\tcase <-ctx.Done():\n\t\t\treturn resp, QuorumCallError{ctx.Err().Error(), errCount, len(replyValues)}\n\t\t}\n\n\t\tif errCount+len(replyValues) == expected {\n\t\t\treturn resp, QuorumCallError{\"incomplete call\", errCount, len(replyValues)}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "263ace49d3617ea12ebfaa13b8ce5f7b", "score": "0.494135", "text": "func ReadTransaction() []byte {\n\tret := C.read_transaction((*C.char)(unsafe.Pointer(uintptr(0))), 0)\n\tbuffer := make([]byte, ret)\n\tC.read_transaction((*C.char)(unsafe.Pointer(&buffer[0])), C.size_t(len(buffer)))\n\treturn buffer\n}", "title": "" }, { "docid": "185166f143485585024a7741887c9e50", "score": "0.49396002", "text": "func (s *TradeConditionRead) Decode(d *jx.Decoder) error {\n\tif s == nil {\n\t\treturn errors.New(\"invalid: unable to decode TradeConditionRead to nil\")\n\t}\n\tvar requiredBitSet [1]uint8\n\n\tif err := d.ObjBytes(func(d *jx.Decoder, k []byte) error {\n\t\tswitch string(k) {\n\t\tcase \"id\":\n\t\t\trequiredBitSet[0] |= 1 << 0\n\t\t\tif err := func() error {\n\t\t\t\tv, err := d.Int()\n\t\t\t\ts.ID = int(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}(); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"decode field \\\"id\\\"\")\n\t\t\t}\n\t\tcase \"condition\":\n\t\t\trequiredBitSet[0] |= 1 << 1\n\t\t\tif err := func() error {\n\t\t\t\tv, err := d.Str()\n\t\t\t\ts.Condition = string(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}(); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"decode field \\\"condition\\\"\")\n\t\t\t}\n\t\tdefault:\n\t\t\treturn d.Skip()\n\t\t}\n\t\treturn nil\n\t}); err != nil {\n\t\treturn errors.Wrap(err, \"decode TradeConditionRead\")\n\t}\n\t// Validate required fields.\n\tvar failures []validate.FieldError\n\tfor i, mask := range [1]uint8{\n\t\t0b00000011,\n\t} {\n\t\tif result := (requiredBitSet[i] & mask) ^ mask; result != 0 {\n\t\t\t// Mask only required fields and check equality to mask using XOR.\n\t\t\t//\n\t\t\t// If XOR result is not zero, result is not equal to expected, so some fields are missed.\n\t\t\t// Bits of fields which would be set are actually bits of missed fields.\n\t\t\tmissed := bits.OnesCount8(result)\n\t\t\tfor bitN := 0; bitN < missed; bitN++ {\n\t\t\t\tbitIdx := bits.TrailingZeros8(result)\n\t\t\t\tfieldIdx := i*8 + bitIdx\n\t\t\t\tvar name string\n\t\t\t\tif fieldIdx < len(jsonFieldsNameOfTradeConditionRead) {\n\t\t\t\t\tname = jsonFieldsNameOfTradeConditionRead[fieldIdx]\n\t\t\t\t} else {\n\t\t\t\t\tname = strconv.Itoa(fieldIdx)\n\t\t\t\t}\n\t\t\t\tfailures = append(failures, validate.FieldError{\n\t\t\t\t\tName: name,\n\t\t\t\t\tError: validate.ErrFieldRequired,\n\t\t\t\t})\n\t\t\t\t// Reset bit.\n\t\t\t\tresult &^= 1 << bitIdx\n\t\t\t}\n\t\t}\n\t}\n\tif len(failures) > 0 {\n\t\treturn &validate.Error{Fields: failures}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1ebeffaf506d4c29ed58aa02674a0969", "score": "0.49335736", "text": "func (b *BBoy) OpenRead() error {\n\treturn b.Open(RD_ONLY)\n}", "title": "" }, { "docid": "351997ecd788c596d22f031e5e1defb2", "score": "0.49194208", "text": "func readRule(account string, txId string) (int, bool) {\nreapply:\n\tif _, ok := objState[account]; !ok {\n\t\t// account not created yet\n\t\treturn -1, false\n\t}\n\tobject := objState[account]\n\tobject.mu.Lock()\n\n\tif txId > object.CommitVersion {\n\t\t//search across the committed timestamp and the TW list for object D\n\t\tvar version string\n\t\tvar readVal int\n\t\tif object.CommitVersion > version && object.CommitVersion <= txId {\n\t\t\tversion = object.CommitVersion\n\t\t}\n\t\tkeys := getTwKeys(account)\n\t\tfor _, k := range keys {\n\t\t\tif k <= txId && k > version {\n\t\t\t\tversion = k\n\t\t\t}\n\t\t}\n\n\t\tif version == object.CommitVersion {\n\t\t\tif version == \"\" {\n\t\t\t\tobject.mu.Unlock()\n\t\t\t\treturn -1, false\n\t\t\t} else {\n\t\t\t\tAddToRts(object.Rts, txId)\n\t\t\t\treadVal = object.CommitVal\n\t\t\t\tobject.mu.Unlock()\n\t\t\t\treturn readVal, true\n\t\t\t}\n\t\t} else {\n\t\t\tif version == txId {\n\t\t\t\treadVal = object.Tw[version]\n\t\t\t\tobject.mu.Unlock()\n\t\t\t\treturn readVal, true\n\t\t\t} else {\n\t\t\t\t// wait unitl version is committed or aborted\n\t\t\t\tobject.mu.Unlock()\n\t\t\t\tcond.L.Lock()\n\t\t\t\taborted := false\n\t\t\t\tcommitted := false\n\t\t\t\tfor aborted == false && committed == false {\n\t\t\t\t\tcond.Wait()\n\t\t\t\t\t_, ok := object.Tw[version]\n\t\t\t\t\tcommitted = version == object.CommitVersion\n\t\t\t\t\taborted = !ok\n\t\t\t\t}\n\t\t\t\tcond.L.Unlock()\n\t\t\t\tgoto reapply\n\t\t\t}\n\t\t}\n\t} else {\n\t\tobject.mu.Unlock()\n\t\treturn 0, false\n\t}\n}", "title": "" }, { "docid": "4d5fe24029a75be323ce1c53e7161127", "score": "0.49082136", "text": "func (tc *TradeClient) GetTrade(tradeID string, portfolioID int32) (*tradepb.Trade, error) {\n\treq := &tradepb.GetTradeRequest{\n\t\tTradeId: tradeID,\n\t\tPortfolioId: portfolioID,\n\t}\n\tclientDeadline := time.Now().Add(time.Duration(1 * time.Second))\n\tctx, cancel := context.WithDeadline(context.Background(), clientDeadline)\n\tdefer cancel()\n\n\tres, err := tc.client.GetTrade(ctx, req)\n\tif err != nil {\n\t\tlogger.Printf(\"Error calling GetTrade: %v\", err)\n\t\treturn nil, err\n\t}\n\treturn res.GetTrade(), nil\n}", "title": "" }, { "docid": "558da4dc303b23630c9a8cb83b2afcf9", "score": "0.49000245", "text": "func (tir *TransactionIndexReader) Read(txid Hash256) (*TransactionIndex, error) {\n\n\t// Bitcoin Core handles and saves the transaction ids in reverse.\n\ttxidReverse := txid.ReversedCopy()\n\n\tkey := append([]byte(\"t\"), txidReverse[:]...)\n\tvalue, err := tir.db.Get(key, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmb := NewMovingBytes(value)\n\tti := &TransactionIndex{}\n\tti.NumFile = int32(mb.ReadVarInt())\n\tti.DataPos = uint32(mb.ReadVarInt())\n\tti.TxOffset = int(mb.ReadVarInt())\n\n\treturn ti, nil\n}", "title": "" }, { "docid": "f4f474beff93e335c84177d0db98a9dd", "score": "0.48910803", "text": "func TestOpen(t *testing.T) {\n\tvar b bytes.Buffer\n\twantHold := 4 * time.Second\n\twantASN := uint32(12345)\n\tif err := sendOpen(&b, wantASN, net.ParseIP(\"1.2.3.4\"), wantHold); err != nil {\n\t\tt.Fatalf(\"Send open: %s\", err)\n\t}\n\top, err := readOpen(&b)\n\tif err != nil {\n\t\tt.Fatalf(\"Read open: %s\", err)\n\t}\n\tif op.holdTime != wantHold {\n\t\tt.Errorf(\"Wrong hold-time, want %q, got %q\", wantHold, op.holdTime)\n\t}\n\tif op.asn != wantASN {\n\t\tt.Errorf(\"Wrong ASN, want %d, got %d\", wantASN, op.asn)\n\t}\n}", "title": "" }, { "docid": "f4f474beff93e335c84177d0db98a9dd", "score": "0.48910803", "text": "func TestOpen(t *testing.T) {\n\tvar b bytes.Buffer\n\twantHold := 4 * time.Second\n\twantASN := uint32(12345)\n\tif err := sendOpen(&b, wantASN, net.ParseIP(\"1.2.3.4\"), wantHold); err != nil {\n\t\tt.Fatalf(\"Send open: %s\", err)\n\t}\n\top, err := readOpen(&b)\n\tif err != nil {\n\t\tt.Fatalf(\"Read open: %s\", err)\n\t}\n\tif op.holdTime != wantHold {\n\t\tt.Errorf(\"Wrong hold-time, want %q, got %q\", wantHold, op.holdTime)\n\t}\n\tif op.asn != wantASN {\n\t\tt.Errorf(\"Wrong ASN, want %d, got %d\", wantASN, op.asn)\n\t}\n}", "title": "" }, { "docid": "d0fc3d6f20936e29ecc830ab80e1542c", "score": "0.48780447", "text": "func (s *SmartContract) ReadCodeInfo(ctx contractapi.TransactionContextInterface, pID_code string) (*CodeInfo, error) {\n\tiCodeInfoJSON, err := ctx.GetStub().GetState(pID_code)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to read from world state: %v\", err)\n\t}\n\tif iCodeInfoJSON == nil {\n\t\treturn nil, fmt.Errorf(\"the CodeInfo %s does not exist\", pID_code)\n\t}\n\n\tvar mCodeInfo CodeInfo\n\terr = json.Unmarshal(iCodeInfoJSON, &mCodeInfo)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &mCodeInfo, nil\n}", "title": "" }, { "docid": "28fb824754f557d5f18376f17a959b07", "score": "0.48748073", "text": "func (s *SmartContract) ReadVote(ctx contractapi.TransactionContextInterface, id string) (*Vote, error) {\n\tvoteJSON, err := ctx.GetStub().GetState(id)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to read from world state: %v\", err)\n\t}\n\tif voteJSON == nil {\n\t\treturn nil, fmt.Errorf(\"the vote %s does not exist\", id)\n\t}\n\n\tvar vote Vote\n\terr = json.Unmarshal(voteJSON, &vote)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &vote, nil\n}", "title": "" }, { "docid": "e1d9a10eb1ea13631c7dcb4bd8f294d0", "score": "0.48629856", "text": "func readSharelist (stub shim.ChaincodeStubInterface, args []string) pb.Response{\n\tvar key, jsonResp string\n\tvar err error\n\tfmt.Println(\"starting read_sharelist\")\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting key of the var to query\")\n\t}\n\n\t// input sanitation\n\terr = sanitizeArguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key) //get the var from ledger\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\tres := Receipt{}\n\tjson.Unmarshal(valAsbytes,&res)\n\townerAsByte,_ := json.Marshal(res.ShareList)\n\n\tfmt.Println(\"- end read_sharelist\")\n\treturn shim.Success(ownerAsByte) //send it onward\n}", "title": "" }, { "docid": "e3f0a058317381bb034f0caa0620b7a2", "score": "0.4856524", "text": "func (t *ReadTest) Invoke(stub shim.ChaincodeStubInterface) pb.Response {\n\tfunction, args := stub.GetFunctionAndParameters()\n\tlogger.Infof(\"ReadTest Args=%s\", args)\n\n\tif function == \"concat\" {\n\t\tif len(args) < 5 {\n\t\t\treturn shim.Error(\"Required args are: concat, channelID, ccID, key1, key2, key3\")\n\t\t}\n\t\tchannelID := string(args[0])\n\t\tccID := string(args[1])\n\t\tkey1 := string(args[2])\n\t\tkey2 := string(args[3])\n\t\tkey3 := string(args[4])\n\n\t\t// The unsafeGetState on the transaction snap can be invoked with or without a channel.\n\t\tresp1 := stub.InvokeChaincode(TransactionSnap, [][]byte{[]byte(QueryFunc), []byte(channelID), []byte(ccID), []byte(key1)}, channelID)\n\t\tresp2 := stub.InvokeChaincode(TransactionSnap, [][]byte{[]byte(QueryFunc), []byte(channelID), []byte(ccID), []byte(key2)}, \"\")\n\t\tresp3 := stub.InvokeChaincode(TransactionSnap, [][]byte{[]byte(QueryFunc), []byte(channelID), []byte(ccID), []byte(\"invalidKey\")}, \"\")\n\n\t\tif resp1.GetStatus() != 200 {\n\t\t\treturn shim.Error(\"Query on key1 failed: \" + resp1.GetMessage())\n\t\t}\n\t\tif resp2.GetStatus() != 200 {\n\t\t\treturn shim.Error(\"Query on key2 failed: \" + resp2.GetMessage())\n\t\t}\n\t\tif resp3.GetStatus() != 200 {\n\t\t\treturn shim.Error(\"Query on invalid key failed: \" + resp2.GetMessage())\n\t\t}\n\n\t\tlogger.Infof(\"Response from %s for key1 : %s \", TransactionSnap, string(resp1.Payload))\n\t\tlogger.Infof(\"Response from %s for key2 : %s \", TransactionSnap, string(resp2.Payload))\n\n\t\tv3 := strings.Join([]string{string(resp1.Payload), string(resp2.Payload)}, \"\")\n\t\terr := stub.PutState(key3, []byte(v3))\n\t\tif err != nil {\n\t\t\treturn shim.Error(fmt.Sprintf(\"PutState failed: key %s, value %s, error: %s\", key3, v3, err.Error()))\n\t\t}\n\n\t\treturn shim.Success([]byte(v3))\n\t}\n\n\tif function == \"put\" {\n\t\tif len(args) < 2 {\n\t\t\treturn shim.Error(\"Required args are: key,value\")\n\t\t}\n\t\tkey := string(args[0])\n\t\tvalue := []byte(args[1])\n\t\tstub.PutState(key, value)\n\t\treturn shim.Success([]byte(\"\"))\n\t}\n\tif function == \"checkGetStateAndUnsafeGetState\" {\n\t\tif len(args) < 1 {\n\t\t\treturn shim.Error(\"Required args are: channelID, ccID, key\")\n\t\t}\n\t\tchannelID := string(args[0])\n\t\tccID := string(args[1])\n\t\tkey := string(args[2])\n\t\tvalue, err := stub.GetState(key)\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\tresp1 := stub.InvokeChaincode(TransactionSnap, [][]byte{[]byte(QueryFunc), []byte(channelID), []byte(ccID), []byte(key)}, channelID)\n\t\tif resp1.GetStatus() != 200 {\n\t\t\treturn shim.Error(fmt.Sprintf(\"Query on %s failed: %s\", key, resp1.GetMessage()))\n\t\t}\n\t\tif string(value) != string(resp1.Payload) {\n\t\t\treturn shim.Error(fmt.Sprintf(\"unsafeGetState return different value from GetState %s %s\", value, resp1.Payload))\n\t\t}\n\t\treturn shim.Success([]byte(\"\"))\n\t}\n\n\treturn shim.Error(\"Only three functions is supported: concat, put, get\")\n\n}", "title": "" }, { "docid": "920f259bd1ffc9fb5b810b01b7183b9d", "score": "0.48532158", "text": "func (g *Gateio) GetTradeHistory(ctx context.Context, symbol string) (TradHistoryResponse, error) {\n\tvar params string\n\tvar result TradHistoryResponse\n\tparams = fmt.Sprintf(\"currencyPair=%s\", symbol)\n\n\terr := g.SendAuthenticatedHTTPRequest(ctx, exchange.RestSpot, http.MethodPost, gateioTradeHistory, params, &result)\n\tif err != nil {\n\t\treturn result, err\n\t}\n\n\tif result.Code > 0 {\n\t\treturn result, fmt.Errorf(\"code:%d message:%s\", result.Code, result.Message)\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "280ff6dd8d7c9cf6e1cc8020c4d4bb68", "score": "0.483857", "text": "func (d *db) loadReadState() *readState {\n\td.readState.RLock()\n\tstate := d.readState.val\n\tstate.ref()\n\td.readState.RUnlock()\n\treturn state\n}", "title": "" }, { "docid": "894017a89a985a4baf16dfe47358ef32", "score": "0.483154", "text": "func (sc *SellerContract) Get(ctx contractapi.TransactionContextInterface, key string) (*SellerObj, error) {\n\t\n existingObj, err := ctx.GetStub().GetState(key)\n if err != nil {\n return nil, err\n }\n\n if existingObj == nil {\n return nil, fmt.Errorf(\"Cannot read world state pair with key %s. Does not exist\", key)\n }\n\n\tsellerObj := new(SellerObj)\n\tif err := json.Unmarshal(existingObj, sellerObj); err != nil {\n\t\treturn nil, fmt.Errorf(\"Data retrieved from world state for key %s was not of type SellerObj\", key)\n\t}\n return sellerObj, nil\n}", "title": "" }, { "docid": "268b581572bde0925303c00cb80faaed", "score": "0.48245755", "text": "func getBankTransactions(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n fmt.Println(\"**********************************************\")\n fmt.Println(\"---------- IN GET BANK TRANSACTIONS ----------\")\n\n // RETURN ERROR IF ARGS IS NOT 1 IN NUMBER\n if len(args) != 1 {\n fmt.Println(\"**************************\")\n fmt.Println(\"Too few argments... Need 1\")\n fmt.Println(\"**************************\")\n return shim.Error(\"Invalid argument count. Expecting 1.\")\n }\n\n // SET ARGUMENTS INTO LOCAL VARIABLES\n _userName := args[0]\n\n // LOG THE ARGUMENTS\n fmt.Println(\"**** Arguments To Function ****\")\n fmt.Println(\"User Name : \", _userName)\n\n // PREPARE THE KEY TO READ BANK TRANSACTIONS\n _bankTransactionKey, err := stub.CreateCompositeKey(PREFIX05IDX, []string{PREFIX05, _userName})\n // CHECK FOR ERROR IN CREATING COMPOSITE KEY\n if err != nil {\n return shim.Error(err.Error())\n }\n fmt.Println(\"getBankTransactions: Prepare Transaction Key Completed\")\n\n // USE THE KEY TO RETRIEVE BANK TRANSACTIONS\n _bankTransactionsAsBytes, err := stub.GetState(_bankTransactionKey)\n if err != nil {\n return shim.Error(err.Error())\n }\n fmt.Println(\"getBankTransactions: Record Retrieved by GetState\")\n\n fmt.Println(string(_bankTransactionsAsBytes))\n fmt.Println(\"---------- OUT GET BANK TRANSACTIONS ----------\")\n fmt.Println(\"***********************************************\")\n\n // RETURN SUCCESS\n return shim.Success(_bankTransactionsAsBytes)\n}", "title": "" }, { "docid": "1a9987848a335f1fd6c83660b7fd6419", "score": "0.48243645", "text": "func (p *BitcoinDAT) OpenTransactionIndexReader() (*TransactionIndexReader, error) {\n\tdb, err := p.openDB(p.datadir + \"/indexes/txindex\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &TransactionIndexReader{db}, nil\n}", "title": "" }, { "docid": "abfe5eebd03252e3dd68d4affb88ea53", "score": "0.48187447", "text": "func (c *noop) Read(_ context.Context, _ *Key, _ interface{}) error {\n\tif c.isStopped() {\n\t\treturn ErrStopped\n\t}\n\treturn ErrNotFound\n}", "title": "" }, { "docid": "174f1a87775c03db1b30e62c3116ee4e", "score": "0.48179883", "text": "func (p *Protocol) ReadState(context.Context, protocol.StateReader, []byte, ...[]byte) ([]byte, uint64, error) {\n\treturn nil, uint64(0), protocol.ErrUnimplemented\n}", "title": "" }, { "docid": "9082a2eb36f20320e6e3e611c8387dff", "score": "0.48178157", "text": "func readStateHistory(stub *shim.ChaincodeStub, assetID string) (AssetStateHistory, error) {\r\n\r\n\tvar ledgerKey = assetID + STATEHISTORYKEY\r\n\tvar assetStateHistory AssetStateHistory\r\n\tvar historyBytes []byte\r\n\r\n\thistoryBytes, err := stub.GetState(ledgerKey)\r\n\tif err != nil {\r\n\t\treturn assetStateHistory, err\r\n\t}\r\n\r\n\terr = json.Unmarshal(historyBytes, &assetStateHistory)\r\n\tif err != nil {\r\n\t\treturn assetStateHistory, err\r\n\t}\r\n\r\n\treturn assetStateHistory, nil\r\n\r\n}", "title": "" }, { "docid": "2419399e2a07e1a6a220c8fc572e8073", "score": "0.48175603", "text": "func (o *State) read(pNow Timestamp, pNode net.HardwareAddr) {\n\tif bytes.Equal([]byte(pNode), o.node) || o.randomSequence {\n\t\to.sequence = uint16(seed.Int()) & 0x3FFF\n\t} else if pNow < o.past {\n\t\to.sequence++\n\t}\n\to.past = pNow\n\to.node = pNode\n}", "title": "" }, { "docid": "3bd0049eb2d3536688a7b36286b7c42e", "score": "0.48156565", "text": "func (t *myChaincode) Query(stub shim.ChaincodeStubInterface, function string, args []string) ([]byte, error) {\n\n\tswitch function {\n\n\tcase \"history\":\n\t\tif len(args) < 2{\n\t\t\treturn nil, errors.New(\"myhistory operation must include at last two arguments, id and a No\")\n\t\t}\n\t\tid := args[0]\n\t\tnum := args[1]\n\n\t\t//some check for the num\n\n\t\tval_num, err := stub.GetState(id + sp + \"numoftx\")\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"history failed. Error accessing state: %s\", err)\n\t\t}\n\t\tint_val, _ := strconv.Atoi(string(val_num))\n\t\tint_num, _ := strconv.Atoi(string(num))\n\t\tfmt.Println(int_val,int_num)\n\t\tif int_val < int_num || int_num <= 0 {\n\t\t\treturn nil,fmt.Errorf(\"Incorrect tx num\")\n\t\t}\n\n\t\tval, err := stub.GetState(id + sp + num)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"history failed. Error accessing state: %s\", err)\n\t\t}\n\t\tif val == nil {\n\t\t\treturn nil, fmt.Errorf(\"get nothing!\")\n\t\t}\n\t\treturn val, nil\n\n\tcase \"getbalance\":\n\t\tif len(args) < 1{\n\t\t\treturn nil, errors.New(\"getnumsofbills operation must include at last one argument, id\")\n\t\t}\n\t\tid := args[0]\n\t\t//Todo: some check for the owner?\n\n\t\tval, err := stub.GetState(id)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"get balance failed. Error accessing state: %s\", err)\n\t\t}\n\t\tif val == nil {\n\t\t\treturn nil, fmt.Errorf(\" the id not exists!\")\n\t\t}\n\n\t\treturn val, nil\n\n\tcase \"gettxnum\":\n\t\tif len(args) < 1 {\n\t\t\treturn nil, errors.New(\"gettxnum operation must include at last one argument, id\")\n\t\t}\n\t\tid := args[0]\n\n\t\tval, err := stub.GetState(id + sp + \"numoftx\")\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"get txnum failed. Error accessing state: %s\", err)\n\t\t}\n\t\tif val == nil {\n\t\t\treturn nil, fmt.Errorf(\"the id not exists!\")\n\t\t}\n\n\t\treturn val, nil\n\n\tdefault:\n\t\treturn nil, errors.New(\"Unsupported operation\")\n\t}\n}", "title": "" }, { "docid": "0d78481e8d8f0487bad11564226fa407", "score": "0.47996935", "text": "func (h *Hippy) Read(fn func(*ReadTx) error) (err error) {\n\t// Get a read transaction from the pool\n\ttx := h.getReadTx()\n\n\th.mux.RLock()\n\tif h.closed {\n\t\terr = ErrIsClosed\n\t} else {\n\t\terr = fn(tx)\n\t}\n\th.mux.RUnlock()\n\n\t// Return read transaction to the pool\n\th.putReadTx(tx)\n\treturn\n}", "title": "" }, { "docid": "fc32654d65439a80b08d670536407629", "score": "0.47989556", "text": "func getAmountAndTypeOnchain(symbol, side string, ethAmount, qty float64) (string, float64, float64) {\n\ttradeType, ethChange, tokenChange := getAmountAndType(symbol, side, ethAmount, qty)\n\tif tradeType == buyType {\n\t\ttradeType = sellType\n\t} else {\n\t\ttradeType = buyType\n\t}\n\treturn tradeType, ethChange * -1, tokenChange * -1\n}", "title": "" }, { "docid": "d747f86dae3246f9cfb0b7eb659502da", "score": "0.47975537", "text": "func (t *AllMarketTicker) Read() (*AllMarketTickerUpdate, error) {\n\tbuf := bytebufferpool.Get()\n\t_, data, err := t.conn.ReadMessage(buf.B)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tr := &AllMarketTickerUpdate{}\n\terr = json.Unmarshal(data, r)\n\tbytebufferpool.Put(buf)\n\treturn r, err\n}", "title": "" }, { "docid": "9471afb25dede951cd11c68379e7ac2a", "score": "0.47926658", "text": "func (t *SimpleChaincode) Query(stub *shim.ChaincodeStub, function string, args []string) ([]byte, error) {\r\n fmt.Printf(\"Query(...,'%s',%v)\\n\",function,args)\r\n if len(args) < 1 {\r\n return nil, errors.New(\"Incorrect number of arguments. Expecting 1 or more arguments\")\r\n }\r\n switch function {\r\n case \"query\" :\r\n key := args[0]\r\n fmt.Println(\"Generic Query call, get state '\"+key+\"'\")\r\n bytes, err := stub.GetState(key)\r\n if err != nil {\r\n fmt.Println(\"Error: get state '\"+key+\"' => \"+err.Error())\r\n return nil, err\r\n }\r\n\r\n fmt.Printf(\"Returning '%v' -> %v\\n\",key,bytes)\r\n return bytes, nil\r\n case \"getRowUsers\" :\r\n return t.getRowUsers(stub,args[0]);\r\n case \"getRowAwards\" :\r\n if len(args) < 2 {\r\n return nil, errors.New(\"Incorrect number of arguments. Expecting 2 or more arguments\")\r\n }\r\n return t.getRowAwards(stub,args[0],args[1]);\r\n case \"getRowsByUIdAwards\" :\r\n return t.getRowsByUIdAwards(stub,args[0]);\r\n case \"getTable\" :\r\n return t.getTable(stub,args[0]);\r\n default:\r\n return nil, errors.New(\"Unsupported function '\"+function+\"'\")\r\n }\r\n}", "title": "" }, { "docid": "c7f9f23c7410fd754c8845312b04718f", "score": "0.47852907", "text": "func GetOpenOrder(db *gorm.DB) (*Order, error) {\n\torder := Order{}\n\tif err := db.Where(\"approved = ?\", false).First(&order).Error; err != nil {\n\t\tfmt.Println(\"[ERROR] \", err.Error())\n\t\treturn nil, err\n\t}\n\n\tfmt.Println(\"[INFO] Found open order!\")\n\tfmt.Println(\"[INFO] Will find purchase Products that belong to it\")\n\n\tpproducts := []PurchaseProduct{}\n\tif err := db.Model(order).Related(&pproducts, \"Pproducts\").Error; err != nil {\n\t\tfmt.Println(\"[ERROR] \", err.Error())\n\t\treturn nil, err\n\t}\n\n\tfmt.Println(\"[INFO] Found all purchase products!!!!\")\n\torder.Pproducts = pproducts\n\n\treturn &order, nil\n}", "title": "" }, { "docid": "69815dbd9f1bb34332187c321a60a88c", "score": "0.47556296", "text": "func (t *SimpleChaincode) clearOpenTrades(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvalAsbytes, err := stub.GetState(openTradesStr) //get the marble from chaincode state\n\n\tvar trades AllOpenTrades\n\tjson.Unmarshal(valAsbytes, &trades)\t\t\n\n\ttrades.OpenTrades = []AnOpenTrade{} \t\t//remove all trades\n\ttradesAsBytes, _ := json.Marshal(trades)\n\terr = stub.PutState(openTradesStr, tradesAsBytes)\t\t\t\t\t\t\t\t\t\t\t\t//rewrite open orders\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\treturn shim.Success([]byte(\"success\"))\n}", "title": "" }, { "docid": "77996324a259f11713f3c6f0bde5cc04", "score": "0.47555146", "text": "func (e *Engine) Read(input *contract.ReadInput) (*contract.ReadOutput, error) {\n\tif input == nil {\n\t\treturn nil, fmt.Errorf(\"empty input specified\")\n\t}\n\n\tvar retQueryVal []byte\n\tvar retVal interface{}\n\tvar retExpiresAt int64\n\n\tif err := e.conn.QueryRow(\n\t\tcontext.Background(),\n\t\t\"SELECT _value, _expires_at FROM redix_data_v5 WHERE _key = $1\",\n\t\tinput.Key,\n\t).Scan(&retQueryVal, &retExpiresAt); err != nil {\n\t\tif err == pgx.ErrNoRows {\n\t\t\treturn &contract.ReadOutput{}, nil\n\t\t}\n\n\t\treturn nil, err\n\t}\n\n\tif err := json.Unmarshal(retQueryVal, &retVal); err != nil {\n\t\treturn nil, err\n\t}\n\n\treadOutput := contract.ReadOutput{\n\t\tKey: input.Key,\n\t\tValue: []byte(fmt.Sprintf(\"%v\", retVal)),\n\t\tTTL: 0,\n\t\tExists: true,\n\t}\n\n\tif retExpiresAt != 0 {\n\t\treadOutput.TTL = time.Unix(0, retExpiresAt).Sub(time.Now())\n\t}\n\n\tdeleter := func() {\n\t\t// TODO report any expected error?\n\t\te.conn.Exec(context.Background(), \"DELETE FROM redix_data_v5 WHERE _key = $1\", input.Key)\n\t}\n\n\tif readOutput.TTL < 0 {\n\t\tgo (func() {\n\t\t\tdeleter()\n\t\t})()\n\t\treturn &contract.ReadOutput{}, nil\n\t}\n\n\tif input.Delete {\n\t\tgo (func() {\n\t\t\tdeleter()\n\t\t})()\n\t}\n\n\treturn &readOutput, nil\n}", "title": "" }, { "docid": "e075d92e10d7a46ddcbaf5ac14e1555e", "score": "0.4743477", "text": "func (m *MarketClient) GetOpenInterest(symbol string) (interface{}, error) {\n\tvar err error\n\tif symbol == \"\" {\n\t\terr = errors.New(SymbolEmpty)\n\t\treturn nil, err\n\t}\n\tparams := fmt.Sprintf(\"symbol=%s\", symbol)\n\treq, err := m.Builder.Build(http.MethodGet, \"/fapi/v1/openInterest\", params)\n\tif err != nil {\n\t\tlogger.Error(\"Failed to build url: %s\", err.Error())\n\t}\n\tres, err := binance.HttpRequest(req)\n\tvar parser map[string]interface{}\n\terr = json.Unmarshal(res, &parser)\n\tif _, ok := parser[\"code\"]; ok {\n\t\tresult := model.APIErrorResponse{}\n\t\terr = json.Unmarshal(res, &result)\n\t\treturn result, err\n\t}\n\tresult := OpenInterestResponse{}\n\terr = json.Unmarshal(res, &result)\n\treturn result, err\n}", "title": "" }, { "docid": "dbde14270c7b27f081e50d199265067e", "score": "0.4742019", "text": "func (b simBroker) Open(ch chan<- QuoteEvent) (Broker, error) {\n\tacctLock.Lock()\n\tdefer acctLock.Unlock()\n\n\tvar acct = account{fundStart: defaultFund, fund: defaultFund, evChan: ch,\n\t\tequity: defaultFund, balance: defaultFund}\n\tacct.orders = []int{}\n\tacct.pos = map[SymbolKey]*PositionType{}\n\tnAccounts++\n\t//log.Info(\"dump acct:\", ch, nAccounts, acct)\n\t//simAccounts is map\n\tbb := simBroker(nAccounts)\n\n\tsimAccounts[bb] = &acct\n\treturn bb, nil\n}", "title": "" }, { "docid": "adab8866a3b34f3c3351f956e40bc746", "score": "0.4737077", "text": "func (e *GateIo) GetTrades(stockType string) interface{} {\n\treturn nil\n}", "title": "" }, { "docid": "a6ab0ce1c6746d98c1b0649cd98fcbe4", "score": "0.47289288", "text": "func (e *Homiex) doTradeHistory(operation *exchange.PublicOperation) error {\n\tsymbol := e.GetSymbolByPair(operation.Pair)\n\n\tget := &utils.HttpGet{\n\t\tURI: fmt.Sprintf(\"%s/openapi/quote/v1/trades?symbol=%s&limit=%v\", API_URL, symbol, 1000),\n\t}\n\n\terr := utils.HttpGetRequest(get)\n\n\tif err != nil {\n\t\treturn err\n\n\t} else {\n\t\ttradeHistory := TradeHistory{}\n\t\tif err := json.Unmarshal(get.ResponseBody, &tradeHistory); err != nil {\n\t\t\treturn err\n\t\t} else if len(tradeHistory) == 0 {\n\t\t\treturn fmt.Errorf(\"%v TradeHistory got 0 record, %v\", e.GetName(), string(get.ResponseBody))\n\t\t}\n\n\t\toperation.TradeHistory = []*exchange.TradeDetail{}\n\t\tfor _, trade := range tradeHistory {\n\t\t\ttd := &exchange.TradeDetail{}\n\n\t\t\ttd.ID = fmt.Sprintf(\"%d\", trade.Time)\n\t\t\tif trade.IsBuyerMaker {\n\t\t\t\ttd.Direction = exchange.Buy\n\t\t\t} else {\n\t\t\t\ttd.Direction = exchange.Sell\n\t\t\t}\n\n\t\t\ttd.Quantity, err = strconv.ParseFloat(trade.Qty, 64)\n\t\t\ttd.Rate, err = strconv.ParseFloat(trade.Price, 64)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%v TradeHistory err: %v\", e.GetName(), err)\n\t\t\t}\n\n\t\t\ttd.TimeStamp = trade.Time\n\n\t\t\toperation.TradeHistory = append(operation.TradeHistory, td)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "32306a3966f0b92febc976c227162adc", "score": "0.47190043", "text": "func (t *IndivBookTicker) Read() (*IndivBookTickerUpdate, error) {\n\tbuf := bytebufferpool.Get()\n\t_, data, err := t.conn.ReadMessage(buf.B)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tr := &IndivBookTickerUpdate{}\n\terr = json.Unmarshal(data, r)\n\tbytebufferpool.Put(buf)\n\treturn r, err\n}", "title": "" }, { "docid": "ced3563e2a14b21ac9c63638bba27a45", "score": "0.47127262", "text": "func (rf *Raft) readPersist(data []byte) {\n\tif data == nil || len(data) < 1 { // bootstrap without any state?\n\t\trf.Logf(\"read nil persist\")\n\t\treturn\n\t}\n\t// Your code here (2C).\n\t// Example:\n\tr := bytes.NewBuffer(data)\n\td := labgob.NewDecoder(r)\n\tvar p PersistState\n\tif d.Decode(&p) != nil {\n\t rf.Logf(\"read persist fail\")\n\t return\n\t}\n\trf.Logf(\"read persist %+v\", p)\n\trf.CurrentTerm = p.CurrentTerm\n\trf.VotedFor = p.VotedFor\n\trf.Log = p.Log\n\trf.CompactedLen = p.CompactedLen\n\trf.IncludeIndex = p.IncludeIndex\n\trf.IncludeTerm = p.IncludeTerm\n\trf.SnapshotData = p.SnapshotData\n\trf.Cursor = rf.LogLen() - 1\n\trf.Logf(\"read persist success\")\n}", "title": "" }, { "docid": "a65610e0774e098ba29ee909fc8674ab", "score": "0.47115946", "text": "func (_Contract *ContractSession) Readme() (*big.Int, error) {\n\treturn _Contract.Contract.Readme(&_Contract.CallOpts)\n}", "title": "" }, { "docid": "c47cb40abb7d6a4585e312a65eee6969", "score": "0.47033465", "text": "func (t *tesseraPrivateTxManager) receive(data common.EncryptedPayloadHash, isRaw bool) (string, []string, []byte, *engine.ExtraMetadata, error) {\n\tif common.EmptyEncryptedPayloadHash(data) {\n\t\treturn \"\", nil, nil, nil, nil\n\t}\n\tcacheKey := data.Hex()\n\tif isRaw {\n\t\t// indicate the cache item is incomplete, this will be fulfilled in SendSignedTx\n\t\tcacheKey = fmt.Sprintf(\"%s-incomplete\", cacheKey)\n\t}\n\tif item, found := t.cache.Get(cacheKey); found {\n\t\tcacheItem, ok := item.(cache.PrivateCacheItem)\n\t\tif !ok {\n\t\t\treturn \"\", nil, nil, nil, fmt.Errorf(\"unknown cache item. expected type PrivateCacheItem\")\n\t\t}\n\t\treturn cacheItem.Extra.Sender, cacheItem.Extra.ManagedParties, cacheItem.Payload, &cacheItem.Extra, nil\n\t}\n\n\turi := fmt.Sprintf(\"/transaction/%s?isRaw=%v\", url.PathEscape(data.ToBase64()), isRaw)\n\n\tvar statusCode int\n\tvar err error\n\tresponse := new(receiveResponse)\n\n\tfor i := 0; i < 5; i++ {\n\t\tstatusCode, err = t.submitJSON(\"GET\", uri, nil, response)\n\t\tif err != nil && statusCode != http.StatusNotFound {\n\t\t\tlog.Warn(\"Failed to fetch data from tessera\", \"retry\", i, \"uri\", uri, \"statuscode\", statusCode, \"err\", err)\n\t\t\ttime.Sleep(1 * time.Second)\n\t\t\tcontinue\n\t\t}\n\t\tbreak\n\t}\n\n\tif statusCode == http.StatusNotFound {\n\t\tlog.Debug(\"data not found in tessera\", \"uri\", uri, \"statuscode\", statusCode, \"err\", err)\n\t\treturn \"\", nil, nil, nil, nil\n\t} else if err != nil {\n\t\tlog.Error(\"Failed to fetch data from tessera\", \"uri\", uri, \"statuscode\", statusCode, \"err\", err)\n\t\tos.Exit(112)\n\t}\n\n\tvar extra engine.ExtraMetadata\n\tif !isRaw {\n\t\tacHashes, err := common.Base64sToEncryptedPayloadHashes(response.AffectedContractTransactions)\n\t\tif err != nil {\n\t\t\treturn \"\", nil, nil, nil, fmt.Errorf(\"unable to decode ACOTHs %v. Cause: %v\", response.AffectedContractTransactions, err)\n\t\t}\n\t\tacMerkleRoot, err := common.Base64ToHash(response.ExecHash)\n\t\tif err != nil {\n\t\t\treturn \"\", nil, nil, nil, fmt.Errorf(\"unable to decode execution hash %s. Cause: %v\", response.ExecHash, err)\n\t\t}\n\t\textra = engine.ExtraMetadata{\n\t\t\tACHashes: acHashes,\n\t\t\tACMerkleRoot: acMerkleRoot,\n\t\t\tPrivacyFlag: response.PrivacyFlag,\n\t\t\tManagedParties: response.ManagedParties,\n\t\t\tSender: response.SenderKey,\n\t\t}\n\t} else {\n\t\textra = engine.ExtraMetadata{\n\t\t\tManagedParties: response.ManagedParties,\n\t\t\tSender: response.SenderKey,\n\t\t}\n\t}\n\n\tt.cache.Set(cacheKey, cache.PrivateCacheItem{\n\t\tPayload: response.Payload,\n\t\tExtra: extra,\n\t}, gocache.DefaultExpiration)\n\n\treturn response.SenderKey, response.ManagedParties, response.Payload, &extra, nil\n}", "title": "" }, { "docid": "d2c2f9fa2909b3f85f101f5fec2ce0c2", "score": "0.46998265", "text": "func (s *untieMerge) ToSellTrade() interfaces.State {\n\treturn &sellTrade{}\n}", "title": "" }, { "docid": "139f62bb18f1e3aff0baa796c8cb9ae5", "score": "0.46953622", "text": "func (cs *ChainSupport) Reader() ledger.Reader {\n\treturn cs.ledger\n}", "title": "" }, { "docid": "42d434b849490c3f0a73a042a4f126ce", "score": "0.469219", "text": "func ReadState(ctx context.Context, id ID) (pb.Invocation_State, error) {\n\tvar state pb.Invocation_State\n\terr := ReadColumns(ctx, id, map[string]interface{}{\"State\": &state})\n\treturn state, err\n}", "title": "" }, { "docid": "4a9b2c94ab7ccfb2937eff5e5a8e3115", "score": "0.46822062", "text": "func openPaymentChannelWriteinChainState(state interfaces.ChainStateOperation,\n\tchannelId fields.ChannelId,\n\tarbitrationLockBlock fields.VarUint2,\n\tinterestAttribution fields.VarUint1,\n\tleftAddress fields.Address,\n\tleftAmount fields.Amount,\n\tleftSatoshi fields.SatoshiVariation,\n\trightAddress fields.Address,\n\trightAmount fields.Amount,\n\trightSatoshi fields.SatoshiVariation,\n) error {\n\n\tvar realLeftSatoshi = leftSatoshi.GetRealSatoshi()\n\tvar realRightSatoshi = rightSatoshi.GetRealSatoshi()\n\n\tvar e error\n\t// Query whether the channel exists\n\tsto, e := state.Channel(channelId)\n\tif e != nil {\n\t\treturn e\n\t}\n\t// Channel IDS with the same left and right addresses and closed by consensus can be reused\n\tvar reuseVersion fields.VarUint4 = 1\n\tvar isIdCanUse = (sto == nil) ||\n\t\t(sto.IsAgreementClosed() && sto.LeftAddress.Equal(leftAddress) && sto.RightAddress.Equal(rightAddress))\n\tif isIdCanUse == false {\n\t\tif sto.IsFinalDistributionClosed() {\n\t\t\treturn fmt.Errorf(\"Payment Channel Id <%s> finally arbitration closed.\", hex.EncodeToString(channelId))\n\t\t} else if sto.IsOpening() {\n\t\t\treturn fmt.Errorf(\"Payment Channel Id <%s> is opening.\", hex.EncodeToString(channelId))\n\t\t}\n\t\treturn fmt.Errorf(\"Payment Channel Id <%s> already exist.\", hex.EncodeToString(channelId))\n\t}\n\tif sto != nil {\n\t\treuseVersion = sto.ReuseVersion + 1 // Reuse version number growth\n\t}\n\t// Channel ID validity\n\tif len(channelId) != stores.ChannelIdLength || channelId[0] == 0 || channelId[stores.ChannelIdLength-1] == 0 {\n\t\treturn fmt.Errorf(\"Payment Channel Id <%s> format error.\", hex.EncodeToString(channelId))\n\t}\n\t// Two addresses cannot be the same\n\tif leftAddress.Equal(rightAddress) {\n\t\treturn fmt.Errorf(\"Left address cannot equal with right address.\")\n\t}\n\t// Cannot be negative, or both channels are zero at the same time (one can be positive and the other zero)\n\tif leftAmount.IsNegative() || leftAmount.IsNegative() ||\n\t\t(leftAmount.IsEmpty() && rightAmount.IsEmpty() && realLeftSatoshi==0 && realRightSatoshi==0 ) {\n\t\treturn fmt.Errorf(\"OpenPaymentChannel Payment Channel create error: left or right Amount is not positive.\")\n\t}\n\t// Check the number of digits stored in the amount\n\tlabt, _ := leftAmount.Serialize()\n\trabt, _ := rightAmount.Serialize()\n\tif len(labt) > 6 || len(rabt) > 6 {\n\t\t// Avoid locking the storage digits of funds too long, resulting in the value storage digits after compound interest calculation exceeding the maximum range\n\t\treturn fmt.Errorf(\"Payment Channel create error: left or right Amount bytes too long.\")\n\t}\n\n\t// Check whether the balance is sufficient\n\tbls1, e := state.Balance(leftAddress)\n\tif e != nil {\n\t\treturn e\n\t}\n\tif bls1 == nil {\n\t\treturn fmt.Errorf(\"OpenPaymentChannel Address %s Balance cannot empty.\", leftAddress.ToReadable())\n\t}\n\tamt1 := bls1.Hacash\n\tif amt1.LessThan(&leftAmount) {\n\t\treturn fmt.Errorf(\"OpenPaymentChannel Address %s Balance is not enough. need %s but got %s\", leftAddress.ToReadable(), leftAmount.ToFinString(), amt1.ToFinString())\n\t}\n\tsat1 := bls1.Satoshi\n\tif sat1 < realLeftSatoshi {\n\t\treturn fmt.Errorf(\"OpenPaymentChannel Address %s Satoshi is not enough. need %d but got %d\", leftAddress.ToReadable(), leftSatoshi, sat1)\n\t}\n\n\tbls2, e := state.Balance(rightAddress)\n\tif e != nil {\n\t\treturn e\n\t}\n\tif bls2 == nil {\n\t\treturn fmt.Errorf(\"Address %s Balance is not enough.\", rightAddress.ToReadable())\n\t}\n\tamt2 := bls2.Hacash\n\tif amt2.LessThan(&rightAmount) {\n\t\treturn fmt.Errorf(\"OpenPaymentChannel Address %s Balance is not enough. need %s but got %s\", rightAddress.ToReadable(), rightAmount.ToFinString(), amt2.ToFinString())\n\t}\n\tsat2 := bls2.Satoshi\n\tif sat2 < realRightSatoshi {\n\t\treturn fmt.Errorf(\"OpenPaymentChannel Address %s Satoshi is not enough. need %d but got %d\", rightAddress.ToReadable(), rightSatoshi, sat2)\n\t}\n\n\tcurheight := state.GetPendingBlockHeight()\n\t// Create channel\n\tvar storeItem = stores.CreateEmptyChannel()\n\tstoreItem.BelongHeight = fields.BlockHeight(curheight)\n\t//storeItem.ArbitrationLockBlock = fields.VarUint2(uint16(5000)) // The lock-in period unilaterally proposed is about 17 days\n\t//storeItem.InterestAttribution = fields.VarUint1(0) // By default, interest distribution is shared by the two parties according to the close amount\n\tstoreItem.ArbitrationLockBlock = arbitrationLockBlock\n\tstoreItem.InterestAttribution = interestAttribution\n\tstoreItem.LeftAddress = leftAddress\n\tstoreItem.LeftAmount = leftAmount\n\tstoreItem.LeftSatoshi = leftSatoshi\n\tstoreItem.RightAddress = rightAddress\n\tstoreItem.RightAmount = rightAmount\n\tstoreItem.RightSatoshi = rightSatoshi\n\tstoreItem.ReuseVersion = reuseVersion // Reuse version number\n\tstoreItem.SetOpening() // Open status\n\t// testing environment\n\tif sys.TestDebugLocalDevelopmentMark {\n\t\tstoreItem.ArbitrationLockBlock = fields.VarUint2(uint16(20))\n\t}\n\t// Deduction balance\n\tif leftAmount.IsPositive() {\n\t\te = DoSubBalanceFromChainStateV3(state, leftAddress, leftAmount)\n\t\tif e != nil {\n\t\t\treturn e\n\t\t}\n\n\t}\n\tif rightAmount.IsPositive() {\n\t\te = DoSubBalanceFromChainStateV3(state, rightAddress, rightAmount)\n\t\tif e != nil {\n\t\t\treturn e\n\t\t}\n\t}\n\tif realLeftSatoshi > 0 {\n\t\te = DoSubSatoshiFromChainStateV3(state, leftAddress, realLeftSatoshi)\n\t\tif e != nil {\n\t\t\treturn e\n\t\t}\n\t}\n\tif realRightSatoshi > 0 {\n\t\te = DoSubSatoshiFromChainStateV3(state, rightAddress, realRightSatoshi)\n\t\tif e != nil {\n\t\t\treturn e\n\t\t}\n\t}\n\t// Storage channel\n\te = state.ChannelCreate(channelId, storeItem)\n\tif e != nil {\n\t\treturn e\n\t}\n\t// Total supply statistics\n\ttotalsupply, e := state.ReadTotalSupply()\n\tif e != nil {\n\t\treturn e\n\t}\n\t// Cumulative locked HAC\n\taddamt := leftAmount.ToMei() + rightAmount.ToMei()\n\taddsat := realRightSatoshi + realRightSatoshi\n\tif addamt > 0 {\n\t\ttotalsupply.DoAdd(stores.TotalSupplyStoreTypeOfLocatedHACInChannel, addamt)\n\t}\n\tif addsat > 0 {\n\t\ttotalsupply.DoAdd(stores.TotalSupplyStoreTypeOfLocatedSATInChannel, float64(addsat))\n\t}\n\ttotalsupply.DoAdd(stores.TotalSupplyStoreTypeOfChannelOfOpening, 1)\n\t// update total supply\n\te3 := state.UpdateSetTotalSupply(totalsupply)\n\tif e3 != nil {\n\t\treturn e3\n\t}\n\t//\n\treturn nil\n}", "title": "" }, { "docid": "5e4737173c65608fd25212f2ffb16d10", "score": "0.46815187", "text": "func testStateRead(t *testing.T, path string) *states.State {\n\tt.Helper()\n\n\tf, err := os.Open(path)\n\tif err != nil {\n\t\tt.Fatalf(\"err: %s\", err)\n\t}\n\tdefer f.Close()\n\n\tsf, err := statefile.Read(f)\n\tif err != nil {\n\t\tt.Fatalf(\"err: %s\", err)\n\t}\n\n\treturn sf.State\n}", "title": "" }, { "docid": "4d1108a21bf35db362b396ced02d145e", "score": "0.46801767", "text": "func (t *SimpleChaincode) get(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" } ]
ee8be64b8365b1b81db500b9a631374a
Close closes the both of registered reader and writer and finishes the forwarder.
[ { "docid": "80936dfe418cc1d2eb0f995a233177bd", "score": "0.73053974", "text": "func (f *SingleForwarder) Close() (retErr error) {\n\tf.closeOnce.Do(func() {\n\t\tf.curRMu.Lock()\n\t\tr := f.curR\n\t\tf.curR = nil\n\t\tf.curRMu.Unlock()\n\t\tif r != nil {\n\t\t\tif err := r.Close(); err != nil {\n\t\t\t\tretErr = err\n\t\t\t}\n\t\t}\n\t\t// TODO: Wait until read data fully written to the current writer if needed.\n\t\tf.curWMu.Lock()\n\t\tw := f.curW\n\t\tf.curW = nil\n\t\tf.curWMu.Unlock()\n\t\tif w != nil {\n\t\t\tif err := w.Close(); err != nil {\n\t\t\t\tretErr = err\n\t\t\t}\n\t\t}\n\t\tclose(f.doneCh)\n\t})\n\treturn retErr\n}", "title": "" } ]
[ { "docid": "23c9460c316c8b72258a31479cee392d", "score": "0.6682741", "text": "func (tr *GthReader) Close() {\n\ttr.reader.Close()\n\ttr.writer.Close()\n}", "title": "" }, { "docid": "adc57834cdaa404890be7f3a42693c91", "score": "0.6578449", "text": "func (r *Resolver) Close() {\n\tselect {\n\tcase <-r.closed:\n\t\treturn\n\tdefault:\n\t\t// continue\n\t}\n\tclose(r.closed)\n\n\tr.forwarder.Close()\n}", "title": "" }, { "docid": "eaa2c0c59d141fde94b10064ef834264", "score": "0.63309735", "text": "func (r *Ripper) Close() {\n\tr.r.Close()\n\tr.w.Close()\n}", "title": "" }, { "docid": "6a8af84a6a66edbcd426807600e0703a", "score": "0.6251182", "text": "func (r *ProxyReader) Close() (err error) {\n\tif closer, ok := r.reader.(io.Closer); ok {\n\t\treturn closer.Close()\n\t}\n\tclose(r.c)\n\treturn\n}", "title": "" }, { "docid": "0d97d35ef8c11e2157d9d0fbc0faf873", "score": "0.62298363", "text": "func (f *Forwarder) Close() error {\n\tif f.lis != nil {\n\t\treturn f.lis.Close()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "aa445685708e1db6fc89fe0674dd3735", "score": "0.62031597", "text": "func (r *Reader) Close() error {\n\tr.mu.Lock()\n\tdefer r.mu.Unlock()\n\n\tfor shard, tr := range r.shards {\n\t\ttr.Release()\n\t\tdelete(r.shards, shard)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "074fcd6f485ec6851c5f7a8f5be62721", "score": "0.6184079", "text": "func (w *ReaderMsgp) Close() {\n\tw.r.Reset(nil)\n\treaderMsgpPool.Put(w)\n}", "title": "" }, { "docid": "579648fb046ff5d054589b2be09c96dd", "score": "0.61790484", "text": "func (r *ProcessLogReader) Close() error {\n\tr.fin <- struct{}{}\n\treturn r.f.Close()\n}", "title": "" }, { "docid": "e22fcf447108b185c94f0a851aa65137", "score": "0.617249", "text": "func (h *Handler) Close() {\n\tfor _, w := range h.writers {\n\t\terr := w.Close()\n\t\tif err != nil {\n\t\t\tlogError(err)\n\t\t}\n\t}\n\th.writers = nil\n}", "title": "" }, { "docid": "00d42c38908c293a178fbc69301bfe34", "score": "0.61416435", "text": "func (w *wrapReadCloser) Close() error {\n\tw.reader.Close()\n\tw.writer.Close()\n\treturn nil\n}", "title": "" }, { "docid": "29a9d8efb13c7baa31fe4cefa933a7de", "score": "0.6135252", "text": "func (f *Forwarder) Close() error {\n\treturn f.router.Close()\n}", "title": "" }, { "docid": "beeb85a86b45dc892764b6321f06c9cb", "score": "0.6126955", "text": "func (w *Reader) Close() error {\n\treturn w.lr.Close()\n}", "title": "" }, { "docid": "048cc8ce791952e7f00d18834d08bb19", "score": "0.6117974", "text": "func (r *ShardReader) Close(ctx context.Context) {\n\tfor f := range r.fieldReaders {\n\t\tif fr := r.fieldReaders[f]; fr != nil {\n\t\t\tfr.Close(ctx)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3cfb06a4ae5ad4aeffc3181528d1399e", "score": "0.6096708", "text": "func (r *RaptorCodeReader) Close() error {\n\tif r.rcUDPReader != nil {\n\t\t// TODO: r.rcUDPReader.Close()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "79c5875ce124d87da21045e35fd946f8", "score": "0.6089346", "text": "func (jp *Handler) Close() error {\n\te1 := jp.Reader.Close()\n\te2 := jp.Writer.Close()\n\n\tif e1 != nil {\n\t\treturn e1\n\t}\n\treturn e2\n}", "title": "" }, { "docid": "40122e75f28ae373fd4f920b0d620d16", "score": "0.6069228", "text": "func (r *Reassembler) Close() {\n\tr.c.Close()\n}", "title": "" }, { "docid": "5876ce38eb0929414c22be27726820e0", "score": "0.59990823", "text": "func (r *Reader) Close() error {\n\tfor _, iter := range r.iterators {\n\t\titer.Close()\n\t}\n\n\tr.txn.Discard()\n\treturn nil\n}", "title": "" }, { "docid": "d88f14e399450d3353c1156aceeb8ac2", "score": "0.59817815", "text": "func (r *Reader) Close() error {\n\treturn nil\n}", "title": "" }, { "docid": "d3f064b4a1f491a28cfe8271488d39eb", "score": "0.597846", "text": "func (it *RewardsStakedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "1405c9480ff51fda2ce878508ae75e39", "score": "0.5978168", "text": "func (z *Reader) Close() error {}", "title": "" }, { "docid": "b6ae50e5f7ce4458b2859ecf1a2c2548", "score": "0.59739643", "text": "func (c *collector) Close() {}", "title": "" }, { "docid": "5407bdd4fbc5bca7ac3eae4be95506b4", "score": "0.5971251", "text": "func (self *FileHandler) Close() {\n\tself.StreamHandler.Close2()\n}", "title": "" }, { "docid": "552607c028b54c7ce4a2f4699aa79c56", "score": "0.59681886", "text": "func (rdr *Reader) Close() {\n\trdr.StopScan()\n\tfor _, thisFunc := range rdr.deferredUntilClose {\n\t\tthisFunc()\n\t}\n\trdr.deferredUntilClose = nil\n}", "title": "" }, { "docid": "4decf5caca318472b83f9138fe64e125", "score": "0.59653246", "text": "func (r *Reader) Close() {\n\tclose(r.stop)\n\n\t_ = r.client.Close()\n}", "title": "" }, { "docid": "08702b4d9f976688d6488d4a4a1bd4e9", "score": "0.5961864", "text": "func (it *LinkContractForwardToIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "72729364cf2b935b39984be0a3b598b3", "score": "0.596083", "text": "func (c *ProtocolReadWriter) Close() (err error) {\n\tdefer func() {\n\t\trecovered := recover()\n\t\tif recovered == nil {\n\t\t\terr = nil\n\t\t} else {\n\t\t\terr = recovered.(error)\n\t\t}\n\t}()\n\tclose(c.closeReq) // signal that we should shut everything down\n\treturn <-c.closeRes\n}", "title": "" }, { "docid": "ac75d0163e3878ddc01f6dd7dc278e0c", "score": "0.5948925", "text": "func (r *Reader) Close() error {\n\terr := r.psc.Unsubscribe()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn r.conn.Close()\n}", "title": "" }, { "docid": "afdb131ced4eba40b7cd1b7dbb1a2286", "score": "0.5948478", "text": "func (w *writer) Close() (err error) {\n\tselect {\n\tcase <-w.exited:\n\t\treturn w.err\n\tdefault:\n\t}\n\tif w.flush != nil {\n\t\terr := w.flush(w)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tclose(w.input)\n\tclose(w.write)\n\t<-w.exited\n\n\tif w.close != nil {\n\t\terr := w.close(w)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn w.err\n}", "title": "" }, { "docid": "dd7e9afb59b41f425d19e13c41582056", "score": "0.59432244", "text": "func (w *Writer) Close() error {\n\t// If stream is already closed, it is reported by `writeChunk`.\n\t_, err := w.writeChunk(nil, operationFinish)\n\tw.dst = nil\n\treturn err\n}", "title": "" }, { "docid": "039792c70c62ecb015f27e43195ed471", "score": "0.59269613", "text": "func (f *ForwardConn) Close() (err error) {\n\tf.closeOnce.Do(func() {\n\t\terr = f.srv.Close()\n\t\terr = f.remoteConn.Close()\n\t\tRemoveForwardConn(f.ID)\n\t})\n\treturn err\n}", "title": "" }, { "docid": "3ddabf93823c0ceede49c2248ab34895", "score": "0.5922885", "text": "func (rw *DirRewriter) Close(ctx context.Context) {\n\trw.ws.Close()\n\n\trw.cache.Close(ctx)\n}", "title": "" }, { "docid": "ae46c56bba4f5cb29006f8ba2cecb07d", "score": "0.5911119", "text": "func (g *GZIPReader) Close() error {\n\n\tif g.inReader != nil {\n\t\terr := g.inReader.Close()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\terr := g.gzipReader.Close()\n\treturn err\n}", "title": "" }, { "docid": "840a63d90682deb79c307a1293036fdd", "score": "0.5878013", "text": "func (it *RegisterRegisteredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "b89084bc6608b671f4b81627719d2de7", "score": "0.5877425", "text": "func (r *reader) Close() {\n\tclose(r.i)\n}", "title": "" }, { "docid": "d628f2d4402eba02282bb3dfc5929b64", "score": "0.58733934", "text": "func (rh *RegistrationHandler) Close() error {\n\tif !rh.closed {\n\t\trh.closed = true\n\t\tclose(rh.requestStream)\n\t\treturn nil\n\t}\n\treturn fmt.Errorf(\"Cannot close a closed DataspaceHandler\")\n}", "title": "" }, { "docid": "f26e883a35a17e3a31e86386f6c63105", "score": "0.58597106", "text": "func (w *writer) Close() error {\n\tfor w.parent != nil {\n\t\tw = w.parent\n\t}\n\n\tw.once.Do(func() {\n\t\tclose(w.msgs)\n\t\tselect {\n\t\tcase <-w.running:\n\t\t\t<-w.done\n\t\t}\n\t})\n\treturn nil\n}", "title": "" }, { "docid": "bccd9aff19676d4933e137aed4fbfe9a", "score": "0.58593535", "text": "func (l *Forwarder) Close() error {\n\tl.Lock()\n\tdefer l.Unlock()\n\tif l.isClosed {\n\t\treturn nil\n\t}\n\tl.isClosed = true\n\treturn l.sessionLogger.Finalize()\n}", "title": "" }, { "docid": "7fd39f5c4697d45f167d2745ceed8df9", "score": "0.58592397", "text": "func (file *objectReader) Close() (err error) {\n\t// Close the sftpFile - this will likely cause the WriteTo to error\n\terr = file.sftpFile.Close()\n\t// Close the pipeReader so writes to the pipeWriter fail\n\t_ = file.pipeReader.Close()\n\t// Wait for the background process to finish\n\t<-file.done\n\t// Show connection no longer in use\n\tfile.f.removeSession()\n\treturn err\n}", "title": "" }, { "docid": "70d2fd0c481ba324df496705f6ef71bf", "score": "0.58559626", "text": "func (writer *Writer) Close() error {\n\treturn nil\n}", "title": "" }, { "docid": "7fdb9c1f234964d2c75a88efea2f7ff3", "score": "0.5829122", "text": "func (w *WriterMsgp) Close() {\n\tw.w.Reset(nil)\n\tw.b.Reset()\n\twriterMsgpPool.Put(w)\n}", "title": "" }, { "docid": "8d57bb6c497607792b9d71a0c2c54467", "score": "0.5829117", "text": "func (r *Resolver) Close() {\n\n}", "title": "" }, { "docid": "e05bf77afad3571416cd746ffbe63bdd", "score": "0.5828332", "text": "func (it *MigrateETHDKGTestLogNamedBytesIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "0a1eb1e68eb81583becd3114e74f2424", "score": "0.5827918", "text": "func (it *MigrateETHDKGTestLogNamedBytes32Iterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "73c12f6b0cf5d6abeb432129605b930a", "score": "0.5824277", "text": "func (r *randReader) Close() error {\n\treturn nil\n}", "title": "" }, { "docid": "427d3082c6c1342b8f896a2f576c3f99", "score": "0.58210033", "text": "func (it *BindingsTokenBurnedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "9c671f55736dfa743edd8be89bbf8385", "score": "0.58205414", "text": "func (it *EthDKGLogNamedBytesIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "5f3a83bfd73f07fdbaa9245cb23d5cbe", "score": "0.581874", "text": "func (t *throttledWriteCloser) Close() error {\n\t// Unregister with the pool\n\terr := twiddleClientCount(t.pool, -1)\n\n\treturn orErrors(err, t.origWriteCloser.Close())\n}", "title": "" }, { "docid": "78d4b1ae77f9f7e117c73b801cdd1091", "score": "0.58162713", "text": "func (proxy *TCPProxy) Close() { proxy.listener.Close() }", "title": "" }, { "docid": "eb1346a96cfd6fdc1f2b72d48be3b02d", "score": "0.5812401", "text": "func (w *Writer) Close() error { return w.dst.Close() }", "title": "" }, { "docid": "de9f1ff592652f7c078248673e91fb09", "score": "0.5808941", "text": "func (it *EthDKGLogNamedBytes32Iterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "b9cceffa8af71b2477d02ba0510b4294", "score": "0.58029133", "text": "func (it *RewardsOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "7b9e39679905fc7e095201c6c02cc5d5", "score": "0.5795882", "text": "func (t *throttledReadWriteCloser) Close() error {\n\t// In this case we really have two copies of all the data\n\t// It really doesn't matter which we use as the reader and writer hold the\n\t// same data\n\n\t// Unregister with the pool\n\terr := twiddleClientCount(t.throttledReadCloser.pool, -1)\n\n\treturn orErrors(err, t.throttledReadCloser.origReadCloser.Close())\n}", "title": "" }, { "docid": "add0614793149408075b32795dc75165", "score": "0.57850015", "text": "func (br *BufferReader) Close() {\n\tbr.b.Release()\n}", "title": "" }, { "docid": "ce689e5e760b3dce6a0f2af83b41a69b", "score": "0.5777371", "text": "func (it *RegistryTestLogNamedBytes32Iterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "2927fb3dbfaf0254fc0faf410f36fce1", "score": "0.57760876", "text": "func (it *IShareTokenTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "f24aac32793d09dfc5fa9848017f2c8c", "score": "0.5773917", "text": "func (re *wrappedResponseEmitter) Close() error {\n\treturn re.r.Close()\n}", "title": "" }, { "docid": "b2cf372b2f1b5d96abd0fe39384adf6c", "score": "0.5772035", "text": "func (it *RegistryOwnershipRenouncedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "186c572369fe38088a0bf7ee718dc5bd", "score": "0.5769817", "text": "func (r *PipeReader) Close() error {\n\treturn nil\n}", "title": "" }, { "docid": "6680d7fb6f5802fb1aca796714bd9999", "score": "0.57631373", "text": "func (c *fwdConn) close() {\n\tc.mu.Lock()\n\tdefer c.mu.Unlock()\n\tif c.closed {\n\t\treturn\n\t}\n\tc.closed = true\n\tc.closeConnLocked()\n\t// Unblock any remaining readers.\n\tc.change.Broadcast()\n}", "title": "" }, { "docid": "b4710211b9827b1920bcbae4529226f7", "score": "0.57617396", "text": "func (f *fwriter) Close() error {\n\tf.Lock()\n\tf.closed = true\n\n\t// tell the waiting clients that we have no more data\n\tf.update.Broadcast()\n\tf.Unlock()\n\treturn nil\n}", "title": "" }, { "docid": "c2b2b1351913915b7040029bec317a71", "score": "0.576136", "text": "func (it *RegistryTestLogNamedBytesIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "227d08598af53792e01187d4e7de12b3", "score": "0.57599324", "text": "func (limitedReadCloser *LimitReadCloser) Close() error {\n return limitedReadCloser.closer.Close()\n}", "title": "" }, { "docid": "c7455bb467ae9a409631566ff77b13ae", "score": "0.575951", "text": "func (it *BurnableTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "0ee1d676fcc19e6af0be501726a5220d", "score": "0.5759011", "text": "func (it *MigrateETHDKGTestLogNamedStringIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "f1f9df1e41fc1ccf73f921c8d18ab42b", "score": "0.57565457", "text": "func (i *OggWriter) Close() error {\n\tdefer func() {\n\t\ti.fd = nil\n\t\ti.stream = nil\n\t}()\n\n\t// Returns no error has it may be convenient to call\n\t// Close() multiple times\n\tif i.fd == nil {\n\t\t// Close stream if we are operating on a stream\n\t\tif closer, ok := i.stream.(io.Closer); ok {\n\t\t\treturn closer.Close()\n\t\t}\n\t\treturn nil\n\t}\n\n\t// Seek back one page, we need to update the header and generate new CRC\n\tpageOffset, err := i.fd.Seek(-1*int64(i.lastPayloadSize+pageHeaderSize+1), 2)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tpayload := make([]byte, i.lastPayloadSize)\n\tif _, err := i.fd.ReadAt(payload, pageOffset+pageHeaderSize+1); err != nil {\n\t\treturn err\n\t}\n\n\tdata := i.createPage(payload, pageHeaderTypeEndOfStream, i.previousGranulePosition, i.pageIndex-1)\n\tif err := i.writeToStream(data); err != nil {\n\t\treturn err\n\t}\n\n\t// Update the last page if we are operating on files\n\t// to mark it as the EOS\n\treturn i.fd.Close()\n}", "title": "" }, { "docid": "ba68ce493e240e66cba4519c30375a14", "score": "0.57555455", "text": "func (it *RefundableCrowdsaleImplFinalizedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "93d49d924554c776e0a25fe01ac315ae", "score": "0.5752274", "text": "func (w *readCloserWrapper) Close() error {\n\tswitch t := w.Reader.(type) {\n\tcase io.Closer:\n\t\treturn t.Close()\n\tdefault:\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "4e7109ca7d2cf081f3ba3eb8b4ceda33", "score": "0.57521135", "text": "func (it *MigrateETHDKGTestLogNamedIntIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "03b89c84dd9353f1cb67ec9457523800", "score": "0.57517886", "text": "func (it *ERC20BurnableTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "03b89c84dd9353f1cb67ec9457523800", "score": "0.57517886", "text": "func (it *ERC20BurnableTransferIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "29697392d60c66f47833192bc86e64fa", "score": "0.5749016", "text": "func (it *AtokenInterestStreamRedirectedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "cee3f2dcd4714b4d74b1bf4f5015ef40", "score": "0.57485795", "text": "func (r *Resolver) Close() {\n\tlog.Println(\"Close\")\n}", "title": "" }, { "docid": "1a0779e9b6816ad4f6b15c304917ee0b", "score": "0.574553", "text": "func (t *throttledReadCloser) Close() error {\n\t// Unregister with the pool\n\terr := twiddleClientCount(t.pool, -1)\n\n\treturn orErrors(err, t.origReadCloser.Close())\n}", "title": "" }, { "docid": "0dc7050ffa51dab36f4a6287f625caeb", "score": "0.57413846", "text": "func (r ReadStream) Close() error {\n\tif r.s.transfers == nil {\n\t\treturn nil\n\t}\n\tr.s.setDelayedErr(io.EOF)\n\treturn nil\n}", "title": "" }, { "docid": "65991eb4ad848ca58d7121f999f03249", "score": "0.5738989", "text": "func (it *MigrateETHDKGTestLogNamedAddressIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a642e5c3f84398f04155725aae14e7df", "score": "0.573304", "text": "func (r *reader) Close() error {\n\tif r.closer == nil {\n\t\treturn nil\n\t}\n\treturn r.closer.Close()\n}", "title": "" }, { "docid": "44457d1b7d28094d848076c29511da1e", "score": "0.5729123", "text": "func (it *TokenBurnIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "522deada12d7f1559b73d524a747ba6c", "score": "0.5725492", "text": "func (s *SynScanner) Close() {\n\ts.handle.Close()\n}", "title": "" }, { "docid": "22179ce545b7e6a165f13f160574b7c0", "score": "0.57228947", "text": "func (itr *unsignedReaderIterator) Close() error {\n\tif r, ok := itr.r.(io.ReadCloser); ok {\n\t\treturn r.Close()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0d0a478327c28cab80b2783ec1be21dd", "score": "0.5721021", "text": "func (it *ValidatorsFinedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "f341743d9872a195660882e6c2bde99f", "score": "0.5720404", "text": "func (r *DefaultRouter) Close() {\n\tr.Lock()\n\tdefer r.Unlock()\n\n\tfor _, sink := range r.sinks {\n\t\tsink.Flush()\n\t\tif err := sink.Stop(); err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tif err := sink.Close(); err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fc6b9d2273c4721b85d9126d6514b457", "score": "0.5719786", "text": "func (r *Reader) Close() error {\n\tvar err error\n\tif r.gz != nil {\n\t\terr = r.gz.Close()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif c, ok := r.rdr.(io.ReadCloser); ok {\n\t\terr = c.Close()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d178c2e795831e691c07a954528b6b0c", "score": "0.5714432", "text": "func (z *Writer) Close() error {}", "title": "" }, { "docid": "a5a90a86d788c5f321a01fc5050e2f7b", "score": "0.5714289", "text": "func (r *Reader) Close() {\n\tif r.zipFile != nil {\n\t\tr.zipFile.Close()\n\t}\n\tif r.file != nil {\n\t\tr.file.Close()\n\t}\n}", "title": "" }, { "docid": "f2eae2841cb7f7f0e24ce2cc9635bc66", "score": "0.5709979", "text": "func (r *Reader) Close() {\n\tr.shp.Close()\n\tif r.dbf != nil {\n\t\tr.dbf.Close()\n\t}\n}", "title": "" }, { "docid": "3c037e52281e3558ee10e4ace552a658", "score": "0.57076526", "text": "func (w *PipeWriter) Close() error {\n\treturn nil\n}", "title": "" }, { "docid": "518eedcbcb61da6d211103683ec175e7", "score": "0.5702636", "text": "func (it *EthDKGLogNamedStringIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "5db06f1110c35e5ff9ed52ed4f7ce9ea", "score": "0.5701603", "text": "func (it *MigrateETHDKGTestLogBytes32Iterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "a61adbeb1ad9be1895e6fb41f9490acf", "score": "0.56985253", "text": "func (rl *PipeRelay) Close() error {\n\treturn nil\n}", "title": "" }, { "docid": "e823da259ca0a4bae8953a8611f89cd7", "score": "0.5697028", "text": "func (it *StakingFinedIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "7d597da12fe66e6b2874e9145f6406d4", "score": "0.5694296", "text": "func (g *WriterGroup) Close() {\n\tg.mu.Lock()\n\tdefer g.mu.Unlock()\n\tfor _, w := range g.writers {\n\t\tw.Close()\n\t}\n\tg.writers = nil\n\tg.closed = true\n}", "title": "" }, { "docid": "bbe6d177790f6a4367c348690613cb03", "score": "0.5692789", "text": "func (z *writer) Close() error {\n\terr := z.Writer.Close()\n\tz.tally()\n\n\treturn err\n}", "title": "" }, { "docid": "0581ccd769bc88bc6ed03cb5d7253b30", "score": "0.5692438", "text": "func (it *MigrateETHDKGTestLogBytesIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "06100c3309a56c62fe2ea22dc32ee4e6", "score": "0.5691175", "text": "func (writer *SocketWriter) Close() {\n\twriter.lock.Lock()\n\tdefer writer.lock.Unlock()\n\tif writer.closed {\n\t\treturn\n\t}\n\n\twriter.writer.Close()\n\twriter.writer = nil\n\twriter.closed = true\n}", "title": "" }, { "docid": "2ba1341bea6cc30b1ba5f591af4f1589", "score": "0.56897277", "text": "func (w *Writer) Close() error {\n\tif w.err != nil {\n\t\treturn w.err\n\t}\n\tif c, ok := w.c.(io.Closer); ok {\n\t\tw.err = c.Close()\n\t}\n\tw.checkTail()\n\treturn w.err\n}", "title": "" }, { "docid": "2213581fb6edd019f446f8eb79cd1a6d", "score": "0.5688122", "text": "func (it *MigrateETHDKGTestLogIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "782366e8624d44a8b046ee6ad63d2345", "score": "0.5686541", "text": "func (it *DSTokenBurnIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "4ae6ba812388719f5aa57e7818f015ab", "score": "0.5685327", "text": "func (it *RegistryOwnershipTransferredIterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" }, { "docid": "2e4b91106d9a36b9d197ed9e7c1d0215", "score": "0.5682326", "text": "func (out *DefaultIOHandler) Close() {\n\tlog := out.context.Log()\n\tlog.Debug(\"IOHandler closing all subscribed writers.\")\n\tif out.StdoutWriter != nil {\n\t\tout.StdoutWriter.Close()\n\t}\n\n\tif out.StderrWriter != nil {\n\t\tout.StderrWriter.Close()\n\t}\n}", "title": "" }, { "docid": "0edf82bd3949e9fc92d6ad3ee38d3c5f", "score": "0.56806", "text": "func (it *DSTestLogNamedBytes32Iterator) Close() error {\n\tit.sub.Unsubscribe()\n\treturn nil\n}", "title": "" } ]
656ea19540f363f85611e19ccb783e4d
Arrivals return a stream of arrived peers.
[ { "docid": "1d9298fa5830cf36a7910caf40d1f5f0", "score": "0.6672218", "text": "func (t *Tracker) Arrivals() *network.ArrivalStream {\n\treturn t.arrivals.Stream()\n}", "title": "" } ]
[ { "docid": "666e300106316544593205a1e72a666a", "score": "0.5779928", "text": "func Peers() ([]byte, error) {\n\tif hop != nil && hop.peer != nil && len(hop.peer.Peers()) > 0 {\n\t\tpeers := &types.StringSlice{\n\t\t\tOutput: hop.peer.Peers(),\n\t\t}\n\t\treturn proto.Marshal(peers)\n\t}\n\treturn nil, ErrNoPeersConnected\n}", "title": "" }, { "docid": "6466ddbd920652b3616eab5d38715e75", "score": "0.57637674", "text": "func (c *Channel) Peers() []fab.Peer {\n\tvar peersArray []fab.Peer\n\tfor _, v := range c.peers {\n\t\tpeersArray = append(peersArray, v)\n\t}\n\treturn peersArray\n}", "title": "" }, { "docid": "2232b81a9db7f980eaa555fd3852c9f7", "score": "0.56346023", "text": "func (node *Node) Peers(arguments *NodeArguments, reply *NodeReply) error {\n\tif arguments.Count <= 0 {\n\t\targuments.Count = 10\n\t}\n\tpeers, nextStart, err := announce.RecentPeers(arguments.Start, arguments.Count, announce.TypePeer)\n\tif nil == err {\n\t\tfor _, p := range peers {\n\t\t\trecent := p.(announce.RecentData)\n\t\t\treply.Addresses = append(reply.Addresses, recent.Address)\n\t\t}\n\t}\n\treply.NextStart = nextStart\n\treturn err\n}", "title": "" }, { "docid": "a7384d3111a79789b3b6fe39a9c41ac9", "score": "0.56156474", "text": "func (d Dispatcher) Peers() []string {\n\treturn d.GetPeersPubs()\n}", "title": "" }, { "docid": "e0e131ece51639e7c341988e9787e8bd", "score": "0.55715436", "text": "func GetPeers() ([]*Peer, error) {\n\t// check protocol\n\tswitch Torr.Announce.Scheme {\n\tcase \"udp\":\n\t\t// sending connection request to UDP server (the announce host) and reading responses\n\t\tconnID, tranID, err := ConnReqUDP()\n\t\tif err != nil {\n\t\t\treturn []*Peer{}, err\n\t\t}\n\n\t\t// once connection request is successfule, sending announce request\n\t\t// this will mainly get us a list of seeders for that torrent files\n\t\treturn GetPeersUDP(Torr.Announce.String(), connID, tranID)\n\n\tcase \"http\", \"https\":\n\t\t// if the announce scheme is http then send a http tracker request\n\t\treturn GetPeersHTTP()\n\n\tdefault:\n\t\treturn []*Peer{}, fmt.Errorf(\"unsupported announce protocol, %v\", Torr.Announce.Scheme)\n\t}\n}", "title": "" }, { "docid": "36a9daedcf97dccc43aaafbcfa37f484", "score": "0.5541854", "text": "func (c *Client) Peers() ([]api.ID, error) {\n\tvar ids []api.IDSerial\n\terr := c.do(\"GET\", \"/peers\", nil, &ids)\n\tresult := make([]api.ID, len(ids))\n\tfor i, id := range ids {\n\t\tresult[i] = id.ToID()\n\t}\n\treturn result, err\n}", "title": "" }, { "docid": "1157c5a7470ac9b2ea496f0709516ec1", "score": "0.55260533", "text": "func (a *App) PeersAll() (PeersKnown, error) {\n\tsuspended := a.peers.Suspended()\n\tblackList := a.peers.BlackList()\n\trestrictedIPsMap := make(map[string]struct{}, len(suspended)+len(blackList))\n\tfor _, suspendedPeer := range suspended {\n\t\trestrictedIPsMap[suspendedPeer.IP.String()] = struct{}{}\n\t}\n\tfor _, blackListedPeer := range blackList {\n\t\trestrictedIPsMap[blackListedPeer.IP.String()] = struct{}{}\n\t}\n\n\tknownPeers := a.peers.KnownPeers()\n\n\tnowMillis := common.UnixMillisFromTime(time.Now())\n\n\tout := make([]Peer, 0, len(knownPeers))\n\tfor _, knownPeer := range knownPeers {\n\t\tip := knownPeer.String()\n\t\tif _, in := restrictedIPsMap[ip]; in {\n\t\t\tcontinue\n\t\t}\n\t\t// FIXME(nickeksov): add normal lastSeen field\n\t\tout = append(out, Peer{\n\t\t\tAddress: \"/\" + ip,\n\t\t\tLastSeen: uint64(nowMillis),\n\t\t})\n\t}\n\n\treturn PeersKnown{Peers: out}, nil\n}", "title": "" }, { "docid": "242715526ab788bdb7a00e7b56021703", "score": "0.5449329", "text": "func (obj *chain) Peers() peers.Peers {\n\treturn obj.peers\n}", "title": "" }, { "docid": "584cef1573482a512cd6fc2460fdc6b4", "score": "0.5437918", "text": "func (s *Server) Peers(ctx context.Context, chainID string) (<-chan *PeerInfo, error) {\n\t// Wait for the DHT to be connected before searching.\n\t<-s.connectedCh\n\n\tid, err := cid.Decode(chainID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tch := make(chan *PeerInfo)\n\tgo func() {\n\t\ttctx, cancel := context.WithTimeout(ctx, 10*time.Second)\n\n\t\tdefer cancel()\n\t\tdefer close(ch)\n\n\t\tpeers := s.dht.FindProvidersAsync(tctx, id, 10)\n\t\tfor p := range peers {\n\t\t\tif p.ID != s.node.PeerHost.ID() && len(p.Addrs) > 0 {\n\t\t\t\tstream, err := s.node.PeerHost.NewStream(ctx, p.ID, \"/chainkit/0.1.0\")\n\t\t\t\tif err != nil {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tdec := json.NewDecoder(stream)\n\t\t\t\tpeer := &PeerInfo{}\n\t\t\t\tif err := dec.Decode(peer); err != nil {\n\t\t\t\t\tui.Error(\"failed to decode: %v\", err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tif peer.IP == nil {\n\t\t\t\t\tpeer.IP = []string{}\n\t\t\t\t}\n\t\t\t\tfor _, addr := range p.Addrs {\n\t\t\t\t\tv, err := addr.ValueForProtocol(multiaddr.P_IP4)\n\t\t\t\t\tif err != nil || v == \"\" {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\tpeer.IP = append(peer.IP, v)\n\t\t\t\t}\n\n\t\t\t\tch <- peer\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn ch, nil\n}", "title": "" }, { "docid": "03b12f952952bed74586389d15455cf0", "score": "0.5418444", "text": "func (s *server) Peers() []int {\n\treturn s.pCatalog.GetPeerList(s.pid)\n}", "title": "" }, { "docid": "b469fe39cf428fe6e4754100b603e97c", "score": "0.5388928", "text": "func Addrs() ([]byte, error) {\n\tfor i := 0; i < 5; i++ {\n\t\taddrs := []string{}\n\t\tif hop.peer != nil {\n\t\t\tfor _, v := range hop.peer.Host.Addrs() {\n\t\t\t\tif !strings.HasPrefix(v.String(), \"127\") {\n\t\t\t\t\taddrs = append(addrs, v.String()+\"/p2p/\"+hop.peer.Host.ID().String())\n\t\t\t\t}\n\t\t\t}\n\t\t\taddrsOP := &types.StringSlice{\n\t\t\t\tOutput: addrs,\n\t\t\t}\n\t\t\treturn proto.Marshal(addrsOP)\n\t\t}\n\t\t<-time.After(time.Millisecond * 200)\n\t}\n\treturn nil, errors.New(\"could not get peer address\")\n}", "title": "" }, { "docid": "508b37abda4dd289d37eec8e4da5d9c2", "score": "0.5388898", "text": "func Peers() {\n\tfmt.Println(\"Friends:\")\n\n\tpeers := strings.Split(apctl.Send_and_receive(\"\", \"P\"), \" \")\n\n\tfor i,v := range peers {\n\t\tcontacts[i] = v\n\t\tfmt.Printf(\"%d : %s\\n\", i, v)\n\t}\n}", "title": "" }, { "docid": "2f8afda48f23dd13d47ffd8230b0cf41", "score": "0.5383074", "text": "func (s *PlayerService) Peers(accountID int64, params *PlayerParam) ([]PlayerPeers, *http.Response, error) {\n\tif params == nil {\n\t\tparams = &PlayerParam{}\n\t}\n\tpeers := new([]PlayerPeers)\n\tapiError := new(APIError)\n\tpath := fmt.Sprintf(\"%s/peers\", strconv.Itoa(int(accountID)))\n\tresp, err := s.sling.New().Get(path).QueryStruct(params).Receive(peers, apiError)\n\treturn *peers, resp, relevantError(err, *apiError)\n}", "title": "" }, { "docid": "6da27da675f3f8a225bc5188e0ae53c7", "score": "0.53781897", "text": "func (sw *Switch) Peers() *PeerSet {\n\treturn sw.peers\n}", "title": "" }, { "docid": "ee4f45c11bcbfb836c3b12e8d384bc15", "score": "0.53677815", "text": "func (action *ActionImpl) Peers() []api.Peer {\n\treturn action.peers\n}", "title": "" }, { "docid": "c5cd359d3ce56aa4686dfe39236730f4", "score": "0.53554475", "text": "func (e *Engine) Peers() []peer.ID {\n\te.lock.RLock()\n\tdefer e.lock.RUnlock()\n\n\tresponse := make([]peer.ID, 0)\n\tfor _, ledger := range e.ledgerMap {\n\t\tresponse = append(response, ledger.Partner)\n\t}\n\treturn response\n}", "title": "" }, { "docid": "7197943c44788b43dda05a53fafe030a", "score": "0.5343891", "text": "func (mgr *AddrSubManager) AddrStream(ctx context.Context, p peer.ID, initial []ma.Multiaddr) <-chan ma.Multiaddr {\n\tsub := &addrSub{pubch: make(chan ma.Multiaddr), ctx: ctx}\n\tout := make(chan ma.Multiaddr)\n\n\tmgr.mu.Lock()\n\tif _, ok := mgr.subs[p]; ok {\n\t\tmgr.subs[p] = append(mgr.subs[p], sub)\n\t} else {\n\t\tmgr.subs[p] = []*addrSub{sub}\n\t}\n\tmgr.mu.Unlock()\n\n\tsort.Sort(addr.AddrList(initial))\n\n\tgo func(buffer []ma.Multiaddr) {\n\t\tdefer close(out)\n\n\t\tsent := make(map[string]bool, len(buffer))\n\t\tvar outch chan ma.Multiaddr\n\n\t\tfor _, a := range buffer {\n\t\t\tsent[string(a.Bytes())] = true\n\t\t}\n\n\t\tvar next ma.Multiaddr\n\t\tif len(buffer) > 0 {\n\t\t\tnext = buffer[0]\n\t\t\tbuffer = buffer[1:]\n\t\t\toutch = out\n\t\t}\n\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase outch <- next:\n\t\t\t\tif len(buffer) > 0 {\n\t\t\t\t\tnext = buffer[0]\n\t\t\t\t\tbuffer = buffer[1:]\n\t\t\t\t} else {\n\t\t\t\t\toutch = nil\n\t\t\t\t\tnext = nil\n\t\t\t\t}\n\t\t\tcase naddr := <-sub.pubch:\n\t\t\t\tif sent[string(naddr.Bytes())] {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tsent[string(naddr.Bytes())] = true\n\t\t\t\tif next == nil {\n\t\t\t\t\tnext = naddr\n\t\t\t\t\toutch = out\n\t\t\t\t} else {\n\t\t\t\t\tbuffer = append(buffer, naddr)\n\t\t\t\t}\n\t\t\tcase <-ctx.Done():\n\t\t\t\tmgr.removeSub(p, sub)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t}(initial)\n\n\treturn out\n}", "title": "" }, { "docid": "aa4bf096f0aca181a3983e26a29bcf69", "score": "0.5336537", "text": "func (locus *Locus) GetPeers() []*client.Peer {\n\trr := locus.tube.BulkRead()\n\ts := make([]*client.Peer, len(rr))\n\tfor i, r := range rr {\n\t\ts[i] = r.Value.(*client.Peer)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "f16ab13028734f2d5f71ba8dbce59995", "score": "0.5282289", "text": "func (mgr *AddrSubManager) AddrStream(ctx context.Context, p peer.ID, initial []ma.Multiaddr) (<-chan ma.Multiaddr, error) {\n\tsub := &addrSub{pubch: make(chan ma.Multiaddr), ctx: ctx}\n\tout := make(chan ma.Multiaddr)\n\n\tmgr.mu.Lock()\n\tif _, ok := mgr.subs[p]; ok {\n\t\tmgr.subs[p] = append(mgr.subs[p], sub)\n\t} else {\n\t\tmgr.subs[p] = []*addrSub{sub}\n\t}\n\tmgr.mu.Unlock()\n\n\tsort.Sort(addr.AddrList(initial))\n\n\tgo func(buffer []ma.Multiaddr) {\n\t\tdefer close(out)\n\n\t\tsent := make(map[string]bool, len(buffer))\n\t\tvar outch chan ma.Multiaddr\n\n\t\tfor _, a := range buffer {\n\t\t\tsent[string(a.Bytes())] = true\n\t\t}\n\n\t\tvar next ma.Multiaddr\n\t\tif len(buffer) > 0 {\n\t\t\tnext = buffer[0]\n\t\t\tbuffer = buffer[1:]\n\t\t\toutch = out\n\t\t}\n\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase outch <- next:\n\t\t\t\tif len(buffer) > 0 {\n\t\t\t\t\tnext = buffer[0]\n\t\t\t\t\tbuffer = buffer[1:]\n\t\t\t\t} else {\n\t\t\t\t\toutch = nil\n\t\t\t\t\tnext = nil\n\t\t\t\t}\n\t\t\tcase naddr := <-sub.pubch:\n\t\t\t\tif sent[string(naddr.Bytes())] {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tsent[string(naddr.Bytes())] = true\n\t\t\t\tif next == nil {\n\t\t\t\t\tnext = naddr\n\t\t\t\t\toutch = out\n\t\t\t\t} else {\n\t\t\t\t\tbuffer = append(buffer, naddr)\n\t\t\t\t}\n\t\t\tcase <-ctx.Done():\n\t\t\t\tmgr.removeSub(p, sub)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t}(initial)\n\n\treturn out, nil\n}", "title": "" }, { "docid": "be116c51bca59c2ad40512e05dafd033", "score": "0.52779263", "text": "func (p *Peer) Peers() []*memberlist.Node {\n\treturn p.mlist.Members()\n}", "title": "" }, { "docid": "1d38505f8ee74d5bda5101a6196537b0", "score": "0.5271794", "text": "func (action *Action) Peers() []fab.Peer {\n\treturn action.peers\n}", "title": "" }, { "docid": "6ac886f387ba89e5723e7b8b37ee7959", "score": "0.52599365", "text": "func (btc *ExchangeWalletSPV) Peers() ([]*asset.WalletPeer, error) {\n\treturn btc.spvNode.peers()\n}", "title": "" }, { "docid": "8aaa9bcbfcf7018cc6f2bd7b902a23c4", "score": "0.525719", "text": "func (c *chainObj) committeePeers() map[uint16]peering.PeerSender {\n\treturn c.peers.AllNodes()\n}", "title": "" }, { "docid": "27ea4c2f92f921c7784026e58b1d4a3f", "score": "0.5245365", "text": "func (s *strategist) Peers() []*peer.Peer {\n\tresponse := make([]*peer.Peer, 0)\n\tfor _, ledger := range s.ledgerMap {\n\t\tresponse = append(response, ledger.Partner)\n\t}\n\treturn response\n}", "title": "" }, { "docid": "9e3a5e7f579ad579e4e57760f84f9b5d", "score": "0.524188", "text": "func (n *Network) Peers() []*Node {\n\tpeersCopy := make([]*Node, len(n.peers))\n\tcopy(peersCopy, n.peers)\n\treturn peersCopy\n}", "title": "" }, { "docid": "017b103c495eb52c2278e50ccbf54644", "score": "0.5238041", "text": "func (e *GstElementConfig) GetPeers() []*GstElementConfig { return e.peers }", "title": "" }, { "docid": "597cf97de2383cc725e55efccd9034c3", "score": "0.5217215", "text": "func (g *Gossiper) ListenPeers() {\n\tfor {\n\t\tbuffer := make([]byte, 4096)\n\t\tn, temp, err := g.GossiperUDPConn.ReadFromUDP(buffer)\n\t\tif n == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tclientAddress := temp.String()\n\t\t//println(clientAddress)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"ERROR:\", err)\n\t\t\tfmt.Println(\"Bytes read:\", n)\n\t\t\tpanic(err)\n\t\t}\n\t\t//var gossippacket GossipPacket\n\t\tgossippacket := GossipPacket{}\n\t\terr = protobuf.Decode(buffer[0:n], &gossippacket)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"ERROR11:\", err)\n\t\t\tpanic(err)\n\t\t}\n\t\tif gossippacket.Simple != nil {\n\t\t\tfmt.Println(\"SIMPLE MESSAGE origin\", gossippacket.Simple.OriginalName,\n\t\t\t\t\"from\", gossippacket.Simple.RelayPeerAddr, \"contents\", gossippacket.Simple.Contents)\n\t\t\tg.addNewAddrAndPrintPeers(clientAddress)\n\t\t\t//Store the original name in a string map\n\t\t\tPeerNames[clientAddress] = gossippacket.Simple.OriginalName\n\t\t\tif g.Simple {\n\t\t\t\tgossippacket.Simple.RelayPeerAddr = g.GossipAddr\n\t\t\t\tg.sendGossip(gossippacket, clientAddress)\n\t\t\t}\n\n\t\t} else if gossippacket.Rumor != nil {\n\t\t\t//Store the original name in a string map\n\t\t\tPeerNames[clientAddress] = gossippacket.Rumor.Origin\n\t\t\t//Save the rumor ID\n\t\t\t//rumorID[gossippacket.Rumor.Origin]\n\t\t\tfmt.Println(\"RUMOR origin\", gossippacket.Rumor.Origin,\n\t\t\t\t\"from\", clientAddress, \"ID\", gossippacket.Rumor.ID,\n\t\t\t\t\"contents\", gossippacket.Rumor.Text)\n\n\t\t\tg.addNewAddrAndPrintPeers(clientAddress)\n\n\t\t\tif !g.Simple {\n\t\t\t\tvar psSlice []PeerStatus\n\t\t\t\tif g.KnownAddresses != nil {\n\t\t\t\t\tfor _, address := range g.KnownAddresses {\n\t\t\t\t\t\tif PeerNames[address] != \"\" {\n\t\t\t\t\t\t\tpsSlice = append(psSlice, PeerStatus{\n\t\t\t\t\t\t\t\tIdentifier: PeerNames[address],\n\t\t\t\t\t\t\t\tNextID: RumorID[PeerNames[address]] + 1,\n\t\t\t\t\t\t\t})\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tsp := StatusPacket{Want: psSlice}\n\t\t\t\tgp := GossipPacket{Status: &sp}\n\t\t\t\tg.sendGossip(gp, clientAddress)\n\t\t\t}\n\n\t\t} else if gossippacket.Status != nil { //Need to implement status packet logic.\n\t\t\tfmt.Print(\"STATUS from \", clientAddress)\n\t\t\tfor _, element := range gossippacket.Status.Want {\n\t\t\t\tfmt.Print(\" peer \", element.Identifier, \" nextID \", element.NextID)\n\t\t\t}\n\t\t\tfmt.Println()\n\t\t\tfmt.Println(\"PEERS\", g.Peers)\n\t\t} else {\n\t\t\tfmt.Println(\"you must be trolling dude\")\n\t\t}\n\n\t}\n}", "title": "" }, { "docid": "ca833755686c183ac3e278077bf45ab6", "score": "0.520727", "text": "func (o *LocalRouter) GetPeers() []*LocalRouterPeer {\n\treturn o.Peers\n}", "title": "" }, { "docid": "e4ed519c835318124f0e08c042a7dc3b", "score": "0.52067596", "text": "func (r *Room) Members() []connections.OutputConnection {\n\tr.Lock.Lock()\n\tdefer r.Lock.Unlock()\n\tconns := make([]connections.OutputConnection, r.Conns.Len())\n\te := r.Conns.Front()\n\ti := 0\n\tfor {\n\t\tif e == nil {\n\t\t\tbreak\n\t\t}\n\t\tconns[i] = e.Value.(connections.OutputConnection)\n\t\te = e.Next()\n\t\ti++\n\t}\n\treturn conns\n}", "title": "" }, { "docid": "fe166c9d71bd2485fdff527d2665f383", "score": "0.51776975", "text": "func (s *Daemon) Peers() []PeerInfo {\n\tvar peers []PeerInfo\n\tfor _, client := range s.V1Server.GetPeerList() {\n\t\tpeers = append(peers, client.Info())\n\t}\n\treturn peers\n}", "title": "" }, { "docid": "06b47f476ef00922a1c7e4716378265e", "score": "0.51590365", "text": "func (p *PeerPool) Addrs() []net.Addr {\n\treturn p.peerAddrs\n}", "title": "" }, { "docid": "06221ab492672cf09abd33c1c1ac66fe", "score": "0.51554614", "text": "func (ds *localDiscoveryService) GetPeers() ([]fab.Peer, error) {\n\tvar peers []fab.Peer\n\tfor _, p := range ds.peers {\n\t\tif p.MSPID() == ds.mspID {\n\t\t\tpeers = append(peers, p)\n\t\t}\n\t}\n\treturn peers, nil\n}", "title": "" }, { "docid": "7ecbbad1e268c055930b388b9980017d", "score": "0.5141892", "text": "func sendToPeers(peers []*Peer, prop *peer.SignedProposal) []*PeerResponse {\n\tch := make(chan *PeerResponse)\n\tl := len(peers)\n\tresp := make([]*PeerResponse, 0, l)\n\tfor _, p := range peers {\n\t\tgo p.Endorse(ch, prop)\n\t}\n\tfor i := 0; i < l; i++ {\n\t\tresp = append(resp, <-ch)\n\t}\n\tclose(ch)\n\treturn resp\n}", "title": "" }, { "docid": "103e046290834e18f2bbe88bce172171", "score": "0.51311696", "text": "func (this *Roomba) Stream(packet_ids []byte) (<-chan [][]byte, error) {\n\tb := new(bytes.Buffer)\n\tb.WriteByte(byte(len(packet_ids)))\n\tb.Write(packet_ids)\n\terr := this.Write(OpCodes[\"Stream\"], b.Bytes())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := make(chan [][]byte)\n\tgo this.ReadStream(packet_ids, out)\n\treturn out, nil\n}", "title": "" }, { "docid": "fa3493f37ef761c16e9e41db4921319a", "score": "0.5084465", "text": "func GetPeersUDP(addr string, connID uint64, tranID uint32) ([]*Peer, error) {\n\t// building the required packet in connection request\n\tpacket, err := udpAnnouncePacket(connID, tranID)\n\tif err != nil {\n\t\treturn []*Peer{}, err\n\t}\n\n\t// udp dial (WTF, just because comments are cool)\n\tconn, err := net.Dial(\"udp\", addr)\n\tif err != nil {\n\t\treturn []*Peer{}, err\n\t}\n\tdefer conn.Close()\n\n\t// writing to data to the udp server\n\tnw, err := conn.Write(packet)\n\tif err != nil {\n\t\treturn []*Peer{}, err\n\t}\n\toutput.DevInfof(\"written %v bytes to as udp announce request\\n\", nw)\n\n\t// reading tracker response\n\tresp := make([]byte, 20+RequestPeerNum*6) // 20 + `RequestPeerNum` * 6 is the largest possible value for response (cause `RequestPeerNum` is finite)\n\tnr, err := bufio.NewReader(conn).Read(resp)\n\tif err != nil {\n\t\treturn []*Peer{}, err\n\t}\n\n\toutput.DevInfof(\"read %v bytes as udp announce response\\n\", nr)\n\tresp = resp[:nr] // skipping rest of the bytes, only populated ones contains all the data\n\n\t// if len(resp) < 20, somethings wrong with the response\n\tif len(resp) < 20 {\n\t\toutput.DevInfof(\"the announce response length is shorter than 20 bytes\")\n\t\treturn []*Peer{}, err\n\t}\n\n\t// response packet structure\n\t// 0-4 -> 32-bit integer -> action -> 1 (announce), not needed now\n\t// 4-8 -> 32-bit integer -> transaction_id\n\t// 8-12 -> 32-bit integer -> interval (new announce req can not be made until interval seconds have passed)\n\t// 12-16 -> 32-bit integer -> leechers\n\t// 16-20 -> 32-bit integer -> number of seeders\n\t// [rest] -> information about other peers\n\n\t// to extract data from response, the response is formatted like,\n\tBE := binary.BigEndian\n\n\t// checking if the response (recieved from tracker), has the same `transition_id`\n\t// that was in the request, if not then it's not a successful transaction\n\tif BE.Uint32(resp[4:8]) != TransactionID {\n\t\treturn []*Peer{}, fmt.Errorf(\"the response doesn't have the expected `transaction_id`\")\n\t}\n\n\t// interval := BE.Uint32(resp[8:12])\n\t// leechers := BE.Uint32(resp[12:16])\n\t// numseed := BE.Uint32(resp[16:20])\n\t// output.DevInfof(\"number of seeders found = %v *****\\n\", numseed)\n\n\t// [After 20-bytes] - the rest contains peer (seeder) information, 6 bytes for each peer\n\t// first 4 bytes are IP address and last 2 bytes are port. Reading the peer info,\n\t// more about it http://www.bittorrent.org/beps/bep_0015.html\n\n\t// holds all the peer pointers\n\tpeers := []*Peer{}\n\n\ti := 20 // i = 21st byte\n\n\t// reading the data after 20-bytes, and extracting information about other peers\n\t// maximux needed peers <= 12\n\tfor {\n\t\tif i >= len(resp) || i >= RequestPeerNum*6 {\n\t\t\tbreak\n\t\t}\n\n\t\tpeers = append(peers, &Peer{IP: net.IP(resp[i : i+4]), Port: binary.BigEndian.Uint16(resp[i+4 : i+6])})\n\n\t\ti += 6\n\t}\n\n\t// returning the extracted information about peers\n\treturn peers, err\n}", "title": "" }, { "docid": "b655d5e9d17a16ca938e113ce053f60e", "score": "0.5071551", "text": "func (p *Peers) GetPeers() []peer.ID {\n\tpeers, _ := p.snapshot.Load().([]peer.ID)\n\treturn peers\n}", "title": "" }, { "docid": "6e07d41b222ae0b859120b6e50974670", "score": "0.5068028", "text": "func (n *DRNGNetwork) Peers() []*Peer {\n\treturn n.network.Peers()\n}", "title": "" }, { "docid": "6264a3944e78df4d7aaba4ddabd1eabe", "score": "0.50658214", "text": "func (t PeerSet) Peers() []*agent.Peer {\n\treturn t\n}", "title": "" }, { "docid": "753cda7f68aa85409b941c1610ad00a7", "score": "0.50294155", "text": "func StreamAnimeEpisodes() <-chan *AnimeEpisodes {\n\tchannel := make(chan *AnimeEpisodes, nano.ChannelBufferSize)\n\n\tgo func() {\n\t\tfor obj := range DB.All(\"AnimeEpisodes\") {\n\t\t\tchannel <- obj.(*AnimeEpisodes)\n\t\t}\n\n\t\tclose(channel)\n\t}()\n\n\treturn channel\n}", "title": "" }, { "docid": "8fc9689f32f5abf8ad97552297f56783", "score": "0.50074995", "text": "func (p *peerState) forAllPeers(closure func(p *peer)) {\n\tfor e := p.peers.Front(); e != nil; e = e.Next() {\n\t\tclosure(e.Value.(*peer))\n\t}\n\tp.forAllOutboundPeers(closure)\n}", "title": "" }, { "docid": "8cfb2f5b7247d83253ed5f35e29a0b3b", "score": "0.5002035", "text": "func (s *Session) Peers() map[string]*Peer {\n\ts.mu.RLock()\n\tdefer s.mu.RUnlock()\n\treturn s.peers\n}", "title": "" }, { "docid": "009b0b6490986a803e590dc45aa20833", "score": "0.4960887", "text": "func (net *Net) Peers(ctx context.Context) ([]n.PeerInfo, error) {\n\tresp, err := net.client.Peers(ctx, &rpc.PeersRequest{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpeerInfos := make([]n.PeerInfo, len(resp.Peers))\n\tfor i, p := range resp.Peers {\n\t\tpeerInfo, err := fromProtoPeerInfo(p)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tpeerInfos[i] = peerInfo\n\t}\n\treturn peerInfos, nil\n}", "title": "" }, { "docid": "9feb35ee7ed8caef3994e56a8b1ef1ea", "score": "0.49467832", "text": "func (o VPCRouterWireGuardOutput) Peers() VPCRouterWireGuardPeerArrayOutput {\n\treturn o.ApplyT(func(v VPCRouterWireGuard) []VPCRouterWireGuardPeer { return v.Peers }).(VPCRouterWireGuardPeerArrayOutput)\n}", "title": "" }, { "docid": "d2d354da606488342848a2a5178e6e13", "score": "0.49467176", "text": "func (c *combined) StreamDuties(ctx context.Context, pubKeys [][]byte) (ethpb.BeaconNodeValidator_StreamDutiesClient, error) {\n\tvar wg sync.WaitGroup\n\tclients := make([]ethpb.BeaconNodeValidator_StreamDutiesClient, len(c.beaconChains))\n\terrs := make([]error, len(c.beaconChains))\n\tfor i, beaconChain := range c.beaconChains {\n\t\twg.Add(1)\n\t\tgo func(i int, beaconChain beaconchain.BeaconChain) {\n\t\t\tclients[i], errs[i] = beaconChain.StreamDuties(ctx, pubKeys)\n\t\t\twg.Done()\n\t\t}(i, beaconChain)\n\t}\n\twg.Wait()\n\n\tfor _, err := range errs {\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to stream duties\")\n\t\t}\n\t}\n\n\treturn newStreamDuties(clients...), nil\n}", "title": "" }, { "docid": "8eb5d59bbbf5e60a58cf1812efbdfbf4", "score": "0.49388587", "text": "func (action *Action) GetPeers() ([]fab.Peer, error) {\n\treturn action.Peers(), nil\n}", "title": "" }, { "docid": "299fa062283a0146050cdc6a2102e6ad", "score": "0.49280372", "text": "func (r *AgentGroup) GetPeers() []Peer {\n\treturn r.peers.getPeers()\n}", "title": "" }, { "docid": "c5f021a2a34592e8ab683f3203a310d0", "score": "0.49253938", "text": "func (e *ExportedChatlistInvite) GetPeers() (value []PeerClass) {\n\tif e == nil {\n\t\treturn\n\t}\n\treturn e.Peers\n}", "title": "" }, { "docid": "2abf917fe61fccabf2ec66532febac43", "score": "0.49207425", "text": "func GetPeersHTTP() ([]*Peer, error) {\n\t// trkurl is the address for sending the announce request\n\ttrkurl := Torr.Announce\n\n\t// to populate the URL query values with required properties,\n\t// torrent identifier, client information, the data we want\n\t// to download and number of peers we want\n\tpr := url.Values{}\n\n\tpr.Add(\"info_hash\", string(Torr.InfoHash)) // torrent info_hash, sha1 hash of encoded (bencode) info_hash property of torr metadata\n\tpr.Add(\"peer_id\", PeerID) // peer_id, unique identifier for each download\n\tpr.Add(\"port\", strconv.Itoa(int(ClientPort))) // post that out client is listening on for sharing data\n\tpr.Add(\"ip\", ClientIP.String()) // ip address of the local machine\n\tpr.Add(\"uploaded\", \"0\") // how much data has been uploaded\n\tpr.Add(\"downloaded\", \"0\") // how much data has been downloaded\n\tpr.Add(\"left\", strconv.Itoa(Torr.Size)) // how much data is left to be downloaded\n\tpr.Add(\"compact\", \"1\") // 1\n\tpr.Add(\"event\", \"started\") // what event this announce request is for\n\tpr.Add(\"numwant\", strconv.Itoa(RequestPeerNum)) // number of peers we want the server to send back\n\n\ttrkurl.RawQuery = pr.Encode()\n\n\t// sending the announce request to `trkurl`\n\tresp, err := http.Get(trkurl.String())\n\tif err != nil {\n\t\treturn []*Peer{}, err\n\t}\n\tdefer resp.Body.Close()\n\n\t// checking if request failed\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn []*Peer{}, fmt.Errorf(\"tracker request failed: %v\", resp.StatusCode)\n\t}\n\n\t// decoding the data got back from in the response\n\tdata, err := bencode.Decode(resp.Body)\n\tif err != nil {\n\t\toutput.DevErrorf(\"unable to decode the tracker response data, %v\", err)\n\t\treturn []*Peer{}, err\n\t}\n\n\t// checking if tracker rejected the request\n\tif v, ok := data[\"failure reason\"]; ok {\n\t\treturn []*Peer{}, fmt.Errorf(\"Tracker request rejected: %v\", v)\n\t}\n\n\t// if there's any warnning\n\tif v, ok := data[\"warning message\"]; ok {\n\t\toutput.DevWarnf(\"%v\\n\", v)\n\t}\n\n\t// to hold pointers to peers\n\tpeers := []*Peer{}\n\n\t// reading information about peers\n\tif str, ok := data[\"peers\"].(string); ok {\n\t\td := []byte(str)\n\n\t\ti := 0\n\t\tfor {\n\t\t\t// max number of peers 12\n\t\t\tif i >= len(d) || i >= RequestPeerNum*6 {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tp := Peer{\n\t\t\t\tIP: net.IP(d[i : i+4]),\n\t\t\t\tPort: binary.BigEndian.Uint16(d[i+4 : i+6]),\n\t\t\t}\n\n\t\t\tpeers = append(peers, &p)\n\n\t\t\ti += 6\n\t\t}\n\t}\n\n\treturn peers, err\n}", "title": "" }, { "docid": "12ee15b7012d6a23455b2837eb92126d", "score": "0.48970622", "text": "func (rs *ResponseStream) Events() chan<- pbi.MessageV1 {\n\treturn rs.events\n}", "title": "" }, { "docid": "6a39f6303a40d6a28a43f9664ba6bdf5", "score": "0.48853445", "text": "func (c *ViperConfiger) Peers() []Peer {\n\tpeers := []Peer{}\n\terr := c.config.UnmarshalKey(\"peers\", &peers)\n\tif err != nil {\n\t\tlog.Print(\"Failed to unmarshal peers:\", err)\n\t\treturn nil\n\t}\n\treturn peers\n}", "title": "" }, { "docid": "a2025a98c9192091bce69b99682524e9", "score": "0.48718685", "text": "func (ps *PeerSubscriber) waitForPeers(ctx context.Context) ([]PeerRegistration, error) {\n\tps.lk.Lock()\n\tdefer ps.lk.Unlock()\n\n\tif ps.peers != nil {\n\t\treturn ps.peers, nil\n\t}\n\n\t// wait for all other peers to send their peer registration\n\tpeerCh := make(chan *PeerRegistration, 16)\n\tps.peers = make([]PeerRegistration, 0, ps.containerNodesTotal)\n\n\t// add a random delay before subscribing, to avoid overloading the subscriber system\n\tdelay := time.Duration(rand.Intn(ps.containerCount)) * time.Millisecond\n\tif delay > time.Second {\n\t\tps.runenv.RecordMessage(\"waiting for %s before subscribing\", delay)\n\t}\n\ttime.Sleep(delay)\n\n\tsctx, cancelSub := context.WithCancel(ctx)\n\tif _, err := ps.client.Subscribe(sctx, PeerRegistrationTopic, peerCh); err != nil {\n\t\tcancelSub()\n\t\treturn nil, err\n\t}\n\tdefer cancelSub()\n\n\tstart := time.Now()\n\tps.runenv.RecordMessage(\"waiting for peer information from %d peers\", ps.containerNodesTotal)\n\tfor i := 0; i < ps.containerNodesTotal; i++ {\n\t\tselect {\n\t\tcase ai, ok := <-peerCh:\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"not enough peer infos. expected %d, got %d\", ps.containerNodesTotal, len(ps.peers))\n\t\t\t}\n\t\t\tps.peers = append(ps.peers, *ai)\n\t\t\tif len(ps.peers)%500 == 0 {\n\t\t\t\tps.runenv.RecordMessage(\"received peer information from %d of %d peers in %s\", len(ps.peers), ps.containerNodesTotal, time.Since(start))\n\t\t\t}\n\t\tcase <-ctx.Done():\n\t\t\tps.runenv.RecordMessage(\"context cancelled before receiving peer information from %d peers: %s\", ps.containerNodesTotal, ctx.Err())\n\t\t\treturn nil, ctx.Err()\n\t\t}\n\t}\n\n\tps.runenv.RecordMessage(\"received peer information from %d peers in %s\", len(ps.peers), time.Since(start))\n\n\treturn ps.peers, nil\n}", "title": "" }, { "docid": "bf47d71a6b193e3a0a06a5dc333bee08", "score": "0.48676568", "text": "func (s *S) Iter() <-chan interface{} {\n\tc := make(chan interface{}, s.Len())\n\tgo func() {\n\t\tfor e := range s.s {\n\t\t\tc <- e\n\t\t}\n\t\tclose(c)\n\t}()\n\n\treturn c\n}", "title": "" }, { "docid": "5c6b4a641a3f915d24b2cabbe0c1a178", "score": "0.48470274", "text": "func (p *Status) All() []peer.ID {\n\tp.lock.RLock()\n\tdefer p.lock.RUnlock()\n\tpids := make([]peer.ID, 0, len(p.peers))\n\tfor pid := range p.peers {\n\t\tpids = append(pids, pid)\n\t}\n\treturn pids\n}", "title": "" }, { "docid": "281aa911dc4fc423cb6c63f3d1096976", "score": "0.48460913", "text": "func (m *Mapper) IterPeers() chan *Peer {\n\tpeerChan := make(chan *Peer)\n\tgo func() {\n\t\t// get list of peer keys\n\t\tm.peerLock.RLock()\n\t\tpKeys := make([]string, 0, len(m.peerMap))\n\t\tfor key := range m.peerMap {\n\t\t\tpKeys = append(pKeys, key)\n\t\t}\n\t\tm.peerLock.RUnlock()\n\t\t// shuffle the keys, this way the cluster won't all do them in the\n\t\t// same order\n\t\tShuffle(pKeys)\n\t\tfor _, key := range pKeys {\n\t\t\tm.peerLock.RLock()\n\t\t\tpeer, ok := m.peerMap[key]\n\t\t\tm.peerLock.RUnlock()\n\t\t\tif ok {\n\t\t\t\tpeerChan <- peer\n\t\t\t}\n\t\t}\n\n\t\tclose(peerChan)\n\t}()\n\treturn peerChan\n}", "title": "" }, { "docid": "729cd9c6ec65e6dbceee2ecb8b67ea1a", "score": "0.48406112", "text": "func (ds *MockStaticDiscoveryService) GetPeers() ([]fab.Peer, error) {\r\n\r\n\tif ds.Error != nil {\r\n\t\treturn nil, ds.Error\r\n\t}\r\n\r\n\tif ds.Peers == nil {\r\n\t\tmockPeer := MockPeer{MockName: \"Peer1\", MockURL: \"http://peer1.com\", MockRoles: []string{}, MockCert: nil, MockMSP: \"Org1MSP\"}\r\n\t\tpeers := make([]fab.Peer, 0)\r\n\t\tpeers = append(peers, &mockPeer)\r\n\t\tds.Peers = peers\r\n\t}\r\n\r\n\treturn ds.Peers, nil\r\n\r\n}", "title": "" }, { "docid": "1caf15a2205c034cf26784ef0369b188", "score": "0.4838962", "text": "func (s *Adapter) Stream(logstream chan *router.Message) {\n\tfor msg := range logstream {\n\t\tgo s.sendLog(msg)\n\t}\n}", "title": "" }, { "docid": "3ce464d83a60bef50890edd8fe4c911d", "score": "0.48158994", "text": "func (n *Node) Peers() []*Node {\n\tvar parent *Node\n\tif parent = n.Parent(); parent == nil {\n\t\treturn nil\n\t}\n\tpeers := []*Node{}\n\tfor _, node := range parent.Nodes {\n\t\tif node != n {\n\t\t\tpeers = append(peers, node)\n\t\t}\n\t}\n\treturn peers\n}", "title": "" }, { "docid": "8eaf735c715836338bf20ce886b4f66a", "score": "0.48130608", "text": "func (mn MessageNetwork) GetPeers() []peers.Peer {\n\treturn mn.peersProvider.GetPeers()\n}", "title": "" }, { "docid": "ea05893e1673171b324b0914e57624b8", "score": "0.480407", "text": "func IAXpeers(client Client, actionID string) ([]Response, error) {\n\treturn requestList(client, \"IAXpeers\", actionID, iaxEvent, iaxComplete)\n}", "title": "" }, { "docid": "7c2178aa299f1a9691d608f93e048792", "score": "0.4803841", "text": "func (ps *SmartPeerSelector) Peers() *peers.Peers {\n\treturn ps.peers\n}", "title": "" }, { "docid": "b2d26d9392488977c28be24594de89a9", "score": "0.48016888", "text": "func (p *peerState) forAllOutboundPeers(closure func(p *peer)) {\n\tfor e := p.outboundPeers.Front(); e != nil; e = e.Next() {\n\t\tclosure(e.Value.(*peer))\n\t}\n\tfor e := p.persistentPeers.Front(); e != nil; e = e.Next() {\n\t\tclosure(e.Value.(*peer))\n\t}\n}", "title": "" }, { "docid": "d3027c9ea90960065944fcf9116dcf22", "score": "0.47900707", "text": "func (p *Status) Active() []peer.ID {\n\tp.lock.RLock()\n\tdefer p.lock.RUnlock()\n\tpeers := make([]peer.ID, 0)\n\tfor pid, status := range p.peers {\n\t\tif status.IsActive() {\n\t\t\tpeers = append(peers, pid)\n\t\t}\n\t}\n\treturn peers\n}", "title": "" }, { "docid": "9ff9db0103130b284354f6f7ccd1e6a1", "score": "0.47879395", "text": "func (n *NetworkingService) GetPeers() []multiaddr.Multiaddr {\n\tpeers := n.host.Peerstore().PeersWithAddrs()\n\taddrs := []multiaddr.Multiaddr{}\n\tfor _, p := range peers {\n\t\tpeerAddrs := n.host.Peerstore().Addrs(p)\n\t\tfor _, addr := range peerAddrs {\n\t\t\taddrs = append(addrs, addr)\n\t\t}\n\t}\n\treturn addrs\n}", "title": "" }, { "docid": "3aa5639560a8cf8d11ff31d70149079e", "score": "0.47842535", "text": "func (m *Manager) consolidateStreams() {\n\tvar currLedgerTxnCount uint32\n\tvar currLedger *ManagedLedger\n\tfor msg := range m.remote.Incoming {\n\n\t\tswitch msg := msg.(type) {\n\t\tcase *LedgerStreamMsg:\n\t\t\tglog.V(2).Infof(\"Ledger %d\", msg.LedgerSequence)\n\t\t\tcurrLedger = &ManagedLedger{\n\t\t\t\tLedgerSequence: msg.LedgerSequence,\n\t\t\t\tCloseTime: msg.LedgerTime,\n\t\t\t\tHash: msg.LedgerHash,\n\t\t\t}\n\t\t\tcurrLedgerTxnCount = msg.TxnCount\n\n\t\tcase *TransactionStreamMsg:\n\t\t\tif currLedger == nil {\n\t\t\t\t// If we get a transaction before we see our first ledger,\n\t\t\t\t// ignore it.\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tglog.V(2).Infof(\"Txn %s\", msg.Transaction.GetHash())\n\t\t\tcurrLedger.Transactions = append(currLedger.Transactions, &msg.Transaction)\n\n\t\t\tif len(currLedger.Transactions) == int(currLedgerTxnCount) {\n\t\t\t\tm.unorderedLedgers <- currLedger\n\t\t\t\tcurrLedger = nil\n\t\t\t\tcurrLedgerTxnCount = 0\n\t\t\t}\n\n\t\tcase *ServerStreamMsg:\n\t\t\tglog.V(1).Infof(\"Server message: %s\", msg.Status)\n\n\t\tdefault:\n\t\t\tpanic(\"Unknown incoming message\")\n\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d45f0e204be629c3bc16d4a068d4f1a9", "score": "0.47780356", "text": "func (o *LocalRouterHealth) GetPeers() []*LocalRouterHealthPeer {\n\treturn o.Peers\n}", "title": "" }, { "docid": "170ee094bb9c831c93f1887934eebcce", "score": "0.47721362", "text": "func (d *Data) Stream() []DataEvent {\n\treturn d.stream\n}", "title": "" }, { "docid": "dac67569d169b2f948246aef0657f4e9", "score": "0.47538", "text": "func (o *LocalRouterUpdateRequest) GetPeers() []*LocalRouterPeer {\n\treturn o.Peers\n}", "title": "" }, { "docid": "46e38123bab958c86f437503417c4990", "score": "0.47537205", "text": "func (_e *PeerManager_Expecter) Peers() *PeerManager_Peers_Call {\n\treturn &PeerManager_Peers_Call{Call: _e.mock.On(\"Peers\")}\n}", "title": "" }, { "docid": "758fefa2f474816869b9641d0bb4d384", "score": "0.47500467", "text": "func buildStreams(addrs []string) ([]xpipe.Streams, error) {\n\tstrs := make([]xpipe.Streams, len(addrs))\n\tfor i, addr := range addrs {\n\t\tstr, err := xpipe.NewStreams(addr)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Failed to '%s' as a network address. %v\", addr, err)\n\t\t}\n\t\tstrs[i] = str\n\t}\n\treturn strs, nil\n}", "title": "" }, { "docid": "cc4a5d37feb57979a2f0ad8861645aff", "score": "0.47429144", "text": "func (p *Status) Connected() []peer.ID {\n\tp.lock.RLock()\n\tdefer p.lock.RUnlock()\n\tpeers := make([]peer.ID, 0)\n\tfor pid, status := range p.peers {\n\t\tif status.ConnectionState().IsConnected() {\n\t\t\tpeers = append(peers, pid)\n\t\t}\n\t}\n\treturn peers\n}", "title": "" }, { "docid": "f8410a928f6530248356f87249d29afc", "score": "0.47418118", "text": "func (s *Surrogate) Streams() []Stream {\n\tnum := s.value.NumMethod()\n\tvar streams []Stream\n\tfor i := 0; i < num; i++ {\n\t\tmethod := s.value.Method(i)\n\t\tname := s.value.Type().Method(i).Name\n\n\t\tmethodType := method.Type()\n\n\t\t// stream methods are always of type `fn(Context) -> chan T`\n\t\tif methodType.NumIn() != 1 || methodType.NumOut() != 1 {\n\t\t\tcontinue\n\t\t}\n\n\t\t// not a valid input type, expecting a context.Context\n\t\tif !methodType.In(0).Implements(contextType) {\n\t\t\tcontinue\n\t\t}\n\n\t\tif methodType.Out(0).Kind() != reflect.Chan {\n\t\t\tcontinue\n\t\t}\n\n\t\t//todo: validate the Elem of the chan is valid\n\t\tstreams = append(streams, Stream{name: name, method: method})\n\t}\n\n\treturn streams\n}", "title": "" }, { "docid": "3fdd2ffbffa07df881909513c992d3d0", "score": "0.47368848", "text": "func (mab *memoryAddrBook) AddrStream(ctx context.Context, p peer.ID) <-chan ma.Multiaddr {\n\ts := mab.segments.get(p)\n\ts.RLock()\n\tdefer s.RUnlock()\n\n\tbaseaddrslice := s.addrs[p]\n\tinitial := make([]ma.Multiaddr, 0, len(baseaddrslice))\n\tfor _, a := range baseaddrslice {\n\t\tinitial = append(initial, a.Addr)\n\t}\n\n\treturn mab.subManager.AddrStream(ctx, p, initial)\n}", "title": "" }, { "docid": "d5fa8d663b2b333ef9fb73ca6a64a069", "score": "0.47315377", "text": "func Unmarshal(peersBinary []byte) ([]Peer, error) {\n\tconst peerBytes = 6\n\tif len(peersBinary) % peerBytes != 0 {\n\t\terr := fmt.Errorf(\"received malformed peers\")\n\t\treturn nil, err\n\t}\n\n\tnumPeers := len(peersBinary) / peerBytes\n\tpeers := make([]Peer, numPeers)\n\tfor i := 0; i < numPeers; i++ {\n\t\toffset := i * peerBytes\n\t\tpeers[i].IP = peersBinary[offset : offset+4]\n\t\tpeers[i].Port = binary.BigEndian.Uint16(peersBinary[offset+4 : offset+6])\n\t}\n\n\treturn peers, nil\n}", "title": "" }, { "docid": "864efb91a1cc249c8d9b4a8c8d02138f", "score": "0.4730523", "text": "func (s *ArkClient) GetAllPeers() (PeerResponse, ArkApiResponseError, *http.Response) {\n\tpeerResponse := new(PeerResponse)\n\tpeerResponseError := new(ArkApiResponseError)\n\tresp, err := s.sling.New().Get(\"api/peers\").Receive(peerResponse, peerResponseError)\n\n\tif err != nil {\n\t\tpeerResponseError.ErrorMessage = err.Error()\n\t\tpeerResponseError.ErrorObj = err\n\t}\n\n\treturn *peerResponse, *peerResponseError, resp\n}", "title": "" }, { "docid": "dc009bcd1879e3811bd3df9b71d3aac7", "score": "0.4728176", "text": "func (n *Network) ConnectedPeers() []string {\n\tpeers := make([]string, len(n.peers))\n\ti := 0\n\tfor _, v := range n.peers {\n\t\tpeers[i] = fmt.Sprintf(\"%s:%d\", v.ip, v.port)\n\t\ti++\n\t}\n\treturn peers\n}", "title": "" }, { "docid": "28a18a8ccd697ba3d8c720e9e17b9580", "score": "0.4709499", "text": "func seedToPeers(songFile string) {\r\n\tvar wg sync.WaitGroup\r\n\r\n\t// Get list of peers from tracker\r\n\tvar peers proto.TrackerSlice\r\n\tclient.Call(\"list-peers\", proto.ClientCmdMsg{\"\"}, &peers)\r\n\r\n\tpeerToConn = make(map[string]bool)\r\n\r\n\t// Loop to acquire udp connections to all other peers\r\n\tfor _, peer := range peers.Res {\r\n\t\tip, _, _ := net.SplitHostPort(peer)\r\n\r\n\t\tif ip != publicIp { // check not this client\r\n\t\t\t// Connect to an available peer\r\n\t\t\tpc, _ := net.Dial(\"udp\", net.JoinHostPort(ip, \"6121\"))\r\n\t\t\tpeerToConn[ip] = false\r\n\r\n\t\t\twg.Add(1)\r\n\t\t\t// ARQ requests to the peer until we set its response bool to nil\r\n\t\t\tgo func() {\r\n\t\t\t\tdefer wg.Done()\r\n\t\t\t\tdefer pc.Close()\r\n\t\t\t\tfor {\r\n\t\t\t\t\tmux.Lock()\r\n\t\t\t\t\tif peerToConn[ip] {\r\n\t\t\t\t\t\tmux.Unlock()\r\n\t\t\t\t\t\tbreak\r\n\t\t\t\t\t}\r\n\t\t\t\t\tmux.Unlock()\r\n\r\n\t\t\t\t\tpc.Write([]byte(\"request:\" + songFile))\r\n\t\t\t\t\ttime.Sleep(500 * time.Microsecond)\r\n\t\t\t\t}\r\n\t\t\t}()\r\n\t\t}\r\n\t}\r\n\r\n\twg.Wait() // wait until we get a response from every peer\r\n\r\n\r\n\t// Dial seedees mp3 port\r\n\tfor _, seedee := range seedees {\r\n\t\tc, _ := net.Dial(\"udp\", net.JoinHostPort(seedee, \"6122\"))\r\n\t\tpeerToSeedees[seedee] = c\r\n\t}\r\n\r\n\tif isSourceSeeder {\r\n\t\tr, err := os.Open(\"../songs/\" + songFile)\r\n\t\tif err != nil {\r\n\t\t\tlog.Fatal(err)\r\n\t\t\treturn\r\n\t\t}\r\n\r\n\t\td := mp3.NewDecoder(r)\r\n\r\n\t\tskipped := 0\r\n\t\tcurrIndex := 0\r\n\t\tprebufferedFrames := 0\r\n\t\tvar frame mp3.Frame\r\n\r\n\t\tfor connectedToTracker {\r\n\t\t\tif prebufferedFrames == 300 { // pre-buffered 200 frames before playing\r\n\t\t\t\t// send rpc to start playing\r\n\t\t\t\tgo client.Call(\"ready-to-play\", proto.ClientCmdMsg{\"\"}, nil)\r\n\t\t\t}\r\n\r\n\t\t\tif err := d.Decode(&frame, &skipped); err != nil {\r\n\t\t\t\tbreak\r\n\t\t\t}\r\n\r\n\t\t\treader := frame.Reader()\r\n\t\t\tframe_bytes, _ := ioutil.ReadAll(reader)\r\n\r\n\t\t\tfor _, c := range peerToSeedees {\r\n\t\t\t\tc.Write(frame_bytes)\r\n\t\t\t\ttime.Sleep(300 * time.Microsecond)\r\n\t\t\t}\r\n\r\n\t\t\t// Write frame into local songBuf\r\n\t\t\tfor j := 0; j < len(frame_bytes); j++ {\r\n\t\t\t\tsongBuf[currIndex + j] = frame_bytes[j]\r\n\t\t\t}\r\n\t\t\r\n\t\t\tcurrIndex = currIndex + len(frame_bytes)\r\n\t\t\tprebufferedFrames++\r\n\t\t}\r\n\t}\r\n}", "title": "" }, { "docid": "7131359836bee66c619bfe8d8ed8f497", "score": "0.47045985", "text": "func streamRouter(ports []uint16, parsedPackets chan *pcap.Packet, processors []chan *pcap.Packet) {\n\tfor pkt := range parsedPackets {\n\t\tif pkt.TCP == nil {\n\t\t\tcontinue\n\t\t}\n\t\tclientPort := uint16(0)\n\t\tfor _, p := range ports {\n\t\t\tif pkt.TCP.SrcPort == p {\n\t\t\t\tclientPort = pkt.TCP.DestPort\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif pkt.TCP.DestPort == p {\n\t\t\t\tclientPort = pkt.TCP.SrcPort\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif clientPort != 0 {\n\t\t\t// client Port can be assumed to have sufficient entropy for\n\t\t\t// distribution among processors, and we want the same\n\t\t\t// tcp stream to go to the same processor every time\n\t\t\t// so that if we do proper packet reconstruction it will\n\t\t\t// be easier.\n\t\t\tselect {\n\t\t\tcase processors[int(clientPort)%len(processors)] <- pkt:\n\t\t\tdefault:\n\t\t\t\tfmt.Fprint(os.Stderr, \"Shedding load at router!\")\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "efca3096cc76600e524131cfd66a9558", "score": "0.47040993", "text": "func Peers(relativePath string, router *gin.RouterGroup, conf *config.Config) {\n\trouter.GET(relativePath, func(ctx *gin.Context) {\n\t\tr := ctx.Request\n\t\tif !model.IsPeer(r, conf) {\n\t\t\tctx.JSON(http.StatusNotAcceptable, model.GetClusterNotPermitMessage(r))\n\t\t\treturn\n\t\t}\n\n\t\tctx.JSON(http.StatusOK, conf.Peers())\n\t})\n}", "title": "" }, { "docid": "68c6a88cf0222994dcc6a1bc91c15f8a", "score": "0.47016355", "text": "func (service *Info) Peers(_ *http.Request, _ *struct{}, reply *PeersReply) error {\n\tservice.log.Info(\"Info: Peers called\")\n\n\treply.Peers = service.networking.Peers()\n\treturn nil\n}", "title": "" }, { "docid": "645e16a6824c8e0b7ea9f489742923ea", "score": "0.46977314", "text": "func Live() Streams {\n\turl := follow_url\n\treqT := get\n\tresp, err := Send(GenReq(&reqT, &url, nil))\n\tif err != nil {\n\t\tlog.Fatal(\"Couldn't get followed list, quitting\", err)\n\t}\n\tresp_data, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tlog.Fatal(\"Could not parse response, quitting\", err)\n\t}\n\tlive := Streams{}\n\terr = json.Unmarshal([]byte(resp_data), &live)\n\n\tif err != nil {\n\t\tlog.Fatal(\"Couldn't unmarshal json...\", err)\n\t}\n\treturn live\n}", "title": "" }, { "docid": "41b26768425d1a860a4ed025f27f8643", "score": "0.46950656", "text": "func (a *Assembler) Streams() chan Stream {\n\treturn a.output\n}", "title": "" }, { "docid": "b980c7bf252cfd2c089001b25b0672ef", "score": "0.46889806", "text": "func (app *subApplications) Peers() application_peers.Application {\n\treturn app.peerApp\n}", "title": "" }, { "docid": "d74986bcad36c9ee6f3ab6e02cd638f7", "score": "0.46852258", "text": "func (c *Chain) sendToPeers(peers []*Peer, prop *TransactionProposal) []*PeerResponse {\n\tch := make(chan *PeerResponse)\n\tl := len(peers)\n\tresp := make([]*PeerResponse, 0, l)\n\tfor _, p := range peers {\n\t\tgo p.Endorse(ch, prop.Proposal)\n\t}\n\tfor i := 0; i < l; i++ {\n\t\tresp = append(resp, <-ch)\n\t}\n\tclose(ch)\n\treturn resp\n}", "title": "" }, { "docid": "3751cc50c1adab3c1a6b36f7c2ce3081", "score": "0.4684365", "text": "func (m *AnnounceMemory) FindPeers(infoHash gorrent.Sha1Hash, maxAge time.Duration) []gorrent.Peer {\n\tvar peers []gorrent.Peer\n\n\tfor _, a := range m.announces {\n\t\tif a.Announce.InfoHash == infoHash {\n\t\t\tlimit := time.Now().Add(-maxAge)\n\t\t\tif a.LastUpdated.After(limit) {\n\t\t\t\tpeers = append(peers, a.Announce.Peer)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn peers\n}", "title": "" }, { "docid": "39326a11cc2d507f7840b64705c683aa", "score": "0.46831247", "text": "func (cp *MultiStrategy) Filter() (interface{}, error) {\n\tres := make([]string, 0)\n\tdupCheck := make(map[string]bool)\n\t// add target peers\n\tfor _, peer := range cp.targetPeers {\n\t\tif _, ok := dupCheck[peer]; !ok {\n\t\t\tdupCheck[peer] = true\n\t\t\tres = append(res, peer)\n\t\t}\n\t}\n\tif len(res) > 0 {\n\t\treturn res, nil\n\t}\n\n\t// add all filters\n\tfor _, filter := range cp.filters {\n\t\tpeers, err := filter.Filter()\n\t\tif err != nil {\n\t\t\treturn res, err\n\t\t}\n\t\tfor _, peer := range peers.([]string) {\n\t\t\tif _, ok := dupCheck[peer]; !ok {\n\t\t\t\tdupCheck[peer] = true\n\t\t\t\tres = append(res, peer)\n\t\t\t}\n\t\t}\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "554f8ebda142e0b26a19d51821345104", "score": "0.4682538", "text": "func RaftPeers(consenterIDs []uint64) []raft.Peer {\n\tvar peers []raft.Peer\n\n\tfor _, raftID := range consenterIDs {\n\t\tpeers = append(peers, raft.Peer{ID: raftID})\n\t}\n\treturn peers\n}", "title": "" }, { "docid": "d99cb23a923841e4b26126b6ce28f5f3", "score": "0.46703038", "text": "func (br *Broadcast) GetLiveChaining() ([]*Broadcast, error) {\n\tinsta := br.insta\n\tbody, _, err := insta.sendRequest(\n\t\t&reqOptions{\n\t\t\tEndpoint: urlLiveChaining,\n\t\t\tQuery: map[string]string{\n\t\t\t\t\"include_post_lives\": \"true\",\n\t\t\t},\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar resp struct {\n\t\tBroadcasts []*Broadcast `json:\"broadcasts\"`\n\t\tStatus string `json:\"string\"`\n\t}\n\terr = json.Unmarshal(body, &resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, br := range resp.Broadcasts {\n\t\tbr.setValues(insta)\n\t}\n\treturn resp.Broadcasts, nil\n}", "title": "" }, { "docid": "54c6b2bbff0717761e68500308db8883", "score": "0.4668277", "text": "func (o GetVPCRouterWireGuardOutput) Peers() GetVPCRouterWireGuardPeerArrayOutput {\n\treturn o.ApplyT(func(v GetVPCRouterWireGuard) []GetVPCRouterWireGuardPeer { return v.Peers }).(GetVPCRouterWireGuardPeerArrayOutput)\n}", "title": "" }, { "docid": "5a04f10b7857a357de594a4479532755", "score": "0.46660352", "text": "func (c *Client) GetPeers(ctx context.Context) ([]byte, error) {\n\treturn c.apiHandler.GetPeers(ctx, c.groupID)\n}", "title": "" }, { "docid": "6a3c5fb45ffc35076bdd3f6c71b9580f", "score": "0.4662391", "text": "func localPipe() (*localPeer, *localPeer) {\n\taToB := make(chan Message, 10)\n\tbToA := make(chan Message, 10)\n\n\ta := &localPeer{\n\t\tincoming: bToA,\n\t\toutgoing: aToB,\n\t}\n\tb := &localPeer{\n\t\tincoming: aToB,\n\t\toutgoing: bToA,\n\t}\n\n\treturn a, b\n}", "title": "" }, { "docid": "6a3c5fb45ffc35076bdd3f6c71b9580f", "score": "0.4662391", "text": "func localPipe() (*localPeer, *localPeer) {\n\taToB := make(chan Message, 10)\n\tbToA := make(chan Message, 10)\n\n\ta := &localPeer{\n\t\tincoming: bToA,\n\t\toutgoing: aToB,\n\t}\n\tb := &localPeer{\n\t\tincoming: aToB,\n\t\toutgoing: bToA,\n\t}\n\n\treturn a, b\n}", "title": "" }, { "docid": "e20365574eb35ee2e1e227232a9a457e", "score": "0.4657379", "text": "func (s *Server) getLocalPeers(peers []*PeerInfo) []*PeerInfo {\n\t// if there are only two peers, return\n\tif len(peers) <= 2 {\n\t\treturn peers\n\t}\n\n\t// \"insert\" self node info to sort and get peers\n\tpeers = append(peers, &PeerInfo{\n\t\tName: s.config.Name,\n\t\tAddress: s.config.ListenAddr,\n\t})\n\t// convert peer info into map to sort\n\tinfo := map[string]*PeerInfo{}\n\tkeys := make([]string, 0, len(peers))\n\tfor _, p := range peers {\n\t\tinfo[p.Address] = p\n\t\tkeys = append(keys, p.Address)\n\t}\n\n\tsort.Strings(keys)\n\n\tlocalPeers := make([]*PeerInfo, 0, 2)\n\tfor k, v := range keys {\n\t\tif v == s.config.ListenAddr {\n\t\t\t// get previous and next local peers\n\t\t\tnext := k + 1\n\t\t\tprev := k - 1\n\n\t\t\t// handle edges\n\t\t\tif next >= len(peers) {\n\t\t\t\tnext = 0\n\t\t\t}\n\t\t\tif prev < 0 {\n\t\t\t\tprev = len(peers) - 1\n\t\t\t}\n\n\t\t\tn := keys[next]\n\t\t\tp := keys[prev]\n\n\t\t\tnextInfo := info[n]\n\t\t\tprevInfo := info[p]\n\t\t\tlocalPeers = append(localPeers, []*PeerInfo{nextInfo, prevInfo}...)\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// TODO: return previous and next peers as \"local\" peers\n\treturn localPeers\n}", "title": "" }, { "docid": "7b6ec0f493814cd1a98f8dcd9cdb625c", "score": "0.46521372", "text": "func (o *VPCRouterWireGuard) GetPeers() []*VPCRouterWireGuardPeer {\n\treturn o.Peers\n}", "title": "" }, { "docid": "1fa7663b4b349b31bb2203fccd121ff6", "score": "0.4650226", "text": "func (o *LocalRouterUpdateSettingsRequest) GetPeers() []*LocalRouterPeer {\n\treturn o.Peers\n}", "title": "" }, { "docid": "d23f8e87d8613bd4482ae773e9cf05cb", "score": "0.46448058", "text": "func PeerAddrs() []string {\n\taddrs, err := GetStrArrayCfgVal(nil, \"iplist\", \"tx_peers\")\n\tif err != nil {\n\t\tlogger.Panic(err)\n\t}\n\tif len(addrs) == 0 {\n\t\treturn MinerAddrs()\n\t}\n\treturn addrs\n}", "title": "" }, { "docid": "f41443fef127476b4c8389edab3b874a", "score": "0.4644257", "text": "func (this ForgeFedTicketsTrackedByProperty) GetActivityStreamsArrive() vocab.ActivityStreamsArrive {\n\treturn this.activitystreamsArriveMember\n}", "title": "" }, { "docid": "67bf9c5debfbcd179df07825143bde69", "score": "0.46383038", "text": "func (peer *Peer) GetPeerAddresses() {\n\tcommand := 0\n\tmessage, err := xdr.NewStellarMessage(xdr.MessageTypeGetPeers, command)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tpeer.sendMessage(message)\n}", "title": "" }, { "docid": "b14b8d3e05cd054025ff1c55b7370138", "score": "0.46267813", "text": "func newElementStream(s <-chan *Message) (*elements, error) {\n\te := &elements{stream: s}\n\te.next()\n\tif e.err != nil {\n\t\treturn nil, e.err\n\t}\n\treturn e, nil\n}", "title": "" }, { "docid": "bc7540ad15ba1c68e5d89cfaf08288ec", "score": "0.46240574", "text": "func (as StaticAddrs) DiscoverPeers(_ context.Context, opt ...Option) (<-chan peer.AddrInfo, error) {\n\tvar p Param\n\tif err := p.Apply(opt); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif p.isLimited() && len(as) > p.Limit {\n\t\tas = as[:p.Limit]\n\t}\n\n\tps, err := peer.AddrInfosFromP2pAddrs(as...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tch := make(chan peer.AddrInfo, len(ps))\n\tfor _, p := range ps {\n\t\tch <- p\n\t}\n\tclose(ch)\n\n\treturn ch, err\n}", "title": "" }, { "docid": "7d133ef09f9b5b5e8ee0e274c2ee1e5b", "score": "0.46212497", "text": "func bgpPeers() []string {\n\treturn viper.GetStringSlice(\"bgp_peers\")\n}", "title": "" } ]
ed69fc6f1ac13253cfa3eac3e6da8a5e
TestAccInvitedUserRemoveTeam tests adding a team to a rollbar_user resource that is based on an invited but not yet registered email.
[ { "docid": "9588376be7156f7714759404c5742470", "score": "0.787156", "text": "func (s *AccSuite) TestAccInvitedUserRemoveTeam() {\n\trn := \"rollbar_user.test_user\"\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s-team-1\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s-team-2\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"terraform-provider-test+%s@rollbar.com\"\n\t\t\tteam_ids = [\n\t\t\t\trollbar_team.test_team_1.id,\n\t\t\t\trollbar_team.test_team_2.id,\n\t\t\t]\n\t\t\tdepends_on = [\n\t\t\t\trollbar_team.test_team_1, \n\t\t\t\trollbar_team.test_team_2\n\t\t\t]\n\t\t}\n\t`\n\tconfigOrigin := fmt.Sprintf(tmpl, s.randName, s.randName, s.randName)\n\t// language=hcl\n\ttmpl = `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s-team-1\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s-team-2\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"terraform-provider-test+%s@rollbar.com\"\n\t\t\tteam_ids = [rollbar_team.test_team_1.id]\n\t\t}\n\t`\n\tconfigRemoveTeam := fmt.Sprintf(tmpl, s.randName, s.randName, s.randName)\n\tresource.ParallelTest(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: configOrigin,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t\t{\n\t\t\t\tConfig: configRemoveTeam,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t\ts.checkUserTeams(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" } ]
[ { "docid": "88487a631b3cf77a1fe7281b4a3be083", "score": "0.7181659", "text": "func (s *AccSuite) TestAccRegisteredUserRemoveTeam() {\n\trn := \"rollbar_user.test_user\"\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s-team-1\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s-team-2\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"terraform-provider-test@rollbar.com\"\n\t\t\tteam_ids = [\n\t\t\t\trollbar_team.test_team_1.id,\n\t\t\t\trollbar_team.test_team_2.id,\n\t\t\t]\n\t\t\tdepends_on = [\n\t\t\t\trollbar_team.test_team_1, \n\t\t\t\trollbar_team.test_team_2\n\t\t\t]\n\t\t}\n\t`\n\tconfigOrigin := fmt.Sprintf(tmpl, s.randName, s.randName)\n\t// language=hcl\n\ttmpl = `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s-team-1\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s-team-2\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\t# This email already has an account. \n\t\t\t# https://github.com/rollbar/terraform-provider-rollbar/issues/91\n\t\t\temail = \"terraform-provider-test@rollbar.com\"\n\t\t\tteam_ids = [rollbar_team.test_team_1.id]\n\t\t}\n\t`\n\tconfigRemoveTeam := fmt.Sprintf(tmpl, s.randName, s.randName)\n\tresource.Test(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: configOrigin,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t\t{\n\t\t\t\tConfig: configRemoveTeam,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t\ts.checkUserTeams(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "240e7175bb82ba772e24c224ce8ae422", "score": "0.67026865", "text": "func (s *AccSuite) TestAccInvitedUserAddTeam() {\n\trn := \"rollbar_user.test_user\"\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s-team-1\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s-team-2\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"terraform-provider-test+%s@rollbar.com\"\n\t\t\tteam_ids = [rollbar_team.test_team_1.id]\n\t\t}\n\t`\n\tconfigOrigin := fmt.Sprintf(tmpl, s.randName, s.randName, s.randName)\n\t// language=hcl\n\ttmpl = `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s-team-1\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s-team-2\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"terraform-provider-test+%s@rollbar.com\"\n\t\t\tteam_ids = [\n\t\t\t\trollbar_team.test_team_1.id,\n\t\t\t\trollbar_team.test_team_2.id,\n\t\t\t]\n\t\t\tdepends_on = [\n\t\t\t\trollbar_team.test_team_1, \n\t\t\t\trollbar_team.test_team_2\n\t\t\t]\n\t\t}\n\t`\n\tconfigAddTeam := fmt.Sprintf(tmpl, s.randName, s.randName, s.randName)\n\tresource.ParallelTest(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: configOrigin,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t\t{\n\t\t\t\tConfig: configAddTeam,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t\ts.checkUserTeams(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "ad32196353641d4d7488de6719aa2e58", "score": "0.65040416", "text": "func UserTeamDelete(c *gin.Context) {\n\tform := &model.UserTeamParams{}\n\n\tif err := c.BindJSON(&form); err != nil {\n\t\tlogrus.Warnf(\"Failed to bind user team data. %s\", err)\n\n\t\tc.JSON(\n\t\t\thttp.StatusPreconditionFailed,\n\t\t\tgin.H{\n\t\t\t\t\"status\": http.StatusPreconditionFailed,\n\t\t\t\t\"message\": \"Failed to bind user team data\",\n\t\t\t},\n\t\t)\n\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tassigned := store.GetUserHasTeam(\n\t\tc,\n\t\tform,\n\t)\n\n\tif assigned == false {\n\t\tc.JSON(\n\t\t\thttp.StatusPreconditionFailed,\n\t\t\tgin.H{\n\t\t\t\t\"status\": http.StatusPreconditionFailed,\n\t\t\t\t\"message\": \"Team is not assigned\",\n\t\t\t},\n\t\t)\n\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\terr := store.DeleteUserTeam(\n\t\tc,\n\t\tform,\n\t)\n\n\tif err != nil {\n\t\tlogrus.Warnf(\"Failed to delete user team. %s\", err)\n\n\t\tc.JSON(\n\t\t\thttp.StatusInternalServerError,\n\t\t\tgin.H{\n\t\t\t\t\"status\": http.StatusInternalServerError,\n\t\t\t\t\"message\": \"Failed to unlink team\",\n\t\t\t},\n\t\t)\n\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tc.JSON(\n\t\thttp.StatusOK,\n\t\tgin.H{\n\t\t\t\"status\": http.StatusOK,\n\t\t\t\"message\": \"Successfully unlinked team\",\n\t\t},\n\t)\n}", "title": "" }, { "docid": "37df23b0a5c778a2a053ba1a5b096546", "score": "0.6485937", "text": "func TestTeamRemoveAfterReset(t *testing.T) {\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUser(\"bob\", 10)\n\tbob.signup()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\tjoe := ctx.installKeybaseForUser(\"joe\", 10)\n\tjoe.signup()\n\tdivDebug(ctx, \"Signed up joe (%s)\", joe.username)\n\n\tteam := ann.createTeam([]*smuUser{bob, joe})\n\tdivDebug(ctx, \"team created (%s)\", team.name)\n\n\tkickTeamRekeyd(ann.getPrimaryGlobalContext(), t)\n\tbob.reset()\n\tdivDebug(ctx, \"Reset bob (%s)\", bob.username)\n\n\tbob.loginAfterReset(10)\n\tdivDebug(ctx, \"Bob logged in after reset\")\n\tann.pollForMembershipUpdate(team, keybase1.PerTeamKeyGeneration(2), nil)\n\n\tjoe.reset()\n\tdivDebug(ctx, \"Reset joe (%s), not re-provisioning though!\", joe.username)\n\n\tann.pollForMembershipUpdate(team, keybase1.PerTeamKeyGeneration(3), nil)\n\n\tcli := ann.getTeamsClient()\n\terr := cli.TeamRemoveMember(context.TODO(), keybase1.TeamRemoveMemberArg{\n\t\tTeamID: team.ID,\n\t\tMember: keybase1.NewTeamMemberToRemoveWithAssertion(keybase1.AssertionTeamMemberToRemove{Assertion: bob.username}),\n\t})\n\trequire.NoError(t, err)\n\n\terr = cli.TeamRemoveMember(context.TODO(), keybase1.TeamRemoveMemberArg{\n\t\tTeamID: team.ID,\n\t\tMember: keybase1.NewTeamMemberToRemoveWithAssertion(keybase1.AssertionTeamMemberToRemove{Assertion: joe.username}),\n\t})\n\trequire.NoError(t, err)\n\n\tG := ann.getPrimaryGlobalContext()\n\tteams.NewTeamLoaderAndInstall(G)\n\trole, err := teams.MemberRole(context.TODO(), G, team.name, bob.username)\n\trequire.NoError(t, err)\n\trequire.Equal(t, role, keybase1.TeamRole_NONE)\n}", "title": "" }, { "docid": "44cf51537152ead39b65d1aa56f6b432", "score": "0.6359807", "text": "func (s *AccSuite) TestAccProjectRemoveTeam() {\n\tteam1ResourceName := \"rollbar_team.test_team_1\"\n\tteam1Name := fmt.Sprintf(\"%s-team-1\", s.randName)\n\tteam2ResourceName := \"rollbar_team.test_team_2\"\n\tteam2Name := fmt.Sprintf(\"%s-team-2\", s.randName)\n\tprojectResourceName := \"rollbar_project.test_project\"\n\tprojectName := s.randName\n\n\t// language=hcl\n\ttmpl1 := `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_project\" \"test_project\" {\n\t\t\tname = \"%s\"\n\t\t\tteam_ids = [\n\t\t\t\trollbar_team.test_team_1.id,\n\t\t\t\trollbar_team.test_team_2.id,\n\t\t\t]\n\t\t}\n\t`\n\tconfig1 := fmt.Sprintf(tmpl1, team1Name, team2Name, projectName)\n\n\t// language=hcl\n\ttmpl2 := `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_project\" \"test_project\" {\n\t\t\tname = \"%s\"\n\t\t\tteam_ids = [rollbar_team.test_team_1.id]\n\t\t}\n\t`\n\tconfig2 := fmt.Sprintf(tmpl2, team1Name, projectName)\n\n\tresource.ParallelTest(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: config1,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(projectResourceName, \"team_ids.*\", team1ResourceName, \"id\"),\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(projectResourceName, \"team_ids.*\", team2ResourceName, \"id\"),\n\t\t\t\t),\n\t\t\t},\n\t\t\t{\n\t\t\t\tConfig: config2,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(projectResourceName, \"team_ids.0\", team1ResourceName, \"id\"),\n\t\t\t\t\ts.checkProjectTeams(projectResourceName),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "5a0180d33ab9b171e2b978721c10d9cf", "score": "0.62779695", "text": "func (s *AccSuite) checkUserIsNotInvited(userEmail, teamName string) resource.TestCheckFunc {\n\treturn func(ts *terraform.State) error {\n\t\tl := log.With().\n\t\t\tStr(\"user_email\", userEmail).\n\t\t\tStr(\"team_name\", teamName).\n\t\t\tLogger()\n\t\tl.Info().Msg(\"Checking that user is not invited to team\")\n\t\tc := s.client()\n\n\t\tteamID, err := c.FindTeamID(teamName)\n\t\ts.Nil(err)\n\t\tinvitations, err := c.ListPendingInvitations(teamID)\n\t\ts.Nil(err)\n\t\tfor _, inv := range invitations {\n\t\t\tif inv.ToEmail == userEmail {\n\t\t\t\terr = fmt.Errorf(\"user %s is invited to team %s\", userEmail, teamName)\n\t\t\t\tl.Err(err).Send()\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tl.Debug().Msg(\"Confirmed user is not invited to team\")\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "7337bb77130cca37adda7f547ddb79f1", "score": "0.62720305", "text": "func TestTeamDelete(t *testing.T) {\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUser(\"bob\", 10)\n\tbob.signup()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\tcam := ctx.installKeybaseForUser(\"cam\", 10)\n\tcam.signup()\n\tdivDebug(ctx, \"Signed up cam (%s)\", cam.username)\n\n\tteam := ann.createTeam([]*smuUser{bob, cam})\n\tdivDebug(ctx, \"team created (%s)\", team.name)\n\n\tann.sendChat(team, \"0\")\n\tdivDebug(ctx, \"Sent chat '0' (%s via %s)\", team.name, ann.username)\n\n\tann.readChats(team, 1)\n\tbob.readChats(team, 1)\n\tdivDebug(ctx, \"Ann and bob can read\")\n\n\t// just one person needs to do this before ann deletes, so her\n\t// deletion will immediately fall into accelerated rekeyd.\n\tkickTeamRekeyd(bob.getPrimaryGlobalContext(), t)\n\n\tann.delete()\n\tdivDebug(ctx, \"Ann deleted her account\")\n\tdivDebug(ctx, \"ann uid: %s\", ann.uid())\n\tdivDebug(ctx, \"bob uid: %s\", bob.uid())\n\tdivDebug(ctx, \"cam uid: %s\", cam.uid())\n\n\t// bob and cam should see the key get rotated after ann deletes\n\tbob.pollForMembershipUpdate(team, keybase1.PerTeamKeyGeneration(2), nil)\n\tcam.pollForMembershipUpdate(team, keybase1.PerTeamKeyGeneration(2), nil)\n\n\t// It's important for cam to clear her cache right before the attempt to send,\n\t// since she might have received gregors that ann deleted her account,\n\t// and therefore might be trying to refresh and load the team.\n\tcam.primaryDevice().clearUPAKCache()\n\tcam.sendChat(team, \"1\")\n\n\tdivDebug(ctx, \"Cam sent a chat\")\n\tbob.readChats(team, 2)\n\n\t// Disable UIDMapper cache to be able to see current state of\n\t// Active/Inactive for members.\n\tbob.setUIDMapperNoCachingMode(true)\n\tcam.setUIDMapperNoCachingMode(true)\n\n\tbob.assertMemberMissing(team, ann)\n\tbob.assertMemberActive(team, cam)\n\n\tcam.assertMemberMissing(team, ann)\n\tcam.assertMemberActive(team, bob)\n}", "title": "" }, { "docid": "930f257475940516781d2d42fc0ef9ae", "score": "0.6160412", "text": "func (s *AccSuite) TestAccRegisteredUserAddTeam() {\n\trn := \"rollbar_user.test_user\"\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s-team-1\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s-team-2\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\t# This email already has an account. \n\t\t\t# https://github.com/rollbar/terraform-provider-rollbar/issues/91\n\t\t\temail = \"terraform-provider-test@rollbar.com\"\n\t\t\tteam_ids = [rollbar_team.test_team_1.id]\n\t\t}\n\t`\n\tconfigOrigin := fmt.Sprintf(tmpl, s.randName, s.randName)\n\t// language=hcl\n\ttmpl = `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s-team-1\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s-team-2\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"terraform-provider-test@rollbar.com\"\n\t\t\tteam_ids = [\n\t\t\t\trollbar_team.test_team_1.id,\n\t\t\t\trollbar_team.test_team_2.id,\n\t\t\t]\n\t\t\tdepends_on = [\n\t\t\t\trollbar_team.test_team_1, \n\t\t\t\trollbar_team.test_team_2\n\t\t\t]\n\t\t}\n\t`\n\tconfigAddTeam := fmt.Sprintf(tmpl, s.randName, s.randName)\n\tresource.Test(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: configOrigin,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t\t{\n\t\t\t\tConfig: configAddTeam,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t\ts.checkUserTeams(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "b8bf6989707355c39dbd968cb071e9a0", "score": "0.6076984", "text": "func TestTeamResetAdd(t *testing.T) {\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUser(\"bob\", 10)\n\tbob.signup()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\tcam := ctx.installKeybaseForUser(\"cam\", 10)\n\tcam.signup()\n\tdivDebug(ctx, \"Signed up cam (%s)\", cam.username)\n\n\tteam := ann.createTeam([]*smuUser{cam})\n\tdivDebug(ctx, \"team created (%s)\", team.name)\n\n\tann.sendChat(team, \"0\")\n\tdivDebug(ctx, \"Sent chat '2' (%s via %s)\", team.name, ann.username)\n\n\tann.readChats(team, 1)\n\n\tbob.reset()\n\tdivDebug(ctx, \"Reset bob (%s)\", bob.username)\n\n\tbob.loginAfterReset(10)\n\tdivDebug(ctx, \"Bob logged in after reset\")\n\n\t_, err := bob.teamGet(team)\n\trequire.Error(t, err)\n\tdivDebug(ctx, \"Bob failed to read the team\")\n\n\tann.addWriter(team, bob)\n\tdivDebug(ctx, \"Added bob as a writer\")\n\t_, err = bob.teamGet(team)\n\trequire.NoError(t, err)\n\tdivDebug(ctx, \"Bob could read the team after added\")\n\tbob.readChats(team, 1)\n\tdivDebug(ctx, \"Bob reading chats after added\")\n\tann.sendChat(team, \"1\")\n\tdivDebug(ctx, \"Ann sending chat '2'\")\n\tbob.readChats(team, 2)\n\tdivDebug(ctx, \"Bob reading chat '2'\")\n}", "title": "" }, { "docid": "d53a905849b11ee34bf330678a722cf1", "score": "0.6066275", "text": "func (s *AccSuite) TestAccUserCreateInvite() {\n\trn := \"rollbar_user.test_user\"\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team\" {\n\t\t\tname = \"%s-team-0\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"terraform-provider-test+%s@rollbar.com\"\n\t\t\tteam_ids = [rollbar_team.test_team.id]\n\t\t}\n\t`\n\tconfig := fmt.Sprintf(tmpl, s.randName, s.randName)\n\tresource.ParallelTest(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: config,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t\ts.checkUserTeams(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "38d01c2943866a76348b9e26849da862", "score": "0.6054078", "text": "func (s *AccSuite) TestAccUserInvitedToRegistered() {\n\trn := \"rollbar_user.test_user\"\n\t//randString := s.randName\n\trandString := \"tf-acc-test-7lppmg40pk\" // Must be constant across VCR record/playback runs\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"jason.mcvetta+%s@gmail.com\"\n\t\t\tteam_ids = [rollbar_team.test_team.id]\n\t\t}\n\t`\n\tconfig := fmt.Sprintf(tmpl, randString, randString)\n\tvar r *recorder.Recorder\n\torigTransport := http.DefaultTransport\n\tresource.Test(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tPreConfig: func() {\n\t\t\t\t\tvar err error\n\t\t\t\t\tr, err = recorder.New(\"vcr/invited_user\")\n\t\t\t\t\ts.Nil(err)\n\t\t\t\t\tr.AddFilter(vcrFilterHeaders)\n\t\t\t\t\thttp.DefaultTransport = r\n\t\t\t\t},\n\t\t\t\tConfig: config,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t\tresource.TestCheckResourceAttr(rn, \"status\", \"invited\"),\n\t\t\t\t),\n\t\t\t},\n\t\t\t{\n\t\t\t\tPreConfig: func() {\n\t\t\t\t\t// When recording the cassette, we use\n\t\t\t\t\t// github.com/sqweek/dialog to pop up a GUI dialog and wait\n\t\t\t\t\t// for confirmation; thereby allowing the developer to\n\t\t\t\t\t// manually accept the invitation.\n\n\t\t\t\t\t//ok := dialog.Message(\n\t\t\t\t\t//\t\"%s\",\n\t\t\t\t\t//\t\"Accept the email invitation then continue\",\n\t\t\t\t\t//).Title(\"Invitation accepted?\").YesNo()\n\t\t\t\t\t//if !ok {\n\t\t\t\t\t//\ts.FailNow(\"User did not accept the invitation\")\n\t\t\t\t\t//}\n\n\t\t\t\t\terr := r.Stop() // Stop the previous recorder\n\t\t\t\t\ts.Nil(err)\n\t\t\t\t\tr, err = recorder.New(\"vcr/registered_user\")\n\t\t\t\t\ts.Nil(err)\n\t\t\t\t\tr.AddFilter(vcrFilterHeaders)\n\t\t\t\t\thttp.DefaultTransport = r\n\n\t\t\t\t},\n\t\t\t\tConfig: config,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t\tresource.TestCheckResourceAttr(rn, \"status\", \"registered\"),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n\terr := r.Stop() // Stop the last recorder\n\ts.Nil(err)\n\thttp.DefaultTransport = origTransport\n}", "title": "" }, { "docid": "b8a43c11f10dc1798b5084fdd7f9e3e0", "score": "0.5890246", "text": "func (s *AccSuite) checkUserIsNotOnTeam(userEmail, teamName string) resource.TestCheckFunc {\n\treturn func(ts *terraform.State) error {\n\t\tl := log.With().\n\t\t\tStr(\"user_email\", userEmail).\n\t\t\tStr(\"team_name\", teamName).\n\t\t\tLogger()\n\t\tl.Info().Msg(\"Checking that user is not member of team\")\n\t\tc := s.client()\n\n\t\tuserID, err := c.FindUserID(userEmail)\n\t\ts.Nil(err)\n\t\tteams, err := c.ListUserTeams(userID)\n\t\ts.Nil(err)\n\t\tfor _, t := range teams {\n\t\t\tif t.Name == teamName {\n\t\t\t\terr = fmt.Errorf(\"check failed, user %s is member of team %s\", userEmail, teamName)\n\t\t\t\tl.Err(err).Send()\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tl.Debug().Msg(\"Confirmed that user is not member of team\")\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "3541ae4bef497ac92b74ffec8989d8a1", "score": "0.58742416", "text": "func TestTeamAddAfterReset(t *testing.T) {\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUser(\"bob\", 10)\n\tbob.signup()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\n\tteam := ann.createTeam([]*smuUser{bob})\n\tdivDebug(ctx, \"team created (%s)\", team.name)\n\n\tann.sendChat(team, \"0\")\n\n\tkickTeamRekeyd(ann.getPrimaryGlobalContext(), t)\n\tbob.reset()\n\tdivDebug(ctx, \"Reset bob (%s)\", bob.username)\n\n\tbob.loginAfterReset(10)\n\tdivDebug(ctx, \"Bob logged in after reset\")\n\n\tann.pollForMembershipUpdate(team, keybase1.PerTeamKeyGeneration(2), nil)\n\n\tcli := ann.getTeamsClient()\n\t_, err := cli.TeamAddMember(context.TODO(), keybase1.TeamAddMemberArg{\n\t\tTeamID: team.ID,\n\t\tUsername: bob.username,\n\t\t// Note: any role would do! Does not have to be the same as before\n\t\t// reset. This does not apply to imp-teams though, it requires the\n\t\t// same role there.\n\t\tRole: keybase1.TeamRole_READER,\n\t})\n\trequire.NoError(t, err)\n\n\tG := ann.getPrimaryGlobalContext()\n\tteams.NewTeamLoaderAndInstall(G)\n\trole, err := teams.MemberRole(context.TODO(), G, team.name, bob.username)\n\trequire.NoError(t, err)\n\trequire.Equal(t, role, keybase1.TeamRole_READER)\n\n\tbob.readChats(team, 1)\n}", "title": "" }, { "docid": "855852507eefb275dca31ca4c27ca741", "score": "0.5865202", "text": "func (s *AccSuite) checkUserTeams(resourceName string) resource.TestCheckFunc {\n\treturn func(ts *terraform.State) error {\n\t\tl := log.With().Logger()\n\t\tl.Info().Msg(\"Checking rollbar_user resource's teams\")\n\t\tc := s.client()\n\t\temail, err := s.getResourceIDString(ts, resourceName)\n\t\ts.Nil(err)\n\n\t\tteamExpected := make(map[int]bool) // Teams user is expected to have\n\t\tteamFound := make(map[int]bool) // Teams found for this user\n\t\tvar unexpectedTeams []int\n\t\tteamCount, err := s.getResourceAttrInt(ts, resourceName, \"team_ids.#\")\n\t\ts.Nil(err)\n\t\tfor i := 0; i < teamCount; i++ {\n\t\t\tattr := fmt.Sprintf(\"team_ids.%d\", i)\n\t\t\tteamID, err := s.getResourceAttrInt(ts, resourceName, attr)\n\t\t\ts.Nil(err)\n\t\t\tteamFound[teamID] = false\n\t\t\tteamExpected[teamID] = true\n\t\t}\n\t\tl = l.With().Interface(\"teamExpected\", teamExpected).Logger()\n\n\t\t// Check team memberships, if state contains a Rollbar user ID.\n\t\tif userID, err := s.getResourceAttrInt(ts, resourceName, \"user_id\"); err == nil {\n\t\t\tcurrentTeams, err := c.ListUserCustomTeams(userID)\n\t\t\ts.Nil(err)\n\t\t\tfor teamID := range teamFound {\n\t\t\t\t// Did we find an expected team?\n\t\t\t\tfor _, t := range currentTeams {\n\t\t\t\t\tif t.ID == teamID {\n\t\t\t\t\t\tteamFound[teamID] = true\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\t// Did we find an unexpected team?\n\t\t\t\tif !teamExpected[teamID] {\n\t\t\t\t\tunexpectedTeams = append(unexpectedTeams, teamID)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tl.Debug().\n\t\t\tInterface(\"teamFound\", teamFound).\n\t\t\tMsg(\"Existing team memberships\")\n\n\t\t// Check invitations\n\t\tinvitations, err := c.FindPendingInvitations(email)\n\t\tif err != nil && err != client.ErrNotFound {\n\t\t\ts.Nil(err)\n\t\t}\n\t\t// Did we find any expected teams?\n\t\tfor teamID := range teamFound {\n\t\t\tfor _, inv := range invitations {\n\t\t\t\tif inv.TeamID == teamID {\n\t\t\t\t\tteamFound[teamID] = true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\t// Did we find any unexpected teams?\n\t\tfor _, inv := range invitations {\n\t\t\tif !teamExpected[inv.TeamID] {\n\t\t\t\tunexpectedTeams = append(unexpectedTeams, inv.TeamID)\n\t\t\t}\n\t\t}\n\t\tl.Debug().\n\t\t\tInterface(\"teamFound\", teamFound).\n\t\t\tMsg(\"Team invitations plus memberships\")\n\n\t\t// Error if any team was not found\n\t\tfor teamID, found := range teamFound {\n\t\t\tif !found {\n\t\t\t\tmsg := fmt.Sprintf(\"team %d not found\", teamID)\n\t\t\t\tl.Error().Msg(msg)\n\t\t\t\treturn fmt.Errorf(msg)\n\t\t\t}\n\t\t}\n\n\t\t// Error if any unexpected team was found\n\t\tif len(unexpectedTeams) != 0 {\n\t\t\tfor _, teamID := range unexpectedTeams {\n\t\t\t\tt, err := c.ReadTeam(teamID)\n\t\t\t\ts.Nil(err)\n\t\t\t\tl.Error().\n\t\t\t\t\tInterface(\"team\", t).\n\t\t\t\t\tMsg(\"Found unexpected team\")\n\t\t\t}\n\t\t\tmsg := fmt.Sprintf(\"found unexpected teams: %v\", unexpectedTeams)\n\t\t\tlog.Error().Msg(msg)\n\t\t\treturn fmt.Errorf(msg)\n\t\t}\n\n\t\t// Check passed!\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "08eb5f695b3b167ffe8f0c2cd38ef3a7", "score": "0.5836474", "text": "func ExitUserTeam(db *sql.DB, username string, teamname string) error {\n\tif db == nil {\n\t\treturn errors.New(errorDBNil)\n\t}\n\tu, err := GetUserUsername(db, username)\n\tif err != nil {\n\t\treturn err\n\t}\n\tt, err := GetTeam(db, teamname)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif u == nil || t == nil {\n\t\treturn errors.New(errorResourceNotFound)\n\t}\n\tquery, err := db.Prepare(\"DELETE FROM EquipoUsuario WHERE usuarioid = ? AND equipoid = ? \")\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer query.Close()\n\t_, err = query.Exec(u.ID, t.ID)\n\treturn err\n}", "title": "" }, { "docid": "24b9f55feb930f74baec4b0ce778b0fd", "score": "0.5834214", "text": "func (s *AccSuite) TestAccUserImportInvited() {\n\trn := \"rollbar_user.test_user\"\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team\" {\n\t\t\tname = \"%s-team-0\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"terraform-provider-test+%s@rollbar.com\"\n\t\t\tteam_ids = [rollbar_team.test_team.id]\n\t\t}\n\t`\n\tconfig := fmt.Sprintf(tmpl, s.randName, s.randName)\n\tresource.ParallelTest(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: config,\n\t\t\t},\n\t\t\t{\n\t\t\t\tResourceName: rn,\n\t\t\t\tImportState: true,\n\t\t\t\tImportStateVerify: true,\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "61a6a68a2f123c80aaa48fb0a6bcc9a8", "score": "0.5825836", "text": "func testTeamReAddAfterReset(t *testing.T, pukful, adminOwner, removeAfterReset bool) {\n\tif removeAfterReset && !adminOwner {\n\t\trequire.FailNow(t, \"nope\")\n\t}\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUser(\"bob\", 10)\n\tbob.signup()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\n\tvar team smuTeam\n\tif adminOwner {\n\t\t// Create a team where ann is an admin and bob is an owner.\n\t\tteam = ann.createTeam2(nil, nil, nil, []*smuUser{bob})\n\t\tann.editMember(&team, ann.username, keybase1.TeamRole_ADMIN)\n\t} else {\n\t\tteam = ann.createTeam([]*smuUser{bob})\n\t}\n\tdivDebug(ctx, \"team created (%s) (%v)\", team.name, team.ID)\n\n\tbobUVBeforeReset := bob.userVersion()\n\n\tann.sendChat(team, \"0\")\n\tkickTeamRekeyd(ann.getPrimaryGlobalContext(), t)\n\tbob.reset()\n\tdivDebug(ctx, \"Reset bob (%s)\", bob.username)\n\n\tif pukful {\n\t\t// Bob gets a puk BEFORE being re-added.\n\t\tbob.loginAfterReset(10)\n\t\tdivDebug(ctx, \"Bob logged in after reset\")\n\t}\n\n\tann.pollForMembershipUpdate(team, keybase1.PerTeamKeyGeneration(2), nil)\n\n\tcli := ann.getTeamsClient()\n\terr := cli.TeamReAddMemberAfterReset(context.TODO(), keybase1.TeamReAddMemberAfterResetArg{\n\t\tId: team.ID,\n\t\tUsername: bob.username,\n\t})\n\trequire.NoError(t, err)\n\n\tif removeAfterReset {\n\t\terr := ann.getTeamsClient().TeamRemoveMember(context.TODO(), keybase1.TeamRemoveMemberArg{\n\t\t\tTeamID: team.ID,\n\t\t\tMember: keybase1.NewTeamMemberToRemoveWithAssertion(keybase1.AssertionTeamMemberToRemove{Assertion: bob.username}),\n\t\t})\n\t\trequire.NoError(t, err)\n\t\treturn\n\t}\n\n\tif !pukful {\n\t\t// Bob gets a puk AFTER being re-added.\n\t\tbob.loginAfterReset(10)\n\t\tdivDebug(ctx, \"Bob logged in after reset\")\n\t}\n\n\texpectedRole := keybase1.TeamRole_WRITER\n\tif adminOwner {\n\t\t// The reset owner should be re-admitted as an owner since\n\t\t// that's the highest power ann can grant.\n\t\texpectedRole = keybase1.TeamRole_ADMIN\n\t}\n\n\tteams.NewTeamLoaderAndInstall(ann.getPrimaryGlobalContext())\n\n\tpollFn := func(_ int) bool {\n\t\tG := ann.getPrimaryGlobalContext()\n\t\tteamObj, err := teams.Load(context.TODO(), G, keybase1.LoadTeamArg{\n\t\t\tID: team.ID,\n\t\t\tNeedAdmin: true,\n\t\t\tForceRepoll: true,\n\t\t})\n\t\trequire.NoError(t, err)\n\n\t\trole, err := teamObj.MemberRole(context.TODO(), bob.userVersion())\n\t\trequire.NoError(t, err)\n\t\tif role == keybase1.TeamRole_NONE {\n\t\t\treturn false\n\t\t}\n\t\tif role == expectedRole {\n\t\t\treturn true\n\t\t}\n\t\trequire.FailNowf(t, \"unexpected role\", \"got %v on the hunt for %v\", role, expectedRole)\n\n\t\t// Old UV should be gone. Note that the server would not have allowed\n\t\t// adding new UV without removing the old one first, so if the old UV\n\t\t// is not being removed correctly during SBS handling, this test would\n\t\t// probably never get to the following assertions (unless that server\n\t\t// logic has changed.)\n\t\trole, err = teamObj.MemberRole(context.TODO(), bobUVBeforeReset)\n\t\trequire.NoError(t, err)\n\t\trequire.Equal(t, keybase1.TeamRole_NONE, role)\n\t\treturn false\n\t}\n\n\tif pukful {\n\t\t// Bob should have been synchronously made a cyrptomember by re-add.\n\t\trequire.Equal(t, true, pollFn(0))\n\t} else {\n\t\t// A background task should upgrade bob from an invite to a cryptomember.\n\t\tpollTime := 10 * time.Second\n\t\tpollFor(t, \"bob to be upgraded from invite to cryptomember\",\n\t\t\tpollTime, ann.getPrimaryGlobalContext(), pollFn)\n\t}\n\n\tbob.readChats(team, 1)\n}", "title": "" }, { "docid": "8f3c415925265a6ac0cc09dab3f9fdca", "score": "0.5816699", "text": "func UserTeamAppend(c *gin.Context) {\n\tform := &model.UserTeamParams{}\n\n\tif err := c.BindJSON(&form); err != nil {\n\t\tlogrus.Warnf(\"Failed to bind user team data. %s\", err)\n\n\t\tc.JSON(\n\t\t\thttp.StatusPreconditionFailed,\n\t\t\tgin.H{\n\t\t\t\t\"status\": http.StatusPreconditionFailed,\n\t\t\t\t\"message\": \"Failed to bind user team data\",\n\t\t\t},\n\t\t)\n\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tassigned := store.GetUserHasTeam(\n\t\tc,\n\t\tform,\n\t)\n\n\tif assigned == true {\n\t\tc.JSON(\n\t\t\thttp.StatusPreconditionFailed,\n\t\t\tgin.H{\n\t\t\t\t\"status\": http.StatusPreconditionFailed,\n\t\t\t\t\"message\": \"Team is already appended\",\n\t\t\t},\n\t\t)\n\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\terr := store.CreateUserTeam(\n\t\tc,\n\t\tform,\n\t)\n\n\tif err != nil {\n\t\tlogrus.Warnf(\"Failed to append user team. %s\", err)\n\n\t\tc.JSON(\n\t\t\thttp.StatusInternalServerError,\n\t\t\tgin.H{\n\t\t\t\t\"status\": http.StatusInternalServerError,\n\t\t\t\t\"message\": \"Failed to append team\",\n\t\t\t},\n\t\t)\n\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tc.JSON(\n\t\thttp.StatusOK,\n\t\tgin.H{\n\t\t\t\"status\": http.StatusOK,\n\t\t\t\"message\": \"Successfully appended team\",\n\t\t},\n\t)\n}", "title": "" }, { "docid": "9496d11cea6d9f9f04aba2908a0c6b20", "score": "0.569982", "text": "func TestTeamAPIEndpoint_DeleteTeam_RBAC(t *testing.T) {\n\tserver := SetupAPITestServer(t, func(hs *HTTPServer) {\n\t\ths.Cfg = setting.NewCfg()\n\t\ths.teamService = &teamtest.FakeService{ExpectedTeamDTO: &team.TeamDTO{}}\n\t})\n\n\trequest := func(teamID int64, user *user.SignedInUser) (*http.Response, error) {\n\t\treq := server.NewRequest(http.MethodDelete, fmt.Sprintf(detailTeamURL, teamID), http.NoBody)\n\t\treq = webtest.RequestWithSignedInUser(req, user)\n\t\treturn server.Send(req)\n\t}\n\n\tt.Run(\"Access control prevents deleting teams with the incorrect permissions\", func(t *testing.T) {\n\t\tres, err := request(1, userWithPermissions(1, []accesscontrol.Permission{\n\t\t\t{Action: accesscontrol.ActionTeamsDelete, Scope: \"teams:id:2\"},\n\t\t}))\n\t\trequire.NoError(t, err)\n\t\tassert.Equal(t, http.StatusForbidden, res.StatusCode)\n\t\trequire.NoError(t, res.Body.Close())\n\t})\n\n\tt.Run(\"Access control allows deleting teams with the correct permissions\", func(t *testing.T) {\n\t\tres, err := request(1, userWithPermissions(1, []accesscontrol.Permission{\n\t\t\t{Action: accesscontrol.ActionTeamsDelete, Scope: \"teams:id:1\"},\n\t\t}))\n\t\trequire.NoError(t, err)\n\t\tassert.Equal(t, http.StatusOK, res.StatusCode)\n\t\trequire.NoError(t, res.Body.Close())\n\t})\n}", "title": "" }, { "docid": "de381387cd55f7cbaf173f361776610f", "score": "0.5667417", "text": "func (m *Membership) InviteMemberToTeam(t *Team) error {\n\treqURL := \"https://api.github.com/teams/\" + strconv.Itoa(t.ID) + \"/memberships/\" + m.User.Login\n\ttype params struct {\n\t\tRole string `json:\"role\"`\n\t}\n\tp := &params{\n\t\tRole: m.Role,\n\t}\n\tjd, jerr := json.Marshal(&p)\n\tif jerr != nil {\n\t\treturn jerr\n\t}\n\treq, err := http.NewRequest(\"PUT\", reqURL, bytes.NewBuffer(jd))\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog.SetOutput(os.Stdout)\n\tlog.Printf(\"Invite user %s to team: %s\\n\", m.User.Login, t.Name)\n\treq.Header.Set(\"Authorization\", \"token \"+Token)\n\tc := &http.Client{}\n\tres, rerr := c.Do(req)\n\tif rerr != nil {\n\t\treturn rerr\n\t}\n\t_, rlerr := ParseRateLimit(res)\n\tif rlerr != nil {\n\t\treturn rlerr\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1d96a493cdcb77708134c2375455ac05", "score": "0.5644673", "text": "func (s *AccSuite) checkUserIsInvited(userEmail, teamName string) resource.TestCheckFunc {\n\treturn func(ts *terraform.State) error {\n\t\tl := log.With().\n\t\t\tStr(\"user_email\", userEmail).\n\t\t\tStr(\"team_name\", teamName).\n\t\t\tLogger()\n\t\tl.Info().Msg(\"Checking that user has been invited to team\")\n\t\tc := s.client()\n\n\t\tteamID, err := c.FindTeamID(teamName)\n\t\ts.Nil(err)\n\t\tinvitations, err := c.ListPendingInvitations(teamID)\n\t\ts.Nil(err)\n\t\tfor _, inv := range invitations {\n\t\t\tif inv.ToEmail == userEmail {\n\t\t\t\tl.Debug().Msg(\"Confirmed user is invited to team\")\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\terr = fmt.Errorf(\"could not confirm user %s is invited to team %s\", userEmail, teamName)\n\t\tl.Err(err).Send()\n\t\treturn err\n\t}\n}", "title": "" }, { "docid": "e5d2c867c2364c485cd65e8346dba62b", "score": "0.56150097", "text": "func (s *AccSuite) TestAccUserMoveBetweenTeams() {\n\tteam1Name := fmt.Sprintf(\"%s-team-1\", s.randName)\n\tteam2Name := fmt.Sprintf(\"%s-team-2\", s.randName)\n\tuser1Email := \"terraform-provider-test@rollbar.com\"\n\tuser2Email := fmt.Sprintf(\"terraform-provider-test+%s@rollbar.com\", s.randName)\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\t# Registered user\n\t\tresource \"rollbar_user\" \"test_user_1\" {\n\t\t\temail = \"%s\"\n\t\t\tteam_ids = [ rollbar_team.test_team_1.id ]\n\t\t}\n\n\t\t# Invited user\n\t\tresource \"rollbar_user\" \"test_user_2\" {\n\t\t\temail = \"%s\"\n\t\t\tteam_ids = [ rollbar_team.test_team_1.id ]\n\t\t}\n\t`\n\tconfigOrigin := fmt.Sprintf(tmpl, team1Name, team2Name, user1Email, user2Email)\n\t// language=hcl\n\ttmpl = `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\t# Registered user\n\t\tresource \"rollbar_user\" \"test_user_1\" {\n\t\t\temail = \"%s\"\n\t\t\tteam_ids = [ rollbar_team.test_team_2.id ]\n\t\t}\n\n\t\t# Invited user\n\t\tresource \"rollbar_user\" \"test_user_2\" {\n\t\t\temail = \"%s\"\n\t\t\tteam_ids = [ rollbar_team.test_team_2.id ]\n\t\t}\n\t`\n\tconfigChangeTeams := fmt.Sprintf(tmpl, team1Name, team2Name, user1Email, user2Email)\n\tresource.Test(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: configOrigin,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\tresource.TestCheckResourceAttr(\"rollbar_team.test_team_1\", \"name\", team1Name),\n\t\t\t\t\tresource.TestCheckResourceAttr(\"rollbar_team.test_team_2\", \"name\", team2Name),\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(\"rollbar_user.test_user_1\", \"team_ids.0\", \"rollbar_team.test_team_1\", \"id\"),\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(\"rollbar_user.test_user_2\", \"team_ids.0\", \"rollbar_team.test_team_1\", \"id\"),\n\t\t\t\t\ts.checkUserIsOnTeam(user1Email, team1Name),\n\t\t\t\t\ts.checkUserIsInvited(user2Email, team1Name),\n\t\t\t\t),\n\t\t\t},\n\t\t\t{\n\t\t\t\tConfig: configChangeTeams,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(\"rollbar_user.test_user_1\", \"team_ids.0\", \"rollbar_team.test_team_2\", \"id\"),\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(\"rollbar_user.test_user_2\", \"team_ids.0\", \"rollbar_team.test_team_2\", \"id\"),\n\t\t\t\t\ts.checkUserIsOnTeam(user1Email, team2Name),\n\t\t\t\t\ts.checkUserIsInvited(user2Email, team2Name),\n\t\t\t\t\ts.checkUserIsNotOnTeam(user1Email, team1Name),\n\t\t\t\t\ts.checkUserIsNotInvited(user2Email, team1Name),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "06686a118f996f80c4ea839b5ad613dc", "score": "0.5562348", "text": "func NewSfTeamUninviteDetails(TargetIndex int64, OriginalFolderName string) *SfTeamUninviteDetails {\n\ts := new(SfTeamUninviteDetails)\n\ts.TargetIndex = TargetIndex\n\ts.OriginalFolderName = OriginalFolderName\n\treturn s\n}", "title": "" }, { "docid": "df209f2a3620c044fc48b3594f621144", "score": "0.5552423", "text": "func TestTeamResetNoKeysAdmin(t *testing.T) {\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUser(\"bob\", 10)\n\tbob.signup()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\tcam := ctx.installKeybaseForUser(\"cam\", 10)\n\tcam.signup()\n\tdivDebug(ctx, \"Signed up cam (%s)\", cam.username)\n\n\tteam := ann.createTeam([]*smuUser{cam})\n\tdivDebug(ctx, \"team created (%s)\", team.name)\n\n\tann.sendChat(team, \"0\")\n\tdivDebug(ctx, \"Sent chat '2' (%s via %s)\", team.name, ann.username)\n\n\tann.readChats(team, 1)\n\n\tbob.reset()\n\tdivDebug(ctx, \"Reset bob (%s)\", bob.username)\n\n\tann.addAdmin(team, bob)\n\tdivDebug(ctx, \"Added bob as an admin\")\n}", "title": "" }, { "docid": "c3b006f9b8a880854c15ff9da134d270", "score": "0.5536313", "text": "func TestTeamResetAfterReset(t *testing.T) {\n\ttt := newTeamTester(t)\n\tdefer tt.cleanup()\n\n\talice := tt.addUser(\"alice\")\n\tbob := tt.addUser(\"bob\")\n\n\tbob.reset()\n\tbob.loginAfterReset()\n\t_, teamName := alice.createTeam2()\n\ttn := teamName.String()\n\talice.addTeamMember(tn, bob.username, keybase1.TeamRole_OWNER)\n\tbob.leave(tn)\n\tbob.reset()\n\tbob.loginAfterReset()\n\talice.addTeamMember(tn, bob.username, keybase1.TeamRole_WRITER)\n\tbob.leave(tn)\n\tbob.reset()\n\tbob.loginAfterReset()\n\talice.addTeamMember(tn, bob.username, keybase1.TeamRole_OWNER)\n\tbob.leave(tn)\n\talice.loadTeam(tn, false)\n}", "title": "" }, { "docid": "5f78b071558e5fb9676b7611fb73275d", "score": "0.55153316", "text": "func TestTeamResetAddNoPUK(t *testing.T) {\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUserNoPUK(\"bob\", 10)\n\tbob.signupNoPUK()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\tcam := ctx.installKeybaseForUser(\"cam\", 10)\n\tcam.signup()\n\tdivDebug(ctx, \"Signed up cam (%s)\", cam.username)\n\n\tteam := ann.createTeam([]*smuUser{cam})\n\tdivDebug(ctx, \"team created (%s)\", team.name)\n\n\tann.sendChat(team, \"0\")\n\tdivDebug(ctx, \"Sent chat '2' (%s via %s)\", team.name, ann.username)\n\n\tann.readChats(team, 1)\n\n\tbob.reset()\n\tdivDebug(ctx, \"Reset bob (%s)\", bob.username)\n\n\tbob.loginAfterResetNoPUK(1)\n\tdivDebug(ctx, \"Bob logged in after reset\")\n\n\t_, err := bob.teamGet(team)\n\trequire.Error(t, err)\n\tdivDebug(ctx, \"Bob failed to read the team\")\n\n\t// this is the main point of the test, to get this to work\n\t// without an eldest seqno error.\n\tann.addWriter(team, bob)\n\tdivDebug(ctx, \"Added bob as a writer\")\n}", "title": "" }, { "docid": "99fe5c4b055a7700e97b89833fa141a3", "score": "0.54977995", "text": "func (db *data) DeleteTeam(record *model.Team, current *model.User) error {\n\treturn db.Delete(\n\t\trecord,\n\t).Error\n}", "title": "" }, { "docid": "59d6fb48856cc1c4f3e332d0e7ce2293", "score": "0.54057074", "text": "func TestTeamResetBadgesOnRemove(t *testing.T) {\n\ttestTeamResetBadgesAndDismiss(t, false)\n}", "title": "" }, { "docid": "8c6b013cb0f488661b2322479777b70f", "score": "0.5372599", "text": "func TestTeamOwnerResetAdminReadmit(t *testing.T) {\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUser(\"bob\", 10)\n\tbob.signup()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\n\tteam := ann.createTeam([]*smuUser{})\n\tdivDebug(ctx, \"team created (%s)\", team.name)\n\tann.addAdmin(team, bob)\n\n\tann.reset()\n\tdivDebug(ctx, \"Reset ann (%s)\", ann.username)\n\n\tann.loginAfterReset(2)\n\tdivDebug(ctx, \"Ann logged in after reset\")\n\tbob.addAdmin(team, ann)\n\t_, err := ann.teamGet(team)\n\trequire.NoError(t, err)\n\tdivDebug(ctx, \"Ann read the team\")\n}", "title": "" }, { "docid": "62c08473baaae7222e8485fcb2fd07df", "score": "0.5362437", "text": "func QuitTeam(ws *dataStruct.WSConnection,message []byte){\n\tqi := new(QuitInfo)\n\terr := json.Unmarshal(message,qi)\n\tif err != nil{\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\tif ws.WhichTeam == nil{\n\t\tlog.Println(\"illegal information\")\n\t\treturn\n\t}\n\tif ws.WhichUser == nil{\n\t\tlog.Println(\"illegal information\")\n\t\treturn\n\t}\n\t//just can delete the user in your own team\n\tif _,ok := ws.WhichTeam.MemberGroup[qi.UserID];!ok{\n\t\tlog.Println(\"illegal information\")\n\t\treturn\n\t}\n\tif _,ok := dataStruct.AllUser[qi.UserID];!ok{\n\t\tlog.Println(\"illegal information\")\n\t\treturn\n\t}\n\tif dataStruct.AllUser[qi.UserID].WhichTeam == nil{\n\t\tws.OutChan <- []byte(`{\"path\":\"quitteam\",\"message\":\"false\"}`)\n\t\treturn\n\t}\n\tdataStruct.AllUser[qi.UserID].WSConn.OutChan <- []byte(`{\"path\":\"quitteam\",\"message\":\"false\"}`)\n\tws.WhichUser.CurrentGrade = 0\n\tdelete(ws.WhichTeam.MemberGroup,qi.UserID)\n\tdelete(ws.WhichTeam.GameGrade,qi.UserID)\n\t//if the count of member equal to 0\n\tif len(ws.WhichTeam.MemberGroup) == 0{\n\t\tws.WhichTeam.TeamDelete()\n\t}else{\n\t\tif ws.WhichUser.HouseOwner{\n\t\t\tsetHouseOwner(ws.WhichTeam) //reselect the homeowner\n\t\t}\n\t\tuserInfo := make([]UserInfo,5)\n\t\tvar i int\n\t\tfor _,v:=range ws.WhichTeam.MemberGroup{\n\t\t\tuserInfo[i] = UserInfo{\n\t\t\t\tUserName: v.UserName,\n\t\t\t\tUserID: v.UserID,\n\t\t\t\tImageURL: v.ImageUrl,\n\t\t\t\tRank: v.Grade,\n\t\t\t\tShow: \t\tv.Show,\n\t\t\t\tHouseOwner: v.HouseOwner,\n\t\t\t}\n\t\t\ti++\n\t\t}\n\t\tallUser := AllUserInfo{\n\t\t\tPath: \"quitteam\",\n\t\t\tMessage: true,\n\t\t\tAllUser: userInfo[:i],\n\t\t}\n\t\tdata,err := json.Marshal(allUser)\n\t\tif err != nil{\n\t\t\tlog.Println(err)\n\t\t\treturn\n\t\t}\n\t\tfor _,v := range ws.WhichTeam.MemberGroup{\n\t\t\tv.WSConn.OutChan <- data\n\t\t}\n\t}\n\tdataStruct.AllUser[qi.UserID].WhichTeam = nil\n\tdataStruct.AllUser[qi.UserID].WSConn.WhichTeam = nil //break the link between webSocketconn and team\n}", "title": "" }, { "docid": "e369a4c5d2464e6806f317463dfa8cb4", "score": "0.53587717", "text": "func (s *AccSuite) TestAccUserCreateInviteMixedCase() {\n\trn := \"rollbar_user.test_user\"\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team\" {\n\t\t\tname = \"%s-team-0\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\t# Note capital \"X\" in the email address below\n\t\t\temail = \"terraform-provider-test+X-%s@rollbar.com\"\n\t\t\tteam_ids = [rollbar_team.test_team.id]\n\t\t}\n\t`\n\tconfig := fmt.Sprintf(tmpl, s.randName, s.randName)\n\tresource.ParallelTest(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: config,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t\ts.checkUserTeams(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "24475591a1de6d318809753a8280dd01", "score": "0.5338073", "text": "func (c *Client) RemoveUserFromTeam(teamID, userID string) error {\n\t_, err := c.delete(\"/teams/\" + teamID + \"/users/\" + userID)\n\treturn err\n}", "title": "" }, { "docid": "0598bf019e1ed11b2154625912418465", "score": "0.53286695", "text": "func TestTeamResetNoKeys(t *testing.T) {\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUser(\"bob\", 10)\n\tbob.signup()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\tcam := ctx.installKeybaseForUser(\"cam\", 10)\n\tcam.signup()\n\tdivDebug(ctx, \"Signed up cam (%s)\", cam.username)\n\n\tteam := ann.createTeam([]*smuUser{cam})\n\tdivDebug(ctx, \"team created (%s)\", team.name)\n\n\tann.sendChat(team, \"0\")\n\tdivDebug(ctx, \"Sent chat '2' (%s via %s)\", team.name, ann.username)\n\n\tann.readChats(team, 1)\n\n\tbob.reset()\n\tdivDebug(ctx, \"Reset bob (%s)\", bob.username)\n\n\tann.addWriter(team, bob)\n\tdivDebug(ctx, \"Added bob as a writer\")\n}", "title": "" }, { "docid": "c306d4a19168c9c8897bd4d02e7733a7", "score": "0.52904344", "text": "func addUserTeam(db *sql.DB, username string, teamname string, teamrole string) error {\n\tif db == nil {\n\t\treturn errors.New(errorDBNil)\n\t}\n\tu, err := GetUserUsername(db, username)\n\tif err != nil {\n\t\treturn err\n\t}\n\tt, err := GetTeam(db, teamname)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif u == nil || t == nil {\n\t\treturn errors.New(errorResourceNotFound)\n\t}\n\terr = ExitUserTeam(db, username, teamname)\n\tif err != nil {\n\t\treturn err\n\t}\n\tquery, err := db.Prepare(\"INSERT INTO EquipoUsuario(usuarioid, equipoid, rol) VALUES (?, ?, ?) \")\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer query.Close()\n\t_, err = query.Exec(u.ID, t.ID, teamrole)\n\treturn err\n}", "title": "" }, { "docid": "1822239c3177ab21f14c4a96b53fe924", "score": "0.52895254", "text": "func delUser(email string) bool {\n\tbody := bytes.NewBufferString(\"\")\n\twriter := multipart.NewWriter(body)\n\twriter.WriteField(\"query\", `{\"type\":\"is\",\"value\":\"user\"}`)\n\twriter.WriteField(\"sort\", \"email\")\n\twriter.WriteField(\"mode\", \"manual\")\n\twriter.WriteField(\"include_bots\", \"0\")\n\twriter.WriteField(\"exclude_slackbot\", \"true\")\n\twriter.WriteField(\"token\", getoken())\n\twriter.WriteField(\"set_active\", \"true\")\n\twriter.Close()\n\tConType := writer.FormDataContentType()\n\tDelUser, _ := requests(\"POST\", host+\"/api/users.admin.fetchTeamUsers\", body, ConType)\n\tDelUserBodyBytes, _ := ioutil.ReadAll(DelUser.Body)\n\tvar slacks Slack\n\terr := json.Unmarshal([]byte(DelUserBodyBytes), &slacks)\n\tif err != nil {\n\t\treturn false\n\t}\n\tfor _, value := range slacks.Items {\n\t\tif value.Profile.Email == email {\n\t\t\tbody1 := bytes.NewBufferString(\"\")\n\t\t\twriter1 := multipart.NewWriter(body1)\n\t\t\twriter1.WriteField(\"user\", string(value.ID))\n\t\t\twriter1.WriteField(\"token\", getoken())\n\t\t\twriter1.WriteField(\"set_active\", \"true\")\n\t\t\twriter1.Close()\n\t\t\tConType1 := writer1.FormDataContentType()\n\t\t\t_, err := requests(\"POST\", host+\"/api/users.admin.setInactive\", body1, ConType1)\n\t\t\tif err != nil {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "26f8b1c152e0c123de04c73d870efb4d", "score": "0.52825266", "text": "func InviteUsersToTeams() error {\n\tteamListFile := path.Join(DataDir, \"teams.json\")\n\tif _, cerr := os.Stat(teamListFile); os.IsNotExist(cerr) {\n\t\tlog.Println(teamListFile, \"does not exist\")\n\t\treturn cerr\n\t}\n\tfd, ferr := ioutil.ReadFile(teamListFile)\n\tif ferr != nil {\n\t\treturn ferr\n\t}\n\tvar ts []*Team\n\tjerr := json.Unmarshal(fd, &ts)\n\tif jerr != nil {\n\t\treturn jerr\n\t}\n\tfor _, t := range ts {\n\t\tfor _, u := range t.Members {\n\t\t\tm, merr := u.GetLocalMembership()\n\t\t\tif merr != nil {\n\t\t\t\treturn merr\n\t\t\t}\n\t\t\tierr := m.InviteMemberToTeam(t)\n\t\t\tif ierr != nil {\n\t\t\t\treturn ierr\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6098656bb4af5ee43d7161bc3dd4ce70", "score": "0.52728415", "text": "func DeleteTeam(t *Team) error {\n\tif err := t.GetRepositories(); err != nil {\n\t\treturn err\n\t}\n\n\t// Get organization.\n\torg, err := GetUserByID(t.OrgID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsess := x.NewSession()\n\tdefer sessionRelease(sess)\n\tif err = sess.Begin(); err != nil {\n\t\treturn err\n\t}\n\n\t// Delete all accesses.\n\tfor _, repo := range t.Repos {\n\t\tif err = repo.recalculateTeamAccesses(sess, t.ID); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Delete team-user.\n\tif _, err = sess.Where(\"org_id=?\", org.Id).Where(\"team_id=?\", t.ID).Delete(new(TeamUser)); err != nil {\n\t\treturn err\n\t}\n\n\t// Delete team.\n\tif _, err = sess.Id(t.ID).Delete(new(Team)); err != nil {\n\t\treturn err\n\t}\n\t// Update organization number of teams.\n\tif _, err = sess.Exec(\"UPDATE `user` SET num_teams=num_teams-1 WHERE id=?\", t.OrgID); err != nil {\n\t\treturn err\n\t}\n\n\treturn sess.Commit()\n}", "title": "" }, { "docid": "f60e1b1af436bfbb7d436927cf376bb2", "score": "0.52413714", "text": "func (s *AccSuite) checkUserIsOnTeam(userEmail, teamName string) resource.TestCheckFunc {\n\treturn func(ts *terraform.State) error {\n\t\tl := log.With().\n\t\t\tStr(\"user_email\", userEmail).\n\t\t\tStr(\"team_name\", teamName).\n\t\t\tLogger()\n\t\tl.Info().Msg(\"Checking that user is member of team\")\n\t\tc := s.client()\n\n\t\t// Find user ID\n\t\tuserID, err := c.FindUserID(userEmail)\n\t\ts.Nil(err)\n\t\ts.NotZero(userID)\n\n\t\tteams, err := c.ListUserTeams(userID)\n\t\ts.Nil(err)\n\t\tfor _, t := range teams {\n\t\t\tif t.Name == teamName {\n\t\t\t\tl.Debug().Msg(\"Confirmed that user is member of team\")\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\terr = fmt.Errorf(\"could not confirm that user %s is member of team %s\", userEmail, teamName)\n\t\tl.Err(err).Send()\n\t\treturn err\n\t}\n}", "title": "" }, { "docid": "0ab7e32dc6e4dc6a973a31b72d985331", "score": "0.5226078", "text": "func (TeamService) CreateTeam(ctx context.Context, req *pbUsers.CreateTeamRequest) (*pbUsers.JwtResponse, error) {\n\tlog.Println(req)\n\n\tvar team db.Team\n\tfilter := bson.D{{\"name\", req.GetName()}}\n\tif err := db.TeamCollection.FindOne(context.TODO(), filter).Decode(&team); err != nil {\n\t\tif err == mongo.ErrNoDocuments {\n\t\t\tcreatorID, err := primitive.ObjectIDFromHex(req.GetCreatorID())\n\t\t\tif err != nil {\n\t\t\t\treturn nil, status.Error(codes.Unknown, \"internal server error\")\n\t\t\t}\n\n\t\t\tteam = db.Team{\n\t\t\t\tName: req.GetName(),\n\t\t\t\tCreatorID: creatorID,\n\t\t\t\tImageNumber: req.GetImageNumber(),\n\t\t\t\tRequests: []db.Requests{},\n\t\t\t\tUploadTime: time.Now().Unix(),\n\t\t\t}\n\n\t\t\tres, err := db.TeamCollection.InsertOne(context.TODO(), team)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, status.Error(codes.Unknown, \"internal server error\")\n\t\t\t}\n\t\t\tteam.ID = res.InsertedID.(primitive.ObjectID)\n\n\t\t\tfilter := bson.D{{\"_id\", creatorID}}\n\t\t\tupdate := bson.D{\n\t\t\t\t{\n\t\t\t\t\t\"$set\", bson.D{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\"teamid\", team.ID,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tvar user db.User\n\t\t\topt := options.FindOneAndUpdate().SetReturnDocument(options.After)\n\t\t\tif err := db.UserCollection.FindOneAndUpdate(context.TODO(), filter, update, opt).Decode(&user); err != nil {\n\t\t\t\treturn nil, status.Error(codes.Unknown, \"internal server error\")\n\t\t\t}\n\n\t\t\ttokenSecret, err := jwt.CreateNewUserJwt(user, config[\"jwtSecret\"])\n\t\t\tif err != nil {\n\t\t\t\treturn nil, status.Error(codes.Unknown, \"internal server error\")\n\t\t\t}\n\n\t\t\treturn &pbUsers.JwtResponse{Jwt: tokenSecret}, nil\n\t\t}\n\n\t\treturn nil, status.Error(codes.Unknown, \"internal server error\")\n\t}\n\n\treturn nil, status.Error(codes.Unknown, \"team already exists\")\n}", "title": "" }, { "docid": "11caafa12a8d49a5a54d450c87310be0", "score": "0.5177715", "text": "func TestTeamResetBadgesOnAdd(t *testing.T) {\n\ttestTeamResetBadgesAndDismiss(t, true)\n}", "title": "" }, { "docid": "a3eae824ee41877d7e9aaa92a904f5de", "score": "0.5119841", "text": "func TestTeamResetManyNoKeys(t *testing.T) {\n\tctx := newSMUContext(t)\n\tdefer ctx.cleanup()\n\n\tann := ctx.installKeybaseForUser(\"ann\", 10)\n\tann.signup()\n\tdivDebug(ctx, \"Signed up ann (%s)\", ann.username)\n\tbob := ctx.installKeybaseForUser(\"bob\", 10)\n\tbob.signup()\n\tdivDebug(ctx, \"Signed up bob (%s)\", bob.username)\n\tcam := ctx.installKeybaseForUser(\"cam\", 10)\n\tcam.signup()\n\tdivDebug(ctx, \"Signed up cam (%s)\", cam.username)\n\n\tteam := ann.createTeam([]*smuUser{cam})\n\tdivDebug(ctx, \"team created (%s)\", team.name)\n\n\tann.sendChat(team, \"0\")\n\tdivDebug(ctx, \"Sent chat '2' (%s via %s)\", team.name, ann.username)\n\n\tann.readChats(team, 1)\n\n\tfor i := 0; i < 5; i++ {\n\t\tbob.reset()\n\t\tdivDebug(ctx, \"Reset bob (%s)\", bob.username)\n\n\t\tbob.loginAfterReset(10)\n\t\tdivDebug(ctx, \"Bob logged in after reset\")\n\t}\n\n\tann.addWriter(team, bob)\n\tdivDebug(ctx, \"Added bob as a writer\")\n}", "title": "" }, { "docid": "85fc5b982963e89bd20627b2d01bfa6a", "score": "0.5112857", "text": "func TestTeamAPIEndpoint_UpdateTeam_RBAC(t *testing.T) {\n\tserver := SetupAPITestServer(t, func(hs *HTTPServer) {\n\t\ths.Cfg = setting.NewCfg()\n\t\ths.teamService = &teamtest.FakeService{ExpectedTeamDTO: &team.TeamDTO{}}\n\t})\n\n\trequest := func(teamID int64, user *user.SignedInUser) (*http.Response, error) {\n\t\treq := server.NewRequest(http.MethodPut, fmt.Sprintf(detailTeamURL, teamID), strings.NewReader(teamCmd))\n\t\treq = webtest.RequestWithSignedInUser(req, user)\n\t\treturn server.SendJSON(req)\n\t}\n\n\tt.Run(\"Access control allows updating team with the correct permissions\", func(t *testing.T) {\n\t\tres, err := request(1, userWithPermissions(1, []accesscontrol.Permission{\n\t\t\t{Action: accesscontrol.ActionTeamsWrite, Scope: \"teams:id:1\"},\n\t\t}))\n\t\trequire.NoError(t, err)\n\t\tassert.Equal(t, http.StatusOK, res.StatusCode)\n\t\trequire.NoError(t, res.Body.Close())\n\t})\n\n\tt.Run(\"Access control allows updating teams with the wildcard scope\", func(t *testing.T) {\n\t\tres, err := request(1, userWithPermissions(1, []accesscontrol.Permission{\n\t\t\t{Action: accesscontrol.ActionTeamsWrite, Scope: \"teams:*\"},\n\t\t}))\n\t\trequire.NoError(t, err)\n\t\tassert.Equal(t, http.StatusOK, res.StatusCode)\n\t\trequire.NoError(t, res.Body.Close())\n\t})\n\n\tt.Run(\"Access control prevent updating a team with wrong scope\", func(t *testing.T) {\n\t\tres, err := request(1, userWithPermissions(1, []accesscontrol.Permission{\n\t\t\t{Action: accesscontrol.ActionTeamsWrite, Scope: \"teams:id:2\"},\n\t\t}))\n\t\trequire.NoError(t, err)\n\t\tassert.Equal(t, http.StatusForbidden, res.StatusCode)\n\t\trequire.NoError(t, res.Body.Close())\n\t})\n}", "title": "" }, { "docid": "3701bb3a976633a39dcc9cc25610ae53", "score": "0.50957197", "text": "func (s *teamMembers) Remove(ctx context.Context, teamID string, options TeamMemberRemoveOptions) error {\n\tif !validStringID(&teamID) {\n\t\treturn errors.New(\"invalid value for team ID\")\n\t}\n\tif err := options.valid(); err != nil {\n\t\treturn err\n\t}\n\n\tusersOrMemberships := options.kind()\n\tURL := fmt.Sprintf(\"teams/%s/relationships/%s\", url.QueryEscape(teamID), usersOrMemberships)\n\n\tvar req *retryablehttp.Request\n\n\tif usersOrMemberships == \"users\" {\n\t\tvar err error\n\t\tvar members []*teamMemberUser\n\t\tfor _, name := range options.Usernames {\n\t\t\tmembers = append(members, &teamMemberUser{Username: name})\n\t\t}\n\t\treq, err = s.client.newRequest(\"DELETE\", URL, members)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tvar err error\n\t\tvar members []*teamMemberOrgMembership\n\t\tfor _, ID := range options.OrganizationMembershipIDs {\n\t\t\tmembers = append(members, &teamMemberOrgMembership{ID: ID})\n\t\t}\n\t\treq, err = s.client.newRequest(\"DELETE\", URL, members)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn s.client.do(ctx, req, nil)\n}", "title": "" }, { "docid": "1bb8311d2ba33c8eea0774b57cbaf442", "score": "0.5091003", "text": "func DeleteTeam(id int64) error {\n\t// disassociate all repos with this team\n\tdb.Exec(\"UPDATE repos SET team_id = 0 WHERE team_id = ?\", id)\n\t// delete the team memberships and the team itself\n\tdb.Exec(\"DELETE FROM members WHERE team_id = ?\", id)\n\tdb.Exec(\"DELETE FROM teams WHERE id = ?\", id)\n\treturn nil\n}", "title": "" }, { "docid": "cb77c7229ef417ca746ffd7ad978a16d", "score": "0.50820535", "text": "func AddTeamMember(orgId, teamId, uid int64) error {\n\tif IsTeamMember(orgId, teamId, uid) {\n\t\treturn nil\n\t}\n\n\tif err := AddOrgUser(orgId, uid); err != nil {\n\t\treturn err\n\t}\n\n\t// Get team and its repositories.\n\tt, err := GetTeamById(teamId)\n\tif err != nil {\n\t\treturn err\n\t}\n\tt.NumMembers++\n\n\tif err = t.GetRepositories(); err != nil {\n\t\treturn err\n\t}\n\n\tsess := x.NewSession()\n\tdefer sessionRelease(sess)\n\tif err = sess.Begin(); err != nil {\n\t\treturn err\n\t}\n\n\ttu := &TeamUser{\n\t\tUid: uid,\n\t\tOrgID: orgId,\n\t\tTeamID: teamId,\n\t}\n\tif _, err = sess.Insert(tu); err != nil {\n\t\treturn err\n\t} else if _, err = sess.Id(t.ID).Update(t); err != nil {\n\t\treturn err\n\t}\n\n\t// Give access to team repositories.\n\tfor _, repo := range t.Repos {\n\t\tif err = repo.recalculateTeamAccesses(sess, 0); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// We make sure it exists before.\n\tou := new(OrgUser)\n\tif _, err = sess.Where(\"uid=?\", uid).And(\"org_id=?\", orgId).Get(ou); err != nil {\n\t\treturn err\n\t}\n\tou.NumTeams++\n\tif t.IsOwnerTeam() {\n\t\tou.IsOwner = true\n\t}\n\tif _, err = sess.Id(ou.ID).AllCols().Update(ou); err != nil {\n\t\treturn err\n\t}\n\n\treturn sess.Commit()\n}", "title": "" }, { "docid": "782f5818620f649a402a1d7a68858d90", "score": "0.50710183", "text": "func (h *Helper) InTeam(ctx context.Context, uid gregor1.UID, teamID keybase1.TeamID) (bool, error) {\n\ttlfID := chat1.TLFID(teamID.ToBytes())\n\tibox, err := h.G().InboxSource.ReadUnverified(ctx, uid, types.InboxSourceDataSourceLocalOnly,\n\t\t&chat1.GetInboxQuery{\n\t\t\tTlfID: &tlfID,\n\t\t\tMemberStatus: []chat1.ConversationMemberStatus{chat1.ConversationMemberStatus_ACTIVE},\n\t\t\tAllowUnseenQuery: true,\n\t\t})\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn len(ibox.ConvsUnverified) > 0, nil\n}", "title": "" }, { "docid": "bcb8fb5d49f01814dd103e78eeecb668", "score": "0.5070829", "text": "func NewTeam(t *Team) error {\n\tif len(t.Name) == 0 {\n\t\treturn errors.New(\"empty team name\")\n\t}\n\n\thas, err := x.Id(t.OrgID).Get(new(User))\n\tif err != nil {\n\t\treturn err\n\t} else if !has {\n\t\treturn ErrOrgNotExist\n\t}\n\n\tt.LowerName = strings.ToLower(t.Name)\n\thas, err = x.Where(\"org_id=?\", t.OrgID).And(\"lower_name=?\", t.LowerName).Get(new(Team))\n\tif err != nil {\n\t\treturn err\n\t} else if has {\n\t\treturn ErrTeamAlreadyExist{t.OrgID, t.LowerName}\n\t}\n\n\tsess := x.NewSession()\n\tdefer sess.Close()\n\tif err = sess.Begin(); err != nil {\n\t\treturn err\n\t}\n\n\tif _, err = sess.Insert(t); err != nil {\n\t\tsess.Rollback()\n\t\treturn err\n\t}\n\n\t// Update organization number of teams.\n\tif _, err = sess.Exec(\"UPDATE `user` SET num_teams=num_teams+1 WHERE id = ?\", t.OrgID); err != nil {\n\t\tsess.Rollback()\n\t\treturn err\n\t}\n\treturn sess.Commit()\n}", "title": "" }, { "docid": "b84bfe7ee44fdd25260aec2c3375a4b2", "score": "0.5064166", "text": "func delInvite(email string) bool {\n\trevoke, _ := requests(\"GET\", host+\"/admin/invites\", nil, \"\")\n\trevokeBody, _ := ioutil.ReadAll(revoke.Body)\n\tcrumb := strings.Split(strings.SplitAfter(string(revokeBody), \"boot_data.crumb_key = \\\"\")[1], \"\\\";\")[0]\n\tDeljson := strings.SplitAfter(strings.Split(string(revokeBody), \"\\\",\\\"email\\\":\\\"\"+email)[0], \"\\\"id\\\":\\\"\")[2]\n\tif len(Deljson) >= 8 && len(Deljson) <= 14 {\n\t\turl := host + \"/admin/invites?revoke=\" + Deljson + \"&\" + crumb\n\t\trequests(\"GET\", url, nil, \"\")\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "1f834512db2dff8a103c2bcad50b8241", "score": "0.5036066", "text": "func RemoveTeamMember(orgId, teamId, uid int64) error {\n\tsess := x.NewSession()\n\tdefer sessionRelease(sess)\n\tif err := sess.Begin(); err != nil {\n\t\treturn err\n\t}\n\tif err := removeTeamMember(sess, orgId, teamId, uid); err != nil {\n\t\treturn err\n\t}\n\treturn sess.Commit()\n}", "title": "" }, { "docid": "c7c524c925184bdb7ada3244d6e05484", "score": "0.5031547", "text": "func (s *AccSuite) TestAccProjectAddTeam() {\n\tteam1ResourceName := \"rollbar_team.test_team_1\"\n\tteam1Name := fmt.Sprintf(\"%s-team-1\", s.randName)\n\tteam2ResourceName := \"rollbar_team.test_team_2\"\n\tteam2Name := fmt.Sprintf(\"%s-team-2\", s.randName)\n\tprojectResourceName := \"rollbar_project.test_project\"\n\tprojectName := s.randName\n\n\t// language=hcl\n\ttmpl1 := `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_project\" \"test_project\" {\n\t\t\tname = \"%s\"\n\t\t\tteam_ids = [rollbar_team.test_team_1.id]\n\t\t}\n\t`\n\tconfig1 := fmt.Sprintf(tmpl1, team1Name, projectName)\n\n\t// language=hcl\n\ttmpl2 := `\n\t\tresource \"rollbar_team\" \"test_team_1\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_team\" \"test_team_2\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_project\" \"test_project\" {\n\t\t\tname = \"%s\"\n\t\t\tteam_ids = [\n\t\t\t\trollbar_team.test_team_1.id,\n\t\t\t\trollbar_team.test_team_2.id,\n\t\t\t]\n\t\t}\n\t`\n\tconfig2 := fmt.Sprintf(tmpl2, team1Name, team2Name, projectName)\n\n\tresource.ParallelTest(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: config1,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(projectResourceName, \"team_ids.0\", team1ResourceName, \"id\"),\n\t\t\t\t),\n\t\t\t},\n\t\t\t{\n\t\t\t\tConfig: config2,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(projectResourceName, \"team_ids.0\", team1ResourceName, \"id\"),\n\t\t\t\t\tresource.TestCheckTypeSetElemAttrPair(projectResourceName, \"team_ids.1\", team2ResourceName, \"id\"),\n\t\t\t\t\ts.checkProjectTeams(projectResourceName),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "dc9de604f6b62dac4a9f496fb58ee234", "score": "0.50207144", "text": "func Test_addRemoveOtp(t *testing.T) {\n\tname := usersName[0]\n\tinitAListOfUsers(t, usersName)\n\n\tokUrlJ := cr.Url{Url: fmt.Sprintf(\"%v/%v\", ServicePath, name)}\n\turl := resourcePath + \"/\" + name\n\texeCommandCheckRes(t, cr.PUT_STR, url, http.StatusCreated, string(uData), okUrlJ)\n\n\tdata, _ := stRestful.UsersList.GetPropertyAttachedToEntity(name, propertyName)\n\texeCommandCheckRes(t, cr.GET_STR, url, http.StatusOK, \"\", data.(*otp.OtpUser))\n\n\tokUrlJ = cr.Url{Url: fmt.Sprintf(\"%v/%v\", ServicePath, name)}\n\turl = resourcePath + \"/\" + name\n\texeCommandCheckRes(t, cr.DELETE_STR, url, http.StatusNoContent, \"\", cr.StringMessage{Str: \"\"})\n\n\texeCommandCheckRes(t, cr.GET_STR, url, http.StatusNotFound, \"\", cr.Error{Code: http.StatusNotFound})\n}", "title": "" }, { "docid": "b573bc3c938c5edd183669fb0eb5bcb6", "score": "0.5015875", "text": "func createTeam(ctx iris.Context) {\n\n\tv := model.Team{}\n\tif err := parseJsonAndSetCtxFromError(ctx, &v, invalidInputFormat); err != nil {\n\t\treturn\n\t}\n\n\tif !v.IsValid() {\n\t\tsetCtxError(ctx, missingField)\n\t\treturn\n\t}\n\n\tuser, _ := getUserForBearer(ctx)\n\tif user == nil {\n\t\tsetCtxError(ctx, unknownError)\n\t\treturn\n\t}\n\n\t_, insertErr := db.PostgresDb.Query(\"insert into teams(name,team_motto,created_by_id) values($1,$2,$3)\",\n\t\tv.Name, v.Motto, user.DbId)\n\tsetCtxFromDbError(ctx, insertErr, teamAlreadyExists)\n}", "title": "" }, { "docid": "ab84f55514595c5f25c7cc0358885c2d", "score": "0.49636722", "text": "func (cli *OpsGenieAlertClient) AddTeam(req alerts.AddTeamAlertRequest) (*alerts.AddTeamAlertResponse, error) {\n\treq.APIKey = cli.apiKey\n\tresp, err := cli.sendRequest(cli.buildPostRequest(addTeamAlertURL, req))\n\n\tif resp == nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tvar addTeamAlertResp alerts.AddTeamAlertResponse\n\n\tif err = resp.Body.FromJsonTo(&addTeamAlertResp); err != nil {\n\t\tmessage := \"Server response can not be parsed, \" + err.Error()\n\t\tlogging.Logger().Warn(message)\n\t\treturn nil, errors.New(message)\n\t}\n\treturn &addTeamAlertResp, nil\n}", "title": "" }, { "docid": "cd67c2a7d31cce42e9a6c43be62450bc", "score": "0.49527276", "text": "func crowdRiseNewEventTeamHandler(w http.ResponseWriter, r *http.Request, firstname string, lastname string, crowdriseUsername string, ein string) {\n\t//Check to make sure the user doesn't already have a team\n\tauthParts := strings.Split(r.Header.Get(\"Authorization\"), \" \")\n\tif len(authParts) != 2 {\n\t\terrJSONHandler(w, r, http.StatusBadRequest, \"unable to get authorization header bearer token\")\n\t\treturn\n\t}\n\tpassedInToken := authParts[1]\n\n\tvar crowdRiseTeamName sql.NullString\n\terr := DB.QueryRow(\"select crowdrise_team_id from users where oauth_token=? limit 1\", passedInToken).Scan(&crowdRiseTeamName)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\terrJSONHandler(w, r, http.StatusBadRequest, \"invalid token, no associated user found\")\n\t\t\treturn\n\t\t}\n\t\tlog.Println(\"error with database validating token for reverse proxy\")\n\t\terrJSONHandler(w, r, http.StatusBadRequest, \"internal database error\")\n\t\treturn\n\t}\n\n\tif crowdRiseTeamName.String != \"\" {\n\t\tlog.Println(\"the user already has a crowdrise team\")\n\t\terrJSONHandler(w, r, http.StatusBadRequest, \"the user already has a crowdrise team\")\n\t\treturn\n\t}\n\n\tb, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tlog.Printf(\"issue reading signup body - %v\", err)\n\t\terrJSONHandler(w, r, http.StatusInternalServerError, \"internal error reading the signup body\")\n\t\treturn\n\t}\n\tteamName := \"300 Days of Run - \" + firstname + \" \" + lastname\n\tb = append(b, []byte(fmt.Sprintf(\"&api_key=%s&api_secret=%s&team_name=%s&charity_ein=%s&event_username=300DaysofRun&organizer_username=%s\", CROWDRISE_API_KEY, CROWDRISE_API_SECRET, teamName, ein, crowdriseUsername))...)\n\tlog.Printf(\"changing body to %s\", b)\n\tr.Body = ioutil.NopCloser(bytes.NewBuffer(b))\n\tr.ContentLength = int64(len(b))\n\n\tresp, err := http.Post(CROWDRISE_BASE_URL+\"/api/create_event_team\", \"application/x-www-form-urlencoded\", bytes.NewBuffer(b))\n\tlog.Printf(\"Postd request. Response: %v\", resp)\n\tif err != nil {\n\t\tlog.Printf(\"error adding user to event - %q\", err.Error())\n\t\terrJSONHandler(w, r, http.StatusInternalServerError, \"error adding user to event\")\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\n\tdata, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tlog.Printf(\"error reading response body from event add request - %q\", err.Error())\n\t\terrJSONHandler(w, r, http.StatusInternalServerError, \"error reading response from crowdrise\")\n\t\treturn\n\t}\n\n\tif resp.StatusCode > 300 {\n\t\tlog.Printf(\"unexpected response from crowdrise event add: %s\", data)\n\t\terrJSONHandler(w, r, http.StatusInternalServerError, \"unexpected result from crowdrise\")\n\t\treturn\n\t}\n\n\tvar createTeamResponse struct {\n\t\tStatus string `json:\"status\"`\n\t\tResult []struct {\n\t\t\tTeamCreated bool `json:\"team_created\"`\n\t\t\tURL string `json:\"url\"`\n\t\t\tPrivateURL string `json:\"private_url\"`\n\t\t\tTeamUsername string `json:\"team_username\"`\n\t\t\tTeamID int `json:\"team_id\"`\n\t\t\tErrorID int `json:\"error_id\"`\n\t\t\tError string `json:\"error\"`\n\t\t} `json:\"result\"`\n\t}\n\tvar createTeamErrorResponse struct {\n\t\tStatus string `json:\"status\"`\n\t\tResult []struct {\n\t\t\tTeamCreated bool `json:\"team_created\"`\n\t\t\tErrorID string `json:\"error_id\"`\n\t\t\tError string `json:\"error\"`\n\t\t} `json:\"result\"`\n\t}\n\terr = json.Unmarshal(data, &createTeamResponse)\n\tif err != nil {\n\t\terr = json.Unmarshal(data, &createTeamErrorResponse)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"error unmarshalling create team response for %q: %q\", string(data), err.Error())\n\t\t\terrJSONHandler(w, r, http.StatusInternalServerError, \"unable to parse result from crowdrise create team \")\n\t\t\treturn\n\t\t}\n\t\t//Something went wrong, the team was not created and doesn't already exist\n\t\tw.Write(data)\n\t\treturn\n\t}\n\n\t// avoid panics for out of bounds index access below\n\tif len(createTeamResponse.Result) == 0 {\n\t\tlog.Printf(\"error - crowdrise did not return data in result key - %s\", string(data))\n\t\terrJSONHandler(w, r, http.StatusInternalServerError, \"crowdrise did not return data in the result key\")\n\t\treturn\n\t}\n\n\t//If the user already exists, that's fine, we want to store the user's info anyway\n\tif !createTeamResponse.Result[0].TeamCreated {\n\t\tlog.Printf(\"error - team not created - %s\", string(data))\n\t\terrJSONHandler(w, r, http.StatusInternalServerError, fmt.Sprintf(\"crowdrise did not create the team - %s\", createTeamResponse.Result[0].Error))\n\t\treturn\n\t}\n\n\t_, err = DB.Exec(\"update users set crowdrise_team_username=?, crowdrise_team_id=?, crowdrise_private_url=?, crowdrise_public_url=? where oauth_token=? limit 1\", createTeamResponse.Result[0].TeamUsername, createTeamResponse.Result[0].TeamID, createTeamResponse.Result[0].PrivateURL, createTeamResponse.Result[0].URL, passedInToken)\n\tif err != nil {\n\t\tlog.Printf(\"error updating user record with crowdrise team information - %q\", err.Error())\n\t\terrJSONHandler(w, r, http.StatusInternalServerError, \"internal storage error saving crowdrise information\")\n\t\treturn\n\t}\n\n\t// pass the data back to the front end\n\tw.Write(data)\n}", "title": "" }, { "docid": "e42daefd0c7f3d4d9f5d0e50c150ea6a", "score": "0.4929596", "text": "func (s *AccSuite) TestAccUserCreateAssign() {\n\trn := \"rollbar_user.test_user\"\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team\" {\n\t\t\tname = \"%s-team-0\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\t# This email already has an account. \n\t\t\t# https://github.com/rollbar/terraform-provider-rollbar/issues/91\n\t\t\temail = \"terraform-provider-test@rollbar.com\"\n\t\t\tteam_ids = [rollbar_team.test_team.id]\n\t\t}\n\t`\n\tconfig := fmt.Sprintf(tmpl, s.randName)\n\tresource.Test(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: config,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(rn),\n\t\t\t\t\ts.checkUserTeams(rn),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "08f16d79ac8437d29982316d9e702b16", "score": "0.49119124", "text": "func TestTeamCreate(t *testing.T) {\n\troutes := SetUpGin()\n\tConvey(\"create a new team\", t, func() {\n\t\tvar (\n\t\t\tw *httptest.ResponseRecorder\n\t\t\tr *http.Request\n\t\t)\n\t\tConvey(\"create a new team ok\", func() {\n\t\t\t/* insert team 1 */\n\t\t\tpostb := map[string]interface{}{\n\t\t\t\t\"team_name\": \"team_X\",\n\t\t\t\t\"resume\": \"this is resumeA\",\n\t\t\t\t\"users\": []int{1, 2, 3},\n\t\t\t}\n\t\t\tb, _ := json.Marshal(postb)\n\t\t\tw, r = NewTestContextWithDefaultSession(\"POST\", \"/api/v1/team\", &b)\n\t\t\troutes.ServeHTTP(w, r)\n\t\t\trespBody := w.Body.String()\n\t\t\tSo(respBody, ShouldContainSubstring, \"team created\")\n\t\t\tSo(w.Code, ShouldEqual, 200)\n\t\t\t///* insert team 2 */\n\t\t\t//postb = map[string]interface{}{\n\t\t\t//\t\"team_name\": \"team_B\",\n\t\t\t//\t\"resume\": \"this is resumeB\",\n\t\t\t//\t\"users\": []int{1},\n\t\t\t//}\n\t\t\t//b, _ = json.Marshal(postb)\n\t\t\t//w, r = NewTestContextWithDefaultSession(\"POST\", \"/api/v1/team\", &b)\n\t\t\t//routes.ServeHTTP(w, r)\n\t\t\t//respBody = w.Body.String()\n\t\t\t//So(respBody, ShouldContainSubstring, \"team created\")\n\t\t\t//So(w.Code, ShouldEqual, 200)\n\t\t\t///* insert team 3 */\n\t\t\t//postb = map[string]interface{}{\n\t\t\t//\t\"team_name\": \"team_C\",\n\t\t\t//\t\"resume\": \"this is resumeC\",\n\t\t\t//\t\"users\": []int{2, 3},\n\t\t\t//}\n\t\t\t//b, _ = json.Marshal(postb)\n\t\t\t//w, r = NewTestContextWithDefaultSession(\"POST\", \"/api/v1/team\", &b)\n\t\t\t//routes.ServeHTTP(w, r)\n\t\t\t//respBody = w.Body.String()\n\t\t\t//So(respBody, ShouldContainSubstring, \"team created\")\n\t\t\t//So(w.Code, ShouldEqual, 200)\n\t\t\t///* insert team 4 */\n\t\t\t//postb = map[string]interface{}{\n\t\t\t//\t\"team_name\": \"team_D\",\n\t\t\t//\t\"resume\": \"this is resumeD\",\n\t\t\t//\t\"users\": []int{},\n\t\t\t//}\n\t\t\t//b, _ = json.Marshal(postb)\n\t\t\t//w, r = NewTestContextWithDefaultSession(\"POST\", \"/api/v1/team\", &b)\n\t\t\t//routes.ServeHTTP(w, r)\n\t\t\t//respBody = w.Body.String()\n\t\t\t//So(respBody, ShouldContainSubstring, \"team created\")\n\t\t\t//So(w.Code, ShouldEqual, 200)\n\t\t\t///* insert team 5 */\n\t\t\t//postb = map[string]interface{}{\n\t\t\t//\t\"team_name\": \"team_D1\",\n\t\t\t//\t\"resume\": \"this is resumeD1\",\n\t\t\t//\t\"users\": []int{1, 2},\n\t\t\t//}\n\t\t\t//b, _ = json.Marshal(postb)\n\t\t\t//w, r = NewTestContextWithDefaultSession(\"POST\", \"/api/v1/team\", &b)\n\t\t\t//routes.ServeHTTP(w, r)\n\t\t\t//respBody = w.Body.String()\n\t\t\t//So(respBody, ShouldContainSubstring, \"team created\")\n\t\t\t//So(w.Code, ShouldEqual, 200)\n\t\t})\n\t\tConvey(\"create a new team faild\", func() {\n\t\t\tpostb := map[string]interface{}{\n\t\t\t\t\"resume\": \"this is resume3\",\n\t\t\t\t\"userIDs\": []int{2, 3},\n\t\t\t}\n\t\t\tb, _ := json.Marshal(postb)\n\t\t\tw, r = NewTestContextWithDefaultSession(\"POST\", \"/api/v1/team\", &b)\n\t\t\troutes.ServeHTTP(w, r)\n\t\t\tSo(w.Code, ShouldEqual, 400)\n\t\t})\n\t})\n}", "title": "" }, { "docid": "558b3c85dd23f71eb0b42f18ab77917c", "score": "0.4900997", "text": "func verifySlackTeam(payload *SlackPayload) error {\n\tappConfig := config.GetConfig()\n\tteamID := appConfig.Slack.TeamID\n\tif teamID != \"\" && teamID != payload.TeamID {\n\t\terr := fmt.Sprintf(\"TeamID: %s does not match required TeamID: %s - Blocking\", payload.TeamID, teamID)\n\t\tlog.Printf(err)\n\t\treturn errors.New(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "44c20667cee2ef086dad34150dec1bc5", "score": "0.48952004", "text": "func (userUtil UserMemberUtil) GetUserTeams(deleted bool) *[]types.Team {\n\t// if there's no userId in the struct\n\tif userUtil.UserId == nil || *userUtil.UserId == \"\" {\n\t\treturn nil\n\t}\n\n\t// get all the teams where the creator matches the current userId\n\t// or where the current userId is a part of the members\n\tteamsFilter := bson.D{\n\t\t{\"app\", userUtil.App},\n\t\t{\"deleted\", deleted},\n\t\t{\"$or\", bson.A{\n\t\t\t// return any team you created\n\t\t\tbson.D{{\"createdby\", *userUtil.UserId}},\n\t\t\t// or are a member of\n\t\t\tbson.D{\n\t\t\t\t{\"members\", bson.D{\n\t\t\t\t\t{\"$in\", []string{*userUtil.UserId}},\n\t\t\t\t}},\n\t\t\t},\n\t\t}},\n\t}\n\n\tcur, err := db.TeamCollection.Find(context.Background(), teamsFilter)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn nil\n\t}\n\n\tdefer cur.Close(context.TODO())\n\n\tvar teams []types.Team\n\tvar teamIds []string\n\tvar organisationIds []string\n\n\tfor cur.Next(context.TODO()) {\n\t\tvar team types.Team\n\t\terr := cur.Decode(&team)\n\t\tif err != nil {\n\t\t\tlog.Print(err)\n\t\t}\n\n\t\t// append the teams data to the various array variables\n\t\tteams = append(teams, team)\n\t\tteamIds = append(teamIds, team.Id)\n\t\torganisationIds = append(organisationIds, team.OrganisationId)\n\t}\n\n\tuserUtil.teams = teams\n\tuserUtil.teamIds = teamIds\n\tuserUtil.organisationIds = organisationIds\n\n\treturn &userUtil.teams\n}", "title": "" }, { "docid": "d33541756398eb3914e650ff6f57291b", "score": "0.48949468", "text": "func CreateTeam(t *teams.Team, env *config.Env, cookie *http.Cookie) {\n\treqBody, err := json.Marshal(t)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"error marshalling team data: %v\", err))\n\t}\n\n\treq, err := http.NewRequest(\"POST\", config.BaseAPIURL+\"teams/\", bytes.NewReader(reqBody))\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"error getting new request: %v\", err))\n\t}\n\treq.AddCookie(cookie)\n\n\trr := httptest.NewRecorder()\n\trouter := routes.Routes(env)\n\trouter.ServeHTTP(rr, req)\n\n\tres := rr.Result()\n\n\tif res.StatusCode != http.StatusOK {\n\t\tresBody, err := ioutil.ReadAll(res.Body)\n\t\tif err != nil {\n\t\t\tpanic(fmt.Sprintf(\"error reading res: %v\", err))\n\t\t}\n\n\t\tpanic(fmt.Sprintf(\"error creating new team: %s\", resBody))\n\t}\n\n\terr = json.NewDecoder(res.Body).Decode(t)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"error decoding res body: %v\", err))\n\t}\n\n\tif t.ID == 0 {\n\t\tpanic(\"expected team id to be returned\")\n\t}\n}", "title": "" }, { "docid": "520d99032212c78f94ea515fda49484e", "score": "0.4892393", "text": "func (m *TeamJoiningEnabledEventMessageDetail) SetTeamId(value *string)() {\n m.teamId = value\n}", "title": "" }, { "docid": "dd4c2eb9744090318a32292a4cf29567", "score": "0.4891528", "text": "func sweepResourceUser(_ string) error {\n\tlog.Info().Msg(\"Cleaning up Rollbar users from acceptance test runs.\")\n\n\tc := client.NewClient(client.DefaultBaseURL, os.Getenv(\"ROLLBAR_API_KEY\"))\n\tusers, err := c.ListUsers()\n\tif err != nil {\n\t\tlog.Err(err).Send()\n\t\treturn err\n\t}\n\n\t// Find the ID for this account's \"Everyone\" team\n\tvar everyoneTeamID int\n\tteams, err := c.ListTeams()\n\tif err != nil {\n\t\tlog.Err(err).Send()\n\t\treturn err\n\t}\n\tfor _, t := range teams {\n\t\tif t.Name == \"Everyone\" {\n\t\t\teveryoneTeamID = t.ID\n\t\t}\n\t}\n\n\tcount := 0\n\tfor _, u := range users {\n\t\t// We're only interested in test users\n\t\tif !strings.HasPrefix(u.Username, \"tf-acc-test-\") {\n\t\t\tcontinue\n\t\t}\n\t\t// Ignore this user, because it is required for acceptance tests that\n\t\t// involve a registered user.\n\t\tif u.Username == \"tf-acc-test-rollbar-provider\" {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Remove the user from Everyone team, thereby removing it from the account.\n\t\terr = c.RemoveUserFromTeam(u.ID, everyoneTeamID)\n\t\tif err != nil {\n\t\t\tlog.Err(err).Send()\n\t\t\treturn err\n\t\t}\n\t\tcount++\n\t\tlog.Debug().\n\t\t\tInt(\"user_id\", u.ID).\n\t\t\tStr(\"username\", u.Username).\n\t\t\tMsg(\"Removed user\")\n\t}\n\n\tlog.Info().Int(\"count\", count).Msg(\"Users cleanup complete\")\n\treturn nil\n}", "title": "" }, { "docid": "7f631ff8c1b21494421711c48f491195", "score": "0.48881483", "text": "func (db *data) CreateTeam(record *model.Team, current *model.User) error {\n\trecord.TeamUsers = model.TeamUsers{\n\t\t&model.TeamUser{\n\t\t\tUserID: current.ID,\n\t\t\tPerm: \"owner\",\n\t\t},\n\t}\n\n\treturn db.Create(\n\t\trecord,\n\t).Error\n}", "title": "" }, { "docid": "c0b115a41a7833d8b947c5f8de154917", "score": "0.4884214", "text": "func (c *Client) AddUserToTeamFromInvite(hash, dataToHash, inviteId string) (*Result, *AppError) {\n\tdata := make(map[string]string)\n\tdata[\"hash\"] = hash\n\tdata[\"data\"] = dataToHash\n\tdata[\"invite_id\"] = inviteId\n\tif r, err := c.DoApiPost(\"/teams/add_user_to_team_from_invite\", MapToJson(data)); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tdefer closeBody(r)\n\t\treturn &Result{r.Header.Get(HEADER_REQUEST_ID),\n\t\t\tr.Header.Get(HEADER_ETAG_SERVER), TeamFromJson(r.Body)}, nil\n\t}\n}", "title": "" }, { "docid": "34071ca9ca3805bda828df1625d9c3d2", "score": "0.48537233", "text": "func UnmarshalTeam(data []byte, team *portainer.Team) error {\n\treturn json.Unmarshal(data, team)\n}", "title": "" }, { "docid": "ed10d4fe5c3d109e8643b1f8ac49db61", "score": "0.48528993", "text": "func (r *UserJoinedTeamsCollectionRequest) Add(ctx context.Context, reqObj *Team) (resObj *Team, err error) {\n\terr = r.JSONRequest(ctx, \"POST\", \"\", reqObj, &resObj)\n\treturn\n}", "title": "" }, { "docid": "dc3bbfc800df7534cff2b8db33291733", "score": "0.48403388", "text": "func Test_addRemoveAm(t *testing.T) {\n\tname := usersName[0]\n\tinitAListOfUsers(t, usersName)\n\n\tokUrlJ := cr.Url{Url: fmt.Sprintf(\"%v/%v\", ServicePath, name)}\n\turl := resourcePath + \"/\" + name\n\texeCommandCheckRes(t, cr.PUT_STR, url, http.StatusCreated, string(uData), okUrlJ)\n\tdata, _ := stRestful.UsersList.GetPropertyAttachedToEntity(name, propertyName)\n\texeCommandCheckRes(t, cr.GET_STR, url, http.StatusOK, \"\", data.(*am.AmUserInfo))\n\n\tokUrlJ = cr.Url{Url: fmt.Sprintf(\"%v/%v\", ServicePath, name)}\n\turl = resourcePath + \"/\" + name\n\texeCommandCheckRes(t, cr.DELETE_STR, url, http.StatusNoContent, \"\", cr.StringMessage{Str: \"\"})\n\n\texeCommandCheckRes(t, cr.GET_STR, url, http.StatusNotFound, \"\", cr.Error{Code: http.StatusNotFound})\n}", "title": "" }, { "docid": "d4e865fa590d9bff743768d6d1b28063", "score": "0.48070556", "text": "func (s *TeamsService) RemoveTeamMembership(ctx context.Context, team int64, user string) (*Response, error) {\n\tu := fmt.Sprintf(\"teams/%v/memberships/%v\", team, user)\n\treq, err := s.client.NewRequest(\"DELETE\", u, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s.client.Do(ctx, req, nil)\n}", "title": "" }, { "docid": "bd1366d5cf338083f295ace18737e3c0", "score": "0.47994876", "text": "func TestInvalidWebTokenUpdateEmail(t *testing.T) {\n\ttests.ResetLog()\n\tdefer tests.DisplayLog()\n\n\tdb, err := db.NewMGO(tests.Context, tests.TestSession)\n\tif err != nil {\n\t\tt.Fatalf(\"\\t%s\\tShould be able to get a Mongo session : %v\", tests.Failed, err)\n\t}\n\tdefer db.CloseMGO(tests.Context)\n\n\tvar publicID string\n\tdefer func() {\n\t\tif err := removeUser(db, publicID); err != nil {\n\t\t\tt.Fatalf(\"\\t%s\\tShould be able to remove the test user : %v\", tests.Failed, err)\n\t\t}\n\t\tt.Logf(\"\\t%s\\tShould be able to remove the test user.\", tests.Success)\n\t}()\n\n\tt.Log(\"Given the need to validate web tokens don't work after user update.\")\n\t{\n\t\tt.Log(\"\\tWhen using a new user.\")\n\t\t{\n\t\t\tu1, err := auth.NewUser(auth.NUser{\n\t\t\t\tStatus: auth.StatusActive,\n\t\t\t\tFullName: \"Test Kennedy\",\n\t\t\t\tEmail: \"bill@ardanlabs.com\",\n\t\t\t\tPassword: \"_Password124\",\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tt.Fatalf(\"\\t%s\\tShould be able to build a new user : %v\", tests.Failed, err)\n\t\t\t}\n\t\t\tt.Logf(\"\\t%s\\tShould be able to build a new user.\", tests.Success)\n\n\t\t\tif err := auth.CreateUser(tests.Context, db, u1); err != nil {\n\t\t\t\tt.Fatalf(\"\\t%s\\tShould be able to create a user : %v\", tests.Failed, err)\n\t\t\t}\n\t\t\tt.Logf(\"\\t%s\\tShould be able to create a user.\", tests.Success)\n\n\t\t\t// We need to do this so we can clean up after.\n\t\t\tpublicID = u1.PublicID\n\n\t\t\twebTok, err := auth.CreateWebToken(tests.Context, db, u1, 5*time.Second)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatalf(\"\\t%s\\tShould be able to create a web token : %v\", tests.Failed, err)\n\t\t\t}\n\t\t\tt.Logf(\"\\t%s\\tShould be able to create a web token.\", tests.Success)\n\n\t\t\tif _, err := auth.ValidateWebToken(tests.Context, db, webTok); err != nil {\n\t\t\t\tt.Fatalf(\"\\t%s\\tShould be able to validate the web token : %v\", tests.Failed, err)\n\t\t\t}\n\t\t\tt.Logf(\"\\t%s\\tShould be able to validate the web token.\", tests.Success)\n\n\t\t\tuu := auth.UpdUser{\n\t\t\t\tPublicID: publicID,\n\t\t\t\tStatus: auth.StatusActive,\n\t\t\t\tFullName: \"Update Kennedy\",\n\t\t\t\tEmail: \"change@ardanlabs.com\",\n\t\t\t}\n\n\t\t\tif err := auth.UpdateUser(tests.Context, db, uu); err != nil {\n\t\t\t\tt.Fatalf(\"\\t%s\\tShould be able to update a user : %v\", tests.Failed, err)\n\t\t\t}\n\t\t\tt.Logf(\"\\t%s\\tShould be able to update a user.\", tests.Success)\n\n\t\t\tif _, err := auth.ValidateWebToken(tests.Context, db, webTok); err == nil {\n\t\t\t\tt.Fatalf(\"\\t%s\\tShould Not be able to validate the org web token.\", tests.Failed)\n\t\t\t}\n\t\t\tt.Logf(\"\\t%s\\tShould Not be able to validate the org web token.\", tests.Success)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "87bc521f0ad714a6b9d5487bb80f706b", "score": "0.47970986", "text": "func (k *KeybaseDaemonRPC) NewlyAddedToTeam(context.Context, keybase1.TeamID) error {\n\treturn nil\n}", "title": "" }, { "docid": "be405df394565350d27cb5df5e5f6206", "score": "0.4795792", "text": "func (c *Client) AddUserToTeam(teamID, userID string) error {\n\t_, err := c.put(\"/teams/\"+teamID+\"/users/\"+userID, nil, nil)\n\treturn err\n}", "title": "" }, { "docid": "fa722dd001b6de1c6e8a4289b1111bae", "score": "0.47907522", "text": "func (c *Client) DeleteTeam(id string) error {\n\t_, err := c.delete(\"/teams/\" + id)\n\treturn err\n}", "title": "" }, { "docid": "07aa0c3595600e9ef413a845e7251347", "score": "0.47843713", "text": "func removeFavoriteTeamHandler(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tteamId := vars[\"team\"]\n\tinstallationId := r.FormValue(\"installationId\")\n\terr := checkInstallation(installationId)\n\t_, err = db.Exec(\n\t\t\"DELETE FROM favorites WHERE installationid=$1 AND teamid=$2;\",\n\t\tinstallationId,\n\t\tteamId,\n\t)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tvar results [0]string\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tencoder := json.NewEncoder(w)\n\tencoder.Encode(&results)\n\n}", "title": "" }, { "docid": "6849bc0e3058784a7e3680afee1c45af", "score": "0.47703147", "text": "func (m *ChannelIdentity) SetTeamId(value *string)() {\n err := m.GetBackingStore().Set(\"teamId\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "88bc1a7cc700a57d6f1cfedfe38f06fc", "score": "0.4747261", "text": "func createTeamWithWriters(tc libkb.TestContext, writers []*kbtest.FakeUser) string {\n\tname := createTeam(tc)\n\tfor _, u := range writers {\n\t\terr := teams.SetRoleWriter(context.TODO(), tc.G, name, u.Username)\n\t\trequire.NoError(tc.T, err, \"team set role\")\n\t}\n\treturn name\n}", "title": "" }, { "docid": "984f413c596785dab5d77151a0d4ec8d", "score": "0.47323257", "text": "func VerifyInvite(invite Invitation) int {\n\tvar i Invitation\n\tinvitation := Conn.Where(\"email = ? AND verification_code = ?\", invite.Email, invite.VerificationCode).Find(&i)\n\t//If invitation does not exist\n\tif invitation != nil && invitation.Error != nil {\n\t\treturn 403\n\t}\n\n\tvar u User\n\tfindUser := Conn.Where(\"email = ?\", i.Email).Find(&u)\n\t//If user does not exist\n\tif findUser != nil && findUser.Error != nil {\n\t\treturn 404\n\t}\n\treturn 200\n}", "title": "" }, { "docid": "81eb1ef3eabd133e5110edff19dc370b", "score": "0.47319162", "text": "func AssertTournamentNotStarted(ac *core.FoosmanContext, ID int) error {\n\tvar tournament Tournament\n\tif err := ac.DB.First(&tournament, ID).Error; err != nil {\n\t\treturn err\n\t}\n\n\tif tournament.State != int(core.New) {\n\t\treturn errors.New(\"Can't delete team from a tournament that has started\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2a0deacdbe79e2e7f5d133803b3aa0e6", "score": "0.4728587", "text": "func TestMoveoutUser(t *testing.T) {\n if err := MoveoutUser(\"Meeting\",\"test\"); err != nil {\n\t\tt.Error(\"MoveoutUser test failed.\");\n\t\tfmt.Println(\"error: \" , err);\n } else {\n t.Log(\"MoveoutUser test success\");\n }\n}", "title": "" }, { "docid": "4a610e2e1ea24cc22291f2f584ea6272", "score": "0.4720581", "text": "func (s *AccSuite) TestAccUserImportRegistered() {\n\trn := \"rollbar_user.test_user\"\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team\" {\n\t\t\tname = \"%s-team-0\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"terraform-provider-test@rollbar.com\"\n\t\t\tteam_ids = [rollbar_team.test_team.id]\n\t\t}\n\t`\n\tconfig := fmt.Sprintf(tmpl, s.randName)\n\tresource.Test(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: config,\n\t\t\t},\n\t\t\t{\n\t\t\t\tResourceName: rn,\n\t\t\t\tImportState: true,\n\t\t\t\tImportStateVerify: true,\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "d53101d197b3044c4bbce7bc502d42e1", "score": "0.4719279", "text": "func (a *App) TeamMembersToAdd(since int64, teamID *string, includeRemovedMembers bool) ([]*model.UserTeamIDPair, *model.AppError) {\n\tuserTeams, err := a.Srv().Store().Group().TeamMembersToAdd(since, teamID, includeRemovedMembers)\n\tif err != nil {\n\t\treturn nil, model.NewAppError(\"TeamMembersToAdd\", \"app.select_error\", nil, \"\", http.StatusInternalServerError).Wrap(err)\n\t}\n\n\treturn userTeams, nil\n}", "title": "" }, { "docid": "285d656b7287f1c83c52a63c0b49996d", "score": "0.47122383", "text": "func (org *User) GetUserTeams(userID int64) error {\n\tteams := make([]*Team, 0, 5)\n\tif err := x.Sql(`SELECT team.* FROM team\nINNER JOIN team_user ON team_user.team_id = team.id\nWHERE team_user.org_id = ? AND team_user.uid = ?`,\n\t\torg.Id, userID).Find(&teams); err != nil {\n\t\treturn fmt.Errorf(\"get teams: %v\", err)\n\t}\n\n\t// FIXME: should I change this value inside method,\n\t// or only in location of caller where it's really needed?\n\torg.NumTeams = len(org.Teams)\n\treturn nil\n}", "title": "" }, { "docid": "8eebfc7187ae413be62b624a09a52a34", "score": "0.47072586", "text": "func (s *AccSuite) TestAccTeamAssignProject() {\n\tprojectResourceName := \"rollbar_project.test_project\"\n\tteamName := fmt.Sprintf(\"%s-team-0\", s.randName)\n\tprojectName := s.randName\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team\" {\n\t\t\tname = \"%s\"\n\t\t}\n\n\t\tresource \"rollbar_project\" \"test_project\" {\n\t\t\tname = \"%s\"\n\t\t\tteam_ids = [rollbar_team.test_team.id]\n\t\t}\n\t`\n\tconfig := fmt.Sprintf(tmpl, teamName, projectName)\n\tresource.ParallelTest(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: config,\n\t\t\t\tCheck: resource.ComposeTestCheckFunc(\n\t\t\t\t\ts.checkResourceStateSanity(projectResourceName),\n\t\t\t\t\ts.checkProjectTeams(projectResourceName),\n\t\t\t\t),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "056d15f7b11a2751fb2adf9c43e712a1", "score": "0.47061184", "text": "func (r *resolver) TeamMembers(ctx context.Context, args struct {\n\tUserID string\n\tTeamID string\n\tExcludeTeam bool\n}) ([]*teamMember, error) {\n\tc, err := getCtx(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif args.UserID == model.Me {\n\t\targs.UserID = c.AppContext.Session().UserId\n\t}\n\n\tif !c.App.SessionHasPermissionToUser(*c.AppContext.Session(), args.UserID) && !c.App.SessionHasPermissionTo(*c.AppContext.Session(), model.PermissionReadOtherUsersTeams) {\n\t\tc.SetPermissionError(model.PermissionReadOtherUsersTeams)\n\t\treturn nil, c.Err\n\t}\n\n\tcanSee, appErr := c.App.UserCanSeeOtherUser(c.AppContext.Session().UserId, args.UserID)\n\tif appErr != nil {\n\t\treturn nil, appErr\n\t}\n\n\tif !canSee {\n\t\tc.SetPermissionError(model.PermissionViewMembers)\n\t\treturn nil, c.Err\n\t}\n\n\tif args.TeamID != \"\" && !args.ExcludeTeam {\n\t\tif !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), args.TeamID, model.PermissionViewTeam) {\n\t\t\tc.SetPermissionError(model.PermissionViewTeam)\n\t\t\treturn nil, c.Err\n\t\t}\n\n\t\ttm, appErr2 := c.App.GetTeamMember(args.TeamID, args.UserID)\n\t\tif appErr2 != nil {\n\t\t\treturn nil, appErr2\n\t\t}\n\n\t\treturn []*teamMember{{*tm}}, nil\n\t}\n\n\texcludeTeamID := \"\"\n\tif args.TeamID != \"\" && args.ExcludeTeam {\n\t\texcludeTeamID = args.TeamID\n\t}\n\n\t// Do not return archived team members\n\tmembers, appErr := c.App.GetTeamMembersForUser(args.UserID, excludeTeamID, false)\n\tif appErr != nil {\n\t\treturn nil, appErr\n\t}\n\n\t// Convert to the wrapper format.\n\tres := make([]*teamMember, 0, len(members))\n\tfor _, tm := range members {\n\t\tres = append(res, &teamMember{*tm})\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "8eb5376e880253250dc353063a4b7ebc", "score": "0.46960902", "text": "func (a *App) TeamMembersMinusGroupMembers(teamID string, groupIDs []string, page, perPage int) ([]*model.UserWithGroups, int64, *model.AppError) {\n\tusers, err := a.Srv().Store().Group().TeamMembersMinusGroupMembers(teamID, groupIDs, page, perPage)\n\tif err != nil {\n\t\treturn nil, 0, model.NewAppError(\"TeamMembersMinusGroupMembers\", \"app.select_error\", nil, \"\", http.StatusInternalServerError).Wrap(err)\n\t}\n\n\tfor _, u := range users {\n\t\ta.SanitizeProfile(&u.User, false)\n\t}\n\n\t// parse all group ids of all users\n\tallUsersGroupIDMap := map[string]bool{}\n\tfor _, user := range users {\n\t\tfor _, groupID := range user.GetGroupIDs() {\n\t\t\tallUsersGroupIDMap[groupID] = true\n\t\t}\n\t}\n\n\t// create a slice of distinct group ids\n\tvar allUsersGroupIDSlice []string\n\tfor key := range allUsersGroupIDMap {\n\t\tallUsersGroupIDSlice = append(allUsersGroupIDSlice, key)\n\t}\n\n\t// retrieve groups from DB\n\tgroups, appErr := a.GetGroupsByIDs(allUsersGroupIDSlice)\n\tif appErr != nil {\n\t\treturn nil, 0, appErr\n\t}\n\n\t// map groups by id\n\tgroupMap := map[string]*model.Group{}\n\tfor _, group := range groups {\n\t\tgroupMap[group.Id] = group\n\t}\n\n\t// populate each instance's groups field\n\tfor _, user := range users {\n\t\tuser.Groups = []*model.Group{}\n\t\tfor _, groupID := range user.GetGroupIDs() {\n\t\t\tgroup, ok := groupMap[groupID]\n\t\t\tif ok {\n\t\t\t\tuser.Groups = append(user.Groups, group)\n\t\t\t}\n\t\t}\n\t}\n\n\ttotalCount, err := a.Srv().Store().Group().CountTeamMembersMinusGroupMembers(teamID, groupIDs)\n\tif err != nil {\n\t\treturn nil, 0, model.NewAppError(\"TeamMembersMinusGroupMembers\", \"app.select_error\", nil, \"\", http.StatusInternalServerError).Wrap(err)\n\t}\n\treturn users, totalCount, nil\n}", "title": "" }, { "docid": "5702b878609a0be4d86d4ba75f59ae53", "score": "0.4662443", "text": "func TestIncomingMailHandler_handleNewTicketMail_RegisteredUser(t *testing.T) {\n\ttestee := getTestHandlerWithMockedData()\n\tuserId := 1\n\ttestMail := mailData.Mail{Id: \"TestId01\", Sender: \"testsender@test.de\", Receiver: \"test@test.de\", Subject: \"TestSubject\",\n\t\tContent: \"TestContent\", SentTime: time.Now().Unix()}\n\n\t// Overwrite the mocked interface which are needed in this test:\n\tmockedUserContext := new(mockedForTests.MockedUserContext)\n\tmockedUserContext.On(\"GetUserForEmail\", testMail.Sender).Return(true, userId)\n\treturnedUser := userData.User{}\n\tmockedUserContext.On(\"GetUserById\", userId).Return(true, returnedUser)\n\n\tmockedTicketContext := new(mockedForTests.MockedTicketContext)\n\tmockedTicketContext.On(\"CreateNewTicketForInternalUser\", testMail.Subject, returnedUser, mock.Anything).\n\t\tReturn(&ticketData.Ticket{}, nil)\n\n\ttestee.TicketContext = mockedTicketContext\n\ttestee.UserContext = mockedUserContext\n\n\t// Execute the test:\n\terr := testee.handleNewTicketMail(testMail)\n\tassert.Nil(t, err)\n\n\t// Assert the correct parameters\n\tmockedUserContext.AssertExpectations(t)\n\tmockedTicketContext.AssertExpectations(t)\n}", "title": "" }, { "docid": "c48bd7a8d711fa6ab41c59969035b136", "score": "0.46614632", "text": "func UserTeamIndex(c *gin.Context) {\n\trecords, err := store.GetUserTeams(\n\t\tc,\n\t\t&model.UserTeamParams{\n\t\t\tUser: c.Param(\"user\"),\n\t\t},\n\t)\n\n\tif err != nil {\n\t\tlogrus.Warnf(\"Failed to fetch user teams. %s\", err)\n\n\t\tc.JSON(\n\t\t\thttp.StatusInternalServerError,\n\t\t\tgin.H{\n\t\t\t\t\"status\": http.StatusInternalServerError,\n\t\t\t\t\"message\": \"Failed to fetch teams\",\n\t\t\t},\n\t\t)\n\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tc.JSON(\n\t\thttp.StatusOK,\n\t\trecords,\n\t)\n}", "title": "" }, { "docid": "9545cf70f118f3bb17c8b286a4334210", "score": "0.4659802", "text": "func createTeam(tc libkb.TestContext) string {\n\tb, err := libkb.RandBytes(4)\n\trequire.NoError(tc.T, err)\n\n\tname := fmt.Sprintf(\"TeAm%v\", hex.EncodeToString(b))\n\t_, err = teams.CreateRootTeam(context.TODO(), tc.G, name, keybase1.TeamSettings{})\n\trequire.NoError(tc.T, err)\n\treturn name\n}", "title": "" }, { "docid": "a80208b814dc9e373954c97f2397d328", "score": "0.46535638", "text": "func (s *Service) teamUserOnly(h http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tvars := mux.Vars(r)\n\t\tctx := r.Context()\n\t\tUserID := ctx.Value(contextKeyUserID).(string)\n\t\tUserType := ctx.Value(contextKeyUserType).(string)\n\t\tTeamID := vars[\"teamId\"]\n\t\tidErr := validate.Var(TeamID, \"required,uuid\")\n\t\tif idErr != nil {\n\t\t\ts.Failure(w, r, http.StatusBadRequest, Errorf(EINVALID, idErr.Error()))\n\t\t\treturn\n\t\t}\n\n\t\tvar Role string\n\t\tif UserType != adminUserType {\n\t\t\tvar UserErr error\n\t\t\tRole, UserErr = s.TeamDataSvc.TeamUserRole(ctx, UserID, TeamID)\n\t\t\tif UserType != adminUserType && UserErr != nil {\n\t\t\t\ts.Failure(w, r, http.StatusForbidden, Errorf(EUNAUTHORIZED, \"REQUIRES_TEAM_USER\"))\n\t\t\t\treturn\n\t\t\t}\n\t\t} else {\n\t\t\tRole = adminUserType\n\t\t}\n\n\t\tctx = context.WithValue(ctx, contextKeyTeamRole, Role)\n\n\t\th(w, r.WithContext(ctx))\n\t}\n}", "title": "" }, { "docid": "c20a3816f71f761a660f29cb3c3791c2", "score": "0.46490744", "text": "func (s *AccSuite) TestAccUserInvalidConfig() {\n\t// language=hcl\n\ttmpl := `\n\t\tresource \"rollbar_team\" \"test_team\" {\n\t\t\tname = \"%s-team-0\"\n\t\t}\n\n\t\tresource \"rollbar_user\" \"test_user\" {\n\t\t\temail = \"\"\n\t\t\tteam_ids = [rollbar_team.test_team.id]\n\t\t}\n\t`\n\tconfig := fmt.Sprintf(tmpl, s.randName)\n\tresource.ParallelTest(s.T(), resource.TestCase{\n\t\tPreCheck: func() { s.preCheck() },\n\t\tProviders: s.providers,\n\t\tCheckDestroy: nil,\n\t\tSteps: []resource.TestStep{\n\t\t\t{\n\t\t\t\tConfig: config,\n\t\t\t\tExpectError: regexp.MustCompile(\"Email must be supplied\"),\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "f0ad963a13a0431c255ab0e26a4f08bc", "score": "0.46265873", "text": "func TeamDeleteByID(ctx context.Context, id int) (string, error) {\n\tif access, err := TeamValidateMember(ctx, id); err != nil || !access {\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn \"Failed\", err\n\t\t}\n\t\treturn \"Failed\", gqlError(\"(Not Member Of Team or Team doesn't exist\", \"code\", \"ACCESS_DENIED\")\n\t}\n\n\tdb := config.ConnectGorm()\n\tsqlDB, _ := db.DB()\n\tdefer sqlDB.Close()\n\n\tif err := db.Exec(`\n DELETE t.*, b.*, l.*, li.* \n FROM team as t\n INNER JOIN board as b on b.team_id = t.id\n INNER JOIN list as l on l.board_id = b.id\n INNER JOIN list_item as li on li.list_id = l.id\n WHERE t.id = ?;\n `, id).Error; err != nil {\n\t\tfmt.Println(err)\n\t\treturn \"Failed\", err\n\t}\n\n\treturn \"Success\", nil\n}", "title": "" }, { "docid": "d12148dd8a658112cd9694dcf6727a5f", "score": "0.46220458", "text": "func (o AccountTeamMemberOutput) InvitedByUserEmail() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *AccountTeamMember) pulumi.StringOutput { return v.InvitedByUserEmail }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "634df0cfb9294512e6d70700e5a675f6", "score": "0.46121687", "text": "func (t *TeamAPI) Delete(ctx context.Context) error {\n\t_, err := t.client.callAPI(\n\t\tctx,\n\t\trequestParam{\n\t\t\tpath: t.client.BaseURL + subURLTeamDelete,\n\t\t\tmethod: http.MethodPost,\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d6fe2be89c5e64c3a38c74d51580b14c", "score": "0.4612121", "text": "func (a *Auditor) AuditTeam(m libkb.MetaContext, id keybase1.TeamID, isPublic bool, headMerkleSeqno keybase1.Seqno, chain map[keybase1.Seqno]keybase1.LinkID,\n\thiddenChain map[keybase1.Seqno]keybase1.LinkID, maxSeqno keybase1.Seqno, maxHiddenSeqno keybase1.Seqno,\n\tlastMerkleRoot *libkb.MerkleRoot, auditMode keybase1.AuditMode) (err error) {\n\n\tm = m.WithLogTag(\"AUDIT\")\n\tdefer m.Trace(fmt.Sprintf(\"Auditor#AuditTeam(%+v)\", id), &err)()\n\tdefer m.PerfTrace(fmt.Sprintf(\"Auditor#AuditTeam(%+v)\", id), &err)()\n\tstart := time.Now()\n\tdefer func() {\n\t\tvar message string\n\t\tif err == nil {\n\t\t\tmessage = fmt.Sprintf(\"Audited team %s\", id)\n\t\t} else {\n\t\t\tmessage = fmt.Sprintf(\"Failed auditing %s\", id)\n\t\t}\n\t\tm.G().RuntimeStats.PushPerfEvent(keybase1.PerfEvent{\n\t\t\tEventType: keybase1.PerfEventType_TEAMAUDIT,\n\t\t\tMessage: message,\n\t\t\tCtime: keybase1.ToTime(start),\n\t\t})\n\t}()\n\n\tif id.IsPublic() != isPublic {\n\t\treturn NewBadPublicError(id, isPublic)\n\t}\n\n\t// Single-flight lock by team ID.\n\tlock := a.locktab.AcquireOnName(m.Ctx(), m.G(), id.String())\n\tdefer lock.Release(m.Ctx())\n\n\terr = a.auditLocked(m, id, headMerkleSeqno, chain, hiddenChain, maxSeqno, maxHiddenSeqno, lastMerkleRoot, auditMode)\n\tif hidden.ShouldClearSupportFlagOnError(err) {\n\t\tm.Debug(\"Clearing support hidden chain flag for team %s because of error %v in Auditor\", id, err)\n\t\tm.G().GetHiddenTeamChainManager().ClearSupportFlagIfFalse(m, id)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "1da2b48c71cffb12e5bcc8d3c2c19557", "score": "0.46033698", "text": "func UnmarshalTeamMembership(data []byte, membership *portainer.TeamMembership) error {\n\treturn json.Unmarshal(data, membership)\n}", "title": "" }, { "docid": "82bcb0c8f0011de13917c270bfed7218", "score": "0.4592585", "text": "func RemoveUsersFromTaskForDelete(ctx context.Context,companyTeamName string,InviteUserId string)(bool) {\n\tvalue :=CompanyInvitations{}\n\tuserMap := map[string]Users{}\n\ttaskInUsersMap :=map[string]UserTasks{}\n\teachTaskInUser :=UserTasks{}\n\tupdateTask := UserTasks{}\n\tusersInTask :=TaskUser{}\n\tupdateUsersInTask := TaskUser{}\n\tvar keySlice []string\n\tvar taskKeySlice []string\n\tdb,err :=GetFirebaseClient(ctx,\"\")\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn false\n\t}\n\terr = db.Child(\"Company/\"+companyTeamName+\"/Invitation/\"+InviteUserId).Value(&value)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn false\n\t}\n\terr = db.Child(\"Users\").OrderBy(\"Info/Email\").EqualTo(value.Email).Value(&userMap)\n\t/*if err != nil {\n\t\tlog.Fatal(err)\n\t\treturn false\n\t}*/\n\tdataValue := reflect.ValueOf(userMap)\n\tfor _, key := range dataValue.MapKeys() {\n\t\tkeySlice = append(keySlice, key.String())\n\t}\n\tfor _, k := range keySlice {\n\t\terr = db.Child(\"Users/\" + k + \"/Tasks\").Value(&taskInUsersMap)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t\treturn false\n\t\t}\n\t\ttaskDataValue := reflect.ValueOf(taskInUsersMap)\n\t\tfor _,taskKey:= range taskDataValue.MapKeys(){\n\t\t\ttaskKeySlice = append(taskKeySlice,taskKey.String())\n\t\t}\n\t\tfor _, specificTaskKey := range taskKeySlice {\n\t\t\tif taskInUsersMap[specificTaskKey].CompanyId == companyTeamName {\n\n\t\t\t\terr = db.Child(\"Users/\" + k + \"/Tasks/\" + specificTaskKey).Value(&eachTaskInUser)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatal(err)\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\tupdateTask.CompanyId = eachTaskInUser.CompanyId\n\t\t\t\tupdateTask.CustomerName = eachTaskInUser.CustomerName\n\t\t\t\tupdateTask.DateOfCreation = eachTaskInUser.DateOfCreation\n\t\t\t\tupdateTask.EndDate = eachTaskInUser.EndDate\n\t\t\t\tupdateTask.JobName = eachTaskInUser.JobName\n\t\t\t\tupdateTask.StartDate = eachTaskInUser.StartDate\n\t\t\t\tupdateTask.Status = helpers.StatusInActive\n\t\t\t\tupdateTask.TaskName = eachTaskInUser.TaskName\n\t\t\t\terr = db.Child(\"Users/\" + k + \"/Tasks/\" + specificTaskKey).Update(&updateTask)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatal(err)\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t}\n\t\t\terr = db.Child(\"Tasks/\"+specificTaskKey+\"/UsersAndGroups/User/\"+k).Value(&usersInTask)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tupdateUsersInTask.Status = helpers.UserStatusDeleted\n\t\t\tupdateUsersInTask.FullName = usersInTask.FullName\n\t\t\tupdateUsersInTask.UserTaskStatus = usersInTask.UserTaskStatus\n\t\t\terr = db.Child(\"Tasks/\"+specificTaskKey+\"/UsersAndGroups/User/\"+k).Update(&updateUsersInTask)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t}\n\n\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "584c2708f3e6bbf1a3d3ed46967feb7b", "score": "0.4586963", "text": "func TestRemoveEnvironmentWithLoggedInUsers(t *testing.T) {\n\tfor _, user := range testCaseUsers {\n\t\tt.Run(user.Description, func(t *testing.T) {\n\n\t\t\t// Add an environment\n\t\t\tapim := GetDevClient()\n\t\t\toutput, err := testutils.AddEnvironmentWithOutTokenFlag(t, apim.GetEnvName(), apim.GetApimURL())\n\n\t\t\t// Validate added environment\n\t\t\tassert.Nil(t, err)\n\t\t\ttestutils.ValidateAddedEnvironments(t, output, apim.GetEnvName(), true)\n\n\t\t\t// Login to the added environment\n\t\t\tbase.Execute(t, \"login\", apim.GetEnvName(), \"-u\", user.CtlUser.Username, \"-p\", user.CtlUser.Password)\n\n\t\t\t// Remove the added environment\n\t\t\tremoveEnvOutput, errr := testutils.RemoveEnvironment(t, apim.GetEnvName())\n\t\t\tassert.Nil(t, errr)\n\n\t\t\t//Validate removed environment\n\t\t\ttestutils.ValidateRemoveEnvironments(t, removeEnvOutput, apim.GetEnvName())\n\t\t})\n\t}\n}", "title": "" }, { "docid": "b1c13a583871f3713734f0fc8968fae4", "score": "0.4570856", "text": "func (s *GithubSCM) CreateTeam(ctx context.Context, opt *NewTeamOptions) (*Team, error) {\n\tif !opt.valid() || opt.TeamName == \"\" || opt.Organization == \"\" {\n\t\treturn nil, ErrMissingFields{\n\t\t\tMethod: \"CreateTeam\",\n\t\t\tMessage: fmt.Sprintf(\"%+v\", opt),\n\t\t}\n\t}\n\n\t// check that the team name does not already exist for this organization\n\tteam, _, err := s.client.Teams.GetTeamBySlug(ctx, slug.Make(opt.Organization), slug.Make(opt.TeamName))\n\tif err != nil {\n\t\t// error expected to be 404 Not Found; logging here in case it's a different error\n\t\ts.logger.Debugf(\"CreateTeam: check for team %s: %s\", opt.TeamName, err)\n\t}\n\n\tif team == nil {\n\t\ts.logger.Debugf(\"CreateTeam: creating %s\", opt.TeamName)\n\t\tteam, _, err = s.client.Teams.CreateTeam(ctx, opt.Organization, github.NewTeam{\n\t\t\tName: opt.TeamName,\n\t\t})\n\t\tif err != nil {\n\t\t\tif opt.TeamName != TeachersTeam && opt.TeamName != StudentsTeam {\n\t\t\t\treturn nil, ErrFailedSCM{\n\t\t\t\t\tMethod: \"CreateTeam\",\n\t\t\t\t\tMessage: fmt.Sprintf(\"failed to create GitHub team %s, make sure it does not already exist\", opt.TeamName),\n\t\t\t\t\tGitError: fmt.Errorf(\"failed to create GitHub team %s: %w\", opt.TeamName, err),\n\t\t\t\t}\n\t\t\t}\n\t\t\t// continue if it is one of standard teacher/student teams. Such teams can be safely reused\n\t\t\ts.logger.Debugf(\"Team %s already exists on organization %s\", opt.TeamName, opt.Organization)\n\t\t}\n\t\ts.logger.Debugf(\"CreateTeam: done creating %s\", opt.TeamName)\n\t}\n\tfor _, user := range opt.Users {\n\t\ts.logger.Debugf(\"CreateTeam: adding user %s to %s\", user, opt.TeamName)\n\t\t_, _, err = s.client.Teams.AddTeamMembershipByID(ctx, team.GetOrganization().GetID(), team.GetID(), user, nil)\n\t\tif err != nil {\n\t\t\treturn nil, ErrFailedSCM{\n\t\t\t\tMethod: \"CreateTeam\",\n\t\t\t\tMessage: fmt.Sprintf(\"failed to add user '%s' to GitHub team '%s'\", user, team.GetName()),\n\t\t\t\tGitError: fmt.Errorf(\"failed to add '%s' to GitHub team '%s': %w\", user, team.GetName(), err),\n\t\t\t}\n\t\t}\n\t}\n\treturn &Team{\n\t\tID: uint64(team.GetID()),\n\t\tName: team.GetName(),\n\t\tOrganization: team.GetOrganization().GetLogin(),\n\t}, nil\n}", "title": "" }, { "docid": "5ca2f3526667c1452f0a8e97d0f11005", "score": "0.45646498", "text": "func (ti *TeamImporter) saveTeamUser(team *github.Team, users []*github.User) {\n\tfor _, u := range users {\n\t\te := entities.TeamUser{\n\t\t\tGithubUserID: int(u.GetID()),\n\t\t\tGithubTeamID: int(team.GetID()),\n\t\t}\n\n\t\terr := ti.Repository.SaveTeamUser(e)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e2443a053a09495753ec53cead99c344", "score": "0.45627952", "text": "func (this *Auth) del(stub shim.ChaincodeStubInterface, args []string) peer.Response {\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments.Expecting 1\")\n\t}\n\tname := args[0]\n\tid := args[1]\n\tkey := name + \"~\" + id\n\tdata, err := stub.GetState(key)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tif data == nil {\n\t\treturn shim.Error(\"User not found.\")\n\t}\n\n\terr = stub.PutState(key, []byte(ROLE_REVOKED))\n\tif err != nil {\n\t\tshim.Error(err.Error())\n\t}\n\treturn shim.Success([]byte(\"User unAuth ok!\"))\n}", "title": "" }, { "docid": "e20c1b72a35d7fc29e22ec53cbd3c263", "score": "0.4551958", "text": "func (a *App) RenameTeam(team *model.Team, newTeamName string, newDisplayName string) (*model.Team, *model.AppError) {\n\n\t// check if name is occupied\n\t_, errnf := a.GetTeamByName(newTeamName)\n\n\t// \"-\" can be used as a newTeamName if only DisplayName change is wanted\n\tif errnf == nil && newTeamName != \"-\" {\n\t\terrbody := fmt.Sprintf(\"team with name %s already exists\", newTeamName)\n\t\treturn nil, model.NewAppError(\"RenameTeam\", \"app.team.rename_team.name_occupied\", nil, errbody, http.StatusBadRequest)\n\t}\n\n\tif newTeamName != \"-\" {\n\t\tteam.Name = newTeamName\n\t}\n\n\tif newDisplayName != \"\" {\n\t\tteam.DisplayName = newDisplayName\n\t}\n\n\tnewTeam, err := a.ch.srv.teamService.UpdateTeam(team, teams.UpdateOptions{})\n\tif err != nil {\n\t\tvar invErr *store.ErrInvalidInput\n\t\tvar appErr *model.AppError\n\t\tvar domErr *teams.DomainError\n\t\tvar nfErr *store.ErrNotFound\n\t\tswitch {\n\t\tcase errors.As(err, &nfErr):\n\t\t\treturn nil, model.NewAppError(\"RenameTeam\", \"app.team.get.find.app_error\", nil, \"\", http.StatusNotFound).Wrap(err)\n\t\tcase errors.As(err, &invErr):\n\t\t\treturn nil, model.NewAppError(\"RenameTeam\", \"app.team.update.find.app_error\", nil, \"\", http.StatusBadRequest).Wrap(err)\n\t\tcase errors.As(err, &appErr):\n\t\t\treturn nil, appErr\n\t\tcase errors.As(err, &domErr):\n\t\t\treturn nil, model.NewAppError(\"RenameTeam\", \"api.team.update_restricted_domains.mismatch.app_error\", map[string]any{\"Domain\": domErr.Domain}, \"\", http.StatusBadRequest).Wrap(err)\n\t\tdefault:\n\t\t\treturn nil, model.NewAppError(\"RenameTeam\", \"app.team.update.updating.app_error\", nil, \"\", http.StatusInternalServerError).Wrap(err)\n\t\t}\n\t}\n\n\treturn newTeam, nil\n}", "title": "" }, { "docid": "29aabcba481806ca12648f945970038f", "score": "0.45506844", "text": "func (c *Client) RemoveTeamMember(teamID int64, username string) error {\n\t_, err := c.getResponse(\"DELETE\", fmt.Sprintf(\"/teams/%d/members/%s\", teamID, username), nil, nil)\n\treturn err\n}", "title": "" } ]
26ae77482044976c85be006df2ba279c
AutoRecover when deferred, records a panic to Bugsnag and recovers.
[ { "docid": "c522ba9ee2c86f96ed09d675c35852c3", "score": "0.7337711", "text": "func (snagger *bugsnagger) AutoRecover(rawData ...interface{}) {\n\tif r := recover(); r != nil {\n\t\tsnagger.Notify(recoverError(r), rawData...)\n\t\tlog.Error(r)\n\t}\n}", "title": "" } ]
[ { "docid": "696bd1fd148f960a66eb1f920b41f527", "score": "0.67487323", "text": "func panicRecover() {\n\tdefer func() {\n\t\tstr := recover()\n\t\tfmt.Println(\"something wrong but its ok\", str)\n\t}()\n\tpanic(\"PANICING\")\n}", "title": "" }, { "docid": "ed054dd495c581e9f62a8fdb81e1158b", "score": "0.6597407", "text": "func _recover() interface{} {\n\t// Deferred functions are currently not executed during panic, so there is\n\t// no way this can return anything besides nil.\n\treturn nil\n}", "title": "" }, { "docid": "ed054dd495c581e9f62a8fdb81e1158b", "score": "0.6597407", "text": "func _recover() interface{} {\n\t// Deferred functions are currently not executed during panic, so there is\n\t// no way this can return anything besides nil.\n\treturn nil\n}", "title": "" }, { "docid": "b59527d87a6fef831b57f9f49ac4f314", "score": "0.64989865", "text": "func (snagger *bugsnagger) AutoNotify(rawData ...interface{}) {\n\tif r := recover(); r != nil {\n\t\tsnagger.Notify(recoverError(r), rawData...)\n\t\tlog.Error(r)\n\t\tdebug.PrintStack()\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "6f6474f6c4e19ce96a3a671fb527e471", "score": "0.6416751", "text": "func DeferRecover(tag string, handlePanic func(error)) func() {\n\treturn func() {\n\t\tif err := recover(); err != nil {\n\t\t\tlog.Errorf(\"%s, recover from: %v\\n%s\\n\", tag, err, debug.Stack())\n\t\t\tif handlePanic != nil {\n\t\t\t\thandlePanic(fmt.Errorf(\"%v\", err))\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fa1251d9a776dfaf9fc8ad93d14d8806", "score": "0.6404593", "text": "func PanicRecover(f func(w http.ResponseWriter, r *http.Request)) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\n\t\t\t\tlog.Printf(\"PANIC RECOVERED: %v\\n\", r)\n\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\tm := map[string]interface{}{\n\t\t\t\t\t\"Title\": \"Error :-(\",\n\t\t\t\t\t\"Error\": r,\n\t\t\t\t}\n\t\t\t\tdisplay(w, \"panic\", &m)\n\t\t\t}\n\t\t}()\n\t\tf(w, r)\n\t}\n}", "title": "" }, { "docid": "3078d572dac73708e8b2269af6b5a097", "score": "0.6390976", "text": "func (AsyncRoutine) Recover(f func()) {\n\tgo func() {\n\t\tdefer paniccatcher.Catcher()\n\t\tf()\n\t}()\n}", "title": "" }, { "docid": "a21e97236e33b6419e20624500464c3a", "score": "0.63371384", "text": "func panicRecover(input *models.RunningInput) {\n\t//nolint:revive // recover is called inside a deferred function\n\tif err := recover(); err != nil {\n\t\ttrace := make([]byte, 2048)\n\t\truntime.Stack(trace, true)\n\t\tlog.Printf(\"E! FATAL: [%s] panicked: %s, Stack:\\n%s\",\n\t\t\tinput.LogName(), err, trace)\n\t\tlog.Println(\"E! PLEASE REPORT THIS PANIC ON GITHUB with \" +\n\t\t\t\"stack trace, configuration, and OS information: \" +\n\t\t\t\"https://github.com/influxdata/telegraf/issues/new/choose\")\n\t}\n}", "title": "" }, { "docid": "25b88658b2e248fb49f0d7ccc7a32aea", "score": "0.6169814", "text": "func RecoverAndReportPanic() {\n\tif r := recover(); r != nil {\n\t\tpanicErr := panicAsError(depthForRecoverAndReportPanic+1, r)\n\t\tif crashReporterEnabled {\n\t\t\tsendCrashReport(panicErr)\n\t\t}\n\t\tsyslog.Fatalf(\"A panic has occurred!\\n%+v\", panicErr)\n\t}\n}", "title": "" }, { "docid": "6e1d1337dfd0533746600b102c1715b2", "score": "0.61027706", "text": "func (client *Client) Recover() {\n\ttears := recover()\n\tif tears == nil {\n\t\treturn\n\t}\n\n\tmessage := fmt.Sprintf(\n\t\t\"PANIC OCCURRED: %v\\n%s\\n\", tears, string(stackTrace()),\n\t)\n\n\tlogger.Fatal(message)\n}", "title": "" }, { "docid": "821ebd3e0cc48f5aa9cdef3cb178e4a8", "score": "0.59934324", "text": "func (a *App) Recover() {\n\tmsg, err := a.broker.Recover()\n\n\tif err != nil {\n\t\ta.log.Error(err.Error())\n\t}\n\n\ta.log.Notice(msg)\n}", "title": "" }, { "docid": "de9d31850c71697e04e0dbbacb998238", "score": "0.5992026", "text": "func Recovery() macaron.Handler {\n\treturn func(ctx *Context) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\tcombinedErr := fmt.Errorf(\"%s\\n%s\", err, string(stack(3)))\n\t\t\t\tctx.ServerError(\"PANIC:\", combinedErr)\n\t\t\t}\n\t\t}()\n\n\t\tctx.Next()\n\t}\n}", "title": "" }, { "docid": "01788445c6fa4df751a8825028e8b5fe", "score": "0.59689254", "text": "func Recover() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\terrStr := fmt.Sprintf(\"%s\", err)\n\t\t\t\tdebugStack := errStr\n\t\t\t\tfor _, v := range strings.Split(string(debug.Stack()), \"\\n\") {\n\t\t\t\t\tdebugStack += v + \" \"\n\t\t\t\t}\n\n\t\t\t\terr1 := errcode.New(errcode.ServerPanicError, errors.New(debugStack))\n\t\t\t\tapi.SendResponse(c, err1, nil)\n\t\t\t}\n\t\t}()\n\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "494cd7a28ea72a8d8a7762c429502d1e", "score": "0.5939621", "text": "func demPanic() {\n\tdefer func () {\n\t\t// if we didn't print the message nothing would show.\n\t\tfmt.Println(recover())\n\t}()\n\tpanic(\"Panic\")\n}", "title": "" }, { "docid": "3338350e04d9ae70dd2546b75b480638", "score": "0.5936555", "text": "func AutoNotify(rawData ...interface{}) martini.Handler {\n\tupdateGlobalConfig(rawData...)\n\n\tdevice.AddVersion(FrameworkName, \"v1.0\") // The latest martini release from 2014\n\tstate := bugsnag.HandledState{\n\t\tSeverityReason: bugsnag.SeverityReasonUnhandledMiddlewareError,\n\t\tOriginalSeverity: bugsnag.SeverityError,\n\t\tUnhandled: true,\n\t\tFramework: FrameworkName,\n\t}\n\n\treturn func(r *http.Request, c martini.Context) {\n\t\t// Martini's request-based context for dependency injection means that we can\n\t\t// attach request data to the notifier (one notifier <=> one request) itself.\n\t\t// This means that request data will show up when doing just notifier.Notify(err)\n\t\tnotifier := bugsnag.New(append(rawData, r, state)...)\n\n\t\t// In case users use bugsnag.Notify instead of the mapped notifier.\n\t\tctx := bugsnag.AttachRequestData(r.Context(), r)\n\n\t\tif notifier.Config.IsAutoCaptureSessions() {\n\t\t\tctx = bugsnag.StartSession(ctx)\n\t\t}\n\t\tnotifier.FlushSessionsOnRepanic(false)\n\t\tc.Map(r.WithContext(ctx))\n\t\tdefer notifier.AutoNotify(ctx)\n\t\tc.Map(notifier)\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "c35168967ac2d809a6b1c81d2d51b105", "score": "0.5906861", "text": "func Recover(ctx *fiber.Ctx) (err error) {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tlogger.ApiLog().Error(r)\n\t\t\terr = apihelpers.Failed(ctx, &apihelpers.ApiError{\n\t\t\t\tCode: fiber.StatusInternalServerError,\n\t\t\t\tError: errors.New(\"internal server error\"),\n\t\t\t})\n\t\t}\n\t}()\n\n\t// Return err if exist, else move to next handler\n\treturn ctx.Next()\n}", "title": "" }, { "docid": "11f16981b5194447d6a1a33885679a38", "score": "0.58424836", "text": "func recovery(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer func() {\n\t\t\tswitch err := recover(); err := err.(type) {\n\t\t\tdefault:\n\t\t\t\tdef.Metric.PanicsTotal.Inc()\n\t\t\t\tlog := structlog.FromContext(r.Context(), nil)\n\t\t\t\tlog.PrintErr(err, structlog.KeyStack, structlog.Auto)\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tcase nil:\n\t\t\tcase net.Error:\n\t\t\t\tlog := structlog.FromContext(r.Context(), nil)\n\t\t\t\tlog.PrintErr(err)\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t}\n\t\t}()\n\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "559dcf1d087dec5f13329a44da127daa", "score": "0.58391005", "text": "func Recover(logger *zap.SugaredLogger) func(http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\t\tdefer func() {\n\t\t\t\tif err := recover(); err != nil {\n\t\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\t\tlogger.Errorw(\"panic recovery\", \"error\", err, \"traceback\", debug.Stack())\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\tnext.ServeHTTP(w, r)\n\t\t}\n\n\t\treturn http.HandlerFunc(fn)\n\t}\n}", "title": "" }, { "docid": "29d19e3c94b268e2934510e0c71ea828", "score": "0.5835011", "text": "func serverRecover(f func(w http.ResponseWriter, r *http.Request)) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\tlog.Println(\"Panic recovered! err:\", r)\n\t\t\t\thttp.Error(w, r.(runtime.Error).Error(), http.StatusInternalServerError)\n\t\t\t}\n\t\t}()\n\t\tf(w, r)\n\t}\n}", "title": "" }, { "docid": "6390521c40e78be824f0b68c3a712a9c", "score": "0.5826115", "text": "func Recover() {\n\tif r := recover(); r != nil {\n\t\tLogCrash(r)\n\t}\n}", "title": "" }, { "docid": "8514562d38afdc1f86a65f5973a2d645", "score": "0.58100945", "text": "func Recover() (err error) {\n\tdefer func() {\n\t\tp := recover()\n\t\terr = fmt.Errorf(\"res: %v\", p)\n\t}()\n\tpanic(1)\n}", "title": "" }, { "docid": "7daea9ca1e0ad28d643b7b2cc0e26701", "score": "0.5781458", "text": "func Recover(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(\n\t\tfunc(w http.ResponseWriter, r *http.Request) {\n\t\t\tdefer func() {\n\t\t\t\tif rec := recover(); rec != nil {\n\t\t\t\t\tmsg, stack := extractPanic(rec)\n\t\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\t\"endpoint\": r.RequestURI,\n\t\t\t\t\t\t\"traceback\": stack,\n\t\t\t\t\t\t\"panic\": msg,\n\t\t\t\t\t}).Error(\"request failed\")\n\t\t\t\t\thttp.Error(w, fmt.Sprintf(\"%s \\n%s\", msg, stack), http.StatusInternalServerError)\n\t\t\t\t}\n\t\t\t}()\n\t\t\thandler.ServeHTTP(w, r)\n\t\t},\n\t)\n}", "title": "" }, { "docid": "3d3b4c44e617ea3a1a221c32fba88da1", "score": "0.5777708", "text": "func WithRecover(tag string, f func(), handlePanic func(error)) {\n\tdefer DeferRecover(tag, handlePanic)()\n\n\tf()\n}", "title": "" }, { "docid": "936ed8f7a52174b2f3a144e8171454fa", "score": "0.5763039", "text": "func Recover() {\n\tif r := recover(); r != nil {\n\t\tLog.Err(fmt.Sprintf(\"panic: %v\", r))\n\t\tos.Exit(int(EXIT_FAILURE))\n\t}\n}", "title": "" }, { "docid": "cf98f430167daba2d81b9fa7ae16765d", "score": "0.57571054", "text": "func handlePanic() {\n\tif r := recover(); r != nil {\n\t\tlog.Fatalln(\"async\", fmt.Sprintf(\"panic recovered: %ss \\n %s\", r, debug.Stack()))\n\t}\n}", "title": "" }, { "docid": "2cce9041be335588555e0fe003760ed0", "score": "0.57251966", "text": "func AutoNotify(rawData ...interface{}) iris.Handler {\n\t// Configure bugsnag with the passed in configuration (for manual notifications)\n\tfor _, datum := range rawData {\n\t\tif c, ok := datum.(bugsnag.Configuration); ok {\n\t\t\tbugsnag.Configure(c)\n\t\t}\n\t}\n\n\tdevice.AddVersion(FrameworkName, iris.Version)\n\tstate := bugsnag.HandledState{\n\t\tSeverityReason: bugsnag.SeverityReasonUnhandledMiddlewareError,\n\t\tOriginalSeverity: bugsnag.SeverityError,\n\t\tUnhandled: true,\n\t\tFramework: FrameworkName,\n\t}\n\trawData = append(rawData, state)\n\treturn func(c iris.Context) {\n\t\tr := c.Request()\n\t\tnotifier := bugsnag.New(append(rawData, r)...)\n\t\tctx := bugsnag.AttachRequestData(r.Context(), r)\n\t\tif notifier.Config.IsAutoCaptureSessions() {\n\t\t\tctx = bugsnag.StartSession(ctx)\n\t\t}\n\t\tc.ResetRequest(r.WithContext(ctx))\n\n\t\tnotifier.FlushSessionsOnRepanic(false)\n\t\tdefer notifier.AutoNotify(ctx)\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "efa7353479eb2da979c488b3502631e2", "score": "0.5686405", "text": "func DontPanic() (err error) {\n\tgo func() {\n\t\t// Move recover into goroutine\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\tfmt.Println(\"recovered\", r)\n\t\t\t\terr = errors.New(\"panic in goroutine\")\n\t\t\t}\n\t\t}()\n\n\t\tpanic(\"A-A-A!!!\")\n\t}()\n\ttime.Sleep(time.Second)\n\treturn err\n}", "title": "" }, { "docid": "ca4d02d9a9c5a3babbbfc36dff150c15", "score": "0.56189", "text": "func (s *Server) recoverPanic(next http.Handler) http.Handler {\n\tmw := func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer func() {\n\t\t\t// panic?\n\t\t\tp := recover()\n\t\t\tif p == nil {\n\t\t\t\treturn // done, no panic\n\t\t\t}\n\n\t\t\t// error?\n\t\t\terr, ok := p.(error)\n\t\t\tif !ok {\n\t\t\t\tpanic(p) // not error, re-raise\n\t\t\t}\n\n\t\t\tL := s.log.WithContext(r.Context())\n\t\t\tL.WithFields(logrus.Fields{\n\t\t\t\t\"method\": r.Method,\n\t\t\t\t\"url\": r.URL,\n\t\t\t}).Errorf(\"unhandled panic! %v\", err)\n\n\t\t\tresp := &ErrorResponse{Error: err.Error()}\n\t\t\tutils.MustWriteJSON(w, resp, http.StatusInternalServerError)\n\t\t}()\n\n\t\tnext.ServeHTTP(w, r)\n\t}\n\n\treturn http.HandlerFunc(mw)\n}", "title": "" }, { "docid": "a257a5ee78b28b2bc36df750055c81c8", "score": "0.56176406", "text": "func (c *MConnection) _recover() {\n\tif r := recover(); r != nil {\n\t\tc.stopForError(r)\n\t}\n}", "title": "" }, { "docid": "307e089fefc7a09d6dfa003568e94deb", "score": "0.56129146", "text": "func WithRecoverHandler(routine func()) {\n\tdefer RecoverHandler()\n\troutine()\n}", "title": "" }, { "docid": "caf6e6c0162760ccb807fcafb4c43826", "score": "0.55995715", "text": "func recoverPanik(name string, next HandlerFunc) HandlerFunc {\n\tcounter := panicRecoverCounter.With(prometheus.Labels{\n\t\tmethodLabel: name,\n\t})\n\treturn func(ctx context.Context, w http.ResponseWriter, r *http.Request) (err error) {\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\tvar rErr error\n\t\t\t\tif asErr, ok := r.(error); ok {\n\t\t\t\t\trErr = asErr\n\t\t\t\t} else {\n\t\t\t\t\trErr = fmt.Errorf(\"panic in %q: %+v\", name, r)\n\t\t\t\t}\n\t\t\t\tlog.C(ctx).Errorw(\n\t\t\t\t\t\"recovered from panic:\",\n\t\t\t\t\t\"err\", rErr,\n\t\t\t\t\t\"endpoint\", name,\n\t\t\t\t)\n\t\t\t\tcounter.Inc()\n\n\t\t\t\t// change named return value to a generic 500 error\n\t\t\t\terr = RawError(InternalServerError(), rErr, PlainTextContentType)\n\t\t\t}\n\t\t}()\n\t\treturn next(ctx, w, r)\n\t}\n}", "title": "" }, { "docid": "4c3842b35c9bc85ec8fadcf3676f6266", "score": "0.55995214", "text": "func RecoverMiddleware() kapusta.MiddlewareFunc {\n\treturn func(c kapusta.Client) kapusta.Client {\n\t\treturn kapusta.ClientFunc(func(ctx context.Context, r *http.Request) (res *http.Response, err error) {\n\t\t\tdefer func() {\n\t\t\t\tif r := recover(); r != nil {\n\t\t\t\t\terr = fmt.Errorf(\"recovered panic: %v\", r)\n\t\t\t\t}\n\t\t\t}()\n\t\t\treturn c.Do(ctx, r)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "8a85dbe899e134b1c9ef28864a9e3a6d", "score": "0.55979955", "text": "func Recover(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\terrMsg := \"An unexpected error occured\"\n\t\t\t\tstack := debug.Stack()\n\t\t\t\thlog.FromRequest(r).Error().\n\t\t\t\t\tBytes(\"stacktrace\", stack).\n\t\t\t\t\tMsg(errMsg)\n\n\t\t\t\tif config.IsProd() {\n\t\t\t\t\twrite.Error(w, errMsg, http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tw.Header().Set(\"Content-Type\", \"text/html; charset=UTF-8\")\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\tfmt.Fprintf(w, \"<h1>panic: %v</h1><pre>%s</pre>\", err, stack)\n\t\t\t}\n\t\t}()\n\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "a4f5d26f8358139bdc6680cc9b226926", "score": "0.55783033", "text": "func Recovery() HandlerFunc {\n\treturn func(ctx *Context) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\thttprequest, _ := httputil.DumpRequest(ctx.Request, false)\n\t\t\t\tgoErr := errors.Wrap(err, 3)\n\t\t\t\treset := string([]byte{27, 91, 48, 109})\n\t\t\t\tlogrus.Errorf(\"[Nice Recovery] panic recovered:\\n\\n%s%s\\n\\n%s%s\", httprequest, goErr.Error(), goErr.Stack(), reset)\n\t\t\t\tcode := 500\n\t\t\t\tmsg := fmt.Sprintf(\"%v\", err)\n\t\t\t\tif err, ok := err.(types.Error); ok {\n\t\t\t\t\tcode = err.Code\n\t\t\t\t}\n\t\t\t\tctx.JSON(http.StatusOK, types.Fail{\n\t\t\t\t\tCode: code,\n\t\t\t\t\tMsg: msg,\n\t\t\t\t})\n\t\t\t}\n\t\t}()\n\t\tctx.Next()\n\t}\n}", "title": "" }, { "docid": "620b0b38b6fc71d5fef957ca99514605", "score": "0.55444187", "text": "func MakeRequestRecovery(wg *sync.WaitGroup, bar *progressbar.ProgressBar) {\n\tdefer wg.Done()\n\tbar.Add(1)\n\tif r := recover(); r != nil {\n\t\tfmt.Println(\"Recovered in f\", r)\n\t}\n}", "title": "" }, { "docid": "41fd51ab4322b7ccb25d06a06fcc0069", "score": "0.5523308", "text": "func (comp *HttpComponent) tryRecover(rw http.ResponseWriter, r *http.Request, v interface{}) {\n\trec, ok := v.(camStatics.RecoverInterface)\n\tif !ok {\n\t\tcomp.Recover(v)\n\t\treturn\n\t}\n\n\trecoverRoute := comp.GetRecoverRoute()\n\tctx := comp.newHttpContext(r, rw)\n\tctx.SetRecover(rec)\n\tdefer func() { ctx.Close() }()\n\tcomp.routeHandler(ctx, recoverRoute)\n}", "title": "" }, { "docid": "27318e25ed20f55cdc02ca4d2dcf0b69", "score": "0.5508257", "text": "func (sr SecureRecoverer) Recover(message string) error {\n\tif sr.Sync {\n\t\tsyscall.Sync()\n\t}\n\n\tif sr.Debug {\n\t\tif message != \"\" {\n\t\t\tlog.SetPrefix(\"recovery: \")\n\t\t\tlog.Print(message)\n\t\t}\n\t\ttime.Sleep(DebugTimeout * time.Second)\n\t}\n\n\tif sr.RandWait {\n\t\trd := time.Duration(rand.Intn(15))\n\t\ttime.Sleep(rd * time.Second)\n\t\tlog.SetPrefix(\"recovery: \")\n\t\tlog.Printf(\"Reboot in %s seconds\", rd)\n\t}\n\n\tif sr.Reboot {\n\t\tif err := syscall.Reboot(syscall.LINUX_REBOOT_CMD_RESTART); err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tif err := syscall.Reboot(syscall.LINUX_REBOOT_CMD_POWER_OFF); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "35ad4f9ba0fae3ab9520c317eca079c8", "score": "0.54848576", "text": "func (plugin *ExamplePlugin) showPanicLog() {\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tplugin.Log.Info(\"Recovered from panic\")\n\t\t}\n\t}()\n\tplugin.Log.Panic(\"Panic log: calls panic() after log, will be recovered\") //calls panic() after logging\n}", "title": "" }, { "docid": "986984577182ac583845ccd3473eed52", "score": "0.5458474", "text": "func recoverPanic(ret *C.GoResult) {\n\tif rec := recover(); rec != nil {\n\t\t// we don't want to import cosmos-sdk\n\t\t// we also cannot use interfaces to detect these error types (as they have no methods)\n\t\t// so, let's just rely on the descriptive names\n\t\t// this is used to detect \"out of gas panics\"\n\t\tname := reflect.TypeOf(rec).Name()\n\t\tswitch name {\n\t\t// These two cases are for types thrown in panics from this module:\n\t\t// https://github.com/cosmos/cosmos-sdk/blob/4ffabb65a5c07dbb7010da397535d10927d298c1/store/types/gas.go\n\t\t// ErrorOutOfGas needs to be propagated through the rust code and back into go code, where it should\n\t\t// probably be thrown in a panic again.\n\t\t// TODO figure out how to pass the text in its `Descriptor` field through all the FFI\n\t\t// TODO handle these cases on the Rust side in the first place\n\t\tcase \"ErrorOutOfGas\":\n\t\t\t*ret = C.GoResult_OutOfGas\n\t\t// Looks like this error is not treated specially upstream:\n\t\t// https://github.com/cosmos/cosmos-sdk/blob/4ffabb65a5c07dbb7010da397535d10927d298c1/baseapp/baseapp.go#L818-L853\n\t\t// but this needs to be periodically verified, in case they do start checking for this type\n\t\t// \tcase \"ErrorGasOverflow\":\n\t\tdefault:\n\t\t\tlog.Printf(\"Panic in Go callback: %#v\\n\", rec)\n\t\t\tdebug.PrintStack()\n\t\t\t*ret = C.GoResult_Panic\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1d27eb2272f27494b121c301a1ba2f1b", "score": "0.54515386", "text": "func doRecover(err *error) {\n\tr := recover()\n\tswitch r := r.(type) {\n\tcase nil:\n\t\treturn\n\tcase runtime.Error:\n\t\tpanic(r)\n\tcase error:\n\t\t*err = r\n\tdefault:\n\t\tpanic(r)\n\t}\n}", "title": "" }, { "docid": "8c530acabe3f4d56d6551bd4c0977e12", "score": "0.54504913", "text": "func Recover(next ConsumeFunc) ConsumeFunc {\n\treturn func(ctx context.Context, message *eventbusclient.Message) {\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\tlogEntry := helper.LoggerFromCtx(ctx)\n\n\t\t\t\tfields := helper.GetLogFieldFromMessage(message)\n\t\t\t\tfields[\"trace\"] = string(debug.Stack())\n\t\t\t\tlogEntry.WithFields(fields).Error(fmt.Sprintf(\"MessagePanic: %v\", r))\n\t\t\t}\n\t\t}()\n\t\tnext(ctx, message)\n\t}\n}", "title": "" }, { "docid": "e81cb8446b1b297ed3076e34e855c1d2", "score": "0.54489905", "text": "func Recover() *EventID {\n\tif err := recover(); err != nil {\n\t\thub := CurrentHub()\n\t\treturn hub.Recover(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "18fba2ea1409d737d5b0eb4d9e40a239", "score": "0.544351", "text": "func Recover() func(*Retryer) {\n\treturn func(r *Retryer) {\n\t\tr.Recover = true\n\t}\n}", "title": "" }, { "docid": "c46bc732aa1eda14a876651f238b6fa6", "score": "0.5427649", "text": "func panicGo(){\n\ta:=1\n\tb := 0\n\t// defer func(){\n\t// \tif err := recover(); err != nil{\n\t// \t\tlog.Println(\"error:\", err)\n\t// \t}\n\t// }\n\tif b == 0{\n\t\tpanic(\"divide by 0\")\t//panic happen after defer statment are executed\n\t\t\t\t\t\t\t\t//defer gets called even after panic. We can use this to run some function defer func(){//do something in case of panic. U call recover inside that function...read more about recover}\n\t}\n\tans := a/b\n\tfmt.Println(ans)\n}", "title": "" }, { "docid": "b11ef085247906c27e1ea339715d6a58", "score": "0.5424857", "text": "func Recover(f func(ctx context.Context, panicErr *PanicError)) func(ctx context.Context) {\n\treturn func(ctx context.Context) {\n\t\te := recover()\n\t\tif e == nil {\n\t\t\treturn\n\t\t}\n\t\tpanicLoc := internal.IdentifyPanic(0)\n\t\tstack := debug.Stack()\n\t\tpErr := &PanicError{\n\t\t\tException: e,\n\t\t\tLocation: panicLoc,\n\t\t\tStacktrace: stack,\n\t\t}\n\t\tf(ctx, pErr)\n\t}\n}", "title": "" }, { "docid": "6d8bbe98dacd13fb0ea30f41f14f2aca", "score": "0.5398862", "text": "func finalRecover() {\n\tif p := recover(); p != nil {\n\t\tfmt.Fprintln(os.Stderr, \"ERROR: Something terrible has happened. Please file a ticket with this info:\")\n\t\tfmt.Fprintf(os.Stderr, \"ERROR: %v\\n%v\\n\", p, string(debug.Stack()))\n\t\tfailureExit(nil)\n\t}\n\tsuccessExit()\n}", "title": "" }, { "docid": "edef2919a12fb84f099cf263bdc3a246", "score": "0.53971595", "text": "func (w *Worker) recovery(panicwork Work) {\n\tif r := recover(); r != nil {\n\t\tDebugOut.Printf(\"Worker panic'd: %s\\n\", r)\n\t\tErrorOut.Printf(\"Worker panic'd: %s\\n\", r)\n\n\t\tif panicwork != nil {\n\t\t\tpanicwork.Return(WorkError{fmt.Sprintf(\"Work generated panic: %s\", r)})\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3a385e58ed20f8750eba74b7afbf830b", "score": "0.53882027", "text": "func Recovery(c *gin.Context) {\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tswitch v := err.(type) {\n\t\t\tcase *httperror.HTTPError:\n\t\t\t\tc.AbortWithStatusJSON(v.Status, gin.H{\n\t\t\t\t\t\"name\": v.Name,\n\t\t\t\t\t\"message\": v.Error(),\n\t\t\t\t})\n\t\t\tdefault:\n\t\t\t\t// httprequest, _ := httputil.DumpRequest(c.Request, false)\n\t\t\t\t// logger.Warnf(\"[Recovery] %s panic recovered:\\n%s\\n%s\", timeFormat(time.Now()), string(httprequest), err)\n\t\t\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, gin.H{\n\t\t\t\t\t\"name\": \"Error\",\n\t\t\t\t\t\"message\": fmt.Sprintf(\"%v\", err),\n\t\t\t\t\t\"stack\": fmt.Sprintf(\"%+v\", errors.WithStack(err.(error))),\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t}()\n\tc.Next()\n}", "title": "" }, { "docid": "1b2ab2a890cc6fdbd5059c72f424e748", "score": "0.53809816", "text": "func panicRecovery(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(rw http.ResponseWriter, rq *http.Request) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\tlog.Error(err)\n\n\t\t\t\t// To avoid 'superfluous response.WriteHeader call' error\n\t\t\t\tif rw.Header().Get(\"Content-Type\") == \"\" {\n\t\t\t\t\trw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\t}\n\t\t\t}\n\t\t}()\n\n\t\thandler.ServeHTTP(rw, rq)\n\t})\n}", "title": "" }, { "docid": "737ad407bb2c6f79eb287a6da2d5abe0", "score": "0.53641754", "text": "func logStackOnRecover(s runtime.NegotiatedSerializer, panicReason interface{}, w http.ResponseWriter) {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(fmt.Sprintf(\"recover from panic situation: - %v\\r\\n\", panicReason))\n\tfor i := 2; ; i++ {\n\t\t_, file, line, ok := rt.Caller(i)\n\t\tif !ok {\n\t\t\tbreak\n\t\t}\n\t\tbuffer.WriteString(fmt.Sprintf(\" %s:%d\\r\\n\", file, line))\n\t}\n\tglog.Errorln(buffer.String())\n\n\theaders := http.Header{}\n\tif ct := w.Header().Get(\"Content-Type\"); len(ct) > 0 {\n\t\theaders.Set(\"Accept\", ct)\n\t}\n\tresponsewriters.ErrorNegotiated(apierrors.NewGenericServerResponse(http.StatusInternalServerError, \"\", schema.GroupResource{}, \"\", \"\", 0, false), s, schema.GroupVersion{}, w, &http.Request{Header: headers})\n}", "title": "" }, { "docid": "3e04de6e1b8d673c6c929560a28a04d6", "score": "0.53530484", "text": "func (req *HTTPRequest) handlePanic() {\n\tif rec := recover(); rec != nil {\n\t\t// The recovered panic may not be an error\n\t\tvar err error\n\t\tswitch val := rec.(type) {\n\t\tcase error:\n\t\t\terr = val\n\t\tdefault:\n\t\t\terr = fmt.Errorf(\"%v\", val)\n\t\t}\n\t\terr = fmt.Errorf(\"panic: %v\", err)\n\n\t\treq.res.Error(err, req)\n\t}\n}", "title": "" }, { "docid": "8ded99f41145c714cb3af4134fb2fb45", "score": "0.534728", "text": "func CatchPanic(f func()) (err error) {\n\tdefer func() { err = RecoverError() }()\n\tf()\n\treturn\n}", "title": "" }, { "docid": "bd83682b8a21b9b255bffc9d18e0098f", "score": "0.5323184", "text": "func recoverPanic(w http.ResponseWriter) {\n\tif r := recover(); r != nil {\n\t\trespondWithError(w, 500, fmt.Sprintf(\"%s\", r))\n\t}\n}", "title": "" }, { "docid": "5b1a2432c4c66c1364bda8d42dba7141", "score": "0.5308742", "text": "func CatchPanic(f work.HandleFunc) work.HandleFunc {\n\treturn func(job *work.Job, opt *work.DequeueOptions) (err error) {\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\tconst size = 4096\n\t\t\t\tstack := make([]byte, size)\n\t\t\t\tstack = stack[:runtime.Stack(stack, false)]\n\n\t\t\t\terr = fmt.Errorf(\"panic: %v\\n\\n%s\", r, stack)\n\t\t\t}\n\t\t}()\n\t\treturn f(job, opt)\n\t}\n}", "title": "" }, { "docid": "b1e4ced0fa89605726004e03923d4049", "score": "0.5295771", "text": "func (httpAPI *API) Recover(params martini.Params, r render.Render, req *http.Request, user auth.User) {\n\tif !isAuthorizedForAction(req, user) {\n\t\tRespond(r, &APIResponse{Code: ERROR, Message: \"Unauthorized\"})\n\t\treturn\n\t}\n\tinstanceKey, err := httpAPI.getInstanceKey(params[\"host\"], params[\"port\"])\n\tif err != nil {\n\t\tRespond(r, &APIResponse{Code: ERROR, Message: err.Error()})\n\t\treturn\n\t}\n\tvar candidateKey *inst.InstanceKey\n\tif key, err := httpAPI.getInstanceKey(params[\"candidateHost\"], params[\"candidatePort\"]); err == nil {\n\t\tcandidateKey = &key\n\t}\n\n\tskipProcesses := (req.URL.Query().Get(\"skipProcesses\") == \"true\") || (params[\"skipProcesses\"] == \"true\")\n\trecoveryAttempted, promotedInstanceKey, err := logic.CheckAndRecover(&instanceKey, candidateKey, skipProcesses)\n\tif err != nil {\n\t\tRespond(r, &APIResponse{Code: ERROR, Message: err.Error(), Details: instanceKey})\n\t\treturn\n\t}\n\tif !recoveryAttempted {\n\t\tRespond(r, &APIResponse{Code: ERROR, Message: \"Recovery not attempted\", Details: instanceKey})\n\t\treturn\n\t}\n\tif promotedInstanceKey == nil {\n\t\tRespond(r, &APIResponse{Code: ERROR, Message: \"Recovery attempted but no instance promoted\", Details: instanceKey})\n\t\treturn\n\t}\n\tRespond(r, &APIResponse{Code: OK, Message: fmt.Sprintf(\"Recovery executed on %+v\", instanceKey), Details: *promotedInstanceKey})\n}", "title": "" }, { "docid": "10ff5f882c91851440dfa8f58f6ada37", "score": "0.52850294", "text": "func catchPanic(w http.ResponseWriter, r *http.Request) {\n\n\tif n := recover(); n != nil {\n\n\t}\n}", "title": "" }, { "docid": "d9a1799b457c5402afeb7ffc4bfa076e", "score": "0.52831197", "text": "func recoverPanic(err *error) {\n\tif e := recover(); nil != e {\n\t\tstack := debug.Stack()\n\t\terrMsg := \"\"\n\t\tswitch x := e.(type) {\n\t\tcase error:\n\t\t\terrMsg = x.Error()\n\t\tcase string:\n\t\t\terrMsg = x\n\t\tdefault:\n\t\t\terrMsg = \"unknown panic\"\n\t\t}\n\t\tif nil != err {\n\t\t\t*err = errors.New(\"PANIC RECOVERED: \" + errMsg + \"\\n\\t\" + string(stack) + \"\\n\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "dba618e7fdb051daf00e17d68c1197f0", "score": "0.5282751", "text": "func CallAndRecover(f func()) (result interface{}) {\n\tdefer func() {\n\t\tresult = recover()\n\t}()\n\tf()\n\treturn\n}", "title": "" }, { "docid": "e2b2f6fe86775f9bb14bb67c21982fb3", "score": "0.52818793", "text": "func (toiler *ToilRecorder) RecoveredNotice(panicValue interface{}) {\n\tif nil != toiler.recoveredNoticeFunc {\n\t\ttoiler.recoveredNoticeFunc(panicValue)\n\t}\n}", "title": "" }, { "docid": "2b9dd8d607b677a7b40f767c2d40a2d8", "score": "0.52639395", "text": "func panicOne() {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tfmt.Println(\"Recovered in f\", r)\n\t\t}\n\t}()\n\tfmt.Println(\"Calling panicTwo...\")\n\tpanicTwo(0)\n\tfmt.Println(\"Returned normally from panicTwo\")\n}", "title": "" }, { "docid": "9c8355cf0d743984c980a63273590005", "score": "0.5257193", "text": "func recoverHandler(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n log.WithFields(log.Fields{\n \"error\": err,\n }).Panic(\"Recovered from server crash\")\n\t\t\t\thttp.Error(w, http.StatusText(503), 503)\n\t\t\t}\n\t\t}()\n\n\t\tnext.ServeHTTP(w, r)\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "b4f4895678b71138f7f1652a073431fc", "score": "0.524976", "text": "func runWithRecovery(inner func() (Loggable, error)) (loggable Loggable, err error) {\n\tdefer func() {\n\t\tif recovered := recover(); recovered != nil {\n\t\t\tlog.Printf(\"Fatal error: %v\", recovered)\n\t\t\tloggable = literalLoggable{\n\t\t\t\ttraceLogs: []string{\n\t\t\t\t\tfmt.Sprintf(\"Captured panic: %v\", recovered),\n\t\t\t\t\t\"stacktrace from panic: \\n\" + string(debug.Stack()),\n\t\t\t\t},\n\t\t\t}\n\t\t\terr = errors.New(\"A fatal error has occurred. \" +\n\t\t\t\t\"Please submit an issue at https://github.com/GoogleCloudPlatform/compute-image-tools/issues\")\n\t\t}\n\t}()\n\treturn inner()\n}", "title": "" }, { "docid": "6cade8e3717a7bbf9cb34fcefa89b3a6", "score": "0.52425945", "text": "func catchPanic() {\n\tif p := recover(); p != nil {\n\t\tlog.Printf(\"unrecoverable internal error %v\\n\", p)\n\t}\n}", "title": "" }, { "docid": "f4f1e713565055b3783198a6904d1f92", "score": "0.5241481", "text": "func recover() interface{}", "title": "" }, { "docid": "f4f1e713565055b3783198a6904d1f92", "score": "0.5241481", "text": "func recover() interface{}", "title": "" }, { "docid": "7976ebf1eecd1f1a898c7b0af48ded1f", "score": "0.524033", "text": "func (s *service) recoverHandler(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\ts.writeError(w, errInternalServer, fmt.Sprintf(\"foo: %+v\", err))\n\n\t\t\t\tbotEnabled, er := strconv.ParseBool(os.Getenv(\"BOT_ENABLED\"))\n\t\t\t\tif er != nil {\n\t\t\t\t\tbotEnabled = false\n\t\t\t\t}\n\t\t\t\tif botEnabled {\n\t\t\t\t\tmsg := tgbotapi.NewMessageToChannel(os.Getenv(\"BOT_CHANNEL\"), \"Panic: \"+err.(string))\n\t\t\t\t\ts.telbot.Send(msg)\n\t\t\t\t}\n\n\t\t\t\treturn\n\t\t\t}\n\t\t}()\n\n\t\tnext.ServeHTTP(w, r)\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "7d71bb75232ce81d680da923567bc745", "score": "0.52002555", "text": "func newRecoveryWithLogger(log *logging.Logger) gin.HandlerFunc {\n\n\treturn func(c *gin.Context) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\tif log != nil {\n\t\t\t\t\thttprequest, _ := httputil.DumpRequest(c.Request, false)\n\t\t\t\t\tlog.Infof(\"[Recovery] panic recovered: %s %v\", string(httprequest), err)\n\t\t\t\t}\n\t\t\t\tc.AbortWithStatus(http.StatusInternalServerError)\n\t\t\t}\n\t\t}()\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "a7c987cc3eb929ab78ed9171e2c10135", "score": "0.5196801", "text": "func (h *Handler) InitRecovery(w http.ResponseWriter, r *http.Request) {\n\tvar cInp CoreInput\n\tif err := httpflow.DecodeJSON(r, &cInp); err != nil {\n\t\thttpflow.RespondError(h.log, w, r, err)\n\t\treturn\n\t}\n\n\tif err := CheckEmail(cInp.Email); err != nil {\n\t\thttpflow.RespondError(h.log, w, r, err)\n\t\treturn\n\t}\n\n\t// if email is not found, etc. we don't want the user or attacker\n\t// to know this.\n\trespErr := func(err error) {\n\t\tif httpflow.ErrorCode(err) < 500 {\n\t\t\thttpflow.Respond(h.log, w, r, nil, http.StatusAccepted)\n\t\t\treturn\n\t\t}\n\n\t\thttpflow.RespondError(h.log, w, r, err)\n\t}\n\n\tctx := r.Context()\n\n\tusr, err := h.db.FetchUserByEmail(ctx, cInp.Email)\n\tif err != nil {\n\t\trespErr(err)\n\t\treturn\n\t}\n\n\tusrC := usr.ExposeCore()\n\n\ttok, err := usrC.InitRecovery(h.token.recov)\n\tif err != nil {\n\t\tif errors.Is(err, ErrTooManyTokens) {\n\t\t\tsecs := int(time.Until(usrC.Recovery.NextAt.Time).Seconds())\n\t\t\tw.Header().Add(\"Retry-After\", strconv.Itoa(secs))\n\t\t}\n\n\t\thttpflow.RespondError(h.log, w, r, err)\n\n\t\treturn\n\t}\n\n\tif err = h.db.UpdateUser(ctx, usr); err != nil {\n\t\trespErr(err)\n\t\treturn\n\t}\n\n\tgo h.email.SendAccountRecovery(ctx, usrC.Email, tok)\n\n\thttpflow.Respond(h.log, w, r, nil, http.StatusAccepted)\n}", "title": "" }, { "docid": "890475b19974553be1bceeef6c383b78", "score": "0.5186823", "text": "func GoWithRecover(handler func(), recoverHandler func(r interface{})) {\n\tgo func() {\n\t\tdefer func() {\n\t\t\tif r := recover(); r != nil {\n\t\t\t\tfmt.Fprintf(os.Stderr, \"%s goroutine panic:%v\\n%s\\n\", time.Now().Format(\"2006-01-02 15:04:05\"), r, string(debug.Stack()))\n\n\t\t\t\tif recoverHandler != nil {\n\t\t\t\t\tgo func() {\n\t\t\t\t\t\tdefer func() {\n\t\t\t\t\t\t\tif p := recover(); p != nil {\n\t\t\t\t\t\t\t\tfmt.Fprintf(os.Stderr, \"recover goroutine panic:%v\\n%s\\n\", p, string(debug.Stack()))\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}()\n\n\t\t\t\t\t\trecoverHandler(r)\n\t\t\t\t\t}()\n\t\t\t\t}\n\t\t\t}\n\t\t}()\n\n\t\thandler()\n\t}()\n}", "title": "" }, { "docid": "5d7a302bf06454f4b106782bdab3fb9b", "score": "0.51802105", "text": "func didPanic(fn PanicTestFunc) (panicked bool, message interface{}) {\n\tdefer func() {\n\t\tif message = recover(); message != nil {\n\t\t\tpanicked = true\n\t\t}\n\t}()\n\n\tfn()\n\n\treturn panicked, message\n}", "title": "" }, { "docid": "eeea1aaec08223e96839792e902e1d20", "score": "0.517661", "text": "func Recover(ctx Context, name string, f func() error) {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif name != \"\" {\n\t\t\t\tWarn.Println(ctx, name, \"abort with\", r)\n\t\t\t} else {\n\t\t\t\tWarn.Println(ctx, \"goroutine abort with\", r)\n\t\t\t}\n\n\t\t\tError.Println(ctx, string(debug.Stack()))\n\t\t}\n\t}()\n\n\tif err := f(); err != nil && !IsNormalQuit(err) {\n\t\tif name != \"\" {\n\t\t\tWarn.Println(ctx, name, \"terminated with\", err)\n\t\t} else {\n\t\t\tWarn.Println(ctx, \"terminated abort with\", err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "afbbb7d7f1f08163d913c247c1d16582", "score": "0.51763576", "text": "func RecoverFromPanic(cleanup func()) {\n\t/*\n\t A normal debug.Stack() at this point looks like this:\n\t goroutine 23 [running]:\n\t runtime/debug.Stack(0xc00012a000, 0x584f40, 0xc0000d0120)\n\t /opt/go1.13.1/src/runtime/debug/stack.go:24 +0x9d\n\t main.start.func1.1(0xc0000882a0, 0x5c3de0, 0xc00012a000)\n\t /projects/novi/cmd/novi/main.go:65 +0x8d\n\t panic(0x584f40, 0xc0000d0120)\n\t /opt/go1.13.1/src/runtime/panic.go:679 +0x1b2\n\t github.com/iivvoo/novi/novi.(*TermUI).RenderTerm(0xc0000b8700)\n\t /projects/novi/novi/term.go:90 +0x487\n\t main.start.func1(0xc0000882a0, 0x5c3de0, 0xc00012a000, 0xc00008c720, 0xc0000b8700)\n\t /projects/novi/cmd/novi/main.go:110 +0x229\n\t created by main.start\n\n\t We don't care about the trace up until the panic and the line after it,\n\t so we need to do some fancy counting to skip that. Also, it's nice to\n\t have the actual error at the bottom\n\t*/\n\tif r := recover(); r != nil {\n\t\tcleanup()\n\t\ts := strings.Split(string(debug.Stack()), \"\\n\")\n\t\tpanicCheck := 0\n\t\tfmt.Println(s[0])\n\t\tfor _, entry := range s {\n\t\t\tif panicCheck == 2 {\n\t\t\t\tfmt.Println(entry)\n\t\t\t} else if strings.HasPrefix(entry, \"panic(\") {\n\t\t\t\tpanicCheck = 1\n\t\t\t} else if panicCheck == 1 {\n\t\t\t\tpanicCheck = 2\n\t\t\t}\n\t\t}\n\t\tfmt.Printf(\"%s\\n\", r)\n\t}\n}", "title": "" }, { "docid": "851d9166a0a8323a792523d319d5f7ca", "score": "0.5172401", "text": "func RunWithRecovery(f func()) {\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tLOGGER.Error(\"error in async method: %v\", err)\n\t\t}\n\t}()\n\n\t//execute the method\n\tf()\n}", "title": "" }, { "docid": "21186486251eae7fb9c8bb4dd1036165", "score": "0.51674074", "text": "func errRecovery(w http.ResponseWriter) {\n\tif err := recover(); err != nil {\n\t\terrString := err.(error).Error()\n\t\tlog.Println(\"panic recovery:\", errString)\n\t\tjsonError(w, errString, 500)\n\t}\n}", "title": "" }, { "docid": "507e9db33dbdc1845edd20905474ed9d", "score": "0.51663804", "text": "func Recovery() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\t//stack := gin.stack(3)\n\t\t\t\t//log.Printf(\"PANIC: %s\\n%s\", err, stack)\n\t\t\t\tc.Error(err.(error)).SetMeta(\"Middleware.Recovery\")\n\n\t\t\t\tc.AbortWithStatusJSON(500, gin.H{\n\t\t\t\t\t\"error\": err,\n\t\t\t\t})\n\t\t\t}\n\t\t}()\n\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "9f1884e320c19c8418fde9574590f0e4", "score": "0.513976", "text": "func Recover(t *testing.T) {\n\tif r := recover(); r != nil {\n\t\tt.Fatal(\"Unhandled Exception:\", string(debug.Stack()))\n\t}\n}", "title": "" }, { "docid": "0627c260fc274347b9963bd923f70eba", "score": "0.5138971", "text": "func RecoverPanic() {\n\tif err := recover(); err != nil {\n\t\tfmt.Println(\"Panic error recovered : \", err)\n\t\tfmt.Println(\"Parameters needed :\\n Path to the file needed after '-config' : for example : ./goDASH -config ../config/config\\n or URL missing after -url.\\n To have more informations, execute ./goDASH -help\")\n\t}\n}", "title": "" }, { "docid": "213fa66f0f69236291ebf58a4984f38b", "score": "0.51331705", "text": "func (_Identity *IdentityTransactor) TriggerRecovery(opts *bind.TransactOpts, ein *big.Int, newAssociatedAddress common.Address, v uint8, r [32]byte, s [32]byte, timestamp *big.Int) (*types.Transaction, error) {\n\treturn _Identity.contract.Transact(opts, \"triggerRecovery\", ein, newAssociatedAddress, v, r, s, timestamp)\n}", "title": "" }, { "docid": "fecffc04bc7400801141b714100ad072", "score": "0.5131598", "text": "func TestRecoverNil(t *testing.T) {\n\tdefer Recover()\n}", "title": "" }, { "docid": "1df57ee2bd24a107e319e22edcc88e42", "score": "0.51193494", "text": "func handlePanic(cb func(error)) {\n\tif r := recover(); r != nil {\n\t\tif e, ok := r.(error); ok {\n\t\t\tb := debug.Stack()\n\t\t\tcb(fmt.Errorf(\"panic: %s\\n%s\", e, string(b)))\n\t\t} else {\n\t\t\tcb(fmt.Errorf(\"Unknown worker panic: %+v\", r))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1c608bad7d798ba720239ba8918341a8", "score": "0.51168", "text": "func gorecover() interface{} {\n\tgp := getg()\n\tp := gp._panic\n\tif p != nil && !p.goexit && !p.recovered {\n\t\tp.recovered = true\n\t\treturn p.arg\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c720e96992274621872cc1a01a64a238", "score": "0.50640166", "text": "func OnPanic(handlerFunc HandlerFunc) {\n\tDefaultIris.OnPanic(handlerFunc)\n}", "title": "" }, { "docid": "ec34271b4308ffd15c763382aefeb62a", "score": "0.50589836", "text": "func Recovery(handler ErrHandlerFunc) Handler {\n\treturn func(c *Context) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\terrMsg, ok := err.(error)\n\t\t\t\tif !ok {\n\t\t\t\t\terrMsg = errors.New(fmt.Sprint(err))\n\t\t\t\t}\n\t\t\t\thandler(c, errMsg)\n\t\t\t}\n\t\t}()\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "df8f46932ee8f636d9c8851cb2c24842", "score": "0.50485814", "text": "func Recoverer(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\tdefer func() {\n\t\t\tif rvr := recover(); rvr != nil {\n\t\t\t\tlogger := ctxlog.FromRequest(r)\n\n\t\t\t\t// Ensure logger is logging stack traces, at least here.\n\t\t\t\tlogger = logger.WithOptions(zap.AddStacktrace(zap.ErrorLevel))\n\n\t\t\t\tlogger.Error(\"PANIC\",\n\t\t\t\t\tzap.Any(\"panic_value\", rvr),\n\t\t\t\t)\n\n\t\t\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\t\t}\n\t\t}()\n\n\t\tnext.ServeHTTP(w, r)\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "64e3cad6c2ad3585aedd4dd00769ff59", "score": "0.5031378", "text": "func f() (x int) {\r\n\tdefer func() {\r\n\t\trecover()\r\n\t\tx = 1\r\n\t}()\r\n\tpanic(\"\")\r\n}", "title": "" }, { "docid": "a6dba7151cc0d9a24e0e1a46c1d8a766", "score": "0.50296384", "text": "func Recoverer(l logger.Backend) func(http.Handler) http.Handler {\n\treturn func(h http.Handler) http.Handler {\n\t\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\t\tdefer func() {\n\t\t\t\tif rvr := recover(); rvr != nil {\n\t\t\t\t\tl.Logf(\"request panic for %s from %s, %v\", r.URL.String(), r.RemoteAddr, rvr)\n\t\t\t\t\tif rvr != http.ErrAbortHandler {\n\t\t\t\t\t\tl.Logf(string(debug.Stack()))\n\t\t\t\t\t}\n\t\t\t\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\t\t\t}\n\t\t\t}()\n\t\t\th.ServeHTTP(w, r)\n\t\t}\n\t\treturn http.HandlerFunc(fn)\n\t}\n}", "title": "" }, { "docid": "985ef00a7c0111cf7fb1189d3494a295", "score": "0.5024452", "text": "func catch(){\n // recover() = return error panic\n if err := recover(); err != nil {\n fmt.Println(\"Terjadi kesalahan :\", err)\n }\n}", "title": "" }, { "docid": "f7dd979df78f51dca8affb2a26ed6006", "score": "0.50174105", "text": "func (baseController *BaseController) CatchPanic(functionName string) {\n\tif r := recover(); r != nil {\n\t\tbuf := make([]byte, 10000)\n\t\truntime.Stack(buf, false)\n\t\tbaseController.ServeError(fmt.Errorf(\"%v\", r))\n\t}\n}", "title": "" }, { "docid": "275586e7e4a6780f917ad1c7f6a23612", "score": "0.50126123", "text": "func RecoverWithConfig(config RecoveryConfig) wsserver.MiddlewareFunc {\n\treturn func(handle wsserver.MsgHandlerFunc) wsserver.MsgHandlerFunc {\n\t\treturn func(c *wsserver.Context) error {\n\t\t\tdefer func() {\n\t\t\t\tif err := recover(); err != nil {\n\t\t\t\t\terr, ok := err.(error)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\terr = fmt.Errorf(\"%+v\", err)\n\t\t\t\t\t}\n\t\t\t\t\tstack := make([]byte, config.StackSize)\n\t\t\t\t\tlength := runtime.Stack(stack, config.DisableStackAll)\n\t\t\t\t\tif !config.DisablePrintStack {\n\t\t\t\t\t\tmsg := fmt.Sprintf(\"[PANIC RECOVER] %v %s\\n\", err, stack[:length])\n\t\t\t\t\t\tc.Logger().Debug(msg)\n\t\t\t\t\t}\n\t\t\t\t\tc.Error(err)\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\terr := handle(c)\n\t\t\treturn err\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1759b6d9137c0e9c3f7b28bd2cadbf49", "score": "0.49955654", "text": "func ConfigureRecoverFunc() graphql.RecoverFunc {\n\treturn func(_ context.Context, errInterface interface{}) error {\n\t\tvar err error\n\t\tswitch e := errInterface.(type) {\n\t\tcase error:\n\t\t\terr = e\n\t\tdefault:\n\t\t\t// skip the panic handler stack frames until the actual panic\n\t\t\terr = errors.Newf(\"%+v\", e)\n\t\t}\n\t\treturn err\n\t}\n}", "title": "" }, { "docid": "16ef081057d10b1226e79519e7386f0a", "score": "0.49755323", "text": "func Recovery() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tdefer func() {\n\t\t\tif err := recover(); err != nil {\n\t\t\t\trecoveryLog(c, string(stack(3)))\n\t\t\t\trenderJson := TRenderJson{-1, \" internal server error\", \"\", nil}\n\t\t\t\tc.JSON(http.StatusInternalServerError, renderJson)\n\t\t\t\tc.Set(\"render\", renderJson)\n\t\t\t\tc.Abort()\n\t\t\t}\n\t\t}()\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "3a6c7bffc25f2b00e5191768f407f1ef", "score": "0.4969239", "text": "func WithRecovery(h http.Handler, log *logger.Logger) http.Handler {\n\treturn http.HandlerFunc(func(rw http.ResponseWriter, req *http.Request) {\n\t\tdefer func() {\n\t\t\tif v := recover(); v != nil {\n\t\t\t\tlog.Error(\"Panic while serving request\",\n\t\t\t\t\tctx.Interface(\"err\", v),\n\t\t\t\t\tctx.Str(\"method\", req.Method),\n\t\t\t\t\tctx.Str(\"url\", req.URL.String()),\n\t\t\t\t\tctx.Stack(\"stack\"),\n\t\t\t\t)\n\n\t\t\t\trw.WriteHeader(http.StatusInternalServerError)\n\t\t\t}\n\t\t}()\n\n\t\th.ServeHTTP(rw, req)\n\t})\n}", "title": "" }, { "docid": "47cdcd106e55a50f3c0966599eed84e3", "score": "0.49521124", "text": "func (t Trigger) Trigger() {\n\tdefer func() {\n\t\trecover()\n\t}()\n\tclose(t)\n}", "title": "" }, { "docid": "ce3250503e18c06827b6c847230af4e1", "score": "0.4948635", "text": "func panics(fn func()) (panicked bool) {\n\tdefer func() {\n\t\tpanicked = (recover() != nil)\n\t}()\n\tfn()\n\treturn\n}", "title": "" }, { "docid": "c2ed26ece2e665a53e86a3f770c359ef", "score": "0.49392495", "text": "func RecoverPostHandler(c *gin.Context) {\n\tvar (\n\t\tf recoverFields\n\t\te recoverErrors\n\t\tresp = &recoverData{\n\t\t\tFields: &f,\n\t\t\tErrors: &e,\n\t\t\tSuccess: false,\n\t\t}\n\t)\n\n\t// Get User data submitted through form\n\terr := c.ShouldBind(&f)\n\tif err != nil {\n\t\t// Validate User input\n\t\terrs := err.(validator.ValidationErrors)\n\t\tfor _, err := range errs {\n\t\t\tswitch err.Field() {\n\t\t\tcase \"Token\":\n\t\t\t\te.Token = true\n\t\t\tcase \"Email\":\n\t\t\t\te.Email = true\n\t\t\tcase \"Password\":\n\t\t\t\te.Password = true\n\t\t\tcase \"ConfirmPassword\":\n\t\t\t\te.ConfirmPassword = true\n\t\t\t}\n\t\t}\n\t\tif errs != nil {\n\t\t\tc.HTML(http.StatusUnprocessableEntity, \"recover.html\", resp)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Sanitize input\n\tuser := &User{\n\t\tEmail: strings.TrimSpace(strings.ToLower(f.Email)),\n\t\tPassword: f.Password,\n\t}\n\n\t// Further validate input\n\tif !user.HasValidEmail() {\n\t\te.Email = true\n\t}\n\tif f.Password != f.ConfirmPassword {\n\t\te.PasswordMatch = true\n\t}\n\tif e.Email || e.PasswordMatch {\n\t\tc.HTML(http.StatusUnprocessableEntity, \"recover.html\", resp)\n\t\treturn\n\t}\n\n\t// Check if recover token is valid\n\tvar tokenExpired bool\n\terr = postgres.DB.QueryRow(`\n\t\tSELECT ((recover_token_expiration_date - NOW()) < INTERVAL '0 second') AS token_expired \n\t\tFROM users \n\t\tWHERE email=$1 AND recover_token=$2`, user.Email, f.Token).\n\t\tScan(&tokenExpired)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\t// If email or recover token are not found in DB, render failure page\n\t\t\te.Token = true\n\t\t\tc.HTML(http.StatusNotFound, \"recover.html\", resp)\n\t\t\treturn\n\t\t}\n\n\t\thttperror.Render500(c, err, \"Error querying database\")\n\t\treturn\n\t}\n\n\t// If recover token has expired, render failure page\n\tif tokenExpired {\n\t\te.TokenExpired = true\n\t\tc.HTML(http.StatusForbidden, \"recover.html\", resp)\n\t\treturn\n\t}\n\n\thashedPassword, err := argon2id.CreateHash(user.Password, argon2id.DefaultParams)\n\tif httperror.Render500IfErr(c, err, \"Error hasing password\") != nil {\n\t\treturn\n\t}\n\n\t// Update user in DB (Set new password and delete recover token)\n\t_, err = postgres.DB.Exec(`\n\t\tUPDATE users \n\t\tSET password=$1, recover_token=NULL, recover_token_expiration_date=NULL \n\t\tWHERE email=$2`, hashedPassword, user.Email)\n\tif httperror.Render500IfErr(c, err, \"Error executing query\") != nil {\n\t\treturn\n\t}\n\n\t// Sign Out from all previous sessions since the password was changed\n\ts := c.MustGet(\"session\").(*auth.Session)\n\tsessionIDs, _ := redis.GetUserSessions(s.UserID)\n\tfor _, sessionID := range sessionIDs {\n\t\tredis.DeleteSession(sessionID)\n\t}\n\tredis.DeleteUserSessions(s.UserID)\n\n\tresp.Success = true\n\tc.HTML(http.StatusOK, \"recover.html\", resp)\n}", "title": "" }, { "docid": "79603dd189df16d77d13451eb27d1960", "score": "0.49339342", "text": "func freedeferpanic() {\n\t// _panic must be cleared before d is unlinked from gp.\n\tthrow(\"freedefer with d._panic != nil\")\n}", "title": "" }, { "docid": "45d76cea1514aff67a2c964eea63be11", "score": "0.4927764", "text": "func Panic(f func()) (err test.Error) {\n\tpanicked := true\n\tdefer func() {\n\t\trecover()\n\t\tif panicked {\n\t\t\terr = nil\n\t\t}\n\t}()\n\terr = test.Error{errors.New(\"should have panicked\")}\n\tf()\n\tpanicked = false\n\treturn\n}", "title": "" }, { "docid": "bf04ae5ca693c167676f5927cc660907", "score": "0.49240232", "text": "func (AsyncRoutine) Report(f func()) {\n\tgo func() {\n\t\tdefer paniccatcher.Reporter()\n\t\tf()\n\t}()\n}", "title": "" }, { "docid": "5830e15e2d9e3c9a984f2cf77f9a5fdb", "score": "0.4920988", "text": "func (sa *SchedulingApplication) finishRecovery() {\n\t// no need to do anything if we are already running\n\tif sa.ApplicationInfo.IsRunning() {\n\t\treturn\n\t}\n\t// If we're not running we need to cover two cases in one: move from accepted, via starting to running\n\terr := sa.ApplicationInfo.HandleApplicationEvent(cache.RunApplication)\n\tif err == nil {\n\t\terr = sa.ApplicationInfo.HandleApplicationEvent(cache.RunApplication)\n\t}\n\t// log the unexpected failure\n\tif err != nil {\n\t\tlog.Logger().Error(\"Unexpected app state change failure while recovering allocation\",\n\t\t\tzap.String(\"currentState\", sa.ApplicationInfo.GetApplicationState()),\n\t\t\tzap.Error(err))\n\t}\n}", "title": "" }, { "docid": "2a29a4c96e8f2d1f59e0dcd79b7204a9", "score": "0.49202144", "text": "func catchPanic(f func() error) (err error) {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tlog.Criticalf(\"Caught unhandled error: %v\", r)\n\n\t\t\tswitch data := r.(type) {\n\t\t\tcase error:\n\t\t\t\terr = data\n\n\t\t\tdefault:\n\t\t\t\terr = errors.New(fmt.Sprintf(\"%v\", data))\n\t\t\t}\n\t\t}\n\t}()\n\n\terr = f()\n\n\treturn\n}", "title": "" } ]
3ac6d00dd06b4589b59c509e1d58cf2f
NewAuthorizationCode creates a new authorization code and saves it in the session store returning the new auth code and any error that occurs.
[ { "docid": "2a5945009e1558f6a4d61e79ff9bd95b", "score": "0.7613127", "text": "func (s *SessionStore) NewAuthorizationCode(clientID, redirectURI string, scope []string) (AuthorizationCode, error) {\n\tcode, err := NewToken()\n\tif err != nil {\n\t\treturn AuthorizationCode{}, err\n\t}\n\tauthCode := AuthorizationCode{\n\t\tCode: Secret(code),\n\t\tClientID: clientID,\n\t\tRedirectURI: redirectURI,\n\t\tScope: scope,\n\t\tCreatedAt: timeNow(),\n\t\tExpiresIn: DefaultAuthorizationCodeExpiry,\n\t}\n\t// Check whether there is an existing authcode with this access token\n\texisting, err := s.GetAuthorizationCode(authCode.Code)\n\t// If there is an existing auth code then return an error\n\tif err == nil && existing.Code.RawString() == authCode.Code.RawString() {\n\t\treturn authCode, ErrorServerError\n\t}\n\t// Otherwise return the auth code and add it to the session store.\n\treturn authCode, s.PutAuthorizationCode(authCode)\n}", "title": "" } ]
[ { "docid": "0d8ff74e20b4552d2f6d5773cc0f567f", "score": "0.6821023", "text": "func (m *MemSessionStoreBackend) PutAuthorizationCode(authCode AuthorizationCode) error {\n\tm.mtx.Lock()\n\tdefer m.mtx.Unlock()\n\tm.authCodes[authCode.Code.RawString()] = authCode\n\treturn nil\n}", "title": "" }, { "docid": "a665b9282860d6273db9bfc2c603010e", "score": "0.67648274", "text": "func NewAuthorizationCode(clientID, userID, redirectURI, scope string, expiresIn int64) *AuthorizationCode {\n\treturn &AuthorizationCode{\n\t\tCommon: Common{\n\t\t\t//ID: fmt.Sprintf(\"%s\", uuid.Must(uuid.NewV4())),\n\t\t\tID: fmt.Sprintf(\"%s\", uuid.NewV4()),\n\t\t\tCreatedAt: time.Now().UTC().UnixNano(),\n\t\t},\n\t\tClientID: sql.NullString{String: clientID, Valid: true},\n\t\tUserID: sql.NullString{String: userID, Valid: true},\n\t\t// Code: fmt.Sprintf(\"%s\", uuid.Must(uuid.NewV4())),\n\t\tCode: fmt.Sprintf(\"%s\", uuid.NewV4()),\n\t\tRedirectURI: redirectURI,\n\t\tScope: scope,\n\t\tExpiresIn: expiresIn,\n\t}\n}", "title": "" }, { "docid": "05b3694a1bbe90cafd492a0f52d7f9fa", "score": "0.64698493", "text": "func InsertAuthorizationCode(ts *TokenStore, code string, data []byte, expiresAt string) (err error) {\n\tparams := &dynamodb.PutItemInput{\n\t\tTableName: aws.String(ts.tcfg.BasicCName),\n\t\tItem: map[string]*dynamodb.AttributeValue{\n\t\t\t\"ID\": &dynamodb.AttributeValue{\n\t\t\t\tS: aws.String(code),\n\t\t\t},\n\t\t\t\"Data\": &dynamodb.AttributeValue{\n\t\t\t\tB: data,\n\t\t\t},\n\t\t\t\"ExpiredAt\": &dynamodb.AttributeValue{\n\t\t\t\tS: aws.String(expiresAt),\n\t\t\t},\n\t\t},\n\t}\n\t_, err = ts.client.PutItem(params)\n\treturn\n}", "title": "" }, { "docid": "32b21146a77a370a31b1a7ea7d349485", "score": "0.6460021", "text": "func NewAuthCodeToken(code, refreshToken, redirectURI string) (*AuthCodeToken, error) {\n\t// First check if such an authorization grant has been issued\n\tconn := NewConn()\n\tdefer CloseConn(conn)\n\n\tvalue := code + \":\" + redirectURI\n\treply, err := redis.Int(conn.Do(\"HEXISTS\", authCodeGrantSet, value))\n\tif err != nil {\n\t\tlog.Println(\"NewAuthCodeToken: \" + err.Error())\n\t\treturn nil, err\n\t}\n\n\t// If 'value' is not found in the Redis cache, there are the following possibilities:\n\t// - A toekn was already issued on this authorization grant and must be revoked.\n\t// - It has expired and was removed by housekeep().\n\t// - It was never issued.\n\t// - the redirect URI is wrong.\n\tif reply == 0 {\n\t\treturn nil, fmt.Errorf(\"recycled/expired/invalid authorization grant or wrong redirect_uri\")\n\t}\n\n\t// If found, check if it has expired since housekeeping runs only every 5 minutes\n\tintTime, err := redis.Int64(conn.Do(\"HGET\", authCodeGrantSet, value))\n\tif err != nil {\n\t\tlog.Println(\"NewAuthCodeToken: \" + err.Error())\n\t\treturn nil, err\n\t}\n\n\tissueTime := time.Unix(intTime, 0)\n\tif time.Now().Sub(issueTime) >= 10*time.Minute {\n\t\treturn nil, fmt.Errorf(\"expired authorization grant\")\n\t}\n\n\t// If not expired, remove it from the Redis cache since\n\t// we're about to issue a token for it.\n\tgo removeAuthCodeGrant(code, redirectURI)\n\n\tvar token *AuthCodeToken\n\tvar meta *authCodeTokenMeta\n\n\t// Generates a new key if a duplicate is encoutered\n\tfor reply == 1 {\n\t\ttoken, meta = generateAuthCodeToken(code)\n\n\t\t// Replace newly-generated refresh token with function parameter 'refreshToken'\n\t\t// if it is of length 72 since SHA-256 generates a string of length 64 and we\n\t\t// prepend it with flow identifier of length 8. (AUTHCODE)\n\t\tif len(refreshToken) == 72 {\n\t\t\ttoken.RefreshToken = refreshToken\n\t\t}\n\n\t\treply, err = redis.Int(conn.Do(\"HEXISTS\", authCodeTokensSet, token.AccessToken))\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tjsonBytes, err := json.Marshal(internalAuthCodeToken{Token: *token, Meta: *meta})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t_, err = conn.Do(\"HSET\", authCodeTokensSet, token.AccessToken, string(jsonBytes))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn token, nil\n}", "title": "" }, { "docid": "708d153b0e67ea172e99045f21ee0b4a", "score": "0.6429213", "text": "func NewAuthCodeGrant(redirectURI string) string {\n\tvar code string\n\tvar reply = 0\n\tvar err error\n\n\t// In case we get a duplicate value, we iterate until we get a unique one.\n\tconn := NewConn()\n\tdefer CloseConn(conn)\n\tfor reply == 0 {\n\t\tcode = generateNonce(20)\n\t\tvalue := code + \":\" + redirectURI\n\t\treply, err = redis.Int(conn.Do(\"HSET\", authCodeGrantSet, value, time.Now().Unix()))\n\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t}\n\n\treturn code\n}", "title": "" }, { "docid": "fcbfd87cf25644cb4e0b730633cd82f7", "score": "0.6423613", "text": "func NewAuthorizationCode(code string) *AuthorizationCode {\n\tthis := AuthorizationCode{}\n\tthis.Code = code\n\treturn &this\n}", "title": "" }, { "docid": "4d5068dfd33868b97911735e6d3af712", "score": "0.6406656", "text": "func GenAuthCode(ctx iris.Context) {\n\tgenAuthCodeRequest := &GenAuthCodeRequestData{}\n\n\ter := ctx.ReadJSON(genAuthCodeRequest)\n\terr.CheckErrWithCallback(er, response.GenCallbackBadRequest(ctx, er))\n\n\temail := genAuthCodeRequest.Email\n\n\tuser, has, er := model.GetUserByEmail(email)\n\terr.CheckErrWithPanic(er)\n\n\tif !has {\n\t\tresponse.Forbidden(ctx, iris.Map{})\n\t\treturn\n\t}\n\n\thas, er = model.CheckAuthCodeByUser(user.ID)\n\terr.CheckErrWithPanic(er)\n\n\tnewCode := genRandAuthCode(args.AuthCodeSize)\n\t// if exists, update, or, insert\n\tif !has {\n\t\t_, er := model.NewAuthCode(user.ID, newCode)\n\t\terr.CheckErrWithPanic(er)\n\t} else {\n\t\ter = model.UpdateAuthCode(user.ID, newCode)\n\t\terr.CheckErrWithPanic(er)\n\t}\n\n\tresponse.OK(ctx, iris.Map{\n\t\t\"authCode\": newCode,\n\t})\n}", "title": "" }, { "docid": "6e57cc02386b398a6dd142745d59d814", "score": "0.61836565", "text": "func (codeStore CodeStore) NewCode(ID string) (string, error) {\n\n\texists := codeStore.doesCodeWithIDExist(ID)\n\tif exists {\n\t\treturn \"\", errors.New(\"Code With ID Already Exists\")\n\t}\n\n\tcodeStr := GenerateCode()\n\n\tcode := config.VerificationCode{\n\t\tID: ID,\n\t\tCreationUTC: time.Now().Unix(),\n\t\tCode: codeStr,\n\t}\n\n\tcodeStore.mainCollection.InsertOne(context.TODO(), code)\n\treturn code.Code, nil\n}", "title": "" }, { "docid": "3f7e2ab9c1759426b59b20e87fa3d138", "score": "0.61606836", "text": "func (auth *AuthoriseRequestBody) GenerateAuthCode(w http.ResponseWriter) *Authcode {\n\tb := make([]byte, 50)\n\trand.Read(b)\n\n\tauthcode := &Authcode{}\n\tauthcode.ID = bson.NewObjectId()\n\tauthcode.Code = uuid.Must(uuid.NewV4()).String()\n\tauthcode.UserID = user.ID\n\tauthcode.ExpiresAt = time.Now().Local().Add(time.Hour*time.Duration(0) +\n\t\ttime.Minute*time.Duration(1) +\n\t\ttime.Second*time.Duration(0))\n\tauthcode.CreatedAt = time.Now().Local()\n\tauthcode.UpdatedAt = time.Now().Local()\n\n\tdb := database.Db\n\tc := db.C(\"authcode\")\n\t// Insert\n\tinsertionErrors := c.Insert(&authcode)\n\n\tif insertionErrors != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tresponse := map[string]interface{}{\"errors\": insertionErrors.Error(), \"status\": 0}\n\t\tjson.NewEncoder(w).Encode(response)\n\n\t}\n\n\treturn authcode\n}", "title": "" }, { "docid": "3d009b1b6e3fbeee5b84dda8b27574f4", "score": "0.6106421", "text": "func NewOauthAuthorizationCode(client *OauthClient, user *OauthUser, expiresIn int, redirectURI, scope string) *OauthAuthorizationCode {\n\treturn &OauthAuthorizationCode{\n\t\tMyGormModel: MyGormModel{\n\t\t\tID: uuid.New(),\n\t\t\tCreatedAt: time.Now().UTC(),\n\t\t},\n\t\tClientID: util.StringOrNull(string(client.ID)),\n\t\tUserID: util.StringOrNull(string(user.ID)),\n\t\tCode: uuid.New(),\n\t\tExpiresAt: time.Now().UTC().Add(time.Duration(expiresIn) * time.Second),\n\t\tRedirectURI: util.StringOrNull(redirectURI),\n\t\tScope: scope,\n\t}\n}", "title": "" }, { "docid": "b598b370c12075516f37500806f77b0c", "score": "0.6096187", "text": "func (m *MemSessionStoreBackend) DeleteAuthorizationCode(code Secret) error {\n\tm.mtx.Lock()\n\tdefer m.mtx.Unlock()\n\tif _, ok := m.authCodes[code.RawString()]; ok {\n\t\tdelete(m.authCodes, code.RawString())\n\t\treturn nil\n\t}\n\treturn ErrorServerError\n}", "title": "" }, { "docid": "3bc7babbf457f180fcb55f9613dc9f4c", "score": "0.60203093", "text": "func (o *CreateRepository4Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "fbfcb6e1a55ea4fdba11bafcdf96713f", "score": "0.60177064", "text": "func (req *Defaults) CreateAuthCode(ctx *gin.Context) {\n\tauthRequest, err := lib.InitAuthCode(ctx.Request)\n\n\tif err != nil {\n\t\tctx.JSON(http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tvalidateErr := authRequest.Validate()\n\tif validateErr != nil {\n\t\tctx.JSON(http.StatusBadRequest, validateErr)\n\t\treturn\n\t}\n\n\tcredentials := helpers.MarshalCredentialsFromForm(ctx.Request)\n\n\t// check & resolve the identity\n\tif resp, err := req.IdentityClient.Client.ValidateUserIdentity(ctx, credentials); err != nil || !resp.GetSuccess() {\n\t\tpageTemplate := req.SitePages.RetrieveFile(\"login\").Template\n\n\t\tdescript := \"Error: Invalid Credentials\"\n\n\t\tif err != nil {\n\t\t\tdescript = \"An Internal Error has Occurred While Logging In\"\n\t\t}\n\n\t\tpageTemplate.Execute(ctx.Writer, webserve.OutTemplate{\n\t\t\tError: true,\n\t\t\tErrorDescription: descript,\n\t\t\tScript: webserve.DevError(err.Error()),\n\t\t})\n\t\treturn\n\t}\n\n\ttoken := lib.CreateCodeToken(authRequest, credentials.GetUsername()).ToJWT(req.Environment.JWTSecret)\n\n\tgrpcAuthRequest := &grpcAuthorization.AuthorizeUserRequest{\n\t\tUserID: credentials.Username,\n\t\tClientID: authRequest.ClientID,\n\t}\n\n\t// check if user has accepted agreement on conditions page\n\t// returns condition page if not.\n\tif resp, err := req.AuthorizationClient.Client.IsUserAuthorized(ctx, grpcAuthRequest); err != nil || !resp.GetSuccess() {\n\t\ttemp := req.SitePages.RetrieveFile(\"conditions\")\n\t\tif temp == nil {\n\t\t\tctx.JSON(http.StatusInternalServerError, lib.CreateError(\"internal server error\", \"conditions page not found\"))\n\t\t\treturn\n\t\t}\n\n\t\ttemp.Template.Execute(ctx.Writer, webserve.OutTemplate{\n\t\t\tScript: webserve.WriteSessionStorage(\"_truauth.clientIntro\", token),\n\t\t})\n\n\t\treturn\n\t}\n\n\tredirect := fmt.Sprintf(\"%s?code=%s&state=%s\", authRequest.RedirectURI, token, authRequest.State)\n\thttp.Redirect(ctx.Writer, ctx.Request, redirect, http.StatusFound)\n}", "title": "" }, { "docid": "59661dad2a3fc2131beb907a2de85e56", "score": "0.5977177", "text": "func (m *MemSessionStoreBackend) GetAuthorizationCode(code Secret) (AuthorizationCode, error) {\n\tm.mtx.Lock()\n\tdefer m.mtx.Unlock()\n\tif authCode, ok := m.authCodes[code.RawString()]; ok {\n\t\treturn authCode, nil\n\t}\n\treturn AuthorizationCode{}, ErrorAccessDenied\n}", "title": "" }, { "docid": "890feca0d39bfa192333ecf0d3283fbf", "score": "0.5963542", "text": "func (o *CreateRepository10Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "d512a24e06917e0712858a97822c6a25", "score": "0.5935299", "text": "func (o *RTRPulseSessionCreated) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "477012767d10ce5152673718085c5427", "score": "0.5931246", "text": "func AddCode(w http.ResponseWriter, r *http.Request, enc Encoder, parms martini.Params, db codeDB_inter) (int, string) {\n\tuserid := parms[\"userid\"]\n\tal := getPostCode(r, userid)\n\tid, err := db.Add(al)\n\tswitch err {\n\tcase ErrAlreadyExists:\n\t\t// Duplicate\n\t\treturn http.StatusConflict, Must(enc.Encode(\n\t\t\tNewError(ErrCodeAlreadyExists, fmt.Sprintf(\"the code '%s' from '%s' already exists\", al.Name, al.Description))))\n\tcase nil:\n\t\t// TODO : Location is expected to be an absolute URI, as per the RFC2616\n\t\tw.Header().Set(\"Location\", fmt.Sprintf(\"/code/%s/%d\", userid, id))\n\t\treturn http.StatusCreated, Must(enc.Encode(al))\n\tdefault:\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "2e650e9ab29730b85084f035fcc70240", "score": "0.5894658", "text": "func (o *CreateRepository16Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "59d75c2cbe337cfdc5e22f38d05691d1", "score": "0.5879277", "text": "func generateAuthCodeToken(code string) (*AuthCodeToken, *authCodeTokenMeta) {\n\tnonce := generateNonce(16)\n\tcreationTime := time.Now()\n\n\taccessToken := AuthCodeFlowID + hash(fmt.Sprintf(\"%s%s%s\", code, creationTime, nonce))\n\trefreshToken := AuthCodeFlowID + hash(fmt.Sprintf(\"%s%s\", creationTime, nonce))\n\n\treturn &AuthCodeToken{\n\t\t\tAccessToken: accessToken,\n\t\t\tRefreshToken: refreshToken,\n\t\t\tExpiresIn: 3600,\n\t\t}, &authCodeTokenMeta{\n\t\t\tAuthGrant: code,\n\t\t\tCreationTime: creationTime,\n\t\t\tNonce: nonce,\n\t\t}\n}", "title": "" }, { "docid": "1755e490020d97d89424b524793a9d79", "score": "0.5845824", "text": "func (m *Manager) getAuthorizationCode(ctx context.Context, code string) (oauth2.TokenInfo, error) {\n\tti, err := m.tokenStore.GetByCode(ctx, code)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if ti == nil || ti.GetCode() != code || ti.GetCodeCreateAt().Add(ti.GetCodeExpiresIn()).Before(time.Now()) {\n\t\terr = errors.ErrInvalidAuthorizeCode\n\t\treturn nil, errors.ErrInvalidAuthorizeCode\n\t}\n\treturn ti, nil\n}", "title": "" }, { "docid": "2d5dea88def8a26fbbdd287007c1d596", "score": "0.5804249", "text": "func (ac *BasicAuthCache) RegisterAuthCode(clientID, scope, redirect_uri, code string) (err error) {\n\tentry := &CacheEntry{\n\t\tClientID: clientID,\n\t\tScope: scope,\n\t\tRedirectURI: redirect_uri,\n\t}\n\tac.AuthCodes[code] = entry\n\n\tif CodeExpiry > 0 {\n\t\tgo DelayedDelete(ac.AuthCodes, code, CodeExpiry)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e34f44b59083f28d6e40ee2267a60302", "score": "0.5785968", "text": "func (o *OAuth) AuthorizeCode(code string) (tr *TokenResponse, err error) {\n\tbody, err := http.Request(\"POST\", codeEndpoint(code), http.Headers{\"Authorization\": o.AuthorizationHeader})\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = json.Unmarshal(body, &tr)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "8e9ec11d85eb5de13b583480b2409085", "score": "0.57636255", "text": "func (o *RTRListQueuedSessionsUnauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "01a43febbb819ab329c3aa0f5f0fbb1e", "score": "0.575792", "text": "func(cred *Credentials) StartAuthCode(w http.ResponseWriter, r *http.Request, heroID int) {\n authorizeURL, err := url.Parse(cred.AuthDomain)\n if err != nil {\n w.WriteHeader(http.StatusUnauthorized)\n w.Write(getJSONErrorFromString(fmt.Sprintf(\"Bad Authorize URL: %s\", err)))\n return\n }\n values := url.Values{}\n values.Set(\"response_type\", \"code\")\n values.Set(\"grant_type\", \"authorization_code\")\n values.Set(\"client_id\", cred.ClientID)\n values.Set(\"redirect_uri\", cred.Callback)\n \n if cred.Scope != \"\" { // sso will include all scopes by default\n values.Set(\"scope\", cred.Scope)\n }\n \n values.Set(\"state\", base64.StdEncoding.EncodeToString([]byte(fmt.Sprintf(\"hero=%d\", heroID))))\n authorizeURL.Path = cred.AuthURL\n authorizeURL.RawQuery = values.Encode()\n \n http.Redirect(w, r, authorizeURL.String(), http.StatusFound)\n return\n}", "title": "" }, { "docid": "c43ce8d57ee1677242568956088c786c", "score": "0.5660263", "text": "func (o *AuthorizationCode) GetCode() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Code\n}", "title": "" }, { "docid": "e987e703c503ad98858b67891280d02d", "score": "0.56168544", "text": "func (o *UpdateRepository34Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "28aa225b4401769c0dfbe6afc3cad5aa", "score": "0.5589722", "text": "func (o *IntegrationCustomerTokenServiceV1CreateCustomerAccessTokenPostDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "583e3874daaef59ee1a6834f707e5ad2", "score": "0.55834925", "text": "func (o *KerberosRealmCreateDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "909eeb94442929e80cc8313c1a3ec465", "score": "0.55710673", "text": "func (o *AddRoleOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "e23dd518757a776dbbcd214f360ee04f", "score": "0.5569769", "text": "func (o *ObjectsClassDeleteUnauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "a6e2f233f3705232b78c7268ff54e3a3", "score": "0.55443865", "text": "func (o *CreateRepository4Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "e345da6faa974f2958af77f5ceddf5b7", "score": "0.552071", "text": "func (o *TenantsGetUnauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "942b9a872cd465d7c07d60227bc8462e", "score": "0.55149674", "text": "func (o *UpdateRepository17Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "6bd00372b5eb005527b4d49535c356c0", "score": "0.5512817", "text": "func (o *ObjectsClassGetUnauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "1139a851f7a83e94034e315a18bfa430", "score": "0.55064243", "text": "func (r *Router) GatewayAuthCode(name, authorizeURL, tokenURL string, scopes map[string]string) {\n\tr.securitySchemes[name] = oaSecurityScheme{\n\t\tType: \"oauth2\",\n\t\tFlows: oaFlows{\n\t\t\tAuthorizationCode: &oaFlow{\n\t\t\t\tAuthorizationURL: authorizeURL,\n\t\t\t\tTokenURL: tokenURL,\n\t\t\t\tScopes: scopes,\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "c484ec5ee9c9620f359456b57afff3c7", "score": "0.54876184", "text": "func (s *SessionStore) CheckAuthorizationCode(code Secret, redirectURI string) (AuthorizationCode, error) {\n\tauthCode, err := s.GetAuthorizationCode(code)\n\tif err != nil {\n\t\treturn authCode, err\n\t}\n\t// If set, check that RedirectURI matches the given redirectURI\n\tif authCode.RedirectURI != \"\" && authCode.RedirectURI != redirectURI {\n\t\treturn authCode, ErrorAccessDenied\n\t}\n\t// Check that the code is not expired.\n\tif authCode.IsExpired() {\n\t\treturn authCode, ErrorAccessDenied\n\t}\n\treturn authCode, nil\n}", "title": "" }, { "docid": "67f0bba27bb06affea71b26a7d6328b1", "score": "0.548203", "text": "func (o *UpdateRepository30Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "a158a24f76a4ae8c8915315f66b6e3aa", "score": "0.5481914", "text": "func (o *UpdateRepositoryUnauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "7d9fb8c6729a908afd3af41e92b42c22", "score": "0.54773176", "text": "func (o *UpdateRepository6Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "5a7f262683f7e0a1e94b76988cf7c15b", "score": "0.54424894", "text": "func (o *GetInfrastructureAccountUnauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "adf5f4cd957135a7a1485619667ca395", "score": "0.54419386", "text": "func (surveyTicket *SurveyTicket) GenerateAuthCode() {\n\trand.Seed(time.Now().UTC().UnixNano())\n\tconst chars = \"0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz\"\n\tresult := make([]byte, SurveyTicketsAuthCodeLength)\n\tfor i := 0; i < SurveyTicketsAuthCodeLength; i++ {\n\t\tresult[i] = chars[rand.Intn(len(chars))]\n\t}\n\tsurveyTicket.AuthCode = string(result)\n}", "title": "" }, { "docid": "d7da7fe2fd214d3640db95191765663c", "score": "0.5431996", "text": "func (o *CreateD4CGcpAccountCreated) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "052fe1fd741f16f8409f6084b96e6d54", "score": "0.54306966", "text": "func (m *Manager) delAuthorizationCode(ctx context.Context, code string) error {\n\treturn m.tokenStore.RemoveByCode(ctx, code)\n}", "title": "" }, { "docid": "5890c7286c2892c8257d3dfba95c83e9", "score": "0.54226255", "text": "func (o *CreateMappingIdentityDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "8149962363bb58fdf8408c5a9b0fa628", "score": "0.54173857", "text": "func (o *KerberosRealmCreateCreated) IsCode(code int) bool {\n\treturn code == 201\n}", "title": "" }, { "docid": "c7a5c7ee05be0e9a529ee01a55cfee12", "score": "0.5401737", "text": "func HandleAuthCode(w http.ResponseWriter, req *http.Request) {\n\tkeys, _ := req.URL.Query()[\"code\"]\n\tkey := keys[0]\n\tauthcode = string(key)\n}", "title": "" }, { "docid": "32f30f1011c7b6355a6ea4d726a7cc2a", "score": "0.5391654", "text": "func (o *CreateRepository10Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "999d4570849571a09d62c5d258241ba2", "score": "0.539129", "text": "func (m *Manager) getAndDelAuthorizationCode(ctx context.Context, tgr *oauth2.TokenGenerateRequest) (oauth2.TokenInfo, error) {\n\tcode := tgr.Code\n\tti, err := m.getAuthorizationCode(ctx, code)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if ti.GetClientID() != tgr.ClientID {\n\t\treturn nil, errors.ErrInvalidAuthorizeCode\n\t} else if codeURI := ti.GetRedirectURI(); codeURI != \"\" && codeURI != tgr.RedirectURI {\n\t\treturn nil, errors.ErrInvalidAuthorizeCode\n\t}\n\n\terr = m.delAuthorizationCode(ctx, code)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn ti, nil\n}", "title": "" }, { "docid": "7e2d4ac276efe22123ddfc9053d82a2f", "score": "0.53894633", "text": "func (o *DeleteNotificationsV1Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "28bf2b86a9d5d8e28f410092ac040703", "score": "0.5377085", "text": "func (o *CreateRepository4Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "07121d7c376c2bd5d8704b4c05d2bfc2", "score": "0.5366533", "text": "func (o *CreateRepository4Created) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "511aa26e2c7756d81aaf573b432d6b9a", "score": "0.53646356", "text": "func (o *CreateOrUpdateMeteringCredentialsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "a797327aa7d8054f1316b971bcb96469", "score": "0.5358446", "text": "func StartAuthCodeFlow(ctx *fiber.Ctx, req *response.AuthCodeFlowRequest) *model.Response {\n\trlog := logger.GetRequestLogger(ctx)\n\trlog.Debug(\"Handle authcode\")\n\tnative := req.Native() && config.Get().Features.Polling.Enabled\n\tif !native && req.RedirectURI == \"\" {\n\t\treturn &model.Response{\n\t\t\tStatus: fiber.StatusBadRequest,\n\t\t\tResponse: api.Error{\n\t\t\t\tError: api.ErrorStrInvalidRequest,\n\t\t\t\tErrorDescription: \"parameter redirect_uri must be given for client_type=web\",\n\t\t\t},\n\t\t}\n\t}\n\treq.Restrictions.ReplaceThisIP(ctx.IP())\n\treq.Restrictions.ClearUnsupportedKeys()\n\tp := provider2.GetProvider(req.Issuer)\n\tif p == nil {\n\t\treturn &model.Response{\n\t\t\tStatus: fiber.StatusBadRequest,\n\t\t\tResponse: api.ErrorUnknownIssuer,\n\t\t}\n\t}\n\treq.Issuer = p.Issuer()\n\texp := req.Restrictions.GetExpires()\n\tif exp > 0 && exp < unixtime.Now() {\n\t\treturn &model.Response{\n\t\t\tStatus: fiber.StatusBadRequest,\n\t\t\tResponse: model.BadRequestError(\"token would already be expired\"),\n\t\t}\n\t}\n\n\toState, consentCode := state.CreateState()\n\tauthFlowInfo := authcodeinforepo.AuthFlowInfo{\n\t\tAuthFlowInfoOut: authcodeinforepo.AuthFlowInfoOut{\n\t\t\tState: oState,\n\t\t\tAuthCodeFlowRequest: *req,\n\t\t},\n\t}\n\tres := api.AuthCodeFlowResponse{\n\t\tConsentURI: utils.CombineURLPath(routes.ConsentEndpoint, consentCode.String()),\n\t}\n\tif native {\n\t\tpoll := authFlowInfo.State.PollingCode(rlog)\n\t\tauthFlowInfo.PollingCode = transfercoderepo.CreatePollingCode(poll, req.ResponseType, req.MaxTokenLen)\n\t\tres.PollingInfo = api.PollingInfo{\n\t\t\tPollingCode: poll,\n\t\t\tPollingCodeExpiresIn: config.Get().Features.Polling.PollingCodeExpiresAfter,\n\t\t\tPollingInterval: config.Get().Features.Polling.PollingInterval,\n\t\t}\n\t}\n\tif err := authFlowInfo.Store(rlog, nil); err != nil {\n\t\trlog.Errorf(\"%s\", errorfmt.Full(err))\n\t\treturn model.ErrorToInternalServerErrorResponse(err)\n\t}\n\tif !native && trustedRedirectURI(req.RedirectURI) {\n\t\tauthURI, err := GetAuthorizationURL(\n\t\t\trlog, nil, p, state.NewState(consentCode.GetState()),\n\t\t\treq.Restrictions.Restrictions,\n\t\t)\n\t\tif err != nil {\n\t\t\trlog.Errorf(\"%s\", errorfmt.Full(err))\n\t\t\treturn model.ErrorToInternalServerErrorResponse(err)\n\t\t}\n\t\treturn &model.Response{\n\t\t\tStatus: httpstatus.StatusOKForward,\n\t\t\tResponse: map[string]string{\n\t\t\t\t\"authorization_uri\": authURI,\n\t\t\t},\n\t\t}\n\t}\n\treturn &model.Response{\n\t\tStatus: fiber.StatusOK,\n\t\tResponse: res,\n\t}\n}", "title": "" }, { "docid": "95b3da531cedbd718c4934c02f02035e", "score": "0.5355313", "text": "func (o *CreateRepository16Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "b23d9927663c0a50178edfa8e7866b5d", "score": "0.5348203", "text": "func (o *CreateRepository10Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "76df7685a9b4badab4d67e52b14cebf5", "score": "0.5344423", "text": "func NewCode(email string) *Code {\n\ts := new(Code)\n\ts.email = NewEmail(email)\n\treturn s\n}", "title": "" }, { "docid": "7a6c6212f216bb7fea53e7b423d337bc", "score": "0.53436184", "text": "func (o *AddRoleForbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "2dd720dcb4827170a085d529aa332db0", "score": "0.5343354", "text": "func (cred *Credentials) GetAccessTokenFromCode(w http.ResponseWriter, r *http.Request) error {\n respValues := r.URL.Query()\n code := respValues.Get(\"code\")\n GetAccessTokenFromCodeError := fmt.Errorf(\"GetAccessTokenFromCodeError\")\n \n if code == \"\" {\n w.WriteHeader(http.StatusUnauthorized)\n w.Write(getJSONErrorFromString(fmt.Sprintf(\"code not found in URL reponse\")))\n return GetAccessTokenFromCodeError\n }\n cred.Code = code\n\n values := url.Values{}\n values.Set(\"response_type\", \"id_token\")\n values.Set(\"grant_type\", \"authorization_code\")\n values.Set(\"code\", cred.Code)\n values.Set(\"redirect_uri\", cred.Callback)\n\n token := UAAToken{}\n resp, err := cred.SendRequest(values, cred.TokenURL, \"GET\", \"Basic\", &token)\n if err != nil {\n w.WriteHeader(http.StatusUnauthorized)\n w.Write(getJSONErrorFromString(fmt.Sprintf(\"TokenError:%s\", err)))\n return GetAccessTokenFromCodeError\n }\n if resp.StatusCode != 200 {\n w.WriteHeader(http.StatusUnauthorized)\n w.Write(getJSONErrorFromString(fmt.Sprintf(\"TokenError: HTTP status code: %s\", err)))\n return GetAccessTokenFromCodeError\n }\n cred.Token = token\n return nil\n}", "title": "" }, { "docid": "a183c8ea3abda196e807c3bde572f027", "score": "0.5324743", "text": "func GenerateAuthCode() string {\n\ttoken := uuid.New().String()\n\treturn strings.TrimRight(base64.URLEncoding.EncodeToString([]byte(token)), \"=\")\n}", "title": "" }, { "docid": "b8ad36e3b0c9712f06157ba2f7835cfb", "score": "0.5313379", "text": "func (o *NodesGetUnauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "881abaa8cd8887a0690354db0b57178d", "score": "0.5310193", "text": "func (w *WebStrategy) handleAuthorizationCodeFlow(request *authnz.RequestMsg, action *engine.Action) (*authnz.HandleAuthnZResponse, error) {\n\tredirectURI := buildRequestURL(request) + callbackEndpoint\n\t// / Build and store session state\n\tstate, stateCookie, err := w.buildStateParam(action.Client)\n\tif err != nil {\n\t\tzap.L().Info(\"Could not generate state parameter\", zap.Error(err), zap.String(\"client_name\", action.Client.Name()))\n\t\treturn nil, err\n\t}\n\tzap.S().Debugf(\"Initiating redirect to identity provider using redirect URL: %s\", redirectURI)\n\treturn &authnz.HandleAuthnZResponse{\n\t\tResult: &v1beta1.CheckResult{\n\t\t\tStatus: rpc.Status{\n\t\t\t\tCode: int32(rpc.UNAUTHENTICATED), // Response tells Mixer to reject request\n\t\t\t\tMessage: \"Redirecting to identity provider\",\n\t\t\t\tDetails: []*types.Any{status.PackErrorDetail(&policy.DirectHttpResponse{\n\t\t\t\t\tCode: policy.Found, // Response Mixer remaps on request\n\t\t\t\t\tHeaders: map[string]string{\n\t\t\t\t\t\tlocation: generateAuthorizationURL(action.Client, redirectURI, state),\n\t\t\t\t\t\tsetCookie: stateCookie.String(),\n\t\t\t\t\t},\n\t\t\t\t})},\n\t\t\t},\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "7143e3587d5dfd7b1f973a6ea992c6e5", "score": "0.5304043", "text": "func (o *PostAssetDeviceClaimsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "884a63f9cb9796ed3a07976f248bae3a", "score": "0.5303503", "text": "func getPutCode(r *http.Request, parms martini.Params) (*Code, error) {\n\tal := getPostCode(r, parms[\"userid\"])\n\tid, err := strconv.Atoi(parms[\"codeid\"])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tal.Id = id\n\treturn al, nil\n}", "title": "" }, { "docid": "8769c3adef9efd82a935276787416bca", "score": "0.52963614", "text": "func (srv *Service) CreateAuthorizationToken(ctx context.Context, userID int64, clientID, codeChallenge string) (*AuthorizationToken, error) {\n\tclientApp, err := clientapp.GetByClientID(clientID)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, errors.ErrorInvalidArgument, \"\")\n\t}\n\tauthorizationToken := &AuthorizationToken{\n\t\tClientID: clientApp.ID,\n\t\tUserID: userID,\n\t\tAuthorizationToken: cryptoutil.RandomToken32(),\n\t\tCodeChallenge: codeChallenge,\n\t}\n\n\terr = authorizationToken.Validate()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, errors.ErrorInvalidArgument, \"\")\n\t}\n\n\tauthorizationTokenJSON, err := json.Marshal(authorizationToken)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, errors.ErrorUnknown, \"\")\n\t}\n\n\texpiry := viper.GetDuration(\"authorization_token_expires_in\")\n\n\terr = srv.Redis.Set(AuthorizationTokenKeyPrefix+authorizationToken.AuthorizationToken, authorizationTokenJSON, expiry).Err()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, errors.ErrorUnknown, \"\")\n\t}\n\treturn authorizationToken, nil\n}", "title": "" }, { "docid": "9b80063fafba9c37ad440a190ec2d5ec", "score": "0.52929795", "text": "func CodeExchange(\n\trlog log.Ext1FieldLogger, oState *state.State, code string, networkData api.ClientMetaData,\n) *model.Response {\n\trlog.Debug(\"Handle code exchange\")\n\tauthInfo, err := authcodeinforepo.GetAuthFlowInfoByState(rlog, oState)\n\tif err != nil {\n\t\tif errors.Is(err, sql.ErrNoRows) {\n\t\t\treturn &model.Response{\n\t\t\t\tStatus: fiber.StatusBadRequest,\n\t\t\t\tResponse: api.ErrorStateMismatch,\n\t\t\t}\n\t\t}\n\t\trlog.Errorf(\"%s\", errorfmt.Full(err))\n\t\treturn model.ErrorToInternalServerErrorResponse(err)\n\t}\n\tp := provider2.GetProvider(authInfo.Issuer)\n\tif p == nil {\n\t\treturn &model.Response{\n\t\t\tStatus: fiber.StatusBadRequest,\n\t\t\tResponse: api.ErrorUnknownIssuer,\n\t\t}\n\t}\n\tparams := url.Values{}\n\tparams.Set(\"grant_type\", \"authorization_code\")\n\tparams.Set(\"code_verifier\", authInfo.CodeVerifier)\n\tparams.Set(\"code\", code)\n\tparams.Set(\"redirect_uri\", routes.RedirectURI)\n\tparams.Set(\"client_id\", p.ClientID())\n\n\thttpRes, err := p.AddClientAuthentication(httpclient.Do().R(), p.Endpoints().Token).\n\t\tSetFormDataFromValues(params).\n\t\tSetResult(&oidcreqres.OIDCTokenResponse{}).\n\t\tSetError(&oidcreqres.OIDCErrorResponse{}).\n\t\tPost(p.Endpoints().Token)\n\tif err != nil {\n\t\trlog.Errorf(\"%s\", errorfmt.Full(err))\n\t\treturn model.ErrorToInternalServerErrorResponse(err)\n\t}\n\tif errRes, ok := httpRes.Error().(*oidcreqres.OIDCErrorResponse); ok && errRes != nil && errRes.Error != \"\" {\n\t\treturn &model.Response{\n\t\t\tStatus: httpRes.RawResponse.StatusCode,\n\t\t\tResponse: model.OIDCError(errRes.Error, errRes.ErrorDescription),\n\t\t}\n\t}\n\toidcTokenRes, ok := httpRes.Result().(*oidcreqres.OIDCTokenResponse)\n\tif !ok {\n\t\treturn &model.Response{\n\t\t\tStatus: httpstatus.StatusOIDPError,\n\t\t\tResponse: model.ErrorWithoutDescription(\"could not unmarshal OP response\"),\n\t\t}\n\t}\n\n\tif oidcTokenRes.RefreshToken == \"\" {\n\t\treturn &model.Response{\n\t\t\tStatus: httpstatus.StatusOIDPError,\n\t\t\tResponse: api.ErrorNoRefreshToken,\n\t\t}\n\t}\n\tscopes := authInfo.Restrictions.GetScopes()\n\tscopesStr := oidcTokenRes.Scopes\n\tif scopesStr != \"\" {\n\t\tscopes = iutils.SplitIgnoreEmpty(scopesStr, \" \")\n\t\tauthInfo.Restrictions.SetMaxScopes(scopes) // Update restrictions with correct scopes\n\t}\n\taudiences := authInfo.Restrictions.GetAudiences()\n\tif tmp, ok := jwtutils.GetAudiencesFromJWT(rlog, oidcTokenRes.AccessToken); ok {\n\t\taudiences = tmp\n\t}\n\tauthInfo.Restrictions.SetMaxAudiences(audiences) // Update restrictions with correct audiences\n\n\toidcSub, ok := jwtutils.GetStringFromJWT(rlog, oidcTokenRes.IDToken, \"sub\")\n\tif !ok {\n\t\treturn &model.Response{\n\t\t\tStatus: httpstatus.StatusOIDPError,\n\t\t\tResponse: model.ErrorWithoutDescription(\"could not get 'subject' from id token\"),\n\t\t}\n\t}\n\tvar ste *mytokenrepo.MytokenEntry\n\tif err = db.Transact(\n\t\trlog, func(tx *sqlx.Tx) error {\n\t\t\tste, err = createMytokenEntry(rlog, tx, authInfo, oidcTokenRes.RefreshToken, oidcSub, networkData)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tat := accesstokenrepo.AccessToken{\n\t\t\t\tToken: oidcTokenRes.AccessToken,\n\t\t\t\tIP: networkData.IP,\n\t\t\t\tComment: \"Initial Access Token from authorization code flow\",\n\t\t\t\tMytoken: ste.Token,\n\t\t\t\tScopes: scopes,\n\t\t\t\tAudiences: audiences,\n\t\t\t}\n\t\t\tif err = at.Store(rlog, tx); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif authInfo.PollingCode {\n\t\t\t\tjwt, err := ste.Token.ToJWT()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tif err = transfercoderepo.LinkPollingCodeToMT(\n\t\t\t\t\trlog, tx, oState.PollingCode(rlog), jwt, ste.ID,\n\t\t\t\t); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn authcodeinforepo.DeleteAuthFlowInfoByState(rlog, tx, oState)\n\t\t},\n\t); err != nil {\n\t\trlog.Errorf(\"%s\", errorfmt.Full(err))\n\t\treturn model.ErrorToInternalServerErrorResponse(err)\n\t}\n\tif authInfo.PollingCode {\n\t\turi := \"/native\"\n\t\tif authInfo.ApplicationName != \"\" {\n\t\t\turi = fmt.Sprintf(\"%s?application=%s\", uri, authInfo.ApplicationName)\n\t\t}\n\t\treturn &model.Response{\n\t\t\tStatus: fiber.StatusSeeOther,\n\t\t\tResponse: uri,\n\t\t}\n\t}\n\tres, err := ste.Token.ToTokenResponse(rlog, authInfo.ResponseType, authInfo.MaxTokenLen, networkData, \"\")\n\tif err != nil {\n\t\trlog.Errorf(\"%s\", errorfmt.Full(err))\n\t\treturn model.ErrorToInternalServerErrorResponse(err)\n\t}\n\tvar cookie *fiber.Cookie\n\tif authInfo.ResponseType == model.ResponseTypeTransferCode {\n\t\tcookie = cookies.TransferCodeCookie(res.TransferCode, int(res.ExpiresIn))\n\t} else {\n\t\tcookie = cookies.MytokenCookie(res.Mytoken)\n\t}\n\treturn &model.Response{\n\t\tStatus: fiber.StatusSeeOther,\n\t\tResponse: ternary.IfNotEmptyOr(authInfo.RedirectURI, \"/home\"),\n\t\tCookies: []*fiber.Cookie{cookie},\n\t}\n}", "title": "" }, { "docid": "1399b6619e12cbb018559911e6878af1", "score": "0.5277616", "text": "func (o *RTRPulseSessionForbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "a834164daa4ef652a4bf1f2836b720b6", "score": "0.52693003", "text": "func (o *CreateRepository16Created) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "93cd1c514446cf591e14c507425eea83", "score": "0.5262402", "text": "func (z *Zoho) AuthorizationCodeRequest(\n\tclientID, clientSecret string,\n\tscopes []ScopeString,\n\tredirectURI string,\n) (err error) {\n\t// check for existing tokens\n\terr = z.CheckForSavedTokens()\n\tif err == nil {\n\t\tz.oauth.clientID = clientID\n\t\tz.oauth.clientSecret = clientSecret\n\t\tz.oauth.redirectURI = redirectURI\n\t\tz.oauth.scopes = scopes\n\t\treturn nil\n\t}\n\n\t// user may be able to issue a refresh if they have a refresh token, but maybe they are trying to get a new token.\n\t// a breaking change could be to provide a bool: consent - where the user forces the consent screen otherwise we will try to refresh\n\trequiresConsentPrompt := false\n\tif err == ErrTokenExpired {\n\t\t// currently we will simply check if the token is expired and if it is we will \"prompt=consent\"\n\t\trequiresConsentPrompt = true\n\t}\n\n\tscopeStr := \"\"\n\tfor i, a := range scopes {\n\t\tscopeStr += string(a)\n\t\tif i < len(scopes)-1 {\n\t\t\tscopeStr += \",\"\n\t\t}\n\t}\n\n\tz.oauth.scopes = scopes\n\n\t// q := url.Values{}\n\t// q.Set(\"scope\", scopeStr)\n\t// q.Set(\"client_id\", clientID)\n\t// q.Set(\"redirect_uri\", redirectURI)\n\t// q.Set(\"response_type\", \"code\")\n\t// q.Set(\"access_type\", \"offline\")\n\n\t// authURL := fmt.Sprintf(\"%s%s?%s\", z.oauth.baseURL, oauthAuthorizationRequestSlug, q.Encode())\n\tauthURL := z.AuthorizationCodeURL(scopeStr, clientID, redirectURI, requiresConsentPrompt)\n\n\tsrvChan := make(chan int)\n\tcodeChan := make(chan string)\n\tvar srv *http.Server\n\n\tlocalRedirect := strings.Contains(redirectURI, \"localhost\")\n\tif localRedirect {\n\t\t// start a localhost server that will handle the redirect url\n\t\tu, err := url.Parse(redirectURI)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to parse redirect URI: %s\", err)\n\t\t}\n\t\t_, port, err := net.SplitHostPort(u.Host)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to split redirect URI into host and port segments: %s\", err)\n\t\t}\n\t\tsrv = &http.Server{Addr: \":\" + port}\n\n\t\thttp.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\t\tw.Write([]byte(\"Code retrieved, you can close this window to continue\"))\n\n\t\t\tcodeChan <- r.URL.Query().Get(\"code\")\n\t\t})\n\n\t\tgo func() {\n\t\t\tsrvChan <- 1\n\t\t\terr := srv.ListenAndServe()\n\t\t\tif err != nil && err != http.ErrServerClosed {\n\t\t\t\tfmt.Printf(\"Error while serving locally: %s\\n\", err)\n\t\t\t}\n\t\t}()\n\n\t\t<-srvChan\n\t}\n\n\tfmt.Printf(\"Go to the following authentication URL to begin oAuth2 flow:\\n %s\\n\\n\", authURL)\n\n\tcode := \"\"\n\n\tif localRedirect {\n\t\t// wait for code to be returned by the server\n\t\tcode = <-codeChan\n\t\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\t\tdefer func() {\n\t\t\tcancel()\n\t\t}()\n\t\tif err := srv.Shutdown(ctx); err != nil {\n\t\t\tfmt.Printf(\"Error while shutting down local server: %s\\n\", err)\n\t\t}\n\t} else {\n\t\tfmt.Printf(\"Paste code and press enter:\\n\")\n\t\t_, err := fmt.Scan(&code)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to read code from input: %s\", err)\n\t\t}\n\t}\n\n\tif code == \"\" {\n\t\treturn fmt.Errorf(\"No code was recieved from oAuth2 flow\")\n\t}\n\n\terr = z.GenerateTokenRequest(clientID, clientSecret, code, redirectURI)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to retrieve oAuth2 token: %s\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a86800b718e705895b42597cfcd9d8c7", "score": "0.5261645", "text": "func (o *RequestDeviceEnrollmentV3OK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "ae2c5ad488b2a4e11a9795099132d859", "score": "0.5255438", "text": "func (g *Google) ExchangeCode(redirectURI, code string) (string, error) {\n\tform := url.Values{}\n\tform.Set(\"client_id\", g.ClientID)\n\tform.Set(\"client_secret\", g.ClientSecret)\n\tform.Set(\"grant_type\", \"authorization_code\")\n\tform.Set(\"redirect_uri\", redirectURI)\n\tform.Set(\"code\", code)\n\n\tres, err := http.PostForm(g.TokenURL.String(), form)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tvar token token\n\tdefer res.Body.Close()\n\terr = json.NewDecoder(res.Body).Decode(&token)\n\n\treturn token.Token, err\n}", "title": "" }, { "docid": "095b1d9350d1182f35d7a8531fe05539", "score": "0.5254563", "text": "func (o *GetNotificationsV1Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "be1125a914a2a848e14642f0bb7c3100", "score": "0.5249815", "text": "func (a *AuthContainer) getNewAccesstoken() *AuthContainer {\r\n\tvar code string\r\n\tvar err error\r\n\tcode, err = a.getCode()\r\n\tif err != nil {\r\n\t\tcodepara := url.Values{}\r\n\t\tcodepara.Set(\"client_id\", a.Cs.Cid.ClientID)\r\n\t\tcodepara.Set(\"redirect_uri\", a.Cs.Cid.Redirecturis[0])\r\n\t\tcodepara.Set(\"scope\", strings.Join(a.gogauthCfg.Scopes, \" \"))\r\n\t\tcodepara.Set(\"response_type\", \"code\")\r\n\t\tcodepara.Set(\"approval_prompt\", \"force\")\r\n\t\tcodepara.Set(\"access_type\", \"offline\")\r\n\t\tcodeurl := oauthurl + \"auth?\" + codepara.Encode()\r\n\t\tfmt.Printf(\"\\n### This is a manual input mode.\\n### Please input code retrieved by importing following URL to your browser.\\n\\n\"+\r\n\t\t\t\"[URL]==> %v\\n\"+\r\n\t\t\t\"[CODE]==>\", codeurl)\r\n\t\tif _, err := fmt.Scan(&code); err != nil {\r\n\t\t\tlog.Fatalf(\"Error: %v.\\n\", err)\r\n\t\t}\r\n\t\ta.Cs.Cid.Redirecturis = append(a.Cs.Cid.Redirecturis, a.Cs.Cid.Redirecturis[0])\r\n\t}\r\n\ttokenparams := url.Values{}\r\n\ttokenparams.Set(\"client_id\", a.Cs.Cid.ClientID)\r\n\ttokenparams.Set(\"client_secret\", a.Cs.Cid.Clientsecret)\r\n\ttokenparams.Set(\"redirect_uri\", a.Cs.Cid.Redirecturis[len(a.Cs.Cid.Redirecturis)-1])\r\n\ttokenparams.Set(\"code\", code)\r\n\ttokenparams.Set(\"grant_type\", \"authorization_code\")\r\n\tr := &utl.RequestParams{\r\n\t\tMethod: \"POST\",\r\n\t\tAPIURL: oauthurl + \"token\",\r\n\t\tData: strings.NewReader(tokenparams.Encode()),\r\n\t\tContenttype: \"application/x-www-form-urlencoded\",\r\n\t\tAccesstoken: \"\",\r\n\t\tDtime: 10,\r\n\t}\r\n\tbody, err := r.FetchAPI()\r\n\tif err != nil {\r\n\t\tfmt.Fprintf(os.Stderr, \"Error: [ %v ] - Code is wrong. \", err)\r\n\t\tos.Exit(1)\r\n\t}\r\n\tjson.Unmarshal(body, &a.Atoken)\r\n\ta.gogauthCfg.Clientid = a.Cs.Cid.ClientID\r\n\ta.gogauthCfg.Clientsecret = a.Cs.Cid.Clientsecret\r\n\ta.gogauthCfg.Refreshtoken = a.Atoken.Refreshtoken\r\n\ta.gogauthCfg.Accesstoken = a.Atoken.Accesstoken\r\n\ta.gogauthCfg.Expiresin = a.chkAtoken() - 360 // 6 minutes as adjustment time\r\n\treturn a\r\n}", "title": "" }, { "docid": "bb0aab78addd8782754a54659f0e1c8b", "score": "0.5245639", "text": "func (o *SnapmirrorPolicyCreateDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "da40895ae60eeb2c2eb34b8c47455757", "score": "0.5241689", "text": "func (o *RTRListQueuedSessionsForbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "15b14069ad86e684345716909215bcc6", "score": "0.5231743", "text": "func (o *RTRPulseSessionBadRequest) Code() int {\n\treturn 400\n}", "title": "" }, { "docid": "1bc178349d4c3ef36a49d47301fd5774", "score": "0.52185154", "text": "func GenerateCode(ctx context.Context, message string, duration time.Duration) (*models.PremiumCode, error) {\n\tkey := make([]byte, 16)\n\t_, err := rand.Read(key)\n\tif err != nil {\n\t\treturn nil, errors.WithMessage(err, \"GenerateCode\")\n\t}\n\n\tencoded := encodeKey(key)\n\n\tmodel := &models.PremiumCode{\n\t\tCode: encoded,\n\t\tMessage: message,\n\t\tPermanent: duration == -1,\n\t\tDuration: int64(duration),\n\t}\n\n\terr = model.InsertG(ctx, boil.Infer())\n\tif err != nil {\n\t\tif cast, ok := errors.Cause(err).(*pq.Error); ok {\n\t\t\tif cast.Code == \"23505\" {\n\t\t\t\treturn nil, ErrCodeCollision\n\t\t\t}\n\t\t}\n\t}\n\n\treturn model, err\n}", "title": "" }, { "docid": "8d7655100955d06bc00c570616cb92b3", "score": "0.5211905", "text": "func (o *CreateRepository10Created) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "58d17682cb018c57c12482504c94ec0e", "score": "0.5210234", "text": "func (o *CreateScanCreated) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "a627d1229e9b69ac616bbabfff5dbf94", "score": "0.52076036", "text": "func (o *AccountCreateDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "c5331d00dbab40012c66c6d6be433288", "score": "0.5200631", "text": "func exchangeAuthenticationCode(client *oauth2.Config, code string) (*oauth2.Token, error) {\n\treturn getToken(client, GrantTypeAuthCode, code)\n}", "title": "" }, { "docid": "f004e70fcb7b7ce9bd07e8cad0b7bfa5", "score": "0.5198432", "text": "func (o *CreateBlueprintRequestUsingPOST1Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "40bad9447ab3bae345efc33ca513fbba", "score": "0.5191807", "text": "func (o *RTRPulseSessionCreated) IsCode(code int) bool {\n\treturn code == 201\n}", "title": "" }, { "docid": "f643e33b895d86c1c0d26ad4e40c03bb", "score": "0.51767933", "text": "func (o *CreateRepository16Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "95b52a42c78d6f6c4fc65cab7dab5228", "score": "0.5173726", "text": "func (o *RestoreBlueprintVersionUsingPOST1Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "fde6d465f2f108587cfa2b3ba3ded6b0", "score": "0.51733226", "text": "func (o *CreateGcpStorageProfileCreated) IsCode(code int) bool {\n\treturn code == 201\n}", "title": "" }, { "docid": "1e078c6dde10d1fea3f4bf39e1dd56a1", "score": "0.5159502", "text": "func NewClientWithAuthorizationCode(ctx context.Context, oac oauth2.Config, authCode string,\n\tcustomClient *http.Client) (client AuthenticatedClient, err error) {\n\t// Spawn a clean client if necessary\n\tif customClient == nil {\n\t\tcustomClient = cleanhttp.DefaultClient()\n\t}\n\t// Prepare the oauth2 enabled client\n\tc := &Controller{\n\t\tctx: context.WithValue(ctx, oauth2.HTTPClient, customClient),\n\t}\n\t// Exchange auth code for access & refresh token\n\tif c.token, err = oac.Exchange(c.ctx, authCode,\n\t\toauth2.SetAuthURLParam(\"scope\", strings.Join(oac.Scopes, \" \")),\n\t\toauth2.SetAuthURLParam(\"redirect_uri\", oac.RedirectURL),\n\t); err != nil {\n\t\terr = fmt.Errorf(\"can not get oauth2 tokens with authorization code: %w\", err)\n\t\treturn\n\t}\n\t// Generate the oauth2 enabled http client\n\tc.http = oac.Client(c.ctx, c.token)\n\t// Return the initialized controller as Client\n\tclient = c\n\treturn\n}", "title": "" }, { "docid": "fdecc5defcd0797ea545929de887376e", "score": "0.51567304", "text": "func (o *PcloudPodcapacityGetUnauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "aa27545a3fe89288f17a81e15c89e365", "score": "0.5154781", "text": "func (o *InternalV1StorageRegionsStoragePoolsPutUnauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "744c726fbdbcefed3204699e5e5b6769", "score": "0.5153183", "text": "func (o *GetOauthClientClientIDDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "df91349c789cf773ad0bf0a9a00b8808", "score": "0.5148798", "text": "func (o *UpdateRepository34Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "title": "" }, { "docid": "da0ce15469434a706b6476641ffa34e8", "score": "0.5148764", "text": "func (o *AutosupportCreateDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "fc24d7155d6b0e38888b943e2d150ee0", "score": "0.5147284", "text": "func (op *OpenID) authzCodeFlow(r *http.Request, state AuthState) (AuthSuccessResp, AuthErrResp) {\n\t// Generate `code` for response\n\tcode, err := GetRandomString(AuthzCodeOctetsRand)\n\tif err != nil {\n\t\tutils.ELog(err, r)\n\n\t\tresp := AuthErrResp{}\n\t\tresp.Error = \"server_error\"\n\t\tresp.ErrorDescription = \"Server isn't able to fullfill your request\"\n\t\tresp.State = GetParam(r, \"state\")\n\t\treturn AuthSuccessResp{}, resp\n\t}\n\n\t// Generate response value\n\tsuc := AuthSuccessResp{ok: true}\n\tsuc.State = GetParam(r, \"state\")\n\tsuc.Code = code\n\n\t// Cache request to be able to respond with token\n\tses := Session{}\n\tses.Code = suc.Code\n\tses.ClientID = GetParam(r, \"client_id\")\n\tses.Nonce = GetParam(r, \"nonce\")\n\tses.Scope = GetParam(r, \"scope\")\n\tses.AuthTime = state.AuthTime\n\tses.MaxAge, _ = time.ParseDuration(GetParam(r, \"max_age\"))\n\tses.Acr = state.Acr\n\tses.ClaimsLocales = GetParam(r, \"claim_locales\")\n\tses.Claims, err = ReadClaimsRequest(GetParam(r, \"claims\"))\n\tif err != nil {\n\t\tutils.ELog(err, r)\n\t\t// TODO: Is it safe to continue program flow here?\n\t}\n\n\t// Now it's needed to cache this\n\top.Cache.Cache(ses)\n\n\treturn suc, AuthErrResp{}\n}", "title": "" }, { "docid": "37505ad741c77f91cb4d93a07d6b922c", "score": "0.5143835", "text": "func (o *TransferBundleCreated) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "8e9b44889e02b331148f5bb481a43f66", "score": "0.51430774", "text": "func updateNewGoogleDriveTokenFromCode(id string, code string) (tok *oauth2.Token, err *model.HTMLResponse) {\n\n\tconfig := establishGoogleDriveCreds()\n\n\ttok, erro := config.Exchange(oauth2.NoContext, code)\n\tif erro != nil {\n\t\terr = model.BuildResponse(http.StatusNotFound, model.Messages.FailedGetToken+model.EnvVariables.Google_Drive_PDS, erro.Error())\n\t\treturn\n\t}\n\n\tb, erro := json.Marshal(tok)\n\tif erro != nil {\n\t\terr = model.BuildResponse(http.StatusInternalServerError, model.Messages.FailedParseToken+model.EnvVariables.Google_Drive_PDS, erro.Error())\n\t\treturn\n\t}\n\n\terr = sm.UpdateSessionData(id, string(b), model.EnvVariables.SessionVariables.GoogleDriveToken)\n\treturn\n}", "title": "" }, { "docid": "0c092ecec380f4336ac3697d046ddbb5", "score": "0.51419574", "text": "func NewAuthorizationCodeWithDefaults() *AuthorizationCode {\n\tthis := AuthorizationCode{}\n\treturn &this\n}", "title": "" }, { "docid": "7c21cb48615d0dd4f53cfd54dab68dfe", "score": "0.51401955", "text": "func (o *RTRCreatePutFilesForbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "acc7dc7a5e87d04dac07f8b1f3ffbac1", "score": "0.51383746", "text": "func (o *CreateScanForbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "59ceff1a5ffa5b4031ac6931a8972477", "score": "0.51353383", "text": "func (o *CreateD4CGcpAccountForbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "0b58adde44b77038d497731682a6a348", "score": "0.5130158", "text": "func (o *GetTestcryptShadowCredentialsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "51a07d940bfb85f167684d16f3aff710", "score": "0.5123075", "text": "func AddCode(userId int, appId int) *models.Code {\n\tuserIdString := strconv.Itoa(userId)\n\tappIdString := strconv.Itoa(appId)\n\tv := GetCodeByKeys(\"userid\", userIdString, \"appid\", appIdString)\n\tvar u models.Code\n\tvar err error\n\tif v != nil {\n\t\tu = *v\n\t} else {\n\t\tu.Userid = uint(userId)\n\t\tu.Appid = uint(appId)\n\t\t_, err = models.AddCode(&u)\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t}\n\tu.Code = utils.RandomString(64)\n\tu.Expire = utils.TimeStamp(600)\n\terr = models.UpdateCodeById(&u)\n\tif err == nil {\n\t\treturn &u\n\t}\n\treturn nil\n}", "title": "" } ]
2a32c080e2010f5bba8eaa97dcdb1ac0
Write parses the standard logging line and passes its components to the logger for severity(lb).
[ { "docid": "e133377eb043de85327b5888eb255f3c", "score": "0.54631376", "text": "func (lb logBridge) Write(b []byte) (n int, err error) {\n\tvar (\n\t\tfile = \"???\"\n\t\tline = 1\n\t\ttext string\n\t)\n\t// Split \"d.go:23: message\" into \"d.go\", \"23\", and \"message\".\n\tif parts := bytes.SplitN(b, []byte{':'}, 3); len(parts) != 3 || len(parts[0]) < 1 || len(parts[2]) < 1 {\n\t\ttext = fmt.Sprintf(\"bad log format: %s\", b)\n\t} else {\n\t\tfile = string(parts[0])\n\t\ttext = string(parts[2][1:]) // skip leading space\n\t\tline, err = strconv.Atoi(string(parts[1]))\n\t\tif err != nil {\n\t\t\ttext = fmt.Sprintf(\"bad line number: %s\", b)\n\t\t\tline = 1\n\t\t}\n\t}\n\t// printWithFileLine with alsoToStderr=true, so standard log messages\n\t// always appear on standard error.\n\tlogging.printWithFileLine(severity.Severity(lb), logging.logger, logging.filter, file, line, true, text)\n\treturn len(b), nil\n}", "title": "" } ]
[ { "docid": "ee86eb90dae5ee5980200eb3687825e0", "score": "0.6450306", "text": "func (l *Log) write(severity string, format string, args ...interface{}) {\n\tl.mu.RLock()\n\t{\n\t\tm := fmt.Sprintf(format, args...)\n\t\tmessage := fmt.Sprintf(\"[%s] %s\\n\", severity, m)\n\t\tl.writer.Write([]byte(message))\n\t}\n\tl.mu.RUnlock()\n}", "title": "" }, { "docid": "ccc9a0dbe5d3a1b980ceafd7a8309d19", "score": "0.6204219", "text": "func (writer *Writer) Write(bs []byte, record *iface.Record) {\n\twriter.lock.Lock()\n\tdefer writer.lock.Unlock()\n\n\tseverity := writer.severities[record.Level]\n\tpriority := int(writer.facility) | int(severity)\n\terr := writer.log.Write(record.Time, priority, writer.tag, bs)\n\tif err != nil {\n\t\twriter.log.Close()\n\t\tif writer.errorHandler != nil {\n\t\t\twriter.errorHandler(bs, record, err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "5a5e5c4b86f1e8335118bb09242828f7", "score": "0.6076486", "text": "func (s *stdlogAdapter) Write(data []byte) (int, error) {\n\tstr := string(bytes.TrimRight(data, \" \\t\\n\"))\n\n\tif s.forceLevel != NoLevel {\n\t\t// Use pickLevel to strip log levels included in the line since we are\n\t\t// forcing the level\n\t\t_, str := s.pickLevel(str)\n\n\t\t// Log at the forced level\n\t\ts.dispatch(str, s.forceLevel)\n\t} else if s.inferLevels {\n\t\tif s.inferLevelsWithTimestamp {\n\t\t\tstr = s.trimTimestamp(str)\n\t\t}\n\n\t\tlevel, str := s.pickLevel(str)\n\t\ts.dispatch(str, level)\n\t} else {\n\t\ts.log.Info(str)\n\t}\n\n\treturn len(data), nil\n}", "title": "" }, { "docid": "ffec87ec6e1fd055794792a5aaab096b", "score": "0.6030928", "text": "func (l *stdLogger) Write(p []byte) (_ int, err error) {\n\tlevel := l.stdSorter(p)\n\tif level.IsEnabled(l.level) {\n\t\terr = l.logger.Output(4, formatMessage(level, \"%s\", string(p)))\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "257a8fe48b71652c5fbda027e8e0a457", "score": "0.5804189", "text": "func (m *modernLogger) Write(bytes []byte) (int, error) {\n\n\tstring_ := string(bytes)\n\n\t// splitFunc that splits at avery ' '\n\tstringSplit := func(r rune) bool {\n\t\treturn r == ' '\n\t}\n\n\t// split to access Llongfile\n\tformat := strings.FieldsFunc(string_, stringSplit)\n\n\t// find log prefix (starts with '/' and ends with ':')\n\tformatByte := []byte(format[3])\n\tprefixEnd := 2\n\tif (formatByte[0] == '/') && (formatByte[len(formatByte)-1] == ':') {\n\t\tprefixEnd = 3\n\t}\n\n\t// splitFunc for log.Llongfile\n\tlongFileSplit := func(r rune) bool {\n\t\treturn r == '/' || r == ':'\n\t}\n\tvar modernLongFile = make([]string, 3)\n\t// split log.Llongfile\n\tsubFormat := strings.FieldsFunc(format[prefixEnd], longFileSplit)\n\tcopy(modernLongFile, subFormat[len(subFormat)-3:]) // package, file, line\n\n\t// add []'s and a trailing tab\n\tformat[prefixEnd] = strings.Join([]string{\"[\", modernLongFile[0], \"]\", \"[\", modernLongFile[1], \"]\", \"[:\", modernLongFile[2], \"]\", \"\\t\"}, \"\")\n\n\t// format color\n\tformat = addColor(m.logType, prefixEnd, format)\n\n\t// join string\n\tmodernFormat := strings.Join(format, \" \")\n\n\treturn m.out.Write([]byte(modernFormat))\n}", "title": "" }, { "docid": "4d657d517e8a4e609f088d13a63680cf", "score": "0.5773916", "text": "func (wkr *worker) writeLine(ln []byte) error {\n\tif len(ln) == 0 {\n\t\treturn nil\n\t}\n\n\t// extract date\n\tt, err := wkr.extractDate(ln)\n\n\t// handle err\n\t// Discard == true: continue processing\n\t// Discard == false: halt processing, error\n\tif err != nil {\n\t\tif wkr.iOpt.Discard {\n\t\t\twkr.discardedCnt += 1\n\t\t\t// TODO: add with central logging\n\t\t\t//log.Printf(\"parse: '%v' at line %v for '%v'\", err.Error(), wkr.r.Stats().LineCnt, string(ln))\n\t\t\treturn nil\n\t\t} else {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn wkr.w.WriteLine(ln, t)\n}", "title": "" }, { "docid": "7a77936f246405d7e72a9d5b222b2700", "score": "0.5677997", "text": "func (core *SysLogCore) Write(entry zapcore.Entry, fields []zapcore.Field) error {\n\t// Generate the message.\n\tbuffer, err := core.encoder.EncodeEntry(entry, fields)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to encode log entry\")\n\t}\n\n\t//message := fmt.Sprintf(\"[metadata={process='microgateway',function='microgateway',TMG_CLUSTER_NAME='%s',TMG_ZONE_NAME='%s',POD_IP='%s'}] \", os.Getenv(\"TMG_CLUSTER_NAME\"), os.Getenv(\"TMG_ZONE_NAME\"), os.Getenv(\"POD_IP\")) + buffer.String()\n\tmessage := buffer.String()\n\n\t// Write the message.\n\tswitch entry.Level {\n\tcase zapcore.DebugLevel:\n\t\treturn core.writer.Debug(message)\n\n\tcase zapcore.InfoLevel:\n\t\treturn core.writer.Info(message)\n\n\tcase zapcore.WarnLevel:\n\t\treturn core.writer.Warning(message)\n\n\tcase zapcore.ErrorLevel:\n\t\treturn core.writer.Err(message)\n\n\tcase zapcore.DPanicLevel:\n\t\treturn core.writer.Crit(message)\n\n\tcase zapcore.PanicLevel:\n\t\treturn core.writer.Crit(message)\n\n\tcase zapcore.FatalLevel:\n\t\treturn core.writer.Crit(message)\n\n\tdefault:\n\t\treturn errors.Errorf(\"unknown log level: %v\", entry.Level)\n\t}\n}", "title": "" }, { "docid": "e26e770f9fd7dde9ef9c16908178bee6", "score": "0.5671251", "text": "func (w *writer) Write(b []byte) (int, error) {\n\tswitch w.pri {\n\tcase sInfo:\n\t\treturn len(b), w.el.Info(1, string(b))\n\tcase sWarning:\n\t\treturn len(b), w.el.Warning(3, string(b))\n\tcase sError:\n\t\treturn len(b), w.el.Error(2, string(b))\n\t}\n\treturn 0, fmt.Errorf(\"unrecognized severity: %v\", w.pri)\n}", "title": "" }, { "docid": "39e45427bcda40e70d00e8de7f7e7553", "score": "0.567083", "text": "func (splitter *OutputSplitter) Write(p []byte) (n int, err error) {\n\tif bytes.Contains(p, []byte(\"level=debug\")) || bytes.Contains(p, []byte(\"level=info\")) ||\n\t\tbytes.Contains(p, []byte(\"level=trace\")) || bytes.Contains(p, []byte(\"level=warn\")) {\n\t\treturn os.Stdout.Write(p)\n\t}\n\treturn os.Stderr.Write(p)\n}", "title": "" }, { "docid": "015379599c421eb7014d23c88100d748", "score": "0.5654696", "text": "func (l *Logger) Write(ctx context.Context, level Level, msg interface{}, extra Extra) {\n\tl.mx.Lock()\n\tdefer l.mx.Unlock()\n\n\tif msg == nil {\n\t\treturn\n\t}\n\n\tevent := NewEvent(level, msg, extra)\n\tfor _, h := range l.preHooks {\n\t\th(ctx, &event)\n\t}\n\n\tif l.level.Gt(level) {\n\t\treturn\n\t}\n\n\tformattedEvent, err := l.formatter.Format(event)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tif _, err := l.output.Write([]byte(formattedEvent + \"\\n\")); err != nil {\n\t\tpanic(err)\n\t}\n\n\tfor _, h := range l.postHooks {\n\t\th(ctx, &event)\n\t}\n}", "title": "" }, { "docid": "2b48b12cfa55deecf968dce946aabb49", "score": "0.56269485", "text": "func (l *Logger) log(level int64, v string) { l.doMsg(level, v) }", "title": "" }, { "docid": "e9df0b0978be0ef809c31ca6f9ecef93", "score": "0.557362", "text": "func (lw *LoggerWriter) Write(p []byte) (n int, err error) {\n\tInfof(lw.LogKey, \" %s: %s %s %s\", lw.FormattedSerialNumber, lw.Request.Method, SanitizeRequestURL(lw.Request, &lw.QueryValues), string(p))\n\treturn len(p), nil\n}", "title": "" }, { "docid": "d823021cc668c18143e062cdcbb6e2d0", "score": "0.55212235", "text": "func (ll *LogLine) Write() {\n\tll.mu.Lock()\n\tdefer ll.mu.Unlock()\n\tll.logger.Print(ll.buf.String())\n\tll.buf.Reset()\n}", "title": "" }, { "docid": "c2406e26c65330435228a3de73b6a311", "score": "0.55018175", "text": "func (w *Writer) Write(logline *types.Log) error {\n\tif w.stdout {\n\t\tlog.Info(logline)\n\t}\n\terr := w.checkConn()\n\tif err == nil {\n\t\terr = w.enc.Encode(logline)\n\t}\n\tw.checkError(err)\n\treturn err\n}", "title": "" }, { "docid": "24f40d7a430ba28347bd3ba38ac3b96e", "score": "0.5489803", "text": "func (l *loggingT) output(s severity.Severity, logger *logWriter, buf *buffer.Buffer, depth int, file string, line int, alsoToStderr bool) {\n\tvar isLocked = true\n\tl.mu.Lock()\n\tdefer func() {\n\t\tif isLocked {\n\t\t\t// Unlock before returning in case that it wasn't done already.\n\t\t\tl.mu.Unlock()\n\t\t}\n\t}()\n\n\tif l.traceLocation.isSet() {\n\t\tif l.traceLocation.match(file, line) {\n\t\t\tbuf.Write(dbg.Stacks(false))\n\t\t}\n\t}\n\tdata := buf.Bytes()\n\tif logger != nil {\n\t\tif logger.writeKlogBuffer != nil {\n\t\t\tlogger.writeKlogBuffer(data)\n\t\t} else {\n\t\t\t// TODO: set 'severity' and caller information as structured log info\n\t\t\t// keysAndValues := []interface{}{\"severity\", severityName[s], \"file\", file, \"line\", line}\n\t\t\tif s == severity.ErrorLog {\n\t\t\t\tlogger.WithCallDepth(depth+3).Error(nil, string(data))\n\t\t\t} else {\n\t\t\t\tlogger.WithCallDepth(depth + 3).Info(string(data))\n\t\t\t}\n\t\t}\n\t} else if l.toStderr {\n\t\tos.Stderr.Write(data)\n\t} else {\n\t\tif alsoToStderr || l.alsoToStderr || s >= l.stderrThreshold.get() {\n\t\t\tos.Stderr.Write(data)\n\t\t}\n\n\t\tif logging.logFile != \"\" {\n\t\t\t// Since we are using a single log file, all of the items in l.file array\n\t\t\t// will point to the same file, so just use one of them to write data.\n\t\t\tif l.file[severity.InfoLog] == nil {\n\t\t\t\tif err := l.createFiles(severity.InfoLog); err != nil {\n\t\t\t\t\tos.Stderr.Write(data) // Make sure the message appears somewhere.\n\t\t\t\t\tl.exit(err)\n\t\t\t\t}\n\t\t\t}\n\t\t\tl.file[severity.InfoLog].Write(data)\n\t\t} else {\n\t\t\tif l.file[s] == nil {\n\t\t\t\tif err := l.createFiles(s); err != nil {\n\t\t\t\t\tos.Stderr.Write(data) // Make sure the message appears somewhere.\n\t\t\t\t\tl.exit(err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif l.oneOutput {\n\t\t\t\tl.file[s].Write(data)\n\t\t\t} else {\n\t\t\t\tswitch s {\n\t\t\t\tcase severity.FatalLog:\n\t\t\t\t\tl.file[severity.FatalLog].Write(data)\n\t\t\t\t\tfallthrough\n\t\t\t\tcase severity.ErrorLog:\n\t\t\t\t\tl.file[severity.ErrorLog].Write(data)\n\t\t\t\t\tfallthrough\n\t\t\t\tcase severity.WarningLog:\n\t\t\t\t\tl.file[severity.WarningLog].Write(data)\n\t\t\t\t\tfallthrough\n\t\t\t\tcase severity.InfoLog:\n\t\t\t\t\tl.file[severity.InfoLog].Write(data)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif s == severity.FatalLog {\n\t\t// If we got here via Exit rather than Fatal, print no stacks.\n\t\tif atomic.LoadUint32(&fatalNoStacks) > 0 {\n\t\t\tl.mu.Unlock()\n\t\t\tisLocked = false\n\t\t\ttimeoutFlush(ExitFlushTimeout)\n\t\t\tOsExit(1)\n\t\t}\n\t\t// Dump all goroutine stacks before exiting.\n\t\t// First, make sure we see the trace for the current goroutine on standard error.\n\t\t// If -logtostderr has been specified, the loop below will do that anyway\n\t\t// as the first stack in the full dump.\n\t\tif !l.toStderr {\n\t\t\tos.Stderr.Write(dbg.Stacks(false))\n\t\t}\n\n\t\t// Write the stack trace for all goroutines to the files.\n\t\ttrace := dbg.Stacks(true)\n\t\tlogExitFunc = func(error) {} // If we get a write error, we'll still exit below.\n\t\tfor log := severity.FatalLog; log >= severity.InfoLog; log-- {\n\t\t\tif f := l.file[log]; f != nil { // Can be nil if -logtostderr is set.\n\t\t\t\tf.Write(trace)\n\t\t\t}\n\t\t}\n\t\tl.mu.Unlock()\n\t\tisLocked = false\n\t\ttimeoutFlush(ExitFlushTimeout)\n\t\tOsExit(255) // C++ uses -1, which is silly because it's anded with 255 anyway.\n\t}\n\tbuffer.PutBuffer(buf)\n\n\tif stats := severityStats[s]; stats != nil {\n\t\tatomic.AddInt64(&stats.lines, 1)\n\t\tatomic.AddInt64(&stats.bytes, int64(len(data)))\n\t}\n}", "title": "" }, { "docid": "0c5bf1066866e4a2b95c19fd071d4620", "score": "0.5483669", "text": "func (t *thundraLogManager) Write(p []byte) (n int, err error) {\n\t// We need to skip last 3 frames and additionalCalldepth for wrapper functions\n\t_, file, line, ok := runtime.Caller(3 + additionalCalldepth)\n\tadditionalCalldepth = 0 //reset it\n\tif !ok {\n\t\tfile = \"???\"\n\t\tline = 0\n\t}\n\n\tmL := &monitoredLog{\n\t\tlog: string(p),\n\t\tlogMessage: string(p),\n\t\tloggerName: fmt.Sprintf(\"%s %d\", file, line),\n\t\tlogTimestamp: plugin.GetTimestamp(),\n\t\tlogLevel: t.recentLogLevel,\n\t\tlogLevelId: t.recentLogLevelId,\n\t}\n\tt.logs = append(t.logs, mL)\n\treturn len(p), nil\n}", "title": "" }, { "docid": "9f43d96bd31ff1dd9a9be48b8c8e412a", "score": "0.54309815", "text": "func (log *Logger) write(msg LogMessage) error {\n\t//check if its a zero LogMessage\n\tif msg.M == \"\" {\n\t\treturn nil\n\t}\n\n\ttimeStamp := time.Now().Format(time.RFC3339)\n\tlogMessage := timeStamp + \" - \" + strings.ToUpper(msg.S) + \" - \" + msg.M\n\n\tif msg.D == \"system\" {\n\t\t_, err := log.SystemLog.WriteString(logMessage + \"\\n\")\n\t\tif err != nil {\n\t\t\treturn errors.New(\"Logger: Failed to write to system log file, with error: \" + err.Error())\n\t\t}\n\t} else if msg.D == \"network\" {\n\t\t_, err := log.NetworkLog.WriteString(logMessage + \"\\n\")\n\t\tif err != nil {\n\t\t\treturn errors.New(\"Logger: Failed to write to network log file, with error: \" + err.Error())\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1943c7816b34344b494e74a0ba35f65a", "score": "0.54303545", "text": "func (s *stepSaver) WriteLog(l *logLine) error {\n\tstoredLine := storedLogLine{\n\t\tTime: l.Time,\n\t\tMessage: l.Message,\n\t\tLine: s.lineCount,\n\t\tStepName: l.Step,\n\t}\n\n\tif len(storedLine.Message) > maxLineSize {\n\t\tvar buffer bytes.Buffer\n\t\tbuffer.WriteString(storedLine.Message[:maxLineSize])\n\t\tbuffer.WriteString(fmt.Sprintf(\" [line truncated after %d characters]\", maxLineSize))\n\t\tstoredLine.Message = buffer.String()\n\t}\n\tif err := s.encoder.Encode(storedLine); err != nil {\n\t\treturn fmt.Errorf(\"marshaling log line %v: %v\", storedLine, err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3da1cde052b257417fb0f41ec5d011cd", "score": "0.53870875", "text": "func (l *Logger) Write(cls LogClassification, message string) {\n\tif l.lst == nil || !l.Should(cls) {\n\t\treturn\n\t}\n\tl.lst(cls, message)\n}", "title": "" }, { "docid": "2321a22c95bb454ef0cc14960900bcfc", "score": "0.5384305", "text": "func (l *Logger) write(level Level, message string) {\n\tl.mu.Lock()\n\tdefer l.mu.Unlock()\n\n\tfor _, backend := range l.backends {\n\t\tif backend.Level() >= level {\n\t\t\tbackend.Write(level, message)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "bdd4e26d15fd99e4fdad94bfcc1264f1", "score": "0.5377832", "text": "func (r *Log) Write(p []byte) (int, error) {\n\tr.lines++\n\tfmt.Println(strings.TrimRight(string(p), \"\\n\"))\n\tlineData := LogLine{\n\t\tName: r.name,\n\t\tTime: time.Now(),\n\t\tStream: r.stream,\n\t\tMessage: strings.TrimSpace(string(p)),\n\t}\n\n\tjsonContent, err := json.Marshal(lineData)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"could not prepare log line\")\n\t}\n\n\tline := fmt.Sprintln(string(jsonContent))\n\tcount, err := r.file.Write([]byte(line))\n\tif err != nil {\n\t\tfmt.Println(\"Error\")\n\t\treturn count, errors.Wrap(err, \"could not write log line\")\n\t}\n\treturn len(p), nil\n}", "title": "" }, { "docid": "8012de7bb67428998e470efdbf064072", "score": "0.5361411", "text": "func (t *TextLogger) writeLine(output io.Writer, prefix, msg string) {\n\tfmt.Fprintf(output, \"%s %s %s\\n\", prefix, time.Now().Local().Format(\"Mon Jan 2 15:04:05 2006\"), msg)\n}", "title": "" }, { "docid": "1c775a79d0725275e8eeb9110956f512", "score": "0.53309315", "text": "func (l *Logger) lprintln(lv Level, v ...interface{}) { _ = l.Output(lv, 4, fmt.Sprintln(v...)) }", "title": "" }, { "docid": "28750462ca7fb26e4008a0cb78352216", "score": "0.5324867", "text": "func (o *os) log(l Level, m string) error {\n\t// discard if we're not at the right level\n\tif l < o.opts.Level {\n\t\treturn nil\n\t}\n\n\te := &Event{\n\t\tTimestamp: time.Now().Format(\"2006-1-2 15:04:05\"),\n\t\tLevel: l,\n\t\tFields: o.opts.Fields,\n\t\tMessage: m,\n\t}\n\n\t// write directly.\n\tif err := Send(e); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0b5b45b0ed90912d02133ea3beff693d", "score": "0.53208363", "text": "func writeLog(line string, file string) {\r\n\tlogLine := line\r\n\tf, err := os.OpenFile(file, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)\r\n\tcheck(err)\r\n\tdefer f.Close()\r\n\t_, err = f.WriteString(logLine + \"\\n\")\r\n\tcheck(err)\r\n}", "title": "" }, { "docid": "d25bcf8b19d72c987e15cb19432d401f", "score": "0.5307211", "text": "func (lw *LoggerWriter) Write(p []byte) (n int, err error) {\n\tLogTo(lw.LogKey, \" #%03d: %s %s %s\", lw.SerialNumber, lw.Request.Method, SanitizeRequestURL(lw.Request.URL), string(p))\n\treturn len(p), nil\n}", "title": "" }, { "docid": "8961bf61f8395238bdcbcc7ce31a8836", "score": "0.53033006", "text": "func (l *LogEntry) Write(status, totalBytes int, elapsed time.Duration) {\n\trid := GetReqID(l.req.Context())\n\tif rid != \"\" {\n\t\tfmt.Fprintf(l.buf, \"[%s] \", rid)\n\t}\n\n\tfmt.Fprintf(l.buf, \"%03d | %s | %s | \", status, humanize.IBytes(uint64(totalBytes)), elapsed)\n\tl.buf.WriteString(l.req.Host + \" | \" + l.req.Method + \" \" + l.req.RequestURI)\n\tlog.Print(l.buf.String())\n}", "title": "" }, { "docid": "9bff8919841a6c3180a87f22dd0cd611", "score": "0.52926636", "text": "func (l *SimpleLogger) Write(b []byte) (int, error) {\n\tl.rotate()\n\tvar buf bytes.Buffer\n\tbuf.WriteString(fmt.Sprintf(\"%s: \", time.Now().Format(\"Mon Jan 2 15:04:05 -0700 MST 2006\")))\n\tbuf.Write(b)\n\tif len(b) > 0 && b[len(b)-1] != '\\n' {\n\t\tbuf.WriteString(\"\\n\")\n\t}\n\treturn l.file.Write(buf.Bytes())\n}", "title": "" }, { "docid": "5a424ff7671b83fd566e0bb8be2dbb04", "score": "0.5277268", "text": "func logLevelsExample() {\n\tlDebug := log.New(os.Stdout, \"DEBUG: \", log.Lshortfile)\n\tlogFile := new(bytes.Buffer)\n\tw := SustainedMultiWriter(logFile, lDebug.Writer())\n\tlError := log.New(w, \"ERROR: \", log.Lshortfile)\n\n\tfmt.Println(\"standard output:\")\n\tlError.Print(\"cannot communicate with the database\")\n\tlDebug.Print(\"you cannot hum while holding your nose\")\n\n\tfmt.Print(\"\\nlog file contents:\\n\", logFile.String())\n}", "title": "" }, { "docid": "3a6fc43bef39defca767733cf63b78d5", "score": "0.5268675", "text": "func (lfw *logFileWrapper) Write(b []byte) (int, error) {\n\t// Sanity check - close should not have been called yet.\n\tif build.DEBUG && lfw.closed {\n\t\tpanic(\"cannot write to the logger after it has been closed\")\n\t}\n\treturn lfw.file.Write(b)\n}", "title": "" }, { "docid": "8935a039c7477860884cdb3918ba25e9", "score": "0.5262582", "text": "func (fa *FileAppender) writeLogItem(log *LogItem) {\n\n\tts := toolkit.GetTimeStamp(log.t0)\n\n\tif fa.logFile == nil {\n\t\t// output to console\n\t\tfmt.Println(ts, log.severity, log.file, log.line, log.info)\n\t\treturn\n\t}\n\n\tif fa.logFormat == \"\" {\n\t\t// no logformat specified\n\t\tfa.logFile.WriteString(log.file)\n\t\tfa.logFile.WriteString(\" \")\n\t\tfa.logFile.WriteString(log.line)\n\t\tfa.logFile.WriteString(\" \")\n\t\tfa.logFile.WriteString(log.info)\n\t\tfa.logFile.WriteString(\"\\n\")\n\t\treturn\n\t}\n\n\ts := fa.getLogFormat(log.severity)\n\n\tfor true {\n\t\tidx := strings.Index(s, \"%\")\n\t\tif idx > 0 {\n\t\t\tfa.logFile.WriteString(s[0:idx])\n\t\t\ts = s[idx:]\n\t\t} else if idx == 0 {\n\t\t\tif strings.Index(s, \"%V\") == 0 {\n\t\t\t\tfa.logFile.WriteString(getLogSeverityString(log.severity))\n\t\t\t\ts = s[2:]\n\t\t\t} else if strings.Index(s, \"%T\") == 0 {\n\t\t\t\tfa.logFile.WriteString(ts)\n\t\t\t\ts = s[2:]\n\t\t\t} else if strings.Index(s, \"%I\") == 0 {\n\t\t\t\tfa.logFile.WriteString(log.info)\n\t\t\t\ts = s[2:]\n\t\t\t} else if strings.Index(s, \"%F\") == 0 {\n\t\t\t\tfa.logFile.WriteString(path.Base(log.file))\n\t\t\t\ts = s[2:]\n\t\t\t} else if strings.Index(s, \"%L\") == 0 {\n\t\t\t\tfa.logFile.WriteString(log.line)\n\t\t\t\ts = s[2:]\n\t\t\t} else {\n\t\t\t\t// skip the %\n\t\t\t\ts = s[1:]\n\t\t\t}\n\t\t} else {\n\t\t\t// idx < 0\n\t\t\tfa.logFile.WriteString(s)\n\t\t\tbreak\n\t\t}\n\t}\n\n\tfa.logFile.WriteString(\"\\n\")\n}", "title": "" }, { "docid": "0136e92f2b829fc24986698a79be3313", "score": "0.52557933", "text": "func (l *Logger) Write(s []byte) error {\n\tif _, err := l.Logfile.Write(s); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "91ce41d11d0852ce9d70ecc2a7d1bbb7", "score": "0.52484405", "text": "func writeLog(msg ...interface{}) {\n\tlogLocker.Lock()\n\tdefer logLocker.Unlock()\n\tif *confVerbose {\n\t\tcolor.Green(fmt.Sprint(time.Now().Format(\"02_01_06-15.04.05\"), \"[WRITE] ->\", msg))\n\t}\n}", "title": "" }, { "docid": "33d57f41a5f48dfa359b63e9b8bc472c", "score": "0.5243606", "text": "func (l loggerType) Write(p []byte) (n int, err error) {\n\tif config.Logger.Level >= loggerLevelDebug {\n\t\tline := l.prefix(\"WRITE\") + string(p)\n\t\treturn l.out.Write([]byte(line))\n\t}\n\treturn 0, nil\n}", "title": "" }, { "docid": "33a44f21dec60645d37057526cbfdfe7", "score": "0.5242361", "text": "func (l *logger) Write(p []byte) (n int, err error) {\n\tdefer func() {\n\t\tif t := l.trigger; t != nil {\n\t\t\tt()\n\t\t}\n\t}()\n\n\tn, err = l.w.Write(p)\n\treturn\n}", "title": "" }, { "docid": "11c701acb47f611ef4dfda7caf9449ff", "score": "0.52415466", "text": "func logLine(message LiveLoggerMessage) {\n\tvar line string\n\tswitch message.eventType {\n\tcase \"NEW\":\n\t\tline = fmt.Sprintf(\"[ NEW ] - %s : %s\", message.source, message.message)\n\tcase \"DROP\":\n\t\tline = fmt.Sprintf(\"[ DROP ] - %s : %s\", message.source, message.message)\n\tcase \"START\":\n\t\tline = fmt.Sprintf(\"[ START ] - %s : %s\", message.source, message.message)\n\tcase \"UPDATE\":\n\t\tline = fmt.Sprintf(\"[ UPDATE ] - %s ( %6.2f %% ) : %s\", message.source, message.progress, message.message)\n\tcase \"END\":\n\t\tline = fmt.Sprintf(\"[ DONE ] - %s : %s\", message.source, message.message)\n\tdefault:\n\t\tline = fmt.Sprintf(\"%s : %s\", message.source, message.message)\n\t}\n\tfmt.Fprintln(os.Stdout, line)\n}", "title": "" }, { "docid": "146cbf206e97685d3caa62f0712fe1f5", "score": "0.523984", "text": "func (self *LoggerWriter) Write(prio Priority, tag Tag, message string) error {\n\tiov := [][]byte{\n\t\t[]byte{byte(prio)},\n\t\t[]byte(tag),\n\t\t[]byte(message),\n\t}\n\n\t// Both the tag and the message need to be null-terminated\n\tiov[1] = append(iov[1], '\\x00')\n\tiov[2] = append(iov[2], '\\x00')\n\n\t_, err := vectorio.Writev(self.f, iov)\n\treturn err\n}", "title": "" }, { "docid": "0baeab84a3184919db44ae8648af3bc6", "score": "0.5213309", "text": "func (l *logger) WriteLog(s ...interface{}) {\n\tl.Lock()\n\tdefer l.Unlock()\n\tl.buffer.WriteString(fmt.Sprintf(\"%s %s\", l.timeInterface.GetNow(), l.GetLogLevel()))\n\tl.makeLogContent(s...)\n\t//l.mysqlChan <- l.buffer.String()\n\tl.buffer.WriteString(\"\\n\")\n\tl.fd.Write(l.buffer.Bytes())\n\tl.buffer.Reset()\n}", "title": "" }, { "docid": "2bcf3894eeeff42463291b1ea45f6c57", "score": "0.52117395", "text": "func CopyStandardLogTo(name string) {\n\tsev, ok := severity.ByName(name)\n\tif !ok {\n\t\tpanic(fmt.Sprintf(\"log.CopyStandardLogTo(%q): unrecognized severity name\", name))\n\t}\n\t// Set a log format that captures the user's file and line:\n\t// d.go:23: message\n\tstdLog.SetFlags(stdLog.Lshortfile)\n\tstdLog.SetOutput(logBridge(sev))\n}", "title": "" }, { "docid": "a9da6a015348b30d5aac1c42f2127cf9", "score": "0.51972246", "text": "func (sl *StoreLogger) LogWrite(level ConfigLevel, key string, val interface{}) {\n\tlogLine := fmt.Sprintf(\"%s%s: writing level=%v key=%s val=%s\", time.Now().UTC().Format(TIME_FORMAT), LOG_NAME, level, key, val)\n\tsl.Log.Print(logLine)\n}", "title": "" }, { "docid": "c9f1d3bb2ef0c8eaa11662dc0001bb60", "score": "0.5193489", "text": "func (l *Logger) lprint(lv Level, v ...interface{}) { _ = l.Output(lv, 4, fmt.Sprint(v...)) }", "title": "" }, { "docid": "f4f24d0d0851f7c1a7f331dcb8e3b422", "score": "0.5193352", "text": "func (rf *Raft) Log(level LogLevel, a ...interface{}) {\n\tif !rf.killed() && level >= SetLogLevel {\n\t\tpc, _, ln, _ := runtime.Caller(1)\n\t\trp := regexp.MustCompile(\".+\\\\.([a-zA-Z]+)\")\n\t\tfuncName := rp.FindStringSubmatch(runtime.FuncForPC(pc).Name())[1]\n\t\tst := \"F\"\n\t\tif rf.state == Leader {\n\t\t\tst = \"L\"\n\t\t} else if rf.state == Candidate {\n\t\t\tst = \"C\"\n\t\t}\n\t\tdata := append([]interface{}{level, \"[ Server\", rf.me, \"- term\", rf.currentTerm, st, \"]\", \"[\", funcName, ln, \"]\"}, a...)\n\t\tfmt.Println(data...)\n\t}\n}", "title": "" }, { "docid": "4eab14af3184d9a0f422762d2edadffd", "score": "0.51920956", "text": "func writeMultiline(log logging.Logger, s string) {\n\tif s == \"\" {\n\t\treturn\n\t}\n\tfor _, line := range strings.Split(strings.TrimSuffix(s, \"\\n\"), \"\\n\") {\n\t\tlog.Log(line)\n\t}\n}", "title": "" }, { "docid": "3a06d48c43e22913ce29838fff8b65e7", "score": "0.5161522", "text": "func (sw syslogWriter) WriteLevel(level Level, p []byte) (n int, err error) {\r\n\tswitch level {\r\n\tcase DebugLevel:\r\n\t\terr = sw.w.Debug(string(p))\r\n\tcase InfoLevel:\r\n\t\terr = sw.w.Info(string(p))\r\n\tcase WarnLevel:\r\n\t\terr = sw.w.Warning(string(p))\r\n\tcase ErrorLevel:\r\n\t\terr = sw.w.Err(string(p))\r\n\tcase FatalLevel:\r\n\t\terr = sw.w.Emerg(string(p))\r\n\tcase PanicLevel:\r\n\t\terr = sw.w.Crit(string(p))\r\n\tcase NoLevel:\r\n\t\terr = sw.w.Info(string(p))\r\n\tdefault:\r\n\t\tpanic(\"invalid level\")\r\n\t}\r\n\tn = len(p)\r\n\treturn\r\n}", "title": "" }, { "docid": "39b17d0d5e6fde337b3da78c1b02f711", "score": "0.51438487", "text": "func (a *DBAppender) WriteLog(level string, catalog string, callin int, v ...interface{}) {\n\t// arg call in not used.\n\tcallin = 3\n\ta.mu.Lock()\n\tm := LogTable{}\n\tm.Level = level\n\tm.Catalog = catalog\n\tm.Message = fmt.Sprint(v...)\n\tm.CreateTime = time.Now()\n\n\t_, file, line, ok := runtime.Caller(callin)\n\tif !ok {\n\t\tfile = \"???\"\n\t\tline = 0\n\t}\n\n\tm.Source = file\n\tm.Line = line\n\n\t// do save\n\tif err := Insert(a.Sql, m); err != nil {\n\t\tfmt.Printf(\"Write Logger to DB Error: %v\\n\", err)\n\t}\n\n\ta.mu.Unlock()\n}", "title": "" }, { "docid": "5d0b9e1be631c81be04e2e4006f85a82", "score": "0.512644", "text": "func Write(info []byte, In string, Out string, WhoAmI string) {\n\t//Build complete String\n\tFullString := WhoAmI + \", \" + In + \", \" + Out + \", \" + string(info) + \"\\n\"\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tlogfile.Write([]byte(FullString))\n}", "title": "" }, { "docid": "1c87608e39ee3cde3267368f851b7685", "score": "0.511889", "text": "func (l *Logger) Write(ctx context.Context, e Event) {\n\t// if a formater or the output are unset, bail.\n\tif l.Formatter == nil || l.Output == nil {\n\t\treturn\n\t}\n\n\tif IsSkipWrite(ctx) {\n\t\treturn\n\t}\n\tif !l.Writable.IsEnabled(e.GetFlag()) {\n\t\treturn\n\t}\n\tif !l.WritableScopes.IsEnabled(GetPath(ctx)...) {\n\t\treturn\n\t}\n\n\terr := l.Formatter.WriteFormat(ctx, l.Output, e)\n\tif err != nil && l.Errors != nil {\n\t\tl.Errors <- err\n\t}\n}", "title": "" }, { "docid": "fbe892e35b4a9ab9c82d4cd3a09a279b", "score": "0.5117395", "text": "func Write(logtype string, message string) {\n\tsuccess := false\n\tfor _, v := range logsOutput.File {\n\t\tif v.Logtype == logtype {\n\t\t\tlog.SetOutput(v.Logoutput)\n\t\t\tlog.Println(message)\n\t\t\tsuccess = true\n\t\t}\n\t}\n\tlog.SetOutput(os.Stderr)\n\tif !success {\n\t\tlog.Println(\"Type\", logtype, \"was not assigned for log output\")\n\t}\n}", "title": "" }, { "docid": "b55397bc0b94ce182f38feec2cb3a351", "score": "0.5107914", "text": "func (m *MemoryLogger) Write(p []byte) (n int, err error) {\n\tm.addEntry(NewLogEntry(string(p), m.level))\n\treturn len(p), nil\n}", "title": "" }, { "docid": "8e3c0b036042889798d6008231047d11", "score": "0.5096262", "text": "func (l Logger) Write(p []byte) (int, error) {\n\tlg := l.getLogger()\n\tif lg == nil {\n\t\treturn 0, nil\n\t}\n\treturn lg.Write(p)\n}", "title": "" }, { "docid": "d07f4866d3ac1fc7fe51648196025e99", "score": "0.50890774", "text": "func StandardOutLogger(out SuperMarketLog) {\n\toutputFormat := \"%s\\t%s\\t%s\\t%s\"\n\tlog.Printf(\n\t\toutputFormat,\n\t\tout.Method,\n\t\tout.RequestURI,\n\t\tout.Name,\n\t\tout.Time,\n\t)\n}", "title": "" }, { "docid": "55fc68027a5fb2674d814686b7f2e3c0", "score": "0.5079274", "text": "func (l *Logger) Output(lv Level, calldepth int, s string) error {\n\tif lv >= l.min {\n\t\tif (l.flag & Llevel) != 0 {\n\t\t\treturn l.lg.Output(calldepth, fmt.Sprintf(\"[%v] %s\", lv, s))\n\t\t}\n\t\treturn l.lg.Output(calldepth, s)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e5eaca1502fe482cd8ef2718981f4efd", "score": "0.50720394", "text": "func writeRecord(w *orc.Writer, e *log.Entry) error {\n\tvar strVal string\n\tvar ok bool\n\tfields := make(map[string]string, len(e.Fields))\n\tfor k, v := range e.Fields {\n\t\tstrVal, ok = v.(string)\n\t\tif !ok {\n\t\t\t// Maybe we should log an error here?\n\t\t\tcontinue\n\t\t}\n\t\tfields[k] = strVal\n\t}\n\treturn w.Write(e.Timestamp, e.Level.String(), e.Message, fields)\n}", "title": "" }, { "docid": "1c50f36944d2fa930de982f7809b5b9d", "score": "0.5058877", "text": "func (s *SyslogWriter) Write(p []byte) (n int, err error) {\n\tp1 := deletePrefix.ReplaceAllString(string(p), \"\")\n\tlevel := \"\"\n\ttolog := string(replaceLevel.ReplaceAllStringFunc(p1, func(l string) string {\n\t\tlevel = l\n\t\treturn \"\"\n\t}))\n\tswitch level {\n\tcase \"[DEBUG] \":\n\t\ts.w.Debug(tolog)\n\tcase \"[INFO] \":\n\t\ts.w.Info(tolog)\n\tcase \"[NOTICE] \":\n\t\ts.w.Notice(tolog)\n\tcase \"[WARNING] \", \"[WARN] \":\n\t\ts.w.Warning(tolog)\n\tcase \"[ERROR] \", \"[ERR] \":\n\t\ts.w.Err(tolog)\n\tcase \"[CRIT] \":\n\t\ts.w.Crit(tolog)\n\tcase \"[ALERT] \":\n\t\ts.w.Alert(tolog)\n\tcase \"[EMERG] \":\n\t\ts.w.Emerg(tolog)\n\tdefault:\n\t\ts.w.Notice(tolog)\n\t}\n\treturn len(p), nil\n}", "title": "" }, { "docid": "a314e4e7d09260ed4eeb13a6cf816081", "score": "0.5055228", "text": "func (l *Logger) Log(level Level, msg string) {\n\tnow := time.Now() // get this early.\n\tvar file string\n\tvar line int\n\tl.mu.Lock()\n\tdefer l.mu.Unlock()\n\tif l.lev >= level {\n\t\tl.buf = l.buf[:0]\n\n\t\tif l.needCallerInfo {\n\t\t\t// release lock while getting caller info - it's expensive.\n\t\t\tl.mu.Unlock()\n\t\t\tvar ok bool\n\t\t\t_, file, line, ok = runtime.Caller(2)\n\t\t\tif !ok {\n\t\t\t\tfile = \"???\"\n\t\t\t\tline = 0\n\t\t\t}\n\t\t\t// relock\n\t\t\tl.mu.Lock()\n\t\t}\n\n\t\tfor _, layouter := range l.layouters {\n\t\t\tlayouter.layout(&l.buf, level, msg, now, file, line)\n\t\t}\n\t\tif len(l.buf) == 0 || l.buf[len(l.buf)-1] != '\\n' {\n\t\t\tl.buf = append(l.buf, '\\n')\n\t\t}\n\n\t\tfor _, lis := range l.lis {\n\t\t\tlis.Write(l.buf)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "bcfd16e2c6b72cd0820eeb53ca58db6a", "score": "0.505375", "text": "func (l *Logger) Log(msg string, priority, flags uint32) {\n\t// add timestamp and priority tag\n\tentry := fmt.Sprintf(\"[%s] %s %s\", timestamp(), tag(priority), msg)\n\t// add newline if necessary\n\tif entry[len(entry)-1] != '\\n' {\n\t\tentry += \"\\n\"\n\t}\n\n\t// check that this priority level is unmasked\n\tif priority&mask == 0 {\n\t\treturn\n\t}\n\n\t// if Trace flag is set, add trace output\n\tif flags&Trace != 0 {\n\t\tentry += \"\\tTrace:\\n\" + trace()\n\t}\n\n\t// print to each output\n\tl.mu.Lock()\n\tdefer l.mu.Unlock()\n\tif _, err := l.w.Write([]byte(entry)); err != nil {\n\t\tpanic(err)\n\t}\n\tif flags&Stdout != 0 {\n\t\tif _, err := os.Stdout.WriteString(entry); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\tif flags&Stderr != 0 && l != Default {\n\t\tif _, err := os.Stderr.WriteString(entry); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\n\t// if Exit flag set, terminate program\n\tif flags&Exit != 0 {\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "4cdf7eebaab55f603dd176479c0a9779", "score": "0.5038162", "text": "func processLine(line string, config *Config) {\n\t// build log line ... sets the json key order too\n\tlog := NewOrderedMap()\n\tif config.timestampKeySet {\n\t\tlog.Set(config.TimestampKey, time.Now().Format(timeFormat))\n\t}\n\tif config.levelKeySet {\n\t\tlog.Set(config.LevelKey, \"INFO\")\n\t}\n\tlog.Set(config.MessageKey, line)\n\n\t// preprocess the log line for general purpose cleanup\n\tif config.preprocessSet {\n\t\tif match := config.preprocessParsed.FindStringSubmatch(log.values[config.MessageKey]); match != nil {\n\t\t\tlog.StoreNamedCaptures(config.preprocessParsed, &match)\n\t\t}\n\t}\n\n\t// parse out glog\n\tif config.glogSet {\n\t\tif match := glogRegex.FindStringSubmatch(log.values[config.MessageKey]); match != nil {\n\t\t\tcaptureGlog(config, match, log)\n\t\t}\n\t}\n\n\t// apply pattern rules if any\n\tvar ignoreMetricLabels []string\n\tfor _, pattern := range config.Patterns {\n\t\tif match := pattern.regexParsed.FindStringSubmatch(log.values[config.MessageKey]); match != nil {\n\t\t\tif pattern.Discard {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// set level\n\t\t\tif pattern.levelSet {\n\t\t\t\tlog.values[config.LevelKey] = pattern.Level\n\t\t\t}\n\n\t\t\tlog.StoreNamedCaptures(pattern.regexParsed, &match)\n\t\t\tlog.Merge(pattern.Add)\n\n\t\t\tignoreMetricLabels = pattern.IgnoreMetricLabels\n\n\t\t\tbreak // a line can only match one pattern\n\t\t}\n\t}\n\n\tfmt.Println(log.ToJson())\n\n\t// remove keys nobody should be using as metrics, but can get set accidentally via captures\n\tdelete(log.values, config.MessageKey)\n\tif config.timestampKeySet {\n\t\tdelete(log.values, config.TimestampKey)\n\t}\n\n\t// remove explicitly ignored labels\n\tfor _, l := range ignoreMetricLabels {\n\t\tdelete(log.values, l)\n\t}\n\n\t// report to metrics backends\n\tif config.Prometheus != nil {\n\t\tconfig.Prometheus.Inc(log.values)\n\t}\n\tif config.Statsd != nil {\n\t\tconfig.Statsd.Inc(log.values)\n\t}\n}", "title": "" }, { "docid": "935e9b1b0b184287c267069fd28c3e36", "score": "0.5012599", "text": "func (l *LoggerAsWriter) Write(p []byte) (int, error) {\n\tfor _, logger := range l.ourLoggers {\n\t\t// Skip = 3 because this presumes that we have been called by log.Println()\n\t\t// If the caller has used log.Output or the like this will be wrong\n\t\tlogger.Log(3, l.level, string(p))\n\t}\n\treturn len(p), nil\n}", "title": "" }, { "docid": "02b9e349a1049ce14252d0c2ed8d8add", "score": "0.5009794", "text": "func (l *Logger) log(calloffset int, lvl Level, template string, fmtArgs []interface{}, fields []Field) {\n\tif !l.core.Enabled(lvl) {\n\t\tswitch lvl {\n\t\tcase PanicLevel:\n\t\t\tpanic(messagef(template, fmtArgs...))\n\t\tcase FatalLevel:\n\t\t\tos.Exit(1)\n\t\t}\n\t\treturn\n\t}\n\n\te := Entry{\n\t\tLevel: lvl,\n\t\tTime: time.Now(),\n\t\tMessage: messagef(template, fmtArgs...),\n\t\tFields: fields,\n\t\tLoggerName: l.name,\n\t\tCtx: l.ctx,\n\t}\n\n\tif l.addCaller {\n\t\te.Caller = NewEntryCaller(runtime.Caller(l.callerSkip + calloffset))\n\t}\n\n\tif err := l.core.Write(e); err != nil {\n\t\t// TODO: handle internal log errors\n\t}\n\n\t// PanicLevel and FatalLevel require additional operations\n\tswitch lvl {\n\tcase PanicLevel:\n\t\tpanic(e.Message)\n\tcase FatalLevel:\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "04c21b90b25c1428b7275ee4c8af68a6", "score": "0.5009469", "text": "func P(sev string) Line {\n\treturn &line{sev: logging.ParseSeverity(sev)}\n}", "title": "" }, { "docid": "dadd675427347b9f8f83a3b331d55fbf", "score": "0.5006232", "text": "func (f *LogFile) Level() int { return 0 }", "title": "" }, { "docid": "a758b189d4deb76d6514e566ea0a2ebf", "score": "0.49947008", "text": "func (l *Logger) Write(p []byte) (n int, err error) {\n\tif l.flags&L_CONSOLE != 0 { // Print string to terminal before writing to file\t\n\t\tfmt.Printf(\"%v\", string(p))\n\t}\n\n\tif l.flags&L_FILE != 0 { // Write to file\n\t\tn, err := l.file.Write(p)\n\t\tif err != nil {\n\t\t\treturn n, err\n\t\t}\n\t}\n\n\treturn len(p), nil\n}", "title": "" }, { "docid": "a133ba1bc723c8aaa5fadd0a3c9ffc19", "score": "0.49894154", "text": "func (l *Logger) syslogWrite(p Priority, msg string) (int, error) {\n\t// ensure it ends in a \\n\n\tnl := \"\"\n\tif !strings.HasSuffix(msg, \"\\n\") {\n\t\tnl = \"\\n\"\n\t}\n\n\terr := l.conn.writeString(p, l.hostname, l.tag, msg, nl)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\t// Note: return the length of the input, not the number of\n\t// bytes printed by Fprintf, because this must behave like\n\t// an io.Writer.\n\treturn len(msg), nil\n}", "title": "" }, { "docid": "f210206bd7b7ba2ffb8e6d52dc3c9732", "score": "0.49860105", "text": "func Log(level string) {\n\tutil.SetLevelString(level)\n}", "title": "" }, { "docid": "1406dfc78c24c822e6546a824b54caad", "score": "0.49858135", "text": "func (f *fluentdWriter) Write(p []byte) (n int, err error) {\n\tnow := time.Now()\n\n\tentry := logEntry{\n\t\tName: \"root\",\n\t\tLevelName: \"INFO\",\n\t\tSeverity: \"INFO\",\n\t\tMessage: string(p),\n\t\tTimestampSeconds: now.Unix(),\n\t\tTimestampNanos: now.Nanosecond(),\n\t}\n\n\tvar buf []byte\n\tbuf, err = json.Marshal(entry)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tbuf = append(buf, '\\n')\n\t_, err = f.w.Write(buf)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tn = len(p)\n\treturn\n}", "title": "" }, { "docid": "ac15147ede790b454e217895224f44a8", "score": "0.49844396", "text": "func (c *Chat) LogLine(llp LogLineParsed) {\n\tc.logger.LogLine(llp)\n}", "title": "" }, { "docid": "7040f1af4982219538fd0bef3661e360", "score": "0.49807099", "text": "func (a *TAdapter) Write(rec *logr.LogRec) error {\n\trus := a.Logger\n\tif rus == nil {\n\t\trus = logrus.StandardLogger()\n\t}\n\n\tentry := convertLogRec(rec, rus)\n\treturn a.hook.Fire(entry)\n}", "title": "" }, { "docid": "8f9bb0613835631b0f98c752483e14c9", "score": "0.49729306", "text": "func (coll *Collector) Write(msg string, extra map[string]interface{}) (err error) {\n\n\tm := gelf.Message{\n\t\tVersion: \"1.1\",\n\t\tHost: coll.host,\n\t\tShort: msg,\n\t\tTimeUnix: float64(time.Now().Unix()),\n\t\tLevel: 6, // info always\n\t\tFacility: \"drone\",\n\t\tExtra: extra,\n\t}\n\n\tif err = coll.writer.WriteMessage(&m); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "1d83c872e2e332da6b8094e05fe8bea0", "score": "0.49604362", "text": "func levelLog(entry *log.Entry, level std.Level, msg string) {\n\tswitch level {\n\tcase log.DebugLevel:\n\t\tentry.Debug(msg)\n\tcase log.InfoLevel:\n\t\tentry.Info(msg)\n\tcase log.WarnLevel:\n\t\tentry.Warning(msg)\n\tcase log.ErrorLevel:\n\t\tentry.Error(msg)\n\tcase log.FatalLevel:\n\t\tentry.Fatal(msg)\n\tcase log.PanicLevel:\n\t\tentry.Panic(msg)\n\t}\n}", "title": "" }, { "docid": "7a15ed91da2a69faa42198144f8fc483", "score": "0.49592856", "text": "func SyslogWrite(priority syslog.Priority, message, tag string) error {\n\tw, err := syslog.New(priority, tag)\n\tif err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\tdefer w.Close()\n\tif _, err := w.Write([]byte(message)); err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c2647ef7df258b228f0a9604aa2a9f90", "score": "0.49528182", "text": "func (f logFormatter) format(_ io.Writer, params handlers.LogFormatterParams) {\n\tf.logger.With(\n\t\tzap.Duration(\"duration\", time.Since(params.TimeStamp)),\n\t\tzap.String(\"url\", params.URL.String()),\n\t\tzap.String(\"method\", params.Request.Method),\n\t\tzap.String(\"remote_addr\", params.Request.RemoteAddr),\n\t\tzap.String(\"user_agent\", params.Request.UserAgent()),\n\t\tzap.String(\"mode\", \"access_log\"),\n\t).Info(\"Handled HTTP request\")\n}", "title": "" }, { "docid": "2cc835e03ef5ddf220fa0f518200f2e3", "score": "0.4939708", "text": "func (syslogBackend SyslogBackend) Log(entry Entry) {\n\tline := syslogBackend.FormattedLogLine(entry)\n\tsyslogBackend.writer.Write([]byte(line))\n}", "title": "" }, { "docid": "15d95330b86f4e8ba4bcae928b78f078", "score": "0.49373114", "text": "func output(w io.Writer, l Level, v ...interface{}) error {\n\tif l < level {\n\t\treturn nil\n\t}\n\t_, err := fmt.Fprint(w, colorize(l, timestamp(levelPrefix[l]+fmt.Sprintln(v...))))\n\treturn err\n}", "title": "" }, { "docid": "f71f39a20bbcc58ea91448b0a920a838", "score": "0.49342972", "text": "func (l *logger) Info(level int, msg string, kvs ...interface{}) {\n\tif l.Enabled(level) {\n\t\tvalues := copySlice(l.values)\n\t\tvalues = append(values, kvs...)\n\t\tvalues = append(values, \"msg\", msg)\n\t\tl.write(values)\n\t}\n}", "title": "" }, { "docid": "58d3521b33181c53e4374dc566b11227", "score": "0.49268463", "text": "func (l *Logger) Log(now time.Time, level string, msg string, ctx []Field) {\n\tl.mu.Lock()\n\tdefer l.mu.Unlock()\n\n\twriteTimestamp(l.w, now)\n\tl.w.WriteByte(' ')\n\twriteLevel(l.w, level)\n\tl.w.WriteByte(' ')\n\twriteMessage(l.w, msg)\n\n\tfor _, f := range l.context {\n\t\tl.w.WriteByte(' ')\n\t\tf.WriteTo(l.w)\n\t}\n\n\tfor _, f := range ctx {\n\t\tl.w.WriteByte(' ')\n\t\tf.WriteTo(l.w)\n\t}\n\n\tl.w.WriteByte('\\n')\n\n\tl.w.Flush()\n}", "title": "" }, { "docid": "ad87b02442faadcfefcaf711971946c0", "score": "0.49231312", "text": "func (l *StdLogger) output(level LogLevel, stackAdjust int, format string, args ...interface{}) {\n\tif level < Level {\n\t\treturn\n\t} \n\tll := l.dlog\n\tswitch level {\n\t\tcase Error: fallthrough\n\t\tcase Warning: ll = l.elog\n\t}\n\tif int(level) < len(headers) && int(level) >= 0 {\n\t\tformat = headers[int(level)] + format\n\t}\n\tll.Output(stackAdjust + 2, fmt.Sprintf(format, args...))\n}", "title": "" }, { "docid": "5aa1877a8479752991c38168547c17c1", "score": "0.49076372", "text": "func Add(baseLevel logLevel, writer io.Writer) {\n\tall.Add(baseLevel, writer)\n}", "title": "" }, { "docid": "9ea76e31cc9a862f06ddf47c032289b6", "score": "0.4906996", "text": "func EnableLogging(w io.Writer) {}", "title": "" }, { "docid": "7a1c74baea4991c95dd46c2039066934", "score": "0.48962986", "text": "func (lw *LoggerWriter) Write(content []byte) (int, error) {\n\treturn lw.Writer.Write(content)\n}", "title": "" }, { "docid": "53982136bb543aead6c995cf20350bcc", "score": "0.48894355", "text": "func (l *Logger) Write(p []byte) (n int, err error) {\n\tif Flags&L_CONSOLE != 0 { // Print string to terminal before writing to file\n\t\tfmt.Print(string(p))\n\t}\n\n\tif Flags&L_FILE != 0 && len(LogFilename) > 0 { // Write to file\n\t\tfilename := fmt.Sprintf(\"%s-%s.log\", LogFilename, time.Now().Format(\"20060102\"))\n\n\t\tlogFile, fileErr := os.OpenFile(filename, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0666)\n\t\tif fileErr == nil {\n\t\t\tdefer logFile.Close()\n\t\t\tlogFile.Write(p)\n\t\t}\n\t}\n\n\treturn len(p), nil\n}", "title": "" }, { "docid": "88ebd97f973bba2ba2ceff11d7294392", "score": "0.4888506", "text": "func initLogger() {\n\tlogdir := viper.GetString(\"log.log_dir\")\n\tstdout := viper.GetBool(\"log_stdout\")\n\n\tvar writer io.Writer\n\n\tif logdir != \"\" {\n\t\tfolderPath, err := filepath.Abs(logdir)\n\t\tpanicIfError(err, fmt.Sprintf(\"Error on parsing log path: %s\", logdir))\n\n\t\tabspath, err := filepath.Abs(path.Join(logdir, \"run.log\"))\n\t\tpanicIfError(err, fmt.Sprintf(\"Error on parsing log file path: %s\", logdir))\n\n\t\terr = os.MkdirAll(folderPath, os.ModePerm)\n\t\tpanicIfError(err, fmt.Sprintf(\"Error on creating log dir: %s\", folderPath))\n\n\t\tif stdout {\n\t\t\tfmt.Println(\"Will be logged to stdout and \", abspath)\n\t\t\tfileWriter := mylog.RotateLog(abspath)\n\t\t\twriter = io.MultiWriter(os.Stdout, fileWriter)\n\t\t} else {\n\t\t\tfmt.Println(\"Will be logged to \", abspath)\n\t\t\twriter = mylog.RotateLog(abspath)\n\t\t}\n\t} else {\n\t\t// stdout only\n\t\tfmt.Println(\"Will be logged to stdout\")\n\t\twriter = os.Stdout\n\t}\n\tlogrus.SetOutput(writer)\n\n\t// Only log the warning severity or above.\n\tswitch viper.GetString(\"log.level\") {\n\tcase \"panic\":\n\t\tlogrus.SetLevel(logrus.PanicLevel)\n\tcase \"fatal\":\n\t\tlogrus.SetLevel(logrus.FatalLevel)\n\tcase \"error\":\n\t\tlogrus.SetLevel(logrus.ErrorLevel)\n\tcase \"warn\":\n\t\tlogrus.SetLevel(logrus.WarnLevel)\n\tcase \"info\":\n\t\tlogrus.SetLevel(logrus.InfoLevel)\n\tcase \"debug\":\n\t\tlogrus.SetLevel(logrus.DebugLevel)\n\tcase \"trace\":\n\t\tlogrus.SetLevel(logrus.TraceLevel)\n\tdefault:\n\t\tfmt.Println(\"Unknown level\", viper.GetString(\"log.level\"), \"Set to INFO\")\n\t\tlogrus.SetLevel(logrus.InfoLevel)\n\t}\n\n\tFormatter := new(logrus.TextFormatter)\n\tFormatter.ForceColors = false\n\tFormatter.DisableColors = true\n\tFormatter.TimestampFormat = \"06-01-02 15:04:05.000000\"\n\tFormatter.FullTimestamp = true\n\tlogrus.SetFormatter(Formatter)\n\n\t// redirect standard log to logrus\n\t//log.SetOutput(logrus.StandardLogger().Writer())\n\t//log.Println(\"Standard logger. Am I here?\")\n\tlineNum := viper.GetBool(\"log_line_number\")\n\tif lineNum {\n\t\t//filenameHook := filename.NewHook()\n\t\t//filenameHook.Field = \"line\"\n\t\t//logrus.AddHook(filenameHook)\n\t\tlogrus.SetReportCaller(true)\n\t}\n\tbyLevel := viper.GetBool(\"multifile_by_level\")\n\tif byLevel && logdir != \"\" {\n\t\tpanicLog, _ := filepath.Abs(path.Join(logdir, \"panic.log\"))\n\t\tfatalLog, _ := filepath.Abs(path.Join(logdir, \"fatal.log\"))\n\t\twarnLog, _ := filepath.Abs(path.Join(logdir, \"warn.log\"))\n\t\terrorLog, _ := filepath.Abs(path.Join(logdir, \"error.log\"))\n\t\tinfoLog, _ := filepath.Abs(path.Join(logdir, \"info.log\"))\n\t\tdebugLog, _ := filepath.Abs(path.Join(logdir, \"debug.log\"))\n\t\ttraceLog, _ := filepath.Abs(path.Join(logdir, \"trace.log\"))\n\t\twriterMap := lfshook.WriterMap{\n\t\t\tlogrus.PanicLevel: mylog.RotateLog(panicLog),\n\t\t\tlogrus.FatalLevel: mylog.RotateLog(fatalLog),\n\t\t\tlogrus.WarnLevel: mylog.RotateLog(warnLog),\n\t\t\tlogrus.ErrorLevel: mylog.RotateLog(errorLog),\n\t\t\tlogrus.InfoLevel: mylog.RotateLog(infoLog),\n\t\t\tlogrus.DebugLevel: mylog.RotateLog(debugLog),\n\t\t\tlogrus.TraceLevel: mylog.RotateLog(traceLog),\n\t\t}\n\t\tlogrus.AddHook(lfshook.NewHook(\n\t\t\twriterMap,\n\t\t\tFormatter,\n\t\t))\n\t}\n\tlogger := logrus.StandardLogger()\n\tlogrus.Debug(\"Logger initialized.\")\n\tbyModule := viper.GetBool(\"multifile_by_module\")\n\tif !byModule {\n\t\tlogdir = \"\"\n\t}\n\n\tdownloader.InitLoggers(logger, logdir)\n\tfetcher.InitLoggers(logger, logdir)\n\tp2p.InitLoggers(logger, logdir)\n\tog.InitLoggers(logger, logdir)\n\tsyncer.InitLoggers(logger, logdir)\n\tannsensus.InitLoggers(logger, logdir)\n\n}", "title": "" }, { "docid": "79db469ea4640561a395655261bf93b4", "score": "0.4886565", "text": "func addStructured(\n\tctx context.Context, sev Severity, depth int, format string, args []interface{},\n) {\n\tif sev == Severity_FATAL {\n\t\t// We load the ReportingSettings from the a global singleton in this\n\t\t// call path. See the singleton's comment for a rationale.\n\t\tif sv := settings.TODO(); sv != nil {\n\t\t\terr := errors.NewWithDepthf(depth+1, format, args...)\n\t\t\tsendCrashReport(ctx, sv, err, ReportTypePanic)\n\t\t}\n\t}\n\n\tentry := MakeEntry(\n\t\tctx, sev, &mainLog.logCounter, depth+1, mainLog.redactableLogs.Get(), format, args...)\n\tif sp, el, ok := getSpanOrEventLog(ctx); ok {\n\t\teventInternal(sp, el, (sev >= Severity_ERROR), entry)\n\t}\n\tmainLog.outputLogEntry(entry)\n}", "title": "" }, { "docid": "8cce4bfcbd3e351ca481c88afa5c12a3", "score": "0.48842725", "text": "func Custom(logType string, text string) {\n\tprintLog(logType, text)\n}", "title": "" }, { "docid": "f07ba132f01662f71337e7cca5c83a6a", "score": "0.48616144", "text": "func (h *AuditLogHandler) Write(input []byte) (int, error) {\n\tn, err := h.writer.Write(input)\n\tif h.entry.Message == EndOfAuditLogChainMessage && h.key != nil {\n\t\t// here we can guarantee that crypto key will be reset for next log entry,\n\t\t// because this Write is called under logrus's lock\n\t\terr := h.formatter.SetCryptoKey(h.key)\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t}\n\treturn n, err\n}", "title": "" }, { "docid": "c00fd5da57fdbfb4c8df3cdc03a48ca3", "score": "0.48580334", "text": "func (s SmudgeLogger) Log(level smudge.LogLevel, a ...interface{}) (n int, err error) {\n\tstr := strings.TrimSuffix(fmt.Sprintln(a...), \"\\n\")\n\tswitch level {\n\tcase smudge.LogFatal:\n\t\tlog.Fatal().Msg(str)\n\tcase smudge.LogInfo:\n\t\tlog.Info().Msg(str)\n\tcase smudge.LogError:\n\t\tlog.Error().Msg(str)\n\tcase smudge.LogWarn:\n\t\tlog.Warn().Msg(str)\n\tdefault:\n\t\tlog.Debug().Msg(str)\n\t}\n\treturn 0, nil\n}", "title": "" }, { "docid": "79505204091e5a5350e0201ff0713bb1", "score": "0.4857159", "text": "func SetOutputBySeverity(name string, w io.Writer) {\n\tlogging.mu.Lock()\n\tdefer logging.mu.Unlock()\n\tsev, ok := severity.ByName(name)\n\tif !ok {\n\t\tpanic(fmt.Sprintf(\"SetOutputBySeverity(%q): unrecognized severity name\", name))\n\t}\n\trb := &redirectBuffer{\n\t\tw: w,\n\t}\n\tlogging.file[sev] = rb\n}", "title": "" }, { "docid": "7edd760870d693903cd8b88ee4b3ad61", "score": "0.485496", "text": "func CustomizeLog(loglevel int, message string) {\n\tswitch loglevel {\n\tcase 0:\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"message\": message,\n\t\t}).Error(\"\")\n\tcase 1:\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"message\": message,\n\t\t}).Warn(\"\")\n\tcase 2:\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"message\": message,\n\t\t}).Info(\"\")\n\tdefault:\n\t\tglog.Errorf(\"invalid loglevel: %d for message: %s\", loglevel, message)\n\t}\n}", "title": "" }, { "docid": "ebfbf1bb03da6a83083d95dd14f78ba3", "score": "0.4851973", "text": "func (l *fields) stageln(header string, a ...interface{}) {\n\tl.stage(header, func() string { return fmt.Sprint(a...) })\n}", "title": "" }, { "docid": "39b3f151160d9612f14e53d2c451c614", "score": "0.48510543", "text": "func (l *Log) addSTDHook(level int) {\n\t// Allow only 1 standard hook\n\tif l.tmHook == nil {\n\t\tl.tmHook = new(stdHook.Hook)\n\t\tl.tmHook.Init(level)\n\t\tl.logger.AddHook(l.tmHook)\n\t}\n}", "title": "" }, { "docid": "e29041b3c6a7d9b2feab50a31effaa20", "score": "0.4846068", "text": "func (writer *erroneousSystemLogCaptureWriter) Write(data []byte) (n int, err error) {\n\twriter.mutex.Lock()\n\tdefer writer.mutex.Unlock()\n\n\tdataCopy := make([]byte, len(data))\n\tcopy(dataCopy, data)\n\tstacktraceBytes := getStacktraceBytes()\n\tlogInfo := erroneousSystemLogInfo{\n\t\tmessage: dataCopy,\n\t\tstacktrace: stacktraceBytes,\n\t}\n\twriter.logMessages = append(writer.logMessages, logInfo)\n\treturn len(data), nil\n}", "title": "" }, { "docid": "c4aa8aab57f4541deb29526c36204cfe", "score": "0.4843098", "text": "func (writer GlogWriter) Write(data []byte) (n int, err error) {\n\tklog.Info(string(data))\n\treturn len(data), nil\n}", "title": "" }, { "docid": "7e8d1b5ae8863d813a3da2a72c0a0f24", "score": "0.48419195", "text": "func (b *ASCIIOverTCP) Logger(l Logger) {\n\tb.Handler.Logger = l\n}", "title": "" }, { "docid": "4a3515c13fc501eea7a6da891d388029", "score": "0.4838818", "text": "func write(w http.ResponseWriter, header int, body []byte, l *zap.Logger) {\n\tw.WriteHeader(header)\n\tif _, err := w.Write(body); err != nil {\n\t\tl.Error(err.Error())\n\t}\n}", "title": "" }, { "docid": "641175941e7915dc457724bdd56791d6", "score": "0.48332906", "text": "func (l *Logger) Output(level int, calldepth int, format string, v ...interface{}) error {\n\tif level < l.level {\n\t\treturn nil\n\t}\n\n\ts := fmt.Sprintf(format+\"\\n\", v...)\n\n\tlevelName := LlevelName[level]\n\n\tnow := time.Now() // get this early.\n\tvar funcName string\n\tvar pc uintptr\n\tvar file string\n\tvar line int\n\tl.mu.Lock()\n\tdefer l.mu.Unlock()\n\tif l.flag&(Lshortfile|Llongfile) != 0 {\n\t\t// Release lock while getting caller info - it's expensive.\n\t\tl.mu.Unlock()\n\t\tvar ok bool\n\t\tpc, file, line, ok = runtime.Caller(calldepth)\n\t\tfuncName = runtime.FuncForPC(pc).Name()\n\t\tif !ok {\n\t\t\tfile = \"???\"\n\t\t\tline = 0\n\t\t}\n\t\tl.mu.Lock()\n\t}\n\n\tl.FormatHeader(now, funcName, file, line, levelName)\n\n\tl.buf = append(l.buf, \" | \"...)\n\tl.buf = append(l.buf, s...)\n\tif len(s) == 0 || s[len(s)-1] != '\\n' {\n\t\tl.buf = append(l.buf, '\\n')\n\t}\n\t_, err := l.out.Write(l.buf)\n\treturn err\n}", "title": "" }, { "docid": "e944547063a2232ebacc18c224c30bde", "score": "0.4820511", "text": "func (ll *LogLink) Write(l CloudwatchLinkAddress, protocol tcpip.NetworkProtocolNumber, header []byte, payload []byte) (int, error) {\n\t// todo: replace with pcap-friendly format\n\tpl := PacketLog{ll.ProtocolToString(protocol), l.Src().String(), l.Dest().String(),\n\t\tbase64.StdEncoding.EncodeToString(header), base64.StdEncoding.EncodeToString(payload)}\n\tplBytes, err := json.Marshal(pl)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tll.writePoller.Cw <- WritePollInput{plBytes, &l}\n\treturn len(plBytes), nil\n}", "title": "" }, { "docid": "5553f43eabd17bbded6a1b4b54dbe576", "score": "0.48170906", "text": "func testPrint(t *testing.T, flag int, prefix string, pattern string, logLevel int) {\n\tbuf := new(bytes.Buffer)\n\tl := lo.New(buf, prefix, flag)\n\tl.SetLevel(logLevel)\n\n\tl.Printf(\"hello %d world\", 23)\n\n\tif l.Level() != lo.LevelDebug {\n\t\tl.Printf(\"debug: hello %d world\", 23)\n\t}\n\n\tline := buf.String()\n\tline = line[0 : len(line)-1]\n\n\tbuf.Reset()\n\n\tpattern1 := \"^\" + pattern + \"INFO hello 23 world$\"\n\tmatched, err := regexp.MatchString(pattern1, line)\n\n\tif err != nil {\n\t\tt.Fatal(\"pattern did not compile:\", err)\n\t}\n\tif !matched {\n\t\tt.Errorf(\"log output should match %q is %q\", pattern1, line)\n\t}\n\n\tif l.Level() == lo.LevelDebug {\n\t\tl.Printf(\"debug: hello %d world\", 23)\n\n\t\tline := buf.String()\n\t\tline = line[0 : len(line)-1]\n\n\t\tpattern2 := \"^\" + pattern + \"DEBUG hello 23 world$\"\n\t\tmatched, err := regexp.MatchString(pattern2, line)\n\n\t\tif err != nil {\n\t\t\tt.Fatal(\"pattern did not compile:\", err)\n\t\t}\n\t\tif !matched {\n\t\t\tt.Errorf(\"log output should match %q is %q\", pattern2, line)\n\t\t}\n\t}\n\n\tl.SetOutput(os.Stderr)\n}", "title": "" }, { "docid": "9e8933b97f3497c5bcd4719f5fa9a424", "score": "0.4807775", "text": "func (s *severity) Log(details ...Jsonable) {\n\t_, _ = log(s, details...)\n}", "title": "" }, { "docid": "96ea15f1539df30e50cd05a56f91f06d", "score": "0.4807132", "text": "func (h *FileHandler) Log(lv Level, d D) {\n\tmsg, err := json.Marshal(d)\n\tif err != nil {\n\t\treturn\n\t}\n\tswitch lv {\n\tcase _debugLevel:\n\t\th.logger.Debug(string(msg))\n\tcase _infoLevel:\n\t\th.logger.Info(string(msg))\n\tcase _warnLevel:\n\t\th.logger.Warn(string(msg))\n\tcase _errorLevel:\n\t\th.logger.Error(string(msg))\n\tcase _fatalLevel:\n\t\th.logger.Critical(string(msg))\n\tdefault:\n\t}\n}", "title": "" }, { "docid": "ef1b81851dab4ff5f8d36c32104b76f7", "score": "0.48045674", "text": "func (kv *KVServer) Log(level LogLevel, a ...interface{}) {\n\tif !kv.killed() && level >= SetLogLevel {\n\t\tpc, _, ln, _ := runtime.Caller(1)\n\t\trp := regexp.MustCompile(\".+\\\\.([a-zA-Z]+)\")\n\t\tfuncName := rp.FindStringSubmatch(runtime.FuncForPC(pc).Name())[1]\n\t\tdata := append([]interface{}{level, \"[ KV\", kv.me, \"]\", \"[\", funcName, ln, \"]\"}, a...)\n\t\tfmt.Println(data...)\n\t}\n}", "title": "" }, { "docid": "7ba2e9771aa8fefb5781850088888015", "score": "0.4801002", "text": "func (l *Logger) log(level LogLevel, message interface{}) {\n\n\tnow := time.Now()\n\tvar logType string\n\tswitch level {\n\tcase DEBUG:\n\t\tlogType = \"[DEBUG]\"\n\t\tbreak\n\tcase WARNING:\n\t\tlogType = \"[WARNING]\"\n\t\tbreak\n\tcase ERROR:\n\t\tlogType = \"[ERROR]\"\n\t\tbreak\n\tdefault:\n\t\tlogType = \"[INFO]\"\n\t\tbreak\n\n\t}\n\t// format the output in a somewhat friendly way\n\tfmt.Printf(\"[%s] - [%s]\\t[%+v]\\n\", logType, now, message)\n\n}", "title": "" } ]
c8bff0b0b9a2d2428c47a0832aa1309d
The client side logic for executing list identity command
[ { "docid": "860a10ce92ff421517808700d5b922ef", "score": "0.80104214", "text": "func (c *ClientCmd) runListIdentity(cmd *cobra.Command, args []string) error {\n\tlog.Debug(\"Entered runListIdentity\")\n\n\tid, err := c.LoadMyIdentity()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif c.dynamicIdentity.id != \"\" {\n\t\tresp, err := id.GetIdentity(c.dynamicIdentity.id, c.clientCfg.CAName)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tfmt.Printf(\"Name: %s, Type: %s, Affiliation: %s, Max Enrollments: %d, Attributes: %+v\\n\", resp.ID, resp.Type, resp.Affiliation, resp.MaxEnrollments, resp.Attributes)\n\t\treturn nil\n\t}\n\n\terr = id.GetAllIdentities(c.clientCfg.CAName, lib.IdentityDecoder)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" } ]
[ { "docid": "e850f3f83bcf29a1e4ba2d0c4909054c", "score": "0.63910514", "text": "func (a *V0alpha1ApiService) AdminListIdentitiesExecute(r V0alpha1ApiApiAdminListIdentitiesRequest) ([]Identity, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []Identity\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"V0alpha1ApiService.AdminListIdentities\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/identities\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\tif r.perPage != nil {\n\t\tlocalVarQueryParams.Add(\"per_page\", parameterToString(*r.perPage, \"\"))\n\t}\n\tif r.page != nil {\n\t\tlocalVarQueryParams.Add(\"page\", parameterToString(*r.page, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"oryAccessToken\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v JsonError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "ebcea28ca951f0a26301407aca81bd03", "score": "0.5923091", "text": "func (c *identityProviders) List(opts meta_v1.ListOptions) (result *v1.IdentityProviderList, err error) {\n\tresult = &v1.IdentityProviderList{}\n\terr = c.client.Get().\n\t\tResource(\"identityproviders\").\n\t\tVersionedParams(&opts, scheme.ParameterCodec).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "title": "" }, { "docid": "597e56ac027be091c92eac477033aa56", "score": "0.58950573", "text": "func (repository *Repository) ListIdentifiers(token string) ([]byte, error) {\n\trepository.request.Clear()\n\trepository.request.ResumptionToken = token\n\treturn repository.request.GetIdentifiers(\"oai_dc\")\n}", "title": "" }, { "docid": "14b2961f71c9b030cca82798316af0f1", "score": "0.5819499", "text": "func List() *ishell.Cmd {\n\tlist := &ishell.Cmd{\n\t\tName: \"list\",\n\t\tHelp: \"List entities\",\n\t}\n\n\tlist.AddCmd(&ishell.Cmd{\n\t\tName: \"indices\",\n\t\tHelp: \"List indices\",\n\t\tFunc: func(c *ishell.Context) {\n\t\t\tif context != nil {\n\t\t\t\tresult, err := context.ListIndices()\n\t\t\t\tif err != nil {\n\t\t\t\t\terrorMsg(c, \"Failed to retrieve list of indices: %s\", err.Error())\n\t\t\t\t}\n\t\t\t\tfor _, index := range result {\n\t\t\t\t\tvar aliases = make([]string, len(index.Aliases))\n\t\t\t\t\tfor i, alias := range index.Aliases {\n\t\t\t\t\t\taliases[i] = alias.Name\n\t\t\t\t\t}\n\t\t\t\t\taliasesstr := strings.Join(aliases, \", \")\n\t\t\t\t\tcprintlist(c, cyb(index.Name), \" [\",\n\t\t\t\t\t\tfmt.Sprintf(\"docs: %d, bytes: %d, aliases: %s\", index.DocumentCount, index.Size, hbl(aliasesstr)),\n\t\t\t\t\t\t\"]\")\n\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\terrorMsg(c, errNotConnected)\n\t\t\t}\n\t\t},\n\t})\n\n\tlist.AddCmd(&ishell.Cmd{\n\t\tName: \"nodes\",\n\t\tHelp: \"List nodes\",\n\t\tFunc: func(c *ishell.Context) {\n\t\t\tif context != nil {\n\t\t\t\tresult, err := context.ListNodes()\n\t\t\t\tif err != nil {\n\t\t\t\t\terrorMsg(c, \"Failed to retrieve list of nodes: %s\", err.Error())\n\t\t\t\t} else {\n\t\t\t\t\tfor _, node := range result {\n\t\t\t\t\t\tcprintlist(c, cyb(node.Name), \" @ \", hbl(node.Host), \" [\"+node.IP+\"]\")\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\terrorMsg(c, errNotConnected)\n\t\t\t}\n\t\t},\n\t})\n\n\treturn list\n}", "title": "" }, { "docid": "193ea95eec4f36440a8a306fc0bc4a3e", "score": "0.5644953", "text": "func (s *service) List(w http.ResponseWriter, r *http.Request) (interface{}, error) {\n\tctx := r.Context()\n\tuserID := httpapi.GetUserID(r)\n\n\tpr, err := decodePaginatedRequest(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thistory, err := s.repoMngr.LoginHistory().ByUserID(ctx, userID, pr.Limit, pr.Offset)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to lookup login history: %w\", err)\n\t}\n\n\tresponse := &listResponse{}\n\tresponse.Create(history)\n\n\treturn response, nil\n}", "title": "" }, { "docid": "fb052c6e699be54c6eddb98b7fc63c71", "score": "0.56275576", "text": "func (uc usecaseHandler) List(query application.Query) ([]user.User, error) {\n\ttrx := uc.TrxManager.Begin()\n\n\tresult, error := uc.UserRepo.List(trx, query)\n\tif error != nil {\n\t\tuc.TrxManager.Rollback(trx)\n\t\treturn nil, error\n\t}\n\n\tuc.TrxManager.Commit(trx)\n\treturn result, nil\n}", "title": "" }, { "docid": "f00808bdb8bdaf86bebe1ae5d46fdb36", "score": "0.560305", "text": "func (s *UsersServer) List(\n\tctx context.Context,\n\t_ *connect.Request[users.ListRequest],\n) (*connect.Response[users.ListResponse], error) {\n\t// if !current.Admin {\n\t// \treturn nil, connect.NewError(\n\t// \t\tconnect.CodePermissionDenied,\n\t// \t\tfmt.Errorf(\"only admins can access this resource\"),\n\t// \t)\n\t// }\n\n\tif err := ctx.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\trecords, err := s.repository.List(ctx)\n\n\tif err != nil {\n\t\treturn nil, connect.NewError(connect.CodeInternal, err)\n\t}\n\n\tpayload := make([]*types.User, len(records))\n\tfor id, record := range records {\n\t\tpayload[id] = convertUser(record)\n\t}\n\n\treturn connect.NewResponse(&users.ListResponse{\n\t\tUsers: payload,\n\t}), nil\n}", "title": "" }, { "docid": "122028a34a34a2744dbaefa52cfb3d24", "score": "0.5583584", "text": "func (r repoHandler) List(trx *gorm.DB, query application.Query) ([]user.User, error) {\n\tpayload := []user.User{}\n\n\tsearchQuery := fmt.Sprintf(\"%%%s%%\", query.Query)\n\tfmt.Print(searchQuery)\n\n\tres := trx.Where(\"email LIKE ?\", searchQuery).Find(&payload)\n\treturn payload, res.Error\n}", "title": "" }, { "docid": "04eebc0eaf04fb480e0df9015b242b39", "score": "0.5543172", "text": "func (me *PROTECTIONSOURCES_IMPL) ListProtectedObjects (\r\n environment models.Environment2Enum,\r\n id int64,\r\n allUnderHierarchy *bool) ([]*models.ProtectedVMInformation, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/public/protectionSources/protectedObjects\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //process optional query parameters\r\n _queryBuilder, err = apihelper.AppendUrlWithQueryParameters(_queryBuilder, map[string]interface{} {\r\n \"environment\" : models.Environment2EnumToValue(environment),\r\n \"id\" : id,\r\n \"allUnderHierarchy\" : allUnderHierarchy,\r\n })\r\n if err != nil {\r\n //error in query param handling\r\n return nil, err\r\n }\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Get(_queryBuilder, headers)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal []*models.ProtectedVMInformation\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "22393432308355ab07980cd8ddd8d601", "score": "0.55280393", "text": "func (u *UserCommand) List(ctx context.Context, client auth.ClientI) error {\n\tusers, err := client.GetUsers(false)\n\tif err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\tif u.format == teleport.Text {\n\t\tif len(users) == 0 {\n\t\t\tfmt.Println(\"No users found\")\n\t\t\treturn nil\n\t\t}\n\t\tt := asciitable.MakeTable([]string{\"User\", \"Roles\"})\n\t\tfor _, u := range users {\n\t\t\tt.AddRow([]string{\n\t\t\t\tu.GetName(), strings.Join(u.GetRoles(), \",\"),\n\t\t\t})\n\t\t}\n\t\tfmt.Println(t.AsBuffer().String())\n\t} else {\n\t\tout, err := json.MarshalIndent(users, \"\", \" \")\n\t\tif err != nil {\n\t\t\treturn trace.Wrap(err, \"failed to marshal users\")\n\t\t}\n\t\tfmt.Print(string(out))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d05f374ad66335bd6c28bb513e5ea01c", "score": "0.5494064", "text": "func (s *userAssignedIdentityLister) List(selector labels.Selector) (ret []*v1alpha1.UserAssignedIdentity, err error) {\n\terr = cache.ListAll(s.indexer, selector, func(m interface{}) {\n\t\tret = append(ret, m.(*v1alpha1.UserAssignedIdentity))\n\t})\n\treturn ret, err\n}", "title": "" }, { "docid": "bb1dc8afb90800c51d0b2251e24c5f09", "score": "0.54623127", "text": "func (s *service) List(w http.ResponseWriter, r *http.Request) (interface{}, error) {\n\tctx := r.Context()\n\tuserID := httpapi.GetUserID(r)\n\n\tdevices, err := s.repoMngr.Device().ByUserID(ctx, userID)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get user devices: %w\", err)\n\t}\n\n\tresp := &listResponse{}\n\tresp.Create(devices)\n\treturn resp, nil\n}", "title": "" }, { "docid": "5fa2ed3d0d67e4a2c7ea59b8d292bd57", "score": "0.54584193", "text": "func (uc UserController) List(c *gin.Context) {\n\tlog.Debug().Caller().Msg(\"users list\")\n\n\tu, err := uc.Userservice.List()\n\n\tif err != nil {\n\t\tc.AbortWithStatus(http.StatusNotFound)\n\t\tlog.Error().Caller().Err(err).Send()\n\t} else {\n\t\tc.JSON(http.StatusOK, u)\n\t}\n}", "title": "" }, { "docid": "59aefbd08884dd78bca24a4e3994cb9f", "score": "0.5457431", "text": "func (args *Batch) IdList () ([]string, error) {\n\tvar txidList []string\n\n\ttxCount, err := strconv.Atoi(args.Args.TxCount)\n\tif err != nil {\n return []string{}, err\n }\n\n\tfor txIndex := 0; txIndex < txCount; txIndex++ {\n\t\ttxid, err := args.TxId()\n\t\tif err != nil {\n\t\t\treturn []string{}, err\n\t\t}\n\t\ttxidList = append(txidList, txid)\n\t}\n\treturn txidList, nil\n}", "title": "" }, { "docid": "bfce32c1c06ab41d4aafc79d3e9aa18e", "score": "0.54320335", "text": "func (s *oIDCIdentityProviderLister) List(selector labels.Selector) (ret []*v1alpha1.OIDCIdentityProvider, err error) {\n\terr = cache.ListAll(s.indexer, selector, func(m interface{}) {\n\t\tret = append(ret, m.(*v1alpha1.OIDCIdentityProvider))\n\t})\n\treturn ret, err\n}", "title": "" }, { "docid": "44999c2d3ae8e557beac1709b4c837bd", "score": "0.5396128", "text": "func (h *Handler) List(c *gin.Context) {\n\n\tinvList, err := h.api.Inventories().List()\n\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, invList)\n}", "title": "" }, { "docid": "475eb13e151e5bc2e454deb56752b4fd", "score": "0.539191", "text": "func (u Users) List() []string {\n\tvar list []string\n\tfor _, user := range u.Users {\n\t\tlist = append(list, user.Identifier)\n\t}\n\treturn list\n}", "title": "" }, { "docid": "5d124c439ae435cb1530ae7014660b6f", "score": "0.53890526", "text": "func VaultIdentitiesGet(c *gin.Context) {\n\tc.JSON(http.StatusOK, gin.H{})\n}", "title": "" }, { "docid": "7fbf00211befe3434455db3512be34d8", "score": "0.5371454", "text": "func init_identity(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar err error\n\t//var err2 error\n\t//var idAttribute []IDAttribute\n\tfmt.Println(\"starting init_identity\")\n\n\tif len(args) < 9 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 6\")\n\t}\n\n\t//input sanitation\n\terr = sanitize_arguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tvar identity Identity\n\n\tidentity.ObjectType = \"identity\"\n\tidentity.Id = args[0]\n\tidentity.Owner.Id = args[1]\n\tidentity.Owner.Company = args[2]\n\t//fmt.Println(\"tes before loop\")\n\n\tvar attr IDAttribute\n\tattr.ObjectType = \"identity_attribute\"\n\tattr.IDSignature = \"noSig\"\n\tfor i := 3; i < 9; i++ {\n\t\t//fmt.Println(\"masuk loop, i = \", + i)\n\t\tif i%2 != 0 {\n\t\t\t//fmt.Println(\"i ganjil\")\n\t\t\tattr.IDKey = args[i]\n\t\t} else {\n\t\t\t//fmt.Println(\"i genap\")\n\t\t\tattr.IDValue = args[i]\n\t\t\tidentity.IDAttribute = append(identity.IDAttribute, attr)\n\t\t}\n\t}\n\n\t//check if new owner exists\n\towner, err := get_owner(stub, identity.Owner.Id)\n\tif err != nil {\n\t\tfmt.Println(\"Failed to find owner - \" + identity.Owner.Id)\n\t\treturn shim.Error(err.Error())\n\t}\n\n\t//check authorizing company (see note in set_owner() about how this is quirky)\n\tif owner.Company != identity.Owner.Company {\n\t\treturn shim.Error(\"The company '\" + identity.Owner.Company + \"' cannot authorize creation for '\" + owner.Company + \"'.\")\n\t}\n\n\t//check if identity id already exists\n\tidentityX, err := get_identity(stub, identity.Id)\n\tif err == nil {\n\t\tfmt.Println(\"This identity already exists - \" + identity.Id)\n\t\tfmt.Println(identityX)\n\t\treturn shim.Error(\"This identity already exists - \" + identity.Id) //all stop a identity by this id exists\n\t}\n\n\t//build the identity json string manually\n\tidentityAsBytes, _ := json.Marshal(identity)\n\t//---\n\terr = stub.PutState(identity.Id, identityAsBytes) //store identity with id as key\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tfmt.Println(\"- end init_identity\")\n\treturn shim.Success(nil)\n}", "title": "" }, { "docid": "e8ea2ea3ee177e6431476dc62b34beb6", "score": "0.53576785", "text": "func (s *IncidentsService) List(opt *IncidentsOptions) (Incidents, *http.Response, error) {\n\tvar incidents Incidents\n\tu, err := addOptions(\"incidents\", opt)\n\tif err != nil {\n\t\treturn incidents, nil, err\n\t}\n\n\n\tres, err := s.client.Get(u, &incidents)\n\tif err != nil {\n\t\treturn incidents, res, err\n\t}\n\n\treturn incidents, res, err\n}", "title": "" }, { "docid": "3c18bc2b8bb3770a4adbeb7279fdff23", "score": "0.5350388", "text": "func (o CNSRQLQueriesList) Identity() elemental.Identity {\n\n\treturn CNSRQLQueryIdentity\n}", "title": "" }, { "docid": "a4f6db9ed6eaf2734713e004d5e1654a", "score": "0.532513", "text": "func (u *User) List(c echo.Context) error {\n\treq := &domain.UserRequest{}\n\n\tif err := c.Bind(req); err != nil {\n\t\tc.Logger().Error(err)\n\t\treturn echo.NewHTTPError(http.StatusBadRequest)\n\t}\n\n\tlist, err := backend.User.UserList(*req)\n\tif err != nil {\n\t\tc.Logger().Error(err)\n\t\treturn echo.NewHTTPError(http.StatusInternalServerError)\n\t}\n\treturn c.JSON(200, list)\n}", "title": "" }, { "docid": "dcb7ea8911eaaace41e293d3afb7e24e", "score": "0.53204054", "text": "func (sp *IdentityProtocol) onRequest(s network.Stream) {\n\n\t// get request data\n\tdata := &pb.IdentityRequest{}\n\tbuf, err := ioutil.ReadAll(s)\n\tif err != nil {\n\t\ts.Reset()\n\t\tutils.LogErrorf(\"%v\", err)\n\t\treturn\n\t}\n\ts.Close()\n\n\t// unmarshal it\n\tproto.Unmarshal(buf, data)\n\tif err != nil {\n\t\tutils.LogErrorf(\"%v\", err)\n\t\treturn\n\t}\n\n\tutils.LogInfof(\"Received identity request from %s. Message: %s\", s.Conn().RemotePeer(), data.Message)\n\n\t// generate response message\n\t// utils.LogInfof(\"Sending identity response to %s. Message id: %s...\", s.Conn().RemotePeer(), data.Metadata.Id)\n\n\t// List identity index\n\tsubjectHash := subject.Hash(data.SubjectHash)\n\tvar identitySet []string\n\tset := sp.context.Cache.GetIdentitySet(subjectHash.Hex())\n\t// set, err := sp.manager.GetIdentitySet(&subjectHash)\n\tfor k := range set {\n\t\tidentitySet = append(identitySet, k.String())\n\t}\n\tresp := &pb.IdentityResponse{Metadata: NewMetadata(sp.context.Host, data.Metadata.Id, false),\n\t\tMessage: fmt.Sprintf(\"Identity response from %s\", sp.context.Host.ID()), SubjectHash: subjectHash.Byte(), IdentitySet: identitySet}\n\n\t// send the response\n\tok := SendProtoMessage(sp.context.Host, s.Conn().RemotePeer(), identityResponse, resp)\n\n\tif ok {\n\t\tutils.LogInfof(\"Identity response(%v) to %s sent.\", set, s.Conn().RemotePeer().String())\n\t}\n}", "title": "" }, { "docid": "d87db89936c0639f8ae7918c6cd43915", "score": "0.53156567", "text": "func read_identity_by_owner_id(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\tfmt.Println(\"Starting read_identity_by_owner_id\")\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments, expecting 1\")\n\t}\n\n\tvar fetchedIdentity Identity\n\towner_id := args[0]\n\townerFound := false\n\tfetchedIdentityID := \"\"\n\n\t// ---- Get Identity ---- //\n\tresultsIterator, err := stub.GetStateByRange(\"i0\", \"i9999999999999999999\")\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\tfor resultsIterator.HasNext() {\n\t\taKeyValue, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\tqueryValAsBytes := aKeyValue.Value\n\t\tvar identity Identity\n\t\tjson.Unmarshal(queryValAsBytes, &identity) //func Unmarshal(data []byte, v interface{}) error. un stringify it aka JSON.parse()\n\n\t\tif (identity.Owner.Id == owner_id) {\n\t\t\tfetchedIdentityID = identity.Id\n\t\t\townerFound = true\n\t\t}\n\t}\n\n\tif !ownerFound {\n\t\treturn shim.Error(\"Owner with ID = \" + owner_id + \" doesn't have identity or doesnt exist\")\n\t} else { //owner exists\n\n\t\tfmt.Println(\"Owner ID \" + owner_id + \" possess Identity with ID: \" + fetchedIdentityID)\n\t\t//getting requested identity\n\t\tfetchedIdentity, err = get_identity(stub, fetchedIdentityID)\n\t\tif err!=nil {\n\t\t \tfmt.Println(\"Error on get_identity\")\n\t\t \treturn shim.Error(err.Error())\n\t \t}\n\t}\n\n\tfmt.Print(\"Fetched Identity of \" + owner_id + \" - \")\n\tfmt.Println(fetchedIdentity)\n\n\tidentityAsBytes, _ := json.Marshal(fetchedIdentity)\n\n\treturn shim.Success(identityAsBytes)\n}", "title": "" }, { "docid": "608e3725328516dc32a4eb2a92b3ba03", "score": "0.5263676", "text": "func (this *hndAccountAPI) cmdAccountGetList(w http.ResponseWriter, r *http.Request) (err error) {\n\t// Get Account list from storage\n\tmngr := domain.GetAccountManager()\n\tlist, err := mngr.GetAccountList()\n\tif err != nil {\n\t\treturn this.WriteError(w, err.Error(), http.StatusNotFound)\n\t}\n\t// Write command response\n\terr = this.WriteJsonReply(w, list)\n\treturn err\n}", "title": "" }, { "docid": "5910c0d758f02b4019092a090fdedd90", "score": "0.5254637", "text": "func (me *PROTECTIONSOURCES_IMPL) ListVirtualMachines (\r\n vCenterId *int64,\r\n names []string,\r\n uuids []string,\r\n protected *bool) ([]*models.ProtectionSource, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/public/protectionSources/virtualMachines\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //process optional query parameters\r\n _queryBuilder, err = apihelper.AppendUrlWithQueryParameters(_queryBuilder, map[string]interface{} {\r\n \"vCenterId\" : vCenterId,\r\n \"names\" : names,\r\n \"uuids\" : uuids,\r\n \"protected\" : protected,\r\n })\r\n if err != nil {\r\n //error in query param handling\r\n return nil, err\r\n }\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Get(_queryBuilder, headers)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal []*models.ProtectionSource\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "2af113061654d04d2b81a26e21ec181e", "score": "0.52399135", "text": "func filterUserList(configInfo *ConfigInfo, userList UserList) (err error, userId string) {\n\tfor _, user := range userList.Resources {\n\t\tif configInfo.logLevel > 1 {\n\t\t\tuserResources, err := json.MarshalIndent(user, \"\", \"\\t\")\n\t\t\tif err == nil {\n\t\t\t\tfmt.Printf(\"userResources is %s\\n\", userResources)\n\t\t\t}\n\t\t}\n\t\tuserId = user[\"id\"].(string)\n\t\tif user[\"urn:ietf:params:scim:schemas:extension:ibm:2.0:User\"] == nil {\n\t\t\temail := \"\"\n\t\t\tif user[\"emails\"] != nil {\n\t\t\t\temail = user[\"emails\"].([]interface{})[0].(map[string]interface{})[\"value\"].(string)\n\t\t\t}\n\t\t\tcreated := user[\"meta\"].(map[string]interface{})[\"created\"]\n\t\t\tfmt.Printf(\"user %s, %s created on %s has no lastLogin or realm\\n\", userId, email, created)\n\t\t\tcontinue\n\t\t}\n\t\tlastLogin := user[\"urn:ietf:params:scim:schemas:extension:ibm:2.0:User\"].(map[string]interface{})[\"lastLogin\"]\n\t\trealm := user[\"urn:ietf:params:scim:schemas:extension:ibm:2.0:User\"].(map[string]interface{})[\"realm\"]\n\t\tif lastLogin == nil && realm == \"cloudIdentityRealm\" {\n\t\t\temail := \"\"\n\t\t\tif user[\"emails\"] != nil {\n\t\t\t\temail = user[\"emails\"].([]interface{})[0].(map[string]interface{})[\"value\"].(string)\n\t\t\t}\n\t\t\tcreated := user[\"meta\"].(map[string]interface{})[\"created\"]\n\t\t\tfmt.Printf(\"user %s, %s created on %s has no lastLogin\\n\", userId, email, created)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "54d9673ec39721b345ba5781f79ac5b8", "score": "0.5239394", "text": "func (a *V0alpha1ApiService) AdminGetIdentityExecute(r V0alpha1ApiApiAdminGetIdentityRequest) (*Identity, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue *Identity\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"V0alpha1ApiService.AdminGetIdentity\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/identities/{id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", url.PathEscape(parameterToString(r.id, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"oryAccessToken\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v JsonError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v JsonError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "78ee582ee1bf9bcdc170278bd728e818", "score": "0.5239099", "text": "func (s *BaseSimpleSqlListener) EnterIdList(ctx *IdListContext) {}", "title": "" }, { "docid": "4d3f346d8af6b798716fed3b643def20", "score": "0.5234111", "text": "func (r ListIdentityPoliciesRequest) Send(ctx context.Context) (*ListIdentityPoliciesResponse, error) {\n\tr.Request.SetContext(ctx)\n\terr := r.Request.Send()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := &ListIdentityPoliciesResponse{\n\t\tListIdentityPoliciesOutput: r.Request.Data.(*ListIdentityPoliciesOutput),\n\t\tresponse: &aws.Response{Request: r.Request},\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "cc13e27a7adad5a45c0ab17c20663fcd", "score": "0.52197176", "text": "func (a *Client) Id4MeAgentList(params *Id4MeAgentListParams) (*Id4MeAgentListOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewId4MeAgentListParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"id4MeAgentList\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/id4MeAgent/_search\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &Id4MeAgentListReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*Id4MeAgentListOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for id4MeAgentList: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "409f913461dd7ad3d861ea6432f3457c", "score": "0.521199", "text": "func getIdentidy(output chan<- Identity, upiOrID string) {\n\tvar id Identity\n\terr := api.get(\"identity/integrations/v3/identity/\"+upiOrID, &id)\n\tif err != nil {\n\t\tlogFatal(\"failed to retrieve the identity record\", err)\n\t}\n\toutput <- id\n}", "title": "" }, { "docid": "032efb7b2b745d1d808dac02bb573998", "score": "0.519974", "text": "func (o TokensList) Identity() elemental.Identity {\n\n\treturn TokenIdentity\n}", "title": "" }, { "docid": "3346635623253b17890b0453a863acf9", "score": "0.51912314", "text": "func ExecList() {\n\n\tcredentialsPath := fmt.Sprintf(\"%s/git-credentials.json\", utils.GetHomeDir())\n\n\tif utils.FileExists(credentialsPath) {\n\t\tusers := utils.GetCredentials()\n\n\t\tfmt.Println(users.List())\n\t\treturn\n\t}\n\tfmt.Println(\"git-credentials.json file does not exists.\\nGenerate it with the i (init) command.\")\n}", "title": "" }, { "docid": "9683427f9d47097c6f41af82ba54a38c", "score": "0.5189036", "text": "func (controller UsersController) List(c *gin.Context) {\n\tvar user entities.User\n\tresult, err := mongodb.GetAll(controller.MongoDBClient, Collections[\"users\"], bson.M{}, user)\n\tif err != nil {\n\t\tfmt.Printf(\"error %v\", err)\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"message\": err})\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, gin.H{\"users\": result})\n}", "title": "" }, { "docid": "04219e3d8d9a77c2d39fc0d319b80d54", "score": "0.5186468", "text": "func (m *MockIdentityRepository) Query(funcs ...func(*gorm.DB) *gorm.DB) ([]account.Identity, error) {\n\tvar identities []account.Identity\n\tidentities = append(identities, *m.testIdentity)\n\treturn identities, nil\n}", "title": "" }, { "docid": "1b6df2ac4fb80b281ca958c3dae61ee2", "score": "0.51853967", "text": "func (es *FileSystemEntityStorage) List(typeName string) ([]common.EntityID, error) {\n\tprefix := typeName + \"$\"\n\tpat := filepath.Join(es.directory, prefix+\"*\")\n\tfiles, err := filepath.Glob(pat)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tres := make([]common.EntityID, 0, len(files))\n\tprefixLen := len(prefix)\n\tfor _, fpath := range files {\n\t\t_, fn := filepath.Split(fpath)\n\t\tif !strings.HasPrefix(fn, prefix) {\n\t\t\tgwlog.Errorf(\"invalid file: %s\", fpath)\n\t\t}\n\t\tidbytes, err := base64.URLEncoding.DecodeString(fn[prefixLen:])\n\t\tif err != nil {\n\t\t\tgwlog.TraceError(\"fail to parse file %s\", fpath)\n\t\t\tcontinue\n\t\t}\n\n\t\tres = append(res, common.MustEntityID(string(idbytes)))\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "bb5430002f3d531f9414255fe9c5b966", "score": "0.5180269", "text": "func (me *PROTECTIONSOURCES_IMPL) ListProtectionSourcesRegistrationInfo (\r\n tenantIds []string,\r\n allUnderHierarchy *bool,\r\n environments []models.Environments2Enum,\r\n ids []int64,\r\n includeEntityPermissionInfo *bool,\r\n sids []string) (*models.GetRegistrationInformationResponse, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/public/protectionSources/registrationInfo\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //process optional query parameters\r\n _queryBuilder, err = apihelper.AppendUrlWithQueryParameters(_queryBuilder, map[string]interface{} {\r\n \"tenantIds\" : tenantIds,\r\n \"allUnderHierarchy\" : allUnderHierarchy,\r\n \"environments\" : models.Environments2EnumArrayToValue(environments),\r\n \"ids\" : ids,\r\n \"includeEntityPermissionInfo\" : includeEntityPermissionInfo,\r\n \"sids\" : sids,\r\n })\r\n if err != nil {\r\n //error in query param handling\r\n return nil, err\r\n }\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Get(_queryBuilder, headers)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal *models.GetRegistrationInformationResponse = &models.GetRegistrationInformationResponse{}\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "66c591b9c5035aea09ed26a5ee54c0b4", "score": "0.517097", "text": "func (o SpringCloudAppIdentityOutput) IdentityIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v SpringCloudAppIdentity) []string { return v.IdentityIds }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "b5534ed47920f14fa5bcdefc5b42eab9", "score": "0.5163234", "text": "func (s *Service) List(ctx context.Context, userContext am.UserContext, filter *am.UserFilter) (oid int, users []*am.User, err error) {\n\tserviceLog := log.With().\n\t\tInt(\"UserID\", userContext.GetUserID()).\n\t\tInt(\"OrgID\", userContext.GetOrgID()).\n\t\tStr(\"Call\", \"userservice.List\").\n\t\tStr(\"TraceID\", userContext.GetTraceID()).Logger()\n\tserviceLog.Info().Int(\"filterOrgID_parameter\", filter.OrgID).Int(\"filterStart_parameter\", filter.Start).Int(\"filterLimit_parameter\", filter.Limit).Msg(\"processing\")\n\n\tif filter.OrgID != userContext.GetOrgID() {\n\t\tif !s.IsAuthorized(ctx, userContext, am.RNUserSystem, \"read\") {\n\t\t\tserviceLog.Error().Msg(\"user not authorized orgID is not context orgid\")\n\t\t\treturn 0, nil, am.ErrUserNotAuthorized\n\t\t}\n\t\toid = filter.OrgID\n\t} else {\n\t\tif !s.IsAuthorized(ctx, userContext, am.RNUserManage, \"read\") {\n\t\t\tserviceLog.Error().Msg(\"user not authorized\")\n\t\t\treturn 0, nil, am.ErrUserNotAuthorized\n\t\t}\n\t\toid = userContext.GetOrgID()\n\t}\n\n\tvar rows *pgx.Rows\n\n\tusers = make([]*am.User, 0)\n\n\tif val, ok := filter.Filters.Bool(\"deleted\"); ok {\n\t\trows, err = s.pool.Query(\"userListWithDelete\", oid, val, filter.Start, filter.Limit)\n\t} else {\n\t\trows, err = s.pool.Query(\"userList\", oid, filter.Start, filter.Limit)\n\t}\n\n\tif err != nil {\n\t\tif err == pgx.ErrNoRows {\n\t\t\treturn 0, nil, am.ErrNoResults\n\t\t}\n\t\treturn 0, nil, err\n\t}\n\tdefer rows.Close()\n\n\tfor i := 0; rows.Next(); i++ {\n\t\tvar createTime time.Time\n\t\tvar agreeTime time.Time\n\t\tvar lastLogin time.Time\n\n\t\tuser := &am.User{}\n\n\t\tif err := rows.Scan(&user.OrgID, &user.UserID, &user.UserCID, &user.UserEmail, &user.FirstName, &user.LastName, &user.StatusID,\n\t\t\t&createTime, &user.Deleted, &user.AgreementAccepted, &agreeTime, &lastLogin); err != nil {\n\t\t\treturn 0, nil, err\n\t\t}\n\n\t\tif user.OrgID != oid {\n\t\t\treturn 0, nil, am.ErrOrgIDMismatch\n\t\t}\n\t\tuser.CreationTime = createTime.UnixNano()\n\t\tuser.AgreementAcceptedTimestamp = agreeTime.UnixNano()\n\t\tuser.LastLoginTimestamp = lastLogin.UnixNano()\n\t\tusers = append(users, user)\n\t}\n\n\treturn oid, users, nil\n}", "title": "" }, { "docid": "63deaf3226d54adc1ac558305c9eb456", "score": "0.5162866", "text": "func (c *IotHubHTTPClient) ListDeviceIDs(top int) (string, string) {\n\turl := fmt.Sprintf(\"%s/devices?top=%d&api-version=%s\", c.hostName, top, apiVersion)\n\treturn c.performRequest(\"GET\", url, \"\")\n}", "title": "" }, { "docid": "161d61725bf32294db3124f56ae26db7", "score": "0.51597846", "text": "func (t *DIC3) ListIDs(req *Request, reply *ListResponse) error {\n\tfmt.Println(\"in ListIDs:: Request ID : \", req.Id)\n\tkeys := make([]string, 0, len(dict3))\n for k := range dict3 {\n keys = append(keys, \"[\",k.KeyA,\",\", k.RelA, \"]\")\n }\n\treply.Id = req.Id\n\treply.List = keys\n\treply.Err = nil\n\treturn nil\n}", "title": "" }, { "docid": "48a124520bbd8d892ec2df19d794339d", "score": "0.51573414", "text": "func (i *Interactor) GetList(c ...Condition) ([]*User, error) {\n\treturn i.repository.GetList(c...)\n}", "title": "" }, { "docid": "d1c6238e6b1c623fc8c3273c970ae88d", "score": "0.51568216", "text": "func (u *UserAPI) List(c *gin.Context) gohttp.Response {\n\tvar queryParam schema.UserQueryParam\n\tif err := c.ShouldBindQuery(&queryParam); err != nil {\n\t\tlogger.Error(err.Error())\n\t\treturn gohttp.Response{\n\t\t\tError: errors.InvalidParams.New(),\n\t\t}\n\t}\n\n\tuser, err := u.service.List(c, &queryParam)\n\tif err != nil {\n\t\tlogger.Error(err.Error())\n\t\treturn gohttp.Response{\n\t\t\tError: err,\n\t\t}\n\t}\n\n\tvar res []schema.User\n\tcopier.Copy(&res, &user)\n\treturn gohttp.Response{\n\t\tError: errors.Success.New(),\n\t\tData: res,\n\t}\n}", "title": "" }, { "docid": "6bf402f1a27fc0086759705cf5519767", "score": "0.51523316", "text": "func (o LinuxVirtualMachineIdentityOutput) IdentityIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v LinuxVirtualMachineIdentity) []string { return v.IdentityIds }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "1c68672106a82e6e33119a4385d755ff", "score": "0.51388", "text": "func (e Endpoints) List(ctx context.Context) (users []io.User, err error) {\n\trequest := ListRequest{}\n\tresponse, err := e.ListEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn response.(ListResponse).Users, response.(ListResponse).Err\n}", "title": "" }, { "docid": "bf5c4ec8313d196e7f922b725fc2786c", "score": "0.5133681", "text": "func (o GetVirtualMachineIdentityOutput) IdentityIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v GetVirtualMachineIdentity) []string { return v.IdentityIds }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "2e1f33099baba990776de75e7ea814fa", "score": "0.5130279", "text": "func listUsers(configInfo *ConfigInfo) (err error) {\n\tusersReturned := 0\n\terr, userList := getUserList(configInfo, \"id\", \"\", \"id,meta.created,emails,urn:ietf:params:scim:schemas:extension:ibm:2.0:User:realm,meta.created,emails,urn:ietf:params:scim:schemas:extension:ibm:2.0:User:lastLogin\")\n\tif err != nil {\n\t\tfmt.Printf(\"Error %s from getUserList\\n\", err)\n\t}\n\tfor len(userList.Resources) > 0 {\n\t\tusersReturned += len(userList.Resources)\n fmt.Printf(\"Got %d users back\\n\", len(userList.Resources))\n\t\terr, userId := filterUserList(configInfo, userList)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Error %s from filterUserList\\n\", err)\n\t\t}\n\t\tnextUserId := userId + \"0\"\n\t\terr, userList = getUserList(configInfo, \"id\", nextUserId, \"id,meta.created,emails,urn:ietf:params:scim:schemas:extension:ibm:2.0:User:realm,meta.created,emails,urn:ietf:params:scim:schemas:extension:ibm:2.0:User:lastLogin\")\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Error %s from getUserList\\n\", err)\n\t\t}\n\t}\n\tfmt.Printf(\"%d users returned and filtered\\n\", usersReturned)\n\treturn\n}", "title": "" }, { "docid": "8b37df7079521cadeef468b6ef65c4bc", "score": "0.51252556", "text": "func (s userAssignedIdentityNamespaceLister) List(selector labels.Selector) (ret []*v1alpha1.UserAssignedIdentity, err error) {\n\terr = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {\n\t\tret = append(ret, m.(*v1alpha1.UserAssignedIdentity))\n\t})\n\treturn ret, err\n}", "title": "" }, { "docid": "cbcb03ccd60d6b5f37c7772b72972c1d", "score": "0.512518", "text": "func (o PollAccountsList) Identity() elemental.Identity {\n\n\treturn PollAccountIdentity\n}", "title": "" }, { "docid": "74d7283a4f316ad8113c95631072bb50", "score": "0.51222336", "text": "func (client BaseClient) ListSiteIdentifiersAssignedToHostNameResponder(resp *http.Response) (result IdentifierCollection, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "title": "" }, { "docid": "7979e04a94bac43e643b72cc57f7de1b", "score": "0.5120714", "text": "func (r *UsersSettingsCseIdentitiesService) List(userId string) *UsersSettingsCseIdentitiesListCall {\n\tc := &UsersSettingsCseIdentitiesListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.userId = userId\n\treturn c\n}", "title": "" }, { "docid": "09dfd5eaebb3058954b3dba5ce8811aa", "score": "0.51105875", "text": "func HandleGetUserList(request *restful.Request, response *restful.Response) {\n\tlog.Printf(\"call HandleGetUserList\")\n\trequestRaw := new(model.RequestUserList)\n\terr := request.ReadEntity(requestRaw)\n\tif err != nil {\n\t\thandleInternalError(response, err)\n\t\treturn\n\t}\n\tresult, err := users.GetUserList(requestRaw)\n\tif err != nil {\n\t\thandleInternalError(response, err)\n\t\treturn\n\t}\n\tresponse.WriteHeaderAndEntity(http.StatusOK, result)\n}", "title": "" }, { "docid": "9ca61cc7315d3c75bff4f9897a5c937b", "score": "0.50827324", "text": "func (b *backend) pathRoleSecretIDList(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {\n\troleName := data.Get(\"role_name\").(string)\n\tif roleName == \"\" {\n\t\treturn logical.ErrorResponse(\"missing role_name\"), nil\n\t}\n\n\tlock := b.roleLock(roleName)\n\tlock.RLock()\n\tdefer lock.RUnlock()\n\n\t// Get the role entry\n\trole, err := b.roleEntry(ctx, req.Storage, roleName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif role == nil {\n\t\treturn logical.ErrorResponse(fmt.Sprintf(\"role %q does not exist\", roleName)), nil\n\t}\n\n\t// Guard the list operation with an outer lock\n\tb.secretIDListingLock.RLock()\n\tdefer b.secretIDListingLock.RUnlock()\n\n\troleNameHMAC, err := createHMAC(role.HMACKey, role.name)\n\tif err != nil {\n\t\treturn nil, errwrap.Wrapf(\"failed to create HMAC of role_name: {{err}}\", err)\n\t}\n\n\t// Listing works one level at a time. Get the first level of data\n\t// which could then be used to get the actual SecretID storage entries.\n\tsecretIDHMACs, err := req.Storage.List(ctx, fmt.Sprintf(\"%s%s/\", role.SecretIDPrefix, roleNameHMAC))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar listItems []string\n\tfor _, secretIDHMAC := range secretIDHMACs {\n\t\t// For sanity\n\t\tif secretIDHMAC == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Prepare the full index of the SecretIDs.\n\t\tentryIndex := fmt.Sprintf(\"%s%s/%s\", role.SecretIDPrefix, roleNameHMAC, secretIDHMAC)\n\n\t\t// SecretID locks are not indexed by SecretIDs itself.\n\t\t// This is because SecretIDs are not stored in plaintext\n\t\t// form anywhere in the backend, and hence accessing its\n\t\t// corresponding lock many times using SecretIDs is not\n\t\t// possible. Also, indexing it everywhere using secretIDHMACs\n\t\t// makes listing operation easier.\n\t\tsecretIDLock := b.secretIDLock(secretIDHMAC)\n\n\t\tsecretIDLock.RLock()\n\n\t\tresult := secretIDStorageEntry{}\n\t\tif entry, err := req.Storage.Get(ctx, entryIndex); err != nil {\n\t\t\tsecretIDLock.RUnlock()\n\t\t\treturn nil, err\n\t\t} else if entry == nil {\n\t\t\tsecretIDLock.RUnlock()\n\t\t\treturn nil, fmt.Errorf(\"storage entry for SecretID is present but no content found at the index\")\n\t\t} else if err := entry.DecodeJSON(&result); err != nil {\n\t\t\tsecretIDLock.RUnlock()\n\t\t\treturn nil, err\n\t\t}\n\t\tlistItems = append(listItems, result.SecretIDAccessor)\n\t\tsecretIDLock.RUnlock()\n\t}\n\n\treturn logical.ListResponse(listItems), nil\n}", "title": "" }, { "docid": "316520c8a541559489d1a35fb09f13f8", "score": "0.50780857", "text": "func getUserList(configInfo *ConfigInfo, userAttribute, userStartingValue, attributeList string) (err error, userList UserList) {\n\terr = checkAuth(configInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\tuserEndpoint := \"/v2.0/Users\"\n\tuserQuery := \"?filter=\" + userAttribute + \"%20ge%20%22\" + userStartingValue + \"%22\"\n\tsortBy := \"&sortBy=\" + userAttribute\n\tattributes := \"\"\n\tif attributeList != \"\" {\n\t\tattributes = \"&attributes=\" + attributeList\n\t}\n\tcountLimit := \"&count=2500\"\n\tcompleteURL := \"https://\" + configInfo.tenantHostname + userEndpoint + userQuery + sortBy + attributes + countLimit\n\tif configInfo.logLevel > 0 {\n\t\tfmt.Printf(\"Calling %s\\n\", completeURL)\n\t}\n\tclient := &http.Client{\n\t\tTimeout: time.Second * 200,\n\t}\n\treq, err := http.NewRequest(\"GET\", completeURL, nil)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Received error %s creating new request from URL %s\\n\", err, completeURL)\n\t\tfailures++\n\t\treturn\n\t}\n\treq.Header.Add(\"Authorization\", \"Bearer \"+configInfo.accessToken)\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Received error %s from server\\n%s\\n\", err, configInfo.tenantHostname)\n\t\tfailures++\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\n\tif configInfo.logLevel > 0 {\n\t\tfmt.Printf(\"Received %d from %s\\n\", resp.StatusCode, configInfo.tenantHostname)\n\t}\n\n\tcontents, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Received error %s from server\\n%s\\n\", err, configInfo.tenantHostname)\n\t\tfailures++\n\t\treturn\n\t}\n\n\tif resp.StatusCode != 200 {\n\t\tfmt.Fprintf(os.Stderr, \"Received response code %d from server %s\\n%s\\n\", resp.StatusCode, configInfo.tenantHostname, contents)\n\t\tfailures++\n\t\treturn\n\t}\n\n\tif configInfo.logLevel > 1 {\n\t\tfmt.Printf(\"%s\\n\", contents)\n\t}\n\n\terr = json.Unmarshal(contents, &userList)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Error trying to unmarshal response: \\n%s \\n \", string(contents))\n\t\tfailures++\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "7d795d43fc441d76555475532c220f42", "score": "0.5075441", "text": "func (h apiHTTP) List(w http.ResponseWriter, r *http.Request) {\n\tlistRequest := paramsDecoder(r)\n\tdata, err := h.svc.FetchList(listRequest)\n\tif err != nil {\n\t\trender.Render(w, r, middleware.ErrBadRequest)\n\t\treturn\n\t}\n\trender.Respond(w, r, data)\n\treturn\n}", "title": "" }, { "docid": "1daf109bdbfd07eab0d9a45d02717ff1", "score": "0.50735784", "text": "func (exportGetList *ExportGetList) GetIDList() {\n\texportGetList.DataListFromDataBase = (new(ModelExportOperate)).FetchList()\n}", "title": "" }, { "docid": "3fa0d914cfe0b78e2863a4f5d6a6a646", "score": "0.5069751", "text": "func manageOdataIDList(name string, odataID string) model.Option {\n\treturn func(s *model.Model) error {\n\n\t\t// TODO: need to update @odata.count property, too\n\n\t\tserversList, ok := s.GetPropertyOkUnlocked(name)\n\t\tif !ok {\n\t\t\tserversList = []map[string]string{}\n\t\t}\n\t\tsl, ok := serversList.([]map[string]string)\n\t\tif !ok {\n\t\t\tsl = []map[string]string{}\n\t\t}\n\t\tsl = append(sl, map[string]string{\"@odata.id\": odataID})\n\n\t\ts.UpdatePropertyUnlocked(name, sl)\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "11f3b13ac9c80af65ca8193da8f38ab3", "score": "0.5068302", "text": "func (c *OrganizationController) List(ctx *app.ListOrganizationContext) error {\n\tcurrentUser, err := manager.ContextIdentity(ctx)\n\tif err != nil {\n\t\treturn jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError(err.Error()))\n\t}\n\n\tif currentUser == nil {\n\t\treturn jsonapi.JSONErrorResponse(ctx, errors.NewUnauthorizedError(\"error finding the current user\"))\n\t}\n\n\torgs, err := c.app.OrganizationService().ListOrganizations(ctx, *currentUser)\n\n\tif err != nil {\n\t\tlog.Error(ctx, map[string]interface{}{\n\t\t\t\"err\": err,\n\t\t}, \"failed to list organizations\")\n\t\treturn jsonapi.JSONErrorResponse(ctx, errors.NewInternalError(err))\n\t}\n\n\treturn ctx.OK(&app.OrganizationArray{Data: convertToAppOrganization(orgs)})\n}", "title": "" }, { "docid": "6b0cc9f639e4f460cf3beeb312fefb60", "score": "0.50676924", "text": "func (ir IdentityRequest) GetAllUsers(ctx context.Context) (*uiamresp.BasePage, error) {\n\tvar resp uiamresp.BasePage\n\n\tif err := httputil.Execute(ir.getRequest(ctx), \"GET\", fmt.Sprintf(\"%s/mv1/identities\", ir.ServerURL), nil, &resp); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &resp, nil\n}", "title": "" }, { "docid": "6c4cf07f1fd20b6a5b93af5a8568afdf", "score": "0.50645286", "text": "func (o VirtualMachineIdentityOutput) IdentityIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v VirtualMachineIdentity) []string { return v.IdentityIds }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "cf3497e33a6cd41bb826a1805680feee", "score": "0.5061708", "text": "func read_everything(stub shim.ChaincodeStubInterface) pb.Response {\n\ttype Everything struct {\n\t\tOwners []Owner `json:\"owners\"`\n\t\tIdentities []Identity `json:\"identities\"`\n\t}\n\tvar everything Everything\n\n\t// ---- Get All Identity ---- //\n\tresultsIterator, err := stub.GetStateByRange(\"i0\", \"i9999999999999999999\")\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer resultsIterator.Close()\n\n\tfor resultsIterator.HasNext() {\n\t\taKeyValue, err := resultsIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\tqueryKeyAsStr := aKeyValue.Key\n\t\tqueryValAsBytes := aKeyValue.Value\n\t\tfmt.Println(\"on identity id - \", queryKeyAsStr)\n\t\tvar identity Identity\n\t\tjson.Unmarshal(queryValAsBytes, &identity) //func Unmarshal(data []byte, v interface{}) error. un stringify it aka JSON.parse()\n\t\teverything.Identities = append(everything.Identities, identity) //add this identity to the list\n\t}\n\tfmt.Println(\"identity array - \", everything.Identities)\n\n\t// ---- Get All Owners ---- //\n\townersIterator, err := stub.GetStateByRange(\"o0\", \"o9999999999999999999\")\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tdefer ownersIterator.Close()\n\n\tfor ownersIterator.HasNext() {\n\t\taKeyValue, err := ownersIterator.Next()\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\tqueryKeyAsStr := aKeyValue.Key\n\t\tqueryValAsBytes := aKeyValue.Value\n\t\tfmt.Println(\"on owner id - \", queryKeyAsStr)\n\t\tvar owner Owner\n\t\tjson.Unmarshal(queryValAsBytes, &owner) //un stringify it aka JSON.parse()\n\n\t\teverything.Owners = append(everything.Owners, owner) //add this identity owner to the list\n\t}\n\tfmt.Println(\"owner array - \", everything.Owners)\n\n\t//change to array of bytes\n\teverythingAsBytes, _ := json.Marshal(everything) //convert to array of bytes\n\treturn shim.Success(everythingAsBytes)\n}", "title": "" }, { "docid": "26ff3c41f1259af305a858fd3e95bda5", "score": "0.505801", "text": "func (ctrl *UserController) List(ctx *app.ListUserContext) error {\n\tc, e := make(chan core.UserList), make(chan error)\n\tlist := func() {\n\t\tdefer func() {\n\t\t\tclose(c)\n\t\t\tclose(e)\n\t\t}()\n\n\t\tul, err := store().ListUsers(ctx.Limit, ctx.Offset)\n\t\tc <- ul\n\t\te <- err\n\t}\n\n\tgo invoke(ctx, list)\n\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\treturn ctx.InternalServerError(ctx.Err())\n\t\tcase err := <-e:\n\t\t\treturn err\n\t\tcase userList := <-c:\n\t\t\tvar res app.BluelensUserCollection\n\t\t\tfor _, user := range userList {\n\t\t\t\tres = append(res, mediaTypeUser(user))\n\t\t\t}\n\t\t\treturn ctx.OK(res)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f6317c1e787d034bdadf24be1e826ef2", "score": "0.5056293", "text": "func (c *UsersClient) List(ctx context.Context, query odata.Query) (*[]User, int, error) {\n\tresp, status, _, err := c.BaseClient.Get(ctx, GetHttpRequestInput{\n\t\tDisablePaging: query.Top > 0,\n\t\tOData: query,\n\t\tValidStatusCodes: []int{http.StatusOK},\n\t\tUri: Uri{\n\t\t\tEntity: \"/users\",\n\t\t\tHasTenantId: true,\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, status, fmt.Errorf(\"UsersClient.BaseClient.Get(): %v\", err)\n\t}\n\n\tdefer resp.Body.Close()\n\trespBody, err := io.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, status, fmt.Errorf(\"io.ReadAll(): %v\", err)\n\t}\n\n\tvar data struct {\n\t\tUsers []User `json:\"value\"`\n\t}\n\tif err := json.Unmarshal(respBody, &data); err != nil {\n\t\treturn nil, status, fmt.Errorf(\"json.Unmarshal(): %v\", err)\n\t}\n\n\treturn &data.Users, status, nil\n}", "title": "" }, { "docid": "c3c08a5929d80a0c218efbb15fa9f125", "score": "0.50560176", "text": "func (c *ServerController) HandleList(ctx *gin.Context) {\n\tserverList := c.repository.List()\n\n\t// Send server list to client\n\tctx.JSON(http.StatusOK, serverList)\n}", "title": "" }, { "docid": "7b1caeffad748d089dbebddf30bcdc18", "score": "0.50550574", "text": "func (c *ListCommand) Exec(in io.Reader, out io.Writer) error {\n\tserviceID, source := c.manifest.ServiceID()\n\tif source == manifest.SourceUndefined {\n\t\treturn errors.ErrNoServiceID\n\t}\n\tc.Input.ServiceID = serviceID\n\n\tdomains, err := c.Globals.Client.ListDomains(&c.Input)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif !c.Globals.Verbose() {\n\t\ttw := text.NewTable(out)\n\t\ttw.AddHeader(\"SERVICE\", \"VERSION\", \"NAME\", \"COMMENT\")\n\t\tfor _, domain := range domains {\n\t\t\ttw.AddLine(domain.ServiceID, domain.ServiceVersion, domain.Name, domain.Comment)\n\t\t}\n\t\ttw.Print()\n\t\treturn nil\n\t}\n\n\tfmt.Fprintf(out, \"Service ID: %s\\n\", c.Input.ServiceID)\n\tfmt.Fprintf(out, \"Version: %d\\n\", c.Input.ServiceVersion)\n\tfor i, domain := range domains {\n\t\tfmt.Fprintf(out, \"\\tDomain %d/%d\\n\", i+1, len(domains))\n\t\tfmt.Fprintf(out, \"\\t\\tName: %s\\n\", domain.Name)\n\t\tfmt.Fprintf(out, \"\\t\\tComment: %v\\n\", domain.Comment)\n\t}\n\tfmt.Fprintln(out)\n\n\treturn nil\n}", "title": "" }, { "docid": "92fc662dea04f89cc0f907a5f5bbf729", "score": "0.505198", "text": "func (a *UsersApiService) listUsersExecute(r apiListUsersRequest) (UserListResponse, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarReturnValue UserListResponse\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"UsersApiService.ListUsers\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/user\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"apiKeyAuth\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"DD-API-KEY\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"appKeyAuth\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"DD-APPLICATION-KEY\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.PrepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, nil)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.CallAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v APIErrorResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 429 {\n\t\t\tvar v APIErrorResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "7ca3ff331d35ef9dd0c7f8e766c80f1a", "score": "0.50483555", "text": "func (s oIDCIdentityProviderNamespaceLister) List(selector labels.Selector) (ret []*v1alpha1.OIDCIdentityProvider, err error) {\n\terr = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {\n\t\tret = append(ret, m.(*v1alpha1.OIDCIdentityProvider))\n\t})\n\treturn ret, err\n}", "title": "" }, { "docid": "c045a75ef29d27b5a2f13242bc599e0e", "score": "0.5048237", "text": "func List(ctx context.Context, svc iaas.Service) (list []abstract.ClusterIdentity, xerr fail.Error) {\n\tvar emptyList []abstract.ClusterIdentity\n\n\tif ctx == nil {\n\t\treturn emptyList, fail.InvalidParameterCannotBeNilError(\"ctx\")\n\t}\n\tif svc == nil {\n\t\treturn emptyList, fail.InvalidParameterCannotBeNilError(\"svc\")\n\t}\n\n\tinstance, xerr := New(svc)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tlist = []abstract.ClusterIdentity{}\n\txerr = instance.Browse(ctx, func(hc *abstract.ClusterIdentity) fail.Error {\n\t\tlist = append(list, *hc)\n\t\treturn nil\n\t})\n\treturn list, xerr\n}", "title": "" }, { "docid": "af5e4d0de2d1c3a4036f1c9fac315f97", "score": "0.50317246", "text": "func (wrapper *SimpleCommandWrapper) List(parent string) ([]string, error) {\n\tvar found bool\n\tvar op api_operation.Operation\n\tvar keyProp, keysProp api_property.Property\n\n\tlist := []string{}\n\n\tif op, found = wrapper.operations.Get(OPERATION_ID_COMMAND_LIST); !found {\n\t\treturn list, errors.New(\"No list operation available in Command Wrapper\")\n\t}\n\n\tprops := op.Properties()\n\n\tif keyProp, found = props.Get(OPERATION_PROPERTY_COMMAND_KEY); !found {\n\t\treturn list, errors.New(\"No key property available in Command Wrapper\")\n\t}\n\n\tif !keyProp.Set(parent) {\n\t\treturn list, errors.New(\"Key property value failed to set in Command Wrapper\")\n\t}\n\n\tif keysProp, found = props.Get(OPERATION_PROPERTY_COMMAND_KEYS); !found {\n\t\treturn list, errors.New(\"No keys property available in Command Wrapper\")\n\t}\n\n\tresult := op.Exec(props)\n\t<-result.Finished()\n\n\tif !result.Success() {\n\t\terrs := result.Errors()\n\t\tif len(errs) == 0 {\n\t\t\treturn list, errors.New(\"Unknown error occured listing commands\")\n\t\t} else {\n\t\t\treturn list, errs[0]\n\t\t}\n\t}\n\n\tlist = keysProp.Get().([]string)\n\treturn list, nil\n}", "title": "" }, { "docid": "95cbf887953a00b111da198d7b2e4534", "score": "0.5030477", "text": "func (ctrl CredentialController) AccessList(c *gin.Context) {\n\tcredential := c.MustGet(cCredential).(common.Credential)\n\n\tvar organization common.Organization\n\tif err := db.Organizations().FindId(credential.OrganizationID).One(&organization); err != nil {\n\t\tlogrus.Errorln(\"Error while retriving Organization:\", err)\n\t\tc.JSON(http.StatusInternalServerError, common.Error{\n\t\t\tCode: http.StatusInternalServerError,\n\t\t\tErrors: []string{\"Error while getting Access List\"},\n\t\t})\n\t\treturn\n\t}\n\n\tvar allaccess map[bson.ObjectId]*common.AccessType\n\n\t// indirect access from organization\n\tfor _, v := range organization.Roles {\n\t\tif v.Type == \"user\" {\n\t\t\t// if an organization admin\n\t\t\tswitch v.Role {\n\t\t\tcase rbac.OrganizationAdmin:\n\t\t\t\t{\n\t\t\t\t\taccess := gin.H{\n\t\t\t\t\t\t\"descendant_roles\": []string{\n\t\t\t\t\t\t\t\"admin\",\n\t\t\t\t\t\t\t\"use\",\n\t\t\t\t\t\t\t\"read\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"role\": gin.H{\n\t\t\t\t\t\t\t\"resource_name\": organization.Name,\n\t\t\t\t\t\t\t\"description\": \"Can manage all aspects of the organization\",\n\t\t\t\t\t\t\t\"related\": gin.H{\n\t\t\t\t\t\t\t\t\"organization\": \"/v1/organizations/\" + organization.ID.Hex() + \"/\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"resource_type\": \"organization\",\n\t\t\t\t\t\t\t\"name\": rbac.OrganizationAdmin,\n\t\t\t\t\t\t},\n\t\t\t\t\t}\n\n\t\t\t\t\tallaccess[v.GranteeID].IndirectAccess = append(allaccess[v.GranteeID].IndirectAccess, access)\n\t\t\t\t}\n\t\t\t// if an organization auditor or member\n\t\t\tcase rbac.OrganizationMember:\n\t\t\t\t{\n\t\t\t\t\taccess := gin.H{\n\t\t\t\t\t\t\"descendant_roles\": []string{\n\t\t\t\t\t\t\t\"read\",\n\t\t\t\t\t\t\t\"use\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"role\": gin.H{\n\t\t\t\t\t\t\t\"resource_name\": organization.Name,\n\t\t\t\t\t\t\t\"description\": \"User is a member of the Organization\",\n\t\t\t\t\t\t\t\"related\": gin.H{\n\t\t\t\t\t\t\t\t\"organization\": \"/v1/organizations/\" + organization.ID.Hex() + \"/\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"resource_type\": \"organization\",\n\t\t\t\t\t\t\t\"name\": rbac.OrganizationMember,\n\t\t\t\t\t\t},\n\t\t\t\t\t}\n\n\t\t\t\t\tallaccess[v.GranteeID].IndirectAccess = append(allaccess[v.GranteeID].IndirectAccess, access)\n\t\t\t\t}\n\t\t\t// if an organization auditor\n\t\t\tcase rbac.OrganizationAuditor:\n\t\t\t\t{\n\t\t\t\t\taccess := gin.H{\n\t\t\t\t\t\t\"descendant_roles\": []string{\n\t\t\t\t\t\t\t\"read\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"role\": gin.H{\n\t\t\t\t\t\t\t\"resource_name\": organization.Name,\n\t\t\t\t\t\t\t\"description\": \"Can view all aspects of the organization\",\n\t\t\t\t\t\t\t\"related\": gin.H{\n\t\t\t\t\t\t\t\t\"organization\": \"/v1/organizations/\" + organization.ID.Hex() + \"/\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"resource_type\": \"organization\",\n\t\t\t\t\t\t\t\"name\": rbac.OrganizationAuditor,\n\t\t\t\t\t\t},\n\t\t\t\t\t}\n\t\t\t\t\tallaccess[v.GranteeID].IndirectAccess = append(allaccess[v.GranteeID].IndirectAccess, access)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// direct access\n\n\tfor _, v := range credential.Roles {\n\t\tif v.Type == \"user\" {\n\t\t\t// if an inventory admin\n\t\t\tswitch v.Role {\n\t\t\tcase rbac.CredentialAdmin:\n\t\t\t\t{\n\t\t\t\t\taccess := gin.H{\n\t\t\t\t\t\t\"descendant_roles\": []string{\n\t\t\t\t\t\t\t\"admin\",\n\t\t\t\t\t\t\t\"use\",\n\t\t\t\t\t\t\t\"read\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"role\": gin.H{\n\t\t\t\t\t\t\t\"resource_name\": credential.Name,\n\t\t\t\t\t\t\t\"description\": \"Can manage all aspects of the credential\",\n\t\t\t\t\t\t\t\"related\": gin.H{\n\t\t\t\t\t\t\t\t\"inventory\": \"/v1/credentials/\" + credential.ID.Hex() + \"/\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"resource_type\": \"credential\",\n\t\t\t\t\t\t\t\"name\": rbac.InventoryAdmin,\n\t\t\t\t\t\t},\n\t\t\t\t\t}\n\n\t\t\t\t\tallaccess[v.GranteeID].DirectAccess = append(allaccess[v.GranteeID].DirectAccess, access)\n\t\t\t\t}\n\t\t\t// if an inventory\n\t\t\tcase rbac.InventoryUse:\n\t\t\t\t{\n\t\t\t\t\taccess := gin.H{\n\t\t\t\t\t\t\"descendant_roles\": []string{\n\t\t\t\t\t\t\t\"use\",\n\t\t\t\t\t\t\t\"read\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"role\": gin.H{\n\t\t\t\t\t\t\t\"resource_name\": credential.Name,\n\t\t\t\t\t\t\t\"description\": \"Can use the credential in a job template\",\n\t\t\t\t\t\t\t\"related\": gin.H{\n\t\t\t\t\t\t\t\t\"inventory\": \"/v1/credentials/\" + credential.ID.Hex() + \"/\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\"resource_type\": \"credential\",\n\t\t\t\t\t\t\t\"name\": rbac.InventoryUse,\n\t\t\t\t\t\t},\n\t\t\t\t\t}\n\t\t\t\t\tallaccess[v.GranteeID].DirectAccess = append(allaccess[v.GranteeID].DirectAccess, access)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvar usrs []common.AccessUser\n\n\tfor k, v := range allaccess {\n\t\tvar user common.AccessUser\n\t\terr := db.Users().FindId(k).One(&user)\n\t\tif err != nil {\n\t\t\tlogrus.Errorln(\"Error while retriving user data:\", err)\n\t\t\tc.JSON(http.StatusInternalServerError, common.Error{\n\t\t\t\tCode: http.StatusInternalServerError,\n\t\t\t\tErrors: []string{\"Error while getting Access List\"},\n\t\t\t})\n\t\t\treturn\n\t\t}\n\n\t\tmetadata.AccessUserMetadata(&user)\n\t\tuser.Summary = v\n\t\tusrs = append(usrs, user)\n\t}\n\n\tcount := len(usrs)\n\tpgi := util.NewPagination(c, count)\n\t//if page is incorrect return 404\n\tif pgi.HasPage() {\n\t\tc.JSON(http.StatusNotFound, gin.H{\"detail\": \"Invalid page \" + strconv.Itoa(pgi.Page()) + \": That page contains no results.\"})\n\t\treturn\n\t}\n\t// send response with JSON rendered data\n\tc.JSON(http.StatusOK, common.Response{\n\t\tCount: count,\n\t\tNext: pgi.NextPage(),\n\t\tPrevious: pgi.PreviousPage(),\n\t\tData: usrs[pgi.Skip():pgi.End()],\n\t})\n\n}", "title": "" }, { "docid": "2ef5eaf8866ed8c8568d5d2d22e0191d", "score": "0.5027501", "text": "func ident(id uuid.UUID) *client.GenericData {\n\tAPIStringTypeUser := \"identities\"\n\tut := APIStringTypeUser\n\ti := id.String()\n\treturn &client.GenericData{\n\t\tType: &ut,\n\t\tID: &i,\n\t}\n}", "title": "" }, { "docid": "133149edd6e39865513428a49bbaf805", "score": "0.5019113", "text": "func (i *ThingInteractor) List(authorization string) error {\n\tif authorization == \"\" {\n\t\treturn ErrAuthNotProvided\n\t}\n\n\tthings, err := i.thingProxy.List(authorization)\n\tsendErr := i.clientPublisher.SendDevicesList(things, err)\n\tif err != nil {\n\t\tif sendErr != nil {\n\t\t\treturn fmt.Errorf(\"error getting list of things: %v, %w\", sendErr, err)\n\t\t}\n\t\treturn fmt.Errorf(\"error getting list of things: %w\", err)\n\t}\n\tif sendErr != nil {\n\t\treturn fmt.Errorf(\"error sending response to client: %w\", sendErr)\n\t}\n\n\ti.logger.Info(\"devices obtained\")\n\treturn nil\n}", "title": "" }, { "docid": "87e8cb8649081997d4493bbf901c2c0a", "score": "0.5018569", "text": "func (c *Client) IDs(ctx context.Context) (_ []string, err error) {\n\tb, err := c.vulns(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdec, err := newStreamDecoder(b)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar ids []string\n\tfor dec.More() {\n\t\tvar v VulnMeta\n\t\terr := dec.Decode(&v)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tids = append(ids, v.ID)\n\t}\n\n\treturn ids, nil\n}", "title": "" }, { "docid": "7caf03565e1ba59692d9bf57c0e1d2d2", "score": "0.50172687", "text": "func (me *PROTECTIONSOURCES_IMPL) ListDataStoreInformation (\r\n sourceId int64) ([]*models.ProtectionSource, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/public/protectionSources/datastores\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //process optional query parameters\r\n _queryBuilder, err = apihelper.AppendUrlWithQueryParameters(_queryBuilder, map[string]interface{} {\r\n \"sourceId\" : sourceId,\r\n })\r\n if err != nil {\r\n //error in query param handling\r\n return nil, err\r\n }\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Get(_queryBuilder, headers)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal []*models.ProtectionSource\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "91cd197a5a19e2807e9f72f5a9ccd10e", "score": "0.50153416", "text": "func (m *MockUserCredentialsStore) List(v0 context.Context, v1 database.UserCredentialsListOpts) ([]*database.UserCredential, int, error) {\n\tr0, r1, r2 := m.ListFunc.nextHook()(v0, v1)\n\tm.ListFunc.appendCall(UserCredentialsStoreListFuncCall{v0, v1, r0, r1, r2})\n\treturn r0, r1, r2\n}", "title": "" }, { "docid": "f53c4c91d474156d4e915d6f7868ce38", "score": "0.49924853", "text": "func (a *Auth) List(ctx context.Context, req *pb.ListAccountsRequest, rsp *pb.ListAccountsResponse) error {\n\t// set defaults\n\tif req.Options == nil {\n\t\treq.Options = &pb.Options{}\n\t}\n\tif len(req.Options.Namespace) == 0 {\n\t\treq.Options.Namespace = namespace.DefaultNamespace\n\t}\n\n\t// setup the defaults incase none exist\n\ta.setupDefaultAccount(req.Options.Namespace)\n\n\t// authorize the request\n\tif err := namespace.AuthorizeAdmin(ctx, req.Options.Namespace, \"auth.Accounts.List\"); err != nil {\n\t\treturn err\n\t}\n\n\t// get the records from the store\n\tkey := strings.Join([]string{storePrefixAccounts, req.Options.Namespace, \"\"}, joinKey)\n\trecs, err := a.Options.Store.Read(key, store.ReadPrefix())\n\tif err != nil {\n\t\treturn errors.InternalServerError(\"auth.Accounts.List\", \"Unable to read from store: %v\", err)\n\t}\n\n\t// unmarshal the records\n\tvar accounts = make([]*auth.Account, 0, len(recs))\n\tfor _, rec := range recs {\n\t\tvar r *auth.Account\n\t\tif err := json.Unmarshal(rec.Value, &r); err != nil {\n\t\t\treturn errors.InternalServerError(\"auth.Accounts.List\", \"Error to unmarshaling json: %v. Value: %v\", err, string(rec.Value))\n\t\t}\n\t\taccounts = append(accounts, r)\n\t}\n\n\t// serialize the accounts\n\trsp.Accounts = make([]*pb.Account, 0, len(recs))\n\tfor _, a := range accounts {\n\t\trsp.Accounts = append(rsp.Accounts, serializeAccount(a))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f9c6d835ad1d4c1a649efc65a327eee4", "score": "0.4991303", "text": "func (c *MockLibOvsDbClient) List(ctx context.Context, result interface{}) error {\n\treturn nil\n}", "title": "" }, { "docid": "e70d05ab8d737c0e1d1716c1e35704d9", "score": "0.4987972", "text": "func (f *Frontend) List(c *gin.Context, ref store.KeySaver) {\n\tf.list(c, ref, false)\n}", "title": "" }, { "docid": "7b6c36850f9f83e0643b26e0ee0c1acd", "score": "0.49835154", "text": "func (me *PROTECTIONSOURCES_IMPL) ListProtectionSources (\r\n allUnderHierarchy *bool,\r\n id *int64,\r\n excludeOffice365Types []models.ExcludeOffice365TypesEnum,\r\n includeDatastores *bool,\r\n includeVMFolders *bool,\r\n includeEntityPermissionInfo *bool,\r\n sids []string,\r\n tenantIds []string,\r\n excludeTypes []models.ExcludeTypesEnum,\r\n includeNetworks *bool,\r\n environments []models.Environments2Enum,\r\n environment *string) ([]*models.NodeInAProtectionSourcesTree, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/public/protectionSources\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //process optional query parameters\r\n _queryBuilder, err = apihelper.AppendUrlWithQueryParameters(_queryBuilder, map[string]interface{} {\r\n \"allUnderHierarchy\" : allUnderHierarchy,\r\n \"id\" : id,\r\n \"excludeOffice365Types\" : models.ExcludeOffice365TypesEnumArrayToValue(excludeOffice365Types),\r\n \"includeDatastores\" : includeDatastores,\r\n \"includeVMFolders\" : includeVMFolders,\r\n \"includeEntityPermissionInfo\" : includeEntityPermissionInfo,\r\n \"sids\" : sids,\r\n \"tenantIds\" : tenantIds,\r\n \"excludeTypes\" : models.ExcludeTypesEnumArrayToValue(excludeTypes),\r\n \"includeNetworks\" : includeNetworks,\r\n \"environments\" : models.Environments2EnumArrayToValue(environments),\r\n \"environment\" : environment,\r\n })\r\n if err != nil {\r\n //error in query param handling\r\n return nil, err\r\n }\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Get(_queryBuilder, headers)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal []*models.NodeInAProtectionSourcesTree\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "be9b176ad6413a305a45b2336a7dea7e", "score": "0.49823985", "text": "func (c EntityController) List(ctx context.Context, pred *store.SelectionPredicate) ([]corev2.Resource, error) {\n\t// Fetch from store\n\tresults, err := c.store.GetEntities(ctx, pred)\n\tif err != nil {\n\t\treturn nil, NewError(InternalErr, err)\n\t}\n\n\tresources := make([]corev2.Resource, len(results))\n\tfor i, v := range results {\n\t\tresources[i] = corev2.Resource(v)\n\t}\n\n\treturn resources, nil\n}", "title": "" }, { "docid": "6e6bb5fd5d1a76bdf2a03f3cca853423", "score": "0.49821696", "text": "func (c *Image) IdentifierList() []string {\n\treturn append(c.ContentCommon.IdentifierList(),[]string{ \"path\",\"title\",}...)\n}", "title": "" }, { "docid": "7ac3bd971c2789ae981984bbf400d043", "score": "0.49732614", "text": "func (o GetWindowsFunctionAppIdentityOutput) IdentityIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v GetWindowsFunctionAppIdentity) []string { return v.IdentityIds }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "32e00892f7a9ce84e600ddc335872b1d", "score": "0.49724624", "text": "func List(u *takrib.AuthUser) (*takrib.ListQuery, error) {\n\tswitch true {\n\tcase u.Role <= takrib.AdminRole: // user is SuperAdmin or Admin\n\t\treturn nil, nil\n\tcase u.Role == takrib.CompanyAdminRole:\n\t\treturn &takrib.ListQuery{Query: \"company_id = ?\", ID: u.CompanyID}, nil\n\tcase u.Role == takrib.LocationAdminRole:\n\t\treturn &takrib.ListQuery{Query: \"location_id = ?\", ID: u.LocationID}, nil\n\tdefault:\n\t\treturn nil, echo.ErrForbidden\n\t}\n}", "title": "" }, { "docid": "03de915bb53381f77ccb2ed9c9ef5f75", "score": "0.49709564", "text": "func (a *AwsCommand) List(args []string) error {\n\tl := newListFlags()\n\tif err := l.flagSet.Parse(args); err != nil {\n\t\treturn nil // we don't return error, the usage will be printed instead\n\t}\n\n\tinput := &ec2.DescribeImagesInput{}\n\n\tif len(l.owners) == 0 {\n\t\tinput.Owners = stringSlice(\"self\")\n\t}\n\n\tif len(l.imageIds) != 0 {\n\t\tinput.ImageIds = stringSlice(l.imageIds...)\n\t}\n\n\timages, err := a.Images(input)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn images.Print(l.output)\n}", "title": "" }, { "docid": "0221acab84712ebf1812862439f66624", "score": "0.49682745", "text": "func (a *TaxInformationApiService) ClientTaxInformationListExecute(r ApiClientTaxInformationListRequest) (PaginatedTaxInformationListList, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue PaginatedTaxInformationListList\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"TaxInformationApiService.ClientTaxInformationList\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v2/clients/{client_uuid}/tax-informations/\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"client_uuid\"+\"}\", _neturl.PathEscape(parameterToString(r.clientUuid, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.limit != nil {\n\t\tlocalVarQueryParams.Add(\"limit\", parameterToString(*r.limit, \"\"))\n\t}\n\tif r.offset != nil {\n\t\tlocalVarQueryParams.Add(\"offset\", parameterToString(*r.offset, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"tokenAuth\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "73a5fdabc78525ec1d69534444a55aae", "score": "0.49616963", "text": "func (client Client) ListResponder(resp *http.Response) (result SetObject, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusUnauthorized, http.StatusNotFound),\n\t\tautorest.ByUnmarshallingJSON(&result.Value),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "title": "" }, { "docid": "2109f5e607ebf463ec5f689dab572e28", "score": "0.49611276", "text": "func (c *AdminController) List() {\n\n\t// request body\n\tvar paginationData AdminPaginationData\n\tif err := json.Unmarshal(c.Ctx.Input.RequestBody, &paginationData); err != nil {\n\t\tc.Data[\"json\"] = utils.ResponseError(c.Ctx, \"参数错误!\", err)\n\t\tc.ServeJSON()\n\t\treturn\n\t}\n\n\t// orm instance\n\to := orm.NewOrm()\n\tadmin := new(models.Admin)\n\tqs := o.QueryTable(admin)\n\tqs = qs.Filter(\"nickname__icontains\", paginationData.Keyword)\n\n\tvar lists []models.Admin\n\tif paginationData.Online == 0 {\n\t\tqs = qs.Filter(\"online\", 0)\n\t}\n\tif paginationData.Online == 1 {\n\t\tqs = qs.Filter(\"online\", 1)\n\t}\n\tif _, err := qs.OrderBy(\"-root\", \"id\").Limit(paginationData.PageSize, (paginationData.PageOn-1)*paginationData.PageSize).All(&lists); err != nil {\n\t\tlogs.Error(err)\n\t\tc.Data[\"json\"] = utils.ResponseError(c.Ctx, \"查询失败!\", err)\n\t\tc.ServeJSON()\n\t\treturn\n\t}\n\ttotal, _ := qs.Count()\n\tfor index := range lists {\n\t\tlists[index].Password = \"******\"\n\t}\n\tpaginationData.Total = total\n\tpaginationData.List = &lists\n\tc.Data[\"json\"] = utils.ResponseSuccess(c.Ctx, \"查询成功!\", &paginationData)\n\tc.ServeJSON()\n\n}", "title": "" }, { "docid": "5af46034fb048f4bd26362f654c6cd99", "score": "0.4956775", "text": "func cmdListUsers(ccmd *cobra.Command, args []string) {\n\taplSvc := apl.NewClient()\n\toutput := runListCommand(&userParams, aplSvc.Users.List)\n\tif output != nil {\n\t\tfields := []string{\"ID\", \"Email\", \"FirstName\", \"LastName\", \"UserType\", \"WorkRole\", \"CreatedTime\"}\n\t\tprintTableResultsCustom(output.([]apl.User), fields)\n\t}\n}", "title": "" }, { "docid": "fada7f92a7faf310cc54b8b78e9c005e", "score": "0.49541524", "text": "func (tm *TunnelManager) List() []string {\n\tvar r []string\n\tfor _, v := range tm.Tunnels {\n\t\tr = append(r, v.SAMTunnel.ID())\n\t}\n\treturn r\n}", "title": "" }, { "docid": "bd015d4acb7c833678fd91b2e6bc6471", "score": "0.49540383", "text": "func (c *ListCommand) Execute(ctx context.Context, ee *ExecutionEnvironment) (*ExecutionResult, error) {\n\tcmds := ee.Parser.Commands.List(true)\n\n\tresult := NewExecutionResult()\n\tresult.AddMessage(cmds...)\n\n\treturn result, nil\n}", "title": "" }, { "docid": "5e954dd9676e3a50168c7891bd1cc99d", "score": "0.49518093", "text": "func (client SecretsClient) ListByProfileResponder(resp *http.Response) (result SecretListResult, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "title": "" }, { "docid": "d24653f2fbfdc74cfe450865cfdde6c5", "score": "0.494991", "text": "func (o WindowsVirtualMachineIdentityOutput) IdentityIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v WindowsVirtualMachineIdentity) []string { return v.IdentityIds }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "683cfaa507c1dbfe0b9eef394cd19d13", "score": "0.49486908", "text": "func (o GetApplicationGatewayIdentityOutput) IdentityIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v GetApplicationGatewayIdentity) []string { return v.IdentityIds }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "0fc22657e38172a89311e5ac9a3d271c", "score": "0.49465248", "text": "func (app *App) List(c echo.Context) error {\n\t// Check that we can parse limit, ignore errors\n\tlimit, err := strconv.ParseInt(c.QueryParam(\"limit\"), 10, 64)\n\tif err != nil {\n\t\tlimit = LIMIT\n\t}\n\t// Get all keys up to limit\n\tdata := app.Store[c.Param(\"user\")].All(\"store\", c.QueryParam(\"offset\"), int(limit))\n\t// Join the array with new lines\n\treturn c.String(http.StatusOK, strings.Join(data, \"\\n\"))\n}", "title": "" }, { "docid": "4ba91ed8a0326aba8781ae3aa73acf38", "score": "0.4946385", "text": "func (me *PROTECTIONSOURCES_IMPL) ListApplicationServers (\r\n environment models.Environment2Enum,\r\n protectionSourceId *int64,\r\n application models.ApplicationEnum,\r\n protectionSourcesRootNodeId *int64) ([]*models.RegisteredApplicationServer, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/public/protectionSources/applicationServers\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //process optional query parameters\r\n _queryBuilder, err = apihelper.AppendUrlWithQueryParameters(_queryBuilder, map[string]interface{} {\r\n \"environment\" : models.Environment2EnumToValue(environment),\r\n \"protectionSourceId\" : protectionSourceId,\r\n \"application\" : models.ApplicationEnumToValue(application),\r\n \"protectionSourcesRootNodeId\" : protectionSourcesRootNodeId,\r\n })\r\n if err != nil {\r\n //error in query param handling\r\n return nil, err\r\n }\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Get(_queryBuilder, headers)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal []*models.RegisteredApplicationServer\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "7ab673ec8fc0f08fa9ec7b12fb3bd60c", "score": "0.49426433", "text": "func (me *PROTECTIONSOURCES_IMPL) ListSqlAagHostsAndDatabases (\r\n sqlProtectionSourceIds []int64) ([]*models.SQLAAGHostAndDatabases, error) {\r\n//validating required parameters\r\n if (sqlProtectionSourceIds == nil){\r\n return nil,errors.New(\"The parameter 'sqlProtectionSourceIds' is a required parameter and cannot be nil.\")\r\n} //the endpoint path uri\r\n _pathUrl := \"/public/protectionSources/sqlAagHostsAndDatabases\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //process optional query parameters\r\n _queryBuilder, err = apihelper.AppendUrlWithQueryParameters(_queryBuilder, map[string]interface{} {\r\n \"sqlProtectionSourceIds\" : sqlProtectionSourceIds,\r\n })\r\n if err != nil {\r\n //error in query param handling\r\n return nil, err\r\n }\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Get(_queryBuilder, headers)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal []*models.SQLAAGHostAndDatabases\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "74113aab34f1f97ad546b646466acf31", "score": "0.49377516", "text": "func List(u *plethora_api.AuthUser) (*plethora_api.ListQuery, error) {\n\tswitch true {\n\tcase u.Role <= plethora_api.AdminRole: // user is SuperAdmin or Admin\n\t\treturn nil, nil\n\tcase u.Role == plethora_api.CompanyAdminRole:\n\t\treturn &plethora_api.ListQuery{Query: \"company_id = ?\", ID: u.CompanyID}, nil\n\tcase u.Role == plethora_api.LocationAdminRole:\n\t\treturn &plethora_api.ListQuery{Query: \"location_id = ?\", ID: u.LocationID}, nil\n\tdefault:\n\t\treturn nil, echo.ErrForbidden\n\t}\n}", "title": "" }, { "docid": "57b3d8e695ebe808853c19c2471852f4", "score": "0.4935979", "text": "func (a App) List(w http.ResponseWriter, r *http.Request) {\n\tw.Write([]byte(\"List opinions\"))\n}", "title": "" }, { "docid": "f49eabb9929a673ba0c2e932ccf3a59b", "score": "0.49311006", "text": "func (h Wincred) List() (map[string]string, error) {\n\tcreds, err := winc.List()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := make(map[string]string)\n\tfor i := range creds {\n\t\tattrs := creds[i].Attributes\n\t\tfor _, attr := range attrs {\n\t\t\tif strings.Compare(attr.Keyword, \"label\") == 0 &&\n\t\t\t\tbytes.Compare(attr.Value, []byte(credentials.CredsLabel)) == 0 {\n\n\t\t\t\tresp[creds[i].TargetName] = creds[i].UserName\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn resp, nil\n}", "title": "" } ]
0c3af84a625c492cf192994c558d9b4a
IsYANGGoStruct ensures that OpenconfigTerminalDevice_TerminalDevice_State implements the yang.GoStruct interface. This allows functions that need to handle this struct to identify it as being generated by ygen.
[ { "docid": "ac377930c2f6d7dc1f68aa7eaeef2585", "score": "0.8913325", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_State) IsYANGGoStruct() {}", "title": "" } ]
[ { "docid": "c62796c9bab20bdaed6d911347919874", "score": "0.8442028", "text": "func (*OpenconfigTerminalDevice_TerminalDevice) IsYANGGoStruct() {}", "title": "" }, { "docid": "c8dc0c4b0f80b01065b188c6ef314fc6", "score": "0.8385364", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "03633b567d340ec556794af96be0020d", "score": "0.836223", "text": "func (*TerminalDevice) IsYANGGoStruct() {}", "title": "" }, { "docid": "03633b567d340ec556794af96be0020d", "score": "0.8362229", "text": "func (*TerminalDevice) IsYANGGoStruct() {}", "title": "" }, { "docid": "54d38850402ca1af8ca8f6cf16445c49", "score": "0.8225863", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet_State) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "ec957fce88354dcbde86b592e595c3fb", "score": "0.8125693", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "77126e88e964ec96e985fb2cfba29650", "score": "0.80548394", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "77126e88e964ec96e985fb2cfba29650", "score": "0.80548394", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "6006f2fa0b39590b08dd329bc7e0c374", "score": "0.8032586", "text": "func (*TerminalDevice_Channel_Otn) IsYANGGoStruct() {}", "title": "" }, { "docid": "6006f2fa0b39590b08dd329bc7e0c374", "score": "0.8032586", "text": "func (*TerminalDevice_Channel_Otn) IsYANGGoStruct() {}", "title": "" }, { "docid": "2ee001644882739380f587937ab49ec1", "score": "0.8031077", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_Ethernet_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "b3acc74d85f9ca6a0df23ec7f958dfff", "score": "0.8011273", "text": "func (*OpenconfigPlatform_Components_Component_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "b3acc74d85f9ca6a0df23ec7f958dfff", "score": "0.8011273", "text": "func (*OpenconfigPlatform_Components_Component_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "db7096dc8fff1433b6cd5d751644e92f", "score": "0.80058616", "text": "func (*TerminalDevice_Channel) IsYANGGoStruct() {}", "title": "" }, { "docid": "db7096dc8fff1433b6cd5d751644e92f", "score": "0.80046153", "text": "func (*TerminalDevice_Channel) IsYANGGoStruct() {}", "title": "" }, { "docid": "f2cbb469b9a140bf6295c98d4feb62d6", "score": "0.79849094", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ingress_State) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "001aa8f9a06898d228b914a32c592930", "score": "0.79834574", "text": "func (*OpenconfigPlatform_Components_Component_Port_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "c4cee86431249b5caf203e4abe4a609e", "score": "0.7961984", "text": "func (*OpenconfigLldp_Lldp_Interfaces_Interface_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "a881d2242d665de7d99533d0d0d718e8", "score": "0.7952994", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet_Lldp_State) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "002606c1a859282430d496dc5463be48", "score": "0.794683", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "203f9f0ac65d4a3d66452a89f8eb4a22", "score": "0.78531635", "text": "func (*OpenconfigSystem_System_Logging_Console_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "203f9f0ac65d4a3d66452a89f8eb4a22", "score": "0.78531635", "text": "func (*OpenconfigSystem_System_Logging_Console_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "55ea01d7b6c0dfcd566b73d658c666bd", "score": "0.7827334", "text": "func (*OpenconfigPlatform_Components_Component_Chassis_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "4117e4cb332f546294cabc514150128a", "score": "0.78261214", "text": "func (*OpenconfigPlatform_Components_Component_Transceiver_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "3e408772cc66fd00d9dd62f56a49c694", "score": "0.7812027", "text": "func (*OpenconfigSystem_System_Openflow_Controllers_Controller_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "fbe5fb13261bdcfe225ffd86b431e260", "score": "0.77901226", "text": "func (*OpenconfigPlatform_Components_Component_Properties_Property_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "fbe5fb13261bdcfe225ffd86b431e260", "score": "0.77901226", "text": "func (*OpenconfigPlatform_Components_Component_Properties_Property_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "8264623853c3b9339c49a0b2b8c3828b", "score": "0.7780473", "text": "func (*OpenconfigSystem_System_Openflow_Agent_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "84c185d329d79e71e4bc547a78e8082f", "score": "0.77733666", "text": "func (*Bfd_Interface_MicroBfdSession) IsYANGGoStruct() {}", "title": "" }, { "docid": "2bdf074971bed6fb4023311c6660ccd4", "score": "0.777208", "text": "func (*OpenconfigMessages_Messages_DebugEntries_DebugService_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "118ced0c01e979b30504316d3c56727a", "score": "0.77686834", "text": "func (*OpenconfigPlatform_Components_Component_IntegratedCircuit_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "627a935f324472b774217f0a5079a10d", "score": "0.7758147", "text": "func (*OpenconfigSystem_System_Messages_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "a74a3f432f9dc95771bf94438414c66b", "score": "0.7757873", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_OperationalModes_Mode_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "ad80401928744c9308c34530cb0665f6", "score": "0.7755639", "text": "func (*OpenconfigPlatform_Components_Component_Cpu_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "043dd96abc9f3ec4565bd1520b4b8f08", "score": "0.7736889", "text": "func (*OpenconfigSystem_System_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "043dd96abc9f3ec4565bd1520b4b8f08", "score": "0.7736889", "text": "func (*OpenconfigSystem_System_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "0b2ed1b65280226c876446cf26cdedeb", "score": "0.7734477", "text": "func (*TerminalDevice_Mode) IsYANGGoStruct() {}", "title": "" }, { "docid": "0b2ed1b65280226c876446cf26cdedeb", "score": "0.7733681", "text": "func (*TerminalDevice_Mode) IsYANGGoStruct() {}", "title": "" }, { "docid": "66c792cdba5fa91c5bef2583199878bf", "score": "0.7730515", "text": "func (*TerminalDevice_Channel_Ethernet) IsYANGGoStruct() {}", "title": "" }, { "docid": "66c792cdba5fa91c5bef2583199878bf", "score": "0.7730515", "text": "func (*TerminalDevice_Channel_Ethernet) IsYANGGoStruct() {}", "title": "" }, { "docid": "a7ed2f1e0f83a7c86aa2aab40127ca34", "score": "0.7726171", "text": "func (*OpenconfigSystem_System_Messages_DebugEntries_DebugService_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "f1727b1d30a841a7def535c4797d413c", "score": "0.7715063", "text": "func (*OpenconfigPlatform_Components_Component_State_Memory) IsYANGGoStruct() {}", "title": "" }, { "docid": "53bfef45a7a123535cf8597cd943ae2e", "score": "0.7709178", "text": "func (*Device) IsYANGGoStruct() {}", "title": "" }, { "docid": "53bfef45a7a123535cf8597cd943ae2e", "score": "0.7709178", "text": "func (*Device) IsYANGGoStruct() {}", "title": "" }, { "docid": "53bfef45a7a123535cf8597cd943ae2e", "score": "0.7709178", "text": "func (*Device) IsYANGGoStruct() {}", "title": "" }, { "docid": "53bfef45a7a123535cf8597cd943ae2e", "score": "0.7709178", "text": "func (*Device) IsYANGGoStruct() {}", "title": "" }, { "docid": "53bfef45a7a123535cf8597cd943ae2e", "score": "0.7709178", "text": "func (*Device) IsYANGGoStruct() {}", "title": "" }, { "docid": "be7ab1fa7e1d94cb8806fb7dac0c6472", "score": "0.7695262", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet_Config) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "641a045c432cba2cf34604f47de7dc08", "score": "0.76930267", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet_Lldp_Neighbors_Neighbor_CustomTlvs_Tlv_State) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "72b5fc92210ce7bd12e0d54233799b45", "score": "0.76874965", "text": "func (*TerminalDevice_Channel_Ingress) IsYANGGoStruct() {}", "title": "" }, { "docid": "72b5fc92210ce7bd12e0d54233799b45", "score": "0.76864165", "text": "func (*TerminalDevice_Channel_Ingress) IsYANGGoStruct() {}", "title": "" }, { "docid": "0a7bef110047e998e181a58293d0fa62", "score": "0.76792485", "text": "func (*OpenconfigSystem_System_Memory_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "0a7bef110047e998e181a58293d0fa62", "score": "0.76778257", "text": "func (*OpenconfigSystem_System_Memory_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "ca4753c859425dc885de310b71fe41a6", "score": "0.76747936", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_Esnr) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "e223ed362eeb6a67ee87f83826e9f997", "score": "0.76626056", "text": "func (*OpenconfigPlatform_Components_Component_Transceiver_PhysicalChannels_Channel_State) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "6701776417b980efb40707d96dc1aca0", "score": "0.76502675", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet_Lldp_Neighbors_Neighbor_State) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "c457f130ab3da552866c9a755468d5ac", "score": "0.7639479", "text": "func (*OpenconfigSystem_System_Ntp_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "c457f130ab3da552866c9a755468d5ac", "score": "0.7639479", "text": "func (*OpenconfigSystem_System_Ntp_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "9980afe71d08c2133da379f40aa59f74", "score": "0.76229465", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_Subinterfaces_Subinterface_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "9980afe71d08c2133da379f40aa59f74", "score": "0.76229465", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_Subinterfaces_Subinterface_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "3fa269d5a199790fd46bac990a89e387", "score": "0.76193154", "text": "func (*OpenconfigMessages_Messages_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "e40a6cddeee9fab4fe8b8deb299a21ea", "score": "0.76142603", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_QValue) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "63bfbbc6b4a78621eb7c489472b15fe9", "score": "0.75971425", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PreFecBer) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "033467009508a577a7c1b0fd75616fd1", "score": "0.75845313", "text": "func (*OpenconfigSystem_System_TelnetServer_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "033467009508a577a7c1b0fd75616fd1", "score": "0.75845313", "text": "func (*OpenconfigSystem_System_TelnetServer_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "38284c7ec6df83e50bea744de8401d8b", "score": "0.7572742", "text": "func (*OpenconfigPlatform_Components_Component_Storage_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "d91740a3dcdfa137f7ecadf577476aa0", "score": "0.75697964", "text": "func (*TerminalDevice_Channel_Assignment) IsYANGGoStruct() {}", "title": "" }, { "docid": "d91740a3dcdfa137f7ecadf577476aa0", "score": "0.7569369", "text": "func (*TerminalDevice_Channel_Assignment) IsYANGGoStruct() {}", "title": "" }, { "docid": "5d6ae67ed69efc8e0b2a0f896511295d", "score": "0.75620997", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "903ce815ca95db405c1e543f99334d25", "score": "0.75596845", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_State_Counters) IsYANGGoStruct() {}", "title": "" }, { "docid": "903ce815ca95db405c1e543f99334d25", "score": "0.75596845", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_State_Counters) IsYANGGoStruct() {}", "title": "" }, { "docid": "79731519ec5237e35a4aeae40a8fe45e", "score": "0.75512034", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn_State_PostFecBer) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "2e2307e7e9bf6c2940bde1e71b0bb018", "score": "0.7544561", "text": "func (*OpenconfigLldp_Lldp_Interfaces_Interface_State_Counters) IsYANGGoStruct() {}", "title": "" }, { "docid": "d933bc8ed596b74d81ce32ad762cd2dd", "score": "0.75371444", "text": "func (*OpenconfigSystem_System_Aaa_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "d933bc8ed596b74d81ce32ad762cd2dd", "score": "0.75371444", "text": "func (*OpenconfigSystem_System_Aaa_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "fbc70524c9956bf73ef472a49f41130c", "score": "0.75264704", "text": "func (*OpenconfigLldp_Lldp_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "4debdfe7206854c25baa179cae199bd5", "score": "0.75229067", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_OperationalModes_Mode_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "9a51aece0a64595acbc2629fdf6f6c23", "score": "0.7520503", "text": "func (*OpenconfigSystem_System_Openflow_Controllers_Controller_Connections_Connection_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "c2bb51931f48e3b32b6a0172918b1d07", "score": "0.7510986", "text": "func (*OpenconfigPlatform_Components_Component_State_Temperature) IsYANGGoStruct() {}", "title": "" }, { "docid": "c2bb51931f48e3b32b6a0172918b1d07", "score": "0.7510986", "text": "func (*OpenconfigPlatform_Components_Component_State_Temperature) IsYANGGoStruct() {}", "title": "" }, { "docid": "283d379df330acaec8f838d1616eba87", "score": "0.7504672", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "283d379df330acaec8f838d1616eba87", "score": "0.7504672", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "34d8e8c41a36d4bc16dae7f43c4b3cca", "score": "0.7502485", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_Ethernet_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "99b2befc40f9e83c8e8b021e921e1aeb", "score": "0.7499455", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ingress_Config) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "1370610124e451eab0cb6ebe2ea7a982", "score": "0.7497272", "text": "func (*OpenconfigSystem_System_Aaa_Authentication_Users_User_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "1370610124e451eab0cb6ebe2ea7a982", "score": "0.7497272", "text": "func (*OpenconfigSystem_System_Aaa_Authentication_Users_User_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "796167b89d45919c0b9e0e7de4fd6658", "score": "0.74874973", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet_Lldp_State_Counters) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "dd4c84a54c526f8152ae37ecdf072784", "score": "0.7479885", "text": "func (*OpenconfigSystem_System_Cpus_Cpu_State_Kernel) IsYANGGoStruct() {}", "title": "" }, { "docid": "66db20463dfe4bfbae51d20b9a5d1e4b", "score": "0.7479743", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Ethernet_Lldp_Config) IsYANGGoStruct() {\n}", "title": "" }, { "docid": "f16a766b2893a6a1fdd1594dc403e9f8", "score": "0.74741113", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_OperationalModes) IsYANGGoStruct() {}", "title": "" }, { "docid": "56ca2d38eed3e89222607ccbde1a0451", "score": "0.74654144", "text": "func (*OpenconfigPlatform_Components_Component_Fabric_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "cf998a3a54f2356e1feee1526cbbe538", "score": "0.7451701", "text": "func (*OpenconfigSystem_System_Messages_State_Message) IsYANGGoStruct() {}", "title": "" }, { "docid": "25243049c6c11ea326e5724bb885cdce", "score": "0.74474525", "text": "func (*OpenconfigInterfaces_Interfaces_Interface_Ethernet_State_Counters) IsYANGGoStruct() {}", "title": "" }, { "docid": "377111325d184623d12483b59ae2831b", "score": "0.744692", "text": "func (*OpenconfigPlatform_Components_Component_Fan_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "0927218a6d3fe8c32062d617ae6b2e29", "score": "0.7444838", "text": "func (*OpenconfigPlatform_Components_Component_Port_Config) IsYANGGoStruct() {}", "title": "" }, { "docid": "2d167685084a2ce0af3d36f7f4413c11", "score": "0.742935", "text": "func (*OpenconfigTerminalDevice_TerminalDevice_LogicalChannels_Channel_Otn) IsYANGGoStruct() {}", "title": "" }, { "docid": "f7d920d32451f02fbef16c654c31fbc4", "score": "0.7429253", "text": "func (*OpenconfigSystem_System_Aaa_Accounting_Events_Event_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "f7d920d32451f02fbef16c654c31fbc4", "score": "0.7428849", "text": "func (*OpenconfigSystem_System_Aaa_Accounting_Events_Event_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "49e4ff3fee8ad18cb6fec0a6154ba4f2", "score": "0.7425807", "text": "func (*OpenconfigPlatform_Components_Component_OpticalChannel_State) IsYANGGoStruct() {}", "title": "" }, { "docid": "49917da442ae31741eada2cd2635b001", "score": "0.74238086", "text": "func (*OpenconfigLldp_Lldp_Interfaces_Interface_Config) IsYANGGoStruct() {}", "title": "" } ]
7ac25f564f0fdf6268765ab581c2105c
the uncoverbools pass replaces any unshadowed "true" or "false" variables with a BoolExpr
[ { "docid": "99c167643dd45e828c6afdea3151f0f0", "score": "0.8278146", "text": "func uncoverBools(e Expr) Expr {\n\tvar top scope\n\treturn uncoverBoolsExpr(&top, e)\n}", "title": "" } ]
[ { "docid": "ec2427f2e937e95884d9be1d90fd6a36", "score": "0.61052674", "text": "func simplifyBool(cfg *Config, prog *cc.Prog) {\n\tcc.Preorder(prog, func(x cc.Syntax) {\n\t\tswitch x := x.(type) {\n\t\tcase *cc.Expr:\n\t\t\tswitch x.Op {\n\t\t\tcase cc.Not:\n\t\t\t\ty := x.Left\n\t\t\t\tfor y.Op == cc.Paren {\n\t\t\t\t\ty = y.Left\n\t\t\t\t}\n\t\t\t\tswitch y.Op {\n\t\t\t\tcase cc.AndAnd:\n\t\t\t\t\t*x = *y\n\t\t\t\t\tx.Left = &cc.Expr{Op: cc.Not, Left: x.Left}\n\t\t\t\t\tx.Right = &cc.Expr{Op: cc.Not, Left: x.Right}\n\t\t\t\t\tx.Op = cc.OrOr\n\n\t\t\t\tcase cc.OrOr:\n\t\t\t\t\t*x = *y\n\t\t\t\t\tx.Left = &cc.Expr{Op: cc.Not, Left: x.Left}\n\t\t\t\t\tx.Right = &cc.Expr{Op: cc.Not, Left: x.Right}\n\t\t\t\t\tx.Op = cc.AndAnd\n\n\t\t\t\tcase cc.EqEq:\n\t\t\t\t\tif isfloat(x.Left.XType) {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\t*x = *y\n\t\t\t\t\tx.Op = cc.NotEq\n\n\t\t\t\tcase cc.NotEq:\n\t\t\t\t\tif isfloat(x.Left.XType) {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\t*x = *y\n\t\t\t\t\tx.Op = cc.EqEq\n\n\t\t\t\tcase cc.Lt:\n\t\t\t\t\tif isfloat(x.Left.XType) {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\t*x = *y\n\t\t\t\t\tx.Op = cc.GtEq\n\n\t\t\t\tcase cc.LtEq:\n\t\t\t\t\tif isfloat(x.Left.XType) {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\t*x = *y\n\t\t\t\t\tx.Op = cc.Gt\n\n\t\t\t\tcase cc.Gt:\n\t\t\t\t\tif isfloat(x.Left.XType) {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\t*x = *y\n\t\t\t\t\tx.Op = cc.LtEq\n\n\t\t\t\tcase cc.GtEq:\n\t\t\t\t\tif isfloat(x.Left.XType) {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\t*x = *y\n\t\t\t\t\tx.Op = cc.Lt\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t})\n}", "title": "" }, { "docid": "118f4202826b9c725910a94e85c8a886", "score": "0.58869493", "text": "func allBooleanLiterals(v jsonVisitor, items []pogo.Parsed) []bool {\n\tresult := make([]bool, 0)\n\tfor _, p := range items {\n\t\tif _, ok := isBooleanLiteral(p); ok {\n\t\t\tresult = append(result, acceptBooleanLiteral(v, p))\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "3ca59ad2262e58258d2eb9e536aa25a0", "score": "0.55778515", "text": "func (s *BaseGarvikListener) EnterBoolExpr(ctx *BoolExprContext) {}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "a927d882415b15b71f064b607d6790d4", "score": "0.5455449", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\treturn graphql.UnmarshalBoolean(v)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "2d600b737427c6b16992711163db7a80", "score": "0.5453787", "text": "func (ec *executionContext) unmarshalNBoolean2bool(ctx context.Context, v interface{}) (bool, error) {\n\tres, err := graphql.UnmarshalBoolean(v)\n\treturn res, graphql.ErrorOnPath(ctx, err)\n}", "title": "" }, { "docid": "7671951c6ed59fe71e8f7c8974a7715f", "score": "0.53934413", "text": "func Simplify(f Bool) Bool {\n\tif ff, ok := f.(*and); ok {\n\t\tv1 := Simplify(ff.V1)\n\t\tv2 := Simplify(ff.V2)\n\t\tif l, ok := v1.(*constBool); ok {\n\t\t\tif l.v == false {\n\t\t\t\treturn BoolConst(false)\n\t\t\t} else {\n\t\t\t\treturn v2\n\t\t\t}\n\t\t}\n\t\tif r, ok := v2.(*constBool); ok {\n\t\t\tif r.v == false {\n\t\t\t\treturn BoolConst(false)\n\t\t\t} else {\n\t\t\t\treturn v1\n\t\t\t}\n\t\t}\n\t\tif Equal(v1, v2) {\n\t\t\treturn v1\n\t\t}\n\t\tif l, ok := v1.(*not); ok {\n\t\t\tif Equal(l.V1, v2) {\n\t\t\t\treturn BoolConst(false)\n\t\t\t}\n\t\t}\n\t\tif r, ok := v2.(*not); ok {\n\t\t\tif Equal(v1, r.V1) {\n\t\t\t\treturn BoolConst(false)\n\t\t\t}\n\t\t}\n\t\tswitch vv1 := v1.(type) {\n\t\tcase *stringEq:\n\t\t\tif vv2, ok := v2.(*stringEq); ok {\n\t\t\t\tif vvv1, ok1 := isVarConst(vv1.V1, vv1.V2); ok1 {\n\t\t\t\t\tif vvv2, ok2 := isVarConst(vv2.V1, vv2.V2); ok2 {\n\t\t\t\t\t\tif vvv1 != vvv2 {\n\t\t\t\t\t\t\treturn BoolConst(false)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tif vv2, ok := v2.(*stringNe); ok {\n\t\t\t\tif vvv1, ok1 := isVarConst(vv1.V1, vv1.V2); ok1 {\n\t\t\t\t\tif vvv2, ok2 := isVarConst(vv2.V1, vv2.V2); ok2 {\n\t\t\t\t\t\tif vvv1 != vvv2 {\n\t\t\t\t\t\t\treturn v1\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\treturn BoolConst(false)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\tcase *stringNe:\n\t\t\tif vv2, ok := v2.(*stringEq); ok {\n\t\t\t\tif vvv1, ok1 := isVarConst(vv1.V1, vv1.V2); ok1 {\n\t\t\t\t\tif vvv2, ok2 := isVarConst(vv2.V1, vv2.V2); ok2 {\n\t\t\t\t\t\tif vvv1 != vvv2 {\n\t\t\t\t\t\t\treturn v2\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\treturn BoolConst(false)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\tcase *intEq:\n\t\t\tif vv2, ok := v2.(*intEq); ok {\n\t\t\t\tif vvv1, ok1 := isVarConst(vv1.V1, vv1.V2); ok1 {\n\t\t\t\t\tif vvv2, ok2 := isVarConst(vv2.V1, vv2.V2); ok2 {\n\t\t\t\t\t\tif vvv1 != vvv2 {\n\t\t\t\t\t\t\treturn BoolConst(false)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tif vv2, ok := v2.(*intNe); ok {\n\t\t\t\tif vvv1, ok1 := isVarConst(vv1.V1, vv1.V2); ok1 {\n\t\t\t\t\tif vvv2, ok2 := isVarConst(vv2.V1, vv2.V2); ok2 {\n\t\t\t\t\t\tif vvv1 != vvv2 {\n\t\t\t\t\t\t\treturn v1\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\treturn BoolConst(false)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\tcase *intNe:\n\t\t\tif vv2, ok := v2.(*intEq); ok {\n\t\t\t\tif vvv1, ok1 := isVarConst(vv1.V1, vv1.V2); ok1 {\n\t\t\t\t\tif vvv2, ok2 := isVarConst(vv2.V1, vv2.V2); ok2 {\n\t\t\t\t\t\tif vvv1 != vvv2 {\n\t\t\t\t\t\t\treturn v2\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\treturn BoolConst(false)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\tcase *uintEq:\n\t\t\tif vv2, ok := v2.(*uintEq); ok {\n\t\t\t\tif vvv1, ok1 := isVarConst(vv1.V1, vv1.V2); ok1 {\n\t\t\t\t\tif vvv2, ok2 := isVarConst(vv2.V1, vv2.V2); ok2 {\n\t\t\t\t\t\tif vvv1 != vvv2 {\n\t\t\t\t\t\t\treturn BoolConst(false)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tif vv2, ok := v2.(*uintNe); ok {\n\t\t\t\tif vvv1, ok1 := isVarConst(vv1.V1, vv1.V2); ok1 {\n\t\t\t\t\tif vvv2, ok2 := isVarConst(vv2.V1, vv2.V2); ok2 {\n\t\t\t\t\t\tif vvv1 != vvv2 {\n\t\t\t\t\t\t\treturn v1\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\treturn BoolConst(false)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\tcase *uintNe:\n\t\t\tif vv2, ok := v2.(*uintEq); ok {\n\t\t\t\tif vvv1, ok1 := isVarConst(vv1.V1, vv1.V2); ok1 {\n\t\t\t\t\tif vvv2, ok2 := isVarConst(vv2.V1, vv2.V2); ok2 {\n\t\t\t\t\t\tif vvv1 != vvv2 {\n\t\t\t\t\t\t\treturn v2\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\treturn BoolConst(false)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn And(v1, v2)\n\t}\n\tif ff, ok := f.(*or); ok {\n\t\tv1 := Simplify(ff.V1)\n\t\tv2 := Simplify(ff.V2)\n\t\tif l, ok := v1.(*constBool); ok {\n\t\t\tif l.v == true {\n\t\t\t\treturn BoolConst(true)\n\t\t\t} else {\n\t\t\t\treturn v2\n\t\t\t}\n\t\t}\n\t\tif r, ok := v2.(*constBool); ok {\n\t\t\tif r.v == true {\n\t\t\t\treturn BoolConst(true)\n\t\t\t} else {\n\t\t\t\treturn v1\n\t\t\t}\n\t\t}\n\t\tif Equal(v1, v2) {\n\t\t\treturn v1\n\t\t}\n\t\tif l, ok := v1.(*not); ok {\n\t\t\tif Equal(l.V1, v2) {\n\t\t\t\treturn BoolConst(true)\n\t\t\t}\n\t\t}\n\t\tif r, ok := v2.(*not); ok {\n\t\t\tif Equal(v1, r.V1) {\n\t\t\t\treturn BoolConst(true)\n\t\t\t}\n\t\t}\n\t\treturn Or(v1, v2)\n\t}\n\tif ff, ok := f.(*not); ok {\n\t\tv1 := Simplify(ff.V1)\n\t\tif vv, ok := v1.(*not); ok {\n\t\t\treturn vv.V1\n\t\t}\n\t\tif vv, ok := v1.(*constBool); ok {\n\t\t\treturn BoolConst(!vv.v)\n\t\t}\n\t\tif vv, ok := v1.(*and); ok {\n\t\t\treturn Simplify(Or(Not(vv.V1), Not(vv.V2)))\n\t\t}\n\t\tif vv, ok := v1.(*or); ok {\n\t\t\treturn Simplify(And(Not(vv.V1), Not(vv.V2)))\n\t\t}\n\t\tswitch vv := v1.(type) {\n\t\tcase *boolEq:\n\t\t\treturn BoolNe(vv.V1, vv.V2)\n\t\tcase *bytesEq:\n\t\t\treturn BytesNe(vv.V1, vv.V2)\n\t\tcase *doubleEq:\n\t\t\treturn DoubleNe(vv.V1, vv.V2)\n\t\tcase *intEq:\n\t\t\treturn IntNe(vv.V1, vv.V2)\n\t\tcase *stringEq:\n\t\t\treturn StringNe(vv.V1, vv.V2)\n\t\tcase *uintEq:\n\t\t\treturn UintNe(vv.V1, vv.V2)\n\t\tcase *boolNe:\n\t\t\treturn BoolEq(vv.V1, vv.V2)\n\t\tcase *bytesNe:\n\t\t\treturn BytesEq(vv.V1, vv.V2)\n\t\tcase *doubleNe:\n\t\t\treturn DoubleEq(vv.V1, vv.V2)\n\t\tcase *intNe:\n\t\t\treturn IntEq(vv.V1, vv.V2)\n\t\tcase *stringNe:\n\t\t\treturn StringEq(vv.V1, vv.V2)\n\t\tcase *uintNe:\n\t\t\treturn UintEq(vv.V1, vv.V2)\n\t\t}\n\t\treturn Not(v1)\n\t}\n\treturn f\n}", "title": "" }, { "docid": "3352ef78cc6820859adebf8d2f53372f", "score": "0.5359804", "text": "func expression(lex *lexer, vars *[]*rex.Value) *rex.Value {\n\ta := not(lex, vars)\n\tfor lex.checkLook(tknAnd, tknOr) {\n\t\tlex.getToken(tknAnd, tknOr)\n\t\ttkn := lex.current\n\t\tb := not(lex, vars)\n\t\tswitch tkn {\n\t\tcase tknAnd:\n\t\t\ta = rex.NewValueBool(a.Bool() && b.Bool())\n\t\tcase tknOr:\n\t\t\ta = rex.NewValueBool(a.Bool() || b.Bool())\n\t\t}\n\t}\n\treturn a\n}", "title": "" }, { "docid": "d9c5fab3dff59944134faf408dad7ab8", "score": "0.53247476", "text": "func ParseBool(in interface{}) (bool, error) {\n\tvar result bool\n\tif err := mapstructure.WeakDecode(in, &result); err != nil {\n\t\treturn false, err\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "60ee3590d004f4ab03250cee860a21bc", "score": "0.52971077", "text": "func (s *BaseGarvikListener) ExitBoolExpr(ctx *BoolExprContext) {}", "title": "" }, { "docid": "89caf6768367c04e9ccee1ada822d547", "score": "0.52117276", "text": "func parseAnnotationsBool(ctx context.Context, a map[string]string, key string, def bool) bool {\n\tif v, ok := a[key]; ok {\n\t\tswitch strings.ToLower(v) {\n\t\tcase \"true\":\n\t\t\treturn true\n\t\tcase \"false\":\n\t\t\treturn false\n\t\tdefault:\n\t\t\tlog.G(ctx).WithFields(logrus.Fields{\n\t\t\t\tlogfields.OCIAnnotation: key,\n\t\t\t\tlogfields.Value: v,\n\t\t\t\tlogfields.ExpectedType: logfields.Bool,\n\t\t\t}).Warning(\"annotation could not be parsed\")\n\t\t}\n\t}\n\treturn def\n}", "title": "" }, { "docid": "9f504d330325f66002ca6494ad5810f0", "score": "0.5206042", "text": "func (s *BaseXsParserListener) EnterBoolExpr(ctx *BoolExprContext) {}", "title": "" }, { "docid": "e30cb9ca732f80883977e923c9ada5cb", "score": "0.51962674", "text": "func parseBool(v starlark.Value) bool {\n\treturn bool(v.Truth())\n}", "title": "" }, { "docid": "5e23cfae19f8ca0c87c78b29647ac72e", "score": "0.5102921", "text": "func (vf ViewFuncs) ParseBool(raw interface{}) (bool, error) {\n\tv := fmt.Sprintf(\"%v\", raw)\n\tif len(v) == 0 {\n\t\treturn false, nil\n\t}\n\tswitch strings.ToLower(v) {\n\tcase \"true\", \"1\", \"yes\":\n\t\treturn true, nil\n\tcase \"false\", \"0\", \"no\":\n\t\treturn false, nil\n\tdefault:\n\t\treturn false, fmt.Errorf(\"invalid boolean value `%s`\", v)\n\t}\n}", "title": "" }, { "docid": "3574eeea22cf0ad387c5d231c38d9bcc", "score": "0.5100483", "text": "func Bool(v bool) *bool { return &v }", "title": "" }, { "docid": "3574eeea22cf0ad387c5d231c38d9bcc", "score": "0.5100483", "text": "func Bool(v bool) *bool { return &v }", "title": "" }, { "docid": "3574eeea22cf0ad387c5d231c38d9bcc", "score": "0.5100483", "text": "func Bool(v bool) *bool { return &v }", "title": "" }, { "docid": "3574eeea22cf0ad387c5d231c38d9bcc", "score": "0.5100483", "text": "func Bool(v bool) *bool { return &v }", "title": "" }, { "docid": "3574eeea22cf0ad387c5d231c38d9bcc", "score": "0.5100483", "text": "func Bool(v bool) *bool { return &v }", "title": "" }, { "docid": "3574eeea22cf0ad387c5d231c38d9bcc", "score": "0.5100483", "text": "func Bool(v bool) *bool { return &v }", "title": "" }, { "docid": "3574eeea22cf0ad387c5d231c38d9bcc", "score": "0.5100483", "text": "func Bool(v bool) *bool { return &v }", "title": "" }, { "docid": "3574eeea22cf0ad387c5d231c38d9bcc", "score": "0.5100483", "text": "func Bool(v bool) *bool { return &v }", "title": "" }, { "docid": "ad63a4fdd7c07b587bfdd7bb79eda999", "score": "0.5081698", "text": "func Bool(b bool) *bool { return &b }", "title": "" }, { "docid": "ad63a4fdd7c07b587bfdd7bb79eda999", "score": "0.5081698", "text": "func Bool(b bool) *bool { return &b }", "title": "" }, { "docid": "ad63a4fdd7c07b587bfdd7bb79eda999", "score": "0.5081698", "text": "func Bool(b bool) *bool { return &b }", "title": "" }, { "docid": "552ae46ee63d14b4c471e8fed61ad863", "score": "0.50673956", "text": "func DebugFalsef(cond bool, format string, v ...interface{}) {}", "title": "" }, { "docid": "2b9eac8486ab0ea0fd338ecad7896454", "score": "0.50497186", "text": "func (s *BaseXsParserListener) ExitBoolExpr(ctx *BoolExprContext) {}", "title": "" }, { "docid": "f78cb67c2a15202154046e83f2ae5243", "score": "0.50454766", "text": "func foldrBool(f func(bool, bool) bool, xs []bool, x0 bool) bool {\n\ty := x0 // neutral element\n\tfor _, x := range xs {\n\t\ty = f(y, x)\n\t}\n\treturn y\n}", "title": "" }, { "docid": "0e1a6fd7605ff2d51445a79c62b3ad38", "score": "0.5031062", "text": "func DebugFalse(cond bool, msg string) {}", "title": "" }, { "docid": "28ed973770428a9242f42819d8a9fd30", "score": "0.5021438", "text": "func (w *WaccVisitor) VisitExprBoolLiter(ctx *parser.ExprBoolLiterContext) interface{} {\n\tb, _ := strconv.ParseBool(ctx.BOOL_LITER().GetText())\n\treturn ast.NewLiteral(types.Boolean, b, getPos(ctx))\n}", "title": "" }, { "docid": "1a816d0ff267acfad7f2f7704e9a21d9", "score": "0.50136894", "text": "func BoolValueSlice(src []*bool) []bool {\n\tdst := make([]bool, len(src))\n\tfor i := 0; i < len(src); i++ {\n\t\tif src[i] != nil {\n\t\t\tdst[i] = *(src[i])\n\t\t}\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "1a816d0ff267acfad7f2f7704e9a21d9", "score": "0.50136894", "text": "func BoolValueSlice(src []*bool) []bool {\n\tdst := make([]bool, len(src))\n\tfor i := 0; i < len(src); i++ {\n\t\tif src[i] != nil {\n\t\t\tdst[i] = *(src[i])\n\t\t}\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "4a4f50109093b710fcc95e7d421f58cc", "score": "0.49949756", "text": "func FromBool(b bool) Bool {\n\treturn Bool{\n\t\trules: rules{simpleRule(b)},\n\t}\n}", "title": "" }, { "docid": "8cf93ca31f39477e2453a2478108dcef", "score": "0.49943057", "text": "func VisitBoolVal(in BoolVal, f Visit) error {\n\t_, err := f(in)\n\treturn err\n}", "title": "" }, { "docid": "d166c18d2216564aea6f27e6033afc41", "score": "0.49938145", "text": "func (pb *Problem) unsat() bool {\n\tdone := make([]bool, len(pb.Clauses)) // clauses that were deemed sat during propagation\n\tmodified := true\n\tfor modified {\n\t\tmodified = false\n\t\tfor i, clause := range pb.Clauses {\n\t\t\tif done[i] { // That clause was already proved true\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tunbound := 0\n\t\t\tvar unit int // An unbound literal, if any\n\t\t\tsat := false\n\t\t\tfor _, lit := range clause {\n\t\t\t\tv := lit\n\t\t\t\tif v < 0 {\n\t\t\t\t\tv = -v\n\t\t\t\t}\n\t\t\t\tbinding := pb.units[v-1]\n\t\t\t\tif binding == 0 {\n\t\t\t\t\tunbound++\n\t\t\t\t\tif unbound == 1 {\n\t\t\t\t\t\tunit = lit\n\t\t\t\t\t} else {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t} else if binding*lit == v { // (binding == -1 && lit < 0) || (binding == 1 && lit > 0) {\n\t\t\t\t\tsat = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif sat {\n\t\t\t\tdone[i] = true\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif unbound == 0 {\n\t\t\t\t// All lits are false: problem is UNSAT\n\t\t\t\tif i < pb.NbClauses {\n\t\t\t\t\tpb.tagged[i] = true\n\t\t\t\t}\n\t\t\t\treturn true\n\t\t\t}\n\t\t\tif unbound == 1 {\n\t\t\t\tif unit < 0 {\n\t\t\t\t\tpb.units[-unit-1] = -1\n\t\t\t\t} else {\n\t\t\t\t\tpb.units[unit-1] = 1\n\t\t\t\t}\n\t\t\t\tdone[i] = true\n\t\t\t\tif i < pb.NbClauses {\n\t\t\t\t\tpb.tagged[i] = true\n\t\t\t\t}\n\t\t\t\tmodified = true\n\t\t\t}\n\t\t}\n\t}\n\t// Problem is either sat or could not be proven unsat through unit propagation\n\treturn false\n}", "title": "" }, { "docid": "2077629cf10b48feb48982ad40458f65", "score": "0.49856153", "text": "func Not(boolean interface{}) Expr { return fn1(\"not\", boolean) }", "title": "" }, { "docid": "578ff7cfe120d02802f3bb99d91d7b3b", "score": "0.4984845", "text": "func BoolValueSlice(src []*bool) []bool {\n\tdst := make([]bool, len(src))\n\tfor i := range src {\n\t\tif src[i] != nil {\n\t\t\tdst[i] = *(src[i])\n\t\t}\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "ce4bc0d7fc8d1a67a0920c1475cc8113", "score": "0.49832654", "text": "func InterpretArgs(args []string, r Refactoring) []interface{} {\n\tparams := r.Description().Params\n\tresult := []interface{}{}\n\tfor i, opt := range args {\n\t\tif i < len(params) && params[i].IsBoolean() {\n\t\t\tswitch opt {\n\t\t\tcase \"true\":\n\t\t\t\tresult = append(result, true)\n\t\t\tcase \"false\":\n\t\t\t\tresult = append(result, false)\n\t\t\tdefault:\n\t\t\t\tresult = append(result, opt)\n\t\t\t}\n\t\t} else {\n\t\t\tresult = append(result, opt)\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "3eaa984c0905bef30dad589b9b3acc2a", "score": "0.4976203", "text": "func reflTakesBool(target interface{}) bool {\n\tval := reflValue(target)\n\tswitch val.Kind() {\n\tcase reflect.Bool:\n\t\treturn true\n\tcase reflect.Array, reflect.Slice:\n\t\treturn val.Type().Elem().Kind() == reflect.Bool\n\tdefault:\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "67928ff2d6fc17b34e489e954d3b89f1", "score": "0.49463445", "text": "func negate(myBoolean *bool) {\r\n\tif *myBoolean {\r\n\t\t*myBoolean = false\r\n\t\treturn\r\n\t}\r\n\t*myBoolean = true\r\n}", "title": "" }, { "docid": "a764d7eb241234849a9de3928f28f7b8", "score": "0.49409094", "text": "func BoolP(v bool) *bool {\n\treturn &v\n}", "title": "" }, { "docid": "5ab0b3b6dec8b21e9a97c35e5ac7cd45", "score": "0.49354765", "text": "func Bool(v bool) *bool { return Ptr(v) }", "title": "" }, { "docid": "5b7000be940ff2aa60a2d870734cac0c", "score": "0.49350575", "text": "func DropBool(pred BoolPredicate, s <-chan bool) <-chan bool {\n\tch := make(chan bool, 1)\n\tgo func() {\n\t\tfor {\n\t\t\tif v, ok := <-s; !ok {\n\t\t\t\tbreak\n\t\t\t} else if !pred(v) {\n\t\t\t\tch <- v\n\t\t\t\tfor i := range s {\n\t\t\t\t\tch <- i\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tclose(ch)\n\t}()\n\treturn ch\n}", "title": "" }, { "docid": "946252c36ed3022dcfd9e6b4c3a63e10", "score": "0.49345344", "text": "func NotAll(bools ...bool) bool {\n\treturn untilBool(func(b bool) bool { return !b }, bools...)\n}", "title": "" }, { "docid": "3ac8b87b553bd31422a58ded6f57eedf", "score": "0.49343634", "text": "func coalesceBool(lhs *bool, rhs *bool) {\n\t*lhs = *lhs || *rhs\n\t*rhs = false\n}", "title": "" }, { "docid": "00e690a94c0c1e04cee0bc45f9bad29a", "score": "0.4926104", "text": "func False(cond bool, format string, args ...interface{}) {}", "title": "" }, { "docid": "07147345596b211de0c22a50396ffcc1", "score": "0.4920569", "text": "func updateBool(valA *bool, valB bool) bool {\n\tif *valA != valB {\n\t\t*valA = valB\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "0ff04f1dbd36e110d96ff9c1ffde5170", "score": "0.4891268", "text": "func AssignToBool(dst, src any, _ AccumulativeBuffer) (ok bool) {\n\tswitch dst.(type) {\n\tcase *bool:\n\t\tswitch src.(type) {\n\t\tcase *bool:\n\t\t\t*dst.(*bool) = *src.(*bool)\n\t\t\tok = true\n\t\tcase bool:\n\t\t\t*dst.(*bool) = src.(bool)\n\t\t\tok = true\n\t\tcase *[]byte:\n\t\t\t*dst.(*bool) = fastconv.B2S(*src.(*[]byte)) == \"true\"\n\t\t\tok = true\n\t\tcase []byte:\n\t\t\t*dst.(*bool) = fastconv.B2S(src.([]byte)) == \"true\"\n\t\t\tok = true\n\t\tcase *string:\n\t\t\t*dst.(*bool) = *src.(*string) == \"true\"\n\t\t\tok = true\n\t\tcase string:\n\t\t\t*dst.(*bool) = src.(string) == \"true\"\n\t\t\tok = true\n\t\tcase int:\n\t\t\t*dst.(*bool) = src.(int) != 0\n\t\t\tok = true\n\t\tcase *int:\n\t\t\t*dst.(*bool) = *src.(*int) != 0\n\t\t\tok = true\n\t\tcase int8:\n\t\t\t*dst.(*bool) = src.(int8) != 0\n\t\t\tok = true\n\t\tcase *int8:\n\t\t\t*dst.(*bool) = *src.(*int8) != 0\n\t\t\tok = true\n\t\tcase int16:\n\t\t\t*dst.(*bool) = src.(int16) != 0\n\t\t\tok = true\n\t\tcase *int16:\n\t\t\t*dst.(*bool) = *src.(*int16) != 0\n\t\t\tok = true\n\t\tcase int32:\n\t\t\t*dst.(*bool) = src.(int32) != 0\n\t\t\tok = true\n\t\tcase *int32:\n\t\t\t*dst.(*bool) = *src.(*int32) != 0\n\t\t\tok = true\n\t\tcase int64:\n\t\t\t*dst.(*bool) = src.(int64) != 0\n\t\t\tok = true\n\t\tcase *int64:\n\t\t\t*dst.(*bool) = *src.(*int64) != 0\n\t\t\tok = true\n\t\tcase uint:\n\t\t\t*dst.(*bool) = src.(uint) != 0\n\t\t\tok = true\n\t\tcase *uint:\n\t\t\t*dst.(*bool) = *src.(*uint) != 0\n\t\t\tok = true\n\t\tcase uint8:\n\t\t\t*dst.(*bool) = src.(uint8) != 0\n\t\t\tok = true\n\t\tcase *uint8:\n\t\t\t*dst.(*bool) = *src.(*uint8) != 0\n\t\t\tok = true\n\t\tcase uint16:\n\t\t\t*dst.(*bool) = src.(uint16) != 0\n\t\t\tok = true\n\t\tcase *uint16:\n\t\t\t*dst.(*bool) = *src.(*uint16) != 0\n\t\t\tok = true\n\t\tcase uint32:\n\t\t\t*dst.(*bool) = src.(uint32) != 0\n\t\t\tok = true\n\t\tcase *uint32:\n\t\t\t*dst.(*bool) = *src.(*uint32) != 0\n\t\t\tok = true\n\t\tcase uint64:\n\t\t\t*dst.(*bool) = src.(uint64) != 0\n\t\t\tok = true\n\t\tcase *uint64:\n\t\t\t*dst.(*bool) = *src.(*uint64) != 0\n\t\t\tok = true\n\t\tcase float32:\n\t\t\t*dst.(*bool) = src.(float32) != 0\n\t\t\tok = true\n\t\tcase *float32:\n\t\t\t*dst.(*bool) = *src.(*float32) != 0\n\t\t\tok = true\n\t\tcase float64:\n\t\t\t*dst.(*bool) = src.(float64) != 0\n\t\t\tok = true\n\t\tcase *float64:\n\t\t\t*dst.(*bool) = *src.(*float64) != 0\n\t\t\tok = true\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7679ee71ccfce4c5e018a822b4ef2861", "score": "0.48869932", "text": "func BoolSlice(src []bool) []*bool {\n\tdst := make([]*bool, len(src))\n\tfor i := 0; i < len(src); i++ {\n\t\tdst[i] = &(src[i])\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "7679ee71ccfce4c5e018a822b4ef2861", "score": "0.48869932", "text": "func BoolSlice(src []bool) []*bool {\n\tdst := make([]*bool, len(src))\n\tfor i := 0; i < len(src); i++ {\n\t\tdst[i] = &(src[i])\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "a6ed9356e9a2b75cfd92422cfbe8525d", "score": "0.48866948", "text": "func BoolMap(src map[string]bool) map[string]*bool {\n\tdst := make(map[string]*bool)\n\tfor k, val := range src {\n\t\tv := val\n\t\tdst[k] = &v\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "a6ed9356e9a2b75cfd92422cfbe8525d", "score": "0.48866948", "text": "func BoolMap(src map[string]bool) map[string]*bool {\n\tdst := make(map[string]*bool)\n\tfor k, val := range src {\n\t\tv := val\n\t\tdst[k] = &v\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "3c81064d385044447f47ac6ea7193293", "score": "0.48864782", "text": "func buildBooleanLiteralVisitor(base jsonVisitor, fn func(delegate jsonVisitor, items []pogo.Parsed) bool) jsonVisitor {\n\treturn &jsonLambdaVisitor{\n\t\tbase: base,\n\t\tvisitBooleanLiteralFunc: fn,\n\t}\n}", "title": "" }, { "docid": "80f3b849400ff3deb93777af2be2a114", "score": "0.48844317", "text": "func FromBool(val bool) Bool {\n\tvar u uint32\n\tif val {\n\t\tu = 1\n\t}\n\treturn Bool{\n\t\tUint32{\n\t\t\tvalue: u,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "51cbab781c7f14dada11a29c9de25a3f", "score": "0.4872422", "text": "func main() {\n\tfmt.Println(true && true)\n\tfmt.Println(true && false)\n\tfmt.Println(true || true)\n\tfmt.Println(true || false)\n\tfmt.Println(!true)\n}", "title": "" }, { "docid": "d0e07bcda1ab2cb64bcd4da9cff6b43c", "score": "0.48692873", "text": "func BoolSlice(src []bool) []*bool {\n\tdst := make([]*bool, len(src))\n\tfor i := range src {\n\t\tdst[i] = &(src[i])\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "1746838ae6ad9d65ef6c7d2fbe90f151", "score": "0.48644096", "text": "func (f fakeCompiledExpr) EvaluateBoolean(attributes attribute.Bag) (bool, error) {\n\treturn f.b, f.err\n}", "title": "" }, { "docid": "368a1296c9fa31704145d5051605dd3f", "score": "0.48594174", "text": "func DMux(in, s bool) (a, b bool) {\n\ta = And(Not(s), in)\n\tb = And(s, in)\n\n\treturn\n}", "title": "" }, { "docid": "7c1e63c5afd486640e52119a13e217e6", "score": "0.48527306", "text": "func unpoint(expr ast.Expr) ast.Expr {\n\tif expr, ok := expr.(*ast.UnaryExpr); ok {\n\t\tif expr.Op == token.AND {\n\t\t\treturn expr.X\n\t\t}\n\t}\n\treturn expr\n}", "title": "" }, { "docid": "7d3e618bec34bb9cb85ade57df1741e3", "score": "0.48522574", "text": "func BoolValueMap(src map[string]*bool) map[string]bool {\n\tdst := make(map[string]bool)\n\tfor k, val := range src {\n\t\tif val != nil {\n\t\t\tdst[k] = *val\n\t\t}\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "7d3e618bec34bb9cb85ade57df1741e3", "score": "0.48522574", "text": "func BoolValueMap(src map[string]*bool) map[string]bool {\n\tdst := make(map[string]bool)\n\tfor k, val := range src {\n\t\tif val != nil {\n\t\t\tdst[k] = *val\n\t\t}\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "cd37f9e0823d405fab1e07829664e9fe", "score": "0.48480445", "text": "func builtinIsFalse(_ *lisp.LEnv, _ *lisp.LVal) *lisp.LVal {\n\t// NB these aren't normal functions - they aren't looking for an array of args\n\treturn lisp.Fun(GenSymbol(), lisp.Formals(), func(env *lisp.LEnv, input *lisp.LVal) *lisp.LVal {\n\t\tif input.Str != lisp.FalseSymbol {\n\t\t\treturn lisp.ErrorConditionf(FailedConstraint, \"Value %v is not false\", input)\n\t\t}\n\t\treturn lisp.Nil()\n\t})\n}", "title": "" }, { "docid": "072284dfa76810ff2f0dd3cff02c4ae5", "score": "0.48451492", "text": "func builtinCheckBool(env *lisp.LEnv, name string, constraints []*lisp.LVal) *lisp.LVal {\n\t// NB these aren't normal functions - they aren't looking for an array of args\n\treturn lisp.Fun(GenSymbol(), lisp.Formals(\"input\"), func(env *lisp.LEnv, input *lisp.LVal) *lisp.LVal {\n\t\tif input.Str != lisp.TrueSymbol && input.Str != lisp.FalseSymbol {\n\t\t\treturn lisp.ErrorConditionf(WrongType, \"Input was not a boolean for type %s\", name)\n\t\t}\n\t\treturn builtinCheckAny(env, constraints).FunData().Builtin(env, input)\n\t})\n}", "title": "" }, { "docid": "63ca3fd9f85704cdf520280d83d7e996", "score": "0.4842131", "text": "func Not(frame wdte.Frame, args ...wdte.Func) wdte.Func {\n\tframe = frame.Sub(\"!\")\n\n\tswitch len(args) {\n\tcase 0:\n\t\treturn wdte.GoFunc(Not)\n\t}\n\n\treturn wdte.Bool(args[0] != wdte.Bool(true))\n}", "title": "" }, { "docid": "4b02f485760cbaa928a4d95431a49ef7", "score": "0.48410475", "text": "func MakeBool(b bool) Value", "title": "" }, { "docid": "9668e6669e31eb08642f5db489d96684", "score": "0.48410332", "text": "func And(bools ...bool) bool {\n\treturn !NotAll(bools...)\n}", "title": "" }, { "docid": "fdb4b6f87349859fd76d74eee5c704b6", "score": "0.48237106", "text": "func False(expr bool, args ...interface{}) {\n\tassert(!expr, args, []interface{}{\"Expect false, but get true: [%T:%[1]v]\", expr})\n}", "title": "" }, { "docid": "fd96c99928ac9032cafff67f4e1d4fff", "score": "0.48145026", "text": "func LVAsBool(v LValue) bool { return v != LNil && v != LFalse }", "title": "" }, { "docid": "e9772df06e4f34db329ddd6aa0ee87d1", "score": "0.4793469", "text": "func AllTrue(vs ...bool) bool {\n\tfor _, v := range vs {\n\t\tif !v {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "dccdb854f0dc43dba2339c031efed972", "score": "0.47862726", "text": "func BoolMap(src map[string]bool) map[string]*bool {\n\tdst := make(map[string]*bool, len(src))\n\tfor k, val := range src {\n\t\tv := val\n\t\tdst[k] = &v\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "f5cd3e2e726d9a2c79a5de43beb6df0b", "score": "0.4785937", "text": "func BoolValueMap(src map[string]*bool) map[string]bool {\n\tdst := make(map[string]bool, len(src))\n\tfor k, val := range src {\n\t\tif val != nil {\n\t\t\tdst[k] = *val\n\t\t}\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "170a232edf0c40549ca9bd4d754eba56", "score": "0.47835845", "text": "func And(bools ...bool) bool {\r\n\tfor _, b := range bools {\r\n\t\tif !b {\r\n\t\t\treturn false\r\n\t\t}\r\n\t}\r\n\treturn true\r\n}", "title": "" }, { "docid": "24146869c2e96c8a9e4bd9fc41e25ed2", "score": "0.4780887", "text": "func loadBool(testVar *bool, testVarName, envVar, resource string) {\n\tif env := os.Getenv(envVar); env != \"\" {\n\t\t*testVar, _ = strconv.ParseBool(env)\n\t} else {\n\t\tboolVal := strconv.FormatBool(*testVar)\n\t\tfmt.Printf(WARNING_ERROR, envVar, testVarName, boolVal, resource)\n\t}\n}", "title": "" }, { "docid": "69d5a208c808cc6ecf4b709f79cbf16c", "score": "0.4780341", "text": "func skipOwnerRefCheck(annotations map[string]string) bool {\n\tif value, present := annotations[skipOwnerRefCheckAnnotation]; present {\n\t\tif skip, err := strconv.ParseBool(value); err == nil && skip {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "577e48232dda650aef443acd817c862c", "score": "0.47727466", "text": "func BoolSlice(i interface{}) []bool {\n\tv, _ := BoolSliceE(i)\n\treturn v\n}", "title": "" }, { "docid": "7f94bff619f6703d2cb85eb1c3e3d2de", "score": "0.4772177", "text": "func RefBool(b bool, defaultValue ...bool) *bool {\n\tdb := false\n\tif len(defaultValue) > 0 {\n\t\tdb = defaultValue[0]\n\t}\n\tif b == db {\n\t\treturn nil\n\t}\n\treturn &b\n}", "title": "" }, { "docid": "5e97be6069cff9662c7e451000eafdaa", "score": "0.4771386", "text": "func FromStdBoolSlice(s []bool) []Bool {\n\treturn *((*[]Bool)(unsafe.Pointer(&s)))\n}", "title": "" }, { "docid": "cf416d4a4fb117e49155ca52c86e5318", "score": "0.47682732", "text": "func Boolp(value bool) *bool {\n\treturn &value\n}", "title": "" } ]
a32d30786d3a1e9b33898430cc3ead2f
NewOnDemandWrapper returns new instance of OnDemandWrapper
[ { "docid": "51d860c80f5a1d8dda156bffb9dcfb44", "score": "0.78153145", "text": "func NewOnDemandWrapper(downloader TextFileDownloader, releaseRepo Repository) *OnDemandWrapper {\n\treturn &OnDemandWrapper{\n\t\tdownloader: downloader,\n\t\trepository: releaseRepo,\n\t}\n}", "title": "" } ]
[ { "docid": "0f2e3a61ff6a79c0eb8960d478bb1f50", "score": "0.6475877", "text": "func New() *wrapper {\n\treturn &wrapper{wrapped: nil}\n}", "title": "" }, { "docid": "adda87b4220ce4878fc99ab799a609b3", "score": "0.6003427", "text": "func NewWrapper(dep *fdep.Dep) *Wrapper {\n\treturn &Wrapper{\n\t\tdep: dep,\n\t}\n}", "title": "" }, { "docid": "17c63887402573bf7d38ef1c23d065ba", "score": "0.5892725", "text": "func NewWrapper(log *zap.Logger) *Wrapper {\n\treturn &Wrapper{log: log}\n}", "title": "" }, { "docid": "3d379f0bdd1cb8c1d45c4dcaa4736878", "score": "0.5774153", "text": "func New() *Wrapper {\n\treturn &Wrapper{\n\t\tOnConnect: map[string]OnConnect{},\n\t}\n}", "title": "" }, { "docid": "9bbf42e8e0e9429951ac0ab6b8b524d9", "score": "0.56748366", "text": "func NewWrapper(address common.Address, backend bind.ContractBackend) (*Wrapper, error) {\n\tcontract, err := bindWrapper(address, backend, backend, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Wrapper{WrapperCaller: WrapperCaller{contract: contract}, WrapperTransactor: WrapperTransactor{contract: contract}, WrapperFilterer: WrapperFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "f18cb3553d3215bc0f1f923046a3fd10", "score": "0.5651616", "text": "func CreateWrapper(key string, ntt interface{}) CacheWrapper {\n\treturn &cachable{\n\t\tkey: key,\n\t\tentity: ntt,\n\t}\n}", "title": "" }, { "docid": "6da3932c4b8cfdc9fbbcfbaa906952ce", "score": "0.5572867", "text": "func NewExternal()(*External) {\n m := &External{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "title": "" }, { "docid": "b7b1aa6ecf4ffad375b639cbeb0567a9", "score": "0.5514109", "text": "func newMockSweepManager(t mockConstructorTestingTnewMockSweepManager) *mockSweepManager {\n\tmock := &mockSweepManager{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "89da31ab6bfa6a743e2b42c5b937ce6a", "score": "0.5506721", "text": "func New() api.Facade {\n\treturn lockbased.NewFacade(lockbased.NewStore())\n}", "title": "" }, { "docid": "10807944a7c1b9e4e66637646a00c1b2", "score": "0.53720057", "text": "func NewWrapper(database *sql.DB) Wrapper {\n\tvar wrapper Wrapper\n\twrapper.Wrap(database)\n\treturn wrapper\n}", "title": "" }, { "docid": "97b976cf364540fc740d1babb16e2c21", "score": "0.5371605", "text": "func NewWrapper(name string) WrapperI {\n\tif w, ok := wrapperRegistry[name]; ok {\n\t\treturn w.CopyI()\n\t} else {\n\t\tpanic (\"Unkown wrapper \" + name)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0723bbf2eebfb25d4cdf53f9c2f4fa88", "score": "0.5365353", "text": "func newMockAPI() models.API {\n\tapi := MockAPI{}\n\treturn &api\n}", "title": "" }, { "docid": "65535cb0089805ec20b699906f238635", "score": "0.5329546", "text": "func newLocalCache(tenant interface{}, timeout time.Duration, debugMode bool, logger *log.Logger) *localCache {\n\tlc := &localCache{\n\t\ttimeout: timeout,\n\t\tdebugMode: debugMode,\n\t\tlogger: logger,\n\t}\n\tlc.SetTenant(tenant)\n\treturn lc\n}", "title": "" }, { "docid": "fbef514aa91cf32752b0831dd21dca97", "score": "0.5320921", "text": "func NewBypass() Bypass {\n\treturn make(Bypass)\n}", "title": "" }, { "docid": "c74243564b3310354259450ba9be1491", "score": "0.52780724", "text": "func NewWrapper(st, cacheStorage blob.Storage, prefixes []blob.ID, hmacSecret []byte, duration time.Duration) blob.Storage {\n\tif cacheStorage == nil {\n\t\treturn st\n\t}\n\n\treturn &listCacheStorage{\n\t\tStorage: st,\n\t\tcacheStorage: cacheStorage,\n\t\tprefixes: prefixes,\n\t\tcacheTimeFunc: clock.Now,\n\t\thmacSecret: hmacSecret,\n\t\tcacheDuration: duration,\n\t}\n}", "title": "" }, { "docid": "51fa1f3e70853b7467a23d4cb5a04a2c", "score": "0.5265649", "text": "func newRequester_unexported(t interface {\n\tmock.TestingT\n\tCleanup(func())\n}) *requester_unexported {\n\tmock := &requester_unexported{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "2cee2cea242fcca1e7a16365b720d573", "score": "0.52574253", "text": "func NewImpl() Impl { return new(impl) }", "title": "" }, { "docid": "31071ec9cf6fb783f3a12efbbac7aae0", "score": "0.5250986", "text": "func (p *dummyProvider) Create(cfg *Config) (Cache, error) {\n\treturn &dummyCache{p: p, cfg: cfg}, nil\n}", "title": "" }, { "docid": "275bea660ce18c232f680e037c949f44", "score": "0.5230088", "text": "func createWrapperFunction(function interface{}) {\n\tfn := reflect.ValueOf(function).Elem()\n\tv := reflect.MakeFunc(reflect.TypeOf(function).Elem(), genericWrapper)\n\tfn.Set(v)\n}", "title": "" }, { "docid": "c9a0419e748bdd0b674a6b2d4e1a31b4", "score": "0.52257925", "text": "func Wrap(t *testing.T) *Util {\n\treturn &Util{t}\n}", "title": "" }, { "docid": "822afa02ba941a5ccb492be52626447d", "score": "0.52247494", "text": "func NewOnDemandServer(g *graph.Graph, pool *ws.StructClientPool, handler OnDemandServerHandler) (*OnDemandServer, error) {\n\treturn &OnDemandServer{\n\t\tGraph: g,\n\t\tclientPool: pool,\n\t\tactiveTasks: make(map[graph.Identifier]map[string]*activeTask),\n\t\twsNamespace: ondemand.Namespace + handler.ResourceName(),\n\t\tresourceName: handler.ResourceName(),\n\t\thandler: handler,\n\t}, nil\n}", "title": "" }, { "docid": "61b75394634b64e48a929d9f7988a52c", "score": "0.5203773", "text": "func New() *AutoManagedProvider {\n\treturn NewWithConfig(\n\t\t2*time.Second,\n\t\t6330,\n\t\t\"localhost:6330\",\n\t)\n}", "title": "" }, { "docid": "c5e6c39af3f84117880fb31bc10e989e", "score": "0.520309", "text": "func newMockAPI(t *testing.T) (*API, *fakes.FakeCoreClient) {\n\tfake := &fakes.FakeCoreClient{}\n\ta, err := New(zaptest.NewLogger(t).Sugar(), CoreOpts{})\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\ta.c = fake\n\treturn a, fake\n}", "title": "" }, { "docid": "d73ec95d8a60deb2856bcbb11fbf58c7", "score": "0.51909", "text": "func WrapMeterImpl(impl MeterImpl, libraryName string) Meter {\n\treturn &wrappedMeterImpl{\n\t\timpl: impl,\n\t\tlibraryName: libraryName,\n\t}\n}", "title": "" }, { "docid": "4d27216a9775a06dd4781592c92cd615", "score": "0.51714927", "text": "func NewMock() Client {\n\treturn &fastlyMock{}\n}", "title": "" }, { "docid": "0bf3c7c49fbff00636edcba35778453c", "score": "0.5160757", "text": "func Wrap(statsHandler *ocgrpc.ClientHandler) stats.Handler {\n\treturn &wrapper{\n\t\toc: statsHandler,\n\t}\n}", "title": "" }, { "docid": "280c23ae956c65e9f1cc313ac9f2fb55", "score": "0.5160546", "text": "func New(lruCap ...int) *Cache {\n\tmemAdapter := NewAdapterMemory(lruCap...)\n\tc := &Cache{\n\t\tlocalAdapter: memAdapter,\n\t}\n\t// Here may be a \"timer leak\" if adapter is manually changed from memory adapter.\n\t// Do not worry about this, as adapter is less changed, and it does nothing if it's not used.\n\tgtimer.AddSingleton(context.Background(), time.Second, memAdapter.(*AdapterMemory).syncEventAndClearExpired)\n\treturn c\n}", "title": "" }, { "docid": "491060e8bb5ffd83743f4393a54023ff", "score": "0.51502156", "text": "func newLocalCache() CacheProvider {\r\n\tcache := new(localCache)\r\n\tcache.cached = map[interface{}]interface{}{}\r\n\tcache.exps = map[interface{}]time.Time{}\r\n\treturn cache\r\n}", "title": "" }, { "docid": "db34f3f91be69aafb7bee6c7af99abd6", "score": "0.5146383", "text": "func newManagementClient(url url.URL, p pipeline.Pipeline) managementClient {\n\treturn managementClient{\n\t\turl: url,\n\t\tp: p,\n\t}\n}", "title": "" }, { "docid": "d923f1d3fb9b81a00a63cc8683989905", "score": "0.51406807", "text": "func New(mgr manager.Manager) manager.Manager {\n\treturn &managerWrapper{\n\t\tManager: mgr,\n\t}\n}", "title": "" }, { "docid": "5a1179b4aa6bfe65bc6c132e03d1586c", "score": "0.5100883", "text": "func New(ctx context.Context, id string, publisher shim.Publisher, shutdown func()) (shim.Shim, error) {\n\treturn &service{}, nil\n}", "title": "" }, { "docid": "f301ff6d03481246680f169a27068df9", "score": "0.5100565", "text": "func NewInternal(client *Client) Internal {\n\treturn &internal{client: client}\n}", "title": "" }, { "docid": "f405a9b9212690617a9b657cf597b371", "score": "0.5082031", "text": "func New() Interface {\n\treturn newBreaker().trigger()\n}", "title": "" }, { "docid": "37b8834b3d6cf9c09c8a2cfcfeed6a96", "score": "0.50790304", "text": "func New(handler http.Handler, pool *safe.Pool) *Mirroring {\n\treturn &Mirroring{\n\t\troutinePool: pool,\n\t\thandler: handler,\n\t\trw: blackholeResponseWriter{},\n\t}\n}", "title": "" }, { "docid": "8157f565c85b56446b98ab905d392bb1", "score": "0.5077874", "text": "func New(memcache *memcache.Client, secondsToExpiry int32, orderNumberGetter contentserviceinterface.OrderNumberGetter) *Client {\n\treturn &Client{\n\t\tMemcache: memcache,\n\t\tSecondsToExpiry: secondsToExpiry,\n\t\tOrderNumberGetter: orderNumberGetter,\n\t}\n}", "title": "" }, { "docid": "efd9e4596e415b09cfdb38d4672afbfb", "score": "0.5076234", "text": "func newDirectRunner() Service {\n\trunner := direct.New(\n\t\tmustEnv(\"RUNNER\"),\n\t\tenv(\"TRACKER\", \"http://goci.me/rpc/tracker\"),\n\t\tmustEnv(\"HOSTED\"),\n\t)\n\treturn runner\n}", "title": "" }, { "docid": "ef0a4977be74b5dbf957260bdc620518", "score": "0.50684243", "text": "func New(config *Config, l *log.Logger) HttpWrapper {\n\treturn &httpwrapper{\n\t\tc: config,\n\t\tl: l,\n\t}\n}", "title": "" }, { "docid": "c5606a651161009d4150a18bba9e3625", "score": "0.506128", "text": "func Wrap(c *http.Client) *Client {\n\treturn &Client{native: c}\n}", "title": "" }, { "docid": "74d931b3b66b22f120520598a2a6d9d7", "score": "0.5059157", "text": "func NewWrapper(cfg Config) (func(http.Handler) http.HandlerFunc, error) {\n\tif cfg.MinSize < 0 {\n\t\treturn nil, fmt.Errorf(\"minimum size must be greater than or equal to zero\")\n\t}\n\n\tvar contentTypes []parsedContentType\n\tfor _, v := range cfg.ExcludedContentTypes {\n\t\tmediaType, params, err := mime.ParseMediaType(v)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"parsing media type: %w\", err)\n\t\t}\n\n\t\tcontentTypes = append(contentTypes, parsedContentType{mediaType, params})\n\t}\n\n\treturn func(h http.Handler) http.HandlerFunc {\n\t\treturn func(rw http.ResponseWriter, r *http.Request) {\n\t\t\trw.Header().Add(vary, acceptEncoding)\n\n\t\t\tbrw := &responseWriter{\n\t\t\t\trw: rw,\n\t\t\t\tbw: brotli.NewWriter(rw),\n\t\t\t\tminSize: cfg.MinSize,\n\t\t\t\tstatusCode: http.StatusOK,\n\t\t\t\texcludedContentTypes: contentTypes,\n\t\t\t}\n\t\t\tdefer brw.close()\n\n\t\t\th.ServeHTTP(brw, r)\n\t\t}\n\t}, nil\n}", "title": "" }, { "docid": "a9965126748b5f3362ec86c64c448839", "score": "0.5056608", "text": "func NewMock(jenkinsState idler.PodState, ownedBy string) *Proxy {\n\n\tif jenkinsState == \"\" {\n\t\tjenkinsState = idler.Idled\n\t}\n\tauth.SetDefaultClient(auth.NewMockAuth(\"http://authURL\"))\n\n\treturn &Proxy{\n\t\ttenant: &tenant.Mock{},\n\t\tidler: idler.NewMock(\"\", jenkinsState, false),\n\t\twit: &wit.Mock{\n\t\t\tOwnedBy: ownedBy,\n\t\t},\n\t\tclusters: map[string]string{\n\t\t\t\"Valid_OpenShift_API_URL\": \"test_route\",\n\t\t},\n\t\tProxyCache: cache.New(15*time.Minute, 10*time.Minute),\n\t\tTenantCache: cache.New(30*time.Minute, 40*time.Minute),\n\t\tredirect: \"http://redirect\",\n\t\tstorageService: &storage.Mock{},\n\t\tvisitLock: &sync.Mutex{},\n\t}\n}", "title": "" }, { "docid": "59c991a99c1c80a3935cebec41e2a22c", "score": "0.50462794", "text": "func New(real caching.Container) caching.Container {\n\treturn &container{\n\t\treal: real,\n\t}\n}", "title": "" }, { "docid": "cdf2d6d26f5e9c19905ee646af23188b", "score": "0.50430495", "text": "func NewTOKENMANAGEMENT(config configuration.CONFIGURATION) *TOKENMANAGEMENT_IMPL {\n client := new(TOKENMANAGEMENT_IMPL)\n client.config = config\n return client\n}", "title": "" }, { "docid": "13f0868f2bf99c933cd3653ceadc32d4", "score": "0.503697", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t\tService: dsunit.New(),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "1f93094acccd3bdc8c73970abe5ac683", "score": "0.502017", "text": "func New(ts topo.Server, actionTimeout, lockTimeout time.Duration) *Wrangler {\n\treturn &Wrangler{ts, initiator.NewActionInitiator(ts, *tabletManagerProtocol), time.Now().Add(actionTimeout), lockTimeout, true}\n}", "title": "" }, { "docid": "14f00ae6d39de3d023d385ed566a392e", "score": "0.5018781", "text": "func New() connector.Connector {\n\treturn mockConnector{}\n}", "title": "" }, { "docid": "d2067d1dab6e922cd63062ed1086d81e", "score": "0.5013366", "text": "func newMockProvider(endpoints []*endpoint.Endpoint, changes *plan.Changes) provider.Provider {\n\tdnsProvider := &mockProvider{\n\t\tRecordsStore: endpoints,\n\t\tExpectChanges: changes,\n\t}\n\n\treturn dnsProvider\n}", "title": "" }, { "docid": "5fad4eeb32abf8238e5c2ce1356a6687", "score": "0.50115657", "text": "func WrapMeterImpl(impl MeterImpl) metric.Meter {\n\treturn meter{impl}\n}", "title": "" }, { "docid": "91ef19805eff4b9702be907fb0dce2f2", "score": "0.50087065", "text": "func newClientCache(kubecli kubernetes.Interface, apiObject *api.ArangoDeployment) *clientCache {\n\treturn &clientCache{\n\t\tclients: make(map[string]driver.Client),\n\t\tkubecli: kubecli,\n\t\tapiObject: apiObject,\n\t}\n}", "title": "" }, { "docid": "990f0d2ef8cafb33b7b8689e0b39c91c", "score": "0.5008372", "text": "func New() executor.Memcache {\n\treturn &memcacheExecutor{}\n}", "title": "" }, { "docid": "89c3938ef73b20c2264089dab201940d", "score": "0.49941474", "text": "func NewSdkWrapper() (*SdkWrapper, error) {\n\tsw := &SdkWrapper{}\n\terr := sw.loadEnv()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// init client\n\tc, err := google.DefaultClient(context.Background(), compute.CloudPlatformScope)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsw.computeService, err = compute.New(c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsw.throttler = throttle.NewTokenBucket(sw.ratelimitqps, sw.ratelimitbucketSize)\n\treturn sw, nil\n}", "title": "" }, { "docid": "89c3938ef73b20c2264089dab201940d", "score": "0.49941474", "text": "func NewSdkWrapper() (*SdkWrapper, error) {\n\tsw := &SdkWrapper{}\n\terr := sw.loadEnv()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// init client\n\tc, err := google.DefaultClient(context.Background(), compute.CloudPlatformScope)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsw.computeService, err = compute.New(c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsw.throttler = throttle.NewTokenBucket(sw.ratelimitqps, sw.ratelimitbucketSize)\n\treturn sw, nil\n}", "title": "" }, { "docid": "51d41c9fdca863a9f2b0153a98974785", "score": "0.49940327", "text": "func Wrap(p RemotePaxos) RemotePaxos {\n\treturn &Paxos{p}\n}", "title": "" }, { "docid": "51d41c9fdca863a9f2b0153a98974785", "score": "0.49940327", "text": "func Wrap(p RemotePaxos) RemotePaxos {\n\treturn &Paxos{p}\n}", "title": "" }, { "docid": "e38f97d7eb3b9a0f7e0b37a0a18259c2", "score": "0.4980965", "text": "func Wrap(rt http.RoundTripper) http.RoundTripper {\n\treturn &transport{wrapped: rt}\n}", "title": "" }, { "docid": "d2d6856d311c816c7401fb9cd1b5a215", "score": "0.4970735", "text": "func NewLocalImplementation() Implementation { return &localImpl{} }", "title": "" }, { "docid": "84fa77cbbea6712668c6b77a1b7d59a7", "score": "0.4967354", "text": "func (*NoFactory) New() Module { return nil }", "title": "" }, { "docid": "06add70088a12db61401ba84809a599c", "score": "0.49659938", "text": "func newInstrumentingService(counter metrics.Counter, latency metrics.Histogram, s Service) Service {\n\treturn &instrumentingService{\n\t\trequestCount: counter,\n\t\trequestLatency: latency,\n\t\tService: s,\n\t}\n}", "title": "" }, { "docid": "0d6a3987292caee9d434d71dee7ee1de", "score": "0.4964155", "text": "func newMockApiClient(t mockConstructorTestingTnewMockApiClient) *mockApiClient {\n\tmock := &mockApiClient{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "f9176d09f46ae9a7adb436a0a814d8a5", "score": "0.49603117", "text": "func New(host, callerID, apiKey string) Interface {\n\treturn &Client{\n\t\thost: host,\n\t\tcallerID: callerID,\n\t\tapiKey: apiKey,\n\t}\n}", "title": "" }, { "docid": "c0415b7050797a3539cecacd791030e9", "score": "0.49593392", "text": "func NewExternalAdapterClient(t mockConstructorTestingTNewExternalAdapterClient) *ExternalAdapterClient {\n\tmock := &ExternalAdapterClient{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "62f7064065f92c522e2c62be0034672f", "score": "0.4955491", "text": "func New() *Mock {\n\treturn &Mock{\n\t\tmutex: sync.Mutex{},\n\t\tcurtime: time.Now(),\n\t}\n}", "title": "" }, { "docid": "b135ad5c6bcdee713e03aabbde010eee", "score": "0.4954653", "text": "func New(address string, expiredTime time.Duration) (*Client, error) {\n\tc := memcache.New(address)\n\treturn NewFromGoMemCache(c, expiredTime), c.Ping()\n}", "title": "" }, { "docid": "f00e3f027da496e8ff660a54e8e6c033", "score": "0.49526584", "text": "func (c *Cache) Wrap(be restic.Backend) restic.Backend {\n\treturn &Backend{\n\t\tBackend: be,\n\t\tCache: c,\n\t}\n}", "title": "" }, { "docid": "2cc080fb2646cded7a1987cd07f9cfaa", "score": "0.4950602", "text": "func newMockApiClientSys(t mockConstructorTestingTnewMockApiClientSys) *mockApiClientSys {\n\tmock := &mockApiClientSys{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "b514d532ee7a91fc1bc09db5ca228cd1", "score": "0.4945386", "text": "func NewStandalone(\n\tport int,\n\tproxyName,\n\tzoneName string,\n) (func(poller.Consumer) Differ, poller.Registrar) {\n\treturn func(consumer poller.Consumer) Differ {\n\t\treturn standaloneDiffer{\n\t\t\tport: port,\n\t\t\tconsumer: consumer,\n\t\t\tproxyName: proxyName,\n\t\t\tzoneName: zoneName,\n\t\t}\n\t}, poller.NewNopRegistrar()\n}", "title": "" }, { "docid": "451ece380080620a09a9c41cf016a24f", "score": "0.49423832", "text": "func NewClientWrapper(bs map[string]*ratelimit.Bucket, wait bool) client.Wrapper {\n\tfn := clientLimit(bs, wait, \"go.micro.client\")\n\n\treturn func(c client.Client) client.Client {\n\t\treturn &clientWrapper{fn, c}\n\t}\n}", "title": "" }, { "docid": "97ee19105e6ca472ecd48b2ad92bfffa", "score": "0.49379042", "text": "func NewProxy(llm *LogListManager, db DistributorBuilder, mf monitoring.MetricFactory) *Proxy {\n\tvar p Proxy\n\tp.llWatcher = llm\n\tp.distributorBuilder = db\n\tp.Init = make(chan bool, 1)\n\tp.rootsRefreshInterval = 24 * time.Hour\n\n\tif mf == nil {\n\t\tmf = monitoring.InertMetricFactory{}\n\t}\n\tproxyOnce.Do(func() { proxyInitMetrics(mf) })\n\n\treturn &p\n}", "title": "" }, { "docid": "4d41304f12661dcf8af80b667cc6ab87", "score": "0.4936519", "text": "func New() servicespec.InstrumentorService {\n\treturn &service{}\n}", "title": "" }, { "docid": "2c7748a7f14068a7001dc5f3459133b7", "score": "0.49332973", "text": "func newMockGoSNMPWrapper(t mockNewGoSNMPWrapperT) *MockGoSNMPWrapper {\n\tmock := &MockGoSNMPWrapper{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "648dd757b86a75467f24c42ffe11c6b0", "score": "0.49298584", "text": "func (s *TestServer) Wrap(t *testing.T) *WrappedTestServer {\n\treturn &WrappedTestServer{s, t}\n}", "title": "" }, { "docid": "a12921dee4ace7b7d8441a265b284bd8", "score": "0.49296403", "text": "func New(ctx context.Context, client Client) (*Exporter, error) {\n\texp := NewUnstarted(client)\n\tif err := exp.Start(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\treturn exp, nil\n}", "title": "" }, { "docid": "0ed1c2d22e3e2e29e73235e438e465bc", "score": "0.49219623", "text": "func New(lruCap ...int) *Cache {\n\tmemAdapter := newAdapterMemory(lruCap...)\n\tc := &Cache{\n\t\tadapter: memAdapter,\n\t}\n\t// Here may be a \"timer leak\" if adapter is manually changed from memory adapter.\n\t// Do not worry about this, as adapter is less changed and it dose nothing if it's not used.\n\tgtimer.AddSingleton(time.Second, memAdapter.syncEventAndClearExpired)\n\treturn c\n}", "title": "" }, { "docid": "3ba4069a1b4531471158399e43cf8eaf", "score": "0.4921517", "text": "func New(hint int64) *QueueWrapper {\n return &QueueWrapper{\n simpleQueue: queue.New(hint),\n queueSize: 0,\n queueLock: &sync.RWMutex{},\n }\n}", "title": "" }, { "docid": "2c9209f12d94d7a6f7177c964ad5ea31", "score": "0.49167904", "text": "func New(config *Config) (http.RoundTripper, error) {\n\t// Set transport level security\n\tif config.Transport != nil && (config.HasCA() || config.HasCertAuth() || config.HasCertCallback() || config.TLS.Insecure) {\n\t\treturn nil, fmt.Errorf(\"using a custom transport with TLS certificate options or the insecure flag is not allowed\")\n\t}\n\n\tif !isValidHolders(config) {\n\t\treturn nil, fmt.Errorf(\"misconfigured holder for dialer or cert callback\")\n\t}\n\n\tvar (\n\t\trt http.RoundTripper\n\t\terr error\n\t)\n\n\tif config.Transport != nil {\n\t\trt = config.Transport\n\t} else {\n\t\trt, err = tlsCache.get(config)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn HTTPWrappersForConfig(config, rt)\n}", "title": "" }, { "docid": "62fa239c75147135ab00eb58aa8e1a9f", "score": "0.49154794", "text": "func New(hostname string, api API) *Client {\n\tclient := &Client{\n\t\tnow: now,\n\t\thostname: hostname,\n\t\tmetrics: make(map[string]*Metric),\n\t\thistograms: make(map[string]*ExactHistogram),\n\t\twriter: api,\n\t\tlastFlush: now(),\n\t}\n\treturn client\n}", "title": "" }, { "docid": "c88aaa4d413378654605e88740995c5c", "score": "0.48990178", "text": "func newLocalService(env evergreen.Environment) *localService {\n\treturn &localService{env: env}\n}", "title": "" }, { "docid": "089bbf15bd86e7b98a638970ee83cdc4", "score": "0.48967633", "text": "func newServer() *internalServerStuff {\n\ts := new(internalServerStuff)\n\n\treturn s\n\n}", "title": "" }, { "docid": "a17728fe473bcf21f249ede65a719428", "score": "0.48904055", "text": "func newMock_Client(t interface {\n\tmock.TestingT\n\tCleanup(func())\n}) *mock_Client {\n\tmock := &mock_Client{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "691305780e019dc7e6633037e4a54412", "score": "0.48895445", "text": "func newHandleCache(eventLogName string, loader handleLoaderFunc,\n\tfreer freeLibraryFunc) *handleCache {\n\n\thc := &handleCache{\n\t\tloader: loader,\n\t\tfreer: freer,\n\t\teventLogName: eventLogName,\n\t}\n\thc.cache = common.NewCacheWithRemovalListener(expirationTimeout,\n\t\tinitialSize, hc.evictionHandler)\n\thc.cache.StartJanitor(janitorInterval)\n\treturn hc\n}", "title": "" }, { "docid": "49819f989084c7c14070ff83d569356a", "score": "0.48822397", "text": "func newInstance(cfg *config.Instance, p *dataCenterProvider) (resource.ProviderInstance, error) {\n\tlog.Info(\"Initializing mock instance\")\n\ti := &instance{\n\t\tmock: newMock(\"instance\", p.Provider),\n\t\tInstance: cfg,\n\t\tid: \"0xdeadbeef\",\n\t\timageId: \"0xcab01dab\",\n\t\tkeyname: \"id_rsa\",\n\t\tstate: \"available\",\n\t\tprivateIPAddress: \"192.168.0.1\",\n\t\tpublicIPAddress: \"34.33.32.31\",\n\t}\n\treturn i, nil\n}", "title": "" }, { "docid": "0d845a05deba32ce7e6ff85ce6b24292", "score": "0.4879167", "text": "func New(addr, key, env string, c Cache) *Client {\n\tif c == nil {\n\t\tc = NoCache{}\n\t}\n\treturn &Client{\n\t\tAddr: addr,\n\t\tCache: c,\n\t\tkey: key,\n\t}\n}", "title": "" }, { "docid": "088eb5a453b9fdcd0b08a1e39f60309e", "score": "0.4878325", "text": "func newStandaloneService(servingOptions *options.ServingOptions, instanceManager *instanceManager) *standaloneService {\n\ts := &standaloneService{\n\t\tservingOptions: servingOptions,\n\t\tinstanceManager: instanceManager,\n\t}\n\treturn s\n}", "title": "" }, { "docid": "7450a01ada4dda696a2e79110299f40f", "score": "0.48721728", "text": "func NewMock() *Mock {\n\treturn &Mock{\n\t\tData: MockData{\n\t\t\tServices: make(map[uint64]map[string]Service),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "fe2bae1f7b6111fff0712c5454abcde9", "score": "0.48657322", "text": "func New() *Locker {\n return &Locker{\n m : gmap.NewStrAnyMap(),\n }\n}", "title": "" }, { "docid": "aa556e26a5c9a11165e091bd1b662d08", "score": "0.48654696", "text": "func newInstrumenter(appName string, meter metric.Meter, latencyCallback metric.Int64ObserverFunc) (ins *instrumenter, err error) {\n\tins = new(instrumenter)\n\n\tdefaultLabels := []label.KeyValue{label.String(\"name\", appName)}\n\n\tmsgSeen, err := meter.NewInt64Counter(\"msgSeen\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tslackLatency, err := meter.NewInt64ValueObserver(\"slackLatencyMillis\", latencyCallback)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdispatchLatency, err := meter.NewInt64ValueRecorder(\"msgDispatchLatencyMillis\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmsgProcessed, err := newBoundCounterByMsgType(\"msgProcessed\", appName, meter)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmsgProcessingLatencyMillis, err := newBoundValueRecorderByMsgType(\"msgProcessingLatencyMillis\", appName, meter)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tins.coreMetrics = coreMetrics{msgsSeen: msgSeen.Bind(defaultLabels...),\n\t\tmsgsProcessed: msgProcessed,\n\t\tmsgProcessingLatencyMillis: msgProcessingLatencyMillis,\n\t\tmsgDispatchLatencyMillis: dispatchLatency.Bind(defaultLabels...),\n\t\tslackLatencyMillis: slackLatency}\n\n\tins.appName = appName\n\tins.pluginMetrics = make(map[string]pluginMetrics)\n\n\tins.meter = meter\n\treturn ins, nil\n}", "title": "" }, { "docid": "8e3b999c45c2c40d5bb6dcc3e91cf1e7", "score": "0.48592818", "text": "func NewFaultWrapper(logger *log.Logger, template *template.Template) *FaultWrapper {\n\n\tfw := &FaultWrapper{\n\t\ttemplate: template,\n\t\tlogger: logger,\n\t}\n\n\treturn fw\n}", "title": "" }, { "docid": "8af81a6605d6569bc443bdad0e7dcad6", "score": "0.48592398", "text": "func New() Interface {\n\tif singleton == nil {\n\t\tsingleton = new(impl)\n\t\truntime.SetFinalizer(singleton, destructor)\n\t}\n\t// singleton.Debug = true\n\treturn singleton\n}", "title": "" }, { "docid": "e982d41f8d7087205e20dbcede101124", "score": "0.48571923", "text": "func New(client *http.Client) (downloader module.Downloader) {\n\tmoduleBase := stub.NewModuleInternal()\n\tif client == nil {\n\t\tclient = DefaultClient\n\t}\n\n\treturn &myDownloader{\n\t\tModuleInternal: moduleBase,\n\t\thttpClient: client,\n\t}\n}", "title": "" }, { "docid": "d9433890f8284ef8ba45893d1b5f2ff5", "score": "0.48519397", "text": "func GetInstance(apiOptions models.APIOptions) *ClientWrapper {\n\n\tif clientInstance != nil {\n\t\treturn clientInstance\n\t}\n\n\tsdkKey++\n\tdatafileDir := os.Getenv(\"DATAFILES_DIR\")\n\tdatafile, err := ioutil.ReadFile(filepath.Clean(path.Join(datafileDir, apiOptions.DatafileName)))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tconfigManager, err := config.NewStaticProjectConfigManagerFromPayload(datafile)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\teventProcessor := event.NewBatchEventProcessor(\n\t\tevent.WithBatchSize(models.EventProcessorDefaultBatchSize),\n\t\tevent.WithQueueSize(models.EventProcessorDefaultQueueSize),\n\t\tevent.WithFlushInterval(models.EventProcessorDefaultFlushInterval),\n\t)\n\n\toptimizelyFactory := &client.OptimizelyFactory{\n\t\tDatafile: datafile,\n\t}\n\n\teventProcessor.EventDispatcher = &optlyplugins.ProxyEventDispatcher{}\n\n\tconfig, err := configManager.GetConfig()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\toverrideStore := decision.NewMapExperimentOverridesStore()\n\tuserProfileService := userprofileservice.CreateUserProfileService(config, apiOptions)\n\tcompositeExperimentService := decision.NewCompositeExperimentService(\n\t\tdecision.WithUserProfileService(userProfileService),\n\t\tdecision.WithOverrideStore(overrideStore),\n\t)\n\n\t// @TODO: Add sdkKey dynamically once event-batching support is implemented\n\tcompositeService := decision.NewCompositeService(strconv.Itoa(sdkKey), decision.WithCompositeExperimentService(compositeExperimentService))\n\tclient, err := optimizelyFactory.Client(\n\t\tclient.WithConfigManager(configManager),\n\t\tclient.WithDecisionService(compositeService),\n\t\tclient.WithEventProcessor(eventProcessor),\n\t)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tnotificationManager := optlyplugins.NotificationManager{}\n\tnotificationManager.SubscribeNotifications(apiOptions.Listeners, client)\n\tclientInstance = &ClientWrapper{\n\t\tclient: client,\n\t\teventDispatcher: eventProcessor.EventDispatcher,\n\t\tuserProfileService: userProfileService,\n\t\toverrideStore: overrideStore,\n\t\tnotificationManager: &notificationManager,\n\t}\n\treturn clientInstance\n}", "title": "" }, { "docid": "78b8961169dc75aa1c9d01ab8f776ed4", "score": "0.48500076", "text": "func New() Interface {\n\tvar client = &http.Client{Timeout: defaultHTTPTimeout}\n\treturn &metadataGetter{client: client, baseURL: baseURL}\n}", "title": "" }, { "docid": "273e9e626ad42b4b1daab458a9942034", "score": "0.48446465", "text": "func New(ctx context.Context, id string, publisher events.Publisher) (shim.Shim, error) {\n\treturn &service{\n\t\tcontext: ctx,\n\t\tid: id,\n\t\tprocesses: make(map[string]*process),\n\t\tpublisher: publisher,\n\t}, nil\n}", "title": "" }, { "docid": "d5fbdabd152ba5b8ecdb95a7300d6934", "score": "0.484407", "text": "func Setup() *Wrapper {\n\treturn &Wrapper{\n\t\t&exchange.Exchange{},\n\t}\n}", "title": "" }, { "docid": "7504ea38a061f7f7a4ced22ec9ba718d", "score": "0.48437634", "text": "func NewWrapper(cmd *exec.Cmd, stdin io.Reader) *Wrapper {\n\twrapper := &Wrapper{Command: cmd}\n\tif stdin != nil {\n\t\tcmd.Stdin = stdin\n\t}\n\tcmd.Stdout = &wrapper.Stdout\n\tcmd.Stderr = &wrapper.Stderr\n\treturn wrapper\n}", "title": "" }, { "docid": "fa9d0f7d23c9b02c8a945ad04f41e315", "score": "0.4835529", "text": "func New() *Proxy {\n\treturn &Proxy{}\n}", "title": "" }, { "docid": "1db8092439520801c7c5aa0bfb6db31e", "score": "0.48332852", "text": "func newLocalHelper() localInterface {\n\tl := &localHelper{artifactCtl: artifact.Ctl}\n\tl.init()\n\treturn l\n}", "title": "" }, { "docid": "09dae0b986b7d988b8bc2f61f5fb2cc0", "score": "0.48329118", "text": "func newCacheImpl(opts ...Option) *cacheImpl {\n\toptions := newOptions(opts...)\n\tc := &cacheImpl{\n\t\toptions: options,\n\t\tkeys: make(map[string]string),\n\t\thsets: make(map[string]map[string]string),\n\t\tdelKeys: make(map[string]string),\n\t}\n\tif c.options.Driver == nil {\n\t\tc.options.Driver = driver.DefaultDriver\n\t}\n\treturn c\n}", "title": "" }, { "docid": "35bbc61c5e1f05fa4d692102938e82f8", "score": "0.4825453", "text": "func newCacheDetector(cacheDataManager *cacheDataManager, resourceClient source.ResourceClient) *cacheDetector {\n\treturn &cacheDetector{\n\t\tcacheDataManager: cacheDataManager,\n\t\tresourceClient: resourceClient,\n\t}\n}", "title": "" }, { "docid": "737d29d627cdd19dcc0b6bdee7a88948", "score": "0.4822065", "text": "func newDummyDataStoreClient() datastore.DataStoreClient {\n\treturn &dummyDataStoreClient{}\n}", "title": "" }, { "docid": "0ca675c42ddd7ba85e4c436148111d4b", "score": "0.48179376", "text": "func New() Interface {\n\treturn new(impl)\n}", "title": "" }, { "docid": "eb20d80b351f7e32d9a7739418453844", "score": "0.4817821", "text": "func (dt *dependenciesTracker) Wrap(cl pulumirpc.ResourceMonitorClient) pulumirpc.ResourceMonitorClient {\n\tm := newInterceptingResourceMonitor(cl)\n\tm.afterRegisterResource = func(in *pulumirpc.RegisterResourceRequest,\n\t\tresp *pulumirpc.RegisterResourceResponse,\n\t\terr error,\n\t) {\n\t\tvar deps []URN\n\t\tfor _, dep := range in.GetDependencies() {\n\t\t\tdeps = append(deps, URN(dep))\n\t\t}\n\t\tdt.dependsOn.Store(URN(resp.Urn), deps)\n\t}\n\treturn m\n}", "title": "" } ]
62fbb903adf5d1270c8c3debefd08097
NewDNSHandler creates a new dnshandler that simply connects to the endpoint by passed url connectTO is endpoint url
[ { "docid": "d3846d277f0ccb46442baa532e769d93", "score": "0.77513623", "text": "func NewDNSHandler(connectTO *url.URL) dnsutils.Handler {\n\treturn &connectDNSHandler{connectTO: connectTO}\n}", "title": "" } ]
[ { "docid": "9521c3eb7e7472182cecf3514f8af7e5", "score": "0.6527121", "text": "func NewDNSHandler(traced dnsutils.Handler) dnsutils.Handler {\n\treturn next.NewDNSHandler(\n\t\t&beginTraceHandler{traced: traced},\n\t\t&endTraceHandler{},\n\t)\n}", "title": "" }, { "docid": "e5f8a13d5c9d7d2a7508793b6822f8ca", "score": "0.5547608", "text": "func makeEndpoint(hostport, serviceName string) *zipkincore.Endpoint {\n\thost, port, err := net.SplitHostPort(hostport)\n\tif err != nil {\n\t\treturn nil\n\t}\n\taddrs, err := net.LookupIP(host)\n\tif err != nil {\n\t\treturn nil\n\t}\n\tif len(addrs) <= 0 {\n\t\treturn nil\n\t}\n\tportInt, err := strconv.ParseInt(port, 10, 16)\n\tif err != nil {\n\t\treturn nil\n\t}\n\tendpoint := zipkincore.NewEndpoint()\n\tbinary.LittleEndian.PutUint32(addrs[0], (uint32)(endpoint.Ipv4))\n\tendpoint.Port = int16(portInt)\n\tendpoint.ServiceName = serviceName\n\treturn endpoint\n}", "title": "" }, { "docid": "7ea669655032d444a6ba892c5668e4b1", "score": "0.54606", "text": "func newSignHandler(server *Server, endpoint string) (h http.Handler, err error) {\n\t// NewHandler is constructor for register handler\n\treturn &cfapi.HTTPHandler{\n\t\tHandler: &signHandler{server: server, endpoint: endpoint},\n\t\tMethods: []string{\"POST\"},\n\t}, nil\n}", "title": "" }, { "docid": "148ae887c0022ae6422d88dfbd96b913", "score": "0.5374734", "text": "func New(upstream string) *Handler {\n\t_, port, err := net.SplitHostPort(upstream)\n\tif err != nil && !strings.HasSuffix(err.Error(), \"missing port in address\") {\n\t\tpanic(err)\n\t}\n\n\tif len(port) == 0 {\n\t\tupstream += \":80\"\n\t}\n\n\treturn &Handler{\n\t\tclient: http.Client{\n\t\t\tTimeout: 1 * time.Hour,\n\t\t},\n\t\tupstream: upstream,\n\t}\n}", "title": "" }, { "docid": "7b490fd7f6ba4ee975bee109fa3094e8", "score": "0.5354944", "text": "func NewEntryPointHandler(dstEntryPoint *configuration.EntryPoint, permanent bool) (negroni.Handler, error) {\n\texp := regexp.MustCompile(`(:\\d+)`)\n\tmatch := exp.FindStringSubmatch(dstEntryPoint.Address)\n\tif len(match) == 0 {\n\t\treturn nil, fmt.Errorf(\"bad Address format %q\", dstEntryPoint.Address)\n\t}\n\n\tprotocol := \"http\"\n\tif dstEntryPoint.TLS != nil {\n\t\tprotocol = \"https\"\n\t}\n\n\treplacement := protocol + \"://${1}\" + match[0] + \"${2}\"\n\n\treturn NewRegexHandler(defaultRedirectRegex, replacement, permanent)\n}", "title": "" }, { "docid": "f90e73c5b23e06db831c31abefab6c42", "score": "0.5295993", "text": "func newEndpoint(URI, authURI string) endpoint {\n\treturn endpoint{\n\t\tURI: URI,\n\t\tAuthURI: authURI,\n\t}\n}", "title": "" }, { "docid": "ed4c85ffc62f15129a6ff1ffb0fd9f60", "score": "0.5263838", "text": "func DialHandler(address string, handler Handler, signalHandler SignalHandler) (*Conn, error) {\n\ttr, err := getTransport(address)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn newConn(tr, handler, signalHandler)\n}", "title": "" }, { "docid": "05800e40b31f53747edbb6be1d086fb1", "score": "0.5139935", "text": "func MakeHandler(ctx context.Context, us Service, logger kitlog.Logger) http.Handler {\n\tr := mux.NewRouter()\n\n\topts := []kithttp.ServerOption{\n\t\tkithttp.ServerErrorLogger(logger),\n\t\tkithttp.ServerErrorEncoder(encodeError),\n\t\tkithttp.ServerBefore(kithttp.PopulateRequestContext, func(c context.Context, r *http.Request) context.Context {\n\t\t\tvar scheme = \"http\"\n\t\t\tif r.TLS != nil {\n\t\t\t\tscheme = \"https\"\n\t\t\t}\n\t\t\tc = context.WithValue(c, contextKeyHTTPAddress, scheme+\"://\"+r.Host+\"/\")\n\t\t\treturn c\n\t\t}),\n\t}\n\n\tURLHealthzHandler := kithttp.NewServer(\n\t\tmakeURLHealthzEndpoint(us),\n\t\tfunc(c context.Context, r *http.Request) (interface{}, error) {\n\t\t\treturn nil, nil\n\t\t},\n\t\tencodeResponse,\n\t\topts...,\n\t)\n\tURLShortifyHandler := kithttp.NewServer(\n\t\tmakeURLShortifyEndpoint(us),\n\t\tdecodeURLShortenerRequest,\n\t\tencodeResponse,\n\t\topts...,\n\t)\n\tURLRedirectHandler := kithttp.NewServer(\n\t\tmakeURLRedirectEndpoint(us),\n\t\tdecodeURLRedirectRequest,\n\t\tencodeRedirectResponse,\n\t\topts...,\n\t)\n\tURLInfoHandler := kithttp.NewServer(\n\t\tmakeURLInfoEndpoint(us),\n\t\tdecodeURLInfoRequest,\n\t\tencodeResponse,\n\t\topts...,\n\t)\n\n\tr.Handle(\"/\", URLShortifyHandler).Methods(\"POST\")\n\tr.Handle(\"/healthz\", URLHealthzHandler).Methods(\"GET\")\n\tr.Handle(\"/{shortURL}\", URLRedirectHandler).Methods(\"GET\")\n\tr.Handle(\"/info/{shortURL}\", URLInfoHandler).Methods(\"GET\")\n\n\treturn r\n}", "title": "" }, { "docid": "4c47bb8ff67364923e9d8a1fdbc53f55", "score": "0.5115427", "text": "func makeHandler(c *http.Client, timeout time.Duration, upstreamURL string, auth *authProxy) func(w http.ResponseWriter, r *http.Request) {\n\n\tif strings.HasSuffix(upstreamURL, \"/\") == false {\n\t\tupstreamURL = upstreamURL + \"/\"\n\t}\n\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tif r.Body != nil {\n\t\t\tdefer r.Body.Close()\n\t\t}\n\n\t\tvar host string\n\n\t\ttldSepCount := 1\n\t\ttldSep := \".\"\n\t\tif len(r.Host) == 0 || strings.Count(r.Host, tldSep) <= tldSepCount {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tw.Write([]byte(\"invalid sub-domain in Host header\"))\n\t\t\treturn\n\t\t}\n\n\t\thost = r.Host[0:strings.Index(r.Host, tldSep)]\n\t\tfmt.Printf(\"Router host: %s (%s)\\n\", host, r.Host)\n\n\t\trequestURI := r.RequestURI\n\t\trequestURI = strings.TrimLeft(requestURI, \"/\")\n\n\t\tif len(requestURI) == 0 {\n\t\t\tif host == \"system\" {\n\t\t\t\tscheme := \"http\"\n\t\t\t\tif r.TLS != nil {\n\t\t\t\t\tscheme = \"https\"\n\t\t\t\t}\n\t\t\t\tredirectUrl, urlErr := url.Parse(fmt.Sprintf(\"%s://%s/dashboard/\", scheme, r.Host))\n\n\t\t\t\tif urlErr != nil {\n\t\t\t\t\thttp.Error(w, urlErr.Error(), http.StatusInternalServerError)\n\t\t\t\t\tlog.Printf(\"Could not build dashboard redirect url %s\", urlErr.Error())\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tlog.Printf(\"Redirecting to %q\\n\", redirectUrl.String())\n\t\t\t\thttp.Redirect(w, r, redirectUrl.String(), http.StatusTemporaryRedirect)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tlog.Printf(\"requestURI not set\\n\")\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\n\t\tvar upstreamFullURL *url.URL\n\n\t\tisAuthHost := strings.HasPrefix(r.Host, authHost)\n\t\tif isAuthHost {\n\t\t\tvar err error\n\t\t\tupstreamFullURL, err = url.Parse(fmt.Sprintf(\"%s%s\", auth.URL, requestURI))\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"Auth URL transparent error: %s\\n\", err)\n\t\t\t} else {\n\t\t\t\tlog.Printf(\"Auth URL transparent %s\\n\", upstreamFullURL.String())\n\t\t\t}\n\t\t} else {\n\t\t\tupstreamFullURL, _ = url.Parse(fmt.Sprintf(\"%sfunction/%s-%s\", upstreamURL, host, requestURI))\n\t\t}\n\n\t\tif auth != nil && !isAuthHost {\n\t\t\tauthStatus, location := auth.Validate(upstreamFullURL.Path, r)\n\t\t\tfmt.Println(authStatus, location)\n\n\t\t\tresponseWritten := false\n\t\t\tswitch authStatus {\n\t\t\tcase http.StatusUnauthorized:\n\t\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\t\tw.Write([]byte(\"Unauthorized\"))\n\n\t\t\t\tresponseWritten = true\n\t\t\t\tbreak\n\t\t\tcase http.StatusTemporaryRedirect:\n\n\t\t\t\tdirectTo, _ := url.Parse(location)\n\t\t\t\tq := directTo.Query()\n\n\t\t\t\treturnTo := \"http://\" + r.Host + \"\" + r.RequestURI\n\n\t\t\t\tredirectURI, _ := url.Parse(q.Get(\"redirect_uri\"))\n\t\t\t\tlog.Printf(`Redirect URL: \"%s\"\\n`, redirectURI)\n\n\t\t\t\tredirectURIQuery := redirectURI.Query()\n\t\t\t\tredirectURIQuery.Set(\"r\", returnTo)\n\n\t\t\t\tredirectURI.RawQuery = redirectURIQuery.Encode()\n\n\t\t\t\tlog.Printf(`* Redirect URL: \"%s\"\\n`, redirectURI)\n\t\t\t\tq.Set(\"redirect_uri\", redirectURI.String())\n\n\t\t\t\tdirectTo.RawQuery = q.Encode()\n\n\t\t\t\tlog.Println(\"Go to: \", r.RequestURI, r.URL.String())\n\n\t\t\t\tlog.Printf(\"Auth caused redirect to: %s\\n\", directTo.String())\n\t\t\t\thttp.Redirect(w, r, directTo.String(), http.StatusTemporaryRedirect)\n\t\t\t\tresponseWritten = true\n\t\t\t\tbreak\n\t\t\tcase http.StatusBadGateway:\n\t\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\tw.Write([]byte(\"bad gateway reaching auth server\"))\n\t\t\t\tresponseWritten = true\n\t\t\t\tbreak\n\t\t\tcase http.StatusOK:\n\t\t\t\tlog.Printf(\"Auth cleared. OK.\\n\")\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tif responseWritten {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\treq, _ := http.NewRequest(r.Method, upstreamFullURL.String(), r.Body)\n\n\t\ttimeoutContext, cancel := context.WithTimeout(context.Background(), timeout)\n\t\tdefer cancel()\n\n\t\tcopyHeaders(req.Header, &r.Header)\n\n\t\tlog.Printf(\"Serving: %s\\n\", req.URL.String())\n\n\t\tres, resErr := c.Do(req.WithContext(timeoutContext))\n\t\tif resErr != nil {\n\t\t\tw.WriteHeader(http.StatusServiceUnavailable)\n\t\t\tw.Write([]byte(resErr.Error()))\n\n\t\t\tfmt.Printf(\"Upstream %s status: %d\\n\", upstreamFullURL, http.StatusBadGateway)\n\t\t\treturn\n\t\t}\n\n\t\tcopyHeaders(w.Header(), &res.Header)\n\t\tfmt.Printf(\"Upstream %s status: %d\\n\", upstreamFullURL, res.StatusCode)\n\n\t\tw.WriteHeader(res.StatusCode)\n\n\t\tif res.Body != nil {\n\t\t\tdefer res.Body.Close()\n\n\t\t\tbytesOut, _ := ioutil.ReadAll(res.Body)\n\t\t\tw.Write(bytesOut)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "240b2cad4cd28f421ac8bcebdc378c26", "score": "0.5036511", "text": "func newConn(tr transport, handler Handler, signalHandler SignalHandler) (*Conn, error) {\n\tconn := new(Conn)\n\tconn.transport = tr\n\tconn.calls = make(map[uint32]*Call)\n\tconn.out = make(chan *Message, 10)\n\tconn.handler = handler\n\tconn.signalHandler = signalHandler\n\tconn.nextSerial = 1\n\tconn.serialUsed = map[uint32]bool{0: true}\n\tconn.busObj = conn.Object(\"org.freedesktop.DBus\", \"/org/freedesktop/DBus\")\n\treturn conn, nil\n}", "title": "" }, { "docid": "c2777b311d8dc1844ade17b5784b7654", "score": "0.4970813", "text": "func createConfig(address string, port uint16, p plugin.Handler) *dnsserver.Config {\n\tc := &dnsserver.Config{\n\t\tZone: \".\",\n\t\tTransport: \"dns\",\n\t\tListenHosts: []string{address},\n\t\tPort: strconv.FormatUint(uint64(port), 10),\n\t}\n\n\tc.AddPlugin(func(next plugin.Handler) plugin.Handler { return p })\n\treturn c\n}", "title": "" }, { "docid": "c58d7f0fa21524e365988d5a6fc8dbbb", "score": "0.4952429", "text": "func RegisterVdoThuServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterVdoThuServiceHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "c2dfa4dc07eaf5211375483f96eb137a", "score": "0.49410114", "text": "func (t *targetrunner) httpdaepost(w http.ResponseWriter, r *http.Request) {\n\tapiItems, err := t.checkRESTItems(w, r, 0, true, cmn.Version, cmn.Daemon)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tif len(apiItems) > 0 {\n\t\tswitch apiItems[0] {\n\t\tcase cmn.UserRegister:\n\t\t\tgettargetkeepalive().keepalive.send(kaRegisterMsg)\n\t\t\tbody, err := cmn.ReadBytes(r)\n\t\t\tif err != nil {\n\t\t\t\tt.invalmsghdlr(w, r, err.Error())\n\t\t\t\treturn\n\t\t\t}\n\t\t\tcaller := r.Header.Get(cmn.HeaderCallerName)\n\t\t\tif err := t.applyRegMeta(body, caller); err != nil {\n\t\t\t\tt.invalmsghdlr(w, r, err.Error())\n\t\t\t}\n\t\t\treturn\n\t\tcase cmn.Mountpaths:\n\t\t\tt.handleMountpathReq(w, r)\n\t\t\treturn\n\t\tdefault:\n\t\t\tt.invalmsghdlr(w, r, \"unrecognized path in /daemon POST\")\n\t\t\treturn\n\t\t}\n\t}\n\n\tif status, err := t.joinCluster(); err != nil {\n\t\ts := fmt.Sprintf(\"%s: failed to register, status %d, err: %v\", t.si, status, err)\n\t\tt.invalmsghdlr(w, r, s)\n\t\treturn\n\t}\n\n\tif glog.FastV(3, glog.SmoduleAIS) {\n\t\tglog.Infof(\"Registered %s(self)\", t.si)\n\t}\n}", "title": "" }, { "docid": "f73a51e471e2f2bce29efbdd38cb3830", "score": "0.4931819", "text": "func DbusHandlerNew(methodTable map[string]interface{}) *DbusHandler {\n\tconn, err := dbus.SessionBus()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treply, err := conn.RequestName(serviceInterface, dbus.NameFlagDoNotQueue)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tif reply != dbus.RequestNameReplyPrimaryOwner {\n\t\tpanic(\"Name already taken\")\n\t}\n\tfmt.Println(\"Connected to dbus\")\n\tconn.ExportMethodTable(methodTable, objectPath, serviceInterface)\n\n\treturn &DbusHandler{\n\t\tconn: conn,\n\t}\n}", "title": "" }, { "docid": "94e9d165be3b48098772e809c1cfd7a1", "score": "0.490775", "text": "func (c *CLab) NewEndpoint(e string) *types.Endpoint {\n\t// initialize a new endpoint\n\tendpoint := new(types.Endpoint)\n\n\t// split the string to get node name and endpoint name\n\tsplit := strings.Split(e, \":\")\n\tif len(split) != 2 {\n\t\tlog.Fatalf(\"endpoint %s has wrong syntax\", e) // skipcq: GO-S0904\n\t}\n\tnName := split[0] // node name\n\n\t// initialize the endpoint name based on the split function\n\tendpoint.EndpointName = split[1] // endpoint name\n\tif len(endpoint.EndpointName) > 15 {\n\t\tlog.Fatalf(\"interface '%s' name exceeds maximum length of 15 characters\", endpoint.EndpointName)\n\t}\n\t// generate unique MAC\n\tendpoint.MAC = utils.GenMac(ClabOUI)\n\n\t// search the node pointer for a node name referenced in endpoint section\n\tswitch nName {\n\t// \"host\" is a special reference to host namespace\n\t// for which we create an special Node with kind \"host\"\n\tcase \"host\":\n\t\tendpoint.Node = &types.NodeConfig{\n\t\t\tKind: \"host\",\n\t\t\tShortName: \"host\",\n\t\t\tNSPath: hostNSPath,\n\t\t\tDeploymentStatus: \"created\",\n\t\t}\n\t// mgmt-net is a special reference to a bridge of the docker network\n\t// that is used as the management network\n\tcase \"mgmt-net\":\n\t\tendpoint.Node = &types.NodeConfig{\n\t\t\tKind: \"bridge\",\n\t\t\tShortName: \"mgmt-net\",\n\t\t\tDeploymentStatus: \"created\",\n\t\t}\n\tdefault:\n\t\tc.m.Lock()\n\t\tif n, ok := c.Nodes[nName]; ok {\n\t\t\tendpoint.Node = n.Config()\n\t\t\tn.Config().Endpoints = append(n.Config().Endpoints, endpoint)\n\t\t}\n\t\tc.m.Unlock()\n\t}\n\n\t// stop the deployment if the matching node element was not found\n\t// \"host\" node name is an exception, it may exist without a matching node\n\tif endpoint.Node == nil {\n\t\tlog.Fatalf(\"not all nodes are specified in the 'topology.nodes' section or the names don't match in the 'links.endpoints' section: %s\", nName) // skipcq: GO-S0904\n\t}\n\n\treturn endpoint\n}", "title": "" }, { "docid": "fe5786a6aae20e0a232bd959440815fd", "score": "0.4907353", "text": "func NewHandler(root, network, address string) http.Handler {\n\th := gofast.NewHandler(gofast.NewPHPFS(root), network, address)\n\treturn h\n}", "title": "" }, { "docid": "efe443677207f6867028c6f3c238df9b", "score": "0.48928526", "text": "func RegisterTrustixLogAPIHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterTrustixLogAPIHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "85255445866e8699e5439d682baa5b9e", "score": "0.48924547", "text": "func RegisterDHXServcieHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterDHXServcieHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "e32adb5e640752f02637eb31e6b21d5f", "score": "0.4877079", "text": "func newServer(h *hive, addr string) *server {\n\tr := mux.NewRouter()\n\ts := &server{\n\t\tServer: http.Server{\n\t\t\tAddr: addr,\n\t\t\tHandler: r,\n\t\t},\n\t\trouter: r,\n\t\thive: h,\n\t}\n\thandlerV1 := v1Handler{srv: s}\n\thandlerV1.install(r)\n\twebHandler := webHandler{h: h}\n\twebHandler.install(r)\n\treturn s\n}", "title": "" }, { "docid": "74d753acead014251e68c2545eaa72af", "score": "0.48698908", "text": "func RegisterDFIServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterDFIServiceHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "c8fab20843a41f737b2a82cf274164e0", "score": "0.4862509", "text": "func newForwardingHandler() echo.HandlerFunc {\n\treturn func(c echo.Context) error {\n\n\t\tsvcName, err := getSvcName(c.Request().Host)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Couldn't find service name (%s)\", err)\n\t\t\treturn c.String(400, \"No service name given\")\n\t\t}\n\t\thostPortStr := fmt.Sprintf(\"http://%s:8080\", svcName)\n\t\tlog.Printf(\"using container URL %s\", hostPortStr)\n\n\t\t// forward the request\n\t\tsvcURL, err := url.Parse(hostPortStr)\n\t\tif err != nil {\n\t\t\tlog.Printf(\n\t\t\t\t\"Error parsing container URL string %s (%s)\",\n\t\t\t\thostPortStr,\n\t\t\t\terr,\n\t\t\t)\n\t\t\treturn c.String(400, fmt.Sprintf(\"Error parsing URL string %s (%s)\", hostPortStr, err))\n\t\t}\n\n\t\tr := c.Request()\n\n\t\tproxy := httputil.NewSingleHostReverseProxy(svcURL)\n\t\tproxy.Director = func(req *http.Request) {\n\t\t\treq.URL = svcURL\n\t\t\treq.Host = svcURL.Host\n\t\t\t// req.URL.Scheme = \"https\"\n\t\t\treq.URL.Path = r.URL.Path\n\t\t\treq.URL.RawQuery = r.URL.RawQuery\n\t\t\t// req.URL.Host = containerURL.Host\n\t\t\t// req.URL.Path = containerURL.Path\n\t\t\treqBytes, _ := httputil.DumpRequest(req, false)\n\t\t\tlog.Printf(\"Proxying request to %v\", *req.URL)\n\t\t\tlog.Printf(\"with body %s\", string(reqBytes))\n\t\t}\n\t\tproxy.ModifyResponse = func(res *http.Response) error {\n\t\t\trespBody, _ := httputil.DumpResponse(res, true)\n\t\t\tlog.Printf(\"Proxied response: %v\", string(respBody))\n\t\t\treturn nil\n\t\t}\n\n\t\tlog.Printf(\n\t\t\t\"Proxying request to %s to host %s\",\n\t\t\tr.URL.Path,\n\t\t\thostPortStr,\n\t\t)\n\t\tw := c.Response()\n\t\tproxy.ServeHTTP(w, r)\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "ffb3d8efa301e5f535e910e9bba23a21", "score": "0.48443696", "text": "func MakeNewSiteEndpoint(svc service.Service) endpoint.Endpoint {\n\treturn func(ctx context.Context, request interface{}) (response interface{}, err error) {\n\t\treq := request.(NewSiteRequest)\n\t\terr = svc.NewSite(ctx, req.SiteID, req.Theme)\n\t\treturn NewSiteResponse{Err: err}, nil\n\t}\n}", "title": "" }, { "docid": "c7836c50b6e6a0caaf0a936facf51b46", "score": "0.48085487", "text": "func createHandler(webServer *WebServer) http.Handler {\n\th := http.NewServeMux()\n\n\th.HandleFunc(\"/hash\", hashHandler(webServer))\n\th.HandleFunc(\"/hash/\", hashHandler(webServer))\n\th.HandleFunc(\"/shutdown\", shutdownHandler(webServer))\n\th.HandleFunc(\"/stats\", statsHandler(webServer))\n\n\treturn h\n}", "title": "" }, { "docid": "1d40ade9e1290654f7bbabf684a54698", "score": "0.48082685", "text": "func MakeNewAdapterEndpoint(s services.Server) endpoint.Endpoint {\n\treturn func(ctx context.Context, request interface{}) (interface{}, error) {\n\t\treq := request.(NewAdapterRequest)\n\t\tadapter, err := s.NewAdapter(ctx, req.DriverName, req.ConnectString, req.DbSpecified)\n\t\treturn NewAdapterResponse{Adapter: adapter, Err: err}, nil\n\t}\n}", "title": "" }, { "docid": "2fa3d00dca1995595f6773253110035b", "score": "0.48051313", "text": "func newHandler(store *Store, handler storeHandler) http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\thandler(store, w, req)\n\t})\n}", "title": "" }, { "docid": "d7f0cf5b2b4aa7a8b4eda3817e4326c6", "score": "0.4773471", "text": "func NewHandler(s Shortener) *Handler {\n\th := &Handler{\n\t\trouter: mux.NewRouter(),\n\t\t// urls: make(map[string]string),\n\t\ts: s,\n\t}\n\th.router.HandleFunc(\"/urls\", h.HandleCreate).Methods(\"POST\")\n\th.router.HandleFunc(\"/urls/{id}\", h.HandleRedirect).Methods(\"GET\")\n\treturn h\n}", "title": "" }, { "docid": "e7053b8554dfb76eed7630bfc5cfe522", "score": "0.4770795", "text": "func DiCreateAuthHandler(jwtService *user.JwtService) *middleware.AuthHandler {\n\treturn middleware.CreateAuthHandler(jwtService)\n}", "title": "" }, { "docid": "efe0159439366099e453fae2e4bde3c1", "score": "0.47689638", "text": "func MakeHttpHandler(ctx context.Context, endpoints endpoint.Endpoints, logger log.Logger,) http.Handler {\n\tr := mux.NewRouter()\n\t// 链路追踪\n//\tzipkinServer := zipkin.HTTPServerTrace(zipkinTracer, zipkin.Name(\"http-transport\"))\n\toptions := []kithttp.ServerOption{\n\t\tkithttp.ServerErrorLogger(logger),\n\t\tkithttp.ServerErrorEncoder(kithttp.DefaultErrorEncoder),\n\t\tkithttp.ServerErrorEncoder(func(ctx context.Context, err error, w http.ResponseWriter) {\n\t\t\tlogger.Log(fmt.Sprint(ctx.Value(ContextReqUUid)))\n\t\t\tw.WriteHeader(http.StatusOK)\n\t\t\tjson.NewEncoder(w).Encode(err)\n\t\t}),\n\t\tkithttp.ServerBefore(func(ctx context.Context, request *http.Request) context.Context {\n\t\t\tUUID := uuid.NewV5(uuid.Must(uuid.NewV4(),nil), \"req_uuid\").String()\n\t\t\tlogger.Log(\"给请求添加uuid\", zap.Any(\"UUID\", UUID))\n\t\t\tctx = context.WithValue(ctx, ContextReqUUid, UUID)\n\t\t\treturn ctx\n\t\t}),\n\t//\tzipkinServer,\n\t}\n\n // 暴露具体的 endpoint\n\tr.Methods(\"POST\").Path(\"/register\").Handler(kithttp.NewServer(\n\t\tendpoints.RegistAccount,\n\t\tdecodeRegisterRequest, // 请求参数\n\t\tencode.JsonResponse,\n\t\toptions...,\n\t))\n\n\tr.Methods(\"POST\").Path(\"/login\").Handler(kithttp.NewServer(\n\t\tendpoints.LoginAccount,\n\t\tdecodeLoginRequest, // 请求参数\n\t\tencode.JsonResponse,\n\t\toptions...,\n\t))\n\tr.Methods(\"POST\").Path(\"/userInfo\").Handler(kithttp.NewServer(\n\t\tendpoints.GetUserInfoByToken,\n\t\tdecodeGetTokenRequest, // 请求参数\n\t\tencode.JsonResponse,\n\t\toptions...,\n\t))\n\treturn r\n}", "title": "" }, { "docid": "0d9010be1598a10c99729a3759aa2138", "score": "0.47337964", "text": "func redirectHandler(w http.ResponseWriter, req *http.Request) {\n\tlogRequest(req)\n\thost := parseHost(req)\n\t// [?] port, err := net.LookupPort(\"tcp\", \"https\") and strconv.Itoa()\n\tif config.TlsPort != \"443\" {\n\t\thost = net.JoinHostPort(host, config.TlsPort)\n\t}\n\tnewURL, _ := req.URL.Parse(\"\")\n\tnewURL.Host = host\n\tnewURL.Scheme = \"https\"\n\thttp.Redirect(w, req, newURL.String(), http.StatusMovedPermanently)\n}", "title": "" }, { "docid": "d97c50fd5d5ab078e794128e35b55564", "score": "0.47195116", "text": "func MakeHTTPSHandler(service Service) http.Handler {\n\tr := chi.NewRouter()\n\n\t//Agregar a una persona\n\taddPersonHandler := kithttp.NewServer(\n\t\tmakeAddPersonEndpoint(service),\n\t\taddPersonRequestDecoder,\n\t\tkithttp.EncodeJSONResponse,\n\t)\n\tr.Method(http.MethodPost, \"/\", addPersonHandler)\n\n\t//Buscar a una persona por ID\n\tgetPersonaByIDHandler := kithttp.NewServer(\n\t\tmakeGetPersonaByIDEndPoint(service),\n\t\tgetPersonaByIDRequestDecoder,\n\t\tkithttp.EncodeJSONResponse,\n\t)\n\tr.Method(http.MethodGet, \"/id/{id}\", getPersonaByIDHandler)\n\n\t//Buscar a una persona por DNI\n\tgetPersonaByDNIHandler := kithttp.NewServer(\n\t\tmakeGetPersonaByDNIEndPoint(service),\n\t\tgetPersonaByDNIRequestDecoder,\n\t\tkithttp.EncodeJSONResponse,\n\t)\n\tr.Method(http.MethodGet, \"/dni/{dni}\", getPersonaByDNIHandler)\n\n\treturn r\n}", "title": "" }, { "docid": "da389219bb7bedf4e8e127e94cc21ecd", "score": "0.47169474", "text": "func newServerHandler(s *Server) *ServerHandler {\n\treturn &ServerHandler{s: s}\n}", "title": "" }, { "docid": "e9070696dd4a88a7700751e3554d0d63", "score": "0.47141787", "text": "func newZKHandler(path string, nodes ...string) (*zkHandler, error) {\n\thdlr := &zkHandler{Connecting: true, Nodes: zk.FormatServers(nodes), Path: path}\n\tvar err error\n\thdlr.conn, _, err = zk.Connect(hdlr.Nodes, 30*time.Second, zk.WithLogger(&log.Logger), zk.WithEventCallback(func(ev zk.Event) {\n\t\tswitch ev.Type {\n\t\tcase zk.EventSession:\n\t\t\tswitch ev.State {\n\t\t\tcase zk.StateAuthFailed:\n\t\t\t\thdlr.Err = fmt.Errorf(\"ZK Auth Failed: %w\", zk.ErrAuthFailed)\n\t\t\t\thdlr.conn.Close()\n\t\t\tcase zk.StateExpired:\n\t\t\t\thdlr.Err = fmt.Errorf(\"ZK Session Expired: %w\", zk.ErrSessionExpired)\n\t\t\t\thdlr.conn.Close()\n\t\t\t}\n\t\t}\n\n\t\thdlr.Connecting = false\n\t\tif ev.State == zk.StateConnected {\n\t\t\tlog.Print(\"Connected to Zookeeper.\")\n\t\t}\n\t}))\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn hdlr, nil\n}", "title": "" }, { "docid": "cafec892600675938c612d2f08abf98a", "score": "0.46964934", "text": "func New(address string, branch string, secret string, logger *logrus.Logger) http.Handler {\n\tproto := \"tcp\"\n\taddr := address\n\tif strings.HasPrefix(addr, \"unix:\") {\n\t\tproto = \"unix\"\n\t\taddr = addr[5:]\n\t}\n\treturn &Server{\n\t\tproto: proto,\n\t\taddress: addr,\n\t\tbranch: branch,\n\t\tsecret: secret,\n\t\tlogger: logger,\n\t}\n}", "title": "" }, { "docid": "e79bd37a55819b00fd5a71e644819d5b", "score": "0.46941605", "text": "func NewHandler(priv *key.Private, conf *Config, n Network) *Handler {\n\tif err := validateConf(conf); err != nil {\n\t\tpanic(err)\n\t}\n\tlist := conf.List\n\tt := conf.Threshold\n\tpoints := make([]kyber.Point, len(list), len(list))\n\tmyIdx := -1\n\tmyPoint := priv.Public.Point()\n\tfor i := range list {\n\t\tpoint := list[i].Point()\n\t\tpoints[i] = point\n\t\tif point.Equal(myPoint) {\n\t\t\tmyIdx = i\n\t\t}\n\t}\n\tif myIdx == -1 {\n\t\tpanic(\"dkg: no public key corresponding in the given list. BAD.\")\n\t}\n\tstate, err := dkg.NewDistKeyGenerator(key.Curve, priv.Scalar(), points, t)\n\tif err != nil {\n\t\tpanic(\"dkg: error using dkg library: \" + err.Error())\n\t}\n\treturn &Handler{\n\t\tconf: conf,\n\t\tstate: state,\n\t\tnet: n,\n\t\ttmpResponses: make(map[uint32][]*dkg.Response),\n\t\tidx: myIdx,\n\t\tn: len(list),\n\t\tshareCh: make(chan Share, 1),\n\t\terrCh: make(chan error, 1),\n\t}\n}", "title": "" }, { "docid": "8a29c2025de0de7413e3518160b0d5ea", "score": "0.4683684", "text": "func MakeHandler(service Service, logger log.Logger) http.Handler {\n\topts := []khttp.ServerOption{\n\t\tkhttp.ServerErrorLogger(logger),\n\t\tkhttp.ServerErrorEncoder(kit.EncodeError),\n\t}\n\n\troutes := kit.Routes{\n\t\tkit.Route{\n\t\t\tName: \"UUID\",\n\t\t\tMethod: \"GET\",\n\t\t\tPattern: \"/two/v1/uuid/{type:[0-9]}\",\n\t\t\tHandler: khttp.NewServer(\n\t\t\t\tmakeUuidEndpoint(service),\n\t\t\t\tdecodeUuidRequest,\n\t\t\t\tkit.Encode,\n\t\t\t\topts...,\n\t\t\t),\n\t\t},\n\t}\n\n\treturn kit.AddRoutes(routes...)\n}", "title": "" }, { "docid": "d68ab40e71a957227fe37694b38e2767", "score": "0.4673999", "text": "func NewHandler(ctx context.Context, c *HandlerConfig) (*Handler, error) {\n\terr := c.CheckAndSetDefaults()\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\th := &Handler{\n\t\tc: c,\n\t\tcloseContext: ctx,\n\t\tlog: logrus.WithFields(logrus.Fields{\n\t\t\ttrace.Component: teleport.ComponentAppProxy,\n\t\t}),\n\t}\n\n\t// Create a new session cache, this holds sessions that can be used to\n\t// forward requests.\n\th.cache, err = newSessionCache(ctx, h.log)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\t// Get the name of this cluster.\n\tcn, err := h.c.AccessPoint.GetClusterName()\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\th.clusterName = cn.GetClusterName()\n\n\t// Create the application routes.\n\th.router = httprouter.New()\n\th.router.UseRawPath = true\n\th.router.POST(\"/x-teleport-auth\", makeRouterHandler(h.withCustomCORS(h.handleAuth)))\n\th.router.OPTIONS(\"/x-teleport-auth\", makeRouterHandler(h.withCustomCORS(nil)))\n\th.router.GET(\"/teleport-logout\", h.withRouterAuth(h.handleLogout))\n\th.router.NotFound = h.withAuth(h.handleHttp)\n\n\treturn h, nil\n}", "title": "" }, { "docid": "5c4b0c9c402748b90ed9eee7c96ae579", "score": "0.46630338", "text": "func SNIHost(h http.Handler) Handler {\n\treturn &sniHost{h}\n}", "title": "" }, { "docid": "51677378209fa8bff502e7841483a2d3", "score": "0.46591973", "text": "func newNPMEndpoint(endpoint *hcn.HostComputeEndpoint) *npmEndpoint {\n\treturn &npmEndpoint{\n\t\tname: endpoint.Name,\n\t\tid: endpoint.Id,\n\t\tpodKey: unspecifiedPodKey,\n\t\tnetPolReference: make(map[string]struct{}),\n\t\tip: endpoint.IpConfigurations[0].IpAddress,\n\t}\n}", "title": "" }, { "docid": "4b9a212ac055470121ce03fe8dba4120", "score": "0.4658413", "text": "func (d *bridgeDriver) CreateEndpoint(nid, eid string, ei *EndpointInterface, epOptions map[string]interface{}) (*EndpointInterface, error) {\n\tdefer osl.InitOSContext()()\n\n\tif ei == nil {\n\t\treturn nil, errors.New(\"invalid interface info\")\n\t}\n\n\tn, err := d.getNetwork(nid)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Check if endpoint id is good and retrieve correspondent endpoint\n\tep, err := n.getEndpoint(eid)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Endpoint with that id exists either on desired or other sandbox\n\tif ep != nil {\n\t\treturn nil, ErrEndpointExists(eid)\n\t}\n\n\t// Try to convert the options to endpoint configuration\n\tepConfig, err := parseEndpointOptions(epOptions)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create and add the endpoint\n\tn.Lock()\n\tendpoint := &bridgeEndpoint{id: eid, nid: nid, config: epConfig}\n\tn.endpoints[eid] = endpoint\n\tn.Unlock()\n\n\t// On failure make sure to remove the endpoint\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tn.Lock()\n\t\t\tdelete(n.endpoints, eid)\n\t\t\tn.Unlock()\n\t\t}\n\t}()\n\n\t// Generate a name for what will be the host side pipe interface\n\thostIfName, err := netutils.GenerateIfaceName(d.nlh, vethPrefix, vethLen)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Generate a name for what will be the sandbox side pipe interface\n\tcontainerIfName, err := netutils.GenerateIfaceName(d.nlh, vethPrefix, vethLen)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Generate and add the interface pipe host <-> sandbox\n\tveth := &netlink.Veth{\n\t\tLinkAttrs: netlink.LinkAttrs{Name: hostIfName, TxQLen: 0},\n\t\tPeerName: containerIfName}\n\tif err = d.nlh.LinkAdd(veth); err != nil {\n\t\treturn nil, types.InternalErrorf(\"failed to add the host (%s) <=> sandbox (%s) pair interfaces: %v\", hostIfName, containerIfName, err)\n\t}\n\n\t// Get the host side pipe interface handler\n\thost, err := d.nlh.LinkByName(hostIfName)\n\tif err != nil {\n\t\treturn nil, types.InternalErrorf(\"failed to find host side interface %s: %v\", hostIfName, err)\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif err := d.nlh.LinkDel(host); err != nil {\n\t\t\t\tlogrus.WithError(err).Warnf(\"Failed to delete host side interface (%s)'s link\", hostIfName)\n\t\t\t}\n\t\t}\n\t}()\n\n\t// Get the sandbox side pipe interface handler\n\tsbox, err := d.nlh.LinkByName(containerIfName)\n\tif err != nil {\n\t\treturn nil, types.InternalErrorf(\"failed to find sandbox side interface %s: %v\", containerIfName, err)\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif err := d.nlh.LinkDel(sbox); err != nil {\n\t\t\t\tlogrus.WithError(err).Warnf(\"Failed to delete sandbox side interface (%s)'s link\", containerIfName)\n\t\t\t}\n\t\t}\n\t}()\n\n\tn.Lock()\n\tconfig := n.config\n\tn.Unlock()\n\n\t// Add bridge inherited attributes to pipe interfaces\n\tif config.Mtu != 0 {\n\t\terr = d.nlh.LinkSetMTU(host, config.Mtu)\n\t\tif err != nil {\n\t\t\treturn nil, types.InternalErrorf(\"failed to set MTU on host interface %s: %v\", hostIfName, err)\n\t\t}\n\t\terr = d.nlh.LinkSetMTU(sbox, config.Mtu)\n\t\tif err != nil {\n\t\t\treturn nil, types.InternalErrorf(\"failed to set MTU on sandbox interface %s: %v\", containerIfName, err)\n\t\t}\n\t}\n\n\t// Attach host side pipe interface into the bridge\n\tif err = addToBridge(d.nlh, hostIfName, config.BridgeName); err != nil {\n\t\treturn nil, fmt.Errorf(\"adding interface %s to bridge %s failed: %v\", hostIfName, config.BridgeName, err)\n\t}\n\n\t// Allow packets to enter and leave the same (bridge) interface.\n\terr = setHairpinMode(d.nlh, host, true)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Store the sandbox side pipe interface parameters\n\tendpoint.srcName = containerIfName\n\tendpoint.macAddress = ei.MacAddress\n\tendpoint.addr = ei.Address\n\tendpoint.addrv6 = ei.AddressIPv6\n\n\t// Set default gateway info if this endpoint is not the networks gatway.\n\tif gw := n.config.DefaultGatewayIPv4; gw != nil && !gw.Equal(endpoint.addr.IP) {\n\t\tendpoint.gatewayv4 = gw\n\t}\n\tif gw := n.config.DefaultGatewayIPv6; gw != nil && !gw.Equal(endpoint.addr.IP) {\n\t\tendpoint.gatewayv6 = gw\n\t}\n\n\t// Set the sbox's MAC if not provided. If specified, use the one configured by user, otherwise generate one based on IP.\n\teiOut := &EndpointInterface{}\n\tif endpoint.macAddress == nil {\n\t\tendpoint.macAddress = netutils.GenerateRandomMAC()\n\t\teiOut.MacAddress = endpoint.macAddress\n\t}\n\n\t// Up the host interface after finishing all netlink configuration\n\tif err = d.nlh.LinkSetUp(host); err != nil {\n\t\treturn nil, fmt.Errorf(\"could not set link up for host interface %s: %v\", hostIfName, err)\n\t}\n\n\tif endpoint.addrv6 == nil && config.EnableIPv6 {\n\t\tvar ip6 net.IP\n\t\tnetwork := n.config.PoolIPv6\n\t\tif config.PoolIPv6 != nil {\n\t\t\tnetwork = config.PoolIPv6\n\t\t}\n\n\t\tones, _ := network.Mask.Size()\n\t\tif ones > 80 {\n\t\t\terr = types.ForbiddenErrorf(\"Cannot self generate an IPv6 address on network %v: At least 48 host bits are needed.\", network)\n\t\t\treturn nil, err\n\t\t}\n\n\t\tip6 = make(net.IP, len(network.IP))\n\t\tcopy(ip6, network.IP)\n\t\tfor i, h := range endpoint.macAddress {\n\t\t\tip6[i+10] = h\n\t\t}\n\n\t\tendpoint.addrv6 = &net.IPNet{IP: ip6, Mask: network.Mask}\n\t\teiOut.AddressIPv6 = endpoint.addrv6\n\t}\n\n\t// TODO(nategraf) Implement storage.\n\t//if err = d.storeUpdate(endpoint); err != nil {\n\t//\treturn nil, fmt.Errorf(\"failed to save bridge endpoint %.7s to store: %v\", endpoint.id, err)\n\t//}\n\n\treturn eiOut, nil\n}", "title": "" }, { "docid": "2356c7b16e832ff91213ee47a983c016", "score": "0.465832", "text": "func NewHandler(ctx context.Context, cfg *config.Config, log *log.Logger, name string) (*Handler, error) {\n\tlog.Info(\"New handler\", \"name\", name)\n\n\thost := cfg.ValOrDef(\"osrm.host\", \"localhost\")\n\turl := fmt.Sprintf(\"https://%s\", host)\n\n\th := &Handler{\n\t\tBaseHandler: svc.NewBaseHandler(ctx, cfg, log, name),\n\t\tClient: newClient(url),\n\t}\n\n\treturn h, nil\n}", "title": "" }, { "docid": "c23ff8ee85814ec33737b360578cbf7e", "score": "0.46478388", "text": "func NewFSHandler(basePath string) Handler {\n\treturn &fshandler{\n\t\tHandler: Default(),\n\t\tbasePath: basePath,\n\t\tsessions: make(map[[16]byte]*srvSession),\n\t}\n}", "title": "" }, { "docid": "2917df9cd3f9aed683a1bb0fae2956e8", "score": "0.46438858", "text": "func RegisterTaxServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterTaxServiceHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "31b0b59e2cbfcf3f8a11d693ceb72bbf", "score": "0.46429592", "text": "func New(svc service.AddsvcService, logger log.Logger ) (ep Endpoints) {\n\t\n\tvar sumEndpoint endpoint.Endpoint = NewSumEndpoint(svc,logger);\n\tep.SumEndpoint = sumEndpoint\n\n\tvar concatEndpoint endpoint.Endpoint = NewConcatEndpoint(svc,logger);\n\tep.ConcatEndpoint = concatEndpoint;\n\treturn ep\n}", "title": "" }, { "docid": "ac12a776bc6fa974b4c358cdaab49323", "score": "0.46380228", "text": "func NewEndpoint(service health.Service) *Endpoint {\n\treturn &Endpoint{\n\t\tservice: service,\n\t}\n}", "title": "" }, { "docid": "6e4f4362bc7b7fc533d48a53c1134eeb", "score": "0.46138448", "text": "func RegisterFeeServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterFeeServiceHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "a901481ad6c38d989232c2612953bfb1", "score": "0.4609646", "text": "func newEnrollHandler(server *Server) (h http.Handler, err error) {\n\treturn newSignHandler(server, \"enroll\")\n}", "title": "" }, { "docid": "3d85026e5928f7be3e23851a86fb171f", "score": "0.46040648", "text": "func (a *SNSApp) createEndpoint(token string) (string, error) {\n\tin := &SDK.CreatePlatformEndpointInput{\n\t\tPlatformApplicationArn: String(a.arn),\n\t\tToken: String(token),\n\t}\n\tif a.userData != \"\" {\n\t\tin.CustomUserData = String(a.userData)\n\t}\n\n\tresp, err := a.svc.Client.CreatePlatformEndpoint(in)\n\tif err != nil {\n\t\tlog.Error(\"[SNS] error on `CreatePlatformEndpoint` operation, token=\"+token, err.Error())\n\t\treturn \"\", err\n\t}\n\treturn *resp.EndpointArn, nil\n}", "title": "" }, { "docid": "3764b45e605412427405f2d2c14490ef", "score": "0.4600179", "text": "func (d *Dispatcher) newProxyStageHandler(ep config.Endpoint) (*StageHandler, error) {\n\tproxyUrl, err := url.Parse(ep.URL)\n\tif nil != err {\n\t\treturn nil, errors.New(fmt.Sprintf(\"failed to parse url: %v, for endpoint: %v, %v\", ep.URL, ep.Name, err))\n\t}\n\n\ttransName := ep.Name\n\n\tif ep.SharedTransport != \"\" {\n\t\ttransName = ep.SharedTransport\n\t}\n\n\tif v, ok := d.transports[transName]; ok {\n\t\td.transports[transName] = v\n\t} else {\n\t\td.transports[transName] = newCbTransport(ep.Name, d.proxyConfig, d.cbConfig)\n\t}\n\n\t// create the reverse proxy\n\trouteProxy := httputil.NewSingleHostReverseProxy(proxyUrl)\n\trouteProxy.Transport = d.transports[transName]\n\trouteProxy.ErrorLog = gwlog.LogAdapter()\n\n\tsh := &StageHandler{\n\t\tNext: nil,\n\t\tExecHandler: func(w http.ResponseWriter, r *http.Request) bool {\n\t\t\trouteProxy.ServeHTTP(w, r)\n\t\t\treturn false\n\t\t},\n\t}\n\n\treturn sh, nil\n}", "title": "" }, { "docid": "ebf068a70b6b7cd0a5f75fbbf9d85825", "score": "0.4599239", "text": "func newDialerInitializer(u *url.URL, opts *Options) (di DialerInitializer, err error) {\n\thost, port, err := netutil.SplitHostPort(u.Host)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"invalid address: %s: %w\", u.Host, err)\n\t}\n\n\tif addrsLen := len(opts.ServerIPAddrs); addrsLen > 0 {\n\t\t// Don't resolve the addresses of the server since those from the\n\t\t// options should be used.\n\t\taddrs := make([]string, 0, addrsLen)\n\t\tfor _, addr := range opts.ServerIPAddrs {\n\t\t\taddrs = append(addrs, netutil.JoinHostPort(addr.String(), port))\n\t\t}\n\n\t\thandler := bootstrap.NewDialContext(opts.Timeout, addrs...)\n\n\t\treturn func() (bootstrap.DialHandler, error) { return handler, nil }, nil\n\t} else if _, err = netip.ParseAddr(host); err == nil {\n\t\t// Don't resolve the address of the server since it's already an IP.\n\t\thandler := bootstrap.NewDialContext(opts.Timeout, u.Host)\n\n\t\treturn func() (bootstrap.DialHandler, error) { return handler, nil }, nil\n\t}\n\n\tresolvers, err := newResolvers(opts)\n\tif err != nil {\n\t\t// Don't wrap the error since it's informative enough as is.\n\t\treturn nil, err\n\t}\n\n\tvar dialHandler atomic.Value\n\tdi = func() (h bootstrap.DialHandler, resErr error) {\n\t\t// Check if the dial handler has already been created.\n\t\th, ok := dialHandler.Load().(bootstrap.DialHandler)\n\t\tif ok {\n\t\t\treturn h, nil\n\t\t}\n\n\t\t// TODO(e.burkov): It may appear that several exchanges will try to\n\t\t// resolve the upstream hostname at the same time. Currently, the last\n\t\t// successful value will be stored in dialHandler, but ideally we should\n\t\t// resolve only once.\n\t\th, resolveErr := bootstrap.ResolveDialContext(u, opts.Timeout, resolvers, opts.PreferIPv6)\n\t\tif resolveErr != nil {\n\t\t\treturn nil, fmt.Errorf(\"creating dial handler: %w\", resolveErr)\n\t\t}\n\n\t\tif !dialHandler.CompareAndSwap(nil, h) {\n\t\t\treturn dialHandler.Load().(bootstrap.DialHandler), nil\n\t\t}\n\n\t\treturn h, nil\n\t}\n\n\treturn di, nil\n}", "title": "" }, { "docid": "e31d61d4b9faca682b4bc43f0cd5bacb", "score": "0.4598073", "text": "func NewHandler(cfg Config) (*Handler, error) {\n\tif err := os.MkdirAll(cfg.Directory, teleport.SharedDirMode); err != nil {\n\t\treturn nil, trace.ConvertSystemError(err)\n\t}\n\n\tif err := cfg.CheckAndSetDefaults(); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\th := &Handler{\n\t\tEntry: log.WithFields(log.Fields{\n\t\t\ttrace.Component: teleport.Component(teleport.SchemeFile),\n\t\t}),\n\t\tConfig: cfg,\n\t}\n\treturn h, nil\n}", "title": "" }, { "docid": "941fbc3b506d4b958318ce9f4fe1b665", "score": "0.45976916", "text": "func New(pathPrefix string, config Config, logHandler logger.LoggerFunc) (*Handler,error) {\r\n\tif err := config.Validate(); err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\t// set global log level to the level set in config.\r\n\tlogger.SetLogLevel(config.LogLevel)\r\n\r\n\thandler := &Handler{\r\n\t\tConfig: config,\r\n\t\tloggerFunc: logHandler,\r\n\t\tpathPrefix: pathPrefix,\r\n\t}\r\n\thandler.Router = handler.newRouter()\r\n\r\n\thandler.log(\"API Host Web Service started.\", logger.Info)\r\n\r\n\treturn handler, nil\r\n}", "title": "" }, { "docid": "36e2454c35a86492013af4b0b970f46f", "score": "0.45937687", "text": "func newGCPHandler(ctx context.Context, config HandlerConfig) (*handler, error) {\n\tif err := config.CheckAndSetDefaults(); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\ttokenCache, err := utils.NewFnCache(utils.FnCacheConfig{\n\t\tTTL: time.Second * 60,\n\t\tClock: config.Clock,\n\t\tContext: ctx,\n\t})\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\tsvc := &handler{\n\t\tHandlerConfig: config,\n\t\ttokenCache: tokenCache,\n\t}\n\n\tsvc.fwd, err = reverseproxy.New(\n\t\treverseproxy.WithRoundTripper(config.RoundTripper),\n\t\treverseproxy.WithLogger(config.Log),\n\t\treverseproxy.WithErrorHandler(svc.formatForwardResponseError),\n\t)\n\treturn svc, trace.Wrap(err)\n}", "title": "" }, { "docid": "fe156d6fa8234431ceb8e0e314b4dc3a", "score": "0.45788467", "text": "func (lt *Logtail) CreateHandler() http.Handler {\n\tlt.router.HandleFunc(\"/logtail/{program}/stdout\", lt.getStdoutLog).Methods(\"GET\")\n\tlt.router.HandleFunc(\"/logtail/{program}/stderr\", lt.getStderrLog).Methods(\"GET\")\n\treturn lt.router\n}", "title": "" }, { "docid": "f9f4ac137c97410b16736c816f4f6983", "score": "0.4571896", "text": "func MakeOutageEndpointHandler(\n\tusername, passwordHash string,\n\tisTendermintRunningFn func() bool,\n\texecuteServiceCmdFn func(string) error,\n) func(http.ResponseWriter, *http.Request) {\n\tlog.Printf(\"Creating outage simulator endpoint: username=%s passwordHash=%s\", username, passwordHash)\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tif r.Method != \"POST\" {\n\t\t\trespond(w, http.StatusMethodNotAllowed, \"Unsupported method\")\n\t\t\treturn\n\t\t}\n\t\tif r.Body == nil {\n\t\t\trespond(w, http.StatusBadRequest, \"Missing command in request\")\n\t\t\treturn\n\t\t}\n\t\tif err := authenticate(r, username, passwordHash); err != nil {\n\t\t\tlog.Printf(\"Failed authentication attempt from: %s\", r.RemoteAddr)\n\t\t\trespond(w, http.StatusUnauthorized, fmt.Sprintf(\"Error: %v\", err))\n\t\t\treturn\n\t\t}\n\t\tbody, err := ioutil.ReadAll(r.Body)\n\t\tif err != nil {\n\t\t\trespond(w, http.StatusInternalServerError, \"Internal server error while reading request body\")\n\t\t\treturn\n\t\t}\n\t\tswitch string(body) {\n\t\tcase \"up\":\n\t\t\tlog.Printf(\"Attempting to bring Tendermint UP\")\n\t\t\ttendermintUp(w, isTendermintRunningFn, executeServiceCmdFn)\n\t\tcase \"down\":\n\t\t\tlog.Printf(\"Attempting to bring Tendermint DOWN\")\n\t\t\ttendermintDown(w, isTendermintRunningFn, executeServiceCmdFn)\n\t\tdefault:\n\t\t\trespond(w, http.StatusBadRequest, \"Unrecognised command\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fa3829a32bbbe025a877f113b73c6833", "score": "0.45717376", "text": "func configureServer(s *graceful.Server, scheme, addr string) {\n\n}", "title": "" }, { "docid": "f5a14d97185555795f8c5d3f61e0305d", "score": "0.45716438", "text": "func New(config *Config) (f Fred) {\n\n\tif config.PeeringHostProxy != \"\" && config.PeeringHost != config.PeeringHostProxy {\n\t\t// we are behind a proxy: register with the proxy address for everyone else to find us\n\t\terr := config.NaSe.RegisterSelf(config.PeeringHostProxy, config.ExternalHostProxy)\n\n\t\tif err != nil {\n\t\t\tlog.Err(err).Msg(err.(*errors.Error).ErrorStack())\n\t\t\tpanic(err)\n\t\t}\n\t} else {\n\t\t// not behind a proxy: register with the local bind address\n\t\terr := config.NaSe.RegisterSelf(config.PeeringHost, config.ExternalHost)\n\n\t\tif err != nil {\n\t\t\tlog.Err(err).Msg(err.(*errors.Error).ErrorStack())\n\t\t\tpanic(err)\n\t\t}\n\t}\n\n\ts := newStoreService(config.Store)\n\n\tr := newReplicationService(s, config.Client, config.NaSe)\n\n\tt := newTriggerService(s, config.TriggerCert, config.TriggerKey)\n\n\ta := newAuthService(config.NaSe)\n\n\treturn Fred{\n\t\tE: newExthandler(s, r, t, a, config.NaSe),\n\t\tI: newInthandler(s, r, t, config.NaSe),\n\t}\n}", "title": "" }, { "docid": "c514c4aa918972815fc7f251b016219e", "score": "0.45672122", "text": "func delegationHandlerFn(cliCtx context.CLIContext, cdc *wire.Codec) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t// read parameters\n\t\tvars := mux.Vars(r)\n\t\tbech32delegator := vars[\"delegatorAddr\"]\n\t\tbech32validator := vars[\"validatorAddr\"]\n\n\t\tdelegatorAddr, err := sdk.AccAddressFromBech32(bech32delegator)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tw.Write([]byte(err.Error()))\n\t\t\treturn\n\t\t}\n\n\t\tvalidatorAddr, err := sdk.AccAddressFromBech32(bech32validator)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tw.Write([]byte(err.Error()))\n\t\t\treturn\n\t\t}\n\t\tvalidatorAddrAcc := sdk.AccAddress(validatorAddr)\n\n\t\tkey := stake.GetDelegationKey(delegatorAddr, validatorAddrAcc)\n\n\t\tres, err := cliCtx.QueryStore(key, storeName)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tw.Write([]byte(fmt.Sprintf(\"couldn't query delegation. Error: %s\", err.Error())))\n\t\t\treturn\n\t\t}\n\n\t\t// the query will return empty if there is no data for this record\n\t\tif len(res) == 0 {\n\t\t\tw.WriteHeader(http.StatusNoContent)\n\t\t\treturn\n\t\t}\n\n\t\tdelegation, err := types.UnmarshalDelegation(cdc, key, res)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tw.Write([]byte(err.Error()))\n\t\t\treturn\n\t\t}\n\n\t\toutputDelegation := stakeClient.ConvertDelegationToDelegationOutput(cliCtx, delegation)\n\n\t\toutput, err := cdc.MarshalJSONIndent(outputDelegation, \"\", \" \")\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tw.Write([]byte(err.Error()))\n\t\t\treturn\n\t\t}\n\n\t\tw.Write(output)\n\t}\n}", "title": "" }, { "docid": "40fb5e8b3036299c00402eec6207f739", "score": "0.45666793", "text": "func TestCreateHandler(t *testing.T) {\n\th := CreateHandler(\"/prefix\", \":8080\")\n\tassert.NotNil(t, h)\n}", "title": "" }, { "docid": "35bb84de10476f2615f8e2a3f35a2c46", "score": "0.45661527", "text": "func (s *Server) handleNewConn(p *packet) {\n\tvar scid, odcid []byte\n\tif s.addrVer != nil && s.addrVer.IsActive(p.addr) {\n\t\t// Retry token\n\t\todcid = s.addrVer.VerifyToken(p.addr, p.header.DCID, p.header.Token)\n\t\tif len(odcid) == 0 {\n\t\t\ts.logger.log(levelDebug, zs(\"\", \"transport:packet_dropped\"),\n\t\t\t\tzv(\"addr\", p.addr), zv(\"\", &p.header), zs(\"trigger\", \"retry_required\"))\n\t\t\ts.retry(p.addr, &p.header)\n\t\t\tfreePacket(p)\n\t\t\treturn\n\t\t}\n\t\t// Use SCID originally from retry packet as it is verified.\n\t\tscid = p.header.DCID\n\t}\n\tc, err := s.newConn(p.addr, scid, odcid)\n\tif err != nil {\n\t\ts.logger.log(levelError, zs(\"\", \"transport:packet_dropped\"),\n\t\t\tzv(\"addr\", p.addr), zv(\"\", &p.header), zs(\"trigger\", \"create_connection_failed\"), ze(\"message\", err))\n\t\tfreePacket(p)\n\t\treturn\n\t}\n\tif len(odcid) == 0 {\n\t\todcid = p.header.DCID\n\t}\n\tc.attemptKey = s.attemptKey(p.addr, odcid)\n\ts.peersMu.Lock()\n\tif s.closing {\n\t\t// Do not create a new handler when server is closing\n\t\ts.peersMu.Unlock()\n\t\tfreePacket(p)\n\t\treturn\n\t}\n\tif ec := s.peers[string(c.scid)]; ec != nil {\n\t\t// scid is randomly generated, but possible clash. Drop packet for now.\n\t\ts.peersMu.Unlock()\n\t\ts.logger.log(levelError, zs(\"\", \"transport:packet_dropped\"),\n\t\t\tzv(\"addr\", p.addr), zv(\"\", &p.header), zs(\"trigger\", \"create_connection_failed\"), zs(\"message\", \"generated cid conflict\"))\n\t\tfreePacket(p)\n\t\treturn\n\t}\n\tif ec := s.peers[string(c.attemptKey)]; ec != nil {\n\t\t// Client may send multiple initial packets, discard the new connection and reuse the one already created.\n\t\ts.peersMu.Unlock()\n\t\ts.logger.log(levelInfo, zs(\"\", \"generic:info\"),\n\t\t\tzx(\"cid\", c.scid), zv(\"addr\", p.addr), zx(\"odcid\", odcid), zs(\"message\", \"found connection from initial attempt key, discard new connection\"))\n\t\tec.recvCh <- p\n\t\treturn\n\t}\n\ts.peers[string(c.scid)] = c\n\ts.peers[string(c.attemptKey)] = c\n\ts.peersMu.Unlock()\n\ts.logger.log(levelInfo, zs(\"\", \"connectivity:connection_started\"),\n\t\tzx(\"cid\", c.scid), zv(\"addr\", p.addr), zs(\"vantage_point\", \"server\"), zx(\"odcid\", odcid))\n\tc.recvCh <- p // Buffered channel\n\ts.handleConn(c)\n}", "title": "" }, { "docid": "aa8cb64f12181a3fa706969144f958a2", "score": "0.45639977", "text": "func newHandler(um models.UserManager) *handler {\n\treturn &handler{um}\n}", "title": "" }, { "docid": "28a2169f3d239edc159289c54c2aff6a", "score": "0.45609948", "text": "func RegisterLoveHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Printf(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Printf(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterLoveHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "ee2cad6311d9411634e47de226cec5a2", "score": "0.45580152", "text": "func NewStripProxy(t Transport) *StripProxy {\n return &StripProxy{\n Transport : t,\n }\n}", "title": "" }, { "docid": "af7b921ada3a9f7b8b238b1132a50cc5", "score": "0.4552726", "text": "func (d *Daemon) connectHandler(w *rest.ResponseWriter, r *rest.Request) {\n\tvar id string\n\n\terr := r.ParseForm()\n\tif err != nil {\n\t\tApiResponse(w, 500, \"BAD_REQUEST\")\n\t\treturn\n\t}\n\n\t_, hasFrom := r.Form[\"from\"]\n\tif hasFrom == false {\n\t\tApiResponse(w, 500, \"MISSING_FROM_BLOCK_ID\")\n\t\treturn\n\t}\n\n\t_, hasTo := r.Form[\"to\"]\n\tif hasTo == false {\n\t\tApiResponse(w, 500, \"MISSING_TO_BLOCK_ID\")\n\t\treturn\n\t}\n\n\tfID, hasID := r.Form[\"id\"]\n\tif hasID == false {\n\t\tid = d.getID()\n\t} else {\n\n\t\tif len(strings.TrimSpace(fID[0])) == 0 {\n\t\t\tApiResponse(w, 500, \"BAD_CONNECTION_ID\")\n\t\t\treturn\n\t\t}\n\n\t\t_, ok := d.blockMap[fID[0]]\n\t\tif ok == false {\n\t\t\tid = fID[0]\n\t\t} else {\n\t\t\tApiResponse(w, 500, \"BLOCK_ID_ALREADY_EXISTS\")\n\t\t\treturn\n\t\t}\n\t}\n\n\tfrom := r.Form[\"from\"][0]\n\tto := r.Form[\"to\"][0]\n\n\tif len(from) == 0 {\n\t\tApiResponse(w, 500, \"MISSING_FROM_BLOCK_ID\")\n\t\treturn\n\t}\n\n\tif len(to) == 0 {\n\t\tApiResponse(w, 500, \"MISSING_TO_BLOCK_ID\")\n\t\treturn\n\t}\n\n\t_, exists := d.blockMap[from]\n\tif exists == false {\n\t\tApiResponse(w, 500, \"FROM_BLOCK_NOT_FOUND\")\n\t\treturn\n\t}\n\n\t_, exists = d.blockMap[strings.Split(to, \"/\")[0]]\n\tif exists == false {\n\t\tApiResponse(w, 500, \"TO_BLOCK_NOT_FOUND\")\n\t\treturn\n\t}\n\n\terr = d.CreateConnection(from, to, id)\n\tif err != nil {\n\t\tApiResponse(w, 500, \"TO_ROUTE_NOT_FOUND\")\n\t\treturn\n\t}\n\n\tApiResponse(w, 200, \"CONNECTION_CREATED\")\n}", "title": "" }, { "docid": "24910a5a84df7af94edd4bdd0b6c703e", "score": "0.4545634", "text": "func RegisterAncientServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterAncientServiceHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "e428803c101ea8cf6d272105dbb840ce", "score": "0.45442006", "text": "func createServer(ctx context.Context, addr string, mapping nameMapping) *http.Server {\n\thandler := jnsd.HandlerConfig{\n\t\tName: func(name string) (string, error) {\n\t\t\taddr, ok := mapping.Name[name]\n\t\t\tif !ok {\n\t\t\t\treturn \"\", jnsd.ErrNotRegistered\n\t\t\t}\n\t\t\treturn addr, nil\n\t\t},\n\n\t\tAddr: func(addr string) (string, error) {\n\t\t\tname, ok := mapping.Addr[addr]\n\t\t\tif !ok {\n\t\t\t\treturn \"\", jnsd.ErrNotRegistered\n\t\t\t}\n\t\t\treturn name, nil\n\t\t},\n\t}.Handler()\n\n\tserver := &http.Server{\n\t\tAddr: addr,\n\t\tHandler: handler,\n\t\tBaseContext: func(lis net.Listener) context.Context {\n\t\t\treturn ctx\n\t\t},\n\t}\n\tgo func() {\n\t\t<-ctx.Done()\n\n\t\tctx, _ := context.WithTimeout(context.Background(), time.Minute)\n\t\terr := server.Shutdown(ctx)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Error: shutdown server: %v\", err)\n\t\t}\n\t}()\n\n\treturn server\n}", "title": "" }, { "docid": "ff47ae55fc60a5eea34f8b11cfec52c5", "score": "0.4535334", "text": "func NewHandler(c Config) *Handler {\n\th := &Handler{\n\t\tmux: pat.New(),\n\t\tConfig: &c,\n\t\tLogger: zap.NewNop(),\n\t\tCLFLogger: log.New(os.Stderr, \"[httpd] \", 0),\n\t\tstats: &Statistics{},\n\t\trequestTracker: NewRequestTracker(),\n\t}\n\n\t// Limit the number of concurrent & enqueued write requests.\n\th.writeThrottler = NewThrottler(c.MaxConcurrentWriteLimit, c.MaxEnqueuedWriteLimit)\n\th.writeThrottler.EnqueueTimeout = c.EnqueuedWriteTimeout\n\n\t// Disable the write log if they have been suppressed.\n\twriteLogEnabled := c.LogEnabled\n\tif c.SuppressWriteLog {\n\t\twriteLogEnabled = false\n\t}\n\n\th.AddRoutes([]Route{\n\t\tRoute{\n\t\t\t\"query-options\", // Satisfy CORS checks.\n\t\t\t\"OPTIONS\", \"/query\", false, true, h.serveOptions,\n\t\t},\n\t\tRoute{\n\t\t\t\"query\", // Query serving route.\n\t\t\t\"GET\", \"/query\", true, true, h.serveQuery,\n\t\t},\n\t\tRoute{\n\t\t\t\"query\", // Query serving route.\n\t\t\t\"POST\", \"/query\", true, true, h.serveQuery,\n\t\t},\n\t\tRoute{\n\t\t\t\"write-options\", // Satisfy CORS checks.\n\t\t\t\"OPTIONS\", \"/write\", false, true, h.serveOptions,\n\t\t},\n\t\tRoute{\n\t\t\t\"write\", // Data-ingest route.\n\t\t\t\"POST\", \"/write\", true, writeLogEnabled, h.serveWrite,\n\t\t},\n\t\tRoute{\n\t\t\t\"prometheus-write\", // Prometheus remote write\n\t\t\t\"POST\", \"/api/v1/prom/write\", false, true, h.servePromWrite,\n\t\t},\n\t\tRoute{\n\t\t\t\"prometheus-read\", // Prometheus remote read\n\t\t\t\"POST\", \"/api/v1/prom/read\", true, true, h.servePromRead,\n\t\t},\n\t\tRoute{ // Ping\n\t\t\t\"ping\",\n\t\t\t\"GET\", \"/ping\", false, true, h.servePing,\n\t\t},\n\t\tRoute{ // Ping\n\t\t\t\"ping-head\",\n\t\t\t\"HEAD\", \"/ping\", false, true, h.servePing,\n\t\t},\n\t\tRoute{ // Ping w/ status\n\t\t\t\"status\",\n\t\t\t\"GET\", \"/status\", false, true, h.serveStatus,\n\t\t},\n\t\tRoute{ // Ping w/ status\n\t\t\t\"status-head\",\n\t\t\t\"HEAD\", \"/status\", false, true, h.serveStatus,\n\t\t},\n\t\tRoute{\n\t\t\t\"prometheus-metrics\",\n\t\t\t\"GET\", \"/metrics\", false, true, promhttp.Handler().ServeHTTP,\n\t\t},\n\t}...)\n\n\tfluxRoute := Route{\n\t\t\"flux-read\",\n\t\t\"POST\", \"/api/v2/query\", true, true, nil,\n\t}\n\n\tif !c.FluxEnabled {\n\t\tfluxRoute.HandlerFunc = func(w http.ResponseWriter, r *http.Request) {\n\t\t\thttp.Error(w, \"Flux query service disabled. Verify flux-enabled=true in the [http] section of the FreeTSDB config.\", http.StatusForbidden)\n\t\t}\n\t} else {\n\t\tfluxRoute.HandlerFunc = h.serveFluxQuery\n\t}\n\th.AddRoutes(fluxRoute)\n\n\treturn h\n}", "title": "" }, { "docid": "0f9103044988849a2caa9680e463da80", "score": "0.45340043", "text": "func New(ctx context.Context, next http.Handler, config *Config, name string) (http.Handler, error) {\n\tif config.DimdanDomain == \"\" {\n\t\treturn nil, fmt.Errorf(\"DimdanDomain cannot be empty\")\n\t}\n\tif config.TakeawayDomain == \"\" {\n\t\treturn nil, fmt.Errorf(\"TakeawayDomain cannot be empty\")\n\t}\n\tif config.ShopDomain == \"\" {\n\t\treturn nil, fmt.Errorf(\"ShopDomain cannot be empty\")\n\t}\n\tif config.SDeliveryDomain == \"\" {\n\t\treturn nil, fmt.Errorf(\"SDeliveryDomain cannot be empty\")\n\t}\n\tif config.StoreDirectoryDomain == \"\" {\n\t\treturn nil, fmt.Errorf(\"StoreDirectoryDomain cannot be empty\")\n\t}\n\tif config.Key == \"\" {\n\t\treturn nil, fmt.Errorf(\"Key cannot be empty\")\n\t}\n\treturn &DimdanRedirect{\n\t\tnext: next,\n\t\tname: name,\n\t\tdimdanDomain: config.DimdanDomain,\n\t\ttakeawayDomain: config.TakeawayDomain,\n\t\tshopDomain: config.ShopDomain,\n\t\tsDeliveryDomain: config.SDeliveryDomain,\n\t\tstoreDirectoryDomain: config.StoreDirectoryDomain,\n\t\tkey: config.Key,\n\t}, nil\n}", "title": "" }, { "docid": "60ef3cbfdadcf0dc87798a154c7a24c9", "score": "0.4529906", "text": "func MakeHandler(fn func(context.Context, appenv.AppEnv, http.ResponseWriter, *http.Request) *AppError) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tctx := appengine.NewContext(r)\n\t\tenv := appenv.GetEnv()\n\n\t\tif env.HostEnv == appenv.EnvLive {\n\t\t\thost := strings.ToLower(r.URL.Host)\n\t\t\tif host != env.Config.BaseDomainName {\n\t\t\t\tpath := r.URL.Path\n\t\t\t\tredirectURL := fmt.Sprintf(\"https://%s%s\",\n\t\t\t\t\tenv.Config.BaseDomainName, path)\n\t\t\t\thttp.Redirect(w, r, redirectURL, http.StatusMovedPermanently)\n\t\t\t\tlog.Infof(ctx, \"Redirecting to %s. Original Host:%s, Path:%s\",\n\t\t\t\t\tredirectURL, host, path)\n\t\t\t}\n\t\t}\n\n\t\tif e := fn(ctx, env, w, r); e != nil {\n\t\t\tapplicationError(ctx, w, r, e)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "17d144f935045a280901fe52525d1aeb", "score": "0.45270583", "text": "func (t *Transport) CreateConnection(endpoint string) (grav.Connection, error) {\n\tif !strings.HasPrefix(endpoint, \"http\") {\n\t\tendpoint = fmt.Sprintf(\"http://%s\", endpoint)\n\t}\n\n\tendpointURL, err := url.Parse(endpoint)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tept := &Endpoint{\n\t\tselfUUID: t.selfUUID,\n\t\tURL: endpointURL,\n\t}\n\n\treturn ept, nil\n}", "title": "" }, { "docid": "c078ba5c28215b63dbd412745b8577f9", "score": "0.4526332", "text": "func CreateServiceHandler(w http.ResponseWriter, r *http.Request) {\n\t// TODO\n}", "title": "" }, { "docid": "17123e59a6f6820d993e48345dd1c1d5", "score": "0.45189518", "text": "func MakeHandler(hs Service, logger kitlog.Logger) http.Handler {\n\tr := mux.NewRouter()\n\n\topts := []kithttp.ServerOption{\n\t\tkithttp.ServerErrorHandler(transport.NewLogErrorHandler(logger)),\n\t\tkithttp.ServerErrorEncoder(transportcommons.ProcessResponseError),\n\t}\n\n\tregisterIncidentHandler := kithttp.NewServer(\n\t\tmakeRegisterIncidentEndpoint(hs),\n\t\thandleRegisterIncidentRequest,\n\t\ttransportcommons.HandleResponse,\n\t\topts...,\n\t)\n\n\tr.Handle(servicecommons.RegisterIncidentPath.String(), registerIncidentHandler).Methods(\"POST\")\n\n\treturn r\n}", "title": "" }, { "docid": "9f6ccde8d3db5584ad82bbe1794190ba", "score": "0.45179233", "text": "func (client VirtualNetworkClient) createClientVpnEndpoint(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPost, \"/clientVpnEndpoints\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response CreateClientVpnEndpointResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "ddfaa9d1d83a2530bf4484df74bce80c", "score": "0.4514997", "text": "func RegisterPostServiceHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterPostServiceHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "064cb8446ed3d0c886e45232e9b823cf", "score": "0.45101428", "text": "func (r *Resolver) newresolver(URL string) (model.Resolver, error) {\n\th3 := strings.HasPrefix(URL, \"http3://\")\n\tif h3 {\n\t\tURL = strings.Replace(URL, \"http3://\", \"https://\", 1)\n\t}\n\treturn r.newChildResolver(h3, URL)\n}", "title": "" }, { "docid": "35d26b3360ed3855fc90b13fa47246de", "score": "0.45083803", "text": "func NewEndpoint(deps *module.Dependencies) Endpoint {\n\treturn &EndpointHandlers{\n\t\tContactsSaveContactsHandler: NewContactsSaveContactsHandler(deps),\n\t}\n}", "title": "" }, { "docid": "7819a146014b0013a6faf336812d480b", "score": "0.4507232", "text": "func New(svc dynamodbiface.DynamoDBAPI, tableName string) (*Handler, error) {\n\tif tableName == \"\" {\n\t\tlog.Error().Msg(\"Table name is empty\")\n\t\treturn nil, errors.New(ErrStoreTableNameIsEmpty)\n\t}\n\n\treturn &Handler{svc, tableName}, nil\n}", "title": "" }, { "docid": "48ac4ae2e29e5a2dab1e328a7320da24", "score": "0.45055732", "text": "func (s *Service) SSLEndpointCreate(appIdentity string, o struct {\n\tCertificateChain string `json:\"certificate_chain\"` // raw contents of the public certificate chain (eg: .crt or .pem file)\n\tPreprocess *bool `json:\"preprocess,omitempty\"` // allow Heroku to modify an uploaded public certificate chain if deemed\n\t// advantageous by adding missing intermediaries, stripping unnecessary\n\t// ones, etc.\n\tPrivateKey string `json:\"private_key\"` // contents of the private key (eg .key file)\n}) (*SSLEndpoint, error) {\n\tvar sslEndpoint SSLEndpoint\n\treturn &sslEndpoint, s.Post(&sslEndpoint, fmt.Sprintf(\"/apps/%v/ssl-endpoints\", appIdentity), o)\n}", "title": "" }, { "docid": "9c1ebe239127a4353ea074a52622bc00", "score": "0.45039877", "text": "func NewCUPSHandler(i idGetter, drainURLs []string, drainCount int) *CUPSHandler {\n\treturn &CUPSHandler{\n\t\tidGetter: i,\n\t\tdrainURLs: drainURLs,\n\t\tdrainCount: drainCount,\n\t}\n}", "title": "" }, { "docid": "e3ac324a106c53d70708240063f86850", "score": "0.4503643", "text": "func (a *SNSApp) CreateEndpoint(token string) (*SNSEndpoint, error) {\n\tarn, err := a.createEndpoint(token)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tendpoint := a.svc.NewApplicationEndpoint(arn)\n\treturn endpoint, nil\n}", "title": "" }, { "docid": "0e8b0a5cb5bf0a2f46946ac0192266ce", "score": "0.4502062", "text": "func newRequestHandler(req *api.Request) (*requestHandler, error) {\n\tglog.V(2).Infof(\"Using docker socket: %s\", req.DockerSocket)\n\n\tdocker, err := docker.NewDocker(req.DockerSocket)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &requestHandler{\n\t\trequest: req,\n\t\tdocker: docker,\n\t\tinstaller: script.NewInstaller(req.BaseImage, req.ScriptsURL, docker),\n\t\tgit: git.NewGit(),\n\t\tfs: util.NewFileSystem(),\n\t\ttar: tar.NewTar(),\n\t}, nil\n}", "title": "" }, { "docid": "d3a5032c058165f662e3b1e320ab6d69", "score": "0.45003387", "text": "func NewEndpoint(prefix string, store streamstore.Storage) http.Handler {\n\tendpoint := &Endpoint{mux.NewRouter(), store, prefix}\n\tendpoint.router.Path(\"/\").Methods(\"POST\").HandlerFunc(endpoint.handlePost)\n\tendpoint.router.Path(\"/\").Methods(\"GET\").HandlerFunc(endpoint.handleList)\n\tendpoint.router.Path(\"/{id}\").Methods(\"GET\").HandlerFunc(endpoint.handleGet)\n\tendpoint.router.Path(\"/{id}\").Methods(\"PUT\").HandlerFunc(endpoint.handlePut)\n\tendpoint.router.Path(\"/{id}\").Methods(\"PATCH\").HandlerFunc(endpoint.handlePatch)\n\tendpoint.router.Path(\"/{id}\").Methods(\"DELETE\").HandlerFunc(endpoint.handleDel)\n\treturn endpoint\n}", "title": "" }, { "docid": "6ef1aff1de82ada9488e5495a18b9a69", "score": "0.4497552", "text": "func NewEndpoint(url string) *Endpoint {\n\treturn &Endpoint{url}\n}", "title": "" }, { "docid": "6a97dcf1f4e0f6b4dbbea57600d7d2e0", "score": "0.44964364", "text": "func newMiddleware(healthcheckHandler func(http.ResponseWriter, *http.Request), endpoint string) func(http.Handler) http.Handler {\n\treturn func(h http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\t\t\tif req.Method == \"GET\" && req.URL.Path == endpoint {\n\t\t\t\thealthcheckHandler(w, req)\n\t\t\t\treturn\n\t\t\t} else if req.Method == \"GET\" && req.URL.Path == \"/healthcheck\" {\n\t\t\t\thttp.NotFound(w, req)\n\t\t\t\treturn\n\t\t\t}\n\t\t\th.ServeHTTP(w, req)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "c5bbc428439a78aedb6151c969cc6bf3", "score": "0.44955742", "text": "func (h *ManagerHandler) newServiceHandler(ctx *fasthttp.RequestCtx) {\n\tdetail, err := models.ExtractCtxRequestDetail(ctx)\n\n\tservice := models.ApronService{}\n\terr = json.Unmarshal(detail.RequestBody, &service)\n\tinternal.CheckError(err)\n\n\tif h.storageManager.IsKeyExistingInBucket(internal.ServiceBucketName, service.Id) {\n\t\tctx.SetStatusCode(fasthttp.StatusBadRequest)\n\t\tctx.WriteString(\"duplicated service name\")\n\t} else {\n\t\tbinaryService, err := proto.Marshal(&service)\n\t\tinternal.CheckError(err)\n\t\terr = h.storageManager.SaveBinaryKeyData(internal.ServiceBucketName, service.Id, binaryService)\n\t\tinternal.CheckError(err)\n\n\t\tctx.SetStatusCode(fasthttp.StatusCreated)\n\t}\n}", "title": "" }, { "docid": "ec599bfb33a9ffd302d9a0f3c724fc19", "score": "0.44929937", "text": "func NewHandler(dbURL string) (h *Handler) {\n\t// Database connection\n\tsession, err := sql.Open(\"oci8\", dbURL)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Initialize handler\n\tnh := notification.NewHandler(session, dbURL)\n\tuh := user.NewHandler(session, dbURL, Key, nh.Manager.Operator)\n\thh := house.NewHandler(session, dbURL)\n\th = &Handler{Database: session, DBURL: dbURL, UserHandler: uh, HouseHandler: hh, NotifHandler: nh}\n\n\treturn h\n}", "title": "" }, { "docid": "7ba8b41b34a0849879efe29cb3824f4c", "score": "0.4490634", "text": "func NewSocket(d *daemon.Daemon, u url.URL) *ControlSocket {\n\tvar rc = ControlSocket{\n\t\tDaemon: d,\n\t\tURL: u,\n\t}\n\n\tvar mux = new(http.ServeMux)\n\tmux.HandleFunc(\"/state\", rc.getStateHandler)\n\tmux.HandleFunc(\"/login\", rc.postLoginHandler)\n\trc.server.Handler = mux\n\n\treturn &rc\n}", "title": "" }, { "docid": "8c6b18caa2c37ae81cf55f36f1cb84c3", "score": "0.44901899", "text": "func NewHandler(method, username, password string, h HandlerFunc, useAuth bool) Handler {\n\treturn Handler{\n\t\tallowedMethod: method,\n\t\thandle: h,\n\t\tuseAuth: useAuth,\n\t\tusername: username,\n\t\tpassword: password,\n\t}\n}", "title": "" }, { "docid": "472ec5a404cef8473a5310172bcf0ea0", "score": "0.44876242", "text": "func makeCreateWalletHandler(m *http.ServeMux, endpoints endpoint.Endpoints, options []http1.ServerOption) {\n\tm.Handle(\"/create-wallet\", http1.NewServer(endpoints.CreateWalletEndpoint, decodeCreateWalletRequest, encodeCreateWalletResponse, options...))\n}", "title": "" }, { "docid": "57e0580befbf0a5c1c250b668896cf3b", "score": "0.44811633", "text": "func makeSignupHandler(m *http.ServeMux, endpoints endpoint.Endpoints, options []http1.ServerOption) {\n\tm.Handle(\"/signup\", http1.NewServer(endpoints.SignupEndpoint, decodeSignupRequest, encodeSignupResponse, options...))\n}", "title": "" }, { "docid": "f0e9ae89be0587ac0a8f3fb8a304324f", "score": "0.44767866", "text": "func newLoginHandler(encoder *encoder, rs report.Service) *loginHandler {\n\treturn &loginHandler{\n\t\tencoder: encoder,\n\t\trs: rs,\n\t}\n}", "title": "" }, { "docid": "0ee6930d884672325f00e9e9533d8960", "score": "0.44628215", "text": "func NewHandler() Handler { return defaultHandler{} }", "title": "" }, { "docid": "a00c7c58f7eca6b68b849db537dfe2d4", "score": "0.44589955", "text": "func (r *Resolver) newChildResolver(h3 bool, URL string) (model.Resolver, error) {\n\tif r.newChildResolverFn != nil {\n\t\treturn r.newChildResolverFn(h3, URL)\n\t}\n\treturn netx.NewDNSClient(netx.Config{\n\t\tBogonIsError: true,\n\t\tByteCounter: r.ByteCounter, // nil is handled by netx\n\t\tHTTP3Enabled: h3,\n\t\tLogger: r.logger(),\n\t\tProxyURL: r.ProxyURL,\n\t}, URL)\n}", "title": "" }, { "docid": "a0b446e1b75aa820e88ddef4c03506d1", "score": "0.44561198", "text": "func NewEndpoint(arg string) (ep Endpoint, e error) {\n\t// isEmptyPath - check whether given path is not empty.\n\tisEmptyPath := func(path string) bool {\n\t\treturn path == \"\" || path == SlashSeparator || path == `\\`\n\t}\n\n\tif isEmptyPath(arg) {\n\t\treturn ep, fmt.Errorf(\"empty or root endpoint is not supported\")\n\t}\n\n\tvar isLocal bool\n\tvar host string\n\tu, err := url.Parse(arg)\n\tif err == nil && u.Host != \"\" {\n\t\t// URL style of endpoint.\n\t\t// Valid URL style endpoint is\n\t\t// - Scheme field must contain \"http\" or \"https\"\n\t\t// - All field should be empty except Host and Path.\n\t\tif !((u.Scheme == \"http\" || u.Scheme == \"https\") &&\n\t\t\tu.User == nil && u.Opaque == \"\" && !u.ForceQuery && u.RawQuery == \"\" && u.Fragment == \"\") {\n\t\t\treturn ep, fmt.Errorf(\"invalid URL endpoint format\")\n\t\t}\n\n\t\tvar port string\n\t\thost, port, err = net.SplitHostPort(u.Host)\n\t\tif err != nil {\n\t\t\tif !strings.Contains(err.Error(), \"missing port in address\") {\n\t\t\t\treturn ep, fmt.Errorf(\"invalid URL endpoint format: %s\", err)\n\t\t\t}\n\n\t\t\thost = u.Host\n\t\t} else {\n\t\t\tvar p int\n\t\t\tp, err = strconv.Atoi(port)\n\t\t\tif err != nil {\n\t\t\t\treturn ep, fmt.Errorf(\"invalid URL endpoint format: invalid port number\")\n\t\t\t} else if p < 1 || p > 65535 {\n\t\t\t\treturn ep, fmt.Errorf(\"invalid URL endpoint format: port number must be between 1 to 65535\")\n\t\t\t}\n\t\t}\n\t\tif i := strings.Index(host, \"%\"); i > -1 {\n\t\t\thost = host[:i]\n\t\t}\n\n\t\tif host == \"\" {\n\t\t\treturn ep, fmt.Errorf(\"invalid URL endpoint format: empty host name\")\n\t\t}\n\n\t\t// As this is path in the URL, we should use path package, not filepath package.\n\t\t// On MS Windows, filepath.Clean() converts into Windows path style ie `/foo` becomes `\\foo`\n\t\tu.Path = path.Clean(u.Path)\n\t\tif isEmptyPath(u.Path) {\n\t\t\treturn ep, fmt.Errorf(\"empty or root path is not supported in URL endpoint\")\n\t\t}\n\n\t\t// On windows having a preceding SlashSeparator will cause problems, if the\n\t\t// command line already has C:/<export-folder/ in it. Final resulting\n\t\t// path on windows might become C:/C:/ this will cause problems\n\t\t// of starting minio server properly in distributed mode on windows.\n\t\t// As a special case make sure to trim the separator.\n\n\t\t// NOTE: It is also perfectly fine for windows users to have a path\n\t\t// without C:/ since at that point we treat it as relative path\n\t\t// and obtain the full filesystem path as well. Providing C:/\n\t\t// style is necessary to provide paths other than C:/,\n\t\t// such as F:/, D:/ etc.\n\t\t//\n\t\t// Another additional benefit here is that this style also\n\t\t// supports providing \\\\host\\share support as well.\n\t\tif runtime.GOOS == globalWindowsOSName {\n\t\t\tif filepath.VolumeName(u.Path[1:]) != \"\" {\n\t\t\t\tu.Path = u.Path[1:]\n\t\t\t}\n\t\t}\n\n\t} else {\n\t\t// Only check if the arg is an ip address and ask for scheme since its absent.\n\t\t// localhost, example.com, any FQDN cannot be disambiguated from a regular file path such as\n\t\t// /mnt/export1. So we go ahead and start the minio server in FS modes in these cases.\n\t\tif isHostIP(arg) {\n\t\t\treturn ep, fmt.Errorf(\"invalid URL endpoint format: missing scheme http or https\")\n\t\t}\n\t\tu = &url.URL{Path: path.Clean(arg)}\n\t\tisLocal = true\n\t}\n\n\treturn Endpoint{\n\t\tURL: u,\n\t\tIsLocal: isLocal,\n\t\tHostName: host,\n\t}, nil\n}", "title": "" }, { "docid": "262037cb76e2258d1fbf0779a7a478a1", "score": "0.44546703", "text": "func NewHandler(monitor ecsevent.Monitor) func(http.Handler) http.Handler {\n\tif monitor == nil {\n\t\tmonitor = &ecsevent.NopMonitor{}\n\t} else if _, ok := monitor.(*ecsevent.SpanMonitor); ok {\n\t\tmonitor.Record(map[string]interface{}{\n\t\t\tecsevent.FieldLogLevel: \"warn\",\n\t\t\tecsevent.FieldMessage: \"ecsevent middleware may have disconnected traces if given a span monitor\",\n\t\t})\n\t}\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\ttimeStart := time.Now()\n\n\t\t\t// Obtain the tracer to use from the root, if available.\n\t\t\t// Default to a NoopTracer if unavailable.\n\t\t\tvar tracer opentracing.Tracer\n\t\t\troot := monitor.Root()\n\t\t\tif root != nil {\n\t\t\t\ttracer = root.Tracer()\n\t\t\t} else {\n\t\t\t\ttracer = opentracing.NoopTracer{}\n\t\t\t}\n\n\t\t\tvar opentracingSpan opentracing.Span\n\t\t\twireContext, _ := tracer.Extract(\n\t\t\t\topentracing.HTTPHeaders,\n\t\t\t\topentracing.HTTPHeadersCarrier(r.Header))\n\n\t\t\t// Create the span referring to the RPC client if available.\n\t\t\t// If wireContext == nil, a root span will be created.\n\t\t\topentracingSpan = tracer.StartSpan(\n\t\t\t\tfmt.Sprintf(\"%s %s\", r.Method, r.Host),\n\t\t\t\text.RPCServerOption(wireContext))\n\n\t\t\tspan := ecsevent.NewSpanMonitorFromParent(monitor, ecsevent.WithOpenTracingSpan(opentracingSpan))\n\n\t\t\tfullURL := &url.URL{\n\t\t\t\tHost: r.Host,\n\t\t\t}\n\t\t\tif forwardedHost := r.Header.Get(\"X-Forwarded-Host\"); forwardedHost != \"\" {\n\t\t\t\tfullURL.Host = forwardedHost\n\t\t\t}\n\t\t\tif r.URL != nil {\n\t\t\t\tfullURL.Path = r.URL.Path\n\t\t\t\tfullURL.RawQuery = r.URL.RawQuery\n\t\t\t}\n\t\t\tif scheme := r.Header.Get(\"X-Forwarded-Proto\"); scheme != \"\" {\n\t\t\t\tfullURL.Scheme = scheme\n\t\t\t}\n\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\tecsevent.FieldHTTPRequestMethod: r.Method,\n\t\t\t\tecsevent.FieldHTTPRequestBodyBytes: int64(r.ContentLength),\n\t\t\t\tecsevent.FieldHTTPVersion: fmt.Sprintf(\"%d.%d\", r.ProtoMajor, r.ProtoMinor),\n\t\t\t\tecsevent.FieldECSVersion: \"1.0.1\",\n\t\t\t})\n\t\t\tif r.RemoteAddr != \"\" {\n\t\t\t\tipComponent := parseRemoteAddr(r.RemoteAddr)\n\t\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\t\tecsevent.FieldClientIP: ipComponent,\n\t\t\t\t})\n\t\t\t\tcolon := strings.LastIndexByte(r.RemoteAddr, ':')\n\t\t\t\tif colon != -1 && len(r.RemoteAddr) > colon {\n\t\t\t\t\tif port, err := strconv.Atoi(r.RemoteAddr[colon+1:]); err == nil {\n\t\t\t\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\t\t\t\tecsevent.FieldClientPort: port,\n\t\t\t\t\t\t})\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tif r.Host != \"\" {\n\t\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\t\tecsevent.FieldURLDomain: r.Host,\n\t\t\t\t})\n\t\t\t}\n\t\t\tif r.URL != nil {\n\t\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\t\tecsevent.FieldURLOriginal: r.URL.String(),\n\t\t\t\t\tecsevent.FieldURLFull: fullURL.String(),\n\t\t\t\t})\n\t\t\t\tif r.URL.Path != \"\" {\n\t\t\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\t\t\tecsevent.FieldURLPath: r.URL.Path,\n\t\t\t\t\t})\n\t\t\t\t}\n\t\t\t\tif r.URL.RawQuery != \"\" {\n\t\t\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\t\t\tecsevent.FieldURLQuery: r.URL.RawQuery,\n\t\t\t\t\t})\n\t\t\t\t}\n\t\t\t}\n\t\t\tif ref := r.Header.Get(\"Referer\"); ref != \"\" {\n\t\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\t\tecsevent.FieldHTTPRequestReferrer: ref,\n\t\t\t\t})\n\t\t\t}\n\t\t\tif ua := r.Header.Get(\"User-Agent\"); ua != \"\" {\n\t\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\t\tecsevent.FieldUserAgentOriginal: ua,\n\t\t\t\t})\n\t\t\t}\n\t\t\tif xff := r.Header.Get(\"X-Forwarded-For\"); xff != \"\" {\n\t\t\t\t// TODO: support Forwarded header\n\t\t\t\tips := []string{}\n\t\t\t\tfor _, rawIP := range strings.Split(xff, \",\") {\n\t\t\t\t\tip := net.ParseIP(rawIP)\n\t\t\t\t\tif ip != nil {\n\t\t\t\t\t\tips = append(ips, ip.String())\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\t\tecsevent.FieldRelatedIP: ips,\n\t\t\t\t})\n\t\t\t}\n\n\t\t\tr = r.WithContext(span.WithContext(opentracing.ContextWithSpan(r.Context(), opentracingSpan)))\n\t\t\t// Record status and size, using 200 as our default status\n\t\t\t// Passes everything through to the parent response writer after\n\t\t\t// recording status and size.\n\t\t\twrw := &responseWriter{\n\t\t\t\tResponseWriter: w,\n\t\t\t\tstatus: 200,\n\t\t\t}\n\t\t\tnext.ServeHTTP(wrw, r)\n\t\t\ttimeEnd := time.Now()\n\t\t\tdurationNS := int64(float64(timeEnd.Sub(timeStart)) / float64(time.Nanosecond))\n\t\t\tspan.UpdateFields(map[string]interface{}{\n\t\t\t\tecsevent.FieldHTTPResponseStatusCode: wrw.status,\n\t\t\t\tecsevent.FieldHTTPResponseBodyBytes: int64(wrw.size),\n\t\t\t\tecsevent.FieldEventStart: timeStart,\n\t\t\t\tecsevent.FieldEventEnd: timeEnd,\n\t\t\t\tecsevent.FieldEventDuration: durationNS,\n\t\t\t})\n\t\t\tspan.Finish()\n\t\t})\n\t}\n}", "title": "" }, { "docid": "6d5fad43324de60b5d99f06a750b143d", "score": "0.4451262", "text": "func RegisterTodoHandlerFromEndpoint(ctx context.Context, mux *runtime.ServeMux, endpoint string, opts []grpc.DialOption) (err error) {\n\tconn, err := grpc.Dial(endpoint, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tgo func() {\n\t\t\t<-ctx.Done()\n\t\t\tif cerr := conn.Close(); cerr != nil {\n\t\t\t\tgrpclog.Infof(\"Failed to close conn to %s: %v\", endpoint, cerr)\n\t\t\t}\n\t\t}()\n\t}()\n\n\treturn RegisterTodoHandler(ctx, mux, conn)\n}", "title": "" }, { "docid": "ec4005ddca0bc7969034968b293d8d31", "score": "0.44485608", "text": "func makeAddHandler(endpoints endpoint.Endpoints, options []grpc.ServerOption) grpc.Handler {\n\treturn grpc.NewServer(endpoints.AddEndpoint, decodeAddRequest, encodeAddResponse, options...)\n}", "title": "" }, { "docid": "5a69585c09aff46fc8db8e05068056d5", "score": "0.44471225", "text": "func MakeHandler(bs services.Service, logger kitlog.Logger) http.Handler {\n\topts := []kithttp.ServerOption{\n\t\tkithttp.ServerErrorHandler(transport.NewLogErrorHandler(logger)),\n\t\tkithttp.ServerErrorEncoder(encodeError),\n\t}\n\n\tauthLoginHandler := kithttp.NewServer(\n\t\tmakeAuthLoginEndpoint(bs),\n\t\tdecodeAuthLoginRequest,\n\t\tencodeResponse,\n\t\topts...,\n\t)\n\n\tauthLogoutHandler := kithttp.NewServer(\n\t\tmakeAuthLogoutEndpoint(bs),\n\t\tdecodeAuthLogoutRequest,\n\t\tencodeResponse,\n\t\topts...,\n\t)\n\n\tauthSignUpHandler := kithttp.NewServer(\n\t\tmakeSignUpEndpoint(bs),\n\t\tdecodeAuthSignUpRequest,\n\t\tencodeResponse,\n\t\topts...,\n\t)\n\n\tauthRecoverPasswordHandler := kithttp.NewServer(\n\t\tmakeRecoverPasswordEndpoint(bs),\n\t\tdecodeAuthRecoverPasswordRequest,\n\t\tencodeResponse,\n\t\topts...,\n\t)\n\n\tauthRefreshTokenHandler := kithttp.NewServer(\n\t\tmakeRefreshTokenEndpoint(bs),\n\t\tdecodeAuthRefreshTokenRequest,\n\t\tencodeResponse,\n\t\topts...,\n\t)\n\n\tr := mux.NewRouter()\n\n\tr.Handle(\"/auth/v1/login\", authLoginHandler).Methods(\"POST\")\n\tr.Handle(\"/auth/v1/logout\", authLogoutHandler).Methods(\"GET\")\n\tr.Handle(\"/auth/v1/signup\", authSignUpHandler).Methods(\"POST\")\n\tr.Handle(\"/auth/v1/recoverPassword\", authRecoverPasswordHandler).Methods(\"POST\")\n\tr.Handle(\"/auth/v1/refreshToken\", authRefreshTokenHandler).Methods(\"POST\")\n\n\treturn r\n}", "title": "" }, { "docid": "f9676a44fe0bbac78162f635fa296fe1", "score": "0.44420838", "text": "func New(svc transport.Service, logger log.Logger, store storage.Store, cdc *securecookie.SecureCookie, embedStaticFiles bool) http.Handler {\n\th := &handler{\n\t\tsvc: svc,\n\t\tlogger: logger,\n\t\tstore: store,\n\t\tcookieCodec: cdc,\n\t\tembedStaticFiles: embedStaticFiles,\n\t}\n\n\tapi := way.NewRouter()\n\tapi.HandleFunc(\"POST\", \"/api/send_magic_link\", h.sendMagicLink)\n\tapi.HandleFunc(\"GET\", \"/api/verify_magic_link\", h.verifyMagicLink)\n\tapi.HandleFunc(\"GET\", \"/api/credential_creation_options\", h.credentialCreationOptions)\n\tapi.HandleFunc(\"POST\", \"/api/credentials\", h.registerCredential)\n\tapi.HandleFunc(\"GET\", \"/api/credential_request_options\", h.credentialRequestOptions)\n\tapi.HandleFunc(\"POST\", \"/api/webauthn_login\", h.webAuthnLogin)\n\tapi.HandleFunc(\"POST\", \"/api/dev_login\", h.devLogin)\n\tapi.HandleFunc(\"GET\", \"/api/auth_user\", h.authUser)\n\tapi.HandleFunc(\"GET\", \"/api/token\", h.token)\n\tapi.HandleFunc(\"GET\", \"/api/users\", h.users)\n\tapi.HandleFunc(\"GET\", \"/api/usernames\", h.usernames)\n\tapi.HandleFunc(\"GET\", \"/api/users/:username\", h.user)\n\tapi.HandleFunc(\"PATCH\", \"/api/auth_user\", h.updateUser)\n\tapi.HandleFunc(\"PUT\", \"/api/auth_user/avatar\", h.updateAvatar)\n\tapi.HandleFunc(\"POST\", \"/api/users/:username/toggle_follow\", h.toggleFollow)\n\tapi.HandleFunc(\"GET\", \"/api/users/:username/followers\", h.followers)\n\tapi.HandleFunc(\"GET\", \"/api/users/:username/followees\", h.followees)\n\tapi.HandleFunc(\"POST\", \"/api/posts\", h.createPost)\n\tapi.HandleFunc(\"GET\", \"/api/users/:username/posts\", h.posts)\n\tapi.HandleFunc(\"GET\", \"/api/posts/:post_id\", h.post)\n\tapi.HandleFunc(\"DELETE\", \"/api/posts/:post_id\", h.deletePost)\n\tapi.HandleFunc(\"POST\", \"/api/posts/:post_id/toggle_like\", h.togglePostLike)\n\tapi.HandleFunc(\"POST\", \"/api/posts/:post_id/toggle_subscription\", h.togglePostSubscription)\n\tapi.HandleFunc(\"GET\", \"/api/timeline\", h.timeline)\n\tapi.HandleFunc(\"DELETE\", \"/api/timeline/:timeline_item_id\", h.deleteTimelineItem)\n\tapi.HandleFunc(\"POST\", \"/api/posts/:post_id/comments\", h.createComment)\n\tapi.HandleFunc(\"GET\", \"/api/posts/:post_id/comments\", h.comments)\n\tapi.HandleFunc(\"POST\", \"/api/comments/:comment_id/toggle_like\", h.toggleCommentLike)\n\tapi.HandleFunc(\"GET\", \"/api/notifications\", h.notifications)\n\tapi.HandleFunc(\"GET\", \"/api/has_unread_notifications\", h.hasUnreadNotifications)\n\tapi.HandleFunc(\"POST\", \"/api/notifications/:notification_id/mark_as_read\", h.markNotificationAsRead)\n\tapi.HandleFunc(\"POST\", \"/api/mark_notifications_as_read\", h.markNotificationsAsRead)\n\tapi.HandleFunc(\"HEAD\", \"/api/proxy\", withCacheControl(proxyCacheControl)(h.proxy))\n\n\tr := way.NewRouter()\n\tr.Handle(\"*\", \"/api/...\", h.withAuth(api))\n\tr.HandleFunc(\"GET\", \"/img/avatars/:name\", h.avatar)\n\tr.Handle(\"GET\", \"/...\", h.staticHandler())\n\n\treturn r\n}", "title": "" }, { "docid": "bebf22cb37bd05e8b6208b455a6011b5", "score": "0.44404703", "text": "func NewHandler(service *image.Service) *Handler {\n return &Handler{\n Service: service,\n }\n}", "title": "" }, { "docid": "69051f13d235d0b11d178cc32ae0ddb7", "score": "0.44399402", "text": "func NewHandler(s *Server) *Handler {\n\th := &Handler{\n\t\tserver: s,\n\t\tmux: pat.New(),\n\t}\n\n\t// Authentication route\n\th.mux.Get(\"/authenticate\", http.HandlerFunc(h.serveAuthenticate))\n\n\t// User routes.\n\th.mux.Get(\"/users\", http.HandlerFunc(h.serveUsers))\n\th.mux.Post(\"/users\", http.HandlerFunc(h.serveCreateUser))\n\th.mux.Put(\"/users/:user\", http.HandlerFunc(h.serveUpdateUser))\n\th.mux.Del(\"/users/:user\", http.HandlerFunc(h.serveDeleteUser))\n\n\t// Database routes\n\th.mux.Get(\"/db\", http.HandlerFunc(h.serveDatabases))\n\th.mux.Post(\"/db\", http.HandlerFunc(h.serveCreateDatabase))\n\th.mux.Del(\"/db/:name\", http.HandlerFunc(h.serveDeleteDatabase))\n\n\t// Series routes.\n\th.mux.Get(\"/db/:db/series\", http.HandlerFunc(h.serveQuery))\n\th.mux.Post(\"/db/:db/series\", http.HandlerFunc(h.serveWriteSeries))\n\n\t// Shard routes.\n\th.mux.Get(\"/db/:db/shards\", http.HandlerFunc(h.serveShards))\n\th.mux.Del(\"/db/:db/shards/:id\", http.HandlerFunc(h.serveDeleteShard))\n\n\t// Retention policy routes.\n\th.mux.Get(\"/db/:db/retention_policies\", http.HandlerFunc(h.serveRetentionPolicies))\n\th.mux.Post(\"/db/:db/retention_policies\", http.HandlerFunc(h.serveCreateRetentionPolicy))\n\th.mux.Put(\"/db/:db/retention_policies/:name\", http.HandlerFunc(h.serveUpdateRetentionPolicy))\n\th.mux.Del(\"/db/:db/retention_policies/:name\", http.HandlerFunc(h.serveDeleteRetentionPolicy))\n\n\t// Data node routes.\n\th.mux.Get(\"/data_nodes\", http.HandlerFunc(h.serveDataNodes))\n\th.mux.Post(\"/data_nodes\", http.HandlerFunc(h.serveCreateDataNode))\n\th.mux.Del(\"/data_nodes/:id\", http.HandlerFunc(h.serveDeleteDataNode))\n\n\t// Utilities\n\th.mux.Get(\"/ping\", http.HandlerFunc(h.servePing))\n\n\treturn h\n}", "title": "" } ]
e39ac65236424a40c128249b0649e5ad
Setup sets up the elements necessary for the test cases
[ { "docid": "b91de875b17274081e6bf251a7d34849", "score": "0.0", "text": "func Setup(ctx context.Context, runenv *runtime.RunEnv, opts *SetupOpts) (*DHTRunInfo, error) {\n\tif err := initAssets(runenv); err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient := sync.MustBoundClient(ctx, runenv)\n\t//defer watcher.Close()\n\t//defer writer.Close()\n\n\tri := &DHTRunInfo{\n\t\tRunInfo: &utils.RunInfo{\n\t\t\tRunEnv: runenv,\n\t\t\tClient: client,\n\t\t},\n\t\tDHTGroupProperties: make(map[string]*SetupOpts),\n\t}\n\n\t// TODO: Take opts.NFindPeers into account when setting a minimum?\n\tif ri.RunEnv.TestInstanceCount < minTestInstances {\n\t\treturn nil, fmt.Errorf(\n\t\t\t\"requires at least %d instances, only %d started\",\n\t\t\tminTestInstances, ri.RunEnv.TestInstanceCount,\n\t\t)\n\t}\n\n\terr := SetupNetwork(ctx, ri, 0)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tri.RunEnv.RecordMessage(\"past the setup network barrier\")\n\n\tgroupSeq, testSeq, err := utils.GetGroupsAndSeqs(ctx, ri.RunInfo, opts.GroupOrder)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor g, props := range ri.GroupProperties {\n\t\tfakeEnv := &runtime.RunEnv{\n\t\t\tRunParams: runtime.RunParams{TestInstanceParams: props.Params},\n\t\t}\n\t\tri.DHTGroupProperties[g] = GetCommonOpts(fakeEnv)\n\t}\n\n\tri.RunEnv.RecordMessage(\"past nodeid\")\n\n\trng := rand.New(rand.NewSource(int64(testSeq)))\n\tpriv, _, err := crypto.GenerateEd25519Key(rng)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttestNode := &NodeParams{\n\t\thost: nil,\n\t\tdht: nil,\n\t\tinfo: &DHTNodeInfo{\n\t\t\tNodeInfo: &tglibp2p.NodeInfo{\n\t\t\t\tSeq: testSeq,\n\t\t\t\tGroupSeq: groupSeq,\n\t\t\t\tGroup: ri.RunEnv.TestGroupID,\n\t\t\t\tAddrs: nil,\n\t\t\t},\n\t\t\tProperties: opts,\n\t\t},\n\t}\n\n\ttestNode.host, testNode.dht, err = NewDHTNode(ctx, ri.RunEnv, opts, priv, testNode.info)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttestNode.info.Addrs = host.InfoFromHost(testNode.host)\n\n\totherNodes, err := tglibp2p.ShareAddresses(ctx, ri.RunInfo, testNode.info.NodeInfo)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tri.RunEnv.RecordMessage(\"finished setup function\")\n\n\toutputStart(testNode)\n\n\totherDHTNodes := make(map[peer.ID]*DHTNodeInfo, len(otherNodes))\n\tfor pid, nodeInfo := range otherNodes {\n\t\totherDHTNodes[pid] = &DHTNodeInfo{\n\t\t\tNodeInfo: nodeInfo,\n\t\t\tProperties: ri.DHTGroupProperties[nodeInfo.Group],\n\t\t}\n\t}\n\n\tri.Node = testNode\n\tri.Others = otherDHTNodes\n\treturn ri, nil\n}", "title": "" } ]
[ { "docid": "1106da7ebb0d14295cba9a7725a18021", "score": "0.709144", "text": "func (suite *controllerUtilSuite) SetupSuite() {\n\tsuite.r = initUnitTestReconcile()\n\tsuite.nuxeoName = \"testnux\"\n\tsuite.namespace = \"testns\"\n}", "title": "" }, { "docid": "16370619b2a34cf1a5d5aa81c2572abe", "score": "0.7073062", "text": "func setup() {\n\tserverConfigs := commons.InitConfigurations(commons.GetServerHome() + \"/resources/.test/config.default.yaml\")\n\tcommons.ConstructConnectionPool(serverConfigs.DBConfigMap)\n\n\t//create the database in sqlite\n\tconstructTestDB(serverConfigs.Home)\n\t//constructing new routes\n\tm = routes.NewRouter()\n\t//The response recorder used to record HTTP responses\n\trespRec = httptest.NewRecorder()\n}", "title": "" }, { "docid": "b94203c3d276606a887e014050646ba4", "score": "0.7034832", "text": "func setup() {\n\tfmt.Printf(\"Setting up test values...\\n\")\n}", "title": "" }, { "docid": "c8cda8ac1ca259d80a243def18050166", "score": "0.7031755", "text": "func (suite *reconUtilSuite) SetupSuite() {\n\tsuite.r = initUnitTestReconcile()\n\tsuite.nuxeoName = \"testnux\"\n\tsuite.namespace = \"testns\"\n\tsuite.secretKey = \"foo\"\n\tsuite.secretData = []byte(\"bar\")\n\tsuite.secretName = \"testsecret\"\n\tsuite.cmName = \"mycm\"\n\tsuite.nuxeoUID = \"00000000-0000-0000-0000-000000000000\"\n}", "title": "" }, { "docid": "b91b2eff0132b6a843dfbf39e1ba7841", "score": "0.6880166", "text": "func (t *Test) Setup() *Test {\n\t// this bit of defensive programming is to aid unit testing\n\tif t.harness.Harness.KubeClient() != nil {\n\t\t_ = t.Test.Setup()\n\t}\n\tt.envs[\"TEST_OPERATOR_NS\"] = t.Namespace\n\tt.envs[\"TEST_COUNT\"] = fmt.Sprintf(\"%d\", t.testCount)\n\treturn t\n}", "title": "" }, { "docid": "d3b60be178da394a2a144a9e547e3f63", "score": "0.68294674", "text": "func (t *Framework) Setup() error {\n\tif e := t.createTestNamespace(); e != nil {\n\t\treturn e\n\t}\n\treturn t.setupOperator()\n}", "title": "" }, { "docid": "fa559d05e0ef15c53672daef4a97bb57", "score": "0.68058455", "text": "func (suite *WebTestSuite) SetupTest() {\n}", "title": "" }, { "docid": "4adcb85f0c2a2e5cebc101350c48a797", "score": "0.6764614", "text": "func setupTests(suite *AppTestSuite) {\n\tfor _, test := range tests {\n\t\ttest.Setup(suite, suite.T())\n\t}\n}", "title": "" }, { "docid": "7521fb634fdcd4a303d6d64a30e9cd57", "score": "0.6733655", "text": "func (s *Suite) SetupTest() {\n}", "title": "" }, { "docid": "b28b4a799ff7cbeafa3c3a55cc8cc2ac", "score": "0.6708627", "text": "func (s *VotesSuite) SetupSuite() {\n\ts.cleanupTables()\n\ts.seed(\"users\")\n\ts.seed(\"posts\")\n\ts.authToken = s.getAuthToken()\n}", "title": "" }, { "docid": "58c06e27220f08d1951e07a758a244d9", "score": "0.6680225", "text": "func (ts *TSuite) CaseSetup() {\n\n}", "title": "" }, { "docid": "9cb0e9ea15926b5a23a3a4348274b271", "score": "0.6665641", "text": "func (ts *TSuite) SuitSetup() {\n\n}", "title": "" }, { "docid": "e2a347968de76ae6a9fabcb5afb5a0f9", "score": "0.6658182", "text": "func setup() {\n\tif testArticle == nil {\n\t\tfile, _ := os.Open(\"fixtures/heise.html\")\n\t\ttestArticle, _ = NewArticle(file)\n\t}\n}", "title": "" }, { "docid": "28e8ef28be373affd518698adafd7021", "score": "0.66487175", "text": "func (h *Harness) Setup() error {\n\t// start up the qitmeer node\n\tif err := h.Node.start(); err != nil {\n\t\treturn err\n\t}\n\t// setup the rpc client\n\tif err := h.connectRPCClient(); err != nil {\n\t\treturn err\n\t}\n\tif err := h.wallet.Start(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c83f8a28dc8406c96e9bb2fa7a9be7b3", "score": "0.6636912", "text": "func (suite *Suite) SetupSuite() {\n\tsuite.JSONFile = \"test-json.json\"\n\t_ = initConfig(suite.JSONFile, jsonExample)\n\n\tsuite.EnvFile = \"test-env.json\"\n\t_ = initConfig(suite.EnvFile, jsonExample)\n\n\tsuite.YAMLFile = \"test-yaml.yml\"\n\t_ = initConfig(suite.YAMLFile, yamlExample)\n\n\tsuite.TOMLFile = \"test-toml.toml\"\n\t_ = initConfig(suite.TOMLFile, tomlExample)\n}", "title": "" }, { "docid": "7322ed09ed88c5aec0054168f18e61ee", "score": "0.6603129", "text": "func (testSuite *EndToEndSuite) SetupSuite() {\n\tif testSuite == nil {\n\t\treturn\n\t}\n\n\ttestSuite.testBucketNames = make(map[string]string)\n\n\tawsConfiguration := newAWSConfiguration()\n\n\tcheckAWSEnvironment(testSuite.T(), awsConfiguration)\n\tinitializeAWSEnvironment(testSuite.T(), awsConfiguration)\n\n\ttestSuite.s3Client = s3.New(session.Must(session.NewSession(awsConfiguration)))\n\n\t_ = listAWSS3Buckets(testSuite.T(), testSuite.s3Client) // Note: API connection test.\n\n\tinitializeHelmEnvironment(testSuite.T())\n}", "title": "" }, { "docid": "5dcd3eccf1b446b99f6202d7760a5a33", "score": "0.65875036", "text": "func (suite *TestBuilderSuite) SetupSuite() {\n\tdao.PrepareTestForPostgresSQL()\n\tsuite.all = []*selector.Candidate{\n\t\t{\n\t\t\tNamespaceID: 1,\n\t\t\tNamespace: \"library\",\n\t\t\tRepository: \"harbor\",\n\t\t\tKind: \"image\",\n\t\t\tTags: []string{\"latest\"},\n\t\t\tDigest: \"latest\",\n\t\t\tPushedTime: time.Now().Unix(),\n\t\t\tLabels: []string{\"L1\", \"L2\"},\n\t\t},\n\t\t{\n\t\t\tNamespaceID: 1,\n\t\t\tNamespace: \"library\",\n\t\t\tRepository: \"harbor\",\n\t\t\tKind: \"image\",\n\t\t\tTags: []string{\"dev\"},\n\t\t\tDigest: \"dev\",\n\t\t\tPushedTime: time.Now().Unix(),\n\t\t\tLabels: []string{\"L3\"},\n\t\t},\n\t}\n\n\tindex2.Register(index2.AlgorithmOR, or.New)\n\tindex.Register(doublestar.Kind, []string{\n\t\tdoublestar.Matches,\n\t\tdoublestar.Excludes,\n\t\tdoublestar.RepoMatches,\n\t\tdoublestar.RepoExcludes,\n\t\tdoublestar.NSMatches,\n\t\tdoublestar.NSExcludes,\n\t}, doublestar.New)\n\tindex.Register(label.Kind, []string{label.With, label.Without}, label.New)\n\tindex3.Register(action.Retain, action.NewRetainAction)\n\n\tsuite.oldClient = dep.DefaultClient\n\tdep.DefaultClient = &fakeRetentionClient{}\n}", "title": "" }, { "docid": "a1a41bd9bf36cdec26058a1e962e6c30", "score": "0.65655696", "text": "func (t *Test) setup(ctx context.Context) error {\n\n\t// Apply CNPs to the cluster.\n\tif err := t.applyPolicies(ctx); err != nil {\n\t\tt.ciliumLogs(ctx)\n\t\treturn fmt.Errorf(\"applying network policies: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5fbaa174b8a71c1c722e67f3cd9f4e53", "score": "0.6550641", "text": "func (p *PolicyTestSuite) SetupSuite() {\n\tp.schema = &Schema{}\n\tp.schema.Trigger = &Trigger{}\n}", "title": "" }, { "docid": "1f4d4202396fe8cd7308e4e6cdd0f7e9", "score": "0.6535172", "text": "func (e *testEnv) Setup(funcs ...Func) types.Environment {\n\tif len(funcs) == 0 {\n\t\treturn e\n\t}\n\te.actions = append(e.actions, action{role: roleSetup, funcs: funcs})\n\treturn e\n}", "title": "" }, { "docid": "c11200eaa4e793353fed49a5eb284fbf", "score": "0.6520378", "text": "func Setup(t *testing.T) *TestContext {\n\tif testing.Short() {\n\t\tt.Skip(\"skipping integration tests in short mode\")\n\t}\n\n\ttc := e2e.Setup(t)\n\tt.Cleanup(tc.Teardown)\n\n\treturn &TestContext{\n\t\ttc: tc,\n\t\tt: t,\n\t}\n}", "title": "" }, { "docid": "71e40309338ecd9b7abd057996e09b74", "score": "0.65058714", "text": "func Setup() { global.Setup() }", "title": "" }, { "docid": "7497274e7c02e81b7eacc730777a3674", "score": "0.6501957", "text": "func (suite *ContainersTestSuite) SetupTest() {\n\tResetGlobalKubeUtil()\n}", "title": "" }, { "docid": "ca87106de3a0a66877554191f738fd89", "score": "0.64897996", "text": "func (s *VaultSuite) SetupSuite() {\n\ts.setup()\n}", "title": "" }, { "docid": "03b5af4211f64f2cc0b2a620dbdc6801", "score": "0.64633626", "text": "func (s *SobelTS) SetUp() {\n}", "title": "" }, { "docid": "b86e6e2fec6182643f932c6beee9f898", "score": "0.64624166", "text": "func (rh *RandHound) Setup(nodes int, faulty int, groups int, purpose string) error {\n\n\trh.nodes = nodes\n\trh.groups = groups\n\trh.faulty = faulty\n\trh.purpose = purpose\n\n\trh.server = make([][]*onet.TreeNode, groups)\n\trh.group = make([][]int, groups)\n\trh.threshold = make([]int, groups)\n\trh.key = make([][]abstract.Point, groups)\n\trh.ServerIdxToGroupNum = make([]int, nodes)\n\trh.ServerIdxToGroupIdx = make([]int, nodes)\n\n\trh.i1s = make(map[int]*I1)\n\trh.i2s = make(map[int]*I2)\n\trh.r1s = make(map[int]*R1)\n\trh.r2s = make(map[int]*R2)\n\trh.polyCommit = make(map[int][]abstract.Point)\n\trh.secret = make(map[int][]int)\n\trh.chosenSecret = make(map[int][]int)\n\n\trh.Done = make(chan bool, 1)\n\trh.SecretReady = false\n\n\treturn nil\n}", "title": "" }, { "docid": "1c990ebbe031ed859f6686291405df9b", "score": "0.6437805", "text": "func Setup() {\n\tinitDir()\n}", "title": "" }, { "docid": "c18267f65274c7a13f826d3b688c5586", "score": "0.6430757", "text": "func (w *webRequester) Setup() error { return nil }", "title": "" }, { "docid": "2a7d6eb9a71fe4034f6c43cca526f97b", "score": "0.6420134", "text": "func (h *Harness) Setup() error {\n\tvar err error\n\n\t// Logging\n\tif h.options.Logger == nil {\n\t\th.options.Logger = &logger.TestLogger{}\n\t}\n\tif h.options.LogLevel == 0 {\n\t\th.options.LogLevel = logger.Info\n\t}\n\th.options.Logger.SetLevel(h.options.LogLevel)\n\n\t// Directories\n\th.options.ManifestDirectory, err = resolveDirectory(h.options.ManifestDirectory)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// It's possible we don't have a kubeconfig file at Setup time. We hope someone\n\t// will call SetKubeconfig at a later point when the location of kubeconfig is\n\t// known.\n\th.SetKubeconfig(\"\")\n\treturn nil\n}", "title": "" }, { "docid": "6488a9b3e44ab4006faf58d011e0a243", "score": "0.6417651", "text": "func (s *LinehayatTestSuite) SetupTest() {\n\ts.studentRepo = NewStudentRepo()\n}", "title": "" }, { "docid": "b4f1f2a57a188c6ca38e96a2a453ee0b", "score": "0.6411109", "text": "func (suite *HookAgentTestSuite) SetupSuite() {\n\tsuite.pool = tests.GiveMeRedisPool()\n\tsuite.namespace = tests.GiveMeTestNamespace()\n\n\tsuite.agent = &basicAgent{\n\t\tcontext: context.TODO(),\n\t\tnamespace: suite.namespace,\n\t\tredisPool: suite.pool,\n\t}\n\n\tsuite.prepareData()\n}", "title": "" }, { "docid": "fce379b4e9b11f8a063d032932f70ff9", "score": "0.6408361", "text": "func (suite *RecomputationsProfileTestSuite) SetupSuite() {\n\n\tconst testConfig = `\n\t [server]\n\t bindip = \"\"\n\t port = 8080\n\t maxprocs = 4\n\t cache = false\n\t lrucache = 700000000\n\t gzip = true\n\t\treqsizelimit = 1073741824\n\n\t [mongodb]\n\t host = \"127.0.0.1\"\n\t port = 27017\n\t db = \"AR_test_recomputations2\"\n\t `\n\n\t_ = gcfg.ReadStringInto(&suite.cfg, testConfig)\n\n\tsuite.respRecomputationsCreated = \" <root>\\n\" +\n\t\t\" <Message>A recalculation request has been filed</Message>\\n </root>\"\n\n\tsuite.respUnauthorized = \"Unauthorized\"\n\tsuite.tenantDbConf = config.MongoConfig{\n\t\tHost: \"localhost\",\n\t\tPort: 27017,\n\t\tDb: \"AR_test_recomputations2_tenant\",\n\t\tPassword: \"h4shp4ss\",\n\t\tUsername: \"dbuser\",\n\t\tStore: \"ar\",\n\t}\n\tsuite.clientkey = \"mysecretcombination\"\n\n\tsuite.confHandler = respond.ConfHandler{suite.cfg}\n\tsuite.router = mux.NewRouter().StrictSlash(false).PathPrefix(\"/api/v2\").Subrouter()\n\tHandleSubrouter(suite.router, &suite.confHandler)\n\n}", "title": "" }, { "docid": "ef77a3f7aeb09f84416021fbb74a96a8", "score": "0.6402625", "text": "func setup() {\n\tfmt.Printf(\"## Building the rollercoaster...\\n\")\n\tPrepareRandom()\n\tmon = ConstructMonitor(CarCap)\n\tcar = ConstructCar(GetCoasterName(), 1)\n\n\tfor i := range pass {\n\t\tpass[i] = ConstructPassenger(GetPersonName(), i)\n\t}\n}", "title": "" }, { "docid": "a96ba7a47b3db1f5ed1948750c9ec4ee", "score": "0.6389231", "text": "func (suite *E2ETestSuite) SetupSuite() {\n\tfmt.Printf(\"** End2End Setup Initiated ** \\n\\n\")\n\tsuite.subscriptionID = os.Getenv(\"ARM_SUBSCRIPTION_ID\")\n\n\tif suite.subscriptionID == \"\" {\n\t\tsuite.T().Fatal(\"ARM_SUBSCRIPTION_ID must be specified in the environment\")\n\t}\n\n\tsuite.projectShortName = random.UniqueId()\n\tsuite.projectName = fmt.Sprintf(\"ModTestE2EProject-%s\", suite.projectShortName)\n\n\tfmt.Printf(\n\t\t\"Using Suite Values:\\n\\tProjectName=%s\\n\\tProjectShortName=%s\\n\",\n\t\tsuite.projectName,\n\t\tsuite.projectShortName)\n\n\tsuite.terraformOptions = &terraform.Options{\n\t\t// The path to where our Terraform code is located\n\t\tTerraformDir: terraformDirectory,\n\t\t// Variables to pass to our Terraform code using -var options\n\t\tVars: map[string]interface{}{\n\t\t\t\"projectName\": suite.projectName,\n\t\t\t\"projectShortName\": suite.projectShortName,\n\t\t\t\"billTo\": billToTagValue,\n\t\t\t\"location\": testLocation,\n\t\t\t\"extra_tags\": map[string]string{\n\t\t\t\t\"e2e_test\": \"true\",\n\t\t\t\t\"billTo\": \"USER_TAG_OVERWRITE_FOR_BILL_TO\",\n\t\t\t},\n\t\t},\n\t}\n\n}", "title": "" }, { "docid": "4dfac690171a2617f6c8c49f60814607", "score": "0.63622737", "text": "func (rh *RandHound) Setup(nodes int, groups int, purpose string) error {\n\tvar err error\n\n\tlocation, _ := time.LoadLocation(\"Europe/Vienna\")\n\ttime := time.Now().In(location)\n\n\t// Setup session information\n\tif rh.Session, err = rh.newSession(nodes, groups, purpose, time, nil, rh.Public()); err != nil {\n\t\treturn err\n\t}\n\n\t// Setup message buffers\n\trh.Messages = rh.newMessages()\n\n\t// Setup CoSi instance\n\trh.cosi = cosi.NewCosi(rh.Suite(), rh.Private(), rh.Roster().Publics())\n\n\t// Setup other stuff\n\trh.records = make(map[int]map[int]*Record)\n\trh.commits = make(map[int]abstract.Point)\n\trh.Done = make(chan bool, 1)\n\trh.SecretReady = false\n\n\treturn nil\n}", "title": "" }, { "docid": "2cdf156accd945ca7ea03bccce2613c3", "score": "0.63619286", "text": "func (suite *ExampleTestSuite) SetupTest() {\n\tsuite.VariableThatShouldStartAtFive = 5\n}", "title": "" }, { "docid": "e86e7a2fa6155cc078ed88978cc99911", "score": "0.63547415", "text": "func setup(t *testing.T) {\n\tvar err error\n\n\tstorkVolumeDriver, err = storkdriver.Get(volumeDriverName)\n\trequire.NoError(t, err, \"Error getting stork driver %v\", volumeDriverName)\n\n\terr = storkVolumeDriver.Init(nil)\n\trequire.NoError(t, err, \"Error initializing stork driver %v\", volumeDriverName)\n\n\tnodeDriver, err = node.Get(nodeDriverName)\n\trequire.NoError(t, err, \"Error getting node driver %v\", nodeDriverName)\n\n\terr = nodeDriver.Init()\n\trequire.NoError(t, err, \"Error initializing node driver %v\", nodeDriverName)\n\n\tschedulerDriver, err = scheduler.Get(schedulerDriverName)\n\trequire.NoError(t, err, \"Error getting scheduler driver %v\", schedulerDriverName)\n\n\terr = schedulerDriver.Init(\"specs\", volumeDriverName, nodeDriverName)\n\trequire.NoError(t, err, \"Error initializing scheduler driver %v\", schedulerDriverName)\n\n\tvolumeDriver, err = volume.Get(volumeDriverName)\n\trequire.NoError(t, err, \"Error getting volume driver %v\", volumeDriverName)\n\n\terr = volumeDriver.Init(schedulerDriverName, nodeDriverName)\n\trequire.NoError(t, err, \"Error initializing volume driver %v\", volumeDriverName)\n}", "title": "" }, { "docid": "933c235098542b40d9378242c975c70b", "score": "0.63337094", "text": "func Setup(api *operations.FlagrAPI) {\n\tsetupCRUD(api)\n\tsetupEvaluation(api)\n\tsetupHealth(api)\n\tsetupExport(api)\n}", "title": "" }, { "docid": "d7eec98ccba1027d8d6c92d12262439e", "score": "0.633307", "text": "func (suite *TestSuiteAPI) SetupSuite() {\n\tvar err error\n\tsuite.token, suite.keptnAPIURL, err = testutils.GetApiCredentials()\n\tsuite.Require().Nil(err)\n}", "title": "" }, { "docid": "178923ab4a2cce210c46513aa8b118dc", "score": "0.63326645", "text": "func (suite *KeeperTestSuite) SetupTest() {\n\tsuite.coordinator = ibctesting.NewCoordinator(suite.T(), 2)\n\tsuite.chainA = suite.coordinator.GetChain(ibctesting.GetChainID(0))\n\tsuite.chainB = suite.coordinator.GetChain(ibctesting.GetChainID(1))\n}", "title": "" }, { "docid": "d333935bc0ec10741e5db6320fa72ee7", "score": "0.63235474", "text": "func setup(t *testing.T) {\n\tt.Helper()\n\tif !isSetup {\n\t\terr := f.Setup(base.Settings{})\n\t\tif err != nil {\n\t\t\tt.Fatal(\"Setup error\", err)\n\t\t}\n\t\tisSetup = true\n\t}\n}", "title": "" }, { "docid": "c2256daf6c39e191a0a83e3ebcf09982", "score": "0.6318464", "text": "func Setup() {\n\t// setup for `abc[de]f`\n\ttr = NewTree()\n\t// abc\n\ttr.AddChild(LITERAL, \"abc\")\n\t// [\n\ttr.AddChildAndMoveOnto(LSBRACKET, \"[\")\n\t// de\n\ttr.AddChild(LITERAL, \"de\")\n\t// ]\n\ttr.ChangeNode(SBRACKETS, \"[]\")\n\ttr.MoveUp()\n\t// f\n\ttr.AddChild(LITERAL, \"f\")\n}", "title": "" }, { "docid": "22eec01c4a6c028fe3a00af7e77a64dc", "score": "0.63040555", "text": "func (s *DeploySuite) SetupSuite() {\n\ts.tc = kube.NewTestClient(\"\")\n\ts.createKustomized(s.sharedConfigDir)\n}", "title": "" }, { "docid": "f0f5cb5588c73f9d07011d2e5ce4b058", "score": "0.62898254", "text": "func Setup(db storage.Driver, adminAPIKey string, nodesAPIKey string) *echo.Echo {\n\te := echo.New()\n\n\tinitAdminRouter(e, db, adminAPIKey)\n\tinitNodesRouter(e, db, nodesAPIKey)\n\n\treturn e\n}", "title": "" }, { "docid": "1dae4a75609892387b6be373b2cdb3d8", "score": "0.6278596", "text": "func (cpt *ControlPlaneTest) SetupEnvironment() *ControlPlaneTest {\n\ttypes.SetName(cpt.nodeName)\n\n\t// Configure k8s and perform capability detection with the fake client.\n\tversion.Update(cpt.clients, true)\n\n\tdatapath := fakeDatapath.NewDatapath()\n\tcpt.Datapath = datapath\n\n\tcpt.tempDir = setupTestDirectories()\n\n\treturn cpt\n}", "title": "" }, { "docid": "54bd42d0f3877161545bc1f2480e6962", "score": "0.6274024", "text": "func (s *Suite) SetupSuite() {\n\tif s.TestPrefix == \"\" {\n\t\ts.TestPrefix = \"lochness-test\"\n\t}\n\n\ts.KVDir, _ = ioutil.TempDir(\"\", s.TestPrefix+\"-\"+uuid.New())\n\n\tif s.KVPort == 0 {\n\t\ts.KVPort = uint16(1024 + rand.Intn(65535-1024))\n\t}\n\n\tif s.KVCmdMaker == nil {\n\t\ts.KVCmdMaker = ConsulMaker\n\t}\n\ts.KVCmd = s.KVCmdMaker(s.KVPort, s.KVDir, s.TestPrefix)\n\n\tif testing.Verbose() {\n\t\ts.KVCmd.Stdout = os.Stdout\n\t\ts.KVCmd.Stderr = os.Stderr\n\t}\n\ts.Require().NoError(s.KVCmd.Start())\n\ttime.Sleep(2500 * time.Millisecond) // Wait for test kv to be ready\n\n\tvar err error\n\tfor i := 0; i < 10; i++ {\n\t\ts.KV, err = kv.New(\"http://127.0.0.1:\" + strconv.Itoa(int(s.KVPort)))\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t\terr = s.KV.Ping()\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t\ttime.Sleep(500 * time.Millisecond) // Wait for test kv to be ready\n\t}\n\tif s.KV == nil {\n\t\tpanic(err)\n\t}\n\n\ts.KVPrefix = \"lochness\"\n\ts.KVURL = \"http://127.0.0.1:\" + strconv.Itoa(int(s.KVPort))\n}", "title": "" }, { "docid": "06cd82c69521029e6820260c59430296", "score": "0.6263899", "text": "func (t *testConfig) Setup() (err error) {\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tdumpK8Env()\n\t\t}\n\t}()\n\n\tdrs := []*string{&bookinfoGateway, &destinationRuleAll, &routeAllRule}\n\tfor _, dr := range drs {\n\t\t*dr = filepath.Join(bookinfoSampleDir, networkingDir, *dr)\n\t\tdefaultRules = append(defaultRules, *dr)\n\t}\n\n\trs := []*string{&rateLimitRule, &denialRule, &ingressDenialRule, &newTelemetryRule,\n\t\t&kubeenvTelemetryRule}\n\tfor _, r := range rs {\n\t\t*r = filepath.Join(bookinfoSampleDir, policyDir, *r)\n\t\trules = append(rules, *r)\n\t}\n\n\trs = []*string{&routeReviewsVersionsRule, &routeReviewsV3Rule, &tcpDbRule}\n\tfor _, r := range rs {\n\t\t*r = filepath.Join(bookinfoSampleDir, networkingDir, *r)\n\t\trules = append(rules, *r)\n\t}\n\n\trs = []*string{&redisQuotaRollingWindowRule, &redisQuotaFixedWindowRule}\n\tfor _, r := range rs {\n\t\t*r = filepath.Join(mixerTestDataDir, *r)\n\t\trules = append(rules, *r)\n\t}\n\n\tlog.Infof(\"new rule %s\", rateLimitRule)\n\tlog.Infof(\"Rules are default: %v, test-specific: %v\", defaultRules, rules)\n\tfor _, rule := range append(defaultRules, rules...) {\n\t\terr = copyRuleToFilesystem(t, rule)\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tif !util.CheckPodsRunning(tc.Kube.Namespace, tc.Kube.KubeConfig) {\n\t\treturn fmt.Errorf(\"can't get all pods running\")\n\t}\n\n\tif err = setupDefaultRouting(); err != nil {\n\t\treturn err\n\t}\n\tallowRuleSync()\n\n\t// pre-warm the system. we don't care about what happens with this\n\t// request, but we want Mixer, etc., to be ready to go when the actual\n\t// Tests start.\n\tif err = visitProductPage(30*time.Second, 200); err != nil {\n\t\tlog.Infof(\"initial product page request failed: %v\", err)\n\t}\n\n\tallowPrometheusSync()\n\n\treturn\n}", "title": "" }, { "docid": "cc30c7ed2d232a493986631355afa87a", "score": "0.6252303", "text": "func (suite *ModelTestSuite) SetupSuite() {\n\tlog.Println(\"Model Tests Begin\")\n\n\tsuite.model = new(Model)\n\tsuite.db, suite.model.mock, _ = sqlmock.New()\n}", "title": "" }, { "docid": "441c88e94b57ef3075ace72580caefa7", "score": "0.62364465", "text": "func setupSuite() {\n\t// Run only on Ginkgo node 1\n\n\tc, err := framework.LoadClientset()\n\tif err != nil {\n\t\tklog.Fatal(\"Error loading client: \", err)\n\t}\n\n\t// Delete any namespaces except those created by the system. This ensures no\n\t// lingering resources are left over from a previous test run.\n\tif framework.TestContext.CleanStart {\n\t\tdeleted, err := framework.DeleteNamespaces(c, nil, /* deleteFilter */\n\t\t\t[]string{\n\t\t\t\tmetav1.NamespaceSystem,\n\t\t\t\tmetav1.NamespaceDefault,\n\t\t\t\tmetav1.NamespacePublic,\n\t\t\t\tv1.NamespaceNodeLease,\n\t\t\t\t// kind local path provisioner namespace since 0.7.0\n\t\t\t\t// https://github.com/kubernetes-sigs/kind/blob/v0.7.0/pkg/build/node/storage.go#L35\n\t\t\t\t\"local-path-storage\",\n\t\t\t})\n\t\tif err != nil {\n\t\t\tframework.Failf(\"Error deleting orphaned namespaces: %v\", err)\n\t\t}\n\t\tklog.Infof(\"Waiting for deletion of the following namespaces: %v\", deleted)\n\t\tif err := framework.WaitForNamespacesDeleted(c, deleted, namespaceCleanupTimeout); err != nil {\n\t\t\tframework.Failf(\"Failed to delete orphaned namespaces %v: %v\", deleted, err)\n\t\t}\n\t}\n\n\t// In large clusters we may get to this point but still have a bunch\n\t// of nodes without Routes created. Since this would make a node\n\t// unschedulable, we need to wait until all of them are schedulable.\n\tframework.ExpectNoError(e2enode.WaitForAllNodesSchedulable(c, framework.TestContext.NodeSchedulableTimeout))\n\n\t//// If NumNodes is not specified then auto-detect how many are scheduleable and not tainted\n\t//if framework.TestContext.CloudConfig.NumNodes == framework.DefaultNumNodes {\n\t//\tframework.TestContext.CloudConfig.NumNodes = len(framework.GetReadySchedulableNodesOrDie(c).Items)\n\t//}\n\n\t// Ensure all pods are running and ready before starting tests (otherwise,\n\t// cluster infrastructure pods that are being pulled or started can block\n\t// test pods from running, and tests that ensure all pods are running and\n\t// ready will fail).\n\tpodStartupTimeout := framework.TestContext.SystemPodsStartupTimeout\n\t// TODO: In large clusters, we often observe a non-starting pods due to\n\t// #41007. To avoid those pods preventing the whole test runs (and just\n\t// wasting the whole run), we allow for some not-ready pods (with the\n\t// number equal to the number of allowed not-ready nodes).\n\tif err := e2epod.WaitForPodsRunningReady(c, metav1.NamespaceSystem, int32(framework.TestContext.MinStartupPods), int32(framework.TestContext.AllowedNotReadyNodes), podStartupTimeout, map[string]string{}); err != nil {\n\t\te2edebug.DumpAllNamespaceInfo(c, metav1.NamespaceSystem)\n\t\te2ekubectl.LogFailedContainers(c, metav1.NamespaceSystem, framework.Logf)\n\t\tframework.Failf(\"Error waiting for all pods to be running and ready: %v\", err)\n\t}\n\n\t//if err := framework.WaitForDaemonSets(c, metav1.NamespaceSystem, int32(framework.TestContext.AllowedNotReadyNodes), framework.TestContext.SystemDaemonsetStartupTimeout); err != nil {\n\t//\tframework.Logf(\"WARNING: Waiting for all daemonsets to be ready failed: %v\", err)\n\t//}\n\n\tdc := c.DiscoveryClient\n\n\tserverVersion, serverErr := dc.ServerVersion()\n\tif serverErr != nil {\n\t\tframework.Logf(\"Unexpected server error retrieving version: %v\", serverErr)\n\t}\n\tif serverVersion != nil {\n\t\tframework.Logf(\"kube-apiserver version: %s\", serverVersion.GitVersion)\n\t}\n}", "title": "" }, { "docid": "419d0b905089aca12a42c84b6c17e85b", "score": "0.6227674", "text": "func (suite *AnteTestSuite) SetupTest() {\n\tsuite.coordinator = ibctesting.NewCoordinator(suite.T(), 2)\n\tsuite.chainA = suite.coordinator.GetChain(ibctesting.GetChainID(0))\n\tsuite.chainB = suite.coordinator.GetChain(ibctesting.GetChainID(1))\n\t// commit some blocks so that QueryProof returns valid proof (cannot return valid query if height <= 1)\n\tsuite.coordinator.CommitNBlocks(suite.chainA, 2)\n\tsuite.coordinator.CommitNBlocks(suite.chainB, 2)\n\tsuite.path = ibctesting.NewPath(suite.chainA, suite.chainB)\n\tsuite.coordinator.Setup(suite.path)\n}", "title": "" }, { "docid": "55f2addc94f5c040ab4e05122b7b4aa0", "score": "0.62256074", "text": "func (suite *ZkTestSuite) SetupTest() {\n\tsuite.providerConfig = config.ConfigurationProviders{\n\t\tTemplateURL: suite.zkURL,\n\t\tTemplateDir: \"/datadog/check_configs\",\n\t}\n\tsuite.populate()\n}", "title": "" }, { "docid": "4511142b6c5df339288231c35e1200fb", "score": "0.62221056", "text": "func (bench Scaling) Setup() error {\n\tlog.Info(\"Setting up DC/OS scaling benchmark\")\n\treturn nil\n}", "title": "" }, { "docid": "fb77531a88e977412ab2446e3037425a", "score": "0.6213722", "text": "func OSSpecificSetup() {\n}", "title": "" }, { "docid": "d615f3f923bd71cb0048837f2887c150", "score": "0.6210504", "text": "func Setup(datastore *data.Datastore) {\n\t_datastore = datastore\n\tcreateFederationFollowersTable()\n\tcreateFederationOutboxTable()\n\tcreateFederatedActivitiesTable()\n}", "title": "" }, { "docid": "a62047fd2cc9934bde3b7dd48b400698", "score": "0.6207286", "text": "func SetUp(ctx context.Context) error {\n\tif err := upstart.StopJob(ctx, \"p2p\"); err != nil {\n\t\treturn errors.Wrap(err, \"failed to stop p2p\")\n\t}\n\n\tif err := clearSharedDir(); err != nil {\n\t\treturn errors.Wrap(err, \"failed to clear the p2p shared directory\")\n\t}\n\n\tif err := createVirtualNetwork(ctx); err != nil {\n\t\treturn errors.Wrap(err, \"failed to create the virtual network\")\n\t}\n\n\t// Restart avahi in the network namespace and wait to be ready.\n\tif err := upstart.RestartJob(ctx, \"avahi\", upstart.WithArg(\"NETNS\", NSName)); err != nil {\n\t\treturn errors.Wrap(err, \"failed to restart avahi\")\n\t}\n\tif err := testing.Poll(ctx, func(ctx context.Context) error {\n\t\treturn testexec.CommandContext(ctx, \"p2p-client\", \"--num-connections\").Run()\n\t}, nil); err != nil {\n\t\treturn errors.Wrap(err, \"failed to wait avahi startup\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bd8ec522669ae85fa630ddb099fbd148", "score": "0.620372", "text": "func SetUp() {\n\tonce.Do(setUpTestDB)\n}", "title": "" }, { "docid": "13f58506d9831d0ff30b23e6eb97397e", "score": "0.6197507", "text": "func (e *devSeedScenario) Setup(appCtx appcontext.AppContext, userUploader *uploader.UserUploader, primeUploader *uploader.PrimeUploader) {\n\tdb := appCtx.DB()\n\tmoveRouter := moverouter.NewMoveRouter()\n\tshipmentFetcher := mtoshipment.NewMTOShipmentFetcher()\n\n\t// Testdatagen factories will create new random duty locations so let's get the standard ones in the migrations\n\tvar allDutyLocations []models.DutyLocation\n\tdb.All(&allDutyLocations)\n\n\tvar originDutyLocationsInGBLOC []models.DutyLocation\n\tdb.Where(\"transportation_offices.GBLOC = ?\", \"KKFA\").\n\t\tInnerJoin(\"transportation_offices\", \"duty_locations.transportation_office_id = transportation_offices.id\").\n\t\tAll(&originDutyLocationsInGBLOC)\n\n\t/*\n\t\tADD NEW SUB-SCENARIOS HERE\n\t*/\n\n\t// sets the sub-scenarios\n\te.SubScenarios = map[string]func(){\n\t\t\"diverted_shipments\": subScenarioDivertedShipments(appCtx, userUploader, allDutyLocations, originDutyLocationsInGBLOC),\n\t\t\"hhg_onboarding\": subScenarioHHGOnboarding(appCtx, userUploader),\n\t\t\"hhg_services_counseling\": subScenarioHHGServicesCounseling(appCtx, userUploader, allDutyLocations, originDutyLocationsInGBLOC),\n\t\t\"payment_request_calculations\": subScenarioPaymentRequestCalculations(appCtx, userUploader, primeUploader, moveRouter, shipmentFetcher),\n\t\t\"ppm_customer_flow\": subScenarioPPMCustomerFlow(appCtx, userUploader, moveRouter),\n\t\t\"ppm_and_hhg\": subScenarioPPMAndHHG(appCtx, userUploader, moveRouter),\n\t\t\"prime_user_and_client_cert\": subScenarioPrimeUserAndClientCert(appCtx),\n\t\t\"shipment_hhg_cancelled\": subScenarioShipmentHHGCancelled(appCtx, allDutyLocations, originDutyLocationsInGBLOC),\n\t\t\"txo_queues\": subScenarioTXOQueues(appCtx, userUploader),\n\t\t\"misc\": subScenarioMisc(appCtx, userUploader, primeUploader, moveRouter),\n\t\t\"reweighs\": subScenarioReweighs(appCtx, userUploader, primeUploader, moveRouter),\n\t\t\"nts_and_ntsr\": subScenarioNTSandNTSR(appCtx, userUploader, moveRouter, shipmentFetcher),\n\t\t\"sit_extensions\": subScenarioSITExtensions(appCtx, userUploader, primeUploader),\n\t\t\"customer_support_remarks\": subScenarioCustomerSupportRemarks(appCtx),\n\t\t\"evaluation_reports\": subScenarioEvaluationReport(appCtx),\n\t\t\"ppm_close_outs\": subScenarioPPMCloseOut(appCtx, userUploader),\n\t\t\"shipment_address_updates\": subScenarioShipmentAddressUpdates(appCtx),\n\t\t\"sit_address_updates\": subScenarioSITAddressUpdates(appCtx, userUploader),\n\t}\n}", "title": "" }, { "docid": "8d9bbe168d5737edeb794a92e0d9f80d", "score": "0.618164", "text": "func TestSetup(t *imagetest.TestWorkflow) error {\n\tvm, err := t.CreateTestVM(\"vm\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm.RunTests(\"TestTokenFetch|TestMetaDataResponseHeaders|TestGetMetaDataUsingIP\")\n\n\tvm2, err := t.CreateTestVM(\"vm2\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm2.SetShutdownScript(shutdownScript)\n\tif err := vm2.Reboot(); err != nil {\n\t\treturn err\n\t}\n\tvm2.RunTests(\"TestShutdownScript$\")\n\n\tvm3, err := t.CreateTestVM(\"vm3\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm3.SetShutdownScript(strings.Repeat(\"a\", metadataMaxLength))\n\tif err := vm3.Reboot(); err != nil {\n\t\treturn err\n\t}\n\tvm3.RunTests(\"TestShutdownScriptFailed\")\n\n\tvm4, err := t.CreateTestVM(\"vm4\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := vm4.SetShutdownScriptURL(shutdownScript); err != nil {\n\t\treturn err\n\t}\n\tif err := vm4.Reboot(); err != nil {\n\t\treturn err\n\t}\n\tvm4.RunTests(\"TestShutdownUrlScript\")\n\n\tvm5, err := t.CreateTestVM(\"vm5\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm5.SetShutdownScript(shutdownScriptTime)\n\tif err := vm5.Reboot(); err != nil {\n\t\treturn err\n\t}\n\tvm5.RunTests(\"TestShutdownScriptTime\")\n\n\tvm6, err := t.CreateTestVM(\"vm6\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm6.SetStartupScript(startupScript)\n\tvm6.RunTests(\"TestStartupScript$\")\n\n\tvm7, err := t.CreateTestVM(\"vm7\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm7.SetStartupScript(strings.Repeat(\"a\", metadataMaxLength))\n\tvm7.RunTests(\"TestStartupScriptFailed\")\n\n\tvm8, err := t.CreateTestVM(\"vm8\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm8.SetStartupScript(daemonScript)\n\tvm8.RunTests(\"TestDaemonScript\")\n\treturn nil\n}", "title": "" }, { "docid": "35a96bcf0348db2c9d41636eeda2c47d", "score": "0.61718875", "text": "func (suite *OCITestSuite) SetupTest() {\n\tsuite.fs = afero.NewMemMapFs()\n}", "title": "" }, { "docid": "714c55f63182dbd1b441bc9d935a7ddf", "score": "0.6171678", "text": "func (suite *JobTestSuite) SetupSuite() {\n\tmcp := &v1testing.ClientPool{}\n\tsuite.defaultClientPool = v1.DefaultClientPool\n\tv1.DefaultClientPool = mcp\n\n\tsuite.mcp = mcp\n}", "title": "" }, { "docid": "abb018ef4240c8e0d1dc117bcbb6f833", "score": "0.6167306", "text": "func (s *OshinkoUnitTestSuite) SetUpSuite(c *check.C) {}", "title": "" }, { "docid": "eeb2b60c5db4d59cbc444d2436162e62", "score": "0.6166689", "text": "func Setup() benchmark.Setup {\n\treturn benchmark.Setup{\n\t\tInfo: newInfo,\n\t\tInfoFmt: newInfoFmt,\n\t\tInfoWithErrorStack: newInfoWithErrorStack,\n\t\tError: newError,\n\t\tInfoWith3: newInfoWith3,\n\t\tInfoWith10: newInfoWith10,\n\t\tInfoWith10Exist: newInfoWith10Exist,\n\t}\n}", "title": "" }, { "docid": "b81a279b59bbbeafe109a151b322660e", "score": "0.6164858", "text": "func Setup(testName string, t *testing.T) {\n\n\tif directory.Exists(GetTestPath(testName)) {\n\t\tif err := directory.RemoveAll(GetTestPath(testName)); err != nil {\n\t\t\tt.Error(err)\n\t\t}\n\t}\n\n\tif err := directory.Create(GetTestPath(testName)); err != nil {\n\t\tt.Error(err)\n\t}\n}", "title": "" }, { "docid": "1e55fb8959fd52d23834b5b8729ee6bc", "score": "0.6157319", "text": "func setupSuite() {\n\t// Run only on Ginkgo node 1\n\tc, err := framework.LoadClientset()\n\tif err != nil {\n\t\tklog.Fatal(\"Error loading client: \", err)\n\t}\n\n\t// Delete any namespaces except those created by the system. This ensures no\n\t// lingering resources are left over from a previous test run.\n\tif framework.TestContext.CleanStart {\n\t\tdeleted, err := framework.DeleteNamespaces(c, nil, /* deleteFilter */\n\t\t\t[]string{\n\t\t\t\tmetav1.NamespaceSystem,\n\t\t\t\tmetav1.NamespaceDefault,\n\t\t\t\tmetav1.NamespacePublic,\n\t\t\t\tv1.NamespaceNodeLease,\n\t\t\t})\n\t\tif err != nil {\n\t\t\tframework.Failf(\"Error deleting orphaned namespaces: %v\", err)\n\t\t}\n\t\tklog.Infof(\"Waiting for deletion of the following namespaces: %v\", deleted)\n\t\tif err := framework.WaitForNamespacesDeleted(c, deleted, framework.NamespaceCleanupTimeout); err != nil {\n\t\t\tframework.Failf(\"Failed to delete orphaned namespaces %v: %v\", deleted, err)\n\t\t}\n\t}\n\n\t// In large clusters we may get to this point but still have a bunch\n\t// of nodes without Routes created. Since this would make a node\n\t// unschedulable, we need to wait until all of them are schedulable.\n\tframework.ExpectNoError(framework.WaitForAllNodesSchedulable(c, framework.TestContext.NodeSchedulableTimeout))\n\n\t// Ensure all pods are running and ready before starting tests (otherwise,\n\t// cluster infrastructure pods that are being pulled or started can block\n\t// test pods from running, and tests that ensure all pods are running and\n\t// ready will fail).\n\tpodStartupTimeout := framework.TestContext.SystemPodsStartupTimeout\n\t// TODO: In large clusters, we often observe a non-starting pods due to\n\t// #41007. To avoid those pods preventing the whole test runs (and just\n\t// wasting the whole run), we allow for some not-ready pods (with the\n\t// number equal to the number of allowed not-ready nodes).\n\tif err := e2epod.WaitForPodsRunningReady(c, metav1.NamespaceSystem, int32(framework.TestContext.MinStartupPods), int32(framework.TestContext.AllowedNotReadyNodes), podStartupTimeout, map[string]string{}); err != nil {\n\t\tframework.DumpAllNamespaceInfo(c, metav1.NamespaceSystem)\n\t\t//e2ekubectl.LogFailedContainers(c, metav1.NamespaceSystem, framework.Logf)\n\t\tframework.Failf(\"Error waiting for all pods to be running and ready: %v\", err)\n\t}\n\n\tdc := c.DiscoveryClient\n\n\tserverVersion, serverErr := dc.ServerVersion()\n\tif serverErr != nil {\n\t\tframework.Logf(\"Unexpected server error retrieving version: %v\", serverErr)\n\t}\n\tif serverVersion != nil {\n\t\tframework.Logf(\"kube-apiserver version: %s\", serverVersion.GitVersion)\n\t}\n\n\tif framework.TestContext.NodeKiller.Enabled {\n\t\tnodeKiller := framework.NewNodeKiller(framework.TestContext.NodeKiller, c, framework.TestContext.Provider)\n\t\tgo nodeKiller.Run(framework.TestContext.NodeKiller.NodeKillerStopCh)\n\t}\n}", "title": "" }, { "docid": "1d9869d937e8cc5ef314a7caf8be3fd9", "score": "0.61561346", "text": "func (suite *PouchTopSuite) SetupSuite(c *check.C) {\n\tSkipIfFalse(c, environment.IsLinux)\n\n\tenvironment.PruneAllContainers(apiClient)\n\n\tcommand.PouchRun(\"pull\", busyboxImage).Assert(c, icmd.Success)\n}", "title": "" }, { "docid": "65a19920eb2bf41ec5fbb9de8d057845", "score": "0.6144558", "text": "func (suite *DBTestSuite) SetupTest() {\n}", "title": "" }, { "docid": "f586f722ed69a1ddddb103d1ee1fee73", "score": "0.61432016", "text": "func setup() {\n\t// test server\n\tmux = http.NewServeMux()\n\n\t// We want to ensure that tests catch mistakes where the endpoint URL is\n\t// specified as absolute rather than relative. It only makes a difference\n\t// when there's a non-empty base URL path. So, use that. See issue #752.\n\tapiHandler := http.NewServeMux()\n\n\tserver = httptest.NewServer(apiHandler)\n}", "title": "" }, { "docid": "a688c300d28d3fb47305facb8d36b2f4", "score": "0.6142901", "text": "func TestSetup(t *imagetest.TestWorkflow) error {\n\tvm1, err := t.CreateTestVM(\"vm1\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm1.RunTests(\"TestHostname|TestFQDN|TestHostKeysGeneratedOnce|TestArePackagesLegal|TestStandardPrograms|TestGuestPackages|TestNTPService|TestHostsFile\")\n\n\tvm2, err := t.CreateTestVM(\"vm2.custom.domain\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm2.RunTests(\"TestCustomHostname\")\n\n\treturn nil\n}", "title": "" }, { "docid": "6fb7afcd323aca4e23d7443ce3eb6f0c", "score": "0.61326104", "text": "func (t *TeamSpirit) Setup() error {\n\tif err := t.Driver.Start(); err != nil {\n\t\treturn fmt.Errorf(\"failed to start Driver: %s\", err)\n\t}\n\tvar err error\n\tt.page, err = t.login()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := t.focusOnTimeSheet(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cfc5f890c56d761b7e967f031b7d8171", "score": "0.61034155", "text": "func (e *ExchangeRates) Setup(config base.Settings) {\n\te.Name = config.Name\n\te.Enabled = config.Enabled\n\te.RESTPollingDelay = config.RESTPollingDelay\n\te.Verbose = config.Verbose\n\te.PrimaryProvider = config.PrimaryProvider\n}", "title": "" }, { "docid": "e5f68d6559a21218b33dfb27238a96c2", "score": "0.6098586", "text": "func setup() {\n\t// test server\n\tmux = http.NewServeMux()\n\n\t// We want to ensure that tests catch mistakes where the endpoint URL is\n\t// specified as absolute rather than relative. It only makes a difference\n\t// when there's a non-empty base URL path. So, use that. See issue #752.\n\tapiHandler := http.NewServeMux()\n\tapiHandler.Handle(baseURLPath+\"/\", http.StripPrefix(baseURLPath, mux))\n\tapiHandler.HandleFunc(\"/\", func(w http.ResponseWriter, req *http.Request) {\n\t\tfmt.Fprintln(os.Stderr, \"FAIL: Client.BaseURL path prefix is not preserved in the request URL:\")\n\t\tfmt.Fprintln(os.Stderr)\n\t\tfmt.Fprintln(os.Stderr, \"\\t\"+req.URL.String())\n\t\tfmt.Fprintln(os.Stderr)\n\t\thttp.Error(w, \"Client.BaseURL path prefix is not preserved in the request URL.\", http.StatusInternalServerError)\n\t})\n\n\tserver = httptest.NewServer(apiHandler)\n\n\t// Plex client configured to use test server\n\tclient = NewClient(nil)\n\turl, _ := url.Parse(server.URL + baseURLPath + \"/\")\n\tclient.BaseURL = url\n}", "title": "" }, { "docid": "a9823bc5ed746c42cd71eed287bfbfba", "score": "0.609036", "text": "func (s *UnitTestSuite) SetupSuite() {\n\t// create logger and registry\n\tlog.Init(\"registration-service-testing\")\n\ttest.SetEnvVarAndRestore(s.T(), commonconfig.WatchNamespaceEnvVar, test.HostOperatorNs)\n}", "title": "" }, { "docid": "c64cce8f6016b2b8731a3ecc5f8d9b40", "score": "0.6072147", "text": "func setUp() error {\n\ttmpDir, err := ioutil.TempDir(os.TempDir(), \"server_test\")\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to create temp dir: %v\", err)\n\t}\n\tlog.Printf(\"Created temp dir: %s\", tmpDir)\n\tpath, err := buildSampleEmulator(tmpDir)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to build sample emulator: %v\", err)\n\t}\n\tlog.Printf(\"Successfully built Sample emulator: %s\", path)\n\temulatorPath = path\n\n\tportPicker := &broker.FreePortPicker{}\n\tbrokerPort, err = portPicker.Next()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to pick a free port: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2157a10cdbf3db26f19c4097a74ce634", "score": "0.60687715", "text": "func (s *TestSuite) SetUpSuite(c *C) {\n\n\t// initialize the bootstrap configuration \n\t//bootstrap.Bootstrap()\t\t\n\tBootstrap()\n}", "title": "" }, { "docid": "53c574113ecc4d0d913fb6316ccde4f8", "score": "0.6068721", "text": "func setup() {\n\t// test server\n\ttestMux = http.NewServeMux()\n\ttestServer = httptest.NewServer(testMux)\n\ttestClient, _ = jiralib.NewJiraClient(testServer.URL, \"\", \"\")\n}", "title": "" }, { "docid": "ce91e4c41753ef052125f1847bebb75b", "score": "0.604946", "text": "func (node *BaseNode) Setup() error {\n\treturn nil\n}", "title": "" }, { "docid": "2791062994fa92ae3dc267b5eaa8ea7e", "score": "0.60378414", "text": "func (s *VanillaSimulation) Setup(dir string, hosts []string) (\n\t*onet.SimulationConfig, error) {\n\tsc := &onet.SimulationConfig{}\n\ts.CreateRoster(sc, hosts, 2005)\n\terr := s.CreateTree(sc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn sc, nil\n}", "title": "" }, { "docid": "f3105b2da6258b85519d7b763868c562", "score": "0.60375124", "text": "func setup() (string, error) {\n\tfmt.Println(\":: Creating simulating data...\")\n\td, err := ioutil.TempDir(os.TempDir(), \"hi.dir\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\ttmpdir := filepath.Join(d, \"hi.sub.dir\")\n\tif err := os.Mkdir(tmpdir, 0777); err != nil {\n\t\treturn \"\", err\n\t}\n\n\tfor _, t := range tests {\n\t\tif err := ioutil.WriteFile(filepath.Join(d, t.n), []byte(\"Go is cool!\"), t.m); err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t}\n\n\treturn d, nil\n}", "title": "" }, { "docid": "ad956f6050822712b125b5c85820b85b", "score": "0.6022062", "text": "func (r *RequestTest) Setup() {\n\tos.Setenv(\"API_AUTH\", r.AuthValue)\n\n\tbytes, err := json.Marshal(r.BodyMap)\n\tif err != nil {\n\t\tlog.Print(\"[!] failed setting up for test - \" + r.Description)\n\t\tos.Exit(3)\n\t}\n\tr.Request.Body = string(bytes)\n\n\tlog.Print(r.Description)\n}", "title": "" }, { "docid": "a1cfa3f5463ad7d3b97797938645b99e", "score": "0.60157645", "text": "func (s *OshinkoUnitTestSuite) SetUpTest(c *check.C) {}", "title": "" }, { "docid": "5e6e7b3df9e5044528d95b919e5fc83b", "score": "0.60126466", "text": "func Setup(e *echo.Echo, h Handler) {\n\tapi := e.Group(\"/api\")\n\n\tapi.GET(\"/users\", h.ListUsers)\n\tapi.GET(\"/user/:id\", h.GetUser)\n}", "title": "" }, { "docid": "0f773a7a321ad414bfde8ce114c691ef", "score": "0.60118484", "text": "func (s *Suite) Setup(fn resource.SetupFn) *Suite {\n\ts.setupFns = append(s.setupFns, fn)\n\treturn s\n}", "title": "" }, { "docid": "04034861f74dee45dcfbc090e72a1e05", "score": "0.60111475", "text": "func (s *elasticsearchIntegrationSuite) SetupSuite() {\n\ts.setupSuite(\"testdata/integration_elasticsearch_cluster.yaml\")\n\ts.esClient = CreateESClient(&s.Suite, s.testClusterConfig.ESConfig, s.Logger)\n\tPutIndexTemplate(&s.Suite, s.esClient, fmt.Sprintf(\"testdata/es_%s_index_template.json\", s.testClusterConfig.ESConfig.Version), \"test-visibility-template\")\n\tindexName := s.testClusterConfig.ESConfig.GetVisibilityIndex()\n\tCreateIndex(&s.Suite, s.esClient, indexName)\n\ts.putIndexSettings(indexName, defaultTestValueOfESIndexMaxResultWindow)\n}", "title": "" }, { "docid": "7f473ac817addf68e3765401dcdcbcc7", "score": "0.59997857", "text": "func (p *YandexMetrika) SetUp(settings map[string]string) (map[string]string, error) {\n\terr := validateRequiredFields(settings, []string{\"id\"})\n\tif nil != err {\n\t\treturn nil, err\n\t}\n\n\treturn mergeSettings(settings, p.Defaults()), nil\n}", "title": "" }, { "docid": "29d191864ca0f79a2bd46d94dcffbec2", "score": "0.5994384", "text": "func (lb *Elb) Setup(metadata map[string]string) {\n\tfmt.Printf(\"-> ELB:%s(%s):settingUpElb\\n\", metadata[\"name\"], metadata[\"region\"])\n\tlb.awsClient = elb.New(lb.AwsAuth, aws.Regions[metadata[\"region\"]])\n\tlb.name = metadata[\"name\"]\n\tlb.region = metadata[\"region\"]\n\tlb.class = metadata[\"class\"]\n\tlb.syncCh = make(chan int)\n\tlb.configKey = lb.ConfigPath + \"/elb/\" + lb.region + \"/\" + lb.name + \"/\" + lb.class\n\tgo func() {\n\t\tlb.sync()\n\t}()\n}", "title": "" }, { "docid": "74364d31fbc2cc58e94f2745fd62ffdf", "score": "0.5986662", "text": "func Setup(t *testing.T, logf logging.FormatLogger) (*test.Clients, *test.Cleaner) {\n\tif pkgTest.Flags.Namespace == \"\" {\n\t\tpkgTest.Flags.Namespace = DefaultTestNamespace\n\t}\n\n\tclients, err := test.NewClients(\n\t\tpkgTest.Flags.Kubeconfig,\n\t\tpkgTest.Flags.Cluster,\n\t\tpkgTest.Flags.Namespace)\n\tif err != nil {\n\t\tt.Fatalf(\"Couldn't initialize clients: %v\", err)\n\t}\n\tcleaner := test.NewCleaner(logf, clients.Dynamic)\n\n\treturn clients, cleaner\n}", "title": "" }, { "docid": "3c3da6b72872db0218290e5b67bdf1b7", "score": "0.59838337", "text": "func (suite *KeeperTestSuite) SetupTest() {\n\tconfig := sdk.GetConfig()\n\tapp.SetBech32AddressPrefixes(config)\n\n\ttApp := app.NewTestApp()\n\tctx := tApp.NewContext(true, tmproto.Header{Height: 1, Time: tmtime.Now()})\n\ttApp.InitializeFromGenesisStates()\n\t_, addrs := app.GeneratePrivKeyAddressPairs(1)\n\tkeeper := tApp.GetHardKeeper()\n\tsuite.app = tApp\n\tsuite.ctx = ctx\n\tsuite.keeper = keeper\n\tsuite.addrs = addrs\n}", "title": "" }, { "docid": "f6614b261a840c5950bafb992a91f6b6", "score": "0.597494", "text": "func setup(testDir string) error {\n\tif err := os.RemoveAll(testDir); err != nil {\n\t\treturn err\n\t}\n\tif err := os.MkdirAll(testDir, 0750); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "378333bd418c121d98843c36ee6492ac", "score": "0.59739196", "text": "func SetupGlobals() {\n\n\tLoadConfig()\n\tLoadBangs()\n\tLoadTemplates()\n\n\tElasticsearchConnect()\n\n}", "title": "" }, { "docid": "38b61d2a809c6e00d0fdec3c6752a896", "score": "0.5971801", "text": "func (s *PersistenceCacheTestSuite) SetupTest() {\n\tvalues := make(map[string][]byte)\n\ts.cache = &Cache{values}\n}", "title": "" }, { "docid": "2fb9de583f148c484e2871ce06658a95", "score": "0.5969571", "text": "func (s *ONOSTopoSuite) SetupTestSuite(c *input.Context) error {\n\ts.c = c\n\treturn nil\n}", "title": "" }, { "docid": "6e83aaba06d587d92160226b05f1d091", "score": "0.59667987", "text": "func (MockNexmo) Setup(config nexmo.Auth) error { return nil }", "title": "" }, { "docid": "b60f84ddcd90a0b715533b229462e5b9", "score": "0.59633636", "text": "func (s *GeoIPTestSuite) SetupSuite() {\n\tlogger.Init()\n\tconfig.Init(\"../config/\")\n\ts.geoIPPath = \"../\" + config.GetConfig().GetString(\"geoip.filepath\")\n\t_ = InitGeoIPReader(s.geoIPPath)\n}", "title": "" }, { "docid": "506e49e4a18d3358164c49ba74d5071a", "score": "0.5954464", "text": "func (*screenParser) Setup() error {\n\treturn nil\n}", "title": "" }, { "docid": "cd8a96e05e01b49ac8a03ffcb0eadc95", "score": "0.59489846", "text": "func (c *TestConsumer) Setup(sess sarama.ConsumerGroupSession) error {\n\tprintln(\"Setup is called:\", sess.MemberID())\n\treturn nil\n}", "title": "" }, { "docid": "49d0d91d7893a3dede526ffcc7df7c65", "score": "0.59488326", "text": "func init() {\n\n\tSetup();\n}", "title": "" }, { "docid": "962b4882fabb0fa5a3bdb7289b24a447", "score": "0.5940167", "text": "func (f *FluxTest) Setup() error {\n\tchainlinkClients, err := environment.GetChainlinkClients(f.Environment)\n\tif err != nil {\n\t\treturn err\n\t}\n\tnodeAddresses, err := actions.ChainlinkNodeAddresses(chainlinkClients)\n\tif err != nil {\n\t\treturn err\n\t}\n\tadapter, err := environment.GetExternalAdapter(f.Environment)\n\tif err != nil {\n\t\treturn err\n\t}\n\tf.chainlinkClients = chainlinkClients\n\tf.nodeAddresses = nodeAddresses\n\tf.adapter = adapter\n\n\treturn f.deployContracts()\n}", "title": "" }, { "docid": "58d3122ab4b58e7b19c98ec72049c7d0", "score": "0.5925978", "text": "func (s *TodoTestSuite) SetupTest() {\n\t// Setup Mocks\n\tpersitenceCtrl := gomock.NewController(s.T())\n\ts.mockPersistence = mock_models.NewMockPersistence(persitenceCtrl)\n\tcacheCtrl := gomock.NewController(s.T())\n\ts.mockCache = mock_models.NewMockCacheInterface(cacheCtrl)\n\n\t// Setting CacheActive based on ENV variable.\n\tos.Setenv(\"CACHE_ACTIVE\", \"false\")\n\tcacheActive, err := strconv.ParseBool(os.Getenv(\"CACHE_ACTIVE\"))\n\ts.NoError(err)\n\n\ts.todoDAO = TodoDAOPersister{\n\t\tDataStore: s.mockPersistence,\n\t\tCache: s.mockCache,\n\t\tCacheActive: cacheActive,\n\t}\n}", "title": "" }, { "docid": "f2afe6b94580994465a777206f652f29", "score": "0.5925417", "text": "func (o *options) Setup() {\n\to.ExportFilePath = os.Getenv(container.ExportsPathName)\n\to.StatePath = os.Getenv(container.StatePathName)\n\n\to.podName = os.Getenv(container.PodName)\n\to.podNamespace = os.Getenv(container.PodNamespaceName)\n\to.PodKey = lsv1alpha1.ObjectReference{Name: o.podName, Namespace: o.podNamespace}\n\n\to.deployItemName = os.Getenv(container.DeployItemName)\n\to.deployItemNamespace = os.Getenv(container.DeployItemNamespaceName)\n\to.DeployItemKey = lsv1alpha1.ObjectReference{Name: o.deployItemName, Namespace: o.deployItemNamespace}\n\n\t// todo: create own backoff method with timeout to gracefully handle timeouts\n\to.DefaultBackoff = wait.Backoff{\n\t\tDuration: 10 * time.Second,\n\t\tFactor: 1.25,\n\t\tSteps: math.MaxInt32, // retry until we are stopped by some timeout\n\t\tCap: 5 * time.Minute,\n\t}\n}", "title": "" }, { "docid": "25c30d58c7adbf3ddfbc3844e59ad638", "score": "0.5923225", "text": "func (p *publisher) SetUp() {}", "title": "" }, { "docid": "8ffa2ddcd0a37a1a68ef9a698c22c752", "score": "0.591829", "text": "func webServerTestSetup(t *testing.T) (*test.Context, *test.Framework) {\n\ttestContext := test.NewContext(t)\n\terr := testContext.InitializeClusterResources(&test.CleanupOptions{TestContext: testContext, Timeout: cleanupTimeout, RetryInterval: cleanupRetryInterval})\n\tif err != nil {\n\t\tdefer testContext.Cleanup()\n\t\tt.Fatalf(\"Failed to initialize cluster resources: %v\", err)\n\t}\n\tt.Log(\"Initialized cluster resources\")\n\tnamespace, err = testContext.GetOperatorNamespace()\n\tname = strings.ToLower(strings.Split(t.Name(), \"/\")[1])\n\tif err != nil {\n\t\tdefer testContext.Cleanup()\n\t\tt.Fatalf(\"Failed to get namespace for testing context '%v': %v\", testContext, err)\n\t}\n\tt.Logf(\"Testing in namespace %s\", namespace)\n\t// get global test variables\n\tframework := test.Global\n\treturn testContext, framework\n}", "title": "" } ]
8608834589015829a728d73c3bf3df05
Int32Value is to convert int32 pointer into int32
[ { "docid": "3d4a57e9ad885601513bd958b1c3c0a5", "score": "0.7807166", "text": "func Int32Value(v *int32) int32 {\n\tif v == nil {\n\t\treturn 0\n\t}\n\n\treturn *v\n}", "title": "" } ]
[ { "docid": "c38bd7ae8fbc164cc801f8aab0bcd093", "score": "0.8283231", "text": "func Int32(v int32) *int32 { return &v }", "title": "" }, { "docid": "53c2505b5a30ad53997d1715693562d1", "score": "0.8051837", "text": "func PtrInt32(v int32) *int32 { return &v }", "title": "" }, { "docid": "53c2505b5a30ad53997d1715693562d1", "score": "0.8051837", "text": "func PtrInt32(v int32) *int32 { return &v }", "title": "" }, { "docid": "53c2505b5a30ad53997d1715693562d1", "score": "0.8051837", "text": "func PtrInt32(v int32) *int32 { return &v }", "title": "" }, { "docid": "2e0f79a8e953e00d4d6ab06c2abbf2e8", "score": "0.79101896", "text": "func Int32(v int32) *int32 {\n\treturn ptr.Int32(v)\n}", "title": "" }, { "docid": "1516406596809ed18b2295ec4d4356ed", "score": "0.78753203", "text": "func int32Ptr(i int32) *int32 { return &i }", "title": "" }, { "docid": "97db768a21dfebe42e2079cf4661c91d", "score": "0.7860733", "text": "func Int32(v int32) *int32 {\n\treturn &v\n}", "title": "" }, { "docid": "97db768a21dfebe42e2079cf4661c91d", "score": "0.7860733", "text": "func Int32(v int32) *int32 {\n\treturn &v\n}", "title": "" }, { "docid": "97db768a21dfebe42e2079cf4661c91d", "score": "0.7860733", "text": "func Int32(v int32) *int32 {\n\treturn &v\n}", "title": "" }, { "docid": "97db768a21dfebe42e2079cf4661c91d", "score": "0.7860733", "text": "func Int32(v int32) *int32 {\n\treturn &v\n}", "title": "" }, { "docid": "9fe3e7ba9eef9b4b93ac32255f8def58", "score": "0.7839473", "text": "func Int32Ptr(i int32) *int32 { return &i }", "title": "" }, { "docid": "517845a13032be13a7ec84b4cb00b498", "score": "0.77928346", "text": "func Int32Val(p *int32, o int32) int32 {\n\tif p == nil {\n\t\treturn o\n\t}\n\treturn *p\n}", "title": "" }, { "docid": "527c46a543f650cfee92ac01125d6f07", "score": "0.77913934", "text": "func Int(v int) *int32 { return Int32(int32(v)) }", "title": "" }, { "docid": "42070d3a40bdb130b0873b0ddf4ec430", "score": "0.77641433", "text": "func Int32(s int32) *int32 {\n\treturn &s\n}", "title": "" }, { "docid": "e4da24676ee2598a260bf616b434929f", "score": "0.7679219", "text": "func Int32Pointer(value int32) *int32 {\n\treturn &value\n}", "title": "" }, { "docid": "3dfade708a640f3776e62cec452e82ac", "score": "0.7641584", "text": "func Int32(val interface{}) int32 {\n\treturn int32(Int64(val))\n}", "title": "" }, { "docid": "a306c2c6209189c661cf9fe165c18c91", "score": "0.7576205", "text": "func Int32(v int32) Value {\n\treturn intValue(v)\n}", "title": "" }, { "docid": "a81b2064f02ab82b838ec335172a2fb6", "score": "0.7571457", "text": "func Int32(i int32) *int32 {\n\treturn &i\n}", "title": "" }, { "docid": "a81b2064f02ab82b838ec335172a2fb6", "score": "0.7571457", "text": "func Int32(i int32) *int32 {\n\treturn &i\n}", "title": "" }, { "docid": "bd272c9b5cdd6e3d8589b70d48c20762", "score": "0.75499797", "text": "func Int32ValueToInt(v *int32) *int {\n\tif v == nil {\n\t\treturn nil\n\t}\n\n\tval := int(*v)\n\treturn &val\n}", "title": "" }, { "docid": "6526262160bb9c678c2125804e22e6e0", "score": "0.7529951", "text": "func Int32ToPtrInt(int32_ int32) (ptr_int_ *int) {\n\tptr_int_ = new(int)\n\n\t*ptr_int_ = int(int32_)\n\n\treturn\n}", "title": "" }, { "docid": "4e2e160b886b7c68298f833030ff3f26", "score": "0.7514736", "text": "func ToInt32(ptr *int32) int32 {\n\treturn *ptr\n}", "title": "" }, { "docid": "3722ca6f9fece370da715494dd68b08d", "score": "0.7492445", "text": "func Int32Ptr(v int32) *int32 {\n\treturn &v\n}", "title": "" }, { "docid": "3722ca6f9fece370da715494dd68b08d", "score": "0.7492445", "text": "func Int32Ptr(v int32) *int32 {\n\treturn &v\n}", "title": "" }, { "docid": "9279e2daafdb7ab8a438b136ccbc49d9", "score": "0.74831456", "text": "func Int32ToPtrInt32(int32_ int32) (ptr_int32_ *int32) {\n\tptr_int32_ = new(int32)\n\n\t*ptr_int32_ = int32(int32_)\n\n\treturn\n}", "title": "" }, { "docid": "cf42c4973d9e1a1c2fd4613a5ab96df0", "score": "0.7468879", "text": "func toInt32(val *int) *int32 {\n\tif val == nil {\n\t\treturn nil\n\t}\n\n\tv := int32(*val)\n\treturn &v\n}", "title": "" }, { "docid": "e88c5f1143bf56fd1d01dc702080d35b", "score": "0.7465328", "text": "func LoadInt32(addr *int32) (val int32)", "title": "" }, { "docid": "bcbe8dfd98e4e8c50bbcd53302292553", "score": "0.74584216", "text": "func Int32(v interface{}) int32 {\n\treturn int32(Int(v))\n}", "title": "" }, { "docid": "d76fe531e6c069310a1c9f0d4cd08a1d", "score": "0.744943", "text": "func (v *Value) Int32() (int32, error) {\n\tswitch v.getrv().Kind() {\n\tcase reflect.Int8, reflect.Int16, reflect.Int32:\n\t\treturn int32(v.int()), nil\n\tcase reflect.Int:\n\t\tif bits.UintSize == 32 { // 32\n\t\t\treturn int32(v.int()), nil\n\t\t}\n\t\treturn 0, &ErrUnsupportedKind{\"Value.Int32\", v.getrv().Kind()}\n\n\tcase reflect.Uint8, reflect.Uint16:\n\t\treturn int32(v.uint()), nil\n\n\tcase reflect.Interface, reflect.Ptr:\n\t\treturn (&Value{rv: indirect(v.getrv())}).Int32()\n\n\tdefault:\n\t\treturn 0, &ErrUnsupportedKind{\"Value.Int32\", v.getrv().Kind()}\n\t}\n}", "title": "" }, { "docid": "14521236ea266e58fc1b660f2ad2d1ea", "score": "0.74261767", "text": "func (v Value) Int32() int32 {\n\tvar i int32\n\tt := reflect.TypeOf(i)\n\tif uint64(t.Size()) != uint64(len(v)) {\n\t\tpanic(\"value cannot be converted to Int32, size mismatch\")\n\t}\n\tfor n := 0; n < int(t.Size()); n++ {\n\t\ti |= int32(v[n]) << uint(n*8)\n\t}\n\treturn i\n}", "title": "" }, { "docid": "da559a56241df0c08eca1114175ae5be", "score": "0.741714", "text": "func Int32Ptr(i int32) *int32 {\n\tp := int32(i)\n\treturn &p\n}", "title": "" }, { "docid": "cb9fd55e23caa815b3e53f8a2558cc5e", "score": "0.74169534", "text": "func Int32(value reflect.Value) int32 {\n\treturn value.Interface().(int32)\n}", "title": "" }, { "docid": "a8e63fe889b740dd318a22bb895dec7f", "score": "0.741319", "text": "func Int32Ptr(i int32) *int32 {\n\treturn &i\n}", "title": "" }, { "docid": "93bf58308eac7e0ceacb02573b235302", "score": "0.7375893", "text": "func Int32ToPtr(int32_ int32) (ptr_int32_ *int32) {\n\tptr_int32_ = Int32ToPtrInt32(int32_)\n\n\treturn\n}", "title": "" }, { "docid": "140aac7fb09e6f7b3d76bc622bb5b26e", "score": "0.7369894", "text": "func (a *Arg) AsInt32Ptr() *int32 {\n\tif a.value != nil {\n\t\treturn a.value.(*int32)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5e3279028f841d5fe1e731db808380dc", "score": "0.7367144", "text": "func StoreInt32(addr *int32, val int32)", "title": "" }, { "docid": "df49d6ec5fe09066ccdbbe1a145f738d", "score": "0.7364218", "text": "func int32Ptr(i int32) *int32 {\n\treturn &i\n}", "title": "" }, { "docid": "9b03e516e75ba54879a74eb3295e1a49", "score": "0.73625696", "text": "func IntValueToInt32(v *int) *int32 {\n\tif v == nil {\n\t\treturn nil\n\t}\n\n\tval := int32(*v)\n\treturn &val\n}", "title": "" }, { "docid": "b5d665c48ed3bc23ad5b5317d56a7d17", "score": "0.7351927", "text": "func ValueOfInt32(i *int32) int32 {\n\tif i == nil {\n\t\treturn 0\n\t}\n\treturn *i\n}", "title": "" }, { "docid": "9238047889b84af82066b4167b9a7c5a", "score": "0.7347423", "text": "func intPtr(val int32) *int32 {\n\treturn &val\n}", "title": "" }, { "docid": "aa69646bf6aabca6701de2eea0f6f6a0", "score": "0.7346931", "text": "func ValueInt32(value Value) (int32, error) {\n\tswitch v := value.(type) {\n\tcase BoolValue:\n\t\tif v {\n\t\t\treturn int32(1), nil\n\t\t}\n\t\treturn int32(0), nil\n\tcase Int8Value:\n\t\treturn int32(v), nil\n\tcase Int16Value:\n\t\treturn int32(v), nil\n\tcase Int32Value:\n\t\treturn int32(v), nil\n\tcase Int64Value:\n\t\treturn int32(v), nil\n\t}\n\treturn 0, fmt.Errorf(\"type conversion from %T to int32 failed\", value)\n}", "title": "" }, { "docid": "4cf1ec92274c6751f155b80923c03c2d", "score": "0.7252109", "text": "func Int32P(i int32) *int32 {\n\treturn &i\n}", "title": "" }, { "docid": "e0ab8b64574341147f214f97f5e5db29", "score": "0.72291565", "text": "func (p *PoolAllocator) Int32(bd BitDepth) Signed {\n\ts := p.i32.Get().(*i32)\n\ts.channels = channels(p.Channels)\n\ts.buffer = s.buffer[:p.Length*p.Channels]\n\ts.bitDepth = limitBitDepth(bd, BitDepth32)\n\treturn s\n}", "title": "" }, { "docid": "9b4d2bd9a1850207b71641967cd2fb4e", "score": "0.7215405", "text": "func (t ThousandthInches) Int32Ptr() *int32 {\n\tval := int32(t)\n\treturn &val\n}", "title": "" }, { "docid": "8f70f4f93c9171367a347e919a3223e1", "score": "0.7192327", "text": "func Int32() *int32 {\n\treturn (*int32)(malign(unsafe.Sizeof(int32(0))))\n}", "title": "" }, { "docid": "84431d165555f28e229f2d54281a95b1", "score": "0.718288", "text": "func (v Val) Int32() int32 {\n\tif v.t != bsontype.Int32 {\n\t\tpanic(ElementTypeError{\"bson.Value.Int32\", v.t})\n\t}\n\treturn int32(v.bootstrap[0]) | int32(v.bootstrap[1])<<8 |\n\t\tint32(v.bootstrap[2])<<16 | int32(v.bootstrap[3])<<24\n}", "title": "" }, { "docid": "e8e2e818a5c5fe0d786db869f9336266", "score": "0.7131691", "text": "func Int(v int) *int32 {\n\tp := new(int32)\n\t*p = int32(v)\n\treturn p\n}", "title": "" }, { "docid": "5717fce9015da1d4f26df4cf40d9fbc7", "score": "0.7061108", "text": "func Int32Pointer(i int32) *int32 {\n\treturn &i\n}", "title": "" }, { "docid": "4e2addb3f157b040cae72ee7bc08dcbf", "score": "0.70587766", "text": "func (self *Value) I32() int32 {\n\tpointer := self.inner()\n\n\tif ValueKind(pointer.kind) != I32 {\n\t\tpanic(\"Cannot convert value to `int32`\")\n\t}\n\n\treturn int32(C.to_int32(pointer))\n}", "title": "" }, { "docid": "efe033a0e805fa002c77cb3f7c8d4b52", "score": "0.7055242", "text": "func Int32ToInt32(int32_ int32) int32 {\n\treturn int32_\n}", "title": "" }, { "docid": "df62475facdfef22bb4eafe6798f16c1", "score": "0.7034087", "text": "func (t *LongArray) ToInt32() (int32, error) {\n\treturn 0, errors.New(\"couldn't cast to int32\")\n}", "title": "" }, { "docid": "eef464ff0705a1fcb5de10d33635352d", "score": "0.7020218", "text": "func ToInt32(i interface{}) int32 {\n\treturn int32(ToFloat64(i))\n}", "title": "" }, { "docid": "30891d83bcc817707eade43d654c9b71", "score": "0.7015042", "text": "func toInt32(i interface{}) int32 {\n\tv, err := toInt32E(i)\n\tif err != nil {\n\t\t_, fn, line, _ := runtime.Caller(0)\n\t\tpanic(filepath.Base(fn) + \":\" + strconv.Itoa(line-2) + \" >> \" + err.Error() + \" >> \" + fmtDebugStack(string(debug.Stack())))\n\t}\n\treturn v\n}", "title": "" }, { "docid": "ff2c744c21489b3f73a0816ea47e96fa", "score": "0.69626945", "text": "func Int32ToInt(int32_ int32) (int_ int) {\n\tint_ = int(int32_)\n\n\treturn\n}", "title": "" }, { "docid": "4cc27dfd51f7a9ea050aef32bf097cd9", "score": "0.6958406", "text": "func (a Allocator) Int32(bd BitDepth) Signed {\n\treturn &i32{\n\t\tbuffer: make([]int32, a.Channels*a.Length, a.Channels*a.Capacity),\n\t\tchannels: channels(a.Channels),\n\t\tbitDepth: limitBitDepth(bd, BitDepth32),\n\t}\n}", "title": "" }, { "docid": "7e806e8879de7c88bc951427d2aae2a4", "score": "0.69362724", "text": "func IntToInt32(v int) int32 {\n\treturn int32(v)\n}", "title": "" }, { "docid": "a477dcdb24ba340c60c01f0445ada459", "score": "0.6934669", "text": "func toInt32E(i interface{}) (int32, error) {\n\ti = indirect(i)\n\n\tswitch s := i.(type) {\n\tcase int:\n\t\treturn int32(s), nil\n\tcase int64:\n\t\treturn int32(s), nil\n\tcase int32:\n\t\treturn s, nil\n\tcase int16:\n\t\treturn int32(s), nil\n\tcase int8:\n\t\treturn int32(s), nil\n\tcase uint:\n\t\treturn int32(s), nil\n\tcase uint64:\n\t\treturn int32(s), nil\n\tcase uint32:\n\t\treturn int32(s), nil\n\tcase uint16:\n\t\treturn int32(s), nil\n\tcase uint8:\n\t\treturn int32(s), nil\n\tcase float64:\n\t\treturn int32(s), nil\n\tcase float32:\n\t\treturn int32(s), nil\n\tcase string:\n\t\tv, err := strconv.ParseInt(s, 0, 0)\n\t\tif err == nil {\n\t\t\treturn int32(v), nil\n\t\t}\n\t\treturn 0, fmt.Errorf(\"unable to cast %#v of type %T to int32\", i, i)\n\tcase bool:\n\t\tif s {\n\t\t\treturn 1, nil\n\t\t}\n\t\treturn 0, nil\n\tcase nil:\n\t\treturn 0, nil\n\tdefault:\n\t\treturn 0, fmt.Errorf(\"unable to cast %#v of type %T to int32\", i, i)\n\t}\n}", "title": "" }, { "docid": "570bbd1eb803427ce19a2adeaf7d6142", "score": "0.6929552", "text": "func SetValueInt32(homeID uint32, valueID uint64, value int32) error {\n\tcvalueid := C.valueid_create(C.uint32_t(homeID), C.uint64_t(valueID))\n\tdefer C.valueid_free(cvalueid)\n\tok := bool(C.manager_setValueInt32(cmanager, cvalueid, C.int32_t(value)))\n\tif ok == false {\n\t\treturn fmt.Errorf(\"value is not of 32-bit signed integer type\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6542f8aacd4b83d626945f1db934fb32", "score": "0.6928864", "text": "func (recv *Value) ToInt32() int32 {\n\tretC := C.jsc_value_to_int32((*C.JSCValue)(recv.native))\n\tretGo := (int32)(retC)\n\n\treturn retGo\n}", "title": "" }, { "docid": "edce30f97a5425bdc5695def7ea44320", "score": "0.6902351", "text": "func (t *IntArray) ToInt32() (int32, error) {\n\treturn 0, errors.New(\"couldn't cast to int32\")\n}", "title": "" }, { "docid": "1d020f6a14a07073186b87b2fbfd1bd8", "score": "0.6900039", "text": "func IntOfUint32(i uint32) Int {\n return IntOfUint64(uint64(i))\n}", "title": "" }, { "docid": "4a36ca83ecfbddf83e8ff8fcc45185cc", "score": "0.6899079", "text": "func (i Int) Int32() int32 {\n return int32(i.impl.Int64())\n}", "title": "" }, { "docid": "7f4bccfaa0144c790741375222e80c5c", "score": "0.687571", "text": "func Int16ToPtrInt32(int16_ int16) (ptr_int32_ *int32) {\n\tptr_int32_ = new(int32)\n\n\t*ptr_int32_ = int32(int16_)\n\n\treturn\n}", "title": "" }, { "docid": "97a791b603e7c2e8ef88cf2943b2a2ff", "score": "0.68722636", "text": "func IntOfInt32(i int32) Int {\n return IntOfInt64(int64(i))\n}", "title": "" }, { "docid": "05821bd9f2f5997a35a65e48ee5fea84", "score": "0.6865713", "text": "func (v Value) Uint32() uint32 {\n\tvar i uint32\n\tt := reflect.TypeOf(i)\n\tif uint64(t.Size()) != uint64(len(v)) {\n\t\tpanic(\"value cannot be converted to Uint32, size mismatch\")\n\t}\n\tfor n := 0; n < int(t.Size()); n++ {\n\t\ti |= uint32(v[n]) << uint(n*8)\n\t}\n\treturn i\n}", "title": "" }, { "docid": "836d7892138b1b6a150e9596546277f5", "score": "0.68532145", "text": "func (t *Short) ToInt32() (int32, error) {\n\treturn int32(t.Value), nil\n}", "title": "" }, { "docid": "0e0bf18ca5c7d54b1ee216a4135e00b9", "score": "0.6847163", "text": "func (d *decodeState) int32(v reflect.Value) {\n\td.off += 1 // type\n\n\tklen := int(Int8(d.data[d.off:]))\n\td.off += 1 // name length\n\n\tif klen > 0 {\n\t\tkey := d.data[d.off : d.off+klen-1]\n\t\td.off += klen\n\t\tv = fieldByTag(v, key)\n\t\tu, pv := d.indirect(v, false)\n\t\tif u != nil {\n\t\t\td.off -= 1 + 1 + klen\n\t\t\tif err := u.UnmarshalMCPACK(d.next()); err != nil {\n\t\t\t\td.error(err)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tv = pv\n\t}\n\n\tval := Int32(d.data[d.off:])\n\td.off += 4 // value\n\n\tif !v.IsValid() {\n\t\treturn\n\t}\n\tv.SetInt(int64(val))\n}", "title": "" }, { "docid": "2189c108fa28d9f427c02f2c7177deab", "score": "0.6843843", "text": "func (i ID) Int32() int32 {\n\treturn i.Value.(int32)\n}", "title": "" }, { "docid": "87591692bce041a80bd69be93bc9bff9", "score": "0.6838285", "text": "func ToInt32(i interface{}) (result int32, err error) {\n\tswitch s := i.(type) {\n\tcase int:\n\t\tif s > math.MaxInt32 || s < math.MinInt32 {\n\t\t\treturn 0, fmt.Errorf(\"Can't convert to %T. %v overflows %T\", result, s, result)\n\t\t}\n\t\treturn int32(s), nil\n\tcase int64:\n\t\tif s > math.MaxInt32 || s < math.MinInt32 {\n\t\t\treturn 0, fmt.Errorf(\"Can't convert to %T. %v overflows %T\", result, s, result)\n\t\t}\n\t\treturn int32(s), nil\n\tcase int32:\n\t\tif s > math.MaxInt32 || s < math.MinInt32 {\n\t\t\treturn 0, fmt.Errorf(\"Can't convert to %T. %v overflows %T\", result, s, result)\n\t\t}\n\t\treturn s, nil\n\tcase int16:\n\t\treturn int32(s), nil\n\tcase int8:\n\t\treturn int32(s), nil\n\tcase uint:\n\t\treturn int32(s), nil\n\tcase uint64:\n\t\tif s > math.MaxInt32 {\n\t\t\treturn 0, fmt.Errorf(\"Can't convert to %T. %v overflows %T\", result, s, result)\n\t\t}\n\t\treturn int32(s), nil\n\tcase uint32:\n\t\tif s > math.MaxInt32 {\n\t\t\treturn 0, fmt.Errorf(\"Can't convert to %T. %v overflows %T\", result, s, result)\n\t\t}\n\t\treturn int32(s), nil\n\tcase uint16:\n\t\treturn int32(s), nil\n\tcase uint8:\n\t\treturn int32(s), nil\n\tcase float64:\n\t\tif s > math.MaxInt32 || s < math.MinInt32 {\n\t\t\treturn 0, fmt.Errorf(\"Can't convert to %T. %v overflows %T\", result, s, result)\n\t\t}\n\t\treturn int32(s), nil\n\tcase float32:\n\t\tif s > math.MaxInt32 || s < math.MinInt32 {\n\t\t\treturn 0, fmt.Errorf(\"Can't convert to %T. %v overflows %T\", result, s, result)\n\t\t}\n\t\treturn int32(s), nil\n\tcase string:\n\t\tv, err := strconv.ParseInt(s, 0, 0)\n\t\tif err == nil {\n\t\t\treturn int32(v), nil\n\t\t}\n\t\treturn 0, fmt.Errorf(\"unable to cast %#v of type %T to int32\", i, i)\n\tcase bool:\n\t\tif s {\n\t\t\treturn 1, nil\n\t\t}\n\t\treturn 0, nil\n\tcase nil:\n\t\treturn 0, nil\n\tdefault:\n\t\treturn 0, fmt.Errorf(\"unable to cast %#v of type %T to int32\", i, i)\n\t}\n}", "title": "" }, { "docid": "dd0503771a022f5880014e562071dd4a", "score": "0.68012846", "text": "func (b *ValueBinder) Int32(sourceParam string, dest *int32) *ValueBinder {\n\treturn b.intValue(sourceParam, dest, 32, false)\n}", "title": "" }, { "docid": "389d58a2bd1287b6b0f3ec941404c772", "score": "0.6792095", "text": "func (t *ByteArray) ToInt32() (int32, error) {\n\treturn 0, errors.New(\"couldn't cast to int32\")\n}", "title": "" }, { "docid": "74b336b5c7a07d14b564f775f847a9a6", "score": "0.6782313", "text": "func Uint32(v interface{}) uint32 {\n\treturn uint32(Uint(v))\n}", "title": "" }, { "docid": "e101fa5051f20b767d64782e82c3ee75", "score": "0.6769401", "text": "func Uint32(v uint32) *uint32 { return &v }", "title": "" }, { "docid": "2f778ade7f91c56d8d326dacd5849145", "score": "0.67536837", "text": "func (i Int) Uint32() uint32 {\n return uint32(i.impl.Uint64())\n}", "title": "" }, { "docid": "3f904047051182fbe8db4abdf2e01cc4", "score": "0.67493296", "text": "func fromInt32(source int32) int32Valuer {\n\treturn int32Valuer{source: source}\n}", "title": "" }, { "docid": "0c7f6a25a918389fcc68aaeec2c305b2", "score": "0.6747199", "text": "func Uint32Val(p *uint32, o uint32) uint32 {\n\tif p == nil {\n\t\treturn o\n\t}\n\treturn *p\n}", "title": "" }, { "docid": "683b0ef79a3c9354dabd117dd7e13fbf", "score": "0.6745149", "text": "func (t *Long) ToInt32() (int32, error) {\n\treturn int32(t.Value), nil\n}", "title": "" }, { "docid": "51113a3d7e909cb46f0b325cb44c8bc6", "score": "0.6741112", "text": "func (v *RawValue) GetInt32Value() (o int32) {\n\tif v != nil && v.Int32Value != nil {\n\t\treturn *v.Int32Value\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "adcbf6dc24df17f6fff60cb0e622a979", "score": "0.67282176", "text": "func GetInt32(b []byte, pos int) int32 {\n\treturn int32(b[pos]) | int32(b[pos+1])<<8 | int32(b[pos+2])<<16 | int32(b[pos+3])<<24\n}", "title": "" }, { "docid": "cd5b16516d893fea65f3ad87e902e8b4", "score": "0.6718371", "text": "func (v Int32Value) Get() interface{} {\n\treturn int32(v)\n}", "title": "" }, { "docid": "ee2c63f8a74016a554934980fd559514", "score": "0.67009634", "text": "func bytesToInt32(buf []byte) int32 {\n\treturn *(*int32)(unsafe.Pointer(&buf[0]))\n}", "title": "" }, { "docid": "d1bf2bd242551a5845d73c165c44daad", "score": "0.66939753", "text": "func (o *Buffer) enc_ref_int32(p *Properties, base structPointer) error {\n\tv := structPointer_Word32Val(base, p.field)\n\tx := int32(word32Val_Get(v))\n\to.buf = append(o.buf, p.tagcode...)\n\tp.valEnc(o, uint64(x))\n\treturn nil\n}", "title": "" }, { "docid": "5937ea6c78cbca7ae3000f57010a7fcf", "score": "0.6693791", "text": "func (t *Byte) ToInt32() (int32, error) {\n\treturn int32(t.Value), nil\n}", "title": "" }, { "docid": "cd396de2a9ea5caa8f96c820f7eef3a5", "score": "0.6692747", "text": "func Int32() int32 {\n\treturn int32(intRange(math.MinInt32, math.MaxInt32))\n}", "title": "" }, { "docid": "bb9ef7465874b4d0feb5b56054e65b76", "score": "0.6691246", "text": "func zeroIntToIntPtr(zeroInt zero.Int) *int {\n\tif zeroInt.Ptr() == nil {\n\t\treturn nil\n\t}\n\n\tvalue64 := zeroInt.Int64\n\tvalue32 := int(value64)\n\treturn &value32\n}", "title": "" }, { "docid": "e472a14d983fb9584d4b17569c27c4ef", "score": "0.667462", "text": "func ParseInt32(v interface{}) int32 {\n\treturn int32(ParseInt(v))\n}", "title": "" }, { "docid": "99ec8e6c66e750f28b45457964e01f0f", "score": "0.6667649", "text": "func Int32ToPtrInt64(int32_ int32) (ptr_int64_ *int64) {\n\tptr_int64_ = new(int64)\n\n\t*ptr_int64_ = int64(int32_)\n\n\treturn\n}", "title": "" }, { "docid": "71891f1ac3c4f7817373f5d9d2d1f159", "score": "0.6654712", "text": "func Uint32(v uint32) Value {\n\treturn intValue(v)\n}", "title": "" }, { "docid": "923cb1534de35b44f4aa86af164ba92d", "score": "0.6644369", "text": "func (t *List) ToInt32() (int32, error) {\n\treturn 0, errors.New(\"couldn't cast to int32\")\n}", "title": "" }, { "docid": "052f326f4e05889e290d6bb17407575b", "score": "0.66438305", "text": "func (v *Value) Uint32() (uint32, error) {\n\tswitch v.getrv().Kind() {\n\tcase reflect.Uint8, reflect.Uint16, reflect.Uint32:\n\t\treturn uint32(v.uint()), nil\n\n\tcase reflect.Uint:\n\t\tif bits.UintSize == 32 { // 32\n\t\t\treturn uint32(v.uint()), nil\n\t\t}\n\t\treturn 0, &ErrUnsupportedKind{\"Value.Uint32\", v.getrv().Kind()}\n\n\tcase reflect.Interface, reflect.Ptr:\n\t\treturn (&Value{rv: indirect(v.getrv())}).Uint32()\n\n\tdefault:\n\t\treturn 0, &ErrUnsupportedKind{\"Value.Uint32\", v.getrv().Kind()}\n\t}\n}", "title": "" }, { "docid": "aef9c3b3c7abdda89a84ef7a8a7ec1ce", "score": "0.66430783", "text": "func GetValueAsInt(homeID uint32, valueID uint64) (int32, error) {\n\tcvalueid := C.valueid_create(C.uint32_t(homeID), C.uint64_t(valueID))\n\tdefer C.valueid_free(cvalueid)\n\tvar cint C.int32_t\n\tok := bool(C.manager_getValueAsInt(cmanager, cvalueid, &cint))\n\tif ok == false {\n\t\treturn int32(cint), fmt.Errorf(\"value is not of 32-bit signed integer type\")\n\t}\n\treturn int32(cint), nil\n}", "title": "" }, { "docid": "a7dd222d987c7bc1cbbc74924ac30da6", "score": "0.6641212", "text": "func (t *Int) ToInt32() (int32, error) {\n\treturn int32(t.Value), nil\n}", "title": "" }, { "docid": "e11b5ab24e4fb58cbe2a17a5d472c5ae", "score": "0.66224575", "text": "func sizeSint32Value(v protoreflect.Value, tagsize int, opts marshalOptions) int {\n\treturn tagsize + protowire.SizeVarint(protowire.EncodeZigZag(int64(int32(v.Int()))))\n}", "title": "" }, { "docid": "440090de25875c7503d9c5bf9a25a08f", "score": "0.6619899", "text": "func appendSint32Value(b []byte, v protoreflect.Value, wiretag uint64, opts marshalOptions) ([]byte, error) {\n\tb = protowire.AppendVarint(b, wiretag)\n\tb = protowire.AppendVarint(b, protowire.EncodeZigZag(int64(int32(v.Int()))))\n\treturn b, nil\n}", "title": "" }, { "docid": "b26ae27f6ec09f24dd30df1bfd9ed28e", "score": "0.6617829", "text": "func PtrInt(v int) *int { return &v }", "title": "" }, { "docid": "b26ae27f6ec09f24dd30df1bfd9ed28e", "score": "0.6617829", "text": "func PtrInt(v int) *int { return &v }", "title": "" }, { "docid": "b26ae27f6ec09f24dd30df1bfd9ed28e", "score": "0.6617829", "text": "func PtrInt(v int) *int { return &v }", "title": "" }, { "docid": "e6da3a28df80c0a54544cc765669955c", "score": "0.66090804", "text": "func Int32ToPtrInt8(int32_ int32) (ptr_int8_ *int8) {\n\tptr_int8_ = new(int8)\n\n\t*ptr_int8_ = int8(int32_)\n\n\treturn\n}", "title": "" }, { "docid": "d3cf7cb0a27a46131f27328e551b815e", "score": "0.66029894", "text": "func ValueInt(prefix string, v int32) {\n\tprefix = safeString(prefix)\n\tcprefix, _ := unpackPCharString(prefix)\n\tcv, _ := (C.int)(v), cgoAllocsUnknown\n\tC.igValueInt(cprefix, cv)\n\truntime.KeepAlive(prefix)\n}", "title": "" }, { "docid": "0893bb9e2446df257cf26c8f8b8d464c", "score": "0.65857726", "text": "func (vh *ValueHolder) GetInt32() (int32, bool) {\n\ti64, ok := vh.getInt(int32Prefix, 32)\n\treturn int32(i64), ok\n}", "title": "" } ]
87b2b52e98e4ada3ea42209a1d885538
/ source csv id,name,access_group_ids,endpoint,public_key,ip,routes,requires_privileged_access,password_hash target tables sqlite> PRAGMA table_info(gateways); 0|name|TEXT|0||1 1|endpoint|TEXT|1||0 2|public_key|TEXT|1||0 3|ip|TEXT|1||0 4|requires_privileged_access|BOOLEAN|1|0|0 5|password_hash|TEXT|1||0 sqlite> PRAGMA table_info(gateway_routes); 0|gateway_name|TEXT|1||1 1|route|TEXT|1||2 sqlite> PRAGMA table_info(gateway_access_group_ids); 0|gateway_name|TEXT|1||1 1|group_id|TEXT|1||2
[ { "docid": "f2a3d36e5b603809b7d3d5e06d8786c2", "score": "0.56056273", "text": "func convertGateway(gateway map[string]string) {\n\tfmt.Printf(\"INSERT INTO gateways(name, endpoint, public_key, ip, requires_privileged_access, password_hash) VALUES('%s', '%s', '%s', '%s', %s, '%s');\\n\",\n\t\tgateway[\"name\"],\n\t\tgateway[\"endpoint\"],\n\t\tgateway[\"public_key\"],\n\t\tgateway[\"ip\"],\n\t\tconvertBool(gateway[\"requires_privileged_access\"]),\n\t\tgateway[\"password_hash\"],\n\t)\n\n\troutes := make(map[string]bool)\n\tfor _, route := range strings.Split(gateway[\"routes\"], \",\") {\n\t\tif routes[route] {\n\t\t\tcontinue\n\t\t}\n\t\troutes[route] = true\n\t\tfmt.Printf(\"INSERT INTO gateway_routes(gateway_name, route) VALUES('%s', '%s');\\n\",\n\t\t\tgateway[\"name\"],\n\t\t\troute,\n\t\t)\n\t}\n\n\tgroupIDs := make(map[string]bool)\n\tfor _, groupID := range strings.Split(gateway[\"access_group_ids\"], \",\") {\n\t\tif groupIDs[groupID] {\n\t\t\tcontinue\n\t\t}\n\t\tgroupIDs[groupID] = true\n\n\t\tfmt.Printf(\"INSERT INTO gateway_access_group_ids(gateway_name, group_id) VALUES('%s', '%s');\\n\",\n\t\t\tgateway[\"name\"],\n\t\t\tgroupID,\n\t\t)\n\t}\n}", "title": "" } ]
[ { "docid": "cef8d76f28a01b31925c4009163caa29", "score": "0.51272804", "text": "func (uvs *uvstreamer) buildTablePlan() error {\n\tuvs.plans = make(map[string]*tablePlan)\n\ttableLastPKs := make(map[string]*binlogdatapb.TableLastPK)\n\tfor _, tablePK := range uvs.inTablePKs {\n\t\ttableLastPKs[tablePK.TableName] = tablePK\n\t}\n\ttables := uvs.se.GetSchema()\n\tfor range tables {\n\t\tfor _, rule := range uvs.filter.Rules {\n\t\t\tif !strings.HasPrefix(rule.Match, \"/\") {\n\t\t\t\t_, ok := tables[rule.Match]\n\t\t\t\tif !ok {\n\t\t\t\t\treturn fmt.Errorf(\"table %s is not present in the database\", rule.Match)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tfor tableName := range tables {\n\t\trule, err := matchTable(tableName, uvs.filter, tables)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif rule == nil {\n\t\t\tcontinue\n\t\t}\n\t\tplan := &tablePlan{\n\t\t\ttablePK: nil,\n\t\t\trule: &binlogdatapb.Rule{\n\t\t\t\tFilter: rule.Filter,\n\t\t\t\tMatch: rule.Match,\n\t\t\t},\n\t\t}\n\t\ttablePK, ok := tableLastPKs[tableName]\n\t\tif !ok {\n\t\t\ttablePK = &binlogdatapb.TableLastPK{\n\t\t\t\tTableName: tableName,\n\t\t\t\tLastpk: nil,\n\t\t\t}\n\t\t}\n\t\tplan.tablePK = tablePK\n\t\tuvs.plans[tableName] = plan\n\t\tuvs.tablesToCopy = append(uvs.tablesToCopy, tableName)\n\n\t}\n\tsort.Strings(uvs.tablesToCopy)\n\treturn nil\n}", "title": "" }, { "docid": "87ed650c34e0fbb8a51b32fceb866d29", "score": "0.5124557", "text": "func Open(dbpath string) {\n\tmax_ipv6_range.SetString(\"340282366920938463463374607431768211455\", 10)\n\tfrom_6to4.SetString(\"42545680458834377588178886921629466624\", 10)\n\tto_6to4.SetString(\"42550872755692912415807417417958686719\", 10)\n\tfrom_teredo.SetString(\"42540488161975842760550356425300246528\", 10)\n\tto_teredo.SetString(\"42540488241204005274814694018844196863\", 10)\n\t\n\tvar err error\n\tf, err = os.Open(dbpath)\n\tif err != nil {\n\t\treturn\n\t}\n\t\n\tmeta.databasetype = readuint8(1)\n\tmeta.databasecolumn = readuint8(2)\n\tmeta.databaseyear = readuint8(3)\n\tmeta.databasemonth = readuint8(4)\n\tmeta.databaseday = readuint8(5)\n\tmeta.ipv4databasecount = readuint32(6)\n\tmeta.ipv4databaseaddr = readuint32(10)\n\tmeta.ipv6databasecount = readuint32(14)\n\tmeta.ipv6databaseaddr = readuint32(18)\n\tmeta.ipv4indexbaseaddr = readuint32(22)\n\tmeta.ipv6indexbaseaddr = readuint32(26)\n\tmeta.ipv4columnsize = uint32(meta.databasecolumn << 2) // 4 bytes each column\n\tmeta.ipv6columnsize = uint32(16 + ((meta.databasecolumn - 1) << 2)) // 4 bytes each column, except IPFrom column which is 16 bytes\n\t\n\tdbt := meta.databasetype\n\t\n\t// since both IPv4 and IPv6 use 4 bytes for the below columns, can just do it once here\n\tif country_position[dbt] != 0 {\n\t\tcountry_position_offset = uint32(country_position[dbt] - 1) << 2\n\t\tcountry_enabled = true\n\t}\n\tif region_position[dbt] != 0 {\n\t\tregion_position_offset = uint32(region_position[dbt] - 1) << 2\n\t\tregion_enabled = true\n\t}\n\tif city_position[dbt] != 0 {\n\t\tcity_position_offset = uint32(city_position[dbt] - 1) << 2\n\t\tcity_enabled = true\n\t}\n\tif isp_position[dbt] != 0 {\n\t\tisp_position_offset = uint32(isp_position[dbt] - 1) << 2\n\t\tisp_enabled = true\n\t}\n\tif domain_position[dbt] != 0 {\n\t\tdomain_position_offset = uint32(domain_position[dbt] - 1) << 2\n\t\tdomain_enabled = true\n\t}\n\tif zipcode_position[dbt] != 0 {\n\t\tzipcode_position_offset = uint32(zipcode_position[dbt] - 1) << 2\n\t\tzipcode_enabled = true\n\t}\n\tif latitude_position[dbt] != 0 {\n\t\tlatitude_position_offset = uint32(latitude_position[dbt] - 1) << 2\n\t\tlatitude_enabled = true\n\t}\n\tif longitude_position[dbt] != 0 {\n\t\tlongitude_position_offset = uint32(longitude_position[dbt] - 1) << 2\n\t\tlongitude_enabled = true\n\t}\n\tif timezone_position[dbt] != 0 {\n\t\ttimezone_position_offset = uint32(timezone_position[dbt] - 1) << 2\n\t\ttimezone_enabled = true\n\t}\n\tif netspeed_position[dbt] != 0 {\n\t\tnetspeed_position_offset = uint32(netspeed_position[dbt] - 1) << 2\n\t\tnetspeed_enabled = true\n\t}\n\tif iddcode_position[dbt] != 0 {\n\t\tiddcode_position_offset = uint32(iddcode_position[dbt] - 1) << 2\n\t\tiddcode_enabled = true\n\t}\n\tif areacode_position[dbt] != 0 {\n\t\tareacode_position_offset = uint32(areacode_position[dbt] - 1) << 2\n\t\tareacode_enabled = true\n\t}\n\tif weatherstationcode_position[dbt] != 0 {\n\t\tweatherstationcode_position_offset = uint32(weatherstationcode_position[dbt] - 1) << 2\n\t\tweatherstationcode_enabled = true\n\t}\n\tif weatherstationname_position[dbt] != 0 {\n\t\tweatherstationname_position_offset = uint32(weatherstationname_position[dbt] - 1) << 2\n\t\tweatherstationname_enabled = true\n\t}\n\tif mcc_position[dbt] != 0 {\n\t\tmcc_position_offset = uint32(mcc_position[dbt] - 1) << 2\n\t\tmcc_enabled = true\n\t}\n\tif mnc_position[dbt] != 0 {\n\t\tmnc_position_offset = uint32(mnc_position[dbt] - 1) << 2\n\t\tmnc_enabled = true\n\t}\n\tif mobilebrand_position[dbt] != 0 {\n\t\tmobilebrand_position_offset = uint32(mobilebrand_position[dbt] - 1) << 2\n\t\tmobilebrand_enabled = true\n\t}\n\tif elevation_position[dbt] != 0 {\n\t\televation_position_offset = uint32(elevation_position[dbt] - 1) << 2\n\t\televation_enabled = true\n\t}\n\tif usagetype_position[dbt] != 0 {\n\t\tusagetype_position_offset = uint32(usagetype_position[dbt] - 1) << 2\n\t\tusagetype_enabled = true\n\t}\n\t\n\tmetaok = true\n}", "title": "" }, { "docid": "4bdeee9a5df3162265b073c482e5bce0", "score": "0.5071936", "text": "func (s *Syncer) trackTableInfoFromDownstream(tctx *tcontext.Context, sourceTable, targetTable *filter.Table) error {\n\t// TODO: Switch to use the HTTP interface to retrieve the TableInfo directly if HTTP port is available\n\t// use parser for downstream.\n\tparser2, err := utils.GetParserForConn(tctx.Ctx, s.ddlDBConn.BaseConn.DBConn)\n\tif err != nil {\n\t\treturn terror.ErrSchemaTrackerCannotParseDownstreamTable.Delegate(err, targetTable, sourceTable)\n\t}\n\n\trows, err := s.ddlDBConn.QuerySQL(tctx, \"SHOW CREATE TABLE \"+targetTable.String())\n\tif err != nil {\n\t\treturn terror.ErrSchemaTrackerCannotFetchDownstreamTable.Delegate(err, targetTable, sourceTable)\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tvar tableName, createSQL string\n\t\tif err = rows.Scan(&tableName, &createSQL); err != nil {\n\t\t\treturn terror.WithScope(terror.DBErrorAdapt(err, terror.ErrDBDriverError), terror.ScopeDownstream)\n\t\t}\n\n\t\t// rename the table back to original.\n\t\tvar createNode ast.StmtNode\n\t\tcreateNode, err = parser2.ParseOneStmt(createSQL, \"\", \"\")\n\t\tif err != nil {\n\t\t\treturn terror.ErrSchemaTrackerCannotParseDownstreamTable.Delegate(err, targetTable, sourceTable)\n\t\t}\n\t\tcreateStmt := createNode.(*ast.CreateTableStmt)\n\t\tcreateStmt.IfNotExists = true\n\t\tcreateStmt.Table.Schema = model.NewCIStr(sourceTable.Schema)\n\t\tcreateStmt.Table.Name = model.NewCIStr(sourceTable.Name)\n\n\t\t// schema tracker sets non-clustered index, so can't handle auto_random.\n\t\tif v, _ := s.schemaTracker.GetSystemVar(schema.TiDBClusteredIndex); v == \"OFF\" {\n\t\t\tfor _, col := range createStmt.Cols {\n\t\t\t\tfor i, opt := range col.Options {\n\t\t\t\t\tif opt.Tp == ast.ColumnOptionAutoRandom {\n\t\t\t\t\t\t// col.Options is unordered\n\t\t\t\t\t\tcol.Options[i] = col.Options[len(col.Options)-1]\n\t\t\t\t\t\tcol.Options = col.Options[:len(col.Options)-1]\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tvar newCreateSQLBuilder strings.Builder\n\t\trestoreCtx := format.NewRestoreCtx(format.DefaultRestoreFlags, &newCreateSQLBuilder)\n\t\tif err = createStmt.Restore(restoreCtx); err != nil {\n\t\t\treturn terror.ErrSchemaTrackerCannotParseDownstreamTable.Delegate(err, targetTable, sourceTable)\n\t\t}\n\t\tnewCreateSQL := newCreateSQLBuilder.String()\n\t\ttctx.L().Debug(\"reverse-synchronized table schema\",\n\t\t\tzap.Stringer(\"sourceTable\", sourceTable),\n\t\t\tzap.Stringer(\"targetTable\", targetTable),\n\t\t\tzap.String(\"sql\", newCreateSQL),\n\t\t)\n\t\tif err = s.schemaTracker.Exec(tctx.Ctx, sourceTable.Schema, newCreateSQL); err != nil {\n\t\t\treturn terror.ErrSchemaTrackerCannotCreateTable.Delegate(err, sourceTable)\n\t\t}\n\t}\n\n\tif err = rows.Err(); err != nil {\n\t\treturn terror.WithScope(terror.DBErrorAdapt(err, terror.ErrDBDriverError), terror.ScopeDownstream)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a676642672c55f215588f4562350bc97", "score": "0.5021202", "text": "func open() error {\n\tmaxIPv6Range.SetString(\"340282366920938463463374607431768211455\", 10)\n\n\tvar err error\n\tf, err = newFileMock()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmeta.databaseType = readUint8(1)\n\tmeta.databaseColumn = readUint8(2)\n\tmeta.databaseYear = readUint8(3)\n\tmeta.databaseMonth = readUint8(4)\n\tmeta.databaseDay = readUint8(5)\n\tmeta.ipv4databaseCount = readUint32(6)\n\tmeta.ipv4databaseAddr = readUint32(10)\n\tmeta.ipv6databaseCount = readUint32(14)\n\tmeta.ipv6databaseAddr = readUint32(18)\n\tmeta.ipv4indexBaseAddr = readUint32(22)\n\tmeta.ipv6indexBaseAddr = readUint32(26)\n\tmeta.ipv4columnSize = uint32(meta.databaseColumn << 2) // 4 bytes each column\n\tmeta.ipv6columnSize = uint32(16 + ((meta.databaseColumn - 1) << 2)) // 4 bytes each column, except IPFrom column which is 16 bytes\n\n\tdbt := meta.databaseType\n\n\t// since both IPv4 and IPv6 use 4 bytes for the below columns, can just do it once here\n\tinitRegion(dbt)\n\tif netSpeedPosition[dbt] != 0 {\n\t\tnetSpeedPositionOffset = uint32(netSpeedPosition[dbt]-1) << 2\n\t\tnetSpeedEnabled = true\n\t}\n\tif iddCodePosition[dbt] != 0 {\n\t\tiddCodePositionOffset = uint32(iddCodePosition[dbt]-1) << 2\n\t\tiddCodeEnabled = true\n\t}\n\tif areaCodePosition[dbt] != 0 {\n\t\tareaCodePositionOffset = uint32(areaCodePosition[dbt]-1) << 2\n\t\tareaCodeEnabled = true\n\t}\n\tif weatherStationCodePosition[dbt] != 0 {\n\t\tweatherStationCodePositionOffset = uint32(weatherStationCodePosition[dbt]-1) << 2\n\t\tweatherStationCodeEnabled = true\n\t}\n\tif weatherStationNamePosition[dbt] != 0 {\n\t\tweatherStationNamePositionOffset = uint32(weatherStationNamePosition[dbt]-1) << 2\n\t\tweatherStationNameEnabled = true\n\t}\n\tif mccPosition[dbt] != 0 {\n\t\tmccPositionOffset = uint32(mccPosition[dbt]-1) << 2\n\t\tmccEnabled = true\n\t}\n\tif mncPosition[dbt] != 0 {\n\t\tmncPositionOffset = uint32(mncPosition[dbt]-1) << 2\n\t\tmncEnabled = true\n\t}\n\tif mobileBrandPosition[dbt] != 0 {\n\t\tmobileBrandPositionOffset = uint32(mobileBrandPosition[dbt]-1) << 2\n\t\tmobileBrandEnabled = true\n\t}\n\tif elevationPosition[dbt] != 0 {\n\t\televationPositionOffset = uint32(elevationPosition[dbt]-1) << 2\n\t\televationEnabled = true\n\t}\n\tif usageTypePosition[dbt] != 0 {\n\t\tusageTypePositionOffset = uint32(usageTypePosition[dbt]-1) << 2\n\t\tusageTypeEnabled = true\n\t}\n\n\tmetaOK = true\n\treturn nil\n}", "title": "" }, { "docid": "522ab83318bc381e22febd69ecdf5bab", "score": "0.49827716", "text": "func Open(dbpath string) error {\n\tmax_ipv6_range.SetString(\"340282366920938463463374607431768211455\", 10)\n\tfrom_6to4.SetString(\"42545680458834377588178886921629466624\", 10)\n\tto_6to4.SetString(\"42550872755692912415807417417958686719\", 10)\n\tfrom_teredo.SetString(\"42540488161975842760550356425300246528\", 10)\n\tto_teredo.SetString(\"42540488241204005274814694018844196863\", 10)\n\n\tvar err error\n\tf, err = os.Open(dbpath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmeta.databasetype = readuint8(1)\n\tmeta.databasecolumn = readuint8(2)\n\tmeta.databaseyear = readuint8(3)\n\tmeta.databasemonth = readuint8(4)\n\tmeta.databaseday = readuint8(5)\n\tmeta.ipv4databasecount = readuint32(6)\n\tmeta.ipv4databaseaddr = readuint32(10)\n\tmeta.ipv6databasecount = readuint32(14)\n\tmeta.ipv6databaseaddr = readuint32(18)\n\tmeta.ipv4indexbaseaddr = readuint32(22)\n\tmeta.ipv6indexbaseaddr = readuint32(26)\n\tmeta.ipv4columnsize = uint32(meta.databasecolumn << 2) // 4 bytes each column\n\tmeta.ipv6columnsize = uint32(16 + ((meta.databasecolumn - 1) << 2)) // 4 bytes each column, except IPFrom column which is 16 bytes\n\n\tdbt := meta.databasetype\n\n\t// since both IPv4 and IPv6 use 4 bytes for the below columns, can just do it once here\n\tif country_position[dbt] != 0 {\n\t\tcountry_position_offset = uint32(country_position[dbt]-1) << 2\n\t\tcountry_enabled = true\n\t}\n\tif region_position[dbt] != 0 {\n\t\tregion_position_offset = uint32(region_position[dbt]-1) << 2\n\t\tregion_enabled = true\n\t}\n\tif city_position[dbt] != 0 {\n\t\tcity_position_offset = uint32(city_position[dbt]-1) << 2\n\t\tcity_enabled = true\n\t}\n\tif isp_position[dbt] != 0 {\n\t\tisp_position_offset = uint32(isp_position[dbt]-1) << 2\n\t\tisp_enabled = true\n\t}\n\tif proxytype_position[dbt] != 0 {\n\t\tproxytype_position_offset = uint32(proxytype_position[dbt]-1) << 2\n\t\tproxytype_enabled = true\n\t}\n\tif domain_position[dbt] != 0 {\n\t\tdomain_position_offset = uint32(domain_position[dbt]-1) << 2\n\t\tdomain_enabled = true\n\t}\n\tif usagetype_position[dbt] != 0 {\n\t\tusagetype_position_offset = uint32(usagetype_position[dbt]-1) << 2\n\t\tusagetype_enabled = true\n\t}\n\tif asn_position[dbt] != 0 {\n\t\tasn_position_offset = uint32(asn_position[dbt]-1) << 2\n\t\tasn_enabled = true\n\t}\n\tif as_position[dbt] != 0 {\n\t\tas_position_offset = uint32(as_position[dbt]-1) << 2\n\t\tas_enabled = true\n\t}\n\tif lastseen_position[dbt] != 0 {\n\t\tlastseen_position_offset = uint32(lastseen_position[dbt]-1) << 2\n\t\tlastseen_enabled = true\n\t}\n\n\tmetaok = true\n\treturn nil\n}", "title": "" }, { "docid": "a7a9d314c0610cb113a061bab9d93a89", "score": "0.49768418", "text": "func LoadTableInfo(db *sql.DB, dbTables []string, excludeDbTables []string, conf *Config) map[string]*ModelInfo {\n\n\ttableInfos := make(map[string]*ModelInfo)\n\n\t// generate go files for each table\n\tvar tableIdx = 0\n\tfor i, tableName := range dbTables {\n\n\t\t_, ok := FindInSlice(excludeDbTables, tableName)\n\t\tif ok {\n\t\t\tfmt.Printf(\"Skipping excluded table %s\\n\", tableName)\n\t\t\tcontinue\n\t\t}\n\n\t\tif strings.HasPrefix(tableName, \"[\") && strings.HasSuffix(tableName, \"]\") {\n\t\t\ttableName = tableName[1 : len(tableName)-1]\n\t\t}\n\n\t\tdbMeta, err := LoadMeta(conf.SQLType, db, conf.SQLDatabase, tableName)\n\t\tif err != nil {\n\t\t\tmsg := fmt.Sprintf(\"Warning - LoadMeta skipping table info for %s error: %v\\n\", tableName, err)\n\t\t\tif au != nil {\n\t\t\t\tfmt.Print(au.Yellow(msg))\n\t\t\t} else {\n\t\t\t\tfmt.Printf(msg)\n\t\t\t}\n\n\t\t\tcontinue\n\t\t}\n\n\t\tmodelInfo, err := GenerateModelInfo(tableInfos, dbMeta, tableName, conf)\n\t\tif err != nil {\n\t\t\tmsg := fmt.Sprintf(\"Error - %v\\n\", err)\n\t\t\tif au != nil {\n\t\t\t\tfmt.Print(au.Red(msg))\n\t\t\t} else {\n\t\t\t\tfmt.Printf(msg)\n\t\t\t}\n\n\t\t\tcontinue\n\t\t}\n\n\t\tif len(modelInfo.Fields) == 0 {\n\t\t\tif conf.Verbose {\n\t\t\t\tfmt.Printf(\"[%d] Table: %s - No Fields Available\\n\", i, tableName)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\tmodelInfo.Index = tableIdx\n\t\tmodelInfo.IndexPlus1 = tableIdx + 1\n\t\ttableIdx++\n\n\t\ttableInfos[tableName] = modelInfo\n\t}\n\n\treturn tableInfos\n}", "title": "" }, { "docid": "5275b67a21b807cfbfdb7404dbbe3a5e", "score": "0.4976559", "text": "func getTBL(dbname string, args []string) bool {\n filename := dbname + \"/\" + args[3] + \".csv\" //filename for first table\n csvfile, err := os.Open(filename)\n if err != nil { // if there is an error opening the file then return false menu function\n return false// states that there was a problem oprning it\n }\n reader := csv.NewReader(csvfile)\n\n file1record, err1 := reader.ReadAll() //this reads all data from the csv into a 2D array\n if err1 != nil { // if there is an error reading the output for whatever reason display error\n log.Fatal(err1)\n }\n csvfile.Close()\n\n var filename2 string\n if args[5] == \"inner\" || args[5] == \"outer\" { // These statements check for whether the \n filename2 = dbname + \"/\" + args[7] + \".csv\"//select command has specific join commands\n } else if args[5] == \"left\" || args[5] == \"right\" {//such as inner join and by knowing that\n filename2 = dbname + \"/\" + args[8] + \".csv\"// we get the correct string for the second\n } else { //filename\n filename2 = dbname + \"/\" + args[5] + \".csv\"\n }\n csvfile2, err2 := os.Open(filename2)\n if err2 != nil {\n return false\n }\n reader = csv.NewReader(csvfile2)\n file2record, err3 := reader.ReadAll() //read all data into another 2D array\n if err3 != nil {\n log.Fatal(err3)\n }\n /*\n if len(file2record) > 1 {\n fmt.Println(\"\")\n } \n if len(file1record) > 1 {\n fmt.Println(\"\")\n } \n */\n if args[7] == \"where\" { //if using a where condition the selection statement evalues this\n name1 := strings.Split(args[8], \".\")[1] //sidentifies the column identifier\n name2 := strings.Split(args[10], \".\")[1]//i.e. this gets \"id\" from \"E.id\"\n\n x, y:=-1, -1\n for i := 0; i < len(file1record[0]); i++ {\n if name1 == strings.Split(file1record[0][i], \" \")[0] {\n x = i \n }\n }\n for i := 0; i < len(file2record[0]); i++ {\n if name2 == strings.Split(file2record[0][i], \" \")[0] {\n y = i \n }\n }\n\n if x == -1 || y == -1 {\n fmt.Printf(\"Error one of the requested fields does not exist in one of the tables \\n\")\n return false\n }\n\n title := false\n for i := 0; i < len(file1record); i++ {\n for j := 0; j < len(file2record); j++ {\n if file1record[i][x] == file2record[j][y] {\n if !title {\n fmt.Printf(\"%s|%s|%s|%s\\n\", file1record[0][0],file1record[0][1],\n file2record[0][0], file2record[0][1])\n title = true\n }\n fmt.Printf(\"%s|%s|%s|%s\\n\", file1record[i][0],file1record[i][1],\n file2record[j][0], file2record[j][1])\n }\n }\n }\n } else if args[5] + args[6] == \"innerjoin\" { //if inner join is the condition\n mat := innerJoin(file1record, file2record, args[10], args[12])//calls innerJoin function which returns the innerjoin table (2d array)\n for i := 0; i < len(mat); i++ {//this is to print the data from our innerjoin table\n for j := 0; j < len(mat[i]); j++ {\n fmt.Printf(\"%s\", mat[i][j])\n if j < len(mat[i])-1 { //makes sure we dont print a \"|\" at the end\n fmt.Printf(\"|\")\n }\n }\n fmt.Printf(\"\\n\")\n }\n } else if args[5] + args[6] == \"leftouter\" { //if leftouter this both innerjoin and leftouter\n mat := innerJoin(file1record, file2record, args[11], args[13])//leftouterjoin = innerjoin + left table values\n mat = leftOuterJoin(file1record, mat)//Use our innerjoin as the parameter and also result\n for i := 0; i < len(mat); i++ {//similar print as above\n for j := 0; j < len(mat[i]); j++ {\n fmt.Printf(\"%s\", mat[i][j])\n if j < len(mat[i])-1 {\n fmt.Printf(\"|\")\n }\n }\n fmt.Printf(\"\\n\")\n }\n }\n return true\n}", "title": "" }, { "docid": "da40859530847eb62ef1e566cd75e3c7", "score": "0.49566412", "text": "func (mysqld *Mysqld) dumpTableSplit(td proto.TableDefinition, dbName, keyName string, keyType key.KeyspaceIdType, mainCloneSourcePath string, cloneSourcePaths map[key.KeyRange]string, maximumFilesize uint64) (map[key.KeyRange][]SnapshotFile, error) {\n\tfilename := path.Join(mainCloneSourcePath, td.Name+\".csv\")\n\tselectIntoOutfile := `SELECT {{.KeyspaceIdColumnName}}, {{.Columns}} INTO OUTFILE \"{{.TableOutputPath}}\" CHARACTER SET binary FIELDS TERMINATED BY ',' OPTIONALLY ENCLOSED BY '\"' ESCAPED BY '\\\\' LINES TERMINATED BY '\\n' FROM {{.TableName}}`\n\tqueryParams := map[string]string{\n\t\t\"TableName\": dbName + \".\" + td.Name,\n\t\t\"Columns\": strings.Join(td.Columns, \", \"),\n\t\t\"KeyspaceIdColumnName\": keyName,\n\t\t\"TableOutputPath\": filename,\n\t}\n\tnumberColumn := true\n\tif keyType == key.KIT_BYTES {\n\t\tnumberColumn = false\n\t\tqueryParams[\"KeyspaceIdColumnName\"] = \"HEX(\" + keyName + \")\"\n\t}\n\tsio, err := fillStringTemplate(selectIntoOutfile, queryParams)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err := mysqld.ExecuteSuperQuery(sio); err != nil {\n\t\treturn nil, err\n\t}\n\n\tfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer func() {\n\t\tfile.Close()\n\t\tif e := os.Remove(filename); e != nil {\n\t\t\tlog.Errorf(\"Cannot remove %v: %v\", filename, e)\n\t\t}\n\t}()\n\n\thasherWriters := make(map[key.KeyRange]*namedHasherWriter)\n\n\tfor kr, cloneSourcePath := range cloneSourcePaths {\n\t\tfilenamePattern := path.Join(cloneSourcePath, td.Name+\".%v.csv.gz\")\n\t\tw, err := newCompressedNamedHasherWriter(filenamePattern, mysqld.SnapshotDir, td.Name, maximumFilesize)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\thasherWriters[kr] = w\n\t}\n\n\tsplitter := csvsplitter.NewKeyspaceCSVReader(file, ',', numberColumn)\n\tfor {\n\t\tkeyspaceId, line, err := splitter.ReadRecord()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor kr, w := range hasherWriters {\n\t\t\tif kr.Contains(keyspaceId) {\n\t\t\t\t_, err = w.Write(line)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\tsnapshotFiles := make(map[key.KeyRange][]SnapshotFile)\n\tfor i, hw := range hasherWriters {\n\t\tif snapshotFiles[i], err = hw.SnapshotFiles(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn snapshotFiles, nil\n}", "title": "" }, { "docid": "6d9abfe82a0b9d3b4cf6b7486fe1389e", "score": "0.48880664", "text": "func (*AIProxyCredentials) TableName() string { return \"ai_proxy_credentials\" }", "title": "" }, { "docid": "dc13dc50558eb7936c23211532fa3bbb", "score": "0.48395354", "text": "func AnalyseTables(bf *types.BackupFile) (map[string]int, error) {\n\tcounts := make(map[string]int)\n\n\tframes, err := bf.Slurp()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to slurp frames\")\n\t}\n\tfor _, f := range frames {\n\t\tif f.GetHeader() != nil {\n\t\t\tcounts[\"header\"]++\n\t\t\tcontinue\n\t\t}\n\t\tif f.GetVersion() != nil {\n\t\t\tcounts[\"version\"]++\n\t\t\tcontinue\n\t\t}\n\t\tif f.GetAttachment() != nil {\n\t\t\tcounts[\"attachment\"]++\n\t\t\tcontinue\n\t\t}\n\t\tif f.GetAvatar() != nil {\n\t\t\tcounts[\"avatar\"]++\n\t\t\tcontinue\n\t\t}\n\t\tif f.GetPreference() != nil {\n\t\t\tcounts[\"pref\"]++\n\t\t\tcontinue\n\t\t}\n\t\tif stmt := f.GetStatement(); stmt != nil {\n\t\t\tif strings.HasPrefix(*stmt.Statement, \"DROP TABLE\") {\n\t\t\t\tif counts[\"drop_table\"] == 0 {\n\t\t\t\t\texamples[\"drop_table\"] = stmt\n\t\t\t\t}\n\t\t\t\tcounts[\"drop_table\"]++\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif strings.HasPrefix(*stmt.Statement, \"CREATE TABLE\") {\n\t\t\t\tif counts[\"create_table\"] == 0 {\n\t\t\t\t\texamples[\"create_table\"] = stmt\n\t\t\t\t}\n\t\t\t\tcounts[\"create_table\"]++\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif strings.HasPrefix(*stmt.Statement, \"DROP INDEX\") {\n\t\t\t\tif counts[\"drop_index\"] == 0 {\n\t\t\t\t\texamples[\"drop_index\"] = stmt\n\t\t\t\t}\n\t\t\t\tcounts[\"drop_index\"]++\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif strings.HasPrefix(*stmt.Statement, \"CREATE INDEX\") ||\n\t\t\t\tstrings.HasPrefix(*stmt.Statement, \"CREATE UNIQUE INDEX\") {\n\t\t\t\tif counts[\"create_index\"] == 0 {\n\t\t\t\t\texamples[\"create_index\"] = stmt\n\t\t\t\t}\n\t\t\t\tcounts[\"create_index\"]++\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif strings.HasPrefix(*stmt.Statement, \"INSERT INTO\") {\n\t\t\t\ttable := strings.Split(*stmt.Statement, \" \")[2]\n\t\t\t\tif counts[\"insert_into_\"+table] == 0 {\n\t\t\t\t\texamples[\"insert_into_\"+table] = stmt\n\t\t\t\t}\n\t\t\t\tcounts[\"insert_into_\"+table]++\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tcounts[\"other_stmt\"]++\n\t\t}\n\t}\n\n\treturn counts, nil\n}", "title": "" }, { "docid": "95812c6cf62a300fd2be6b26a162bf1b", "score": "0.4737917", "text": "func dumpTable(tx *genji.Tx, tableName string, w io.Writer) error {\n\tvar buf bytes.Buffer\n\n\tt, err := tx.GetTable(tableName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif _, err = fmt.Fprintf(w, \"CREATE TABLE %s\", t.Name()); err != nil {\n\t\treturn err\n\t}\n\n\tti, err := t.Info()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfcs := ti.FieldConstraints\n\t// Fields constraints should be displayed between parenthesis.\n\tif len(fcs) > 0 {\n\t\tbuf.WriteString(\" (\\n\")\n\t}\n\n\tfor i, fc := range fcs {\n\t\t// Don't display the last comma.\n\t\tif i > 0 {\n\t\t\tbuf.WriteString(\",\\n\")\n\t\t}\n\n\t\tbuf.WriteString(\" \" + fcs[i].Path.String() + \" \")\n\t\tbuf.WriteString(strings.ToUpper(fcs[i].Type.String()))\n\t\tif fc.IsPrimaryKey {\n\t\t\tbuf.WriteString(\" PRIMARY KEY\")\n\t\t}\n\n\t\tif fc.IsNotNull {\n\t\t\tbuf.WriteString(\" NOT NULL\")\n\t\t}\n\t}\n\n\t// Fields constraints close parenthesis.\n\tif len(fcs) > 0 {\n\t\tbuf.WriteString(\"\\n);\\n\")\n\t} else {\n\t\tbuf.WriteString(\";\\n\")\n\t}\n\n\t// Print CREATE TABLE statement.\n\tif _, err = buf.WriteTo(w); err != nil {\n\t\treturn err\n\t}\n\tbuf.Reset()\n\n\t// Indexes statements.\n\tindexes, err := t.Indexes()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, index := range indexes {\n\t\tu := \"\"\n\t\tif index.Opts.Unique {\n\t\t\tu = \" UNIQUE\"\n\t\t}\n\n\t\t_, err = fmt.Fprintf(w, \"CREATE%s INDEX %s ON %s (%s);\\n\", u, index.Opts.IndexName, index.Opts.TableName,\n\t\t\tindex.Opts.Path)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tq := fmt.Sprintf(\"SELECT * FROM %s\", t.Name())\n\tres, err := tx.Query(context.Background(), q)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer res.Close()\n\n\t// Inserts statements.\n\tinsert := fmt.Sprintf(\"INSERT INTO %s VALUES \", t.Name())\n\treturn res.Iterate(func(d document.Document) error {\n\t\tbuf.WriteString(insert)\n\n\t\tdata, err := document.MarshalJSON(d)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbuf.Write(data)\n\t\tbuf.WriteString(\";\\n\")\n\n\t\tif _, err = buf.WriteTo(w); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tbuf.Reset()\n\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "dd3e870812c28a233409b6dd7a20048c", "score": "0.47211716", "text": "func (vc *Cache) GetTableSQL(ddl isql.CreateTable) (sqls []string) {\n\tsqlCreateTmpl := `CREATE TABLE IF NOT EXISTS \"%s\".\"%s\"` + \"\\n(\\n\" + `%s) %s`\n\tsqlSegmTmpl := ` SEGMENTED BY hash(\"%s\") ALL NODES`\n\tcolumnTmpl := `\"%s\" %s,` + \"\\n\"\n\tcolumns := ``\n\torder := ``\n\t//store enum values into comment\n\tvar enums []string\n\n\tfor i, col := range ddl.GetColumns() {\n\t\tcolumns += fmt.Sprintf(columnTmpl, col.GetName(), vc.typeConvert(col.GetType()))\n\t\t//enum check\n\t\tif enumReg.MatchString(col.GetType()) {\n\t\t\tenums = append(enums, serializeEnum(col.GetType(), i+1))\n\t\t}\n\t}\n\n\tfor _, key := range ddl.GetConstraints() {\n\t\tif key.GetType() == isql.Primary {\n\t\t\tcolumns += `PRIMARY KEY (\"` + strings.Join(key.GetColumns(), `\",\"`) + \"\\\") ENABLED,\\n\"\n\t\t\torder = fmt.Sprintf(`ORDER BY \"%s\"`, strings.Join(key.GetColumns(), `\",\"`))\n\t\t}\n\n\t\tif key.GetType() == isql.Unique {\n\t\t\tvar columnsNames []string\n\t\t\tfor _, column := range key.GetColumns() {\n\t\t\t\tcolumnsNames = append(columnsNames, roundBrack.ReplaceAllLiteralString(column, \"\"))\n\t\t\t}\n\n\t\t\t//when primary not exist segment projection\n\t\t\tif len(order) == 0 {\n\t\t\t\torder = fmt.Sprintf(`ORDER BY \"%s\"`, strings.Join(columnsNames, `\",\"`))\n\t\t\t\torder += fmt.Sprintf(sqlSegmTmpl, strings.Join(columnsNames, `\",\"`))\n\t\t\t}\n\n\t\t\tcolumns += `UNIQUE (\"` + strings.Join(columnsNames, `\",\"`) + \"\\\") ENABLED,\\n\"\n\t\t}\n\t}\n\n\tcolumns = strings.Trim(columns, \",\\n\")\n\n\tsqls = append(sqls, fmt.Sprintf(sqlCreateTmpl, ddl.GetCreateTable().GetSchema(), ddl.GetCreateTable().GetName(), columns, order))\n\n\tif len(enums) > 0 {\n\t\tsqls = append(sqls, setEnumSQL(ddl.GetCreateTable().GetSchema(), ddl.GetCreateTable().GetName(), enums))\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "6e26a8e071a73a1dd4a3702a11c75d6b", "score": "0.46755528", "text": "func (d *Dumper) dumpTable(conn *Connection, database string, table string) error {\n\tvar allBytes uint64\n\tvar allRows uint64\n\tvar where string\n\tvar selfields []string\n\n\tisGenerated, err := d.generatedFields(conn, table)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfields := make([]string, 0)\n\t{\n\t\tcursor, err := conn.StreamFetch(fmt.Sprintf(\"SELECT * FROM `%s`.`%s` LIMIT 1\", database, table))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tflds := cursor.Fields()\n\t\tfor _, fld := range flds {\n\t\t\td.log.Debug(\"dump\", zap.Any(\"filters\", d.cfg.Filters), zap.String(\"table\", table), zap.String(\"field_name\", fld.Name))\n\n\t\t\tif _, ok := d.cfg.Filters[table][fld.Name]; ok {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif isGenerated[fld.Name] {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tfields = append(fields, fmt.Sprintf(\"`%s`\", fld.Name))\n\t\t\treplacement, ok := d.cfg.Selects[table][fld.Name]\n\t\t\tif ok {\n\t\t\t\tselfields = append(selfields, fmt.Sprintf(\"%s AS `%s`\", replacement, fld.Name))\n\t\t\t} else {\n\t\t\t\tselfields = append(selfields, fmt.Sprintf(\"`%s`\", fld.Name))\n\t\t\t}\n\t\t}\n\n\t\terr = cursor.Close()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif v, ok := d.cfg.Wheres[table]; ok {\n\t\twhere = fmt.Sprintf(\" WHERE %v\", v)\n\t}\n\n\tcursor, err := conn.StreamFetch(fmt.Sprintf(\"SELECT %s FROM `%s`.`%s` %s\", strings.Join(selfields, \", \"), database, table, where))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfileNo := 1\n\tstmtsize := 0\n\tchunkbytes := 0\n\trows := make([]string, 0, 256)\n\tinserts := make([]string, 0, 256)\n\tfor cursor.Next() {\n\t\trow, err := cursor.RowValues()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tvalues := make([]string, 0, 16)\n\t\tfor _, v := range row {\n\t\t\tif v.Raw() == nil {\n\t\t\t\tvalues = append(values, \"NULL\")\n\t\t\t} else {\n\t\t\t\tstr := v.String()\n\t\t\t\tswitch {\n\t\t\t\tcase v.IsSigned(), v.IsUnsigned(), v.IsFloat(), v.IsIntegral(), v.Type() == querypb.Type_DECIMAL:\n\t\t\t\t\tvalues = append(values, str)\n\t\t\t\tdefault:\n\t\t\t\t\tvalues = append(values, fmt.Sprintf(\"\\\"%s\\\"\", escapeBytes(v.Raw())))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tr := \"(\" + strings.Join(values, \",\") + \")\"\n\t\trows = append(rows, r)\n\n\t\tallRows++\n\t\tstmtsize += len(r)\n\t\tchunkbytes += len(r)\n\t\tallBytes += uint64(len(r))\n\t\tatomic.AddUint64(&d.cfg.Allbytes, uint64(len(r)))\n\t\tatomic.AddUint64(&d.cfg.Allrows, 1)\n\n\t\tif stmtsize >= d.cfg.StmtSize {\n\t\t\tinsertone := fmt.Sprintf(\"INSERT INTO `%s`(%s) VALUES\\n%s\", table, strings.Join(fields, \",\"), strings.Join(rows, \",\\n\"))\n\t\t\tinserts = append(inserts, insertone)\n\t\t\trows = rows[:0]\n\t\t\tstmtsize = 0\n\t\t}\n\n\t\tif (chunkbytes / 1024 / 1024) >= d.cfg.ChunksizeInMB {\n\t\t\tquery := strings.Join(inserts, \";\\n\") + \";\\n\"\n\t\t\tfile := fmt.Sprintf(\"%s/%s.%s.%05d.sql\", d.cfg.Outdir, database, table, fileNo)\n\t\t\terr = writeFile(file, query)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\td.log.Info(\n\t\t\t\t\"dumping table ...\",\n\t\t\t\tzap.String(\"database\", database),\n\t\t\t\tzap.String(\"table\", table),\n\t\t\t\tzap.Uint64(\"rows\", allRows),\n\t\t\t\tzap.Any(\"bytes_mb\", (allBytes/1024/1024)),\n\t\t\t\tzap.Int(\"part\", fileNo),\n\t\t\t\tzap.Int(\"thread_conn_id\", conn.ID),\n\t\t\t)\n\n\t\t\tinserts = inserts[:0]\n\t\t\tchunkbytes = 0\n\t\t\tfileNo++\n\t\t}\n\t}\n\tif chunkbytes > 0 {\n\t\tif len(rows) > 0 {\n\t\t\tinsertone := fmt.Sprintf(\"INSERT INTO `%s`(%s) VALUES\\n%s\", table, strings.Join(fields, \",\"), strings.Join(rows, \",\\n\"))\n\t\t\tinserts = append(inserts, insertone)\n\t\t}\n\n\t\tquery := strings.Join(inserts, \";\\n\") + \";\\n\"\n\t\tfile := fmt.Sprintf(\"%s/%s.%s.%05d.sql\", d.cfg.Outdir, database, table, fileNo)\n\t\terr = writeFile(file, query)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\terr = cursor.Close()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\td.log.Info(\n\t\t\"dumping table done...\",\n\t\tzap.String(\"database\", database),\n\t\tzap.String(\"table\", table),\n\t\tzap.Uint64(\"all_rows\", allRows),\n\t\tzap.Any(\"all_bytes\", (allBytes/1024/1024)),\n\t\tzap.Int(\"thread_conn_id\", conn.ID),\n\t)\n\treturn nil\n}", "title": "" }, { "docid": "34009a8cc652c969be28d3c292881536", "score": "0.4649119", "text": "func init() {\n\tup := batch(`\n\tCOMMENT ON TABLE actor_states IS 'Actor states that were changed at an epoch. Associates actors states as single-level trees with CIDs pointing to complete state tree with the root CID (head) for that actor''s state.';\n\tCOMMENT ON COLUMN actor_states.code IS 'CID identifier for the type of the actor.';\n\tCOMMENT ON COLUMN actor_states.head IS 'CID of the root of the state tree for the actor.';\n\tCOMMENT ON COLUMN actor_states.height IS 'Epoch when this state change happened.';\n\tCOMMENT ON COLUMN actor_states.state IS 'Top level of state data.';\n\n\tCOMMENT ON TABLE actors IS 'Actors on chain that were added or updated at an epoch. Associates the actor''s state root CID (head) with the chain state root CID from which it decends. Includes account ID nonce and balance at each state.';\n\tCOMMENT ON COLUMN actors.balance IS 'Actor balance in attoFIL.';\n\tCOMMENT ON COLUMN actors.code IS 'Human readable identifier for the type of the actor.';\n\tCOMMENT ON COLUMN actors.head IS 'CID of the root of the state tree for the actor.';\n\tCOMMENT ON COLUMN actors.height IS 'Epoch when this actor was created or updated.';\n\tCOMMENT ON COLUMN actors.id IS 'Actor address.';\n\tCOMMENT ON COLUMN actors.nonce IS 'The next actor nonce that is expected to appear on chain.';\n\tCOMMENT ON COLUMN actors.state_root IS 'CID of the state root.';\n\n\tCOMMENT ON TABLE block_headers IS 'Blocks included in tipsets at an epoch.';\n\tCOMMENT ON COLUMN block_headers.cid IS 'CID of the block.';\n\tCOMMENT ON COLUMN block_headers.fork_signaling IS 'Flag used as part of signaling forks.';\n\tCOMMENT ON COLUMN block_headers.height IS 'Epoch when this block was mined.';\n\tCOMMENT ON COLUMN block_headers.miner IS 'Address of the miner who mined this block.';\n\tCOMMENT ON COLUMN block_headers.parent_base_fee IS 'The base fee after executing the parent tipset.';\n\tCOMMENT ON COLUMN block_headers.parent_state_root IS 'CID of the block''s parent state root.';\n\tCOMMENT ON COLUMN block_headers.parent_weight IS 'Aggregate chain weight of the block''s parent set.';\n\tCOMMENT ON COLUMN block_headers.timestamp IS 'Time the block was mined in Unix time, the number of seconds elapsed since January 1, 1970 UTC.';\n\tCOMMENT ON COLUMN block_headers.win_count IS 'Number of reward units won in this block.';\n\n\tCOMMENT ON TABLE block_messages IS 'Message CIDs and the Blocks CID which contain them.';\n\tCOMMENT ON COLUMN block_messages.block IS 'CID of the block that contains the message.';\n\tCOMMENT ON COLUMN block_messages.height IS 'Epoch when the block was mined.';\n\tCOMMENT ON COLUMN block_messages.message IS 'CID of a message in the block.';\n\n\tCOMMENT ON TABLE block_parents IS 'Block CIDs to many parent Block CIDs.';\n\tCOMMENT ON COLUMN block_parents.block IS 'CID of the block.';\n\tCOMMENT ON COLUMN block_parents.height IS 'Epoch when the block was mined.';\n\tCOMMENT ON COLUMN block_parents.parent IS 'CID of the parent block.';\n\n\tCOMMENT ON TABLE chain_economics IS 'Economic summaries per state root CID.';\n\tCOMMENT ON COLUMN chain_economics.burnt_fil IS 'Total FIL (attoFIL) burned as part of penalties and on-chain computations.';\n\tCOMMENT ON COLUMN chain_economics.circulating_fil IS 'The amount of FIL (attoFIL) circulating and tradeable in the economy. The basis for Market Cap calculations.';\n\tCOMMENT ON COLUMN chain_economics.locked_fil IS 'The amount of FIL (attoFIL) locked as part of mining, deals, and other mechanisms.';\n\tCOMMENT ON COLUMN chain_economics.mined_fil IS 'The amount of FIL (attoFIL) that has been mined by storage miners.';\n\tCOMMENT ON COLUMN chain_economics.parent_state_root IS 'CID of the parent state root.';\n\tCOMMENT ON COLUMN chain_economics.vested_fil IS 'Total amount of FIL (attoFIL) that is vested from genesis allocation.';\n\n\tCOMMENT ON TABLE chain_powers IS 'Power summaries from the Power actor.';\n\tCOMMENT ON COLUMN chain_powers.height IS 'Epoch this power summary applies to.';\n\tCOMMENT ON COLUMN chain_powers.miner_count IS 'Total number of miners.';\n\tCOMMENT ON COLUMN chain_powers.participating_miner_count IS 'Total number of miners with power above the minimum miner threshold.';\n\tCOMMENT ON COLUMN chain_powers.qa_smoothed_position_estimate IS 'Total power smoothed position estimate - Alpha Beta Filter \"position\" (value) estimate in Q.128 format.';\n\tCOMMENT ON COLUMN chain_powers.qa_smoothed_velocity_estimate IS 'Total power smoothed velocity estimate - Alpha Beta Filter \"velocity\" (rate of change of value) estimate in Q.128 format.';\n\tCOMMENT ON COLUMN chain_powers.state_root IS 'CID of the parent state root.';\n\tCOMMENT ON COLUMN chain_powers.total_pledge_collateral IS 'Total locked FIL (attoFIL) miners have pledged as collateral in order to participate in the economy.';\n\tCOMMENT ON COLUMN chain_powers.total_qa_bytes_committed IS 'Total provably committed, quality adjusted storage power in bytes. Quality adjusted power is a weighted average of the quality of its space and it is based on the size, duration and quality of its deals.';\n\tCOMMENT ON COLUMN chain_powers.total_qa_bytes_power IS 'Total quality adjusted storage power in bytes in the network. Quality adjusted power is a weighted average of the quality of its space and it is based on the size, duration and quality of its deals.';\n\tCOMMENT ON COLUMN chain_powers.total_raw_bytes_committed IS 'Total provably committed storage power in bytes. Raw byte power is the size of a sector in bytes.';\n\tCOMMENT ON COLUMN chain_powers.total_raw_bytes_power IS 'Total storage power in bytes in the network. Raw byte power is the size of a sector in bytes.';\n\n\tCOMMENT ON TABLE chain_rewards IS 'Reward summaries from the Reward actor.';\n\tCOMMENT ON COLUMN chain_rewards.cum_sum_baseline IS 'Target that CumsumRealized needs to reach for EffectiveNetworkTime to increase. It is measured in byte-epochs (space * time) representing power committed to the network for some duration.';\n\tCOMMENT ON COLUMN chain_rewards.cum_sum_realized IS 'Cumulative sum of network power capped by BaselinePower(epoch). It is measured in byte-epochs (space * time) representing power committed to the network for some duration.';\n\tCOMMENT ON COLUMN chain_rewards.effective_baseline_power IS 'The baseline power (in bytes) at the EffectiveNetworkTime epoch.';\n\tCOMMENT ON COLUMN chain_rewards.effective_network_time IS 'Ceiling of real effective network time \"theta\" based on CumsumBaselinePower(theta) == CumsumRealizedPower. Theta captures the notion of how much the network has progressed in its baseline and in advancing network time.';\n\tCOMMENT ON COLUMN chain_rewards.height IS 'Epoch this rewards summary applies to.';\n\tCOMMENT ON COLUMN chain_rewards.new_baseline_power IS 'The baseline power (in bytes) the network is targeting.';\n\tCOMMENT ON COLUMN chain_rewards.new_reward IS 'The reward to be paid in per WinCount to block producers. The actual reward total paid out depends on the number of winners in any round. This value is recomputed every non-null epoch and used in the next non-null epoch.';\n\tCOMMENT ON COLUMN chain_rewards.new_reward_smoothed_position_estimate IS 'Smoothed reward position estimate - Alpha Beta Filter \"position\" (value) estimate in Q.128 format.';\n\tCOMMENT ON COLUMN chain_rewards.new_reward_smoothed_velocity_estimate IS 'Smoothed reward velocity estimate - Alpha Beta Filter \"velocity\" (rate of change of value) estimate in Q.128 format.';\n\tCOMMENT ON COLUMN chain_rewards.state_root IS 'CID of the parent state root.';\n\tCOMMENT ON COLUMN chain_rewards.total_mined_reward IS 'The total FIL (attoFIL) awarded to block miners.';\n\n\tCOMMENT ON TABLE derived_gas_outputs IS 'Derived gas costs resulting from execution of a message in the VM.';\n\tCOMMENT ON COLUMN derived_gas_outputs.actor_name IS 'Human readable identifier for the type of the actor.';\n\tCOMMENT ON COLUMN derived_gas_outputs.base_fee_burn IS 'The amount of FIL (in attoFIL) to burn as a result of the base fee. It is parent_base_fee (or gas_fee_cap if smaller) multiplied by gas_used. Note: successful window PoSt messages are not charged this burn.';\n\tCOMMENT ON COLUMN derived_gas_outputs.cid IS 'CID of the message.';\n\tCOMMENT ON COLUMN derived_gas_outputs.exit_code IS 'The exit code that was returned as a result of executing the message. Exit code 0 indicates success. Codes 0-15 are reserved for use by the runtime. Codes 16-31 are common codes shared by different actors. Codes 32+ are actor specific.';\n\tCOMMENT ON COLUMN derived_gas_outputs.from IS 'Address of actor that sent the message.';\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_burned IS 'The overestimated units of gas to burn. It is a portion of the difference between gas_limit and gas_used.';\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_fee_cap IS 'The maximum price that the message sender is willing to pay per unit of gas.';\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_limit IS 'A hard limit on the amount of gas (i.e., number of units of gas) that a message’s execution should be allowed to consume on chain. It is measured in units of gas.';\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_premium IS 'The price per unit of gas (measured in attoFIL/gas) that the message sender is willing to pay (on top of the BaseFee) to \"tip\" the miner that will include this message in a block.';\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_refund IS 'The overestimated units of gas to refund. It is a portion of the difference between gas_limit and gas_used.';\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_used IS 'A measure of the amount of resources (or units of gas) consumed, in order to execute a message.';\n\tCOMMENT ON COLUMN derived_gas_outputs.height IS 'Epoch this message was executed at.';\n\tCOMMENT ON COLUMN derived_gas_outputs.method IS 'The method number to invoke. Only unique to the actor the method is being invoked on. A method number of 0 is a plain token transfer - no method exectution.';\n\tCOMMENT ON COLUMN derived_gas_outputs.miner_penalty IS 'Any penalty fees (in attoFIL) the miner incured while executing the message.';\n\tCOMMENT ON COLUMN derived_gas_outputs.miner_tip IS 'The amount of FIL (in attoFIL) the miner receives for executing the message. Typically it is gas_premium * gas_limit but may be lower if the total fees exceed the gas_fee_cap.';\n\tCOMMENT ON COLUMN derived_gas_outputs.nonce IS 'The message nonce, which protects against duplicate messages and multiple messages with the same values.';\n\tCOMMENT ON COLUMN derived_gas_outputs.over_estimation_burn IS 'The fee to pay (in attoFIL) for overestimating the gas used to execute a message. The overestimated gas to burn (gas_burned) is a portion of the difference between gas_limit and gas_used. The over_estimation_burn value is gas_burned * parent_base_fee.';\n\tCOMMENT ON COLUMN derived_gas_outputs.parent_base_fee IS 'The set price per unit of gas (measured in attoFIL/gas unit) to be burned (sent to an unrecoverable address) for every message execution.';\n\tCOMMENT ON COLUMN derived_gas_outputs.refund IS 'The amount of FIL (in attoFIL) to refund to the message sender after base fee, miner tip and overestimation amounts have been deducted.';\n\tCOMMENT ON COLUMN derived_gas_outputs.size_bytes IS 'Size in bytes of the serialized message.';\n\tCOMMENT ON COLUMN derived_gas_outputs.state_root IS 'CID of the parent state root.';\n\tCOMMENT ON COLUMN derived_gas_outputs.to IS 'Address of actor that received the message.';\n\tCOMMENT ON COLUMN derived_gas_outputs.value IS 'The FIL value transferred (attoFIL) to the message receiver.';\n\n\tCOMMENT ON TABLE drand_block_entries IS 'Drand randomness round numbers used in each block.';\n\tCOMMENT ON COLUMN drand_block_entries.block IS 'CID of the block.';\n\tCOMMENT ON COLUMN drand_block_entries.round IS 'The round number of the randomness used.';\n\n\tCOMMENT ON TABLE id_addresses IS 'Mapping of IDs to robust addresses from the init actor''s state.';\n\tCOMMENT ON COLUMN id_addresses.address IS 'Robust address of the actor.';\n\tCOMMENT ON COLUMN id_addresses.id IS 'ID of the actor.';\n\tCOMMENT ON COLUMN id_addresses.state_root IS 'CID of the parent state root at which this address mapping was added.';\n\n\tCOMMENT ON TABLE market_deal_proposals IS 'All storage deal states with latest values applied to end_epoch when updates are detected on-chain.';\n\tCOMMENT ON COLUMN market_deal_proposals.client_collateral IS 'The amount of FIL (in attoFIL) the client has pledged as collateral.';\n\tCOMMENT ON COLUMN market_deal_proposals.client_id IS 'Address of the actor proposing the deal.';\n\tCOMMENT ON COLUMN market_deal_proposals.deal_id IS 'Identifier for the deal.';\n\tCOMMENT ON COLUMN market_deal_proposals.end_epoch IS 'The epoch at which this deal with end.';\n\tCOMMENT ON COLUMN market_deal_proposals.height IS 'Epoch at which this deal proposal was added or changed.';\n\tCOMMENT ON COLUMN market_deal_proposals.is_verified IS 'Deal is with a verified provider.';\n\tCOMMENT ON COLUMN market_deal_proposals.label IS 'An arbitrary client chosen label to apply to the deal.';\n\tCOMMENT ON COLUMN market_deal_proposals.padded_piece_size IS 'The piece size in bytes with padding.';\n\tCOMMENT ON COLUMN market_deal_proposals.piece_cid IS 'CID of a sector piece. A Piece is an object that represents a whole or part of a File.';\n\tCOMMENT ON COLUMN market_deal_proposals.provider_collateral IS 'The amount of FIL (in attoFIL) the provider has pledged as collateral. The Provider deal collateral is only slashed when a sector is terminated before the deal expires.';\n\tCOMMENT ON COLUMN market_deal_proposals.provider_id IS 'Address of the actor providing the services.';\n\tCOMMENT ON COLUMN market_deal_proposals.start_epoch IS 'The epoch at which this deal with begin. Storage deal must appear in a sealed (proven) sector no later than start_epoch, otherwise it is invalid.';\n\tCOMMENT ON COLUMN market_deal_proposals.state_root IS 'CID of the parent state root for this deal.';\n\tCOMMENT ON COLUMN market_deal_proposals.storage_price_per_epoch IS 'The amount of FIL (in attoFIL) that will be transferred from the client to the provider every epoch this deal is active for.';\n\tCOMMENT ON COLUMN market_deal_proposals.unpadded_piece_size IS 'The piece size in bytes without padding.';\n\n\tCOMMENT ON TABLE market_deal_states IS 'All storage deal state transitions detected on-chain.';\n\tCOMMENT ON COLUMN market_deal_states.deal_id IS 'Identifier for the deal.';\n\tCOMMENT ON COLUMN market_deal_states.height IS 'Epoch at which this deal was added or changed.';\n\tCOMMENT ON COLUMN market_deal_states.last_update_epoch IS 'Epoch this deal was last updated at. -1 if deal state never updated.';\n\tCOMMENT ON COLUMN market_deal_states.sector_start_epoch IS 'Epoch this deal was included in a proven sector. -1 if not yet included in proven sector.';\n\tCOMMENT ON COLUMN market_deal_states.slash_epoch IS 'Epoch this deal was slashed at. -1 if deal was never slashed.';\n\tCOMMENT ON COLUMN market_deal_states.state_root IS 'CID of the parent state root for this deal.';\n\n\tCOMMENT ON TABLE message_gas_economy IS 'Gas economics for all messages in all blocks at each epoch.';\n\tCOMMENT ON COLUMN message_gas_economy.base_fee IS 'The set price per unit of gas (measured in attoFIL/gas unit) to be burned (sent to an unrecoverable address) for every message execution.';\n\tCOMMENT ON COLUMN message_gas_economy.base_fee_change_log IS 'The logarithm of the change between new and old base fee.';\n\tCOMMENT ON COLUMN message_gas_economy.gas_capacity_ratio IS 'The gas_limit_unique_total / target gas limit total for all blocks.';\n\tCOMMENT ON COLUMN message_gas_economy.gas_fill_ratio IS 'The gas_limit_total / target gas limit total for all blocks.';\n\tCOMMENT ON COLUMN message_gas_economy.gas_limit_total IS 'The sum of all the gas limits.';\n\tCOMMENT ON COLUMN message_gas_economy.gas_limit_unique_total IS 'The sum of all the gas limits of unique messages.';\n\tCOMMENT ON COLUMN message_gas_economy.gas_waste_ratio IS '(gas_limit_total - gas_limit_unique_total) / target gas limit total for all blocks.';\n\tCOMMENT ON COLUMN message_gas_economy.height IS 'Epoch these economics apply to.';\n\tCOMMENT ON COLUMN message_gas_economy.state_root IS 'CID of the parent state root at this epoch.';\n\n\tCOMMENT ON TABLE messages IS 'Validated on-chain messages by their CID and their metadata.';\n\tCOMMENT ON COLUMN messages.cid IS 'CID of the message.';\n\tCOMMENT ON COLUMN messages.from IS 'Address of the actor that sent the message.';\n\tCOMMENT ON COLUMN messages.gas_fee_cap IS 'The maximum price that the message sender is willing to pay per unit of gas.';\n\tCOMMENT ON COLUMN messages.gas_premium IS 'The price per unit of gas (measured in attoFIL/gas) that the message sender is willing to pay (on top of the BaseFee) to \"tip\" the miner that will include this message in a block.';\n\tCOMMENT ON COLUMN messages.height IS 'Epoch this message was executed at.';\n\tCOMMENT ON COLUMN messages.method IS 'The method number invoked on the recipient actor. Only unique to the actor the method is being invoked on. A method number of 0 is a plain token transfer - no method exectution.';\n\tCOMMENT ON COLUMN messages.nonce IS 'The message nonce, which protects against duplicate messages and multiple messages with the same values.';\n\tCOMMENT ON COLUMN messages.size_bytes IS 'Size of the serialized message in bytes.';\n\tCOMMENT ON COLUMN messages.to IS 'Address of the actor that received the message.';\n\tCOMMENT ON COLUMN messages.value IS 'Amount of FIL (in attoFIL) transferred by this message.';\n\n\tCOMMENT ON TABLE miner_current_deadline_infos IS 'Deadline refers to the window during which proofs may be submitted.';\n\tCOMMENT ON COLUMN miner_current_deadline_infos.challenge IS 'Epoch at which to sample the chain for challenge (< Open).';\n\tCOMMENT ON COLUMN miner_current_deadline_infos.close IS 'First epoch from which a proof may no longer be submitted (>= Open).';\n\tCOMMENT ON COLUMN miner_current_deadline_infos.deadline_index IS 'A deadline index, in [0..d.WPoStProvingPeriodDeadlines) unless period elapsed.';\n\tCOMMENT ON COLUMN miner_current_deadline_infos.fault_cutoff IS 'First epoch at which a fault declaration is rejected (< Open).';\n\tCOMMENT ON COLUMN miner_current_deadline_infos.height IS 'Epoch at which this info was calculated.';\n\tCOMMENT ON COLUMN miner_current_deadline_infos.miner_id IS 'Address of the miner this info relates to.';\n\tCOMMENT ON COLUMN miner_current_deadline_infos.open IS 'First epoch from which a proof may be submitted (>= CurrentEpoch).';\n\tCOMMENT ON COLUMN miner_current_deadline_infos.period_start IS 'First epoch of the proving period (<= CurrentEpoch).';\n\tCOMMENT ON COLUMN miner_current_deadline_infos.state_root IS 'CID of the parent state root at this epoch.';\n\n\tCOMMENT ON TABLE miner_fee_debts IS 'Miner debts per epoch from unpaid fees.';\n\tCOMMENT ON COLUMN miner_fee_debts.fee_debt IS 'Absolute value of debt this miner owes from unpaid fees in attoFIL.';\n\tCOMMENT ON COLUMN miner_fee_debts.height IS 'Epoch at which this debt applies.';\n\tCOMMENT ON COLUMN miner_fee_debts.miner_id IS 'Address of the miner that owes fees.';\n\tCOMMENT ON COLUMN miner_fee_debts.state_root IS 'CID of the parent state root at this epoch.';\n\n\tCOMMENT ON TABLE miner_infos IS 'Miner Account IDs for all associated addresses plus peer ID. See https://docs.filecoin.io/mine/lotus/miner-addresses/ for more information.';\n\tCOMMENT ON COLUMN miner_infos.consensus_faulted_elapsed IS 'The next epoch this miner is eligible for certain permissioned actor methods and winning block elections as a result of being reported for a consensus fault.';\n\tCOMMENT ON COLUMN miner_infos.control_addresses IS 'JSON array of control addresses. Control addresses are used to submit WindowPoSts proofs to the chain. WindowPoSt is the mechanism through which storage is verified in Filecoin and is required by miners to submit proofs for all sectors every 24 hours. Those proofs are submitted as messages to the blockchain and therefore need to pay the respective fees.';\n\tCOMMENT ON COLUMN miner_infos.height IS 'Epoch at which this miner info was added/changed.';\n\tCOMMENT ON COLUMN miner_infos.miner_id IS 'Address of miner this info applies to.';\n\tCOMMENT ON COLUMN miner_infos.multi_addresses IS 'JSON array of multiaddrs at which this miner can be reached.';\n\tCOMMENT ON COLUMN miner_infos.new_worker IS 'Address of a new worker address that will become effective at worker_change_epoch.';\n\tCOMMENT ON COLUMN miner_infos.owner_id IS 'Address of actor designated as the owner. The owner address is the address that created the miner, paid the collateral, and has block rewards paid out to it.';\n\tCOMMENT ON COLUMN miner_infos.peer_id IS 'Current libp2p Peer ID of the miner.';\n\tCOMMENT ON COLUMN miner_infos.state_root IS 'CID of the parent state root at this epoch.';\n\tCOMMENT ON COLUMN miner_infos.worker_id IS 'Address of actor designated as the worker. The worker is responsible for doing all of the work, submitting proofs, committing new sectors, and all other day to day activities.';\n\tCOMMENT ON COLUMN miner_infos.worker_change_epoch IS 'Epoch at which a new_worker address will become effective.';\n\n\tCOMMENT ON TABLE miner_locked_funds IS 'Details of Miner funds locked and unavailable for use.';\n\tCOMMENT ON COLUMN miner_locked_funds.height IS 'Epoch at which these details were added/changed.';\n\tCOMMENT ON COLUMN miner_locked_funds.initial_pledge IS 'Amount of FIL (in attoFIL) locked due to it being pledged as collateral. When a Miner ProveCommits a Sector, they must supply an \"initial pledge\" for the Sector, which acts as collateral. If the Sector is terminated, this deposit is removed and burned along with rewards earned by this sector up to a limit.';\n\tCOMMENT ON COLUMN miner_locked_funds.locked_funds IS 'Amount of FIL (in attoFIL) locked due to vesting. When a Miner receives tokens from block rewards, the tokens are locked and added to the Miner''s vesting table to be unlocked linearly over some future epochs.';\n\tCOMMENT ON COLUMN miner_locked_funds.miner_id IS 'Address of the miner these details apply to.';\n\tCOMMENT ON COLUMN miner_locked_funds.pre_commit_deposits IS 'Amount of FIL (in attoFIL) locked due to it being used as a PreCommit deposit. When a Miner PreCommits a Sector, they must supply a \"precommit deposit\" for the Sector, which acts as collateral. If the Sector is not ProveCommitted on time, this deposit is removed and burned.';\n\tCOMMENT ON COLUMN miner_locked_funds.state_root IS 'CID of the parent state root at this epoch.';\n\n\tCOMMENT ON TABLE miner_pre_commit_infos IS 'Information on sector PreCommits.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.deal_weight IS 'Total space*time of submitted deals.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.expiration_epoch IS 'Epoch this sector expires.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.height IS 'Epoch this PreCommit information was added/changed.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.is_replace_capacity IS 'Whether to replace a \"committed capacity\" no-deal sector (requires non-empty DealIDs).';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.miner_id IS 'Address of the miner who owns the sector.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.pre_commit_deposit IS 'Amount of FIL (in attoFIL) used as a PreCommit deposit. If the Sector is not ProveCommitted on time, this deposit is removed and burned.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.pre_commit_epoch IS 'Epoch this PreCommit was created.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.replace_sector_deadline IS 'The deadline location of the sector to replace.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.replace_sector_number IS 'ID of the committed capacity sector to replace.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.replace_sector_partition IS 'The partition location of the sector to replace.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.seal_rand_epoch IS 'Seal challenge epoch. Epoch at which randomness should be drawn to tie Proof-of-Replication to a chain.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.sealed_cid IS 'CID of the sealed sector.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.sector_id IS 'Numeric identifier for the sector.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.state_root IS 'CID of the parent state root at this epoch.';\n\tCOMMENT ON COLUMN miner_pre_commit_infos.verified_deal_weight IS 'Total space*time of submitted verified deals.';\n\n\tCOMMENT ON TABLE miner_sector_deals IS 'Mapping of Deal IDs to their respective Miner and Sector IDs.';\n\tCOMMENT ON COLUMN miner_sector_deals.deal_id IS 'Numeric identifier for the deal.';\n\tCOMMENT ON COLUMN miner_sector_deals.height IS 'Epoch at which this deal was added/updated.';\n\tCOMMENT ON COLUMN miner_sector_deals.miner_id IS 'Address of the miner the deal is with.';\n\tCOMMENT ON COLUMN miner_sector_deals.sector_id IS 'Numeric identifier of the sector the deal is for.';\n\n\tCOMMENT ON TABLE miner_sector_events IS 'Sector events on-chain per Miner/Sector.';\n\tCOMMENT ON COLUMN miner_sector_events.event IS 'Name of the event that occurred.';\n\tCOMMENT ON COLUMN miner_sector_events.height IS 'Epoch at which this event occurred.';\n\tCOMMENT ON COLUMN miner_sector_events.miner_id IS 'Address of the miner who owns the sector.';\n\tCOMMENT ON COLUMN miner_sector_events.sector_id IS 'Numeric identifier of the sector.';\n\tCOMMENT ON COLUMN miner_sector_events.state_root IS 'CID of the parent state root at this epoch.';\n\n\tCOMMENT ON TABLE miner_sector_infos IS 'Latest state of sectors by Miner.';\n\tCOMMENT ON COLUMN miner_sector_infos.activation_epoch IS 'Epoch during which the sector proof was accepted.';\n\tCOMMENT ON COLUMN miner_sector_infos.deal_weight IS 'Integral of active deals over sector lifetime.';\n\tCOMMENT ON COLUMN miner_sector_infos.expected_day_reward IS 'Expected one day projection of reward for sector computed at activation time (in attoFIL).';\n\tCOMMENT ON COLUMN miner_sector_infos.expected_storage_pledge IS 'Expected twenty day projection of reward for sector computed at activation time (in attoFIL).';\n\tCOMMENT ON COLUMN miner_sector_infos.expiration_epoch IS 'Epoch during which the sector expires.';\n\tCOMMENT ON COLUMN miner_sector_infos.height IS 'Epoch at which this sector info was added/updated.';\n\tCOMMENT ON COLUMN miner_sector_infos.initial_pledge IS 'Pledge collected to commit this sector (in attoFIL).';\n\tCOMMENT ON COLUMN miner_sector_infos.miner_id IS 'Address of the miner who owns the sector.';\n\tCOMMENT ON COLUMN miner_sector_infos.sealed_cid IS 'The root CID of the Sealed Sector’s merkle tree. Also called CommR, or \"replica commitment\".';\n\tCOMMENT ON COLUMN miner_sector_infos.sector_id IS 'Numeric identifier of the sector.';\n\tCOMMENT ON COLUMN miner_sector_infos.state_root IS 'CID of the parent state root at this epoch.';\n\tCOMMENT ON COLUMN miner_sector_infos.verified_deal_weight IS 'Integral of active verified deals over sector lifetime.';\n\n\tCOMMENT ON TABLE miner_sector_posts IS 'Proof of Spacetime for sectors.';\n\tCOMMENT ON COLUMN miner_sector_posts.height IS 'Epoch at which this PoSt message was executed.';\n\tCOMMENT ON COLUMN miner_sector_posts.miner_id IS 'Address of the miner who owns the sector.';\n\tCOMMENT ON COLUMN miner_sector_posts.post_message_cid IS 'CID of the PoSt message.';\n\tCOMMENT ON COLUMN miner_sector_posts.sector_id IS 'Numeric identifier of the sector.';\n\n\tCOMMENT ON TABLE multisig_transactions IS 'Details of pending transactions involving multisig actors.';\n\tCOMMENT ON COLUMN multisig_transactions.approved IS 'Addresses of signers who have approved the transaction. 0th entry is the proposer.';\n\tCOMMENT ON COLUMN multisig_transactions.height IS 'Epoch at which this transaction was executed.';\n\tCOMMENT ON COLUMN multisig_transactions.method IS 'The method number to invoke on the recipient if the proposal is approved. Only unique to the actor the method is being invoked on. A method number of 0 is a plain token transfer - no method exectution.';\n\tCOMMENT ON COLUMN multisig_transactions.multisig_id IS 'Address of the multisig actor involved in the transaction.';\n\tCOMMENT ON COLUMN multisig_transactions.params IS 'CBOR encoded bytes of parameters to send to the method that will be invoked if the proposal is approved.';\n\tCOMMENT ON COLUMN multisig_transactions.state_root IS 'CID of the parent state root at this epoch.';\n\tCOMMENT ON COLUMN multisig_transactions.to IS 'Address of the recipient who will be sent a message if the proposal is approved.';\n\tCOMMENT ON COLUMN multisig_transactions.transaction_id IS 'Number identifier for the transaction - unique per multisig.';\n\tCOMMENT ON COLUMN multisig_transactions.value IS 'Amount of FIL (in attoFIL) that will be transferred if the proposal is approved.';\n\n\tCOMMENT ON TABLE parsed_messages IS 'Messages parsed to extract useful information.';\n\tCOMMENT ON COLUMN parsed_messages.cid IS 'CID of the message.';\n\tCOMMENT ON COLUMN parsed_messages.from IS 'Address of the actor that sent the message.';\n\tCOMMENT ON COLUMN parsed_messages.height IS 'Epoch this message was executed at.';\n\tCOMMENT ON COLUMN parsed_messages.method IS 'The name of the method that was invoked on the recipient actor.';\n\tCOMMENT ON COLUMN parsed_messages.params IS 'Method parameters parsed and serialized as a JSON object.';\n\tCOMMENT ON COLUMN parsed_messages.to IS 'Address of the actor that received the message.';\n\tCOMMENT ON COLUMN parsed_messages.value IS 'Amount of FIL (in attoFIL) transferred by this message.';\n\n\tCOMMENT ON TABLE power_actor_claims IS 'Miner power claims recorded by the power actor.';\n\tCOMMENT ON COLUMN power_actor_claims.height IS 'Epoch this claim was made.';\n\tCOMMENT ON COLUMN power_actor_claims.miner_id IS 'Address of miner making the claim.';\n\tCOMMENT ON COLUMN power_actor_claims.quality_adj_power IS 'Sum of quality adjusted storage power for a miner''s sectors. Quality adjusted power is a weighted average of the quality of its space and it is based on the size, duration and quality of its deals.';\n\tCOMMENT ON COLUMN power_actor_claims.raw_byte_power IS 'Sum of raw byte storage power for a miner''s sectors. Raw byte power is the size of a sector in bytes.';\n\tCOMMENT ON COLUMN power_actor_claims.state_root IS 'CID of the parent state root at this epoch.';\n\n\tCOMMENT ON TABLE receipts IS 'Message reciepts after being applied to chain state by message CID and parent state root CID of tipset when message was executed.';\n\tCOMMENT ON COLUMN receipts.exit_code IS 'The exit code that was returned as a result of executing the message. Exit code 0 indicates success. Codes 0-15 are reserved for use by the runtime. Codes 16-31 are common codes shared by different actors. Codes 32+ are actor specific.';\n\tCOMMENT ON COLUMN receipts.gas_used IS 'A measure of the amount of resources (or units of gas) consumed, in order to execute a message.';\n\tCOMMENT ON COLUMN receipts.height IS 'Epoch the message was executed and receipt generated.';\n\tCOMMENT ON COLUMN receipts.idx IS 'Index of message indicating execution order.';\n\tCOMMENT ON COLUMN receipts.message IS 'CID of the message this receipt belongs to.';\n\tCOMMENT ON COLUMN receipts.state_root IS 'CID of the parent state root that this epoch.';\n`)\n\tdown := batch(`\n\tCOMMENT ON TABLE actor_states IS NULL;\n\tCOMMENT ON COLUMN actor_states.code IS NULL;\n\tCOMMENT ON COLUMN actor_states.head IS NULL;\n\tCOMMENT ON COLUMN actor_states.height IS NULL;\n\tCOMMENT ON COLUMN actor_states.state IS NULL;\n\n\tCOMMENT ON TABLE actors IS NULL;\n\tCOMMENT ON COLUMN actors.balance IS NULL;\n\tCOMMENT ON COLUMN actors.code IS NULL;\n\tCOMMENT ON COLUMN actors.head IS NULL;\n\tCOMMENT ON COLUMN actors.height IS NULL;\n\tCOMMENT ON COLUMN actors.id IS NULL;\n\tCOMMENT ON COLUMN actors.nonce IS NULL;\n\tCOMMENT ON COLUMN actors.state_root IS NULL;\n\n\tCOMMENT ON TABLE block_headers IS NULL;\n\tCOMMENT ON COLUMN block_headers.cid IS NULL;\n\tCOMMENT ON COLUMN block_headers.fork_signaling IS NULL;\n\tCOMMENT ON COLUMN block_headers.height IS NULL;\n\tCOMMENT ON COLUMN block_headers.miner IS NULL;\n\tCOMMENT ON COLUMN block_headers.parent_base_fee IS NULL;\n\tCOMMENT ON COLUMN block_headers.parent_state_root IS NULL;\n\tCOMMENT ON COLUMN block_headers.parent_weight IS NULL;\n\tCOMMENT ON COLUMN block_headers.timestamp IS NULL;\n\tCOMMENT ON COLUMN block_headers.win_count IS NULL;\n\n\tCOMMENT ON TABLE block_messages IS NULL;\n\tCOMMENT ON COLUMN block_messages.block IS NULL;\n\tCOMMENT ON COLUMN block_messages.height IS NULL;\n\tCOMMENT ON COLUMN block_messages.message IS NULL;\n\n\tCOMMENT ON TABLE block_parents IS NULL;\n\tCOMMENT ON COLUMN block_parents.block IS NULL;\n\tCOMMENT ON COLUMN block_parents.height IS NULL;\n\tCOMMENT ON COLUMN block_parents.parent IS NULL;\n\n\tCOMMENT ON TABLE chain_economics IS NULL;\n\tCOMMENT ON COLUMN chain_economics.burnt_fil IS NULL;\n\tCOMMENT ON COLUMN chain_economics.circulating_fil IS NULL;\n\tCOMMENT ON COLUMN chain_economics.locked_fil IS NULL;\n\tCOMMENT ON COLUMN chain_economics.mined_fil IS NULL;\n\tCOMMENT ON COLUMN chain_economics.parent_state_root IS NULL;\n\tCOMMENT ON COLUMN chain_economics.vested_fil IS NULL;\n\n\tCOMMENT ON TABLE chain_powers IS NULL;\n\tCOMMENT ON COLUMN chain_powers.height IS NULL;\n\tCOMMENT ON COLUMN chain_powers.miner_count IS NULL;\n\tCOMMENT ON COLUMN chain_powers.participating_miner_count IS NULL;\n\tCOMMENT ON COLUMN chain_powers.qa_smoothed_position_estimate IS NULL;\n\tCOMMENT ON COLUMN chain_powers.qa_smoothed_velocity_estimate IS NULL;\n\tCOMMENT ON COLUMN chain_powers.state_root IS NULL;\n\tCOMMENT ON COLUMN chain_powers.total_pledge_collateral IS NULL;\n\tCOMMENT ON COLUMN chain_powers.total_qa_bytes_committed IS NULL;\n\tCOMMENT ON COLUMN chain_powers.total_qa_bytes_power IS NULL;\n\tCOMMENT ON COLUMN chain_powers.total_raw_bytes_committed IS NULL;\n\tCOMMENT ON COLUMN chain_powers.total_raw_bytes_power IS NULL;\n\n\tCOMMENT ON TABLE chain_rewards IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.cum_sum_baseline IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.cum_sum_realized IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.effective_baseline_power IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.effective_network_time IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.height IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.new_baseline_power IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.new_reward IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.new_reward_smoothed_position_estimate IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.new_reward_smoothed_velocity_estimate IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.state_root IS NULL;\n\tCOMMENT ON COLUMN chain_rewards.total_mined_reward IS NULL;\n\n\tCOMMENT ON TABLE derived_gas_outputs IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.actor_name IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.base_fee_burn IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.cid IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.exit_code IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.from IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_burned IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_fee_cap IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_limit IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_premium IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_refund IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.gas_used IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.height IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.method IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.miner_penalty IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.miner_tip IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.nonce IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.over_estimation_burn IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.parent_base_fee IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.refund IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.size_bytes IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.state_root IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.to IS NULL;\n\tCOMMENT ON COLUMN derived_gas_outputs.value IS NULL;\n\n\tCOMMENT ON TABLE drand_block_entries IS NULL;\n\tCOMMENT ON COLUMN drand_block_entries.block IS NULL;\n\tCOMMENT ON COLUMN drand_block_entries.round IS NULL;\n\n\tCOMMENT ON TABLE id_addresses IS NULL;\n\tCOMMENT ON COLUMN id_addresses.address IS NULL;\n\tCOMMENT ON COLUMN id_addresses.id IS NULL;\n\tCOMMENT ON COLUMN id_addresses.state_root IS NULL;\n\n\tCOMMENT ON TABLE market_deal_proposals IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.client_collateral IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.client_id IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.deal_id IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.end_epoch IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.height IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.is_verified IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.label IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.padded_piece_size IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.piece_cid IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.provider_collateral IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.provider_id IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.start_epoch IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.state_root IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.storage_price_per_epoch IS NULL;\n\tCOMMENT ON COLUMN market_deal_proposals.unpadded_piece_size IS NULL;\n\n\tCOMMENT ON TABLE market_deal_states IS NULL;\n\tCOMMENT ON COLUMN market_deal_states.deal_id IS NULL;\n\tCOMMENT ON COLUMN market_deal_states.height IS NULL;\n\tCOMMENT ON COLUMN market_deal_states.last_update_epoch IS NULL;\n\tCOMMENT ON COLUMN market_deal_states.sector_start_epoch IS NULL;\n\tCOMMENT ON COLUMN market_deal_states.slash_epoch IS NULL;\n\tCOMMENT ON COLUMN market_deal_states.state_root IS NULL;\n\n\tCOMMENT ON TABLE message_gas_economy IS NULL;\n\tCOMMENT ON COLUMN message_gas_economy.base_fee IS NULL;\n\tCOMMENT ON COLUMN message_gas_economy.base_fee_change_log IS NULL;\n\tCOMMENT ON COLUMN message_gas_economy.gas_capacity_ratio IS NULL;\n\tCOMMENT ON COLUMN message_gas_economy.gas_fill_ratio IS NULL;\n\tCOMMENT ON COLUMN message_gas_economy.gas_limit_total IS NULL;\n\tCOMMENT ON COLUMN message_gas_economy.gas_limit_unique_total IS NULL;\n\tCOMMENT ON COLUMN message_gas_economy.gas_waste_ratio IS NULL;\n\tCOMMENT ON COLUMN message_gas_economy.height IS NULL;\n\tCOMMENT ON COLUMN message_gas_economy.state_root IS NULL;\n\n\tCOMMENT ON TABLE messages IS NULL;\n\tCOMMENT ON COLUMN messages.cid IS NULL;\n\tCOMMENT ON COLUMN messages.from IS NULL;\n\tCOMMENT ON COLUMN messages.gas_fee_cap IS NULL;\n\tCOMMENT ON COLUMN messages.gas_premium IS NULL;\n\tCOMMENT ON COLUMN messages.height IS NULL;\n\tCOMMENT ON COLUMN messages.method IS NULL;\n\tCOMMENT ON COLUMN messages.nonce IS NULL;\n\tCOMMENT ON COLUMN messages.size_bytes IS NULL;\n\tCOMMENT ON COLUMN messages.to IS NULL;\n\tCOMMENT ON COLUMN messages.value IS NULL;\n\n\tCOMMENT ON TABLE miner_current_deadline_infos IS NULL;\n\tCOMMENT ON COLUMN miner_current_deadline_infos.challenge IS NULL;\n\tCOMMENT ON COLUMN miner_current_deadline_infos.close IS NULL;\n\tCOMMENT ON COLUMN miner_current_deadline_infos.deadline_index IS NULL;\n\tCOMMENT ON COLUMN miner_current_deadline_infos.fault_cutoff IS NULL;\n\tCOMMENT ON COLUMN miner_current_deadline_infos.height IS NULL;\n\tCOMMENT ON COLUMN miner_current_deadline_infos.miner_id IS NULL;\n\tCOMMENT ON COLUMN miner_current_deadline_infos.open IS NULL;\n\tCOMMENT ON COLUMN miner_current_deadline_infos.period_start IS NULL;\n\tCOMMENT ON COLUMN miner_current_deadline_infos.state_root IS NULL;\n\n\tCOMMENT ON TABLE miner_fee_debts IS NULL;\n\tCOMMENT ON COLUMN miner_fee_debts.fee_debt IS NULL;\n\tCOMMENT ON COLUMN miner_fee_debts.height IS NULL;\n\tCOMMENT ON COLUMN miner_fee_debts.miner_id IS NULL;\n\tCOMMENT ON COLUMN miner_fee_debts.state_root IS NULL;\n\n\tCOMMENT ON TABLE miner_infos IS NULL;\n\tCOMMENT ON COLUMN miner_infos.consensus_faulted_elapsed IS NULL;\n\tCOMMENT ON COLUMN miner_infos.control_addresses IS NULL;\n\tCOMMENT ON COLUMN miner_infos.height IS NULL;\n\tCOMMENT ON COLUMN miner_infos.miner_id IS NULL;\n\tCOMMENT ON COLUMN miner_infos.multi_addresses IS NULL;\n\tCOMMENT ON COLUMN miner_infos.new_worker IS NULL;\n\tCOMMENT ON COLUMN miner_infos.owner_id IS NULL;\n\tCOMMENT ON COLUMN miner_infos.peer_id IS NULL;\n\tCOMMENT ON COLUMN miner_infos.state_root IS NULL;\n\tCOMMENT ON COLUMN miner_infos.worker_id IS NULL;\n\tCOMMENT ON COLUMN miner_infos.worker_change_epoch IS NULL;\n\n\tCOMMENT ON TABLE miner_locked_funds IS NULL;\n\tCOMMENT ON COLUMN miner_locked_funds.height IS NULL;\n\tCOMMENT ON COLUMN miner_locked_funds.initial_pledge IS NULL;\n\tCOMMENT ON COLUMN miner_locked_funds.locked_funds IS NULL;\n\tCOMMENT ON COLUMN miner_locked_funds.miner_id IS NULL;\n\tCOMMENT ON COLUMN miner_locked_funds.pre_commit_deposits IS NULL;\n\tCOMMENT ON COLUMN miner_locked_funds.state_root IS NULL;\n\n\tCOMMENT ON TABLE miner_pre_commit_infos IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.deal_weight IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.expiration_epoch IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.height IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.is_replace_capacity IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.miner_id IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.pre_commit_deposit IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.pre_commit_epoch IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.replace_sector_deadline IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.replace_sector_number IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.replace_sector_partition IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.seal_rand_epoch IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.sealed_cid IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.sector_id IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.state_root IS NULL;\n\tCOMMENT ON COLUMN miner_pre_commit_infos.verified_deal_weight IS NULL;\n\n\tCOMMENT ON TABLE miner_sector_deals IS NULL;\n\tCOMMENT ON COLUMN miner_sector_deals.deal_id IS NULL;\n\tCOMMENT ON COLUMN miner_sector_deals.height IS NULL;\n\tCOMMENT ON COLUMN miner_sector_deals.miner_id IS NULL;\n\tCOMMENT ON COLUMN miner_sector_deals.sector_id IS NULL;\n\n\tCOMMENT ON TABLE miner_sector_events IS NULL;\n\tCOMMENT ON COLUMN miner_sector_events.event IS NULL;\n\tCOMMENT ON COLUMN miner_sector_events.height IS NULL;\n\tCOMMENT ON COLUMN miner_sector_events.miner_id IS NULL;\n\tCOMMENT ON COLUMN miner_sector_events.sector_id IS NULL;\n\tCOMMENT ON COLUMN miner_sector_events.state_root IS NULL;\n\n\tCOMMENT ON TABLE miner_sector_infos IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.activation_epoch IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.deal_weight IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.expected_day_reward IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.expected_storage_pledge IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.expiration_epoch IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.height IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.initial_pledge IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.miner_id IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.sealed_cid IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.sector_id IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.state_root IS NULL;\n\tCOMMENT ON COLUMN miner_sector_infos.verified_deal_weight IS NULL;\n\n\tCOMMENT ON TABLE miner_sector_posts IS NULL;\n\tCOMMENT ON COLUMN miner_sector_posts.height IS NULL;\n\tCOMMENT ON COLUMN miner_sector_posts.miner_id IS NULL;\n\tCOMMENT ON COLUMN miner_sector_posts.post_message_cid IS NULL;\n\tCOMMENT ON COLUMN miner_sector_posts.sector_id IS NULL;\n\n\tCOMMENT ON TABLE multisig_transactions IS NULL;\n\tCOMMENT ON COLUMN multisig_transactions.approved IS NULL;\n\tCOMMENT ON COLUMN multisig_transactions.height IS NULL;\n\tCOMMENT ON COLUMN multisig_transactions.method IS NULL;\n\tCOMMENT ON COLUMN multisig_transactions.multisig_id IS NULL;\n\tCOMMENT ON COLUMN multisig_transactions.params IS NULL;\n\tCOMMENT ON COLUMN multisig_transactions.state_root IS NULL;\n\tCOMMENT ON COLUMN multisig_transactions.to IS NULL;\n\tCOMMENT ON COLUMN multisig_transactions.transaction_id IS NULL;\n\tCOMMENT ON COLUMN multisig_transactions.value IS NULL;\n\n\tCOMMENT ON TABLE parsed_messages IS NULL;\n\tCOMMENT ON COLUMN parsed_messages.cid IS NULL;\n\tCOMMENT ON COLUMN parsed_messages.from IS NULL;\n\tCOMMENT ON COLUMN parsed_messages.height IS NULL;\n\tCOMMENT ON COLUMN parsed_messages.method IS NULL;\n\tCOMMENT ON COLUMN parsed_messages.params IS NULL;\n\tCOMMENT ON COLUMN parsed_messages.to IS NULL;\n\tCOMMENT ON COLUMN parsed_messages.value IS NULL;\n\n\tCOMMENT ON TABLE power_actor_claims IS NULL;\n\tCOMMENT ON COLUMN power_actor_claims.height IS NULL;\n\tCOMMENT ON COLUMN power_actor_claims.miner_id IS NULL;\n\tCOMMENT ON COLUMN power_actor_claims.quality_adj_power IS NULL;\n\tCOMMENT ON COLUMN power_actor_claims.raw_byte_power IS NULL;\n\tCOMMENT ON COLUMN power_actor_claims.state_root IS NULL;\n\n\tCOMMENT ON TABLE receipts IS NULL;\n\tCOMMENT ON COLUMN receipts.exit_code IS NULL;\n\tCOMMENT ON COLUMN receipts.gas_used IS NULL;\n\tCOMMENT ON COLUMN receipts.height IS NULL;\n\tCOMMENT ON COLUMN receipts.idx IS NULL;\n\tCOMMENT ON COLUMN receipts.message IS NULL;\n\tCOMMENT ON COLUMN receipts.state_root IS NULL;\n`)\n\n\tpatches.MustRegisterTx(up, down)\n}", "title": "" }, { "docid": "fbbbbd8e8cce031d6cec1f8cebc0bc65", "score": "0.46303397", "text": "func Cockroach_LoadTables(db *sqlx.DB, schema string, relkind string) (res []*Table, err error) {\n\t// sql query\n\tconst sqlstr = `SELECT * ` +\n\t\t`FROM information_schema.tables ` +\n\t\t`WHERE table_catalog = $1 and table_schema = 'public' AND table_type = $2`\n\n\t// run query\n\tXOLogDebug(sqlstr, schema, relkind)\n\n\tvar res2 = []struct {\n\t\tTABLE_NAME string `db:\"table_name\"` //`json:\"rec_created_by\" db:\"TABLE_NAME\"`\n\t\t//AUTO_INCREMENT sql.NullInt64 `db:\"table_name\"`\n\t}{}\n\terr = db.Unsafe().Select(&res2, sqlstr, schema, relkind)\n\tNoErr(err)\n\n\t//fmt.Println(\"Mysql loader - load tables: \", res2)\n\n\tfor i, r := range res2 {\n\t\tt := &Table{\n\t\t\tTableName: r.TABLE_NAME,\n\t\t\tTableSchemeOut: fmt.Sprintf(\"%s.%s\", schema, r.TABLE_NAME), //fmt.Sprintf(\"`%s`.`%s`\", schema, r.TABLE_NAME),\n\t\t\tTableNameSql: r.TABLE_NAME, //fmt.Sprintf(\"`%s`.`%s`\", schema, r.TABLE_NAME),\n\t\t\tDataBase: schema,\n\t\t\tSeq: i,\n\t\t\tTableNameGo: SingularizeIdentifier(r.TABLE_NAME), //,SnakeToCamel(r.TABLE_NAME),\n\t\t\tTableNameJava: SingularizeIdentifier(r.TABLE_NAME), //SnakeToCamel(r.TABLE_NAME),\n\t\t\t//TableNamePB: \"PB_\" + SingularizeIdentifier(r.TABLE_NAME), //SnakeToCamel(r.TABLE_NAME),\n\t\t\tTableNamePB: \"\" + SingularizeIdentifier(r.TABLE_NAME), //SnakeToCamel(r.TABLE_NAME),\n\t\t\tShortName: shortname(r.TABLE_NAME, \"err\", \"res\", \"sqlstr\", \"db\", \"XOLog\"),\n\t\t\tNeedTrigger: needTriggerTable(r.TABLE_NAME),\n\t\t\tIsMysql: false,\n\t\t\tIsPG: true,\n\t\t\tDollar: \"$1\",\n\t\t}\n\t\t/*if r.AUTO_INCREMENT.Valid {\n\t\t\tt.IsAutoIncrement = true\n\t\t}*/\n\t\tt.IsAutoIncrement = false\n\t\tif t.NeedTrigger {\n\n\t\t}\n\t\tres = append(res, t)\n\t}\n\t//helper.PertyPrint(res)\n\n\treturn res, nil\n}", "title": "" }, { "docid": "ccb3631eec132d87bfbe30a159d1a914", "score": "0.4589792", "text": "func Table_field_list(table_str string,database_name string,database_str string)([]string,error){\n\n\t//sql_str:=\"SELECT COLUMN_NAME FROM INFORMATION_SCHEMA.Columns WHERE table_name='room_info' AND table_schema='mj_database'\"\n\tsql_str:=\"SELECT COLUMN_NAME FROM INFORMATION_SCHEMA.Columns WHERE table_name='\"+table_str+\"' and table_schema='\"+database_name+\"'\"\n\n\tvar table_list []string\n\n\tresult,err:=Mysql_connect_query_config_api(sql_str,database_str)\n\n\t//fmt.Println(data_source)\n\n\t//create table list\n\n\tif err!=nil {\n\t\treturn table_list,err\n\t}\n\n\n\n\tfor _, value := range result {\n\t\ttable_list = append(table_list, value[\"COLUMN_NAME\"])\n\t}\n\n\treturn table_list,err\n\n}", "title": "" }, { "docid": "8f45339814af92ce483b33c584a421ed", "score": "0.45785335", "text": "func CopyRoutesTable(srcTable int, ifindex int, dstTable int) {\n}", "title": "" }, { "docid": "2b34dae18688c1a9689c58b2874e2de9", "score": "0.45729595", "text": "func (d *Dumper) generatedFields(conn *Connection, table string) (map[string]bool, error) {\n\tqr, err := conn.Fetch(fmt.Sprintf(\"SHOW FIELDS FROM `%s`\", table))\n\tif err != nil {\n\t\treturn nil, err\n\n\t}\n\n\tfields := map[string]bool{}\n\tfor _, t := range qr.Rows {\n\t\tif len(t) != 6 {\n\t\t\treturn nil, fmt.Errorf(\"error fetching fields, expecting to have 6 columns, have: %d\", len(t))\n\t\t}\n\n\t\tname := t[0].String()\n\t\textra := t[5].String()\n\n\t\t// Can be either \"VIRTUAL GENERATED\" or \"VIRTUAL STORED\"\n\t\t// https://dev.mysql.com/doc/refman/8.0/en/show-columns.html\n\t\tif strings.Contains(extra, \"VIRTUAL\") {\n\t\t\tfields[name] = true\n\t\t}\n\t}\n\n\treturn fields, nil\n}", "title": "" }, { "docid": "e48f166dca35048df31974dbb90cdbc5", "score": "0.45375887", "text": "func getGateways() ([]Gateway, error) {\n f, err := os.Open(\"/proc/net/route\")\n if err != nil {\n return nil, err\n }\n defer f.Close()\n\n r := bufio.NewReader(f)\n\n // Skip first line (header)\n r.ReadString('\\n')\n\n var gateways []Gateway\n for {\n line, err := r.ReadString('\\n')\n if err == io.EOF {\n return gateways, nil\n } else if err != nil {\n return nil, err\n }\n\n cols := strings.Fields(line)\n\n // Read IP in native endianness format\n ipInt64, err := strconv.ParseUint(cols[2], 16, 32)\n if err != nil {\n return nil, err\n }\n\n // Go is an ass, and we won't be working with it again\n ipInt32 := uint32(ipInt64)\n ipBytes := *(*[4]byte)(unsafe.Pointer(&ipInt32))\n\n // Skip lines where gateway is zero (no gateway)\n ip := net.IP(ipBytes[:])\n if ip.Equal(net.IPv4zero) {\n continue\n }\n\n // Also get the corresponding interface so we know\n // where to send our ARP packets\n iface, err := net.InterfaceByName(cols[0])\n if err != nil {\n return nil, err\n }\n\n gateways = append(gateways, Gateway{\n ip: ip,\n iface: iface,\n })\n }\n}", "title": "" }, { "docid": "573560c0c3e14591c93156036e008cf1", "score": "0.45266163", "text": "func (p *ConnPool) GetAllMatchingDetails(table, pattern string) ([]string, *errors.Error) {\n\treadConn := p.ReadPool.Get()\n\tdefer readConn.Close()\n\tkeys, err := readConn.Do(\"KEYS\", table+\":*\"+pattern+\"*\")\n\tif err != nil {\n\t\tif errs, aye := isDbConnectError(err); aye {\n\t\t\treturn nil, errs\n\t\t}\n\t\treturn nil, errors.PackError(errors.UndefinedErrorType, errorCollectingData, err)\n\t}\n\tvar IDs []string\n\tfor _, data := range keys.([]interface{}) {\n\t\tkey := string(data.([]uint8))\n\t\tID := strings.TrimPrefix(key, table+\":\")\n\t\tIDs = append(IDs, ID)\n\t}\n\treturn IDs, nil\n}", "title": "" }, { "docid": "2f86a58f3567af6181933112e7906cb6", "score": "0.45116705", "text": "func TableOptsFromCapture(capture *types.Capture) flow.TableOpts {\n\tlayerKeyMode, _ := flow.LayerKeyModeByName(capture.LayerKeyMode)\n\n\treturn flow.TableOpts{\n\t\tRawPacketLimit: int64(capture.RawPacketLimit),\n\t\tExtraTCPMetric: capture.ExtraTCPMetric,\n\t\tIPDefrag: capture.IPDefrag,\n\t\tReassembleTCP: capture.ReassembleTCP,\n\t\tLayerKeyMode: layerKeyMode,\n\t\tExtraLayers: flow.ExtraLayers(capture.ExtraLayers),\n\t}\n}", "title": "" }, { "docid": "1a4130e13fdd829c78d27523bcc4d28d", "score": "0.44970304", "text": "func PrepareCsv(data types.NmapRun, altout bool) [][]string {\n\tvar result [][]string\n\n\tfieldHeadings := []string{\"Host IP\", \"Host Scan Start\", \"Host Scan End\", \"Host State\", \"Host State Reason\",\n\t\t\"Hostnames\", \"OS\", \"OS-match Accuracy\", \"OS Type\", \"OS Vendor\", \"OS Family\", \"OS Gen\", \"Last Boot\",\n\t\t\"Port ID\", \"Port State\", \"Port State Reason\", \"Service Name\", \"Service Product\", \"Service Version\",\n\t\t\"Service Hostname\", \"Service OSType\", \"Service Extrainfo\", \"Service Tunnel\", \"Service Method\",\n\t\t\"Service Confidence\", \"Service FP String\"}\n\n\tresult = append(result, fieldHeadings)\n\n\tfor _, host := range data.Hosts {\n\t\tvar hostnames string\n\n\t\tfor i, hostname := range host.Hostnames {\n\t\t\tvar singleHN string\n\t\t\tif i+1 == len(host.Hostnames) {\n\t\t\t\tsingleHN = fmt.Sprintf(\"%s : %s\", hostname.Name, hostname.HNType)\n\t\t\t} else {\n\t\t\t\tsingleHN = fmt.Sprintf(\"%s : %s --\", hostname.Name, hostname.HNType)\n\t\t\t}\n\t\t\thostnames += singleHN\n\t\t}\n\n\t\tif len(host.Ports) == 0 {\n\t\t\tvar tmp []string\n\t\t\ttmp = append(tmp, host.Address.Addr, strconv.Itoa(host.Starttime), strconv.Itoa(host.Endtime),\n\t\t\t\thost.Status.State, host.Status.Reason, hostnames, host.Os.OsMatch.Name, strconv.Itoa(host.Os.OsMatch.Accuracy),\n\t\t\t\thost.Os.OsMatch.OsClass.Type, host.Os.OsMatch.OsClass.Vendor, host.Os.OsMatch.OsClass.OsFamily,\n\t\t\t\thost.Os.OsMatch.OsClass.OsGen, host.Uptime.Lastboot, \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\",)\n\t\t\t\tresult = append(result, tmp)\n\t\t}\n\n\t\tfor i, port := range host.Ports {\n\t\t\tvar thisRow []string\n\t\t\tif altout && (i != 0) {\n\t\t\t\tthisRow = append(thisRow, \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", \"\", strconv.Itoa(port.Portid),\n\t\t\t\t\tport.State.State, port.State.Reason, port.Service.Name, port.Service.Product, port.Service.Version,\n\t\t\t\t\tport.Service.Hostname, port.Service.OsType, port.Service.Extrainfo, port.Service.Tunnel,\n\t\t\t\t\tport.Service.Method, strconv.Itoa(port.Service.Conf), port.Service.ServiceFP)\n\t\t\t} else {\n\t\t\t\tthisRow = append(thisRow, host.Address.Addr, strconv.Itoa(host.Starttime), strconv.Itoa(host.Endtime),\n\t\t\t\t\thost.Status.State, host.Status.Reason, hostnames, host.Os.OsMatch.Name, strconv.Itoa(host.Os.OsMatch.Accuracy),\n\t\t\t\t\thost.Os.OsMatch.OsClass.Type, host.Os.OsMatch.OsClass.Vendor, host.Os.OsMatch.OsClass.OsFamily,\n\t\t\t\t\thost.Os.OsMatch.OsClass.OsGen, host.Uptime.Lastboot, strconv.Itoa(port.Portid), port.State.State,\n\t\t\t\t\tport.State.Reason, port.Service.Name, port.Service.Product, port.Service.Version, port.Service.Hostname,\n\t\t\t\t\tport.Service.OsType, port.Service.Extrainfo, port.Service.Tunnel, port.Service.Method,\n\t\t\t\t\tstrconv.Itoa(port.Service.Conf), port.Service.ServiceFP)\n\t\t\t}\n\t\t\tresult = append(result, thisRow)\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "ed02fa185c62a72314748850da8ba76c", "score": "0.44911498", "text": "func gatherKeyspaceLine(\n\tname string,\n\tline string,\n\t//acc telegraf.Accumulator,\n\tglobalTags map[string]string,\n) {\n\tif strings.Contains(line, \"keys=\") {\n\t\tfields := make(map[string]interface{})\n\t\ttags := make(map[string]string)\n\t\tfor k, v := range globalTags {\n\t\t\ttags[k] = v\n\t\t}\n\t\ttags[\"database\"] = name\n\t\tdbparts := strings.Split(line, \",\")\n\t\tfor _, dbp := range dbparts {\n\t\t\tkv := strings.Split(dbp, \"=\")\n\t\t\tival, err := strconv.ParseInt(kv[1], 10, 64)\n\t\t\tif err == nil {\n\t\t\t\tfields[kv[0]] = ival\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c8d4bb774147aaf36d03851f68272925", "score": "0.44788244", "text": "func (db *DB) loadExCreateTable(tbl string, info *StructInfo) error {\n\toptions := NewTableCreateOptions()\n\tfor i := 0; i < info.NumField(); i++ {\n\t\tfield := info.Field(i)\n\t\tswitch field.ColumnName() {\n\t\tcase \"_key\":\n\t\t\t// grnci:\"name;key_type;flags;default_tokenizer;normalizer;token_filters\"\n\t\t\tif field.Dimension() != 0 {\n\t\t\t\treturn fmt.Errorf(\"vector key is not supported\")\n\t\t\t}\n\t\t\tif len(field.Tag(1)) != 0 {\n\t\t\t\toptions.KeyType = field.Tag(1)\n\t\t\t} else {\n\t\t\t\tswitch field.TerminalType() {\n\t\t\t\tcase boolType:\n\t\t\t\t\toptions.KeyType = \"Bool\"\n\t\t\t\tcase intType:\n\t\t\t\t\toptions.KeyType = \"Int64\"\n\t\t\t\tcase floatType:\n\t\t\t\t\toptions.KeyType = \"Float\"\n\t\t\t\tcase timeType:\n\t\t\t\t\toptions.KeyType = \"Time\"\n\t\t\t\tcase textType:\n\t\t\t\t\toptions.KeyType = \"ShortText\"\n\t\t\t\tcase geoType:\n\t\t\t\t\toptions.KeyType = \"WGS84GeoPoint\"\n\t\t\t\tdefault:\n\t\t\t\t\treturn fmt.Errorf(\"unsupported key type\")\n\t\t\t\t}\n\t\t\t}\n\t\t\tif len(field.Tag(2)) != 0 {\n\t\t\t\toptions.Flags = field.Tag(2)\n\t\t\t}\n\t\t\tif len(field.Tag(3)) != 0 {\n\t\t\t\toptions.DefaultTokenizer = field.Tag(3)\n\t\t\t}\n\t\t\tif len(field.Tag(4)) != 0 {\n\t\t\t\toptions.Normalizer = field.Tag(4)\n\t\t\t}\n\t\t\tif len(field.Tag(5)) != 0 {\n\t\t\t\toptions.TokenFilters = field.Tag(5)\n\t\t\t}\n\t\tcase \"_value\":\n\t\t\t// grnci:\"name;value_type\"\n\t\t\tif field.Dimension() != 0 {\n\t\t\t\treturn fmt.Errorf(\"vector value is not supported\")\n\t\t\t}\n\t\t\tif len(field.Tag(1)) != 0 {\n\t\t\t\toptions.ValueType = field.Tag(1)\n\t\t\t} else {\n\t\t\t\tswitch field.TerminalType() {\n\t\t\t\tcase boolType:\n\t\t\t\t\toptions.ValueType = \"Bool\"\n\t\t\t\tcase intType:\n\t\t\t\t\toptions.ValueType = \"Int64\"\n\t\t\t\tcase floatType:\n\t\t\t\t\toptions.ValueType = \"Float\"\n\t\t\t\tcase timeType:\n\t\t\t\t\toptions.ValueType = \"Time\"\n\t\t\t\tcase geoType:\n\t\t\t\t\toptions.ValueType = \"WGS84GeoPoint\"\n\t\t\t\tdefault:\n\t\t\t\t\treturn fmt.Errorf(\"unsupported value type\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn db.TableCreate(tbl, options)\n}", "title": "" }, { "docid": "5ee593d35fb58df44dc3578180377712", "score": "0.44754314", "text": "func ScanTables(ctx context.Context, conn *pgx.Conn) ([]Table, error) {\n\tcolumns, err := swodb.New(conn).TableColumns(ctx)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"scan table columns: %w\", err)\n\t}\n\n\trefs, err := swodb.New(conn).ForeignKeyRefs(ctx)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"scan foreign keys: %w\", err)\n\t}\n\n\ttables := make(map[string]*Table)\n\tfor _, cRow := range columns {\n\t\tswitch cRow.ColTableName {\n\t\tcase \"engine_processing_versions\", \"gorp_migrations\":\n\t\t\t// skip migrate-only tables\n\t\t\tcontinue\n\t\tcase \"switchover_state\", \"switchover_log\", \"change_log\":\n\t\t\t// skip SWO tables\n\t\t\tcontinue\n\t\t}\n\n\t\tif tables[cRow.ColTableName] == nil {\n\t\t\ttables[cRow.ColTableName] = &Table{name: cRow.ColTableName, deps: make(map[string]struct{})}\n\t\t}\n\n\t\ttables[cRow.ColTableName].cols = append(tables[cRow.ColTableName].cols, column(cRow))\n\t\tif cRow.ColColumnName == \"id\" {\n\t\t\ttables[cRow.ColTableName].id = column(cRow)\n\t\t}\n\t}\n\n\tfor _, t := range tables {\n\t\tif t.id.ColColumnName == \"\" {\n\t\t\treturn nil, fmt.Errorf(\"table %s has no id column\", t.name)\n\t\t}\n\t}\n\n\tfor _, fRow := range refs {\n\t\ttables[fRow.SrcRelname].deps[fRow.DstRelname] = struct{}{}\n\t}\n\n\tvar tableList []*Table\n\tfor _, t := range tables {\n\t\tsort.Slice(t.cols, func(i, j int) bool {\n\t\t\treturn t.cols[i].ColOrdinalPosition < t.cols[j].ColOrdinalPosition\n\t\t})\n\t\ttableList = append(tableList, t)\n\t}\n\n\t// sort tables by name\n\tsort.Slice(tableList, func(i, j int) bool {\n\t\treturn tableList[i].name < tableList[j].name\n\t})\n\n\t// take the next table, remove it from other dependency lists\n\tpick := func(i int) *Table {\n\t\tt := tableList[i]\n\t\ttableList = append(tableList[:i], tableList[i+1:]...)\n\n\t\t// delete table name from all deps\n\t\tfor _, t2 := range tableList {\n\t\t\tdelete(t2.deps, t.name)\n\t\t}\n\n\t\treturn t\n\t}\n\n\t// get the next table to pick (zero dependencies)\n\tnext := func() *Table {\n\t\tfor i, t := range tableList {\n\t\t\tif len(t.deps) == 0 {\n\t\t\t\treturn pick(i)\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tvar result []Table\n\tfor {\n\t\tt := next()\n\t\tif t == nil {\n\t\t\tbreak\n\t\t}\n\t\tresult = append(result, *t)\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "4f99edebb7ef84a2a59cd0e9cab10d5f", "score": "0.44748083", "text": "func main() {\n\tr := csv.NewReader(os.Stdin)\n\thead, err := r.Read()\n\t// `url,username,password,extra,name,grouping,fav`\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\torder := make(map[string]int, 7)\n\tfor i, nm := range head {\n\t\tswitch nm {\n\t\tcase \"url\", \"username\", \"password\", \"extra\", \"name\", \"grouping\", \"fav\":\n\t\t\torder[nm] = i\n\t\tdefault:\n\t\t\tlog.Printf(\"WARN: unknown field %q\", nm)\n\t\t}\n\t}\n\tw := io.WriteCloser(os.Stdout)\n\tdefer w.Close()\n\tio.WriteString(w, \"<!DOCTYPE KEEPASSX_DATABASE>\\n<database>\\n<group><title>Import</title><icon>1</icon>\\n\")\n\tdefer io.WriteString(w, \"</group></database>\")\n\n\tenc := xml.NewEncoder(w)\n\tdefer enc.Flush()\n\tenc.Indent(\"\", \" \")\n\n\tfor {\n\t\trow, err := r.Read()\n\t\tif err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tlog.Printf(\"ROW=%q\", row)\n\t\tvar rec entry\n\t\tfor nm, i := range order {\n\t\t\tswitch nm {\n\t\t\tcase \"url\":\n\t\t\t\trec.URL = row[i]\n\t\t\tcase \"username\":\n\t\t\t\trec.Username = row[i]\n\t\t\tcase \"password\":\n\t\t\t\trec.Password = row[i]\n\t\t\tcase \"extra\":\n\t\t\t\trec.Comment = row[i]\n\t\t\tcase \"name\":\n\t\t\t\trec.Title = row[i]\n\t\t\t\t//case \"grouping\":\n\t\t\t\t//rec.Group = row[i]\n\t\t\t}\n\t\t}\n\t\trec.Expire = NotExpire\n\n\t\tif err = enc.Encode(rec); err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tenc.Flush()\n\t}\n}", "title": "" }, { "docid": "a8e758e0af2638f29b7a8c7086b7535e", "score": "0.44662413", "text": "func MakeBpForIfTable(id collectdevice.ID, dev *SnmpDevice) {\n\tfor j := 0; j < len(dev.IfTable.ifEntry); j++ {\n\t\t// remove loopback interface\n\t\tif dev.IfTable.ifEntry[j].ifName == \"lo\" {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Table name, tags, fields\n\t\tname := reflect.TypeOf(dev.IfTable).Name()\n\t\ttags := MakeTagForInfluxDB(id, dev.Device.Ip)\n\t\t//fields := MakeFieldForInfluxDB(dev.IfTable.ifEntry[j])\n\t\tfields := map[string]interface{}{\n\t\t\t\"ifindex\" \t\t: dev.IfTable.ifEntry[j].ifIndex,\n\t\t\t\"descr\" \t\t: dev.IfTable.ifEntry[j].ifDescr,\n\t\t\t\"type\" \t\t\t: dev.IfTable.ifEntry[j].ifType,\n\t\t\t\"mtu\" \t\t\t: dev.IfTable.ifEntry[j].ifMTU,\n\t\t\t\"speed\" \t\t: dev.IfTable.ifEntry[j].ifSpeed,\n\t\t\t\"physaddress\" \t: dev.IfTable.ifEntry[j].ifPhysAddress,\n\t\t\t\"adminstatus\" \t: dev.IfTable.ifEntry[j].ifAdminStatus,\n\t\t\t\"operstatus\" \t: dev.IfTable.ifEntry[j].ifOperStatus,\n\t\t\t\"lastchange\" \t: dev.IfTable.ifEntry[j].ifLastChange,\n\t\t\t\"in-octets\" \t: dev.IfTable.ifEntry[j].ifInOctets,\n\t\t\t\"in-ucastpkts\" \t: dev.IfTable.ifEntry[j].ifInUcastPkts,\n\t\t\t\"in-n-ucastpkts\" : dev.IfTable.ifEntry[j].ifInNUcastPkts,\n\t\t\t\"in-discards\" \t: dev.IfTable.ifEntry[j].ifInDiscards,\n\t\t\t\"in-errors\" \t: dev.IfTable.ifEntry[j].ifInErrors,\n\t\t\t\"out-octets\" \t: dev.IfTable.ifEntry[j].ifOutOctets,\n\t\t\t\"out-ucastpkts\" : dev.IfTable.ifEntry[j].ifOutUcastPkts,\n\t\t\t\"out-n-ucastpkts\" : dev.IfTable.ifEntry[j].ifOutNUcastPkts,\n\t\t\t\"out-discards\" \t: dev.IfTable.ifEntry[j].ifOutDiscards,\n\t\t\t\"out-errors\" \t: dev.IfTable.ifEntry[j].ifOutErrors,\n\t\t\t\"out-qlen\" \t\t: dev.IfTable.ifEntry[j].ifOutQLen,\n\t\t\t\"ifspecific\" \t: dev.IfTable.ifEntry[j].ifSpecific,\n\t\t\t\"ifname\" \t\t: dev.IfTable.ifEntry[j].ifName,\n\t\t\t\"hc-in-octets\" \t: dev.IfTable.ifEntry[j].ifHCInOctets,\n\t\t\t\"hc-out-octets\" : dev.IfTable.ifEntry[j].ifHCOutOctets,\n\t\t}\n\n\t\t// Add batch point\n\t\tif AddBpToInflux(name, tags, fields) != nil {\n\t\t\tlib.LogWarn(\"Failed to store IfTable info.\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4f188e4576c2e6ae3e1b273beb4eb614", "score": "0.4458623", "text": "func (p *PostgresDriver) ForeignKeyInfo(tableName string) ([]bdb.ForeignKey, error) {\n\tvar fkeys []bdb.ForeignKey\n\n\tquery := `\n\tselect\n\t\ttc.constraint_name,\n\t\tkcu.table_name as source_table,\n\t\tkcu.column_name as source_column,\n\t\tccu.table_name as dest_table,\n\t\tccu.column_name as dest_column\n\tfrom information_schema.table_constraints as tc\n\t\tinner join information_schema.key_column_usage as kcu ON tc.constraint_name = kcu.constraint_name\n\t\tinner join information_schema.constraint_column_usage as ccu ON tc.constraint_name = ccu.constraint_name\n\twhere tc.table_name = $1 and tc.constraint_type = 'FOREIGN KEY' and tc.table_schema = 'public';`\n\n\tvar rows *sql.Rows\n\tvar err error\n\tif rows, err = p.dbConn.Query(query, tableName); err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor rows.Next() {\n\t\tvar fkey bdb.ForeignKey\n\t\tvar sourceTable string\n\n\t\tfkey.Table = tableName\n\t\terr = rows.Scan(&fkey.Name, &sourceTable, &fkey.Column, &fkey.ForeignTable, &fkey.ForeignColumn)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfkeys = append(fkeys, fkey)\n\t}\n\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn fkeys, nil\n}", "title": "" }, { "docid": "6618819c9983665bf00464ee1b53b4e7", "score": "0.44401693", "text": "func dumpTable(w io.Writer, db dbQ, database, table, user string) error {\n\tcolSpec := \"*\"\n\tvar discard int\n\tquery := `select 1 from information_schema.table_privileges where privilege_type=\"SELECT\"\n\t\tand table_schema=? and table_name=? and INSTR(grantee, ?)=1`\n\terr := db.QueryRow(query, database, table, \"'\"+user+\"'\").Scan(&discard)\n\tswitch err {\n\tcase nil: // guaranteed to have explicit select privilege on table\n\t\tgoto doDump\n\tcase sql.ErrNoRows: // either we have implicit privileges OR only per-column privileges\n\tdefault:\n\t\treturn err\n\t}\n\tif cols, err := selectableColumns(db, database, table); err != nil {\n\t\treturn err\n\t} else if len(cols) > 0 {\n\t\tfor _, name := range cols {\n\t\t\tif !validName(name) {\n\t\t\t\treturn fmt.Errorf(\"column name %q of table %q cannot be used as unquoted MySQL identifier\", name, table)\n\t\t\t}\n\t\t}\n\t\tcolSpec = strings.Join(cols, \",\")\n\t}\ndoDump:\n\trows, err := db.Query(\"SELECT \" + colSpec + \" from \" + table)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer rows.Close()\n\tvar hasHdr bool\n\tvar vals []string\n\tvar ptrs []interface{}\n\tout := csv.NewWriter(w)\n\tdefer out.Flush()\n\tfor rows.Next() {\n\t\tif !hasHdr {\n\t\t\tnames, err := rows.Columns()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := out.Write(names); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tvals = make([]string, len(names))\n\t\t\tptrs = make([]interface{}, len(names))\n\t\t\tfor i := range ptrs {\n\t\t\t\tptrs[i] = &sql.NullString{}\n\t\t\t}\n\t\t\thasHdr = true\n\t\t}\n\t\tif err := rows.Scan(ptrs...); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor i, v := range ptrs {\n\t\t\tv := v.(*sql.NullString)\n\t\t\tswitch {\n\t\t\tcase v.Valid:\n\t\t\t\tvals[i] = v.String\n\t\t\tdefault:\n\t\t\t\tvals[i] = \"NULL\"\n\t\t\t}\n\t\t}\n\t\tif err := out.Write(vals); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif err := rows.Err(); err != nil {\n\t\treturn err\n\t}\n\tout.Flush()\n\treturn out.Error()\n}", "title": "" }, { "docid": "f6b424f9f8d2a09c0c658a0d6ffa5be9", "score": "0.44282544", "text": "func MakeSplitCreateTableSql(schema, databaseName, tableName string, strategy string) (string, string, error) {\n\talters := make([]string, 0, 5)\n\tlines := strings.Split(schema, \"\\n\")\n\tdelayPrimaryKey := strings.Contains(strategy, \"delayPrimaryKey\")\n\tdelaySecondaryIndexes := strings.Contains(strategy, \"delaySecondaryIndexes\")\n\tuseMyIsam := strings.Contains(strategy, \"useMyIsam\")\n\n\tfor i, line := range lines {\n\t\tif strings.HasPrefix(line, \"CREATE TABLE `\") {\n\t\t\tlines[i] = strings.Replace(line, \"CREATE TABLE `\", \"CREATE TABLE `\"+databaseName+\"`.`\", 1)\n\t\t\tcontinue\n\t\t}\n\n\t\tif strings.Contains(line, \" AUTO_INCREMENT\") {\n\t\t\t// only add to the final ALTER TABLE if we're not\n\t\t\t// dropping the AUTO_INCREMENT on the table\n\t\t\tif strings.Contains(strategy, \"skipAutoIncrement(\"+tableName+\")\") {\n\t\t\t\tlog.Infof(\"Will not add AUTO_INCREMENT back on table %v\", tableName)\n\t\t\t} else {\n\t\t\t\talters = append(alters, \"MODIFY \"+line[:len(line)-1])\n\t\t\t}\n\t\t\tlines[i] = strings.Replace(line, \" AUTO_INCREMENT\", \"\", 1)\n\t\t\tcontinue\n\t\t}\n\n\t\tisPrimaryKey := strings.Contains(line, \" PRIMARY KEY\")\n\t\tisSecondaryIndex := !isPrimaryKey && strings.Contains(line, \" KEY\")\n\t\tif (isPrimaryKey && delayPrimaryKey) || (isSecondaryIndex && delaySecondaryIndexes) {\n\n\t\t\t// remove the comma at the end of the previous line,\n\t\t\tlines[i-1] = lines[i-1][:len(lines[i-1])-1]\n\n\t\t\t// keep our comma if any (so the next index\n\t\t\t// might remove it)\n\t\t\t// also add the key definition to the alters\n\t\t\tif strings.HasSuffix(line, \",\") {\n\t\t\t\tlines[i] = \",\"\n\t\t\t\talters = append(alters, \"ADD \"+line[:len(line)-1])\n\t\t\t} else {\n\t\t\t\tlines[i] = \"\"\n\t\t\t\talters = append(alters, \"ADD \"+line)\n\t\t\t}\n\t\t}\n\n\t\tif useMyIsam && strings.Contains(line, \" ENGINE=InnoDB\") {\n\t\t\tlines[i] = strings.Replace(line, \" ENGINE=InnoDB\", \" ENGINE=MyISAM\", 1)\n\t\t\talters = append(alters, \"ENGINE=InnoDB\")\n\t\t}\n\t}\n\n\talter := \"\"\n\tif len(alters) > 0 {\n\t\talter = \"ALTER TABLE `\" + databaseName + \"`.`\" + tableName + \"` \" + strings.Join(alters, \", \")\n\t}\n\treturn strings.Join(lines, \"\\n\"), alter, nil\n}", "title": "" }, { "docid": "8080021a61199b2bdc7baa1936b7516d", "score": "0.44153702", "text": "func resourceAwsRouteTableImportState(\n\td *schema.ResourceData,\n\tmeta interface{}) ([]*schema.ResourceData, error) {\n\tconn := meta.(*AWSClient).ec2conn\n\n\t// First query the resource itself\n\tid := d.Id()\n\tresp, err := conn.DescribeRouteTables(&ec2.DescribeRouteTablesInput{\n\t\tRouteTableIds: []*string{&id},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(resp.RouteTables) < 1 || resp.RouteTables[0] == nil {\n\t\treturn nil, fmt.Errorf(\"route table %s is not found\", id)\n\t}\n\ttable := resp.RouteTables[0]\n\n\t// Start building our results\n\tresults := make([]*schema.ResourceData, 1,\n\t\t2+len(table.Associations)+len(table.Routes))\n\tresults[0] = d\n\n\t{\n\t\t// Construct the routes\n\t\tsubResource := resourceAwsRoute()\n\t\tfor _, route := range table.Routes {\n\t\t\t// Ignore the local/default route\n\t\t\tif route.GatewayId != nil && *route.GatewayId == \"local\" {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif route.DestinationPrefixListId != nil {\n\t\t\t\t// Skipping because VPC endpoint routes are handled separately\n\t\t\t\t// See aws_vpc_endpoint\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Minimal data for route\n\t\t\td := subResource.Data(nil)\n\t\t\td.SetType(\"aws_route\")\n\t\t\td.Set(\"route_table_id\", id)\n\t\t\td.Set(\"destination_cidr_block\", route.DestinationCidrBlock)\n\t\t\td.Set(\"destination_ipv6_cidr_block\", route.DestinationIpv6CidrBlock)\n\t\t\td.SetId(routeIDHash(d, route))\n\t\t\tresults = append(results, d)\n\t\t}\n\t}\n\n\t{\n\t\t// Construct the associations\n\t\tsubResource := resourceAwsRouteTableAssociation()\n\t\tfor _, assoc := range table.Associations {\n\t\t\tif *assoc.Main {\n\t\t\t\t// Ignore\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Minimal data for route\n\t\t\td := subResource.Data(nil)\n\t\t\td.SetType(\"aws_route_table_association\")\n\t\t\td.Set(\"route_table_id\", assoc.RouteTableId)\n\t\t\td.SetId(*assoc.RouteTableAssociationId)\n\t\t\tresults = append(results, d)\n\t\t}\n\t}\n\n\t{\n\t\t// Construct the main associations. We could do this above but\n\t\t// I keep this as a separate section since it is a separate resource.\n\t\tsubResource := resourceAwsMainRouteTableAssociation()\n\t\tfor _, assoc := range table.Associations {\n\t\t\tif !*assoc.Main {\n\t\t\t\t// Ignore\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Minimal data for route\n\t\t\td := subResource.Data(nil)\n\t\t\td.SetType(\"aws_main_route_table_association\")\n\t\t\td.Set(\"route_table_id\", id)\n\t\t\td.Set(\"vpc_id\", table.VpcId)\n\t\t\td.SetId(*assoc.RouteTableAssociationId)\n\t\t\tresults = append(results, d)\n\t\t}\n\t}\n\n\treturn results, nil\n}", "title": "" }, { "docid": "9003b57792fdeb40371179306e106b17", "score": "0.44153672", "text": "func ConnectionsTable(response []byte) {\n\tvar toolsResponse ToolsResponse\n\tjson.Unmarshal(response, &toolsResponse)\n\n\tif toolsResponse.Status == \"error\" {\n\t\tutils.PrintStatus(toolsResponse.Status, toolsResponse.Message)\n\t\treturn\n\t}\n\n\ttools := toolsResponse.Data\n\n\t// write out the table\n\tt := table.NewWriter()\n\tt.SetOutputMirror(os.Stdout)\n\tt.AppendHeader(table.Row{\"Provider\"})\n\tfor _, tool := range tools {\n\t\tconnected := tool.Connected != \"\"\n\t\tif connected {\n\t\t\tt.AppendRow(table.Row{tool.Provider})\n\t\t}\n\t}\n\tt.SetStyle(tableStyle)\n\tt.Style().Title.Align = text.AlignCenter\n\tt.Render()\n}", "title": "" }, { "docid": "8b8f602a0f825ff9b24c02f2a2369cc0", "score": "0.44135782", "text": "func GetTable(conn *grpc.ClientConn, in []string) (string, error) {\n\topts, optind, err := getopt.Getopts(in, \"n:u:h\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// get specified arguments\n\t// there has to be a more eloquent way to do this\n\tvar request pb.ActivityRequest\n\tif optind > 1 {\n\t\tfor _, opt := range opts {\n\t\t\tswitch opt.Option {\n\t\t\tcase 'n':\n\t\t\t\t// amount\n\t\t\t\tt, err := strconv.Atoi(opt.Value)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t\trequest.Amount = uint32(t)\n\t\t\tcase 'u':\n\t\t\t\t//user\n\t\t\t\trequest.User = opt.Value\n\t\t\tcase 'h':\n\t\t\t\ts, err := getHelp(\"gettable\", nil)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t\treturn s, nil\n\t\t\t}\n\t\t}\n\t}\n\n\tactivities, err := client.GetActivities(conn, &request)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif len(activities) <= 0 {\n\t\treturn \"\", errors.New(\"no activities found\")\n\t}\n\n\t// get the keys of db (doesn't use client.GetKeys since that would incur an unnecessary request to server)\n\tvar keys []string\n\tkeys = append(keys, \"Name\")\n\tfor k := range activities[0].Activities {\n\t\tkeys = append(keys, k)\n\t}\n\n\t// sort keys to avoid randomness in order\n\tsort.Strings(keys[1:])\n\n\t// since the way ranges iterate on maps is non-deterministic, store each row in a slice of string slices instead\n\tvar rows [][]string\n\t// appends keys to rows, for convenience purposes\n\trows = append(rows, keys)\n\tfor _, v := range activities {\n\t\tvar row []string\n\t\trow = append(row, v.Name)\n\t\tfor _, k := range keys {\n\t\t\t// ints are converted to strings since this is just for display purposes anyway\n\t\t\tif k != \"Name\" {\n\t\t\t\trow = append(row, strconv.Itoa(int(v.Activities[k])))\n\t\t\t}\n\t\t}\n\t\trows = append(rows, row)\n\t}\n\n\t// get the maximum length of every entry for the purpose of printing\n\tvar maxlens []int\n\tfor _, r := range rows {\n\t\tfor n, v := range r {\n\t\t\tif n > len(maxlens)-1 {\n\t\t\t\tmaxlens = append(maxlens, len(v))\n\t\t\t} else {\n\t\t\t\tmaxlens[n] = max(maxlens[n], len(v))\n\t\t\t}\n\t\t}\n\t}\n\n\tvar sb strings.Builder\n\tfor _, r := range rows {\n\t\tfor n, v := range r {\n\t\t\tsb.WriteString(v)\n\t\t\ti := maxlens[n]\n\t\t\tfor i > len(v) {\n\t\t\t\tsb.WriteRune(' ')\n\t\t\t\ti--\n\t\t\t}\n\t\t\tsb.WriteRune(' ')\n\t\t}\n\t\tsb.WriteRune('\\n')\n\t}\n\treturn sb.String(), nil\n}", "title": "" }, { "docid": "15f47f683eb6930c51c7ef72008fd549", "score": "0.44104305", "text": "func intentionsTableSchema() *memdb.TableSchema {\n\treturn &memdb.TableSchema{\n\t\tName: intentionsTableName,\n\t\tIndexes: map[string]*memdb.IndexSchema{\n\t\t\t\"id\": &memdb.IndexSchema{\n\t\t\t\tName: \"id\",\n\t\t\t\tAllowMissing: false,\n\t\t\t\tUnique: true,\n\t\t\t\tIndexer: &memdb.UUIDFieldIndex{\n\t\t\t\t\tField: \"ID\",\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"destination\": &memdb.IndexSchema{\n\t\t\t\tName: \"destination\",\n\t\t\t\tAllowMissing: true,\n\t\t\t\t// This index is not unique since we need uniqueness across the whole\n\t\t\t\t// 4-tuple.\n\t\t\t\tUnique: false,\n\t\t\t\tIndexer: &memdb.CompoundIndex{\n\t\t\t\t\tIndexes: []memdb.Indexer{\n\t\t\t\t\t\t&memdb.StringFieldIndex{\n\t\t\t\t\t\t\tField: \"DestinationNS\",\n\t\t\t\t\t\t\tLowercase: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t&memdb.StringFieldIndex{\n\t\t\t\t\t\t\tField: \"DestinationName\",\n\t\t\t\t\t\t\tLowercase: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"source\": &memdb.IndexSchema{\n\t\t\t\tName: \"source\",\n\t\t\t\tAllowMissing: true,\n\t\t\t\t// This index is not unique since we need uniqueness across the whole\n\t\t\t\t// 4-tuple.\n\t\t\t\tUnique: false,\n\t\t\t\tIndexer: &memdb.CompoundIndex{\n\t\t\t\t\tIndexes: []memdb.Indexer{\n\t\t\t\t\t\t&memdb.StringFieldIndex{\n\t\t\t\t\t\t\tField: \"SourceNS\",\n\t\t\t\t\t\t\tLowercase: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t&memdb.StringFieldIndex{\n\t\t\t\t\t\t\tField: \"SourceName\",\n\t\t\t\t\t\t\tLowercase: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"source_destination\": &memdb.IndexSchema{\n\t\t\t\tName: \"source_destination\",\n\t\t\t\tAllowMissing: true,\n\t\t\t\tUnique: true,\n\t\t\t\tIndexer: &memdb.CompoundIndex{\n\t\t\t\t\tIndexes: []memdb.Indexer{\n\t\t\t\t\t\t&memdb.StringFieldIndex{\n\t\t\t\t\t\t\tField: \"SourceNS\",\n\t\t\t\t\t\t\tLowercase: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t&memdb.StringFieldIndex{\n\t\t\t\t\t\t\tField: \"SourceName\",\n\t\t\t\t\t\t\tLowercase: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t&memdb.StringFieldIndex{\n\t\t\t\t\t\t\tField: \"DestinationNS\",\n\t\t\t\t\t\t\tLowercase: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t&memdb.StringFieldIndex{\n\t\t\t\t\t\t\tField: \"DestinationName\",\n\t\t\t\t\t\t\tLowercase: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "1090fabdfb5920381b1912fea9213b74", "score": "0.43801937", "text": "func fillTrunkVlansForInterface(d *db.DB, ifName *string, ifVlanInfo *ifVlan) (error) {\n var err error\n var vlanKeys []db.Key\n vlanTable, err := d.GetTable(&db.TableSpec{Name: VLAN_MEMBER_TN})\n if err != nil {\n return err\n }\n\n vlanKeys, err = vlanTable.GetKeys()\n if err != nil {\n return err\n }\n\n for _, vlanKey := range vlanKeys {\n if len(vlanKeys) < 2 {\n continue\n }\n if vlanKey.Get(1) == *ifName {\n memberPortEntry, err := d.GetEntry(&db.TableSpec{Name:VLAN_MEMBER_TN}, vlanKey)\n if err != nil {\n log.Errorf(\"Error found on fetching Vlan member info from App DB for Interface Name : %s\", *ifName)\n return err\n }\n tagInfo, ok := memberPortEntry.Field[\"tagging_mode\"]\n if ok {\n if tagInfo == \"tagged\" {\n ifVlanInfo.trunkVlans = append(ifVlanInfo.trunkVlans, vlanKey.Get(0))\n }\n }\n }\n }\n return err\n}", "title": "" }, { "docid": "61bf301df515322f61999aee11041500", "score": "0.43647063", "text": "func db_getLinkTable() (map[string]string, error){\n\t//open the database\n\tdb, err := openDB()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer db.Close()\n\t\n\t//get all the rows from the \"links\" table\n\trows, err := db.Query(\"SELECT * FROM links\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t\n\t//Initialize a map & populate it with all the rows from the table\n\tvar ret = make(map[string]string)\n\tfor rows.Next() {\n\t\tvar hash, link string\n\t\tif err := rows.Scan(&hash, &link); err != nil{\n\t\t\treturn nil, err\n\t\t}\n\t\tret[hash] = link\n\t}\n\tif err := rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\t\n\treturn ret, nil\n\t\n}", "title": "" }, { "docid": "39ecaa3249c9b5e22b247d74f4b35ae6", "score": "0.43526953", "text": "func (s *BaseMySqlParserListener) EnterTableSources(ctx *TableSourcesContext) {}", "title": "" }, { "docid": "39ecaa3249c9b5e22b247d74f4b35ae6", "score": "0.43526953", "text": "func (s *BaseMySqlParserListener) EnterTableSources(ctx *TableSourcesContext) {}", "title": "" }, { "docid": "3a4f486c5a5af245d8658c9d81f49715", "score": "0.43318185", "text": "func (s *Datastore) DB_Open() error {\r\n // open file\r\n csvfile, err := os.Open(s.name)\r\n if err != nil {\r\n fmt.Println(err)\r\n return err\r\n }\r\n defer csvfile.Close()\r\n\r\n // read thre file\r\n r := csv.NewReader(csvfile)\r\n for { \r\n line, err := r.Read()\r\n if err == io.EOF {\r\n break\r\n }\r\n if err != nil {\r\n fmt.Println(err)\r\n }\r\n holder := line[0]\r\n // if key (holder) is not in the database, enter key/value pair\r\n if _, check := s.datas[holder]; check == false {\r\n s.datas[holder] = line[1]\r\n }\r\n }\r\n return err\r\n}", "title": "" }, { "docid": "6efdd6900cfa39bdedb9821b841a5f44", "score": "0.43292096", "text": "func handleCreateTable(ctx *fasthttp.RequestCtx) {\n\ts := fmt.Sprintf(\"Receive /CreateTable request\\n\\n\")\n\ts += fmt.Sprintf(\"Host is %q\\n\", ctx.Host())\n\ts += fmt.Sprintf(\"User-Agent is %q\\n\", ctx.UserAgent())\n\ts += fmt.Sprintf(\"Connection has been established at %s\\n\", ctx.ConnTime())\n\ts += fmt.Sprintf(\"Request has been started at %s\\n\", ctx.Time())\n\ts += fmt.Sprintf(\"Serial request number for the current connection is %d\\n\", ctx.ConnRequestNum())\n\ts += fmt.Sprintf(\"Client ip is %q\\n\\n\", ctx.RemoteIP())\n\n\totsHeader := parseHeader(&ctx.Request.Header)\n\ts += fmt.Sprintf(\"Instance is %s\\n\", otsHeader.InstanceName)\n\ts += fmt.Sprintf(\"API version is %s\\n\", otsHeader.APIVersion)\n\ts += fmt.Sprintf(\"Content MD5 is %s\\n\", otsHeader.Contentmd5)\n\ts += fmt.Sprintf(\"Date is %s\\n\", otsHeader.Date)\n\ts += fmt.Sprintf(\"Signature is %s\\n\", otsHeader.Signature)\n\n\tbody := ctx.PostBody()\n\trequest := protocol.CreateTableRequest{}\n\terr := proto.Unmarshal(body, &request)\n\tif err != nil {\n\t\ts += fmt.Sprintf(\"Parse Body Error: %s\", err)\n\t} else {\n\t\ttableName := request.TableMeta.TableName\n\t\ts += fmt.Sprintf(\"TableName is %s\", *tableName)\n\t}\n\n\tfmt.Fprint(ctx, s)\n\tfmt.Println(s)\n\n\tctx.SetContentType(\"text/plain; charset=utf8\")\n\n\t// Set arbitrary headers\n\tctx.Response.Header.Set(\"X-My-Header\", \"my-header-value\")\n\n\t// Set cookies\n\tvar c fasthttp.Cookie\n\tc.SetKey(\"cookie-name\")\n\tc.SetValue(\"cookie-value\")\n\tctx.Response.Header.SetCookie(&c)\n}", "title": "" }, { "docid": "974c05c439aa94a03600b761baec4336", "score": "0.43196782", "text": "func (db *mysqlDB) makeTables() {\n\t_, err := db.conn.Exec(`\n\tCREATE TABLE IF NOT EXISTS stakeholders (\n\t\temail VARCHAR(255) NOT NULL,\n\t\tdomain VARCHAR(255) NOT NULL,\n\t\tname VARCHAR(255) NOT NULL,\n\t\tabbrev VARCHAR(63) NOT NULL,\n\t\tcolorf VARCHAR(63) NOT NULL,\n\t\tcolorb VARCHAR(63) NOT NULL,\n\t\tcadence VARCHAR(63) NOT NULL,\n\t\tPRIMARY KEY (email),\n\t\tINDEX (domain)\n\t);`)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"Could not create stakeholders table: %v\", err))\n\t}\n\n\t_, err = db.conn.Exec(`\n\tCREATE TABLE IF NOT EXISTS stakeholders_hierarchy (\n\t\tparent VARCHAR(255) NOT NULL,\n\t\tchild VARCHAR(255) NOT NULL,\n\t\tdomain VARCHAR(255) NOT NULL,\n\t\tPRIMARY KEY (parent, child),\n\t\tFOREIGN KEY (parent) REFERENCES stakeholders(email),\n\t\tFOREIGN KEY (child) REFERENCES stakeholders(email),\n\t\tINDEX (parent),\n\t\tINDEX (child),\n\t\tINDEX (domain)\n\t);`)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"Could not create stakeholders_heirarchy table: %v\", err))\n\t}\n\n\t_, err = db.conn.Exec(`\n\tCREATE TABLE IF NOT EXISTS threads (\n\t\tid INT NOT NULL AUTO_INCREMENT,\n\t\tname VARCHAR(255) NOT NULL,\n\t\tdomain VARCHAR(255) NOT NULL,\n\t\tdescription TEXT(65535),\n\t\towner VARCHAR(255) NOT NULL,\n\t\titer VARCHAR(255) NOT NULL,\n\t\tstate VARCHAR(255) NOT NULL,\n\t\tpercentile DOUBLE PRECISION NOT NULL,\n\t\tcostdir INT NOT NULL,\n\t\tcosttot INT NOT NULL,\n\t\tPRIMARY KEY (id),\n\t\tFOREIGN KEY (owner) REFERENCES stakeholders(email),\n\t\tINDEX (owner),\n\t\tINDEX (iter),\n\t\tINDEX (state)\n\t);`)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"Could not create threads table: %v\", err))\n\t}\n\n\t_, err = db.conn.Exec(`\n\tCREATE TABLE IF NOT EXISTS threads_hierarchy (\n\t\tparent INT NOT NULL,\n\t\tchild INT NOT NULL,\n\t\tdomain VARCHAR(255) NOT NULL,\n\t\titer VARCHAR(255) NOT NULL,\n\t\tord INT NOT NULL,\n\t\tPRIMARY KEY (parent, child),\n\t\tFOREIGN KEY (parent) REFERENCES threads(id),\n\t\tFOREIGN KEY (child) REFERENCES threads(id),\n\t\tINDEX (parent),\n\t\tINDEX (child),\n\t\tINDEX (domain),\n\t\tINDEX (iter)\n\t);`)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"Could not create threads_hierarchy table: %v\", err))\n\t}\n\n\t_, err = db.conn.Exec(`\n\t\tCREATE TABLE IF NOT EXISTS threads_stakeholders (\n\t\t\tthread INT NOT NULL,\n\t\t\tstk VARCHAR(255) NOT NULL,\n\t\t\tdomain VARCHAR(255) NOT NULL,\n\t\t\titer VARCHAR(255) NOT NULL,\n\t\t\tord INT NOT NULL,\n\t\t\tcost INT NOT NULL,\n\t\t\tPRIMARY KEY (thread, stk),\n\t\t\tFOREIGN KEY (thread) REFERENCES threads(id),\n\t\t\tFOREIGN KEY (stk) REFERENCES stakeholders(email),\n\t\t\tINDEX (thread),\n\t\t\tINDEX (stk),\n\t\t\tINDEX (domain),\n\t\t\tINDEX (iter)\n\t\t);`)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"Could not create threads_stakeholders table: %v\", err))\n\t}\n}", "title": "" }, { "docid": "99ce40b2c09f330592802aaef02f1832", "score": "0.43173945", "text": "func getOncallTableData(oncallData []pdcli.OncallUser) ([]string, [][]string) {\n\n\tvar tableData [][]string\n\n\tfor _, v := range oncallData {\n\n\t\tvar data []string\n\n\t\tif v.EscalationPolicy != \"\" {\n\t\t\tdata = append(data, v.EscalationPolicy)\n\t\t} else {\n\t\t\tdata = append(data, \"N/A\")\n\t\t}\n\n\t\tif v.Name != \"\" {\n\t\t\tdata = append(data, v.Name)\n\t\t} else {\n\t\t\tdata = append(data, \"N/A\")\n\t\t}\n\n\t\tif v.OncallRole != \"\" {\n\t\t\tdata = append(data, v.OncallRole)\n\t\t} else {\n\t\t\tdata = append(data, \"N/A\")\n\t\t}\n\n\t\tif v.Start != \"\" {\n\t\t\tdata = append(data, v.Start)\n\t\t} else {\n\t\t\tdata = append(data, \"N/A\")\n\t\t}\n\n\t\tif v.End != \"\" {\n\t\t\tdata = append(data, v.End)\n\t\t} else {\n\t\t\tdata = append(data, \"N/A\")\n\t\t}\n\n\t\ttableData = append(tableData, data)\n\t}\n\n\theaders := []string{\"Escalation Policy\", \"Name\", \"Oncall Role\", \"From\", \"To\"}\n\n\treturn headers, tableData\n}", "title": "" }, { "docid": "7cb0ae30d1cc340029bc5385827fbd87", "score": "0.43129194", "text": "func getTableData(ctx context.Context, tx *sql.Tx, table string) ([]string, error) {\n\tvar statements []string\n\n\t// Query all rows.\n\trows, err := tx.QueryContext(ctx, fmt.Sprintf(\"SELECT * FROM %s ORDER BY rowid\", table))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to fetch rows for table %q: %w\", table, err)\n\t}\n\n\tdefer func() { _ = rows.Close() }()\n\n\t// Get the column names.\n\tcolumns, err := rows.Columns()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to get columns for table %q: %w\", table, err)\n\t}\n\n\t// Generate an INSERT statement for each row.\n\tfor i := 0; rows.Next(); i++ {\n\t\traw := make([]any, len(columns)) // Raw column values\n\t\trow := make([]any, len(columns))\n\t\tfor i := range raw {\n\t\t\trow[i] = &raw[i]\n\t\t}\n\n\t\terr := rows.Scan(row...)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Failed to scan row %d in table %q: %w\", i, table, err)\n\t\t}\n\n\t\tvalues := make([]string, len(columns))\n\t\tfor j, v := range raw {\n\t\t\tswitch v := v.(type) {\n\t\t\tcase int64:\n\t\t\t\tvalues[j] = strconv.FormatInt(v, 10)\n\t\t\tcase string:\n\t\t\t\t// This is based on logic from dump_callback in sqlite source for sqlite3_db_dump function.\n\t\t\t\tv = fmt.Sprintf(\"'%s'\", strings.ReplaceAll(v, \"'\", \"''\"))\n\n\t\t\t\tif strings.Contains(v, \"\\r\") {\n\t\t\t\t\tv = \"replace(\" + strings.ReplaceAll(v, \"\\r\", \"\\\\r\") + \",'\\\\r',char(13))\"\n\t\t\t\t}\n\n\t\t\t\tif strings.Contains(v, \"\\n\") {\n\t\t\t\t\tv = \"replace(\" + strings.ReplaceAll(v, \"\\n\", \"\\\\n\") + \",'\\\\n',char(10))\"\n\t\t\t\t}\n\n\t\t\t\tvalues[j] = v\n\n\t\t\tcase []byte:\n\t\t\t\tvalues[j] = fmt.Sprintf(\"'%s'\", string(v))\n\t\t\tcase time.Time:\n\t\t\t\t// Try and match the sqlite3 .dump output format.\n\t\t\t\tformat := \"2006-01-02 15:04:05\"\n\n\t\t\t\tif v.Nanosecond() > 0 {\n\t\t\t\t\tformat = format + \".000000000\"\n\t\t\t\t}\n\n\t\t\t\tformat = format + \"-07:00\"\n\n\t\t\t\tvalues[j] = \"'\" + v.Format(format) + \"'\"\n\t\t\tdefault:\n\t\t\t\tif v != nil {\n\t\t\t\t\treturn nil, fmt.Errorf(\"Bad type in column %q of row %d in table %q\", columns[j], i, table)\n\t\t\t\t}\n\n\t\t\t\tvalues[j] = \"NULL\"\n\t\t\t}\n\t\t}\n\n\t\tstatement := fmt.Sprintf(\"INSERT INTO %s VALUES(%s);\", table, strings.Join(values, \",\"))\n\t\tstatements = append(statements, statement)\n\t}\n\n\treturn statements, nil\n}", "title": "" }, { "docid": "c7b72acfe0be569305c17d8d558605bc", "score": "0.4311576", "text": "func (d *DBMetricsCollector) getListOfTables() (map[string]struct{}, error) {\n\ttables := make(map[string]struct{})\n\t_, err := d.db.Exec(\"SELECT name FROM sqlite_master WHERE type='table'\", nil, func(stmt *sql.Statement) bool {\n\t\ttables[stmt.ColumnText(0)] = struct{}{}\n\t\treturn true\n\t})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error get list of tables: %w\", err)\n\t}\n\treturn tables, nil\n}", "title": "" }, { "docid": "6e88f1bf883fe29d280ef4ee8b16c36d", "score": "0.4308426", "text": "func tableUrl(r *TableRequest, baseURL *url.URL, hints bool) (*url.URL, error) {\n\tpath := geo.Path{PointSet: r.Coordinates}\n\tbaseURL.Path += \"/\" + \"polyline(\" + url.PathEscape(path.Encode()) + \")\"\n\n\tparameters := url.Values{}\n\n\tparameters.Add(\"generate_hints\", strconv.FormatBool(hints))\n\n\tif r.Annotations != nil {\n\t\tparameters.Add(\"annotations\", r.Annotations.String())\n\t}\n\n\tif r.Sources != nil {\n\t\tsources := \"\"\n\n\t\tif len(*r.Sources) != len(r.Coordinates) {\n\t\t\tvar t []string\n\t\t\tfor _, i := range *r.Sources {\n\t\t\t\tt = append(t, strconv.Itoa(i))\n\t\t\t}\n\t\t\tsources = strings.Join(t, \";\")\n\t\t}\n\n\t\tif sources != \"\" {\n\t\t\tparameters.Add(\"sources\", sources)\n\n\t\t}\n\t}\n\tif r.Destinations != nil {\n\t\tdestinations := \"\"\n\n\t\tif len(*r.Destinations) != len(r.Coordinates) {\n\t\t\tvar t []string\n\t\t\tfor _, i := range *r.Destinations {\n\t\t\t\tt = append(t, strconv.Itoa(i))\n\t\t\t}\n\t\t\tdestinations = strings.Join(t, \";\")\n\t\t}\n\n\t\tif destinations != \"\" {\n\t\t\tparameters.Add(\"destinations\", destinations)\n\t\t}\n\n\t}\n\n\tif r.ScaleFactor != nil {\n\t\tparameters.Add(\"scale_factor\", strconv.FormatFloat(*r.ScaleFactor, 'f', 4, 32))\n\t}\n\n\tif r.FallbackCoordinate != nil {\n\t\tparameters.Add(\"fallback_coordinate\", r.FallbackCoordinate.String())\n\t}\n\n\tbaseURL.RawQuery = parameters.Encode()\n\n\treturn baseURL, nil\n}", "title": "" }, { "docid": "a0efafcd1992ebf7ab201199e94e342d", "score": "0.43020356", "text": "func initDB(name string) (*sql.DB) {\n tw := new(tabwriter.Writer)\n tw.Init(os.Stderr, 0, 8, 0, '\\t', 0)\n log.Println(\"initDB –\\t\\tInitializing SQLite db with the name \" + name)\n db, err := sql.Open(\"sqlite3\", \"./\"+name+\".db\")\n checkErr(err)\n\n //===============================================//\n log.Println( \"initDB –\\t\\tcreating SQLite tables\")\n createTables(db)\n\n statement, _ := db.Prepare(`UPDATE mytable SET MCCMNC_ID = mcc||\"\"||mnc`)\n _, err = statement.Exec()\n checkErr(err)\n\n log.Println(\"initDB –\\t\\tInitializing users table with admin username and password...\")\n _, err = db.Exec(`INSERT or IGNORE INTO users (username, password) VALUES (\"admin\", \"admin\")`)\n checkErr(err)\n\n log.Println(\"initDB –\\t\\tInitializing favoriteCountries table with a few countries...\")\n _, err = db.Exec(`INSERT or IGNORE INTO favoriteCountries (Country_ID) VALUES (\"bl\")`)\n checkErr(err)\n _, err = db.Exec(`INSERT or IGNORE INTO favoriteCountries (Country_ID) VALUES (\"br\")`)\n checkErr(err)\n _, err = db.Exec(`INSERT or IGNORE INTO favoriteCountries (Country_ID) VALUES (\"in\")`)\n checkErr(err)\n _, err = db.Exec(`INSERT or IGNORE INTO favoriteCountries (Country_ID) VALUES (\"vn\")`)\n checkErr(err)\n\n\n\n // should be changed to initialize only OUR list of operators\n log.Println(\"initDB –\\t\\tInitializing operators table with temporary MCC table data...\")\n _, err = db.Exec(`INSERT or IGNORE INTO operators (MCCMNC_ID, Operator_Name, Country_ID, Operator_Group_Name) SELECT CAST(mytable.MCCMNC_ID AS TEXT), Operator_Name, Country_ID, mytable2.Operator_Group_Name FROM mytable INNER JOIN mytable2 ON mytable.MCCMNC_ID = mytable2.MCCMNC_ID`)\n checkErr(err)\n\n log.Println(\"initDB –\\t\\tExtracting Group_Name column from operators table and respective MCCMNC_ID and putting into operatorGroups table\")\n _, err = db.Exec(`INSERT or IGNORE INTO operatorGroups (Operator_Group_Name, MCCMNC_ID) SELECT operators.Operator_Group_Name, MCCMNC_ID FROM operators`)\n checkErr(err)\n\n log.Println(\"initDB –\\t\\tDeleting Operator_Group_Name column from operators table\")\n _, err = db.Exec(`BEGIN TRANSACTION`)\n checkErr(err)\n _, err = db.Exec(`CREATE TEMPORARY TABLE operators_backup(MCCMNC_ID, Operator_Name, Country_ID)`)\n checkErr(err)\n _, err = db.Exec(`INSERT INTO operators_backup SELECT MCCMNC_ID, Operator_Name, Country_ID FROM operators`)\n checkErr(err)\n _, err = db.Exec(`DROP TABLE operators`)\n checkErr(err)\n _, err = db.Exec(`CREATE TABLE operators(MCCMNC_ID, Operator_Name, Country_ID)`)\n checkErr(err)\n _, err = db.Exec(`INSERT INTO operators SELECT MCCMNC_ID, Operator_Name, Country_ID FROM operators_backup;`)\n checkErr(err)\n _, err = db.Exec(`DROP TABLE operators_backup;`)\n checkErr(err)\n _, err = db.Exec(`COMMIT;`)\n checkErr(err)\n\n log.Println(\"initDB –\\t\\tInitializing countries table with temporary MCC table data...\")\n _, err = db.Exec(`INSERT or IGNORE INTO countries (Country_ID, name, MCC_ID) SELECT Country_ID, country, mcc FROM mytable`)\n checkErr(err)\n log.Println(\"initDB –\\t\\tUpdating Viet Nam to Vietnam (lol)...\")\n _, err = db.Exec(`UPDATE countries SET name=\"Vietnam\" WHERE Country_ID=\"vn\"`)\n checkErr(err)\n\n\n log.Println(\"initDB –\\t\\tLodaing config tables...\")\n loadConfigTables(db)\n //==============================================//\n\n // //EXAMPLE SELECT CODE\n // log.Println(\"initDB –\\t\\tquerying mytable\")\n // rows, err := db.Query(\"SELECT Operator_Name, Country_ID, MCCMNC_ID FROM mytable\")\n // checkErr(err)\n // // rows, err := db.Query(\"SELECT COALESCE(mcc, '') || COALESCE(mnc, '') FROM mytable\") //interesting way of concatting\n //\n // var Operator_Name string\n // var Country_ID string\n // var MCCMNC_ID string\n // for rows.Next() {\n // rows.Scan(&Operator_Name, &Country_ID, &MCCMNC_ID)\n // // log.Println(\"main –\\t\\t\" + MCCMNC_ID + \" | \" + Operator_Name + \" | \" + Country_ID)\n // }\n // defer rows.Close()\n\n return db\n}", "title": "" }, { "docid": "94f65a754d0b466a8ca6f7f71e218b1f", "score": "0.43016788", "text": "func testGenTable(tt string) *model.TableInfo {\n\tt := &model.TableInfo{State: model.StatePublic}\n\tt.Name = model.NewCIStr(\"account\")\n\n\t// the hard values are from TiDB :-), so just ingore them\n\ttp := types.NewFieldType(mysql.TypeLong)\n\ttp.SetFlag(mysql.BinaryFlag)\n\ttp.SetFlen(11)\n\ttp.SetDecimal(-1)\n\ttp.SetCharset(\"binary\")\n\ttp.SetCollate(\"binary\")\n\tuserIDCol := &model.ColumnInfo{\n\t\tID: 1,\n\t\tName: model.NewCIStr(\"ID\"),\n\t\tOffset: 0,\n\t\tFieldType: *tp,\n\t\tState: model.StatePublic,\n\t}\n\n\ttp = types.NewFieldType(mysql.TypeVarchar)\n\ttp.SetFlag(0)\n\ttp.SetFlen(45)\n\ttp.SetDecimal(-1)\n\ttp.SetCharset(\"utf8\")\n\ttp.SetCollate(\"utf8_unicode_ci\")\n\tuserNameCol := &model.ColumnInfo{\n\t\tID: 2,\n\t\tName: model.NewCIStr(\"NAME\"),\n\t\tOffset: 1,\n\t\tFieldType: *tp,\n\t\tState: model.StatePublic,\n\t}\n\n\ttp = types.NewFieldType(mysql.TypeEnum)\n\ttp.SetFlag(mysql.BinaryFlag)\n\ttp.SetFlen(-1)\n\ttp.SetDecimal(-1)\n\ttp.SetCharset(\"binary\")\n\ttp.SetCollate(\"binary\")\n\ttp.SetElems([]string{\"male\", \"female\"})\n\tsexCol := &model.ColumnInfo{\n\t\tID: 3,\n\t\tName: model.NewCIStr(\"SEX\"),\n\t\tOffset: 2,\n\t\tFieldType: *tp,\n\t\tState: model.StatePublic,\n\t}\n\n\tt.Columns = []*model.ColumnInfo{userIDCol, userNameCol, sexCol}\n\n\tswitch tt {\n\tcase \"hasID\":\n\t\tuserIDCol.SetFlag(mysql.NotNullFlag | mysql.PriKeyFlag | mysql.BinaryFlag | mysql.NoDefaultValueFlag)\n\n\t\tt.PKIsHandle = true\n\t\tt.Indices = append(t.Indices, &model.IndexInfo{\n\t\t\tPrimary: true,\n\t\t\tColumns: []*model.IndexColumn{{Name: userIDCol.Name}},\n\t\t})\n\n\tcase \"hasPK\":\n\t\tuserIDCol.SetFlag(mysql.NotNullFlag | mysql.PriKeyFlag | mysql.BinaryFlag | mysql.NoDefaultValueFlag | mysql.UniqueKeyFlag)\n\t\tuserNameCol.SetFlag(mysql.NotNullFlag | mysql.PriKeyFlag | mysql.NoDefaultValueFlag)\n\n\t\tt.Indices = append(t.Indices, &model.IndexInfo{\n\t\t\tPrimary: true,\n\t\t\tUnique: true,\n\t\t\tColumns: []*model.IndexColumn{{Name: userIDCol.Name}, {Name: userNameCol.Name}},\n\t\t})\n\t}\n\n\treturn t\n}", "title": "" }, { "docid": "e93202f59f714f37bb8cfcc1d17e3f81", "score": "0.42986754", "text": "func (p *PostgresDriver) ForeignKeyInfo(schema, tableName string) ([]bdb.ForeignKey, error) {\n\tvar fkeys []bdb.ForeignKey\n\n\tquery := `\n\tselect\n\t\tpgcon.conname,\n\t\tpgc.relname as source_table,\n\t\tpgasrc.attname as source_column,\n\t\tdstlookupname.relname as dest_table,\n\t\tpgadst.attname as dest_column\n\tfrom pg_namespace pgn\n\t\tinner join pg_class pgc on pgn.oid = pgc.relnamespace and pgc.relkind = 'r'\n\t\tinner join pg_constraint pgcon on pgn.oid = pgcon.connamespace and pgc.oid = pgcon.conrelid\n\t\tinner join pg_class dstlookupname on pgcon.confrelid = dstlookupname.oid\n\t\tinner join pg_attribute pgasrc on pgc.oid = pgasrc.attrelid and pgasrc.attnum = ANY(pgcon.conkey)\n\t\tinner join pg_attribute pgadst on pgcon.confrelid = pgadst.attrelid and pgadst.attnum = ANY(pgcon.confkey)\n\twhere pgn.nspname = $2 and pgc.relname = $1 and pgcon.contype = 'f'\n\t`\n\n\tvar rows *sql.Rows\n\tvar err error\n\tif rows, err = p.dbConn.Query(query, tableName, schema); err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor rows.Next() {\n\t\tvar fkey bdb.ForeignKey\n\t\tvar sourceTable string\n\n\t\tfkey.Table = tableName\n\t\terr = rows.Scan(&fkey.Name, &sourceTable, &fkey.Column, &fkey.ForeignTable, &fkey.ForeignColumn)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfkeys = append(fkeys, fkey)\n\t}\n\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn fkeys, nil\n}", "title": "" }, { "docid": "c85e7861509cc7e51c121d2a6ccbae9d", "score": "0.42906362", "text": "func buildCsvFiles(readings []models.ExportedSensorReading) (map[int64]*CsvFile, error) {\n\tcsvFiles := make(map[int64]*CsvFile)\n\n\t// For each sensor reading in the SQL result\n\tfor _, reading := range readings {\n\t\tvar csvFile *CsvFile\n\t\tvar exists bool\n\t\t// If the Buoy Instance doesn't exist yet, create a new csv file for it\n\t\tif csvFile, exists = csvFiles[reading.BuoyInstanceId]; !exists {\n\t\t\tcsvFile = &CsvFile{\n\t\t\t\tBuoyInstanceId: reading.BuoyInstanceId,\n\t\t\t\tBuoyInstanceName: reading.BuoyInstanceName,\n\t\t\t\tFileName: formattedCsvFileName(reading.BuoyInstanceName),\n\t\t\t}\n\t\t\tcsvFile.CsvRowsMap = make(map[int64]*CsvRow)\n\t\t\tcsvFiles[reading.BuoyInstanceId] = csvFile\n\t\t}\n\n\t\tvar csvRow *CsvRow\n\t\t// If the row for the reading doesn't exist in the csv file yet, add it\n\t\tif csvRow, exists = csvFile.CsvRowsMap[reading.ReadingId]; !exists {\n\t\t\treadingRow := &models.Reading{\n\t\t\t\tId: reading.ReadingId,\n\t\t\t\tLatitude: reading.Latitude,\n\t\t\t\tLongitude: reading.Longitude,\n\t\t\t\tAltitude: reading.Altitude,\n\t\t\t\tSpeedOG: reading.SpeedOG,\n\t\t\t\tCourse: reading.Course,\n\t\t\t\tTimestamp: reading.Timestamp,\n\t\t\t}\n\t\t\tcsvRow = &CsvRow{Reading: *readingRow}\n\t\t\tcsvFile.CsvRowsMap[reading.ReadingId] = csvRow\n\t\t}\n\n\t\t// Add the sensor reading to the csv row\n\t\tsensorReading := &CsvSensorReading{\n\t\t\tValue: reading.Value,\n\t\t\tSensorTypeId: reading.SensorTypeId,\n\t\t\tSensorTypeName: reading.SensorTypeName,\n\t\t\tSensorTypeUnit: reading.SensorTypeUnit,\n\t\t}\n\t\tcsvRow.SensorReadings = append(csvRow.SensorReadings, *sensorReading)\n\t}\n\n\treturn csvFiles, nil\n}", "title": "" }, { "docid": "242b34c27c1269e8924fbcff08b4dea1", "score": "0.4285622", "text": "func emitHistory(opts docopt.Opts, fpath string) error {\n\tcopyLocation := fpath + \".copy\"\n\terr := copy(fpath, copyLocation)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tknownTables := map[string]bool{\n\t\t\"downloads\": true,\n\t\t\"downloads_slices\": true,\n\t\t\"downloads_url_chains\": true,\n\t\t\"keyword_search_terms\": true,\n\t\t\"meta\": true,\n\t\t\"segment_usage\": true,\n\t\t\"segments\": true,\n\t\t\"sqlite_sequence\": true,\n\t\t\"typed_url_sync_metadata\": true,\n\t\t\"urls\": true,\n\t\t\"visit_source\": true,\n\t\t\"visits\": true,\n\t}\n\n\t// -- open the database\n\tdb, err := sql.Open(\"sqlite3\", copyLocation)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer db.Close()\n\n\ttableName, optErr := opts.String(\"<tablename>\")\n\tif optErr != nil {\n\t\treturn optErr\n\t}\n\tif !knownTables[tableName] {\n\t\treturn errors.New(tableName + \" not supported.\")\n\t}\n\n\tqueries := map[string]string{\n\t\t\"downloads\": \"SELECT * FROM downloads\",\n\t\t\"downloads_slices\": \"SELECT * FROM downloads_slices\",\n\t\t\"downloads_url_chains\": \"SELECT * FROM downloads_url_chains\",\n\t\t\"keyword_search_terms\": \"SELECT hidden,last_visit_time,normalized_term,term,title,typed_count,url,visit_count FROM keyword_search_terms LEFT JOIN urls ON keyword_search_terms.url_id = urls.id\",\n\t\t\"meta\": \"SELECT * FROM meta\",\n\t\t\"segment_usage\": \"SELECT * FROM segment_usage LEFT JOIN segments ON segment_usage.segment_id = segments.id\",\n\t\t\"segments\": \"SELECT name,url,title,visit_count,typed_count,last_visit_time FROM segments LEFT JOIN urls ON segments.url_id = urls.id\",\n\t\t\"sqlite_sequence\": \"SELECT * FROM sqlite_sequence\",\n\t\t\"typed_url_sync_metadata\": \"SELECT * FROM typed_url_sync_metadata\",\n\t\t\"urls\": \"SELECT * FROM urls\",\n\t\t\"visit_source\": \"SELECT * FROM visit_source\",\n\t\t\"visits\": \"SELECT * FROM visits\",\n\t}\n\n\t// -- it does, print all data out. TODO use querystring instead.\n\trows, readErrors := ReadSqlite2(queries[tableName], db, scan)\n\n\tfor readErr := range readErrors {\n\t\tif readErr != nil {\n\t\t\treturn readErr\n\t\t}\n\t}\n\n\tfor elem := range rows {\n\t\tjsonBytes, err := json.Marshal(elem)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tfmt.Println(string(jsonBytes))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cea291876a195100a1326982452f04fc", "score": "0.4283916", "text": "func LoaderData(datapath string) ([]*adapter.Adapter, error) {\n\tmodeFile, err := os.Open(datapath)\n\tif err != nil {\n\t\tlog.Printf(\"open datafile %v error: %v\", datapath, err)\n\t\treturn nil, err\n\t}\n\tdefer modeFile.Close()\n\n\tscanner := bufio.NewScanner(modeFile)\n\tfirstLine := true\n\n\tcolsNames := make([]string, 0)\n\tnameIndex := -1\n\tclassname := \"\"\n\tresult := make([]*adapter.Adapter, 0)\n\tctnRecord := make(map[int]int)\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\tcols := strings.Split(line, \",\")\n\t\tfor i := range cols {\n\t\t\tcols[i] = strings.Trim(cols[i], \" \")\n\t\t}\n\n\t\tif firstLine {\n\t\t\tfirstLine = false\n\t\t\tfor i := range cols {\n\t\t\t\twords := strings.Split(cols[i], \":\")\n\t\t\t\tif len(words) > 1 {\n\t\t\t\t\tfor j := range words {\n\t\t\t\t\t\twords[j] = strings.Trim(words[j], \" \")\n\t\t\t\t\t}\n\t\t\t\t\tif words[1] == \"class\" {\n\t\t\t\t\t\tclassname = words[0]\n\t\t\t\t\t} else if words[1] == \"id\" {\n\t\t\t\t\t\tnameIndex = i\n\t\t\t\t\t} else if words[1] == \"ctn\" {\n\t\t\t\t\t\tctnRecord[i] = 0\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tcolsNames = append(colsNames, words[0])\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\ta := adapter.MakeAdapter(classname)\n\t\tfor i := range cols {\n\t\t\tif i == nameIndex {\n\t\t\t\ta.SetName(cols[i])\n\t\t\t} else if i == nameIndex {\n\t\t\t\tcontinue\n\t\t\t} else if _, existed := ctnRecord[i]; existed {\n\t\t\t\tval, err := strconv.ParseFloat(cols[i], 64)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatalf(\"load data: %v\", err)\n\t\t\t\t}\n\t\t\t\ta.AddCtn(colsNames[i], val)\n\t\t\t} else {\n\t\t\t\ta.Add(colsNames[i], cols[i])\n\t\t\t}\n\t\t}\n\t\tresult = append(result, a)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "a7ca8e6fb6c7a21cc292f249a1b946e1", "score": "0.42676023", "text": "func loadOperators(csvFile string) map[string]operatorData {\n\tf, err := os.Open(csvFile)\n\tif err != nil {\n\t\tlog.Fatalln(\"Couldn't open the operator csv file:\", err)\n\t}\n\tdefer f.Close()\n\n\toperators := make(map[string]operatorData)\n\n\tr := csv.NewReader(bufio.NewReader(f))\n\n\tfor {\n\t\trecord, err := r.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\tlog.Fatal(\"error reading operator file\", csvFile, err)\n\t\t}\n\n\t\tcallsign := strings.ReplaceAll(strings.ToUpper(record[0]), \" \", \"\")\n\n\t\tlat, err := strconv.ParseFloat(record[1], 64)\n\t\tif err != nil {\n\t\t\tlog.Fatalln(\"can't parse latitude in operator CSV\", err)\n\t\t}\n\t\tlong, err := strconv.ParseFloat(record[2], 64)\n\t\tif err != nil {\n\t\t\tlog.Fatalln(\"can't parse longitude in operator CSV\", err)\n\t\t}\n\t\tgps := gpsCoord{lat, long}\n\n\t\txmitPwr, err := strconv.ParseFloat(record[3], 64)\n\t\tif err != nil {\n\t\t\tlog.Fatalln(\"can't parse transmitter power in operator CSV\", err)\n\t\t}\n\n\t\tantType := record[4]\n\n\t\tantGain, err := strconv.ParseFloat(record[5], 64)\n\t\tif err != nil {\n\t\t\tlog.Fatalln(\"can't parse antenna gain in operator CSV\", err)\n\t\t}\n\n\t\tantHeight, err := strconv.ParseFloat(record[6], 64)\n\t\tif err != nil {\n\t\t\tlog.Fatalln(\"can't parse antenna height in operator CSV\", err)\n\t\t}\n\n\t\toperators[callsign] = operatorData{\n\t\t\tcallsign: callsign,\n\t\t\tgps: gps,\n\t\t\tpixel: gpsToPixel(gps),\n\t\t\txmitPwr: xmitPwr,\n\t\t\tantType: antType,\n\t\t\tantGain: antGain,\n\t\t\tantHeight: antHeight}\n\t}\n\n\treturn operators\n}", "title": "" }, { "docid": "b5dd00d154cc58eb029a7e6e549b3504", "score": "0.4261042", "text": "func Copytable(fromdb *sql.DB, todb *sql.DB, tablename string, updatetscolname string) string {\n\tvar (\n\t\tcontainer []sql.NullString\n\t\tpointers []interface{}\n\t)\n\tfromdbcreatetablespec := showtable(fromdb, tablename)\n\tif fromdbcreatetablespec == \"Table Not Found\" {\n\t\treturn \"ERROR : Could not find source table\"\n\t}\n\ttodbcreatetablespec := showtable(todb, tablename)\n\tif strings.HasPrefix(todbcreatetablespec, \"ERROR : Table Not Found\") {\n\t\tfmt.Println(\"To table not found so we will have to create it\")\n\t\texecres := execDDL(todb, fromdbcreatetablespec)\n\t\tif execres != \"OK\" {\n\t\t\treturn \"ERRROR : Could not create table\"\n\t\t}\n\t}\n\n\tfcol := gettablefields(fromdb, tablename)\n\tlatestts := getLatestUpdateTS(targetdb, tablename, updatetscolname)\n\tsqlinsert := \"REPLACE INTO \" + tablename + \" (\"\n\t\n\tfor _, v := range fcol {\n\t\tsqlinsert = sqlinsert + \"`\" + v.Field + \"`,\"\n\t}\n\tsqlinsert = sqlinsert[:len(sqlinsert)-1] + \") VALUES \"\n\tsqlselect := \"SELECT \"\n\tfor _, v := range fcol {\n\t\tsqlselect = sqlselect + \"`\" + v.Field + \"`,\"\n\t}\n\n\t// This is where we select the rows to be inserted\n\t// I am going to collect all of the rows and batch them for insert then\n\t// I will process the inserts\n\t//\n\t// I want to be in and out of the production db asap\n\tsqlselect = sqlselect[:len(sqlselect)-1] + \" FROM \" + tablename + \" WHERE `\" + updatetscolname + \"` >=\t '\" + latestts + \"'\"\n\t//fmt.Println(\"Executing select - \", sqlselect)\n\n\trows, queryerr := sourcedb.Query(sqlselect) // Note: Ignoring errors for brevity\n\tif queryerr != nil {\n\t\tfmt.Println(sqlselect, \"-\", queryerr)\n\t\treturn queryerr.Error()\n\t}\n\n\tlength := len(fcol)\n\tvar insertvalues []string\n\tfor rows.Next() {\n\n\t\tpointers = make([]interface{}, length)\n\t\tcontainer = make([]sql.NullString, length)\n\n\t\tfor i := range pointers {\n\t\t\tpointers[i] = &container[i]\n\t\t}\n\n\t\terr := rows.Scan(pointers...)\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t\ttstring := \"\"\n\t\tfor k, v := range container {\n\n\t\t\t//fmt.Print(fcol[k].Field, \" - \")\n\t\t\tftype := \"\"\n\t\t\tif strings.HasPrefix(fcol[k].FieldType, \"double\") {\n\t\t\t\tftype = \"double\"\n\t\t\t}\n\t\t\tif strings.HasPrefix(fcol[k].FieldType, \"text\") {\n\t\t\t\tftype = \"varchar\"\n\t\t\t}\n\t\t\tif strings.HasPrefix(fcol[k].FieldType, \"int\") {\n\t\t\t\tftype = \"double\"\n\t\t\t}\n\t\t\tif strings.HasPrefix(fcol[k].FieldType, \"tiny\") {\n\t\t\t\tftype = \"double\"\n\t\t\t}\n\t\t\tif strings.HasPrefix(fcol[k].FieldType, \"varchar\") {\n\t\t\t\tftype = \"varchar\"\n\t\t\t}\n\t\t\tif strings.HasPrefix(fcol[k].FieldType, \"date\") {\n\t\t\t\tftype = \"varchar\"\n\t\t\t}\n\t\t\tif strings.HasPrefix(fcol[k].FieldType, \"time\") {\n\t\t\t\tftype = \"varchar\"\n\t\t\t}\n\t\t\tswitch ftype {\n\t\t\tcase \"double\":\n\t\t\t\tif v.Valid {\n\t\t\t\t\t//\n\t\t\t\t\t//fmt.Println(v.String)\n\t\t\t\t\ttstring = tstring + v.String\n\t\t\t\t} else {\n\t\t\t\t\t//\tfmt.Println(\"NULL\")\n\t\t\t\t\ttstring = tstring + \"NULL\"\n\t\t\t\t}\n\t\t\t\ttstring = tstring + \",\"\n\t\t\tcase \"varchar\":\n\t\t\t\tif v.Valid {\n\t\t\t\t\t//\tfmt.Println(\"'\" + v.String + \"'\")\n\t\t\t\t\t// Clean string\n\t\t\t\t\ttstring = tstring + \"'\" + strings.Replace(v.String, \"'\", `\\'`, -1) + \"'\"\n\t\t\t\t} else {\n\t\t\t\t\t//\tfmt.Println(\"NULL\")\n\t\t\t\t\ttstring = tstring + \"NULL\"\n\t\t\t\t}\n\t\t\t\ttstring = tstring + \",\"\n\t\t\tdefault:\n\t\t\t\tfmt.Println(\"Unhandled\", fcol[k], \"- \", v)\n\n\t\t\t}\n\n\t\t}\n\t\n\t\ttstring = tstring[:len(tstring)-1]\n\t\ttstring = \"(\" + tstring + \")\"\n\t\tinsertvalues = append(insertvalues, tstring)\n\t}\n\tfmt.Print(tablename, \" - \", len(insertvalues), \" rows to copy. \")\n\tbatchcounter := 0\n\tbatchstring := \"\"\n\tres := \"\"\n\tvar reccounter float64\n\treccounter = 0\n\tnow := time.Now().UTC()\n\tvar buffer bytes.Buffer\n\n\tfor _, v := range insertvalues {\n\t\treccounter++\n\t\tbatchcounter++\n\t\tbuffer.WriteString(v + \",\")\n\t\t// The buffer length must be smalled than the max packet size of the db\n\t\tif buffer.Len() > 4000000 {\n\t\t\tbatchstring = buffer.String()\n\t\t\tbatchstring = batchstring[:len(batchstring)-1]\n\t\t\tres = \"OK\"\n\t\t\tres = execDDL(todb, sqlinsert+batchstring)\n\t\t\tif res != \"OK\" {\n\t\t\t\tres = res + \" with query \" + sqlinsert + batchstring\n\t\t\t}\n\t\t\tfmt.Print(\" . \", reccounter, \" Records posted \", res)\n\t\t\tbatchstring = \"\"\n\t\t\tbuffer.Reset()\n\t\t\tbatchcounter = 0\n\t\t}\n\n\t}\n\tif batchcounter > 0 {\n\t\tbatchstring = buffer.String()\n\t\tbatchstring = batchstring[:len(batchstring)-1]\n\t\tres = \"OK\"\n\t\tres = execDDL(todb, sqlinsert+batchstring)\n\t\tfmt.Print(\" . \", reccounter, \" Records posted \", res)\n\n\t} else {\n\t\tfmt.Println(\"No records to copy\")\n\t}\n\tfmt.Println(\" Elapsed =\", time.Since(now))\n\treturn \"OK\"\n}", "title": "" }, { "docid": "3bc8239eb8c5113f4736e912eb50af3f", "score": "0.42588168", "text": "func (mysqld *Mysqld) dumpTableFull(td proto.TableDefinition, dbName, mainCloneSourcePath string, cloneSourcePath string, maximumFilesize uint64) ([]SnapshotFile, error) {\n\tfilename := path.Join(mainCloneSourcePath, td.Name+\".csv\")\n\tselectIntoOutfile := `SELECT {{.Columns}} INTO OUTFILE \"{{.TableOutputPath}}\" CHARACTER SET binary FIELDS TERMINATED BY ',' OPTIONALLY ENCLOSED BY '\"' ESCAPED BY '\\\\' LINES TERMINATED BY '\\n' FROM {{.TableName}}`\n\tqueryParams := map[string]string{\n\t\t\"TableName\": dbName + \".\" + td.Name,\n\t\t\"Columns\": strings.Join(td.Columns, \", \"),\n\t\t\"TableOutputPath\": filename,\n\t}\n\tsio, err := fillStringTemplate(selectIntoOutfile, queryParams)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err := mysqld.ExecuteSuperQuery(sio); err != nil {\n\t\treturn nil, err\n\t}\n\n\tfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer func() {\n\t\tfile.Close()\n\t\tif e := os.Remove(filename); e != nil {\n\t\t\tlog.Errorf(\"Cannot remove %v: %v\", filename, e)\n\t\t}\n\t}()\n\n\tfilenamePattern := path.Join(cloneSourcePath, td.Name+\".%v.csv.gz\")\n\thasherWriter, err := newCompressedNamedHasherWriter(filenamePattern, mysqld.SnapshotDir, td.Name, maximumFilesize)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsplitter := csvsplitter.NewCSVReader(file, ',')\n\tfor {\n\t\tline, err := splitter.ReadRecord()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t_, err = hasherWriter.Write(line)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn hasherWriter.SnapshotFiles()\n}", "title": "" }, { "docid": "05ef68ce51a556cf64d42561a87f143b", "score": "0.42571494", "text": "func printDbData(db map[string]map[string]db.Value, fileName string) {\n fp, err := os.Create(fileName)\n if err != nil {\n return\n }\n defer fp.Close()\n\n for k, v := range db {\n fmt.Fprintf(fp, \"-----------------------------------------------------------------\\r\\n\")\n fmt.Fprintf(fp, \"table name : %v\\r\\n\", k)\n for ik, iv := range v {\n fmt.Fprintf(fp, \" key : %v\\r\\n\", ik)\n for k, d := range iv.Field {\n fmt.Fprintf(fp, \" %v :%v\\r\\n\", k, d)\n }\n }\n }\n fmt.Fprintf(fp, \"-----------------------------------------------------------------\\r\\n\")\n return\n}", "title": "" }, { "docid": "f04081b7cd274cef78aaedfa81a3c574", "score": "0.42567208", "text": "func createTable(db *sql.DB, nameTable string){\n //não precisamos da resposta estamos utilzaremos apenas a variável err para ver se houve algum error\n stringTables := [7]string{\"powerstats\",\"biography\",\"appearance\",\"work\",\"connections\",\"image\",\"super\"}\n switch nameTable {\n case stringTables[0]: \n if existTable(db, stringTables[0]) == false { \n _,err := db.Exec(\"CREATE TABLE \"+nameTable+\" (\"+\n \"idpower integer primary key,\"+\n \"intelligence varchar(10000) not null,\"+ \n \"strength varchar(10000) not null,\"+ \n \"speed varchar(10000) not null,\"+\n \"durability varchar(10000) not null,\"+\n \"power varchar(10000) not null,\"+ \n \"combat varchar(10000) not null\"+\")\")\n if err != nil{\n fmt.Println(stringTables[0])\n panic(err)\n }\n }\n case stringTables[1]:\n if existTable(db, stringTables[1]) == false { \n _,err := db.Exec(\"CREATE TABLE \"+nameTable+\" (\"+\n \"idbio integer primary key,\"+\n \"fullname varchar(10000) not null,\"+ \n \"alteregos varchar(10000) not null,\"+ \n \"aliases varchar[10000] not null,\"+\n \"placeofbirth varchar(10000) not null,\"+ \n \"firstappearance varchar(10000) not null,\"+ \n \"publisher varchar(10000) not null,\"+ \n \"alignment varchar(10000) not null\"+\")\") \n if err != nil{\n fmt.Println(stringTables[1])\n panic(err)\n }\n } \n case stringTables[2]:\n if existTable(db, stringTables[2]) == false { \n _,err := db.Exec(\"CREATE TABLE \"+nameTable+\"(\"+\n \"idappearance integer primary key,\"+\n \"gender varchar(10000) not null,\"+ \n \"race varchar(10000) not null,\"+ \n \"height varchar[10000] not null,\"+ \n \"weight varchar[10000] not null,\"+ \n \"eyecolor varchar(10000) not null,\"+ \n \"haircolor varchar(10000) not null\"+\")\") \n if err != nil{\n fmt.Println(stringTables[2])\n panic(err)\n }\n }\n case stringTables[3]:\n if existTable(db, stringTables[3]) == false { \n _,err := db.Exec(\"CREATE TABLE \"+nameTable+\" (\"+\n \"idwork integer primary key not null,\"+\n \"occupation varchar(10000) not null,\"+ \n \"baseofoperation varchar(10000) not null\"+\")\")\n if err != nil{\n panic(err)\n }\n }\n case stringTables[4]:\n if existTable(db, stringTables[4]) == false { \n _,err := db.Exec(\"CREATE TABLE \"+nameTable+\" (\"+\n \"idcon integer primary key not null,\"+\n \"groupaffiliation varchar(10000) not null,\"+\n \"relatives varchar(10000) not null\"+\")\")\n if err != nil{\n fmt.Println(stringTables[4])\n panic(err)\n }\n } \n case stringTables[5]:\n if existTable(db, stringTables[5]) == false { \n _,err := db.Exec(\"CREATE TABLE \"+nameTable+\" (\"+\n \"idurl integer primary key not null,\"+\n \"url varchar(100000) not null )\") \n if err != nil{\n fmt.Println(stringTables[5])\n panic(err)\n }\n }\n case stringTables[6]:\n if existTable(db, stringTables[6]) == false { \n _,err := db.Exec(\"CREATE TABLE \"+nameTable+\" (\"+ \n \"name varchar(10000) not null,\"+ \n \"id integer primary key not null)\") \n if err != nil{\n fmt.Println(stringTables[6])\n panic(err)\n }\n }\n default:\n fmt.Println(\"Error\")\n }\n}", "title": "" }, { "docid": "9932fd4563e5b5d3562323838370c1b1", "score": "0.42425177", "text": "func genIdx(fpath string) { //nolint:cyclop\n\ttype Index struct {\n\t\tName string\n\t\tNameShort string\n\t\tResType string\n\t\tResTypeFolder string\n\t\tResources [][]string\n\t}\n\n\tvar resources string\n\n\tvar dataSources []Index\n\n\tvar sources []Index\n\n\tfname := \"provider.go\"\n\tlog.Printf(\"[START]get description from file: %s\\n\", fname)\n\n\tdescription, err := getFileDescription(fmt.Sprintf(\"%s/%s\", fpath, fname))\n\tif err != nil {\n\t\tlog.Printf(\"[SKIP!]get description failed, skip: %s\", err)\n\n\t\treturn\n\t}\n\n\tdescription = strings.TrimSpace(description)\n\tif description == \"\" {\n\t\tlog.Printf(\"[SKIP!]description empty, skip: %s\\n\", fname)\n\n\t\treturn\n\t}\n\n\tpos := strings.Index(description, \"Resources List\\n\")\n\tif pos != -1 {\n\t\tresources = strings.TrimSpace(description[pos+16:])\n\t} else {\n\t\tlog.Printf(\"[SKIP!]resource list missing, skip: %s\\n\", fname)\n\n\t\treturn\n\t}\n\n\tindex := Index{}\n\n\tfor _, v := range strings.Split(resources, \"\\n\") {\n\t\tvv := strings.TrimSpace(v)\n\t\tif vv == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tif strings.HasPrefix(v, \" \") { //nolint:nestif\n\t\t\tif index.Name == \"\" {\n\t\t\t\tlog.Printf(\"[FAIL!]no resource name found: %s\", v)\n\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tindex.Resources = append(index.Resources, []string{vv, vv[len(providerName)+1:]})\n\t\t} else {\n\t\t\tif index.Name != \"\" {\n\t\t\t\tif index.Name == dataSourcesStr {\n\t\t\t\t\tdataSources = append(dataSources, index)\n\t\t\t\t} else {\n\t\t\t\t\tsources = append(sources, index)\n\t\t\t\t}\n\t\t\t}\n\t\t\tvvv := \"\"\n\t\t\tresType := \"datasource\"\n\t\t\tresTypeFolder := \"data-sources\"\n\t\t\tif vv != dataSourcesStr {\n\t\t\t\tresType = \"resource\"\n\t\t\t\tresTypeFolder = \"resources\"\n\t\t\t\tvs := strings.Split(vv, \" \")\n\t\t\t\tvvv = strings.ToLower(strings.Join(vs[:len(vs)-1], \"-\"))\n\t\t\t}\n\t\t\tindex = Index{\n\t\t\t\tName: vv,\n\t\t\t\tNameShort: vvv,\n\t\t\t\tResType: resType,\n\t\t\t\tResTypeFolder: resTypeFolder,\n\t\t\t\tResources: [][]string{},\n\t\t\t}\n\t\t}\n\t}\n\n\tif index.Name != \"\" {\n\t\tif index.Name == dataSourcesStr {\n\t\t\tdataSources = append(dataSources, index)\n\t\t} else {\n\t\t\tsources = append(sources, index)\n\t\t}\n\t}\n\n\tdataSources = append(dataSources, sources...)\n\tdata := map[string]interface{}{\n\t\t\"datasource\": dataSources,\n\t}\n\n\tfname = fmt.Sprintf(\"%s/index.md\", docRoot)\n\n\tfd, err := os.OpenFile(fname, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0o644)\n\tif err != nil {\n\t\tlog.Printf(\"[FAIL!]open file %s failed: %s\", fname, err)\n\n\t\treturn\n\t}\n\n\tdefer func() {\n\t\tif e := fd.Close(); e != nil {\n\t\t\tlog.Printf(\"[FAIL!]close file %s failed: %s\", fname, e)\n\t\t}\n\t}()\n\n\tidxTPL, err := ioutil.ReadFile(indexFile)\n\tif err != nil {\n\t\tlog.Printf(\"[FAIL!]open file %s failed: %s\", indexFile, err)\n\n\t\treturn\n\t}\n\n\tt := template.Must(template.New(\"t\").Parse(string(idxTPL)))\n\n\terr = t.Execute(fd, data)\n\tif err != nil {\n\t\tlog.Printf(\"[FAIL!]write file %s failed: %s\", fname, err)\n\n\t\treturn\n\t}\n\n\tlog.Printf(\"[SUCC.]write doc to file success: %s\", fname)\n}", "title": "" }, { "docid": "a770273a83eb9212603685be2a07389b", "score": "0.42403185", "text": "func pointsFromCsv(reader io.Reader) (map[string]*routes_map.Point, error) {\n\tcsvReader := csv.NewReader(reader)\n\tpoints := make(map[string]*routes_map.Point)\n\n\tfor {\n\t\tline, err := csvReader.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\n\t\torigin, err := retrieveOrCreatePoint(line[0], points)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tdestination, err := retrieveOrCreatePoint(line[1], points)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tprice, err := strconv.ParseUint(line[2], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\terr = origin.NewConnection(destination, uint(price))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn points, nil\n}", "title": "" }, { "docid": "bf08f15a776efa52fa77c3d2b0f68775", "score": "0.42402098", "text": "func GetDBTableInfo(visitInfo []visitInfo) []stmtctx.TableEntry {\n\tvar tables []stmtctx.TableEntry\n\texistsFunc := func(tbls []stmtctx.TableEntry, tbl *stmtctx.TableEntry) bool {\n\t\tfor _, t := range tbls {\n\t\t\tif t == *tbl {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t\treturn false\n\t}\n\tfor _, v := range visitInfo {\n\t\tif v.db == \"\" && v.table == \"\" {\n\t\t\t// when v.db == \"\" and v.table == \"\", it means this visitInfo is for dynamic privilege,\n\t\t\t// so it is not related to any database or table.\n\t\t\tcontinue\n\t\t}\n\n\t\ttbl := &stmtctx.TableEntry{DB: v.db, Table: v.table}\n\t\tif !existsFunc(tables, tbl) {\n\t\t\ttables = append(tables, *tbl)\n\t\t}\n\t}\n\treturn tables\n}", "title": "" }, { "docid": "43efb1284470eb857fcf838bb683f752", "score": "0.42328286", "text": "func (rp *ReplicatorPlan) buildFromFields(tableName string, lastpk *sqltypes.Result, fields []*querypb.Field) (*TablePlan, error) {\n\ttpb := &tablePlanBuilder{\n\t\tname: sqlparser.NewIdentifierCS(tableName),\n\t\tlastpk: lastpk,\n\t\tcolInfos: rp.ColInfoMap[tableName],\n\t\tstats: rp.stats,\n\t\tsource: rp.Source,\n\t}\n\tfor _, field := range fields {\n\t\tcolName := sqlparser.NewIdentifierCI(field.Name)\n\t\tisGenerated := false\n\t\tfor _, colInfo := range tpb.colInfos {\n\t\t\tif !strings.EqualFold(colInfo.Name, field.Name) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif colInfo.IsGenerated {\n\t\t\t\tisGenerated = true\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t\tif isGenerated {\n\t\t\tcontinue\n\t\t}\n\t\tcexpr := &colExpr{\n\t\t\tcolName: colName,\n\t\t\tcolType: field.Type,\n\t\t\texpr: &sqlparser.ColName{\n\t\t\t\tName: colName,\n\t\t\t},\n\t\t\treferences: map[string]bool{\n\t\t\t\tfield.Name: true,\n\t\t\t},\n\t\t}\n\t\ttpb.colExprs = append(tpb.colExprs, cexpr)\n\t}\n\t// The following actions are a subset of buildTablePlan.\n\tif err := tpb.analyzePK(rp.ColInfoMap[tableName]); err != nil {\n\t\treturn nil, err\n\t}\n\treturn tpb.generate(), nil\n}", "title": "" }, { "docid": "c55995f89415a986e0e283f944f6488d", "score": "0.42204654", "text": "func createTracerouteTable() error {\n\tsqlCreateTable := `\n CREATE TABLE IF NOT EXISTS traceroute(\n Inserted BIGINT NOT NULL PRIMARY KEY,\n ActualDuration INT,\n CIa TEXT,\n CAddr TEXT,\n SIa TEXT,\n SAddr TEXT,\n\t\tTimeout REAL,\n\t\tCmdOutput TEXT,\n\t\tError TEXT,\n\t\tPath TEXT\n );\n `\n\t_, err := db.Exec(sqlCreateTable)\n\treturn err\n}", "title": "" }, { "docid": "39fa260c7c3713558036637bf4913806", "score": "0.41910303", "text": "func (b *PlanBuilder) buildAnalyzeTable(as *ast.AnalyzeTableStmt, opts map[ast.AnalyzeOptionType]uint64, version int) (Plan, error) {\n\tp := &Analyze{Opts: opts}\n\tp.OptionsMap = make(map[int64]V2AnalyzeOptions)\n\tusePersistedOptions := variable.PersistAnalyzeOptions.Load()\n\n\t// Construct tasks for each table.\n\tfor _, tbl := range as.TableNames {\n\t\tif tbl.TableInfo.IsView() {\n\t\t\treturn nil, errors.Errorf(\"analyze view %s is not supported now\", tbl.Name.O)\n\t\t}\n\t\tif tbl.TableInfo.IsSequence() {\n\t\t\treturn nil, errors.Errorf(\"analyze sequence %s is not supported now\", tbl.Name.O)\n\t\t}\n\n\t\tidxInfo, colInfo := getColsInfo(tbl)\n\t\tphysicalIDs, partitionNames, err := GetPhysicalIDsAndPartitionNames(tbl.TableInfo, as.PartitionNames)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvar commonHandleInfo *model.IndexInfo\n\t\tif version == statistics.Version2 {\n\t\t\tp.ColTasks, err = b.buildAnalyzeFullSamplingTask(as, p.ColTasks, physicalIDs, partitionNames, tbl, version, usePersistedOptions, p.OptionsMap)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\t// Version 1 analyze.\n\t\tif as.ColumnChoice == model.PredicateColumns {\n\t\t\treturn nil, errors.Errorf(\"Only the version 2 of analyze supports analyzing predicate columns\")\n\t\t}\n\t\tif as.ColumnChoice == model.ColumnList {\n\t\t\treturn nil, errors.Errorf(\"Only the version 2 of analyze supports analyzing the specified columns\")\n\t\t}\n\t\tfor _, idx := range idxInfo {\n\t\t\t// For prefix common handle. We don't use analyze mixed to handle it with columns. Because the full value\n\t\t\t// is read by coprocessor, the prefix index would get wrong stats in this case.\n\t\t\tif idx.Primary && tbl.TableInfo.IsCommonHandle && !idx.HasPrefixIndex() {\n\t\t\t\tcommonHandleInfo = idx\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif idx.MVIndex {\n\t\t\t\tb.ctx.GetSessionVars().StmtCtx.AppendWarning(errors.Errorf(\"analyzing multi-valued indexes is not supported, skip %s\", idx.Name.L))\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfor i, id := range physicalIDs {\n\t\t\t\tif id == tbl.TableInfo.ID {\n\t\t\t\t\tid = -1\n\t\t\t\t}\n\t\t\t\tinfo := AnalyzeInfo{\n\t\t\t\t\tDBName: tbl.Schema.O,\n\t\t\t\t\tTableName: tbl.Name.O,\n\t\t\t\t\tPartitionName: partitionNames[i],\n\t\t\t\t\tTableID: statistics.AnalyzeTableID{TableID: tbl.TableInfo.ID, PartitionID: id},\n\t\t\t\t\tIncremental: as.Incremental,\n\t\t\t\t\tStatsVersion: version,\n\t\t\t\t}\n\t\t\t\tp.IdxTasks = append(p.IdxTasks, AnalyzeIndexTask{\n\t\t\t\t\tIndexInfo: idx,\n\t\t\t\t\tAnalyzeInfo: info,\n\t\t\t\t\tTblInfo: tbl.TableInfo,\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t\thandleCols := BuildHandleColsForAnalyze(b.ctx, tbl.TableInfo, true, nil)\n\t\tif len(colInfo) > 0 || handleCols != nil {\n\t\t\tfor i, id := range physicalIDs {\n\t\t\t\tif id == tbl.TableInfo.ID {\n\t\t\t\t\tid = -1\n\t\t\t\t}\n\t\t\t\tinfo := AnalyzeInfo{\n\t\t\t\t\tDBName: tbl.Schema.O,\n\t\t\t\t\tTableName: tbl.Name.O,\n\t\t\t\t\tPartitionName: partitionNames[i],\n\t\t\t\t\tTableID: statistics.AnalyzeTableID{TableID: tbl.TableInfo.ID, PartitionID: id},\n\t\t\t\t\tIncremental: as.Incremental,\n\t\t\t\t\tStatsVersion: version,\n\t\t\t\t}\n\t\t\t\tp.ColTasks = append(p.ColTasks, AnalyzeColumnsTask{\n\t\t\t\t\tHandleCols: handleCols,\n\t\t\t\t\tCommonHandleInfo: commonHandleInfo,\n\t\t\t\t\tColsInfo: colInfo,\n\t\t\t\t\tAnalyzeInfo: info,\n\t\t\t\t\tTblInfo: tbl.TableInfo,\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t}\n\n\treturn p, nil\n}", "title": "" }, { "docid": "3f016295015c877366ec5f6f885adb08", "score": "0.41796347", "text": "func (s *BaseMySqlParserListener) EnterTableSourceBase(ctx *TableSourceBaseContext) {}", "title": "" }, { "docid": "3f016295015c877366ec5f6f885adb08", "score": "0.41796347", "text": "func (s *BaseMySqlParserListener) EnterTableSourceBase(ctx *TableSourceBaseContext) {}", "title": "" }, { "docid": "89369954bff2729b47f6b6d134408726", "score": "0.41791996", "text": "func (c *csvimport) generateStatement( row []string ) error {\n // Header line so create a statement with the same number of columns\n s := []string{\"INSERT INTO \" + c.table + \" (\"}\n\n for i, col := range c.columns {\n if i > 0 {\n s = append( s, \",\" )\n }\n s = append( s, col.name )\n }\n\n s = append( s, \") VALUES (\" )\n\n f := \"$%d\"\n for i, _ := range c.columns {\n s = append( s, fmt.Sprintf( f, i+1 ) )\n f = \",$%d\"\n }\n\n s = append( s, \")\" )\n\n log.Println( strings.Join( s, \"\" ) )\n\n stmt, err := c.tx.Prepare( strings.Join( s, \"\" ) )\n c.stmt = stmt\n return err\n}", "title": "" }, { "docid": "4952508b2fdf3e027cb5cb285e6d9da7", "score": "0.41692486", "text": "func (x *GormDB) buildWhereLine(primaryKeys []string, rowMap []map[string]interface{},\n\tcolumnTypeMap map[string]schema.DataType, dbTagMap map[string]string) (string,[]interface{}) {\n\tvar values []interface{}\n\tsql := \" WHERE (\"\n\tfor _, primaryKey := range primaryKeys {\n\t\tsql += fmt.Sprintf(\"`%s`,\", primaryKey)\n\t}\n\tsql = strings.TrimSuffix(sql, \",\")\n\tsql += \") IN (\"\n\t// ((1,'v1'),(2,'v2'))\n\tfor _, item := range rowMap {\n\t\tsql += \"(\"\n\t\tfor _, primaryKey := range primaryKeys {\n\t\t\tname := dbTagMap[primaryKey]\n\t\t\tvalue := item[name]\n\t\t\tsql += \"?,\"\n\t\t\tvalues = append(values,value)\n\t\t}\n\t\tsql = strings.TrimSuffix(sql, \",\")\n\t\tsql += \"),\"\n\t}\n\tsql = strings.TrimSuffix(sql, \",\")\n\tsql += \")\"\n\treturn sql,values\n}", "title": "" }, { "docid": "33fe3573d135ed785166b17a82c3f003", "score": "0.4157612", "text": "func selectGatewayFields(ctx context.Context, query *gorm.DB, fieldMask *types.FieldMask) *gorm.DB {\n\tif fieldMask == nil || len(fieldMask.Paths) == 0 {\n\t\treturn query.Preload(\"Attributes\").Preload(\"Antennas\")\n\t}\n\tvar gatewayColumns []string\n\tvar notFoundPaths []string\n\tfor _, path := range ttnpb.TopLevelFields(fieldMask.Paths) {\n\t\tswitch path {\n\t\tcase \"ids\", \"created_at\", \"updated_at\":\n\t\t\t// always selected\n\t\tcase attributesField:\n\t\t\tquery = query.Preload(\"Attributes\")\n\t\tcase antennasField:\n\t\t\tquery = query.Preload(\"Antennas\")\n\t\tdefault:\n\t\t\tif columns, ok := gatewayColumnNames[path]; ok {\n\t\t\t\tgatewayColumns = append(gatewayColumns, columns...)\n\t\t\t} else {\n\t\t\t\tnotFoundPaths = append(notFoundPaths, path)\n\t\t\t}\n\t\t}\n\t}\n\tif len(notFoundPaths) > 0 {\n\t\twarning.Add(ctx, fmt.Sprintf(\"unsupported field mask paths: %s\", strings.Join(notFoundPaths, \", \")))\n\t}\n\treturn query.Select(cleanFields(append(append(modelColumns, \"gateway_id\", \"gateway_eui\"), gatewayColumns...)...))\n}", "title": "" }, { "docid": "6cfbe2e52e9df5cbac90fd34ae4c094e", "score": "0.41519946", "text": "func generateTableBatches(tables []Relation, batchSize int) []string {\n\tvar tableNames []string\n\tfor _, table := range tables {\n\t\ttableNames = append(tableNames, table.FQN())\n\t}\n\n\tvar end int\n\tvar batches []string\n\ti := 0\n\tfor i < len(tables) {\n\t\tif i+batchSize < len(tables) {\n\t\t\tend = i + batchSize\n\t\t} else {\n\t\t\tend = len(tables)\n\t\t}\n\n\t\tbatches = append(batches, strings.Join(tableNames[i:end], \", \"))\n\t\ti = end\n\t}\n\n\treturn batches\n}", "title": "" }, { "docid": "49ddecfef8b8b8ffd844b4d325c24bca", "score": "0.41479647", "text": "func (t *SourceTable) Setup(ctx context.Context, db *sql.DB) error {\n\ttx, err := db.Begin()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = tx.Exec(`\n\tCREATE TABLE IF NOT EXISTS fs_sources (\n\t\trowid INTEGER PRIMARY KEY AUTOINCREMENT,\n owner_uid INT NOT NULL,\n\t created_at TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP,\n prefix varchar(128) NOT NULL,\n kind INT NOT NULL,\n\n value1 varchar(1024) NOT NULL,\n value2 varchar(1024) NOT NULL,\n value3 varchar(1024) NOT NULL\n\t);\n\n CREATE INDEX IF NOT EXISTS fs_sources_by_owner ON fs_sources(owner_uid);\n CREATE INDEX IF NOT EXISTS fs_sources_by_prefix ON fs_sources(prefix);\n\t`)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err = tx.Commit(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "43ca054b1dbb8fa1a73a0ca0a7b0be76", "score": "0.41466692", "text": "func galacticCSV(body []byte, rule Rule) [][]string {\n\tvar jsonArray []interface{} // A generic way of handling json without struct\n\tjson.Unmarshal([]byte(body), &jsonArray)\n\tvar overall = make([][]string, 0) // Make a zero sized 2 dimensional array\n\tioMapping := make([]string, 0)\n\theaders := make([]string, 0)\n\n\tisHeaderPrinted := false\n\tisIOMappingGenerated := false\n\tfor _, jsonNode := range jsonArray {\n\t\trow := make([]string, 0)\n\n\t\tif isIOMappingGenerated == false {\n\t\t\tif len(ioMapping) <= 0 && len(rule.IOMapping) <= 0 {\n\t\t\t\tfor nodeKey, _ := range jsonNode.(map[string]interface{}) {\n\t\t\t\t\tioMapping = append(ioMapping, nodeKey) // Generate a IO Mapping based on the received json file. Take note that golang don't preserve the JSON column order\n\t\t\t\t\theaders = append(headers, nodeKey)\n\t\t\t\t}\n\t\t\t} else if len(rule.IOMapping) > 0 { // If IOMapping has been populated\n\t\t\t\tfor _, nodeValue := range rule.IOMapping {\n\t\t\t\t\tioMapping = append(ioMapping, nodeValue.Incoming) // Copy the IO Mapping from Endpoint configuration\n\t\t\t\t\theaders = append(headers, nodeValue.Outgoing)\n\t\t\t\t}\n\t\t\t}\n\t\t\tisIOMappingGenerated = true\n\t\t}\n\n\t\tif isHeaderPrinted == false {\n\t\t\toverall = append(overall, printHeader(headers))\n\t\t\tisHeaderPrinted = true\n\t\t}\n\n\t\trow = append(row, galacticColumnizer(jsonNode.(map[string]interface{}), ioMapping)...)\n\t\toverall = append(overall, row)\n\t}\n\treturn overall\n}", "title": "" }, { "docid": "fde730f3e73cb681e4002418d8992d2a", "score": "0.41385877", "text": "func generateTargetOpenFlow(dk docker.Client, odb ovsdb.Client,\n\tcontainers []db.Container, labels []db.Label,\n\tconnections []db.Connection) (OFRuleSlice, error) {\n\n\tdflGatewayMAC, err := getMac(\"\", quiltBridge)\n\tif err != nil {\n\t\tlog.WithError(err).Error(\"failed to get MAC of default gateway.\")\n\t}\n\n\tifaces, err := odb.ListInterfaces()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tifaceMap := make(map[string]int)\n\tfor _, iface := range ifaces {\n\t\tif iface.OFPort != nil {\n\t\t\tifaceMap[iface.Name] = *iface.OFPort\n\t\t}\n\t}\n\n\tvar rules []string\n\tfor _, dbc := range containers {\n\t\t_, vethOut := veths(dbc.DockerID)\n\t\t_, peerQuilt := patchPorts(dbc.DockerID)\n\t\tdbcMac := dbc.Mac\n\n\t\tofQuilt, ok := ifaceMap[peerQuilt]\n\t\tif !ok {\n\t\t\tcontinue\n\t\t}\n\n\t\tofVeth, ok := ifaceMap[vethOut]\n\t\tif !ok {\n\t\t\tcontinue\n\t\t}\n\n\t\tif ofQuilt < 0 || ofVeth < 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\trules = append(rules, []string{\n\t\t\tfmt.Sprintf(\"table=0 priority=%d,in_port=%d \"+\n\t\t\t\t\"actions=output:%d\", 5000, ofQuilt, ofVeth),\n\t\t\tfmt.Sprintf(\"table=2 priority=%d,in_port=%d \"+\n\t\t\t\t\"actions=output:%d\", 5000, ofVeth, ofQuilt),\n\t\t\tfmt.Sprintf(\"table=0 priority=%d,in_port=%d \"+\n\t\t\t\t\"actions=output:%d\", 0, ofVeth, ofQuilt),\n\t\t}...)\n\n\t\tprotocols := []string{\"tcp\", \"udp\"}\n\n\t\tportsToWeb := make(map[int]struct{})\n\t\tportsFromWeb := make(map[int]struct{})\n\t\tfor _, l := range dbc.Labels {\n\t\t\tfor _, conn := range connections {\n\t\t\t\tif conn.From == l &&\n\t\t\t\t\tconn.To == stitch.PublicInternetLabel {\n\t\t\t\t\tportsToWeb[conn.MinPort] = struct{}{}\n\t\t\t\t} else if conn.From ==\n\t\t\t\t\tstitch.PublicInternetLabel && conn.To == l {\n\t\t\t\t\tportsFromWeb[conn.MinPort] = struct{}{}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// LOCAL is the default quilt-int port created with the bridge.\n\t\tegressRule := fmt.Sprintf(\"table=0 priority=%d,in_port=%d,\",\n\t\t\t5000, ofVeth) +\n\t\t\t\"%s,%s,\" + fmt.Sprintf(\"dl_dst=%s actions=LOCAL\", dflGatewayMAC)\n\t\tingressRule := fmt.Sprintf(\"table=0 priority=%d,in_port=LOCAL,\", 5000) +\n\t\t\t\"%s,%s,\" + fmt.Sprintf(\"dl_dst=%s actions=%d\", dbcMac, ofVeth)\n\n\t\tfor port := range portsFromWeb {\n\t\t\tfor _, protocol := range protocols {\n\t\t\t\tegressPort := fmt.Sprintf(\"tp_src=%d\", port)\n\t\t\t\trules = append(rules, fmt.Sprintf(egressRule, protocol,\n\t\t\t\t\tegressPort))\n\n\t\t\t\tingressPort := fmt.Sprintf(\"tp_dst=%d\", port)\n\t\t\t\trules = append(rules, fmt.Sprintf(ingressRule, protocol,\n\t\t\t\t\tingressPort))\n\t\t\t}\n\t\t}\n\n\t\tfor port := range portsToWeb {\n\t\t\tfor _, protocol := range protocols {\n\t\t\t\tegressPort := fmt.Sprintf(\"tp_dst=%d\", port)\n\t\t\t\trules = append(rules, fmt.Sprintf(egressRule, protocol,\n\t\t\t\t\tegressPort))\n\n\t\t\t\tingressPort := fmt.Sprintf(\"tp_src=%d\", port)\n\t\t\t\trules = append(rules, fmt.Sprintf(ingressRule, protocol,\n\t\t\t\t\tingressPort))\n\t\t\t}\n\t\t}\n\n\t\tvar arpDst string\n\t\tif len(portsToWeb) > 0 || len(portsFromWeb) > 0 {\n\t\t\t// Allow ICMP\n\t\t\trules = append(rules,\n\t\t\t\tfmt.Sprintf(\n\t\t\t\t\t\"table=0 priority=%d,icmp,in_port=%d,dl_dst=%s\"+\n\t\t\t\t\t\t\" actions=LOCAL\",\n\t\t\t\t\t5000, ofVeth, dflGatewayMAC))\n\t\t\trules = append(rules,\n\t\t\t\tfmt.Sprintf(\n\t\t\t\t\t\"table=0 priority=%d,icmp,in_port=LOCAL,\"+\n\t\t\t\t\t\t\"dl_dst=%s actions=output:%d\",\n\t\t\t\t\t5000, dbcMac, ofVeth))\n\n\t\t\tarpDst = fmt.Sprintf(\"%d,LOCAL\", ofQuilt)\n\t\t} else {\n\t\t\tarpDst = fmt.Sprintf(\"%d\", ofQuilt)\n\t\t}\n\n\t\tif len(portsFromWeb) > 0 {\n\t\t\t// Allow default gateway to ARP for containers\n\t\t\trules = append(rules, fmt.Sprintf(\n\t\t\t\t\"table=0 priority=%d,arp,in_port=LOCAL,\"+\n\t\t\t\t\t\"dl_dst=ff:ff:ff:ff:ff:ff actions=output:%d\",\n\t\t\t\t4500, ofVeth))\n\t\t}\n\n\t\trules = append(rules, fmt.Sprintf(\n\t\t\t\"table=0 priority=%d,arp,in_port=%d \"+\n\t\t\t\t\"actions=output:%s\",\n\t\t\t4500, ofVeth, arpDst))\n\t\trules = append(rules, fmt.Sprintf(\n\t\t\t\"table=0 priority=%d,arp,in_port=LOCAL,\"+\n\t\t\t\t\"dl_dst=%s actions=output:%d\",\n\t\t\t4500, dbcMac, ofVeth))\n\t}\n\n\tLabelMacs := make(map[string]map[string]struct{})\n\tfor _, dbc := range containers {\n\t\tfor _, l := range dbc.Labels {\n\t\t\tif _, ok := LabelMacs[l]; !ok {\n\t\t\t\tLabelMacs[l] = make(map[string]struct{})\n\t\t\t}\n\t\t\tLabelMacs[l][dbc.Mac] = struct{}{}\n\t\t}\n\t}\n\n\tfor _, label := range labels {\n\t\tif !label.MultiHost {\n\t\t\tcontinue\n\t\t}\n\n\t\tmacs := LabelMacs[label.Label]\n\t\tif len(macs) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tip := label.IP\n\t\tn := len(macs)\n\t\tlg2n := int(math.Ceil(math.Log2(float64(n))))\n\n\t\tnxmRange := fmt.Sprintf(\"0..%d\", lg2n)\n\t\tif lg2n == 0 {\n\t\t\t// dump-flows collapses 0..0 to just 0.\n\t\t\tnxmRange = \"0\"\n\t\t}\n\t\tmpa := fmt.Sprintf(\"multipath(symmetric_l3l4,0,modulo_n,%d,0,\"+\n\t\t\t\"NXM_NX_REG0[%s])\", n, nxmRange)\n\n\t\trules = append(rules, fmt.Sprintf(\n\t\t\t\"table=0 priority=%d,dl_dst=%s,ip,nw_dst=%s \"+\n\t\t\t\t\"actions=%s,resubmit(,1)\",\n\t\t\t4000, labelMac, ip, mpa))\n\n\t\t// We need the order to make diffing consistent.\n\t\tmacList := make([]string, 0, n)\n\t\tfor mac := range macs {\n\t\t\tmacList = append(macList, mac)\n\t\t}\n\t\tsort.Strings(macList)\n\n\t\ti := 0\n\t\tregPrefix := \"\"\n\t\tfor _, mac := range macList {\n\t\t\tif i > 0 {\n\t\t\t\t// dump-flows puts a 0x prefix for all register values\n\t\t\t\t// except for 0.\n\t\t\t\tregPrefix = \"0x\"\n\t\t\t}\n\t\t\treg0 := fmt.Sprintf(\"%s%x\", regPrefix, i)\n\n\t\t\trules = append(rules, fmt.Sprintf(\n\t\t\t\t\"table=1 priority=5000,ip,nw_dst=%s,\"+\n\t\t\t\t\t\"reg0=%s actions=mod_dl_dst:%s,resubmit(,2)\",\n\t\t\t\tip, reg0, mac))\n\t\t\ti++\n\t\t}\n\t}\n\n\tvar targetRules OFRuleSlice\n\tfor _, r := range rules {\n\t\trule, err := makeOFRule(r)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"failed to make OpenFlow rule: %s\", err)\n\t\t}\n\t\ttargetRules = append(targetRules, rule)\n\t}\n\n\treturn targetRules, nil\n}", "title": "" }, { "docid": "0ba92430949ddac25704266abd1d7780", "score": "0.4130183", "text": "func connectedRoutesFromConfig(cfg *oc.Device) (map[string]*niConnected, error) {\n\t// TODO(robjs): figure out where the reference that is referencing policy\n\t// definitions is that has not yet been removed, improve ygot error message.\n\tif err := cfg.Validate(&ytypes.LeafrefOptions{\n\t\tIgnoreMissingData: true,\n\t\tLog: true,\n\t}); err != nil {\n\t\treturn nil, fmt.Errorf(\"invalid input configuration, %v\", err)\n\t}\n\n\tmatched := map[string]map[uint32]bool{}\n\t// intfRoute is a map, keyed by the name of a physical interface, of maps, keyed by the id\n\t// of a subinterface, that points to the set of connected routes that are configured on the\n\t// interface.\n\tintfRoute := map[string]map[uint32][]*Route{}\n\tfor intName, intf := range cfg.Interface {\n\t\tintfRoute[intf.GetName()] = map[uint32][]*Route{}\n\t\tfor subIntIdx, subintf := range intf.Subinterface {\n\t\t\tif subintf.GetIpv4() != nil {\n\t\t\t\tfor _, a := range subintf.GetIpv4().Address {\n\t\t\t\t\t_, cidr, err := net.ParseCIDR(fmt.Sprintf(\"%s/%d\", a.GetIp(), a.GetPrefixLength()))\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil, fmt.Errorf(\"invalid IPv4 prefix on interface %s, subinterface %d, %s/%d\", intf.GetName(), subintf.GetIndex(), a.GetIp(), a.GetPrefixLength())\n\t\t\t\t\t}\n\t\t\t\t\trt := &Route{\n\t\t\t\t\t\tPrefix: cidr.String(),\n\t\t\t\t\t\tConnected: &Interface{\n\t\t\t\t\t\t\tName: intf.GetName(),\n\t\t\t\t\t\t\tSubinterface: subintf.GetIndex(),\n\t\t\t\t\t\t},\n\t\t\t\t\t}\n\t\t\t\t\tintfRoute[intName][subIntIdx] = append(intfRoute[intName][subIntIdx], rt)\n\t\t\t\t\tif matched[intf.GetName()] == nil {\n\t\t\t\t\t\tmatched[intf.GetName()] = map[uint32]bool{}\n\t\t\t\t\t}\n\t\t\t\t\tmatched[intf.GetName()][subintf.GetIndex()] = false\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tvar (\n\t\tdefName string\n\t\tni = make(map[string]*niConnected)\n\t)\n\n\tfor _, n := range cfg.NetworkInstance {\n\t\tnetInstRoutes := &niConnected{\n\t\t\tN: n.GetName(),\n\t\t}\n\n\t\t// We don't support L2 adjacencies.\n\t\tswitch n.GetType() {\n\t\tcase oc.NetworkInstanceTypes_NETWORK_INSTANCE_TYPE_DEFAULT_INSTANCE:\n\t\t\tif defName != \"\" {\n\t\t\t\treturn nil, fmt.Errorf(\"cannot have >1 default instance, got %s and %s\", n.GetName(), defName)\n\t\t\t}\n\t\t\tdefName = n.GetName()\n\t\t\tnetInstRoutes.T = n.GetType()\n\t\tcase oc.NetworkInstanceTypes_NETWORK_INSTANCE_TYPE_L2P2P, oc.NetworkInstanceTypes_NETWORK_INSTANCE_TYPE_L2VSI, oc.NetworkInstanceTypes_NETWORK_INSTANCE_TYPE_UNSET:\n\t\t\treturn nil, fmt.Errorf(\"invalid network instance type specified for NI %s, %s\", n.GetName(), n.GetType())\n\t\tdefault:\n\t\t\tnetInstRoutes.T = n.GetType()\n\t\t}\n\n\t\tfor _, i := range n.Interface {\n\t\t\tif i.Subinterface == nil {\n\t\t\t\t// an L3 adjacency can only be associated with a subinterface in openconfig.\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif intfRoute[i.GetInterface()] != nil && intfRoute[i.GetInterface()][i.GetSubinterface()] != nil {\n\t\t\t\tnetInstRoutes.Rts = append(netInstRoutes.Rts, intfRoute[i.GetInterface()][i.GetSubinterface()]...)\n\t\t\t\tmatched[i.GetInterface()][i.GetSubinterface()] = true\n\t\t\t}\n\t\t}\n\n\t\tsort.Slice(netInstRoutes.Rts, func(i, j int) bool {\n\t\t\treturn netInstRoutes.Rts[i].Prefix < netInstRoutes.Rts[j].Prefix\n\t\t})\n\n\t\tni[n.GetName()] = netInstRoutes\n\t}\n\n\tif defName == \"\" {\n\t\treturn nil, errors.New(\"no default network instance, invalid\")\n\t}\n\n\tfor intfName, i := range intfRoute {\n\t\tfor subintIndex, routes := range i {\n\t\t\tif !matched[intfName][subintIndex] {\n\t\t\t\t// any unmatched interface is mapped to the default network instance.\n\t\t\t\tni[defName].Rts = append(ni[defName].Rts, routes...)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn ni, nil\n}", "title": "" }, { "docid": "65368f773e5a105f6b393d26c7488b3b", "score": "0.41301066", "text": "func parseApiFile(logger log.Logger, cfg *config.Config, DB db.DataServerProxy, client contracts.ETHClient) (trackersPerURL map[string]*IndexTracker, symbolsForAPI map[string][]string, err error) {\n\n\t// Load index file.\n\tbyteValue, err := ioutil.ReadFile(cfg.ApiFile)\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrapf(err, \"read index file @ %s\", cfg.ApiFile)\n\t}\n\t// Parse to json.\n\tbaseIndexes := make(map[string][]IndexObject)\n\terr = json.Unmarshal(byteValue, &baseIndexes)\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrap(err, \"parse index file\")\n\t}\n\t// Keep track of tracker per symbol.\n\tindexes = make(map[string][]*IndexTracker)\n\t// Build a tracker for each unique URL.\n\ttrackersPerURL = make(map[string]*IndexTracker)\n\t// Keep track of which APIs influence which symbols so we know what to update later.\n\tsymbolsForAPI = make(map[string][]string)\n\n\tfor symbol, apis := range baseIndexes {\n\t\tfor _, api := range apis {\n\t\t\t// Tracker for this API already added?\n\t\t\t_, ok := trackersPerURL[api.URL]\n\t\t\tif !ok {\n\t\t\t\t// Expand any env variables with their values from the .env file.\n\t\t\t\t_, err := godotenv.Read(cfg.EnvFile)\n\t\t\t\t// Ignore file doesn't exist errors.\n\t\t\t\tif err != nil && !os.IsNotExist(err) {\n\t\t\t\t\treturn nil, nil, errors.Wrap(err, \"reading .env file\")\n\t\t\t\t}\n\t\t\t\tapi.URL = os.Expand(api.URL, func(key string) string {\n\t\t\t\t\treturn os.Getenv(key)\n\t\t\t\t})\n\n\t\t\t\tvar name string\n\t\t\t\tvar source DataSource\n\n\t\t\t\t// Create an index tracker based on the api type.\n\t\t\t\t// Default value for the api type.\n\t\t\t\tif api.Type == \"\" {\n\t\t\t\t\tapi.Type = httpIndexType\n\t\t\t\t}\n\t\t\t\tswitch api.Type {\n\t\t\t\tcase httpIndexType:\n\t\t\t\t\t{\n\t\t\t\t\t\tsource = &JSONapi{&FetchRequest{queryURL: api.URL, timeout: cfg.Trackers.FetchTimeout.Duration}, logger}\n\t\t\t\t\t\tu, err := url.Parse(api.URL)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn nil, nil, errors.Wrapf(err, \"invalid API URL: %s\", api.URL)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tname = u.Host\n\t\t\t\t\t}\n\t\t\t\tcase fileIndexType:\n\t\t\t\t\t{\n\t\t\t\t\t\tsource = &JSONfile{filepath: api.URL}\n\t\t\t\t\t\tname = filepath.Base(api.URL)\n\t\t\t\t\t}\n\t\t\t\tcase ethereumIndexType:\n\t\t\t\t\t{\n\t\t\t\t\t\t// Getting current network id from geth node.\n\t\t\t\t\t\tnetworkID, err := client.NetworkID(context.Background())\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn nil, nil, err\n\t\t\t\t\t\t}\n\t\t\t\t\t\t// Validate and pick an ethereum address for current network id.\n\t\t\t\t\t\taddress, err := util.GetAddressForNetwork(api.URL, networkID.Int64())\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn nil, nil, errors.Wrap(err, \"getting address for network id\")\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif api.Parser == uniswapIndexParser {\n\t\t\t\t\t\t\tsource = NewUniswap(symbol, address, client)\n\n\t\t\t\t\t\t} else if api.Parser == balancerIndexParser {\n\t\t\t\t\t\t\tsource = NewBalancer(symbol, address, client)\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\treturn nil, nil, errors.Wrapf(err, \"unknown source for on-chain index tracker\")\n\t\t\t\t\t\t}\n\t\t\t\t\t\tname = fmt.Sprintf(\"%s(%s)\", api.Type, api.URL)\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\treturn nil, nil, errors.New(\"unknown index type for index object\")\n\t\t\t\t}\n\n\t\t\t\tif api.Interval.Duration > 0 && (api.Interval.Duration < cfg.Trackers.SleepCycle.Duration) {\n\t\t\t\t\treturn nil, nil, errors.New(\"api interval can't be smaller than the global tracker cycle\")\n\t\t\t\t}\n\n\t\t\t\t// Default value for the parser.\n\t\t\t\tif api.Parser == \"\" {\n\t\t\t\t\tapi.Parser = jsonPathIndexParser\n\t\t\t\t}\n\t\t\t\tcurrent := &IndexTracker{\n\t\t\t\t\tName: name,\n\t\t\t\t\tIdentifier: api.URL,\n\t\t\t\t\tSource: source,\n\t\t\t\t\tDB: DB,\n\t\t\t\t\tInterval: api.Interval.Duration,\n\t\t\t\t\tParam: api.Param,\n\t\t\t\t\tType: api.Type,\n\t\t\t\t\tcfg: cfg,\n\t\t\t\t}\n\n\t\t\t\ttrackersPerURL[api.URL] = current\n\t\t\t}\n\t\t\t// Now we definitely have one.\n\t\t\tthisOne := trackersPerURL[api.URL]\n\n\t\t\t// Insert add it and it's more specific variant to the symbol -> api map.\n\t\t\tindexes[symbol] = append(indexes[symbol], thisOne)\n\t\t\tspecificName := fmt.Sprintf(\"%s~%s\", symbol, thisOne.Name)\n\t\t\tindexes[specificName] = append(indexes[specificName], thisOne)\n\n\t\t\t// Save this for later so we can build the api->symbol map.\n\t\t\tsymbolsForAPI[api.URL] = append(symbolsForAPI[api.URL], symbol, specificName)\n\t\t}\n\t}\n\treturn\n\n}", "title": "" }, { "docid": "367a6e6e3f80fe6b8a43ecbf0ed86951", "score": "0.412951", "text": "func (b *targetInfoGetter) FetchRemoteTableModels(ctx context.Context, schemaName string) ([]*model.TableInfo, error) {\n\tvar err error\n\tresults := []*model.TableInfo{}\n\tlogger := log.FromContext(ctx)\n\ts := common.SQLWithRetry{\n\t\tDB: b.db,\n\t\tLogger: logger,\n\t}\n\n\terr = s.Transact(ctx, \"fetch table columns\", func(c context.Context, tx *sql.Tx) error {\n\t\tvar versionStr string\n\t\tif versionStr, err = version.FetchVersion(ctx, tx); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tserverInfo := version.ParseServerInfo(versionStr)\n\n\t\trows, e := tx.Query(`\n\t\t\tSELECT table_name, column_name, column_type, generation_expression, extra\n\t\t\tFROM information_schema.columns\n\t\t\tWHERE table_schema = ?\n\t\t\tORDER BY table_name, ordinal_position;\n\t\t`, schemaName)\n\t\tif e != nil {\n\t\t\treturn e\n\t\t}\n\t\tdefer rows.Close()\n\n\t\tvar (\n\t\t\tcurTableName string\n\t\t\tcurColOffset int\n\t\t\tcurTable *model.TableInfo\n\t\t)\n\t\ttables := []*model.TableInfo{}\n\t\tfor rows.Next() {\n\t\t\tvar tableName, columnName, columnType, generationExpr, columnExtra string\n\t\t\tif e := rows.Scan(&tableName, &columnName, &columnType, &generationExpr, &columnExtra); e != nil {\n\t\t\t\treturn e\n\t\t\t}\n\t\t\tif tableName != curTableName {\n\t\t\t\tcurTable = &model.TableInfo{\n\t\t\t\t\tName: model.NewCIStr(tableName),\n\t\t\t\t\tState: model.StatePublic,\n\t\t\t\t\tPKIsHandle: true,\n\t\t\t\t}\n\t\t\t\ttables = append(tables, curTable)\n\t\t\t\tcurTableName = tableName\n\t\t\t\tcurColOffset = 0\n\t\t\t}\n\n\t\t\t// see: https://github.com/pingcap/parser/blob/3b2fb4b41d73710bc6c4e1f4e8679d8be6a4863e/types/field_type.go#L185-L191\n\t\t\tvar flag uint\n\t\t\tif strings.HasSuffix(columnType, \"unsigned\") {\n\t\t\t\tflag |= mysql.UnsignedFlag\n\t\t\t}\n\t\t\tif strings.Contains(columnExtra, \"auto_increment\") {\n\t\t\t\tflag |= mysql.AutoIncrementFlag\n\t\t\t}\n\n\t\t\tft := types.FieldType{}\n\t\t\tft.SetFlag(flag)\n\t\t\tcurTable.Columns = append(curTable.Columns, &model.ColumnInfo{\n\t\t\t\tName: model.NewCIStr(columnName),\n\t\t\t\tOffset: curColOffset,\n\t\t\t\tState: model.StatePublic,\n\t\t\t\tFieldType: ft,\n\t\t\t\tGeneratedExprString: generationExpr,\n\t\t\t})\n\t\t\tcurColOffset++\n\t\t}\n\t\tif err := rows.Err(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// shard_row_id/auto random is only available after tidb v4.0.0\n\t\t// `show table next_row_id` is also not available before tidb v4.0.0\n\t\tif serverInfo.ServerType != version.ServerTypeTiDB || serverInfo.ServerVersion.Major < 4 {\n\t\t\tresults = tables\n\t\t\treturn nil\n\t\t}\n\n\t\tfailpoint.Inject(\n\t\t\t\"FetchRemoteTableModels_BeforeFetchTableAutoIDInfos\",\n\t\t\tfunc() {\n\t\t\t\tfmt.Println(\"failpoint: FetchRemoteTableModels_BeforeFetchTableAutoIDInfos\")\n\t\t\t},\n\t\t)\n\n\t\t// init auto id column for each table\n\t\tfor _, tbl := range tables {\n\t\t\ttblName := common.UniqueTable(schemaName, tbl.Name.O)\n\t\t\tautoIDInfos, err := FetchTableAutoIDInfos(ctx, tx, tblName)\n\t\t\tif err != nil {\n\t\t\t\tlogger.Warn(\"fetch table auto ID infos error. Ignore this table and continue.\", zap.String(\"table_name\", tblName), zap.Error(err))\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfor _, info := range autoIDInfos {\n\t\t\t\tfor _, col := range tbl.Columns {\n\t\t\t\t\tif col.Name.O == info.Column {\n\t\t\t\t\t\tswitch info.Type {\n\t\t\t\t\t\tcase \"AUTO_INCREMENT\":\n\t\t\t\t\t\t\tcol.AddFlag(mysql.AutoIncrementFlag)\n\t\t\t\t\t\tcase \"AUTO_RANDOM\":\n\t\t\t\t\t\t\tcol.AddFlag(mysql.PriKeyFlag)\n\t\t\t\t\t\t\ttbl.PKIsHandle = true\n\t\t\t\t\t\t\t// set a stub here, since we don't really need the real value\n\t\t\t\t\t\t\ttbl.AutoRandomBits = 1\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tresults = append(results, tbl)\n\t\t}\n\t\treturn nil\n\t})\n\treturn results, err\n}", "title": "" }, { "docid": "a8129362e9480de472780258bc744936", "score": "0.41294843", "text": "func extractTableList(node ast.Node, input []*ast.TableName, asName bool) []*ast.TableName {\n\tswitch x := node.(type) {\n\tcase *ast.SelectStmt:\n\t\tif x.From != nil {\n\t\t\tinput = extractTableList(x.From.TableRefs, input, asName)\n\t\t}\n\t\tif x.Where != nil {\n\t\t\tinput = extractTableList(x.Where, input, asName)\n\t\t}\n\t\tif x.With != nil {\n\t\t\tfor _, cte := range x.With.CTEs {\n\t\t\t\tinput = extractTableList(cte.Query, input, asName)\n\t\t\t}\n\t\t}\n\t\tfor _, f := range x.Fields.Fields {\n\t\t\tif s, ok := f.Expr.(*ast.SubqueryExpr); ok {\n\t\t\t\tinput = extractTableList(s, input, asName)\n\t\t\t}\n\t\t}\n\tcase *ast.DeleteStmt:\n\t\tinput = extractTableList(x.TableRefs.TableRefs, input, asName)\n\t\tif x.IsMultiTable {\n\t\t\tfor _, t := range x.Tables.Tables {\n\t\t\t\tinput = extractTableList(t, input, asName)\n\t\t\t}\n\t\t}\n\t\tif x.Where != nil {\n\t\t\tinput = extractTableList(x.Where, input, asName)\n\t\t}\n\t\tif x.With != nil {\n\t\t\tfor _, cte := range x.With.CTEs {\n\t\t\t\tinput = extractTableList(cte.Query, input, asName)\n\t\t\t}\n\t\t}\n\tcase *ast.UpdateStmt:\n\t\tinput = extractTableList(x.TableRefs.TableRefs, input, asName)\n\t\tfor _, e := range x.List {\n\t\t\tinput = extractTableList(e.Expr, input, asName)\n\t\t}\n\t\tif x.Where != nil {\n\t\t\tinput = extractTableList(x.Where, input, asName)\n\t\t}\n\t\tif x.With != nil {\n\t\t\tfor _, cte := range x.With.CTEs {\n\t\t\t\tinput = extractTableList(cte.Query, input, asName)\n\t\t\t}\n\t\t}\n\tcase *ast.InsertStmt:\n\t\tinput = extractTableList(x.Table.TableRefs, input, asName)\n\t\tinput = extractTableList(x.Select, input, asName)\n\tcase *ast.SetOprStmt:\n\t\tl := &ast.SetOprSelectList{}\n\t\tunfoldSelectList(x.SelectList, l)\n\t\tfor _, s := range l.Selects {\n\t\t\tinput = extractTableList(s.(ast.ResultSetNode), input, asName)\n\t\t}\n\tcase *ast.PatternInExpr:\n\t\tif s, ok := x.Sel.(*ast.SubqueryExpr); ok {\n\t\t\tinput = extractTableList(s, input, asName)\n\t\t}\n\tcase *ast.ExistsSubqueryExpr:\n\t\tif s, ok := x.Sel.(*ast.SubqueryExpr); ok {\n\t\t\tinput = extractTableList(s, input, asName)\n\t\t}\n\tcase *ast.BinaryOperationExpr:\n\t\tif s, ok := x.R.(*ast.SubqueryExpr); ok {\n\t\t\tinput = extractTableList(s, input, asName)\n\t\t}\n\tcase *ast.SubqueryExpr:\n\t\tinput = extractTableList(x.Query, input, asName)\n\tcase *ast.Join:\n\t\tinput = extractTableList(x.Left, input, asName)\n\t\tinput = extractTableList(x.Right, input, asName)\n\tcase *ast.TableSource:\n\t\tif s, ok := x.Source.(*ast.TableName); ok {\n\t\t\tif x.AsName.L != \"\" && asName {\n\t\t\t\tnewTableName := *s\n\t\t\t\tnewTableName.Name = x.AsName\n\t\t\t\tnewTableName.Schema = model.NewCIStr(\"\")\n\t\t\t\tinput = append(input, &newTableName)\n\t\t\t} else {\n\t\t\t\tinput = append(input, s)\n\t\t\t}\n\t\t} else if s, ok := x.Source.(*ast.SelectStmt); ok {\n\t\t\tif s.From != nil {\n\t\t\t\tvar innerList []*ast.TableName\n\t\t\t\tinnerList = extractTableList(s.From.TableRefs, innerList, asName)\n\t\t\t\tif len(innerList) > 0 {\n\t\t\t\t\tinnerTableName := innerList[0]\n\t\t\t\t\tif x.AsName.L != \"\" && asName {\n\t\t\t\t\t\tnewTableName := *innerList[0]\n\t\t\t\t\t\tnewTableName.Name = x.AsName\n\t\t\t\t\t\tnewTableName.Schema = model.NewCIStr(\"\")\n\t\t\t\t\t\tinnerTableName = &newTableName\n\t\t\t\t\t}\n\t\t\t\t\tinput = append(input, innerTableName)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn input\n}", "title": "" }, { "docid": "8fe9498059e23f890fd017b70b950234", "score": "0.4124446", "text": "func getTableCreationRequest(model interface{}) string {\n\tvar queryFields, queryPrimary []string\n\treflectValue := reflect.ValueOf(model)\n\tvarFullName := reflectValue.Type().String()\n\tvarSlice := strings.Split(varFullName, \".\")\n\tquery := fmt.Sprintf(\"CREATE TABLE %s\", varSlice[len(varSlice)-1])\n\tval := reflectValue.Elem()\n\n\tfor i := 0; i < val.NumField(); i++ {\n\t\tfield := val.Type().Field(i)\n\t\ttableField := \"\"\n\t\tswitch field.Type.String() {\n\t\tcase \"string\":\n\n\t\t\tswitch field.Tag.Get(\"type\") {\n\t\t\tcase \"text\":\n\t\t\t\ttableField = fmt.Sprintf(\"%s TEXT\", field.Tag.Get(\"db\"))\n\t\t\tdefault:\n\t\t\t\ttableField = fmt.Sprintf(\"%s VARCHAR(%s) NOT NULL DEFAULT ''\", field.Tag.Get(\"db\"), field.Tag.Get(\"len\"))\n\t\t\t}\n\n\t\tcase \"int\", \"int64\":\n\n\t\t\tswitch field.Tag.Get(\"extra\") {\n\t\t\tcase \"AUTO_INCREMENT\":\n\t\t\t\ttableField = fmt.Sprintf(\"%s INT %s\", field.Tag.Get(\"db\"), field.Tag.Get(\"extra\"))\n\t\t\tdefault:\n\t\t\t\ttableField = fmt.Sprintf(\"%s INT NOT NULL default 0\", field.Tag.Get(\"db\"))\n\t\t\t}\n\n\t\t}\n\t\tqueryFields = append(queryFields, tableField)\n\n\t\tif field.Tag.Get(\"key\") == \"primary\" {\n\t\t\tqueryPrimary = append(queryPrimary, field.Tag.Get(\"db\"))\n\t\t}\n\n\t}\n\n\tif len(queryPrimary) > 0 {\n\t\ttablePrimary := fmt.Sprintf(\"PRIMARY KEY (%s)\", strings.Join(queryPrimary, \", \"))\n\t\tqueryFields = append(queryFields, tablePrimary)\n\t}\n\n\treturn fmt.Sprintf(\"%s (%s) ENGINE=InnoDB DEFAULT CHARSET=utf8;\", query, strings.Join(queryFields, \", \"))\n}", "title": "" }, { "docid": "457f86ed889452d3be3640e1d1d842eb", "score": "0.41150513", "text": "func getTargets(b []byte, w io.Writer) {\n\tthisRoute := uint8(20)\n\n\ttargets := db.GetTargets()\n\n\tvar all Targets\n\tall.Target = targets\n\n\tbuf, err := proto.Marshal(&all)\n\tif err != nil {\n\t\tWriteErrorMessage(err, w)\n\t\treturn\n\t}\n\n\theaderBuf := GenerateHeaderBuf(uint16(len(buf)), thisRoute)\n\tif _, err := w.Write(append(headerBuf, buf...)); err != nil {\n\t\tlg.L.Error(\"error writing\", zap.Error(err))\n\t}\n}", "title": "" }, { "docid": "9eac79eab710161acefcbed75182a6a1", "score": "0.4114755", "text": "func initDataBase(flavor, location string) {\n\tif location != \":memory:\" {\n\t\tos.Remove(location) // remove previous copy\n\t}\n\n\t// open the database\n\tdb, err = sql.Open(flavor, location)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tsqlCreateStmt := `\n\tcreate table files (\n\t\tlength integer not null,\n\t\tfilename text not null,\n\t\thash blob defult null,\n\t\tlinkCount integer default 1);\n\t`\n\t// create the table\n\t_, err = db.Exec(sqlCreateStmt)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "9df46331aa86f7fe719a63f3e1cc4368", "score": "0.41137552", "text": "func SetUpTables(conn *sqlite.Conn) error {\n\terr := conn.Exec(\"create table if not exists accounts (id INTEGER PRIMARY KEY AUTOINCREMENT, name TEXT, is_active INTEGER, balance INTEGER, reconciled INTEGER, b_count INTEGER, r_count INTEGER, import_sd TEXT)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = conn.Exec(\"create table if not exists entries (id INTEGER PRIMARY KEY AUTOINCREMENT, date TEXT, name TEXT, cats TEXT, payment TEXT, desc TEXT, check_no TEXT, reviewed INTEGER)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = conn.Exec(\"create index if not exists entries_date_id_idx on entries (date, id)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = conn.Exec(\"create table if not exists recurring_entries (id INTEGER PRIMARY KEY AUTOINCREMENT, date TEXT, name TEXT, cats TEXT, payment TEXT, desc TEXT, check_no TEXT, reviewed INTEGER, count INTEGER, unit INTEGER, num_left INTEGER, day_of_month INTEGER)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = conn.Exec(\"create table if not exists expense_categories (id INTEGER PRIMARY KEY AUTOINCREMENT, name TEXT, is_active INTEGER, parent_id INTEGER)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = conn.Exec(\"create table if not exists income_categories (id INTEGER PRIMARY KEY AUTOINCREMENT, name TEXT, is_active INTEGER, parent_id INTEGER)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = conn.Exec(\"create table if not exists users (id INTEGER PRIMARY KEY AUTOINCREMENT, name TEXT, go_password TEXT, permission INTEGER, last_login INTEGER)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = conn.Exec(\"create unique index if not exists users_name_idx on users (name)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = conn.Exec(\"create table if not exists qfx_fitids (acct_id INTEGER, fit_id TEXT)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = conn.Exec(\"create unique index if not exists qfx_fitids_acct_id_fit_id_idx on qfx_fitids (acct_id, fit_id)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dda514cfaeca3496a19ff21850a7c349", "score": "0.4111498", "text": "func ParseSourcetable(str string) (Sourcetable, []error) {\n\ttable := Sourcetable{}\n\tvar allErrors []error\n\n\tlines := strings.Split(str, \"\\n\")\n\n\tfor lineNo, rawLine := range lines {\n\t\tline := strings.TrimSpace(rawLine)\n\n\t\tif line == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tif line == \"ENDSOURCETABLE\" {\n\t\t\tbreak\n\t\t}\n\n\t\tswitch line[:3] {\n\t\tcase \"CAS\":\n\t\t\tcaster, errs := ParseCasterEntry(line)\n\t\t\tif len(errs) != 0 {\n\t\t\t\tfor _, err := range errs {\n\t\t\t\t\tallErrors = append(allErrors, errors.Wrapf(err, \"parsing line %v\", lineNo))\n\t\t\t\t}\n\t\t\t}\n\t\t\ttable.Casters = append(table.Casters, caster)\n\t\tcase \"NET\":\n\t\t\tnet, errs := ParseNetworkEntry(line)\n\t\t\tif len(errs) != 0 {\n\t\t\t\tfor _, err := range errs {\n\t\t\t\t\tallErrors = append(allErrors, errors.Wrapf(err, \"parsing line %v\", lineNo))\n\t\t\t\t}\n\t\t\t}\n\t\t\ttable.Networks = append(table.Networks, net)\n\t\tcase \"STR\":\n\t\t\tmount, errs := ParseStreamEntry(line)\n\t\t\tif len(errs) != 0 {\n\t\t\t\tfor _, err := range errs {\n\t\t\t\t\tallErrors = append(allErrors, errors.Wrapf(err, \"parsing line %v\", lineNo))\n\t\t\t\t}\n\t\t\t}\n\t\t\ttable.Mounts = append(table.Mounts, mount)\n\t\t}\n\n\t}\n\n\treturn table, allErrors\n}", "title": "" }, { "docid": "76c2fe69278f7d7d927df5c2df276b21", "score": "0.41105124", "text": "func (gt *GT) moreTables() (innerTables, leftTables, innerField, leftField []string, DBS map[string]string) {\n\n\tfor k, v := range gt.InnerTable {\n\t\tst := strings.Split(v, \":\")\n\n\t\tif strings.Contains(st[0], \".\") {\n\t\t\tsts := strings.Split(st[0], \".\")\n\t\t\tif DBS == nil {\n\t\t\t\tDBS = make(map[string]string)\n\t\t\t}\n\t\t\tDBS[sts[1]] = sts[0]\n\t\t\tst[0] = sts[1]\n\t\t}\n\t\tinnerTables = append(innerTables, st[0])\n\t\tif len(st) == 1 { // default\n\t\t\tfield := \"id\"\n\t\t\tif k%2 == 0 {\n\t\t\t\t// default other table_id\n\t\t\t\totb := strings.Split(gt.InnerTable[k+1], \":\")[0]\n\t\t\t\tif strings.Contains(otb, \".\") {\n\t\t\t\t\totb = strings.Split(otb, \".\")[1]\n\t\t\t\t}\n\t\t\t\tfield = otb + \"_id\"\n\t\t\t}\n\t\t\tinnerField = append(innerField, field)\n\t\t} else {\n\t\t\tinnerField = append(innerField, st[1])\n\t\t}\n\t}\n\t// left\n\tfor k, v := range gt.LeftTable {\n\t\tst := strings.Split(v, \":\")\n\n\t\tif strings.Contains(st[0], \".\") {\n\t\t\tsts := strings.Split(st[0], \".\")\n\t\t\tif DBS == nil {\n\t\t\t\tDBS = make(map[string]string)\n\t\t\t}\n\t\t\tDBS[sts[1]] = sts[0]\n\t\t\tst[0] = sts[1]\n\t\t}\n\t\tleftTables = append(leftTables, st[0])\n\t\tif len(st) == 1 {\n\t\t\tfield := \"id\"\n\t\t\tif k%2 == 0 {\n\t\t\t\t// default other table_id\n\t\t\t\totb := strings.Split(gt.LeftTable[k+1], \":\")[0]\n\t\t\t\tif strings.Contains(otb, \".\") {\n\t\t\t\t\totb = strings.Split(otb, \".\")[1]\n\t\t\t\t}\n\t\t\t\tfield = otb + \"_id\"\n\t\t\t}\n\t\t\tleftField = append(leftField, field)\n\t\t} else {\n\t\t\tleftField = append(leftField, st[1])\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "5be8bd2814b8dc8c558c166b0d856888", "score": "0.41070956", "text": "func ProcessSQLData(conv *internal.Conv, db *sql.DB, dbName string) {\n\t// TODO: refactor to use the set of tables computed by\n\t// ProcessInfoSchema instead of computing them again.\n\ttables, err := getTables(db, dbName)\n\tif err != nil {\n\t\tconv.Unexpected(fmt.Sprintf(\"Couldn't get list of table: %s\", err))\n\t\treturn\n\t}\n\tfor _, t := range tables {\n\t\tsrcTable := t.name\n\t\tsrcSchema, ok := conv.SrcSchema[srcTable]\n\t\tif !ok {\n\t\t\tconv.Stats.BadRows[srcTable] += conv.Stats.Rows[srcTable]\n\t\t\tconv.Unexpected(fmt.Sprintf(\"Can't get schemas for table %s\", srcTable))\n\t\t\tcontinue\n\t\t}\n\t\tsrcCols := srcSchema.ColNames\n\t\tif len(srcCols) == 0 {\n\t\t\tconv.Unexpected(fmt.Sprintf(\"Couldn't get source columns for table %s \", t.name))\n\t\t\tcontinue\n\t\t}\n\t\tcolNameList := buildColNameList(srcSchema, srcCols)\n\t\t// MySQL schema and name can be arbitrary strings.\n\t\t// Ideally we would pass schema/name as a query parameter,\n\t\t// but MySQL doesn't support this. So we quote it instead.\n\t\tq := fmt.Sprintf(\"SELECT %s FROM `%s`.`%s`;\", colNameList, t.schema, t.name)\n\t\trows, err := db.Query(q)\n\t\tif err != nil {\n\t\t\tconv.Unexpected(fmt.Sprintf(\"Couldn't get data for table %s : err = %s\", t.name, err))\n\t\t\tcontinue\n\t\t}\n\t\tdefer rows.Close()\n\t\tsrcCols, _ = rows.Columns()\n\t\tspTable, err := internal.GetSpannerTable(conv, srcTable)\n\t\tif err != nil {\n\t\t\tconv.Unexpected(fmt.Sprintf(\"Couldn't get spanner table : %s\", err))\n\t\t\tcontinue\n\t\t}\n\t\tspCols, err := internal.GetSpannerCols(conv, srcTable, srcCols)\n\t\tif err != nil {\n\t\t\tconv.Unexpected(fmt.Sprintf(\"Couldn't get spanner columns for table %s : err = %s\", t.name, err))\n\t\t\tcontinue\n\t\t}\n\t\tspSchema, ok := conv.SpSchema[spTable]\n\t\tif !ok {\n\t\t\tconv.Stats.BadRows[srcTable] += conv.Stats.Rows[srcTable]\n\t\t\tconv.Unexpected(fmt.Sprintf(\"Can't get schemas for table %s\", srcTable))\n\t\t\tcontinue\n\t\t}\n\t\tv, scanArgs := buildVals(len(srcCols))\n\t\tfor rows.Next() {\n\t\t\t// get RawBytes from data.\n\t\t\terr = rows.Scan(scanArgs...)\n\t\t\tif err != nil {\n\t\t\t\tconv.Unexpected(fmt.Sprintf(\"Couldn't process sql data row: %s\", err))\n\t\t\t\t// Scan failed, so we don't have any data to add to bad rows.\n\t\t\t\tconv.StatsAddBadRow(srcTable, conv.DataMode())\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tvalues := valsToStrings(v)\n\t\t\tProcessDataRow(conv, srcTable, srcCols, srcSchema, spTable, spCols, spSchema, values)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "cc2f382204b6f330edb90f62ed02826a", "score": "0.40985888", "text": "func ReadFileCSV(file string, out io.Writer, separator string, doJA3s bool) {\n\n\tr, f, link, err := openPcap(file)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer f.Close()\n\n\tcolumns := []string{\"timestamp\", \"source_ip\", \"source_port\", \"destination_ip\", \"destination_port\", \"ja3_digest\", \"ja3s_digest\"}\n\t_, err = out.Write([]byte(strings.Join(columns, separator) + \"\\n\"))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tcount := 0\n\tfor {\n\t\t// read packet data\n\t\tdata, ci, err := r.ReadPacketData()\n\t\tif err == io.EOF {\n\t\t\tif Debug {\n\t\t\t\tfmt.Println(count, \"fingerprints.\")\n\t\t\t}\n\t\t\treturn\n\t\t} else if err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\tvar (\n\t\t\t// create gopacket\n\t\t\tp = gopacket.NewPacket(data, link, gopacket.Lazy)\n\t\t\t// get JA3 if possible\n\t\t\tdigest = DigestHexPacket(p)\n\t\t\tisServer bool\n\t\t)\n\n\t\tif doJA3s && digest == \"\" {\n\t\t\tdigest = DigestHexPacketJa3s(p)\n\t\t\tisServer = true\n\t\t}\n\n\t\t// check if we got a result\n\t\tif digest != \"\" {\n\n\t\t\tcount++\n\n\t\t\tvar (\n\t\t\t\tb strings.Builder\n\t\t\t\tnl = p.NetworkLayer()\n\t\t\t\ttl = p.TransportLayer()\n\t\t\t)\n\n\t\t\t// got an a digest but no transport or network layer\n\t\t\tif tl == nil || nl == nil {\n\t\t\t\tif Debug {\n\t\t\t\t\tfmt.Println(\"got a nil layer: \", nl, tl, p.Dump(), digest)\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tb.WriteString(timeToString(ci.Timestamp))\n\t\t\tb.WriteString(separator)\n\t\t\tb.WriteString(nl.NetworkFlow().Src().String())\n\t\t\tb.WriteString(separator)\n\t\t\tb.WriteString(tl.TransportFlow().Src().String())\n\t\t\tb.WriteString(separator)\n\t\t\tb.WriteString(nl.NetworkFlow().Dst().String())\n\t\t\tb.WriteString(separator)\n\t\t\tb.WriteString(tl.TransportFlow().Dst().String())\n\t\t\tb.WriteString(separator)\n\t\t\tif isServer {\n\t\t\t\tb.WriteString(\"\")\n\t\t\t\tb.WriteString(separator)\n\t\t\t\tb.WriteString(digest)\n\t\t\t} else { // client\n\t\t\t\tb.WriteString(digest)\n\t\t\t\tb.WriteString(separator)\n\t\t\t\tb.WriteString(\"\")\n\t\t\t}\n\t\t\tb.WriteString(\"\\n\")\n\n\t\t\t_, err := out.Write([]byte(b.String()))\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f519749098f05406dd6b66e109407e06", "score": "0.40983146", "text": "func trackingTable(d *libschema.Database) string {\n\t_, table, _ := trackingSchemaTable(d)\n\treturn table\n}", "title": "" }, { "docid": "7184b68af914fccf25e6866b0c7b8c7d", "score": "0.40947843", "text": "func createTables() {\n\n\tclient := initDBClient()\n\n\t// Create table bots\n\ttableNameBots := \"bots\"\n\n\tinputBots := &dynamodb.CreateTableInput{\n\t\tAttributeDefinitions: []*dynamodb.AttributeDefinition{\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"id\"),\n\t\t\t\tAttributeType: aws.String(\"S\"),\n\t\t\t},\n\t\t},\n\t\tKeySchema: []*dynamodb.KeySchemaElement{\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"id\"),\n\t\t\t\tKeyType: aws.String(\"HASH\"),\n\t\t\t},\n\t\t},\n\t\tProvisionedThroughput: &dynamodb.ProvisionedThroughput{\n\t\t\tReadCapacityUnits: aws.Int64(10),\n\t\t\tWriteCapacityUnits: aws.Int64(10),\n\t\t},\n\n\t\tTableName: aws.String(tableNameBots),\n\t}\n\n\t_, err := client.CreateTable(inputBots)\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tfmt.Println(\"Created the table\", tableNameBots)\n\n\t// Create table sensorsRequest\n\ttableSensorsRequest := \"sensorsRequest\"\n\n\tinputSensors := &dynamodb.CreateTableInput{\n\t\tAttributeDefinitions: []*dynamodb.AttributeDefinition{\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"id\"),\n\t\t\t\tAttributeType: aws.String(\"S\"),\n\t\t\t},\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"msg\"),\n\t\t\t\tAttributeType: aws.String(\"S\"),\n\t\t\t},\n\t\t},\n\t\tKeySchema: []*dynamodb.KeySchemaElement{\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"id\"),\n\t\t\t\tKeyType: aws.String(\"HASH\"),\n\t\t\t},\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"msg\"),\n\t\t\t\tKeyType: aws.String(\"RANGE\"),\n\t\t\t},\n\t\t},\n\t\tProvisionedThroughput: &dynamodb.ProvisionedThroughput{\n\t\t\tReadCapacityUnits: aws.Int64(10),\n\t\t\tWriteCapacityUnits: aws.Int64(10),\n\t\t},\n\n\t\tTableName: aws.String(tableSensorsRequest),\n\t}\n\n\t_, err2 := client.CreateTable(inputSensors)\n\tif err2 != nil {\n\n\t\tpanic(err2.Error())\n\n\t}\n\n\tfmt.Println(\"Created the table\", tableSensorsRequest)\n\n\t// Create table resilience\n\ttableNameResilience := \"resilience\"\n\n\tinputResilience := &dynamodb.CreateTableInput{\n\t\tAttributeDefinitions: []*dynamodb.AttributeDefinition{\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"id\"),\n\t\t\t\tAttributeType: aws.String(\"S\"),\n\t\t\t},\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"message\"),\n\t\t\t\tAttributeType: aws.String(\"S\"),\n\t\t\t},\n\t\t},\n\t\tKeySchema: []*dynamodb.KeySchemaElement{\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"id\"),\n\t\t\t\tKeyType: aws.String(\"HASH\"),\n\t\t\t},\n\t\t\t{\n\t\t\t\tAttributeName: aws.String(\"message\"),\n\t\t\t\tKeyType: aws.String(\"RANGE\"),\n\t\t\t},\n\t\t},\n\t\tProvisionedThroughput: &dynamodb.ProvisionedThroughput{\n\t\t\tReadCapacityUnits: aws.Int64(10),\n\t\t\tWriteCapacityUnits: aws.Int64(10),\n\t\t},\n\n\t\tTableName: aws.String(tableNameResilience),\n\t}\n\n\t_, err3 := client.CreateTable(inputResilience)\n\tif err3 != nil {\n\n\t\tpanic(err3.Error())\n\n\t}\n\n\tfmt.Println(\"Created the table\", tableNameResilience)\n\n}", "title": "" }, { "docid": "0c6f3c7845e236d7d98f8bb51c5b826b", "score": "0.40878662", "text": "func Init(env string) (*sql.DB, error) {\n\tvar (\n\t\tdriver = \"mysql\"\n\t\tuser = os.Getenv(\"DB_USER\")\n\t\tpassword = os.Getenv(\"DB_PASS\")\n\t\tprotocol = \"tcp\"\n\t\taddress = os.Getenv(\"DB_ADDR\")\n\t\tport = os.Getenv(\"DB_PORT\")\n\t)\n\n\tdb, err := sql.Open(driver, fmt.Sprintf(\"%v:%v@%v(%v:%v)/\", user, password, protocol, address, port))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif env == \"test\" {\n\t\t_, err = db.Exec(\n\t\t\t\"CREATE DATABASE IF NOT EXISTS trapAdvisor_test DEFAULT CHARACTER SET utf8 COLLATE utf8_general_ci\",\n\t\t)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t_, err = db.Exec(\"USE trapAdvisor_test\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\t_, err = db.Exec(\n\t\t\t\"CREATE DATABASE IF NOT EXISTS trapAdvisor DEFAULT CHARACTER SET utf8 COLLATE utf8_general_ci\",\n\t\t)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t_, err = db.Exec(\"USE trapAdvisor\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t_, err = db.Exec(`\n\t\tCREATE TABLE IF NOT EXISTS traveller (\n\t\t\tid BIGINT UNSIGNED NOT NULL,\n\t\t\tname VARCHAR(250) NOT NULL,\n\t\t\tsessionToken VARCHAR(250) NOT NULL,\n\t\t\tPRIMARY KEY (id),\n\t\t\tUNIQUE INDEX traveller_id_unique (id ASC)\n\t\t) ENGINE = InnoDB\n\t`)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t_, err = db.Exec(`\n\t\tCREATE TABLE IF NOT EXISTS friendship (\n\t\t\ttravellerId BIGINT UNSIGNED NOT NULL,\n\t\t\tfriendId BIGINT UNSIGNED NOT NULL,\n\t\t\tsimilarity FLOAT NULL DEFAULT NULL,\n\t\t\tPRIMARY KEY (travellerId, friendId),\n\t\t\tINDEX fk_friendship_traveller_idx (travellerId ASC),\n\t\t\tINDEX fk_friendship_friend_idx (friendId ASC),\n\t\t\tCONSTRAINT fk_friendship_traveller\n\t\t\t\tFOREIGN KEY (travellerId)\n\t\t\t\tREFERENCES traveller (id)\n\t\t\t\tON DELETE NO ACTION\n\t\t\t\tON UPDATE NO ACTION,\n\t\t\tCONSTRAINT fk_friendship_friend\n\t\t\t\tFOREIGN KEY (friendId)\n\t\t\t\tREFERENCES traveller (id)\n\t\t\t\tON DELETE NO ACTION\n\t\t\t\tON UPDATE NO ACTION\n\t\t) ENGINE = InnoDB\n\t`)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t_, err = db.Exec(`\n\t\tCREATE TABLE IF NOT EXISTS trip (\n\t\t\tid INT NOT NULL AUTO_INCREMENT,\n\t\t\tname VARCHAR(250) NOT NULL,\n\t\t\tstartDate DATE NOT NULL,\n\t\t\tendDate DATE NOT NULL,\n\t\t\trating FLOAT NOT NULL,\n\t\t\treview TEXT NULL,\n\t\t\ttravellerId BIGINT UNSIGNED NOT NULL,\n\t\t\tPRIMARY KEY (id),\n\t\t\tINDEX fk_trip_traveller_idx (travellerId ASC),\n\t\t\tCONSTRAINT fk_trip_traveller\n\t\t\t\tFOREIGN KEY (travellerId)\n\t\t\t\tREFERENCES traveller (id)\n\t\t\t\tON DELETE NO ACTION\n\t\t\t\tON UPDATE NO ACTION\n\t\t) ENGINE = InnoDB\n\t`)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t_, err = db.Exec(`\n\t\tCREATE TABLE IF NOT EXISTS touristAttraction (\n\t\t\tid INT NOT NULL AUTO_INCREMENT,\n\t\t\tname VARCHAR(250) NOT NULL,\n\t\t\tlocation VARCHAR(250) NOT NULL,\n\t\t\tvisitDate DATE NOT NULL,\n\t\t\trating FLOAT NOT NULL DEFAULT 0,\n\t\t\tpros TEXT NULL,\n\t\t\tcons TEXT NULL,\n\t\t\ttripId INT NOT NULL,\n\t\t\tPRIMARY KEY (id),\n\t\t\tINDEX fk_touristAttraction_trip_idx (tripId ASC),\n\t\t\tCONSTRAINT fk_touristAttraction_trip\n\t\t\t\tFOREIGN KEY (tripId)\n\t\t\t\tREFERENCES trip (id)\n\t\t\t\tON DELETE NO ACTION\n\t\t\t\tON UPDATE NO ACTION\n\t\t) ENGINE = InnoDB\n\t`)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif env == \"test\" {\n\t\t_, err = db.Exec(\"INSERT INTO traveller VALUES (123, 'Morisquinho', 'test12345')\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t_, err = db.Exec(\"INSERT INTO traveller VALUES (1234, 'Ludwig', 'test12345')\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t_, err = db.Exec(\n\t\t\t\"INSERT INTO trip VALUES (1, 'Roland Garros', '2017-05-30', '2017-05-30', 9, 'legal', 123)\",\n\t\t)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t_, err = db.Exec(`\n\t\t\tINSERT INTO touristAttraction\n\t\t\tVALUES (1, 'Torre Eiffel', 'Paris', '2017-05-30', 7.5, 'Não fica no Brasil', 'Fica na França', 1)\n\t\t`)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t_, err = db.Exec(\n\t\t\t\"INSERT INTO touristAttraction VALUES (2, 'Test', 'Brazil', '2017-05-30', 5, 'Bla', 'Ble', 1)\",\n\t\t)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn db, nil\n}", "title": "" }, { "docid": "9a14d7302cb305c5cc1ef438fa7fda23", "score": "0.4082558", "text": "func Cockroach_LoadTableColumns(db *sqlx.DB, schema string, tableName string, table *Table) (res []*Column, err error) {\n\tvar rows = []struct {\n\t\tORDINAL_POSITION int\n\t\tCOLUMN_NAME string\n\t\tDATA_TYPE string\n\t\tIS_NULLABLE string //'YES'\n\t\tCOLUMN_DEFAULT sql.NullString\n\t\t//COLUMN_TYPE string\n\t\t//COLUMN_KEY string //if == 'PRI' then is the primiry key -- not neccoery auto_incer\n\t\t//EXTRA string //if == 'auto_increment' then this is the auto incerment -- not neccoery primiry key\n\t\t//COLUMN_COMMENT string\n\t}{}\n\t// sql query\n\tconst sqlstr = `SELECT * ` +\n\t\t`FROM information_schema.columns ` +\n\t\t`WHERE table_catalog = $1 AND table_schema = 'public' AND table_name = $2 ` +\n\t\t`ORDER BY ordinal_position ASC`\n\n\t// run query\n\tXOLogDebug(sqlstr, schema, tableName)\n\n\terr = db.Unsafe().Select(&rows, sqlstr, schema, tableName)\n\tNoErr(err)\n\t//fmt.Println(\"Mysql loader - load tables: \", rows)\n\tfor _, r := range rows {\n\t\t//if this coulmn is auto_incermnt but not primiry this means: this table has one auto Seq columns\n\t\t//so skip it from our entire genrated paradigram and make the table\n\t\t/*if strings.ToLower(r.EXTRA) == \"auto_increment\" && strings.ToUpper(r.COLUMN_KEY) != \"PRI\" {\n\t\t\ttable.IsAutoIncrement = false\n\t\t\tcontinue\n\t\t}*/\n\t\tnullable := false\n\t\tswitch strings.ToUpper(r.IS_NULLABLE) {\n\t\tcase \"YES\":\n\t\t\tnullable = true\n\t\tcase \"NO\":\n\t\t\tnullable = false\n\t\t}\n\n\t\tgotype := sqlCockRoachToTypeToGoType(r.DATA_TYPE)\n\t\tt := &Column{\n\t\t\tColumnName: r.COLUMN_NAME,\n\t\t\tColumnNameCamel: SnakeToCamel(r.COLUMN_NAME),\n\t\t\tColumnNameSnake: ToSnake(r.COLUMN_NAME),\n\t\t\tSeq: r.ORDINAL_POSITION,\n\t\t\tComment: \"\",\n\t\t\tColumnNameOut: r.COLUMN_NAME,\n\t\t\tSqlType: r.DATA_TYPE,\n\t\t\tSqlTypeStrip: r.DATA_TYPE, // todo: is this correct > we added this field fro mysql\n\t\t\tGoTypeOut: gotype,\n\t\t\tRoachTypeOut: r.DATA_TYPE,\n\t\t\tGoDefaultOut: go_datatype_to_defualt_go_type(gotype),\n\t\t\tJavaTypeOut: go_to_java_type(gotype),\n\t\t\tPBTypeOut: (gotype),\n\t\t\tStructTagOut: fmt.Sprintf(\"`db:\\\"%s\\\"`\", r.COLUMN_NAME),\n\t\t\tIsNullAble: nullable,\n\t\t}\n\n\t\t/*if strings.ToUpper(r.COLUMN_KEY) == \"PRI\" {\n\t\t\ttable.HasPrimaryKey = true\n\t\t\ttable.SinglePrimaryKey = t\n\t\t}*/\n\t\t//fmt.Println(\"Mysql loader - load tables: ))))))) \", t)\n\t\tres = append(res, t)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "1084f654b55567a58674661ec6fc34ce", "score": "0.40808895", "text": "func evalImport(ctx context.Context, cArgs batcheval.CommandArgs) (*roachpb.ImportResponse, error) {\n\targs := cArgs.Args.(*roachpb.ImportRequest)\n\tdb := cArgs.EvalCtx.DB()\n\t// args.Rekeys could be using table descriptors from either the old or new\n\t// foreign key representation on the table descriptor, but this is fine\n\t// because foreign keys don't matter for the key rewriter.\n\tkr, err := MakeKeyRewriterFromRekeys(keys.SystemSQLCodec, args.Rekeys)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"make key rewriter\")\n\t}\n\tif err := cArgs.EvalCtx.GetLimiters().ConcurrentImportRequests.Begin(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\tdefer cArgs.EvalCtx.GetLimiters().ConcurrentImportRequests.Finish()\n\n\t// The sstables only contain MVCC data and no intents, so using an MVCC\n\t// iterator is sufficient.\n\tvar iters []storage.SimpleMVCCIterator\n\tfor _, file := range args.Files {\n\t\tlog.VEventf(ctx, 2, \"import file %s %s\", file.Path, args.Key)\n\n\t\tdir, err := cArgs.EvalCtx.GetExternalStorage(ctx, file.Dir)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdefer func() {\n\t\t\tif err := dir.Close(); err != nil {\n\t\t\t\tlog.Warningf(ctx, \"close export storage failed %v\", err)\n\t\t\t}\n\t\t}()\n\n\t\tconst maxAttempts = 3\n\t\tvar fileContents []byte\n\t\tif err := retry.WithMaxAttempts(ctx, base.DefaultRetryOptions(), maxAttempts, func() error {\n\t\t\tf, err := dir.ReadFile(ctx, file.Path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer f.Close()\n\t\t\tfileContents, err = ioutil.ReadAll(f)\n\t\t\treturn err\n\t\t}); err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"fetching %q\", file.Path)\n\t\t}\n\t\tdataSize := int64(len(fileContents))\n\t\tlog.Eventf(ctx, \"fetched file (%s)\", humanizeutil.IBytes(dataSize))\n\n\t\tif args.Encryption != nil {\n\t\t\tfileContents, err = DecryptFile(fileContents, args.Encryption.Key)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\n\t\tif len(file.Sha512) > 0 {\n\t\t\tchecksum, err := SHA512ChecksumData(fileContents)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif !bytes.Equal(checksum, file.Sha512) {\n\t\t\t\treturn nil, errors.Errorf(\"checksum mismatch for %s\", file.Path)\n\t\t\t}\n\t\t}\n\n\t\titer, err := storage.NewMemSSTIterator(fileContents, false)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tdefer iter.Close()\n\t\titers = append(iters, iter)\n\t}\n\n\tbatcher, err := bulk.MakeSSTBatcher(ctx, db, cArgs.EvalCtx.ClusterSettings(), func() int64 { return MaxImportBatchSize(cArgs.EvalCtx.ClusterSettings()) })\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer batcher.Close()\n\n\tstartKeyMVCC, endKeyMVCC := storage.MVCCKey{Key: args.DataSpan.Key}, storage.MVCCKey{Key: args.DataSpan.EndKey}\n\titer := storage.MakeMultiIterator(iters)\n\tdefer iter.Close()\n\tvar keyScratch, valueScratch []byte\n\n\tfor iter.SeekGE(startKeyMVCC); ; {\n\t\tok, err := iter.Valid()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif !ok {\n\t\t\tbreak\n\t\t}\n\n\t\tif !args.EndTime.IsEmpty() {\n\t\t\t// TODO(dan): If we have to skip past a lot of versions to find the\n\t\t\t// latest one before args.EndTime, then this could be slow.\n\t\t\tif args.EndTime.Less(iter.UnsafeKey().Timestamp) {\n\t\t\t\titer.Next()\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tif !ok || !iter.UnsafeKey().Less(endKeyMVCC) {\n\t\t\tbreak\n\t\t}\n\t\tif len(iter.UnsafeValue()) == 0 {\n\t\t\t// Value is deleted.\n\t\t\titer.NextKey()\n\t\t\tcontinue\n\t\t}\n\n\t\tkeyScratch = append(keyScratch[:0], iter.UnsafeKey().Key...)\n\t\tvalueScratch = append(valueScratch[:0], iter.UnsafeValue()...)\n\t\tkey := storage.MVCCKey{Key: keyScratch, Timestamp: iter.UnsafeKey().Timestamp}\n\t\tvalue := roachpb.Value{RawBytes: valueScratch}\n\t\titer.NextKey()\n\n\t\tkey.Key, ok, err = kr.RewriteKey(key.Key, false /* isFromSpan */)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif !ok {\n\t\t\t// If the key rewriter didn't match this key, it's not data for the\n\t\t\t// table(s) we're interested in.\n\t\t\tif log.V(3) {\n\t\t\t\tlog.Infof(ctx, \"skipping %s %s\", key.Key, value.PrettyPrint())\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\t// Rewriting the key means the checksum needs to be updated.\n\t\tvalue.ClearChecksum()\n\t\tvalue.InitChecksum(key.Key)\n\n\t\tif log.V(3) {\n\t\t\tlog.Infof(ctx, \"Put %s -> %s\", key.Key, value.PrettyPrint())\n\t\t}\n\t\tif err := batcher.AddMVCCKey(ctx, key, value.RawBytes); err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"adding to batch: %s -> %s\", key, value.PrettyPrint())\n\t\t}\n\t}\n\t// Flush out the last batch.\n\tif err := batcher.Flush(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\tlog.Event(ctx, \"done\")\n\treturn &roachpb.ImportResponse{Imported: batcher.GetSummary()}, nil\n}", "title": "" }, { "docid": "ba82aab951d6af84836f1ead32feb98f", "score": "0.4078722", "text": "func (c *csvimport) parseHeader( row []string ) error {\n c.names = make( map[string]*column )\n for i, n := range row {\n if _, exists := c.names[ n ]; exists {\n return fmt.Errorf( \"Unable to import csv, duplicate column header \\\"%s\\\"\", n )\n }\n\n col := &column{ name: n, column: i }\n c.names[ n ] = col\n c.columns = append( c.columns, col )\n }\n\n // create the Stmt\n err := c.generateStatement( row )\n if err != nil {\n log.Println( \"Failed to prepare statement\" )\n return err\n }\n\n // Check to see if we have geometry\n if c.checkGeometry() {\n // Update the geometry prior to the commit\n c.tx.BeforeCommit( c.updateGeometry )\n\n // Cluster on the geometry at the end\n c.tx.OnCommitCluster( c.table, c.geom_index )\n } else {\n // Vacuum at the end when we have no geometry\n c.tx.OnCommitVacuumFull( c.table )\n }\n\n // Now truncate the table\n _, err = c.tx.DeleteFrom( c.table )\n return err\n}", "title": "" }, { "docid": "b03e364f0132ec18da91dfaf9c89b5c5", "score": "0.40772387", "text": "func (c *ClientMysql) TableInfo(table string) (*Result, error) {\n\t// TODO: filter by TABLE_SCHEMA i.e. database name\n\tq := `SELECT\n DATA_LENGTH AS data_size\n, INDEX_LENGTH AS index_size\n, TABLE_ROWS AS rows_count\nFROM information_schema.tables\nWHERE table_name = ?\n`\n\treturn dbQuery(c.db, q, table)\n}", "title": "" }, { "docid": "1a0d6a688322bce37217306b6a3fe5c8", "score": "0.40766516", "text": "func (l *Lock) addTables(tts []TargetTable) {\n\tfor _, tt := range tts {\n\t\tif _, ok := l.tables[tt.Source]; !ok {\n\t\t\tl.tables[tt.Source] = make(map[string]map[string]schemacmp.Table)\n\t\t\tl.done[tt.Source] = make(map[string]map[string]bool)\n\t\t\tl.versions[tt.Source] = make(map[string]map[string]int64)\n\t\t}\n\t\tfor schema, tables := range tt.UpTables {\n\t\t\tif _, ok := l.tables[tt.Source][schema]; !ok {\n\t\t\t\tl.tables[tt.Source][schema] = make(map[string]schemacmp.Table)\n\t\t\t\tl.done[tt.Source][schema] = make(map[string]bool)\n\t\t\t\tl.versions[tt.Source][schema] = make(map[string]int64)\n\t\t\t}\n\t\t\tfor table := range tables {\n\t\t\t\tif _, ok := l.tables[tt.Source][schema][table]; !ok {\n\t\t\t\t\tl.tables[tt.Source][schema][table] = l.joined\n\t\t\t\t\tl.done[tt.Source][schema][table] = false\n\t\t\t\t\tl.versions[tt.Source][schema][table] = 0\n\t\t\t\t\tlog.L().Info(\"table added to the lock\", zap.String(\"lock\", l.ID),\n\t\t\t\t\t\tzap.String(\"source\", tt.Source), zap.String(\"schema\", schema), zap.String(\"table\", table),\n\t\t\t\t\t\tzap.Stringer(\"table info\", l.joined))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "5fdc1a5c98f2d0d9fcb590167214f2f5", "score": "0.40717468", "text": "func createFederatedActivitiesTable() {\n\tcreateTableSQL := `CREATE TABLE IF NOT EXISTS ap_accepted_activities (\n \"id\" INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT,\n\t\t\"iri\" TEXT NOT NULL,\n \"actor\" TEXT NOT NULL,\n \"type\" TEXT NOT NULL,\n\t\t\"timestamp\" TIMESTAMP NOT NULL\n\t);`\n\n\t_datastore.MustExec(createTableSQL)\n\t_datastore.MustExec(`CREATE INDEX IF NOT EXISTS idx_iri_actor_index ON ap_accepted_activities (iri,actor);`)\n}", "title": "" }, { "docid": "d5f56a74770a08f8785767ecbf3b3e18", "score": "0.40628564", "text": "func getKeysAndOtherColumns(primaryKeyFieldsCsv string, columns []string) (string, string, error) {\n\t//\n\t// Requirements:\n\t// A list of quoted columns in a CSV is required for SELECT statements, and this needs to be escaped because of JSON.\n\t// While all SELECT fields must go into SQL as quoted names, the fields come out with raw unquoted keys on the stream.\n\t// Unquoted tokens are required by mergeDiff and tableSync: k1:v1,k2:v2.\n\t//\n\tpkCols := helper.ToUpperQuotedIfNotQuoted(helper.CsvToStringSliceTrimSpaces(primaryKeyFieldsCsv))\n\t// Validate PKs and build list of other columns. Use quoted columns since the user may quote some.\n\totherColsOm := helper.StringSliceToOrderedMap(columns) // temporarily store all columns and we'll delete PK cols next.\n\tmissingPK := make([]string, 0, len(columns))\n\tfor _, pk := range pkCols { // for each pk...\n\t\t_, exists := otherColsOm.Get(pk)\n\t\tif !exists { // if the PK is not in the list of all columns...\n\t\t\tmissingPK = append(missingPK, pk) // save it.\n\t\t} // else...\n\t\t// Delete the PK column from the list of other columns.\n\t\totherColsOm.Delete(pk)\n\t}\n\tif len(missingPK) > 0 { // if bad PKs were found...\n\t\treturn \"\", \"\", fmt.Errorf(\"missing fields: %v\", missingPK)\n\t}\n\tpkTokens, err := helper.OrderedMapToTokens(helper.StringSliceToOrderedMap(pkCols), true)\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\totherTokens, err := helper.OrderedMapToTokens(otherColsOm, true)\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\treturn pkTokens, otherTokens, nil\n}", "title": "" }, { "docid": "db1a2a4e831db84e45b18975f7885d35", "score": "0.40628293", "text": "func (d *Database) Tables() map[string]sql.Table { return d.tables }", "title": "" }, { "docid": "24374a01adcd7de13e01a6093f9811b2", "score": "0.40594155", "text": "func MakeShipmentData(db *pop.Connection) {\n\t// Grab three UUIDs for individual TDLs\n\t// TODO: should this query be made in main, between creation functions,\n\t// and then sourced from one central place?\n\ttdlList := []models.TrafficDistributionList{}\n\terr := db.All(&tdlList)\n\tif err != nil {\n\t\tfmt.Println(\"TDL ID import failed.\")\n\t}\n\n\t// Add three shipment table records using UUIDs from TDLs\n\toneWeek := time.Hour * 168\n\tnow := time.Now()\n\tnowPlusOne := now.Add(oneWeek)\n\tnowPlusTwo := now.Add(oneWeek * 2)\n\tmarket := \"dHHG\"\n\tsourceGBLOC := \"KKFA\"\n\tdestinationGBLOC := \"HAFC\"\n\n\tMakeShipment(db, Assertions{\n\t\tShipment: models.Shipment{\n\t\t\tRequestedPickupDate: &now,\n\t\t\tActualPickupDate: &now,\n\t\t\tActualDeliveryDate: &now,\n\t\t\tTrafficDistributionList: &tdlList[0],\n\t\t\tSourceGBLOC: &sourceGBLOC,\n\t\t\tDestinationGBLOC: &destinationGBLOC,\n\t\t\tMarket: &market,\n\t\t},\n\t})\n\n\tMakeShipment(db, Assertions{\n\t\tShipment: models.Shipment{\n\t\t\tRequestedPickupDate: &nowPlusOne,\n\t\t\tActualPickupDate: &nowPlusOne,\n\t\t\tActualDeliveryDate: &nowPlusOne,\n\t\t\tTrafficDistributionList: &tdlList[1],\n\t\t\tSourceGBLOC: &sourceGBLOC,\n\t\t\tDestinationGBLOC: &destinationGBLOC,\n\t\t\tMarket: &market,\n\t\t},\n\t})\n\n\tMakeShipment(db, Assertions{\n\t\tShipment: models.Shipment{\n\t\t\tRequestedPickupDate: &nowPlusTwo,\n\t\t\tActualPickupDate: &nowPlusTwo,\n\t\t\tActualDeliveryDate: &nowPlusTwo,\n\t\t\tTrafficDistributionList: &tdlList[2],\n\t\t\tSourceGBLOC: &sourceGBLOC,\n\t\t\tDestinationGBLOC: &destinationGBLOC,\n\t\t\tMarket: &market,\n\t\t},\n\t})\n}", "title": "" }, { "docid": "a33649f37f92c0a7a959c67305045ef8", "score": "0.40477318", "text": "func ScanAccess(db *sqlx.DB) error {\n\tvar existingAccess []uint32\n\tvar err error\n\n\t// get existing access\n\t{\n\t\ta := models.Access{}\n\t\texistingAccess, err = a.GetIDs(context.Background(), db)\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// read routing file\n\tdata, err := ioutil.ReadFile(\"routing/route.go\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// set transaction\n\ttx := db.MustBegin()\n\n\t// convert routing to access field\n\tdatas := strings.Split(string(data), \"\\n\")\n\tfor _, env := range datas {\n\t\tenv = strings.TrimSpace(env)\n\t\tif len(env) > 11 && env[:11] == \"app.Handle(\" {\n\t\t\troutings := strings.Split(env[11:(len(env)-1)], \",\")\n\t\t\thttpMethod := routings[0][11:]\n\t\t\turl := strings.TrimSpace(routings[1])\n\t\t\turl = url[1:(len(url) - 1)]\n\t\t\talias := strings.TrimSpace(routings[2])\n\n\t\t\t//store access except login route\n\t\t\tif !(url == \"/login\") {\n\t\t\t\turls := strings.Split(url, \"/\")\n\t\t\t\tcontroller := urls[1]\n\t\t\t\taccess := strings.ToUpper(httpMethod) + \" \" + url\n\t\t\t\texistingAccess, err = storeAccess(existingAccess, tx, controller, access, alias)\n\t\t\t\tif err != nil {\n\t\t\t\t\ttx.Rollback()\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// remove existing access\n\terr = removeAccess(tx, existingAccess)\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn err\n\t}\n\n\treturn tx.Commit()\n}", "title": "" }, { "docid": "0ee3fb11c0138ae006d8e6faf75bb72d", "score": "0.4045987", "text": "func (g *GroupLeaders) TableInfo() *TableInfo {\n\treturn group_leadersTableInfo\n}", "title": "" }, { "docid": "1c61d95487f1e9c26b9896cee26516d6", "score": "0.4042457", "text": "func (x *GormDB) generateUpdateSQL(stmt *gorm.Statement, cols []string,\n\trowMap []map[string]interface{}) (string,[]interface{}) {\n\n\ttableName := stmt.Table\n\t// 有序的主键列表\n\tvar primaryKeys []string\n\tfor _, field := range stmt.Statement.Statement.Schema.PrimaryFields {\n\t\tprimaryKeys = append(primaryKeys, field.DBName)\n\t}\n\n\t// 获取数据库类型\n\tcolumnTypeMap := make(map[string]schema.DataType)\n\tfor _, field := range stmt.Statement.Statement.Schema.Fields {\n\t\tcolumnTypeMap[field.DBName] = field.DataType\n\t}\n\n\t// 实体字段、数据库字段对应关系\n\tdbTagMap := make(map[string]string) // StructName-DbColumnName\n\tfor _, field := range stmt.Statement.Statement.Schema.Fields {\n\t\tdbTagMap[field.DBName] = field.Name\n\t}\n\n\t// 组装SQL\n\t//UPDATE table_name\n\t//SET\n\tvar sql string\n\tvar valueList []interface{}\n\tsql = fmt.Sprintf(\"UPDATE `%s` SET \", tableName)\n\n\t//type_id = CASE\n\t//...\n\t//END,\n\tfor _, colName := range cols {\n\t\tsql += fmt.Sprintf(\"`%s` = CASE \", colName)\n\n\t\tfor _, row := range rowMap {\n\t\t\t// WHEN (id=1 AND UUID='xxx0') THEN 3\n\t\t\tss, values := x.buildCaseLine(primaryKeys, colName, row, columnTypeMap, dbTagMap)\n\t\t\tsql += ss\n\t\t\tvalueList = append(valueList,values...)\n\t\t}\n\t\tsql += \"END,\"\n\t}\n\tsql = strings.TrimSuffix(sql, \",\")\n\n\t//WHERE (id,UUID) IN ((1,'v1'),(2,'v2'))\n\tss,values :=x.buildWhereLine(primaryKeys, rowMap, columnTypeMap, dbTagMap)\n\tsql += ss\n\tvalueList = append(valueList,values...)\n\n\treturn sql,valueList\n}", "title": "" }, { "docid": "ba5a9a7464d899fdeed275e1bfba10e5", "score": "0.40340683", "text": "func (*tableHintInfo) matchTableName(tables []*hintTableInfo, hintTables []hintTableInfo) bool {\n\thintMatched := false\n\tfor _, table := range tables {\n\t\tfor i, curEntry := range hintTables {\n\t\t\tif table == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif curEntry.dbName.L == table.dbName.L && curEntry.tblName.L == table.tblName.L && table.selectOffset == curEntry.selectOffset {\n\t\t\t\thintTables[i].matched = true\n\t\t\t\thintMatched = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\treturn hintMatched\n}", "title": "" }, { "docid": "f61fde6857f73a391aaafa8b796902fa", "score": "0.403398", "text": "func (p *Postgres) Analyze(s *schema.Schema) error {\n\tconstraintLinks := []constraintLink{}\n\n\t// tables\n\ttableRows, err := p.db.Query(`\nSELECT DISTINCT cls.oid AS oid, cls.relname AS table_name, tbl.table_type AS table_type, tbl.table_schema AS table_schema\nFROM pg_catalog.pg_class cls\nINNER JOIN pg_namespace ns ON cls.relnamespace = ns.oid\nINNER JOIN (SELECT table_name, table_type, table_schema\nFROM information_schema.tables\nWHERE table_schema != 'pg_catalog' AND table_schema != 'information_schema'\nAND table_catalog = $1) tbl ON cls.relname = tbl.table_name\nORDER BY oid`, s.Name)\n\tdefer tableRows.Close()\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\trelations := []*schema.Relation{}\n\n\ttables := []*schema.Table{}\n\tfor tableRows.Next() {\n\t\tvar (\n\t\t\ttableOid string\n\t\t\ttableName string\n\t\t\ttableType string\n\t\t\ttableSchema string\n\t\t)\n\t\terr := tableRows.Scan(&tableOid, &tableName, &tableType, &tableSchema)\n\t\tif err != nil {\n\t\t\treturn errors.WithStack(err)\n\t\t}\n\n\t\tname := tableName\n\t\tif tableSchema != defaultSchemaName {\n\t\t\tname = fmt.Sprintf(\"%s.%s\", tableSchema, tableName)\n\t\t}\n\n\t\ttable := &schema.Table{\n\t\t\tName: name,\n\t\t\tType: tableType,\n\t\t}\n\n\t\t// table comment\n\t\ttableCommentRows, err := p.db.Query(`\nSELECT pd.description as comment\nFROM pg_stat_user_tables AS ps, pg_description AS pd\nWHERE ps.relid=pd.objoid\nAND pd.objsubid=0\nAND ps.relname = $1\nAND ps.schemaname = $2`, tableName, tableSchema)\n\t\tdefer tableCommentRows.Close()\n\t\tif err != nil {\n\t\t\treturn errors.WithStack(err)\n\t\t}\n\n\t\tfor tableCommentRows.Next() {\n\t\t\tvar tableComment string\n\t\t\terr = tableCommentRows.Scan(&tableComment)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\t\t\ttable.Comment = tableComment\n\t\t}\n\n\t\t// view definition\n\t\tif tableType == \"VIEW\" {\n\t\t\tviewDefRows, err := p.db.Query(`\nSELECT view_definition FROM information_schema.views\nWHERE table_catalog = $1\nAND table_name = $2\nAND table_schema = $3;\n\t\t`, s.Name, tableName, tableSchema)\n\t\t\tdefer viewDefRows.Close()\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\t\t\tfor viewDefRows.Next() {\n\t\t\t\tvar tableDef string\n\t\t\t\terr := viewDefRows.Scan(&tableDef)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn errors.WithStack(err)\n\t\t\t\t}\n\t\t\t\ttable.Def = fmt.Sprintf(\"CREATE VIEW %s AS (\\n%s\\n)\", tableName, strings.TrimRight(tableDef, \";\"))\n\t\t\t}\n\t\t}\n\n\t\t// constraints\n\t\tconstraintRows, err := p.db.Query(p.queryForConstraints(), tableName, tableSchema)\n\t\tdefer constraintRows.Close()\n\t\tif err != nil {\n\t\t\treturn errors.WithStack(err)\n\t\t}\n\n\t\tconstraints := []*schema.Constraint{}\n\n\t\tfor constraintRows.Next() {\n\t\t\tvar (\n\t\t\t\tconstraintName string\n\t\t\t\tconstraintDef string\n\t\t\t\tconstraintType string\n\t\t\t\tconstraintReferenceTable sql.NullString\n\t\t\t\tconstraintConkey sql.NullString\n\t\t\t\tconstraintConfkey sql.NullString\n\t\t\t)\n\t\t\terr = constraintRows.Scan(&constraintName, &constraintDef, &constraintType, &constraintReferenceTable, &constraintConkey, &constraintConfkey)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\t\t\tconstraint := &schema.Constraint{\n\t\t\t\tName: constraintName,\n\t\t\t\tType: convertConstraintType(constraintType),\n\t\t\t\tDef: constraintDef,\n\t\t\t}\n\t\t\tif constraintType == \"f\" {\n\t\t\t\trelation := &schema.Relation{\n\t\t\t\t\tTable: table,\n\t\t\t\t\tDef: constraintDef,\n\t\t\t\t}\n\t\t\t\trelations = append(relations, relation)\n\t\t\t}\n\t\t\tconstraints = append(constraints, constraint)\n\t\t\tconstraintLinks = append(constraintLinks, constraintLink{\n\t\t\t\tconstraint: constraint,\n\t\t\t\ttable: table.Name,\n\t\t\t\treferenceTable: constraintReferenceTable.String,\n\t\t\t\tconkey: constraintConkey.String,\n\t\t\t\tconfkey: constraintConfkey.String,\n\t\t\t})\n\t\t}\n\t\ttable.Constraints = constraints\n\n\t\t// triggers\n\t\tif !p.rsMode {\n\t\t\ttriggerRows, err := p.db.Query(`\nSELECT tgname, pg_get_triggerdef(pt.oid)\nFROM pg_trigger AS pt\nLEFT JOIN pg_stat_user_tables AS ps ON ps.relid = pt.tgrelid\nWHERE pt.tgisinternal = false\nAND ps.relname = $1\nAND ps.schemaname = $2\nORDER BY pt.tgrelid\n`, tableName, tableSchema)\n\t\t\tdefer triggerRows.Close()\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\n\t\t\ttriggers := []*schema.Trigger{}\n\t\t\tfor triggerRows.Next() {\n\t\t\t\tvar (\n\t\t\t\t\ttriggerName string\n\t\t\t\t\ttriggerDef string\n\t\t\t\t)\n\t\t\t\terr = triggerRows.Scan(&triggerName, &triggerDef)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn errors.WithStack(err)\n\t\t\t\t}\n\t\t\t\ttrigger := &schema.Trigger{\n\t\t\t\t\tName: triggerName,\n\t\t\t\t\tDef: triggerDef,\n\t\t\t\t}\n\t\t\t\ttriggers = append(triggers, trigger)\n\t\t\t}\n\t\t\ttable.Triggers = triggers\n\t\t}\n\n\t\t// columns comments\n\t\tcolumnCommentRows, err := p.db.Query(`\nSELECT pa.attname AS column_name, pd.description AS comment\nFROM pg_stat_all_tables AS ps ,pg_description AS pd ,pg_attribute AS pa\nWHERE ps.relid=pd.objoid\nAND pd.objsubid != 0\nAND pd.objoid=pa.attrelid\nAND pd.objsubid=pa.attnum\nAND ps.relname = $1\nAND ps.schemaname = $2`, tableName, tableSchema)\n\t\tdefer columnCommentRows.Close()\n\t\tif err != nil {\n\t\t\treturn errors.WithStack(err)\n\t\t}\n\n\t\tcolumnComments := make(map[string]string)\n\t\tfor columnCommentRows.Next() {\n\t\t\tvar (\n\t\t\t\tcolumnName string\n\t\t\t\tcolumnComment string\n\t\t\t)\n\t\t\terr = columnCommentRows.Scan(&columnName, &columnComment)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\t\t\tcolumnComments[columnName] = columnComment\n\t\t}\n\n\t\t// columns\n\t\tcolumnRows, err := p.db.Query(`\nSELECT column_name, column_default, is_nullable, data_type, udt_name, character_maximum_length\nFROM information_schema.columns\nWHERE table_name = $1\nAND table_schema = $2\nORDER BY ordinal_position\n`, tableName, tableSchema)\n\t\tdefer columnRows.Close()\n\t\tif err != nil {\n\t\t\treturn errors.WithStack(err)\n\t\t}\n\n\t\tcolumns := []*schema.Column{}\n\t\tfor columnRows.Next() {\n\t\t\tvar (\n\t\t\t\tcolumnName string\n\t\t\t\tcolumnDefault sql.NullString\n\t\t\t\tisNullable string\n\t\t\t\tdataType string\n\t\t\t\tudtName string\n\t\t\t\tcharacterMaximumLength sql.NullInt64\n\t\t\t)\n\t\t\terr = columnRows.Scan(&columnName, &columnDefault, &isNullable, &dataType, &udtName, &characterMaximumLength)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\t\t\tcolumn := &schema.Column{\n\t\t\t\tName: columnName,\n\t\t\t\tType: convertColmunType(dataType, udtName, characterMaximumLength),\n\t\t\t\tNullable: convertColumnNullable(isNullable),\n\t\t\t\tDefault: columnDefault,\n\t\t\t}\n\t\t\tif comment, ok := columnComments[columnName]; ok {\n\t\t\t\tcolumn.Comment = comment\n\t\t\t}\n\t\t\tcolumns = append(columns, column)\n\t\t}\n\t\ttable.Columns = columns\n\n\t\t// indexes\n\t\tindexRows, err := p.db.Query(`\nSELECT\n i.relname AS indexname,\n pg_get_indexdef(i.oid) AS indexdef,\n indkey::text\nFROM ((((pg_index x\nJOIN pg_class c ON ((c.oid = x.indrelid)))\nJOIN pg_class i ON ((i.oid = x.indexrelid)))\nLEFT JOIN pg_namespace n ON ((n.oid = c.relnamespace))))\nWHERE ((c.relkind = ANY (ARRAY['r'::\"char\", 'm'::\"char\"])) AND (i.relkind = 'i'::\"char\"))\nAND c.relname = $1\nAND n.nspname = $2\nORDER BY x.indexrelid\n`, tableName, tableSchema)\n\t\tdefer indexRows.Close()\n\t\tif err != nil {\n\t\t\treturn errors.WithStack(err)\n\t\t}\n\n\t\tindexes := []*schema.Index{}\n\t\tfor indexRows.Next() {\n\t\t\tvar (\n\t\t\t\tindexName string\n\t\t\t\tindexDef string\n\t\t\t\tindkey string\n\t\t\t)\n\t\t\terr = indexRows.Scan(&indexName, &indexDef, &indkey)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\t\t\tindex := &schema.Index{\n\t\t\t\tName: indexName,\n\t\t\t\tDef: indexDef,\n\t\t\t\tTable: &table.Name,\n\t\t\t}\n\t\t\tidxs := indkeyToInts(indkey)\n\t\t\tfor _, idx := range idxs {\n\t\t\t\tindex.Columns = append(index.Columns, table.Columns[idx-1].Name)\n\t\t\t}\n\n\t\t\tindexes = append(indexes, index)\n\t\t}\n\t\ttable.Indexes = indexes\n\n\t\ttables = append(tables, table)\n\t}\n\n\ts.Tables = tables\n\n\t// Link Constraints\n\tfor _, l := range constraintLinks {\n\t\tif l.table != \"\" {\n\t\t\ttable, err := s.FindTableByName(l.table)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tl.constraint.Table = &table.Name\n\t\t\tif l.conkey != \"\" {\n\t\t\t\tidxs := colkeyToInts(l.conkey)\n\t\t\t\tfor _, idx := range idxs {\n\t\t\t\t\tl.constraint.Columns = append(l.constraint.Columns, table.Columns[idx-1].Name)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif l.referenceTable != \"\" {\n\t\t\treferenceTable, err := s.FindTableByName(l.referenceTable)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tl.constraint.ReferenceTable = &referenceTable.Name\n\t\t\tif l.confkey != \"\" {\n\t\t\t\tidxs := colkeyToInts(l.confkey)\n\t\t\t\tfor _, idx := range idxs {\n\t\t\t\t\tl.constraint.ReferenceColumns = append(l.constraint.ReferenceColumns, referenceTable.Columns[idx-1].Name)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Relations\n\tfor _, r := range relations {\n\t\tresult := reFK.FindAllStringSubmatch(r.Def, -1)\n\t\tstrColumns := strings.Split(result[0][1], \", \")\n\t\tstrParentTable := result[0][2]\n\t\tstrParentColumns := strings.Split(result[0][3], \", \")\n\t\tfor _, c := range strColumns {\n\t\t\tcolumn, err := r.Table.FindColumnByName(c)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tr.Columns = append(r.Columns, column)\n\t\t\tcolumn.ParentRelations = append(column.ParentRelations, r)\n\t\t}\n\t\tparentTable, err := s.FindTableByName(strParentTable)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tr.ParentTable = parentTable\n\t\tfor _, c := range strParentColumns {\n\t\t\tcolumn, err := parentTable.FindColumnByName(c)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tr.ParentColumns = append(r.ParentColumns, column)\n\t\t\tcolumn.ChildRelations = append(column.ChildRelations, r)\n\t\t}\n\t}\n\n\ts.Relations = relations\n\n\treturn nil\n}", "title": "" } ]
f80b0623f54eed7ba1412564034a82d1
GRPCStatus make codeErr support grpc status
[ { "docid": "15d147108efcea00a5cbbbffe3a47e97", "score": "0.7373608", "text": "func (ce *codeErr) GRPCStatus() *status.Status {\n\treturn status.New(codes.Code(ce.code.Value()), ce.err.Error())\n}", "title": "" } ]
[ { "docid": "2cbacd567039be9b972dfdbc0cf4441d", "score": "0.70743954", "text": "func grpcCode(err error) codes.Code {\n\tif s, ok := status.FromError(err); ok {\n\t\treturn s.Code()\n\t}\n\treturn codes.Unknown\n}", "title": "" }, { "docid": "665ed25301764d5f881d600178190871", "score": "0.7031448", "text": "func GRPCStatusCode(code Code) codes.Code {\n\treturn grpcCodes[code]\n}", "title": "" }, { "docid": "5e02438e31fba17e26c6d6d76fbd68f1", "score": "0.7027906", "text": "func (x *Error) GRPCStatus() *status.Status {\n\ttype Provider interface {\n\t\tGRPCStatus() *status.Status\n\t}\n\n\tif provider, ok := x.reason.(Provider); ok {\n\t\treturn provider.GRPCStatus()\n\t}\n\n\tvar (\n\t\tcode = codes.Internal\n\t\tbuffer = &bytes.Buffer{}\n\t)\n\n\tif x.code > 0 {\n\t\tcode = codes.Code(x.code)\n\t}\n\n\tif x.msg != \"\" {\n\t\tfmt.Fprint(buffer, x.msg)\n\t}\n\n\tif x.reason != nil {\n\t\tif buffer.Len() > 0 {\n\t\t\tfmt.Fprint(buffer, \": \")\n\t\t}\n\n\t\tfmt.Fprintf(buffer, x.reason.Error())\n\t}\n\n\tpayload := status.New(code, buffer.String())\n\n\t// prepare the details\n\tfor _, item := range x.details {\n\t\t// append the details\n\t\tpayload, _ = payload.WithDetails(&wrapperspb.StringValue{\n\t\t\tValue: item,\n\t\t})\n\t}\n\n\tif len(x.context) > 0 {\n\t\t// prepare the context\n\t\tif details, err := structpb.NewStruct(x.context); err == nil {\n\t\t\t// add the error as details\n\t\t\tpayload, _ = payload.WithDetails(details)\n\t\t}\n\t}\n\n\treturn payload\n}", "title": "" }, { "docid": "825412e9f0ff066bc4e067ed268a9267", "score": "0.6947932", "text": "func traceStatus(err error) trace.Status {\n\tvar code int32\n\tswitch {\n\tcase err == nil, errors.Is(err, context.Canceled):\n\t\treturn trace.Status{Code: trace.StatusCodeOK}\n\tcase errors.Is(err, ErrServiceStopped):\n\t\tcode = trace.StatusCodeFailedPrecondition\n\tcase errors.Is(err, context.DeadlineExceeded):\n\t\tcode = trace.StatusCodeDeadlineExceeded\n\tdefault:\n\t\tcode = trace.StatusCodeUnknown\n\t}\n\treturn trace.Status{\n\t\tCode: code,\n\t\tMessage: err.Error(),\n\t}\n}", "title": "" }, { "docid": "ed17913843c998846ebd4e81ff433395", "score": "0.6920967", "text": "func (g grpcTraceableError) GRPCStatus() *status.Status {\n\ts, ok := status.FromError(g.err)\n\tif !ok {\n\t\treturn nil\n\t}\n\treturn s\n}", "title": "" }, { "docid": "2ccd4b80f91c5db06bb74e8211fadacb", "score": "0.6683562", "text": "func (e *UnavailableError) GRPCStatus() *status.Status {\n\treturn status.New(e.rpcCode, e.Message)\n}", "title": "" }, { "docid": "2df836cba7034565b7c1c2a2baba49a3", "score": "0.66492575", "text": "func Code(err error) codes.Code {\n\treturn grpc.Code(errors.Unwrap(err))\n}", "title": "" }, { "docid": "ebd8a9aa223940a553867e603a3055cb", "score": "0.65871763", "text": "func main() {\n\t//abc := &errdetails.BadRequest{\n\t//\tFieldViolations: []*errdetails.BadRequest_FieldViolation{\n\t//\t\t&errdetails.BadRequest_FieldViolation{\n\t//\t\t\tField: \"abc\",\n\t//\t\t\tDescription: \"def\",\n\t//\t\t},\n\t//\t},\n\t//}\n\terrStatus, _ := status.New(codes.InvalidArgument, \"test\").WithDetails(&errdetails.PreconditionFailure{\n\t\tViolations: []*errdetails.PreconditionFailure_Violation{\n\t\t\t&errdetails.PreconditionFailure_Violation{\n\t\t\t\tType: \"test\",\n\t\t\t\tSubject: \"test\",\n\t\t\t\tDescription: \"test\",\n\t\t\t},\n\t\t},\n\t})\n\tlog.Printf(\"errStatus.Err(): %s\", errStatus.Err())\n\tlog.Printf(\"errStatus.Err(): %+v\", errStatus.Details())\n\n\tst := status.Convert(errStatus.Err())\n\tlog.Printf(\"errStatus.Err(): %+v\", st.Details())\n}", "title": "" }, { "docid": "7760cca515d6ca8f474fdd35c6526711", "score": "0.6560325", "text": "func statusCode(st *tracepb.Status) codes.Code {\n\tswitch st.Code {\n\tcase tracepb.Status_STATUS_CODE_ERROR:\n\t\treturn codes.Error\n\tdefault:\n\t\treturn codes.Ok\n\t}\n}", "title": "" }, { "docid": "3a77de88c5331c00147df972272fe74b", "score": "0.6532132", "text": "func ProtoFromErr(err error) *spb.Status {\n\tswitch err {\n\tcase nil:\n\t\treturn &spb.Status{Code: int32(codes.OK)}\n\tcase context.DeadlineExceeded:\n\t\tfallthrough\n\tcase context.Canceled:\n\t\treturn status.FromContextError(err).Proto()\n\tdefault:\n\t\treturn status.Convert(err).Proto()\n\t}\n}", "title": "" }, { "docid": "879c6502df63ea4cebe1fbf044c6ec27", "score": "0.6487024", "text": "func runStatusToGoogleRpcStatus(rs *runStatus) *google_rpc_status.Status {\n\tif rs == nil || rs.RunStatus == nil {\n\t\treturn &google_rpc_status.Status{}\n\t}\n\tswitch rs.Status {\n\tcase scoot.RunStatusState_UNKNOWN:\n\t\treturn &google_rpc_status.Status{\n\t\t\tCode: int32(google_rpc_code.Code_UNKNOWN),\n\t\t}\n\tcase scoot.RunStatusState_PENDING:\n\t\treturn &google_rpc_status.Status{\n\t\t\tCode: int32(google_rpc_code.Code_OK),\n\t\t}\n\tcase scoot.RunStatusState_RUNNING:\n\t\treturn &google_rpc_status.Status{\n\t\t\tCode: int32(google_rpc_code.Code_OK),\n\t\t}\n\t\t// done states\n\tcase scoot.RunStatusState_COMPLETE:\n\t\treturn &google_rpc_status.Status{\n\t\t\tCode: int32(google_rpc_code.Code_OK),\n\t\t}\n\tcase scoot.RunStatusState_FAILED:\n\t\treturn &google_rpc_status.Status{\n\t\t\tCode: int32(google_rpc_code.Code_INTERNAL),\n\t\t}\n\tcase scoot.RunStatusState_ABORTED:\n\t\treturn &google_rpc_status.Status{\n\t\t\tCode: int32(google_rpc_code.Code_CANCELLED),\n\t\t}\n\tcase scoot.RunStatusState_TIMEDOUT:\n\t\treturn &google_rpc_status.Status{\n\t\t\tCode: int32(google_rpc_code.Code_DEADLINE_EXCEEDED),\n\t\t}\n\tdefault:\n\t\treturn &google_rpc_status.Status{\n\t\t\tCode: int32(google_rpc_code.Code_UNKNOWN),\n\t\t}\n\t}\n}", "title": "" }, { "docid": "94a8e42a3dc7d0c83a9ff226163ae6b7", "score": "0.6467884", "text": "func getStatus(code int) string {\n\tif code >= 500 {\n\t\treturn StatusError\n\t}\n\tif code >= 400 {\n\t\treturn StatusFail\n\t}\n\treturn StatusSuccess\n}", "title": "" }, { "docid": "3061a0a13d132de948c32b60a6884a3b", "score": "0.6389003", "text": "func StatusError(status string) *OutputResponse {\n return &OutputResponse{\n Error: true,\n Status: status,\n }\n}", "title": "" }, { "docid": "893caffd00bd3c84bb373dcfbb494986", "score": "0.6384284", "text": "func StatusErrorf(status string, args ...interface{}) *OutputResponse {\n return &OutputResponse{\n Error: true,\n Status: fmt.Sprintf(status, args...),\n }\n}", "title": "" }, { "docid": "679e84fed6e4ad16945ae7ddea6aa8db", "score": "0.6371602", "text": "func StatusFromCode(code codes.Code) int {\n\tswitch code {\n\tcase codes.OK:\n\t\treturn http.StatusOK\n\tcase codes.Canceled:\n\t\treturn http.StatusRequestTimeout\n\tcase codes.Unknown:\n\t\treturn http.StatusInternalServerError\n\tcase codes.InvalidArgument:\n\t\treturn http.StatusBadRequest\n\tcase codes.DeadlineExceeded:\n\t\treturn http.StatusGatewayTimeout\n\tcase codes.NotFound:\n\t\treturn http.StatusNotFound\n\tcase codes.AlreadyExists:\n\t\treturn http.StatusConflict\n\tcase codes.PermissionDenied:\n\t\treturn http.StatusForbidden\n\tcase codes.Unauthenticated:\n\t\treturn http.StatusUnauthorized\n\tcase codes.ResourceExhausted:\n\t\treturn http.StatusTooManyRequests\n\tcase codes.FailedPrecondition:\n\t\t// Note, this deliberately doesn't translate to the similarly named '412 Precondition Failed' HTTP response status.\n\t\treturn http.StatusBadRequest\n\tcase codes.Aborted:\n\t\treturn http.StatusConflict\n\tcase codes.OutOfRange:\n\t\treturn http.StatusBadRequest\n\tcase codes.Unimplemented:\n\t\treturn http.StatusNotImplemented\n\tcase codes.Internal:\n\t\treturn http.StatusInternalServerError\n\tcase codes.Unavailable:\n\t\treturn http.StatusServiceUnavailable\n\tcase codes.DataLoss:\n\t\treturn http.StatusInternalServerError\n\t}\n\n\treturn http.StatusInternalServerError\n}", "title": "" }, { "docid": "7946b406a73ec2ab95c1a8f48435323d", "score": "0.63656557", "text": "func Err(c codes.Code, msg string, opts ...detailOption) error {\n\tstatusResp := status.New(c, msg)\n\n\tif len(opts) > 0 {\n\t\tdetails := make([]proto.Message, len(opts))\n\t\tfor i, opt := range opts {\n\t\t\tdetails[i] = opt()\n\t\t}\n\n\t\tstatusResp, _ = statusResp.WithDetails(details...)\n\t}\n\n\treturn (*statusError)(statusResp.Proto())\n}", "title": "" }, { "docid": "5def032a5ef997c86733dea1742178a9", "score": "0.6361618", "text": "func (s *ChannelAlreadyExistsException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "1a1d036355bc1a97b85b5cd6501ff1c3", "score": "0.63450086", "text": "func EncodeGrpcRespAlertStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "4831aa7aba137f97a4bce05151169ce5", "score": "0.6337286", "text": "func HTTPStatusFromCode(code codes.Code) int {\n\tswitch code {\n\tcase codes.OK:\n\t\treturn http.StatusOK\n\tcase codes.Canceled:\n\t\treturn http.StatusRequestTimeout\n\tcase codes.Unknown:\n\t\treturn http.StatusInternalServerError\n\tcase codes.InvalidArgument:\n\t\treturn http.StatusBadRequest\n\tcase codes.DeadlineExceeded:\n\t\treturn http.StatusGatewayTimeout\n\tcase codes.NotFound:\n\t\treturn http.StatusNotFound\n\tcase codes.AlreadyExists:\n\t\treturn http.StatusConflict\n\tcase codes.PermissionDenied:\n\t\treturn http.StatusForbidden\n\tcase codes.Unauthenticated:\n\t\treturn http.StatusUnauthorized\n\tcase codes.ResourceExhausted:\n\t\treturn http.StatusTooManyRequests\n\tcase codes.FailedPrecondition:\n\t\treturn http.StatusBadRequest\n\tcase codes.Aborted:\n\t\treturn http.StatusConflict\n\tcase codes.OutOfRange:\n\t\treturn http.StatusBadRequest\n\tcase codes.Unimplemented:\n\t\treturn http.StatusNotImplemented\n\tcase codes.Internal:\n\t\treturn http.StatusInternalServerError\n\tcase codes.Unavailable:\n\t\treturn http.StatusServiceUnavailable\n\tcase codes.DataLoss:\n\t\treturn http.StatusInternalServerError\n\t}\n\n\tgrpclog.Infof(\"Unknown gRPC error code: %v\", code)\n\treturn http.StatusInternalServerError\n}", "title": "" }, { "docid": "c473c53e4cdbffd6ba6078821ec3f967", "score": "0.63317496", "text": "func HTTPStatusFromCode(code codes.Code) int {\n\tswitch code {\n\tcase codes.OK:\n\t\treturn http.StatusOK\n\tcase codes.Canceled:\n\t\treturn http.StatusRequestTimeout\n\tcase codes.Unknown:\n\t\treturn http.StatusInternalServerError\n\tcase codes.InvalidArgument:\n\t\treturn http.StatusBadRequest\n\tcase codes.DeadlineExceeded:\n\t\treturn http.StatusGatewayTimeout\n\tcase codes.NotFound:\n\t\treturn http.StatusNotFound\n\tcase codes.AlreadyExists:\n\t\treturn http.StatusConflict\n\tcase codes.PermissionDenied:\n\t\treturn http.StatusForbidden\n\tcase codes.Unauthenticated:\n\t\treturn http.StatusUnauthorized\n\tcase codes.ResourceExhausted:\n\t\treturn http.StatusTooManyRequests\n\tcase codes.FailedPrecondition:\n\t\t// Note, this deliberately doesn't translate to the similarly named '412 Precondition Failed' HTTP response status.\n\t\treturn http.StatusBadRequest\n\tcase codes.Aborted:\n\t\treturn http.StatusConflict\n\tcase codes.OutOfRange:\n\t\treturn http.StatusBadRequest\n\tcase codes.Unimplemented:\n\t\treturn http.StatusNotImplemented\n\tcase codes.Internal:\n\t\treturn http.StatusInternalServerError\n\tcase codes.Unavailable:\n\t\treturn http.StatusServiceUnavailable\n\tcase codes.DataLoss:\n\t\treturn http.StatusInternalServerError\n\t}\n\n\tgrpclog.Infof(\"Unknown gRPC error code: %v\", code)\n\treturn http.StatusInternalServerError\n}", "title": "" }, { "docid": "e661e0f38b7e1b26c3080d7f419d2f4b", "score": "0.6288515", "text": "func HTTPStatusFromCode(code rpc.Code) int {\n\tswitch code {\n\tcase rpc.OK:\n\t\treturn http.StatusOK\n\tcase rpc.CANCELLED:\n\t\treturn http.StatusRequestTimeout\n\tcase rpc.UNKNOWN:\n\t\treturn http.StatusInternalServerError\n\tcase rpc.INVALID_ARGUMENT:\n\t\treturn http.StatusBadRequest\n\tcase rpc.DEADLINE_EXCEEDED:\n\t\treturn http.StatusGatewayTimeout\n\tcase rpc.NOT_FOUND:\n\t\treturn http.StatusNotFound\n\tcase rpc.ALREADY_EXISTS:\n\t\treturn http.StatusConflict\n\tcase rpc.PERMISSION_DENIED:\n\t\treturn http.StatusForbidden\n\tcase rpc.UNAUTHENTICATED:\n\t\treturn http.StatusUnauthorized\n\tcase rpc.RESOURCE_EXHAUSTED:\n\t\treturn http.StatusTooManyRequests\n\tcase rpc.FAILED_PRECONDITION:\n\t\treturn http.StatusPreconditionFailed\n\tcase rpc.ABORTED:\n\t\treturn http.StatusConflict\n\tcase rpc.OUT_OF_RANGE:\n\t\treturn http.StatusBadRequest\n\tcase rpc.UNIMPLEMENTED:\n\t\treturn http.StatusNotImplemented\n\tcase rpc.INTERNAL:\n\t\treturn http.StatusInternalServerError\n\tcase rpc.UNAVAILABLE:\n\t\treturn http.StatusServiceUnavailable\n\tcase rpc.DATA_LOSS:\n\t\treturn http.StatusInternalServerError\n\t}\n\n\t// should not happen\n\treturn http.StatusInternalServerError\n}", "title": "" }, { "docid": "0187ce588d254154c9597b565cff01cc", "score": "0.62521344", "text": "func (se serviceError) toGRPC() error {\n\tvar msg string\n\n\t// checks whether the error is internal and whether it was wrapped\n\tif se.status == codes.Internal && !se.isWrapped {\n\t\tmsg = defaultMsg\n\t} else {\n\t\tmsg = se.Error()\n\t}\n\n\treturn status.Error(se.status, msg)\n}", "title": "" }, { "docid": "ab561ff20e7ec7f3f9365545301da2ce", "score": "0.62492603", "text": "func (i *IllegalArgumentError) StatusCode() int { return http.StatusBadRequest }", "title": "" }, { "docid": "31843f558357b686f40160a2d6b223b9", "score": "0.62149274", "text": "func (t *FakeNRTxn) CheckStatusCode(c codes.Code) {\n\tt.t.Helper()\n\tif code, ok := t.Attrs[\"grpcStatusCode\"]; !ok {\n\t\tt.t.Error(\"attr grpcStatusCode is missing\")\n\t} else if got, want := code, c; got != want {\n\t\tt.t.Errorf(\"grpcStatusCode is %v, want %v\", got, want)\n\t}\n}", "title": "" }, { "docid": "8b3bf4200ab15d308cf39e68bb855c4e", "score": "0.62058824", "text": "func ToGRPC(err error) error {\n\tif err == nil {\n\t\treturn nil\n\t}\n\n\tgRPCerr, ok := err.(interface {\n\t\ttoGRPC() error\n\t})\n\n\tif !ok {\n\t\treturn status.Error(codes.Unknown, unwrappedErrorMsg)\n\t}\n\n\treturn gRPCerr.toGRPC()\n}", "title": "" }, { "docid": "82a064e0e51fd5bbe699d45e71e5859a", "score": "0.6200645", "text": "func StatusCode(err error) int {\n\tswitch e := err.(type) {\n\tcase *Error:\n\t\tswitch e.EType {\n\t\tcase ETInvalid:\n\t\t\treturn http.StatusBadRequest\n\t\tcase ETNotFound:\n\t\t\treturn http.StatusNotFound\n\t\tdefault:\n\t\t\treturn http.StatusInternalServerError\n\t\t}\n\tdefault:\n\t\treturn http.StatusInternalServerError\n\t}\n}", "title": "" }, { "docid": "a3cbb6aa4ed2179af60378eddb27696e", "score": "0.6188805", "text": "func EncodeGrpcRespBookStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "f8e7d5f6195b0edf40304211a1c71ea6", "score": "0.6185824", "text": "func code(err error) string {\n\tif err == context.Canceled {\n\t\treturn grpcmetrics.Canceled\n\t}\n\n\tst, ok := status.FromError(err)\n\tif !ok {\n\t\treturn grpcmetrics.Unknown\n\t}\n\n\treturn dasherize(st.Code().String())\n}", "title": "" }, { "docid": "ee15cf919f813d5b1c8be5623458c14c", "score": "0.6180664", "text": "func checkStatusCode(status Status) error {\n\tif status.StatusCode != successStatusCode {\n\t\treturn fmt.Errorf(\"error while validating response status: Status Code: %s, Status Message: %s\", status.StatusCode, status.StatusDescription.Description)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0dd0455561b18cc91be04fc69708f63c", "score": "0.6173583", "text": "func HTTPStatus(code codes.Code) int {\n\tif code, ok := rpc2http[code]; ok {\n\t\treturn code\n\t}\n\treturn http.StatusInternalServerError\n}", "title": "" }, { "docid": "d3f58e9a153125f894de11393bc621d8", "score": "0.61279863", "text": "func StatusCode(ctx context.Context) (string, bool) {\n\tcode, ok := ctx.Value(contextkeys.StatusCodeKey).(string)\n\treturn code, ok\n}", "title": "" }, { "docid": "27cfabbb20d3c0046e151c1dbaa29492", "score": "0.61137724", "text": "func (e Error) Status() int { return e.Code }", "title": "" }, { "docid": "6aa2dc9e3f7f96604dd80e16b6e47ce1", "score": "0.6105224", "text": "func (se StatusError) HTTPCode() int { return se.httpCode }", "title": "" }, { "docid": "745c883c3b4a5f5d948519a55d04170c", "score": "0.6098461", "text": "func (s *InternalServiceError) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "fdc6a8b922a049eaa00d231d97cf3326", "score": "0.6098094", "text": "func (e APIError) StatusCode() int {\r\n\treturn e.statusCode\r\n}", "title": "" }, { "docid": "2b7d3a970a99f1b2b5bc793bbfaaa2a6", "score": "0.6060334", "text": "func (he httpError) StatusCode() int {\n\treturn he.code\n}", "title": "" }, { "docid": "583ae7010ffd985ab842ca2d3b275056", "score": "0.60570973", "text": "func (e errorType) StatusCode() int {\n\treturn e.statusCode\n}", "title": "" }, { "docid": "08d87b835b8a0ec2e05f9a88e10ef68b", "score": "0.60462403", "text": "func (e ErrType) StatusCode() int {\n\tswitch e {\n\tcase ErrTypeForbidden:\n\t\treturn http.StatusForbidden\n\tcase ErrTypeUnauthorized:\n\t\treturn http.StatusUnauthorized\n\tcase ErrTypeNotFound:\n\t\treturn http.StatusNotFound\n\tcase ErrTypeValidation,\n\t\tErrTypeDuplicate:\n\t\treturn http.StatusBadRequest\n\t}\n\treturn http.StatusInternalServerError\n}", "title": "" }, { "docid": "be29d864559c06f741d6723b1843c09c", "score": "0.60416394", "text": "func WrapWithFallbackCode(err error, code codes.Code, msg string) error {\n\terr = APIErrToGRPC(err)\n\tif s, ok := status.FromError(err); ok {\n\t\treturn status.New(s.Code(), msg+\": \"+s.Message()).Err()\n\t}\n\treturn status.New(code, msg+\": \"+err.Error()).Err()\n}", "title": "" }, { "docid": "870d5ef34dcb8baf660e5a22e2695cd3", "score": "0.6041639", "text": "func (s *ChannelMaxLimitExceededException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "5afba194c9073d19db4c188d995f4bc4", "score": "0.6019089", "text": "func (s *ChannelExistsForEDSException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "6fdffef625a9ff61b48e6c366ee69d4d", "score": "0.60179913", "text": "func (s *ResourceAlreadyExistsException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "70ddeaaeeb1d7e99cae4f953ec6ca0a0", "score": "0.6006358", "text": "func EncodeGrpcRespPublisherStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "22e085848fe3568b350b2d9694f3311b", "score": "0.6002672", "text": "func RPCErr(err error) *status.Status {\n\tr, _ := status.FromError(err)\n\treturn r\n}", "title": "" }, { "docid": "1ff5e920193824568db6fc472ad2dad8", "score": "0.59998643", "text": "func (s *PermissionAlreadyExistsException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "3891d84725836817dd7dab36b2e5d17f", "score": "0.59954387", "text": "func (s *ChannelNotFoundException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "dc7779f77fc853b0dfbda39efe96ed94", "score": "0.59884787", "text": "func DecodeGrpcRespAlertStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "75dad934bb9a717b70c31d5a74b3a944", "score": "0.5986105", "text": "func (s *TrailAlreadyExistsException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "8d0b42739681131ba619b0bbf6cf722b", "score": "0.59826726", "text": "func (r *simpleRequest) StatusCode() int {\n\tif s, ok := r.errstack.err.(HasStatusCode); ok {\n\t\treturn s.StatusCode()\n\t}\n\treturn 400\n}", "title": "" }, { "docid": "caa303e69ba3131b755dd4e8597970b4", "score": "0.5981734", "text": "func (r Errors) StatusCode() int {\n\tif r.HasErrors() {\n\t\treturn strToInt(r.Errors[0].Status)\n\t}\n\treturn 200\n}", "title": "" }, { "docid": "bd67de617d532b7521f5dc0b67e446c4", "score": "0.597062", "text": "func EncodeGrpcRespStoreStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "8d605f6a8a60bbad418fe92fc9c2d711", "score": "0.59641206", "text": "func (f APIError) StatusCode() int {\n\treturn f.ResponseCode\n}", "title": "" }, { "docid": "9c418c58ae3eaf7edef4171532ed3c94", "score": "0.5960246", "text": "func (s *MaxNumberOfConformancePacksExceededException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "84f6063157a52e07a9fe5847e7d3f328", "score": "0.59551454", "text": "func (s Status) Code() int {\n\tswitch s {\n\tcase \"Pending\":\n\t\treturn 0\n\tcase \"Scheduled\":\n\t\treturn 1\n\tcase \"Running\":\n\t\treturn 2\n\tcase \"Stopped\":\n\t\treturn 3\n\tcase \"Error\":\n\t\treturn 3\n\tcase \"Success\":\n\t\treturn 3\n\tdefault:\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "968afc9b25f448dda9ba77b95b8ff505", "score": "0.5948423", "text": "func DecodeGrpcRespStoreStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "7e3a268798d23891dd62af61d7092804", "score": "0.59399927", "text": "func (c *Convertor) StatusCode(s string) cpb.StatusCode_Value {\n\tif c.StatusCodeMap != nil {\n\t\treturn c.StatusCodeMap[strings.ToUpper(s)]\n\t}\n\treturn DefaultStatusCodeMap[strings.ToUpper(s)]\n}", "title": "" }, { "docid": "1fc27bae8d56da830e750f5a5bfe0c3c", "score": "0.59307116", "text": "func (e *PinErr) StatusCode() int {\n\tswitch e.Code {\n\tcase ErrCodeNotFound:\n\t\treturn http.StatusNotFound\n\tcase ErrCodeAPIBadRequest:\n\t\treturn http.StatusBadRequest\n\tdefault:\n\t\treturn http.StatusInternalServerError\n\t}\n}", "title": "" }, { "docid": "cf2f0e6d5e86208ea1158934bc5ce5d9", "score": "0.5929597", "text": "func (s *ResourceExistsException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "cf2f0e6d5e86208ea1158934bc5ce5d9", "score": "0.5929597", "text": "func (s *ResourceExistsException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "8750259d1761467b28fe5d35ab682663", "score": "0.5929469", "text": "func (s *ConformancePackTemplateValidationException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "9698e1ff996c9d6c2cb45f28688c90e9", "score": "0.59255785", "text": "func (s *InvalidArgumentException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "28e45693cc7192fac69f0ce7971fe664", "score": "0.5924304", "text": "func (s *NoSuchConfigRuleInConformancePackException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "a13bf84388f8d5b3267ba30dd28f2eb8", "score": "0.5922529", "text": "func (s *InternalServiceException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "83891e2778031d3b568f162091f21b2b", "score": "0.59194654", "text": "func Status(re *require.Assertions, code int) func([]byte, int) {\n\treturn func(resp []byte, i int) {\n\t\tre.Equal(code, i, \"resp: \"+string(resp))\n\t}\n}", "title": "" }, { "docid": "a5da45d1ffabcb7ff4d48531b323ecf1", "score": "0.591075", "text": "func CodeFromStatus(status int) codes.Code {\n\tswitch status {\n\tcase http.StatusOK:\n\t\treturn codes.OK\n\tcase http.StatusRequestTimeout:\n\t\treturn codes.Canceled\n\tcase http.StatusBadRequest:\n\t\treturn codes.InvalidArgument\n\tcase http.StatusGatewayTimeout:\n\t\treturn codes.DeadlineExceeded\n\tcase http.StatusNotFound:\n\t\treturn codes.NotFound\n\tcase http.StatusConflict:\n\t\treturn codes.AlreadyExists\n\tcase http.StatusForbidden:\n\t\treturn codes.PermissionDenied\n\tcase http.StatusUnauthorized:\n\t\treturn codes.Unauthenticated\n\tcase http.StatusTooManyRequests:\n\t\treturn codes.ResourceExhausted\n\tcase http.StatusNotImplemented:\n\t\treturn codes.Unimplemented\n\tcase http.StatusInternalServerError:\n\t\treturn codes.Internal\n\tcase http.StatusServiceUnavailable:\n\t\treturn codes.Unavailable\n\t}\n\n\treturn http.StatusInternalServerError\n}", "title": "" }, { "docid": "fad6581617eac1ef7b66f14c9b0577ab", "score": "0.5906974", "text": "func (c *Context) Status(code int) {\n\tif code < 100 || code > 999 {\n\t\tpanic(fmt.Errorf(\"invalid status code: %d\", code))\n\t}\n\tc.explicitStatus = true\n\tc.status = code\n}", "title": "" }, { "docid": "3865dbc0271e12d1b656400dafee3b5b", "score": "0.5904953", "text": "func DecodeGrpcRespBookStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "01b1617672d949f4c553f277c83d6dd1", "score": "0.5904525", "text": "func (i *infrastructure) StatusCode() int {\n\ts, ok := i.errstack.err.(HasStatusCode)\n\tif !ok {\n\t\treturn 500\n\t}\n\treturn s.StatusCode()\n}", "title": "" }, { "docid": "3b371f6224afaf570cf6b1866ce27e6e", "score": "0.5897242", "text": "func EncodeGrpcRespPolicerProfileStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "52747c40a6fcb7b1269ac8379f450665", "score": "0.58935916", "text": "func checkResponseErrorCode(rpcError *RpcError) error {\n\tswitch rpcError.ErrCode {\n\tcase ErrorCode_NO_ERROR:\n\t\treturn nil\n\tdefault:\n\t\treturn errors.New(fmt.Sprintf(\"unexpected error code recieved from server.\\n error: %v.\\n\"+\n\t\t\t\" error message : %v.\\n java stacktrace: %v.\\n\",\n\t\t\trpcError.ErrCode.String(),\n\t\t\trpcError.ErrorMessage,\n\t\t\trpcError.JavaStackTrace))\n\t}\n}", "title": "" }, { "docid": "9e5693ebef2c391b85c44aca06e4a529", "score": "0.5887983", "text": "func (s *AccountNotRegisteredException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "ed55cb7eb4112865cedbab1c21dc34e0", "score": "0.58878446", "text": "func (s *MaxNumberOfOrganizationConformancePacksExceededException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "4ed3d85c7f003f16c8deb1966a429dc4", "score": "0.58877337", "text": "func DecodeGrpcRespPublisherStatus(ctx context.Context, response interface{}) (interface{}, error) {\n\treturn response, nil\n}", "title": "" }, { "docid": "a31a42d8e20681dbd6d104766dd5b7df", "score": "0.5887569", "text": "func (s *ResourceConcurrentModificationException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "7e329253e34b6f5e41e99973e7ea6da5", "score": "0.5885541", "text": "func (s *ConcurrentModificationException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "7e329253e34b6f5e41e99973e7ea6da5", "score": "0.5885541", "text": "func (s *ConcurrentModificationException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "d1330303dd17ef0d2532507916faea3f", "score": "0.58811045", "text": "func modifyStatus(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar jsonResp string\n\tvar err error\n\tvar cID string\n\tvar cStatus string\n\tfmt.Println(\"starting modifyStatus\")\n\t\n\tindexName := \"InstructingParty~ContractStatus~MessageIdentification\"\n\tindexName2 := \"InstructedParty~ContractStatus~MessageIdentification\"\n\tindexName3 := \"ContractStatus~MessageIdentification\"\n\n\tif len(args) != 2 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting 2. key of the variable and value to set\")\n\t}\n\n\t// input sanitation\n\terr = sanitize_arguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tcID = args[0]\n\tcStatus = args[1]\n\t\n\t//todo - check if contract id exists\n\tcontract, err := getContractInfo(stub, cID)\n\tif err != nil {\n\t\tfmt.Println(\"This contract doesn't exist - \" + cID)\n\t\tfmt.Println(contract)\n\t\treturn shim.Error(\"This contract doesn't exist - \" + cID) // stop creating contract by this id exists\n\t}\n\t\n\tvalAsbytes, err := stub.GetState(cID) //get the var from ledger\n\t\n\t\n\t\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + cID + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\t\n\tvar tempVal CIPS\n\tjson.Unmarshal(valAsbytes, &tempVal)\n\t\n\tfmt.Println(\"--------tempVal_before---------:\\n\", tempVal)\n\t\n\t\n\t//check if the input status valid\n\t\n\tif cStatus == \"confirmed\" && tempVal.ContractStatus != \"init\"{\n\t\treturn shim.Error(\"You can't modify the status!!!! The current status is NOT 'init'!!!\")\n\t}else if cStatus == \"cleared\" && tempVal.ContractStatus != \"confirmed\"{\n\t\treturn shim.Error(\"You can't modify the status!!!! The current status is NOT 'confirmed'!!!\")\n\t}else if cStatus == \"remitted\" && tempVal.ContractStatus != \"cleared\"{\n\t\treturn shim.Error(\"You can't modify the status!!!! The current status is NOT 'cleared'!!!\")\n\t}else if cStatus == \"received\" && tempVal.ContractStatus != \"remitted\"{\n\t\treturn shim.Error(\"You can't modify the status!!!! The current status is NOT 'remitted'!!!\")\n\t}else if cStatus == \"init\"{\n\t\treturn shim.Error(\"You can't modify the status to init!!!!\")\n\t}else if tempVal.ContractStatus == cStatus{\n\t\treturn shim.Error(\"The input status and the current status are same!!!! Please check your input status!!!\")\n\t}else {\n\t\tPingSIDIndexKey, err := stub.CreateCompositeKey(indexName, []string{tempVal.InstructingParty,tempVal.ContractStatus,tempVal.MessageIdentification})\n\t\tfmt.Println(\"-------------PingSIDIndexKey-------------: %s\\n\",PingSIDIndexKey)\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t\n\t\t// remove the Remittance that key is \"InstructingParty~ContractStatus~MessageIdentification\", because Contract status will be modified\n\t\tdelerr1 := stub.DelState(PingSIDIndexKey) //remove the key from chaincode state\n\t\tif delerr1 != nil {\n\t\t\treturn shim.Error(\"Failed to delete Remittance that key is InstructingParty~ContractStatus~MessageIdentification\")\n\t\t}\n\t\t\n\t\tPedSIDIndexKey, err := stub.CreateCompositeKey(indexName2, []string{tempVal.InstructedParty,tempVal.ContractStatus,tempVal.MessageIdentification})\n\t\tfmt.Println(\"-------------PedSIDIndexKey-------------: %s\\n\",PedSIDIndexKey)\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\n\t\t// remove the Remittance that key is \"InstructedParty~ContractStatus~MessageIdentification\", because Contract status will be modified\n\t\tdelerr2 := stub.DelState(PedSIDIndexKey) //remove the key from chaincode state\n\t\tif delerr2 != nil {\n\t\t\treturn shim.Error(\"Failed to delete Remittance that key is InstructedParty~ContractStatus~MessageIdentification\")\n\t\t}\n\t\t\n\t\n\t\tSIDIndexKey, err := stub.CreateCompositeKey(indexName3, []string{tempVal.ContractStatus,tempVal.MessageIdentification})\n\t\tfmt.Println(\"-------------SIDIndexKey-------------: %s\\n\",SIDIndexKey)\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\t\t\t\n\t\t\n\t\t// remove the Remittance that key is \"ContractStatus~MessageIdentification\", because Contract status will be modified\n\t\tdelerr3 := stub.DelState(SIDIndexKey) //remove the key from chaincode state\n\t\tif delerr3 != nil {\n\t\t\treturn shim.Error(\"Failed to delete Remittance that key is ContractStatus~MessageIdentification\")\n\t\t}\n\t\n\t\ttempVal.ContractStatus = cStatus\n\t\tfmt.Println(\"--------tempVal_after---------:\\n\", tempVal)\n\t}\n\t\n\t\n\t\n\t//change to array of bytes\n\ttempvalAsbytes, _ := json.Marshal(tempVal) //convert to array of bytes\n\t\n\t\n\terr = stub.PutState(cID, tempvalAsbytes) //store marble with MessageIdentification as key\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\t\n\t\n\t// CompositeKey: \"InstructingParty~ContractStatus~MessageIdentification\"\n\t// store CIPS with CompositeKey as key\n\tPingSIDIndexKey, err := stub.CreateCompositeKey(indexName, []string{tempVal.InstructingParty,tempVal.ContractStatus,tempVal.MessageIdentification})\n\tfmt.Println(\"-----modified--------PingSIDIndexKey-------------: %s\\n\",PingSIDIndexKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\t\n\t\n\n\tvar err1 error\n\terr1 = stub.PutState(PingSIDIndexKey,tempvalAsbytes)\n\tif err1 != nil {\n\t\treturn shim.Error(err1.Error())\n\t}\n\n // CompositeKey: \"InstructedParty~ContractStatus~MessageIdentification\"\n\t// store CIPS with CompositeKey as key \n\tPedSIDIndexKey, err := stub.CreateCompositeKey(indexName2, []string{tempVal.InstructedParty,tempVal.ContractStatus,tempVal.MessageIdentification})\n\tfmt.Println(\"-----modified--------PedSIDIndexKey-------------: %s\\n\",PedSIDIndexKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tvar err2 error\n\terr2 = stub.PutState(PedSIDIndexKey,tempvalAsbytes)\n\tif err2 != nil {\n\t\treturn shim.Error(err2.Error())\n\t}\n\t\n\t// CompositeKey: \"ContractStatus~MessageIdentification\"\n\t// store CIPS with CompositeKey as key \n\t\n\tSIDIndexKey, err := stub.CreateCompositeKey(indexName3, []string{tempVal.ContractStatus,tempVal.MessageIdentification})\n\tfmt.Println(\"-----modified--------SIDIndexKey-------------: %s\\n\",SIDIndexKey)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\t\n\tvar err3 error\n\terr3 = stub.PutState(SIDIndexKey,tempvalAsbytes)\n\tif err3 != nil {\n\t\treturn shim.Error(err3.Error())\n\t}\n\t\n\t//todo delete old key-value \"ContractStatus~MessageIdentification\" \n\t\n\t\n\tfmt.Println(\"- end modifyStatus\")\n\treturn shim.Success(tempvalAsbytes) //send it onward\n}", "title": "" }, { "docid": "9592070b5b82d8dc3c7d37bfd6f39726", "score": "0.58707917", "text": "func (s *EventDataStoreAlreadyExistsException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "eae4dd7dce18aa5e83f51e5f8b1e0acd", "score": "0.5869287", "text": "func (s *InvalidRecordingGroupException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "97e7e32775ade81622c2c3e02081a3d5", "score": "0.58688194", "text": "func RPCCode(code int) codes.Code {\n\tif code, ok := http2rpc[code]; ok {\n\t\treturn code\n\t}\n\n\tswitch {\n\tcase code >= 200 && code < 300:\n\t\treturn codes.OK\n\tcase code >= 400 && code < 500:\n\t\treturn codes.FailedPrecondition\n\tcase code >= 500 && code < 600:\n\t\treturn codes.Internal\n\t}\n\treturn codes.Unknown\n}", "title": "" }, { "docid": "e37d2f80d6241a54b0a7abf6af170041", "score": "0.58684075", "text": "func (s *OrganizationConformancePackTemplateValidationException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "f6111acf5d26fb5108daf80814c951c2", "score": "0.58672535", "text": "func (c Code) StatusCode() int {\n\tswitch c {\n\tcase ErrMustBePostRequest:\n\t\treturn http.StatusMethodNotAllowed\n\tcase ErrAccountIDMissing, ErrPKCECodeVerifierMissing, ErrPKCEAuthorizationCodeMissing:\n\t\treturn http.StatusBadRequest\n\tcase ErrPKCEAuthorizationFailed:\n\t\treturn http.StatusUnauthorized\n\tcase ErrOAuthUserInfoFailed, ErrMakingUserSession:\n\t\treturn http.StatusInternalServerError\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "f99af5b1980e098aca781a3c9ec659db", "score": "0.58670914", "text": "func parseStatus(result uint8) (status int) {\n\tswitch result {\n\tcase proto.OpOk:\n\t\tstatus = statusOK\n\tcase proto.OpExistErr:\n\t\tstatus = statusExist\n\tcase proto.OpNotExistErr:\n\t\tstatus = statusNoent\n\tcase proto.OpInodeFullErr:\n\t\tstatus = statusFull\n\tcase proto.OpAgain:\n\t\tstatus = statusAgain\n\tcase proto.OpArgMismatchErr:\n\t\tstatus = statusInval\n\tcase proto.OpNotPerm:\n\t\tstatus = statusNotPerm\n\tdefault:\n\t\tstatus = statusError\n\t}\n\treturn\n}", "title": "" }, { "docid": "def62da7999dd08e09022fe47a77f50d", "score": "0.5860741", "text": "func (s *InsufficientDependencyServiceAccessPermissionException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "94ec9e6083a45c0a59813c9b2e517492", "score": "0.5860421", "text": "func (o EventResponseMessageResponseOutput) StatusCode() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v EventResponseMessageResponse) *string { return v.StatusCode }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a9a4ada1128b257a218a45fb8d2e3b85", "score": "0.58603054", "text": "func (s *MaxConcurrentQueriesException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "214654272b6fcd007270eff4a3349629", "score": "0.58580416", "text": "func (s *PermissionVersionsLimitExceededException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "fea09b1630ce0ac309a822a62ba9e410", "score": "0.5857808", "text": "func getAppErrStatus(status HTTPCode, appErrors AppErrors) *APPHttpStatus {\n\tvar httpStatus = &APPHttpStatus{HTTPStatusCode: status}\n\tvar apiErrors []AppError\n\n\tapiErrors = appErrors.Errors\n\thttpStatus.Errors = apiErrors\n\tif status == HTTPStatusSuccessCode && len(apiErrors) == 0 {\n\t\thttpStatus.Success = true\n\t} else {\n\t\thttpStatus.Success = false\n\t}\n\n\treturn httpStatus\n}", "title": "" }, { "docid": "b5ad2eed81f461e8f0606c836618ac1f", "score": "0.5857616", "text": "func (s *InvalidRequestException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "b5ad2eed81f461e8f0606c836618ac1f", "score": "0.5857616", "text": "func (s *InvalidRequestException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "b5ad2eed81f461e8f0606c836618ac1f", "score": "0.5857616", "text": "func (s *InvalidRequestException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "bbf71536352ef8ee4c2eb5b74720eaff", "score": "0.58570427", "text": "func (r requestError) StatusCode() int {\n\treturn r.statusCode\n}", "title": "" }, { "docid": "8e97ba8057332955465b31a9d3103b4d", "score": "0.58561856", "text": "func err2code(err error) int {\n\treturn http1.StatusOK\n}", "title": "" }, { "docid": "afee45712572e7a7a97d7ce14ca94462", "score": "0.5855112", "text": "func (s *AccountRegisteredException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "e0972b352278280e9ed58b3fa62fbd40", "score": "0.5854414", "text": "func (s *InternalServiceErrorException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "4de7380bb9ab7cea0fbbe4645f9f2a62", "score": "0.5854397", "text": "func (s *NoRunningConfigurationRecorderException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "29351456c5a9649d345360368e39c653", "score": "0.58540773", "text": "func (s *ResourceShareInvitationAlreadyRejectedException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "958a3a1cf905dac2a15c69dddb50bb1d", "score": "0.58540344", "text": "func New(c rpc.Code) rpc.Status {\n\treturn rpc.Status{Code: int32(c)}\n}", "title": "" }, { "docid": "4457554ab77d90a09b75f7246f165d9a", "score": "0.5852945", "text": "func GetGrpcResponseStatusCode(response IResponse) string {\n\tif response != nil {\n\t\treturn strconv.Itoa(response.GetResultCode())\n\t} else {\n\t\treturn \"NA\"\n\t}\n}", "title": "" }, { "docid": "2536c98f56ddfef0a955c434c3426051", "score": "0.58523566", "text": "func (s *EventDataStoreHasOngoingImportException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" } ]
ac35dce57182617f7be5aede06b54a8a
Type returns type of the board (see 7.3.2).
[ { "docid": "f4369993f0b45412abca95ce329d8877", "score": "0.80278593", "text": "func (b *Baseboard) Type() BaseboardType {\n\treturn BaseboardType(b.byte(0x0d))\n}", "title": "" } ]
[ { "docid": "e5cd4aecc75a5043633ce626953cadd1", "score": "0.68383926", "text": "func (t *Machine) Type() byte {\n\treturn 0x17\n}", "title": "" }, { "docid": "1f05ed0d9fbb891cdeccd98d013036be", "score": "0.6690122", "text": "func (p Piece) Type() PieceType {\n\tswitch p {\n\tcase WhiteKing, BlackKing:\n\t\treturn King\n\tcase WhiteQueen, BlackQueen:\n\t\treturn Queen\n\tcase WhiteRook, BlackRook:\n\t\treturn Rook\n\tcase WhiteBishop, BlackBishop:\n\t\treturn Bishop\n\tcase WhiteKnight, BlackKnight:\n\t\treturn Knight\n\tcase WhitePawn, BlackPawn:\n\t\treturn Pawn\n\t}\n\treturn NoPieceType\n}", "title": "" }, { "docid": "f60b82edf03120425d6c1ad4c42311b6", "score": "0.66459936", "text": "func (t *Team) Type() byte {\n\treturn 0x0f\n}", "title": "" }, { "docid": "a07ac1dc2e700ec97bfeada0efd8e586", "score": "0.6557796", "text": "func toBoardTypeEnum(v *BoardType) string {\n\tif v == nil {\n\t\treturn toBoardTypePointer(0).String()\n\t}\n\treturn v.String()\n}", "title": "" }, { "docid": "b569a7a9f8d88c056c2d347beb7d25cb", "score": "0.64969313", "text": "func (addr *Addr) Type() byte {\n\treturn addr[0] >> 5\n}", "title": "" }, { "docid": "7c99c9a184937cc3fa126840c9bdce77", "score": "0.6495905", "text": "func (t *Table) Type(row, col int) int {\n\tif row >= len(t.Row) || col >= len(t.ColDefs) {\n\t\treturn 0\n\t}\n\treturn t.Row[row].Col[col].Type\n}", "title": "" }, { "docid": "8ab430a6a0805f77702037db52ce81f0", "score": "0.64534694", "text": "func (f Frame) Type() byte {\n\treturn f[FrameOffsetType]\n}", "title": "" }, { "docid": "65770b04f8b4186ee9318429fd1fe972", "score": "0.6418065", "text": "func (t *Tile) Type() string {\n\treturn interfaces.UnincorporatedOwner\n}", "title": "" }, { "docid": "00829e68a870f9ad298ce610d44550a2", "score": "0.635378", "text": "func (tileImpl *TileImpl) Type() string {\n\treturn tileImpl.typeImpl\n}", "title": "" }, { "docid": "3c606dc6628b00a062e5963652c536dd", "score": "0.6343961", "text": "func (a *Uint8Column) Type() int8 { return a.typE }", "title": "" }, { "docid": "385e37497eabd473df651481a241d357", "score": "0.63314736", "text": "func (t *Membership) Type() byte {\n\treturn 0x0e\n}", "title": "" }, { "docid": "68f8a3b111c22dfe964ed7b3b89a250b", "score": "0.6298384", "text": "func (o *Cell) Type() *Type {\n\treturn CellType\n}", "title": "" }, { "docid": "1b7da51bad1354dcb0e5291cc91c857f", "score": "0.6280688", "text": "func (o *Registry) Type() string {\n\tif o != nil && o.bitmap_&512 != 0 {\n\t\treturn o.type_\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "98f0b51164d16aac4ec3a44b1c06bef1", "score": "0.62530494", "text": "func (v BoardType) String() string {\n\tswitch int32(v) {\n\tcase 0:\n\t\treturn \"SCRUM\"\n\tcase 1:\n\t\treturn \"KANBAN\"\n\tcase 2:\n\t\treturn \"OTHER\"\n\t}\n\treturn \"unset\"\n}", "title": "" }, { "docid": "3a78483f999e2f7d35ac84c289573545", "score": "0.6249468", "text": "func (c *Cell) Type() types.CellType {\n\treturn c.ml.Type\n}", "title": "" }, { "docid": "518bb495484aa989ecb41529b396bf8f", "score": "0.6228142", "text": "func (m msg) Type() byte {\n\tvar b byte\n\tif len(m) > 0 {\n\t\tb = m[0]\n\t}\n\treturn b\n}", "title": "" }, { "docid": "f36f92a866fe5c35f3554be7d0c7e144", "score": "0.6227043", "text": "func (a *Uint32Column) Type() int8 { return a.typE }", "title": "" }, { "docid": "ebd3b932ebe361e7c43cb9ca7b18f83d", "score": "0.6216539", "text": "func (a *Int8Column) Type() int8 { return a.typE }", "title": "" }, { "docid": "42541e1d81d6b7b725bd709b3e2f3829", "score": "0.61794955", "text": "func (this *Ntile) Type() value.Type { return value.NUMBER }", "title": "" }, { "docid": "6b47f58d7d944fe53a51a71aa96efa5a", "score": "0.61079335", "text": "func (fr *Frame) Type() uint8 {\n\treturn fr.kind\n}", "title": "" }, { "docid": "0b3aa363aa356359c8226d25bcdf43de", "score": "0.60916543", "text": "func (c *Connect) Type() uint8 {\n\treturn TypeOfConnect\n}", "title": "" }, { "docid": "fa4465ae4e5e5453c25bc7615880e911", "score": "0.60733247", "text": "func (a *Uint8FullColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "c22c4ade02b85a7d8633e8682b86c42a", "score": "0.6065705", "text": "func (col *Column) Type() reflect.Type {\n\treturn col.typ\n}", "title": "" }, { "docid": "abf6055caf0ded1f66b712615ef6bd25", "score": "0.60448796", "text": "func (c *Column) Type() reflect.Type {\n\treturn c.column.Type().Elem()\n}", "title": "" }, { "docid": "c409fbd030753ce30beae22787346b3f", "score": "0.6043643", "text": "func (a *Int8FullColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "78a97f2388b12409b8274022e3be2cfc", "score": "0.60305834", "text": "func (a *Int32Column) Type() int8 { return a.typE }", "title": "" }, { "docid": "c1fabdd3e4f9f970bf7322d18a5adff1", "score": "0.6005902", "text": "func (t *Project) Type() byte {\n\treturn 0x04\n}", "title": "" }, { "docid": "e50750d6f87a005860cb100418464c13", "score": "0.5991716", "text": "func (n Screen) GetType() string {\n\treturn \"new_screen\"\n}", "title": "" }, { "docid": "050e0a64927c17d9ef2d7ec346b14d59", "score": "0.59913605", "text": "func (c *ColumnNode) Type() Type {\n\treturn Column\n}", "title": "" }, { "docid": "9316e59604a90b609c9737aedc627fd2", "score": "0.59701145", "text": "func (sh Shellcoin) Type() string {\n\treturn Type\n}", "title": "" }, { "docid": "33d9257ad3cef8d2cb71d91cad487257", "score": "0.5968993", "text": "func (s *Switch) Type() Type { return Type(s.typ) }", "title": "" }, { "docid": "66a6127d4149d30106450ec6fdd9dcf0", "score": "0.5963834", "text": "func (o *Zebra) GetType() string {\n\tif o == nil || IsNil(o.Type) {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Type\n}", "title": "" }, { "docid": "6ea20772a8de8315681a2d0c5576637b", "score": "0.5957878", "text": "func (s *Schema) Type() (*zed.TypeRecord, error) {\n\treturn s.zctx.LookupTypeRecord(s.cols)\n}", "title": "" }, { "docid": "780b1bef642c660b516eb127d5c6a0e1", "score": "0.59562397", "text": "func (a *Uint32FullColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "f02fa32cda70fafb201d507f1f8459ab", "score": "0.5953904", "text": "func (a *Uint16Column) Type() int8 { return a.typE }", "title": "" }, { "docid": "81479df368c00b6da5affc4b7c5d1cef", "score": "0.594689", "text": "func Type() (typa string) {\n\treturn new().Type()\n}", "title": "" }, { "docid": "32513532f29bee2a3b22f3593f1f8ee4", "score": "0.594437", "text": "func (nn *NonNull) Type() string {\n\treturn fmt.Sprintf(\"%s!\", nn.OfType.Type())\n}", "title": "" }, { "docid": "0bb065ea4597e318fd11dd2adc37dced", "score": "0.59309906", "text": "func (s PortType) Type() string {\n\tswitch s & 0x1f {\n\tcase 0:\n\t\treturn \"DMX512\"\n\tcase 1:\n\t\treturn \"MIDI\"\n\tcase 2:\n\t\treturn \"Avab\"\n\tcase 3:\n\t\treturn \"Colortran CMX\"\n\tcase 4:\n\t\treturn \"ADB 62.5\"\n\tcase 5:\n\t\treturn \"Art-Net\"\n\t}\n\treturn \"unknown\"\n}", "title": "" }, { "docid": "c3bee70f95810597a70d33128b8e4866", "score": "0.59287363", "text": "func (this *Magtek) Type() (string) {\n\treturn reflect.TypeOf(this).String()\n}", "title": "" }, { "docid": "0731fb7f0ac06d2c7c97b739c594ca50", "score": "0.5927281", "text": "func (m ManagementSSH) Type() string {\n\treturn m.TypeID\n}", "title": "" }, { "docid": "b5acedae47604153e4fc6ca410e5f7e3", "score": "0.59248596", "text": "func (a *Float32Column) Type() int8 { return a.typE }", "title": "" }, { "docid": "7c8746c31e15c50f91c467161e1668bc", "score": "0.59215486", "text": "func (p Piece) TypeOf() PieceType {\n\treturn PieceType(p & 7)\n}", "title": "" }, { "docid": "3ae814a5916c12f5a10cb3d30cc1e801", "score": "0.5904106", "text": "func (GameOver) Type() string {\n\treturn GameOverType\n}", "title": "" }, { "docid": "e27cea604ea4bd882b27cc313a402cda", "score": "0.5903696", "text": "func (m *messageReader) Type() uint8 {\n\treturn m.mType\n}", "title": "" }, { "docid": "f3ee46cdb5f9d0e9ea04c635e367f320", "score": "0.5880458", "text": "func (o *Registry) GetType() (value string, ok bool) {\n\tok = o != nil && o.bitmap_&512 != 0\n\tif ok {\n\t\tvalue = o.type_\n\t}\n\treturn\n}", "title": "" }, { "docid": "5ee5f218e93a6ac6e24fb38ec313785f", "score": "0.5878595", "text": "func (a *Int32FullColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "469d18273f6e5aff7c5178d0c886e6e8", "score": "0.58717", "text": "func (b *SchmBox) Type() string {\n\treturn \"schm\"\n}", "title": "" }, { "docid": "c461d5a1649dfc36241bc31175ce25f9", "score": "0.5863147", "text": "func (ci *Column[T]) Type() reflect.Type {\n\treturn ci.columnType\n}", "title": "" }, { "docid": "e828106117f79f03e59ac3be30631d71", "score": "0.5861789", "text": "func (a *Int16Column) Type() int8 { return a.typE }", "title": "" }, { "docid": "0cf236929c05aabf0081d4b79e89edbd", "score": "0.5853659", "text": "func (inst *InstFPToUI) Type() types.Type {\n\treturn inst.To\n}", "title": "" }, { "docid": "0cf236929c05aabf0081d4b79e89edbd", "score": "0.5853659", "text": "func (inst *InstFPToUI) Type() types.Type {\n\treturn inst.To\n}", "title": "" }, { "docid": "0cf236929c05aabf0081d4b79e89edbd", "score": "0.5853659", "text": "func (inst *InstFPToUI) Type() types.Type {\n\treturn inst.To\n}", "title": "" }, { "docid": "5206ef6da82a228e4144bd9238e2d1d4", "score": "0.5847975", "text": "func (g GameWorld) Type() string {\n\treturn \"GameWorld\"\n}", "title": "" }, { "docid": "ae4d6c855daa76f4a9c2bfd483586f30", "score": "0.5846201", "text": "func (h *HeatmapDefinition) GetType() string {\n\tif h == nil || h.Type == nil {\n\t\treturn \"\"\n\t}\n\treturn *h.Type\n}", "title": "" }, { "docid": "9c9e276ca7e012dc60df46e42608617f", "score": "0.5842882", "text": "func (s *Record) Type() string {\n\treturn string(s.b[:2])\n}", "title": "" }, { "docid": "4bcf60d1ce413e069c4926459ad5f877", "score": "0.5832875", "text": "func (a *BoolColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "fd12b5ad919d18c2209550630277ef67", "score": "0.5820345", "text": "func (a *Uint64Column) Type() int8 { return a.typE }", "title": "" }, { "docid": "d04ac5854eefe6b067f9c00eb4252b1b", "score": "0.58183783", "text": "func (d *NumeralDie) Type() string {\r\n\treturn fmt.Sprintf(\"d%d\", d.Faces)\r\n}", "title": "" }, { "docid": "de98e398418e7dce88e6efa66fda3d64", "score": "0.5813608", "text": "func (h Host) Type() HostAddrType {\n\treturn h.t\n}", "title": "" }, { "docid": "7473f698b6d24f073287908b56daeda3", "score": "0.58036786", "text": "func (t *MachineToken) Type() byte {\n\treturn 0x18\n}", "title": "" }, { "docid": "7344f713ba9f99dc922500baba7c5702", "score": "0.5792755", "text": "func (a *Int16FullColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "3a8e0108cf487a10b1b15b902c8c66fb", "score": "0.57918847", "text": "func (g *Game) Type() string {\n\treturn g.sceneName\n}", "title": "" }, { "docid": "c4190aaedf426feaeb85be3d961513ef", "score": "0.57868034", "text": "func (p EthFrame) Type() uint16 {\n\treturn binary.BigEndian.Uint16(p[12:14])\n}", "title": "" }, { "docid": "07c0b009301467aa612b2d1200de8613", "score": "0.57848233", "text": "func (rt RunType) Type() string {\n\treturn runType\n}", "title": "" }, { "docid": "1f5f5a101a74b2477be33c0102c03ad4", "score": "0.57826126", "text": "func (n *Node) Type() reflect.Type {\n\treturn reflect.TypeOf(n.This()).Elem()\n}", "title": "" }, { "docid": "8e41ca5378f7cc6682b5e76a6cd0cbb5", "score": "0.57786536", "text": "func (a *StringColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "1077aad0dcc38d9b43f35ed100201a0f", "score": "0.5772103", "text": "func (b *Branch) Type() int {\n\treturn BranchType\n}", "title": "" }, { "docid": "17bdc06923e066122dd44742586e4fec", "score": "0.5762792", "text": "func (_this *SVGFEColorMatrixElement) Type() *svg.SVGAnimatedEnumeration {\n\tvar ret *svg.SVGAnimatedEnumeration\n\tvalue := _this.Value_JS.Get(\"type\")\n\tret = svg.SVGAnimatedEnumerationFromJS(value)\n\treturn ret\n}", "title": "" }, { "docid": "4bad22c91accd7317b1782986ef5c32a", "score": "0.5757956", "text": "func (e *ExprShuffleVector) Type() types.Type {\n\treturn e.Mask.Type()\n}", "title": "" }, { "docid": "0d13c2f71c046b9a2e83594e0022cb3d", "score": "0.5749751", "text": "func (b *base) Type() (byte, error) {\n\treturn b.fixedHeader.ptype()\n}", "title": "" }, { "docid": "241b8bf4da62d8159e1e2f523f2e064d", "score": "0.57373405", "text": "func (a *Uint16FullColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "2ad991b21117511ffd3d444c4acedfda", "score": "0.57311106", "text": "func (c ColRawOf[X]) Type() ColumnType {\n\treturn ColumnTypeFixedString.With(strconv.Itoa(c.Size()))\n}", "title": "" }, { "docid": "8398ed87a51b8dddd236b004986109ac", "score": "0.5728613", "text": "func (t *Org) Type() byte {\n\treturn 0x0d\n}", "title": "" }, { "docid": "42c3b06e6ee2741908da86b080e234e7", "score": "0.5728612", "text": "func (c *SquarePrimitive) Type() T { return SquarePrimitiveT }", "title": "" }, { "docid": "7a45df9a4c2a52fc6a07ab5a98e5a47a", "score": "0.5726257", "text": "func (t *Environment) Type() byte {\n\treturn 0x05\n}", "title": "" }, { "docid": "7a9d17086ec1bc357ccd0230a150d252", "score": "0.57231784", "text": "func (e *Error) Type() uint8 { return e.tp }", "title": "" }, { "docid": "22292f1492f863454d3f41d4d0be7cee", "score": "0.5722759", "text": "func (inst *InstUIToFP) Type() types.Type {\n\treturn inst.To\n}", "title": "" }, { "docid": "22292f1492f863454d3f41d4d0be7cee", "score": "0.5722759", "text": "func (inst *InstUIToFP) Type() types.Type {\n\treturn inst.To\n}", "title": "" }, { "docid": "22292f1492f863454d3f41d4d0be7cee", "score": "0.5722759", "text": "func (inst *InstUIToFP) Type() types.Type {\n\treturn inst.To\n}", "title": "" }, { "docid": "c7374aafd6cfe80605b6c432771edc72", "score": "0.5722729", "text": "func (m ManagementTelnet) Type() string {\n\treturn m.TypeID\n}", "title": "" }, { "docid": "087808786fbe10d3a6b5e0449ba02a4a", "score": "0.57223254", "text": "func (c *Undef) Type() types.Type {\n\treturn c.Typ\n}", "title": "" }, { "docid": "82188a54a95f3ee15818c9d432812aa4", "score": "0.57201135", "text": "func (o *NetworkSupervisorCardAllOf) GetType() string {\n\tif o == nil || o.Type == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Type\n}", "title": "" }, { "docid": "8830c4725272e4650ea8d62a5c90dbe0", "score": "0.57131433", "text": "func (t TsColumnInfo) Type() TsColumnType {\n\treturn t.kind\n}", "title": "" }, { "docid": "d98a46a7942f4b25a761cd117e04af69", "score": "0.5712697", "text": "func (a *Float32FullColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "8cb654351f9bb4f14c6c3525213d3f19", "score": "0.57093006", "text": "func (strct Struct) Type() string {\n\treturn reflect.TypeOf(strct).Name()\n}", "title": "" }, { "docid": "278af23afcdce0a6a993992dfb89dcb1", "score": "0.5701068", "text": "func (r RTCPBye) Type() RTCPType {\n\treturn r.Hdr.Type\n}", "title": "" }, { "docid": "2cec01c911a2f37188bc365aa570792b", "score": "0.5697172", "text": "func (Checker) Type() string {\n\treturn Type\n}", "title": "" }, { "docid": "2cec01c911a2f37188bc365aa570792b", "score": "0.5697172", "text": "func (Checker) Type() string {\n\treturn Type\n}", "title": "" }, { "docid": "04a4ca795e42c08146d79378eb0c821a", "score": "0.569678", "text": "func (h *HelloElemVersionBitmap) Type() HelloElemType {\n\treturn HelloElemTypeVersionBitmap\n}", "title": "" }, { "docid": "b6b3b9a92339cf1eb9595980d63312e4", "score": "0.5693652", "text": "func (o *EquipmentSwitchCard) GetType() string {\n\tif o == nil || o.Type == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Type\n}", "title": "" }, { "docid": "13b3b3f1202397a7ab17bcc3bd108a6a", "score": "0.5692526", "text": "func Type(msg proto.Message) uint16 {\n\treturn uint16(MessageType_value[\"MessageType_\"+reflect.TypeOf(msg).Elem().Name()])\n}", "title": "" }, { "docid": "c57a31477419354dfbe8005d34d5980b", "score": "0.5686762", "text": "func (c Chord) Type() chordtype.Type {\n\treturn c.chordType\n}", "title": "" }, { "docid": "fb1d82a0b497eb7cf3e16afc04657bfc", "score": "0.5684949", "text": "func (n *Node) Type() Type {\n\treturn Type(strings.ToLower(reflect.TypeOf(n.Config).Elem().Name()))\n}", "title": "" }, { "docid": "2ac2ff85da98d2441dfed93597d1670f", "score": "0.5684897", "text": "func (c *CubeCamera) Type() string {\n\treturn c.p.Get(\"type\").String()\n}", "title": "" }, { "docid": "21e78e61f8ddd58e5d1a5f601d2fc7f9", "score": "0.56799084", "text": "func (push *pushSocket) Type() SocketType {\n\treturn push.sck.Type()\n}", "title": "" }, { "docid": "be4beb0ed545b53bf9acb94f660656b3", "score": "0.56778306", "text": "func (a *BoolFullColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "bf1a8e5f21ced48a5b458c40a4555e1c", "score": "0.5675117", "text": "func (m Ready) Type() uint64 {\r\n\treturn MessageTypeReady\r\n}", "title": "" }, { "docid": "6b0583d7a673add50beec7bbab3214ea", "score": "0.56704825", "text": "func (d *Disconnect) Type() uint8 {\n\treturn TypeOfDisconnect\n}", "title": "" }, { "docid": "e17f6006d137dc6d3c5123d334054ac0", "score": "0.56648356", "text": "func (s *Stmt) colType(i C.int) byte {\n\tif len(s.colTypes) == 0 {\n\t\tn := s.nCols\n\t\tif cap(s.colTypes) < n {\n\t\t\ts.colTypes = make([]uint8, n)\n\t\t} else {\n\t\t\ts.colTypes = s.colTypes[:n]\n\t\t}\n\t\tC.column_types(s.stmt, (*C.uchar)(cBytes(s.colTypes)), C.int(n))\n\t}\n\treturn s.colTypes[i]\n}", "title": "" }, { "docid": "8d018a09e42b240617775baea33e2201", "score": "0.5664156", "text": "func (ColInt8) Type() ColumnType {\n\treturn ColumnTypeInt8\n}", "title": "" } ]
9f3e03c295602bff712b48ba5f940311
List all devtest templates, they will be used for e2e tests for the UI components
[ { "docid": "bf416c1968a6850f4fedf80842177c24", "score": "0.7152886", "text": "func List(ctx *context.Context) {\n\ttemplateNames, err := templates.AssetFS().ListFiles(\"devtest\", true)\n\tif err != nil {\n\t\tctx.ServerError(\"AssetFS().ListFiles\", err)\n\t\treturn\n\t}\n\tvar subNames []string\n\tfor _, tmplName := range templateNames {\n\t\tsubName := strings.TrimSuffix(tmplName, \".tmpl\")\n\t\tif subName != \"list\" {\n\t\t\tsubNames = append(subNames, subName)\n\t\t}\n\t}\n\tctx.Data[\"SubNames\"] = subNames\n\tctx.HTML(http.StatusOK, \"devtest/list\")\n}", "title": "" } ]
[ { "docid": "523a3f42d8ffb174f622595e79851e53", "score": "0.76669717", "text": "func List(ctx *context.Context) {\n\ttemplateNames := templates.GetTemplateAssetNames()\n\tvar subNames []string\n\tconst prefix = \"templates/devtest/\"\n\tfor _, tmplName := range templateNames {\n\t\tif strings.HasPrefix(tmplName, prefix) {\n\t\t\tsubName := strings.TrimSuffix(strings.TrimPrefix(tmplName, prefix), \".tmpl\")\n\t\t\tif subName != \"list\" {\n\t\t\t\tsubNames = append(subNames, subName)\n\t\t\t}\n\t\t}\n\t}\n\tctx.Data[\"SubNames\"] = subNames\n\tctx.HTML(http.StatusOK, \"devtest/list\")\n}", "title": "" }, { "docid": "419554147906d172f59f9b9e0f26d759", "score": "0.6001507", "text": "func TestAvailableTemplates(t *testing.T) {\n\ttmpl := Must(New(\"tmpl\").Parse(`{{template \"tmpl\" .}}`))\n\tav := tmpl.AvailableTemplates()\n\t// fmt.Printf(\"PJS1 - %s\\n\", av)\n\twant := []string{\"tmpl\"}\n\tif len(av) != len(want) {\n\t\tt.Errorf(\"got %d; want %d -- unexpected number of templates returned\", len(av), len(want))\n\t} else {\n\t\tfor i := 0; i < len(av); i++ {\n\t\t\tif av[i] != want[i] {\n\t\t\t\tt.Errorf(\"got %q; want %q\", av[i], want[i])\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a48c25738d75f9bb5909d219e7bec9f8", "score": "0.5756627", "text": "func GetTemplates() map[string]map[string]string {\n\tvar templates = make(map[string]map[string]string)\n\ttemplates[\"app\"] = map[string]string{\n\t\t\"node14-adonis.yml\": `services:\n app:\n image: kooldev/node:14-adonis\n command: [\"adonis\", \"serve\", \"--dev\"]\n ports:\n - \"${KOOL_APP_PORT:-3333}:3333\"\n environment:\n ASUSER: \"${KOOL_ASUSER:-0}\"\n UID: \"${UID:-0}\"\n volumes:\n - .:/app:delegated\n networks:\n - kool_local\n - kool_global\n`,\n\t\t\"node14-nestjs.yml\": `services:\n app:\n image: kooldev/node:14-nest\n command: [\"npm\", \"run\", \"start:dev\"]\n ports:\n - \"${KOOL_APP_PORT:-3000}:3000\"\n environment:\n ASUSER: \"${KOOL_ASUSER:-0}\"\n UID: \"${UID:-0}\"\n volumes:\n - .:/app:delegated\n networks:\n - kool_local\n - kool_global\n`,\n\t\t\"php74.yml\": `services:\n app:\n image: kooldev/php:7.4-nginx\n ports:\n - \"${KOOL_APP_PORT:-80}:80\"\n environment:\n ASUSER: \"${KOOL_ASUSER:-0}\"\n UID: \"${UID:-0}\"\n volumes:\n - .:/app:delegated\n networks:\n - kool_local\n - kool_global\n`,\n\t\t\"php8.yml\": `services:\n app:\n image: kooldev/php:8.0-nginx\n ports:\n - \"${KOOL_APP_PORT:-80}:80\"\n environment:\n ASUSER: \"${KOOL_ASUSER:-0}\"\n UID: \"${UID:-0}\"\n volumes:\n - .:/app:delegated\n networks:\n - kool_local\n - kool_global\n`,\n\t\t\"wordpress74.yml\": `services:\n app:\n image: kooldev/wordpress:7.4-nginx\n ports:\n - \"${KOOL_APP_PORT:-80}:80\"\n environment:\n ASUSER: \"${KOOL_ASUSER:-0}\"\n UID: \"${UID:-0}\"\n volumes:\n - .:/app:delegated\n networks:\n - kool_local\n - kool_global\n`,\n\t\t\"wordpress80.yml\": `services:\n app:\n image: kooldev/wordpress:8.0-nginx\n ports:\n - \"${KOOL_APP_PORT:-80}:80\"\n environment:\n ASUSER: \"${KOOL_ASUSER:-0}\"\n UID: \"${UID:-0}\"\n volumes:\n - .:/app:delegated\n networks:\n - kool_local\n - kool_global\n`,\n\t}\n\ttemplates[\"cache\"] = map[string]string{\n\t\t\"memcached16.yml\": `services:\n cache:\n image: memcached:1.6-alpine\n volumes:\n - cache:/data:delegated\n networks:\n - kool_local\n\nvolumes:\n cache:\n`,\n\t\t\"redis6.yml\": `services:\n cache:\n image: redis:6-alpine\n volumes:\n - cache:/data:delegated\n networks:\n - kool_local\n healthcheck:\n test: [\"CMD\", \"redis-cli\", \"ping\"]\n\nvolumes:\n cache:\n`,\n\t}\n\ttemplates[\"database\"] = map[string]string{\n\t\t\"mariadb105.yml\": `services:\n database:\n image: mariadb:10.5\n ports:\n - ${KOOL_DATABASE_PORT:-3306}:3306\n environment:\n MARIADB_ROOT_PASSWORD: ${DB_PASSWORD-rootpass}\n MARIADB_DATABASE: ${DB_DATABASE-database}\n MARIADB_USER: ${DB_USERNAME-user}\n MARIADB_PASSWORD: ${DB_PASSWORD-pass}\n MARIADB_ALLOW_EMPTY_PASSWORD: \"yes\"\n volumes:\n - database:/var/lib/mysql:delegated\n networks:\n - kool_local\n healthcheck:\n test: mysqladmin -p${DB_PASSWORD-pass} ping\n\nvolumes:\n database:\n\nscripts:\n maria: kool exec -e MYSQL_PWD=$DB_PASSWORD database mariadb -u $DB_USERNAME $DB_DATABASE\n`,\n\t\t\"mysql57-adonis.yml\": `services:\n database:\n image: mysql:5.7\n ports:\n - \"${KOOL_DATABASE_PORT:-3306}:3306\"\n environment:\n MYSQL_ROOT_PASSWORD: \"${DB_PASSWORD-rootpass}\"\n MYSQL_DATABASE: \"${DB_DATABASE-database}\"\n MYSQL_USER: \"${DB_USER-user}\"\n MYSQL_PASSWORD: \"${DB_PASSWORD-pass}\"\n MYSQL_ALLOW_EMPTY_PASSWORD: \"yes\"\n volumes:\n - database:/var/lib/mysql:delegated\n networks:\n - kool_local\n healthcheck:\n test: [\"CMD\", \"mysqladmin\", \"ping\"]\n\nvolumes:\n database:\n\nscripts:\n mysql: kool exec -e MYSQL_PWD=$DB_PASSWORD database mysql -u $DB_USER $DB_DATABASE\n`,\n\t\t\"mysql57.yml\": `services:\n database:\n image: mysql:5.7\n ports:\n - \"${KOOL_DATABASE_PORT:-3306}:3306\"\n environment:\n MYSQL_ROOT_PASSWORD: \"${DB_PASSWORD-rootpass}\"\n MYSQL_DATABASE: \"${DB_DATABASE-database}\"\n MYSQL_USER: \"${DB_USERNAME-user}\"\n MYSQL_PASSWORD: \"${DB_PASSWORD-pass}\"\n MYSQL_ALLOW_EMPTY_PASSWORD: \"yes\"\n volumes:\n - database:/var/lib/mysql:delegated\n networks:\n - kool_local\n healthcheck:\n test: [\"CMD\", \"mysqladmin\", \"ping\"]\n\nvolumes:\n database:\n\nscripts:\n mysql: kool exec -e MYSQL_PWD=$DB_PASSWORD database mysql -u $DB_USERNAME $DB_DATABASE\n`,\n\t\t\"mysql8-adonis.yml\": `services:\n database:\n image: mysql:8.0\n command: --default-authentication-plugin=mysql_native_password\n ports:\n - \"${KOOL_DATABASE_PORT:-3306}:3306\"\n environment:\n MYSQL_ROOT_PASSWORD: \"${DB_PASSWORD-rootpass}\"\n MYSQL_DATABASE: \"${DB_DATABASE-database}\"\n MYSQL_USER: \"${DB_USER-user}\"\n MYSQL_PASSWORD: \"${DB_PASSWORD-pass}\"\n MYSQL_ALLOW_EMPTY_PASSWORD: \"yes\"\n volumes:\n - database:/var/lib/mysql:delegated\n networks:\n - kool_local\n healthcheck:\n test: [\"CMD\", \"mysqladmin\", \"ping\"]\n\nvolumes:\n database:\n\nscripts:\n mysql: kool exec -e MYSQL_PWD=$DB_PASSWORD database mysql -u $DB_USER $DB_DATABASE\n`,\n\t\t\"mysql8.yml\": `services:\n database:\n image: mysql:8.0\n command: --default-authentication-plugin=mysql_native_password\n ports:\n - \"${KOOL_DATABASE_PORT:-3306}:3306\"\n environment:\n MYSQL_ROOT_PASSWORD: \"${DB_PASSWORD-rootpass}\"\n MYSQL_DATABASE: \"${DB_DATABASE-database}\"\n MYSQL_USER: \"${DB_USERNAME-user}\"\n MYSQL_PASSWORD: \"${DB_PASSWORD-pass}\"\n MYSQL_ALLOW_EMPTY_PASSWORD: \"yes\"\n volumes:\n - database:/var/lib/mysql:delegated\n networks:\n - kool_local\n healthcheck:\n test: [\"CMD\", \"mysqladmin\", \"ping\"]\n\nvolumes:\n database:\n\nscripts:\n mysql: kool exec -e MYSQL_PWD=$DB_PASSWORD database mysql -u $DB_USERNAME $DB_DATABASE\n`,\n\t\t\"postgresql13-adonis.yml\": `services:\n database:\n image: postgres:13-alpine\n ports:\n - \"${KOOL_DATABASE_PORT:-5432}:5432\"\n environment:\n POSTGRES_DB: \"${DB_DATABASE-database}\"\n POSTGRES_USER: \"${DB_USER-user}\"\n POSTGRES_PASSWORD: \"${DB_PASSWORD-pass}\"\n POSTGRES_HOST_AUTH_METHOD: \"trust\"\n volumes:\n - database:/var/lib/postgresql/data:delegated\n networks:\n - kool_local\n healthcheck:\n test: [\"CMD\", \"pg_isready\", \"-q\", \"-d\", \"$DB_DATABASE\", \"-U\", \"$DB_USER\"]\n\nvolumes:\n database:\n\nscripts:\n psql: kool exec -e PGPASSWORD=$DB_PASSWORD database psql -U $DB_USER $DB_DATABASE\n`,\n\t\t\"postgresql13.yml\": `services:\n database:\n image: postgres:13-alpine\n ports:\n - \"${KOOL_DATABASE_PORT:-5432}:5432\"\n environment:\n POSTGRES_DB: \"${DB_DATABASE-database}\"\n POSTGRES_USER: \"${DB_USERNAME-user}\"\n POSTGRES_PASSWORD: \"${DB_PASSWORD-pass}\"\n POSTGRES_HOST_AUTH_METHOD: \"trust\"\n volumes:\n - database:/var/lib/postgresql/data:delegated\n networks:\n - kool_local\n healthcheck:\n test: [\"CMD\", \"pg_isready\", \"-q\", \"-d\", \"$DB_DATABASE\", \"-U\", \"$DB_USERNAME\"]\n\nvolumes:\n database:\n\nscripts:\n psql: kool exec -e PGPASSWORD=$DB_PASSWORD database psql -U $DB_USERNAME $DB_DATABASE\n`,\n\t}\n\ttemplates[\"scripts\"] = map[string]string{\n\t\t\"laravel.yml\": `scripts:\n composer: kool exec app composer\n artisan: kool exec app php artisan\n phpunit: kool exec app php ./bin/phpunit\n\n setup:\n - cp .env.example .env\n - kool start\n - kool run composer install\n - kool run artisan key:generate\n - kool run node-setup\n\n reset:\n - kool run composer install\n - kool run artisan migrate:fresh --seed\n - kool run node-setup\n`,\n\t\t\"npm-adonis.yml\": `scripts:\n adonis: kool exec app adonis\n npm: kool exec app npm\n npx: kool exec app npx\n\n setup:\n - kool docker kooldev/node:14 npm install\n - kool start\n`,\n\t\t\"npm-nestjs.yml\": `scripts:\n nest: kool exec app nest\n npm: kool exec app npm\n npx: kool exec app npx\n\n setup:\n - kool docker kooldev/node:14 npm install\n - kool start\n`,\n\t\t\"npm-nextjs.yml\": `scripts:\n npm: kool exec app npm\n npx: kool exec app npx\n\n setup:\n - kool docker kooldev/node:14 npm install\n - kool start\n`,\n\t\t\"npm-nodejs.yml\": `scripts:\n node: kool exec app node\n npm: kool exec app npm\n npx: kool exec app npx\n\n setup:\n - kool start\n # - add more setup commands\n`,\n\t\t\"npm-nuxtjs.yml\": `scripts:\n npm: kool exec app npm\n npx: kool exec app npx\n\n setup:\n - kool docker kooldev/node:14 npm install\n - kool start\n`,\n\t\t\"npm.yml\": `scripts:\n npm: kool docker kooldev/node:14 npm\n npx: kool docker kooldev/node:14 npx\n node-setup:\n - kool run npm install\n - kool run npm run dev\n`,\n\t\t\"php.yml\": `scripts:\n php: kool exec app php\n\n setup:\n - kool start\n # - add more setup commands\n`,\n\t\t\"symfony.yml\": `scripts:\n composer: kool exec app composer\n console: kool exec app php ./bin/console\n phpunit: kool exec app php ./bin/phpunit\n\n setup:\n - kool start\n - kool run composer install\n #- kool run console doctrine:migrations:migrate -n\n`,\n\t\t\"wordpress.yml\": `scripts:\n php: kool exec app php\n wp: kool exec app wp\n`,\n\t\t\"yarn-adonis.yml\": `scripts:\n adonis: kool exec app adonis\n yarn: kool exec app yarn\n\n setup:\n - kool docker kooldev/node:14 yarn install\n - kool start\n`,\n\t\t\"yarn-nestjs.yml\": `scripts:\n nest: kool exec app nest\n yarn: kool exec app yarn\n\n setup:\n - kool docker kooldev/node:14 yarn install\n - kool start\n`,\n\t\t\"yarn-nextjs.yml\": `scripts:\n yarn: kool exec app yarn\n\n setup:\n - kool docker kooldev/node:14 yarn install\n - kool start\n`,\n\t\t\"yarn-nodejs.yml\": `scripts:\n node: kool exec app node\n yarn: kool exec app yarn\n\n setup:\n - kool start\n # - add more setup commands\n`,\n\t\t\"yarn-nuxtjs.yml\": `scripts:\n yarn: kool exec app yarn\n\n setup:\n - kool docker kooldev/node:14 yarn install\n - kool start\n`,\n\t\t\"yarn.yml\": `scripts:\n yarn: kool docker kooldev/node:14 yarn\n node-setup:\n - kool run yarn install\n - kool run yarn dev\n`,\n\t}\n\treturn templates\n}", "title": "" }, { "docid": "fb7448296efaf71ea4d6962386b1a549", "score": "0.5708362", "text": "func RenderTemplateTest(w http.ResponseWriter) (map[string]*template.Template, error) {\n\tmyCache := map[string]*template.Template{}\n\n\tpages, err := filepath.Glob(\"./templates/*.page.html\")\n\tif err != nil {\n\t\treturn myCache, err\n\t}\n\n\tfor _, page := range pages {\n\t\tname := filepath.Base(page)\n\t\tfmt.Println(\"Page is currently :\", name)\n\t\tts, err := template.New(name).Funcs(functions).ParseFiles(page)\n\t\tfmt.Println(\"ts ==\", ts)\n\t\tif err != nil {\n\t\t\treturn myCache, err\n\t\t}\n\n\t\tmatches, err := filepath.Glob(\"./templates/*.layout.html\")\n\t\tfmt.Println(matches)\n\t\tif err != nil {\n\t\t\treturn myCache, err\n\t\t}\n\n\t\tif len(matches) > 0 {\n\t\t\tts, err = template.ParseGlob(\"./templates/*.layout.html\")\n\t\t\tfmt.Println(\"Inside len(matches)\", ts)\n\t\t\tif err != nil {\n\t\t\t\treturn myCache, err\n\t\t\t}\n\t\t}\n\t\tmyCache[name] = ts\n\t}\n\treturn myCache, nil\n}", "title": "" }, { "docid": "f7eeb8ae8a5142ebd9969ec067d3d19a", "score": "0.56805426", "text": "func listTests(root string) ([]string, error) {\n\ttests := []string{}\n\terr := filepath.Walk(root, func(path string, info os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif info.IsDir() {\n\t\t\treturn nil\n\t\t}\n\t\tif ext := filepath.Ext(path); ext == \".json\" {\n\t\t\ttest := strings.TrimSuffix(path, ext)\n\t\t\t// ensure .html file exists with the same name\n\t\t\tif _, err := os.Stat(test + \".html\"); os.IsNotExist(err) {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\ttest, err = filepath.Rel(root, test)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\ttests = append(tests, test)\n\t\t}\n\t\treturn nil\n\t})\n\treturn tests, err\n}", "title": "" }, { "docid": "981ec65d3902499feef8d4368fc9e68a", "score": "0.5654381", "text": "func (r *Runner) listAvailableTemplates() {\n\tif r.templatesConfig == nil {\n\t\treturn\n\t}\n\n\tif _, err := os.Stat(r.templatesConfig.TemplatesDirectory); os.IsNotExist(err) {\n\t\tgologger.Error().Msgf(\"%s does not exists\", r.templatesConfig.TemplatesDirectory)\n\t\treturn\n\t}\n\n\tgologger.Print().Msgf(\n\t\t\"\\nListing available v.%s nuclei templates for %s\",\n\t\tr.templatesConfig.CurrentVersion,\n\t\tr.templatesConfig.TemplatesDirectory,\n\t)\n\terr := directoryWalker(\n\t\tr.templatesConfig.TemplatesDirectory,\n\t\tfunc(path string, d *godirwalk.Dirent) error {\n\t\t\tif d.IsDir() && path != r.templatesConfig.TemplatesDirectory {\n\t\t\t\tgologger.Print().Msgf(\"\\n%s:\\n\\n\", r.colorizer.Bold(r.colorizer.BgBrightBlue(d.Name())).String())\n\t\t\t} else if strings.HasSuffix(path, \".yaml\") {\n\t\t\t\tr.logAvailableTemplate(path)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t)\n\t// directory couldn't be walked\n\tif err != nil {\n\t\tgologger.Error().Msgf(\"Could not find templates in directory '%s': %s\\n\", r.templatesConfig.TemplatesDirectory, err)\n\t}\n}", "title": "" }, { "docid": "fe271ad80a55a4a2fca63ebe683b82c2", "score": "0.56299245", "text": "func (s *TemplateService) List(argv *VoidArgs, reply *ServiceReply) *StatusError {\n // Get built in and user templates\n c := s.Host.GetByName(\"template\")\n u := s.Host.GetByName(\"user\")\n list := append(c.Apps, u.Apps...)\n var apps []*Application\n for _, app := range list {\n if app.IsTemplate {\n apps = append(apps, app)\n }\n }\n reply.Reply = apps\n return nil\n}", "title": "" }, { "docid": "f78cd8497ec879f1985d05c4208594d6", "score": "0.56015605", "text": "func (s *Service) List() *ListOp {\n\treturn &ListOp{\n\t\tCredential: s.credential,\n\t\tMethod: \"GET\",\n\t\tPath: \"templates\",\n\t\tAccept: \"application/json\",\n\t\tQueryOpts: make(url.Values),\n\t\tVersion: esign.APIv2,\n\t}\n}", "title": "" }, { "docid": "d757da74b93366da30cbedfec1e60c96", "score": "0.55817276", "text": "func (c TestRunner) List() revel.Result {\n\treturn c.RenderJSON(testSuites)\n}", "title": "" }, { "docid": "13c4767305d2132fe1032dded4a14b86", "score": "0.55584127", "text": "func List() ([]*Template, error) {\n\tresp, err := http.Get(templatesURL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar list []*Template\n\tif err := json.Unmarshal(body, &list); err != nil {\n\t\treturn nil, err\n\t}\n\treturn list, nil\n}", "title": "" }, { "docid": "4d2841ae77c996c63b7ae010e3ecdec4", "score": "0.55122864", "text": "func GetAll() []string {\n\tif len(registry.templates) == 0 {\n\t\treturn nil\n\t}\n\n\tkeys := make([]string, 0, len(getRegistry().templates))\n\tfor k := range getRegistry().templates {\n\t\tkeys = append(keys, k)\n\t}\n\treturn keys\n}", "title": "" }, { "docid": "6fa479b429e95553ad039caf310cda67", "score": "0.5491022", "text": "func (app App) GetAllTemplates() ([]Template, error) {\n\treturn app.repository.GetAllTemplates()\n}", "title": "" }, { "docid": "2ec254beaf82dade65d753dc0f9db082", "score": "0.54764915", "text": "func ListTemplates() ([]string, error) {\n\ttemplates := make([]string, 0)\n\tdir, err := initTemplatesDir()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfiles, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, f := range files {\n\t\tif filepath.Ext(f.Name()) == \".html\" {\n\t\t\tname := strings.TrimSuffix(filepath.Base(f.Name()), filepath.Ext(f.Name()))\n\t\t\ttemplates = append(templates, name)\n\t\t}\n\t}\n\n\treturn templates, nil\n}", "title": "" }, { "docid": "1a152b06af758723915e2e3ea9d0026a", "score": "0.5428582", "text": "func (t template) List(all, scannedOnly bool, timeout time.Duration) (*protocol.TemplateList, error) {\n\tt.session.Connect()\n\tdefer t.session.Disconnect()\n\n\tctx, xerr := utils.GetContext(true)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tservice := protocol.NewTemplateServiceClient(t.session.connection)\n\treturn service.List(ctx, &protocol.TemplateListRequest{All: all, ScannedOnly: scannedOnly})\n}", "title": "" }, { "docid": "831160878dea6bc2828844f8daca48cc", "score": "0.54166746", "text": "func (ec *esClient) ListTemplates() (sets.String, error) {\n\tpayload := &EsRequest{\n\t\tMethod: http.MethodGet,\n\t\tURI: \"_template\",\n\t}\n\n\tec.fnSendEsRequest(ec.cluster, ec.namespace, payload, ec.k8sClient)\n\tif payload.Error != nil {\n\t\treturn nil, payload.Error\n\t}\n\tif payload.StatusCode != 200 {\n\t\treturn nil, fmt.Errorf(\"There was an error retrieving list of templates. Error code: %v, %v\", payload.StatusCode != 200, payload.ResponseBody)\n\t}\n\tresponse := sets.NewString()\n\tfor name := range payload.ResponseBody {\n\t\tresponse.Insert(name)\n\t}\n\treturn response, nil\n}", "title": "" }, { "docid": "369f294541a0efd08750f750bc7c171c", "score": "0.5397887", "text": "func (c *ApplicationTemplatesClient) List(ctx context.Context, query odata.Query) (*[]ApplicationTemplate, int, error) {\n\tresp, status, _, err := c.BaseClient.Get(ctx, GetHttpRequestInput{\n\t\tDisablePaging: query.Top > 0,\n\t\tOData: query,\n\t\tValidStatusCodes: []int{http.StatusOK},\n\t\tUri: Uri{\n\t\t\tEntity: \"/applicationTemplates\",\n\t\t\tHasTenantId: true,\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, status, fmt.Errorf(\"ApplicationTemplatesClient.BaseClient.Get(): %v\", err)\n\t}\n\n\tdefer resp.Body.Close()\n\trespBody, err := io.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, status, fmt.Errorf(\"io.ReadAll(): %v\", err)\n\t}\n\n\tvar data struct {\n\t\tApplicationTemplates []ApplicationTemplate `json:\"value\"`\n\t}\n\tif err := json.Unmarshal(respBody, &data); err != nil {\n\t\treturn nil, status, fmt.Errorf(\"json.Unmarshal(): %v\", err)\n\t}\n\n\treturn &data.ApplicationTemplates, status, nil\n}", "title": "" }, { "docid": "9299bc022774d4109a99ef83740f17f6", "score": "0.53542197", "text": "func (m *DeviceManagement) GetTemplates()([]DeviceManagementTemplateable) {\n val, err := m.GetBackingStore().Get(\"templates\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]DeviceManagementTemplateable)\n }\n return nil\n}", "title": "" }, { "docid": "9126e261bef0cff9e337b0dc46ed1d4b", "score": "0.53213096", "text": "func BuildTestData() []common.TestBundle {\n\tc := memory.Use(context.Background())\n\tc, _ = testclock.UseTime(c, testclock.TestTimeUTC)\n\tbundles := []common.TestBundle{}\n\tfor _, tc := range testCases {\n\t\tbuild, err := build(c, \"debug\", tc.builder, tc.build)\n\t\tif err != nil {\n\t\t\tpanic(fmt.Errorf(\n\t\t\t\t\"Encountered error while building debug/%s/%s.\\n%s\",\n\t\t\t\ttc.builder, tc.build, err))\n\t\t}\n\t\tbundles = append(bundles, common.TestBundle{\n\t\t\tDescription: fmt.Sprintf(\"Debug page: %s/%d\", tc.builder, tc.build),\n\t\t\tData: templates.Args{\n\t\t\t\t\"Build\": build,\n\t\t\t},\n\t\t})\n\t}\n\treturn bundles\n}", "title": "" }, { "docid": "78908d549cf71ccf7fb905667788a40e", "score": "0.53177506", "text": "func RenderTemplates() {\n\tfmt.Println(\"Getting relevant packages\")\n\tpaths, err := filepath.Glob(\"../../services/*/pkg/config/defaults/defaultconfig.go\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treplacer := strings.NewReplacer(\n\t\t\"../../\", \"github.com/owncloud/ocis/v2/\",\n\t\t\"/defaultconfig.go\", \"\",\n\t)\n\tfor i := range paths {\n\t\tpaths[i] = replacer.Replace(paths[i])\n\t}\n\n\tfor template, output := range targets {\n\t\tgenerateIntermediateCode(template, output, paths)\n\t\trunIntermediateCode(output)\n\t}\n\tfmt.Println(\"Cleaning up\")\n\tos.RemoveAll(\"output\")\n}", "title": "" }, { "docid": "86d12fb371bab39f701fce90aec73453", "score": "0.5302289", "text": "func (_m *MockRepository) GetTemplates(s Scaffold) ([]TemplateEntry, error) {\n\tret := _m.ctrl.Call(_m, \"GetTemplates\", s)\n\tret0, _ := ret[0].([]TemplateEntry)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "b0e8c9a8d313eeac6310884c811b63cd", "score": "0.5191639", "text": "func (s *gceClient) Templates() []pbs.Node {\n\tloaderr := s.loadTemplates()\n\tif loaderr != nil {\n\t\ts.log.Error(\"error loading GCE templates\", loaderr)\n\t}\n\tnodes := []pbs.Node{}\n\n\tfor id, tpl := range s.templates {\n\n\t\tmt, ok := s.machineTypes[tpl.Properties.MachineType]\n\t\tif !ok {\n\t\t\ts.log.Error(\"error finding GCE template machine type\",\n\t\t\t\t\"name\", tpl.Properties.MachineType)\n\t\t\tcontinue\n\t\t}\n\n\t\tdisks := tpl.Properties.Disks\n\n\t\tres := pbs.Resources{\n\t\t\tCpus: uint32(mt.GuestCpus),\n\t\t\tRamGb: float64(mt.MemoryMb) / float64(1024),\n\t\t\t// TODO is there always at least one disk? Is the first the best choice?\n\t\t\t// how to know which to pick if there are multiple?\n\t\t\tDiskGb: float64(disks[0].InitializeParams.DiskSizeGb),\n\t\t}\n\n\t\t// Copy resources struct for available\n\t\tavail := res\n\t\tnodes = append(nodes, pbs.Node{\n\t\t\tResources: &res,\n\t\t\tAvailable: &avail,\n\t\t\tZone: s.zone,\n\t\t\tMetadata: map[string]string{\n\t\t\t\t\"gce\": \"yes\",\n\t\t\t\t\"gce-template\": id,\n\t\t\t},\n\t\t})\n\t}\n\treturn nodes\n}", "title": "" }, { "docid": "0f8b658906105554bacc871441dbd4bd", "score": "0.5183524", "text": "func PopulateTemplates() *template.Template {\n\ttemplates, err := template.ParseGlob(\"*.html\")\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1) // no point in our webapp if templates aren't read\n\t}\n\n\treturn templates\n}", "title": "" }, { "docid": "f29fdbc92d15d03598d1cf2757b098e1", "score": "0.5162148", "text": "func PopulateTemplates() {\n\tvar allFiles []string\n\ttemplatesDir := \"./dist/\"\n\tfiles, err := ioutil.ReadDir(templatesDir)\n\tif err != nil {\n\t\tfmt.Println(\"Error reading template dir\")\n\t}\n\tfor _, file := range files {\n\t\tfilename := file.Name()\n\t\tif strings.HasSuffix(filename, \".html\") {\n\t\t\tallFiles = append(allFiles, templatesDir+filename)\n\t\t}\n\t}\n\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\ttemplates = template.Must(template.ParseFiles(allFiles...))\n\n\tindexTemplate = templates.Lookup(\"index.html\")\n\n}", "title": "" }, { "docid": "4e0f78ed016d36be60b082ee20bb6cfe", "score": "0.5161879", "text": "func Test_GetAllConfigs(t *testing.T) {\n\tsetup(t)\n\tdefer cleanup(t)\n\n\tuserID := makeUserID()\n\tconfig := makeConfig()\n\n\tfor _, c := range allClients {\n\t\tview := c.post(t, userID, config)\n\t\tw := request(t, \"GET\", c.PrivateEndpoint, nil)\n\t\tassert.Equal(t, http.StatusOK, w.Code)\n\t\tvar found ConfigsView\n\t\terr := json.Unmarshal(w.Body.Bytes(), &found)\n\t\tassert.NoError(t, err, \"Could not unmarshal JSON\")\n\t\tassert.Equal(t, ConfigsView{Configs: map[string]userconfig.View{\n\t\t\tuserID: view,\n\t\t}}, found)\n\t}\n}", "title": "" }, { "docid": "b2c1ce94533bf16855e9622cf96e27a9", "score": "0.51463705", "text": "func generateTemplates() {\n\ttemplates = make(map[string]*template.Template)\n\tmodulus := template.FuncMap{\"mod\": func(i, j int) bool { return i%j == 0 }}\n\tfor _, tmpl := range config.templateFileList {\n\t\tt := template.New(\"base.html\").Funcs(modulus)\n\t\ttemplates[tmpl] = template.Must(t.ParseFiles(config.templateDirectory+\"base.html\", config.templateDirectory+tmpl))\n\t}\n}", "title": "" }, { "docid": "434d35478de719d5c15f674bb75313d7", "score": "0.51449734", "text": "func ApiListTemplate(apiSet []data.ApiData) string {\n\n\tapiList := \"\"\n\tfor _, api := range apiSet {\n\t\tstatus := \"待审核\"\n\t\tsubmit := `<td>\n <button onclick=\"auditSubmit('`+ api.ApiId +`', '1')\">同意</button>\n <button onclick=\"auditSubmit('`+ api.ApiId +`', '2')\">拒绝</button>\n </td>`\n\t\tswitch api.Status {\n\t\tcase 1:\n\t\t\tstatus = \"已上架\"\n\t\t\tsubmit = `<td>\n <button onclick=\"auditSubmit('`+ api.ApiId +`', '3')\">下架</button>\n </td>`\n\t\tcase 2:\n\t\t\tstatus = \"已拒绝\"\n\t\t}\n\n\n\n\t\tapiList += `<tr align=\"center\">\n <td>` + api.ApiId + `</td>\n <td>` + api.ApiName + `</td>\n <td>` + api.TenantName + `</td>\n <td>` + api.UserName + `</td>\n <td>` + api.ApiDesc + `</td>\n <td>` + status + `</td>\n ` + submit + `\n </tr>`\n\t}\n\n\treturn `<!doctype html>\n<html xmlns=http://www.w3.org/1999/xhtml>\n<meta charset=utf-8>\n<title>OpenAPI-mock Store</title>\n<body>\n<div class=\"content\">\n\t<div>\n <input type=\"button\" name=\"submit\" onclick=\"buy()\" value=\"购买API\"\n style=\"width: 80px;height: 20px; background: #ccc; border-radius: 5px;color: blue;cursor: pointer;\" />\n </div>\n <div class=\"api\">\n <table border=\"1\" width=\"100%\" align=\"center\" cellspacing=\"0\" cellpadding=\"6\">\n <caption>API列表</caption>\n\n <thead>\n <tr align=\"center\">\n <th>id</th>\n <th>名称</th>\n <th>租户名</th>\n <th>用户名</th>\n <th>描述</th>\n <th>状态</th>\n <th>操作</th>\n </tr>\n </thead>\n\n <tbody>\n ` + apiList + `\n </tbody>\n </table>\n </div>\n</div>\n<script>\n let host = \"http://\" + window.location.host;\n function auditSubmit(apiId, status) {\n const data = \"apiId=\" + apiId + \"&status=\" + status;\n createRequest(host + \"/mock/api/audit\", \"POST\", data, function (res) {\n let result = JSON.parse(res);\n console.log(result);\n alert(result.message || \"请求异常\");\n window.location.reload();\n })\n }\n\n\tfunction buy() {\n\t\twindow.location.href = host + \"/mock/contract\";\n\t}\n\n function createRequest(host, method, data, callback) {\n let xhr = window.XMLHttpRequest ? new window.XMLHttpRequest() :\n new window.ActiveXObject('Microsoft.XMLHTTP');\n xhr.open(method || \"GET\", host, false);\n xhr.onreadystatechange = function () {\n //判断请求状态是否是已经完成\n if (xhr.readyState === 4) {\n //判断服务器是否返回成功200,304\n if (xhr.status >= 200 && xhr.status <= 300 || xhr.status === 304) {\n //接收xhr的数据\n callback(xhr.responseText);\n }\n }\n };\n xhr.setRequestHeader(\"Content-Type\", \"application/x-www-form-urlencoded\");\n // xhr.setRequestHeader(\"Canhe-Control\", \"no-cache\");//阻止浏览器读取缓存\n xhr.send(data);\n }\n</script>\n</body>\n</html>`\n}", "title": "" }, { "docid": "943e3f779cb63db3c04d9de7696ce9a1", "score": "0.51266843", "text": "func PopulateTemplates() {\n\tvar allFiles []string\n\ttemplatesDir := \"./templates/\"\n\tfiles, err := ioutil.ReadDir(templatesDir)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1) // No point in running app if templates aren't read\n\t}\n\tfor _, file := range files {\n\t\tfilename := file.Name()\n\t\tif strings.HasSuffix(filename, \".html\") {\n\t\t\tallFiles = append(allFiles, templatesDir+filename)\n\t\t}\n\t}\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1)\n\t}\n\ttemplates, err = template.ParseFiles(allFiles...)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1)\n\t}\n\thomeTemplate = templates.Lookup(\"home.html\")\n\tdeletedTemplate = templates.Lookup(\"deleted.html\")\n\n\teditTemplate = templates.Lookup(\"edit.html\")\n\tsearchTemplate = templates.Lookup(\"search.html\")\n\tcompletedTemplate = templates.Lookup(\"completed.html\")\n\tloginTemplate = templates.Lookup(\"login.html\")\n\n}", "title": "" }, { "docid": "9af0f5797abffa85341fa854aa16bc27", "score": "0.51253337", "text": "func PopulateTemplates() {\n\tvar allFiles []string\n\ttemplatesDir := \"./templates/\"\n\tfiles, err := ioutil.ReadDir(templatesDir)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1) // No point in running app if templates aren't read\n\t}\n\tfor _, file := range files {\n\t\tfilename := file.Name()\n\t\tif strings.HasSuffix(filename, \".html\") {\n\t\t\tallFiles = append(allFiles, templatesDir+filename)\n\t\t}\n\t}\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1)\n\t}\n\ttemplates, err = template.ParseFiles(allFiles...)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tos.Exit(1)\n\t}\n\thomeTemplate = templates.Lookup(\"home.html\")\n\tloginTemplate = templates.Lookup(\"login.html\")\n\tsignupTemplate = templates.Lookup(\"signup.html\")\n\taddnewsTemplate = templates.Lookup(\"addnews.html\")\n\tuserlistTemplate = templates.Lookup(\"userlist.html\")\n\tshownewsTemplate = templates.Lookup(\"shownews.html\")\n\teditnewsTemplate = templates.Lookup(\"editnews.html\")\n\t// deletedTemplate = templates.Lookup(\"deleted.html\")\n\t// editTemplate = templates.Lookup(\"edit.html\")\n\t// searchTemplate = templates.Lookup(\"search.html\")\n\t// completedTemplate = templates.Lookup(\"completed.html\")\n\n}", "title": "" }, { "docid": "6511f721b835d6c66d7f0cad25f05bcc", "score": "0.511696", "text": "func Test_Controller_Resource_TCNP_Template_Render(t *testing.T) {\n\ttestCases := []struct {\n\t\tname string\n\t\tcr infrastructurev1alpha3.AWSMachineDeployment\n\t\tre releasev1alpha1.Release\n\t}{\n\t\t{\n\t\t\tname: \"case 0: basic test\",\n\t\t\tcr: unittest.DefaultMachineDeployment(),\n\t\t\tre: unittest.DefaultRelease(),\n\t\t},\n\t\t{\n\t\t\tname: \"case 1: disk test\",\n\t\t\tcr: unittest.MachineDeploymentWithDisks(unittest.DefaultMachineDeployment(), \"10\", 11, 12, \"13\"),\n\t\t\tre: unittest.DefaultRelease(),\n\t\t},\n\t}\n\n\tfor i, tc := range testCases {\n\t\tt.Run(strconv.Itoa(i), func(t *testing.T) {\n\t\t\tvar err error\n\n\t\t\tctx := unittest.DefaultContext()\n\t\t\tk := unittest.FakeK8sClient()\n\n\t\t\tvar ct cloudtags.Interface\n\t\t\t{\n\t\t\t\tc := cloudtags.Config{\n\t\t\t\t\tK8sClient: k,\n\t\t\t\t\tLogger: microloggertest.New(),\n\t\t\t\t}\n\n\t\t\t\tct, err = cloudtags.New(c)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar rel releases.Interface\n\t\t\t{\n\t\t\t\tc := releases.Config{\n\t\t\t\t\tK8sClient: k,\n\t\t\t\t}\n\n\t\t\t\trel, err = releases.New(c)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar m encrypter.Interface\n\t\t\t{\n\t\t\t\tm = &encrypter.Mock{}\n\t\t\t}\n\n\t\t\tvar e recorder.Interface\n\t\t\t{\n\t\t\t\tc := recorder.Config{\n\t\t\t\t\tK8sClient: k,\n\n\t\t\t\t\tComponent: \"dummy\",\n\t\t\t\t}\n\n\t\t\t\te = recorder.New(c)\n\t\t\t}\n\n\t\t\tvar d *changedetection.TCNP\n\t\t\t{\n\t\t\t\tc := changedetection.TCNPConfig{\n\t\t\t\t\tEvent: e,\n\t\t\t\t\tLogger: microloggertest.New(),\n\t\t\t\t\tReleases: rel,\n\t\t\t\t}\n\n\t\t\t\td, err = changedetection.NewTCNP(c)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar i images.Interface\n\t\t\t{\n\t\t\t\tc := images.Config{\n\t\t\t\t\tK8sClient: k,\n\n\t\t\t\t\tRegistryDomain: \"dummy\",\n\t\t\t\t}\n\n\t\t\t\ti, err = images.New(c)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t{\n\t\t\t\tawsCl := unittest.DefaultCluster()\n\t\t\t\terr = k.CtrlClient().Create(ctx, &awsCl)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\n\t\t\t\tcl := unittest.DefaultCAPIClusterWithLabels(awsCl.Name, map[string]string{})\n\t\t\t\terr = k.CtrlClient().Create(ctx, &cl)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\n\t\t\t\terr = k.CtrlClient().Create(ctx, &tc.cr)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\n\t\t\t\terr = k.CtrlClient().Create(ctx, &tc.re)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar r *Resource\n\t\t\t{\n\t\t\t\tc := Config{\n\t\t\t\t\tCloudTags: ct,\n\t\t\t\t\tDetection: d,\n\t\t\t\t\tEncrypter: m,\n\t\t\t\t\tEvent: e,\n\t\t\t\t\tImages: i,\n\t\t\t\t\tK8sClient: k,\n\t\t\t\t\tLogger: microloggertest.New(),\n\n\t\t\t\t\tAlikeInstances: `{\"m5.2xlarge\":[{\"InstanceType\":\"m5.2xlarge\",\"WeightedCapacity\":1},{\"InstanceType\":\"m4.2xlarge\",\"WeightedCapacity\":1}]}`,\n\t\t\t\t\tInstallationName: \"dummy\",\n\t\t\t\t}\n\n\t\t\t\tr, err = New(c)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tparams, err := r.newTemplateParams(ctx, tc.cr)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\t\t\ttemplateBody, err := template.Render(params)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\t_, err = yaml.YAMLToJSONStrict([]byte(templateBody))\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\t\t\tp := filepath.Join(\"testdata\", unittest.NormalizeFileName(tc.name)+\".golden\")\n\n\t\t\tif *update {\n\t\t\t\terr := os.WriteFile(p, []byte(templateBody), 0644) // nolint: gosec\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\t\t\tgoldenFile, err := os.ReadFile(p)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\tif !bytes.Equal([]byte(templateBody), goldenFile) {\n\t\t\t\tt.Fatalf(\"\\n\\n%s\\n\", cmp.Diff(string(goldenFile), templateBody))\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "3ec211f655a60aa0923ac194d9e9a401", "score": "0.5111874", "text": "func debugPrintLoadTemplate(tmpl *template.Template) {\n if gin.IsDebugging() {\n var buf bytes.Buffer\n for _, tmpl := range tmpl.Templates() {\n buf.WriteString(\"\\t- \")\n buf.WriteString(tmpl.Name())\n buf.WriteString(\"\\n\")\n }\n debugPrint(\"Loaded HTML Templates (%d): \\n%s\\n\", len(tmpl.Templates()), buf.String())\n }\n}", "title": "" }, { "docid": "2b9cd559a4d29635a42b5bbbfc2cbffa", "score": "0.5106342", "text": "func listTests(svc *devicefarm.DeviceFarm, runArn string) {\n\n\tlistReq := &devicefarm.ListTestsInput{\n\t\tARN: aws.String(runArn),\n\t}\n\n\tresp, err := svc.ListTests(listReq)\n\n\tfailOnErr(err, \"error listing tests\")\n\tfmt.Println(awsutil.Prettify(resp))\n}", "title": "" }, { "docid": "3ca07394907963f1acf438acd3c5eb45", "score": "0.5106", "text": "func (ts *TemplateService) List(ctx context.Context, pageOffset, pageSize int,\n\tfilter OwnershipFilter) ([]*resources.Template, error) {\n\treturn ts.list(ctx, int(filter), (pageOffset-1)*pageSize, -pageSize)\n}", "title": "" }, { "docid": "0db16b869fee30d8dbcf5335fe0715f9", "score": "0.5079651", "text": "func LoadTemplates() {\n\tindexTemplate = template.Must(template.ParseFiles(\"./templates/index.html\"))\n}", "title": "" }, { "docid": "baa059f15bc0c6dba3e925a014bd7545", "score": "0.507838", "text": "func getAllLaunchTemplates(client *ec2.EC2, lts []*ec2.LaunchTemplate, nextToken *string) []*ec2.LaunchTemplate {\n\tinput := &ec2.DescribeLaunchTemplatesInput{\n\t\tNextToken: nextToken,\n\t}\n\n\tret, err := client.DescribeLaunchTemplates(input)\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tlts = append(lts, ret.LaunchTemplates...)\n\n\tif ret.NextToken != nil {\n\t\treturn getAllLaunchTemplates(client, lts, ret.NextToken)\n\t}\n\n\treturn lts\n}", "title": "" }, { "docid": "90bafb548362a73aeb29998fde5ff783", "score": "0.5076167", "text": "func (ts *TemplateService) ListAll(ctx context.Context, filter OwnershipFilter) ([]*resources.Template, error) {\n\treturn ts.list(ctx, int(filter), pageOffsetDefault, pageSizeDefault)\n}", "title": "" }, { "docid": "4d14f28ebae9ae47dc6d8b64486b01a3", "score": "0.50756204", "text": "func (m *Manager) ListTemplates() (interface{}, error) {\n\taccessToken, err := m.GetAccessToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\turi := fmt.Sprintf(\"%s?access_token=%s\", templateListURL, accessToken)\n\tresponse, err := util.HTTPGet(uri)\n\n\tvar result resTemplateList\n\terr = json.Unmarshal(response, &result)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif result.ErrCode != 0 {\n\t\terr = fmt.Errorf(\"template msg list error : errcode=%v , errmsg=%v\", result.ErrCode, result.ErrMsg)\n\t\treturn nil, err\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "09cd512f43e2763a1f6580ad3f9514ca", "score": "0.5073285", "text": "func GetTemplates(appDir string) (result []string, err error) {\n\tsubdirectories, err := util.GetSubdirectories(path.Join(appDir, templatesDir))\n\tif err != nil {\n\t\treturn result, err\n\t}\n\tfor _, directory := range subdirectories {\n\t\tisValid, _, err := IsValidTemplateDir(path.Join(templatesDir, directory))\n\t\tif err != nil {\n\t\t\treturn result, err\n\t\t}\n\t\tif isValid {\n\t\t\tresult = append(result, directory)\n\t\t}\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "b9dc49df338704e2a7a2eb1ad2ce0d1c", "score": "0.5064256", "text": "func TemplateServersList(c *cli.Context) error {\n\tdebugCmdFuncInfo(c)\n\ttemplateSvc, formatter := WireUpTemplate(c)\n\n\tcheckRequiredFlags(c, []string{\"template-id\"}, formatter)\n\ttemplateServers, err := templateSvc.GetTemplateServerList(c.String(\"template-id\"))\n\tif err != nil {\n\t\tformatter.PrintFatal(\"Couldn't receive template servers data\", err)\n\t}\n\tif err = formatter.PrintList(templateServers); err != nil {\n\t\tformatter.PrintFatal(\"Couldn't print/format result\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "04a8c0d775a397cab76861d6fd1dff6e", "score": "0.5064238", "text": "func (s *WidgetTemplateServiceOp) List(options ...interface{}) (ListWidgetTemplateResponse, error) {\n\tlistResult := ListWidgetTemplateResponse{}\n\tbody, err := s.client.DoRequest(http.MethodGet, \"/content/widget-templates/\", nil)\n\tif err != nil {\n\t\treturn listResult, err\n\t}\n\n\tjsonErr := json.Unmarshal(body, &listResult)\n\tif jsonErr != nil {\n\t\treturn listResult, jsonErr\n\t}\n\treturn listResult, nil\n}", "title": "" }, { "docid": "8ae3a856faca3098c3b4a2a317d3fb4f", "score": "0.5033636", "text": "func TestListApps(t *testing.T) {\n\tts := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tio.WriteString(w, \"{\\\"name\\\":\\\"test\\\",\\\"custom_deploy_script\\\":null,\\\"current_release_id\\\":\\\"20160509194833\\\",\\\"target_release_id\\\":null,\\\"created\\\":\\\"Mon, 09 May 2016 19:48:33 UTC\\\",\\\"updated\\\":\\\"Mon, 09 May 2016 19:48:48 UTC\\\",\\\"tags\\\":{},\\\"addresses\\\":{\\\"external\\\":[{\\\"port\\\":\\\"test\\\",\\\"address\\\":\\\"tcp://test:80\\\"}],\\\"internal\\\":null}}\")\n\t}))\n\ttestURL := strings.Replace(ts.URL, \"https://\", \"\", -1)\n\tConvey(\"When listing supergiant apps.\", t, func() {\n\t\t//setup\n\t\tsg, err := NewClient(testURL, \"test\", \"test\")\n\t\tSo(err, ShouldBeNil)\n\n\t\tConvey(\"We would expect the list to be successful\", func() {\n\t\t\terr := sg.ListApps(\"test\")\n\t\t\tSo(err, ShouldBeNil)\n\t\t})\n\t})\n}", "title": "" }, { "docid": "02df5264938da91448d01afffcb96c28", "score": "0.5030141", "text": "func (a RightSignatureAPI) ListTemplates(p ...url.Values) (resp ListTemplatesResp, err error) {\n\tparams := url.Values{}\n\tif len(p) > 0 {\n\t\tparams = p[0]\n\t}\n\n\tencodeParams := params.Encode()\n\tif len(encodeParams) > 0 {\n\t\tencodeParams = \"?\" + encodeParams\n\t}\n\n\turl := BaseURL + \"/templates.xml\" + encodeParams\n\tmethod := MethodGet\n\n\tbody, err := a.Send(method, url, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = xml.Unmarshal(body, &resp)\n\treturn\n}", "title": "" }, { "docid": "db474caa604ef330a7a6177198f6b319", "score": "0.50225455", "text": "func Templates() error {\n\treturn pathx.InitTemplates(category, templates)\n}", "title": "" }, { "docid": "38643595b4a583a24ea1b3a6647a0155", "score": "0.50160545", "text": "func GetNewTestSuiteTemplate(cc CodeConfig) string {\n\treturn `\n\tpackage webserver\n\n {{.TimeStampHeader false}}\n\n\timport (\n\t\t\"bytes\"\n\t\t\"encoding/json\"\n\t\t\"log\"\n\t\t\"net/http\"\n\t\t\"net/http/httptest\"\n\t\t\"reflect\"\n\t\t\"sort\"\n\t\t\"strconv\"\n\t\t\"strings\"\n\t\t\"testing\"\n\n\t\t\"github.com/obieq/gas\"\n\t\tgapi \"github.com/obieq/gson-api\"\n\t\t. \"github.com/onsi/ginkgo\"\n\t\t. \"github.com/onsi/gomega\"\n\t\t\"github.com/pallinder/go-randomdata\"\n\t\t\"gopkg.in/guregu/null.v3\"\n\t)\n\n\tconst HTTP_POST = \"POST\"\n const HTTP_PATCH = \"PATCH\"\n\n\ttype Attributes struct {\n\t Attributes interface{} ` + \"`\" + `json:\"attributes\"` + \"`\" + `\n }\n\n type JSONRequest struct {\n\t Data interface{} ` + \"`\" + `json:\"data\"` + \"`\" + `\n }\n\n\tvar (\n\t\tresponse *httptest.ResponseRecorder\n\t)\n\n\tfunc TestMain(t *testing.T) {\n\t\tRegisterFailHandler(Fail)\n\t\tRunSpecs(t, \"Main Suite\")\n\t}\n\n\tvar _ = BeforeSuite(func() {\n\t})\n\n\tvar _ = AfterSuite(func() {\n })\n\n\tfunc parseJSON(recorder *httptest.ResponseRecorder, key string, isAttribute bool) interface{} {\n\t\tj := gapi.JsonApiResource{}\n\t\tjson.Unmarshal(recorder.Body.Bytes(), &j)\n\t\tdata := j.Data.(map[string]interface{})\n\t\tattributes := data[\"attributes\"].(map[string]interface{})\n\n\t\tif isAttribute {\n\t\t\treturn attributes[key]\n\t\t}\n\n\t\treturn data[key]\n\t}\n\n\tfunc parseCreatedAt(recorder *httptest.ResponseRecorder) string {\n\t\t// NOTE: due to timestamp differences (long story), we need to replace the timestamp\n\t\t// returned by POST with the timestamp returned by GET\n\t\treturn strings.Split(strings.Split(recorder.Body.String(), ` + \"`\" + `\"created-at\":\"` + \"`\" + `)[1], ` + \"`\" + `\"` + \"`\" + `)[0]\n\t}\n\n\tfunc expectedEmptyGetResponse() string {\n\t return ` + \"`\" + `{\"data\":[]}` + \"`\" + `\n }\n\n\tfunc expectedNotFoundResponse() string {\n\t return ` + \"`\" + `{ \"errors\": { \"status\": \"404\", \"detail\": \"record not found\" } }` + \"`\" + `\n }\n\n func expectedGetOneResponse(resourceName string, orderedKeys map[int]string, attrs map[string]interface{}) string {\n // parse id\n id := attrs[\"id\"].(string)\n delete(attrs, \"id\") // NOTE: very important step!\n\n\t return ` + \"`\" + `{` + \"`\" + ` +\n\t\t ` + \"`\" + `\"data\":{\"type\":\"` + \"`\" + \" + resourceName + \" + \"`\" + `\",\"id\":\"` + \"`\" + ` + id + ` + \"`\" + `\",` + \"`\" + ` +\n\t\t ` + \"`\" + `\"attributes\":{` + \"`\" + ` + parseKVs(orderedKeys, attrs) + ` + \"`\" + `,\"updated-at\":null}}}` + \"`\" + `\n }\n\nfunc expectedGetAllResponse(resourceName string, orderedKeys map[int]string, attrs map[string]interface{}) string {\n // parse id\n id := attrs[\"id\"].(string)\n delete(attrs, \"id\") // NOTE: very important step!\n\n\treturn ` + \"`\" + `{` + \"`\" + ` +\n\t\t` + \"`\" + `\"data\":[{\"type\":\"` + \"`\" + \" + resourceName + \" + \"`\" + `\",\"id\":\"` + \"`\" + ` + id + ` + \"`\" + `\",` + \"`\" + ` +\n\t\t` + \"`\" + `\"attributes\":{` + \"`\" + ` + parseKVs(orderedKeys, attrs) + ` + \"`\" + `,\"updated-at\":null}}]}` + \"`\" + `\n}\n\nfunc expectedPostPatchResponse(resourceName string, orderedKeys map[int]string, attrs map[string]interface{}) string {\n // parse id\n id := attrs[\"id\"].(string)\n delete(attrs, \"id\") // NOTE: very important step!\n\n // parse updated at\n updatedAt := \"\"\n if attrs[\"updated-at\"] == nil {\n updatedAt = ` + \"`\" + `,\"updated-at\":null` + \"`\" + `\n }\n\n\treturn \"{\" +\n\t\t` + \"`\" + `\"data\":{\"type\":\"` + \"`\" + \" + resourceName + \" + \"`\" + `\",\"id\":\"` + \"`\" + ` + id + ` + \"`\" + `\",` + \"`\" + ` +\n\t\t` + \"`\" + `\"attributes\":{` + \"`\" + ` + parseKVs(orderedKeys, attrs) + updatedAt + ` + \"`\" + `}}}` + \"`\" + `\n}\n\nfunc parseKVs(orderedKeys map[int]string, attrs map[string]interface{}) string {\n\ts := \"\"\n\tsorted := make([]int, 0, len(orderedKeys))\n\tfor i := range orderedKeys {\n\t\tsorted = append(sorted, i)\n\t}\n\tsort.Ints(sorted)\n\n\tfor _, i := range sorted {\n\t\tk := orderedKeys[i]\n\t\tv := attrs[k]\n\t\ts += ` + \"`\" + `\"` + \"`\" + ` + gas.String(k).Dasherize() + ` + \"`\" + `\":` + \"`\" + `\n\t\tswitch v.(type) {\n\t\tcase string:\n\t\t\ts += ` + \"`\" + `\"` + \"`\" + ` + v.(string) + ` + \"`\" + `\"` + \"`\" + `\n\t\tcase int:\n\t\t\ts += strconv.Itoa(v.(int))\n\t\tcase bool:\n\t\t\ts += strconv.FormatBool(v.(bool))\n\t\tcase int64:\n\t\t\ts += strconv.FormatInt(v.(int64), 10)\n\t\tcase float32:\n\t\t\ts += strconv.FormatFloat(float64(v.(float32)), 'f', -1, 32)\n\t\tcase float64:\n\t\t\ts += strconv.FormatFloat(v.(float64), 'f', -1, 64)\n\t\tdefault:\n\t\t\tlog.Panicln(\"No switch for KV type:\", reflect.TypeOf(v))\n\t\t}\n\t\tif i < len(attrs)-1 {\n\t\t\ts += \",\"\n\t\t}\n\t}\n\treturn s\n}\n\nfunc makeRESTRequest(verb string, routeName string, resource gapi.Resourcer) (*httptest.ResponseRecorder, map[string]interface{}) {\n kvs := map[string]interface{}{}\n generateRandomData(kvs, resource)\n\n\t// set attributes struct values w/ the random data values\n val := reflect.Indirect(reflect.ValueOf(resource))\n\tfor i := 0; i < val.Type().NumField(); i++ {\n\t\tf := val.Type().Field(i)\n\n\t\t// skip both created at and updated at\n\t\tif f.Name == \"CreatedAt\" || f.Name == \"UpdatedAt\" || f.Name == \"Resource\" {\n continue\n\t\t}\n\n\t\tswitch f.Type.String() {\n\t\tcase \"null.String\":\n\t\t\tv := kvs[gas.String(f.Name).Dasherize()].(string)\n\t\t\tval.FieldByName(f.Name).Set(reflect.ValueOf(null.StringFrom(v)))\n case \"null.Bool\":\n\t\t\tv := kvs[gas.String(f.Name).Dasherize()].(bool)\n\t\t val.FieldByName(f.Name).Set(reflect.ValueOf(null.BoolFrom(v)))\n\t\tcase \"null.Int\":\n\t\t\tv := kvs[gas.String(f.Name).Dasherize()].(int)\n\t\t\tval.FieldByName(f.Name).Set(reflect.ValueOf(null.IntFrom(int64(v))))\n\t\tdefault:\n\t\t\tlog.Panicln(\"reflect.Set not mapped for:\", f.Type.String())\n\t\t}\n\t}\n\n return sendTestRequest(verb, routeName, resource, kvs)\n}\n\nfunc sendTestRequest(\n\thttpVerb string,\n\trouteName string,\n\tresource gapi.Resourcer,\n\tkvs map[string]interface{}) (*httptest.ResponseRecorder, map[string]interface{}) {\n\n\ta := Attributes{Attributes: resource}\n j := JSONRequest{Data: a}\n\n\tbody, err := json.Marshal(j)\n\tif err != nil {\n\t\tlog.Println(\"Unable to marshal Resource:\", resource)\n\t}\n\n\tserver := NewServer()\n\trequest, _ := http.NewRequest(httpVerb, routeName, bytes.NewReader(body))\n\trecorder := httptest.NewRecorder()\n\tserver.ServeHTTP(recorder, request)\n\n\t// get id and created-at values\n\tkvs[\"id\"] = parseJSON(recorder, \"id\", false).(string)\n kvs[\"created-at\"] = parseJSON(recorder, \"created-at\", true).(string)\n\tif httpVerb == HTTP_PATCH {\n\t\tkvs[\"updated-at\"] = parseJSON(recorder, \"updated-at\", true).(string)\n\t}\n\n\treturn recorder, kvs\n}\n\nfunc generateRandomData(kvs map[string]interface{}, resource gapi.Resourcer) {\n\tval := reflect.Indirect(reflect.ValueOf(resource))\n\tfor i := 0; i < val.Type().NumField(); i++ {\n\t\tf := val.Type().Field(i)\n\n\t\t// skip both created at and updated at\n\t\tif f.Name == \"CreatedAt\" || f.Name == \"UpdatedAt\" || f.Name == \"Resource\" {\n continue\n\t\t}\n\n\t\tswitch f.Type.String() {\n\t\tcase \"string\", \"*string\", \"null.String\":\n\t\t\tkvs[gas.String(f.Name).Dasherize()] = randomdata.SillyName()\n\t\tcase \"int\", \"int64\", \"*int\", \"*int64\", \"null.Int\":\n\t\t\tkvs[gas.String(f.Name).Dasherize()] = randomdata.Number(20000)\n\t\tcase \"bool\", \"*bool\", \"null.Bool\":\n\t\t\tkvs[gas.String(f.Name).Dasherize()] = randomdata.Boolean()\n\t\tcase \"float32\", \"float64\", \"*float32\", \"*float64\", \"null.Float\":\n\t\t\tkvs[gas.String(f.Name).Dasherize()] = randomdata.Decimal(20000)\n\t\tdefault:\n\t\t\tlog.Panicln(\"No random data mapping for:\", f.Name, f.Type)\n\t\t}\n\t}\n}`\n}", "title": "" }, { "docid": "044a909c8da5b5ca755a66b71630aaab", "score": "0.5015992", "text": "func (env *Env) TemplateDirs() []string {\n\treturn env.Templator.ListTemplateDirs()\n}", "title": "" }, { "docid": "179be663c3e1395060971a96df10e12a", "score": "0.50140095", "text": "func (s *Server) ListTemplates(ctx context.Context, q *notification.TemplatesListRequest) (*notification.TemplateList, error) {\n\tapi, err := s.apiFactory.GetAPI()\n\tif err != nil {\n\t\tif apierr.IsNotFound(err) {\n\t\t\treturn &notification.TemplateList{}, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\ttemplates := []*notification.Template{}\n\tfor tmpl := range api.GetConfig().Templates {\n\t\ttemplates = append(templates, &notification.Template{Name: pointer.String(tmpl)})\n\t}\n\treturn &notification.TemplateList{Items: templates}, nil\n}", "title": "" }, { "docid": "8f6e8cf56b3a5a3b4b2d8339895414d9", "score": "0.49864894", "text": "func LoadTemplates() {\n\tTemplates[\"index.html\"] = ParseTemplate(\"index.html\")\n}", "title": "" }, { "docid": "bd3c0ca5157e7b9e9700b1ae5c534df1", "score": "0.49825472", "text": "func Test_Controller_Resource_TCCP_Template_Render(t *testing.T) {\n\ttestCases := []struct {\n\t\tname string\n\t\tcr infrastructurev1alpha3.AWSCluster\n\t\tctx context.Context\n\t\tcpAzs []string\n\t\tcpReplicas int\n\t\tapiWhitelist ConfigAPIWhitelistSecurityGroup\n\t\troute53Enabled bool\n\t\terrorMatcher func(error) bool\n\t}{\n\t\t{\n\t\t\tname: \"case 0: basic test, route53 enabled\",\n\t\t\tcr: unittest.DefaultCluster(),\n\t\t\tctx: unittest.DefaultContext(),\n\t\t\tcpAzs: []string{\"eu-central-1a\"},\n\t\t\tcpReplicas: 1,\n\t\t\terrorMatcher: nil,\n\t\t\troute53Enabled: true,\n\t\t},\n\t\t{\n\t\t\tname: \"case 1: basic test, route53 disabled\",\n\t\t\tcr: unittest.DefaultCluster(),\n\t\t\tctx: unittest.DefaultContext(),\n\t\t\tcpAzs: []string{\"eu-central-1b\"},\n\t\t\tcpReplicas: 1,\n\t\t\terrorMatcher: nil,\n\t\t\troute53Enabled: false,\n\t\t},\n\t\t{\n\t\t\tname: \"case 2: basic test with api whitelist enabled\",\n\t\t\tcr: unittest.DefaultCluster(),\n\t\t\tctx: unittest.DefaultContext(),\n\t\t\tcpAzs: []string{\"eu-central-1c\"},\n\t\t\tcpReplicas: 1,\n\t\t\tapiWhitelist: ConfigAPIWhitelistSecurityGroup{\n\t\t\t\tEnabled: true,\n\t\t\t\tSubnetList: []string{\n\t\t\t\t\t\"172.10.10.10\",\n\t\t\t\t\t\"172.20.20.20\",\n\t\t\t\t},\n\t\t\t},\n\t\t\terrorMatcher: nil,\n\t\t\troute53Enabled: false,\n\t\t},\n\t}\n\n\tvar err error\n\n\tfor i, tc := range testCases {\n\t\tt.Run(strconv.Itoa(i), func(t *testing.T) {\n\t\t\tvar r *Resource\n\t\t\t{\n\t\t\t\tctx := unittest.DefaultContextControlPlane()\n\t\t\t\tk := unittest.FakeK8sClient()\n\n\t\t\t\tvar ct cloudtags.Interface\n\t\t\t\t{\n\t\t\t\t\tc := cloudtags.Config{\n\t\t\t\t\t\tK8sClient: k,\n\t\t\t\t\t\tLogger: microloggertest.New(),\n\t\t\t\t\t}\n\n\t\t\t\t\tct, err = cloudtags.New(c)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tt.Fatal(err)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tvar e recorder.Interface\n\t\t\t\t{\n\t\t\t\t\tc := recorder.Config{\n\t\t\t\t\t\tK8sClient: k,\n\n\t\t\t\t\t\tComponent: \"dummy\",\n\t\t\t\t\t}\n\n\t\t\t\t\te = recorder.New(c)\n\t\t\t\t}\n\n\t\t\t\tvar d *changedetection.TCCP\n\t\t\t\t{\n\t\t\t\t\tc := changedetection.TCCPConfig{\n\t\t\t\t\t\tEvent: e,\n\t\t\t\t\t\tLogger: microloggertest.New(),\n\t\t\t\t\t}\n\n\t\t\t\t\td, err = changedetection.NewTCCP(c)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tt.Fatal(err)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tvar h hamaster.Interface\n\t\t\t\t{\n\t\t\t\t\tc := hamaster.Config{\n\t\t\t\t\t\tK8sClient: k,\n\t\t\t\t\t}\n\n\t\t\t\t\th, err = hamaster.New(c)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tt.Fatal(err)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tvar aws infrastructurev1alpha3.AWSControlPlane\n\t\t\t\t{\n\t\t\t\t\tcl := unittest.DefaultCluster()\n\t\t\t\t\terr = k.CtrlClient().Create(ctx, &cl)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tt.Fatal(err)\n\t\t\t\t\t}\n\n\t\t\t\t\taws = unittest.DefaultAWSControlPlane()\n\t\t\t\t\taws.Spec.AvailabilityZones = tc.cpAzs\n\t\t\t\t\terr = k.CtrlClient().Create(ctx, &aws)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tt.Fatal(err)\n\t\t\t\t\t}\n\n\t\t\t\t\tg8s := unittest.DefaultG8sControlPlane()\n\t\t\t\t\tg8s.Spec.Replicas = tc.cpReplicas\n\t\t\t\t\terr = k.CtrlClient().Create(ctx, &g8s)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tt.Fatal(err)\n\t\t\t\t\t}\n\n\t\t\t\t\tre := unittest.DefaultRelease()\n\t\t\t\t\terr = k.CtrlClient().Create(ctx, &re)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tt.Fatal(err)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tc := Config{\n\t\t\t\t\tCloudTags: ct,\n\t\t\t\t\tCtrlClient: k.CtrlClient(),\n\t\t\t\t\tEvent: e,\n\t\t\t\t\tHAMaster: h,\n\t\t\t\t\tDetection: d,\n\t\t\t\t\tK8sClient: k,\n\t\t\t\t\tLogger: microloggertest.New(),\n\n\t\t\t\t\tAPIWhitelist: ConfigAPIWhitelist{\n\t\t\t\t\t\tPrivate: ConfigAPIWhitelistSecurityGroup{\n\t\t\t\t\t\t\tEnabled: tc.apiWhitelist.Enabled,\n\t\t\t\t\t\t\tSubnetList: tc.apiWhitelist.SubnetList,\n\t\t\t\t\t\t},\n\t\t\t\t\t\tPublic: ConfigAPIWhitelistSecurityGroup{\n\t\t\t\t\t\t\tEnabled: tc.apiWhitelist.Enabled,\n\t\t\t\t\t\t\tSubnetList: tc.apiWhitelist.SubnetList,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tCIDRBlockAWSCNI: \"172.17.0.1/16\",\n\t\t\t\t\tRoute53Enabled: tc.route53Enabled,\n\t\t\t\t}\n\n\t\t\t\tr, err = New(c)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tcl := unittest.DefaultCAPIClusterWithLabels(tc.cr.Name, map[string]string{})\n\n\t\t\tparams, err := r.newParamsMain(tc.ctx, cl, tc.cr, time.Time{})\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\t\t\ttemplateBody, err := template.Render(params)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\t_, err = yaml.YAMLToJSONStrict([]byte(templateBody))\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\tp := filepath.Join(\"testdata\", unittest.NormalizeFileName(tc.name)+\".golden\")\n\n\t\t\tif *update {\n\t\t\t\terr := os.WriteFile(p, []byte(templateBody), 0644) // nolint: gosec\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}\n\t\t\tgoldenFile, err := os.ReadFile(p)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\tif !bytes.Equal([]byte(templateBody), goldenFile) {\n\t\t\t\tt.Fatalf(\"\\n\\n%s\\n\", cmp.Diff(string(goldenFile), templateBody))\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "9269be252f8726799fea1d921b04bdbc", "score": "0.4949243", "text": "func Test_GetAllConfigs_Empty(t *testing.T) {\n\tsetup(t)\n\tdefer cleanup(t)\n\n\tfor _, c := range allClients {\n\t\tw := request(t, \"GET\", c.PrivateEndpoint, nil)\n\t\tassert.Equal(t, http.StatusOK, w.Code)\n\t\tvar found ConfigsView\n\t\terr := json.Unmarshal(w.Body.Bytes(), &found)\n\t\tassert.NoError(t, err, \"Could not unmarshal JSON\")\n\t\tassert.Equal(t, ConfigsView{Configs: map[string]userconfig.View{}}, found)\n\t}\n}", "title": "" }, { "docid": "80b236ad0ccf40d6cb77e2b41a961607", "score": "0.4914693", "text": "func (self *Template) Templates() {\n\tfmt.Printf(\"CACHED TEMPLATES FOR '%s'\\n\", self.base)\n\tfor k, v := range self.cached {\n\t\tfmt.Printf(\"---\\nname: %s\\ntmpl: %v\\n\", k, v)\n\t}\n}", "title": "" }, { "docid": "594771f79c672c93cb6ba75d0feab443", "score": "0.49144232", "text": "func main() {\n\t// tpm is \"container\" holding all the parsed templates\n\t// if Execute multiple templates, it will execute the first one\n\ttmp, err := template.ParseGlob(\"templates/*.html\")\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\terr = tmp.ExecuteTemplate(os.Stdout, \"tmp.html\", nil)\n\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n}", "title": "" }, { "docid": "3ebaff26b5b4035c685b08f9c6d250c5", "score": "0.4903844", "text": "func (r Reports) Templates() (map[string]interface{}, error) {\n\treturn r.c.Request(\"reports/view/templates/\", nil)\n}", "title": "" }, { "docid": "38bd78633af01291585944dd87ad8fa0", "score": "0.4893969", "text": "func TestTemplates(t *testing.T) {\n\t// Here we create a temporary directory and populate it with our sample\n\t// template definition files; usually the template files would already\n\t// exist in some location known to the program.\n\tdir, err := createTestDir(testingTemplateFiles)\n\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\t// Clean up after the test; another quirk of running as an example.\n\tdefer os.RemoveAll(dir)\n\n\ttemplates, err := New(dir, \".html\", nil)\n\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\t//\n\t// 1: Test page + include + layout\n\t//\n\tdata := struct{ Name string }{\"John\"}\n\tb, err := templates.Compile(\"home\", data)\n\tif err != nil {\n\t\tlog.Fatalf(\"template execution: %s\", err)\n\t}\n\n\tgot := string(b.Bytes())\n\twant := \"Layout 1: John home John sidebar John\"\n\n\tif got != want {\n\t\tt.Errorf(\"handler returned wrong body:\\n\\tgot: %q\\n\\twant: %q\", got, want)\n\t}\n\n\t//\n\t// 2: Test layout isolation\n\t//\n\tdata = struct{ Name string }{\"Jane\"}\n\tb, err = templates.Compile(\"about\", data)\n\tif err != nil {\n\t\tlog.Fatalf(\"template execution: %s\", err)\n\t}\n\n\tgot = string(b.Bytes())\n\twant = \"Layout 2: Jane about Jane sidebar Jane\"\n\n\tif got != want {\n\t\tt.Errorf(\"handler returned wrong body:\\n\\tgot: %q\\n\\twant: %q\", got, want)\n\t}\n\n\t//\n\t// 3: Test HTTP handler\n\t//\n\treq, err := http.NewRequest(\"GET\", \"/\", nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\trr := httptest.NewRecorder()\n\n\trouter := http.NewServeMux()\n\trouter.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\tdata = struct{ Name string }{\"Bob\"}\n\t\terr := templates.Render(w, \"home\", data, http.StatusOK)\n\t\tif err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t}\n\t})\n\trouter.ServeHTTP(rr, req)\n\n\tgot = rr.Body.String()\n\twant = \"Layout 1: Bob home Bob sidebar Bob\"\n\n\tif status := rr.Code; status != http.StatusOK {\n\t\tt.Errorf(\"handler returned wrong status code: got %v want %v\", status, http.StatusOK)\n\t\tt.Error(rr.Body.String())\n\t}\n\n\tif got != want {\n\t\tt.Errorf(\"handler returned wrong body:\\n\\tgot: %q\\n\\twant: %q\", got, want)\n\t}\n}", "title": "" }, { "docid": "1d37ea40a54c8c612c527e4bc6f8bdc9", "score": "0.4893184", "text": "func (r *VirtualDiskTemplateResource) ListAll() (*VirtualDiskTemplateConfigList, error) {\n\tvar list VirtualDiskTemplateConfigList\n\tif err := r.c.ReadQuery(BasePath+VirtualDiskTemplateEndpoint, &list); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &list, nil\n}", "title": "" }, { "docid": "2c83d3622060e66f98c91814a3b1d7c7", "score": "0.48886114", "text": "func TestAll(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "3953be106751d861ff1021948f230ad5", "score": "0.4887799", "text": "func getTemplateStrings(embr *embeddableResources, templateNames []string) ([]string, error) {\n\ttemplateStrings := make([]string, len(templateNames))\n\tfor i, v := range templateNames {\n\t\tlog.Println(\"this is the template\", v)\n\t\tstr, err := embr.GetAsString(v)\n\t\tif err != nil {\n\t\t\treturn []string{}, err\n\t\t}\n\t\ttemplateStrings[i] = str\n\t}\n\treturn templateStrings, nil\n}", "title": "" }, { "docid": "e4c9df5eac54e06168753f2ea3376f6d", "score": "0.4885879", "text": "func listTests(ctx context.Context, cfg *Config) ([]*EntityResult, error) {\n\tvar tests []testing.EntityWithRunnabilityInfo\n\tif cfg.runLocal {\n\t\thst, err := connectToTarget(ctx, cfg)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tlocalTests, err := listLocalTests(ctx, cfg, hst)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttests = append(tests, localTests...)\n\t}\n\tif cfg.runRemote {\n\t\tremoteTests, err := listRemoteTests(ctx, cfg)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttests = append(tests, remoteTests...)\n\t}\n\n\tresults := make([]*EntityResult, len(tests))\n\tfor i := 0; i < len(tests); i++ {\n\t\tresults[i] = &EntityResult{EntityInfo: tests[i].EntityInfo, SkipReason: tests[i].SkipReason}\n\t}\n\treturn results, nil\n}", "title": "" }, { "docid": "303ed973ecda12d01f97a1063a4a8d85", "score": "0.48839048", "text": "func (o Scorecard) List() v1alpha3.TestList {\n\toutput := v1alpha3.NewTestList()\n\tfor _, stage := range o.Config.Stages {\n\t\ttests := o.selectTests(stage)\n\t\tfor _, test := range tests {\n\t\t\titem := v1alpha3.NewTest()\n\t\t\titem.Spec = test\n\t\t\toutput.Items = append(output.Items, item)\n\t\t}\n\t}\n\treturn output\n}", "title": "" }, { "docid": "ba867a3aaf48a7009261a5076b4044db", "score": "0.48536402", "text": "func loadTemplates(dir string) *template.Template {\n\n\tfuncMap := template.FuncMap{\n\t\t\"numVotes\": func(maimais []UserMaimai) []int {\n\t\t\tv := voteCount(len(maimais))\n\t\t\tvotes := make([]int, v)\n\t\t\tfor i := range votes {\n\t\t\t\tvotes[i] = i\n\t\t\t}\n\t\t\treturn votes\n\t\t},\n\t\t\"add\": func(a, b int) string {\n\t\t\treturn fmt.Sprintf(\"%02d\", a+b)\n\t\t},\n\t\t\"formatCW\": func(cw int) string {\n\t\t\treturn fmt.Sprintf(\"CW_%02d\", cw)\n\t\t},\n\t\t\"pathPrefix\": func(s string) string {\n\t\t\treturn filepath.Join(\"mm\", s)\n\t\t},\n\t\t\"toJson\": func(i interface{}) string {\n\t\t\tb, err := json.Marshal(i)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err)\n\t\t\t\treturn \"\"\n\t\t\t}\n\t\t\treturn base64.RawStdEncoding.EncodeToString(b)\n\t\t},\n\t\t\"formatTime\": func(t time.Time) string {\n\t\t\tw := t.Weekday()\n\n\t\t\tweekdays := []string{\"So\", \"Mo\", \"Di\", \"Mi\", \"Do\", \"Fr\", \"Sa\"}\n\t\t\treturn fmt.Sprintf(\"%s %s\", weekdays[w], t.Format(\"15:04\"))\n\t\t},\n\t}\n\n\treturn template.Must(template.New(\"templates\").Funcs(funcMap).ParseGlob(filepath.Join(dir, \"*.html\")))\n\n}", "title": "" }, { "docid": "2484a83333784fea9ad67ddc726c0477", "score": "0.48512617", "text": "func BuilderTestData() []common.TestBundle {\n\treturn []common.TestBundle{\n\t\t{\n\t\t\tDescription: \"Basic Test no builds\",\n\t\t\tData: templates.Args{\n\t\t\t\t\"Builder\": &resp.Builder{\n\t\t\t\t\tName: \"Sample Builder\",\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tDescription: \"Basic Test with builds\",\n\t\t\tData: templates.Args{\n\t\t\t\t\"Builder\": &resp.Builder{\n\t\t\t\t\tName: \"Sample Builder\",\n\t\t\t\t\tCurrentBuilds: []*resp.BuildSummary{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tLink: &resp.Link{\n\t\t\t\t\t\t\t\tURL: \"https://some.url/path\",\n\t\t\t\t\t\t\t\tLabel: \"Some current build\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tRevision: \"deadbeef\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tPendingBuilds: []*resp.BuildSummary{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tLink: &resp.Link{\n\t\t\t\t\t\t\t\tURL: \"https://some.url/path\",\n\t\t\t\t\t\t\t\tLabel: \"Some current build\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tRevision: \"deadbeef\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tFinishedBuilds: []*resp.BuildSummary{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tLink: &resp.Link{\n\t\t\t\t\t\t\t\tURL: \"https://some.url/path\",\n\t\t\t\t\t\t\t\tLabel: \"Some current build\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tRevision: \"deadbeef\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "a4628eb5fb424e6c5efbd31deb189271", "score": "0.48496825", "text": "func listRemoteTests(ctx context.Context, cfg *Config) ([]testing.EntityWithRunnabilityInfo, error) {\n\treturn runListTestsCommand(\n\t\tremoteRunnerCommand(ctx, cfg), cfg, cfg.remoteBundleGlob())\n}", "title": "" }, { "docid": "d59e911a8962ff59ec34f4aa6fcc1578", "score": "0.4844048", "text": "func ListTemplatesHandler(w http.ResponseWriter, r *http.Request) {\n\tauthHeader := r.Header.Get(\"Authorization\")\n\n\t// Ensure that the requesting entity can both authenticate to the PKI service, as well as\n\t// has authorization to access the List Templates endpoint\n\tstorage := context.Get(r, \"Storage\").(backend.Storage)\n\terr := storage.GetAccessControl().Authenticate(authHeader)\n\tif err != nil {\n\t\thttpErr := httperror.InvalidAuthn(err.Error())\n\t\thttp.Error(w, httpErr.JSON(), httpErr.HTTPResponse)\n\t\treturn\n\t}\n\n\terr = storage.GetAccessControl().ListTemplates(authHeader)\n\tif err != nil {\n\t\thttpErr := httperror.InvalidAuthz(err.Error())\n\t\thttp.Error(w, httpErr.JSON(), httpErr.HTTPResponse)\n\t\treturn\n\t}\n\n\ttemplateList, httpErr := pki.ListTemplate(storage)\n\tif httpErr != (httperror.HTTPError{}) {\n\t\thttp.Error(w, httpErr.JSON(), httpErr.HTTPResponse)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\terr = json.NewEncoder(w).Encode(templateList)\n\tif err != nil {\n\t\thttpErr := httperror.ResponseEncodeError(err.Error())\n\t\thttp.Error(w, httpErr.JSON(), httpErr.HTTPResponse)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "98e7ee77a13e5656d0fc03db5facf981", "score": "0.48430008", "text": "func (s *Server) GetTemplateList(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\n\tdb := database.GetClient()\n\ttemplates, err := db.Template.Query().All(ctx)\n\tif err != nil {\n\t\tlog.Ctx(ctx).Error().Err(err).Msg(\"fail to query template list from db\")\n\t\tsend(w, http.StatusInternalServerError, common.GetReason(\"unexpected db error\"))\n\t}\n\n\tvar resp []*common.Template\n\n\tfor _, t := range templates {\n\t\tresp = append(resp, t.ToCommonType())\n\t}\n\n\tsend(w, http.StatusOK, resp)\n\treturn\n}", "title": "" }, { "docid": "b9786ee31b19c69eb121c238ffd11667", "score": "0.48362675", "text": "func (t *FpdfTpl) Templates() []Template {\n\treturn t.templates\n}", "title": "" }, { "docid": "0411906a6554b50649d119b3bec86ccd", "score": "0.48315263", "text": "func generateTestDocuments(count int) []storage.Document {\n\tvar docs []storage.Document\n\n\tfor i := 0; i < count; i++ {\n\t\tdocs = append(docs, storage.Document{\n\t\t\tURL: \"http://go.dev\",\n\t\t\tTitle: fmt.Sprintf(\"About go %d\", i),\n\t\t})\n\t}\n\n\treturn docs\n}", "title": "" }, { "docid": "365d2d625388a1a38a6cefc38438c80b", "score": "0.4831395", "text": "func (b binaryDriver) Templates() (map[string]string, error) {\n\tvar templates map[string]string\n\terr := execute(string(b), \"templates\", nil, &templates, os.Stderr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn templates, nil\n}", "title": "" }, { "docid": "1ef0c4529351ca20f2e614f9562daf82", "score": "0.4826948", "text": "func (s *server) loadTemplates() {\n\ts.templates = template.Must(template.New(\"\").Delims(\"{%\", \"%}\").ParseGlob(\n\t\tfilepath.Join(*baseapp.ResourcesDir, \"*.html\"),\n\t))\n}", "title": "" }, { "docid": "597f368fed8a28197a1f6f56832422b7", "score": "0.47983468", "text": "func listAllUsers(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, usersTest)\n}", "title": "" }, { "docid": "0b2dd0d4c4be58631719024e46fb032f", "score": "0.47956476", "text": "func (s *Server) getTemplates() (*template.Template, error) {\n\tglobPath := path.Join(s.cfg.TemplateDir, \"*.tmpl\")\n\ttemplateFiles, err := filepath.Glob(globPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tchanged := false\n\tfor _, file := range templateFiles {\n\t\tif fileChanged(file) {\n\t\t\tlog.Debugf(\"Found (new/changed) template file '%s'\", file)\n\t\t\tchanged = true\n\t\t}\n\t}\n\n\tif changed {\n\t\tlog.Debug(\"Parsing all template files because of new/changed template files\")\n\t\ts.templates, err = template.New(\"\").Funcs(templateFuncs).ParseGlob(globPath)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn s.templates, nil\n}", "title": "" }, { "docid": "1a3885a45a06c774e630d77c62ede54b", "score": "0.47919148", "text": "func TestAdminGetTeacher(t *testing.T) {\n\n\ttmpl := template.Must(template.ParseGlob(\"../web/templates/*\"))\n\n\tgetteacherrepo := repository.NewprofileRepoMock(nil)\n\tgetteacherserv := service.NewProfileServiceImpl(getteacherrepo)\n\n\tadminGetTeacherHandler := handler.NewProfileHandler(tmpl, getteacherserv)\n\n\tmux := http.NewServeMux()\n\tmux.HandleFunc(\"/admin/teacher\", adminGetTeacherHandler.AdminGetTeacher)\n\tts := httptest.NewTLSServer(mux)\n\tdefer ts.Close()\n\n\ttc := ts.Client()\n\tsURL := ts.URL\n\n\tresp, err := tc.Get(sURL + \"/admin/teacher\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tif resp.StatusCode != http.StatusOK {\n\t\tt.Errorf(\"want %d, got %d\", http.StatusOK, resp.StatusCode)\n\t}\n\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tif !bytes.Contains(body, []byte(\"teacher\")) {\n\t\tt.Errorf(\"want body to contain %q\", body)\n\t}\n}", "title": "" }, { "docid": "c8d4956b19af6e57f706f22d07549e5e", "score": "0.47912997", "text": "func (h *EC2Helper) getLaunchTemplates(input *ec2.DescribeLaunchTemplatesInput) ([]*ec2.LaunchTemplate, error) {\n\n\tallLaunchTemplate := []*ec2.LaunchTemplate{}\n\n\terr := h.Svc.DescribeLaunchTemplatesPages(input, func(page *ec2.DescribeLaunchTemplatesOutput, lastPage bool) bool {\n\t\tallLaunchTemplate = append(allLaunchTemplate, page.LaunchTemplates...)\n\t\treturn !lastPage\n\t})\n\n\treturn allLaunchTemplate, err\n}", "title": "" }, { "docid": "bacea767c7651915a931ac1906dc335a", "score": "0.47815037", "text": "func GetDefaultTemplates() []string {\n\ttemplates := make([]string, 0)\n\tfor name := range defaultTemplates {\n\t\ttemplates = append(templates, name)\n\t}\n\treturn templates\n}", "title": "" }, { "docid": "8266288d146682cb9fb859331504ae75", "score": "0.47809234", "text": "func Test_GetAllConfigs_Newest(t *testing.T) {\n\tsetup(t)\n\tdefer cleanup(t)\n\n\tuserID := makeUserID()\n\n\tfor _, c := range allClients {\n\t\tc.post(t, userID, makeConfig())\n\t\tc.post(t, userID, makeConfig())\n\t\tlastCreated := c.post(t, userID, makeConfig())\n\n\t\tw := request(t, \"GET\", c.PrivateEndpoint, nil)\n\t\tassert.Equal(t, http.StatusOK, w.Code)\n\t\tvar found ConfigsView\n\t\terr := json.Unmarshal(w.Body.Bytes(), &found)\n\t\tassert.NoError(t, err, \"Could not unmarshal JSON\")\n\t\tassert.Equal(t, ConfigsView{Configs: map[string]userconfig.View{\n\t\t\tuserID: lastCreated,\n\t\t}}, found)\n\t}\n}", "title": "" }, { "docid": "80893bb6bbb45828971b9903eb796bfe", "score": "0.47794816", "text": "func setupTemplates(mapping map[string]string) map[string]*template.Template {\n\ttemplates := make(map[string]*template.Template)\n\n\tfor k, v := range mapping {\n\t\tt, err := template.ParseFiles(v)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\ttemplates[k] = t\n\t}\n\n\treturn templates\n}", "title": "" }, { "docid": "19f2b1034b0df1d2f6e8333543f821d6", "score": "0.4773613", "text": "func GetTemplates(u *User, id string) ([]*TemplateShort, error) {\n\tURL := buildURL(\"/templates?limit=100\")\n\tb, _, err := SendHTTPRequest(\"GET\", URL, u.Token, nil)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tvar t []*TemplateShort\n\tjson.Unmarshal(b, &t)\n\treturn t, nil\n}", "title": "" }, { "docid": "36bd66adeabd9b0498ea0ad4eec9b6a1", "score": "0.4773257", "text": "func loadTemplates() *template.Template {\n\ttmpl = template.New(\"\").Funcs(template.FuncMap{\n\t\t\"SubmitAndBackTitle\": submitAndBackTitle,\n\t\t\"SubmitAndViewTitle\": submitAndViewTitle,\n\t\t\"SiteTitle\": siteTitle,\n\t\t\"SiteName\": siteName,\n\t\t\"SignUpEnabled\": signUpEnabled,\n\t\t\"SidebarCategories\": sidebarCategories,\n\t\t\"SidebarTags\": sidebarTags,\n\t\t\"SearchDepartments\": searchDepartments,\n\t\t\"Truncate\": truncate,\n\t\t\"GetPriceData\": getPriceData,\n\t\t\"EqIDParentID\": eqIDParentID,\n\t\t\"FormatDateTime\": formatDateTime,\n\t\t\"Now\": now,\n\t\t\"SuperSaverURL\": superSaverURL,\n\t\t\"PrivacyPolicyURL\": privacyPolicyURL,\n\t\t\"AgreementURL\": agreementURL,\n\t\t\"DisclaimerURL\": disclaimerURL,\n\t\t\"WeAreSorryURL\": weAreSorryURL,\n\t\t\"PaymentMethodsURL\": paymentMethodsURL,\n\t\t\"ContactsURL\": contactsURL,\n\t\t\"AboutURL\": aboutURL,\n\t\t\"TotalProducts\": totalProducts,\n\t\t\"NoEscape\": noEscape,\n\t\t\"GenerateColor\": generateColor,\n\t\t\"AccountRoles\": accountRoles,\n\t\t\"PriceRanges\": PriceRanges,\n\t\t\"DiscountRanges\": DiscountRanges,\n\t\t\"NoItemsMessage\": noItemsMessage,\n\t\t\"StringSliceContains\": utility.StringSliceContains,\n\t\t\"NotEmpty\": notEmpty,\n\t\t\"NotEmptyDim\": notEmptyDim,\n\t\t\"ItemDimensions\": itemDimensions,\n\t\t\"PackageDimensions\": packageDimensions,\n\t\t\"ItemWeight\": itemWeight,\n\t\t\"PackageWeight\": packageWeight,\n\t\t\"ManufacturerRecommendedAge\": manufacturerRecommendedAge,\n\t\t\"ItemDate\": itemDate,\n\t\t\"UTCTime\": utcTimeStr,\n\t})\n\n\tfn := func(path string, f os.FileInfo, err error) error {\n\t\tif f.IsDir() != true && strings.HasSuffix(f.Name(), \".gohtml\") {\n\t\t\tvar err error\n\t\t\ttmpl, err = tmpl.ParseFiles(path)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"%s: %s\", path, err.Error())\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\n\terr := filepath.Walk(path.Join(config.AppPath, \"views\"), fn)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\treturn tmpl\n}", "title": "" }, { "docid": "e8e53e18b240ba3bfb2c76959df82bac", "score": "0.47718328", "text": "func init() {\n\t_ = pkger.Include(\"/templates\")\n}", "title": "" }, { "docid": "729294dde3a8810d8838a57978c65554", "score": "0.4771054", "text": "func TestRetrieveStandardTemplate(t *testing.T) {\n\ttests := []struct {\n\t\ttestName string\n\t\ttemplateKind TemplateKind\n\t\ttemplateName string\n\t}{\n\t\t{\n\t\t\ttestName: \"TemplateKindPulumiProject\",\n\t\t\ttemplateKind: TemplateKindPulumiProject,\n\t\t\ttemplateName: \"typescript\",\n\t\t},\n\t\t{\n\t\t\ttestName: \"TemplateKindPolicyPack\",\n\t\t\ttemplateKind: TemplateKindPolicyPack,\n\t\t\ttemplateName: \"aws-typescript\",\n\t\t},\n\t}\n\n\tfor _, tt := range tests {\n\t\ttt := tt\n\t\tt.Run(tt.testName, func(t *testing.T) {\n\t\t\trepository, err := RetrieveTemplates(tt.templateName, false, tt.templateKind)\n\t\t\tassert.Nil(t, err)\n\t\t\tassert.Equal(t, false, repository.ShouldDelete)\n\n\t\t\t// Root should point to Pulumi templates directory\n\t\t\t// (e.g. ~/.pulumi/templates or ~/.pulumi/templates-policy)\n\t\t\ttemplateDir, _ := GetTemplateDir(tt.templateKind)\n\t\t\tassert.Equal(t, templateDir, repository.Root)\n\n\t\t\t// SubDirectory should be a direct subfolder of Root with the name of the template\n\t\t\texpectedPath := filepath.Join(repository.Root, tt.templateName)\n\t\t\tassert.Equal(t, expectedPath, repository.SubDirectory)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "4ff1631d0be8886cb449b93276e83168", "score": "0.4771001", "text": "func initTemplateSet(env *common.Env, generateStaticAssets bool) {\n\n\tisokit.WebAppRoot = appRoot\n\tisokit.StaticAssetsPath = staticAssetsPath\n\tisokit.StaticTemplateBundleFilePath = staticAssetsPath + \"/templates/app.tmplbundle\"\n\tisokit.TemplateFilesPath = appRoot + \"/shared/templates\"\n\tisokit.TemplateFileExtension = \".gohtml\"\n\tisokit.PrefixNamePartial = \"parts/\"\n\n\ttemplateSet := isokit.NewTemplateSet()\n\ttemplateSet.Funcs = template.FuncMap{\n\t\t\"rubyformat\": templatefuncs.RubyDate,\n\t\t\"unixformat\": templatefuncs.UnixTime,\n\t\t\"productionmode\": templatefuncs.IsProduction}\n\ttemplateSet.GatherTemplates()\n\tenv.TemplateSet = templateSet\n\n}", "title": "" }, { "docid": "318b7d7a923a52d9953e26db477201c6", "score": "0.4768604", "text": "func getUITests(tcs []model.TestCase) []model.TestCase {\n\n\tuiTests := []model.TestCase{}\n\tconsentJobs := manifest.GetConsentJobs()\n\n\tfor _, test := range tcs {\n\t\t_, exists := consentJobs.Get(test.ID)\n\t\tif exists {\n\t\t\tlogrus.Tracef(\"skipping job %s\", test.ID)\n\t\t\tcontinue\n\t\t}\n\t\tuiTests = append(uiTests, test)\n\t}\n\n\treturn uiTests\n}", "title": "" }, { "docid": "ecf279388ea640d2ebae551f42d1cc91", "score": "0.47436082", "text": "func init() {\n\ttemplates.Funcs(funcMap)\n\tfor _, asset := range internal.AssetNames() {\n\t\ttemplates = template.Must(templates.New(asset).Parse(string(internal.MustAsset(asset))))\n\t}\n}", "title": "" }, { "docid": "4ed05870fcd1347b5a8093a8cd392cde", "score": "0.4734092", "text": "func loadTemplates() {\n\t// Read in all the templates. (./www/*html)\n\tvar allFiles []string\n\tfiles, err := ioutil.ReadDir(\"./www\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tfor _, file := range files {\n\t\tfilename := file.Name()\n\t\tfmt.Printf(\"Grabbing file: %s\\n\", filename)\n\t\tif strings.HasSuffix(filename, \".html\") {\n\t\t\tallFiles = append(allFiles, \"./www/\"+filename)\n\t\t}\n\t}\n\n\tfmt.Printf(\"allFiles is: %v\\n\", allFiles)\n\tt, err = template.ParseFiles(allFiles...) // parses all .tmpl or ./html files in the 'www' folder\n}", "title": "" }, { "docid": "6b8fe747585a0e642fa679bd55bb08fe", "score": "0.4727467", "text": "func (o *PackageAppOpts) getTemplates(env *archer.Environment) (*cfnTemplates, error) {\n\traw, err := o.ws.ReadFile(o.ws.AppManifestFileName(o.AppName))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tmft, err := manifest.UnmarshalApp(raw)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tproj, err := o.store.GetProject(o.ProjectName())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresources, err := o.describer.GetProjectResourcesByRegion(proj, env.Region)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trepoURL, ok := resources.RepositoryURLs[o.AppName]\n\tif !ok {\n\t\treturn nil, &errRepoNotFound{\n\t\t\tappName: o.AppName,\n\t\t\tenvRegion: env.Region,\n\t\t\tprojAccountID: proj.AccountID,\n\t\t}\n\t}\n\n\tswitch t := mft.(type) {\n\tcase *manifest.LBFargateManifest:\n\t\tcreateLBAppInput := &deploy.CreateLBFargateAppInput{\n\t\t\tApp: mft.(*manifest.LBFargateManifest),\n\t\t\tEnv: env,\n\t\t\tImageRepoURL: repoURL,\n\t\t\tImageTag: o.Tag,\n\t\t}\n\t\tvar appStack *stack.LBFargateStackConfig\n\t\t// If the project supports DNS Delegation, we'll also\n\t\t// make sure the app supports HTTPS\n\t\tif proj.RequiresDNSDelegation() {\n\t\t\tappStack = stack.NewHTTPSLBFargateStack(createLBAppInput)\n\t\t} else {\n\t\t\tappStack = stack.NewLBFargateStack(createLBAppInput)\n\t\t}\n\n\t\ttpl, err := appStack.Template()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tparams, err := appStack.SerializedParameters()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn &cfnTemplates{stack: tpl, configuration: params}, nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"create CloudFormation template for manifest of type %T\", t)\n\t}\n}", "title": "" }, { "docid": "cbc216bac1faf1537d300bc4c8f50eea", "score": "0.47199667", "text": "func readTemplates(dir string) ([]templates.ConstraintTemplate, error) {\n\tfileList, err := getFiles(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult := make([]templates.ConstraintTemplate, len(fileList))\n\tfor i, file := range fileList {\n\t\tyamlString, err := os.ReadFile(file)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcstr := &templv1beta1.ConstraintTemplate{}\n\t\tif err := yaml.Unmarshal(yamlString, cstr); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tunversioned := templates.ConstraintTemplate{}\n\t\tif err := runtimeScheme.Convert(cstr, &unversioned, nil); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult[i] = unversioned\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "e36fd42d7548c82ccf67de057e03a51e", "score": "0.4717332", "text": "func FetchVizierTemplates(conn *grpc.ClientConn, authToken, versionStr string) ([]*yamls.YAMLFile, error) {\n\treader, err := downloadVizierYAMLs(conn, authToken, versionStr, true)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer reader.Close()\n\n\tyamlMap, err := tar.ReadTarFileFromReader(reader)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Convert to YAML files, using the provided file names.\n\t// Get the YAML names, in order.\n\tyamlNames := make([]string, len(yamlMap))\n\ti := 0\n\tfor k := range yamlMap {\n\t\tyamlNames[i] = k\n\t\ti++\n\t}\n\tsort.Strings(yamlNames)\n\n\t// Write to YAMLFile slice.\n\tvar yamlFiles []*yamls.YAMLFile\n\tre := regexp.MustCompile(`(?:[0-9]+_)(.*)(?:\\.yaml)`)\n\tfor _, fName := range yamlNames {\n\t\t// The filename looks like \"./pixie_yamls/00_namespace.yaml\", we want to extract the \"namespace\".\n\t\tms := re.FindStringSubmatch(fName)\n\t\tif ms == nil || len(ms) != 2 {\n\t\t\tcontinue\n\t\t}\n\t\tyamlFiles = append(yamlFiles, &yamls.YAMLFile{\n\t\t\tName: ms[1],\n\t\t\tYAML: yamlMap[fName],\n\t\t})\n\t}\n\n\treturn yamlFiles, nil\n}", "title": "" }, { "docid": "b88b8233f00998e417cf4c7f5eb4118c", "score": "0.47070557", "text": "func test(t *testing.T, tmpl Template, values map[string]interface{}, cb func(values map[string]interface{})) {\n\tb, _, err := tmpl.RenderResult(TemplateRenderModeInstance, values)\n\tif err != nil {\n\t\tt.Log(string(b))\n\t\tt.Error(err)\n\t\treturn\n\t}\n\n\tvar instance interface{}\n\tif err := yaml.Unmarshal(b, &instance); err != nil {\n\t\tt.Log(string(b))\n\t\tt.Error(err)\n\t\treturn\n\t}\n\n\t// actually run the instance if not on CI\n\tif os.Getenv(\"CI\") == \"\" {\n\t\tcb(values)\n\t}\n}", "title": "" }, { "docid": "fadb74776f49e88e967b478d59c4893d", "score": "0.47052684", "text": "func GetTemplates(tempDir string) error {\n\tcommon.PrintlnL0(\"Checking templates in %s\", tempDir)\n\n\tvar tv common.TemplateDefinition\n\terr := common.FetchJSON(strings.Replace(templatePath, \"{{.branch}}\", flagBranch, -1), nil, &tv)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// is there a local copy?\n\tif _, err := os.Stat(filepath.Join(tempDir, \"templates.json\")); os.IsNotExist(err) {\n\t\t// no file. downloading\n\t\tcommon.PrintlnL1(\"No local templates found. Downloading now.\")\n\t\terr := os.MkdirAll(tempDir, 0777)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = common.DownloadTemplates(tempDir, tv, templatePath, flagBranch)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// load the local json\n\ttemplatesLocal, err := ioutil.ReadFile(filepath.Join(tempDir, \"templates.json\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar localTv common.TemplateDefinition\n\terr = json.Unmarshal(templatesLocal, &localTv)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// compare\n\tif localTv.Version != tv.Version {\n\t\tcommon.PrintlnL2(\"Newer templates found. Downloading them now\")\n\t\t// they are different, we need to download the new ones\n\t\terr = common.DownloadTemplates(tempDir, tv, templatePath, flagBranch)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tcommon.PrintlnL1(\"Local templates are up to date\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f3cf50547d269974ff84c1ed49c238e4", "score": "0.4704899", "text": "func (s *Setup) ParseTemplates() error {\n\tfuncMap := template.FuncMap{\n\t\t\"postStarCount\": postStarCount(),\n\t\t\"postCommentCount\": postCommentCount(),\n\t\t\"PreviewTextRelease\": PreviewTextRelease,\n\t}\n\ttemp := template.New(\"issue1\")\n\ttemp.Funcs(funcMap)\n\ttemp, err := temp.ParseGlob(s.TemplatesStoragePath + \"/*\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog.Printf(\"%s\\n\", temp.DefinedTemplates())\n\ts.templates = temp\n\treturn nil\n}", "title": "" }, { "docid": "94e4c77bef062ea5459dec4a9569d55b", "score": "0.47029626", "text": "func LoadTemplates(tt *Templates, p string) error {\n\tvar err error\n\n\t// if tt.Dashboard, err = pc.ExtendTemplate(\n\t// \ttt.Templates.Dashboard,\n\t// \tfp.Join(p, \"page/dashboard.html\"),\n\t// ); err != nil {\n\t// \treturn err\n\t// }\n\n\tfuncs := t.FuncMap{\n\t\t\"formatTimeStamp\": func(timestamp int64) string {\n\t\t\treturn time.Unix(timestamp, 0).Format(\"02 Jan 2006\")\n\t\t},\n\t\t\"formatCurrency\": func(amount int64, currency stripe.Currency) string {\n\t\t\treturn fmt.Sprintf(\"%.2f %s\", float64(amount)/100.00, strings.ToUpper(string(currency)))\n\t\t},\n\t}\n\n\tif tt.Invoice, err = t.New(\"invoice.html.tmpl\").Funcs(funcs).ParseFiles(fp.Join(p, \"page/invoice.html.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\n\tif tt.InvoiceList, err = t.New(\"invoice-list.html.tmpl\").Funcs(funcs).ParseFiles(fp.Join(p, \"page/invoice-list.html.tmpl\")); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "86f755cdc88a62b4963d797eac4bbd4c", "score": "0.47025022", "text": "func buildTemplates() {\n\tvar err error\n\tmainPage, err = template.ParseFiles(\"templates/main.tpl\")\n\tif err != nil {\n\t\tlog.Fatal(\"main template parse error\", err)\n\t}\n\tappPage, err = template.ParseFiles(\"templates/app.tpl\")\n\tif err != nil {\n\t\tlog.Fatal(\"app template parse error\", err)\n\t}\n}", "title": "" }, { "docid": "b00f3c94f7b8ad2388783712203f91dc", "score": "0.4680932", "text": "func (g generator) GenerateManifestTests(log *logrus.Entry, config GeneratorConfig, discovery discovery.ModelDiscovery,\n\tctx *model.Context, conditionalProperties []discovery.ConditionalAPIProperties) (SpecRun, manifest.Scripts, map[string][]manifest.RequiredTokens) {\n\tlog = log.WithField(\"module\", \"GenerateManifestTests\")\n\tfor k, item := range discovery.DiscoveryItems {\n\t\tspectype, err := manifest.GetSpecType(item.APISpecification.SchemaVersion)\n\t\tif err != nil {\n\t\t\tlogrus.Warnf(\"Cannot get spec type from schema version: \" + item.APISpecification.SchemaVersion)\n\t\t\tlog.Warnf(\"specification %s not found\", item.APISpecification.SchemaVersion)\n\t\t\tcontinue\n\t\t}\n\n\t\tlog.Debugf(\"Generating testcases for %s API\", spectype)\n\t\tdiscovery.DiscoveryItems[k].APISpecification.SpecType = spectype\n\t}\n\n\tspecTestCases := []SpecificationTestCases{}\n\tscrSlice := []model.SpecConsentRequirements{}\n\tvar filteredScripts manifest.Scripts\n\ttokens := map[string][]manifest.RequiredTokens{}\n\n\tfor _, item := range discovery.DiscoveryItems {\n\t\tvalidator, err := schema.NewSwaggerOBSpecValidator(item.APISpecification.Name, item.APISpecification.Version)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Warnf(\"manifest testcase generation failed for %s\", item.APISpecification.SchemaVersion)\n\t\t\tvalidator = schema.NewNullValidator()\n\t\t}\n\t\tlog.WithFields(logrus.Fields{\"name\": item.APISpecification.Name, \"version\": item.APISpecification.Version}).\n\t\t\tInfo(\"swagger spec validator created\")\n\n\t\t//scripts, _, err := manifest.LoadGenerationResources(specType, item.APISpecification.Manifest)\n\n\t\tparams := manifest.GenerationParameters{\n\t\t\t//\tScripts: scripts,\n\t\t\tSpec: item.APISpecification,\n\t\t\tBaseurl: item.ResourceBaseURI,\n\t\t\tCtx: ctx,\n\t\t\tEndpoints: item.Endpoints,\n\t\t\tManifestPath: item.APISpecification.Manifest,\n\t\t\tValidator: validator,\n\t\t\tConditional: conditionalProperties,\n\t\t}\n\t\ttcs, fsc, err := manifest.GenerateTestCases(&params)\n\n\t\tfilteredScripts = fsc\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"manifest testcase generation failed for %s\", item.APISpecification.SchemaVersion)\n\t\t\tcontinue\n\t\t}\n\n\t\tspectype := item.APISpecification.SpecType\n\t\trequiredSpecTokens, err := manifest.GetRequiredTokensFromTests(tcs, spectype)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"failed to retrieve required spec tokens from test for spec %s\", spectype)\n\t\t\tcontinue\n\t\t}\n\t\tlogrus.Debugf(\"%s required spec tokens: %+v\", spectype, requiredSpecTokens)\n\t\tspecreq, err := getSpecConsentsFromRequiredTokens(requiredSpecTokens, item.APISpecification.Name)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"failed to retrieve spec consents from required spec tokens for spec %s\", spectype)\n\t\t\tcontinue\n\t\t}\n\t\tscrSlice = append(scrSlice, specreq)\n\t\tif spectype == \"payments\" || spectype == \"cbpii\" { //\n\t\t\t// three sets of test case. all, UI, consent (Non-ui)\n\t\t\ttcs = getUITests(tcs)\n\t\t}\n\t\tstc := SpecificationTestCases{Specification: item.APISpecification, TestCases: tcs}\n\t\tlogrus.Debugf(\"%d test cases generated for %s\", len(tcs), item.APISpecification.Name)\n\t\tspecTestCases = append(specTestCases, stc)\n\t\ttokens[spectype] = requiredSpecTokens\n\t}\n\n\tfor _, item := range scrSlice {\n\t\tlogrus.Tracef(\"%#v\", item)\n\t}\n\tfor _, v := range tokens {\n\t\tlogrus.Tracef(\"%#v\", v)\n\t}\n\treturn SpecRun{specTestCases, scrSlice}, filteredScripts, tokens\n}", "title": "" }, { "docid": "1d17295e6281207cca807e9457fbed85", "score": "0.4677056", "text": "func getScenarioTest(e *httpexpect.Expect, t *testing.T) {\n\ttestCases := []testCase{\n\t\tnotAdminTestCase,\n\t\t{\n\t\t\tToken: testCtx.Admin.Token,\n\t\t\tStatus: http.StatusOK,\n\t\t\tBodyContains: []string{\"Scenario\", \"name\", \"descript\", \"Scénario 750 M€ pour 2018\"}},\n\t}\n\tf := func(tc testCase) *httpexpect.Response {\n\t\treturn e.GET(\"/api/scenarios\").\n\t\t\tWithHeader(\"Authorization\", \"Bearer \"+tc.Token).Expect()\n\t}\n\tfor _, r := range chkTestCases(testCases, f, \"GetScenarios\") {\n\t\tt.Error(r)\n\t}\n}", "title": "" }, { "docid": "1def379ab2f7422ebf52b84f4e91ef22", "score": "0.4676899", "text": "func InitTemplates(done chan<- struct{}) {\n\ttemplateutil.MustInit(IndexTemplate)\n\tif done != nil {\n\t\tdone <- struct{}{}\n\t}\n}", "title": "" }, { "docid": "684af82795a5cdc63cc43bcb1924cab8", "score": "0.46674263", "text": "func renderKappTemplates(stackObj interfaces.IStack, installableObj interfaces.IInstallable,\n\tinstallerVars map[string]interface{}, dryRun bool) error {\n\n\t// merge all the vars required to render the kapp's sugarkube.yaml file\n\ttemplatedVars, err := stackObj.GetTemplatedVars(installableObj, installerVars)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\t// template the descriptor again in case variables refer to outputs\n\terr = installableObj.TemplateDescriptor(templatedVars)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\t// get the updated template vars\n\ttemplatedVars, err = stackObj.GetTemplatedVars(installableObj, installerVars)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\trenderedTemplatePaths, err := installableObj.RenderTemplates(templatedVars, stackObj.GetConfig(),\n\t\tdryRun)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\t// merge renderedTemplates into the templatedVars under the \"kapp.templates\" key. This will\n\t// allow us to support writing files to temporary (dynamic) locations later if we like\n\trenderedTemplatesMap := map[string]interface{}{\n\t\tconstants.KappVarsKappKey: map[string]interface{}{\n\t\t\tconstants.KappVarsTemplatesKey: renderedTemplatePaths,\n\t\t},\n\t}\n\n\tlog.Logger.Debugf(\"Merging rendered template paths into stack config: %#v\",\n\t\trenderedTemplatePaths)\n\n\terr = mergo.Merge(&templatedVars, renderedTemplatesMap, mergo.WithOverride)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\t// remerge and template the kapp's descriptor so it can access the paths of any rendered templates\n\terr = installableObj.TemplateDescriptor(templatedVars)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7b9dee5766a774c17c86ea6f6879635b", "score": "0.46650168", "text": "func init() {\n\ttmpl = template.Must(template.ParseGlob(\"app/view/*.html\"))\n}", "title": "" }, { "docid": "8539243079754b1e7846d9256f8db5d2", "score": "0.46647772", "text": "func (s *ConfigParserSuite) createDefaultTemplates() (err error) {\n\t// let us start from 3 basic templates\n\ttpl1 := `{\n\t\t\"device_type\": \"type1\",\n\t\t\"snmp_version\": \"1\"\n\t}`\n\n\ttpl2 := `{\n\t\t\"device_type\": \"type2\",\n\t\t\"community\": \"test\",\n\t\t\"snmp_version\": \"1\",\n\t\t\"channels\": [\n\t\t\t{\n\t\t\t\t\"name\": \"channel1\",\n\t\t\t\t\"oid\": \".1.2.3.4.4\",\n\t\t\t\t\"type\": \"value\",\n\t\t\t\t\"units\": \"U\"\n\t\t\t},\n\t\t\t{\n\t\t\t\t\"name\": \"channel2\",\n\t\t\t\t\"oid\": \".1.2.3.4.5\"\n\t\t\t}\n\t\t]\n\t}`\n\n\ttpl3 := `{\n\t\t\"device_type\": \"type3\",\n\t\t\"community\": \"demo\",\n\t\t\"channels\": [\n\t\t\t{\n\t\t\t\t\"name\": \"channel1\",\n\t\t\t\t\"oid\": \".2.3.4.5\",\n\t\t\t\t\"poll_interval\": 1234\n\t\t\t}\n\t\t]\n\t}`\n\n\t// write these templates into separate files in current dir (which is\n\t// temp dir already)\n\tif err = ioutil.WriteFile(\"config-type1.json\", []byte(tpl1), os.ModePerm); err != nil {\n\t\treturn\n\t}\n\tif err = ioutil.WriteFile(\"config-type2.json\", []byte(tpl2), os.ModePerm); err != nil {\n\t\treturn\n\t}\n\tif err = ioutil.WriteFile(\"config-type3.json\", []byte(tpl3), os.ModePerm); err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "92859d2d9a5eabcf70355e1892c9e71d", "score": "0.46564507", "text": "func TemplateScriptList(c *cli.Context) error {\n\tdebugCmdFuncInfo(c)\n\ttemplateScriptSvc, formatter := WireUpTemplate(c)\n\n\tcheckRequiredFlags(c, []string{\"template-id\", \"type\"}, formatter)\n\ttemplateScripts, err := templateScriptSvc.GetTemplateScriptList(c.String(\"template-id\"), c.String(\"type\"))\n\tif err != nil {\n\t\tformatter.PrintFatal(\"Couldn't receive templateScript data\", err)\n\t}\n\tif err = formatter.PrintList(templateScripts); err != nil {\n\t\tformatter.PrintFatal(\"Couldn't print/format result\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "71e2128845d43faacb96f382f911a877", "score": "0.46550438", "text": "func listLocalTests(ctx context.Context, cfg *Config, hst *ssh.Conn) ([]testing.EntityWithRunnabilityInfo, error) {\n\treturn runListTestsCommand(\n\t\tlocalRunnerCommand(ctx, cfg, hst), cfg, cfg.localBundleGlob())\n}", "title": "" }, { "docid": "15629f92d631e090fe3ef274df5ff92b", "score": "0.4650704", "text": "func (s *TemplatesService) ListTemplates(headers, queryParams map[string]interface{}) ([]types.Template, *http.Response, error) {\n\tvar err error\n\tvar respBody200 []types.Template\n\n\tresp, err := s.client.doReqNoBody(\"GET\", s.client.BaseURI+\"/templates\", headers, queryParams)\n\tif err != nil {\n\t\treturn respBody200, nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tswitch resp.StatusCode {\n\tcase 200:\n\t\terr = json.NewDecoder(resp.Body).Decode(&respBody200)\n\tdefault:\n\t\terr = goraml.NewAPIError(resp, nil)\n\t}\n\n\treturn respBody200, resp, err\n}", "title": "" }, { "docid": "76a8003c8288d5ea423332bf008abb85", "score": "0.46414104", "text": "func RunTestTemplate(t *testing.T, file string, server *APIServer, context map[string]interface{}) {\n\tts, err := LoadTest(file, context)\n\trequire.NoError(t, err)\n\tRunCleanTestScenario(t, ts, server)\n}", "title": "" }, { "docid": "1d118bd26148168b02bc365aef9440e1", "score": "0.46381277", "text": "func buildbucketBuildTestData() []TestBundle {\n\tbundles := []TestBundle{}\n\tfor _, tc := range []string{\"linux-rel\", \"MacTests\", \"scheduled\"} {\n\t\tbuild, err := GetTestBuild(\"../buildsource/buildbucket\", tc)\n\t\tif err != nil {\n\t\t\tpanic(fmt.Errorf(\"Encountered error while fetching %s.\\n%s\", tc, err))\n\t\t}\n\t\tbundles = append(bundles, TestBundle{\n\t\t\tDescription: fmt.Sprintf(\"Test page: %s\", tc),\n\t\t\tData: templates.Args{\n\t\t\t\t\"BuildPage\": &ui.BuildPage{\n\t\t\t\t\tBuild: ui.Build{\n\t\t\t\t\t\tBuild: build,\n\t\t\t\t\t\tNow: nowTS,\n\t\t\t\t\t},\n\t\t\t\t\tBuildbucketHost: \"example.com\",\n\t\t\t\t},\n\t\t\t\t\"XsrfTokenField\": template.HTML(`<input name=\"[XSRF Token]\" type=\"hidden\" value=\"[XSRF Token]\">`),\n\t\t\t\t\"RetryRequestID\": \"[Retry Request ID]\",\n\t\t\t},\n\t\t})\n\t}\n\treturn bundles\n}", "title": "" } ]
ec6002194ff04a1dc915cce64df82187
AssignProperties_From_VMSizeProperties populates our VMSizeProperties from the provided source VMSizeProperties
[ { "docid": "88b8b55a5ea515299a4f16dc280dd7b4", "score": "0.7934809", "text": "func (properties *VMSizeProperties) AssignProperties_From_VMSizeProperties(source *v1beta20220301s.VMSizeProperties) error {\n\n\t// VCPUsAvailable\n\tproperties.VCPUsAvailable = genruntime.ClonePointerToInt(source.VCPUsAvailable)\n\n\t// VCPUsPerCore\n\tproperties.VCPUsPerCore = genruntime.ClonePointerToInt(source.VCPUsPerCore)\n\n\t// No error\n\treturn nil\n}", "title": "" } ]
[ { "docid": "9f9058fa073daaca1641932d3adac8eb", "score": "0.6947583", "text": "func (properties *VMSizeProperties) AssignProperties_To_VMSizeProperties(destination *v1beta20220301s.VMSizeProperties) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// VCPUsAvailable\n\tdestination.VCPUsAvailable = genruntime.ClonePointerToInt(properties.VCPUsAvailable)\n\n\t// VCPUsPerCore\n\tdestination.VCPUsPerCore = genruntime.ClonePointerToInt(properties.VCPUsPerCore)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "ad8e31c7016b62de7d9df436e8a13015", "score": "0.68030477", "text": "func (properties *VMSizeProperties_STATUS) AssignProperties_From_VMSizeProperties_STATUS(source *v1beta20220301s.VMSizeProperties_STATUS) error {\n\n\t// VCPUsAvailable\n\tproperties.VCPUsAvailable = genruntime.ClonePointerToInt(source.VCPUsAvailable)\n\n\t// VCPUsPerCore\n\tproperties.VCPUsPerCore = genruntime.ClonePointerToInt(source.VCPUsPerCore)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "aef891eac071f964aafd2dfc9b1a1bc8", "score": "0.64107764", "text": "func (properties *VMSizeProperties) PopulateFromARM(owner genruntime.ArbitraryOwnerReference, armInput interface{}) error {\n\ttypedInput, ok := armInput.(VMSizeProperties_ARM)\n\tif !ok {\n\t\treturn fmt.Errorf(\"unexpected type supplied for PopulateFromARM() function. Expected VMSizeProperties_ARM, got %T\", armInput)\n\t}\n\n\t// Set property \"VCPUsAvailable\":\n\tif typedInput.VCPUsAvailable != nil {\n\t\tvcpUsAvailable := *typedInput.VCPUsAvailable\n\t\tproperties.VCPUsAvailable = &vcpUsAvailable\n\t}\n\n\t// Set property \"VCPUsPerCore\":\n\tif typedInput.VCPUsPerCore != nil {\n\t\tvcpUsPerCore := *typedInput.VCPUsPerCore\n\t\tproperties.VCPUsPerCore = &vcpUsPerCore\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "dc09aab36f5b374a47adf470eab19b09", "score": "0.6383424", "text": "func (properties *VMSizeProperties_STATUS) AssignProperties_To_VMSizeProperties_STATUS(destination *v1beta20220301s.VMSizeProperties_STATUS) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// VCPUsAvailable\n\tdestination.VCPUsAvailable = genruntime.ClonePointerToInt(properties.VCPUsAvailable)\n\n\t// VCPUsPerCore\n\tdestination.VCPUsPerCore = genruntime.ClonePointerToInt(properties.VCPUsPerCore)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "3677b88f72d008f220311e2e6a910b6f", "score": "0.6037273", "text": "func (settings *ElasticPoolPerDatabaseSettings) AssignProperties_From_ElasticPoolPerDatabaseSettings(source *v20211101s.ElasticPoolPerDatabaseSettings) error {\n\n\t// MaxCapacity\n\tif source.MaxCapacity != nil {\n\t\tmaxCapacity := *source.MaxCapacity\n\t\tsettings.MaxCapacity = &maxCapacity\n\t} else {\n\t\tsettings.MaxCapacity = nil\n\t}\n\n\t// MinCapacity\n\tif source.MinCapacity != nil {\n\t\tminCapacity := *source.MinCapacity\n\t\tsettings.MinCapacity = &minCapacity\n\t} else {\n\t\tsettings.MinCapacity = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "c1b8b746938ae36c6bdc2d47fec61c55", "score": "0.5857619", "text": "func (pool *Servers_ElasticPool_Spec) AssignProperties_From_Servers_ElasticPool_Spec(source *v20211101s.Servers_ElasticPool_Spec) error {\n\n\t// AzureName\n\tpool.AzureName = source.AzureName\n\n\t// HighAvailabilityReplicaCount\n\tpool.HighAvailabilityReplicaCount = genruntime.ClonePointerToInt(source.HighAvailabilityReplicaCount)\n\n\t// LicenseType\n\tif source.LicenseType != nil {\n\t\tlicenseType := ElasticPoolProperties_LicenseType(*source.LicenseType)\n\t\tpool.LicenseType = &licenseType\n\t} else {\n\t\tpool.LicenseType = nil\n\t}\n\n\t// Location\n\tpool.Location = genruntime.ClonePointerToString(source.Location)\n\n\t// MaintenanceConfigurationId\n\tpool.MaintenanceConfigurationId = genruntime.ClonePointerToString(source.MaintenanceConfigurationId)\n\n\t// MaxSizeBytes\n\tpool.MaxSizeBytes = genruntime.ClonePointerToInt(source.MaxSizeBytes)\n\n\t// MinCapacity\n\tif source.MinCapacity != nil {\n\t\tminCapacity := *source.MinCapacity\n\t\tpool.MinCapacity = &minCapacity\n\t} else {\n\t\tpool.MinCapacity = nil\n\t}\n\n\t// Owner\n\tif source.Owner != nil {\n\t\towner := source.Owner.Copy()\n\t\tpool.Owner = &owner\n\t} else {\n\t\tpool.Owner = nil\n\t}\n\n\t// PerDatabaseSettings\n\tif source.PerDatabaseSettings != nil {\n\t\tvar perDatabaseSetting ElasticPoolPerDatabaseSettings\n\t\terr := perDatabaseSetting.AssignProperties_From_ElasticPoolPerDatabaseSettings(source.PerDatabaseSettings)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ElasticPoolPerDatabaseSettings() to populate field PerDatabaseSettings\")\n\t\t}\n\t\tpool.PerDatabaseSettings = &perDatabaseSetting\n\t} else {\n\t\tpool.PerDatabaseSettings = nil\n\t}\n\n\t// Sku\n\tif source.Sku != nil {\n\t\tvar sku Sku\n\t\terr := sku.AssignProperties_From_Sku(source.Sku)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_Sku() to populate field Sku\")\n\t\t}\n\t\tpool.Sku = &sku\n\t} else {\n\t\tpool.Sku = nil\n\t}\n\n\t// Tags\n\tpool.Tags = genruntime.CloneMapOfStringToString(source.Tags)\n\n\t// ZoneRedundant\n\tif source.ZoneRedundant != nil {\n\t\tzoneRedundant := *source.ZoneRedundant\n\t\tpool.ZoneRedundant = &zoneRedundant\n\t} else {\n\t\tpool.ZoneRedundant = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "3909ff471d58ec2cbb855529e64e6b96", "score": "0.5726887", "text": "func (properties *KeyVaultProperties) AssignProperties_From_KeyVaultProperties(source *v1beta20210901s.KeyVaultProperties) error {\n\n\t// Identity\n\tproperties.Identity = genruntime.ClonePointerToString(source.Identity)\n\n\t// KeyIdentifier\n\tproperties.KeyIdentifier = genruntime.ClonePointerToString(source.KeyIdentifier)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "1773a997ff693d87874a9a25f0db8fce", "score": "0.56820494", "text": "func (virtualNetworkTap *VirtualNetworkTap) AssignPropertiesFromVirtualNetworkTap(source *v1alpha1api20201101storage.VirtualNetworkTap) error {\n\n\t// Spec\n\tvar spec VirtualNetworkTaps_Spec\n\terr := spec.AssignPropertiesFromVirtualNetworkTapsSpec(&source.Spec)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"populating Spec from Spec, calling AssignPropertiesFromVirtualNetworkTapsSpec()\")\n\t}\n\tvirtualNetworkTap.Spec = spec\n\n\t// Status\n\tvar status VirtualNetworkTap_Status_VirtualNetworkTap_SubResourceEmbedded\n\terr = status.AssignPropertiesFromVirtualNetworkTapStatusVirtualNetworkTapSubResourceEmbedded(&source.Status)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"populating Status from Status, calling AssignPropertiesFromVirtualNetworkTapStatusVirtualNetworkTapSubResourceEmbedded()\")\n\t}\n\tvirtualNetworkTap.Status = status\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "49f49effd444c2e22b537248e31e5264", "score": "0.5645201", "text": "func (properties *KeyVaultProperties) AssignProperties_From_KeyVaultProperties(source *v20210101s.KeyVaultProperties) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// KeyIdentifier\n\tproperties.KeyIdentifier = genruntime.ClonePointerToString(source.KeyIdentifier)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tproperties.PropertyBag = propertyBag\n\t} else {\n\t\tproperties.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForKeyVaultProperties interface (if implemented) to customize the conversion\n\tvar propertiesAsAny any = properties\n\tif augmentedProperties, ok := propertiesAsAny.(augmentConversionForKeyVaultProperties); ok {\n\t\terr := augmentedProperties.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "59bc7af7f264c6aec914998ca1d780f4", "score": "0.5625392", "text": "func (properties *VMSizeProperties) ConvertToARM(resolved genruntime.ConvertToARMResolvedDetails) (interface{}, error) {\n\tif properties == nil {\n\t\treturn nil, nil\n\t}\n\tresult := &VMSizeProperties_ARM{}\n\n\t// Set property \"VCPUsAvailable\":\n\tif properties.VCPUsAvailable != nil {\n\t\tvcpUsAvailable := *properties.VCPUsAvailable\n\t\tresult.VCPUsAvailable = &vcpUsAvailable\n\t}\n\n\t// Set property \"VCPUsPerCore\":\n\tif properties.VCPUsPerCore != nil {\n\t\tvcpUsPerCore := *properties.VCPUsPerCore\n\t\tresult.VCPUsPerCore = &vcpUsPerCore\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "c48305e447e4f7275764e80152eb4b33", "score": "0.56084615", "text": "func (profile *HardwareProfile) AssignProperties_From_HardwareProfile(source *v1beta20220301s.HardwareProfile) error {\n\n\t// VmSize\n\tif source.VmSize != nil {\n\t\tvmSize := HardwareProfile_VmSize(*source.VmSize)\n\t\tprofile.VmSize = &vmSize\n\t} else {\n\t\tprofile.VmSize = nil\n\t}\n\n\t// VmSizeProperties\n\tif source.VmSizeProperties != nil {\n\t\tvar vmSizeProperty VMSizeProperties\n\t\terr := vmSizeProperty.AssignProperties_From_VMSizeProperties(source.VmSizeProperties)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VMSizeProperties() to populate field VmSizeProperties\")\n\t\t}\n\t\tprofile.VmSizeProperties = &vmSizeProperty\n\t} else {\n\t\tprofile.VmSizeProperties = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "4d0e3640558b8783a8c70c2cc2340e31", "score": "0.560559", "text": "func (properties *VMSizeProperties_STATUS) PopulateFromARM(owner genruntime.ArbitraryOwnerReference, armInput interface{}) error {\n\ttypedInput, ok := armInput.(VMSizeProperties_STATUS_ARM)\n\tif !ok {\n\t\treturn fmt.Errorf(\"unexpected type supplied for PopulateFromARM() function. Expected VMSizeProperties_STATUS_ARM, got %T\", armInput)\n\t}\n\n\t// Set property \"VCPUsAvailable\":\n\tif typedInput.VCPUsAvailable != nil {\n\t\tvcpUsAvailable := *typedInput.VCPUsAvailable\n\t\tproperties.VCPUsAvailable = &vcpUsAvailable\n\t}\n\n\t// Set property \"VCPUsPerCore\":\n\tif typedInput.VCPUsPerCore != nil {\n\t\tvcpUsPerCore := *typedInput.VCPUsPerCore\n\t\tproperties.VCPUsPerCore = &vcpUsPerCore\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "5e18c8d9e3045a635d14f6911b24894b", "score": "0.55762917", "text": "func (virtualNetworkTapsSpec *VirtualNetworkTaps_Spec) AssignPropertiesFromVirtualNetworkTapsSpec(source *v1alpha1api20201101storage.VirtualNetworkTaps_Spec) error {\n\n\t// AzureName\n\tvirtualNetworkTapsSpec.AzureName = source.AzureName\n\n\t// DestinationLoadBalancerFrontEndIPConfiguration\n\tif source.DestinationLoadBalancerFrontEndIPConfiguration != nil {\n\t\tvar destinationLoadBalancerFrontEndIPConfiguration SubResource\n\t\terr := destinationLoadBalancerFrontEndIPConfiguration.AssignPropertiesFromSubResource(source.DestinationLoadBalancerFrontEndIPConfiguration)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating DestinationLoadBalancerFrontEndIPConfiguration from DestinationLoadBalancerFrontEndIPConfiguration, calling AssignPropertiesFromSubResource()\")\n\t\t}\n\t\tvirtualNetworkTapsSpec.DestinationLoadBalancerFrontEndIPConfiguration = &destinationLoadBalancerFrontEndIPConfiguration\n\t} else {\n\t\tvirtualNetworkTapsSpec.DestinationLoadBalancerFrontEndIPConfiguration = nil\n\t}\n\n\t// DestinationNetworkInterfaceIPConfiguration\n\tif source.DestinationNetworkInterfaceIPConfiguration != nil {\n\t\tvar destinationNetworkInterfaceIPConfiguration SubResource\n\t\terr := destinationNetworkInterfaceIPConfiguration.AssignPropertiesFromSubResource(source.DestinationNetworkInterfaceIPConfiguration)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating DestinationNetworkInterfaceIPConfiguration from DestinationNetworkInterfaceIPConfiguration, calling AssignPropertiesFromSubResource()\")\n\t\t}\n\t\tvirtualNetworkTapsSpec.DestinationNetworkInterfaceIPConfiguration = &destinationNetworkInterfaceIPConfiguration\n\t} else {\n\t\tvirtualNetworkTapsSpec.DestinationNetworkInterfaceIPConfiguration = nil\n\t}\n\n\t// DestinationPort\n\tif source.DestinationPort != nil {\n\t\tdestinationPort := *source.DestinationPort\n\t\tvirtualNetworkTapsSpec.DestinationPort = &destinationPort\n\t} else {\n\t\tvirtualNetworkTapsSpec.DestinationPort = nil\n\t}\n\n\t// Location\n\tif source.Location != nil {\n\t\tvirtualNetworkTapsSpec.Location = *source.Location\n\t} else {\n\t\tvirtualNetworkTapsSpec.Location = \"\"\n\t}\n\n\t// Owner\n\tvirtualNetworkTapsSpec.Owner = source.Owner.Copy()\n\n\t// Tags\n\ttagMap := make(map[string]string)\n\tfor tagKey, tagValue := range source.Tags {\n\t\t// Shadow the loop variable to avoid aliasing\n\t\ttagValue := tagValue\n\t\ttagMap[tagKey] = tagValue\n\t}\n\tvirtualNetworkTapsSpec.Tags = tagMap\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "7ce64248181bbc8774146207ac3bcad5", "score": "0.5557206", "text": "func (pool *Servers_ElasticPool_Spec) AssignProperties_To_Servers_ElasticPool_Spec(destination *v20211101s.Servers_ElasticPool_Spec) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// AzureName\n\tdestination.AzureName = pool.AzureName\n\n\t// HighAvailabilityReplicaCount\n\tdestination.HighAvailabilityReplicaCount = genruntime.ClonePointerToInt(pool.HighAvailabilityReplicaCount)\n\n\t// LicenseType\n\tif pool.LicenseType != nil {\n\t\tlicenseType := string(*pool.LicenseType)\n\t\tdestination.LicenseType = &licenseType\n\t} else {\n\t\tdestination.LicenseType = nil\n\t}\n\n\t// Location\n\tdestination.Location = genruntime.ClonePointerToString(pool.Location)\n\n\t// MaintenanceConfigurationId\n\tdestination.MaintenanceConfigurationId = genruntime.ClonePointerToString(pool.MaintenanceConfigurationId)\n\n\t// MaxSizeBytes\n\tdestination.MaxSizeBytes = genruntime.ClonePointerToInt(pool.MaxSizeBytes)\n\n\t// MinCapacity\n\tif pool.MinCapacity != nil {\n\t\tminCapacity := *pool.MinCapacity\n\t\tdestination.MinCapacity = &minCapacity\n\t} else {\n\t\tdestination.MinCapacity = nil\n\t}\n\n\t// OriginalVersion\n\tdestination.OriginalVersion = pool.OriginalVersion()\n\n\t// Owner\n\tif pool.Owner != nil {\n\t\towner := pool.Owner.Copy()\n\t\tdestination.Owner = &owner\n\t} else {\n\t\tdestination.Owner = nil\n\t}\n\n\t// PerDatabaseSettings\n\tif pool.PerDatabaseSettings != nil {\n\t\tvar perDatabaseSetting v20211101s.ElasticPoolPerDatabaseSettings\n\t\terr := pool.PerDatabaseSettings.AssignProperties_To_ElasticPoolPerDatabaseSettings(&perDatabaseSetting)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_ElasticPoolPerDatabaseSettings() to populate field PerDatabaseSettings\")\n\t\t}\n\t\tdestination.PerDatabaseSettings = &perDatabaseSetting\n\t} else {\n\t\tdestination.PerDatabaseSettings = nil\n\t}\n\n\t// Sku\n\tif pool.Sku != nil {\n\t\tvar sku v20211101s.Sku\n\t\terr := pool.Sku.AssignProperties_To_Sku(&sku)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_Sku() to populate field Sku\")\n\t\t}\n\t\tdestination.Sku = &sku\n\t} else {\n\t\tdestination.Sku = nil\n\t}\n\n\t// Tags\n\tdestination.Tags = genruntime.CloneMapOfStringToString(pool.Tags)\n\n\t// ZoneRedundant\n\tif pool.ZoneRedundant != nil {\n\t\tzoneRedundant := *pool.ZoneRedundant\n\t\tdestination.ZoneRedundant = &zoneRedundant\n\t} else {\n\t\tdestination.ZoneRedundant = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "6eab9d7aa713de04ce9dc4e282f2c0a4", "score": "0.5522489", "text": "func (identifier *UrlSigningParamIdentifier) AssignProperties_From_UrlSigningParamIdentifier(source *v20210601s.UrlSigningParamIdentifier) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// ParamIndicator\n\tidentifier.ParamIndicator = genruntime.ClonePointerToString(source.ParamIndicator)\n\n\t// ParamName\n\tidentifier.ParamName = genruntime.ClonePointerToString(source.ParamName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tidentifier.PropertyBag = propertyBag\n\t} else {\n\t\tidentifier.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForUrlSigningParamIdentifier interface (if implemented) to customize the conversion\n\tvar identifierAsAny any = identifier\n\tif augmentedIdentifier, ok := identifierAsAny.(augmentConversionForUrlSigningParamIdentifier); ok {\n\t\terr := augmentedIdentifier.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "f94983e887fe474f4d705e22682f5ffc", "score": "0.5472906", "text": "func (ipTag *VirtualMachineIpTag) AssignProperties_From_VirtualMachineIpTag(source *v1beta20220301s.VirtualMachineIpTag) error {\n\n\t// IpTagType\n\tipTag.IpTagType = genruntime.ClonePointerToString(source.IpTagType)\n\n\t// Tag\n\tipTag.Tag = genruntime.ClonePointerToString(source.Tag)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "8b0eef3196c2520847d8d9aa63e4531c", "score": "0.54353875", "text": "func (pool *ServersElasticPool) AssignProperties_From_ServersElasticPool(source *v20211101s.ServersElasticPool) error {\n\n\t// ObjectMeta\n\tpool.ObjectMeta = *source.ObjectMeta.DeepCopy()\n\n\t// Spec\n\tvar spec Servers_ElasticPool_Spec\n\terr := spec.AssignProperties_From_Servers_ElasticPool_Spec(&source.Spec)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"calling AssignProperties_From_Servers_ElasticPool_Spec() to populate field Spec\")\n\t}\n\tpool.Spec = spec\n\n\t// Status\n\tvar status Servers_ElasticPool_STATUS\n\terr = status.AssignProperties_From_Servers_ElasticPool_STATUS(&source.Status)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"calling AssignProperties_From_Servers_ElasticPool_STATUS() to populate field Status\")\n\t}\n\tpool.Status = status\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "feacbad340de48bc4da9939c674b70a0", "score": "0.5430533", "text": "func (settings *ElasticPoolPerDatabaseSettings_STATUS) AssignProperties_From_ElasticPoolPerDatabaseSettings_STATUS(source *v20211101s.ElasticPoolPerDatabaseSettings_STATUS) error {\n\n\t// MaxCapacity\n\tif source.MaxCapacity != nil {\n\t\tmaxCapacity := *source.MaxCapacity\n\t\tsettings.MaxCapacity = &maxCapacity\n\t} else {\n\t\tsettings.MaxCapacity = nil\n\t}\n\n\t// MinCapacity\n\tif source.MinCapacity != nil {\n\t\tminCapacity := *source.MinCapacity\n\t\tsettings.MinCapacity = &minCapacity\n\t} else {\n\t\tsettings.MinCapacity = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "3cd451259e535fc0aa9008a0c0f86d08", "score": "0.5381208", "text": "func (settings *DiffDiskSettings) AssignProperties_From_DiffDiskSettings(source *v1beta20220301s.DiffDiskSettings) error {\n\n\t// Option\n\tif source.Option != nil {\n\t\toption := DiffDiskOption(*source.Option)\n\t\tsettings.Option = &option\n\t} else {\n\t\tsettings.Option = nil\n\t}\n\n\t// Placement\n\tif source.Placement != nil {\n\t\tplacement := DiffDiskPlacement(*source.Placement)\n\t\tsettings.Placement = &placement\n\t} else {\n\t\tsettings.Placement = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "3eb2154d7fafa7ebd419ab817a45dc64", "score": "0.5310991", "text": "func (disk *VirtualHardDisk) AssignProperties_From_VirtualHardDisk(source *v1beta20220301s.VirtualHardDisk) error {\n\n\t// Uri\n\tdisk.Uri = genruntime.ClonePointerToString(source.Uri)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "95bdd19830a539258ac1f2dd1267c788", "score": "0.5298542", "text": "func (configuration *PrivateEndpointIPConfiguration) AssignProperties_From_PrivateEndpointIPConfiguration(source *v20220701s.PrivateEndpointIPConfiguration) error {\n\n\t// GroupId\n\tconfiguration.GroupId = genruntime.ClonePointerToString(source.GroupId)\n\n\t// MemberName\n\tconfiguration.MemberName = genruntime.ClonePointerToString(source.MemberName)\n\n\t// Name\n\tconfiguration.Name = genruntime.ClonePointerToString(source.Name)\n\n\t// PrivateIPAddress\n\tconfiguration.PrivateIPAddress = genruntime.ClonePointerToString(source.PrivateIPAddress)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "5f6415526b119b017a9d3cc9dc65c47a", "score": "0.52581316", "text": "func (properties *EncryptionProperties) AssignProperties_From_EncryptionProperties(source *v20210101s.EncryptionProperties) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// KeySource\n\tproperties.KeySource = genruntime.ClonePointerToString(source.KeySource)\n\n\t// KeyVaultProperties\n\tif source.KeyVaultProperties != nil {\n\t\tvar keyVaultProperty KeyVaultProperties\n\t\terr := keyVaultProperty.AssignProperties_From_KeyVaultProperties(source.KeyVaultProperties)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_KeyVaultProperties() to populate field KeyVaultProperties\")\n\t\t}\n\t\tproperties.KeyVaultProperties = &keyVaultProperty\n\t} else {\n\t\tproperties.KeyVaultProperties = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tproperties.PropertyBag = propertyBag\n\t} else {\n\t\tproperties.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForEncryptionProperties interface (if implemented) to customize the conversion\n\tvar propertiesAsAny any = properties\n\tif augmentedProperties, ok := propertiesAsAny.(augmentConversionForEncryptionProperties); ok {\n\t\terr := augmentedProperties.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "814d9bb33d9fcaec22020cbc715bb0a3", "score": "0.5235984", "text": "func (settings *ElasticPoolPerDatabaseSettings) AssignProperties_To_ElasticPoolPerDatabaseSettings(destination *v20211101s.ElasticPoolPerDatabaseSettings) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// MaxCapacity\n\tif settings.MaxCapacity != nil {\n\t\tmaxCapacity := *settings.MaxCapacity\n\t\tdestination.MaxCapacity = &maxCapacity\n\t} else {\n\t\tdestination.MaxCapacity = nil\n\t}\n\n\t// MinCapacity\n\tif settings.MinCapacity != nil {\n\t\tminCapacity := *settings.MinCapacity\n\t\tdestination.MinCapacity = &minCapacity\n\t} else {\n\t\tdestination.MinCapacity = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "31b45fc6ead2b9b81db65614a8fe24db", "score": "0.5235059", "text": "func (signingKey *UrlSigningKey) AssignProperties_From_UrlSigningKey(source *v20210601s.UrlSigningKey) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// KeyId\n\tsigningKey.KeyId = genruntime.ClonePointerToString(source.KeyId)\n\n\t// KeySourceParameters\n\tif source.KeySourceParameters != nil {\n\t\tvar keySourceParameter KeyVaultSigningKeyParameters\n\t\terr := keySourceParameter.AssignProperties_From_KeyVaultSigningKeyParameters(source.KeySourceParameters)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_KeyVaultSigningKeyParameters() to populate field KeySourceParameters\")\n\t\t}\n\t\tsigningKey.KeySourceParameters = &keySourceParameter\n\t} else {\n\t\tsigningKey.KeySourceParameters = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tsigningKey.PropertyBag = propertyBag\n\t} else {\n\t\tsigningKey.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForUrlSigningKey interface (if implemented) to customize the conversion\n\tvar signingKeyAsAny any = signingKey\n\tif augmentedSigningKey, ok := signingKeyAsAny.(augmentConversionForUrlSigningKey); ok {\n\t\terr := augmentedSigningKey.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "ffaee884d9067e4b066fb1cef62afb64", "score": "0.5212873", "text": "func (profile *HardwareProfile_STATUS) AssignProperties_From_HardwareProfile_STATUS(source *v1beta20220301s.HardwareProfile_STATUS) error {\n\n\t// VmSize\n\tif source.VmSize != nil {\n\t\tvmSize := HardwareProfile_VmSize_STATUS(*source.VmSize)\n\t\tprofile.VmSize = &vmSize\n\t} else {\n\t\tprofile.VmSize = nil\n\t}\n\n\t// VmSizeProperties\n\tif source.VmSizeProperties != nil {\n\t\tvar vmSizeProperty VMSizeProperties_STATUS\n\t\terr := vmSizeProperty.AssignProperties_From_VMSizeProperties_STATUS(source.VmSizeProperties)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VMSizeProperties_STATUS() to populate field VmSizeProperties\")\n\t\t}\n\t\tprofile.VmSizeProperties = &vmSizeProperty\n\t} else {\n\t\tprofile.VmSizeProperties = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "8b97c1e040dc409fb7aa6e0db6b43b22", "score": "0.5209888", "text": "func (machine *VirtualMachine_Spec) AssignProperties_From_VirtualMachine_Spec(source *v1beta20220301s.VirtualMachine_Spec) error {\n\n\t// AdditionalCapabilities\n\tif source.AdditionalCapabilities != nil {\n\t\tvar additionalCapability AdditionalCapabilities\n\t\terr := additionalCapability.AssignProperties_From_AdditionalCapabilities(source.AdditionalCapabilities)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_AdditionalCapabilities() to populate field AdditionalCapabilities\")\n\t\t}\n\t\tmachine.AdditionalCapabilities = &additionalCapability\n\t} else {\n\t\tmachine.AdditionalCapabilities = nil\n\t}\n\n\t// ApplicationProfile\n\tif source.ApplicationProfile != nil {\n\t\tvar applicationProfile ApplicationProfile\n\t\terr := applicationProfile.AssignProperties_From_ApplicationProfile(source.ApplicationProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ApplicationProfile() to populate field ApplicationProfile\")\n\t\t}\n\t\tmachine.ApplicationProfile = &applicationProfile\n\t} else {\n\t\tmachine.ApplicationProfile = nil\n\t}\n\n\t// AvailabilitySet\n\tif source.AvailabilitySet != nil {\n\t\tvar availabilitySet SubResource\n\t\terr := availabilitySet.AssignProperties_From_SubResource(source.AvailabilitySet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field AvailabilitySet\")\n\t\t}\n\t\tmachine.AvailabilitySet = &availabilitySet\n\t} else {\n\t\tmachine.AvailabilitySet = nil\n\t}\n\n\t// AzureName\n\tmachine.AzureName = source.AzureName\n\n\t// BillingProfile\n\tif source.BillingProfile != nil {\n\t\tvar billingProfile BillingProfile\n\t\terr := billingProfile.AssignProperties_From_BillingProfile(source.BillingProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_BillingProfile() to populate field BillingProfile\")\n\t\t}\n\t\tmachine.BillingProfile = &billingProfile\n\t} else {\n\t\tmachine.BillingProfile = nil\n\t}\n\n\t// CapacityReservation\n\tif source.CapacityReservation != nil {\n\t\tvar capacityReservation CapacityReservationProfile\n\t\terr := capacityReservation.AssignProperties_From_CapacityReservationProfile(source.CapacityReservation)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_CapacityReservationProfile() to populate field CapacityReservation\")\n\t\t}\n\t\tmachine.CapacityReservation = &capacityReservation\n\t} else {\n\t\tmachine.CapacityReservation = nil\n\t}\n\n\t// DiagnosticsProfile\n\tif source.DiagnosticsProfile != nil {\n\t\tvar diagnosticsProfile DiagnosticsProfile\n\t\terr := diagnosticsProfile.AssignProperties_From_DiagnosticsProfile(source.DiagnosticsProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_DiagnosticsProfile() to populate field DiagnosticsProfile\")\n\t\t}\n\t\tmachine.DiagnosticsProfile = &diagnosticsProfile\n\t} else {\n\t\tmachine.DiagnosticsProfile = nil\n\t}\n\n\t// EvictionPolicy\n\tif source.EvictionPolicy != nil {\n\t\tevictionPolicy := EvictionPolicy(*source.EvictionPolicy)\n\t\tmachine.EvictionPolicy = &evictionPolicy\n\t} else {\n\t\tmachine.EvictionPolicy = nil\n\t}\n\n\t// ExtendedLocation\n\tif source.ExtendedLocation != nil {\n\t\tvar extendedLocation ExtendedLocation\n\t\terr := extendedLocation.AssignProperties_From_ExtendedLocation(source.ExtendedLocation)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ExtendedLocation() to populate field ExtendedLocation\")\n\t\t}\n\t\tmachine.ExtendedLocation = &extendedLocation\n\t} else {\n\t\tmachine.ExtendedLocation = nil\n\t}\n\n\t// ExtensionsTimeBudget\n\tmachine.ExtensionsTimeBudget = genruntime.ClonePointerToString(source.ExtensionsTimeBudget)\n\n\t// HardwareProfile\n\tif source.HardwareProfile != nil {\n\t\tvar hardwareProfile HardwareProfile\n\t\terr := hardwareProfile.AssignProperties_From_HardwareProfile(source.HardwareProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_HardwareProfile() to populate field HardwareProfile\")\n\t\t}\n\t\tmachine.HardwareProfile = &hardwareProfile\n\t} else {\n\t\tmachine.HardwareProfile = nil\n\t}\n\n\t// Host\n\tif source.Host != nil {\n\t\tvar host SubResource\n\t\terr := host.AssignProperties_From_SubResource(source.Host)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field Host\")\n\t\t}\n\t\tmachine.Host = &host\n\t} else {\n\t\tmachine.Host = nil\n\t}\n\n\t// HostGroup\n\tif source.HostGroup != nil {\n\t\tvar hostGroup SubResource\n\t\terr := hostGroup.AssignProperties_From_SubResource(source.HostGroup)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field HostGroup\")\n\t\t}\n\t\tmachine.HostGroup = &hostGroup\n\t} else {\n\t\tmachine.HostGroup = nil\n\t}\n\n\t// Identity\n\tif source.Identity != nil {\n\t\tvar identity VirtualMachineIdentity\n\t\terr := identity.AssignProperties_From_VirtualMachineIdentity(source.Identity)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualMachineIdentity() to populate field Identity\")\n\t\t}\n\t\tmachine.Identity = &identity\n\t} else {\n\t\tmachine.Identity = nil\n\t}\n\n\t// LicenseType\n\tmachine.LicenseType = genruntime.ClonePointerToString(source.LicenseType)\n\n\t// Location\n\tmachine.Location = genruntime.ClonePointerToString(source.Location)\n\n\t// NetworkProfile\n\tif source.NetworkProfile != nil {\n\t\tvar networkProfile NetworkProfile\n\t\terr := networkProfile.AssignProperties_From_NetworkProfile(source.NetworkProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_NetworkProfile() to populate field NetworkProfile\")\n\t\t}\n\t\tmachine.NetworkProfile = &networkProfile\n\t} else {\n\t\tmachine.NetworkProfile = nil\n\t}\n\n\t// OsProfile\n\tif source.OsProfile != nil {\n\t\tvar osProfile OSProfile\n\t\terr := osProfile.AssignProperties_From_OSProfile(source.OsProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_OSProfile() to populate field OsProfile\")\n\t\t}\n\t\tmachine.OsProfile = &osProfile\n\t} else {\n\t\tmachine.OsProfile = nil\n\t}\n\n\t// Owner\n\tif source.Owner != nil {\n\t\towner := source.Owner.Copy()\n\t\tmachine.Owner = &owner\n\t} else {\n\t\tmachine.Owner = nil\n\t}\n\n\t// Plan\n\tif source.Plan != nil {\n\t\tvar plan Plan\n\t\terr := plan.AssignProperties_From_Plan(source.Plan)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_Plan() to populate field Plan\")\n\t\t}\n\t\tmachine.Plan = &plan\n\t} else {\n\t\tmachine.Plan = nil\n\t}\n\n\t// PlatformFaultDomain\n\tmachine.PlatformFaultDomain = genruntime.ClonePointerToInt(source.PlatformFaultDomain)\n\n\t// Priority\n\tif source.Priority != nil {\n\t\tpriority := Priority(*source.Priority)\n\t\tmachine.Priority = &priority\n\t} else {\n\t\tmachine.Priority = nil\n\t}\n\n\t// ProximityPlacementGroup\n\tif source.ProximityPlacementGroup != nil {\n\t\tvar proximityPlacementGroup SubResource\n\t\terr := proximityPlacementGroup.AssignProperties_From_SubResource(source.ProximityPlacementGroup)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field ProximityPlacementGroup\")\n\t\t}\n\t\tmachine.ProximityPlacementGroup = &proximityPlacementGroup\n\t} else {\n\t\tmachine.ProximityPlacementGroup = nil\n\t}\n\n\t// ScheduledEventsProfile\n\tif source.ScheduledEventsProfile != nil {\n\t\tvar scheduledEventsProfile ScheduledEventsProfile\n\t\terr := scheduledEventsProfile.AssignProperties_From_ScheduledEventsProfile(source.ScheduledEventsProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ScheduledEventsProfile() to populate field ScheduledEventsProfile\")\n\t\t}\n\t\tmachine.ScheduledEventsProfile = &scheduledEventsProfile\n\t} else {\n\t\tmachine.ScheduledEventsProfile = nil\n\t}\n\n\t// SecurityProfile\n\tif source.SecurityProfile != nil {\n\t\tvar securityProfile SecurityProfile\n\t\terr := securityProfile.AssignProperties_From_SecurityProfile(source.SecurityProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SecurityProfile() to populate field SecurityProfile\")\n\t\t}\n\t\tmachine.SecurityProfile = &securityProfile\n\t} else {\n\t\tmachine.SecurityProfile = nil\n\t}\n\n\t// StorageProfile\n\tif source.StorageProfile != nil {\n\t\tvar storageProfile StorageProfile\n\t\terr := storageProfile.AssignProperties_From_StorageProfile(source.StorageProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_StorageProfile() to populate field StorageProfile\")\n\t\t}\n\t\tmachine.StorageProfile = &storageProfile\n\t} else {\n\t\tmachine.StorageProfile = nil\n\t}\n\n\t// Tags\n\tmachine.Tags = genruntime.CloneMapOfStringToString(source.Tags)\n\n\t// UserData\n\tmachine.UserData = genruntime.ClonePointerToString(source.UserData)\n\n\t// VirtualMachineScaleSet\n\tif source.VirtualMachineScaleSet != nil {\n\t\tvar virtualMachineScaleSet SubResource\n\t\terr := virtualMachineScaleSet.AssignProperties_From_SubResource(source.VirtualMachineScaleSet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field VirtualMachineScaleSet\")\n\t\t}\n\t\tmachine.VirtualMachineScaleSet = &virtualMachineScaleSet\n\t} else {\n\t\tmachine.VirtualMachineScaleSet = nil\n\t}\n\n\t// Zones\n\tmachine.Zones = genruntime.CloneSliceOfString(source.Zones)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "31ecf8369289ceda594cf5a43cc42036", "score": "0.51967746", "text": "func (virtualNetworkTapsSpec *VirtualNetworkTaps_Spec) AssignPropertiesToVirtualNetworkTapsSpec(destination *v1alpha1api20201101storage.VirtualNetworkTaps_Spec) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// AzureName\n\tdestination.AzureName = virtualNetworkTapsSpec.AzureName\n\n\t// DestinationLoadBalancerFrontEndIPConfiguration\n\tif virtualNetworkTapsSpec.DestinationLoadBalancerFrontEndIPConfiguration != nil {\n\t\tvar destinationLoadBalancerFrontEndIPConfiguration v1alpha1api20201101storage.SubResource\n\t\terr := (*virtualNetworkTapsSpec.DestinationLoadBalancerFrontEndIPConfiguration).AssignPropertiesToSubResource(&destinationLoadBalancerFrontEndIPConfiguration)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating DestinationLoadBalancerFrontEndIPConfiguration from DestinationLoadBalancerFrontEndIPConfiguration, calling AssignPropertiesToSubResource()\")\n\t\t}\n\t\tdestination.DestinationLoadBalancerFrontEndIPConfiguration = &destinationLoadBalancerFrontEndIPConfiguration\n\t} else {\n\t\tdestination.DestinationLoadBalancerFrontEndIPConfiguration = nil\n\t}\n\n\t// DestinationNetworkInterfaceIPConfiguration\n\tif virtualNetworkTapsSpec.DestinationNetworkInterfaceIPConfiguration != nil {\n\t\tvar destinationNetworkInterfaceIPConfiguration v1alpha1api20201101storage.SubResource\n\t\terr := (*virtualNetworkTapsSpec.DestinationNetworkInterfaceIPConfiguration).AssignPropertiesToSubResource(&destinationNetworkInterfaceIPConfiguration)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating DestinationNetworkInterfaceIPConfiguration from DestinationNetworkInterfaceIPConfiguration, calling AssignPropertiesToSubResource()\")\n\t\t}\n\t\tdestination.DestinationNetworkInterfaceIPConfiguration = &destinationNetworkInterfaceIPConfiguration\n\t} else {\n\t\tdestination.DestinationNetworkInterfaceIPConfiguration = nil\n\t}\n\n\t// DestinationPort\n\tif virtualNetworkTapsSpec.DestinationPort != nil {\n\t\tdestinationPort := *virtualNetworkTapsSpec.DestinationPort\n\t\tdestination.DestinationPort = &destinationPort\n\t} else {\n\t\tdestination.DestinationPort = nil\n\t}\n\n\t// Location\n\tlocation := virtualNetworkTapsSpec.Location\n\tdestination.Location = &location\n\n\t// OriginalVersion\n\tdestination.OriginalVersion = virtualNetworkTapsSpec.OriginalVersion()\n\n\t// Owner\n\tdestination.Owner = virtualNetworkTapsSpec.Owner.Copy()\n\n\t// Tags\n\ttagMap := make(map[string]string)\n\tfor tagKey, tagValue := range virtualNetworkTapsSpec.Tags {\n\t\t// Shadow the loop variable to avoid aliasing\n\t\ttagValue := tagValue\n\t\ttagMap[tagKey] = tagValue\n\t}\n\tdestination.Tags = tagMap\n\n\t// Update the property bag\n\tdestination.PropertyBag = propertyBag\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "a146dc330620985910ba58ed7c5f9bf7", "score": "0.5181755", "text": "func (create *ServerPropertiesForCreate) AssignProperties_From_ServerPropertiesForCreate(source *v20180601s.ServerPropertiesForCreate) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// Default\n\tif source.Default != nil {\n\t\tvar def ServerPropertiesForDefaultCreate\n\t\terr := def.AssignProperties_From_ServerPropertiesForDefaultCreate(source.Default)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ServerPropertiesForDefaultCreate() to populate field Default\")\n\t\t}\n\t\tcreate.Default = &def\n\t} else {\n\t\tcreate.Default = nil\n\t}\n\n\t// GeoRestore\n\tif source.GeoRestore != nil {\n\t\tvar geoRestore ServerPropertiesForGeoRestore\n\t\terr := geoRestore.AssignProperties_From_ServerPropertiesForGeoRestore(source.GeoRestore)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ServerPropertiesForGeoRestore() to populate field GeoRestore\")\n\t\t}\n\t\tcreate.GeoRestore = &geoRestore\n\t} else {\n\t\tcreate.GeoRestore = nil\n\t}\n\n\t// PointInTimeRestore\n\tif source.PointInTimeRestore != nil {\n\t\tvar pointInTimeRestore ServerPropertiesForRestore\n\t\terr := pointInTimeRestore.AssignProperties_From_ServerPropertiesForRestore(source.PointInTimeRestore)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ServerPropertiesForRestore() to populate field PointInTimeRestore\")\n\t\t}\n\t\tcreate.PointInTimeRestore = &pointInTimeRestore\n\t} else {\n\t\tcreate.PointInTimeRestore = nil\n\t}\n\n\t// Replica\n\tif source.Replica != nil {\n\t\tvar replica ServerPropertiesForReplica\n\t\terr := replica.AssignProperties_From_ServerPropertiesForReplica(source.Replica)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ServerPropertiesForReplica() to populate field Replica\")\n\t\t}\n\t\tcreate.Replica = &replica\n\t} else {\n\t\tcreate.Replica = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tcreate.PropertyBag = propertyBag\n\t} else {\n\t\tcreate.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForServerPropertiesForCreate interface (if implemented) to customize the conversion\n\tvar createAsAny any = create\n\tif augmentedCreate, ok := createAsAny.(augmentConversionForServerPropertiesForCreate); ok {\n\t\terr := augmentedCreate.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "885158f178a9e85cce2129c731cb151c", "score": "0.5171442", "text": "func (configuration *VirtualMachinePublicIPAddressConfiguration) AssignProperties_From_VirtualMachinePublicIPAddressConfiguration(source *v1beta20220301s.VirtualMachinePublicIPAddressConfiguration) error {\n\n\t// DeleteOption\n\tif source.DeleteOption != nil {\n\t\tdeleteOption := VirtualMachinePublicIPAddressConfigurationProperties_DeleteOption(*source.DeleteOption)\n\t\tconfiguration.DeleteOption = &deleteOption\n\t} else {\n\t\tconfiguration.DeleteOption = nil\n\t}\n\n\t// DnsSettings\n\tif source.DnsSettings != nil {\n\t\tvar dnsSetting VirtualMachinePublicIPAddressDnsSettingsConfiguration\n\t\terr := dnsSetting.AssignProperties_From_VirtualMachinePublicIPAddressDnsSettingsConfiguration(source.DnsSettings)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualMachinePublicIPAddressDnsSettingsConfiguration() to populate field DnsSettings\")\n\t\t}\n\t\tconfiguration.DnsSettings = &dnsSetting\n\t} else {\n\t\tconfiguration.DnsSettings = nil\n\t}\n\n\t// IdleTimeoutInMinutes\n\tconfiguration.IdleTimeoutInMinutes = genruntime.ClonePointerToInt(source.IdleTimeoutInMinutes)\n\n\t// IpTags\n\tif source.IpTags != nil {\n\t\tipTagList := make([]VirtualMachineIpTag, len(source.IpTags))\n\t\tfor ipTagIndex, ipTagItem := range source.IpTags {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tipTagItem := ipTagItem\n\t\t\tvar ipTag VirtualMachineIpTag\n\t\t\terr := ipTag.AssignProperties_From_VirtualMachineIpTag(&ipTagItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualMachineIpTag() to populate field IpTags\")\n\t\t\t}\n\t\t\tipTagList[ipTagIndex] = ipTag\n\t\t}\n\t\tconfiguration.IpTags = ipTagList\n\t} else {\n\t\tconfiguration.IpTags = nil\n\t}\n\n\t// Name\n\tconfiguration.Name = genruntime.ClonePointerToString(source.Name)\n\n\t// PublicIPAddressVersion\n\tif source.PublicIPAddressVersion != nil {\n\t\tpublicIPAddressVersion := VirtualMachinePublicIPAddressConfigurationProperties_PublicIPAddressVersion(*source.PublicIPAddressVersion)\n\t\tconfiguration.PublicIPAddressVersion = &publicIPAddressVersion\n\t} else {\n\t\tconfiguration.PublicIPAddressVersion = nil\n\t}\n\n\t// PublicIPAllocationMethod\n\tif source.PublicIPAllocationMethod != nil {\n\t\tpublicIPAllocationMethod := VirtualMachinePublicIPAddressConfigurationProperties_PublicIPAllocationMethod(*source.PublicIPAllocationMethod)\n\t\tconfiguration.PublicIPAllocationMethod = &publicIPAllocationMethod\n\t} else {\n\t\tconfiguration.PublicIPAllocationMethod = nil\n\t}\n\n\t// PublicIPPrefix\n\tif source.PublicIPPrefix != nil {\n\t\tvar publicIPPrefix SubResource\n\t\terr := publicIPPrefix.AssignProperties_From_SubResource(source.PublicIPPrefix)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field PublicIPPrefix\")\n\t\t}\n\t\tconfiguration.PublicIPPrefix = &publicIPPrefix\n\t} else {\n\t\tconfiguration.PublicIPPrefix = nil\n\t}\n\n\t// Sku\n\tif source.Sku != nil {\n\t\tvar sku PublicIPAddressSku\n\t\terr := sku.AssignProperties_From_PublicIPAddressSku(source.Sku)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_PublicIPAddressSku() to populate field Sku\")\n\t\t}\n\t\tconfiguration.Sku = &sku\n\t} else {\n\t\tconfiguration.Sku = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "1d9dcdfad73de62a8c10f44d0ce02ec5", "score": "0.51250875", "text": "func (profile *TerminateNotificationProfile) AssignProperties_From_TerminateNotificationProfile(source *v1beta20220301s.TerminateNotificationProfile) error {\n\n\t// Enable\n\tif source.Enable != nil {\n\t\tenable := *source.Enable\n\t\tprofile.Enable = &enable\n\t} else {\n\t\tprofile.Enable = nil\n\t}\n\n\t// NotBeforeTimeout\n\tprofile.NotBeforeTimeout = genruntime.ClonePointerToString(source.NotBeforeTimeout)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "3005b5c29a204a1432db45a8507b9c91", "score": "0.5116939", "text": "func (disk *OSDisk) AssignProperties_From_OSDisk(source *v1beta20220301s.OSDisk) error {\n\n\t// Caching\n\tif source.Caching != nil {\n\t\tcaching := Caching(*source.Caching)\n\t\tdisk.Caching = &caching\n\t} else {\n\t\tdisk.Caching = nil\n\t}\n\n\t// CreateOption\n\tif source.CreateOption != nil {\n\t\tcreateOption := CreateOption(*source.CreateOption)\n\t\tdisk.CreateOption = &createOption\n\t} else {\n\t\tdisk.CreateOption = nil\n\t}\n\n\t// DeleteOption\n\tif source.DeleteOption != nil {\n\t\tdeleteOption := DeleteOption(*source.DeleteOption)\n\t\tdisk.DeleteOption = &deleteOption\n\t} else {\n\t\tdisk.DeleteOption = nil\n\t}\n\n\t// DiffDiskSettings\n\tif source.DiffDiskSettings != nil {\n\t\tvar diffDiskSetting DiffDiskSettings\n\t\terr := diffDiskSetting.AssignProperties_From_DiffDiskSettings(source.DiffDiskSettings)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_DiffDiskSettings() to populate field DiffDiskSettings\")\n\t\t}\n\t\tdisk.DiffDiskSettings = &diffDiskSetting\n\t} else {\n\t\tdisk.DiffDiskSettings = nil\n\t}\n\n\t// DiskSizeGB\n\tdisk.DiskSizeGB = genruntime.ClonePointerToInt(source.DiskSizeGB)\n\n\t// EncryptionSettings\n\tif source.EncryptionSettings != nil {\n\t\tvar encryptionSetting DiskEncryptionSettings\n\t\terr := encryptionSetting.AssignProperties_From_DiskEncryptionSettings(source.EncryptionSettings)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_DiskEncryptionSettings() to populate field EncryptionSettings\")\n\t\t}\n\t\tdisk.EncryptionSettings = &encryptionSetting\n\t} else {\n\t\tdisk.EncryptionSettings = nil\n\t}\n\n\t// Image\n\tif source.Image != nil {\n\t\tvar image VirtualHardDisk\n\t\terr := image.AssignProperties_From_VirtualHardDisk(source.Image)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualHardDisk() to populate field Image\")\n\t\t}\n\t\tdisk.Image = &image\n\t} else {\n\t\tdisk.Image = nil\n\t}\n\n\t// ManagedDisk\n\tif source.ManagedDisk != nil {\n\t\tvar managedDisk ManagedDiskParameters\n\t\terr := managedDisk.AssignProperties_From_ManagedDiskParameters(source.ManagedDisk)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ManagedDiskParameters() to populate field ManagedDisk\")\n\t\t}\n\t\tdisk.ManagedDisk = &managedDisk\n\t} else {\n\t\tdisk.ManagedDisk = nil\n\t}\n\n\t// Name\n\tdisk.Name = genruntime.ClonePointerToString(source.Name)\n\n\t// OsType\n\tif source.OsType != nil {\n\t\tosType := OSDisk_OsType(*source.OsType)\n\t\tdisk.OsType = &osType\n\t} else {\n\t\tdisk.OsType = nil\n\t}\n\n\t// Vhd\n\tif source.Vhd != nil {\n\t\tvar vhd VirtualHardDisk\n\t\terr := vhd.AssignProperties_From_VirtualHardDisk(source.Vhd)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualHardDisk() to populate field Vhd\")\n\t\t}\n\t\tdisk.Vhd = &vhd\n\t} else {\n\t\tdisk.Vhd = nil\n\t}\n\n\t// WriteAcceleratorEnabled\n\tif source.WriteAcceleratorEnabled != nil {\n\t\twriteAcceleratorEnabled := *source.WriteAcceleratorEnabled\n\t\tdisk.WriteAcceleratorEnabled = &writeAcceleratorEnabled\n\t} else {\n\t\tdisk.WriteAcceleratorEnabled = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "67e1fd3217050a72294d44b3e74d6734", "score": "0.5113624", "text": "func (profile *VMDiskSecurityProfile) AssignProperties_From_VMDiskSecurityProfile(source *v1beta20220301s.VMDiskSecurityProfile) error {\n\n\t// DiskEncryptionSet\n\tif source.DiskEncryptionSet != nil {\n\t\tvar diskEncryptionSet SubResource\n\t\terr := diskEncryptionSet.AssignProperties_From_SubResource(source.DiskEncryptionSet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field DiskEncryptionSet\")\n\t\t}\n\t\tprofile.DiskEncryptionSet = &diskEncryptionSet\n\t} else {\n\t\tprofile.DiskEncryptionSet = nil\n\t}\n\n\t// SecurityEncryptionType\n\tif source.SecurityEncryptionType != nil {\n\t\tsecurityEncryptionType := VMDiskSecurityProfile_SecurityEncryptionType(*source.SecurityEncryptionType)\n\t\tprofile.SecurityEncryptionType = &securityEncryptionType\n\t} else {\n\t\tprofile.SecurityEncryptionType = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "df2e2242b267b8f85d0cc3c263a6b306", "score": "0.5111278", "text": "func (configuration *VirtualMachineNetworkInterfaceIPConfiguration) AssignProperties_From_VirtualMachineNetworkInterfaceIPConfiguration(source *v1beta20220301s.VirtualMachineNetworkInterfaceIPConfiguration) error {\n\n\t// ApplicationGatewayBackendAddressPools\n\tif source.ApplicationGatewayBackendAddressPools != nil {\n\t\tapplicationGatewayBackendAddressPoolList := make([]SubResource, len(source.ApplicationGatewayBackendAddressPools))\n\t\tfor applicationGatewayBackendAddressPoolIndex, applicationGatewayBackendAddressPoolItem := range source.ApplicationGatewayBackendAddressPools {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tapplicationGatewayBackendAddressPoolItem := applicationGatewayBackendAddressPoolItem\n\t\t\tvar applicationGatewayBackendAddressPool SubResource\n\t\t\terr := applicationGatewayBackendAddressPool.AssignProperties_From_SubResource(&applicationGatewayBackendAddressPoolItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field ApplicationGatewayBackendAddressPools\")\n\t\t\t}\n\t\t\tapplicationGatewayBackendAddressPoolList[applicationGatewayBackendAddressPoolIndex] = applicationGatewayBackendAddressPool\n\t\t}\n\t\tconfiguration.ApplicationGatewayBackendAddressPools = applicationGatewayBackendAddressPoolList\n\t} else {\n\t\tconfiguration.ApplicationGatewayBackendAddressPools = nil\n\t}\n\n\t// ApplicationSecurityGroups\n\tif source.ApplicationSecurityGroups != nil {\n\t\tapplicationSecurityGroupList := make([]SubResource, len(source.ApplicationSecurityGroups))\n\t\tfor applicationSecurityGroupIndex, applicationSecurityGroupItem := range source.ApplicationSecurityGroups {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tapplicationSecurityGroupItem := applicationSecurityGroupItem\n\t\t\tvar applicationSecurityGroup SubResource\n\t\t\terr := applicationSecurityGroup.AssignProperties_From_SubResource(&applicationSecurityGroupItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field ApplicationSecurityGroups\")\n\t\t\t}\n\t\t\tapplicationSecurityGroupList[applicationSecurityGroupIndex] = applicationSecurityGroup\n\t\t}\n\t\tconfiguration.ApplicationSecurityGroups = applicationSecurityGroupList\n\t} else {\n\t\tconfiguration.ApplicationSecurityGroups = nil\n\t}\n\n\t// LoadBalancerBackendAddressPools\n\tif source.LoadBalancerBackendAddressPools != nil {\n\t\tloadBalancerBackendAddressPoolList := make([]SubResource, len(source.LoadBalancerBackendAddressPools))\n\t\tfor loadBalancerBackendAddressPoolIndex, loadBalancerBackendAddressPoolItem := range source.LoadBalancerBackendAddressPools {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tloadBalancerBackendAddressPoolItem := loadBalancerBackendAddressPoolItem\n\t\t\tvar loadBalancerBackendAddressPool SubResource\n\t\t\terr := loadBalancerBackendAddressPool.AssignProperties_From_SubResource(&loadBalancerBackendAddressPoolItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field LoadBalancerBackendAddressPools\")\n\t\t\t}\n\t\t\tloadBalancerBackendAddressPoolList[loadBalancerBackendAddressPoolIndex] = loadBalancerBackendAddressPool\n\t\t}\n\t\tconfiguration.LoadBalancerBackendAddressPools = loadBalancerBackendAddressPoolList\n\t} else {\n\t\tconfiguration.LoadBalancerBackendAddressPools = nil\n\t}\n\n\t// Name\n\tconfiguration.Name = genruntime.ClonePointerToString(source.Name)\n\n\t// Primary\n\tif source.Primary != nil {\n\t\tprimary := *source.Primary\n\t\tconfiguration.Primary = &primary\n\t} else {\n\t\tconfiguration.Primary = nil\n\t}\n\n\t// PrivateIPAddressVersion\n\tif source.PrivateIPAddressVersion != nil {\n\t\tprivateIPAddressVersion := VirtualMachineNetworkInterfaceIPConfigurationProperties_PrivateIPAddressVersion(*source.PrivateIPAddressVersion)\n\t\tconfiguration.PrivateIPAddressVersion = &privateIPAddressVersion\n\t} else {\n\t\tconfiguration.PrivateIPAddressVersion = nil\n\t}\n\n\t// PublicIPAddressConfiguration\n\tif source.PublicIPAddressConfiguration != nil {\n\t\tvar publicIPAddressConfiguration VirtualMachinePublicIPAddressConfiguration\n\t\terr := publicIPAddressConfiguration.AssignProperties_From_VirtualMachinePublicIPAddressConfiguration(source.PublicIPAddressConfiguration)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualMachinePublicIPAddressConfiguration() to populate field PublicIPAddressConfiguration\")\n\t\t}\n\t\tconfiguration.PublicIPAddressConfiguration = &publicIPAddressConfiguration\n\t} else {\n\t\tconfiguration.PublicIPAddressConfiguration = nil\n\t}\n\n\t// Subnet\n\tif source.Subnet != nil {\n\t\tvar subnet SubResource\n\t\terr := subnet.AssignProperties_From_SubResource(source.Subnet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field Subnet\")\n\t\t}\n\t\tconfiguration.Subnet = &subnet\n\t} else {\n\t\tconfiguration.Subnet = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "81b706d7dc754571eb53b6e731c26431", "score": "0.5076589", "text": "func (endpoint *Profiles_Endpoint_Spec) AssignProperties_From_Profiles_Endpoint_Spec(source *v20210601s.Profiles_Endpoint_Spec) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// AzureName\n\tendpoint.AzureName = source.AzureName\n\n\t// ContentTypesToCompress\n\tendpoint.ContentTypesToCompress = genruntime.CloneSliceOfString(source.ContentTypesToCompress)\n\n\t// DefaultOriginGroup\n\tif source.DefaultOriginGroup != nil {\n\t\tvar defaultOriginGroup ResourceReference\n\t\terr := defaultOriginGroup.AssignProperties_From_ResourceReference(source.DefaultOriginGroup)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ResourceReference() to populate field DefaultOriginGroup\")\n\t\t}\n\t\tendpoint.DefaultOriginGroup = &defaultOriginGroup\n\t} else {\n\t\tendpoint.DefaultOriginGroup = nil\n\t}\n\n\t// DeliveryPolicy\n\tif source.DeliveryPolicy != nil {\n\t\tvar deliveryPolicy EndpointProperties_DeliveryPolicy\n\t\terr := deliveryPolicy.AssignProperties_From_EndpointProperties_DeliveryPolicy(source.DeliveryPolicy)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_EndpointProperties_DeliveryPolicy() to populate field DeliveryPolicy\")\n\t\t}\n\t\tendpoint.DeliveryPolicy = &deliveryPolicy\n\t} else {\n\t\tendpoint.DeliveryPolicy = nil\n\t}\n\n\t// GeoFilters\n\tif source.GeoFilters != nil {\n\t\tgeoFilterList := make([]GeoFilter, len(source.GeoFilters))\n\t\tfor geoFilterIndex, geoFilterItem := range source.GeoFilters {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tgeoFilterItem := geoFilterItem\n\t\t\tvar geoFilter GeoFilter\n\t\t\terr := geoFilter.AssignProperties_From_GeoFilter(&geoFilterItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_GeoFilter() to populate field GeoFilters\")\n\t\t\t}\n\t\t\tgeoFilterList[geoFilterIndex] = geoFilter\n\t\t}\n\t\tendpoint.GeoFilters = geoFilterList\n\t} else {\n\t\tendpoint.GeoFilters = nil\n\t}\n\n\t// IsCompressionEnabled\n\tif source.IsCompressionEnabled != nil {\n\t\tisCompressionEnabled := *source.IsCompressionEnabled\n\t\tendpoint.IsCompressionEnabled = &isCompressionEnabled\n\t} else {\n\t\tendpoint.IsCompressionEnabled = nil\n\t}\n\n\t// IsHttpAllowed\n\tif source.IsHttpAllowed != nil {\n\t\tisHttpAllowed := *source.IsHttpAllowed\n\t\tendpoint.IsHttpAllowed = &isHttpAllowed\n\t} else {\n\t\tendpoint.IsHttpAllowed = nil\n\t}\n\n\t// IsHttpsAllowed\n\tif source.IsHttpsAllowed != nil {\n\t\tisHttpsAllowed := *source.IsHttpsAllowed\n\t\tendpoint.IsHttpsAllowed = &isHttpsAllowed\n\t} else {\n\t\tendpoint.IsHttpsAllowed = nil\n\t}\n\n\t// Location\n\tendpoint.Location = genruntime.ClonePointerToString(source.Location)\n\n\t// OptimizationType\n\tendpoint.OptimizationType = genruntime.ClonePointerToString(source.OptimizationType)\n\n\t// OriginGroups\n\tif source.OriginGroups != nil {\n\t\toriginGroupList := make([]DeepCreatedOriginGroup, len(source.OriginGroups))\n\t\tfor originGroupIndex, originGroupItem := range source.OriginGroups {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\toriginGroupItem := originGroupItem\n\t\t\tvar originGroup DeepCreatedOriginGroup\n\t\t\terr := originGroup.AssignProperties_From_DeepCreatedOriginGroup(&originGroupItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_DeepCreatedOriginGroup() to populate field OriginGroups\")\n\t\t\t}\n\t\t\toriginGroupList[originGroupIndex] = originGroup\n\t\t}\n\t\tendpoint.OriginGroups = originGroupList\n\t} else {\n\t\tendpoint.OriginGroups = nil\n\t}\n\n\t// OriginHostHeader\n\tendpoint.OriginHostHeader = genruntime.ClonePointerToString(source.OriginHostHeader)\n\n\t// OriginPath\n\tendpoint.OriginPath = genruntime.ClonePointerToString(source.OriginPath)\n\n\t// OriginalVersion\n\tendpoint.OriginalVersion = source.OriginalVersion\n\n\t// Origins\n\tif source.Origins != nil {\n\t\toriginList := make([]DeepCreatedOrigin, len(source.Origins))\n\t\tfor originIndex, originItem := range source.Origins {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\toriginItem := originItem\n\t\t\tvar origin DeepCreatedOrigin\n\t\t\terr := origin.AssignProperties_From_DeepCreatedOrigin(&originItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_DeepCreatedOrigin() to populate field Origins\")\n\t\t\t}\n\t\t\toriginList[originIndex] = origin\n\t\t}\n\t\tendpoint.Origins = originList\n\t} else {\n\t\tendpoint.Origins = nil\n\t}\n\n\t// Owner\n\tif source.Owner != nil {\n\t\towner := source.Owner.Copy()\n\t\tendpoint.Owner = &owner\n\t} else {\n\t\tendpoint.Owner = nil\n\t}\n\n\t// ProbePath\n\tendpoint.ProbePath = genruntime.ClonePointerToString(source.ProbePath)\n\n\t// QueryStringCachingBehavior\n\tendpoint.QueryStringCachingBehavior = genruntime.ClonePointerToString(source.QueryStringCachingBehavior)\n\n\t// Tags\n\tendpoint.Tags = genruntime.CloneMapOfStringToString(source.Tags)\n\n\t// UrlSigningKeys\n\tif source.UrlSigningKeys != nil {\n\t\turlSigningKeyList := make([]UrlSigningKey, len(source.UrlSigningKeys))\n\t\tfor urlSigningKeyIndex, urlSigningKeyItem := range source.UrlSigningKeys {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\turlSigningKeyItem := urlSigningKeyItem\n\t\t\tvar urlSigningKey UrlSigningKey\n\t\t\terr := urlSigningKey.AssignProperties_From_UrlSigningKey(&urlSigningKeyItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_UrlSigningKey() to populate field UrlSigningKeys\")\n\t\t\t}\n\t\t\turlSigningKeyList[urlSigningKeyIndex] = urlSigningKey\n\t\t}\n\t\tendpoint.UrlSigningKeys = urlSigningKeyList\n\t} else {\n\t\tendpoint.UrlSigningKeys = nil\n\t}\n\n\t// WebApplicationFirewallPolicyLink\n\tif source.WebApplicationFirewallPolicyLink != nil {\n\t\tvar webApplicationFirewallPolicyLink EndpointProperties_WebApplicationFirewallPolicyLink\n\t\terr := webApplicationFirewallPolicyLink.AssignProperties_From_EndpointProperties_WebApplicationFirewallPolicyLink(source.WebApplicationFirewallPolicyLink)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_EndpointProperties_WebApplicationFirewallPolicyLink() to populate field WebApplicationFirewallPolicyLink\")\n\t\t}\n\t\tendpoint.WebApplicationFirewallPolicyLink = &webApplicationFirewallPolicyLink\n\t} else {\n\t\tendpoint.WebApplicationFirewallPolicyLink = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tendpoint.PropertyBag = propertyBag\n\t} else {\n\t\tendpoint.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForProfiles_Endpoint_Spec interface (if implemented) to customize the conversion\n\tvar endpointAsAny any = endpoint\n\tif augmentedEndpoint, ok := endpointAsAny.(augmentConversionForProfiles_Endpoint_Spec); ok {\n\t\terr := augmentedEndpoint.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "00fa7947fead4bdc0207067d404db440", "score": "0.50606203", "text": "func (settings *ElasticPoolPerDatabaseSettings_STATUS) AssignProperties_To_ElasticPoolPerDatabaseSettings_STATUS(destination *v20211101s.ElasticPoolPerDatabaseSettings_STATUS) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// MaxCapacity\n\tif settings.MaxCapacity != nil {\n\t\tmaxCapacity := *settings.MaxCapacity\n\t\tdestination.MaxCapacity = &maxCapacity\n\t} else {\n\t\tdestination.MaxCapacity = nil\n\t}\n\n\t// MinCapacity\n\tif settings.MinCapacity != nil {\n\t\tminCapacity := *settings.MinCapacity\n\t\tdestination.MinCapacity = &minCapacity\n\t} else {\n\t\tdestination.MinCapacity = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "17e55450925931cd4c7a21583276b84d", "score": "0.5052239", "text": "func (parameters *KeyVaultSigningKeyParameters) AssignProperties_From_KeyVaultSigningKeyParameters(source *v20210601s.KeyVaultSigningKeyParameters) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// ResourceGroupName\n\tparameters.ResourceGroupName = genruntime.ClonePointerToString(source.ResourceGroupName)\n\n\t// SecretName\n\tparameters.SecretName = genruntime.ClonePointerToString(source.SecretName)\n\n\t// SecretVersion\n\tparameters.SecretVersion = genruntime.ClonePointerToString(source.SecretVersion)\n\n\t// SubscriptionId\n\tparameters.SubscriptionId = genruntime.ClonePointerToString(source.SubscriptionId)\n\n\t// TypeName\n\tparameters.TypeName = genruntime.ClonePointerToString(source.TypeName)\n\n\t// VaultName\n\tparameters.VaultName = genruntime.ClonePointerToString(source.VaultName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tparameters.PropertyBag = propertyBag\n\t} else {\n\t\tparameters.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForKeyVaultSigningKeyParameters interface (if implemented) to customize the conversion\n\tvar parametersAsAny any = parameters\n\tif augmentedParameters, ok := parametersAsAny.(augmentConversionForKeyVaultSigningKeyParameters); ok {\n\t\terr := augmentedParameters.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "e989a44bf3a81a2d2c67f3fe6617c5f6", "score": "0.50508916", "text": "func (properties *KeyVaultProperties_STATUS) AssignProperties_From_KeyVaultProperties_STATUS(source *v20210101s.KeyVaultProperties_STATUS) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// KeyIdentifier\n\tproperties.KeyIdentifier = genruntime.ClonePointerToString(source.KeyIdentifier)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tproperties.PropertyBag = propertyBag\n\t} else {\n\t\tproperties.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForKeyVaultProperties_STATUS interface (if implemented) to customize the conversion\n\tvar propertiesAsAny any = properties\n\tif augmentedProperties, ok := propertiesAsAny.(augmentConversionForKeyVaultProperties_STATUS); ok {\n\t\terr := augmentedProperties.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "d4ca93446d8952cd27837fec41fcd39b", "score": "0.5049321", "text": "func (rule *IpRule) AssignProperties_From_IpRule(source *v20220901s.IpRule) error {\n\n\t// Value\n\trule.Value = genruntime.ClonePointerToString(source.Value)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "771e48396af991c70b33fb91f210985d", "score": "0.5041806", "text": "func (properties *ResourceGroupProperties_STATUS) AssignProperties_From_ResourceGroupProperties_STATUS(source *v20200601s.ResourceGroupProperties_STATUS) error {\n\n\t// ProvisioningState\n\tproperties.ProvisioningState = genruntime.ClonePointerToString(source.ProvisioningState)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "594e8c37c15325accf18723209d5d414", "score": "0.50351304", "text": "func (profile *StorageProfile) AssignProperties_From_StorageProfile(source *v20180601s.StorageProfile) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// BackupRetentionDays\n\tprofile.BackupRetentionDays = genruntime.ClonePointerToInt(source.BackupRetentionDays)\n\n\t// GeoRedundantBackup\n\tprofile.GeoRedundantBackup = genruntime.ClonePointerToString(source.GeoRedundantBackup)\n\n\t// StorageAutogrow\n\tprofile.StorageAutogrow = genruntime.ClonePointerToString(source.StorageAutogrow)\n\n\t// StorageMB\n\tprofile.StorageMB = genruntime.ClonePointerToInt(source.StorageMB)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tprofile.PropertyBag = propertyBag\n\t} else {\n\t\tprofile.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForStorageProfile interface (if implemented) to customize the conversion\n\tvar profileAsAny any = profile\n\tif augmentedProfile, ok := profileAsAny.(augmentConversionForStorageProfile); ok {\n\t\terr := augmentedProfile.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "a15076ff994ab61a217fa410fac13ebc", "score": "0.5025184", "text": "func (operator *SearchServiceOperatorSpec) AssignProperties_From_SearchServiceOperatorSpec(source *v20220901s.SearchServiceOperatorSpec) error {\n\n\t// Secrets\n\tif source.Secrets != nil {\n\t\tvar secret SearchServiceOperatorSecrets\n\t\terr := secret.AssignProperties_From_SearchServiceOperatorSecrets(source.Secrets)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SearchServiceOperatorSecrets() to populate field Secrets\")\n\t\t}\n\t\toperator.Secrets = &secret\n\t} else {\n\t\toperator.Secrets = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "c6791594df8122175084c2efe34f2c45", "score": "0.50151855", "text": "func (disk *DataDisk) AssignProperties_From_DataDisk(source *v1beta20220301s.DataDisk) error {\n\n\t// Caching\n\tif source.Caching != nil {\n\t\tcaching := Caching(*source.Caching)\n\t\tdisk.Caching = &caching\n\t} else {\n\t\tdisk.Caching = nil\n\t}\n\n\t// CreateOption\n\tif source.CreateOption != nil {\n\t\tcreateOption := CreateOption(*source.CreateOption)\n\t\tdisk.CreateOption = &createOption\n\t} else {\n\t\tdisk.CreateOption = nil\n\t}\n\n\t// DeleteOption\n\tif source.DeleteOption != nil {\n\t\tdeleteOption := DeleteOption(*source.DeleteOption)\n\t\tdisk.DeleteOption = &deleteOption\n\t} else {\n\t\tdisk.DeleteOption = nil\n\t}\n\n\t// DetachOption\n\tif source.DetachOption != nil {\n\t\tdetachOption := DetachOption(*source.DetachOption)\n\t\tdisk.DetachOption = &detachOption\n\t} else {\n\t\tdisk.DetachOption = nil\n\t}\n\n\t// DiskSizeGB\n\tdisk.DiskSizeGB = genruntime.ClonePointerToInt(source.DiskSizeGB)\n\n\t// Image\n\tif source.Image != nil {\n\t\tvar image VirtualHardDisk\n\t\terr := image.AssignProperties_From_VirtualHardDisk(source.Image)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualHardDisk() to populate field Image\")\n\t\t}\n\t\tdisk.Image = &image\n\t} else {\n\t\tdisk.Image = nil\n\t}\n\n\t// Lun\n\tdisk.Lun = genruntime.ClonePointerToInt(source.Lun)\n\n\t// ManagedDisk\n\tif source.ManagedDisk != nil {\n\t\tvar managedDisk ManagedDiskParameters\n\t\terr := managedDisk.AssignProperties_From_ManagedDiskParameters(source.ManagedDisk)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ManagedDiskParameters() to populate field ManagedDisk\")\n\t\t}\n\t\tdisk.ManagedDisk = &managedDisk\n\t} else {\n\t\tdisk.ManagedDisk = nil\n\t}\n\n\t// Name\n\tdisk.Name = genruntime.ClonePointerToString(source.Name)\n\n\t// ToBeDetached\n\tif source.ToBeDetached != nil {\n\t\ttoBeDetached := *source.ToBeDetached\n\t\tdisk.ToBeDetached = &toBeDetached\n\t} else {\n\t\tdisk.ToBeDetached = nil\n\t}\n\n\t// Vhd\n\tif source.Vhd != nil {\n\t\tvar vhd VirtualHardDisk\n\t\terr := vhd.AssignProperties_From_VirtualHardDisk(source.Vhd)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualHardDisk() to populate field Vhd\")\n\t\t}\n\t\tdisk.Vhd = &vhd\n\t} else {\n\t\tdisk.Vhd = nil\n\t}\n\n\t// WriteAcceleratorEnabled\n\tif source.WriteAcceleratorEnabled != nil {\n\t\twriteAcceleratorEnabled := *source.WriteAcceleratorEnabled\n\t\tdisk.WriteAcceleratorEnabled = &writeAcceleratorEnabled\n\t} else {\n\t\tdisk.WriteAcceleratorEnabled = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "c72c58141bad6bbc71224a1c0efe59bc", "score": "0.4991175", "text": "func (identity *VirtualMachineIdentity) AssignProperties_From_VirtualMachineIdentity(source *v1beta20220301s.VirtualMachineIdentity) error {\n\n\t// Type\n\tif source.Type != nil {\n\t\ttypeVar := VirtualMachineIdentity_Type(*source.Type)\n\t\tidentity.Type = &typeVar\n\t} else {\n\t\tidentity.Type = nil\n\t}\n\n\t// UserAssignedIdentities\n\tif source.UserAssignedIdentities != nil {\n\t\tuserAssignedIdentityList := make([]UserAssignedIdentityDetails, len(source.UserAssignedIdentities))\n\t\tfor userAssignedIdentityIndex, userAssignedIdentityItem := range source.UserAssignedIdentities {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tuserAssignedIdentityItem := userAssignedIdentityItem\n\t\t\tvar userAssignedIdentity UserAssignedIdentityDetails\n\t\t\terr := userAssignedIdentity.AssignProperties_From_UserAssignedIdentityDetails(&userAssignedIdentityItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_UserAssignedIdentityDetails() to populate field UserAssignedIdentities\")\n\t\t\t}\n\t\t\tuserAssignedIdentityList[userAssignedIdentityIndex] = userAssignedIdentity\n\t\t}\n\t\tidentity.UserAssignedIdentities = userAssignedIdentityList\n\t} else {\n\t\tidentity.UserAssignedIdentities = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "9100b7bf89e0a7d9028160927faa9db7", "score": "0.4984615", "text": "func (location *ExtendedLocation) AssignProperties_From_ExtendedLocation(source *v20220701s.ExtendedLocation) error {\n\n\t// Name\n\tlocation.Name = genruntime.ClonePointerToString(source.Name)\n\n\t// Type\n\tif source.Type != nil {\n\t\ttypeVar := ExtendedLocationType(*source.Type)\n\t\tlocation.Type = &typeVar\n\t} else {\n\t\tlocation.Type = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "6b6def012fab76bdefb61b3ac4d49a71", "score": "0.49825743", "text": "func (properties *IdentityProperties) AssignProperties_From_IdentityProperties(source *v1beta20210901s.IdentityProperties) error {\n\n\t// PrincipalId\n\tproperties.PrincipalId = genruntime.ClonePointerToString(source.PrincipalId)\n\n\t// TenantId\n\tproperties.TenantId = genruntime.ClonePointerToString(source.TenantId)\n\n\t// Type\n\tif source.Type != nil {\n\t\ttypeVar := IdentityProperties_Type(*source.Type)\n\t\tproperties.Type = &typeVar\n\t} else {\n\t\tproperties.Type = nil\n\t}\n\n\t// UserAssignedIdentities\n\tif source.UserAssignedIdentities != nil {\n\t\tuserAssignedIdentityList := make([]UserAssignedIdentityDetails, len(source.UserAssignedIdentities))\n\t\tfor userAssignedIdentityIndex, userAssignedIdentityItem := range source.UserAssignedIdentities {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tuserAssignedIdentityItem := userAssignedIdentityItem\n\t\t\tvar userAssignedIdentity UserAssignedIdentityDetails\n\t\t\terr := userAssignedIdentity.AssignProperties_From_UserAssignedIdentityDetails(&userAssignedIdentityItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_UserAssignedIdentityDetails() to populate field UserAssignedIdentities\")\n\t\t\t}\n\t\t\tuserAssignedIdentityList[userAssignedIdentityIndex] = userAssignedIdentity\n\t\t}\n\t\tproperties.UserAssignedIdentities = userAssignedIdentityList\n\t} else {\n\t\tproperties.UserAssignedIdentities = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "a5a584c85115e354495d025530e55a26", "score": "0.49810517", "text": "func (format *CustomDnsConfigPropertiesFormat_STATUS) AssignProperties_From_CustomDnsConfigPropertiesFormat_STATUS(source *v20220701s.CustomDnsConfigPropertiesFormat_STATUS) error {\n\n\t// Fqdn\n\tformat.Fqdn = genruntime.ClonePointerToString(source.Fqdn)\n\n\t// IpAddresses\n\tformat.IpAddresses = genruntime.CloneSliceOfString(source.IpAddresses)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "9cde5a22f207294cc6b5316b762f9915", "score": "0.49805298", "text": "func (virtualNetworkTap *VirtualNetworkTap) AssignPropertiesToVirtualNetworkTap(destination *v1alpha1api20201101storage.VirtualNetworkTap) error {\n\n\t// Spec\n\tvar spec v1alpha1api20201101storage.VirtualNetworkTaps_Spec\n\terr := virtualNetworkTap.Spec.AssignPropertiesToVirtualNetworkTapsSpec(&spec)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"populating Spec from Spec, calling AssignPropertiesToVirtualNetworkTapsSpec()\")\n\t}\n\tdestination.Spec = spec\n\n\t// Status\n\tvar status v1alpha1api20201101storage.VirtualNetworkTap_Status_VirtualNetworkTap_SubResourceEmbedded\n\terr = virtualNetworkTap.Status.AssignPropertiesToVirtualNetworkTapStatusVirtualNetworkTapSubResourceEmbedded(&status)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"populating Status from Status, calling AssignPropertiesToVirtualNetworkTapStatusVirtualNetworkTapSubResourceEmbedded()\")\n\t}\n\tdestination.Status = status\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "eef7a6540eb55ca1131e313ade69c8f5", "score": "0.49669504", "text": "func (publicKey *SshPublicKeySpec) AssignProperties_From_SshPublicKeySpec(source *v1beta20220301s.SshPublicKeySpec) error {\n\n\t// KeyData\n\tpublicKey.KeyData = genruntime.ClonePointerToString(source.KeyData)\n\n\t// Path\n\tpublicKey.Path = genruntime.ClonePointerToString(source.Path)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "df94fa11487f6fcf2d422903af9dcbdf", "score": "0.49629036", "text": "func (sku *Sku) AssignProperties_From_Sku(source *v20180601s.Sku) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// Capacity\n\tsku.Capacity = genruntime.ClonePointerToInt(source.Capacity)\n\n\t// Family\n\tsku.Family = genruntime.ClonePointerToString(source.Family)\n\n\t// Name\n\tsku.Name = genruntime.ClonePointerToString(source.Name)\n\n\t// Size\n\tsku.Size = genruntime.ClonePointerToString(source.Size)\n\n\t// Tier\n\tsku.Tier = genruntime.ClonePointerToString(source.Tier)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tsku.PropertyBag = propertyBag\n\t} else {\n\t\tsku.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForSku interface (if implemented) to customize the conversion\n\tvar skuAsAny any = sku\n\tif augmentedSku, ok := skuAsAny.(augmentConversionForSku); ok {\n\t\terr := augmentedSku.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "641425f134320b61caea940ae419cd21", "score": "0.49618557", "text": "func (addressSku *PublicIPAddressSku) AssignProperties_From_PublicIPAddressSku(source *v1beta20220301s.PublicIPAddressSku) error {\n\n\t// Name\n\tif source.Name != nil {\n\t\tname := PublicIPAddressSku_Name(*source.Name)\n\t\taddressSku.Name = &name\n\t} else {\n\t\taddressSku.Name = nil\n\t}\n\n\t// Tier\n\tif source.Tier != nil {\n\t\ttier := PublicIPAddressSku_Tier(*source.Tier)\n\t\taddressSku.Tier = &tier\n\t} else {\n\t\taddressSku.Tier = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "6337208a21c35eaafc711228b33e2481", "score": "0.49565908", "text": "func (properties *KeyVaultProperties_STATUS) AssignProperties_From_KeyVaultProperties_STATUS(source *v1beta20210901s.KeyVaultProperties_STATUS) error {\n\n\t// Identity\n\tproperties.Identity = genruntime.ClonePointerToString(source.Identity)\n\n\t// KeyIdentifier\n\tproperties.KeyIdentifier = genruntime.ClonePointerToString(source.KeyIdentifier)\n\n\t// KeyRotationEnabled\n\tif source.KeyRotationEnabled != nil {\n\t\tkeyRotationEnabled := *source.KeyRotationEnabled\n\t\tproperties.KeyRotationEnabled = &keyRotationEnabled\n\t} else {\n\t\tproperties.KeyRotationEnabled = nil\n\t}\n\n\t// LastKeyRotationTimestamp\n\tproperties.LastKeyRotationTimestamp = genruntime.ClonePointerToString(source.LastKeyRotationTimestamp)\n\n\t// VersionedKeyIdentifier\n\tproperties.VersionedKeyIdentifier = genruntime.ClonePointerToString(source.VersionedKeyIdentifier)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "e18dc1934f5f9149d10749649a064c39", "score": "0.49559322", "text": "func (service *SearchService_Spec) AssignProperties_From_SearchService_Spec(source *v20220901s.SearchService_Spec) error {\n\n\t// AuthOptions\n\tif source.AuthOptions != nil {\n\t\tvar authOption DataPlaneAuthOptions\n\t\terr := authOption.AssignProperties_From_DataPlaneAuthOptions(source.AuthOptions)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_DataPlaneAuthOptions() to populate field AuthOptions\")\n\t\t}\n\t\tservice.AuthOptions = &authOption\n\t} else {\n\t\tservice.AuthOptions = nil\n\t}\n\n\t// AzureName\n\tservice.AzureName = source.AzureName\n\n\t// DisableLocalAuth\n\tif source.DisableLocalAuth != nil {\n\t\tdisableLocalAuth := *source.DisableLocalAuth\n\t\tservice.DisableLocalAuth = &disableLocalAuth\n\t} else {\n\t\tservice.DisableLocalAuth = nil\n\t}\n\n\t// EncryptionWithCmk\n\tif source.EncryptionWithCmk != nil {\n\t\tvar encryptionWithCmk EncryptionWithCmk\n\t\terr := encryptionWithCmk.AssignProperties_From_EncryptionWithCmk(source.EncryptionWithCmk)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_EncryptionWithCmk() to populate field EncryptionWithCmk\")\n\t\t}\n\t\tservice.EncryptionWithCmk = &encryptionWithCmk\n\t} else {\n\t\tservice.EncryptionWithCmk = nil\n\t}\n\n\t// HostingMode\n\tif source.HostingMode != nil {\n\t\thostingMode := SearchServiceProperties_HostingMode(*source.HostingMode)\n\t\tservice.HostingMode = &hostingMode\n\t} else {\n\t\tservice.HostingMode = nil\n\t}\n\n\t// Identity\n\tif source.Identity != nil {\n\t\tvar identity Identity\n\t\terr := identity.AssignProperties_From_Identity(source.Identity)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_Identity() to populate field Identity\")\n\t\t}\n\t\tservice.Identity = &identity\n\t} else {\n\t\tservice.Identity = nil\n\t}\n\n\t// Location\n\tservice.Location = genruntime.ClonePointerToString(source.Location)\n\n\t// NetworkRuleSet\n\tif source.NetworkRuleSet != nil {\n\t\tvar networkRuleSet NetworkRuleSet\n\t\terr := networkRuleSet.AssignProperties_From_NetworkRuleSet(source.NetworkRuleSet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_NetworkRuleSet() to populate field NetworkRuleSet\")\n\t\t}\n\t\tservice.NetworkRuleSet = &networkRuleSet\n\t} else {\n\t\tservice.NetworkRuleSet = nil\n\t}\n\n\t// OperatorSpec\n\tif source.OperatorSpec != nil {\n\t\tvar operatorSpec SearchServiceOperatorSpec\n\t\terr := operatorSpec.AssignProperties_From_SearchServiceOperatorSpec(source.OperatorSpec)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SearchServiceOperatorSpec() to populate field OperatorSpec\")\n\t\t}\n\t\tservice.OperatorSpec = &operatorSpec\n\t} else {\n\t\tservice.OperatorSpec = nil\n\t}\n\n\t// Owner\n\tif source.Owner != nil {\n\t\towner := source.Owner.Copy()\n\t\tservice.Owner = &owner\n\t} else {\n\t\tservice.Owner = nil\n\t}\n\n\t// PartitionCount\n\tif source.PartitionCount != nil {\n\t\tpartitionCount := *source.PartitionCount\n\t\tservice.PartitionCount = &partitionCount\n\t} else {\n\t\tservice.PartitionCount = nil\n\t}\n\n\t// PublicNetworkAccess\n\tif source.PublicNetworkAccess != nil {\n\t\tpublicNetworkAccess := SearchServiceProperties_PublicNetworkAccess(*source.PublicNetworkAccess)\n\t\tservice.PublicNetworkAccess = &publicNetworkAccess\n\t} else {\n\t\tservice.PublicNetworkAccess = nil\n\t}\n\n\t// ReplicaCount\n\tif source.ReplicaCount != nil {\n\t\treplicaCount := *source.ReplicaCount\n\t\tservice.ReplicaCount = &replicaCount\n\t} else {\n\t\tservice.ReplicaCount = nil\n\t}\n\n\t// Sku\n\tif source.Sku != nil {\n\t\tvar sku Sku\n\t\terr := sku.AssignProperties_From_Sku(source.Sku)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_Sku() to populate field Sku\")\n\t\t}\n\t\tservice.Sku = &sku\n\t} else {\n\t\tservice.Sku = nil\n\t}\n\n\t// Tags\n\tservice.Tags = genruntime.CloneMapOfStringToString(source.Tags)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "a8875314cc14af2f52e1bd0e914b0cb6", "score": "0.49547505", "text": "func (property *PrivateEndpointProperty_STATUS) AssignProperties_From_PrivateEndpointProperty_STATUS(source *v20180601s.PrivateEndpointProperty_STATUS) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// Id\n\tproperty.Id = genruntime.ClonePointerToString(source.Id)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tproperty.PropertyBag = propertyBag\n\t} else {\n\t\tproperty.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForPrivateEndpointProperty_STATUS interface (if implemented) to customize the conversion\n\tvar propertyAsAny any = property\n\tif augmentedProperty, ok := propertyAsAny.(augmentConversionForPrivateEndpointProperty_STATUS); ok {\n\t\terr := augmentedProperty.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "fc3112a042e9e2c75bfb755dd5529e9a", "score": "0.4954142", "text": "func (diagnostics *BootDiagnostics) AssignProperties_From_BootDiagnostics(source *v1beta20220301s.BootDiagnostics) error {\n\n\t// Enabled\n\tif source.Enabled != nil {\n\t\tenabled := *source.Enabled\n\t\tdiagnostics.Enabled = &enabled\n\t} else {\n\t\tdiagnostics.Enabled = nil\n\t}\n\n\t// StorageUri\n\tdiagnostics.StorageUri = genruntime.ClonePointerToString(source.StorageUri)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "ec7bf41709f2d803da92f40bd4d04420", "score": "0.49535692", "text": "func (parameters *ServerPortMatchConditionParameters) AssignProperties_From_ServerPortMatchConditionParameters(source *v20210601s.ServerPortMatchConditionParameters) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// MatchValues\n\tparameters.MatchValues = genruntime.CloneSliceOfString(source.MatchValues)\n\n\t// NegateCondition\n\tif source.NegateCondition != nil {\n\t\tnegateCondition := *source.NegateCondition\n\t\tparameters.NegateCondition = &negateCondition\n\t} else {\n\t\tparameters.NegateCondition = nil\n\t}\n\n\t// Operator\n\tparameters.Operator = genruntime.ClonePointerToString(source.Operator)\n\n\t// Transforms\n\tparameters.Transforms = genruntime.CloneSliceOfString(source.Transforms)\n\n\t// TypeName\n\tparameters.TypeName = genruntime.ClonePointerToString(source.TypeName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tparameters.PropertyBag = propertyBag\n\t} else {\n\t\tparameters.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForServerPortMatchConditionParameters interface (if implemented) to customize the conversion\n\tvar parametersAsAny any = parameters\n\tif augmentedParameters, ok := parametersAsAny.(augmentConversionForServerPortMatchConditionParameters); ok {\n\t\terr := augmentedParameters.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "5761f63356114780a5c018bb9a6e2d74", "score": "0.49469095", "text": "func (peering *VirtualNetworks_VirtualNetworkPeering_Spec) AssignProperties_From_VirtualNetworks_VirtualNetworkPeering_Spec(source *v20201101s.VirtualNetworks_VirtualNetworkPeering_Spec) error {\n\n\t// AllowForwardedTraffic\n\tif source.AllowForwardedTraffic != nil {\n\t\tallowForwardedTraffic := *source.AllowForwardedTraffic\n\t\tpeering.AllowForwardedTraffic = &allowForwardedTraffic\n\t} else {\n\t\tpeering.AllowForwardedTraffic = nil\n\t}\n\n\t// AllowGatewayTransit\n\tif source.AllowGatewayTransit != nil {\n\t\tallowGatewayTransit := *source.AllowGatewayTransit\n\t\tpeering.AllowGatewayTransit = &allowGatewayTransit\n\t} else {\n\t\tpeering.AllowGatewayTransit = nil\n\t}\n\n\t// AllowVirtualNetworkAccess\n\tif source.AllowVirtualNetworkAccess != nil {\n\t\tallowVirtualNetworkAccess := *source.AllowVirtualNetworkAccess\n\t\tpeering.AllowVirtualNetworkAccess = &allowVirtualNetworkAccess\n\t} else {\n\t\tpeering.AllowVirtualNetworkAccess = nil\n\t}\n\n\t// AzureName\n\tpeering.AzureName = source.AzureName\n\n\t// DoNotVerifyRemoteGateways\n\tif source.DoNotVerifyRemoteGateways != nil {\n\t\tdoNotVerifyRemoteGateway := *source.DoNotVerifyRemoteGateways\n\t\tpeering.DoNotVerifyRemoteGateways = &doNotVerifyRemoteGateway\n\t} else {\n\t\tpeering.DoNotVerifyRemoteGateways = nil\n\t}\n\n\t// Owner\n\tif source.Owner != nil {\n\t\towner := source.Owner.Copy()\n\t\tpeering.Owner = &owner\n\t} else {\n\t\tpeering.Owner = nil\n\t}\n\n\t// PeeringState\n\tif source.PeeringState != nil {\n\t\tpeeringState := VirtualNetworkPeeringPropertiesFormat_PeeringState(*source.PeeringState)\n\t\tpeering.PeeringState = &peeringState\n\t} else {\n\t\tpeering.PeeringState = nil\n\t}\n\n\t// RemoteAddressSpace\n\tif source.RemoteAddressSpace != nil {\n\t\tvar remoteAddressSpace AddressSpace\n\t\terr := remoteAddressSpace.AssignProperties_From_AddressSpace(source.RemoteAddressSpace)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_AddressSpace() to populate field RemoteAddressSpace\")\n\t\t}\n\t\tpeering.RemoteAddressSpace = &remoteAddressSpace\n\t} else {\n\t\tpeering.RemoteAddressSpace = nil\n\t}\n\n\t// RemoteBgpCommunities\n\tif source.RemoteBgpCommunities != nil {\n\t\tvar remoteBgpCommunity VirtualNetworkBgpCommunities\n\t\terr := remoteBgpCommunity.AssignProperties_From_VirtualNetworkBgpCommunities(source.RemoteBgpCommunities)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualNetworkBgpCommunities() to populate field RemoteBgpCommunities\")\n\t\t}\n\t\tpeering.RemoteBgpCommunities = &remoteBgpCommunity\n\t} else {\n\t\tpeering.RemoteBgpCommunities = nil\n\t}\n\n\t// RemoteVirtualNetwork\n\tif source.RemoteVirtualNetwork != nil {\n\t\tvar remoteVirtualNetwork SubResource\n\t\terr := remoteVirtualNetwork.AssignProperties_From_SubResource(source.RemoteVirtualNetwork)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field RemoteVirtualNetwork\")\n\t\t}\n\t\tpeering.RemoteVirtualNetwork = &remoteVirtualNetwork\n\t} else {\n\t\tpeering.RemoteVirtualNetwork = nil\n\t}\n\n\t// UseRemoteGateways\n\tif source.UseRemoteGateways != nil {\n\t\tuseRemoteGateway := *source.UseRemoteGateways\n\t\tpeering.UseRemoteGateways = &useRemoteGateway\n\t} else {\n\t\tpeering.UseRemoteGateways = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "807b36840967486f21144864a92db35d", "score": "0.49295714", "text": "func (machine *VirtualMachine_Spec) AssignProperties_To_VirtualMachine_Spec(destination *v1beta20220301s.VirtualMachine_Spec) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// AdditionalCapabilities\n\tif machine.AdditionalCapabilities != nil {\n\t\tvar additionalCapability v1beta20220301s.AdditionalCapabilities\n\t\terr := machine.AdditionalCapabilities.AssignProperties_To_AdditionalCapabilities(&additionalCapability)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_AdditionalCapabilities() to populate field AdditionalCapabilities\")\n\t\t}\n\t\tdestination.AdditionalCapabilities = &additionalCapability\n\t} else {\n\t\tdestination.AdditionalCapabilities = nil\n\t}\n\n\t// ApplicationProfile\n\tif machine.ApplicationProfile != nil {\n\t\tvar applicationProfile v1beta20220301s.ApplicationProfile\n\t\terr := machine.ApplicationProfile.AssignProperties_To_ApplicationProfile(&applicationProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_ApplicationProfile() to populate field ApplicationProfile\")\n\t\t}\n\t\tdestination.ApplicationProfile = &applicationProfile\n\t} else {\n\t\tdestination.ApplicationProfile = nil\n\t}\n\n\t// AvailabilitySet\n\tif machine.AvailabilitySet != nil {\n\t\tvar availabilitySet v1beta20220301s.SubResource\n\t\terr := machine.AvailabilitySet.AssignProperties_To_SubResource(&availabilitySet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_SubResource() to populate field AvailabilitySet\")\n\t\t}\n\t\tdestination.AvailabilitySet = &availabilitySet\n\t} else {\n\t\tdestination.AvailabilitySet = nil\n\t}\n\n\t// AzureName\n\tdestination.AzureName = machine.AzureName\n\n\t// BillingProfile\n\tif machine.BillingProfile != nil {\n\t\tvar billingProfile v1beta20220301s.BillingProfile\n\t\terr := machine.BillingProfile.AssignProperties_To_BillingProfile(&billingProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_BillingProfile() to populate field BillingProfile\")\n\t\t}\n\t\tdestination.BillingProfile = &billingProfile\n\t} else {\n\t\tdestination.BillingProfile = nil\n\t}\n\n\t// CapacityReservation\n\tif machine.CapacityReservation != nil {\n\t\tvar capacityReservation v1beta20220301s.CapacityReservationProfile\n\t\terr := machine.CapacityReservation.AssignProperties_To_CapacityReservationProfile(&capacityReservation)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_CapacityReservationProfile() to populate field CapacityReservation\")\n\t\t}\n\t\tdestination.CapacityReservation = &capacityReservation\n\t} else {\n\t\tdestination.CapacityReservation = nil\n\t}\n\n\t// DiagnosticsProfile\n\tif machine.DiagnosticsProfile != nil {\n\t\tvar diagnosticsProfile v1beta20220301s.DiagnosticsProfile\n\t\terr := machine.DiagnosticsProfile.AssignProperties_To_DiagnosticsProfile(&diagnosticsProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_DiagnosticsProfile() to populate field DiagnosticsProfile\")\n\t\t}\n\t\tdestination.DiagnosticsProfile = &diagnosticsProfile\n\t} else {\n\t\tdestination.DiagnosticsProfile = nil\n\t}\n\n\t// EvictionPolicy\n\tif machine.EvictionPolicy != nil {\n\t\tevictionPolicy := string(*machine.EvictionPolicy)\n\t\tdestination.EvictionPolicy = &evictionPolicy\n\t} else {\n\t\tdestination.EvictionPolicy = nil\n\t}\n\n\t// ExtendedLocation\n\tif machine.ExtendedLocation != nil {\n\t\tvar extendedLocation v1beta20220301s.ExtendedLocation\n\t\terr := machine.ExtendedLocation.AssignProperties_To_ExtendedLocation(&extendedLocation)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_ExtendedLocation() to populate field ExtendedLocation\")\n\t\t}\n\t\tdestination.ExtendedLocation = &extendedLocation\n\t} else {\n\t\tdestination.ExtendedLocation = nil\n\t}\n\n\t// ExtensionsTimeBudget\n\tdestination.ExtensionsTimeBudget = genruntime.ClonePointerToString(machine.ExtensionsTimeBudget)\n\n\t// HardwareProfile\n\tif machine.HardwareProfile != nil {\n\t\tvar hardwareProfile v1beta20220301s.HardwareProfile\n\t\terr := machine.HardwareProfile.AssignProperties_To_HardwareProfile(&hardwareProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_HardwareProfile() to populate field HardwareProfile\")\n\t\t}\n\t\tdestination.HardwareProfile = &hardwareProfile\n\t} else {\n\t\tdestination.HardwareProfile = nil\n\t}\n\n\t// Host\n\tif machine.Host != nil {\n\t\tvar host v1beta20220301s.SubResource\n\t\terr := machine.Host.AssignProperties_To_SubResource(&host)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_SubResource() to populate field Host\")\n\t\t}\n\t\tdestination.Host = &host\n\t} else {\n\t\tdestination.Host = nil\n\t}\n\n\t// HostGroup\n\tif machine.HostGroup != nil {\n\t\tvar hostGroup v1beta20220301s.SubResource\n\t\terr := machine.HostGroup.AssignProperties_To_SubResource(&hostGroup)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_SubResource() to populate field HostGroup\")\n\t\t}\n\t\tdestination.HostGroup = &hostGroup\n\t} else {\n\t\tdestination.HostGroup = nil\n\t}\n\n\t// Identity\n\tif machine.Identity != nil {\n\t\tvar identity v1beta20220301s.VirtualMachineIdentity\n\t\terr := machine.Identity.AssignProperties_To_VirtualMachineIdentity(&identity)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_VirtualMachineIdentity() to populate field Identity\")\n\t\t}\n\t\tdestination.Identity = &identity\n\t} else {\n\t\tdestination.Identity = nil\n\t}\n\n\t// LicenseType\n\tdestination.LicenseType = genruntime.ClonePointerToString(machine.LicenseType)\n\n\t// Location\n\tdestination.Location = genruntime.ClonePointerToString(machine.Location)\n\n\t// NetworkProfile\n\tif machine.NetworkProfile != nil {\n\t\tvar networkProfile v1beta20220301s.NetworkProfile\n\t\terr := machine.NetworkProfile.AssignProperties_To_NetworkProfile(&networkProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_NetworkProfile() to populate field NetworkProfile\")\n\t\t}\n\t\tdestination.NetworkProfile = &networkProfile\n\t} else {\n\t\tdestination.NetworkProfile = nil\n\t}\n\n\t// OriginalVersion\n\tdestination.OriginalVersion = machine.OriginalVersion()\n\n\t// OsProfile\n\tif machine.OsProfile != nil {\n\t\tvar osProfile v1beta20220301s.OSProfile\n\t\terr := machine.OsProfile.AssignProperties_To_OSProfile(&osProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_OSProfile() to populate field OsProfile\")\n\t\t}\n\t\tdestination.OsProfile = &osProfile\n\t} else {\n\t\tdestination.OsProfile = nil\n\t}\n\n\t// Owner\n\tif machine.Owner != nil {\n\t\towner := machine.Owner.Copy()\n\t\tdestination.Owner = &owner\n\t} else {\n\t\tdestination.Owner = nil\n\t}\n\n\t// Plan\n\tif machine.Plan != nil {\n\t\tvar plan v1beta20220301s.Plan\n\t\terr := machine.Plan.AssignProperties_To_Plan(&plan)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_Plan() to populate field Plan\")\n\t\t}\n\t\tdestination.Plan = &plan\n\t} else {\n\t\tdestination.Plan = nil\n\t}\n\n\t// PlatformFaultDomain\n\tdestination.PlatformFaultDomain = genruntime.ClonePointerToInt(machine.PlatformFaultDomain)\n\n\t// Priority\n\tif machine.Priority != nil {\n\t\tpriority := string(*machine.Priority)\n\t\tdestination.Priority = &priority\n\t} else {\n\t\tdestination.Priority = nil\n\t}\n\n\t// ProximityPlacementGroup\n\tif machine.ProximityPlacementGroup != nil {\n\t\tvar proximityPlacementGroup v1beta20220301s.SubResource\n\t\terr := machine.ProximityPlacementGroup.AssignProperties_To_SubResource(&proximityPlacementGroup)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_SubResource() to populate field ProximityPlacementGroup\")\n\t\t}\n\t\tdestination.ProximityPlacementGroup = &proximityPlacementGroup\n\t} else {\n\t\tdestination.ProximityPlacementGroup = nil\n\t}\n\n\t// ScheduledEventsProfile\n\tif machine.ScheduledEventsProfile != nil {\n\t\tvar scheduledEventsProfile v1beta20220301s.ScheduledEventsProfile\n\t\terr := machine.ScheduledEventsProfile.AssignProperties_To_ScheduledEventsProfile(&scheduledEventsProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_ScheduledEventsProfile() to populate field ScheduledEventsProfile\")\n\t\t}\n\t\tdestination.ScheduledEventsProfile = &scheduledEventsProfile\n\t} else {\n\t\tdestination.ScheduledEventsProfile = nil\n\t}\n\n\t// SecurityProfile\n\tif machine.SecurityProfile != nil {\n\t\tvar securityProfile v1beta20220301s.SecurityProfile\n\t\terr := machine.SecurityProfile.AssignProperties_To_SecurityProfile(&securityProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_SecurityProfile() to populate field SecurityProfile\")\n\t\t}\n\t\tdestination.SecurityProfile = &securityProfile\n\t} else {\n\t\tdestination.SecurityProfile = nil\n\t}\n\n\t// StorageProfile\n\tif machine.StorageProfile != nil {\n\t\tvar storageProfile v1beta20220301s.StorageProfile\n\t\terr := machine.StorageProfile.AssignProperties_To_StorageProfile(&storageProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_StorageProfile() to populate field StorageProfile\")\n\t\t}\n\t\tdestination.StorageProfile = &storageProfile\n\t} else {\n\t\tdestination.StorageProfile = nil\n\t}\n\n\t// Tags\n\tdestination.Tags = genruntime.CloneMapOfStringToString(machine.Tags)\n\n\t// UserData\n\tdestination.UserData = genruntime.ClonePointerToString(machine.UserData)\n\n\t// VirtualMachineScaleSet\n\tif machine.VirtualMachineScaleSet != nil {\n\t\tvar virtualMachineScaleSet v1beta20220301s.SubResource\n\t\terr := machine.VirtualMachineScaleSet.AssignProperties_To_SubResource(&virtualMachineScaleSet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_SubResource() to populate field VirtualMachineScaleSet\")\n\t\t}\n\t\tdestination.VirtualMachineScaleSet = &virtualMachineScaleSet\n\t} else {\n\t\tdestination.VirtualMachineScaleSet = nil\n\t}\n\n\t// Zones\n\tdestination.Zones = genruntime.CloneSliceOfString(machine.Zones)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "43667f4e577ccc9b838f4529c924d84a", "score": "0.49268547", "text": "func (service *SearchService_Spec) AssignProperties_To_SearchService_Spec(destination *v20220901s.SearchService_Spec) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// AuthOptions\n\tif service.AuthOptions != nil {\n\t\tvar authOption v20220901s.DataPlaneAuthOptions\n\t\terr := service.AuthOptions.AssignProperties_To_DataPlaneAuthOptions(&authOption)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_DataPlaneAuthOptions() to populate field AuthOptions\")\n\t\t}\n\t\tdestination.AuthOptions = &authOption\n\t} else {\n\t\tdestination.AuthOptions = nil\n\t}\n\n\t// AzureName\n\tdestination.AzureName = service.AzureName\n\n\t// DisableLocalAuth\n\tif service.DisableLocalAuth != nil {\n\t\tdisableLocalAuth := *service.DisableLocalAuth\n\t\tdestination.DisableLocalAuth = &disableLocalAuth\n\t} else {\n\t\tdestination.DisableLocalAuth = nil\n\t}\n\n\t// EncryptionWithCmk\n\tif service.EncryptionWithCmk != nil {\n\t\tvar encryptionWithCmk v20220901s.EncryptionWithCmk\n\t\terr := service.EncryptionWithCmk.AssignProperties_To_EncryptionWithCmk(&encryptionWithCmk)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_EncryptionWithCmk() to populate field EncryptionWithCmk\")\n\t\t}\n\t\tdestination.EncryptionWithCmk = &encryptionWithCmk\n\t} else {\n\t\tdestination.EncryptionWithCmk = nil\n\t}\n\n\t// HostingMode\n\tif service.HostingMode != nil {\n\t\thostingMode := string(*service.HostingMode)\n\t\tdestination.HostingMode = &hostingMode\n\t} else {\n\t\tdestination.HostingMode = nil\n\t}\n\n\t// Identity\n\tif service.Identity != nil {\n\t\tvar identity v20220901s.Identity\n\t\terr := service.Identity.AssignProperties_To_Identity(&identity)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_Identity() to populate field Identity\")\n\t\t}\n\t\tdestination.Identity = &identity\n\t} else {\n\t\tdestination.Identity = nil\n\t}\n\n\t// Location\n\tdestination.Location = genruntime.ClonePointerToString(service.Location)\n\n\t// NetworkRuleSet\n\tif service.NetworkRuleSet != nil {\n\t\tvar networkRuleSet v20220901s.NetworkRuleSet\n\t\terr := service.NetworkRuleSet.AssignProperties_To_NetworkRuleSet(&networkRuleSet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_NetworkRuleSet() to populate field NetworkRuleSet\")\n\t\t}\n\t\tdestination.NetworkRuleSet = &networkRuleSet\n\t} else {\n\t\tdestination.NetworkRuleSet = nil\n\t}\n\n\t// OperatorSpec\n\tif service.OperatorSpec != nil {\n\t\tvar operatorSpec v20220901s.SearchServiceOperatorSpec\n\t\terr := service.OperatorSpec.AssignProperties_To_SearchServiceOperatorSpec(&operatorSpec)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_SearchServiceOperatorSpec() to populate field OperatorSpec\")\n\t\t}\n\t\tdestination.OperatorSpec = &operatorSpec\n\t} else {\n\t\tdestination.OperatorSpec = nil\n\t}\n\n\t// OriginalVersion\n\tdestination.OriginalVersion = service.OriginalVersion()\n\n\t// Owner\n\tif service.Owner != nil {\n\t\towner := service.Owner.Copy()\n\t\tdestination.Owner = &owner\n\t} else {\n\t\tdestination.Owner = nil\n\t}\n\n\t// PartitionCount\n\tif service.PartitionCount != nil {\n\t\tpartitionCount := *service.PartitionCount\n\t\tdestination.PartitionCount = &partitionCount\n\t} else {\n\t\tdestination.PartitionCount = nil\n\t}\n\n\t// PublicNetworkAccess\n\tif service.PublicNetworkAccess != nil {\n\t\tpublicNetworkAccess := string(*service.PublicNetworkAccess)\n\t\tdestination.PublicNetworkAccess = &publicNetworkAccess\n\t} else {\n\t\tdestination.PublicNetworkAccess = nil\n\t}\n\n\t// ReplicaCount\n\tif service.ReplicaCount != nil {\n\t\treplicaCount := *service.ReplicaCount\n\t\tdestination.ReplicaCount = &replicaCount\n\t} else {\n\t\tdestination.ReplicaCount = nil\n\t}\n\n\t// Sku\n\tif service.Sku != nil {\n\t\tvar sku v20220901s.Sku\n\t\terr := service.Sku.AssignProperties_To_Sku(&sku)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_Sku() to populate field Sku\")\n\t\t}\n\t\tdestination.Sku = &sku\n\t} else {\n\t\tdestination.Sku = nil\n\t}\n\n\t// Tags\n\tdestination.Tags = genruntime.CloneMapOfStringToString(service.Tags)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "5305b7cb7a2eb0edac5413cb0dfaf2c2", "score": "0.49158293", "text": "func (operator *ServerOperatorSpec) AssignProperties_From_ServerOperatorSpec(source *v20180601s.ServerOperatorSpec) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// Secrets\n\tif source.Secrets != nil {\n\t\tvar secret ServerOperatorSecrets\n\t\terr := secret.AssignProperties_From_ServerOperatorSecrets(source.Secrets)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ServerOperatorSecrets() to populate field Secrets\")\n\t\t}\n\t\toperator.Secrets = &secret\n\t} else {\n\t\toperator.Secrets = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\toperator.PropertyBag = propertyBag\n\t} else {\n\t\toperator.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForServerOperatorSpec interface (if implemented) to customize the conversion\n\tvar operatorAsAny any = operator\n\tif augmentedOperator, ok := operatorAsAny.(augmentConversionForServerOperatorSpec); ok {\n\t\terr := augmentedOperator.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "2b8ba62961f5385cb4008020fc5e24de", "score": "0.4913101", "text": "func (link *EndpointProperties_WebApplicationFirewallPolicyLink) AssignProperties_From_EndpointProperties_WebApplicationFirewallPolicyLink(source *v20210601s.EndpointProperties_WebApplicationFirewallPolicyLink) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// Reference\n\tif source.Reference != nil {\n\t\treference := source.Reference.Copy()\n\t\tlink.Reference = &reference\n\t} else {\n\t\tlink.Reference = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tlink.PropertyBag = propertyBag\n\t} else {\n\t\tlink.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForEndpointProperties_WebApplicationFirewallPolicyLink interface (if implemented) to customize the conversion\n\tvar linkAsAny any = link\n\tif augmentedLink, ok := linkAsAny.(augmentConversionForEndpointProperties_WebApplicationFirewallPolicyLink); ok {\n\t\terr := augmentedLink.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "bbbc1c72241422542e258b45fc13b8b2", "score": "0.49108347", "text": "func (profile *CapacityReservationProfile) AssignProperties_From_CapacityReservationProfile(source *v1beta20220301s.CapacityReservationProfile) error {\n\n\t// CapacityReservationGroup\n\tif source.CapacityReservationGroup != nil {\n\t\tvar capacityReservationGroup SubResource\n\t\terr := capacityReservationGroup.AssignProperties_From_SubResource(source.CapacityReservationGroup)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_SubResource() to populate field CapacityReservationGroup\")\n\t\t}\n\t\tprofile.CapacityReservationGroup = &capacityReservationGroup\n\t} else {\n\t\tprofile.CapacityReservationGroup = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "6f206aedefb407af7943a3a3e96278ff", "score": "0.49089018", "text": "func (parameters *HealthProbeParameters) AssignProperties_From_HealthProbeParameters(source *v20210601s.HealthProbeParameters) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// ProbeIntervalInSeconds\n\tparameters.ProbeIntervalInSeconds = genruntime.ClonePointerToInt(source.ProbeIntervalInSeconds)\n\n\t// ProbePath\n\tparameters.ProbePath = genruntime.ClonePointerToString(source.ProbePath)\n\n\t// ProbeProtocol\n\tparameters.ProbeProtocol = genruntime.ClonePointerToString(source.ProbeProtocol)\n\n\t// ProbeRequestType\n\tparameters.ProbeRequestType = genruntime.ClonePointerToString(source.ProbeRequestType)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tparameters.PropertyBag = propertyBag\n\t} else {\n\t\tparameters.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForHealthProbeParameters interface (if implemented) to customize the conversion\n\tvar parametersAsAny any = parameters\n\tif augmentedParameters, ok := parametersAsAny.(augmentConversionForHealthProbeParameters); ok {\n\t\terr := augmentedParameters.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "c603affde8eeb5e012b6620372db0106", "score": "0.4907116", "text": "func (parameters *SocketAddrMatchConditionParameters) AssignProperties_From_SocketAddrMatchConditionParameters(source *v20210601s.SocketAddrMatchConditionParameters) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// MatchValues\n\tparameters.MatchValues = genruntime.CloneSliceOfString(source.MatchValues)\n\n\t// NegateCondition\n\tif source.NegateCondition != nil {\n\t\tnegateCondition := *source.NegateCondition\n\t\tparameters.NegateCondition = &negateCondition\n\t} else {\n\t\tparameters.NegateCondition = nil\n\t}\n\n\t// Operator\n\tparameters.Operator = genruntime.ClonePointerToString(source.Operator)\n\n\t// Transforms\n\tparameters.Transforms = genruntime.CloneSliceOfString(source.Transforms)\n\n\t// TypeName\n\tparameters.TypeName = genruntime.ClonePointerToString(source.TypeName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tparameters.PropertyBag = propertyBag\n\t} else {\n\t\tparameters.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForSocketAddrMatchConditionParameters interface (if implemented) to customize the conversion\n\tvar parametersAsAny any = parameters\n\tif augmentedParameters, ok := parametersAsAny.(augmentConversionForSocketAddrMatchConditionParameters); ok {\n\t\terr := augmentedParameters.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "446b5e1eddc122cb615f3843cc3b02f5", "score": "0.49029273", "text": "func (reference *ImageDiskReference) AssignProperties_From_ImageDiskReference(source *v1beta20200930s.ImageDiskReference) error {\n\n\t// Lun\n\treference.Lun = genruntime.ClonePointerToInt(source.Lun)\n\n\t// Reference\n\tif source.Reference != nil {\n\t\treferenceTemp := source.Reference.Copy()\n\t\treference.Reference = &referenceTemp\n\t} else {\n\t\treference.Reference = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "1b14d3dc882fb7d643a5c07efed303a2", "score": "0.49027985", "text": "func (identifier *UrlSigningParamIdentifier_STATUS) AssignProperties_From_UrlSigningParamIdentifier_STATUS(source *v20210601s.UrlSigningParamIdentifier_STATUS) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// ParamIndicator\n\tidentifier.ParamIndicator = genruntime.ClonePointerToString(source.ParamIndicator)\n\n\t// ParamName\n\tidentifier.ParamName = genruntime.ClonePointerToString(source.ParamName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tidentifier.PropertyBag = propertyBag\n\t} else {\n\t\tidentifier.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForUrlSigningParamIdentifier_STATUS interface (if implemented) to customize the conversion\n\tvar identifierAsAny any = identifier\n\tif augmentedIdentifier, ok := identifierAsAny.(augmentConversionForUrlSigningParamIdentifier_STATUS); ok {\n\t\terr := augmentedIdentifier.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "073c2bf31cc6f799591bd1fa80945f13", "score": "0.490039", "text": "func (configuration *PrivateEndpointIPConfiguration_STATUS) AssignProperties_From_PrivateEndpointIPConfiguration_STATUS(source *v20220701s.PrivateEndpointIPConfiguration_STATUS) error {\n\n\t// Etag\n\tconfiguration.Etag = genruntime.ClonePointerToString(source.Etag)\n\n\t// GroupId\n\tconfiguration.GroupId = genruntime.ClonePointerToString(source.GroupId)\n\n\t// MemberName\n\tconfiguration.MemberName = genruntime.ClonePointerToString(source.MemberName)\n\n\t// Name\n\tconfiguration.Name = genruntime.ClonePointerToString(source.Name)\n\n\t// PrivateIPAddress\n\tconfiguration.PrivateIPAddress = genruntime.ClonePointerToString(source.PrivateIPAddress)\n\n\t// Type\n\tconfiguration.Type = genruntime.ClonePointerToString(source.Type)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "58c3df72082cb67a43e59b51c107be21", "score": "0.48933017", "text": "func (endpoint *PrivateEndpoint_Spec) AssignProperties_From_PrivateEndpoint_Spec(source *v20220701s.PrivateEndpoint_Spec) error {\n\n\t// ApplicationSecurityGroups\n\tif source.ApplicationSecurityGroups != nil {\n\t\tapplicationSecurityGroupList := make([]ApplicationSecurityGroupSpec_PrivateEndpoint_SubResourceEmbedded, len(source.ApplicationSecurityGroups))\n\t\tfor applicationSecurityGroupIndex, applicationSecurityGroupItem := range source.ApplicationSecurityGroups {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tapplicationSecurityGroupItem := applicationSecurityGroupItem\n\t\t\tvar applicationSecurityGroup ApplicationSecurityGroupSpec_PrivateEndpoint_SubResourceEmbedded\n\t\t\terr := applicationSecurityGroup.AssignProperties_From_ApplicationSecurityGroupSpec_PrivateEndpoint_SubResourceEmbedded(&applicationSecurityGroupItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ApplicationSecurityGroupSpec_PrivateEndpoint_SubResourceEmbedded() to populate field ApplicationSecurityGroups\")\n\t\t\t}\n\t\t\tapplicationSecurityGroupList[applicationSecurityGroupIndex] = applicationSecurityGroup\n\t\t}\n\t\tendpoint.ApplicationSecurityGroups = applicationSecurityGroupList\n\t} else {\n\t\tendpoint.ApplicationSecurityGroups = nil\n\t}\n\n\t// AzureName\n\tendpoint.AzureName = source.AzureName\n\n\t// CustomNetworkInterfaceName\n\tendpoint.CustomNetworkInterfaceName = genruntime.ClonePointerToString(source.CustomNetworkInterfaceName)\n\n\t// ExtendedLocation\n\tif source.ExtendedLocation != nil {\n\t\tvar extendedLocation ExtendedLocation\n\t\terr := extendedLocation.AssignProperties_From_ExtendedLocation(source.ExtendedLocation)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ExtendedLocation() to populate field ExtendedLocation\")\n\t\t}\n\t\tendpoint.ExtendedLocation = &extendedLocation\n\t} else {\n\t\tendpoint.ExtendedLocation = nil\n\t}\n\n\t// IpConfigurations\n\tif source.IpConfigurations != nil {\n\t\tipConfigurationList := make([]PrivateEndpointIPConfiguration, len(source.IpConfigurations))\n\t\tfor ipConfigurationIndex, ipConfigurationItem := range source.IpConfigurations {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tipConfigurationItem := ipConfigurationItem\n\t\t\tvar ipConfiguration PrivateEndpointIPConfiguration\n\t\t\terr := ipConfiguration.AssignProperties_From_PrivateEndpointIPConfiguration(&ipConfigurationItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_PrivateEndpointIPConfiguration() to populate field IpConfigurations\")\n\t\t\t}\n\t\t\tipConfigurationList[ipConfigurationIndex] = ipConfiguration\n\t\t}\n\t\tendpoint.IpConfigurations = ipConfigurationList\n\t} else {\n\t\tendpoint.IpConfigurations = nil\n\t}\n\n\t// Location\n\tendpoint.Location = genruntime.ClonePointerToString(source.Location)\n\n\t// ManualPrivateLinkServiceConnections\n\tif source.ManualPrivateLinkServiceConnections != nil {\n\t\tmanualPrivateLinkServiceConnectionList := make([]PrivateLinkServiceConnection, len(source.ManualPrivateLinkServiceConnections))\n\t\tfor manualPrivateLinkServiceConnectionIndex, manualPrivateLinkServiceConnectionItem := range source.ManualPrivateLinkServiceConnections {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tmanualPrivateLinkServiceConnectionItem := manualPrivateLinkServiceConnectionItem\n\t\t\tvar manualPrivateLinkServiceConnection PrivateLinkServiceConnection\n\t\t\terr := manualPrivateLinkServiceConnection.AssignProperties_From_PrivateLinkServiceConnection(&manualPrivateLinkServiceConnectionItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_PrivateLinkServiceConnection() to populate field ManualPrivateLinkServiceConnections\")\n\t\t\t}\n\t\t\tmanualPrivateLinkServiceConnectionList[manualPrivateLinkServiceConnectionIndex] = manualPrivateLinkServiceConnection\n\t\t}\n\t\tendpoint.ManualPrivateLinkServiceConnections = manualPrivateLinkServiceConnectionList\n\t} else {\n\t\tendpoint.ManualPrivateLinkServiceConnections = nil\n\t}\n\n\t// Owner\n\tif source.Owner != nil {\n\t\towner := source.Owner.Copy()\n\t\tendpoint.Owner = &owner\n\t} else {\n\t\tendpoint.Owner = nil\n\t}\n\n\t// PrivateLinkServiceConnections\n\tif source.PrivateLinkServiceConnections != nil {\n\t\tprivateLinkServiceConnectionList := make([]PrivateLinkServiceConnection, len(source.PrivateLinkServiceConnections))\n\t\tfor privateLinkServiceConnectionIndex, privateLinkServiceConnectionItem := range source.PrivateLinkServiceConnections {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tprivateLinkServiceConnectionItem := privateLinkServiceConnectionItem\n\t\t\tvar privateLinkServiceConnection PrivateLinkServiceConnection\n\t\t\terr := privateLinkServiceConnection.AssignProperties_From_PrivateLinkServiceConnection(&privateLinkServiceConnectionItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_PrivateLinkServiceConnection() to populate field PrivateLinkServiceConnections\")\n\t\t\t}\n\t\t\tprivateLinkServiceConnectionList[privateLinkServiceConnectionIndex] = privateLinkServiceConnection\n\t\t}\n\t\tendpoint.PrivateLinkServiceConnections = privateLinkServiceConnectionList\n\t} else {\n\t\tendpoint.PrivateLinkServiceConnections = nil\n\t}\n\n\t// Subnet\n\tif source.Subnet != nil {\n\t\tvar subnet Subnet_PrivateEndpoint_SubResourceEmbedded\n\t\terr := subnet.AssignProperties_From_Subnet_PrivateEndpoint_SubResourceEmbedded(source.Subnet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_Subnet_PrivateEndpoint_SubResourceEmbedded() to populate field Subnet\")\n\t\t}\n\t\tendpoint.Subnet = &subnet\n\t} else {\n\t\tendpoint.Subnet = nil\n\t}\n\n\t// Tags\n\tendpoint.Tags = genruntime.CloneMapOfStringToString(source.Tags)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "79e743e3923e822b86a71b01093eabe4", "score": "0.48904416", "text": "func (in *HardwareProfile) DeepCopyInto(out *HardwareProfile) {\n\t*out = *in\n\tif in.VmSize != nil {\n\t\tin, out := &in.VmSize, &out.VmSize\n\t\t*out = new(HardwareProfile_VmSize)\n\t\t**out = **in\n\t}\n}", "title": "" }, { "docid": "f40143e6d703420c4904a47e15f66713", "score": "0.4884908", "text": "func (profile *OSProfile) AssignProperties_From_OSProfile(source *v1beta20220301s.OSProfile) error {\n\n\t// AdminPassword\n\tif source.AdminPassword != nil {\n\t\tadminPassword := source.AdminPassword.Copy()\n\t\tprofile.AdminPassword = &adminPassword\n\t} else {\n\t\tprofile.AdminPassword = nil\n\t}\n\n\t// AdminUsername\n\tprofile.AdminUsername = genruntime.ClonePointerToString(source.AdminUsername)\n\n\t// AllowExtensionOperations\n\tif source.AllowExtensionOperations != nil {\n\t\tallowExtensionOperation := *source.AllowExtensionOperations\n\t\tprofile.AllowExtensionOperations = &allowExtensionOperation\n\t} else {\n\t\tprofile.AllowExtensionOperations = nil\n\t}\n\n\t// ComputerName\n\tprofile.ComputerName = genruntime.ClonePointerToString(source.ComputerName)\n\n\t// CustomData\n\tprofile.CustomData = genruntime.ClonePointerToString(source.CustomData)\n\n\t// LinuxConfiguration\n\tif source.LinuxConfiguration != nil {\n\t\tvar linuxConfiguration LinuxConfiguration\n\t\terr := linuxConfiguration.AssignProperties_From_LinuxConfiguration(source.LinuxConfiguration)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_LinuxConfiguration() to populate field LinuxConfiguration\")\n\t\t}\n\t\tprofile.LinuxConfiguration = &linuxConfiguration\n\t} else {\n\t\tprofile.LinuxConfiguration = nil\n\t}\n\n\t// RequireGuestProvisionSignal\n\tif source.RequireGuestProvisionSignal != nil {\n\t\trequireGuestProvisionSignal := *source.RequireGuestProvisionSignal\n\t\tprofile.RequireGuestProvisionSignal = &requireGuestProvisionSignal\n\t} else {\n\t\tprofile.RequireGuestProvisionSignal = nil\n\t}\n\n\t// Secrets\n\tif source.Secrets != nil {\n\t\tsecretList := make([]VaultSecretGroup, len(source.Secrets))\n\t\tfor secretIndex, secretItem := range source.Secrets {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tsecretItem := secretItem\n\t\t\tvar secret VaultSecretGroup\n\t\t\terr := secret.AssignProperties_From_VaultSecretGroup(&secretItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VaultSecretGroup() to populate field Secrets\")\n\t\t\t}\n\t\t\tsecretList[secretIndex] = secret\n\t\t}\n\t\tprofile.Secrets = secretList\n\t} else {\n\t\tprofile.Secrets = nil\n\t}\n\n\t// WindowsConfiguration\n\tif source.WindowsConfiguration != nil {\n\t\tvar windowsConfiguration WindowsConfiguration\n\t\terr := windowsConfiguration.AssignProperties_From_WindowsConfiguration(source.WindowsConfiguration)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_WindowsConfiguration() to populate field WindowsConfiguration\")\n\t\t}\n\t\tprofile.WindowsConfiguration = &windowsConfiguration\n\t} else {\n\t\tprofile.WindowsConfiguration = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "6a0a9d0d07155d7929aba7c6115eeca0", "score": "0.48847708", "text": "func (restore *ServerPropertiesForRestore) AssignProperties_From_ServerPropertiesForRestore(source *v20180601s.ServerPropertiesForRestore) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// CreateMode\n\trestore.CreateMode = genruntime.ClonePointerToString(source.CreateMode)\n\n\t// MinimalTlsVersion\n\trestore.MinimalTlsVersion = genruntime.ClonePointerToString(source.MinimalTlsVersion)\n\n\t// PublicNetworkAccess\n\trestore.PublicNetworkAccess = genruntime.ClonePointerToString(source.PublicNetworkAccess)\n\n\t// RestorePointInTime\n\trestore.RestorePointInTime = genruntime.ClonePointerToString(source.RestorePointInTime)\n\n\t// SourceServerId\n\trestore.SourceServerId = genruntime.ClonePointerToString(source.SourceServerId)\n\n\t// SslEnforcement\n\trestore.SslEnforcement = genruntime.ClonePointerToString(source.SslEnforcement)\n\n\t// StorageProfile\n\tif source.StorageProfile != nil {\n\t\tvar storageProfile StorageProfile\n\t\terr := storageProfile.AssignProperties_From_StorageProfile(source.StorageProfile)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_StorageProfile() to populate field StorageProfile\")\n\t\t}\n\t\trestore.StorageProfile = &storageProfile\n\t} else {\n\t\trestore.StorageProfile = nil\n\t}\n\n\t// Version\n\trestore.Version = genruntime.ClonePointerToString(source.Version)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\trestore.PropertyBag = propertyBag\n\t} else {\n\t\trestore.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForServerPropertiesForRestore interface (if implemented) to customize the conversion\n\tvar restoreAsAny any = restore\n\tif augmentedRestore, ok := restoreAsAny.(augmentConversionForServerPropertiesForRestore); ok {\n\t\terr := augmentedRestore.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "48f3666eaa14630eb94ac18b9f2baf02", "score": "0.48820037", "text": "func (server *Server_Spec) AssignProperties_From_Server_Spec(source *v20180601s.Server_Spec) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// AzureName\n\tserver.AzureName = source.AzureName\n\n\t// Location\n\tserver.Location = genruntime.ClonePointerToString(source.Location)\n\n\t// OperatorSpec\n\tif source.OperatorSpec != nil {\n\t\tvar operatorSpec ServerOperatorSpec\n\t\terr := operatorSpec.AssignProperties_From_ServerOperatorSpec(source.OperatorSpec)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ServerOperatorSpec() to populate field OperatorSpec\")\n\t\t}\n\t\tserver.OperatorSpec = &operatorSpec\n\t} else {\n\t\tserver.OperatorSpec = nil\n\t}\n\n\t// OriginalVersion\n\tserver.OriginalVersion = source.OriginalVersion\n\n\t// Owner\n\tif source.Owner != nil {\n\t\towner := source.Owner.Copy()\n\t\tserver.Owner = &owner\n\t} else {\n\t\tserver.Owner = nil\n\t}\n\n\t// Properties\n\tif source.Properties != nil {\n\t\tvar property ServerPropertiesForCreate\n\t\terr := property.AssignProperties_From_ServerPropertiesForCreate(source.Properties)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ServerPropertiesForCreate() to populate field Properties\")\n\t\t}\n\t\tserver.Properties = &property\n\t} else {\n\t\tserver.Properties = nil\n\t}\n\n\t// Sku\n\tif source.Sku != nil {\n\t\tvar sku Sku\n\t\terr := sku.AssignProperties_From_Sku(source.Sku)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_Sku() to populate field Sku\")\n\t\t}\n\t\tserver.Sku = &sku\n\t} else {\n\t\tserver.Sku = nil\n\t}\n\n\t// Tags\n\tserver.Tags = genruntime.CloneMapOfStringToString(source.Tags)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tserver.PropertyBag = propertyBag\n\t} else {\n\t\tserver.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForServer_Spec interface (if implemented) to customize the conversion\n\tvar serverAsAny any = server\n\tif augmentedServer, ok := serverAsAny.(augmentConversionForServer_Spec); ok {\n\t\terr := augmentedServer.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "5f5da76ee32d416761e14cb5dd0ecba5", "score": "0.48813137", "text": "func (ipTag *VirtualMachineIpTag_STATUS) AssignProperties_From_VirtualMachineIpTag_STATUS(source *v1beta20220301s.VirtualMachineIpTag_STATUS) error {\n\n\t// IpTagType\n\tipTag.IpTagType = genruntime.ClonePointerToString(source.IpTagType)\n\n\t// Tag\n\tipTag.Tag = genruntime.ClonePointerToString(source.Tag)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "de225cba806491c7216b5dfcd1c7f55b", "score": "0.48759842", "text": "func (profile *StorageProfile) AssignProperties_From_StorageProfile(source *v1beta20220301s.StorageProfile) error {\n\n\t// DataDisks\n\tif source.DataDisks != nil {\n\t\tdataDiskList := make([]DataDisk, len(source.DataDisks))\n\t\tfor dataDiskIndex, dataDiskItem := range source.DataDisks {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tdataDiskItem := dataDiskItem\n\t\t\tvar dataDisk DataDisk\n\t\t\terr := dataDisk.AssignProperties_From_DataDisk(&dataDiskItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_DataDisk() to populate field DataDisks\")\n\t\t\t}\n\t\t\tdataDiskList[dataDiskIndex] = dataDisk\n\t\t}\n\t\tprofile.DataDisks = dataDiskList\n\t} else {\n\t\tprofile.DataDisks = nil\n\t}\n\n\t// ImageReference\n\tif source.ImageReference != nil {\n\t\tvar imageReference ImageReference\n\t\terr := imageReference.AssignProperties_From_ImageReference(source.ImageReference)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ImageReference() to populate field ImageReference\")\n\t\t}\n\t\tprofile.ImageReference = &imageReference\n\t} else {\n\t\tprofile.ImageReference = nil\n\t}\n\n\t// OsDisk\n\tif source.OsDisk != nil {\n\t\tvar osDisk OSDisk\n\t\terr := osDisk.AssignProperties_From_OSDisk(source.OsDisk)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_OSDisk() to populate field OsDisk\")\n\t\t}\n\t\tprofile.OsDisk = &osDisk\n\t} else {\n\t\tprofile.OsDisk = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "b0a41b3a937e1c8696840d5089359738", "score": "0.48722586", "text": "func (link *EndpointProperties_WebApplicationFirewallPolicyLink_STATUS) AssignProperties_From_EndpointProperties_WebApplicationFirewallPolicyLink_STATUS(source *v20210601s.EndpointProperties_WebApplicationFirewallPolicyLink_STATUS) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// Id\n\tlink.Id = genruntime.ClonePointerToString(source.Id)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tlink.PropertyBag = propertyBag\n\t} else {\n\t\tlink.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForEndpointProperties_WebApplicationFirewallPolicyLink_STATUS interface (if implemented) to customize the conversion\n\tvar linkAsAny any = link\n\tif augmentedLink, ok := linkAsAny.(augmentConversionForEndpointProperties_WebApplicationFirewallPolicyLink_STATUS); ok {\n\t\terr := augmentedLink.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "bd234058f320f2466358929b5c0e4b92", "score": "0.48641732", "text": "func (configuration *VirtualMachineNetworkInterfaceDnsSettingsConfiguration) AssignProperties_From_VirtualMachineNetworkInterfaceDnsSettingsConfiguration(source *v1beta20220301s.VirtualMachineNetworkInterfaceDnsSettingsConfiguration) error {\n\n\t// DnsServers\n\tconfiguration.DnsServers = genruntime.CloneSliceOfString(source.DnsServers)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "361f76901625e98c60a69b5340dda2fa", "score": "0.48628527", "text": "func (secrets *SearchServiceOperatorSecrets) AssignProperties_From_SearchServiceOperatorSecrets(source *v20220901s.SearchServiceOperatorSecrets) error {\n\n\t// AdminPrimaryKey\n\tif source.AdminPrimaryKey != nil {\n\t\tadminPrimaryKey := source.AdminPrimaryKey.Copy()\n\t\tsecrets.AdminPrimaryKey = &adminPrimaryKey\n\t} else {\n\t\tsecrets.AdminPrimaryKey = nil\n\t}\n\n\t// AdminSecondaryKey\n\tif source.AdminSecondaryKey != nil {\n\t\tadminSecondaryKey := source.AdminSecondaryKey.Copy()\n\t\tsecrets.AdminSecondaryKey = &adminSecondaryKey\n\t} else {\n\t\tsecrets.AdminSecondaryKey = nil\n\t}\n\n\t// QueryKey\n\tif source.QueryKey != nil {\n\t\tqueryKey := source.QueryKey.Copy()\n\t\tsecrets.QueryKey = &queryKey\n\t} else {\n\t\tsecrets.QueryKey = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "dfeab9f326076b53a0e10bebe7bea9cb", "score": "0.48538378", "text": "func (properties *EncryptionProperties_STATUS) AssignProperties_From_EncryptionProperties_STATUS(source *v20210101s.EncryptionProperties_STATUS) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// KeySource\n\tproperties.KeySource = genruntime.ClonePointerToString(source.KeySource)\n\n\t// KeyVaultProperties\n\tif source.KeyVaultProperties != nil {\n\t\tvar keyVaultProperty KeyVaultProperties_STATUS\n\t\terr := keyVaultProperty.AssignProperties_From_KeyVaultProperties_STATUS(source.KeyVaultProperties)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_KeyVaultProperties_STATUS() to populate field KeyVaultProperties\")\n\t\t}\n\t\tproperties.KeyVaultProperties = &keyVaultProperty\n\t} else {\n\t\tproperties.KeyVaultProperties = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tproperties.PropertyBag = propertyBag\n\t} else {\n\t\tproperties.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForEncryptionProperties_STATUS interface (if implemented) to customize the conversion\n\tvar propertiesAsAny any = properties\n\tif augmentedProperties, ok := propertiesAsAny.(augmentConversionForEncryptionProperties_STATUS); ok {\n\t\terr := augmentedProperties.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "0c20384e51d91e93a6397982a3c37276", "score": "0.48509648", "text": "func (in *QueuePropertiesParameters) DeepCopyInto(out *QueuePropertiesParameters) {\n\t*out = *in\n\tif in.CorsRule != nil {\n\t\tin, out := &in.CorsRule, &out.CorsRule\n\t\t*out = make([]QueuePropertiesCorsRuleParameters, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n\tif in.HourMetrics != nil {\n\t\tin, out := &in.HourMetrics, &out.HourMetrics\n\t\t*out = make([]HourMetricsParameters, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n\tif in.Logging != nil {\n\t\tin, out := &in.Logging, &out.Logging\n\t\t*out = make([]LoggingParameters, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n\tif in.MinuteMetrics != nil {\n\t\tin, out := &in.MinuteMetrics, &out.MinuteMetrics\n\t\t*out = make([]MinuteMetricsParameters, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f4df891b4717ec6299656e35e8cd3a45", "score": "0.48472488", "text": "func (endpoint *Profiles_Endpoint_Spec) AssignProperties_To_Profiles_Endpoint_Spec(destination *v20210601s.Profiles_Endpoint_Spec) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(endpoint.PropertyBag)\n\n\t// AzureName\n\tdestination.AzureName = endpoint.AzureName\n\n\t// ContentTypesToCompress\n\tdestination.ContentTypesToCompress = genruntime.CloneSliceOfString(endpoint.ContentTypesToCompress)\n\n\t// DefaultOriginGroup\n\tif endpoint.DefaultOriginGroup != nil {\n\t\tvar defaultOriginGroup v20210601s.ResourceReference\n\t\terr := endpoint.DefaultOriginGroup.AssignProperties_To_ResourceReference(&defaultOriginGroup)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_ResourceReference() to populate field DefaultOriginGroup\")\n\t\t}\n\t\tdestination.DefaultOriginGroup = &defaultOriginGroup\n\t} else {\n\t\tdestination.DefaultOriginGroup = nil\n\t}\n\n\t// DeliveryPolicy\n\tif endpoint.DeliveryPolicy != nil {\n\t\tvar deliveryPolicy v20210601s.EndpointProperties_DeliveryPolicy\n\t\terr := endpoint.DeliveryPolicy.AssignProperties_To_EndpointProperties_DeliveryPolicy(&deliveryPolicy)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_EndpointProperties_DeliveryPolicy() to populate field DeliveryPolicy\")\n\t\t}\n\t\tdestination.DeliveryPolicy = &deliveryPolicy\n\t} else {\n\t\tdestination.DeliveryPolicy = nil\n\t}\n\n\t// GeoFilters\n\tif endpoint.GeoFilters != nil {\n\t\tgeoFilterList := make([]v20210601s.GeoFilter, len(endpoint.GeoFilters))\n\t\tfor geoFilterIndex, geoFilterItem := range endpoint.GeoFilters {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tgeoFilterItem := geoFilterItem\n\t\t\tvar geoFilter v20210601s.GeoFilter\n\t\t\terr := geoFilterItem.AssignProperties_To_GeoFilter(&geoFilter)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_GeoFilter() to populate field GeoFilters\")\n\t\t\t}\n\t\t\tgeoFilterList[geoFilterIndex] = geoFilter\n\t\t}\n\t\tdestination.GeoFilters = geoFilterList\n\t} else {\n\t\tdestination.GeoFilters = nil\n\t}\n\n\t// IsCompressionEnabled\n\tif endpoint.IsCompressionEnabled != nil {\n\t\tisCompressionEnabled := *endpoint.IsCompressionEnabled\n\t\tdestination.IsCompressionEnabled = &isCompressionEnabled\n\t} else {\n\t\tdestination.IsCompressionEnabled = nil\n\t}\n\n\t// IsHttpAllowed\n\tif endpoint.IsHttpAllowed != nil {\n\t\tisHttpAllowed := *endpoint.IsHttpAllowed\n\t\tdestination.IsHttpAllowed = &isHttpAllowed\n\t} else {\n\t\tdestination.IsHttpAllowed = nil\n\t}\n\n\t// IsHttpsAllowed\n\tif endpoint.IsHttpsAllowed != nil {\n\t\tisHttpsAllowed := *endpoint.IsHttpsAllowed\n\t\tdestination.IsHttpsAllowed = &isHttpsAllowed\n\t} else {\n\t\tdestination.IsHttpsAllowed = nil\n\t}\n\n\t// Location\n\tdestination.Location = genruntime.ClonePointerToString(endpoint.Location)\n\n\t// OptimizationType\n\tdestination.OptimizationType = genruntime.ClonePointerToString(endpoint.OptimizationType)\n\n\t// OriginGroups\n\tif endpoint.OriginGroups != nil {\n\t\toriginGroupList := make([]v20210601s.DeepCreatedOriginGroup, len(endpoint.OriginGroups))\n\t\tfor originGroupIndex, originGroupItem := range endpoint.OriginGroups {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\toriginGroupItem := originGroupItem\n\t\t\tvar originGroup v20210601s.DeepCreatedOriginGroup\n\t\t\terr := originGroupItem.AssignProperties_To_DeepCreatedOriginGroup(&originGroup)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_DeepCreatedOriginGroup() to populate field OriginGroups\")\n\t\t\t}\n\t\t\toriginGroupList[originGroupIndex] = originGroup\n\t\t}\n\t\tdestination.OriginGroups = originGroupList\n\t} else {\n\t\tdestination.OriginGroups = nil\n\t}\n\n\t// OriginHostHeader\n\tdestination.OriginHostHeader = genruntime.ClonePointerToString(endpoint.OriginHostHeader)\n\n\t// OriginPath\n\tdestination.OriginPath = genruntime.ClonePointerToString(endpoint.OriginPath)\n\n\t// OriginalVersion\n\tdestination.OriginalVersion = endpoint.OriginalVersion\n\n\t// Origins\n\tif endpoint.Origins != nil {\n\t\toriginList := make([]v20210601s.DeepCreatedOrigin, len(endpoint.Origins))\n\t\tfor originIndex, originItem := range endpoint.Origins {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\toriginItem := originItem\n\t\t\tvar origin v20210601s.DeepCreatedOrigin\n\t\t\terr := originItem.AssignProperties_To_DeepCreatedOrigin(&origin)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_DeepCreatedOrigin() to populate field Origins\")\n\t\t\t}\n\t\t\toriginList[originIndex] = origin\n\t\t}\n\t\tdestination.Origins = originList\n\t} else {\n\t\tdestination.Origins = nil\n\t}\n\n\t// Owner\n\tif endpoint.Owner != nil {\n\t\towner := endpoint.Owner.Copy()\n\t\tdestination.Owner = &owner\n\t} else {\n\t\tdestination.Owner = nil\n\t}\n\n\t// ProbePath\n\tdestination.ProbePath = genruntime.ClonePointerToString(endpoint.ProbePath)\n\n\t// QueryStringCachingBehavior\n\tdestination.QueryStringCachingBehavior = genruntime.ClonePointerToString(endpoint.QueryStringCachingBehavior)\n\n\t// Tags\n\tdestination.Tags = genruntime.CloneMapOfStringToString(endpoint.Tags)\n\n\t// UrlSigningKeys\n\tif endpoint.UrlSigningKeys != nil {\n\t\turlSigningKeyList := make([]v20210601s.UrlSigningKey, len(endpoint.UrlSigningKeys))\n\t\tfor urlSigningKeyIndex, urlSigningKeyItem := range endpoint.UrlSigningKeys {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\turlSigningKeyItem := urlSigningKeyItem\n\t\t\tvar urlSigningKey v20210601s.UrlSigningKey\n\t\t\terr := urlSigningKeyItem.AssignProperties_To_UrlSigningKey(&urlSigningKey)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_UrlSigningKey() to populate field UrlSigningKeys\")\n\t\t\t}\n\t\t\turlSigningKeyList[urlSigningKeyIndex] = urlSigningKey\n\t\t}\n\t\tdestination.UrlSigningKeys = urlSigningKeyList\n\t} else {\n\t\tdestination.UrlSigningKeys = nil\n\t}\n\n\t// WebApplicationFirewallPolicyLink\n\tif endpoint.WebApplicationFirewallPolicyLink != nil {\n\t\tvar webApplicationFirewallPolicyLink v20210601s.EndpointProperties_WebApplicationFirewallPolicyLink\n\t\terr := endpoint.WebApplicationFirewallPolicyLink.AssignProperties_To_EndpointProperties_WebApplicationFirewallPolicyLink(&webApplicationFirewallPolicyLink)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_EndpointProperties_WebApplicationFirewallPolicyLink() to populate field WebApplicationFirewallPolicyLink\")\n\t\t}\n\t\tdestination.WebApplicationFirewallPolicyLink = &webApplicationFirewallPolicyLink\n\t} else {\n\t\tdestination.WebApplicationFirewallPolicyLink = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForProfiles_Endpoint_Spec interface (if implemented) to customize the conversion\n\tvar endpointAsAny any = endpoint\n\tif augmentedEndpoint, ok := endpointAsAny.(augmentConversionForProfiles_Endpoint_Spec); ok {\n\t\terr := augmentedEndpoint.AssignPropertiesTo(destination)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesTo() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "648240c164995d9f7b62f6dc2749a2a8", "score": "0.4837201", "text": "func (a *AgentPoolProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"availabilityZones\":\n\t\t\terr = unpopulate(val, \"AvailabilityZones\", &a.AvailabilityZones)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"cloudProviderProfile\":\n\t\t\terr = unpopulate(val, \"CloudProviderProfile\", &a.CloudProviderProfile)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"count\":\n\t\t\terr = unpopulate(val, \"Count\", &a.Count)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"maxCount\":\n\t\t\terr = unpopulate(val, \"MaxCount\", &a.MaxCount)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"maxPods\":\n\t\t\terr = unpopulate(val, \"MaxPods\", &a.MaxPods)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"minCount\":\n\t\t\terr = unpopulate(val, \"MinCount\", &a.MinCount)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"mode\":\n\t\t\terr = unpopulate(val, \"Mode\", &a.Mode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"nodeImageVersion\":\n\t\t\terr = unpopulate(val, \"NodeImageVersion\", &a.NodeImageVersion)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"nodeLabels\":\n\t\t\terr = unpopulate(val, \"NodeLabels\", &a.NodeLabels)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"nodeTaints\":\n\t\t\terr = unpopulate(val, \"NodeTaints\", &a.NodeTaints)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"osType\":\n\t\t\terr = unpopulate(val, \"OSType\", &a.OSType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"provisioningState\":\n\t\t\terr = unpopulate(val, \"ProvisioningState\", &a.ProvisioningState)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"status\":\n\t\t\terr = unpopulate(val, \"Status\", &a.Status)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"vmSize\":\n\t\t\terr = unpopulate(val, \"VMSize\", &a.VMSize)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7bb4be94e3e8e9fb45354bc4bb067a8f", "score": "0.48363444", "text": "func (profile *ApplicationProfile) AssignProperties_From_ApplicationProfile(source *v1beta20220301s.ApplicationProfile) error {\n\n\t// GalleryApplications\n\tif source.GalleryApplications != nil {\n\t\tgalleryApplicationList := make([]VMGalleryApplication, len(source.GalleryApplications))\n\t\tfor galleryApplicationIndex, galleryApplicationItem := range source.GalleryApplications {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tgalleryApplicationItem := galleryApplicationItem\n\t\t\tvar galleryApplication VMGalleryApplication\n\t\t\terr := galleryApplication.AssignProperties_From_VMGalleryApplication(&galleryApplicationItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VMGalleryApplication() to populate field GalleryApplications\")\n\t\t\t}\n\t\t\tgalleryApplicationList[galleryApplicationIndex] = galleryApplication\n\t\t}\n\t\tprofile.GalleryApplications = galleryApplicationList\n\t} else {\n\t\tprofile.GalleryApplications = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "4c594f1ad865655b7701d6bd95df728f", "score": "0.48356807", "text": "func (application *VMGalleryApplication) AssignProperties_From_VMGalleryApplication(source *v1beta20220301s.VMGalleryApplication) error {\n\n\t// ConfigurationReference\n\tapplication.ConfigurationReference = genruntime.ClonePointerToString(source.ConfigurationReference)\n\n\t// EnableAutomaticUpgrade\n\tif source.EnableAutomaticUpgrade != nil {\n\t\tenableAutomaticUpgrade := *source.EnableAutomaticUpgrade\n\t\tapplication.EnableAutomaticUpgrade = &enableAutomaticUpgrade\n\t} else {\n\t\tapplication.EnableAutomaticUpgrade = nil\n\t}\n\n\t// Order\n\tapplication.Order = genruntime.ClonePointerToInt(source.Order)\n\n\t// PackageReferenceReference\n\tif source.PackageReferenceReference != nil {\n\t\tpackageReferenceReference := source.PackageReferenceReference.Copy()\n\t\tapplication.PackageReferenceReference = &packageReferenceReference\n\t} else {\n\t\tapplication.PackageReferenceReference = nil\n\t}\n\n\t// Tags\n\tapplication.Tags = genruntime.ClonePointerToString(source.Tags)\n\n\t// TreatFailureAsDeploymentFailure\n\tif source.TreatFailureAsDeploymentFailure != nil {\n\t\ttreatFailureAsDeploymentFailure := *source.TreatFailureAsDeploymentFailure\n\t\tapplication.TreatFailureAsDeploymentFailure = &treatFailureAsDeploymentFailure\n\t} else {\n\t\tapplication.TreatFailureAsDeploymentFailure = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "c9fc9a60c33cd630b2304840f836db52", "score": "0.4833117", "text": "func (applicationSecurityGroupStatusVirtualNetworkTapSubResourceEmbedded *ApplicationSecurityGroup_Status_VirtualNetworkTap_SubResourceEmbedded) AssignPropertiesFromApplicationSecurityGroupStatusVirtualNetworkTapSubResourceEmbedded(source *v1alpha1api20201101storage.ApplicationSecurityGroup_Status_VirtualNetworkTap_SubResourceEmbedded) error {\n\n\t// Id\n\tif source.Id != nil {\n\t\tid := *source.Id\n\t\tapplicationSecurityGroupStatusVirtualNetworkTapSubResourceEmbedded.Id = &id\n\t} else {\n\t\tapplicationSecurityGroupStatusVirtualNetworkTapSubResourceEmbedded.Id = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "d9fa07efb8fbc32ffd80545be7519142", "score": "0.48296028", "text": "func (parameters *UrlSigningActionParameters) AssignProperties_From_UrlSigningActionParameters(source *v20210601s.UrlSigningActionParameters) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// Algorithm\n\tparameters.Algorithm = genruntime.ClonePointerToString(source.Algorithm)\n\n\t// ParameterNameOverride\n\tif source.ParameterNameOverride != nil {\n\t\tparameterNameOverrideList := make([]UrlSigningParamIdentifier, len(source.ParameterNameOverride))\n\t\tfor parameterNameOverrideIndex, parameterNameOverrideItem := range source.ParameterNameOverride {\n\t\t\t// Shadow the loop variable to avoid aliasing\n\t\t\tparameterNameOverrideItem := parameterNameOverrideItem\n\t\t\tvar parameterNameOverride UrlSigningParamIdentifier\n\t\t\terr := parameterNameOverride.AssignProperties_From_UrlSigningParamIdentifier(&parameterNameOverrideItem)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_UrlSigningParamIdentifier() to populate field ParameterNameOverride\")\n\t\t\t}\n\t\t\tparameterNameOverrideList[parameterNameOverrideIndex] = parameterNameOverride\n\t\t}\n\t\tparameters.ParameterNameOverride = parameterNameOverrideList\n\t} else {\n\t\tparameters.ParameterNameOverride = nil\n\t}\n\n\t// TypeName\n\tparameters.TypeName = genruntime.ClonePointerToString(source.TypeName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tparameters.PropertyBag = propertyBag\n\t} else {\n\t\tparameters.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForUrlSigningActionParameters interface (if implemented) to customize the conversion\n\tvar parametersAsAny any = parameters\n\tif augmentedParameters, ok := parametersAsAny.(augmentConversionForUrlSigningActionParameters); ok {\n\t\terr := augmentedParameters.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "72d785949c2cf871ea79d54479c706c5", "score": "0.4824993", "text": "func (parameters *RemoteAddressMatchConditionParameters) AssignProperties_From_RemoteAddressMatchConditionParameters(source *v20210601s.RemoteAddressMatchConditionParameters) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// MatchValues\n\tparameters.MatchValues = genruntime.CloneSliceOfString(source.MatchValues)\n\n\t// NegateCondition\n\tif source.NegateCondition != nil {\n\t\tnegateCondition := *source.NegateCondition\n\t\tparameters.NegateCondition = &negateCondition\n\t} else {\n\t\tparameters.NegateCondition = nil\n\t}\n\n\t// Operator\n\tparameters.Operator = genruntime.ClonePointerToString(source.Operator)\n\n\t// Transforms\n\tparameters.Transforms = genruntime.CloneSliceOfString(source.Transforms)\n\n\t// TypeName\n\tparameters.TypeName = genruntime.ClonePointerToString(source.TypeName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tparameters.PropertyBag = propertyBag\n\t} else {\n\t\tparameters.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForRemoteAddressMatchConditionParameters interface (if implemented) to customize the conversion\n\tvar parametersAsAny any = parameters\n\tif augmentedParameters, ok := parametersAsAny.(augmentConversionForRemoteAddressMatchConditionParameters); ok {\n\t\terr := augmentedParameters.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "f6a5a108309763ef971c97a05db35da3", "score": "0.48104817", "text": "func (properties *ServerPrivateEndpointConnectionProperties_STATUS) AssignProperties_From_ServerPrivateEndpointConnectionProperties_STATUS(source *v20180601s.ServerPrivateEndpointConnectionProperties_STATUS) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// PrivateEndpoint\n\tif source.PrivateEndpoint != nil {\n\t\tvar privateEndpoint PrivateEndpointProperty_STATUS\n\t\terr := privateEndpoint.AssignProperties_From_PrivateEndpointProperty_STATUS(source.PrivateEndpoint)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_PrivateEndpointProperty_STATUS() to populate field PrivateEndpoint\")\n\t\t}\n\t\tproperties.PrivateEndpoint = &privateEndpoint\n\t} else {\n\t\tproperties.PrivateEndpoint = nil\n\t}\n\n\t// PrivateLinkServiceConnectionState\n\tif source.PrivateLinkServiceConnectionState != nil {\n\t\tvar privateLinkServiceConnectionState ServerPrivateLinkServiceConnectionStateProperty_STATUS\n\t\terr := privateLinkServiceConnectionState.AssignProperties_From_ServerPrivateLinkServiceConnectionStateProperty_STATUS(source.PrivateLinkServiceConnectionState)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ServerPrivateLinkServiceConnectionStateProperty_STATUS() to populate field PrivateLinkServiceConnectionState\")\n\t\t}\n\t\tproperties.PrivateLinkServiceConnectionState = &privateLinkServiceConnectionState\n\t} else {\n\t\tproperties.PrivateLinkServiceConnectionState = nil\n\t}\n\n\t// ProvisioningState\n\tproperties.ProvisioningState = genruntime.ClonePointerToString(source.ProvisioningState)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tproperties.PropertyBag = propertyBag\n\t} else {\n\t\tproperties.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForServerPrivateEndpointConnectionProperties_STATUS interface (if implemented) to customize the conversion\n\tvar propertiesAsAny any = properties\n\tif augmentedProperties, ok := propertiesAsAny.(augmentConversionForServerPrivateEndpointConnectionProperties_STATUS); ok {\n\t\terr := augmentedProperties.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "ee21a0a89376f1cf936a4df2e62468f5", "score": "0.481033", "text": "func (signingKey *UrlSigningKey_STATUS) AssignProperties_From_UrlSigningKey_STATUS(source *v20210601s.UrlSigningKey_STATUS) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// KeyId\n\tsigningKey.KeyId = genruntime.ClonePointerToString(source.KeyId)\n\n\t// KeySourceParameters\n\tif source.KeySourceParameters != nil {\n\t\tvar keySourceParameter KeyVaultSigningKeyParameters_STATUS\n\t\terr := keySourceParameter.AssignProperties_From_KeyVaultSigningKeyParameters_STATUS(source.KeySourceParameters)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_KeyVaultSigningKeyParameters_STATUS() to populate field KeySourceParameters\")\n\t\t}\n\t\tsigningKey.KeySourceParameters = &keySourceParameter\n\t} else {\n\t\tsigningKey.KeySourceParameters = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tsigningKey.PropertyBag = propertyBag\n\t} else {\n\t\tsigningKey.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForUrlSigningKey_STATUS interface (if implemented) to customize the conversion\n\tvar signingKeyAsAny any = signingKey\n\tif augmentedSigningKey, ok := signingKeyAsAny.(augmentConversionForUrlSigningKey_STATUS); ok {\n\t\terr := augmentedSigningKey.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "66ae6a6b51482a1b3d19c4752db3192f", "score": "0.48100337", "text": "func (parameters *SslProtocolMatchConditionParameters) AssignProperties_From_SslProtocolMatchConditionParameters(source *v20210601s.SslProtocolMatchConditionParameters) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// MatchValues\n\tparameters.MatchValues = genruntime.CloneSliceOfString(source.MatchValues)\n\n\t// NegateCondition\n\tif source.NegateCondition != nil {\n\t\tnegateCondition := *source.NegateCondition\n\t\tparameters.NegateCondition = &negateCondition\n\t} else {\n\t\tparameters.NegateCondition = nil\n\t}\n\n\t// Operator\n\tparameters.Operator = genruntime.ClonePointerToString(source.Operator)\n\n\t// Transforms\n\tparameters.Transforms = genruntime.CloneSliceOfString(source.Transforms)\n\n\t// TypeName\n\tparameters.TypeName = genruntime.ClonePointerToString(source.TypeName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tparameters.PropertyBag = propertyBag\n\t} else {\n\t\tparameters.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForSslProtocolMatchConditionParameters interface (if implemented) to customize the conversion\n\tvar parametersAsAny any = parameters\n\tif augmentedParameters, ok := parametersAsAny.(augmentConversionForSslProtocolMatchConditionParameters); ok {\n\t\terr := augmentedParameters.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "8c76a69b164f97c735041e48dfd2c2b8", "score": "0.4801213", "text": "func (in *HardwareProfile_ARM) DeepCopyInto(out *HardwareProfile_ARM) {\n\t*out = *in\n\tif in.VmSize != nil {\n\t\tin, out := &in.VmSize, &out.VmSize\n\t\t*out = new(HardwareProfile_VmSize)\n\t\t**out = **in\n\t}\n}", "title": "" }, { "docid": "e5096454f55dbf8b097f2d9e031ee956", "score": "0.47962254", "text": "func (subnetStatusVirtualNetworkTapSubResourceEmbedded *Subnet_Status_VirtualNetworkTap_SubResourceEmbedded) AssignPropertiesFromSubnetStatusVirtualNetworkTapSubResourceEmbedded(source *v1alpha1api20201101storage.Subnet_Status_VirtualNetworkTap_SubResourceEmbedded) error {\n\n\t// Id\n\tif source.Id != nil {\n\t\tid := *source.Id\n\t\tsubnetStatusVirtualNetworkTapSubResourceEmbedded.Id = &id\n\t} else {\n\t\tsubnetStatusVirtualNetworkTapSubResourceEmbedded.Id = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "e1a9624ee70a36fbd3b6b61eecf4187a", "score": "0.47961217", "text": "func (networkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded *NetworkInterfaceIPConfiguration_Status_VirtualNetworkTap_SubResourceEmbedded) AssignPropertiesFromNetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded(source *v1alpha1api20201101storage.NetworkInterfaceIPConfiguration_Status_VirtualNetworkTap_SubResourceEmbedded) error {\n\n\t// ApplicationGatewayBackendAddressPools\n\tapplicationGatewayBackendAddressPoolList := make([]ApplicationGatewayBackendAddressPool_Status_VirtualNetworkTap_SubResourceEmbedded, len(source.ApplicationGatewayBackendAddressPools))\n\tfor applicationGatewayBackendAddressPoolIndex, applicationGatewayBackendAddressPoolItem := range source.ApplicationGatewayBackendAddressPools {\n\t\t// Shadow the loop variable to avoid aliasing\n\t\tapplicationGatewayBackendAddressPoolItem := applicationGatewayBackendAddressPoolItem\n\t\tvar applicationGatewayBackendAddressPool ApplicationGatewayBackendAddressPool_Status_VirtualNetworkTap_SubResourceEmbedded\n\t\terr := applicationGatewayBackendAddressPool.AssignPropertiesFromApplicationGatewayBackendAddressPoolStatusVirtualNetworkTapSubResourceEmbedded(&applicationGatewayBackendAddressPoolItem)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating ApplicationGatewayBackendAddressPools from ApplicationGatewayBackendAddressPools, calling AssignPropertiesFromApplicationGatewayBackendAddressPoolStatusVirtualNetworkTapSubResourceEmbedded()\")\n\t\t}\n\t\tapplicationGatewayBackendAddressPoolList[applicationGatewayBackendAddressPoolIndex] = applicationGatewayBackendAddressPool\n\t}\n\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.ApplicationGatewayBackendAddressPools = applicationGatewayBackendAddressPoolList\n\n\t// ApplicationSecurityGroups\n\tapplicationSecurityGroupList := make([]ApplicationSecurityGroup_Status_VirtualNetworkTap_SubResourceEmbedded, len(source.ApplicationSecurityGroups))\n\tfor applicationSecurityGroupIndex, applicationSecurityGroupItem := range source.ApplicationSecurityGroups {\n\t\t// Shadow the loop variable to avoid aliasing\n\t\tapplicationSecurityGroupItem := applicationSecurityGroupItem\n\t\tvar applicationSecurityGroup ApplicationSecurityGroup_Status_VirtualNetworkTap_SubResourceEmbedded\n\t\terr := applicationSecurityGroup.AssignPropertiesFromApplicationSecurityGroupStatusVirtualNetworkTapSubResourceEmbedded(&applicationSecurityGroupItem)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating ApplicationSecurityGroups from ApplicationSecurityGroups, calling AssignPropertiesFromApplicationSecurityGroupStatusVirtualNetworkTapSubResourceEmbedded()\")\n\t\t}\n\t\tapplicationSecurityGroupList[applicationSecurityGroupIndex] = applicationSecurityGroup\n\t}\n\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.ApplicationSecurityGroups = applicationSecurityGroupList\n\n\t// Etag\n\tif source.Etag != nil {\n\t\tetag := *source.Etag\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Etag = &etag\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Etag = nil\n\t}\n\n\t// Id\n\tif source.Id != nil {\n\t\tid := *source.Id\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Id = &id\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Id = nil\n\t}\n\n\t// LoadBalancerBackendAddressPools\n\tloadBalancerBackendAddressPoolList := make([]BackendAddressPool_Status_VirtualNetworkTap_SubResourceEmbedded, len(source.LoadBalancerBackendAddressPools))\n\tfor loadBalancerBackendAddressPoolIndex, loadBalancerBackendAddressPoolItem := range source.LoadBalancerBackendAddressPools {\n\t\t// Shadow the loop variable to avoid aliasing\n\t\tloadBalancerBackendAddressPoolItem := loadBalancerBackendAddressPoolItem\n\t\tvar loadBalancerBackendAddressPool BackendAddressPool_Status_VirtualNetworkTap_SubResourceEmbedded\n\t\terr := loadBalancerBackendAddressPool.AssignPropertiesFromBackendAddressPoolStatusVirtualNetworkTapSubResourceEmbedded(&loadBalancerBackendAddressPoolItem)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating LoadBalancerBackendAddressPools from LoadBalancerBackendAddressPools, calling AssignPropertiesFromBackendAddressPoolStatusVirtualNetworkTapSubResourceEmbedded()\")\n\t\t}\n\t\tloadBalancerBackendAddressPoolList[loadBalancerBackendAddressPoolIndex] = loadBalancerBackendAddressPool\n\t}\n\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.LoadBalancerBackendAddressPools = loadBalancerBackendAddressPoolList\n\n\t// LoadBalancerInboundNatRules\n\tloadBalancerInboundNatRuleList := make([]InboundNatRule_Status_VirtualNetworkTap_SubResourceEmbedded, len(source.LoadBalancerInboundNatRules))\n\tfor loadBalancerInboundNatRuleIndex, loadBalancerInboundNatRuleItem := range source.LoadBalancerInboundNatRules {\n\t\t// Shadow the loop variable to avoid aliasing\n\t\tloadBalancerInboundNatRuleItem := loadBalancerInboundNatRuleItem\n\t\tvar loadBalancerInboundNatRule InboundNatRule_Status_VirtualNetworkTap_SubResourceEmbedded\n\t\terr := loadBalancerInboundNatRule.AssignPropertiesFromInboundNatRuleStatusVirtualNetworkTapSubResourceEmbedded(&loadBalancerInboundNatRuleItem)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating LoadBalancerInboundNatRules from LoadBalancerInboundNatRules, calling AssignPropertiesFromInboundNatRuleStatusVirtualNetworkTapSubResourceEmbedded()\")\n\t\t}\n\t\tloadBalancerInboundNatRuleList[loadBalancerInboundNatRuleIndex] = loadBalancerInboundNatRule\n\t}\n\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.LoadBalancerInboundNatRules = loadBalancerInboundNatRuleList\n\n\t// Name\n\tif source.Name != nil {\n\t\tname := *source.Name\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Name = &name\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Name = nil\n\t}\n\n\t// Primary\n\tif source.Primary != nil {\n\t\tprimary := *source.Primary\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Primary = &primary\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Primary = nil\n\t}\n\n\t// PrivateIPAddress\n\tif source.PrivateIPAddress != nil {\n\t\tprivateIPAddress := *source.PrivateIPAddress\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PrivateIPAddress = &privateIPAddress\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PrivateIPAddress = nil\n\t}\n\n\t// PrivateIPAddressVersion\n\tif source.PrivateIPAddressVersion != nil {\n\t\tprivateIPAddressVersion := IPVersion_Status(*source.PrivateIPAddressVersion)\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PrivateIPAddressVersion = &privateIPAddressVersion\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PrivateIPAddressVersion = nil\n\t}\n\n\t// PrivateIPAllocationMethod\n\tif source.PrivateIPAllocationMethod != nil {\n\t\tprivateIPAllocationMethod := IPAllocationMethod_Status(*source.PrivateIPAllocationMethod)\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PrivateIPAllocationMethod = &privateIPAllocationMethod\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PrivateIPAllocationMethod = nil\n\t}\n\n\t// PrivateLinkConnectionProperties\n\tif source.PrivateLinkConnectionProperties != nil {\n\t\tvar privateLinkConnectionProperty NetworkInterfaceIPConfigurationPrivateLinkConnectionProperties_Status\n\t\terr := privateLinkConnectionProperty.AssignPropertiesFromNetworkInterfaceIPConfigurationPrivateLinkConnectionPropertiesStatus(source.PrivateLinkConnectionProperties)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating PrivateLinkConnectionProperties from PrivateLinkConnectionProperties, calling AssignPropertiesFromNetworkInterfaceIPConfigurationPrivateLinkConnectionPropertiesStatus()\")\n\t\t}\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PrivateLinkConnectionProperties = &privateLinkConnectionProperty\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PrivateLinkConnectionProperties = nil\n\t}\n\n\t// ProvisioningState\n\tif source.ProvisioningState != nil {\n\t\tprovisioningState := ProvisioningState_Status(*source.ProvisioningState)\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.ProvisioningState = &provisioningState\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.ProvisioningState = nil\n\t}\n\n\t// PublicIPAddress\n\tif source.PublicIPAddress != nil {\n\t\tvar publicIPAddress PublicIPAddress_Status_VirtualNetworkTap_SubResourceEmbedded\n\t\terr := publicIPAddress.AssignPropertiesFromPublicIPAddressStatusVirtualNetworkTapSubResourceEmbedded(source.PublicIPAddress)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating PublicIPAddress from PublicIPAddress, calling AssignPropertiesFromPublicIPAddressStatusVirtualNetworkTapSubResourceEmbedded()\")\n\t\t}\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PublicIPAddress = &publicIPAddress\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.PublicIPAddress = nil\n\t}\n\n\t// Subnet\n\tif source.Subnet != nil {\n\t\tvar subnet Subnet_Status_VirtualNetworkTap_SubResourceEmbedded\n\t\terr := subnet.AssignPropertiesFromSubnetStatusVirtualNetworkTapSubResourceEmbedded(source.Subnet)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"populating Subnet from Subnet, calling AssignPropertiesFromSubnetStatusVirtualNetworkTapSubResourceEmbedded()\")\n\t\t}\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Subnet = &subnet\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Subnet = nil\n\t}\n\n\t// Type\n\tif source.Type != nil {\n\t\ttypeVar := *source.Type\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Type = &typeVar\n\t} else {\n\t\tnetworkInterfaceIPConfigurationStatusVirtualNetworkTapSubResourceEmbedded.Type = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "5a117561d105b72affcdea0016254cdc", "score": "0.47939828", "text": "func (details *UserAssignedIdentityDetails) AssignProperties_From_UserAssignedIdentityDetails(source *v1beta20210901s.UserAssignedIdentityDetails) error {\n\n\t// Reference\n\tdetails.Reference = source.Reference.Copy()\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "1d3517b8f25c96f6f8a6a82941cafe51", "score": "0.4790078", "text": "func (data *CreationData) AssignProperties_From_CreationData(source *v1beta20200930s.CreationData) error {\n\n\t// CreateOption\n\tif source.CreateOption != nil {\n\t\tcreateOption := CreationData_CreateOption(*source.CreateOption)\n\t\tdata.CreateOption = &createOption\n\t} else {\n\t\tdata.CreateOption = nil\n\t}\n\n\t// GalleryImageReference\n\tif source.GalleryImageReference != nil {\n\t\tvar galleryImageReference ImageDiskReference\n\t\terr := galleryImageReference.AssignProperties_From_ImageDiskReference(source.GalleryImageReference)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ImageDiskReference() to populate field GalleryImageReference\")\n\t\t}\n\t\tdata.GalleryImageReference = &galleryImageReference\n\t} else {\n\t\tdata.GalleryImageReference = nil\n\t}\n\n\t// ImageReference\n\tif source.ImageReference != nil {\n\t\tvar imageReference ImageDiskReference\n\t\terr := imageReference.AssignProperties_From_ImageDiskReference(source.ImageReference)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_From_ImageDiskReference() to populate field ImageReference\")\n\t\t}\n\t\tdata.ImageReference = &imageReference\n\t} else {\n\t\tdata.ImageReference = nil\n\t}\n\n\t// LogicalSectorSize\n\tdata.LogicalSectorSize = genruntime.ClonePointerToInt(source.LogicalSectorSize)\n\n\t// SourceResourceReference\n\tif source.SourceResourceReference != nil {\n\t\tsourceResourceReference := source.SourceResourceReference.Copy()\n\t\tdata.SourceResourceReference = &sourceResourceReference\n\t} else {\n\t\tdata.SourceResourceReference = nil\n\t}\n\n\t// SourceUri\n\tdata.SourceUri = genruntime.ClonePointerToString(source.SourceUri)\n\n\t// StorageAccountId\n\tdata.StorageAccountId = genruntime.ClonePointerToString(source.StorageAccountId)\n\n\t// UploadSizeBytes\n\tdata.UploadSizeBytes = genruntime.ClonePointerToInt(source.UploadSizeBytes)\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "0476914672828e4a66a79f422e515446", "score": "0.47865027", "text": "func (location *ExtendedLocation) AssignProperties_From_ExtendedLocation(source *v1beta20200930s.ExtendedLocation) error {\n\n\t// Name\n\tlocation.Name = genruntime.ClonePointerToString(source.Name)\n\n\t// Type\n\tif source.Type != nil {\n\t\ttypeVar := ExtendedLocationType(*source.Type)\n\t\tlocation.Type = &typeVar\n\t} else {\n\t\tlocation.Type = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "4d7b5525190c90fd8da1a365860c24c0", "score": "0.4784344", "text": "func (parameters *CacheKeyQueryStringActionParameters) AssignProperties_From_CacheKeyQueryStringActionParameters(source *v20210601s.CacheKeyQueryStringActionParameters) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// QueryParameters\n\tparameters.QueryParameters = genruntime.ClonePointerToString(source.QueryParameters)\n\n\t// QueryStringBehavior\n\tparameters.QueryStringBehavior = genruntime.ClonePointerToString(source.QueryStringBehavior)\n\n\t// TypeName\n\tparameters.TypeName = genruntime.ClonePointerToString(source.TypeName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tparameters.PropertyBag = propertyBag\n\t} else {\n\t\tparameters.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForCacheKeyQueryStringActionParameters interface (if implemented) to customize the conversion\n\tvar parametersAsAny any = parameters\n\tif augmentedParameters, ok := parametersAsAny.(augmentConversionForCacheKeyQueryStringActionParameters); ok {\n\t\terr := augmentedParameters.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "b031d0890bf74761e7f065fb2d807e7f", "score": "0.4781778", "text": "func (create *ServerPropertiesForCreate) AssignProperties_To_ServerPropertiesForCreate(destination *v20180601s.ServerPropertiesForCreate) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(create.PropertyBag)\n\n\t// Default\n\tif create.Default != nil {\n\t\tvar def v20180601s.ServerPropertiesForDefaultCreate\n\t\terr := create.Default.AssignProperties_To_ServerPropertiesForDefaultCreate(&def)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_ServerPropertiesForDefaultCreate() to populate field Default\")\n\t\t}\n\t\tdestination.Default = &def\n\t} else {\n\t\tdestination.Default = nil\n\t}\n\n\t// GeoRestore\n\tif create.GeoRestore != nil {\n\t\tvar geoRestore v20180601s.ServerPropertiesForGeoRestore\n\t\terr := create.GeoRestore.AssignProperties_To_ServerPropertiesForGeoRestore(&geoRestore)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_ServerPropertiesForGeoRestore() to populate field GeoRestore\")\n\t\t}\n\t\tdestination.GeoRestore = &geoRestore\n\t} else {\n\t\tdestination.GeoRestore = nil\n\t}\n\n\t// PointInTimeRestore\n\tif create.PointInTimeRestore != nil {\n\t\tvar pointInTimeRestore v20180601s.ServerPropertiesForRestore\n\t\terr := create.PointInTimeRestore.AssignProperties_To_ServerPropertiesForRestore(&pointInTimeRestore)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_ServerPropertiesForRestore() to populate field PointInTimeRestore\")\n\t\t}\n\t\tdestination.PointInTimeRestore = &pointInTimeRestore\n\t} else {\n\t\tdestination.PointInTimeRestore = nil\n\t}\n\n\t// Replica\n\tif create.Replica != nil {\n\t\tvar replica v20180601s.ServerPropertiesForReplica\n\t\terr := create.Replica.AssignProperties_To_ServerPropertiesForReplica(&replica)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_ServerPropertiesForReplica() to populate field Replica\")\n\t\t}\n\t\tdestination.Replica = &replica\n\t} else {\n\t\tdestination.Replica = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForServerPropertiesForCreate interface (if implemented) to customize the conversion\n\tvar createAsAny any = create\n\tif augmentedCreate, ok := createAsAny.(augmentConversionForServerPropertiesForCreate); ok {\n\t\terr := augmentedCreate.AssignPropertiesTo(destination)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesTo() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "d12b61ad495a6a0e77c5a7a56b31acff", "score": "0.47740266", "text": "func (details *UserAssignedIdentityDetails) AssignProperties_From_UserAssignedIdentityDetails(source *v1beta20220301s.UserAssignedIdentityDetails) error {\n\n\t// Reference\n\tdetails.Reference = source.Reference.Copy()\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "1f483b600a52d2156bf1380471d84b7f", "score": "0.47714412", "text": "func (parameters *HttpVersionMatchConditionParameters) AssignProperties_From_HttpVersionMatchConditionParameters(source *v20210601s.HttpVersionMatchConditionParameters) error {\n\t// Clone the existing property bag\n\tpropertyBag := genruntime.NewPropertyBag(source.PropertyBag)\n\n\t// MatchValues\n\tparameters.MatchValues = genruntime.CloneSliceOfString(source.MatchValues)\n\n\t// NegateCondition\n\tif source.NegateCondition != nil {\n\t\tnegateCondition := *source.NegateCondition\n\t\tparameters.NegateCondition = &negateCondition\n\t} else {\n\t\tparameters.NegateCondition = nil\n\t}\n\n\t// Operator\n\tparameters.Operator = genruntime.ClonePointerToString(source.Operator)\n\n\t// Transforms\n\tparameters.Transforms = genruntime.CloneSliceOfString(source.Transforms)\n\n\t// TypeName\n\tparameters.TypeName = genruntime.ClonePointerToString(source.TypeName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tparameters.PropertyBag = propertyBag\n\t} else {\n\t\tparameters.PropertyBag = nil\n\t}\n\n\t// Invoke the augmentConversionForHttpVersionMatchConditionParameters interface (if implemented) to customize the conversion\n\tvar parametersAsAny any = parameters\n\tif augmentedParameters, ok := parametersAsAny.(augmentConversionForHttpVersionMatchConditionParameters); ok {\n\t\terr := augmentedParameters.AssignPropertiesFrom(source)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling augmented AssignPropertiesFrom() for conversion\")\n\t\t}\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "e483d16cfed3daeb09836b4d6fb3930b", "score": "0.47713092", "text": "func (machine *VirtualMachine) AssignProperties_From_VirtualMachine(source *v1beta20220301s.VirtualMachine) error {\n\n\t// ObjectMeta\n\tmachine.ObjectMeta = *source.ObjectMeta.DeepCopy()\n\n\t// Spec\n\tvar spec VirtualMachine_Spec\n\terr := spec.AssignProperties_From_VirtualMachine_Spec(&source.Spec)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualMachine_Spec() to populate field Spec\")\n\t}\n\tmachine.Spec = spec\n\n\t// Status\n\tvar status VirtualMachine_STATUS\n\terr = status.AssignProperties_From_VirtualMachine_STATUS(&source.Status)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"calling AssignProperties_From_VirtualMachine_STATUS() to populate field Status\")\n\t}\n\tmachine.Status = status\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "25613d3454988b0de42c5ab5599a115a", "score": "0.4771076", "text": "func (operator *SearchServiceOperatorSpec) AssignProperties_To_SearchServiceOperatorSpec(destination *v20220901s.SearchServiceOperatorSpec) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// Secrets\n\tif operator.Secrets != nil {\n\t\tvar secret v20220901s.SearchServiceOperatorSecrets\n\t\terr := operator.Secrets.AssignProperties_To_SearchServiceOperatorSecrets(&secret)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"calling AssignProperties_To_SearchServiceOperatorSecrets() to populate field Secrets\")\n\t\t}\n\t\tdestination.Secrets = &secret\n\t} else {\n\t\tdestination.Secrets = nil\n\t}\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" } ]
92f312d706e5b596798106393a6c25fa
AsSecurityAlert is the BasicEntity implementation for MailClusterEntity.
[ { "docid": "3b91845c43d1bd9a815a0787b686ab4c", "score": "0.79422396", "text": "func (mce MailClusterEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" } ]
[ { "docid": "a8d65bc807e900a2c9dba68e24eb29cf", "score": "0.76822114", "text": "func (sa SecurityAlert) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0ccb04b69fbadf1d3b32d7457edbb571", "score": "0.7208334", "text": "func (sge SecurityGroupEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "2d3ea7f2588bbd25de5e1d9d920884b7", "score": "0.718835", "text": "func (me MailboxEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e5b8f134a97b4b3f9fd734d3414560c7", "score": "0.7170094", "text": "func (ne NicEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ffc0c4208388a0fc461b26e06be27b0e", "score": "0.7164357", "text": "func (mme MailMessageEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "3889159e11521f3deffc755e826968ac", "score": "0.7116125", "text": "func (e Entity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9b5ea25c49c9c787ea3fe6cd1bd55975", "score": "0.70938414", "text": "func (cae CloudApplicationEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6bb2f5df607bae77cc2a9cd7c6513441", "score": "0.7090602", "text": "func (he HostEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "34d6903deaab7c50c31e01144c3d6be9", "score": "0.70416", "text": "func (ae AccountEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c64ad982a0a112332b40e98e04647948", "score": "0.68286043", "text": "func (me MalwareEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "4aa9ae094face4b1666ac0294ed5877f", "score": "0.67524207", "text": "func (sme SubmissionMailEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "2618cef4ce1b6590a9b6379c0cf0b217", "score": "0.67416656", "text": "func (sge SecurityGroupEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d4cbddb3d688f7c3251df3bb477bce1d", "score": "0.6729945", "text": "func (rke RegistryKeyEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9f7b4f88eb4fd7ec0bd76e866868ae56", "score": "0.6710647", "text": "func (sa SecurityAlert) AsBasicEntity() (BasicEntity, bool) {\n\treturn &sa, true\n}", "title": "" }, { "docid": "bf3883bf6a41948fa582fdae3615673d", "score": "0.66871935", "text": "func (itde IoTDeviceEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "de7ca9e25c33a655deaeea55b213d675", "score": "0.6639634", "text": "func (rve RegistryValueEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "667b1bf4798d8406f76c77313fc32165", "score": "0.66340035", "text": "func (sa SecurityAlert) AsEntity() (*Entity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8c12ad30297c77fbd65e6871336ef7f3", "score": "0.6602659", "text": "func (de DNSEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b2bc15fc239d2d08216feec4db488709", "score": "0.6505715", "text": "func (peVar ProcessEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "7367d3b1b2efd3596472a5049f2018c9", "score": "0.6502609", "text": "func (ie IPEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "aba868dcef33ffd34409bc9a0a237915", "score": "0.64468354", "text": "func (are AzureResourceEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "4d2e815a6be0bf19bdf2d1a6d7ff18e6", "score": "0.64404994", "text": "func (fhe FileHashEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "fe57bd0a759e92d957d18938bd85c065", "score": "0.639681", "text": "func (e Entity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e493d5ec804e5f68946dfbaae402cbf6", "score": "0.63863295", "text": "func (ue URLEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "54c574d5cd87c7418f8d4b7d9eba6578", "score": "0.63514274", "text": "func (fe FileEntity) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f5bfa5041571a916c6647c0469a86156", "score": "0.63311726", "text": "func (me MalwareEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "064e81b3bb79c32574e00178c5a18d99", "score": "0.6316782", "text": "func (mce MailClusterEntity) AsBasicEntity() (BasicEntity, bool) {\n\treturn &mce, true\n}", "title": "" }, { "docid": "bd3f1bf1e192173c33e1b9051134de3a", "score": "0.62322503", "text": "func (sa SecurityAlert) AsHostEntity() (*HostEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "49a3276226d288cb099af1c695bcc449", "score": "0.62297845", "text": "func (ae AccountEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ad67499b215a279fff13023131aee5e3", "score": "0.62012774", "text": "func (sa SecurityAlert) AsCloudApplicationEntity() (*CloudApplicationEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f892b552f60aca858eccc5cbf0d449b7", "score": "0.61955893", "text": "func (de DNSEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6ee3a334ccf0e79fcf745bd1d894fc5e", "score": "0.61770576", "text": "func (sa SecurityAlert) AsMailMessageEntity() (*MailMessageEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "98b20ffea1f2497f20a0c36455bcc464", "score": "0.61765575", "text": "func (ue URLEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "769dad9515fa9b24955b32aa871f7dba", "score": "0.616255", "text": "func (sme SubmissionMailEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "920f513d7c79726443004d0ef7f4fa97", "score": "0.6152301", "text": "func (sa SecurityAlert) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "71707cbc7b245fff5288c20cbd15e75c", "score": "0.61515033", "text": "func (cae CloudApplicationEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f877771b14f2276c2bd0f4637ec779f6", "score": "0.6147026", "text": "func (mme MailMessageEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c07847fda82e5369d6e44b1240f85cc4", "score": "0.61390746", "text": "func (rve RegistryValueEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b1a8ab9cc9b0760a9b144b66a574a190", "score": "0.6113038", "text": "func (sa SecurityAlert) AsMailboxEntity() (*MailboxEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "cb86a3430a9ad748f4e5abac86ddb232", "score": "0.61114526", "text": "func (are AzureResourceEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "bbbb9814b590e7c86ad7e1d17e177671", "score": "0.610433", "text": "func (rke RegistryKeyEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "863b960bdbb1919436e1eca3b67e0b1c", "score": "0.6088777", "text": "func (ne NicEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f4ec38904a07dfe2b87b55705a932ab1", "score": "0.6072075", "text": "func (mce MailClusterEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn &mce, true\n}", "title": "" }, { "docid": "79eabad90fd755a91c18f331b085d196", "score": "0.6060493", "text": "func (mce MailClusterEntity) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "359dd71052cf9687fff6913623203715", "score": "0.60533535", "text": "func (ie IPEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "cb5ccc4442dd5b71e5f30f31224eb61d", "score": "0.6038045", "text": "func (he HostEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "422537c5a5d162455f94d8b49f18d1d2", "score": "0.6036768", "text": "func (itde IoTDeviceEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d9ac2853f7addf1f03661b559787fa76", "score": "0.59819484", "text": "func (hb HuntingBookmark) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f195b2cb6ee97bf527614962dfdd64b3", "score": "0.5976919", "text": "func (me MailboxEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ca6e38ba78207ae8bd9b9233a961c9d7", "score": "0.59475493", "text": "func (mce MailClusterEntity) AsEntity() (*Entity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d36a2210467a38bae25110442b61a7ae", "score": "0.59102166", "text": "func (sa SecurityAlert) AsNicEntity() (*NicEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "51e67e968a76f444ccd51d0803effd89", "score": "0.5880627", "text": "func (sge SecurityGroupEntity) AsBasicEntity() (BasicEntity, bool) {\n\treturn &sge, true\n}", "title": "" }, { "docid": "2399f55e13758888b0af8652642692a9", "score": "0.5820622", "text": "func (fe FileEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9a6ca097be9b61aa40446c2d64628665", "score": "0.58161205", "text": "func (fhe FileHashEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c0eaf1de2bb0a73fd22d29fb17ce0ef8", "score": "0.58098346", "text": "func (peVar ProcessEntity) AsMailClusterEntity() (*MailClusterEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "3b31c6c163bd1caac4bea4e9bd144d08", "score": "0.5726385", "text": "func (sa SecurityAlert) AsAccountEntity() (*AccountEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "40b4732c96065d2e9d08913818503e3d", "score": "0.55143243", "text": "func (sge SecurityGroupEntity) AsEntity() (*Entity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "bfebe84c1eb6e319eed018d1d068bf13", "score": "0.5504044", "text": "func (mce MailClusterEntity) AsMailMessageEntity() (*MailMessageEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e7dfaa772d3c22546c0d3fff5f64d540", "score": "0.5498898", "text": "func (mce MailClusterEntity) AsMalwareEntity() (*MalwareEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "99e7a1c805ed6593cc057abde86e34a7", "score": "0.54718524", "text": "func (mce MailClusterEntity) AsMailboxEntity() (*MailboxEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6b2f8d7f04eca84263eb6256cfae2ac0", "score": "0.5440135", "text": "func (sa SecurityAlert) AsMalwareEntity() (*MalwareEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "fdc4d8649163cdf8a5a616d07163eb95", "score": "0.54123634", "text": "func (sge SecurityGroupEntity) AsMailboxEntity() (*MailboxEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "24fd20e50ed33ca1312a21a18abacfb2", "score": "0.5359499", "text": "func (sge SecurityGroupEntity) AsHostEntity() (*HostEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "521df14d911310c6fed4d69cc4195e2f", "score": "0.53567046", "text": "func (sa SecurityAlert) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn &sa, true\n}", "title": "" }, { "docid": "89ca6726f95e1ce6b2f67b9e5a031868", "score": "0.535331", "text": "func (mce MailClusterEntity) AsHostEntity() (*HostEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e95e8a404ff323adcaca59fb32f0122d", "score": "0.53453594", "text": "func (sa SecurityAlert) AsRegistryKeyEntity() (*RegistryKeyEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "2824ccc95c5234548acc9b2ef5e9763c", "score": "0.53062564", "text": "func (mce MailClusterEntity) AsCloudApplicationEntity() (*CloudApplicationEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c7ae06e163731b6bcdcd4684d9083e07", "score": "0.527399", "text": "func (sge SecurityGroupEntity) AsCloudApplicationEntity() (*CloudApplicationEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6f1b69e744d92249ed878e80bf055862", "score": "0.5259801", "text": "func (eti EntityTimelineItem) AsSecurityAlertTimelineItem() (*SecurityAlertTimelineItem, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "2d9f62d64982766719fabbf05dd3d218", "score": "0.52478117", "text": "func (sme SubmissionMailEntity) AsBasicEntity() (BasicEntity, bool) {\n\treturn &sme, true\n}", "title": "" }, { "docid": "9b0d47c1dd62143da89b1c22f0a291ea", "score": "0.523172", "text": "func (sa SecurityAlert) AsSubmissionMailEntity() (*SubmissionMailEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "95878db732afc02ea14fd8bd4ffa829f", "score": "0.5222745", "text": "func (mme MailMessageEntity) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5c15119665246de0da354152d3af59c0", "score": "0.5221179", "text": "func (sa SecurityAlert) AsAzureResourceEntity() (*AzureResourceEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "609569a9e76ed5ba4c20135fcaeeefca", "score": "0.5196715", "text": "func (cae CloudApplicationEntity) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b4887fc19ce4d4b0bb13aa7b48d3673e", "score": "0.5180913", "text": "func (mce MailClusterEntity) AsAccountEntity() (*AccountEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "7dee54ad13f63788ee86407aecf2866c", "score": "0.51771206", "text": "func (sge SecurityGroupEntity) AsMailMessageEntity() (*MailMessageEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "db932c330a2d2221d34e070bb1d45727", "score": "0.51369596", "text": "func (sme SubmissionMailEntity) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "28a1ca0aa80bd3a7c8544a2449914023", "score": "0.51018715", "text": "func (sa SecurityAlert) AsDNSEntity() (*DNSEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "39072cfd6923821ea9cda3fdea7de31c", "score": "0.50905615", "text": "func (he HostEntity) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9b9d468fff9fbfe683b0ae3330f9230c", "score": "0.50897056", "text": "func (a *Alert) AsProto() *gtfsrt.FeedEntity {\n\treturn &gtfsrt.FeedEntity{\n\t\tId: &a.ID,\n\t\tAlert: &gtfsrt.Alert{\n\t\t\tInformedEntity: a.makeEntitySelector(),\n\t\t\tEffect: a.makeAlertEffect(),\n\t\t\tUrl: util.MakeTranslatedString(a.Link),\n\t\t\tHeaderText: util.MakeTranslatedString(a.Title),\n\t\t\tDescriptionText: util.MakeTranslatedString(a.Body),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "2688b502dd6ab95b405a183f0efd8c7e", "score": "0.5086362", "text": "func (me MailboxEntity) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "af69a7588e5593f96f301b2109d42e18", "score": "0.50637597", "text": "func (hb HuntingBookmark) AsSecurityAlert() (*SecurityAlert, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "acf93e780415c79b32d49c3d99162d5d", "score": "0.5061687", "text": "func (sati SecurityAlertTimelineItem) AsBasicEntityTimelineItem() (BasicEntityTimelineItem, bool) {\n\treturn &sati, true\n}", "title": "" }, { "docid": "5ddc2bd4dc9af4a18d810053a8404650", "score": "0.5047628", "text": "func FormatAlert(alert types.ClusterAlert) string {\n\t// TODO(timothyb89): Due to complications with globally enabling +\n\t// properly resetting Windows terminal ANSI processing, for now we just\n\t// disable color output. Otherwise, raw ANSI escapes will be visible to\n\t// users.\n\tvar buf bytes.Buffer\n\tswitch runtime.GOOS {\n\tcase constants.WindowsOS:\n\t\tfmt.Fprint(&buf, alert.Spec.Message)\n\tdefault:\n\t\tswitch alert.Spec.Severity {\n\t\tcase types.AlertSeverity_HIGH:\n\t\t\tfmt.Fprint(&buf, Color(Red, alert.Spec.Message))\n\t\tcase types.AlertSeverity_MEDIUM:\n\t\t\tfmt.Fprint(&buf, Color(Yellow, alert.Spec.Message))\n\t\tdefault:\n\t\t\tfmt.Fprint(&buf, alert.Spec.Message)\n\t\t}\n\t}\n\treturn buf.String()\n}", "title": "" }, { "docid": "0e335c12bcecb9064767d95b83f6abe4", "score": "0.5044566", "text": "func (cae CloudApplicationEntity) AsBasicEntity() (BasicEntity, bool) {\n\treturn &cae, true\n}", "title": "" }, { "docid": "44555328a3066f33d29bd407bfeeac97", "score": "0.5018904", "text": "func (m *ManagedTenantAlertLog) GetAlert()(ManagedTenantAlertable) {\n val, err := m.GetBackingStore().Get(\"alert\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(ManagedTenantAlertable)\n }\n return nil\n}", "title": "" }, { "docid": "3ca179de2c3306a9102c5c7fd93aaa24", "score": "0.50078017", "text": "func (mce MailClusterEntity) AsRegistryKeyEntity() (*RegistryKeyEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "cc36d2ce9422f00eb812b7b319cdba6d", "score": "0.50009733", "text": "func (e Entity) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "290f0034180cc11733638358b6c9f9c5", "score": "0.49979776", "text": "func (mce MailClusterEntity) AsNicEntity() (*NicEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "82e8d4add4b3d28c9e55d72070e28f0d", "score": "0.49890107", "text": "func (msicart MicrosoftSecurityIncidentCreationAlertRuleTemplate) AsBasicAlertRuleTemplate() (BasicAlertRuleTemplate, bool) {\n\treturn &msicart, true\n}", "title": "" }, { "docid": "82e8d4add4b3d28c9e55d72070e28f0d", "score": "0.49890107", "text": "func (msicart MicrosoftSecurityIncidentCreationAlertRuleTemplate) AsBasicAlertRuleTemplate() (BasicAlertRuleTemplate, bool) {\n\treturn &msicart, true\n}", "title": "" }, { "docid": "87435d819633b4e3abf002e6292815da", "score": "0.49550313", "text": "func (ne NicEntity) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "fbe428d76aa422b2a068e7417c8f350b", "score": "0.49437279", "text": "func TestClusterAlertAccessControls(t *testing.T) {\n\tt.Parallel()\n\n\tctx, cancel := context.WithCancel(context.Background())\n\tdefer cancel()\n\n\ttestSrv := newTestTLSServer(t)\n\n\texpectAlerts := func(alerts []types.ClusterAlert, names ...string) {\n\t\tfor _, alert := range alerts {\n\t\t\tfor _, name := range names {\n\t\t\t\tif alert.Metadata.Name == name {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t\tt.Fatalf(\"unexpected alert %q\", alert.Metadata.Name)\n\t\t}\n\t}\n\n\talert1, err := types.NewClusterAlert(\"alert-1\", \"some msg\")\n\trequire.NoError(t, err)\n\n\talert2, err := types.NewClusterAlert(\"alert-2\", \"other msg\")\n\trequire.NoError(t, err)\n\n\t// set one of the two alerts to be viewable by all users\n\talert2.Metadata.Labels = map[string]string{\n\t\ttypes.AlertPermitAll: \"yes\",\n\t}\n\n\tadminClt, err := testSrv.NewClient(TestBuiltin(types.RoleAdmin))\n\trequire.NoError(t, err)\n\tdefer adminClt.Close()\n\n\terr = adminClt.UpsertClusterAlert(ctx, alert1)\n\trequire.NoError(t, err)\n\n\terr = adminClt.UpsertClusterAlert(ctx, alert2)\n\trequire.NoError(t, err)\n\n\t// verify that admin client can see all alerts due to resource-level permissions\n\talerts, err := adminClt.GetClusterAlerts(ctx, types.GetClusterAlertsRequest{\n\t\tWithUntargeted: true,\n\t})\n\trequire.NoError(t, err)\n\trequire.Len(t, alerts, 2)\n\texpectAlerts(alerts, \"alert-1\", \"alert-2\")\n\n\t// verify that WithUntargeted=false admin only observes the alert that specifies\n\t// that it should be shown to all\n\talerts, err = adminClt.GetClusterAlerts(ctx, types.GetClusterAlertsRequest{\n\t\tWithUntargeted: false,\n\t})\n\trequire.NoError(t, err)\n\trequire.Len(t, alerts, 1)\n\texpectAlerts(alerts, \"alert-2\")\n\n\t// verify that some other client with no alert-specific permissions can\n\t// see the \"permit-all\" subset of alerts (using role node here, but any\n\t// role with no special provisions for alerts should be equivalent)\n\totherClt, err := testSrv.NewClient(TestBuiltin(types.RoleNode))\n\trequire.NoError(t, err)\n\tdefer otherClt.Close()\n\n\t// untargeted and targeted should result in the same behavior since otherClt\n\t// does not have resource-level permissions for the cluster_alert type.\n\tfor _, untargeted := range []bool{true, false} {\n\t\talerts, err = otherClt.GetClusterAlerts(ctx, types.GetClusterAlertsRequest{\n\t\t\tWithUntargeted: untargeted,\n\t\t})\n\t\trequire.NoError(t, err)\n\t\trequire.Len(t, alerts, 1)\n\t\texpectAlerts(alerts, \"alert-2\")\n\t}\n\n\t// verify that we still reject unauthenticated clients\n\tnopClt, err := testSrv.NewClient(TestBuiltin(types.RoleNop))\n\trequire.NoError(t, err)\n\tdefer nopClt.Close()\n\n\t_, err = nopClt.GetClusterAlerts(ctx, types.GetClusterAlertsRequest{})\n\trequire.True(t, trace.IsAccessDenied(err))\n\n\t// add more alerts that use resource verb permits\n\talert3, err := types.NewClusterAlert(\n\t\t\"alert-3\",\n\t\t\"msg 3\",\n\t\ttypes.WithAlertLabel(types.AlertVerbPermit, \"token:create\"),\n\t)\n\trequire.NoError(t, err)\n\n\talert4, err := types.NewClusterAlert(\n\t\t\"alert-4\",\n\t\t\"msg 4\",\n\t\ttypes.WithAlertLabel(types.AlertVerbPermit, \"token:create|role:read\"),\n\t)\n\trequire.NoError(t, err)\n\n\terr = adminClt.UpsertClusterAlert(ctx, alert3)\n\trequire.NoError(t, err)\n\n\terr = adminClt.UpsertClusterAlert(ctx, alert4)\n\trequire.NoError(t, err)\n\n\t// verify that admin client can see all alerts in untargeted read mode\n\talerts, err = adminClt.GetClusterAlerts(ctx, types.GetClusterAlertsRequest{\n\t\tWithUntargeted: true,\n\t})\n\trequire.NoError(t, err)\n\trequire.Len(t, alerts, 4)\n\texpectAlerts(alerts, \"alert-1\", \"alert-2\", \"alert-3\", \"alert-4\")\n\n\t// verify that admin client can see all targeted alerts in targeted mode\n\talerts, err = adminClt.GetClusterAlerts(ctx, types.GetClusterAlertsRequest{\n\t\tWithUntargeted: false,\n\t})\n\trequire.NoError(t, err)\n\trequire.Len(t, alerts, 3)\n\texpectAlerts(alerts, \"alert-2\", \"alert-3\", \"alert-4\")\n\n\t// verify that node client can only see one of the two new alerts\n\talerts, err = otherClt.GetClusterAlerts(ctx, types.GetClusterAlertsRequest{})\n\trequire.NoError(t, err)\n\trequire.Len(t, alerts, 2)\n\texpectAlerts(alerts, \"alert-2\", \"alert-4\")\n}", "title": "" }, { "docid": "aafc52352777d01a938883638462e281", "score": "0.493508", "text": "func (sa SecurityAlert) AsRegistryValueEntity() (*RegistryValueEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "279b24085ab6fb1d5999f80d033997c2", "score": "0.49257243", "text": "func (msicar MicrosoftSecurityIncidentCreationAlertRule) AsBasicAlertRule() (BasicAlertRule, bool) {\n\treturn &msicar, true\n}", "title": "" }, { "docid": "279b24085ab6fb1d5999f80d033997c2", "score": "0.49257243", "text": "func (msicar MicrosoftSecurityIncidentCreationAlertRule) AsBasicAlertRule() (BasicAlertRule, bool) {\n\treturn &msicar, true\n}", "title": "" }, { "docid": "bfc946d7d17b9ffe133a07b6306dd21c", "score": "0.49248248", "text": "func Alert(classifier string, body gr.Modifier) *gr.Element {\n\te := el.Div(\n\t\tgr.CSS(\"alert\", \"alert-success\"),\n\t\tel.Anchor(gr.Prop(\"href\", \"#\"),\n\t\t\tgr.CSS(\"close\"), gr.Data(\"dismiss\", \"alert\"), gr.Aria(\"label\", \"close\"),\n\t\t\tgr.Text(\"Close\")),\n\t\tbody)\n\treturn e\n}", "title": "" }, { "docid": "618083f8e7ab35f5624ae0bbc684ebb1", "score": "0.4913976", "text": "func (mme MailMessageEntity) AsBasicEntity() (BasicEntity, bool) {\n\treturn &mme, true\n}", "title": "" }, { "docid": "274743c2b1af9028277ce7933277e50c", "score": "0.49132437", "text": "func (ae AccountEntity) AsSecurityGroupEntity() (*SecurityGroupEntity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "4fb6c9f2ed23a66c5ef1c26d33b55fa1", "score": "0.48991978", "text": "func (sa SecurityAlert) AsFileHashEntity() (*FileHashEntity, bool) {\n\treturn nil, false\n}", "title": "" } ]
63900f532ac69653ac782f827a0947dc
authFileContents returns a PgBouncer user database.
[ { "docid": "9e4028563aa1299a2fe238e35aaf0e34", "score": "0.7821847", "text": "func authFileContents(password string) []byte {\n\t// > There should be at least 2 fields, surrounded by double quotes.\n\t// > Double quotes in a field value can be escaped by writing two double quotes.\n\t// - https://www.pgbouncer.org/config.html#authentication-file-format\n\tquote := func(s string) string {\n\t\treturn `\"` + strings.ReplaceAll(s, `\"`, `\"\"`) + `\"`\n\t}\n\n\tuser1 := quote(postgresqlUser) + \" \" + quote(password) + \"\\n\"\n\n\treturn []byte(user1)\n}", "title": "" } ]
[ { "docid": "3a5b0377f2543398daf5c319bdf55f37", "score": "0.6467095", "text": "func (fs *FileSystem) ReadAuth(filename string) ([]byte, error) {\n\n\terr := sanitize(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdata, err := read(authdb(fs.path, filename))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn data, err\n}", "title": "" }, { "docid": "413e61b16123944c53acb42a9fc21ec7", "score": "0.57827735", "text": "func Read(path string) (UserAuth, error) {\n\tif path == \"/dev/null\" {\n\t\treturn UserAuth{}, nil\n\t}\n\tf, err := os.Open(userAuthFileName(path))\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn UserAuth{}, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\tvar ua UserAuth\n\tif err := json.NewDecoder(f).Decode(&ua); err != nil {\n\t\treturn nil, err\n\t}\n\treturn ua, nil\n}", "title": "" }, { "docid": "db92c501e13bca9e6badaf34217a7974", "score": "0.57360923", "text": "func creds(fn string) string {\n\tf, err := os.Open(fn)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tdefer f.Close()\n\n\tbytes, _ := ioutil.ReadAll(f)\n\n\tvar c cred\n\n\tjson.Unmarshal(bytes, &c)\n\treturn fmt.Sprintf(\"%v:%v@/%v\", c.Username, c.Password, c.Database)\n}", "title": "" }, { "docid": "e4d39992e6bae0b25726af5ed2b1668b", "score": "0.5444798", "text": "func getAuthFile() (*file, error) {\n\tfileLocation := os.Getenv(\"AZURE_AUTH_LOCATION\")\n\tif fileLocation == \"\" {\n\t\treturn nil, errors.New(\"environment variable AZURE_AUTH_LOCATION is not set\")\n\t}\n\n\tcontents, err := ioutil.ReadFile(fileLocation)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tauthFile := file{}\n\terr = json.Unmarshal(contents, &authFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &authFile, nil\n}", "title": "" }, { "docid": "f06a67c67019cfcd3f33639b0fa491d2", "score": "0.53950787", "text": "func loadGitCredentialsAuthFile(fileName string) (*AuthConfig, error) {\n\texists, err := util.FileExists(fileName)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to check if git credentials file exists %s\", fileName)\n\t}\n\tif !exists {\n\t\treturn nil, nil\n\t}\n\n\tdata, err := ioutil.ReadFile(fileName)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to load git credentials file %s\", fileName)\n\t}\n\n\tconfig := &AuthConfig{}\n\tfor _, line := range strings.Split(string(data), \"\\n\") {\n\t\tline = strings.TrimSpace(line)\n\t\tif line == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tu, err := url.Parse(line)\n\t\tif err != nil {\n\t\t\tlog.Logger().Warnf(\"ignoring invalid line in git credentials file: %s error: %s\", fileName, err.Error())\n\t\t\tcontinue\n\t\t}\n\n\t\tuser := u.User\n\t\tusername := user.Username()\n\t\tpassword, _ := user.Password()\n\t\tif username == \"\" {\n\t\t\tlog.Logger().Warnf(\"ignoring missing user name in git credentials file: %s URL: %s\", fileName, line)\n\t\t\tcontinue\n\t\t}\n\t\tif password == \"\" {\n\t\t\tlog.Logger().Warnf(\"ignoring missing password in git credentials file: %s URL: %s\", fileName, line)\n\t\t\tcontinue\n\t\t}\n\t\tu.User = nil\n\t\tserverURL := u.String()\n\t\tserver := config.GetOrCreateServer(serverURL)\n\t\tserver.CurrentUser = username\n\t\tserver.Users = append(server.Users, &UserAuth{\n\t\t\tUsername: username,\n\t\t\tPassword: password,\n\t\t\tApiToken: password,\n\t\t})\n\t}\n\treturn config, nil\n}", "title": "" }, { "docid": "3144eea3e8e09465401b9bdb81a99316", "score": "0.52547014", "text": "func readCredentialsFile() {\n\tfile, err := os.Open(\"/etc/poliskartaCredentials.json\")\n\tdefer file.Close()\n\tif err != nil {\n\t\tpanic(\"Couldn't read the /etc/poliskartaCredentials.json-file! Error: \" + err.Error())\n\t}\n\n\tdecoder := json.NewDecoder(file)\n\t// credentials := structs.Credentials{}\n\terr = decoder.Decode(&credentials)\n\tif err != nil {\n\t panic(\"Couldn't parse the /etc/poliskartaCredentials.json-file as JSON! Error: \" + err.Error())\n\t}\n\n\t// credentials = credentials.Mapquestkey\n}", "title": "" }, { "docid": "740b4bd55649b057d329afe66125f512", "score": "0.5220021", "text": "func ParseFile(inputfile, password string) (*Safe, error) {\n\tvar safe Safe\n\tinfile, err := os.Open(inputfile)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer infile.Close()\n\n\tr, rerr := NewReader(infile, password)\n\tif rerr != nil {\n\t\treturn nil, rerr\n\t}\n\n\theaders, herr := readHeaders(r)\n\tif herr != nil {\n\t\treturn nil, herr\n\t}\n\tsafe.Headers = headers\n\n\tfor {\n\t\trecord, rerr := readRecord(r)\n\t\tif rerr != nil && rerr == EOF {\n\t\t\tif verr := r.Verify(); verr != nil {\n\t\t\t\treturn nil, verr\n\t\t\t}\n\t\t\treturn &safe, nil\n\t\t} else if rerr != nil {\n\t\t\treturn nil, rerr\n\t\t}\n\t\tsafe.Records = append(safe.Records, record)\n\t}\n\n\treturn &safe, nil\n}", "title": "" }, { "docid": "f36e5d1cd7028edde3368f4c519e55f9", "score": "0.5213297", "text": "func getCreds(filename string) (r map[string]string) {\n\tdata, err := ioutil.ReadFile(filename)\n\tif err != nil { panic(err) }\n\tif err = json.Unmarshal(data, &r); err != nil { panic(err) }\n\treturn r\n}", "title": "" }, { "docid": "f19fd620cc8f821ec9ee72ec261ca375", "score": "0.521302", "text": "func ReadUserFromFile () ([]User, error){\n\t//read every users info\n\tvar users []User\t\n\tif data, err := ioutil.ReadFile(UserInfoPath); err == nil {\n\t\tstr := string(data)\n\t\tjson.Unmarshal([]byte(str), &users)\n\t\treturn users, nil\n\t} else {\n\t\tError.Println(err)\n\t\treturn users, err\n\t}\n}", "title": "" }, { "docid": "ca6c463bd10fe8101143c31293e8fa72", "score": "0.52001894", "text": "func NewAuthFromFile(privateFile string) (gosip.AuthCnfg, error) {\n\tjsonFile, err := os.Open(privateFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer func() { _ = jsonFile.Close() }()\n\n\tbyteValue, err := io.ReadAll(jsonFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar cnfg struct {\n\t\tStrategy string `json:\"strategy\"`\n\t}\n\tif err := json.Unmarshal(byteValue, &cnfg); err != nil {\n\t\treturn nil, err\n\t}\n\n\tauth, err := NewAuthByStrategy(cnfg.Strategy)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := auth.ParseConfig(byteValue); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn auth, nil\n}", "title": "" }, { "docid": "3968cc08abaaa104de453d67f4832c68", "score": "0.5180739", "text": "func NewAuthDb(filePath string) *AuthDb {\n\tdb := &AuthDb{}\n\terr := db.init(filePath)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn db\n}", "title": "" }, { "docid": "5c7b4b58eeeb8f1831bda088298d8cf3", "score": "0.51753247", "text": "func (fcs *FileCredentialsServer) GetUserAndPassword(user string) (string, string, error) {\n\tfcs.mu.Lock()\n\tdefer fcs.mu.Unlock()\n\n\tif *dbCredentialsFile == \"\" {\n\t\treturn \"\", \"\", ErrUnknownUser\n\t}\n\n\t// read the json file only once\n\tif fcs.dbCredentials == nil {\n\t\tfcs.dbCredentials = make(map[string][]string)\n\n\t\tdata, err := ioutil.ReadFile(*dbCredentialsFile)\n\t\tif err != nil {\n\t\t\tlog.Warningf(\"Failed to read dbCredentials file: %v\", *dbCredentialsFile)\n\t\t\treturn \"\", \"\", err\n\t\t}\n\n\t\tif err = json.Unmarshal(data, &fcs.dbCredentials); err != nil {\n\t\t\tlog.Warningf(\"Failed to parse dbCredentials file: %v\", *dbCredentialsFile)\n\t\t\treturn \"\", \"\", err\n\t\t}\n\t}\n\n\tpasswd, ok := fcs.dbCredentials[user]\n\tif !ok {\n\t\treturn \"\", \"\", ErrUnknownUser\n\t}\n\treturn user, passwd[0], nil\n}", "title": "" }, { "docid": "b67646c7bf6077f350e94b74ecf6db90", "score": "0.5113989", "text": "func CredentialsFromFile(path string) (Credentials, error) {\n\tbytes, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn Credentials{}, err\n\t}\n\n\ttype dockerConfig struct {\n\t\tAuths map[string]struct {\n\t\t\tAuth string `json:\"auth\"`\n\t\t\tEmail string `json:\"email\"`\n\t\t} `json:\"auths\"`\n\t}\n\n\tvar config dockerConfig\n\tif err = json.Unmarshal(bytes, &config); err != nil {\n\t\treturn Credentials{}, err\n\t}\n\n\tm := map[string]creds{}\n\tfor host, entry := range config.Auths {\n\t\tdecodedAuth, err := base64.StdEncoding.DecodeString(entry.Auth)\n\t\tif err != nil {\n\t\t\treturn Credentials{}, err\n\t\t}\n\t\tauthParts := strings.SplitN(string(decodedAuth), \":\", 2)\n\t\tm[host] = creds{\n\t\t\tusername: authParts[0],\n\t\t\tpassword: authParts[1],\n\t\t}\n\t}\n\treturn Credentials{m: m}, nil\n}", "title": "" }, { "docid": "8f422faae948a9743670fe23692b1271", "score": "0.5113253", "text": "func FromFile() (*User, error) {\n\tf, err := os.Open(UserFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer f.Close()\n\n\tuser := &User{}\n\terr = json.NewDecoder(f).Decode(user)\n\n\treturn user, nil\n}", "title": "" }, { "docid": "397a12ee7490acd0ed32e1a1362e2721", "score": "0.51130414", "text": "func loadGitCredentialsAuth() (*AuthConfig, error) {\n\tfileName := util.GitCredentialsFile()\n\treturn loadGitCredentialsAuthFile(fileName)\n}", "title": "" }, { "docid": "3cdb58d0f5a73ed65ca4058111fd695a", "score": "0.5091896", "text": "func ReadUserPassw(filename string) (string, string, error) {\n\tfh, err := os.Open(filename)\n\tif err != nil {\n\t\treturn \"\", \"\", errors.Wrapf(err, \"open %q\", filename)\n\t}\n\tdefer fh.Close()\n\tscanner := bufio.NewScanner(fh)\n\tfor scanner.Scan() {\n\t\tline := bytes.TrimSpace(scanner.Bytes())\n\t\tif i := bytes.IndexByte(line, '\\n'); i >= 0 {\n\t\t\tline = bytes.TrimSpace(line[:i])\n\t\t}\n\t\tif len(line) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\ti := bytes.IndexByte(line, ':')\n\t\tif i < 0 {\n\t\t\tcontinue\n\t\t}\n\t\treturn string(line[:i]), string(line[i+1:]), nil\n\t}\n\treturn \"\", \"\", io.EOF\n}", "title": "" }, { "docid": "9d24d4b683297727e9a3d6966226dbfd", "score": "0.5055306", "text": "func loadCredsFromFile(filepath string) ([]passListEntry, string) {\n\tbuff, err := ioutil.ReadFile(filepath)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil, \"Failed to open or read file\"\n\t}\n\t//Decrypt passwords\n\tbuff = []byte(rot47(string(buff)))\n\t//Load decrypted passwords\n\tvar passlist []passListEntry\n\terr = json.Unmarshal(buff, &passlist)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn nil, \"Failed to load creds\"\n\t}\n\treturn passlist, \"Ok\"\n}", "title": "" }, { "docid": "018a72dad41d14a8d627e88f82827cbc", "score": "0.50303096", "text": "func (o *Files) GetUser(username, password, clientid string) (bool, error) {\n\n\tfileUser, ok := o.Users[username]\n\tif !ok {\n\t\treturn false, nil\n\t}\n\n\tif o.hasher.Compare(password, fileUser.Password) {\n\t\treturn true, nil\n\t}\n\n\tlog.Warnf(\"wrong password for user %s\", username)\n\n\treturn false, nil\n\n}", "title": "" }, { "docid": "e3f4d252ffdda313155844eb629d5ebf", "score": "0.50283194", "text": "func (db *AuthDb) init(filePath string) error {\n\tf, err := os.Open(filePath)\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn ErrFileNotFound\n\t\t}\n\t\treturn err\n\t}\n\tdefer f.Close()\n\n\tr := csv.NewReader(f)\n\trecords, err := r.ReadAll()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif len(records) > 0 {\n\t\trecords = records[1:]\n\t}\n\n\tentries := make([]Entry, 0, 10)\n\tfor _, record := range records {\n\t\ttlsRequired := false\n\t\tif record[2] == \"true\" {\n\t\t\ttlsRequired = true\n\t\t}\n\t\tentry := Entry{Login: record[0], Ip: record[1], TlsRequired: tlsRequired, Topic: record[3], Channel: record[4], Subscribe: record[5], Publish: record[6]}\n\t\tentries = append(entries, entry)\n\t}\n\tdb.entries = entries\n\treturn nil\n}", "title": "" }, { "docid": "47972a93328d13fbc7e76436158f43a3", "score": "0.50202495", "text": "func readAuthItem(db *sql.DB, name string) (string, error) {\n\tvar r string\n\terr := db.QueryRow(`SELECT password FROM auth WHERE name = ?;`, name).Scan(&r)\n\tif err != nil && !errors.Is(err, sql.ErrNoRows) {\n\t\treturn \"\", err\n\t}\n\n\treturn r, nil\n}", "title": "" }, { "docid": "b99074b06b9097528abbb838f203abf7", "score": "0.50197494", "text": "func ReadUserPassw(filename string) (string, string, error) {\n\tfh, err := os.Open(filename)\n\tif err != nil {\n\t\treturn \"\", \"\", fmt.Errorf(\"open %q: %w\", filename, err)\n\t}\n\tdefer fh.Close()\n\tscanner := bufio.NewScanner(fh)\n\tfor scanner.Scan() {\n\t\tline := bytes.TrimSpace(scanner.Bytes())\n\t\tif i := bytes.IndexByte(line, '\\n'); i >= 0 {\n\t\t\tline = bytes.TrimSpace(line[:i])\n\t\t}\n\t\tif len(line) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\ti := bytes.IndexByte(line, ':')\n\t\tif i < 0 {\n\t\t\tcontinue\n\t\t}\n\t\treturn string(line[:i]), string(line[i+1:]), nil\n\t}\n\treturn \"\", \"\", io.EOF\n}", "title": "" }, { "docid": "4fb35142b1b6af7171d307a0485f2042", "score": "0.4968758", "text": "func (r *realStore) Read() ([]models.User, error) {\n\tif !r.fsys.Exists(r.path) {\n\t\treturn nil, errors.Errorf(\"no file found at %q\", r.path)\n\t}\n\n\tfile, err := r.fsys.Open(r.path)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to open file at %q\", r.path)\n\t}\n\tdefer file.Close()\n\n\t// Create a reader to read all the lines of the file.\n\treader := csv.NewReader(file)\n\trecords, err := reader.ReadAll()\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to read file at %q\", r.path)\n\t}\n\n\t// Parse the records to a user model\n\tusers := make([]models.User, len(records))\n\tfor k, v := range records {\n\t\tuser := &models.User{}\n\t\tif err := user.Unmarshal(v); err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"unable to parse user at %q for index %d\", r.path, k)\n\t\t}\n\n\t\tusers[k] = *user\n\t}\n\n\treturn users, nil\n}", "title": "" }, { "docid": "52947874ee7fa3f3bfe23b10134e936e", "score": "0.49520135", "text": "func (o *Files) readPasswords() (int, error) {\n\n\tusersCount := 0\n\n\tfile, err := os.Open(o.PasswordPath)\n\tif err != nil {\n\t\treturn usersCount, fmt.Errorf(\"Files backend error: couldn't open passwords file: %s\", err)\n\t}\n\tdefer file.Close()\n\tscanner := bufio.NewScanner(file)\n\tscanner.Split(bufio.ScanLines)\n\n\tindex := 0\n\t//Read line by line\n\tfor scanner.Scan() {\n\t\tindex++\n\n\t\t//Check comment or empty line to skip them.\n\t\tif checkCommentOrEmpty(scanner.Text()) {\n\t\t\tcontinue\n\t\t}\n\n\t\tlineArr := strings.Split(scanner.Text(), \":\")\n\t\tif len(lineArr) != 2 {\n\t\t\tlog.Errorf(\"Read passwords error: line %d is not well formatted\", index)\n\t\t\tcontinue\n\t\t}\n\t\t//Create user if it doesn't exist and save password; override password if user existed.\n\t\tvar fileUser *FileUser\n\t\tvar ok bool\n\t\tfileUser, ok = o.Users[lineArr[0]]\n\t\tif ok {\n\t\t\tfileUser.Password = lineArr[1]\n\t\t} else {\n\t\t\tusersCount++\n\t\t\tfileUser = &FileUser{\n\t\t\t\tPassword: lineArr[1],\n\t\t\t\tAclRecords: make([]AclRecord, 0),\n\t\t\t}\n\t\t\to.Users[lineArr[0]] = fileUser\n\t\t}\n\t}\n\n\treturn usersCount, nil\n\n}", "title": "" }, { "docid": "75a68d94275e3545ea5812f599b5b423", "score": "0.49268848", "text": "func (*UserAuth) Descriptor() ([]byte, []int) {\n\treturn file_auth_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "4107cbd6c208b80a5dfb2fdc73366b34", "score": "0.4916718", "text": "func getDB(phone int64) (*models.User, error) {\n\tf, err := os.Open(userDataPath(phone))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Phone %s is not found, \", phone)\n\t}\n\tdefer f.Close()\n\tbuf := make([]byte, 1000)\n\tval, _ := f.Read(buf)\n\n\tvalSplit := strings.Split(string(buf[:val]), \" \")\n\tisAdmin, err := strconv.Atoi(valSplit[2])\n\tif err != nil {\n\t\tisAdmin = 0\n\t}\n\tuserObject := &models.User{\n\t\tPhone: phone,\n\t\tPassword: valSplit[0],\n\t\tName: valSplit[1],\n\t\tIsAdmin: isAdmin,\n\t}\n\treturn userObject, nil\n}", "title": "" }, { "docid": "0f10b397c35ffc7cbb91facfeab480e8", "score": "0.49128112", "text": "func readUserTestContent(ctx context.Context, user, fileName string) ([]byte, error) {\n\ttestFile, err := util.GetUserTestFilePath(ctx, user, fileName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ioutil.ReadFile(testFile)\n}", "title": "" }, { "docid": "c3c6cf36b00dae08e9f0a0d86cca4a46", "score": "0.49101812", "text": "func readFromFile() {\n\tufile, _ := os.OpenFile(\"./data/User.json\", os.O_CREATE|os.O_RDONLY, 0666)\n\tdefer ufile.Close()\n\tdec := json.NewDecoder(ufile)\n\tif err := dec.Decode(&(instance.userList)); err != nil && err != io.EOF {\n\t\tlog.Fatal(err)\n\t}\n\n\tmfile, _ := os.OpenFile(\"./data/Meeting.json\", os.O_CREATE|os.O_RDONLY, 0666)\n\tdefer mfile.Close()\n\tdec = json.NewDecoder(mfile)\n\tif err := dec.Decode(&(instance.meetingList)); err != nil && err != io.EOF {\n\t\tlog.Fatal(err)\n\t}\n\n\tcufile, _ := os.OpenFile(\"./data/curUser.txt\", os.O_CREATE|os.O_RDONLY, 0666)\n\tdefer cufile.Close()\n\tdec = json.NewDecoder(cufile)\n\tif err := dec.Decode(&(instance.curUser)); err != nil && err != io.EOF {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "6617b6566dc0e41c19a2105c27496e29", "score": "0.4894216", "text": "func Read(client client.Client, name string) (user User, err error) {\n\tclient.Logger.Debugf(\"Reading user %s\", name)\n\n\tge, err := getent(\"passwd\", name)\n\tif len(ge) < 7 {\n\t\terr = resources.NotFoundError{Type: Type, Name: name}\n\t\treturn\n\t}\n\n\tuser.UID = ge[2]\n\tuser.GID = ge[3]\n\tuser.Comment = ge[4]\n\tuser.HomeDir = ge[5]\n\tuser.Shell = ge[6]\n\n\tge, err = getent(\"shadow\", name)\n\tif len(ge) > 0 {\n\t\tuser.Passwd = ge[1]\n\t}\n\n\tsudoFile := fmt.Sprintf(\"/etc/sudoers.d/%s\", name)\n\t_, err = os.Stat(sudoFile)\n\tif err == nil {\n\t\tuser.Sudo = true\n\t}\n\n\tlines, err := utils.FileGetLines(\"/etc/group\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tgroupRe := regexp.MustCompile(fmt.Sprintf(\"(.+):.+:.+:*%s*\", name))\n\tfor _, line := range lines {\n\t\tif v := groupRe.FindStringSubmatch(line); v != nil {\n\t\t\tuser.Groups = append(user.Groups, v[1])\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "c8f82ec2aa93a942fa2a2e7344760e1c", "score": "0.48626253", "text": "func (*UserAuth) Descriptor() ([]byte, []int) {\n\treturn file_auth_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "829c1b8232e316ab74dac6756eb7200e", "score": "0.484639", "text": "func AuthFuncsFile(genpkg string, root *expr.RootExpr) *codegen.File {\n\tvar (\n\t\tapiPkg = strings.ToLower(codegen.Goify(root.API.Name, false))\n\t\trootPath = \".\"\n\t\tfilepath = \"auth.go\"\n\t)\n\t{\n\t\tif _, err := os.Stat(filepath); !os.IsNotExist(err) {\n\t\t\treturn nil // file already exists, skip it.\n\t\t}\n\t\tidx := strings.LastIndex(genpkg, string(os.PathSeparator))\n\t\tif idx > 0 {\n\t\t\trootPath = genpkg[:idx]\n\t\t}\n\t}\n\n\tvar (\n\t\tsections []*codegen.SectionTemplate\n\t\tgenerate bool\n\t)\n\t{\n\t\tspecs := []*codegen.ImportSpec{\n\t\t\t{Path: \"context\"},\n\t\t\t{Path: \"fmt\"},\n\t\t\t{Path: \"goa.design/goa\", Name: \"goa\"},\n\t\t\t{Path: \"goa.design/goa/security\"},\n\t\t\t{Path: rootPath, Name: apiPkg},\n\t\t}\n\t\tfor _, svc := range root.Services {\n\t\t\tsd := Services.Get(svc.Name)\n\t\t\tspecs = append(specs, &codegen.ImportSpec{\n\t\t\t\tPath: path.Join(genpkg, codegen.SnakeCase(sd.VarName)),\n\t\t\t\tName: sd.PkgName,\n\t\t\t})\n\t\t}\n\t\theader := codegen.Header(\"\", apiPkg, specs)\n\t\tsections = []*codegen.SectionTemplate{header}\n\t\tfor _, s := range root.Services {\n\t\t\tsvc := Services.Get(s.Name)\n\t\t\tif len(svc.Schemes) > 0 {\n\t\t\t\tgenerate = true\n\t\t\t\tsections = append(sections, &codegen.SectionTemplate{\n\t\t\t\t\tName: \"security-authfuncs\",\n\t\t\t\t\tSource: dummyAuthFuncsT,\n\t\t\t\t\tData: svc,\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t}\n\tif len(sections) == 0 || !generate {\n\t\treturn nil\n\t}\n\n\treturn &codegen.File{\n\t\tPath: filepath,\n\t\tSectionTemplates: sections,\n\t\tSkipExist: true,\n\t}\n}", "title": "" }, { "docid": "26c1172927e95d6eca46d1964ef7ba8e", "score": "0.48436487", "text": "func showDbEntries(gUsers map[string]user, keyData []byte) {\n\tfmt.Printf(\"User database: \\n\")\n\tfor k := range gUsers {\n\t\tfmt.Printf(\" %s - %s\\n\", gUsers[k].Name, decrypt(decode64(gUsers[k].Password), keyData)) // decodificamos y desencriptamos las contraseñas\n\t}\n\treturn\n}", "title": "" }, { "docid": "5dd9684c7282d8bba57297dff4a67ee8", "score": "0.484273", "text": "func readFile() []byte{\n\tb, err := ioutil.ReadFile(\"clientSecretGmail.json\")\n if err != nil {\n log.Fatalf(\"Unable to read client secret file: %v\", err)\n }\n\treturn b\n}", "title": "" }, { "docid": "fa5270f100d301e4970f747e3ee909fd", "score": "0.4829957", "text": "func (userdata *User) LoadFile(filename string) (dataBytes []byte, err error) {\r\n\r\n\tvar file_data FileNode\r\n\tvar file_container File\r\n\tif userdata == nil {\r\n\t\treturn nil, errors.New(\"userdata nil\")\r\n\t}\r\n\t//TODO: This is a toy implementation.\r\n\thidden_c, ok := userlib.DatastoreGet(userdata.FileLocation[filename])\r\n\t// print(hidden_c)\r\n\r\n\tif !ok {\r\n\t\treturn nil, errors.New(\"The filename doesn't exist for this user\")\r\n\t}\r\n\tif len(hidden_c) <= userlib.HashSizeBytes {\r\n\t\treturn nil, errors.New(\"bad data, can't slice getuser\")\r\n\t}\r\n\thmac_tag := hidden_c[:userlib.HashSizeBytes]\r\n\thidden_cont := hidden_c[userlib.HashSizeBytes:]\r\n\tif len(userdata.FileHMAC[filename]) != 16 {\r\n\t\treturn nil, errors.New(\"Probe without proper key in load\")\r\n\t}\r\n\tprobe_hmac, err := userlib.HMACEval(userdata.FileHMAC[filename], hidden_cont)\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"probing in load failed\")\r\n\t}\r\n\tif !userlib.HMACEqual(hmac_tag, probe_hmac) {\r\n\t\treturn nil, errors.New(\"Data seems to be corrupted\")\r\n\t}\r\n\r\n\tencKey := userdata.FileEncrypt[filename]\r\n\r\n\terr = json.Unmarshal(depad(userlib.SymDec(encKey, hidden_cont)), &file_container)\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"unmarshaling failed\")\r\n\t}\r\n\thidden_file, ok := userlib.DatastoreGet(file_container.Head)\r\n\tif !ok {\r\n\t\treturn nil, errors.New(\" bad head yyyy\")\r\n\t}\r\n\tif len(hidden_file) <= userlib.HashSizeBytes {\r\n\t\treturn nil, errors.New(\"bad data, can't slice getuser\")\r\n\t}\r\n\thmac_tag = hidden_file[:userlib.HashSizeBytes]\r\n\thidden_file = hidden_file[userlib.HashSizeBytes:]\r\n\tif len(userdata.FileHMAC[filename]) != 16 {\r\n\t\treturn nil, errors.New(\"Probe without proper key in load\")\r\n\t}\r\n\tprobe_hmac, err = userlib.HMACEval(userdata.FileHMAC[filename], hidden_file)\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"probing in load failed\")\r\n\t}\r\n\tif !userlib.HMACEqual(hmac_tag, probe_hmac) {\r\n\t\treturn nil, errors.New(\"Data seems to be corrupted\")\r\n\t}\r\n\r\n\terr = json.Unmarshal(depad(userlib.SymDec(encKey, hidden_file)), &file_data)\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"unmarshaling failed\")\r\n\t}\r\n\tcur_id := file_container.Head\r\n\r\n\tfor cur_id != file_container.Tail {\r\n\t\thidden_file, ok := userlib.DatastoreGet(cur_id)\r\n\t\tif !ok {\r\n\t\t\treturn nil, errors.New(\"what are we appending\")\r\n\t\t}\r\n\t\tif len(hidden_file) <= userlib.HashSizeBytes {\r\n\t\t\treturn nil, errors.New(\"bad data, can't slice getuser\")\r\n\t\t}\r\n\t\thmac_tag := hidden_file[:userlib.HashSizeBytes]\r\n\t\thidden_data := hidden_file[userlib.HashSizeBytes:]\r\n\t\tif len(userdata.FileHMAC[filename]) != 16 {\r\n\t\t\treturn nil, errors.New(\"Probe without proper key in load\")\r\n\t\t}\r\n\t\tprobe_hmac, err := userlib.HMACEval(userdata.FileHMAC[filename], hidden_data)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, errors.New(\"probing in load failed\")\r\n\t\t}\r\n\t\tif !userlib.HMACEqual(hmac_tag, probe_hmac) {\r\n\t\t\treturn nil, errors.New(\"Data seems to be corrupted\")\r\n\t\t}\r\n\r\n\t\tencKey := userdata.FileEncrypt[filename]\r\n\r\n\t\terr = json.Unmarshal(depad(userlib.SymDec(encKey, hidden_data)), &file_data)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, errors.New(\"unmarshaling failed\")\r\n\t\t}\r\n\t\tdataBytes = append(dataBytes, file_data.Data...)\r\n\t\tcur_id = file_data.Next\r\n\t}\r\n\r\n\thidden_file, ok = userlib.DatastoreGet(cur_id)\r\n\tif !ok {\r\n\t\treturn nil, errors.New(\"what are we appending\")\r\n\t}\r\n\tif len(hidden_file) <= userlib.HashSizeBytes {\r\n\t\treturn nil, errors.New(\"bad data, can't slice getuser\")\r\n\t}\r\n\thmac_tag = hidden_file[:userlib.HashSizeBytes]\r\n\thidden_data := hidden_file[userlib.HashSizeBytes:]\r\n\tif len(userdata.FileHMAC[filename]) != 16 {\r\n\t\treturn nil, errors.New(\"Probe without proper key in load\")\r\n\t}\r\n\tprobe_hmac, err = userlib.HMACEval(userdata.FileHMAC[filename], hidden_data)\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"probing in load failed\")\r\n\t}\r\n\tif !userlib.HMACEqual(hmac_tag, probe_hmac) {\r\n\t\treturn nil, errors.New(\"Data seems to be corrupted\")\r\n\t}\r\n\r\n\terr = json.Unmarshal(depad(userlib.SymDec(encKey, hidden_data)), &file_data)\r\n\tif err != nil {\r\n\t\treturn nil, errors.New(\"unmarshaling failed\")\r\n\t}\r\n\tdataBytes = append(dataBytes, file_data.Data...)\r\n\r\n\treturn dataBytes, nil\r\n\t//End of toy implementation\r\n\r\n}", "title": "" }, { "docid": "0b3d9da0abd22dbbae520f3f3693e607", "score": "0.48284385", "text": "func getUsers(onlyLoginUser bool) (usernames []string) {\n\tfile, err := os.Open(\"/etc/passwd\")\n\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\treader := bufio.NewReader(file)\n\n\tfor {\n\t\tline, err := reader.ReadString('\\n')\n\n\t\t// skip all line starting with #\n\t\tif equal := strings.Index(line, \"#\"); equal < 0 {\n\t\t\t// get the username and description\n\t\t\tlineSlice := strings.Split(line, \":\")\n\n\t\t\tif len(lineSlice) > 1 {\n\t\t\t\tif onlyLoginUser && isLoginUser(lineSlice[6]) {\n\t\t\t\t\tusernames = append(usernames, lineSlice[0])\n\t\t\t\t} else {\n\t\t\t\t\tusernames = append(usernames, lineSlice[0])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn usernames\n\t\t}\n\t}\n\n\terr = file.Close()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn usernames\n}", "title": "" }, { "docid": "72c4f196abce3c2911384d7f9292faa1", "score": "0.4814677", "text": "func initAuthDB() (*sql.DB, error) {\n\tos.Mkdir(\"storage\", 0777)\n\n\tdb, err := sql.Open(\"sqlite3\", \"storage/auth.sqlite\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif _, err := db.Exec(`\n\t\tCREATE TABLE IF NOT EXISTS auth (\n\t\t\tname VARCHAR(32) NOT NULL,\n\t\t\tpassword VARCHAR(512) NOT NULL\n\t\t);\n\t\tCREATE TABLE IF NOT EXISTS privileges (\n\t\t\tname VARCHAR(32) NOT NULL,\n\t\t\tprivileges VARCHAR(1024)\n\t\t);\n\t\tCREATE TABLE IF NOT EXISTS ban (\n\t\t\taddr VARCHAR(39) NOT NULL,\n\t\t\tname VARCHAR(32) NOT NULL\n\t\t);\n\t`); err != nil {\n\t\tdb.Close()\n\t\treturn nil, err\n\t}\n\n\treturn db, nil\n}", "title": "" }, { "docid": "6c3660faf8d580968416fd906d8a5216", "score": "0.4763868", "text": "func loadAuth() {\n\tif auth.user != \"\" || auth.cookieName != \"\" {\n\t\treturn\n\t}\n\tloadGerritOrigin()\n\n\t// First look in Git's http.cookiefile, which is where Gerrit\n\t// now tells users to store this information.\n\tif cookieFile, _ := trimErr(cmdOutputErr(\"git\", \"config\", \"--path\", \"--get-urlmatch\", \"http.cookiefile\", auth.url)); cookieFile != \"\" {\n\t\tdata, _ := ioutil.ReadFile(cookieFile)\n\t\tmaxMatch := -1\n\t\tfor _, line := range lines(string(data)) {\n\t\t\tf := strings.Split(line, \"\\t\")\n\t\t\tif len(f) >= 7 && (f[0] == auth.host || strings.HasPrefix(f[0], \".\") && strings.HasSuffix(auth.host, f[0])) {\n\t\t\t\tif len(f[0]) > maxMatch {\n\t\t\t\t\tauth.cookieName = f[5]\n\t\t\t\t\tauth.cookieValue = f[6]\n\t\t\t\t\tmaxMatch = len(f[0])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif maxMatch > 0 {\n\t\t\treturn\n\t\t}\n\t}\n\n\t// If not there, then look in $HOME/.netrc, which is where Gerrit\n\t// used to tell users to store the information, until the passwords\n\t// got so long that old versions of curl couldn't handle them.\n\tnetrc := netrcName()\n\thomeDir := testHomeDir\n\tif homeDir == \"\" {\n\t\tusr, err := user.Current()\n\t\tif err != nil {\n\t\t\tdief(\"failed to get current user home directory to look for %q: %v\", netrc, err)\n\t\t}\n\t\thomeDir = usr.HomeDir\n\t}\n\tdata, _ := ioutil.ReadFile(filepath.Join(homeDir, netrc))\n\tfor _, line := range lines(string(data)) {\n\t\tif i := strings.Index(line, \"#\"); i >= 0 {\n\t\t\tline = line[:i]\n\t\t}\n\t\tf := strings.Fields(line)\n\t\tif len(f) >= 6 && f[0] == \"machine\" && f[1] == auth.host && f[2] == \"login\" && f[4] == \"password\" {\n\t\t\tauth.user = f[3]\n\t\t\tauth.password = f[5]\n\t\t\treturn\n\t\t}\n\t}\n\n\tdief(\"cannot find authentication info for %s\", auth.host)\n}", "title": "" }, { "docid": "e4c9e174111fc84e7fe5f9c74f8c814d", "score": "0.47619632", "text": "func parseFile(b []byte) *oauth2.Config{\n\tconfig, err := google.ConfigFromJSON(b, gmail.MailGoogleComScope)\n if err != nil {\n log.Fatalf(\"Unable to parse client secret file to config: %v\", err)\n }\n\treturn config\n}", "title": "" }, { "docid": "0e16afa2e8397b3647ffdae986e810d3", "score": "0.47563004", "text": "func (user *User) LoadFile(filename string) (data []byte, err error) {\n\t///////////////////////////////////////\n\t// INODE STRUCTURE //\n\t///////////////////////////////////////\n\tfileKey := user.GetInodeKey(filename)\n\n\t// Retrieve the encrypted Inode structure from DataStore\n\trsaEncrypted, status := userlib.DatastoreGet(fileKey)\n\tif status != true {\n\t\treturn nil, errors.New(\"Filename not found\")\n\t}\n\n\tvar encrypted [][]byte\n\terr = json.Unmarshal(rsaEncrypted, &encrypted)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Inode_r Unmarshalling failed\")\n\t}\n\n\t// Retreive the Marshalled Inode_r struct from the encrypted chunks\n\tindex := 0\n\tinodeMarsh := make([]byte, len(encrypted))\n\tfor index < len(encrypted) {\n\t\t// RSA Asymmetric Key Decryption\n\t\tdecryptedBlock, err := userlib.RSADecrypt(user.Privkey,\n\t\t\tencrypted[index], []byte(\"Tag\"))\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(\"RSA Encryption of Inode_r failed\\n\")\n\t\t}\n\n\t\tinodeMarsh = append(inodeMarsh, decryptedBlock...)\n\t\tindex += 1\n\t}\n\n\t// Remove leading \\x00 characters from inodeMarsh\n\tfor inodeMarsh[0] == []byte(\"\\x00\")[0] {\n\t\tinodeMarsh = remove(inodeMarsh, 0)\n\t}\n\n\tvar file Inode_r\n\terr = json.Unmarshal(inodeMarsh, &file)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Inode_r Unmarshalling failed\")\n\t}\n\n\t// Verify Inode structure's integrity\n\tfileMarsh, err := json.Marshal(file.Inode)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Inode_r.Inode Marshalling failed\")\n\t}\n\n\terr = userlib.RSAVerify(&user.Privkey.PublicKey, fileMarsh, file.Signature)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Inode Integrity Check failed\")\n\t}\n\n\t//\n\t///////////////////////////////////////\n\t// SHARINGRECORD STRUCTURE //\n\t///////////////////////////////////////\n\t// Retrieve encrypted SharingRecord structure from DataStore\n\tshrCipher, status := userlib.DatastoreGet(file.Inode.ShRecordAddr)\n\tif !status {\n\t\treturn nil, errors.New(\"Sharing Record Structure can't be found\")\n\t}\n\n\tiv := shrCipher[:BlockSize]\n\tcipher := userlib.CFBDecrypter(file.Inode.SymmKey, iv)\n\n\t// In place AES decryption of ciphertext\n\tcipher.XORKeyStream(shrCipher[BlockSize:], shrCipher[BlockSize:])\n\n\tvar shrecord SharingRecord_r\n\terr = json.Unmarshal(shrCipher[BlockSize:], &shrecord)\n\tif err != nil {\n\t\treturn nil, errors.New(\"SharingRecord_r Unmarshalling failed\")\n\t}\n\n\t// Verify the integrity of SharingRecord structure\n\tshrMarsh, err := json.Marshal(shrecord.SharingRecord)\n\tif err != nil {\n\t\treturn nil, errors.New(\"SharingRecord_r.SharingRecord Marshalling failed\")\n\t}\n\tmac := userlib.NewHMAC(file.Inode.SymmKey)\n\tmac.Write(shrMarsh)\n\tif !userlib.Equal(shrecord.Signature, mac.Sum(nil)) {\n\t\treturn nil, errors.New(\"SharingRecord Integrity check failed\")\n\t}\n\n\t//\n\t// Loop through all data blocks, run the checks and return them\n\t///////////////////////////////////////\n\t// DATA STRUCTURE //\n\t///////////////////////////////////////\n\tnumBlocks := len(shrecord.SharingRecord.SymmKey)\n\tvar finalData []byte\n\n\tfor i := 0; i < numBlocks; i += 1 {\n\t\tdbKey := shrecord.SharingRecord.Address[i]\n\t\tsymmKey := shrecord.SharingRecord.SymmKey[i]\n\n\t\tciphertext, status := userlib.DatastoreGet(dbKey)\n\t\tif status != true {\n\t\t\treturn nil, errors.New(\"Data block not found\")\n\t\t}\n\n\t\tiv := ciphertext[:BlockSize]\n\t\tcipher := userlib.CFBDecrypter(symmKey, iv)\n\n\t\t// In place AES decryption of ciphertext\n\t\tcipher.XORKeyStream(ciphertext[BlockSize:],\n\t\t\tciphertext[BlockSize:])\n\n\t\tvar data Data\n\t\terr = json.Unmarshal(ciphertext[BlockSize:], &data)\n\t\tif err != nil {\n\t\t\treturn nil, errors.New(\"Data block Unmarshalling failed\")\n\t\t}\n\n\t\t// Check the data integrity\n\t\tmac := userlib.NewHMAC(symmKey)\n\t\tmac.Write(data.Value)\n\t\thmacSum := mac.Sum(nil)\n\t\tif !userlib.Equal(data.Signature, hmacSum) {\n\t\t\treturn nil, errors.New(\"Data Integrity check failed\")\n\t\t}\n\n\t\t// Key-value swap check\n\t\tif dbKey != data.KeyAddr {\n\t\t\treturn nil, errors.New(\"Key Value swap detected\")\n\t\t}\n\n\t\tfinalData = append(finalData, data.Value...)\n\t}\n\n\treturn finalData, nil\n\n}", "title": "" }, { "docid": "c6bec57ba1814749a995b621893a105a", "score": "0.47525606", "text": "func deriveAuthValue(key []byte, sz int) ([]byte, error) {\n\tr := hkdf.Expand(func() hash.Hash { return crypto.SHA256.New() }, key, []byte(\"PASSPHRASE-AUTH\"))\n\n\tauthValue := make([]byte, sz)\n\tif _, err := io.ReadFull(r, authValue); err != nil {\n\t\treturn nil, xerrors.Errorf(\"cannot obtain auth value: %w\", err)\n\t}\n\n\treturn authValue, nil\n}", "title": "" }, { "docid": "3c3d147dbe5960f3ac49b51424f5ffd4", "score": "0.4746185", "text": "func (userdata *User) LoadFile(filename string, offset int) (data []byte, err error) {\r\n\r\n\t// SHARING UID RECREATED\r\n\tif len(userdata.FileRecord[filename]) == 0 {\r\n\t\treturn nil, errors.New(\"FAILURE:: LOADFILE:: FILENAME NOT FOUND\")\r\n\t\t//return nil, nil\r\n\t}\r\n\tSuid := userdata.FileRecord[filename]\r\n\tSuuid := Suid[0:32]\r\n\tSkey := Suid[32:48]\r\n\tSHashkey := Suid[48:64]\r\n\r\n\t// FETCH SHARING RECORD FROM DATA STORE\r\n\tencryptRecord, e1 := userlib.DatastoreGet(string(Suuid))\r\n\tif e1 != true {\r\n\t\treturn nil, errors.New(\"FAILURE:: LOADFILE --- DATASTOREGET\")\r\n\t}\r\n\t// UNMARSHALL ENCRYPTED SHARING RECORD\r\n\tvar cypertext []byte\r\n\tjson.Unmarshal(encryptRecord, &cypertext)\r\n\r\n\tlenCyper := len(cypertext)\r\n\tAppendedMAC := cypertext[lenCyper-32:]\r\n\tAppendedIV := cypertext[:userlib.BlockSize]\r\n\r\n\tmacValue := ComputeHashValue(cypertext[:lenCyper-32], SHashkey)\r\n\r\n\tif !userlib.Equal(AppendedMAC, macValue) {\r\n\t\t//fmt.Pri\r\n\t\t//ntln(\"not equal\")\r\n\t\treturn nil, errors.New(\"FAILURE:: LOADFILE --- INTEGRITY NOT PRESERVED\")\r\n\t}\r\n\r\n\t//fmt.Println(\"Equal\")\r\n\t//DecryptData(data []byte, key []byte, iv []byte)\r\n\tcipher := userlib.CFBDecrypter(Skey, AppendedIV)\r\n\tcipher.XORKeyStream(cypertext[userlib.BlockSize:lenCyper-32], cypertext[userlib.BlockSize:lenCyper-32])\r\n\r\n\tvar shareRecord sharingRecord\r\n\tjson.Unmarshal(cypertext[userlib.BlockSize:lenCyper-32], &shareRecord)\r\n\r\n\t// offset exceeded\r\n\tif offset >= shareRecord.Offset {\r\n\t\treturn nil, errors.New(\"FAILURE:: LOADFILE:: OFFSET VALUE EXCEEDED\")\r\n\t}\r\n\r\n\tfor i := 0; i < shareRecord.Offset; i++ {\r\n\t\tzuid := shareRecord.Blockuuid[i] // 64byte uid\r\n\t\tzsuid := zuid[0:32]\r\n\t\tzBencryptRecord, ze2 := userlib.DatastoreGet(string(zsuid))\r\n\t\tif ze2 != true {\r\n\t\t\treturn nil, errors.New(\"FAILURE:: LOADFILE --- DATASTOREGET\")\r\n\t\t}\r\n\t\tvar zBcypertext []byte\r\n\t\tjson.Unmarshal(zBencryptRecord, &zBcypertext)\r\n\r\n\t\tzBlenCyper := len(zBcypertext)\r\n\t\tzBAppendedMAC := zBcypertext[zBlenCyper-32:]\r\n\t\t//zBAppendedIV := zBcypertext[:userlib.BlockSize]\r\n\r\n\t\tzBmacValue := ComputeHashValue(zBcypertext[:zBlenCyper-32], zuid[48:64])\r\n\r\n\t\tif !userlib.Equal(zBAppendedMAC, zBmacValue) {\r\n\t\t\t//fmt.Println(\"not equal\")\r\n\t\t\treturn nil, errors.New(\"FAILURE:: LOADFILE --- INTEGRITY NOT PRESERVED\")\r\n\t\t}\r\n\r\n\t}\r\n\r\n\t// Accessing BlockDATA FROM DATASTORE\r\n\tuid := shareRecord.Blockuuid[offset] // 64byte uid\r\n\tsuid := uid[0:32]\r\n\tBencryptRecord, e2 := userlib.DatastoreGet(string(suid))\r\n\tif e2 != true {\r\n\t\treturn nil, errors.New(\"FAILURE:: LOADFILE --- DATASTOREGET\")\r\n\t}\r\n\tvar Bcypertext []byte\r\n\tjson.Unmarshal(BencryptRecord, &Bcypertext)\r\n\r\n\tBlenCyper := len(Bcypertext)\r\n\tBAppendedMAC := Bcypertext[BlenCyper-32:]\r\n\tBAppendedIV := Bcypertext[:userlib.BlockSize]\r\n\r\n\tBmacValue := ComputeHashValue(Bcypertext[:BlenCyper-32], uid[48:64])\r\n\r\n\tif !userlib.Equal(BAppendedMAC, BmacValue) {\r\n\t\t//fmt.Println(\"not equal\")\r\n\t\treturn nil, errors.New(\"FAILURE:: LOADFILE --- INTEGRITY NOT PRESERVED\")\r\n\t}\r\n\r\n\t//fmt.Println(\"Equal\")\r\n\t//DecryptData(data []byte, key []byte, iv []byte)\r\n\tBcipher := userlib.CFBDecrypter(uid[32:48], BAppendedIV)\r\n\tBcipher.XORKeyStream(Bcypertext[userlib.BlockSize:BlenCyper-32], Bcypertext[userlib.BlockSize:BlenCyper-32])\r\n\r\n\tData := Bcypertext[userlib.BlockSize : BlenCyper-32]\r\n\r\n\treturn Data, nil\r\n}", "title": "" }, { "docid": "d5fd3bb08c1b3fd9486dff73f0d3a899", "score": "0.47278437", "text": "func (fs *FileSystem) MakeAuth(filename string, data []byte) error {\n\n\terr := sanitize(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = mkdir(fs.path)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = touch(authdb(fs.path, filename), data)\n\treturn err\n}", "title": "" }, { "docid": "cf930ae398d2e976ae441e4cc7a842f7", "score": "0.4720666", "text": "func NewHtpasswdFromFile(path string) (*HtpasswdFile, error) {\n\tr, err := os.Open(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer r.Close()\n\n\tcr := csv.NewReader(r)\n\tcr.Comma = ':'\n\tcr.Comment = '#'\n\tcr.TrimLeadingSpace = true\n\n\trecords, err := cr.ReadAll()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tusers := make(map[string]string)\n\tfor _, record := range records {\n\t\tusers[record[0]] = record[1]\n\t}\n\n\treturn &HtpasswdFile{\n\t\tpath: path,\n\t\tusers: users,\n\t}, nil\n}", "title": "" }, { "docid": "5753096d6cae87940b35e14c7f324649", "score": "0.47205067", "text": "func (c *Credential) ReadFrom(file io.Reader) (n int64, err error) {\n\tdefer recoverMust(&err)\n\n\tmust(readU16(file, &n) == cacheVersion)\n\n\thlen := int(readU16(file, &n))\n\tskip(file, &n, hlen)\n\n\tprinc, realm := readPrincipal(file, &n)\n\tmust(realm == c.realm && nameEquals(princ, c.principal))\n\n\tn += mustReadTickets(c, file)\n\treturn n, err\n}", "title": "" }, { "docid": "8cf5065384d9e6b64c96e76c09e12f2c", "score": "0.47071892", "text": "func loadUsers(database_file string) {\n// TODO load user login and connect it to usersdb (store id/user separately)\n\tvar UsrlasTId uint64\n\tUsrlasTId = 2\n\tif database_file != \"users_test.db\" {\n\t\tdatabase_file = \"../users/users.db\"\n\t}\n\tfile, err := os.Open(database_file)\n\n\tdefer file.Close()\n\n\tif err != nil {\n\t\tlog.Fatal(\"loadUsers 474\", err)\n\t}\n\n\tfi, err := file.Stat()\n\tif err != nil {\n\t\t// Could not obtain stat, handle error\n\t\tlog.Fatal(\"Could not obtain stat\", err)\n\t}\n\n\tvar i uint64\n\n\tfor i = 0; i < uint64(fi.Size()/(64+308)); i++ {\n\t\tvar offset = int(i) + 1\n\t\tif offset == 0 {\n\t\t\toffset = 1\n\t\t}\n\t\tdata := readNextBytes(file, (64+308))\n\t\tusers.mux.Lock()\n\n\t\tusers.data[string(bytes.Trim(data[58:158], \"\\x00\"))]=User{\n\t\t\tId:binary.LittleEndian.Uint64(data[0:8]),\n\t\t\tLastLogin:binary.LittleEndian.Uint64(data[8:58]),\n\t\t\tEmail:string(bytes.Trim(data[58:158], \"\\x00\")),\n\t\t\tIpAddr:string(bytes.Trim(data[158:178], \"\\x00\")),\n\t\t\tSession:string(bytes.Trim(data[178:208], \"\\x00\")),\n\t\t\tKey:string(bytes.Trim(data[208:308], \"\\x00\")),\n\t\t}\n\t\tusers.mux.Unlock()\n\t\tif UsrlasTId < binary.LittleEndian.Uint64(data[0:8]) {\n\t\t\tUsrlasTId = binary.LittleEndian.Uint64(data[0:8])\n\t\t}\n\t}\n\n\tlastId=UsrlasTId\n\tif lastId == 0 || lastId == 1 || lastId == 2 {\n\t\tlastId = 2\n\t}\n}", "title": "" }, { "docid": "c5b7c1ac53a371ae98482ddf4c09f8d7", "score": "0.4704643", "text": "func userAuthFileName(ret string) string {\n\tif runtime.GOOS == \"windows\" {\n\t\t// on Windows there is no HOME\n\t\tret = strings.Replace(ret, \"$HOME\", env.CurrentUserHomeDir(), -1)\n\t}\n\treturn filepath.FromSlash(os.ExpandEnv(ret))\n}", "title": "" }, { "docid": "3abbb4286652e4df7298782845d12fd1", "score": "0.46762115", "text": "func LoadFromFile(keyfile string) (*RobotAuth, error) {\n\tif keyfile == \"\" {\n\t\tkeyfile = filename()\n\t}\n\traw, err := ioutil.ReadFile(keyfile)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to read %v: %v\", credentialsFile, err)\n\t}\n\n\tvar robotAuth RobotAuth\n\terr = json.Unmarshal(raw, &robotAuth)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to parse %v: %v\", credentialsFile, err)\n\t}\n\n\treturn &robotAuth, nil\n}", "title": "" }, { "docid": "4c826fb276f413eccbc76dab3bf694fd", "score": "0.46740296", "text": "func LoadCredentialsFromFile(filePath string) (*credentials.Credentials, error) {\n\t// Attempt to read the file - Nothing wrong if it doesn't exist.\n\tif _, err := os.Stat(filePath); os.IsNotExist(err) {\n\t\treturn &credentials.Credentials{}, nil\n\t}\n\n\tvar readCredentials credentials.Credentials\n\terr := ReadGobFromFile(filePath, &readCredentials)\n\treturn &readCredentials, err\n}", "title": "" }, { "docid": "38c18b4ccca72b602ab253a18d58622e", "score": "0.46671242", "text": "func UsersFromFile(file string) (Users, error) {\n\tcontent, err := ioutil.ReadFile(file)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar users Users\n\tif err := json.Unmarshal(content, &users); err != nil {\n\t\treturn nil, err\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "b751bd9e8c11772762be7cb4e54fc26b", "score": "0.46566287", "text": "func ReadKeytab(file io.Reader, cfg *CredConfig) (creds []*Credential, err error) {\n\tdefer recoverMust(&err)\n\n\tn := int64(0)\n\tmust(readU16(file, &n) == keytabVersion)\n\n\tsize := 0\n\tfor tryRead32(file, &n, &size) {\n\n\t\t// Negative sizes are used for deleted entries, skip over it\n\t\tif size < 0 {\n\t\t\tskip(file, &n, -size)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Get an extra octet_string for the realm\n\t\tparts := make([]string, int(readU16(file, &n))+1)\n\t\tsize -= 2\n\n\t\tfor i := 0; i < len(parts); i++ {\n\t\t\tpsz := int(readU16(file, &n))\n\t\t\tsize -= 2\n\n\t\t\tparts[i] = string(read(file, &n, make([]byte, psz)))\n\t\t\tsize -= psz\n\t\t}\n\n\t\tnametype := int(readU32(file, &n))\n\t\tsize -= 4\n\n\t\t// timestamp unused\n\t\t_ = time.Unix(int64(readU32(file, &n)), 0)\n\t\tsize -= 4\n\n\t\tkvno := int(readU8(file, &n))\n\t\tsize -= 1\n\n\t\tkeytype := int(readU16(file, &n))\n\t\tsize -= 2\n\n\t\tkeysize := int(readU16(file, &n))\n\t\tsize -= 2\n\n\t\tkeydata := read(file, &n, make([]byte, keysize))\n\t\tsize -= keysize\n\n\t\tmust(size >= 0)\n\n\t\tif size >= 4 {\n\t\t\tkvno = int(readU32(file, &n))\n\t\t\tsize -= 4\n\t\t}\n\n\t\tskip(file, &n, size)\n\n\t\tkey := mustLoadKey(keytype, keydata)\n\t\tpr := principalName{nametype, parts[1:]}\n\t\tc := newCredential(pr, parts[0], key, kvno, cfg)\n\t\tcreds = append(creds, c)\n\t}\n\n\treturn creds, nil\n}", "title": "" }, { "docid": "472ecf1398eeac91bc72b27557a6dd7d", "score": "0.46560636", "text": "func readUsers() (map[string]string, error) {\n log.Tracef(\"Reading in users file\")\n usersJson, err := ioutil.ReadFile(config.UsersFile)\n if err != nil {\n log.Errorf(\"%s\", err)\n return map[string]string{}, err\n }\n\n var users map[string]map[string]string\n err = yaml.Unmarshal(usersJson, &users)\n if err != nil {\n log.Errorf(\"%s\", err)\n return nil, err\n }\n return users[\"users\"], nil\n}", "title": "" }, { "docid": "2bf8d86faa29869ec68c308a0b97bc90", "score": "0.4652332", "text": "func (ps *PasswordStore) ReadFile(path string) ([]byte, error) {\n\tfile := filepath.Clean(filepath.Join(\"./\", path+\".gpg\"))\n\tencrypted, err := ps.store.ReadFile(file)\n\tif err != nil {\n\t\treturn nil, xerrors.Errorf(\"could not read file %q: %w\", file, err)\n\t}\n\tdecrypted, err := ps.keyring.Decrypt(encrypted)\n\tif err != nil {\n\t\treturn nil, xerrors.Errorf(\"could not decrypt file %q: %w\", file, err)\n\t}\n\treturn decrypted, nil\n}", "title": "" }, { "docid": "abd80b8b2d854b99f50ba207146f2451", "score": "0.4645449", "text": "func registerFileDb() (model.UserDataStore, error) {\n\tif connString == nil || *connString == \"\" {\n\t\treturn nil, fmt.Errorf(\"registerFileDb: using a file as a database but no file path was provided through the %v flag\", connFlag)\n\t}\n\n\tif _, err := os.Stat(*connString); os.IsNotExist(err) {\n\t\tnewFile, err := os.Create(*connString)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t//Initialize JSON format so the first file read won't fail.\n\t\tnewFile.Write([]byte(\"{}\"))\n\t}\n\n\treturn &fileusermodel.FileUserModel{Filepath: *connString}, nil\n}", "title": "" }, { "docid": "d33a6506c1e0c727716b11faf960be05", "score": "0.46404326", "text": "func load_user_list() {\n\tfile, err := os.OpenFile(USERLIST_FILENAME, os.O_CREATE|os.O_RDONLY, 0600)\n\tdefer file.Close()\n\tcheck_err(err)\n\tscanner := bufio.NewScanner(file)\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\tsplitted_string := strings.Split(line, \":\")\n\t\tuname := strings.TrimSpace(splitted_string[0])\n\t\tpsw := strings.TrimSpace(splitted_string[1])\n\t\t// store user in server memory\n\t\tuser_map[uname] = psw\n\t}\n\n}", "title": "" }, { "docid": "93ca8d5225e11b7b1de60dcea291e7be", "score": "0.4619458", "text": "func load_users(filename string) (Users) {\n\n\tfile, e := ioutil.ReadFile(filename)\n\n if e != nil {\n fmt.Printf(\"File error: %v\\n\", e)\n os.Exit(1)\n }\n\n\tvar users Users\n\terr := json.Unmarshal(file, &users)\n\t\n\tif err != nil {\n\t\tlog.Printf(\"Error reading json %v\", err)\n\t\tos.Exit(1)\n\t}\n\n\treturn users\n}", "title": "" }, { "docid": "925aad73d30c28c0b45b1a00a67b65c0", "score": "0.46184507", "text": "func (k *KeePass2Reader) ReadDatabase(db *os.File, compositeKey *keys.CompositeKey) error {\n\n\tif err := k.CheckSignature(db); err != nil {\n\t\treturn errors.Wrap(err, \"Signature check failed\")\n\t}\n\n\tversion, err := k.CheckVersion(db)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Version check failed\")\n\t}\n\n\tfor {\n\t\tcontinueLoop, err := k.ReadHeaders(db)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"Reading headers failed\")\n\t\t}\n\t\tif continueLoop == false {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif err := k.CheckHeaders(); err != nil {\n\t\treturn errors.Wrap(err, \"Header check failed\")\n\t}\n\n\tif err := k.Db.SetKey(compositeKey, k.transformSeed); err != nil {\n\t\treturn errors.Wrap(err, \"Unable to calculate master key\")\n\t}\n\n\th := sha256.New()\n\th.Write(k.masterSeed)\n\th.Write(k.Db.TransformedMasterKey)\n\tfinalKey := h.Sum(nil)\n\n\tblock, err := aes.NewCipher(finalKey)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"New AES Cipher error\")\n\t}\n\n\tcipherStream, err := streams.NewSymmetricCipherStream(block, k.encryptionIV, db, streams.DirectionDecrypt)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Cipher stream error\")\n\t}\n\n\tvar realStart []byte\n\tcipherStream.ReadData(&realStart, 32)\n\n\tif !bytes.Equal(realStart, k.streamStartBytes) {\n\t\treturn errors.New(\"Wrong key or database file is corrupt\")\n\t}\n\n\thashBlock := streams.NewHashedBlock(cipherStream.BlockMode, cipherStream)\n\tvar result []byte\n\tvar bytesRead int\n\tbyteChunks := 65500 // reads into result in byte chunks sizes\n\n\tfor {\n\t\tbytesRead, err = hashBlock.ReadData(&result, byteChunks)\n\t\tlog.Debugf(\"bytes read from hashBlock: %d\", bytesRead)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif bytesRead == 0 {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tvar xmlDevice io.Reader\n\tif k.Db.CompressionAlgo == core.CompressionNone {\n\t\tlog.Debugf(\"no compression set\")\n\t\txmlDevice = bytes.NewReader(result)\n\t} else {\n\t\tlog.Debugf(\"compression set\")\n\t\tlog.Debugf(\"result length :%d\", len(result))\n\n\t\tbuf := bytes.NewBuffer(result)\n\t\tzr, err := gzip.NewReader(buf)\n\t\tdefer zr.Close()\n\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"gzip new reader failed\")\n\t\t}\n\n\t\tb, err := ioutil.ReadAll(zr)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"xml error\")\n\t\t}\n\n\t\txmlDevice = bytes.NewReader(b)\n\t}\n\n\trandomKey := sha256.Sum256(k.protectedStreamKey)\n\tk.XMLReader, err = NewKeePass2XmlReader(xmlDevice, &randomKey)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"keepass2xml reader creation failed\")\n\t}\n\n\txmlHeaderHash, err := k.XMLReader.HeaderHash()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"xml header hash error\")\n\t}\n\n\tif !(version < keepass2FileVersion || len(xmlHeaderHash) > 0) {\n\t\treturn errors.New(\"xml header hash error\")\n\t}\n\n\tif len(xmlHeaderHash) > 0 {\n\t\thh := sha256.New()\n\t\thh.Write(k.headerStoredData)\n\t\theaderHash := hh.Sum(nil)\n\n\t\tif !bytes.Equal(headerHash, xmlHeaderHash) {\n\t\t\treturn errors.New(\"header doesn't match hash\")\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d9375bf1d14c5398a82130ab5a4b3054", "score": "0.46036342", "text": "func loadUserInfo(bucket string) error {\n\tstorage := os.Getenv(APP_ENV_DB_STORAGE)\n\tdb, err := bolt.Open(storage, defaultDbFileMode, &bolt.Options{Timeout: 1 * time.Second})\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\terr = db.View(func(tx *bolt.Tx) error {\n\t\tbk := tx.Bucket([]byte(bucket))\n\t\tbk.ForEach(func(key, value []byte) error {\n\t\t\tvar tempUser userInfo\n\t\t\tjson.Unmarshal(value, &tempUser)\n\t\t\tkeyStr := string(key)\n\t\t\tkeyInt, err := strconv.Atoi(keyStr)\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"loadUserInfo: falsely parse data\")\n\t\t\t} else {\n\t\t\t\tuserMap[keyInt] = &tempUser\n\t\t\t\tlog.Printf(\"loadUserInfo: successfully parse data, insert user id=%d value=%s\", keyInt, value)\n\t\t\t}\n\t\t\treturn err\n\t\t})\n\t\treturn err\n\t})\n\tdefer db.Close()\n\treturn err\n}", "title": "" }, { "docid": "b3e9a83989034d3b53f3f213e316a8f7", "score": "0.4596822", "text": "func (bb *TwitchBot) ReadCredentials() error {\n\n\t// reads from the file\n\tcredFile, err := ioutil.ReadFile(bb.PrivatePath)\n\tif nil != err {\n\t\treturn err\n\t}\n\n\tbb.Credentials = &OAuthCred{}\n\n\t// parses the file contents\n\tdec := json.NewDecoder(strings.NewReader(string(credFile)))\n\tif err = dec.Decode(bb.Credentials); nil != err && io.EOF != err {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9aacc8ae7524e6323a9ed69549c26962", "score": "0.45964354", "text": "func UserDetails(keypath, keyname, github string) {\n\tWriteConfigFiles(\"keypath\",keypath,CPath,\"user\")\n\tWriteConfigFiles(\"keyname\",keyname,CPath,\"user\")\n\tWriteConfigFiles(\"github\",github,CPath,\"user\")\n}", "title": "" }, { "docid": "fb6c34c3a28fbbe9c5ad01882add7489", "score": "0.45929936", "text": "func PgHbaFileRules(ctx context.Context, db DB) (int, string, StringSlice, StringSlice, string, string, string, StringSlice, string, error) {\n\t// call pg_catalog.pg_hba_file_rules\n\tconst sqlstr = `SELECT * FROM pg_catalog.pg_hba_file_rules()`\n\t// run\n\tvar lineNumber int\n\tvar typ string\n\tvar database StringSlice\n\tvar userName StringSlice\n\tvar address string\n\tvar netmask string\n\tvar authMethod string\n\tvar options StringSlice\n\tvar e string\n\tlogf(sqlstr)\n\tif err := db.QueryRowContext(ctx, sqlstr).Scan(&lineNumber, &typ, &database, &userName, &address, &netmask, &authMethod, &options, &e); err != nil {\n\t\treturn 0, \"\", StringSlice{}, StringSlice{}, \"\", \"\", \"\", StringSlice{}, \"\", logerror(err)\n\t}\n\treturn lineNumber, typ, database, userName, address, netmask, authMethod, options, e, nil\n}", "title": "" }, { "docid": "2570829d6ce2a6be326a1bc670d4e1d0", "score": "0.45884305", "text": "func (p *PEMFile) Contents() string {\n\treturn p.contents\n}", "title": "" }, { "docid": "5b6010dfe2255aeff2b52dc2118bf73c", "score": "0.45858094", "text": "func mongoPass() string {\n\ttext, err := ioutil.ReadFile(\"mongo.txt\")\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\treturn string(text)\n}", "title": "" }, { "docid": "f4d822397e8e359dceed9b1f9d5204fc", "score": "0.45783547", "text": "func loadDockercfgAuths(content []byte) ([]string, error) {\n\tvar data map[string]authEntry\n\tif err := json.Unmarshal(content, &data); err != nil {\n\t\treturn nil, err\n\t}\n\tvar entries []authEntry\n\tfor _, entry := range data {\n\t\tentries = append(entries, entry)\n\t}\n\treturn collectSecretsFrom(entries), nil\n}", "title": "" }, { "docid": "4c7cdf154fccd843d5937011d0371f2e", "score": "0.4572277", "text": "func GetUserFromAuth(req *http.Request, dbmap *gorp.DbMap) (error, *models.User) {\n\tvar item models.User\n\tusername, hash, httpCode := DecodeAuthHeader(req)\n\n\tif httpCode != http.StatusOK { return errors.New(\"Invalid auth\"), nil }\n\n\t// get said user\n\terr := dbmap.SelectOne(&item, \"select * from users where email=$1\", username)\n\t// check hash\n\tif err != nil || item.Hash != hash { return err, nil }\n\n\treturn nil, &item\n}", "title": "" }, { "docid": "20959ac9f6ee6b3824f69cd671f27aea", "score": "0.45713878", "text": "func readCredentials() (string, error) {\n\n\tusr, err := user.Current()\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tdata, err := ioutil.ReadFile(filepath.Join(usr.HomeDir, awsCredentialsFile))\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn string(data), err\n}", "title": "" }, { "docid": "8dafb8a4a55afecc59a74b7885889a06", "score": "0.45710444", "text": "func GetUserJSON(file string) (*model.UserConfig, error) {\n\tbytes, err := ioutil.ReadFile(file)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal JSON contents to UserConfig\n\tvar uc model.UserConfig\n\terr = json.Unmarshal(bytes, &uc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &uc, nil\n}", "title": "" }, { "docid": "bacff5663eb7d4683d9ed897b03599d8", "score": "0.45529777", "text": "func (flag *AuthTeamFlags) formatFromFile() (atc.TeamAuth, error) {\n\n\tcontent, err := os.ReadFile(flag.Config.Path())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar data struct {\n\t\tRoles []map[string]interface{} `json:\"roles\"`\n\t}\n\tif err = yaml.Unmarshal(content, &data); err != nil {\n\t\treturn nil, err\n\t}\n\n\tauth := atc.TeamAuth{}\n\n\tfor _, role := range data.Roles {\n\t\troleName := role[\"name\"].(string)\n\n\t\tusers := []string{}\n\t\tgroups := []string{}\n\n\t\tfor _, connector := range connectors {\n\t\t\tconfig, ok := role[connector.ID()]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tteamConfig, err := connector.newTeamConfig()\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\terr = mapstructure.Decode(config, &teamConfig)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tfor _, user := range teamConfig.GetUsers() {\n\t\t\t\tif user != \"\" {\n\t\t\t\t\tusers = append(users, connector.ID()+\":\"+strings.ToLower(user))\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor _, group := range teamConfig.GetGroups() {\n\t\t\t\tif group != \"\" {\n\t\t\t\t\tgroups = append(groups, connector.ID()+\":\"+strings.ToLower(group))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif conf, ok := role[\"local\"].(map[string]interface{}); ok {\n\t\t\tfor _, user := range conf[\"users\"].([]interface{}) {\n\t\t\t\tif user != \"\" {\n\t\t\t\t\tusers = append(users, \"local:\"+strings.ToLower(user.(string)))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif len(users) == 0 && len(groups) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tauth[roleName] = map[string][]string{\n\t\t\t\"users\": users,\n\t\t\t\"groups\": groups,\n\t\t}\n\t}\n\n\tif err := auth.Validate(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn auth, nil\n}", "title": "" }, { "docid": "849d087ad402398ae0558cb0d08d985d", "score": "0.45516512", "text": "func getKeyFile() (key ssh.Signer, err error){\n usr, _ := user.Current()\n file := usr.HomeDir + \"/.ssh/id_rsa\"\n buf, err := ioutil.ReadFile(file)\n\n if err != nil {\n panic(err)\n }\n\n key, err = ssh.ParsePrivateKey(buf)\n if err != nil {\n return\n }\n return\n}", "title": "" }, { "docid": "394800c51abc4e9b990c3d7ba7e3ccc7", "score": "0.4550346", "text": "func (p *Password) Read() error {\n\t// Check if Title Provided\n\tif p.Title == \"\" {\n\t\treturn errors.New(\"p.Title field required in Password\")\n\t}\n\n\t// Reading file\n\tb, err := ioutil.ReadFile(path.Join(PassLoc, p.Title))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Extracting Password-File's data\n\tarr := bytes.Split(b, []byte(\"\\n\")) // arr - array of each-line-data in the file\n\n\tbPwStr := arr[0] // Password data (First line in the file)\n\tidxPwSp := bytes.IndexByte(bPwStr, byte(' ')) // Index of First \" \" - whitespace in First line (idxPwSp)\n\tp.Password = string(bPwStr[idxPwSp+1:]) // Setting pw.Password\n\n\tbFnStr := arr[1] // Filename data (Second line in the file)\n\tidxFnSp := bytes.IndexByte(bFnStr, byte(' ')) // Index of First \" \" - whitespace in Second line (bFnStr)\n\tp.FileName = string(bFnStr[idxFnSp+1:]) // Setting pw.Filename\n\n\treturn err\n}", "title": "" }, { "docid": "69d6e2bacd799aa24bb3f110e23fa1c3", "score": "0.45402628", "text": "func readUserConfig(path string) (user *User, err error) {\n\tfb, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tuser = &User{}\n\terr = json.Unmarshal(fb, user)\n\treturn\n}", "title": "" }, { "docid": "3433b653414668179b315607e762df09", "score": "0.45311117", "text": "func List(client client.Client) (users []User, err error) {\n\tclient.Logger.Debug(\"Retriving all users\")\n\n\tlines, err := utils.FileGetLines(\"/etc/passwd\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor _, line := range lines {\n\t\tvar user User\n\t\tparts := strings.Split(line, \":\")\n\t\tuser, err = Read(client, parts[0])\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tusers = append(users, user)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "668695e407a7c7e5b401f9d21140990f", "score": "0.45285273", "text": "func (db *Database) GetFileContent(id int) (obj.File, error) {\n\tvar f obj.File\n\n\tconn, err := sqlite3.Open(db.Path)\n\tdefer conn.Close()\n\tif err != nil {\n\t\treturn f, err\n\t}\n\n\trows, err := conn.Query(`\n\t\tSELECT filename, data, owner\n\t\tFROM files\n\t\tWHERE id=?`, id)\n\tif err != nil {\n\t\treturn f, err\n\t}\n\tvar data string\n\tvar user string\n\tvar name string\n\tvar revision int\n\trows.Scan(&name, &data, &user)\n\trows.Close()\n\n\trows, err = conn.Query(\n\t\t`SELECT max(rev_number)\n\t\tFROM revisions\n\t\tWHERE file = ?`, id)\n\trows.Scan(&revision)\n\trows.Close()\n\n\tf.Content = data\n\tf.Name = name\n\tf.User = user\n\tf.ID = id\n\tf.RevisionNumber = revision\n\n\treturn f, nil\n}", "title": "" }, { "docid": "cb8b6975eb5b15fac23f6ac2794677fe", "score": "0.45216978", "text": "func (a AuthEntry) User() string { return a.UserField }", "title": "" }, { "docid": "01017815f5fba3322791af395f4d1a94", "score": "0.45138434", "text": "func (b *Builder) LoadAuthConfig(rootPath string) error {\n\n\tusr, err := user.Current()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"%s\", err)\n\t}\n\n\tb.Privates = make(map[string]AuthConfig)\n\tb.rootPath = strings.Replace(rootPath, \"~\", usr.HomeDir, 1)\n\n\tconfFile := path.Join(b.rootPath, CONFIGFILE)\n\tif _, err := os.Stat(confFile); err != nil {\n\t\treturn nil //missing file is not an error\n\t}\n\n\tc, err := ioutil.ReadFile(confFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := json.Unmarshal(c, &b.Privates); err != nil {\n\n\t\tarr := strings.Split(string(c), \"\\n\")\n\t\tif len(arr) < 2 {\n\t\t\treturn fmt.Errorf(\"The Auth config file is empty\")\n\t\t}\n\n\t\tauthConfig := AuthConfig{}\n\t\torigAuth := strings.Split(arr[0], \" = \")\n\n\t\tauthConfig.Username, authConfig.Password, err = decodeAuth(origAuth[1])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tauthConfig.ServerAddress = IndexServerAddress()\n\t\tb.Privates[IndexServerAddress()] = authConfig\n\t} else {\n\n\t\tfor k, authConfig := range b.Privates {\n\t\t\tauthConfig.Username, authConfig.Password, err = decodeAuth(authConfig.Auth)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tauthConfig.Auth = \"\"\n\t\t\tclean := strings.Replace(k, \"http://\", \"\", 1)\n\t\t\tclean = strings.Replace(clean, \"https://\", \"\", 1)\n\t\t\tb.Privates[clean] = authConfig\n\t\t\tauthConfig.ServerAddress = k\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "86f8b103a6f7e1472fc0215931753620", "score": "0.45108026", "text": "func UpdateAuthDetails(filepath string) error {\n\tmctlCfg, err := config.GetMesheryCtl(viper.GetViper())\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"error processing config\")\n\t}\n\n\t// TODO: get this from the global config\n\treq, err := http.NewRequest(\"GET\", mctlCfg.GetBaseMesheryURL()+\"/api/user/token\", bytes.NewBuffer([]byte(\"\")))\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"error Creating the request :\")\n\t\treturn err\n\t}\n\tif err := AddAuthDetails(req, filepath); err != nil {\n\t\treturn err\n\t}\n\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tdefer SafeClose(resp.Body)\n\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"error dispatching there request :\")\n\t\treturn err\n\t}\n\n\tdata, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"error reading body :\")\n\t\treturn err\n\t}\n\n\tif ContentTypeIsHTML(resp) {\n\t\treturn errors.New(\"invalid body\")\n\t}\n\n\treturn ioutil.WriteFile(filepath, data, os.ModePerm)\n}", "title": "" }, { "docid": "78bacbfaa2ea9bdf0146f6f86af35432", "score": "0.45077306", "text": "func NewAuthConfigurationsFromFile(path string) (*AuthConfigurations, error) {\n\tr, err := os.Open(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn NewAuthConfigurations(r)\n}", "title": "" }, { "docid": "7e2e99a21feb18a12176527a687d7e04", "score": "0.45040154", "text": "func Auth() error {\n\tcredPath := \"googleDriveCredentials.json\"\n\tb, err := ioutil.ReadFile(credPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// If modifying these scopes, delete your previously saved token.json.\n\tconfig, err := google.ConfigFromJSON(b, drive.DriveFileScope)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttok, err := getTokenFromWeb(config)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsaveToken(\"googleDriveToken.json\", tok)\n\n\treturn nil\n}", "title": "" }, { "docid": "0010a60fad4dbe8bfdc0eea996252065", "score": "0.45005393", "text": "func GetUsersFromFile(usersCsv *os.File) ([]User, error) {\n\treader := csv.NewReader(bufio.NewReader(usersCsv))\n\tvar users []User\n\n\tfor {\n\t\tline, err := reader.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Problem reading line with error %v\", err)\n\t\t}\n\t\tif len(line) != 2 {\n\t\t\tlog.Fatalf(\"Encountered CSV entry with invalid number of columns\")\n\t\t}\n\t\tusers = append(users, User{Name: line[0], HashedPassword: line[1]})\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "5ea4a31e2a819a01507fcf2384d6d30e", "score": "0.44994956", "text": "func Read(filename, passphrase string) (passmgr.Store, error) {\n\tcontent, err := readSecretFile(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !bytes.HasPrefix(content, magicnumberV1) {\n\t\treturn nil, fmt.Errorf(\"unknown file type\")\n\t}\n\tmagicnumberLen := len(magicnumberV1)\n\n\tcontent = content[magicnumberLen:]\n\tsalt := content[:saltLenV1]\n\tkey, err := deriveKey([]byte(passphrase), salt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcipher, err := newGCM(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(content) == saltLenV1 {\n\t\treturn &fileStore{aesCipher: cipher, filename: filename, salt: salt}, nil\n\t}\n\n\tciphertext := content[saltLenV1:]\n\tplaintext, err := cipher.Decrypt(ciphertext)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsubjects, err := unmarshalStore(plaintext)\n\ts := &fileStore{aesCipher: cipher, filename: filename, salt: salt, subjects: subjects}\n\treturn s, err\n}", "title": "" }, { "docid": "7f224e444f29a31e38c62d7b8bd3c178", "score": "0.44993794", "text": "func (userdata *User) LoadFile(filename string) (data []byte, err error) {\n\n\trawDataNode, err := userdata.loadDataNode(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar dataNode DataNode\n\terr = json.Unmarshal(rawDataNode, &dataNode)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// fetching FileInfo\n\tencryptedStuff, ok := helpers.DatastoreGet(dataNode.ID.String())\n\tif !ok {\n\t\treturn nil, errors.New(\"Fileinfo not found\")\n\t}\n\tIDBytes, _ := json.Marshal(dataNode.ID)\n\tstuff, err := decryptBlob(encryptedStuff, dataNode.EncryptionKey, dataNode.MacKey, IDBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar info FileInfo\n\terr = json.Unmarshal(stuff, &info)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar ans []byte\n\tfor _, v := range info.FileIDs {\n\t\tfile, ok := helpers.DatastoreGet(v.String())\n\t\tif !ok {\n\t\t\treturn nil, errors.New(\"File not found\")\n\t\t}\n\t\tidBytes, _ := json.Marshal(v)\n\t\traw, err := decryptBlob(file, info.EncryptionKey, info.MacKey, idBytes)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tans = append(ans, raw...)\n\t}\n\treturn ans, nil\n}", "title": "" }, { "docid": "22d30b09ee1491360bd7541566b759a9", "score": "0.44985896", "text": "func readDb(path string) (map[string]struct{}, error) {\n\tfile, err := os.Open(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer file.Close()\n\n\t// var lines []string\n\tdb := map[string]struct{}{}\n\n\tscanner := bufio.NewScanner(file)\n\tfor scanner.Scan() {\n\t\ts := scanner.Text()\n\t\t// fmt.Println(\"line: \", s)\n\t\tx := strings.Split(s, string('\\t'))\n\t\t// fmt.Println(\"slice: \", x[1])\n\t\tif len(x) != 2 {\n\t\t\tpanic(\"wrong db format\")\n\t\t}\n\t\ts = strings.TrimSpace(x[1])\n\t\tif s == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\t// lines = append(lines, s)\n\t\tdb[s] = struct{}{}\n\t}\n\treturn db, scanner.Err()\n}", "title": "" }, { "docid": "9cf99d18dc55cf2d39f5ba2f465f14c0", "score": "0.44918793", "text": "func (c *AuthCnfg) GetAuth() (string, int64, error) { return GetAuth(c) }", "title": "" }, { "docid": "b19f7446e730beda79f7c2983dbf07f3", "score": "0.449172", "text": "func GetFileMetaDB(filesha1 string) (FileMeta, error) {\n\tfileMeta := FileMeta{}\n\ttfile, err := mydb.GetFileMeta(filesha1)\n\tif err != nil || tfile == nil {\n\t\treturn fileMeta, err\n\t}\n\n\tfileMeta.FileSha1 = tfile.FileHash\n\tfileMeta.FileName = tfile.FileName.String\n\tfileMeta.FileSize = tfile.FileSize.Int64\n\tfileMeta.FileAddr = tfile.FileAddr.String\n\n\treturn fileMeta, nil\n}", "title": "" }, { "docid": "b80668a6aaea9eb5b1f7891faaf2c560", "score": "0.4488541", "text": "func (*AuthUserInfo) Descriptor() ([]byte, []int) {\n\treturn file_auth_user_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "363c4f92b2329e2fcda19fa9c564d574", "score": "0.44787657", "text": "func (u *User) LoadCredentials(fn string) *User {\n\t// if credentials file exists\n\tif _, err := os.Stat(fn); err == nil {\n\t\tfmt.Printf(\"Loading user credentials from '%s' file...\\n\", fn)\n\t\tyamlFile, err := ioutil.ReadFile(fn)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"LoadCredentials error #%v \", err)\n\t\t\tos.Exit(1)\n\t\t}\n\t\terr = yaml.Unmarshal(yamlFile, u)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Unmarshal: %v\", err)\n\t\t}\n\n\t}\n\n\tif _, err := os.Stat(fn); os.IsNotExist(err) {\n\t\tfmt.Println(\"Looking for user credentials in the environment variables 'NUX_USERNAME', 'NUX_PASSWORD'...\")\n\t\tif os.Getenv(\"NUX_USERNAME\") == \"\" || os.Getenv(\"NUX_PASSWORD\") == \"\" {\n\t\t\tlog.Fatalf(\"Failed to find credentials file by the default path '%s' and in the environment variables 'NUX_USERNAME', 'NUX_PASSWORD'\", fn)\n\t\t}\n\t\tu.Username, u.Password = os.Getenv(\"NUX_USERNAME\"), os.Getenv(\"NUX_PASSWORD\")\n\t}\n\treturn u\n}", "title": "" }, { "docid": "f74798f3f86e8f318dfb5474c7f83cc2", "score": "0.44744328", "text": "func authUser() {\r\n\taccessToken, err := minecraft.Authenticate(\r\n\t\tos.Getenv(\"MC_USERNAME\"),\r\n\t\tos.Getenv(\"MC_PASSWORD\"),\r\n\t)\r\n\r\n\tCheck(err)\r\n\r\n\tfmt.Print(accessToken)\r\n}", "title": "" }, { "docid": "edb8916b0d57be56bc1fb36dbc30ddd3", "score": "0.44702917", "text": "func (o *ToolOptions) GetAuthenticationDatabase() string {\n\tif o.Source != \"\" {\n\t\treturn o.Source\n\t} else if o.DB != \"\" {\n\t\treturn o.DB\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "7d79f13e0173f331c2259f3a5eab56fc", "score": "0.44684815", "text": "func (m *FileUserModel) GetAll() ([]model.User, error) {\n\tusers, err := readFileToSlice(m.Filepath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "44d50027dc474cd5893def467198c3c0", "score": "0.44300452", "text": "func (*User) Descriptor() ([]byte, []int) {\n\treturn file_auth_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "f444ae0f484d2ab2338816767726f35a", "score": "0.44241485", "text": "func (config *ConnConfig) getAuth() (username, passphrase string, err error) {\n\treturn config.User, config.Pass, nil\n}", "title": "" }, { "docid": "f00783c9a9a78c829e457f56a50155b2", "score": "0.44115445", "text": "func (u *User) GetPassword() (string, error) {\n\tshadowFile, err := os.Open(\"/etc/shadow\")\n\tpasswd := \"\"\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"Failed to open shadow file\")\n\t\treturn \"\", err\n\t}\n\tscanner := bufio.NewScanner(shadowFile)\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\tif strings.HasPrefix(line, u.Name) {\n\t\t\t// Facts.Distro.Version = fmt.Sprint(strings.Split(line, \"=\")[1])\n\t\t\tuserLine := strings.Split(line, \":\")\n\t\t\tpasswd = userLine[1]\n\t\t}\n\t}\n\tif err = scanner.Err(); err != nil {\n\t\tlog.Error().Err(err).Msg(\"failed to find user in shadow file\")\n\t\treturn \"\", err\n\t}\n\n\treturn passwd, nil\n}", "title": "" }, { "docid": "84f0a6d032d76d94fd060530a43f4e6f", "score": "0.44018447", "text": "func (o *Files) readAcls() (int, error) {\n\tlinesCount := 0\n\tcurrentUser := \"\"\n\tuserExists := false\n\n\tfile, err := os.Open(o.AclPath)\n\tif err != nil {\n\t\treturn linesCount, errors.Errorf(\"Files backend error: couldn't open acl file: %s\", err)\n\t}\n\tdefer file.Close()\n\tscanner := bufio.NewScanner(file)\n\tscanner.Split(bufio.ScanLines)\n\n\tindex := 0\n\n\tfor scanner.Scan() {\n\t\tindex++\n\n\t\tif checkCommentOrEmpty(scanner.Text()) {\n\t\t\tcontinue\n\t\t}\n\n\t\tline := strings.TrimSpace(scanner.Text())\n\n\t\tlineArr := strings.Fields(line)\n\t\tprefix := lineArr[0]\n\n\t\tif prefix == \"user\" {\n\t\t\t// Since there may be more than one consecutive space in the username, we have to remove the prefix and trim to get the username.\n\t\t\tusername, err := removeAndTrim(prefix, line, index)\n\t\t\tif err != nil {\n\t\t\t\treturn 0, err\n\t\t\t}\n\n\t\t\t_, ok := o.Users[username]\n\n\t\t\tif !ok {\n\t\t\t\tlog.Warnf(\"user %s doesn't exist, skipping acls\", username)\n\t\t\t\t// Flag username to skip topics later.\n\t\t\t\tuserExists = false\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tuserExists = true\n\t\t\tcurrentUser = username\n\t\t} else if prefix == \"topic\" || prefix == \"pattern\" {\n\t\t\tvar aclRecord = AclRecord{\n\t\t\t\tTopic: \"\",\n\t\t\t\tAcc: MOSQ_ACL_NONE,\n\t\t\t}\n\n\t\t\t/*\tIf len is 2, then we assume ReadWrite privileges.\n\n\t\t\t\tNotice that Mosquitto docs prevent whitespaces in the topic when there's no explicit access given:\n\t\t\t\t\t\"The access type is controlled using \"read\", \"write\", \"readwrite\" or \"deny\". This parameter is optional (unless <topic> includes a space character)\"\n\t\t\t\t\thttps://mosquitto.org/man/mosquitto-conf-5.html\n\t\t\t\tWhen access is given, then the topic may contain whitespaces.\n\n\t\t\t\tNevertheless, there may be white spaces between topic/pattern and the permission or the topic itself.\n\t\t\t\tFields captures the case in which there's only topic/pattern and the given topic because it trims extra spaces between them.\n\t\t\t*/\n\t\t\tif len(lineArr) == 2 {\n\t\t\t\taclRecord.Topic = lineArr[1]\n\t\t\t\taclRecord.Acc = MOSQ_ACL_READWRITE\n\t\t\t} else {\n\t\t\t\t// There may be more than one space between topic/pattern and the permission, as well as between the latter and the topic itself.\n\t\t\t\t// Hence, we remove the prefix, trim the line and split on white space to get the permission.\n\t\t\t\tline, err = removeAndTrim(prefix, line, index)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\n\t\t\t\tlineArr = strings.Split(line, \" \")\n\t\t\t\tpermission := lineArr[0]\n\n\t\t\t\t// Again, there may be more than one space between the permission and the topic, so we'll trim what's left after removing it and that'll be the topic.\n\t\t\t\ttopic, err := removeAndTrim(permission, line, index)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\n\t\t\t\tswitch permission {\n\t\t\t\tcase read, write, readwrite, subscribe, deny:\n\t\t\t\t\taclRecord.Acc = permissions[permission]\n\t\t\t\tdefault:\n\t\t\t\t\treturn 0, errors.Errorf(\"Files backend error: wrong acl format at line %d\", index)\n\t\t\t\t}\n\n\t\t\t\taclRecord.Topic = topic\n\t\t\t}\n\n\t\t\tif prefix == \"topic\" {\n\t\t\t\tif currentUser != \"\" {\n\t\t\t\t\t// Skip topic when user was not found.\n\t\t\t\t\tif !userExists {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\tfUser, ok := o.Users[currentUser]\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\treturn 0, errors.Errorf(\"Files backend error: user does not exist for acl at line %d\", index)\n\t\t\t\t\t}\n\t\t\t\t\tfUser.AclRecords = append(fUser.AclRecords, aclRecord)\n\t\t\t\t} else {\n\t\t\t\t\to.AclRecords = append(o.AclRecords, aclRecord)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\to.AclRecords = append(o.AclRecords, aclRecord)\n\t\t\t}\n\n\t\t\tlinesCount++\n\n\t\t} else {\n\t\t\treturn 0, errors.Errorf(\"Files backend error: wrong acl format at line %d\", index)\n\t\t}\n\t}\n\n\treturn linesCount, nil\n}", "title": "" }, { "docid": "a400c6352f5cfc4dc9051b2de3b3140c", "score": "0.43923846", "text": "func GenKeyfileContent() (string, error) {\n\tb := make([]byte, keyfileRandBytes)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn base64.StdEncoding.EncodeToString(b), nil\n}", "title": "" }, { "docid": "2e41f2c4f5dda32d4f112e6d306afab1", "score": "0.43912414", "text": "func b64UserCredsParse() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\t// ++++++++++++++++++\n\t\t// Capturing the user account credentials encoded b64 format from\n\t\tvar email, passwd string\n\t\terr := readAuthHeader(c, \"Basic\", func(val string) error {\n\t\t\tv, err := b64.StdEncoding.DecodeString(val)\n\t\t\tif err != nil {\n\t\t\t\treturn ex.NewErr(&ex.ErrInvalid{}, err, \"Error reading the encrypted credentials\", \"b64UserCredsParse/readAuthHeader\")\n\t\t\t}\n\t\t\tlump := strings.Split(string(v), \":\")\n\t\t\temail = lump[0]\n\t\t\tpasswd = lump[1]\n\t\t\treturn nil\n\t\t})\n\t\tif ex.DigestErr(err, c) != 0 {\n\t\t\treturn\n\t\t}\n\t\tif email == \"\" || passwd == \"\" {\n\t\t\t// ++++++++++ incase the readAuthHeader read out empty creds\n\t\t\tex.DigestErr(ex.NewErr(&ex.ErrLogin{}, err, \"Invalid credentials in the request authorization\", \"b64UserCredsParse/readAuthHeader\"), c)\n\t\t\treturn\n\t\t}\n\t\t// ++++++++++++ user email and password are all set and ready to go\n\t\tc.Set(\"email\", email)\n\t\tc.Set(\"passwd\", passwd)\n\t\tlog.Infof(\"Email %s Passwd %s\", email, passwd)\n\t}\n}", "title": "" }, { "docid": "393587d486d26c8fa6b1c7da212520d4", "score": "0.4390032", "text": "func (userdata *User) ReceiveFile(filename string, sender string, msgid string) error {\n\t//@aak missing RSAverify and RSASign\n\tvar receive []byte\n\tvar part1 string\n\tvar part2 string\n\tpart1 = msgid[0:256]\n\tpart2 = msgid[256:]\n\t//fmt.Print(\"\\nSEND_PART1 :\", part1)\n\t//fmt.Print(\"\\nENC_MSG_PART2 :\", part2)\n\tsendPub, ok := userlib.KeystoreGet(sender)\n\tif !ok {\n\t\treturn errors.New(\"Recepient doesn't exist or something went wrong\")\n\t}\n\ter := userlib.RSAVerify(&sendPub, []byte(part2), []byte(part1))\n\tif er != nil {\n\t\treturn er\n\t}\n\treceive, er = userlib.RSADecrypt(&userdata.PrivateKey, []byte(part2), nil)\n\tif er != nil {\n\t\treturn er\n\t}\n\t//fmt.Print(\"\\nUUID RECV: \", string(receive))\n\tfileInfo := new(FileInfo)\n\tfileInfo.FileUUID = string(receive)\n\tfileInfo.FileName = (userdata.Username + filename)\n\tuserdata.AccessibleFiles = append(userdata.AccessibleFiles, *fileInfo)\n\n\tu := new(UserSalt)\n\tval1, ok := userlib.DatastoreGet(userdata.Username + userdata.Password)\n\tif !ok {\n\t\treturn errors.New(\"Something went wrong\")\n\t}\n\tjson.Unmarshal(val1, &u)\n\tsalt := u.Salt\n\thashedPassword := userlib.Argon2Key([]byte(userdata.Password), salt, 256)\n\tval2, _ := json.Marshal(userdata)\n\tuserlib.DatastoreSet(string(hashedPassword), val2)\n\n\tu.Hmac = applyHMAC(salt, val2)\n\tval3, _ := json.Marshal(u)\n\tuserlib.DatastoreSet(userdata.Username+userdata.Password, val3)\n\n\treturn nil\n}", "title": "" }, { "docid": "88330e5937ba486f94bd01e4ad2105b7", "score": "0.4381842", "text": "func (c *fileCredentialCache) Load() (*CacheableCredentials, error) {\n\tcred := &CacheableCredentials{Expiration: aws.Time(time.Now())}\n\n\tdata, err := ioutil.ReadFile(c.path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := json.Unmarshal(data, cred); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn cred, nil\n}", "title": "" }, { "docid": "dde370f94301bccf03c4aa9c75e0ff2b", "score": "0.43812627", "text": "func LoadAuthenticationFromJSON(filename string) (Authentication, error) {\n\n\t// define a slice of users & fill it from a JSON file\n\tvar users []User\n\tencoded, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if err = json.Unmarshal(encoded, &users); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// cast the slice of users into an Authentication implementation\n\treturn UsersAuthentication(users), nil\n}", "title": "" }, { "docid": "005a9b8f1d7f0810ddab0a1fd662557b", "score": "0.43807897", "text": "func (*User) Descriptor() ([]byte, []int) {\n\treturn file_auth_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "d10d7887e241e7497262659e6cddcbb3", "score": "0.4380042", "text": "func Xsqlite3AuthRead(tls *libc.TLS, pParse uintptr, pExpr uintptr, pSchema uintptr, pTabList uintptr) {\n\tvar pTab uintptr = uintptr(0)\n\tvar zCol uintptr\n\tvar iSrc int32\n\tvar iDb int32\n\tvar iCol int32\n\n\tiDb = Xsqlite3SchemaToIndex(tls, (*Parse)(unsafe.Pointer(pParse)).Fdb, pSchema)\n\tif iDb < 0 {\n\t\treturn\n\t}\n\n\tif int32((*Expr)(unsafe.Pointer(pExpr)).Fop) == TK_TRIGGER {\n\t\tpTab = (*Parse)(unsafe.Pointer(pParse)).FpTriggerTab\n\t} else {\n\t\tfor iSrc = 0; iSrc < (*SrcList)(unsafe.Pointer(pTabList)).FnSrc; iSrc++ {\n\t\t\tif (*Expr)(unsafe.Pointer(pExpr)).FiTable == (*SrcItem)(unsafe.Pointer(pTabList+8+uintptr(iSrc)*104)).FiCursor {\n\t\t\t\tpTab = (*SrcItem)(unsafe.Pointer(pTabList + 8 + uintptr(iSrc)*104)).FpTab\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\tiCol = int32((*Expr)(unsafe.Pointer(pExpr)).FiColumn)\n\tif pTab == uintptr(0) {\n\t\treturn\n\t}\n\n\tif iCol >= 0 {\n\t\tzCol = (*Column)(unsafe.Pointer((*Table)(unsafe.Pointer(pTab)).FaCol + uintptr(iCol)*24)).FzCnName\n\t} else if int32((*Table)(unsafe.Pointer(pTab)).FiPKey) >= 0 {\n\t\tzCol = (*Column)(unsafe.Pointer((*Table)(unsafe.Pointer(pTab)).FaCol + uintptr((*Table)(unsafe.Pointer(pTab)).FiPKey)*24)).FzCnName\n\t} else {\n\t\tzCol = ts + 7617\n\t}\n\n\tif SQLITE_IGNORE == Xsqlite3AuthReadCol(tls, pParse, (*Table)(unsafe.Pointer(pTab)).FzName, zCol, iDb) {\n\t\t(*Expr)(unsafe.Pointer(pExpr)).Fop = U8(TK_NULL)\n\t}\n}", "title": "" }, { "docid": "bc09e201611fcc619dee54fc81d79897", "score": "0.4379124", "text": "func CredentialsCleanerFile(filePath string) ([]byte, error) {\n\tfile, err := os.Open(filePath)\n\tdefer file.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn credentialsCleaner(file)\n}", "title": "" }, { "docid": "489430dde19c60764fa5f815be87d777", "score": "0.43771607", "text": "func (c *Client) LoginFromFile(filename string) error {\n\tfileDump, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttype fileCredentials struct {\n\t\tEmail string `json:\"email\"`\n\t\tPassword string `json:\"password\"`\n\t}\n\n\tvar creds = fileCredentials{}\n\tif err := json.Unmarshal(fileDump, &creds); err != nil {\n\t\treturn err\n\t}\n\n\treturn c.Login(creds.Email, creds.Password)\n}", "title": "" } ]
3d8fbba541a22ca299a6aacb64ae4cdc
Get fetches the CRD.
[ { "docid": "4343aca98bb6cd3d7ed0f040474ac421", "score": "0.0", "text": "func (m *APIInfrastructureClient) Get(ctx context.Context, definer Definer) (*v1beta1.CustomResourceDefinition, error) {\n\tcrd := &v1beta1.CustomResourceDefinition{}\n\treturn crd, m.client.Get(ctx, types.NamespacedName{Name: definer.GetName()}, crd)\n}", "title": "" } ]
[ { "docid": "745b6daea001d8b86b81c5a47fc1f958", "score": "0.6760414", "text": "func GetCRD(group, version, kind string) (*apiextensions.CustomResourceDefinition, error) {\n\tcrds, err := LoadCRDs()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error loading CRDs: %v\", err)\n\t}\n\treturn getMatchingCRD(group, version, kind, crds)\n}", "title": "" }, { "docid": "ca6b6c3ae21b20bea91f9e575a3276b7", "score": "0.64873624", "text": "func (l *CrdLoader) GetCRD(group, version, kind string) (*apiextensions.CustomResourceDefinition, error) {\n\tif kind == \"\" {\n\t\treturn nil, fmt.Errorf(\"invalid argument: 'kind' must contain a value\")\n\t}\n\tif group == \"\" || version == \"\" {\n\t\treturn l.getCRDViaList(group, version, kind)\n\t}\n\treturn l.getCRDViaGet(group, version, kind)\n}", "title": "" }, { "docid": "44ecef42b49e4cf6645ff52c848b6716", "score": "0.62886345", "text": "func (c *CachingClusterReader) Get(ctx context.Context, key client.ObjectKey, obj *unstructured.Unstructured) error {\n\treturn c.Cr.Get(ctx, key, obj)\n}", "title": "" }, { "docid": "8d2a9fe5d4ed63ba24e7e8dedf85b9c2", "score": "0.6118625", "text": "func (c *Copro) Get(db *sql.DB) (err error) {\n\terr = db.QueryRow(`SELECT co.id,co.reference,co.name,co.address,co.zip_code,\n\tci.name,co.label_date,co.budget FROM copro co\n\tLEFT OUTER JOIN city ci ON co.zip_code=ci.insee_code\n\tWHERE id = $1`, c.ID).Scan(&c.ID, &c.Reference, &c.Name, &c.Address,\n\t\t&c.ZipCode, &c.CityName, &c.LabelDate, &c.Budget)\n\treturn err\n}", "title": "" }, { "docid": "67258d75bdc0df29bf0d4284352fcb9a", "score": "0.6065779", "text": "func (rs *CResultSet) Get() (*C, error) {\n\treturn rs.last, rs.lastErr\n}", "title": "" }, { "docid": "ed360bc1a9c638a6af9e79a133d74b06", "score": "0.6048743", "text": "func (k *k8sops) GetCRD(name string) (*apiextensionsv1beta1.CustomResourceDefinition, error) {\n\tcrd, err := k.kubeExt.ApiextensionsV1beta1().CustomResourceDefinitions().Get(name, metav1.GetOptions{})\n\tif err != nil {\n\t\tk.logger.Error(\"could not get CRD\", zap.Error(err))\n\t\treturn nil, err\n\t}\n\treturn crd, nil\n}", "title": "" }, { "docid": "548ccd7d73124e79f3a990a9dd4c14d4", "score": "0.5951522", "text": "func (g *Getter) Get() (*io.ReadCloser, error) {\n\tresp, err := http.Get(g.url)\n\tif err != nil {\n\t\treturn nil, err\n\t} else {\n\t\treturn (&resp.Body), err\n\t}\n}", "title": "" }, { "docid": "6d12fa6d878313072373829dca252e27", "score": "0.5893356", "text": "func (i *ClanService) Get() (Clan, error) {\n\tpath := \"/v1/clans/%s\"\n\turl := fmt.Sprintf(path, NormaliseTag(i.tag))\n\treq, err := i.c.NewRequest(\"GET\", url, nil)\n\tvar clan Clan\n\n\tif err == nil {\n\t\t_, err = i.c.Do(req, &clan, path)\n\t}\n\n\treturn clan, err\n}", "title": "" }, { "docid": "325622c79064cfb689281498b74517dd", "score": "0.587958", "text": "func (c *client) Get(path string) (*http.Response, error) {\n\treq := c.cfClient.NewRequest(\"GET\", path)\n\treturn c.cfClient.DoRequest(req)\n}", "title": "" }, { "docid": "f47322eea91cad0820808f936d88f597", "score": "0.5872605", "text": "func (c *cRD2s) Get(name string, options v1.GetOptions) (result *v1alpha1.CRD2, err error) {\n\tresult = &v1alpha1.CRD2{}\n\terr = c.client.Get().\n\t\tNamespace(c.ns).\n\t\tResource(\"crd2s\").\n\t\tName(name).\n\t\tVersionedParams(&options, scheme.ParameterCodec).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "title": "" }, { "docid": "97d057e83dff4c29577e5d9c5296e7df", "score": "0.5836375", "text": "func Get(client *gophercloud.ServiceClient, zoneID string, rrsetID string) (r GetResult) {\n\tresp, err := client.Get(rrsetURL(client, zoneID, rrsetID), &r.Body, nil)\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "title": "" }, { "docid": "d9c1ac0b40b41eaa16278a07062b8314", "score": "0.5825758", "text": "func (c *Client) Get() *actions.GetService {\n\treturn actions.NewGetService(c.conn)\n}", "title": "" }, { "docid": "f25c9eb6c8b4c95b51ea51119d1b404f", "score": "0.5806223", "text": "func (c *restClient) Get(\n\tbrokerSpec framework.ServiceBrokerSpec,\n\tquery url.Values,\n\tpathElts ...string,\n) (*http.Request, error) {\n\treq, err := http.NewRequest(\"GET\", c.urlStr(brokerSpec, pathElts...), nil)\n\tif err != nil {\n\t\tlogger.Debugf(\"CF Client GET error (%s)\", err)\n\t\treturn nil, err\n\t}\n\treq.URL.RawQuery = query.Encode()\n\tlogger.Debugf(\"CF client making GET request to %s\", req.URL.String())\n\treq.Header.Set(versionHeader, apiVersion)\n\treturn req, nil\n}", "title": "" }, { "docid": "35f422ba39331ff4d8023a9395e3c516", "score": "0.5805491", "text": "func (c *motorcycleClient) Get(uid runtime.UID) (*api.Motorcycle, error) {\n\tlog.Tracef(\"Client.Get; UID: %q, GVK: %v\", uid, c.gvk)\n\tobject, err := c.storage.Get(c.gvk, uid)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn object.(*api.Motorcycle), nil\n}", "title": "" }, { "docid": "d973751e61a84ccdb849d8fe85cd145b", "score": "0.5795977", "text": "func (s myCrdNamespaceLister) Get(name string) (*v1.MyCrd, error) {\n\tobj, exists, err := s.indexer.GetByKey(s.namespace + \"/\" + name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !exists {\n\t\treturn nil, errors.NewNotFound(v1.Resource(\"mycrd\"), name)\n\t}\n\treturn obj.(*v1.MyCrd), nil\n}", "title": "" }, { "docid": "43febc13d761d369b55fa5257448ec6f", "score": "0.57932204", "text": "func (r *R) Get() redis.Conn {\n\treturn r.pool.Get()\n}", "title": "" }, { "docid": "f69f93844084ff6d828dd547b59d8065", "score": "0.5773842", "text": "func Get(c *eclcloud.ServiceClient, id string) (r GetResult) {\n\t_, r.Err = c.Get(getURL(c, id), &r.Body, nil)\n\treturn\n}", "title": "" }, { "docid": "d098e25dcb1d54847313124695337816", "score": "0.57699734", "text": "func (c *RefClient) Get(ctx context.Context, id uuid.UUID) (*Ref, error) {\n\treturn c.Query().Where(ref.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "95c2b76dedb2663cf56026950c1d5803", "score": "0.5769669", "text": "func (r *redisService) Get(ctn *service.Container) (client *redisClient, err error) {\n\t// This functions means:\n\t// If ctn contains redisClient, return this redisClient\n\t// If ctn not contains redisClient, then execute r.New function, save the result to\n\t// container and return the result\n\tc, er := ctn.Get(&r.self)\n\tif er != nil {\n\t\treturn nil, er\n\t} else {\n\t\treturn c.(*redisClient), nil\n\t}\n}", "title": "" }, { "docid": "1cf97ce317a74e7b0921705eb90e9c0f", "score": "0.5753411", "text": "func (c *Crocker) Get(serverURL string) (*credentials.Credentials, error) {\n\treturn client.Get(c.Prog, serverURL)\n}", "title": "" }, { "docid": "534779525d60c427517a34ba0358da68", "score": "0.5730357", "text": "func (r *Recycler) Get() (net.Conn, error) {\n\tselect {\n\tcase c := <-r.buf:\n\t\treturn c, nil\n\tdefault:\n\t\treturn r.next()\n\t}\n}", "title": "" }, { "docid": "d2ef3f98b1f365b629ebaceb5caad0b8", "score": "0.57058036", "text": "func (p *Pool) Get() (redis.Client, error) {\n\tselect {\n\tcase conn := <-p.pool:\n\t\treturn conn, nil\n\tdefault:\n\t\treturn p.df(p.network, p.addr)\n\t}\n}", "title": "" }, { "docid": "ace9e100d4202e74385fc05a634987ca", "score": "0.5704478", "text": "func Get(crawlerID primitive.ObjectID) (*Crawler, error) {\n\tres := crawlerCol.FindOne(nil, bson.M{\"_id\": crawlerID}, options.FindOne())\n\tc := &Crawler{}\n\terr := res.Decode(c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c, nil\n}", "title": "" }, { "docid": "559b556294281224bfecaffdd6af3cd2", "score": "0.5704251", "text": "func (c *ClusterControllerCRD) Get(namespace, name string) *otev1.ClusterController {\n\tcc, err := c.client.OteV1().ClusterControllers(namespace).Get(name, metav1.GetOptions{})\n\tif err != nil {\n\t\tklog.Errorf(\"get clustercontroller(%s-%s) failed: %v\", namespace, name, err)\n\t\treturn nil\n\t}\n\treturn cc\n}", "title": "" }, { "docid": "dd08d8d96b1040550b7db15c350e4b8c", "score": "0.5703704", "text": "func (recycleBin *RecycleBin) Get() (RecycleBinResp, error) {\n\tclient := NewHTTPClient(recycleBin.client)\n\treturn client.Get(recycleBin.ToURL(), recycleBin.config)\n}", "title": "" }, { "docid": "136d4fc238f54670b2492870e657324b", "score": "0.5686193", "text": "func (r RConnect) Get(key string) (string, error) {\n\tvar value string\n\terr := radixClient.Do(radix.Cmd(&value, \"GET\", key))\n\tif err != nil {\n\t\treturn value, err\n\t}\n\tfmt.Println(\"Redis: The GET action has been successfully executed\")\n\treturn value, nil\n}", "title": "" }, { "docid": "c1ebb6b9ecb01f42c4537e6a45d9b2d1", "score": "0.56400657", "text": "func (to *Session) GetCRConfig(cdn string, opts RequestOptions) (tc.SnapshotResponse, toclientlib.ReqInf, error) {\n\turi := `/cdns/` + cdn + `/snapshot`\n\tvar resp tc.SnapshotResponse\n\treqInf, err := to.get(uri, opts, &resp)\n\treturn resp, reqInf, err\n}", "title": "" }, { "docid": "dc4052655e957ec3c62aeac30a000e70", "score": "0.5624836", "text": "func (c *FreshEnergyClient) Get() error {\n\t// get token if current is invalid\n\tif c.Token.AccessToken == \"\" || time.Now().Unix() > c.Token.ExpiresDate.Unix() {\n\t\terr := c.getToken()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// get next link\n\tvar next string\n\tif c.API.Links.Next.Href != \"\" {\n\t\t// have next link in current state\n\t\tnext = c.API.Links.Next.Href\n\t} else {\n\t\t// don't know where to start, start at t - 1h\n\t\tt := time.Now().UTC().Add(time.Hour * -1).Format(queryTimeFormat)\n\t\tnext = fmt.Sprintf(\"%s/users/%s/readings/%s\", energyAPI, c.Customer, t)\n\t}\n\n\t// build up query URL\n\tURL, err := url.Parse(next)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// add access token as value\n\tvalues := url.Values{}\n\tvalues.Add(\"access_token\", c.Token.AccessToken)\n\tURL.RawQuery = values.Encode()\n\n\t// build up request\n\treq, err := http.NewRequest(\"GET\", URL.String(), nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// we want to get json formatted response from API\n\treq.Header.Set(\"Accept\", \"application/json\")\n\n\t// do request\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// suck it all in\n\tcontent, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\tresp.Body.Close()\n\n\t// check status code\n\tif resp.StatusCode != 200 {\n\t\t// maybe we have a wrong access token or link, remove state and hope for the best\n\t\tc.API = FreshEnergyAPI{}\n\t\tc.Token = FreshEnergyToken{}\n\t\treturn fmt.Errorf(\"could not get data from api, got http status code different than 200: %d\", resp.StatusCode)\n\t}\n\n\t// unmatshal body to struct\n\treturn json.Unmarshal(content, &c.API)\n}", "title": "" }, { "docid": "849c884182431bcc911696c98febbd74", "score": "0.5623063", "text": "func (c *Client) Get(ctx context.Context, key string) ([]byte, error) {\n\tconn, err := c.pool.GetContext(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer conn.Close()\n\n\tb, err := redis.Bytes(conn.Do(\"GET\", key))\n\tif err == redis.ErrNil {\n\t\terr = ErrCacheMiss\n\t}\n\treturn b, err\n}", "title": "" }, { "docid": "d9556cbcc1ba3503e0e45581c18010c1", "score": "0.5618901", "text": "func (r *resource) Get(out interface{}) (err error) {\n\treturn r.Do(\"GET\", r.URL, nil, out)\n}", "title": "" }, { "docid": "6f99a7bef0ab7c60140bae3f5a4c0d5d", "score": "0.5617457", "text": "func GetCPULoad(ctx context.Context, cpuLoad *CPULoad, dataChannel chan *CPULoad, refreshRate uint64) error {\n\treturn utils.TickUntilDone(ctx, refreshRate, func() error {\n\t\terr := cpuLoad.UpdateCPULoad()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\treturn ctx.Err()\n\t\tcase dataChannel <- cpuLoad:\n\t\t\treturn nil\n\t\t}\n\t})\n}", "title": "" }, { "docid": "6a1a857218cc111239eb935504768156", "score": "0.5589265", "text": "func (r *RedisDriver) Get(cveID string) (*models.CveDetail, error) {\n\tctx := context.Background()\n\tvar cveResult, cpeResult *redis.StringStringMapCmd\n\tif cveResult = r.conn.HGetAll(ctx, hashKeyPrefix+cveID); cveResult.Err() != nil {\n\t\treturn nil, cveResult.Err()\n\t}\n\tif cpeResult = r.conn.HGetAll(ctx, cpeHashKeyPrefix+cveID); cpeResult.Err() != nil {\n\t\treturn nil, cpeResult.Err()\n\t}\n\treturn r.unmarshal(cveID, cveResult, cpeResult)\n}", "title": "" }, { "docid": "3d4e43eab105129d8ae977ab076c5783", "score": "0.5579393", "text": "func (b *Bucket) Get(ctx context.Context, c cid.Cid) (ipld.Node, error) {\n\treturn b.tmp.Get(ctx, c)\n}", "title": "" }, { "docid": "8824bee524335c7ab3d8ca941c50c7bd", "score": "0.55763525", "text": "func Get(options *types.Options, configuration *Configuration) (*fastdialer.Dialer, error) {\n\treturn normalClient, nil\n}", "title": "" }, { "docid": "70be6f4f64983a4112ffdd8db14c9961", "score": "0.55737466", "text": "func Get(client *eclcloud.ServiceClient, id string) (r GetResult) {\n\t_, r.Err = client.Get(getURL(client, id), &r.Body, nil)\n\treturn\n}", "title": "" }, { "docid": "70be6f4f64983a4112ffdd8db14c9961", "score": "0.55737466", "text": "func Get(client *eclcloud.ServiceClient, id string) (r GetResult) {\n\t_, r.Err = client.Get(getURL(client, id), &r.Body, nil)\n\treturn\n}", "title": "" }, { "docid": "3776ef18f33e62afc520cbcfaea63f6a", "score": "0.5572585", "text": "func (c *FactClient) Get(ctx context.Context, id string) (*Fact, error) {\n\treturn c.Query().Where(fact.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "81455f2d63867ddb487947cbdd858e53", "score": "0.55701923", "text": "func (c *ClinicalResultsClient) Get(ctx context.Context, id uuid.UUID) (*ClinicalResults, error) {\n\treturn c.Query().Where(clinicalresults.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "be3503effe886c8fba6ffaf4aa88626e", "score": "0.5565147", "text": "func (c *CiderClient) Get(key string) (value string, err error) {\n\tvalue, err = c.SendString(SprintfEscape(\"GET %v\", key))\n\treturn\n}", "title": "" }, { "docid": "dde33ff6c646739117d68dfbde83793a", "score": "0.5561812", "text": "func Get() *Client {\n\treturn client\n}", "title": "" }, { "docid": "023a97fff991a3b49d4b24109f00aab6", "score": "0.5550437", "text": "func (c *CassandraDBClient) Get(ctx context.Context, key string) (string, error) {\n\tvar res string\n\n\terr := c.session.Query(`SELECT value FROM cache WHERE key = ? LIMIT 1`, key).\n\t\tWithContext(ctx).\n\t\tConsistency(gocql.One).\n\t\tScan(&res)\n\n\treturn res, err\n}", "title": "" }, { "docid": "31708a04390551c6a1cb161f86f88a5d", "score": "0.55487686", "text": "func (ck *Clerk) Get(key string) string {\n\n\t// Your code here\n\n\tDPrintf(\"\\nClient got Get(%s)\", key)\n\n\t// Create args with a unique XID and tagged with current time\n\targs := new(GetArgs)\n\targs.Xid = strconv.Itoa(int(nrand()))\n\targs.Key = key\n\targs.SendTime = time.Now().UnixNano()\n\n\treply := new(GetReply)\n\tok := false\n\t// Keep trying to send message until it succeeds\n\tfor !(ok && (reply.Err == \"\")) {\n\t\ttempReply := new(GetReply)\n\t\tok = call(ck.primary, \"PBServer.Get\", args, &tempReply)\n\t\treply.Err = tempReply.Err\n\t\treply.Value = tempReply.Value\n\t\tDPrintf(\"\\n\\tok: %v, replyErr: <%s> %s\", ok, reply.Err, args.Xid)\n\t\tif !(ok && (reply.Err == \"\")) {\n\t\t\tview, _ := ck.vs.Ping(0)\n\t\t\tck.primary = view.Primary\n\t\t\ttime.Sleep(viewservice.PingInterval)\n\t\t\tDPrintf(\"\\n\\tResending Get(%s) to %s\", key, ck.primary)\n\t\t}\n\t}\n\tDPrintf(\"\\n\\tClient returning Get(%s) = %s\", key, reply.Value)\n\treturn reply.Value\n}", "title": "" }, { "docid": "ad8e79721f7333ab92d50dd9e43e20f2", "score": "0.5545409", "text": "func Get(c context.Context, name, uri string) (resp *http.Response, err error) {\n\tdone := make(chan *http.Response, 1)\n\tif reps, err := http.NewRequest(\"GET\", uri, nil); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\terrChan := hystrix.GoC(c, name, func(c context.Context) error {\n\t\t\tif resq, err := http.DefaultClient.Do(reps); err != nil {\n\t\t\t\treturn err\n\t\t\t} else {\n\t\t\t\tdone <- resq\n\t\t\t\treturn nil\n\t\t\t}\n\t\t},\n\t\t\tfunc(c context.Context, err error) error {\n\t\t\t\treturn nil\n\t\t\t})\n\n\t\tselect {\n\t\tcase err := <-errChan:\n\t\t\treturn nil, err\n\t\tcase resp := <-done:\n\t\t\treturn resp, nil\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "38b2c07a51d380b9054c2c06b542909b", "score": "0.5538403", "text": "func (s *Client) Get() error {\r\n\r\n\turl := s.hostname + \"/get\"\r\n\trequest, _ := http.NewRequest(\"GET\", url, nil)\r\n\tclient := &http.Client{}\r\n\r\n\tresponse, err := client.Do(request)\r\n\tif err != nil {\r\n\t\tfmt.Printf(\"The HTTP request failed with error %s\\n\", err)\r\n\t\treturn err\r\n\t} else {\r\n\t\tdata, _ := ioutil.ReadAll(response.Body)\r\n\t\tfmt.Println(\"HTTP Response Status:\", response.StatusCode)\r\n\t\tfmt.Println(\"HTTP Body:\")\r\n\t\tfmt.Println(string(data))\r\n\t}\r\n\treturn nil\r\n}", "title": "" }, { "docid": "343ece942eb80489a4f1224a1ea08d1b", "score": "0.55360746", "text": "func GET(key string) (val []byte, err error) {\n\tc, err := _pool.Get()\n\tif err != nil {\n\t\treturn\n\t}\n\tval, err = c.Cmd(\"GET\", key).Bytes()\n\t_pool.Put(c)\n\treturn\n}", "title": "" }, { "docid": "6726e48379cb7e0e2f0134280030614c", "score": "0.5533158", "text": "func Get(id string) (*stripe.BitcoinReceiver, error) {\n\treturn getC().Get(id)\n}", "title": "" }, { "docid": "940523902b001f3fb629427dfa9afa17", "score": "0.55278057", "text": "func (p *RedisConnPool) Get() (*RedisConn, error) {\n\tctx := context.TODO()\n\tr, err := p.ResourcePool.Get(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn r.(*RedisConn), nil\n}", "title": "" }, { "docid": "fefc6720e68fbce0cbea3d63dd155d6e", "score": "0.5526448", "text": "func (f *Refresher) Get() *DataFrame {\n\tf.mutex.Lock()\n\tdefer f.mutex.Unlock()\n\treturn f.df\n}", "title": "" }, { "docid": "fefc6720e68fbce0cbea3d63dd155d6e", "score": "0.5526448", "text": "func (f *Refresher) Get() *DataFrame {\n\tf.mutex.Lock()\n\tdefer f.mutex.Unlock()\n\treturn f.df\n}", "title": "" }, { "docid": "a974fac9fd49e94d1d91974da3f2010c", "score": "0.5525997", "text": "func Get(id string, params *stripe.DisputeParams) (*stripe.Dispute, error) {\n\treturn getC().Get(id, params)\n}", "title": "" }, { "docid": "8bcc5fab17047b381b7bbee4207f23bf", "score": "0.55231917", "text": "func (c *LowLevelClient) Fetch(ctx context.Context, cdnInfo ngdp.CDNInfo, cdnHash ngdp.CDNHash) (io.ReadCloser, error) {\n\tresp, err := c.get(ctx, cdnInfo, ngdp.ContentTypeData, cdnHash, \"\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn nil, errBadStatus{resp.StatusCode, resp.Status, http.StatusOK}\n\t}\n\n\tr := blte.NewReader(resp.Body)\n\treturn newWrappedCloser(r, resp.Body), nil\n}", "title": "" }, { "docid": "23d4542eabbbde879f48b924706258fb", "score": "0.5520028", "text": "func Get(client *eclcloud.ServiceClient, name string) (r GetResult) {\n\t_, r.Err = client.Get(getURL(client, name), &r.Body, nil)\n\treturn\n}", "title": "" }, { "docid": "62d1b7b344fbd426d30ff69002748135", "score": "0.5518733", "text": "func (c Client) Get(ctx context.Context, url string, result interface{}, opt ...RequestOption) error {\n\treturn c.request(ctx, url, \"GET\", nil, result, opt)\n}", "title": "" }, { "docid": "8aea714e302478672b8765d2ea85afde", "score": "0.55177844", "text": "func (ci *ReleasedCI) Get(kt *kit.Kit, bizID uint32, releaseID uint32) ([]*types.ReleaseCICache, error) {\n\tval, err := ci.client.GetIFPresent(releaseID)\n\tif err == nil {\n\t\tci.mc.hitCounter.With(prm.Labels{\"resource\": \"released_ci\", \"biz\": tools.Itoa(bizID)}).Inc()\n\n\t\t// hit from cache.\n\t\tmeta, yes := val.([]*types.ReleaseCICache)\n\t\tif !yes {\n\t\t\treturn nil, fmt.Errorf(\"unsupported released CI cache value type: %v\", reflect.TypeOf(val).String())\n\t\t}\n\t\treturn meta, nil\n\t}\n\n\tif err != gcache.KeyNotFoundError {\n\t\t// this is not a not found error, log it.\n\t\tlogs.Errorf(\"get biz: %d, release: %d CI cache from local cache failed, err: %v, rid: %s\", bizID, releaseID,\n\t\t\terr, kt.Rid)\n\t\t// do not return here, try to refresh cache for now.\n\t}\n\n\tstart := time.Now()\n\n\t// get the cache from cache service directly.\n\topt := &pbcs.GetReleasedCIReq{\n\t\tBizId: bizID,\n\t\tReleaseId: releaseID,\n\t}\n\n\tresp, err := ci.cs.CS().GetReleasedCI(kt.RpcCtx(), opt)\n\tif err != nil {\n\t\tci.mc.errCounter.With(prm.Labels{\"resource\": \"released_ci\", \"biz\": tools.Itoa(bizID)}).Inc()\n\t\treturn nil, err\n\t}\n\n\trci := make([]*types.ReleaseCICache, 0)\n\terr = jsoni.UnmarshalFromString(resp.JsonRaw, &rci)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(resp.JsonRaw) <= maxRCISizeKB {\n\t\t// only cache the released ci which is less than maxRCISizeKB\n\t\terr = ci.client.Set(releaseID, rci)\n\t\tif err != nil {\n\t\t\tlogs.Errorf(\"refresh biz: %d, release: %d CI cache failed, err: %v, rid: %s\", bizID, releaseID, err, kt.Rid)\n\t\t\t// do not return, ignore the error directly.\n\t\t}\n\t}\n\n\tci.mc.refreshLagMS.With(prm.Labels{\"resource\": \"released_ci\", \"biz\": tools.Itoa(bizID)}).Observe(\n\t\ttools.SinceMS(start))\n\n\treturn rci, nil\n}", "title": "" }, { "docid": "1bf030650a10da68101465faecd94af5", "score": "0.55067146", "text": "func (p *Pool) Get() (c *Client) {\nLOOP:\n\tfor c == nil {\n\t\tselect {\n\t\tcase item := <-p.free:\n\t\t\tif !item.IsValid() {\n\t\t\t\titem.Exit()\n\t\t\t\tlib.Debugf(\"Error in client, ignoring it\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tc = item\n\t\tdefault:\n\t\t\tbreak LOOP\n\t\t}\n\t}\n\n\tif c == nil {\n\t\tlib.Debugf(\"Pool: created new client\")\n\t\tc = NewClient(&p.config)\n\t}\n\treturn\n}", "title": "" }, { "docid": "cd88ed749313d7b744ac85faad476887", "score": "0.5504326", "text": "func (cc *CentralClient) get(target string) (io.ReadCloser, error) {\n\tif err := isValidTargetURL(cc.config.BaseURL, target); err != nil {\n\t\treturn nil, err\n\t}\n\tres, err := cc.httpClient.Get(target)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif res.StatusCode != http.StatusOK {\n\t\tdefer func() {\n\t\t\t_ = res.Body.Close()\n\t\t}()\n\t\tdata, _ := ioutil.ReadAll(res.Body)\n\t\treturn nil, fmt.Errorf(\"HTTP GET error: code=%d, status=%s, body=%s\", res.StatusCode, res.Status, string(data))\n\t}\n\treturn res.Body, nil\n}", "title": "" }, { "docid": "f3c4884bf219c49ba6ae6abd448bf7e6", "score": "0.5503057", "text": "func Get(c *gophercloud.ServiceClient, id string) (r GetResult) {\n\tresp, err := c.Get(resourceURL(c, id), &r.Body, nil)\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "title": "" }, { "docid": "64c5d46b4168341fbde09b444841a5c7", "score": "0.55003256", "text": "func (c *restClient) Fetch(ctx context.Context, path string, params string) ([]byte, error) {\n\tresp, err := c.Get(ctx, path, params)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close() //nolint\n\tif resp.StatusCode != 200 {\n\t\treturn nil, errors.New(resp.Status)\n\t}\n\tresponseData, err := io.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn responseData, err\n}", "title": "" }, { "docid": "bfc2d343328fb0cdc49328b4d76133e4", "score": "0.5497099", "text": "func Get(c *gophercloud.ServiceClient, id int) GetResult {\n\tvar res GetResult\n\n\t_, res.Err = perigee.Request(\"GET\", resourceURL(c, id), perigee.Options{\n\t\tMoreHeaders: c.AuthenticatedHeaders(),\n\t\tResults: &res.Body,\n\t\tOkCodes: []int{200},\n\t})\n\n\treturn res\n}", "title": "" }, { "docid": "f8584d1df9647f11ff4db3c5ac46cbce", "score": "0.5481075", "text": "func (c *Client) Get(path string) (string, error) {\n\treturn c.Do(\"GET\", path)\n}", "title": "" }, { "docid": "32432ad5f24334fa6eb48a0f806ba39d", "score": "0.5478593", "text": "func (c *ClientImpl) Get(namespace string, name string) (result runtime.Object, e error) {\n\tif c.Error != \"\" {\n\t\te = fmt.Errorf(c.Error)\n\t}\n\tresult = c.CustomResourceImpl\n\treturn\n}", "title": "" }, { "docid": "594e886512b9bbc5122db6ea7ed084d7", "score": "0.54769194", "text": "func (c *CardClient) Get(ctx context.Context, id int) (*Card, error) {\n\treturn c.Query().Where(card.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "f4b4693a6e825f59f8f6ef947506863b", "score": "0.5470112", "text": "func Get(c *cli.Context) error {\n\tfunction := GetMap.GetFunc(getResource(c))\n\treturn function(c)\n}", "title": "" }, { "docid": "6710ec998e301193e8502ab0b3bc9bb7", "score": "0.54696906", "text": "func Get(c *gophercloud.ServiceClient) GetResult {\n\tvar res GetResult\n\t_, res.Err = c.Request(\"GET\", getURL(c), gophercloud.RequestOpts{\n\t\tJSONResponse: &res.Body,\n\t\tOkCodes: []int{200},\n\t})\n\treturn res\n}", "title": "" }, { "docid": "1538e281772f980fb4640e2ee44c9605", "score": "0.54661477", "text": "func (c *clientImpl) Get(ctx context.Context, in *GetRequest, opts ...grpc.CallOption) (*Node, error) {\n\treturn c.client.Get(ctx, in, opts...)\n}", "title": "" }, { "docid": "75ced54df84c58502e60578f21151abe", "score": "0.5462737", "text": "func (l *RedisLedger) Get(key string) (string, error) {\n\tvar result string\n\tcmd := radix.Cmd(result, \"GET\", key)\n\n\tif err := l.pool.Do(cmd); err != nil {\n\t\tlog.Printf(\"ERROR: call GET - %s\", err)\n\t\treturn \"\", err\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "c51702efc8190da11935e10f6a4361be", "score": "0.5461092", "text": "func (f *circuitBreakerEndDeviceFetcher) Get(ctx context.Context, ids ttnpb.EndDeviceIdentifiers, fieldMaskPaths ...string) (*ttnpb.EndDevice, error) {\n\tif err := f.circuitOpen(); err != nil {\n\t\treturn nil, err\n\t}\n\tdev, err := f.fetcher.Get(ctx, ids, fieldMaskPaths...)\n\tf.observeError(ctx, err)\n\treturn dev, err\n}", "title": "" }, { "docid": "ed7704d32aa78b8a44a1afb77d614198", "score": "0.54585654", "text": "func (cm *ClientManager) Get(target string) *grpc.ClientConn {\n\tcm.connectionsMu.Lock()\n\tdefer cm.connectionsMu.Unlock()\n\n\tif _, exists := cm.connections[target]; !exists {\n\t\treturn nil\n\t}\n\n\tcm.connections[target].refCount++\n\treturn cm.connections[target].gc\n}", "title": "" }, { "docid": "e3a16060db0af03dfcc62e23bf9a1fc3", "score": "0.5454588", "text": "func (s *RedisClusterStore) Get(ctx context.Context, key any) (any, error) {\n\tobject, err := s.clusclient.Get(ctx, key.(string)).Result()\n\tif err == redis.Nil {\n\t\treturn nil, lib_store.NotFoundWithCause(err)\n\t}\n\treturn object, err\n}", "title": "" }, { "docid": "0a45b486c771e943c60284b2d27e086d", "score": "0.5452878", "text": "func (reb *Manager) getCT(si *cluster.Snode, obj *rebObject, slice *sliceGetResp) {\n\t// First, read metadata\n\tqMeta := url.Values{}\n\tqMeta = cmn.AddBckToQuery(qMeta, obj.bck)\n\tqMeta.Add(cmn.URLParamECMeta, \"true\")\n\tif glog.FastV(4, glog.SmoduleReb) {\n\t\tglog.Infof(\"Getting slice %d for %s via API\", slice.sliceID, obj.objName)\n\t}\n\tpath := cmn.URLPath(cmn.Version, cmn.Objects, obj.bck.Name, obj.objName)\n\turlPath := si.URL(cmn.NetworkIntraData) + path\n\n\tvar (\n\t\trq *http.Request\n\t\tresp *http.Response\n\t)\n\tif rq, slice.err = http.NewRequest(http.MethodHead, urlPath, nil); slice.err != nil {\n\t\treturn\n\t}\n\trq.URL.RawQuery = qMeta.Encode()\n\tif resp, slice.err = reb.client.Do(rq); slice.err != nil {\n\t\treturn\n\t}\n\tresp.Body.Close()\n\tif resp.StatusCode != http.StatusOK {\n\t\tslice.err = fmt.Errorf(\"failed to read metadata, HTTP status: %d\", resp.StatusCode)\n\t\treturn\n\t}\n\tmetaBytes := resp.Header.Get(cmn.HeaderObjECMeta)\n\tif metaBytes == \"\" {\n\t\tslice.err = fmt.Errorf(\"empty metadata\")\n\t\treturn\n\t}\n\tmetadata := ec.Metadata{}\n\tif slice.err = jsoniter.Unmarshal([]byte(metaBytes), &metadata); slice.err != nil {\n\t\treturn\n\t}\n\n\t// Second, get the slice\n\tif slice.sliceID != 0 {\n\t\tpath = cmn.URLPath(cmn.Version, cmn.EC, obj.bck.Name, obj.objName)\n\t} else {\n\t\tpath = cmn.URLPath(cmn.Version, cmn.Objects, obj.bck.Name, obj.objName)\n\t}\n\turlPath = si.URL(cmn.NetworkIntraData) + path\n\tif rq, slice.err = http.NewRequest(http.MethodGet, urlPath, nil); slice.err != nil {\n\t\treturn\n\t}\n\trq.URL.RawQuery = qMeta.Encode()\n\tif resp, slice.err = reb.client.Do(rq); slice.err != nil {\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\tif resp.StatusCode != http.StatusOK {\n\t\tcmn.DrainReader(resp.Body)\n\t\tslice.err = fmt.Errorf(\"failed to read slice, HTTP status: %d\", resp.StatusCode)\n\t\treturn\n\t}\n\tif _, slice.err = io.Copy(slice.sgl, resp.Body); slice.err != nil {\n\t\treturn\n\t}\n\tslice.meta = &metadata\n}", "title": "" }, { "docid": "06584525ac9f88a7e14a075831a1974c", "score": "0.5448729", "text": "func Get(key string) (reply interface{}, err error) {\n redisConn := <-redisConnsAvail\n err = (*redisConn).Send(\"GET\", key)\n if err != nil {\n fmt.Println(\"redis get send error\", err)\n return nil, err\n }\n err = (*redisConn).Flush()\n if err != nil {\n fmt.Println(\"redis get flush error\", err)\n return nil, err\n }\n reply, err = (*redisConn).Receive()\n redisConnsAvail <- redisConn\n return reply, err\n}", "title": "" }, { "docid": "75355a9b74f243cfc0f3c19f9016d448", "score": "0.54469454", "text": "func (ctx *BackendResources) Get(distName string, rType string) []Resource {\n\n\tsHashring, exists := ctx.Collection[rType]\n\tif !exists {\n\t\tlog.Printf(\"Requested resource type %q not present in our resource collection.\", rType)\n\t\treturn []Resource{}\n\t}\n\n\tresources, err := sHashring.GetForDist(distName)\n\tif err != nil {\n\t\tlog.Printf(\"Failed to get resources for distributor %q: %s\", distName, err)\n\t}\n\treturn resources\n}", "title": "" }, { "docid": "ca6d016e51b932ec05778e835205d7b3", "score": "0.54446626", "text": "func (c *Client) Get(req *Request) (*Response, error) {\n\treturn c.Send(req, MethodGet)\n}", "title": "" }, { "docid": "f0f1779335624c44b751c4d566eb5517", "score": "0.54403317", "text": "func (c *redisAdapterRepository) Get(key string) (string, error) {\n\tdata, err := c.cacheConn.Get(key).Result()\n\treturn data, err\n}", "title": "" }, { "docid": "3e67329cdfaed5d4690f2efeba6ab184", "score": "0.54311794", "text": "func Get(params *stripe.BalanceParams) (*stripe.Balance, error) {\n\treturn getC().Get(params)\n}", "title": "" }, { "docid": "b0e9c903aca04ef2c1a313a8c11b29e7", "score": "0.54264045", "text": "func (r *APIRemoteCRDFetcher) Fetch(ctx context.Context, xrd v1alpha1.CompositeResourceDefinition) (*v1beta1.CustomResourceDefinition, error) {\n\tremote := &v1beta1.CustomResourceDefinition{}\n\tif err := r.client.Get(ctx, GetClaimCRDName(xrd), remote); err != nil {\n\t\treturn nil, errors.Wrap(err, errGetCRD)\n\t}\n\treturn resource.SanitizedDeepCopyObject(remote).(*v1beta1.CustomResourceDefinition), nil\n}", "title": "" }, { "docid": "024f4821d1d15f3f8dc4fe9c14097a7f", "score": "0.54259247", "text": "func (h *RediGo) Get(key string) ([]byte, error) {\n\tconn := h.RedisConn.Get()\n\tdefer conn.Close()\n\n\treply, err := redis.Bytes(conn.Do(\"GET\", key))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn reply, nil\n}", "title": "" }, { "docid": "c3d253b150c254684162e883ba9d122f", "score": "0.542316", "text": "func (c *ChargeService) Get(id string) (Charge, error) {\n\tvar ch Charge\n\n\terr := c.client.Call(\"GET\", fmt.Sprintf(\"/charges/%s\", id), nil, &ch)\n\treturn ch, err\n}", "title": "" }, { "docid": "fa31258d6a02c5b29211d7650d4415f5", "score": "0.5421653", "text": "func (c *Cache) Get(cr auth.Credentials, o ...GetOption) (client.Client, error) {\n\topts := &getOptions{}\n\tfor _, fn := range o {\n\t\tfn(opts)\n\t}\n\n\textra := bytes.Buffer{}\n\textra.Write(c.salt)\n\textra.WriteString(opts.Namespace)\n\tid := cr.Hash(extra.Bytes())\n\n\tlog := c.log.WithValues(\"client-id\", id)\n\tif opts.Namespace != \"\" {\n\t\tlog = log.WithValues(\"namespace\", opts.Namespace)\n\t}\n\n\tc.mx.RLock()\n\tsn, ok := c.active[id]\n\tc.mx.RUnlock()\n\n\tif ok {\n\t\tlog.Debug(\"Used existing client\")\n\t\treturn sn, nil\n\t}\n\n\tstarted := time.Now()\n\tcfg := cr.Inject(c.cfg)\n\n\twc, err := c.newClient(cfg, client.Options{Scheme: c.scheme, Mapper: c.mapper})\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, errNewClient)\n\t}\n\n\tca, err := c.newCache(cfg, cache.Options{Scheme: c.scheme, Mapper: c.mapper, Namespace: opts.Namespace})\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, errNewCache)\n\t}\n\n\tdci := client.NewDelegatingClientInput{\n\t\tCacheReader: ca,\n\t\tClient: wc,\n\t\tUncachedObjects: c.nocache,\n\n\t\t// TODO(negz): Don't cache unstructured objects? Doing so allows us to\n\t\t// cache object types that aren't known at build time, like managed\n\t\t// resources and composite resources. On the other hand it could lead to\n\t\t// the cache starting a watch on any kind of resource it encounters,\n\t\t// e.g. arbitrary owner references.\n\t\tCacheUnstructured: true,\n\t}\n\tdc, err := client.NewDelegatingClient(dci)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, errDelegClient)\n\t}\n\n\t// We use a distinct s.expiry ticker rather than a context deadline or timeout\n\t// because it's not possible to extend a context's deadline or timeout, but it\n\t// is possible to 'reset' (i.e. extend) a ticker.\n\texpiration := &tickerExpiration{t: time.NewTicker(c.expiry)}\n\tnewExpiry := time.Now().Add(c.expiry)\n\tctx, cancel := context.WithCancel(context.Background())\n\tsn = &session{client: dc, cancel: cancel, expiry: c.expiry, expiration: expiration, log: log}\n\n\tc.mx.Lock()\n\tc.active[id] = sn\n\tc.mx.Unlock()\n\n\tgo func() {\n\t\terr := ca.Start(ctx)\n\t\tlog.Debug(\"Cache stopped\", \"error\", err)\n\n\t\t// Start blocks until ctx is closed, or it encounters an error. If we make\n\t\t// it here either the cache crashed, or the context was cancelled (e.g.\n\t\t// because our session expired).\n\t\tc.remove(id)\n\t}()\n\n\t// Stop our cache when we expire.\n\tgo func() {\n\t\tselect {\n\t\tcase <-expiration.C():\n\t\t\t// We expired, and should remove ourself from the session cache.\n\t\t\tlog.Debug(\"Client expired\")\n\t\t\tc.remove(id)\n\t\tcase <-ctx.Done():\n\t\t\tlog.Debug(\"Client stopped\")\n\t\t\t// We're done for some other reason (e.g. the cache crashed). We assume\n\t\t\t// whatever cancelled our context did so by calling done() - we just need\n\t\t\t// to let this goroutine finish.\n\t\t}\n\t}()\n\n\tif !ca.WaitForCacheSync(ctx) {\n\t\tc.remove(id)\n\t\treturn nil, errors.New(errWaitForCacheSync)\n\t}\n\n\tlog.Debug(\"Created client\",\n\t\t\"duration\", time.Since(started),\n\t\t\"new-expiry\", newExpiry,\n\t)\n\n\treturn sn, nil\n}", "title": "" }, { "docid": "91d8ed9e58281286b5b512970e4c0f59", "score": "0.54172593", "text": "func (c *atomicConnectionClass) get() rpc.ConnectionClass {\n\treturn rpc.ConnectionClass(atomic.LoadUint32((*uint32)(c)))\n}", "title": "" }, { "docid": "1691dd6b818d1ee15c3324b1339ebd40", "score": "0.54134655", "text": "func (h *RedisCache) Get(key string) (string , error){\n\tvalue , err := h.client.Get(key).Result()\n\treturn value , err\n}", "title": "" }, { "docid": "de772478eff56079de213e115d54fe0b", "score": "0.5412934", "text": "func Get(requester Requester, ctx context.Context, r GetRequest) error {\n\treq, err := http.NewRequest(\"GET\", r.URL, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresp, err := requester(ctx, req)\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\tresp.Body.Close()\n\n\treturn nil\n}", "title": "" }, { "docid": "35cc266564e44465e0f54dc9df5a4664", "score": "0.54121614", "text": "func GetCr(name, namespace string, client runtimeClient.Client) (*v1beta1.KafkaCluster, error) {\n\tcr := &v1beta1.KafkaCluster{}\n\n\terr := client.Get(context.TODO(), types.NamespacedName{Name: name, Namespace: namespace}, cr)\n\tif err != nil {\n\t\treturn nil, errors.WrapIfWithDetails(err, \"could not get cr from k8s\", \"crName\", name, \"namespace\", namespace)\n\t}\n\treturn cr, nil\n}", "title": "" }, { "docid": "22c582d70c8b4f962d7b653a6d0147dd", "score": "0.5407797", "text": "func (c *Client) Get(path string) ([]byte, *zk.Stat, error) {\n\tvar data []byte\n\tvar stat *zk.Stat\n\terr := c.retryUntilConnected(func() error {\n\t\td, s, err := c.getConn().Get(path)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdata = d\n\t\tstat = s\n\t\treturn nil\n\t})\n\treturn data, stat, errors.Wrapf(err, \"zk client failed to get data at %s\", path)\n}", "title": "" }, { "docid": "2733ae522601937fbe963758272f7b07", "score": "0.5407795", "text": "func Get(id string, params *stripe.CardParams) (*stripe.Card, error) {\n\treturn getC().Get(id, params)\n}", "title": "" }, { "docid": "eee686ea1270ab8fad1d2f3aec0e562b", "score": "0.54064703", "text": "func GetCDN(uri string) (string, error) {\n\tresp, err := getClient().Get(uri + TrafficMonitorConfigDocPath)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"reading reply from %v: %v\\n\", uri, err)\n\t}\n\tdefer resp.Body.Close()\n\trespBytes, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"reading reply from %v: %v\\n\", uri, err)\n\t}\n\n\tconfigDoc := TrafficMonitorConfigDoc{}\n\tjson := jsoniter.ConfigFastest\n\tif err := json.Unmarshal(respBytes, &configDoc); err != nil {\n\t\treturn \"\", fmt.Errorf(\"unmarshalling: %v\", err)\n\t}\n\treturn configDoc.CDN, nil\n}", "title": "" }, { "docid": "0805f0075a7c272a7dc0ca660817b89e", "score": "0.5405347", "text": "func Get(params *BalanceParams) (*Balance, error) {\n\treturn getC().Get(params)\n}", "title": "" }, { "docid": "d37ccd6f2f069ebd3ab0f7d516677929", "score": "0.5399152", "text": "func GetCmdGet(queryRoute string, cdc *codec.Codec) *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"get [address]\",\n\t\tShort: \"Fetch the number of credits of an address\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcliCtx := context.NewCLIContext().WithCodec(cdc)\n\t\t\tres, _, err := cliCtx.QueryWithData(fmt.Sprintf(\"custom/%s/%s/%s\", queryRoute, types.QueryGet, args[0]), nil)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"could not get credit\\n%s\\n\", err.Error())\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tvar out string\n\t\t\tcdc.MustUnmarshalJSON(res, &out)\n\t\t\treturn cliCtx.PrintOutput(out)\n\t\t},\n\t}\n}", "title": "" }, { "docid": "ba2b88f75c6dd5aff1450d8334bdb1a5", "score": "0.539413", "text": "func (c *Client) Get(URL *url.URL) *Result {\n\tlogger.Info(fmt.Sprintf(\"Fetching %s\", URL.String()))\n\n\tclient := mustCreateClient()\n\treq := mustCreateRequest(\"GET\", URL)\n\tres, err := client.Do(req)\n\tif err != nil {\n\t\treturn makeFailedResult(URL, req, err)\n\t}\n\tdefer res.Body.Close()\n\n\t// Let's sure we can read the full response before continuing\n\tb, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn makeFailedResult(URL, req, err)\n\t}\n\n\treturn makeSuccessfulResult(URL, req, res, b)\n}", "title": "" }, { "docid": "8118ade163c18781530d77010702f1b9", "score": "0.53851646", "text": "func (client ReplicationFabricsClient) Get(ctx context.Context, fabricName string) (result Fabric, err error) {\n\tif tracing.IsEnabled() {\n\t\tctx = tracing.StartSpan(ctx, fqdn+\"/ReplicationFabricsClient.Get\")\n\t\tdefer func() {\n\t\t\tsc := -1\n\t\t\tif result.Response.Response != nil {\n\t\t\t\tsc = result.Response.Response.StatusCode\n\t\t\t}\n\t\t\ttracing.EndSpan(ctx, sc, err)\n\t\t}()\n\t}\n\treq, err := client.GetPreparer(ctx, fabricName)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"siterecovery.ReplicationFabricsClient\", \"Get\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.GetSender(req)\n\tif err != nil {\n\t\tresult.Response = autorest.Response{Response: resp}\n\t\terr = autorest.NewErrorWithError(err, \"siterecovery.ReplicationFabricsClient\", \"Get\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult, err = client.GetResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"siterecovery.ReplicationFabricsClient\", \"Get\", resp, \"Failure responding to request\")\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "e959c9b23aad9a23664d268131c33f72", "score": "0.5382043", "text": "func (hc *XKCDClient) Fetch(n ComicNumber, save bool) (model.Comic, error) {\n\tresp, err := hc.client.Get(hc.buildURL(n))\n\tif err != nil {\n\t\treturn model.Comic{}, err\n\t}\n}", "title": "" }, { "docid": "f83db5d7fb5c096ce447f0a8983b872c", "score": "0.53729814", "text": "func (r *URLDBDownloadResultResource) Get(id string) (*URLDBDownloadResultConfig, error) {\n\tvar item URLDBDownloadResultConfig\n\tif err := r.c.ReadQuery(BasePath+URLDBDownloadResultEndpoint, &item); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &item, nil\n}", "title": "" }, { "docid": "1d7fbf68b9368c33070b369eb4f775f9", "score": "0.5371274", "text": "func (cs *CacheService) Get(ctx context.Context, req *pb.GetReq) (*pb.GetResp, error) {\n\ttime.Sleep(5 * time.Millisecond)\n\tif parent := opentracing.SpanFromContext(ctx); parent != nil {\n\t\tpctx := parent.Context()\n\t\tif tracer := opentracing.GlobalTracer(); tracer != nil {\n\t\t\tmysqlSpan := tracer.StartSpan(serviceNameDbQueryUser, opentracing.ChildOf(pctx))\n\t\t\tdefer mysqlSpan.Finish()\n\t\t\t// do some options\n\t\t\ttime.Sleep(time.Millisecond * 10)\n\t\t}\n\t}\n\tkey := req.GetKey()\n\tvalue := cs.Storage[key]\n\tfmt.Println(\"get called with return of value: \", value)\n\tresp := &pb.GetResp{Value: value}\n\treturn resp, nil\n}", "title": "" }, { "docid": "7d9589529819e8ca1e694731277e0f3f", "score": "0.53659767", "text": "func (cix CloudCIXClient) GetData(application string, service string, objectId string) ([]byte, error) {\n\n\t// Initialises the client and generates the token.\n\tclient := http.Client{}\n\ttoken, err := cix.GetToken()\n\tif err != nil {\n\t\tfmt.Print(err)\n\t}\n\n\t// Creates the GET request based on the supplied parameters.\n\tvar url string\n\n\tif objectId == \"\" {\n\t\turl = \"https://\" + application + \".\" + cix.ApiUrl + \"/\" + service + \"/\"\n\t} else {\n\t\turl = \"https://\" + application + \".\" + cix.ApiUrl + \"/\" + service + \"/\" + objectId + \"/\"\n\t}\n\n\trequest, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Sets the token in the request header and sends the request.\n\trequest.Header.Set(\"X-Auth-Token\", token)\n\tresponse, err := client.Do(request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Reads and returns the response.\n\tdata, err := ioutil.ReadAll(response.Body)\n\tdefer response.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn data, err\n}", "title": "" }, { "docid": "8fc2eb3267df93ab280524e6874419da", "score": "0.5364955", "text": "func (c *Cache) Get(key string) ([]byte, error) {\n\n\tconn := c.Pool.Get()\n\tdefer conn.Close()\n\n\tdata, err := redis.Bytes(conn.Do(\"GET\", key))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn data, nil\n}", "title": "" }, { "docid": "77ba6193fa2f82bade01c8926b2b345f", "score": "0.53566563", "text": "func Get(clientname string) (*Client, util.Gerror) {\n\tvar client *Client\n\tvar err error\n\n\tif config.UsingDB() {\n\t\tclient, err = getClientSQL(clientname)\n\t\tif err != nil {\n\t\t\tvar gerr util.Gerror\n\t\t\tif err != sql.ErrNoRows {\n\t\t\t\tgerr = util.Errorf(err.Error())\n\t\t\t\tgerr.SetStatus(http.StatusInternalServerError)\n\t\t\t} else {\n\t\t\t\tgerr = util.Errorf(\"Client %s not found\", clientname)\n\t\t\t\tgerr.SetStatus(http.StatusNotFound)\n\t\t\t}\n\t\t\treturn nil, gerr\n\t\t}\n\t} else {\n\t\tds := datastore.New()\n\t\tc, found := ds.Get(\"client\", clientname)\n\t\tif !found {\n\t\t\tgerr := util.Errorf(\"Client %s not found\", clientname)\n\t\t\tgerr.SetStatus(http.StatusNotFound)\n\t\t\treturn nil, gerr\n\t\t}\n\t\tif c != nil {\n\t\t\tclient = c.(*Client)\n\t\t}\n\t}\n\treturn client, nil\n}", "title": "" }, { "docid": "2107892ddb5f3136fb5c2c4cdcec4d1f", "score": "0.5353261", "text": "func (r *ClientService) Get(clientID int, opts ...RequestOption) (*model.Client, error) {\n\toptions := NewRequestOptions(opts)\n\tif options.cache {\n\t\tclient, ok := r.clients.Get(clientID)\n\t\tif ok {\n\t\t\treturn client, nil\n\t\t}\n\t}\n\tres, err := r.Details(clientID).Do()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif options.cache {\n\t\tr.clients.Add(res.Client)\n\t}\n\treturn res.Client, nil\n}", "title": "" }, { "docid": "1c7e426e7a4e15636237177d6edf0f6f", "score": "0.5352948", "text": "func (ck *Clerk) Get(key string) string {\n\targs := GetArgs{}\n\targs.Key = key\n\targs.CommandID = ck.getNextCommandID()\n\targs.ClientID = ck.clientID\n\tDebug(dInfo,\"client %d start get %s shard %d\",args.ClientID,key,key2shard(key))\n\tfor {\n\t\tshard := key2shard(key)\n\t\targs.ShardID = shard\n\t\tgid := ck.config.Shards[shard]\n\t\tif servers, ok := ck.config.Groups[gid]; ok {\n\t\t\t// try each server for the shard.\n\t\t\tfor si := 0; si < len(servers); si++ {\n\t\t\t\tsrv := ck.make_end(servers[si])\n\t\t\t\tvar reply GetReply\n\t\t\t\tok := srv.Call(\"ShardKV.Get\", &args, &reply)\n\t\t\t\tif ok && (reply.Err == OK || reply.Err == ErrNoKey) {\n\t\t\t\t\tDebug(dInfo,\"client %d end get %s,with value %s\",args.ClientID,key,reply.Value)\n\t\t\t\t\treturn reply.Value\n\t\t\t\t}\n\t\t\t\tif !ok {\n\t\t\t\t\tDebug(dInfo,\"client %d timeout for get %s\",args.ClientID,key)\n\t\t\t\t} else {\n\t\t\t\t\tDebug(dInfo, \"client %d receive %v for get %s\", args.ClientID, reply.Err,key)\n\t\t\t\t}\n\t\t\t\tif ok && (reply.Err == ErrWrongGroup) {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\t// ... not ok, or ErrWrongLeader\n\t\t\t}\n\t\t}\n\t\ttime.Sleep(100 * time.Millisecond)\n\t\t// ask controler for the latest configuration.\n\t\tck.config = ck.sm.Query(-1)\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "bab6217164d6bdd0a026d0fe6c480bd2", "score": "0.53502387", "text": "func (c *Client) Fetch(endpt string) ([]byte, error) {\n\tpfx := queryExtract(endpt)\n\ttimer := prometheus.NewTimer(queryDurationsSummary.WithLabelValues(pfx))\n\treq, _ := http.NewRequest(\"GET\", endpt, nil)\n\tresp, err := c.client.Do(req)\n\tif err != nil {\n\t\terrorCounter.WithLabelValues(\"reaching_p8s\").Inc()\n\t\treturn []byte{}, err\n\t}\n\n\tbody, _ := ioutil.ReadAll(resp.Body)\n\tdefer resp.Body.Close()\n\ttimer.ObserveDuration()\n\n\treturn body, nil\n}", "title": "" }, { "docid": "a8f299397555226f5e39dcf244da15f6", "score": "0.53476864", "text": "func (c *Client) Get(key string) ([]byte, error) {\n\treturn c.Queryf(\"get %s\\n\", key)\n}", "title": "" }, { "docid": "18d091fb799508cc3973ab6d9d05bced", "score": "0.53401333", "text": "func (d *Data) Get() int {\n\tresponseChan := make(chan int)\n\td.readRequest <- responseChan\n\tresponse := <-responseChan\n\treturn response\n}", "title": "" } ]
5042f55d5fc0e4c87a191d58dd6f02f0
DefaultConfig creates a new configuration with the default address
[ { "docid": "9aacae72d9d6c8fa4ac6947757feb349", "score": "0.8053559", "text": "func DefaultConfig() *Config {\n\treturn NewConfig(DefaultAddress)\n}", "title": "" } ]
[ { "docid": "e2d18195de4527760fec7cf12fa3d0a0", "score": "0.80782187", "text": "func DefaultConfig() *Config {\n\tc := &Config{\n\t\tName: \"Minimal/go1.10.2\",\n\t\tBindAddress: \"0.0.0.0\",\n\t\tBindPort: 30304,\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "ff8ba1e8a9ae837cf346c211e1489a3d", "score": "0.8018874", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tAddr: \"127.0.0.1:5000\",\n\t}\n}", "title": "" }, { "docid": "5f52a69287b26692bde00268ed0663c5", "score": "0.7870085", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tPath: filepath.Join(os.TempDir(), \"sagas\"),\n\t\tHotelsAddr: \":50051\",\n\t\tCoordinatorAddr: \":50050\",\n\t\tAutoRecover: true,\n\t\tInMemory: true,\n\t}\n}", "title": "" }, { "docid": "19d1fcf635566abb413cde28b08692d3", "score": "0.7837787", "text": "func DefaultConfig() (*Config, error) {\n\tconfig := new(Config)\n\tpublic, private, err := signature.Generate(signature.Ed25519, nil)\n\tif err != nil {\n\t\treturn config, err\n\t}\n\tconfig.Node.Ownership.Public = public\n\tconfig.Node.Ownership.Private = private\n\taddr, err := address.Generate(address.KindUser, public.KeyBytes())\n\tif err != nil {\n\t\treturn config, err\n\t}\n\tconfig.Node.Address = addr\n\treturn config, nil\n}", "title": "" }, { "docid": "ea8e5fa865a91a43757571631b8c7808", "score": "0.78145236", "text": "func DefaultConfig() *Config {\n\tonce.Do(func() {\n\t\tcfg = &Config{\n\t\t\tHome: \"kdata\",\n\t\t\tIsDev: true,\n\t\t\tLogLevel: log15.LvlDebug.String(),\n\t\t\tSeeds: []string{},\n\t\t\tNodeAddr: \"sp2p://cc7d13d8573a5a95dea60793c39338e7a98a0be62f2af3c0dd9257b9880d81bb@127.0.0.1:8088\",\n\t\t\tWebAddr: \"0.0.0.0:8080\",\n\t\t}\n\t\tcfg.Home = homeDir(\"kdata\")\n\t\tcfg.LogLevel = \"debug\"\n\t\ttypes.MustNotErr(types.EnsureDir(cfg.Home, os.FileMode(0755)))\n\t})\n\treturn cfg\n}", "title": "" }, { "docid": "99ebce10a34cc9d296f42d4261dece53", "score": "0.7795277", "text": "func Default() *Config {\n\treturn &Config{\n\t\tDuration: 2 * time.Second,\n\t\tAddress: \":8100\",\n\t\tChecks: []Check{\n\t\t\t{\n\t\t\t\tName: \"github\",\n\t\t\t\tURL: \"https://github.com/\",\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"ya\",\n\t\t\t\tURL: \"https://ya.ru\",\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "8b6eaa123d9a13e8dfda50b71bdd7630", "score": "0.7729045", "text": "func DefaultConfig() *Config {\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\ttags := map[string]string{}\n\n\treturn &Config{\n\t\tNodeName: hostname,\n\t\tBindAddr: fmt.Sprintf(\"{{ GetPrivateIP }}:%d\", DefaultBindPort),\n\t\tHTTPAddr: \":8080\",\n\t\tProfile: \"lan\",\n\t\tLogLevel: \"info\",\n\t\tRPCPort: DefaultRPCPort,\n\t\tMailSubjectPrefix: \"[Dkron]\",\n\t\tTags: tags,\n\t\tDataDir: \"dkron.data\",\n\t\tDatacenter: \"dc1\",\n\t\tRegion: \"global\",\n\t\tReconcileInterval: 60 * time.Second,\n\t\tRaftMultiplier: 1,\n\t\tSerfReconnectTimeout: \"24h\",\n\t\tUI: true,\n\t}\n}", "title": "" }, { "docid": "c41c2314ebba3f2c0ca56dee31646885", "score": "0.7723565", "text": "func DefaultConfig(key string) *Config {\n\treturn &Config{\n\t\tNamespace: \"\",\n\t\tSubsystem: \"\",\n\t\tPushEnabled: false,\n\t\tPushTargetURL: \"\",\n\t\tPushInterval: time.Second * 3,\n\t}\n}", "title": "" }, { "docid": "ec636e55b9bd3333bd16e3370a7d6786", "score": "0.7722606", "text": "func Default() *Config {\n\tconf := &Config{\n\t\tServeAddress: \"127.0.0.1:8118\",\n\t\tDataDirectory: \"/path/to/data/directory\",\n\t}\n\treturn conf\n}", "title": "" }, { "docid": "677eb39f3ef7ad31bdf12b76648ee530", "score": "0.7685199", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tListenAddr: \":9600\",\n\t\tDomain: \"http://localhost:9600\",\n\t}\n}", "title": "" }, { "docid": "36c3d3b8b5f38fb4d8ec5023ac17dd68", "score": "0.7639504", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tP2P: DefaultP2P(),\n\t}\n}", "title": "" }, { "docid": "e787dc75a08f22d80d8943a89ea835bc", "score": "0.7587027", "text": "func DefaultConfig() Config {\n\tURL, err := url.Parse(\"file:///var/run/fleet.sock\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tnewConfig := Config{\n\t\tClient: &http.Client{},\n\t\tEndpoint: *URL,\n\t\tLogger: logging.NewLogger(logging.DefaultConfig()),\n\t\tSSHTunnel: nil,\n\t}\n\n\treturn newConfig\n}", "title": "" }, { "docid": "0cdc7d9bc900e88b89e262c63fc0a1f8", "score": "0.7533882", "text": "func DefaultConfig() *SniferConfig {\n\treturn &SniferConfig{\n\t\t\"eth0\",\n\t\ttime.Duration(1) * time.Minute,\n\t\t1600,\n\t\ttrue,\n\t\tfalse,\n\t}\n}", "title": "" }, { "docid": "090139c8f39fad955ed9a1f7299db0ce", "score": "0.7529417", "text": "func DefaultConfig(port int) *Config {\n\tc := &Config{\n\t\tIdConf: \tid.DefaultConfig(),\n\t\tMnrConf: \tminer.DefaultConfig(-1),\n\t\tWtConf: \twallet.DefaultConfig(),\n\t\tChainConf: \tblockchain.DefaultConfig(),\n\t\tVersion: \t0,\n\t\tPeerLimit: \t20,\n\t\tAddrLimit: \t1000,\n\t\tPort: \tport,\n\t\tVerTimeout: \ttime.Second * 2,\n\t\tMxBlkSz: \t\t10000000,\n\t}\n\treturn c\n}", "title": "" }, { "docid": "e537e0d036292f9cd9c6ceb8bf26dd0b", "score": "0.7529025", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tStorageDir: \"./packages\",\n\t\tUpstreamURL: \"http://registry.npmjs.com\",\n\t\tShaCacheSize: 500,\n\t\tAddr: \":8200\",\n\t\tCertFile: \"\",\n\t\tKeyFile: \"\",\n\t\tFrontAddr: \"http://127.0.0.1:8200\",\n\t\tLogger: log.StandardLogger(),\n\t}\n}", "title": "" }, { "docid": "81bab611e503b3cf094c77a5a77a992d", "score": "0.74945134", "text": "func DefaultConfig(bindAddr, advAddr string) (*Config, error) {\n\n\tc := &Config{\n\t\tChord: &ChordConfig{\n\t\t\tBindAddr: bindAddr,\n\t\t\tTimeout: time.Second * 5,\n\t\t\tConnMaxIdle: time.Second * 300,\n\t\t\tPeers: []string{},\n\t\t},\n\t\tServer: grpc.NewServer(),\n\t\tReplicas: 3,\n\t}\n\n\taddr, err := getAdvertiseAddr(bindAddr, advAddr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc.Chord.Config = chord.DefaultConfig(addr)\n\tc.Chord.StabilizeMin = time.Duration(5 * time.Second)\n\tc.Chord.StabilizeMax = time.Duration(15 * time.Second)\n\tc.Chord.Delegate = &ChordDelegate{}\n\t//c.Chord.HashFunc = sha256.New\n\treturn c, nil\n}", "title": "" }, { "docid": "8032c08811545d8424f7c9ed00835ecb", "score": "0.74876076", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tvals: map[envKey]string{\n\t\t\thost: \"192.168.1.1\",\n\t\t\tftpPort: \"21\",\n\t\t\tftpHome: \"/data/video\",\n\t\t\ttelnetPort: \"23\",\n\t\t\ttelnetPrompt: \"# \",\n\t\t},\n\t}\n}", "title": "" }, { "docid": "f2788c53bb8deafc5d605c6e8cb9d061", "score": "0.7453042", "text": "func NewDefaultConfig() Config {\n\treturn Config{\n\t\tURL: \"http://127.0.0.1:8080\",\n\t\tEventsTransport: EventsTransportCallback,\n\t\tEventsPort: 10001,\n\t\tEventsInterface: \"eth0\",\n\t\tLogOutput: ioutil.Discard,\n\t\tPollingWaitTime: defaultPollingWaitTime,\n\t}\n}", "title": "" }, { "docid": "6733f943e46518dc017ee843aaefe98f", "score": "0.7434899", "text": "func DefaultConfig() *Config {\n\treturn NewConfig(map[string]interface{}{\n\t\t\"response-timeout\": time.Minute * 5,\n\t\t\"eth-chain-id\": 1,\n\t\t\"eth-url\": \"ws://localhost:8545\",\n\t\t\"db-host\": \"localhost\",\n\t\t\"db-name\": \"explorer\",\n\t\t\"db-port\": \"5432\",\n\t\t\"db-username\": \"postgres\",\n\t\t\"db-password\": \"postgres\",\n\t})\n}", "title": "" }, { "docid": "f6feaa8b063b36c4c5c95f41b6552081", "score": "0.7402198", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tPort: 8080,\n\t\tEngine: gin.Default(),\n\t\tDB: database.Get(),\n\t}\n}", "title": "" }, { "docid": "70103c00e7d3183cbfe88e77226e6628", "score": "0.73950887", "text": "func DefaultConfig() *Config {\n return &Config{\n WebPort: 8080,\n RPCPort: 5455,\n }\n}", "title": "" }, { "docid": "71b81e94bc0f9b565860ad75a1ff0c59", "score": "0.73812675", "text": "func configDefault(config ...Config) Config {\n\t// Return default config if nothing provided\n\tif len(config) < 1 {\n\t\treturn ConfigDefault\n\t}\n\n\t// Override default config\n\tcfg := config[0]\n\n\t// Set default values\n\tif cfg.Host == \"\" {\n\t\tcfg.Host = ConfigDefault.Host\n\t}\n\tif cfg.Port <= 0 {\n\t\tcfg.Port = ConfigDefault.Port\n\t}\n\tif cfg.Database == \"\" {\n\t\tcfg.Database = ConfigDefault.Database\n\t}\n\tif cfg.Collection == \"\" {\n\t\tcfg.Collection = ConfigDefault.Collection\n\t}\n\treturn cfg\n}", "title": "" }, { "docid": "e214d1de262a1742d7a85f3fcf92dabc", "score": "0.7375965", "text": "func DefaultConfig(serviceName string) *Config {\n\tc := &Config{\n\t\tServiceName: serviceName, // Use client provided service\n\t\tHostName: \"\",\n\t\tEnableHostname: true, // Enable hostname prefix\n\t\tEnableRuntimeMetrics: true, // Enable runtime profiling\n\t\tEnableTypePrefix: false, // Disable type prefix\n\t\tTimerGranularity: time.Millisecond, // Timers are in milliseconds\n\t\tProfileInterval: time.Second, // Poll runtime every second\n\t\tFilterDefault: true, // Don't filter metrics by default\n\t}\n\n\t// Try to get the hostname\n\tname, _ := os.Hostname()\n\tc.HostName = name\n\treturn c\n}", "title": "" }, { "docid": "6720e587dbd42264f10c37d0ebb6675c", "score": "0.73593", "text": "func DefaultConfig() *Config {\n\tuname := defaultUsername\n\tu, err := user.Current()\n\n\tif err != nil {\n\t\tuname = defaultUsername\n\t}\n\n\tif u != nil {\n\t\tuname = u.Username\n\t}\n\n\treturn &Config{\n\t\tUsername: uname,\n\t\tNamespace: defaultNamespace,\n\t\tStorage: defaultStorage,\n\t\tWatcher: Watcher{\n\t\t\tOutputPath: OutputPath(),\n\t\t},\n\t\tServer: Server{\n\t\t\tEndpoint: defaultEndpoint,\n\t\t\tHost: defaultHost,\n\t\t\tJSONRoot: defaultNamespace,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "68178823450ce718b48c13cb69586110", "score": "0.73586273", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tName: \"\",\n\t\tAPIAddr: defaultAPIAddr,\n\t\tLogLevel: \"DEBUG\",\n\t\tDataDir: defaultDataDir,\n\t\tClient: &ClientConfig{\n\t\t\tAPIAddr: defaultAPIAddr,\n\t\t\tOutputDir: path.Join(defaultDataDir, \"output\"),\n\t\t\tSyncIntervalSeconds: 5,\n\t\t\tMeta: map[string]string{},\n\t\t},\n\t\tVersion: version.GetVersion(),\n\t}\n}", "title": "" }, { "docid": "737798f938d30ecf17f95a6e16c25da8", "score": "0.7351118", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tDmsgDisc: dmsg.DefaultDiscAddr,\n\t\tDmsgSessions: dmsg.DefaultMinSessions,\n\t\tDmsgPort: DefaultPort,\n\t\tCLINet: DefaultCLINet,\n\t\tCLIAddr: DefaultCLIAddr(),\n\t}\n}", "title": "" }, { "docid": "0c52eeda38eceb67bf33d05676115322", "score": "0.73432493", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tBindAddr: \"\",\n\t\tAdvertiseAddr: \"\",\n\t\tLeaveOnTerm: true,\n\t\tEnableCompression: false,\n\t\tBroadcastTimeout: 5 * time.Second,\n\t\tLeavePropagateDelay: 0,\n\t\tTimeoutQueues: 200 * time.Millisecond,\n\t\tProcessInterval: 1 * time.Second,\n\t\tCacheSize: 1 << 20,\n\t\tMaxSenders: 10,\n\t}\n}", "title": "" }, { "docid": "540258eedee398d6d29fae541d6adbc5", "score": "0.73205274", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tNetwork: DefaultNetwork,\n\t\tRPCListen: \"localhost:12010\",\n\t\tRESTListen: \"localhost:8281\",\n\t\tInsecure: false,\n\t\tBaseDir: DefaultBaseDir,\n\t\tLogDir: defaultLogDir,\n\t\tMaxLogFiles: defaultMaxLogFiles,\n\t\tMaxLogFileSize: defaultMaxLogFileSize,\n\t\tMinBackoff: defaultMinBackoff,\n\t\tMaxBackoff: defaultMaxBackoff,\n\t\tDebugLevel: defaultLogLevel,\n\t\tTLSCertPath: DefaultTLSCertPath,\n\t\tTLSKeyPath: DefaultTLSKeyPath,\n\t\tMacaroonPath: DefaultMacaroonPath,\n\t\tLsatMaxRoutingFee: defaultLsatMaxFee,\n\t\tLnd: &LndConfig{\n\t\t\tHost: \"localhost:10009\",\n\t\t\tMacaroonPath: DefaultLndMacaroonPath,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "37ddf1db2f8aee5b515b9aa8ee07bee8", "score": "0.7319899", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Settings.\n\t\tCreated: time.Now(),\n\t\tID: \"\",\n\t\tPeerAID: \"\",\n\t\tPeerBID: \"\",\n\t\tWeight: 0,\n\t}\n}", "title": "" }, { "docid": "547ee1f8b031e296b04974aed5157cfb", "score": "0.73097724", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tScopes: []string{defaultScope},\n\t}\n}", "title": "" }, { "docid": "36d538ebe3f96687ff70b6b68dbcd6b0", "score": "0.7302201", "text": "func DefaultConfig(network lachesis.Config) Config {\n\tcfg := Config{\n\t\tNet: network,\n\t\tEmitter: DefaultEmitterConfig(),\n\t\tTxPool: evmcore.DefaultTxPoolConfig(),\n\t\tStoreConfig: DefaultStoreConfig(),\n\n\t\tUpgrade: UpgradeConfig{\n\t\t\tShutDownIfNotUpgraded: false,\n\t\t\tWarningIfNotUpgraded: true,\n\t\t},\n\n\t\tTxIndex: true,\n\t\tDecisiveEventsIndex: false,\n\n\t\tProtocol: ProtocolConfig{\n\t\t\tLatencyImportance: 60,\n\t\t\tThroughputImportance: 40,\n\t\t},\n\n\t\tGPO: gasprice.Config{\n\t\t\tBlocks: 20,\n\t\t\tPercentile: 60,\n\t\t\tMaxPrice: gasprice.DefaultMaxPrice,\n\t\t},\n\t\tRPCGasCap: 25000000,\n\t\tRPCTxFeeCap: 1000, // 1000 FTM\n\t\tRPCLogsBloom: true,\n\t}\n\n\tif network.NetworkID == lachesis.FakeNetworkID {\n\t\tcfg.Emitter = FakeEmitterConfig()\n\t\t// disable self-fork protection if fakenet 1/1\n\t\tif len(network.Genesis.Alloc.Validators) == 1 {\n\t\t\tcfg.Emitter.EmitIntervals.SelfForkProtection = 0\n\t\t}\n\t}\n\t/*if network.NetworkId == lachesis.DevNetworkId { // TODO dev network\n\t\tcfg.TxPool = evmcore.FakeTxPoolConfig()\n\t\tcfg.Emitter = FakeEmitterConfig()\n\t}*/\n\n\treturn cfg\n}", "title": "" }, { "docid": "13b4c44bef13f10e7af806847fb9cbdf", "score": "0.7302155", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tDisable: true,\n\t\tConfigPath: nri.DefaultConfigPath,\n\t\tSocketPath: nri.DefaultSocketPath,\n\t\tPluginPath: nri.DefaultPluginPath,\n\t}\n}", "title": "" }, { "docid": "4053e1ed0795575ca1b3d2dd832d03fb", "score": "0.72892165", "text": "func NewDefaultConfig(name string) Config {\n\treturn Config{\n\t\tName: name,\n\t\tAddress: \"127.0.0.1\",\n\t\tPort: 8080,\n\t\tReadTimeout: 5,\n\t\tWriteTimeout: 60,\n\t\tHealthHandler: true,\n\t\tMetricsHandler: true,\n\t\tPprofHandler: true,\n\t\tDynamicLogLevel: true,\n\t\tCancelSignals: []os.Signal{os.Interrupt},\n\t}\n}", "title": "" }, { "docid": "4ab239b2ea253d3a4c2d9724c2cf9beb", "score": "0.72717494", "text": "func defaultConfiguration() *kurmaConfig {\n\treturn &kurmaConfig{\n\t\tNetworkConfig: kurmaNetworkConfig{\n\t\t\tInterfaces: []*kurmaNetworkInterface{\n\t\t\t\t&kurmaNetworkInterface{\n\t\t\t\t\tDevice: \"lo\",\n\t\t\t\t\tAddress: \"127.0.0.1/8\",\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "cd2a897e1740b1b06d8d5d37c03f5089", "score": "0.72709525", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tPort: 3000,\n\t\tEnv: \"dev\",\n\t}\n}", "title": "" }, { "docid": "11eca9c937f904ba5ff48dc64ab6abcc", "score": "0.7258335", "text": "func DefaultConfig() *Config {\n\treturn &Config{}\n}", "title": "" }, { "docid": "6a7ac6c24b9d27a4f8398f1ff2c39688", "score": "0.72539514", "text": "func DefaultConfig() *Config {\n\tetcdConf := embed.NewConfig()\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\tlog.Errorf(err, \"Error determining hostname: %s\", err)\n\t\treturn nil\n\t}\n\n\tpeer, _ := url.Parse(defaultListenPeerAddr)\n\tetcdConf.ACUrls = nil\n\tetcdConf.LCUrls = nil\n\tetcdConf.APUrls = []url.URL{*peer}\n\tetcdConf.LPUrls = []url.URL{*peer}\n\n\tetcdConf.EnableV2 = false\n\tetcdConf.EnablePprof = false\n\tetcdConf.QuotaBackendBytes = etcdserver.MaxQuotaBytes\n\tetcdConf.Dir = defaultDataDir + hostname\n\tetcdConf.Name = hostname\n\tetcdConf.InitialCluster = fmt.Sprintf(\"%s=%s\", hostname, defaultListenPeerAddr)\n\tetcdConf.AutoCompactionMode = compactor.ModePeriodic\n\tetcdConf.AutoCompactionRetention = \"1h\"\n\treturn &Config{Config: etcdConf}\n}", "title": "" }, { "docid": "918688a2cfefcad5b95d9def2759ab73", "score": "0.724602", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Dependencies.\n\t\tAwsService: nil,\n\t\tCertWatcher: nil,\n\t\tClients: Clients{},\n\t\tCloudConfig: nil,\n\t\tLogger: nil,\n\t\tRandomKeyWatcher: nil,\n\t}\n}", "title": "" }, { "docid": "ae39566b0f2d927a55ab4c53a425fe67", "score": "0.72436965", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Settings.\n\t\tEtcdAddress: \"\",\n\t\tEtcdPrefix: \"\",\n\t\tEtcdTLS: microtls.CertFiles{},\n\t\tKind: KindMemory,\n\t}\n}", "title": "" }, { "docid": "8a943a7f2bc4d069047e44bff2a73511", "score": "0.72208375", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tLogger: nil,\n\t\tRestClient: nil,\n\n\t\tURL: nil,\n\t}\n}", "title": "" }, { "docid": "e3c70a6ec1f23998ac8ba99e31c2868e", "score": "0.7220786", "text": "func newDefaultConfig() *Config {\n\treturn &Config{\n\t\tHooksEnabled: false,\n\t}\n}", "title": "" }, { "docid": "3cedea27d6b271aeb86104d510f9d356", "score": "0.72138226", "text": "func DefaultConfig() Config {\n\treturn Config{}\n}", "title": "" }, { "docid": "3cedea27d6b271aeb86104d510f9d356", "score": "0.72138226", "text": "func DefaultConfig() Config {\n\treturn Config{}\n}", "title": "" }, { "docid": "9dd86ec3a8f7517e6de42e2190004b45", "score": "0.7207014", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Dependencies.\n\t\tClients: Clients{},\n\t\tLogger: nil,\n\t}\n}", "title": "" }, { "docid": "68b843fe561e1048b351d0dffe0a2949", "score": "0.7200572", "text": "func defaultConfig() Config {\n\tconfig := Config{\n\t\tContextName: defaultContextName,\n\t\tContextList: ContextArray{\n\t\t\t{\n\t\t\t\tDirPath: DefaultContextPath(defaultContextName),\n\t\t\t\tName: defaultContextName,\n\t\t\t},\n\t\t},\n\t\tParameters: Parameters{\n\t\t\tDefaultCommand: \"board\",\n\t\t\tPrettyPrint: true,\n\t\t\tWithColor: true,\n\t\t\tIndicators: DefaultIndicatorsTemplate,\n\t\t},\n\t}\n\treturn config\n}", "title": "" }, { "docid": "03b5ff26f8d7e539ffaeaadcad3b0014", "score": "0.7197547", "text": "func DefaultConfig() *Config {\n\tserfConf := serf.DefaultConfig()\n\tetcdConf := etcd.DefaultConfig()\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\tlog.Errorf(err, \"Error determining hostname: %s\", err)\n\t\treturn nil\n\t}\n\tserfConf.NodeName = hostname\n\tetcdConf.Name = hostname\n\treturn &Config{\n\t\tTickerInterval: DefaultTickerInterval,\n\t\tConfig: serfConf,\n\t\tEtcd: etcdConf,\n\t\tTLSConfig: DefaultTLSConfig(),\n\t\tSC: &ServiceCenter{\n\t\t\tAddr: fmt.Sprintf(\"127.0.0.1:%d\", DefaultDCPort),\n\t\t\tPlugin: servicecenter.PluginName,\n\t\t\tTLSConfig: NewTLSConfig(servicecenterName),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "f3482add7e0828e7c78398fbf8698eac", "score": "0.719333", "text": "func DefaultConfig() network.Config {\n\tencCfg := MakeEncodingConfig()\n\n\treturn network.Config{\n\t\tCodec: encCfg.Marshaler,\n\t\tTxConfig: encCfg.TxConfig,\n\t\tLegacyAmino: encCfg.Amino,\n\t\tInterfaceRegistry: encCfg.InterfaceRegistry,\n\t\tAccountRetriever: authtypes.AccountRetriever{},\n\t\tAppConstructor: NewAppConstructor(encCfg),\n\t\tGenesisState: ModuleBasics.DefaultGenesis(encCfg.Marshaler),\n\t\tTimeoutCommit: 2 * time.Second,\n\t\tChainID: \"chain-\" + tmrand.NewRand().Str(6),\n\t\tNumValidators: 4,\n\t\tBondDenom: sdk.DefaultBondDenom,\n\t\tMinGasPrices: fmt.Sprintf(\"0.000006%s\", sdk.DefaultBondDenom),\n\t\tAccountTokens: sdk.TokensFromConsensusPower(1000),\n\t\tStakingTokens: sdk.TokensFromConsensusPower(500),\n\t\tBondedTokens: sdk.TokensFromConsensusPower(100),\n\t\tPruningStrategy: storetypes.PruningOptionNothing,\n\t\tCleanupDir: true,\n\t\tSigningAlgo: string(hd.Secp256k1Type),\n\t\tKeyringOptions: []keyring.Option{},\n\t}\n}", "title": "" }, { "docid": "2e38bfab85e55371f87a0958ae7363ec", "score": "0.7183388", "text": "func DefaultConfig(path string) *StoreCfg {\n\treturn &StoreCfg{\n\t\tBuildCfg: core.BuildCfg{\n\t\t\tOnline: false,\n\t\t},\n\t\tPath: path,\n\t}\n}", "title": "" }, { "docid": "087366f5c4ef11315c449b20e49f7bab", "score": "0.71715266", "text": "func Default() Configuration {\r\n\tc := new(configuration)\r\n\r\n\tc.DB.Type = \"in-memory\"\r\n\tc.API.AllowedOrigin = \"http://localhost:4200\"\r\n\tc.API.ListenPort = \"8080\"\r\n\r\n\treturn c\r\n}", "title": "" }, { "docid": "569232852438f3b5dcc4ce372de25355", "score": "0.71647304", "text": "func DefaultConfig() Config {\n\n\t// SwarmConfigValues defines default values for swarm config params.\n\tvar SwarmConfigValues = SwarmConfig{\n\t\tGossip: false,\n\t\tBootstrap: false,\n\t\tRoutingTableBucketSize: 20,\n\t\tRoutingTableAlpha: 3,\n\t\tRandomConnections: 5,\n\t\tBootstrapNodes: []string{ // these should be the spacemesh foundation bootstrap nodes\n\t\t},\n\t}\n\n\treturn Config{\n\t\tSecurityParam: 20,\n\t\tFastSync: true,\n\t\tTCPPort: 7513,\n\t\tNodeID: \"\",\n\t\tNewNode: false,\n\t\tDialTimeout: duration(\"1m\"),\n\t\tConnKeepAlive: duration(\"48h\"),\n\t\tNetworkID: TestNet,\n\t\tResponseTimeout: duration(\"15s\"),\n\t\tSwarmConfig: SwarmConfigValues,\n\t\tBufferSize: 100,\n\t}\n}", "title": "" }, { "docid": "3442a4b3cb6123f4fef0c0497435cce8", "score": "0.71611726", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tBaseConfig: DefaultBaseConfig(),\n\t\tHttpServer: DefaultRPCConfig(),\n\t\tDB: DefaultDBConfig(),\n\t\tEmail: DefaultEmailConfig(),\n\t}\n}", "title": "" }, { "docid": "8489ac781524ad0860a95dfb310af798", "score": "0.7159264", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Dependencies.\n\t\tLogger: nil,\n\t\tResource: nil,\n\t}\n}", "title": "" }, { "docid": "385a11fec9f00f35be994e4c47f6313c", "score": "0.71432626", "text": "func DefaultConfig() Config {\n\treturn defaultConfig\n}", "title": "" }, { "docid": "385a11fec9f00f35be994e4c47f6313c", "score": "0.71432626", "text": "func DefaultConfig() Config {\n\treturn defaultConfig\n}", "title": "" }, { "docid": "385a11fec9f00f35be994e4c47f6313c", "score": "0.71432626", "text": "func DefaultConfig() Config {\n\treturn defaultConfig\n}", "title": "" }, { "docid": "9e411559294872ae936c3b27b90dde6f", "score": "0.7140565", "text": "func DefaultConfig() Config {\n\tconfig := Config{}\n\n\treturn config\n}", "title": "" }, { "docid": "0a84942b2b5e9bd5a0490ccb0226b37b", "score": "0.71327335", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Dependencies.\n\t\tCertWatcher: nil,\n\t\tCloudConfig: nil,\n\t\tK8sClient: nil,\n\t\tLogger: nil,\n\t}\n}", "title": "" }, { "docid": "d9d967453c0c5ec5949089a2711ef692", "score": "0.7129293", "text": "func DefaultConfig() Config {\n\treturn Config{true, true, true, true, false}\n}", "title": "" }, { "docid": "72b91ee1a30adf0b6dc221bdb3bfbbe4", "score": "0.71287084", "text": "func defaultConfig(defaultEmulatorServiceAccount *Account) *config.Config {\n\treturn &config.Config{\n\t\tEmulators: config.Emulators{{\n\t\t\tName: config.DefaultEmulatorConfigName,\n\t\t\tServiceAccount: defaultEmulatorServiceAccount.name,\n\t\t\tPort: defaultEmulatorPort,\n\t\t}},\n\t\tNetworks: config.Networks{{\n\t\t\tName: defaultEmulatorNetworkName,\n\t\t\tHost: defaultEmulatorHost,\n\t\t\tChainID: flow.Emulator,\n\t\t}},\n\t}\n}", "title": "" }, { "docid": "4b9cd1a836979a0f4def45547fc6d5e8", "score": "0.71230346", "text": "func defaultConfig() Config {\n\treturn Config{\n\t\tName: \"echo\",\n\t\tHosts: []string{\"localhost:22\"},\n\t\tMode: monitors.DefaultIPSettings,\n\t\tTLS: nil,\n\t\tTimeout: 16 * time.Second,\n\t\tDocker: false,\n\t\tDockerfilter: []string{},\n\t\tCheck: checkConfig{\n\t\t\tRequest: commandConfig{\n\t\t\t\tDir: \"\",\n\t\t\t},\n\t\t\tResponse: outputConfig{},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "8ab3ebafe0e5996945fc50f771f503bf", "score": "0.7122904", "text": "func NewDefaultConfig() Config {\n\treturn Config{\n\t\tClusterURL: DefaultClusterURL,\n\t\tInsecure: false,\n\t}\n}", "title": "" }, { "docid": "af5b59436bf1cc9c48d0e7358743ea75", "score": "0.7120338", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Settings.\n\t\tKind: \"\",\n\t}\n}", "title": "" }, { "docid": "84e18193d4f4a100f112d9062d053f93", "score": "0.7117737", "text": "func Default() *Config {\n\treturn &Config{\n\t\tKibana: Kibana{\n\t\t\tHost: \"localhost:5601\",\n\t\t\tUser: \"elastic\",\n\t\t\tPassword: \"changeme\",\n\t\t},\n\t\tLogging: Logging{\n\t\t\tLevel: \"info\",\n\t\t\tFormat: \"json\",\n\t\t\tDebug: false,\n\t\t\tColor: false,\n\t\t},\n\t\tAutoIndexPattern: AutoIndexPattern{\n\t\t\tEnabled: false,\n\t\t\tGeneralPatterns: nil,\n\t\t\tSchedule: \"*/5 * * * *\",\n\t\t\tConcurrency: 20,\n\t\t},\n\t\tRefreshIndexPattern: RefreshIndexPattern{\n\t\t\tEnabled: false,\n\t\t\tPatterns: nil,\n\t\t\tSchedule: \"*/5 * * * *\",\n\t\t\tConcurrency: 20,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "e0d9a50b71a484e5a227a94c4fc62870", "score": "0.71128523", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Dependencies.\n\t\tConfigurers: nil,\n\t\tFileSystem: afero.NewMemMapFs(),\n\t\tLogger: nil,\n\n\t\t// Settings.\n\t\tHelmBinaryPath: \"\",\n\t\tOrganisation: \"\",\n\t\tPassword: \"\",\n\t\tRegistry: \"\",\n\t\tUsername: \"\",\n\t}\n}", "title": "" }, { "docid": "b50b2a64376569065748f73ecc7fa002", "score": "0.7089958", "text": "func DefaultConfig() ejrnl.Config {\n\treturn ejrnl.Config{\n\t\tStorageDirectory: \"~/ejrnl\",\n\t\tSalt: MakeSalt(64),\n\t\tPow: 19,\n\t}\n}", "title": "" }, { "docid": "af3b2be570e5789a8f9c8a0c1dd7322d", "score": "0.70894116", "text": "func DefaultConfig() *Config {\n\treturn &Config{\n\t\tqueueSize: 1000,\n\t\tinputBufferSize: 2048,\n\t\toutputType: \"syslog\",\n\t\tsyslogBufferSize: 2048,\n\t\tfileBufferSize: 2048,\n\t\toutputTypeFromEnviron: true,\n\t}\n}", "title": "" }, { "docid": "e0833cf7c5ec736f9eaf1bc16a26ad7c", "score": "0.7088217", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Dependencies.\n\t\tLogger: nil,\n\n\t\t// Settings.\n\t\tAwsConfig: awsutil.Config{},\n\t}\n}", "title": "" }, { "docid": "7839e0b034a0e6b8e8cdd3b34de54423", "score": "0.7080439", "text": "func (r *EKSConfig) Default() {\n}", "title": "" }, { "docid": "0535ebe5d5e860b012be22884887b2d7", "score": "0.7075856", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tCluster: \"couchbase://localhost\",\n\t}\n}", "title": "" }, { "docid": "b0242cc767d45b3cf51a6a68f1fc6819", "score": "0.7072541", "text": "func DefaultConfig(u *url.URL) *Config {\n\tret := &Config{\n\t\tBase: BaseConfig{\n\t\t\tDialTimeout: DefaultDiaTimeout,\n\t\t},\n\t\tWSHeartInterval: DefaultWSHeartInterval,\n\t\tHTTPMethod: http.MethodConnect,\n\t}\n\n\t// set tls.\n\tswitch u.Scheme {\n\tcase SchemeHTTPS, SchemeWebsocketSec:\n\t\tret.Base.TLSClientConfig = &tls.Config{\n\t\t\tServerName: u.Hostname(),\n\t\t\tInsecureSkipVerify: true,\n\t\t}\n\tdefault:\n\t\t// nothing\n\t}\n\n\treturn ret\n}", "title": "" }, { "docid": "5828d8532550a5cdab63b93d9efd3eba", "score": "0.7070125", "text": "func NewDefaultConfig() *Config {\n\treturn &Config{\n\t\tDataDir: defaultDataDir,\n\t\tLogDir: path.Join(defaultDataDir, \"logs\"),\n\t\tLogLevel: \"debug\",\n\t\tUserAgentComment: \"obmobile\",\n\t\tTestnet: false,\n\t}\n}", "title": "" }, { "docid": "90737b76e310fe1efa4177f67533c8d1", "score": "0.70668614", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Settings.\n\t\tOutput: \"\",\n\t}\n}", "title": "" }, { "docid": "e3658a0c42e0b597af756caf67ce409f", "score": "0.7056938", "text": "func newDefaultConfiguration() component.Config {\n\treturn &Config{\n\t\tHTTPClientSettings: confighttp.NewDefaultHTTPClientSettings(),\n\t}\n}", "title": "" }, { "docid": "719de277816af57432f3429e9b39b3e9", "score": "0.70517355", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tInterval: 10 * time.Second,\n\t\tEpochEndFraction: 0.8,\n\t\tHareDelayLayers: 10,\n\t\tSyncCertDistance: 10,\n\t\tMaxStaleDuration: time.Second,\n\t\tUseNewProtocol: true,\n\t}\n}", "title": "" }, { "docid": "0d0963287a9312ef3b0f8b6330cf3e68", "score": "0.70354086", "text": "func createDefaultConfig() configmodels.Receiver {\n\treturn &Config{\n\t\tReceiverSettings: configmodels.ReceiverSettings{\n\t\t\tTypeVal: typeStr,\n\t\t\tNameVal: typeStr,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "8d3e3bf76162b27f962aafb9a6e676ec", "score": "0.7027994", "text": "func NewDefaultConfig(name string, serverRegistration func(*grpc.Server)) Config {\n\treturn Config{\n\t\tName: name,\n\t\tAddress: \"127.0.0.1\",\n\t\tPort: 9111,\n\t\tServerRegistration: serverRegistration,\n\t\tStreamInterceptors: []grpc.StreamServerInterceptor{},\n\t\tUnaryInterceptors: []grpc.UnaryServerInterceptor{},\n\t\tCancelSignals: []os.Signal{os.Interrupt},\n\t}\n}", "title": "" }, { "docid": "8af20d86c321b9e9428110a7868c703b", "score": "0.70122856", "text": "func NewDefaultConfig() *Config {\n\tconfig := new(Config)\n\tconfig.Host = \"chat.freenode.net:6697\"\n\tconfig.Nick = \"mustangsally\"\n\tconfig.Master = \"aerth:$\"\n\tconfig.CommandPrefix = \"!\"\n\tconfig.Channels = \"##ircb,##go-nuts\"\n\tconfig.UseSSL = true\n\tconfig.InvalidSSL = false\n\tconfig.Karma = true\n\tconfig.ParseLinks = false\n\tconfig.Define = true\n\treturn config\n}", "title": "" }, { "docid": "c1cdb0d83ec86fa6358133d925c3406e", "score": "0.70102596", "text": "func StandardConfig() Config {\n\treturn Config{NilanAddress: \"192.168.5.107:502\"}\n}", "title": "" }, { "docid": "abfb0c7f45461fa7a3199101027d0169", "score": "0.700316", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tMailboxSize: 256,\n\t}\n}", "title": "" }, { "docid": "30d12575fb56bdd8bf12fc1274826378", "score": "0.6986899", "text": "func DefaultConfig(expire time.Duration) *Config {\n\treturn &Config{\n\t\tShards: 1024,\n\t\tForceSet: false,\n\t\tExpire: expire,\n\t\tVacuum: 10 * time.Minute,\n\t\tMaxSize: 0,\n\t\tVerboseLevel: VerboseLevelNone,\n\t}\n}", "title": "" }, { "docid": "c64833b60cf54d3243a5d176ac708ef8", "score": "0.6975748", "text": "func NewDefaultConfig() *Config {\n\treturn &Config{\n\t\tlogFormatter: &log.TextFormatter{},\n\t\tlogOutput: os.Stderr,\n\t\tlogLevel: log.InfoLevel,\n\t\tPgHost: \"localhost\",\n\t\tPgPort: \"5432\",\n\t\tPgDatabase: \"postgres\",\n\t\tPgUser: \"postgres\",\n\t\tPgPassword: \"password\",\n\t\tPgSSLMode: \"disable\",\n\t\tGOCDHost: \"http://localhost\",\n\t\tGOCDPort: \"8153\",\n\t\tGOCDUser: \"\",\n\t\tGOCDPassword: \"\",\n\t\tGOCDTimeout: \"120\",\n\t\tSMTPHost: \"localhost\",\n\t\tSMTPPort: \"25\",\n\t\tSMTPEmail: \"admin@localhost\",\n\t\tSMTPName: \"admin\",\n\t}\n}", "title": "" }, { "docid": "230a23273c17fc7b3e6e7c668f0c0445", "score": "0.6972093", "text": "func NewDefaultConfig() *Config {\n\treturn &Config{\n\t\tBlockSize: DefaultBlockSize,\n\t\tChunkSize: DefaultChunkSize,\n\t\tIndexFile: DefaultIndexfile,\n\t}\n}", "title": "" }, { "docid": "4b15420fc61fc23f448042c224c86372", "score": "0.69712585", "text": "func Default() []Config {\n\tcfg := []Config{\n\t\tConfig{\n\t\t\tRoot: DefaultRoot,\n\t\t\tHost: Host,\n\t\t\tPort: Port,\n\t\t},\n\t}\n\treturn cfg\n}", "title": "" }, { "docid": "f85fdf54dbaf9dad896993967f771589", "score": "0.6970197", "text": "func NewDefaultConfiguration(ext External) configuration {\n\treturn configuration{\n\t\tSystemName: \"daos_server\",\n\t\tSocketDir: \"/var/run/daos_server\",\n\t\tAuto: true,\n\t\tFormat: SAFE,\n\t\tAccessPoints: []string{\"localhost\"},\n\t\tPort: 10000,\n\t\tCert: \"./.daos/daos_server.crt\",\n\t\tKey: \"./.daos/daos_server.key\",\n\t\tScmMountPath: \"/mnt/daos\",\n\t\tHyperthreads: false,\n\t\tPath: \"etc/daos_server.yml\",\n\t\text: ext,\n\t}\n}", "title": "" }, { "docid": "81da9c3d69aaae0dd32c68e244386d18", "score": "0.6960037", "text": "func configDefault(config ...Config) Config {\n\t// Return default config if nothing provided\n\tif len(config) < 1 {\n\t\treturn ConfigDefault\n\t}\n\n\t// Override default config\n\tcfg := config[0]\n\n\t// Set default values for missing fields in overrides\n\tif cfg.Next == nil {\n\t\tcfg.Next = ConfigDefault.Next\n\t}\n\n\tif cfg.Algorithm == \"\" {\n\t\tcfg.Algorithm = ConfigDefault.Algorithm\n\t}\n\n\tif cfg.GetPrivateKeyFunc == nil {\n\t\tcfg.GetPrivateKeyFunc = ConfigDefault.GetPrivateKeyFunc\n\t}\n\n\tif cfg.SignatureQueryKey == \"\" {\n\t\tcfg.SignatureQueryKey = ConfigDefault.SignatureQueryKey\n\t}\n\n\tif cfg.PrivateKeyQueryKey == \"\" {\n\t\tcfg.PrivateKeyQueryKey = ConfigDefault.PrivateKeyQueryKey\n\t}\n\n\tif cfg.ExpiresQueryKey == \"\" {\n\t\tcfg.ExpiresQueryKey = ConfigDefault.ExpiresQueryKey\n\t}\n\n\tif cfg.BodyHashQueryKey == \"\" {\n\t\tcfg.BodyHashQueryKey = ConfigDefault.BodyHashQueryKey\n\t}\n\n\treturn cfg\n}", "title": "" }, { "docid": "13ee06dc9fbb62f6b700b44d49d21d64", "score": "0.69594246", "text": "func NewDefaultConfig(chainID int) Config {\n\tconfig := Config{\n\t\tNetwork: &Network{\n\t\t\tServerAddress: Chains()[chainID],\n\t\t\tNetworkRetriesCount: 5,\n\t\t\tMessageRetriesCount: 5,\n\t\t\tMessageProcessingTimeout: 40000, //ms\n\t\t\tWaitForTimeout: 40000, //ms\n\t\t\tOutOfSyncThreshold: 15000, //ms\n\t\t\tAccessKey: \"\",\n\t\t},\n\t\tCrypto: &Crypto{\n\t\t\tMnemonicDictionary: 1,\n\t\t\tMnemonicWordCount: 12,\n\t\t\tHdkeyDerivationPath: \"\",\n\t\t},\n\t\tAbi: &AbiConfig{\n\t\t\tWorkchain: 0,\n\t\t\tMessageExpirationTimeout: 40000, //ms\n\t\t\tMessageExpirationTimeoutGrowFactor: 1.5},\n\t}\n\n\treturn config\n}", "title": "" }, { "docid": "d300fabb5dc905b8f033bb375d0ece09", "score": "0.6933959", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Dependencies.\n\t\tLogger: nil,\n\n\t\t// Settings.\n\t\tFlag: nil,\n\t\tViper: nil,\n\n\t\tDescription: \"\",\n\t\tGitCommit: \"\",\n\t\tName: \"\",\n\t\tSource: \"\",\n\t}\n}", "title": "" }, { "docid": "abc8e89dd318a86786a9b7f249c23225", "score": "0.6927189", "text": "func NewDefaultConfig() *Config {\n\treturn &Config{\n\t\tPropagationTimeout: env.GetOrDefaultSecond(EnvPropagationTimeout, dns01.DefaultPropagationTimeout),\n\t\tPollingInterval: env.GetOrDefaultSecond(EnvPollingInterval, dns01.DefaultPollingInterval),\n\t}\n}", "title": "" }, { "docid": "70e845ded31df6a5686f7977c04d2155", "score": "0.6922766", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Dependencies.\n\t\tLogger: nil,\n\t}\n}", "title": "" }, { "docid": "68a02a0d9dd86dcee74fc991eb3ec968", "score": "0.69124687", "text": "func DefaultConfig() string {\n\treturn configContent\n}", "title": "" }, { "docid": "54ff8e67eeb568dbfd21af5a076a7bd3", "score": "0.6909246", "text": "func BuildDefaultConfiguration() Configuration {\n\treturn Configuration{\n\t\tHTTPAddress: \"[::]:8080\",\n\t\tSQLProtocol: \"mysql\",\n\t\tSQLAddress: \"root:rootpassword@tcp([::1]:3306)/db\",\n\t\tHashDifficulty: 12,\n\t\tAuthIssuer: \"trackit\",\n\t\tAuthSecret: []byte(\"trackitdefaultsecret\"),\n\t\tAwsRegion: \"us-west-2\",\n\t\tBackendId: \"dev\",\n\t}\n}", "title": "" }, { "docid": "5bbbaed1fc997729af129bc974ab6d9d", "score": "0.69065726", "text": "func Default() *ApplicationConfiguration {\n\treturn &ApplicationConfiguration{\n\t\tLogConfig: logging.DefaultConfiguration(),\n\t\tServerConfig: server.DefaultConfiguration(),\n\t\tDatabaseConfig: database.DefaultConfiguration(),\n\t}\n}", "title": "" }, { "docid": "9d2e70a2f538ad975e6b16eb2ec92c7f", "score": "0.6904858", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tUserAgent: \"opentelemetry-collector-contrib {{version}}\",\n\t\tMetricConfig: MetricConfig{\n\t\t\tKnownDomains: domains,\n\t\t\tPrefix: \"workload.googleapis.com\",\n\t\t\tCreateMetricDescriptorBufferSize: 10,\n\t\t\tInstrumentationLibraryLabels: true,\n\t\t\tServiceResourceLabels: true,\n\t\t\tCumulativeNormalization: true,\n\t\t\tGetMetricName: defaultGetMetricName,\n\t\t\tMapMonitoredResource: defaultResourceToMonitoredResource,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "deb0dc2725e0d170d6b906868b28dabe", "score": "0.69046706", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\t// Dependencies.\n\t\tLogger: nil,\n\t\tVaultClient: nil,\n\n\t\t// Settings.\n\t\tFlag: nil,\n\t\tViper: nil,\n\n\t\tDescription: \"\",\n\t\tGitCommit: \"\",\n\t\tName: \"\",\n\t\tSource: \"\",\n\t}\n}", "title": "" }, { "docid": "ec8599b7be682957deb9c95b2069ab37", "score": "0.6900414", "text": "func NewDefaultConfig() *Config {\n\treturn &Config{\n\t\tTTL: env.GetOrDefaultInt(\"OVH_TTL\", 120),\n\t\tPropagationTimeout: env.GetOrDefaultSecond(\"OVH_PROPAGATION_TIMEOUT\", acme.DefaultPropagationTimeout),\n\t\tPollingInterval: env.GetOrDefaultSecond(\"OVH_POLLING_INTERVAL\", acme.DefaultPollingInterval),\n\t\tHTTPClient: &http.Client{\n\t\t\tTimeout: env.GetOrDefaultSecond(\"OVH_HTTP_TIMEOUT\", ovh.DefaultTimeout),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "c2e640fae1629e4e35a53e26a7bd3d64", "score": "0.6896063", "text": "func NewDefaultConfig(addr, dbname, user, passwd string, ping bool) *Config {\n\tc := &Config{\n\t\tConfig: driver.NewConfig(),\n\t}\n\tc.Net = \"tcp\"\n\tc.Timeout = DefaultDialTimeout\n\tc.ReadTimeout = DefaultReadTimeout\n\tc.WriteTimeout = DefaultWriteTimeout\n\tc.MaxOpenConns = DefaultMaxOpenConns\n\tc.MaxIdleConns = DefaultMaxIdleConns\n\tc.MaxLifetime = DefaultMaxLifetime\n\t// Authentication\n\tc.Addr = addr\n\tc.DBName = dbname\n\tc.User = user\n\tc.Passwd = passwd\n\t// Ping test\n\tc.PingTest = false\n\n\treturn c\n}", "title": "" }, { "docid": "ccee05739bcc2ed7aad2ce02cfc27bb1", "score": "0.6894917", "text": "func DefaultConfig() Config {\n\treturn Config{\n\t\tBatchTimeout: time.Millisecond * time.Duration(50),\n\t\tMaxRetriesForPeer: 2,\n\t\tQueueSize: 20,\n\t\tBatchSize: 20,\n\t\tRequestTimeout: time.Second * time.Duration(10),\n\t\tMaxRetriesForRequest: 100,\n\t\tServeNewProtocol: true,\n\t}\n}", "title": "" }, { "docid": "1affe386e54c3cdd134a424f12508a4e", "score": "0.6885409", "text": "func NewDefaultConfig() *Config {\n\tbaseURL, err := url.Parse(env.GetOrDefaultString(EnvEndpoint, internal.DefaultBaseURL))\n\tif err != nil {\n\t\tbaseURL, _ = url.Parse(internal.DefaultBaseURL)\n\t}\n\n\treturn &Config{\n\t\tBaseURL: baseURL,\n\t\tTTL: env.GetOrDefaultInt(EnvTTL, 300),\n\t\tPropagationTimeout: env.GetOrDefaultSecond(EnvPropagationTimeout, 60*time.Second),\n\t\tPollingInterval: env.GetOrDefaultSecond(EnvPollingInterval, 5*time.Second),\n\t\tSequenceInterval: env.GetOrDefaultSecond(EnvSequenceInterval, dns01.DefaultPropagationTimeout),\n\t\tHTTPClient: &http.Client{\n\t\t\tTimeout: env.GetOrDefaultSecond(EnvHTTPTimeout, 30*time.Second),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "0f94a8b6257328ab0258281f9bf9cd28", "score": "0.68830884", "text": "func Default(getenv func(string) string) (Config, error) {\n\treturn Custom(getenv, DefaultConfigPath)\n}", "title": "" }, { "docid": "6059a31b1900487bbca45718bff0b3fa", "score": "0.6882557", "text": "func NewDefaultConfig(masterIP string, masterPort int32) (*Config, error) {\n\tvar err error\n\tk8configpath, _ := osutils.K8ConfigValidPath()\n\tdatafiles := osutils.CreateDataDirPath(DefaultDataDirPath)\n\n\tc := &Config{\n\t\tNoSSL: true,\n\t\tNoAuth: true,\n\t\tSafemode: true,\n\t\tLogLevel: 5,\n\t\tDB: &DBConfig{\n\t\t\tDriver: Badger,\n\t\t\tName: DefaultDBBucket,\n\t\t\tDataDirPath: datafiles,\n\t\t\tEventBuffer: DefaultDBEventBuffer,\n\t\t},\n\t\tK8: &KubeConfig{\n\t\t\tInCluster: false,\n\t\t\tPath: k8configpath,\n\t\t},\n\t\tDomain: DefaultDomain,\n\t\tDisableFlow: true,\n\t\tNotebooks: &NotebookConfig{\n\t\t\tIP: DefaultNotebookPort,\n\t\t\tPort: DefaultNotebookIP,\n\t\t\tBasePath: DefaultNotebookBasePath,\n\t\t\tCommand: NbDefaultCommand,\n\t\t\tBackgroundCmd: NbDefaultBackgroundCmd,\n\t\t},\n\t\tNbScheduler: &NbSchedulerConfig{\n\t\t\tConcurrency: 0,\n\t\t\tSweepInterval: NbDefaultSweepInterval, // Minutes\n\t\t\tSaveInterval: NbDefaultSaveInterval, // Seconds\n\t\t},\n\t\tJobs: &JobConfig{\n\t\t\tBackoffLimit: JobDefaultBackoff,\n\t\t\tDeadlineSeconds: JobDefaultDeadline,\n\t\t},\n\t\tPods: &PodConfig{},\n\t}\n\n\tif masterIP != \"\" {\n\t\tc.MasterIP = masterIP\n\t}\n\n\tif masterPort != 0 {\n\t\tc.MasterPort = masterPort\n\t} else {\n\t\tc.MasterPort = DefaultMasterPort\n\t}\n\n\tif c.PublicInterface != \"\" {\n\t\tproto := \"http://\"\n\t\tif !c.NoSSL {\n\t\t\tproto = \"https://\"\n\t\t}\n\n\t\tc.PublicInterface = proto + masterIP + \":\" + string(masterPort)\n\t}\n\n\tc, err = SaveConfig(c, \"\")\n\tif err != nil {\n\t\tfmt.Println(\"Failed to write default config at default path: %\", err)\n\t}\n\treturn c, nil\n}", "title": "" } ]
bdfd4c38d971e3e3b9db15021230f1e2
Code gets the status code for the update repository17 no content response
[ { "docid": "8ffd62285a66c2a643682830d6ac0c53", "score": "0.82728845", "text": "func (o *UpdateRepository17NoContent) Code() int {\n\treturn 204\n}", "title": "" } ]
[ { "docid": "dd443055bf126b08d7bc98e29f06f7b6", "score": "0.82775795", "text": "func (o *UpdateRepository6NoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "93b65b50f1b7ada381a972fcb9a636a2", "score": "0.8225618", "text": "func (o *UpdateRepositoryNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "d469000cbcb878b81007f35ae21ab7da", "score": "0.819404", "text": "func (o *UpdateRepository34NoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "e549364d10219d7421276f8c2e8c275c", "score": "0.8172998", "text": "func (o *UpdateRepository30NoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "188ce4ffe1ac7e12f7594797da79865a", "score": "0.776755", "text": "func (o *UpdateRepository17NotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "1ca8d580aa5ef3478f69eeafdbd0af9e", "score": "0.7688359", "text": "func (o *UpdateRepository30NotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "a158a24f76a4ae8c8915315f66b6e3aa", "score": "0.7655038", "text": "func (o *UpdateRepositoryUnauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "942b9a872cd465d7c07d60227bc8462e", "score": "0.76023585", "text": "func (o *UpdateRepository17Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "67f0bba27bb06affea71b26a7d6328b1", "score": "0.7535039", "text": "func (o *UpdateRepository30Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "e987e703c503ad98858b67891280d02d", "score": "0.7530031", "text": "func (o *UpdateRepository34Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "7d9fb8c6729a908afd3af41e92b42c22", "score": "0.75149554", "text": "func (o *UpdateRepository6Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "87312d38258ec7525b61717a196ce339", "score": "0.75093013", "text": "func (o *UpdateRepositoryForbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "784b7a916048e7bb27eb95e4fc415c82", "score": "0.7421517", "text": "func (o *UpdateStatusDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "e40d2f3603a6ccc9be089f68de43d87c", "score": "0.7351438", "text": "func (o *UpdateRepository17Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "cf0905aa397f6e9a559e42d4a38ed274", "score": "0.732739", "text": "func (o *UpdateRepository34Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "1dc6edf5a9b1696bbe98fc1c88433310", "score": "0.73108053", "text": "func (o *UpdateRepository6Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "2cb1c9759ab5e15105d06603e45b2e29", "score": "0.7281827", "text": "func (o *UpdatePlatformDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "25dd1892749148a4e04627ef1989887a", "score": "0.7270489", "text": "func (o *UpdateImageDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "8edb0c3c90d06e0b3a81f7e4bf3c6dbd", "score": "0.7256453", "text": "func (o *UpdateRepository30Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "e4be7ba5db9cf994fd9b316538dee5fa", "score": "0.72554773", "text": "func (o *UpdateProjectDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "1477fe662ab090713d9f78c3595ef48f", "score": "0.7254907", "text": "func (o *GetDaemonUpdateDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "7ced10f8549b49c14bf9cb83717e4219", "score": "0.72367615", "text": "func (o *GetVersionNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "51ff1e69fb2de131a4d85b42cfdbadfc", "score": "0.7179692", "text": "func (o *TournamentServiceUpdateDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "b931c8969b53803ea6676ba44581f408", "score": "0.7164424", "text": "func (o *UpdateAppDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "dd4f196e0f42441556bd0d5000dbefc7", "score": "0.7136475", "text": "func (o *UpdateTCPLbNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "c25ea5185572aaf6bd1c9522ecbc03a4", "score": "0.7091495", "text": "func (o *UpdatePolicyContainerV1OK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "744ac403ac0ecb01b82b37a7173b6cf3", "score": "0.70853597", "text": "func (o *PatchOrganizationNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "f7b1f6ae34588cc82e241a3eb70c4f55", "score": "0.70326036", "text": "func (o *UpdateDeviceDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "c3edf8ed9463258dbd2e034b68a3ac30", "score": "0.7026821", "text": "func (o *SyncAgentNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "890feca0d39bfa192333ecf0d3283fbf", "score": "0.7008042", "text": "func (o *CreateRepository10Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "3f21f450cab294a99c5cf783868f6f81", "score": "0.7007382", "text": "func (o *PetUpdateNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "c2cfd0be23b1ee05687131c1c7234901", "score": "0.69892997", "text": "func (o *QueryCombinedSensorUpdateBuildsOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "f067ee0bd8d8c75ccd1e5836ee82b713", "score": "0.6975177", "text": "func (o *QueryCombinedSensorUpdateBuildsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "160a1bd06de2b1d75521eec8b8ab8c26", "score": "0.69637007", "text": "func (o *UpdateSiteDeployDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "4a29fbee74503f5d7aa2375fec00a151", "score": "0.69533706", "text": "func (o *UpdateIOCDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "76747444e30abc3c72b9160de809c5ea", "score": "0.694868", "text": "func (o *ListArchivedProjectsNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "63a0ee7d3e376600e143296057f1ccd1", "score": "0.6930181", "text": "func (o *UpdateTCPLbNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "c8b37900058af79a18cb40a399e1d8f5", "score": "0.6920381", "text": "func (o *UpdateUserDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "bc378643e37c6e9b89d6861f9527c8ae", "score": "0.69148093", "text": "func (o *UpdateRoomDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "2e650e9ab29730b85084f035fcc70240", "score": "0.690622", "text": "func (o *CreateRepository16Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "eb4a02606f5b298cbf5af1f8df586e9e", "score": "0.6898136", "text": "func (o *UpdateCurrentUserSettingsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "1040ad59dc4f79c72d0aa17d9c8bd2c5", "score": "0.6894488", "text": "func (o *UpdateConnectionDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "3bc7babbf457f180fcb55f9613dc9f4c", "score": "0.68895614", "text": "func (o *CreateRepository4Unauthorized) Code() int {\n\treturn 401\n}", "title": "" }, { "docid": "e4c4508b4a7fa5af44bbaa8ac19bccc3", "score": "0.68860316", "text": "func (o *LicenseManagerModifyDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "7479f62c72994fdeca20f68b61a8b365", "score": "0.68743753", "text": "func (o *AddLibcVersionRevisionDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "342fdc79fd32f31202ff1c95eb8d32c6", "score": "0.68684417", "text": "func (o *GetVersionOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "13d9dba7682b5a489eb6728a1c33d7e9", "score": "0.6866615", "text": "func (o *GetNiaapiDcnmLatestMaintainedReleasesMoidDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "0ea89e5e48f3db15f01f20d181a13cf0", "score": "0.6861332", "text": "func (o *ArchiveProjectNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "16e7e817ecf96fe610d6ec87411fd167", "score": "0.685109", "text": "func (o *QuerySensorUpdatePoliciesOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "877acdee35180ead9f1067472d315db8", "score": "0.684846", "text": "func (o *UpdateAntivirusSettingsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "b23d9927663c0a50178edfa8e7866b5d", "score": "0.6832017", "text": "func (o *CreateRepository10Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "8d7655100955d06bc00c570616cb92b3", "score": "0.6831525", "text": "func (o *CreateRepository10Created) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "04536627aaa567fa8a32d3676ab4967f", "score": "0.6831441", "text": "func (o *PutDeploymentResourceProxyRequestsOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "898690fb169520051e0f5db123ec5763", "score": "0.6820086", "text": "func (o *PatchHyperflexHxdpVersionsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "48d91677164edf64f1e9a68aab3e0aec", "score": "0.679796", "text": "func (o *ArchiveProjectOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "9d2b251cc61f34803b99038261352e62", "score": "0.6791856", "text": "func (o *ListArchivedProjectsOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "6eabd0b24ff585a5995cdb77a77d9c97", "score": "0.67892396", "text": "func (o *ArchiveUploadV2OK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "744932f4c15fae371773a7fb428725c5", "score": "0.6787285", "text": "func (o *GetProjectDashboardNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "e11a6c0b536addb1b1e752c2b8fd3808", "score": "0.67810017", "text": "func (o *PatchOrganizationDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "80c81148496e99193ee563ab2f3f2035", "score": "0.6771166", "text": "func (o *GetOrganizationStatsNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "608be35168dbafc117446d53deaed726", "score": "0.6760739", "text": "func (o *UpdateRuleDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "71aff3dfc24d07e2e176c4ca3d5064e3", "score": "0.6757346", "text": "func (o *PatchOrganizationOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "45a1ad7d69b75149a2de22174f88e239", "score": "0.67569536", "text": "func (o *AddIngredientVersionRevisionDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "0828388579b90349ba56a70a730ec865", "score": "0.6747439", "text": "func (o *AddServerGroupInUpstreamNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "9c431e4cfe815d7270983897c0ef7e39", "score": "0.6746107", "text": "func (o *UpgradeDeploymentStatelessResourceNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "07121d7c376c2bd5d8704b4c05d2bfc2", "score": "0.67417014", "text": "func (o *CreateRepository4Created) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "1db8d3960e31374dff8e65227141ceab", "score": "0.67359436", "text": "func (o *UpdateProjectTeamsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "b4dd08515d90e7ba7d4f1623857ca5c3", "score": "0.67311525", "text": "func (o *UpdateSingleClusterDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "169318dd10b0a9f1d37e6148b824957c", "score": "0.6730606", "text": "func (o *QtreeModifyDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "a834164daa4ef652a4bf1f2836b720b6", "score": "0.67155576", "text": "func (o *CreateRepository16Created) Code() int {\n\treturn 201\n}", "title": "" }, { "docid": "9a5a7d589632253e4889ab8565516f7d", "score": "0.6713118", "text": "func (o *UpdateSignatureTypeDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "70c52a129ff41029031f492d77762790", "score": "0.6713068", "text": "func (o *QueryCombinedSensorUpdatePolicyMembersDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "a420f97fc088aa8bdbcae4bb9e9eef08", "score": "0.66895217", "text": "func (o *PatchHubComponentDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "c12cd15b3925b517bcb15271c9b3172e", "score": "0.66808665", "text": "func (o *ListVersionNamesNoContent) Code() int {\n\treturn 204\n}", "title": "" }, { "docid": "28bf2b86a9d5d8e28f410092ac040703", "score": "0.668005", "text": "func (o *CreateRepository4Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "e457ceb1379e468562d3dd7edc59f426", "score": "0.6675023", "text": "func (o *PutDeploymentResourceProxyRequestsNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "5d9f7f606d3831980426fd8fb36fa80d", "score": "0.6671545", "text": "func (o *UpdateMLExclusionsV1OK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "dbe879660f1433a6061f3347e5b9cb90", "score": "0.66672033", "text": "func (s *InvalidDataRepositoryType) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "d62160c322f7af3c6cb6dbdcb388ad44", "score": "0.66659", "text": "func (o *UpdateRepositoryNoContent) IsCode(code int) bool {\n\treturn code == 204\n}", "title": "" }, { "docid": "36e0e487817040dc97384d67b39828d2", "score": "0.6664618", "text": "func (o *AddServerGroupInUpstreamNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "2f1eae0438dc90d6b764271308f425ff", "score": "0.6661801", "text": "func (o *SyncAgentOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "7805df330e19e203a04bec6d582f6a37", "score": "0.66615164", "text": "func (o *PatchInstalledAppTagsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "ecb472aeb636d983e9348447b665b1ab", "score": "0.6660245", "text": "func (o *GetNotificationsV1OK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "d9cbf5613b2eb282fb13db7f05bb5e34", "score": "0.6651323", "text": "func (o *GetVersionDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "fed48c27188853f1ff0b4fb2ed320bee", "score": "0.6645397", "text": "func (o *PatchBasketsByIDDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "f643e33b895d86c1c0d26ad4e40c03bb", "score": "0.6634548", "text": "func (o *CreateRepository16Forbidden) Code() int {\n\treturn 403\n}", "title": "" }, { "docid": "dedbbf667c93410749d87e535368c1af", "score": "0.66272616", "text": "func (o *PatchAccessResourceDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "5d04fb3dd70bd7c3974983b42381d1ca", "score": "0.66265893", "text": "func (o *APIServiceStatusDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "09d53403c5154b8d6945b024a6a67d33", "score": "0.6624528", "text": "func (o *UpdateAccountMemberDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "f5978e1e7fa5a60247f35eb31860555f", "score": "0.6623694", "text": "func (o *ListArchivedProjectsNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "cb730d0197f5a73c5690c0e603f44f34", "score": "0.6615926", "text": "func (o *GetProjectDashboardOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "6735ac3a81ef5204ec5bd11fdc31b80d", "score": "0.6608081", "text": "func (o *GetFirmwareUpgradeStatusesMoidDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "a3312afe462a229ff5bac74ef3105c59", "score": "0.65994114", "text": "func (s *ConflictingResourceUpdateException) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "title": "" }, { "docid": "fcde9d206ba39a048716a5c13e984a0b", "score": "0.6597778", "text": "func (o *PostFirmwareEulasDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "b6222dcc350891530bd9e69a73cbc2ce", "score": "0.6591558", "text": "func (o *ListArchivedProjectsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "44544db611f1b3c8c4194a8951b155b6", "score": "0.6589415", "text": "func (o *UpdateMsgVpnJndiTopicDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "a4cd1d295857d0a7a262c33bfa051489", "score": "0.658132", "text": "func (o *RTRCreatePutFilesOK) Code() int {\n\treturn 200\n}", "title": "" }, { "docid": "f4f29b9dd38944a22255a0412457f012", "score": "0.65807474", "text": "func (o *UpdateDmrClusterLinkDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "694ee5a5222f94ec0cf6e0fe48779417", "score": "0.657936", "text": "func (o *UpdatePrivilege3NotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "f4ab891aab6270472fc41620df2cf8b0", "score": "0.6578575", "text": "func (o *CreatePlanRevisionDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" } ]
ed2479a5aed8ede988eda5de1d4db15d
DurationToMillis returns d in terms of milliseconds.
[ { "docid": "7f9d5bdb2f9c7a4f8220ff2b60c91fdf", "score": "0.832879", "text": "func DurationToMillis(d time.Duration) int64 {\n\treturn d.Nanoseconds() / nanosToMillisDenominator\n}", "title": "" } ]
[ { "docid": "0985b07b3ac11d0bd47e5b22f21138fd", "score": "0.8465447", "text": "func durationToMillis(d time.Duration) float64 {\n\treturn float64(d.Nanoseconds()) / float64(time.Millisecond.Nanoseconds())\n}", "title": "" }, { "docid": "05d7bfd6d89b76d5c631063993b06b57", "score": "0.7415151", "text": "func toMilliseconds(t time.Duration) float64 {\n\treturn float64(t) / float64(time.Millisecond)\n}", "title": "" }, { "docid": "e566cbbc87511413ba2f740702f7610e", "score": "0.73492515", "text": "func getMilliseconds(d time.Duration) float64 {\n\treturn float64(d.Nanoseconds()) / float64(time.Millisecond)\n}", "title": "" }, { "docid": "ca01c6017ba23937c6401310bf7e5f5d", "score": "0.7126577", "text": "func Milliseconds(d time.Duration) int {\n\treturn int(d / time.Millisecond)\n}", "title": "" }, { "docid": "3cc2d13ad0eaf1867fac13e05211406f", "score": "0.66664153", "text": "func (vf ViewFuncs) DurationRoundMillis(d time.Duration) time.Duration {\n\treturn d.Round(time.Millisecond)\n}", "title": "" }, { "docid": "10066e3d413392341ed53151b3fd656f", "score": "0.66349375", "text": "func RoundToMS(d time.Duration) int64 {\n\treturn int64((d + (500 * time.Microsecond)) / time.Millisecond)\n}", "title": "" }, { "docid": "38be9af34caeaa962c199fe35328c021", "score": "0.6629435", "text": "func DurationToTimeMillisField(duration time.Duration) *lager.KVPairs {\n\treturn lager.Pairs(\"grpc.time_ms\", durationToMilliseconds(duration))\n}", "title": "" }, { "docid": "dc18e518bec08416ddbf6c105bc6ea9c", "score": "0.6603708", "text": "func ToMilliseconds(t time.Time) int64 {\n\treturn t.UnixMilli()\n}", "title": "" }, { "docid": "aa2f6e2575b9f227a68c525b14821382", "score": "0.6590215", "text": "func ToMilliseconds(t time.Time) int64 {\n\treturn t.UnixNano() / nanosToMillisDenominator\n}", "title": "" }, { "docid": "ca831f96b38439ca01e8db6dc6e79575", "score": "0.65478414", "text": "func TimeToMillis(t time.Time) int64 {\n\treturn t.UnixNano() / int64(time.Millisecond)\n}", "title": "" }, { "docid": "f7e0e77995251496b0f512c816c94e88", "score": "0.62144405", "text": "func DurationToTimeMillisFields(duration time.Duration) Fields {\n\treturn Fields{\"http.time_ms\", fmt.Sprintf(\"%v\", durationToMilliseconds(duration))}\n}", "title": "" }, { "docid": "62f02ed3d5a1844ecc20f2e479f84301", "score": "0.61345184", "text": "func TimeToMilliseconds(t time.Time) int64 {\n\t// Convert to seconds.\n\tsec := float64(t.Unix()) + float64(t.Nanosecond())/1e9\n\n\t// Parse seconds.\n\ts, ns := math.Modf(sec)\n\n\t// Round nanoseconds part.\n\tns = math.Round(ns*1000) / 1000\n\n\t// Convert to millis.\n\treturn (int64(s) * 1e3) + (int64(ns * 1e3))\n}", "title": "" }, { "docid": "2c1678b1029775b3c7b308aedcaa044b", "score": "0.6072199", "text": "func (d Duration) Minutes() float64", "title": "" }, { "docid": "b4cf7019fd0b83a4e5ed9570616da497", "score": "0.6029192", "text": "func ToMillis(value interface{}) Expr {\n\treturn fn1(\"to_millis\", value)\n}", "title": "" }, { "docid": "2a99f2073d9212df6cb08cd96092ec45", "score": "0.60230666", "text": "func GetDurationInMillseconds(start time.Time) float64 {\n\tend := time.Now()\n\tduration := end.Sub(start)\n\tmilliseconds := float64(duration) / float64(time.Millisecond)\n\trounded := float64(int(milliseconds*100+.5)) / 100\n\treturn rounded\n}", "title": "" }, { "docid": "67e9d49e34314d8f399fe9e73c58a19f", "score": "0.59621465", "text": "func (i ID) Milliseconds() time.Duration {\n\tt := i >> 22\n\treturn time.Duration(t) * time.Millisecond\n}", "title": "" }, { "docid": "65700c827536d99838eb9804b6f1bbb3", "score": "0.58896273", "text": "func DurationToFloat64(goal time.Duration) float64 {\n\treturn float64(goal) / float64(time.Millisecond)\n}", "title": "" }, { "docid": "22995d57808c2f63b6b241d2269caff5", "score": "0.5857358", "text": "func String2Milliseconds(t string) int {\n\tlast := t[len(t)-1]\n\tdigits := t[0 : len(t)-1]\n\tnum, _ := strconv.Atoi(digits)\n\tswitch last {\n\tcase 's':\n\t\treturn num * 1000\n\tcase 'm':\n\t\treturn num * 60 * 1000\n\tcase 'h':\n\t\treturn num * 3600 * 1000\n\tcase 'd':\n\t\treturn num * 24 * 3600 * 1000\n\tdefault:\n\t\treturn num * 1000\n\t}\n}", "title": "" }, { "docid": "1a156b4ba2b0ac409128134ec96b0e13", "score": "0.5810456", "text": "func (s *OutputDetail) SetDurationInMs(v int64) *OutputDetail {\n\ts.DurationInMs = &v\n\treturn s\n}", "title": "" }, { "docid": "d602c9a7ea30f9c14745267fea369c7b", "score": "0.57535815", "text": "func toMicros(d *durpb.Duration) int64 {\n\tif d == nil {\n\t\treturn 0\n\t}\n\treturn 1e6*d.Seconds + int64(1e-3*float64(d.Nanos))\n}", "title": "" }, { "docid": "d8b6fafecbcf4305da37fd8085533f97", "score": "0.5720826", "text": "func TruncateDuration(d time.Duration) time.Duration {\n\treturn -(d - d%(time.Duration(1)*time.Second))\n}", "title": "" }, { "docid": "bfdaf23aaa5c2a6bcc8b3127199bede7", "score": "0.5663445", "text": "func (e Extent) Milliseconds() float64 {\n\tmillis := e / Millisecond\n\tnsec := e % millis\n\treturn float64(millis) + float64(nsec)/1e6\n}", "title": "" }, { "docid": "b6bb7059cd70826453689f67399619de", "score": "0.5634485", "text": "func (d Duration) Seconds() float64", "title": "" }, { "docid": "4ce8289154de3ad6cf68932e4ad21f2e", "score": "0.5625265", "text": "func Duration(d time.Duration) *duration.Duration {\n\tif d == 0 {\n\t\treturn nil\n\t}\n\tnanos := d.Nanoseconds()\n\tsecs := nanos / 1e9\n\tnanos -= secs * 1e9\n\n\treturn &duration.Duration{Seconds: int64(secs), Nanos: int32(nanos)}\n}", "title": "" }, { "docid": "ded22a8048e09adeeff5c3d0970c5c0d", "score": "0.5620352", "text": "func scaleDuration(d time.Duration, factor float64) time.Duration {\n\treturn time.Duration(float64(d) * factor)\n}", "title": "" }, { "docid": "1157b08279cd4149f5ca95fd08ec673a", "score": "0.55437154", "text": "func (c *EvalContext) GetDurationMs() float64 {\n\treturn float64(c.EndTime.Nanosecond()-c.StartTime.Nanosecond()) / float64(1000000)\n}", "title": "" }, { "docid": "b1ab11f746c7f1abf6683d57dbda8119", "score": "0.5497298", "text": "func roundDuration(duration time.Duration) time.Duration {\n\troundingFactor := time.Millisecond\n\n\tif duration.Milliseconds() >= 1000 {\n\t\troundingFactor = time.Second\n\t}\n\n\treturn duration.Round(roundingFactor)\n}", "title": "" }, { "docid": "d3406cee036e94a009d2c2b73cb854d7", "score": "0.54339826", "text": "func Duration(d *durationpb.Duration) string {\n\treturn units.HumanDuration(d.AsDuration())\n}", "title": "" }, { "docid": "8a4ee9e6e74c30962df67c926e0313b8", "score": "0.54277027", "text": "func (lm *LatManager) toMs(t time.Duration) int64 {\n\tif t <= 0 {\n\t\treturn t.Milliseconds()\n\t}\n\treturn t.Milliseconds() + 1\n}", "title": "" }, { "docid": "44fddbc9de115afc5de2acb74fe23b54", "score": "0.54080576", "text": "func dur(ms int64) time.Duration {\n\treturn time.Duration(ms) * time.Millisecond\n}", "title": "" }, { "docid": "45da036f50c4016d524db21cb08d748c", "score": "0.5394163", "text": "func ToDuration(i interface{}) time.Duration {\n\tv, _ := ToDurationE(i)\n\treturn v\n}", "title": "" }, { "docid": "c2a735243285a3ae9f9566ede56a2c5e", "score": "0.53800267", "text": "func (d Duration) Nanoseconds() int64", "title": "" }, { "docid": "f4ccbc34f03c078b47d5cdc2c6218f23", "score": "0.53750813", "text": "func prettyDuration(t int64) string {\n\tif t/1000 > 0 {\n\t\treturn fmt.Sprintf(\"%.2fs\", float64(t)/1000)\n\t}\n\treturn fmt.Sprintf(\"%dms\", t)\n}", "title": "" }, { "docid": "205fc20a5bf7447526f74637c515ee8a", "score": "0.53631115", "text": "func DurationToTS(d time.Duration) uint64 {\n\treturn oracle.ComposeTS(d.Nanoseconds()/int64(time.Millisecond), 0)\n}", "title": "" }, { "docid": "101256606b4a6a939f7cbcf09c00c6a2", "score": "0.53597355", "text": "func (j *Job) Milliseconds() *Job {\n\tj.intervalUnit = millisecond\n\treturn j\n}", "title": "" }, { "docid": "cd3d5fc44e7d26a5d23e7f4432c28a86", "score": "0.5311605", "text": "func Duration(ns float64) Quantity {\n\treturn scale(ns, []Quantity{\n\t\t{float64(time.Nanosecond), \"ns\"},\n\t\t{float64(time.Microsecond), \"\\u00B5s\"}, // https://decodeunicode.org/U+00B5\n\t\t{float64(time.Millisecond), \"ms\"},\n\t\t{float64(time.Second), \"s\"},\n\t\t{float64(time.Minute), \"m\"},\n\t\t{float64(time.Hour), \"h\"},\n\t})\n}", "title": "" }, { "docid": "bcc16d08cf8c89434e9f7ba3d2542543", "score": "0.5304048", "text": "func Duration(d time.Duration) *time.Duration { return &d }", "title": "" }, { "docid": "bcc16d08cf8c89434e9f7ba3d2542543", "score": "0.5304048", "text": "func Duration(d time.Duration) *time.Duration { return &d }", "title": "" }, { "docid": "5206bcb1ede6444f887383f38603e311", "score": "0.5275108", "text": "func RoundDuration(d time.Duration) string {\n\td_str := d.String()\n\tunit_suffix := extractDurationUnitSuffix(d)\n\tsplit_d_strs := strings.SplitN(d_str, \".\", 2)\n\tif len(split_d_strs) == 1 {\n\t\treturn d_str\n\t} else {\n\t\treturn split_d_strs[0] + string(unit_suffix)\n\t}\n\n}", "title": "" }, { "docid": "e33476ae688199aab40bde4c5bec97d2", "score": "0.52645427", "text": "func FromDuration(dur *duration.Duration) time.Duration {\n\tif dur == nil {\n\t\treturn 0\n\t}\n\td := time.Duration(dur.Seconds) * time.Second\n\tif dur.Nanos > 0 {\n\t\td += time.Duration(dur.Nanos) * time.Nanosecond\n\t}\n\treturn d\n}", "title": "" }, { "docid": "e147d69a3b71b77e92bf24b35707cb2b", "score": "0.5257022", "text": "func usToMs(us uint64) float64 {\n\treturn float64(us) / 1000.0\n}", "title": "" }, { "docid": "472302ea7cba17851d520f71864951fc", "score": "0.5246538", "text": "func FormatDuration(d time.Duration) string {\n\tsec := uint64(d / time.Second)\n\treturn FormatSeconds(sec)\n}", "title": "" }, { "docid": "062add22e95a399b27d979bce0a960f0", "score": "0.5245093", "text": "func humanDuration(d time.Duration) string {\n\tt := int64(d.Seconds())\n\tday := t / 86400\n\thr := (t % 86400) / 3600\n\n\tif day > 0 {\n\t\tif hr != 0 {\n\t\t\treturn fmt.Sprintf(\"%d days %d hrs\", day, hr)\n\t\t}\n\t\treturn fmt.Sprintf(\"%d days\", day)\n\t}\n\n\tmin := (t % 3600) / 60\n\tif hr > 0 {\n\t\tif min != 0 {\n\t\t\treturn fmt.Sprintf(\"%d hrs %d mins\", hr, min)\n\t\t}\n\t\treturn fmt.Sprintf(\"%d hrs\", hr)\n\t}\n\n\tsec := t % 60\n\tif min > 0 {\n\t\tif sec != 0 {\n\t\t\treturn fmt.Sprintf(\"%d mins %d secs\", min, sec)\n\t\t}\n\t\treturn fmt.Sprintf(\"%d mins\", min)\n\t}\n\n\tif sec != 0 {\n\t\treturn fmt.Sprintf(\"%d secs\", sec)\n\t}\n\n\tif d > time.Millisecond {\n\t\treturn fmt.Sprintf(\"%d ms\", d/time.Millisecond)\n\t}\n\n\treturn \"0\"\n}", "title": "" }, { "docid": "927f9e3ee299388c2ca5894b3b7238fe", "score": "0.5236965", "text": "func FromMilliseconds(m int64) time.Time {\n\treturn time.UnixMilli(m)\n}", "title": "" }, { "docid": "f9e493481803e532daee17f8060c10df", "score": "0.52362585", "text": "func Duration(ds *dpb.Duration) time.Duration {\n\td, err := ptypes.Duration(ds)\n\tif err != nil {\n\t\treturn 0\n\t}\n\treturn d\n}", "title": "" }, { "docid": "c2214b377d8fa349e04be4f9cfb04c17", "score": "0.5209176", "text": "func GetMillisForTime(thisTime time.Time) int64 {\n\treturn thisTime.UnixNano() / int64(time.Millisecond)\n}", "title": "" }, { "docid": "c2214b377d8fa349e04be4f9cfb04c17", "score": "0.5209176", "text": "func GetMillisForTime(thisTime time.Time) int64 {\n\treturn thisTime.UnixNano() / int64(time.Millisecond)\n}", "title": "" }, { "docid": "bd641fac5e4bb8694dab13229c831f8c", "score": "0.5202455", "text": "func durationToTimespec(d time.Duration) unix.Timespec {\n\treturn unix.NsecToTimespec(d.Nanoseconds())\n}", "title": "" }, { "docid": "21bf1c816ba288329b165587dae588c5", "score": "0.51910454", "text": "func HumanizeDuration(d time.Duration) string {\n\treturn duration.Duration(d).String()\n}", "title": "" }, { "docid": "b85a0c7debb9ffd991eb09e567807425", "score": "0.51865625", "text": "func Milliseconds() int64 {\n\treturn time.Now().UnixMilli()\n}", "title": "" }, { "docid": "31bba1ea33615c1b936dd594d6ddea1a", "score": "0.51817906", "text": "func GetDuration(m video) uint32 {\n\tm.collectData()\n\tdata := m.getMvhdBox()\n\tif data.done {\n\t\treturn data.totalTimeSecond\n\t}\n\tdata.totalTimeSecond = byteSliceToInt(data.metadata[data.metadataIndex+21:data.metadataIndex+25]) / byteSliceToInt(data.metadata[data.metadataIndex+17:data.metadataIndex+21])\n\tdata.done = true\n\treturn data.totalTimeSecond\n}", "title": "" }, { "docid": "aed9fa429c0dcf46840d101b4e5377ea", "score": "0.5174126", "text": "func (s *ProducerStats) GetDuration() time.Duration {\n\tvar d time.Duration\n\tms := time.Millisecond\n\n\tif !s.start.IsZero() && !s.end.IsZero() {\n\t\td = s.end.Sub(s.start)\n\t}\n\n\t// Lets format the results a bit\n\tif mod := d % ms; mod+mod < ms {\n\t\td = d - mod\n\t} else {\n\t\td = d + ms - mod\n\t}\n\n\treturn d\n}", "title": "" }, { "docid": "63aa1c48042245d42660b377936df6d8", "score": "0.51648533", "text": "func (s *Stopwatch) ElapsedMilliSeconds() float64 {\n\treturn float64(s.Elapsed() / time.Millisecond)\n}", "title": "" }, { "docid": "81b1f9261c70bddb30fe9e993a47ab89", "score": "0.51561934", "text": "func MillisDurationEncoder(d time.Duration, enc PrimitiveArrayEncoder) {\n\tenc.AppendInt64(d.Nanoseconds() / 1e6)\n}", "title": "" }, { "docid": "23f408e57bc44b180b794c3f915123f4", "score": "0.5156133", "text": "func (d *DSNValues) GetDuration(param string, def time.Duration) time.Duration {\n\tif i, err := time.ParseDuration(d.Get(param)); err == nil {\n\t\treturn i\n\t}\n\n\treturn def\n}", "title": "" }, { "docid": "cddc2ad75135e2d07b8a2eece718077d", "score": "0.51531017", "text": "func (d *duration) Duration() time.Duration {\n\tif d == nil {\n\t\treturn time.Duration(0)\n\t}\n\treturn time.Duration(d.Seconds) * time.Second\n}", "title": "" }, { "docid": "84d8023f8586d4f085ee639383f59c6f", "score": "0.5148069", "text": "func GetMillis() int64 {\n\treturn time.Now().UnixNano() / int64(time.Millisecond)\n}", "title": "" }, { "docid": "84d8023f8586d4f085ee639383f59c6f", "score": "0.5148069", "text": "func GetMillis() int64 {\n\treturn time.Now().UnixNano() / int64(time.Millisecond)\n}", "title": "" }, { "docid": "84d8023f8586d4f085ee639383f59c6f", "score": "0.5148069", "text": "func GetMillis() int64 {\n\treturn time.Now().UnixNano() / int64(time.Millisecond)\n}", "title": "" }, { "docid": "84d8023f8586d4f085ee639383f59c6f", "score": "0.5148069", "text": "func GetMillis() int64 {\n\treturn time.Now().UnixNano() / int64(time.Millisecond)\n}", "title": "" }, { "docid": "02e43b02f7a4d8d405a61f5a8a3e85b4", "score": "0.5145015", "text": "func LongDuration(n time.Duration) string {\n\tp := func(n time.Duration, s string) string {\n\t\treturn fmt.Sprintf(\"%d%s\", n, s)\n\t}\n\n\tswitch {\n\tcase n < Sec:\n\t\treturn n.String()\n\tcase n < Min:\n\t\treturn p(n/Sec, \"s\")\n\tcase n < Hr:\n\t\treturn p(n/Min, \"m\")\n\tcase n < Day:\n\t\treturn p(n/Hr, \"h\")\n\tcase n < 2*Week:\n\t\treturn p(n/Day, \"d\")\n\tcase n < Month:\n\t\treturn p(n/Week, \"w\")\n\tcase n < Year:\n\t\treturn p(n/Month, \"mo\")\n\tdefault:\n\t\treturn p(n/Year, \"y\")\n\t}\n}", "title": "" }, { "docid": "9064dd34545a28a4f877256a73bd7148", "score": "0.51375383", "text": "func GetMillis() int64 {\n\tnow := time.Now()\n\tnanos := now.UnixNano()\n\tmillis := nanos / 1000000\n\treturn millis\n}", "title": "" }, { "docid": "59fa469a762aeb2cf6d934fab997567d", "score": "0.5114255", "text": "func convertDDToDMS(dd float64) (float64, float64, float64) {\n\tdegrees := math.Floor(dd)\n\tminutes := (dd - degrees) * 60\n\tseconds := (minutes - math.Floor(minutes)) * 60\n\treturn degrees, minutes, seconds\n}", "title": "" }, { "docid": "ab8ae08c0efcf2534b2bd1890e6b0d98", "score": "0.50992674", "text": "func (is *InternalStatser) TimingDuration(name string, d time.Duration, tags gostatsd.Tags) {\n\tis.TimingMS(name, float64(d)/float64(time.Millisecond), tags)\n}", "title": "" }, { "docid": "ab8ae08c0efcf2534b2bd1890e6b0d98", "score": "0.50992674", "text": "func (is *InternalStatser) TimingDuration(name string, d time.Duration, tags gostatsd.Tags) {\n\tis.TimingMS(name, float64(d)/float64(time.Millisecond), tags)\n}", "title": "" }, { "docid": "b35dc93d3cdbf24322c5b51993369649", "score": "0.50855035", "text": "func NewDuration(d time.Duration) *Duration {\n\treturn &Duration{value: int64(d)}\n}", "title": "" }, { "docid": "3eac8cb2ad4860de6e9f88d34fbb5a0f", "score": "0.50842714", "text": "func (ts *TimeSpan) Millisecond() *Number {\n\treturn NewNumber(ts.millisecond)\n}", "title": "" }, { "docid": "9ec4dcf5999a44b1fa5459b645297740", "score": "0.5078209", "text": "func (o *WarrantyDurationDto) GetDuration() int32 {\n\tif o == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\n\treturn o.Duration\n}", "title": "" }, { "docid": "091990e547277249c5b68d94735b98fb", "score": "0.50768214", "text": "func TimeInMilliseconds() int64 {\n\tnow := time.Now()\n\treturn int64(now.UnixNano() / 1000000)\n}", "title": "" }, { "docid": "74e4ca343b18307b8f51688454497977", "score": "0.50739795", "text": "func Duration(i interface{}) time.Duration {\n\tv, _ := DurationE(i)\n\treturn v\n}", "title": "" }, { "docid": "8146a4a3311fd80b2dcc05e4768580ba", "score": "0.50737154", "text": "func (d Duration) AsDuration() time.Duration {\n\treturn d.Duration\n}", "title": "" }, { "docid": "9a7f15c855535ac10ebf8b0201675f49", "score": "0.50712377", "text": "func (d *Datum) GetMysqlDuration() Duration {\n\treturn Duration{Duration: time.Duration(d.i), Fsp: int(int8(d.decimal))}\n}", "title": "" }, { "docid": "b4818164d0f3602b6775f591ee3e7412", "score": "0.50629467", "text": "func Duration(from interface{}) (time.Duration, error) {\n\treturn converter.Duration(from)\n}", "title": "" }, { "docid": "250d601d38399d29b78bbe3ea62eabf5", "score": "0.5062523", "text": "func (d *Duration) Duration() *time.Duration {\n\tif d == nil {\n\t\treturn nil\n\t}\n\tduration := time.Duration(*d)\n\treturn &duration\n}", "title": "" }, { "docid": "023ee68cfea709f081fda9f743700c8b", "score": "0.50502187", "text": "func NewDuration(d time.Duration) *Duration {\n\treturn (*Duration)(NewInt64(int64(d)))\n}", "title": "" }, { "docid": "726a90b66c537b60fca075d4051c9bc3", "score": "0.5046098", "text": "func unixNanoToMilliseconds(timestamp pcommon.Timestamp) int64 {\n\treturn int64(uint64(timestamp) / uint64(time.Millisecond))\n}", "title": "" }, { "docid": "bced27f03848e23d0c2bcb7be9c16cf7", "score": "0.50256723", "text": "func (o MetricThresholdOutput) Duration() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v MetricThreshold) *string { return v.Duration }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9c3350d6160b9580ca66246d70a4e262", "score": "0.50255257", "text": "func Millisecond() int64 {\n\treturn time.Now().UnixNano() / 1000000\n}", "title": "" }, { "docid": "697977f512a88fb3fc8e9c011ed58871", "score": "0.50049925", "text": "func microseconds(t uint64) time.Duration {\n\treturn time.Duration(t) * time.Microsecond\n}", "title": "" }, { "docid": "186f75e5487192e542484aebf891d1f5", "score": "0.5002624", "text": "func (d *Duration) Duration() time.Duration {\n\tif d != nil {\n\t\treturn time.Duration(*d)\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "bf5a8bf4134553597e384d81812b7bc8", "score": "0.49904975", "text": "func TimeDuration(t time.Duration) *time.Duration {\n\treturn &t\n}", "title": "" }, { "docid": "49a76d1cd2e00141059e7182eb764680", "score": "0.4986058", "text": "func (t ntpTimeShort) Duration() time.Duration {\n\tt64 := uint64(t)\n\tsec := (t64 >> 16) * nanoPerSec\n\tfrac := (t64 & 0xffff) * nanoPerSec >> 16\n\treturn time.Duration(sec + frac)\n}", "title": "" }, { "docid": "965534db1d9b23114ff43106c4909b60", "score": "0.49711174", "text": "func FromDuration(d time.Duration) Duration {\n\treturn Duration{d}\n}", "title": "" }, { "docid": "137c14d919ba969152bb12cc047d6136", "score": "0.496836", "text": "func GetTimeForMillis(millis int64) time.Time {\n\treturn time.Unix(0, millis*int64(time.Millisecond))\n}", "title": "" }, { "docid": "f5e8560e5062135b1997f9fdd8ef2fe0", "score": "0.49682295", "text": "func DurationToTime(dur string) (i int, t string) {\n\tres := strings.Split(dur, \".\")\n\tif d, err := StrTo(res[0]).Int(); err == nil {\n\t\ti = d\n\t\tdhour := \"0\"\n\t\tdmin := \"0\"\n\t\tdsec := \"0\"\n\n\t\ttsec := 0\n\t\tthour := 0\n\t\ttmin := d / 60\n\t\tif tmin == 0 {\n\t\t\ttsec = d\n\t\t} else if tmin > 59 {\n\t\t\tthour = tmin / 60\n\t\t\ttmin = tmin - (thour * 60)\n\t\t\ttsec = d - (thour * 60 * 60) - (tmin * 60)\n\t\t} else {\n\t\t\ttsec = d - (tmin * 60)\n\t\t}\n\t\tif thour > 9 {\n\t\t\tdhour = \"\"\n\t\t}\n\t\tif tmin > 9 {\n\t\t\tdmin = \"\"\n\t\t}\n\t\tif tsec > 9 {\n\t\t\tdsec = \"\"\n\t\t}\n\t\tt = fmt.Sprintf(\"%s%d:%s%d:%s%d\", dhour, thour, dmin, tmin, dsec, tsec)\n\t} else {\n\t\tt = err.Error()\n\t}\n\treturn i, t\n}", "title": "" }, { "docid": "4c8f879085852235d387815a3fb71bb4", "score": "0.49641833", "text": "func formatDuration(i time.Duration, millisecondSep string, numberOfMillisecondDigits int) (s string) {\n // Parse hours\n var hours = int(i / time.Hour)\n var n = i % time.Hour\n if hours < 10 {\n s += \"0\"\n }\n s += strconv.Itoa(hours) + \":\"\n\n // Parse minutes\n var minutes = int(n / time.Minute)\n n = i % time.Minute\n if minutes < 10 {\n s += \"0\"\n }\n s += strconv.Itoa(minutes) + \":\"\n\n // Parse seconds\n var seconds = int(n / time.Second)\n n = i % time.Second\n if seconds < 10 {\n s += \"0\"\n }\n s += strconv.Itoa(seconds) + millisecondSep\n\n // Parse milliseconds\n var milliseconds = float64(n/time.Millisecond) / float64(1000)\n s += fmt.Sprintf(\"%.\"+strconv.Itoa(numberOfMillisecondDigits)+\"f\", milliseconds)[2:]\n return\n}", "title": "" }, { "docid": "c668d7deb230b61a1b87a4e4aae44fb7", "score": "0.4962976", "text": "func fmtDuration(d time.Duration) string {\n\n return fmt.Sprintf(\"%f\", d.Seconds())\n\n}", "title": "" }, { "docid": "b06470b4175d3be07f06a8633e7177bb", "score": "0.4961489", "text": "func GetDuration(key string) time.Duration { return d.GetDuration(key) }", "title": "" }, { "docid": "580c7b219be86ee587c0394a09504ed0", "score": "0.4935979", "text": "func HumanizeDuration(duration time.Duration) string {\n\tdays := int64(duration.Hours() / 24)\n\thours := int64(math.Mod(duration.Hours(), 24))\n\tminutes := int64(math.Mod(duration.Minutes(), 60))\n\tseconds := int64(math.Mod(duration.Seconds(), 60))\n\n\tchunks := []struct {\n\t\tsingularName string\n\t\tamount int64\n\t}{\n\t\t{\"d\", days},\n\t\t{\"h\", hours},\n\t\t{\"m\", minutes},\n\t\t{\"s\", seconds},\n\t}\n\n\tparts := []string{}\n\n\tfor _, chunk := range chunks {\n\t\tswitch chunk.amount {\n\t\tcase 0:\n\t\t\tcontinue\n\t\tdefault:\n\t\t\tparts = append(parts, fmt.Sprintf(\"%d%s\", chunk.amount, chunk.singularName))\n\t\t}\n\t}\n\n\tif len(parts) == 0 {\n\t\treturn \"0s\"\n\t}\n\tif len(parts) > 2 {\n\t\tparts = parts[:2]\n\t}\n\treturn strings.Join(parts, \" \")\n}", "title": "" }, { "docid": "bdf65f408ae5e8dbaeaeefc591eb69fe", "score": "0.49303165", "text": "func ConvertDateToMilli(date time.Time) int64 {\n\treturn date.UnixNano() / int64(time.Millisecond)\n}", "title": "" }, { "docid": "bd671fa1dbd9215b38581cdcf2fcfb5c", "score": "0.49245328", "text": "func FormatDuration(d time.Duration) string {\n\tsuffix := \"ns\"\n\n\tif d > time.Second {\n\t\td = d / time.Second\n\t\tsuffix = \"s\"\n\t} else if d > 10*time.Millisecond {\n\t\td = d / time.Millisecond\n\t\tsuffix = \"ms\"\n\t} else if d > 10*time.Microsecond {\n\t\td = d / time.Microsecond\n\t\tsuffix = \"μs\"\n\t}\n\n\treturn fmt.Sprintf(\"%d\"+suffix, d)\n}", "title": "" }, { "docid": "e5db0ceec6ab2208bb5bab702f6bae19", "score": "0.49179658", "text": "func NewDuration(d time.Duration) *Duration {\n\treturn &Duration{d: d}\n}", "title": "" }, { "docid": "648a5ecf5ab9cf02247009447c38cbd5", "score": "0.4917614", "text": "func FormatMilli(tm time.Duration) string {\n\tmilli := tm.Milliseconds()\n\tif milli > 0 {\n\t\treturn fmt.Sprintf(\"%dms\", milli)\n\t}\n\tmicro := tm.Microseconds()\n\tif micro == 0 {\n\t\treturn \"0\"\n\t}\n\treturn fmt.Sprintf(\"%.2fms\", float64(micro)/1000.0)\n}", "title": "" }, { "docid": "36d1795dc6e4c37ba1cc77b94cd7b1dc", "score": "0.49127504", "text": "func roundDuration(d time.Duration, to time.Duration) time.Duration {\n\treturn (d + to - 1) / to\n}", "title": "" }, { "docid": "6c3b2fe445948f219ea530546a2fd66f", "score": "0.490406", "text": "func (a *AtomicInt64) Duration() time.Duration {\n\treturn time.Duration(a.Get())\n}", "title": "" }, { "docid": "1da63050633b056545f6846c614cc208", "score": "0.49037048", "text": "func (s *Stat) WriteDuration() time.Duration {\n\tvar d time.Duration\n\tfor _, i := range s.Writes {\n\t\td += i.Duration()\n\t}\n\treturn d\n}", "title": "" }, { "docid": "25d493f9976286489aac2b7eb0cee301", "score": "0.4892291", "text": "func secondsToDuration(seconds float64) time.Duration {\n\tttl := seconds * float64(time.Second)\n\treturn time.Duration(ttl)\n}", "title": "" }, { "docid": "25d493f9976286489aac2b7eb0cee301", "score": "0.4892291", "text": "func secondsToDuration(seconds float64) time.Duration {\n\tttl := seconds * float64(time.Second)\n\treturn time.Duration(ttl)\n}", "title": "" }, { "docid": "ddd184e05238c989ee7772942f432dbb", "score": "0.48866057", "text": "func getTimeDuration(quantity int, units string) (time.Duration, error) {\n\tswitch units {\n\tcase \"seconds\":\n\t\treturn time.Duration(quantity) * time.Second, nil\n\tcase \"minutes\":\n\t\treturn time.Duration(quantity) * time.Minute, nil\n\tdefault:\n\t\treturn time.Duration(0), fmt.Errorf(\"Invalid units: %s\", units)\n\t}\n}", "title": "" }, { "docid": "b9309b91f50f73175cf6c33a1265bced", "score": "0.48791087", "text": "func (s *InsertableImage) SetDuration(v int64) *InsertableImage {\n\ts.Duration = &v\n\treturn s\n}", "title": "" } ]
4d2f844db5082b833816ea4cb729a4e6
MustParse parses the arguments in os.Args or exists on error
[ { "docid": "af8854704a4c7573ec454e654e1063ba", "score": "0.0", "text": "func (o *options) MustParse() {\n if err := o.Parse(); err != nil {\n o.flagSet().PrintDefaults()\n\t\tfmt.Fprintln(os.Stderr)\n\t\tfmt.Fprintln(os.Stderr, err)\n\t\tos.Exit(1)\n }\n}", "title": "" } ]
[ { "docid": "36e690baeba6627d77e365b6da922252", "score": "0.6010699", "text": "func checkArgs(a []string) {\n\tif len(a) >= 2 {\n\t\t// Someone's looking for...\n\n\t\tif a[1] == \"version\" {\n\t\t\t// version\n\t\t\tfmt.Println(version)\n\t\t\tos.Exit(0)\n\n\t\t} else if a[1] == \"help\" {\n\t\t\t// help\n\t\t\tfmt.Println(\"You don't really need to read this! \\nJust pipe me some YAML. I don't bite\")\n\t\t\tfmt.Println(\"\\nExample:\")\n\t\t\tfmt.Println(\"\\tkubectl get myNastyPod -o yaml | yh\")\n\t\t\tfmt.Println(\"\\nCommands:\")\n\t\t\tfmt.Println(\"\\thelp: get this helpful help\")\n\t\t\tfmt.Println(\"\\tversion: get the version\")\n\t\t\tos.Exit(0)\n\t\t} else {\n\t\t\t// trolling\n\t\t\tfmt.Println(\"Not really sure of what you want! Maybe try help or version.\")\n\t\t\tos.Exit(0)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "11b35c6f52be4aeda386588464df7a44", "score": "0.59637535", "text": "func checkArgs(argv []string, min int) {\n\tif len(argv) < min {\n\t\tusageAndExit(\"Missing arguments\")\n\t}\n}", "title": "" }, { "docid": "11b35c6f52be4aeda386588464df7a44", "score": "0.59637535", "text": "func checkArgs(argv []string, min int) {\n\tif len(argv) < min {\n\t\tusageAndExit(\"Missing arguments\")\n\t}\n}", "title": "" }, { "docid": "072f30cd9a1060a7cc7dd54ea129c698", "score": "0.59017617", "text": "func checkArgs(argv []string, min int) {\n\tif len(argv) < min {\n\t\tpubsubUsage()\n\t\tos.Exit(2)\n\t}\n}", "title": "" }, { "docid": "5eefece4c47fc5a4b803098d1b6e3ffd", "score": "0.5822146", "text": "func (a *App) Parse(args []string) (int, error){\n\n if len(args) == 1 {\n if a.NoArgUsageFlag {\n fmt.Printf(a.Usage())\n return 0, nil\n } else {\n return 0, nil\n }\n }\n \n args = args[1:]\n argsLen := uint(len(args))\n for i := uint(0); i < argsLen; i++ {\n if a.Options[args[i]] != nil {\n if s, err := a.Options[args[i]].Parse(args[i:], &i); err != nil {\n return s, err\n }\n } else if a.Commands[args[i]] != nil {\n if s, err := a.Commands[args[i]].Parse(args[i:], &i); err != nil {\n return s, err\n }\n } else {\n a.args = append(a.args, args[i])\n }\n \n }\n \n return 0, nil\n\n}", "title": "" }, { "docid": "49b00cf6135f74304f65e49e4b1ceaa7", "score": "0.571805", "text": "func CheckArgs(arg ...string) {\n\tif len(os.Args) < len(arg)+1 {\n\t\tPrintInCyan(\"Usage: %s %s\", os.Args[0], strings.Join(arg, \" \"))\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "6c64ad51ac043acfc2178ee8f5b4f405", "score": "0.5680166", "text": "func CheckArgs() error {\n\targsWithoutProg := os.Args[1:]\n\n\t// Check the number of arguments\n\tif len(argsWithoutProg) < minArg {\n\t\treturn ErrNotEnoughArgs\n\t}\n\tif len(argsWithoutProg) > maxArg {\n\t\treturn ErrTooManyArgs\n\t}\n\n\t// Retrieve values\n\tvar values []float64\n\n\tfor _, arg := range argsWithoutProg {\n\t\tvalue, err := strconv.ParseFloat(arg, 64); if err != nil {\n\t\t\treturn ErrInvalidValues\n\t\t}\n\t\tif value <= 0 {\n\t\t\treturn ErrNegativeValues\n\t\t}\n\t\tvalues = append(values, value)\n\t}\n\tr0 = values[0]\n\tr5 = values[1]\n\tr10 = values[2]\n\tr15 = values[3]\n\tr20 = values[4]\n\tn = values[5]\n\n\tif n < 2 {\n\t\treturn ErrNLessThan2\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "69dda1cbce849ab8f030ad4fe4126d74", "score": "0.5679094", "text": "func (a *Arguments) assertArgumentsValid() {\n\tglog.V(1).Infof(\"%+v\\n\", args)\n\tif a.SourceDir != \"\" {\n\t\tflag.Usage()\n\t}\n}", "title": "" }, { "docid": "c1b6204119b490dd333bb148d7a8b339", "score": "0.5671151", "text": "func checkCLIArgs() {\n\tif len(devMeta.Name) == 0 {\n\t\tpanic(\"device name is missing\")\n\t}\n\n\tif len(devMeta.MAC) == 0 {\n\t\tpanic(\"device MAC is missing\")\n\t}\n}", "title": "" }, { "docid": "87614312971d9e49142dbab88fd1ed33", "score": "0.5652524", "text": "func checkArgs() {\n\n\tif len(os.Args[1:]) >= 1 {\n\t\tfor _, arg := range os.Args[1:] {\n\t\t\tswitch arg {\n\t\t\tcase \"-h\", \"--help\":\n\t\t\t\tprintHelp(0)\n\t\t\tcase \"-d\", \"--debug\":\n\t\t\t\tdebug = true\n\t\t\tdefault:\n\t\t\t\tprintHelp(1)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6bcd263febe8dfc3fd4919651a0ca720", "score": "0.5568876", "text": "func parseArgs() error {\n\tflug.Register(&args)\n\tflag.Parse()\n\n\t// Parse timestamp.\n\tif args.From != \"\" {\n\t\terr := scrapers.SetFromTimestamp(args.From)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Parse chains.\n\tif args.Chains == \"\" {\n\t\tfor chain := range tasks {\n\t\t\targs.ChainList = append(args.ChainList, chain)\n\t\t}\n\t\tsort.Strings(args.ChainList)\n\t} else {\n\t\t// TODO(amit): Handle duplicates.\n\t\targs.ChainList = strings.Split(args.Chains, \",\")\n\t\tfor _, chain := range args.ChainList {\n\t\t\tif tasks[chain] == nil {\n\t\t\t\treturn fmt.Errorf(\"unrecognized chain name: %q\", chain)\n\t\t\t}\n\t\t}\n\t}\n\n\t// No args.\n\tif len(flag.Args()) == 0 {\n\t\treturn noArgs\n\t}\n\n\t// Too many args.\n\tif len(flag.Args()) > 1 {\n\t\treturn fmt.Errorf(\"too many arguments were given.\")\n\t}\n\n\targs.Dir = flag.Args()[0]\n\n\treturn nil\n}", "title": "" }, { "docid": "66f57aaff373c075c38075d7867e4725", "score": "0.55666715", "text": "func (s Switch) checkArgs(minArgs int) error {\n\tif len(os.Args) == 3 && os.Args[2] == \"--help\" {\n\t\treturn nil\n\t}\n\tif len(os.Args)-2 < minArgs {\n\t\tfmt.Printf(\n\t\t\t\"incorect use of %s\\n%s %s --help\\n\",\n\t\t\tos.Args[1], os.Args[0], os.Args[1],\n\t\t)\n\t\treturn fmt.Errorf(\n\t\t\t\"%s expects at least: %d arg(s), %d provided\",\n\t\t\tos.Args[1], minArgs, len(os.Args)-2,\n\t\t)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "438cfbb71aef49ab5d3e637eb23cc3b1", "score": "0.55592775", "text": "func (s Switch) checkArgs(minArgs int) error {\n\tif len(os.Args) == 3 && os.Args[2] == \"--help\" {\n\t\treturn nil\n\t}\n\tif len(os.Args)-2 <minArgs {\n\t\tfmt.Printf(\"incorrect use of %s\\n%s --help\\n\",\n\t\tos.Args[1], os.Args[0], os.Args[1],)\n\t\treturn fmt.Errorf(\n\t\t\t\"%s expects at least %d args, %d provided\", os.Args[1], minArgs, len(os.Args)-2,\n\t\t)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "756e95ae644b17b77b7d3bc970885945", "score": "0.5523191", "text": "func blParseArguments(fmts string, args []BlObject,\n values ...interface{}) int {\n var reqLen, maxLen int\n var fmtLen = len(fmts)\n pos := strings.IndexByte(fmts, '|')\n if pos >= 0 {\n reqLen = pos\n maxLen = fmtLen - 1\n } else {\n reqLen = fmtLen\n maxLen = reqLen\n }\n arglen := len(args)\n /*\n * This algorithm might be pretty shabby. But it yielded\n * the shortest amount of code i found. The last case\n * will also run if pos >= 0 and arglen >= maxLen or\n * arglen <= reqLen1.\n */\n switch {\n case arglen > maxLen && pos >= 0:\n errpkg.SetErrmsg(\"expected at most (%d) arguments\" +\n \", got (%d)\", maxLen, arglen)\n return -1\n case arglen < reqLen && pos >= 0:\n errpkg.SetErrmsg(\"expected at least (%d) arguments\" +\n \", got (%d)\", reqLen, arglen)\n return -1\n case arglen > maxLen || arglen < reqLen:\n errpkg.SetErrmsg(\"expected exactly (%d) arguments\" +\n \", got (%d)\", reqLen, arglen)\n return -1\n }\n /*\n * Make sure that maxLen is equal to the length of the\n * values passed. If the wrong value type is passed,\n * just continue the for loop below, there is just\n * too many errors to report..\n */\n valueLen := len(values)\n if maxLen != valueLen {\n errpkg.InternError(\"expected exactly (%d) values\" +\n \", got (%d)\", maxLen, valueLen)\n }\n var argpos int = -1\n for i := 0; i < fmtLen; i++ {\n argpos++\n if argpos >= arglen {\n break\n }\n switch ch := fmts[i]; ch {\n case 's':\n sobj, ok := args[argpos].(*BlStringObject)\n if !ok {\n errpkg.SetErrmsg(\"expected string\")\n return -1\n }\n sval, ok := values[argpos].(*string)\n if !ok {\n continue\n }\n *sval = sobj.Value\n case 'i':\n iobj, ok := args[argpos].(*BlIntObject)\n if !ok {\n errpkg.SetErrmsg(\"expected integer\")\n return -1\n }\n ival, ok := values[argpos].(*int64)\n if !ok {\n continue\n }\n *ival = iobj.Value\n case 'f':\n fobj, ok := args[argpos].(*BlFloatObject)\n if !ok {\n errpkg.SetErrmsg(\"expected float\")\n return -1\n }\n fval, ok := values[argpos].(*float64)\n if !ok {\n continue\n }\n *fval = fobj.value\n case 'b':\n bobj, ok := args[argpos].(*BlBoolObject)\n if !ok {\n errpkg.SetErrmsg(\"expected boolean\")\n return -1\n }\n bval, ok := values[argpos].(*bool)\n if !ok {\n continue\n }\n *bval = bobj.value\n case 'o':\n oval, ok := values[argpos].(*BlObject)\n if !ok {\n continue\n }\n *oval = args[argpos]\n case '|':\n argpos--\n }\n }\n return 0\n}", "title": "" }, { "docid": "4c597609a4f92308580699fe6d736633", "score": "0.55141306", "text": "func (cli *CommandLine) validateArgs() {\n\tif len(os.Args) < 2 {\n\t\tcli.printUsage()\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "d1b66be8be1c3229dda77562b6f932f3", "score": "0.5501001", "text": "func checkArgs() (string, string) {\n\t//Fetch the command line arguments.\n\targs := os.Args\n\n\t//Check the length of the arugments, return failure if that are too\n\t//long or too short.\n\tif (len(args) < 2) || (len(args) >= 3) {\n\t\treturn \"1\", \"Invalid number of arguments. \\n\" +\n\t\t\t\"Please provide the file name with relative path of the words list input file!\\n\"\n\t}\n\tfile_path := args[1]\n\t//On success, return the file_path value and an empty string indicating\n\t//that everything is good.\n\treturn file_path, \"\"\n}", "title": "" }, { "docid": "3c926e3b3e23e583dcbbcfaf0df8c9d0", "score": "0.548478", "text": "func parseArgs() (string, uint, uint, uint, error) {\n\tif len(os.Args) != 5 {\n\t\treturn \"\", 0, 0, 0, fmt.Errorf(\"Incorrect number of command line arguments\")\n\t}\n\tinputTxt := os.Args[1]\n\tmapperCount, err := strconv.ParseUint(os.Args[2], 10, 0)\n\tif err != nil {\n\t\treturn \"\", 0, 0, 0, err\n\t}\n\tpartitionerCount, err := strconv.ParseUint(os.Args[3], 10, 0)\n\tif err != nil {\n\t\treturn \"\", 0, 0, 0, err\n\t}\n\treducerCount, err := strconv.ParseUint(os.Args[4], 10, 0)\n\tif err != nil {\n\t\treturn \"\", 0, 0, 0, err\n\t}\n\treturn inputTxt, uint(mapperCount), uint(partitionerCount), uint(reducerCount), nil\n}", "title": "" }, { "docid": "532d0f6d820093a088a025ca8512a7d7", "score": "0.5474983", "text": "func checkArgs() string {\n\tif len(os.Args) < 2 {\n\t\tprintUsage()\n\t\tos.Exit(1)\n\t}\n\treturn os.Args[1]\n}", "title": "" }, { "docid": "58fb822f5a34a4d7f6492a4850bd38d5", "score": "0.54749024", "text": "func CheckArgs(arg ...string) {\n\tif len(os.Args) < len(arg)+1 {\n\t\tWarning(\"Usage: %s %s\", os.Args[0], strings.Join(arg, \" \"))\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "58fb822f5a34a4d7f6492a4850bd38d5", "score": "0.54749024", "text": "func CheckArgs(arg ...string) {\n\tif len(os.Args) < len(arg)+1 {\n\t\tWarning(\"Usage: %s %s\", os.Args[0], strings.Join(arg, \" \"))\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "58fb822f5a34a4d7f6492a4850bd38d5", "score": "0.54749024", "text": "func CheckArgs(arg ...string) {\n\tif len(os.Args) < len(arg)+1 {\n\t\tWarning(\"Usage: %s %s\", os.Args[0], strings.Join(arg, \" \"))\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "8ea1a5efc621110d2a8e9b8d3b7722b1", "score": "0.5469485", "text": "func validateArgs() {\n\tif *intervalEndpoint == \"\" {\n\t\tflag.Usage()\n\t\tos.Exit(1)\n\t}\n\tif *outputEndpoint == \"\" {\n\t\tflag.Usage()\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "57936426701ab027fbe1b6dcd106a5e6", "score": "0.53341347", "text": "func main() {\n\tif len(os.Args[1:]) != 1 {\n\t\tfmt.Println(\"Error\")\n\t} else {\n\n\t\tmem := strings.Split(os.Args[1], \" \")\n\t\tvar mem2 []string\n\t\tfor _, v := range mem {\n\t\t\tif v != \"\" {\n\t\t\t\tmem2 = append(mem2, v)\n\t\t\t}\n\t\t}\n\t\tif !isVal(mem2) {\n\t\t\tfmt.Println(\"Error\")\n\t\t\treturn\n\t\t}\n\t\tfmt.Println(rpn(mem2))\n\n\t}\n\n}", "title": "" }, { "docid": "82cccb397497166e44680c06a6b89360", "score": "0.53312284", "text": "func CheckProperUsage(args []string) (invalidargs bool) {\n\tif len(args) > 3 {\n\t\tinvalidargs = true\n\t}\n\tif len(args) == 2 && (args[1] != \"-a\" && args[1] != \"-o\") {\n\t\tinvalidargs = true\n\t}\n\tif len(args) == 3 {\n\t\tif (args[1] == \"-a\" && args[2] == \"-o\") ||\n\t\t\t(args[1] == \"-o\" && args[2] == \"-a\") {\n\t\t\tinvalidargs = false\n\t\t} else {\n\t\t\tinvalidargs = true\n\t\t}\n\t}\n\treturn invalidargs\n}", "title": "" }, { "docid": "611f91e7c772cb6df9d94558a9e07b46", "score": "0.5324672", "text": "func Example_requiredArguments() {\n\t// These are the args you would pass in on the command line\n\tos.Args = split(\"./example --foo=abc --bar\")\n\n\tvar args struct {\n\t\tFoo string `arg:\"required\"`\n\t\tBar bool\n\t}\n\tMustParse(&args)\n\tfmt.Println(args.Foo, args.Bar)\n\t// output: abc true\n}", "title": "" }, { "docid": "9d309b44fe4e0e601e01421399ef1a21", "score": "0.52400506", "text": "func parseArgs(argv []string) int {\n\tif len(argv) > 2 {\n\t\tlog.Fatal(\"Too many arguments!\")\n\t}\n\n\ti, err := strconv.Atoi(argv[1])\n\tif i <= 0 {\n\t\tlog.Fatal(\"Invalid input value\\n\")\n\t}\n\n\tif err != nil {\n\t\tlog.Fatal(\"Invalid input value\" + err.Error())\n\t}\n\n\n\treturn i\n}", "title": "" }, { "docid": "6e308d1c5e00724d0cb5fede0da9da1b", "score": "0.52330565", "text": "func ValidateMinioArgs(c *cli.Context) error {\n\tfor _, p := range []string{\n\t\t\"minio-endpoint\",\n\t\t\"minio-access-key\",\n\t\t\"minio-secret-key\",\n\t\t\"minio-bucket\",\n\t\t\"folder\",\n\t} {\n\t\tif len(c.String(p)) == 0 {\n\t\t\treturn cli.NewExitError(\n\t\t\t\tfmt.Sprintf(\"argument %s is missing\", p),\n\t\t\t\t2,\n\t\t\t)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6a28e864f2634cebd7059f551f2ac70d", "score": "0.5219079", "text": "func sanityCheckInputs(config *config.GitXargsConfig) error {\n\tif err := auth.EnsureGithubOauthTokenSet(); err != nil {\n\t\treturn err\n\t}\n\n\tif len(config.Args) < 1 {\n\t\treturn errors.WithStackTrace(types.NoArgumentsPassedErr{})\n\t}\n\n\tif err := gitxargs_io.EnsureValidOptionsPassed(config); err != nil {\n\t\treturn errors.WithStackTrace(err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e5eb236de26f4c9c5fdc8b553839cf41", "score": "0.5218195", "text": "func checkCreateArgs(cmd *cobra.Command, args []string) error {\n\tgauFlag, err := common.GetGrafanaAPIURL(cmd)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to get Grafana API URL: %s\", err)\n\t}\n\n\targsLen := len(args)\n\n\tif argsLen == 0 {\n\t\tcmd.Usage()\n\t\tos.Exit(0)\n\t} else if gauFlag != \"\" {\n\t\tif argsLen < 2 {\n\t\t\treturn errors.New(\"requires NAME and ROLE argument\")\n\t\t}\n\n\t\tif argsLen > 2 {\n\t\t\treturn errors.New(\"requires only NAME and ROLE argument\")\n\t\t}\n\n\t\tif err := ak.SetName(args[0]); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := ak.SetRole(args[1]); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := ak.SetBaseURL(gauFlag); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif token, err := common.GetGrafanaToken(cmd); err == nil {\n\t\t\tak.SetGrafanaToken(token)\n\t\t} else {\n\t\t\treturn fmt.Errorf(\"failed to get Grafana authorization token: %s\", err)\n\t\t}\n\t} else if argsLen < 3 {\n\t\treturn errors.New(\"requires STACK_SLUG, NAME and ROLE argument\")\n\t} else if argsLen > 3 {\n\t\treturn errors.New(\"requires only STACK_SLUG, NAME and ROLE argument\")\n\t} else {\n\t\tif err := ak.SetStackSlug(args[0]); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := ak.SetName(args[1]); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := ak.SetRole(args[2]); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif token, err := common.GetToken(cmd); err == nil {\n\t\t\tak.SetToken(token)\n\t\t} else {\n\t\t\treturn fmt.Errorf(\"failed to get authorization token: %s\", err)\n\t\t}\n\t}\n\n\tstlFlag, err := cmd.Flags().GetUint64(\"seconds-to-live\")\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to get seconds-to-live flag value: %s\", err)\n\t}\n\n\tif stlFlag > 0 {\n\t\tif err := ak.SetSecondsToLive(stlFlag); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1277a2eae590192717dd5ef4446d8356", "score": "0.5183735", "text": "func Example() {\n\t// These are the args you would pass in on the command line\n\tos.Args = split(\"./example --foo=hello --bar\")\n\n\tvar args struct {\n\t\tFoo string\n\t\tBar bool\n\t}\n\tMustParse(&args)\n\tfmt.Println(args.Foo, args.Bar)\n\t// output: hello true\n}", "title": "" }, { "docid": "0087e1732c17f7381e383e5d4a6e8bd0", "score": "0.5177276", "text": "func positionalArgsValidator(cmd *cobra.Command, args []string) error {\n\tif len(args) == 0 {\n\t\treturn nil\n\t} else if len(args) == 1 {\n\t\t// We do not check if it's a valid uuid as it could be a short name also\n\t\treturn nil\n\t}\n\treturn errors.New(\"Invalid positional arguments\")\n}", "title": "" }, { "docid": "37bdb0f03fda37ba3a96c450395ed985", "score": "0.5168933", "text": "func parseArgs() (string, error) {\n prog := path.Base(os.Args[0])\n usage := fmt.Sprintf(`%s, version %s\n\nUsage:\n %s [/path/to/fortune/cookie/file]\n %s -h|--help\n\nIf the fortune cookie file path is omitted, the contents of environment\nvariable FORTUNE_FILE will be used. If neither is available, fortune will\nabort.`, prog, VERSION, prog, prog)\n\n var fortuneFile string\n var err error\n\n switch len(os.Args) {\n case 1:\n fortuneFile = os.Getenv(\"FORTUNE_FILE\")\n case 2:\n {\n if (os.Args[1] == \"-h\") || (os.Args[1] == \"--help\") {\n err = &Error{usage}\n } else {\n fortuneFile = os.Args[1]\n }\n }\n default:\n err = &Error{usage}\n }\n\n if (err == nil) && (fortuneFile == \"\") {\n err = &Error{\"No fortunes parameter and no FORTUNE_FILE \" +\n \"environment variable\"}\n }\n\n return fortuneFile, err\n}", "title": "" }, { "docid": "cd1bd99adecb345613010ad95fb29982", "score": "0.51359427", "text": "func sanitizeArguments(strs []string) error {\n\tfor i, val := range strs {\n\t\tif len(val) <= 0 {\n\t\t\treturn errors.New(\"Argument \" + strconv.Itoa(i) + \" must be a non-empty string\")\n\t\t}\n\t\tif len(val) > 32 {\n\t\t\treturn errors.New(\"Argument \" + strconv.Itoa(i) + \" must be <= 32 characters\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2695ac896509f4777ac2fd698cb590d3", "score": "0.5132602", "text": "func Validate(args []string) {\n\tif len(args) == 0 {\n\t\targs = append(args, util.GetSpecDirs()...)\n\t}\n\tres := ValidateSpecs(args, false)\n\tif len(res.Errs) > 0 {\n\t\tos.Exit(1)\n\t}\n\tif res.SpecCollection.Size() < 1 {\n\t\tlogger.Infof(true, \"No specifications found in %s.\", strings.Join(args, \", \"))\n\t\terr := res.Runner.Kill()\n\t\tif err != nil {\n\t\t\tlogger.Errorf(false, \"unable to kill runner: %s\", err.Error())\n\t\t}\n\t\tif res.ParseOk {\n\t\t\tos.Exit(0)\n\t\t}\n\t\tos.Exit(1)\n\t}\n\terr := res.Runner.Kill()\n\tif err != nil {\n\t\tlogger.Errorf(false, \"unable to kill runner: %s\", err.Error())\n\t}\n\n\tif res.ErrMap.HasErrors() {\n\t\tos.Exit(1)\n\t}\n\tlogger.Infof(true, \"No errors found.\")\n}", "title": "" }, { "docid": "4920fb4a7f2693b969a907056131f1b4", "score": "0.51169723", "text": "func checkDeleteArgs(cmd *cobra.Command, args []string) error {\n\tgauFlag, err := common.GetGrafanaAPIURL(cmd)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to get Grafana API URL: %s\", err)\n\t}\n\n\targsLen := len(args)\n\n\tif argsLen == 0 {\n\t\tcmd.Usage()\n\t\tos.Exit(0)\n\t} else if gauFlag != \"\" {\n\t\tif argsLen == 0 {\n\t\t\treturn errors.New(\"requires NAME argument\")\n\t\t}\n\n\t\tif argsLen > 1 {\n\t\t\treturn errors.New(\"requires only NAME argument\")\n\t\t}\n\n\t\tif err := ak.SetName(args[0]); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := ak.SetBaseURL(gauFlag); err != nil {\n\t\t\treturn err\n\t\t}\n\t} else if argsLen < 2 {\n\t\treturn errors.New(\"requires STACK_SLUG and NAME argument\")\n\t} else if argsLen > 2 {\n\t\treturn errors.New(\"requires only STACK_SLUG and NAME argument\")\n\t} else {\n\t\tif err := ak.SetStackSlug(args[0]); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := ak.SetName(args[1]); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif token, err := common.GetToken(cmd); err == nil {\n\t\t\tak.SetToken(token)\n\t\t} else {\n\t\t\treturn fmt.Errorf(\"failed to get authorization token: %s\", err)\n\t\t}\n\t}\n\n\tif token, err := common.GetGrafanaToken(cmd); err == nil {\n\t\tak.SetGrafanaToken(token)\n\t} else {\n\t\treturn fmt.Errorf(\"failed to get Grafana authorization token: %s\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "247db840a42f62a20ececefba2fa0ebd", "score": "0.5105839", "text": "func (efs *EFlagSet) ParseOsArgs() {\n\terr := efs.Parse(os.Args[1:])\n\tif err != nil {\n\t\tif err == flag.ErrHelp {\n\t\t\tos.Exit(0)\n\t\t}\n\t\tos.Exit(2)\n\t}\n}", "title": "" }, { "docid": "0f1c66d9111db4c4a156a1548d516d5d", "score": "0.5099742", "text": "func validateArguments(args arguments) {\n\tif args.Input_image == \"\" {\n\t\tlog.Fatalf(\"input_image missing in input json\")\n\t}\n\tif args.Output.Images_path == \"\" {\n\t\tlog.Fatalf(\"Path to output directory for images missing in input json\")\n\t}\n\tif args.Output.HTML.Path == \"\" {\n\t\tlog.Fatalf(\"Path to output directory for html file missing in input json\")\n\t}\n\tif args.Output.HTML.Name == \"\" {\n\t\tlog.Fatalf(\"Name of HTML file is missing in input json\")\n\t}\n\tif args.Site_webmanifest[\"background_color\"] == \"\" {\n\t\targs.Site_webmanifest[\"background_color\"] = \"#ffffff\"\n\t}\n\tif args.Site_webmanifest[\"theme_color\"] == \"\" {\n\t\targs.Site_webmanifest[\"theme_color\"] = \"#ffffff\"\n\t}\n\tif args.Site_webmanifest[\"name\"] == \"\" {\n\t\targs.Site_webmanifest[\"name\"] = \"default-name\"\n\t}\n\tif args.Site_webmanifest[\"short_name\"] == \"\" {\n\t\targs.Site_webmanifest[\"short_name\"] = \"default-short-name\"\n\t}\n}", "title": "" }, { "docid": "d773016bd983e237af22e2a5136c33be", "score": "0.5075973", "text": "func checkCreateArgs(cmd *cobra.Command, args []string) error {\n\targsLen := len(args)\n\n\tif argsLen == 0 {\n\t\tcmd.Usage()\n\t\tos.Exit(0)\n\t}\n\n\tif argsLen > 2 {\n\t\treturn fmt.Errorf(\"requires only STACK_SLUG and optionally NAME argument\")\n\t}\n\n\tif err := st.SetStackSlug(args[0]); err != nil {\n\t\treturn err\n\t}\n\n\tif argsLen == 2 {\n\t\tif err := st.SetName(args[1]); err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\t// If no Name defined, set Name to be the same like Stack Slug\n\t\tif err := st.SetName(args[0]); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif token, err := common.GetToken(cmd); err == nil {\n\t\tst.SetToken(token)\n\t} else {\n\t\treturn fmt.Errorf(\"failed to get authorization token: %s\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "86798b766b7b7e13af3f92c83d4f2d98", "score": "0.506172", "text": "func ValidateParams() bool {\n\n var isValid bool = true\n size := len(os.Args)\n \n if ( size != 5 ){\n isValid = false\n } else if ( os.Args[1] != \"-f\" || os.Args[3] != \"-p\" ){\n isValid = false\n } \n \n return isValid\n}", "title": "" }, { "docid": "6257144c4390d2d12395b4b20a72731e", "score": "0.5061704", "text": "func init() {\n\tflag.Parse()\n\tcheckMandatoryArgs()\n}", "title": "" }, { "docid": "53bea2a7f722a689566817f9561590da", "score": "0.50606036", "text": "func parseArgs(funcName string,\n\targs ...interface{}) (string, bool, time.Duration, error) {\n\n\tif len(args) != 3 {\n\t\treturn \"\", false, 0, fmt.Errorf(\"invalid arguments to %s.%s \"+\n\t\t\t\"-- expected database path, no-freelist-sync and \"+\n\t\t\t\"timeout option\",\n\t\t\tdbType, funcName)\n\t}\n\n\tdbPath, ok := args[0].(string)\n\tif !ok {\n\t\treturn \"\", false, 0, fmt.Errorf(\"first argument to %s.%s is \"+\n\t\t\t\"invalid -- expected database path string\", dbType,\n\t\t\tfuncName)\n\t}\n\n\tnoFreelistSync, ok := args[1].(bool)\n\tif !ok {\n\t\treturn \"\", false, 0, fmt.Errorf(\"second argument to %s.%s is \"+\n\t\t\t\"invalid -- expected no-freelist-sync bool\", dbType,\n\t\t\tfuncName)\n\t}\n\n\ttimeout, ok := args[2].(time.Duration)\n\tif !ok {\n\t\treturn \"\", false, 0, fmt.Errorf(\"third argument to %s.%s is \"+\n\t\t\t\"invalid -- expected timeout time.Duration\", dbType,\n\t\t\tfuncName)\n\t}\n\n\treturn dbPath, noFreelistSync, timeout, nil\n}", "title": "" }, { "docid": "7e4d1a3f54a334014bafb985f9d804a6", "score": "0.50541186", "text": "func checkArgs() (string, string, string) {\n\t// Expect 3 arguments: pubkey, signature, message file names\n\tif len(os.Args) != 4 {\n\t\tprintUsage()\n\t\tos.Exit(1)\n\t}\n\n\treturn os.Args[1], os.Args[2], os.Args[3]\n}", "title": "" }, { "docid": "2965f941d247ca793bf6d960204c482a", "score": "0.50469005", "text": "func ParseArgs() error {\n\treturn CommandLine.ParseArguments(os.Args[1:])\n}", "title": "" }, { "docid": "fe3d26850ab8fc52fb3131c0b30e0a10", "score": "0.50442153", "text": "func (p *LsCmd) ValidateLocalArgs() error {\n if len(p.Path) == 0 {\n return errors.New(StatusText(StatusNotEnoughArgs))\n }\n return nil\n}", "title": "" }, { "docid": "1ba71e821ea5abc3a7f73ac273629cf1", "score": "0.50391746", "text": "func analysisArgs() bool {\n\t//没有选项的情况显示帮助信息\n\tif len(os.Args) <= 1 {\n\t\tfor _, v := range gCommandItems {\n\t\t\tlog(v.Builder.getCommandDesc())\n\t\t}\n\t\treturn false\n\t}\n\n\t//解析指令\n\targs := os.Args[1:]\n\tvar pItem *sCommandItem = nil\n\tfor i := 0; i < len(args); i++ {\n\t\tparm := args[i]\n\t\tif parm[0] == '-' {\n\t\t\tpItem = findCommandItem(parm)\n\t\t\tif pItem == nil {\n\t\t\t\tlogErr(\"illegal command:\" + parm)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tpItem.CanExecute = true\n\t\t} else {\n\t\t\tif pItem == nil {\n\t\t\t\tlogErr(\"illegal command:\" + parm)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tpItem.Parms = append(pItem.Parms, parm)\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "55b016df53c097a43d8a46d6be376011", "score": "0.50377554", "text": "func validateArgs(runAll bool, onlyRun, args []string) error {\n\tif runAll && len(onlyRun) != 0 {\n\t\treturn fmt.Errorf(\"you must either use run-all or only\")\n\t}\n\n\tif !runAll && len(onlyRun) == 0 {\n\t\treturn fmt.Errorf(\"you must use at least one of run-all or only\")\n\t}\n\n\tif len(args) > 1 {\n\t\treturn fmt.Errorf(\"you may only pass one course YAML file at the same time\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b384d301d2f41eeed6b84bc0b34cf8e3", "score": "0.5029049", "text": "func parseArgs(args []string) ([]string, []string, []string) {\n\tflags := make([]string, 0)\n\tcompanies := make([]string, 0)\n\tmiscArgs := make([]string, 0)\n\n\tfor _, ele := range args {\n\t\tif strings.Contains(ele, \"-\") {\n\t\t\tflagArr := strings.Split(ele, \"\")\n\t\t\tfor _, flag := range flagArr {\n\t\t\t\tif flag != \"-\" {\n\t\t\t\t\tflags = append(flags, flag)\n\t\t\t\t}\n\t\t\t}\n\t\t} else if !strings.ContainsAny(ele, \"0123456789\") {\n\t\t\tcompanies = append(companies, ele)\n\t\t} else {\n\t\t\tmiscArgs = append(miscArgs, ele)\n\t\t}\n\t}\n\treturn flags, companies, miscArgs\n}", "title": "" }, { "docid": "b1f153b391e1e1e4b552285078a7c2f0", "score": "0.49840775", "text": "func parse_arg() []string {\n\tflag.Usage = func() { help(stderr) } // overwrite the default usage.\n\tflag.Parse()\n\n\tif *_version {\n\t\tversion(stdout)\n\t\texit(nil)\n\t}\n\n\tif *_help {\n\t\thelp(stdout)\n\t\texit(nil)\n\t}\n\n\tif creator = factories[*_algo]; creator == nil {\n\t\texit(errorf(\"unknown hash algorithm '%s'\", *_algo))\n\t}\n\tsumSize = (creator()).Size()\n\n\tif *_hmac_key != \"\" {\n\t\tkey, err := (&secretKey{}).init(*_hmac_key)\n\t\tif err != nil {\n\t\t\texit(err)\n\t\t}\n\n\t\tif hmacKey, err = key.decode(); err != nil {\n\t\t\texit(errorf(\"parse secret key failed: %s\", err))\n\t\t}\n\t\tcreator = factoryHMAC(creator).normalize()\n\t}\n\n\treturn flag.Args() // Root files to be processed.\n}", "title": "" }, { "docid": "7ca5aa596d2d9de4b7ed5c7decb03ab6", "score": "0.4981589", "text": "func check_args(parsed_query []string, num_expected int, conn net.Conn) bool {\n\n\tif !(len(parsed_query) >= num_expected) {\n\t\tfmt.Fprintf(conn, \"error: Not valid # of args%s\\n\", END_TAG)\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "bc93d8b5cfa18189f6e67c1afb7d66c2", "score": "0.4976647", "text": "func checkNumArgs(op string, expected int) {\n\tif flag.NArg() != expected {\n\t\tlog.Printf(\"%s takes %d argument(s); got %d\",\n\t\t\top, expected, flag.NArg())\n\t\tos.Exit(2)\n\t}\n}", "title": "" }, { "docid": "8aa3452a90e8900aaa12316d43491a5f", "score": "0.49735036", "text": "func validateGoNativeCommand(args []string) error {\n\tgoFlags := getGoFlags()\n\tfor _, arg := range args {\n\t\tfor _, flag := range goFlags {\n\t\t\t// Cli flags are in the format of --key, therefore, the -- need to be added to the name\n\t\t\tif strings.Contains(arg, \"--\"+flag.GetName()) {\n\t\t\t\treturn errorutils.CheckError(fmt.Errorf(\"Flag --%s can't be used with config file\", flag.GetName()))\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "abb4872d426390285a4f6480348c36cc", "score": "0.49703714", "text": "func sanitize_arguments(strs []string) error{\r\n\tfor i, val:= range strs {\r\n\t\tif len(val) <= 0 {\r\n\t\t\treturn errors.New(\"Argument \" + strconv.Itoa(i) + \" must be a non-empty string\")\r\n\t\t}\r\n\t\tif len(val) > 32 {\r\n\t\t\treturn errors.New(\"Argument \" + strconv.Itoa(i) + \" must be <= 32 characters\")\r\n\t\t}\r\n\t}\r\n\treturn nil\r\n}", "title": "" }, { "docid": "30635429f63f1bff235abf1facfd5e6d", "score": "0.49489236", "text": "func IsValidArgs(args []string) bool {\n\treturn len(args) > 1\n}", "title": "" }, { "docid": "3f145bd2aaf17e6eec9089f23a810e26", "score": "0.4941567", "text": "func (c deviceCmd) validateArgs(cmd *cobra.Command, args []string, toComplete string) ([]string, cobra.ShellCompDirective) {\n\tif len(args) == 0 {\n\t\t// first arg -> devId\n\t\treturn internal.DeviceListCompletion{\n\t\t\tDontIgnoreUser: true,\n\t\t}.Run(cmd, args, toComplete)\n\t} else if len(args) == 1 {\n\t\treturn []string{\"props\", \"set\", \"rm\"}, cobra.ShellCompDirectiveNoFileComp\n\t}\n\treturn nil, cobra.ShellCompDirectiveDefault\n}", "title": "" }, { "docid": "3c6314c8dd2cbc79698e97e5a402fb50", "score": "0.49406207", "text": "func checkRestartArgs(cmd *cobra.Command, args []string) error {\n\targsLen := len(args)\n\n\tif argsLen == 0 {\n\t\tcmd.Usage()\n\t\tos.Exit(0)\n\t}\n\n\tif argsLen > 1 {\n\t\treturn fmt.Errorf(\"requires only STACK_SLUG argument\")\n\t}\n\n\tif err := gr.SetStackSlug(args[0]); err != nil {\n\t\treturn err\n\t}\n\n\tif token, err := common.GetToken(cmd); err == nil {\n\t\tgr.SetToken(token)\n\t} else {\n\t\treturn fmt.Errorf(\"failed to get authorization token: %s\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e002becfb835a071d9e024416b497686", "score": "0.49392992", "text": "func parseArgs() {\n\tflag.BoolVar(&cfg.Volume, \"volume\", cfg.Volume, \"Include the volume percentage 0-100\")\n\tflag.BoolVar(&cfg.Elapsed, \"elapsed\", cfg.Elapsed, \"Include the duration:elapsed time\")\n\tflag.IntVar(&cfg.Width, \"width\", cfg.Width, \"Maximum width of output\")\n\n\tflag.Parse()\n}", "title": "" }, { "docid": "db0795eee074976d67335ca1083d1e3d", "score": "0.4933127", "text": "func parseArgs() {\n\tvar err error\n\n\tflag.Usage = func() {\n\t\tfmt.Printf(\"Usage: %s [options] <directory path>\\n\\n\", os.Args[0])\n\t\tfmt.Printf(\" -db: Location for the hash database. Alternatively, this can be set\\n\" +\n\t\t\t\" in the IMGHASH_DB environment variable.\\n\")\n\t\tfmt.Printf(\" -cpu: File to write CPU profile to.\\n\")\n\t\tfmt.Printf(\" -v: Display version information.\\n\")\n\t}\n\n\tversion := flag.Bool(\"v\", false, \"Display version information.\")\n\n\tflag.Parse()\n\n\tif *version {\n\t\tfmt.Printf(\"%s\\n\", Version())\n\t\tos.Exit(0)\n\t}\n\n\tif flag.NArg() == 0 {\n\t\tflag.Usage()\n\t\tos.Exit(1)\n\t}\n\n\tdb.Root = filepath.Clean(flag.Arg(0))\n\tdb.Root, err = filepath.Abs(db.Root)\n\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"%s\\n\", err)\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "cae0ae3089c62c3070cb0ae359beb27e", "score": "0.49310914", "text": "func parsearg(a string) (string, string, bool, bool) {\n\ts := strings.Split(a, \"|\")\n\tfw, rv, t, l := false, false, \"\", s[0]\n\tf := func(t string) (string, bool, bool) {\n\t\tif t[0] == '>' {\n\t\t\tt, rv = t[1:], true\n\t\t}\n\t\tif t[len(t)-1] == '>' {\n\t\t\tt, fw = t[:len(t)-1], true\n\t\t}\n\t\tif !(fw || rv) {\n\t\t\trv = true\n\t\t}\n\t\treturn t, rv, fw\n\t}\n\tif (len(s) > 1) && (len(s[1]) > 0) {\n\t\tt = s[1]\n\t\tt, rv, fw = f(t)\n\t\treturn l, t, rv, fw\n\t}\n\tl, rv, fw = f(l)\n\treturn l, \"\", rv, fw\n}", "title": "" }, { "docid": "975d02d2fdb7f1e7df328efba7752ff0", "score": "0.49166733", "text": "func argv(args []reflect.Value,\n\tt reflect.Type,\n\ts *Step,\n\ta ...interface{}) []reflect.Value {\n\n\tc := cap(args)\n\tif c == 0 {\n\t\treturn nil\n\t}\n\n\targs = argStep(args, t, s)\n\n\tl := len(args) // offset, possibly from argStep\n\tfor i, v := range a {\n\t\tif len(args) == c {\n\t\t\tbreak // all arg index assigned\n\t\t}\n\n\t\tp, err := checkParam(v, t.In(i+l))\n\t\tif err != nil {\n\t\t\t// TODO handle\n\t\t}\n\n\t\targs = append(args, p)\n\t}\n\n\treturn argZero(args, t)\n}", "title": "" }, { "docid": "c6986b343d8d7a439d9b95258a30afaf", "score": "0.4909638", "text": "func parseArgs() string {\n\n choiced := []string{}\n block := flag.Bool(\"block\", false, \"Block domain of coins\")\n update := flag.Bool(\"update\", false, \"Update list of coin domain\")\n clean := flag.Bool(\"clean\", false, \"Unblock coin domain\")\n\n flag.Parse()\n \n if *block { choiced = append(choiced, \"block\" ) }\n if *update { choiced = append(choiced, \"update\") }\n if *clean { choiced = append(choiced, \"clean\" ) }\n\n if len(choiced) == 1 {\n return choiced[0]\n }\n\n fmt.Println(\"Sorry, please choose only one option\")\n flag.PrintDefaults()\n return \"\" \n}", "title": "" }, { "docid": "06418cdc3719fe2c5eb5c53dc730315b", "score": "0.4898863", "text": "func sanitize_arguments(strs []string) error{\n\tfor i, val:= range strs {\n\t\tif len(val) <= 0 {\n\t\t\treturn errors.New(\"Argument \" + strconv.Itoa(i) + \" must be a non-empty string\")\n\t\t}\n\t\tif len(val) > 32 {\n\t\t\treturn errors.New(\"Argument \" + strconv.Itoa(i) + \" must be <= 32 characters\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "06418cdc3719fe2c5eb5c53dc730315b", "score": "0.4898863", "text": "func sanitize_arguments(strs []string) error{\n\tfor i, val:= range strs {\n\t\tif len(val) <= 0 {\n\t\t\treturn errors.New(\"Argument \" + strconv.Itoa(i) + \" must be a non-empty string\")\n\t\t}\n\t\tif len(val) > 32 {\n\t\t\treturn errors.New(\"Argument \" + strconv.Itoa(i) + \" must be <= 32 characters\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "55921783853c730caa46c09926c02b8f", "score": "0.48792353", "text": "func checkArguments(s *ast.CallExpr, e *state) {\n\tmatched := false\n\tfor _, arg := range s.Args {\n\t\t// This argument is an identifier.\n\t\tif i, ok := arg.(*ast.Ident); ok {\n\t\t\tif s := checkIdentForStringValue(i); s != \"\" {\n\t\t\t\te.translations[s] = \"\"\n\t\t\t\tmatched = true\n\t\t\t}\n\t\t}\n\n\t\t// This argument is a string.\n\t\tif argString, ok := arg.(*ast.BasicLit); ok {\n\t\t\tif s := checkString(argString.Value); s != \"\" {\n\t\t\t\te.translations[s] = \"\"\n\t\t\t\tmatched = true\n\t\t\t}\n\t\t}\n\t}\n\n\t// No string arguments were found, check everything that calls this function for strings\n\tif !matched {\n\t\taddParentFuncToList(e)\n\t}\n\n}", "title": "" }, { "docid": "0ccce0047723fb4344b036151c3bc57f", "score": "0.48791835", "text": "func GemInstalledFromArgs(args Args) (Checker, error) {\n\tgi := GemInstalled{}\n\n\tif err := requiredArgs(args, \"name\"); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := decodeFromArgs(args, &gi); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn gi, nil\n}", "title": "" }, { "docid": "82106aba30fe216c3fca14fb2b2d0ace", "score": "0.48777443", "text": "func validateArgs(host string, argDefs []*ast.Field, args []*ast.Arg, items map[string]*ast.TypeDecl, errs *[]*TypeError) {\n\targMap := make(map[string]struct {\n\t\targ *ast.Arg\n\t\tcount int\n\t}, len(args))\n\tfor _, arg := range args {\n\t\tif _, exists := argMap[arg.Name.Name]; !exists {\n\t\t\targMap[arg.Name.Name] = struct {\n\t\t\t\targ *ast.Arg\n\t\t\t\tcount int\n\t\t\t}{\n\t\t\t\targ: arg,\n\t\t\t}\n\t\t}\n\n\t\ta := argMap[arg.Name.Name]\n\t\ta.count += 1\n\t}\n\n\tfor _, argDef := range argDefs {\n\t\t// Args must be unique\n\t\ta, exists := argMap[argDef.Name.Name]\n\t\tif exists {\n\t\t\tdelete(argMap, argDef.Name.Name)\n\t\t}\n\n\t\tif a.count > 1 {\n\t\t\t*errs = append(*errs, &TypeError{\n\t\t\t\tMsg: fmt.Sprintf(\"%s: arg must be unique in: %s\", argDef.Name.Name, host),\n\t\t\t})\n\t\t\tcontinue\n\t\t}\n\t\tdelete(argMap, argDef.Name.Name)\n\n\t\t// Extract value and value type for arg\n\t\tvar val, valType interface{}\n\t\tswitch v := argDef.Type.(type) {\n\t\tcase *ast.Field_Ident:\n\t\t\tvalType = v.Ident\n\t\tcase *ast.Field_List:\n\t\t\tvalType = v.List\n\t\tcase *ast.Field_NonNull:\n\t\t\tvalType = v.NonNull\n\t\t}\n\n\t\t// 3: Non-null args are required and cannot have non value if defVal doesn't exist\n\t\t_, isNonNull := valType.(*ast.NonNull)\n\t\tswitch a.arg == nil {\n\t\tcase !isNonNull: // optional arg\n\t\t\tcontinue\n\t\tcase isNonNull && argDef.Default != nil: // not required cuz it has a default value\n\t\t\tcontinue\n\t\tcase isNonNull && argDef.Default == nil: // required cuz it doesn't hav a default value\n\t\t\t*errs = append(*errs, &TypeError{\n\t\t\t\tMsg: fmt.Sprintf(\"%s: non-null arg must be present in: %s\", argDef.Name.Name, host),\n\t\t\t})\n\t\t\tcontinue\n\t\t}\n\n\t\tswitch v := a.arg.Value.(type) {\n\t\tcase *ast.Arg_BasicLit:\n\t\t\tval = v.BasicLit\n\t\tcase *ast.Arg_CompositeLit:\n\t\t\tval = v.CompositeLit\n\t\t}\n\n\t\tvalidateValue(host, a.arg.Name.Name, a.arg, val, valType, items, errs)\n\t}\n\n\t// Args must exist\n\tfor arg := range argMap {\n\t\t*errs = append(*errs, &TypeError{\n\t\t\tMsg: fmt.Sprintf(\"%s: undefined arg: %s\", host, arg),\n\t\t})\n\t}\n}", "title": "" }, { "docid": "c4bb5e32e3494c038c5789c6b9c8968b", "score": "0.48687866", "text": "func usage(tls *libc.TLS, argv0 uintptr) { /* mptest.c:1241:13: */\n\tbp := tls.Alloc(8)\n\tdefer tls.Free(8)\n\n\tvar i int32\n\tvar zTail uintptr = argv0\n\tfor i = 0; *(*int8)(unsafe.Pointer(argv0 + uintptr(i))) != 0; i++ {\n\t\tif (int32(*(*int8)(unsafe.Pointer(argv0 + uintptr(i))))) == '/' {\n\t\t\tzTail = ((argv0 + uintptr(i)) + uintptr(1))\n\t\t}\n\t}\n\tlibc.Xfprintf(tls, libc.Xstderr, ts+1678 /* \"Usage: %s DATABA...\" */, libc.VaList(bp, zTail))\n\tlibc.Xfprintf(tls, libc.Xstderr,\n\n\t\tts+1717 /* \"Options:\\n --er...\" */, 0)\n\tlibc.Xexit(tls, 1)\n}", "title": "" }, { "docid": "2e4c9c64805033dfe077b2f887479cde", "score": "0.48624572", "text": "func validateArgs(tok token.Token, name string, args []object.Object, size int, types [][]string) object.Object {\n\tif len(args) == 0 || len(args) > size || len(args) < size {\n\t\treturn newError(tok, \"wrong number of arguments to %s(...): got=%d, want=%d\", name, len(args), size)\n\t}\n\n\tfor i, t := range types {\n\t\tif !util.Contains(t, string(args[i].Type())) && !util.Contains(t, object.ANY_OBJ) {\n\t\t\treturn newError(tok, \"argument %d to %s(...) is not supported (got: %s, allowed: %s)\", i, name, args[i].Inspect(), strings.Join(t, \", \"))\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "deda6998326992c3ed65e6e0cbebcc4c", "score": "0.48605484", "text": "func (a *ArgParser) Parse(conf *cmd.Configuration, s cmd.StorageProvider) (cmd.RunnerValidator, error) {\n\tif conf == nil || len(a.Args) == 0 {\n\t\treturn a.parseConfigureCmd(s)\n\t}\n\n\tswitch a.Args[0] {\n\tcase cmdAdd:\n\t\treturn a.parseAddCmd(s, a.Args[1:])\n\tcase cmdList:\n\t\treturn a.parseListCmd(s, a.Args[1:])\n\t}\n\n\treturn a.parseCommuteCmd(conf, a.Args)\n}", "title": "" }, { "docid": "9ef09d39a35255f327570f0203e0eedd", "score": "0.4855467", "text": "func TestValidateFlags(t *testing.T) {\n\tvar (\n\t\tcmd = exec.Command(\"go\", \"run\", \"main.go\")\n\t\terr = cmd.Run()\n\t)\n\tif err == nil {\n\t\tt.Error(\"cmd.Run = nil; want non-nil error\")\n\t}\n\tcmd = exec.Command(\n\t\t\"go\", \"run\", \"main.go\",\n\t\t\"-auth.email\", \"support@cloudflare.com\",\n\t)\n\terr = cmd.Run()\n\tif err == nil {\n\t\tt.Error(\"cmd.Run = nil; want non-nil error\")\n\t}\n\tcmd = exec.Command(\n\t\t\"go\", \"run\", \"main.go\",\n\t\t\"-auth.email\", \"support@cloudflare.com\",\n\t\t\"-auth.key\", \"CF\",\n\t\t\"-url\", \"\",\n\t)\n\terr = cmd.Run()\n\tif err == nil {\n\t\tt.Error(\"cmd.Run = nil; want non-nil error\")\n\t}\n\tcmd = exec.Command(\n\t\t\"go\", \"run\", \"main.go\",\n\t\t\"-auth.email\", \"support@cloudflare.com\",\n\t\t\"-auth.key\", \"CF\",\n\t\t\"start\", \"0\",\n\t\t\"-end\", \"-1\",\n\t)\n\terr = cmd.Run()\n\tif err == nil {\n\t\tt.Error(\"cmd.Run = nil; want non-nil error\")\n\t}\n\tcmd = exec.Command(\n\t\t\"go\", \"run\", \"main.go\",\n\t\t\"-auth.email\", \"support@cloudflare.com\",\n\t\t\"-auth.key\", \"CF\",\n\t\t\"-start\", \"42\",\n\t\t\"-end\", \"42\",\n\t)\n\terr = cmd.Run()\n\tif err == nil {\n\t\tt.Error(\"cmd.Run = nil; want non-nil error\")\n\t}\n}", "title": "" }, { "docid": "0ff45960831eaf9371fd60003a2edc30", "score": "0.4854299", "text": "func TestReqMissing(t *testing.T) {\n\tClearAll()\n\tvar regErr error\n\tregErr = RegisterOpt(\"test1\", \"\", \"a\", false, true, \"test usage\")\n\tregErr = RegisterOpt(\"test2\", \"wow\", \"\", false, true, \"test usage\")\n\tregErr = RegisterOpt(\"test3\", \"\", \"b\", false, true, \"test usage\")\n\tregErr = RegisterOpt(\"test4\", \"\", \"c\", false, true, \"test usage\")\n\tregErr = RegisterOpt(\"test5\", \"hey\", \"\", false, true, \"test usage\")\n\n\tif regErr != nil {\n\t\tt.Error(\"Parse() test: Testing opt parsing but got reg error: \" + regErr.Error())\n\t}\n\n\t// Now to wipe out os.Args\n\tos.Args = []string{\"ignoreme\", \"-a=foo\", \"--wow\", \"suchval\"}\n\n\texpr := regexp.MustCompile(regexp.QuoteMeta(ERR_REQ) + \".+\")\n\n\t// Parse the args, check for errors and correct val\n\tParse()\n\tif HasError() {\n\t\terr := GetError()\n\t\tif err != nil {\n\t\t\tif !expr.MatchString(err.Error()) {\n\t\t\t\tt.Error(\"Parse() test: Wrong type of error given when missing required args: \" + err.Error())\n\t\t\t}\n\t\t} else {\n\t\t\tt.Error(\"Parse() test: Severe error, HasError() returned true but error is nil!\")\n\t\t}\n\t} else {\n\t\tt.Error(\"Parse() test: Didn't get a parse error when missing required options.\")\n\t}\n}", "title": "" }, { "docid": "423cec4f5b5721e389c96414c104cfbe", "score": "0.484898", "text": "func TestReqAllPresent(t *testing.T) {\n\tClearAll()\n\tvar regErr error\n\tregErr = RegisterOpt(\"test1\", \"\", \"a\", false, true, \"test usage\")\n\tregErr = RegisterOpt(\"test2\", \"wow\", \"\", false, true, \"test usage\")\n\tregErr = RegisterOpt(\"test3\", \"\", \"b\", false, true, \"test usage\")\n\tregErr = RegisterOpt(\"test4\", \"\", \"c\", false, true, \"test usage\")\n\tregErr = RegisterOpt(\"test5\", \"hey\", \"\", false, true, \"test usage\")\n\n\tif regErr != nil {\n\t\tt.Error(\"Parse() test: Testing opt parsing but got reg error: \" + regErr.Error())\n\t}\n\n\t// Now to wipe out os.Args\n\tos.Args = []string{\"ignoreme\", \"-a=foo\", \"--wow\", \"suchval\", \"-bbar\", \"-c\", \"baz\", \"--hey=yikes\", \"meh\"}\n\n\t// Parse the args, check for errors and correct val\n\tParse()\n\tif HasError() {\n\t\tt.Error(\"Parse() test: Got a parse error: \" + GetError().Error())\n\t}\n}", "title": "" }, { "docid": "ae992d0530da14488707800e7192c763", "score": "0.48468363", "text": "func parseArgs() int {\n\tflag.StringVar(&filename, \"filename\", \"\", \"file name to use when saving the imported file\")\n\tflag.StringVar(&downloadURL, \"url\", \"\", \"Url to import the file from\")\n\tflag.Parse()\n\tif len(filename) == 0 || len(downloadURL) == 0 {\n\t\tflag.PrintDefaults()\n\t\tlogMessage(\"Invalid command line arguments!\")\n\t\treturn 1\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "dcc154514789d7fe713cbbfdbbbb88d8", "score": "0.48439065", "text": "func ParseArgs(c *cli.Context, o *Options) error {\n\tif o.RuntimeDir != \"\" {\n\t\tlogrus.Debug(\"Runtime directory already set; ignoring arguments\")\n\t\treturn nil\n\t}\n\n\targs := c.Args()\n\n\tlogrus.Infof(\"Parsing arguments: %v\", args.Slice())\n\tif c.NArg() != 1 {\n\t\treturn fmt.Errorf(\"incorrect number of arguments\")\n\t}\n\n\to.RuntimeDir = args.Get(0)\n\n\tlogrus.Infof(\"Successfully parsed arguments\")\n\n\treturn nil\n}", "title": "" }, { "docid": "205a22bec4ea7eddd2d6d675a6e7e6fd", "score": "0.48360077", "text": "func ParseSamtoolsArgs(query *Query) (argv []string, err error) {\n\n\tvar (\n\t\tfilter_options = map[string]string{\n\t\t\t\"head\": \"-h\",\n\t\t\t\"headonly\": \"-H\",\n\t\t\t\"count\": \"-c\",\n\t\t}\n\t\tvalued_options = map[string]string{\n\t\t\t\"flag\": \"-f\",\n\t\t\t\"lib\": \"-l\",\n\t\t\t\"mapq\": \"-q\",\n\t\t\t\"readgroup\": \"-r\",\n\t\t}\n\t)\n\n\tfor src, des := range filter_options {\n\t\tif query.Has(src) {\n\t\t\targv = append(argv, des)\n\t\t}\n\t}\n\n\tfor src, des := range valued_options {\n\t\tif query.Has(src) {\n\t\t\tif val := query.Value(src); val != \"\" {\n\t\t\t\targv = append(argv, des)\n\t\t\t\targv = append(argv, val)\n\t\t\t} else {\n\t\t\t\treturn nil, errors.New(fmt.Sprintf(\"required value not found for query arg: %s \", src))\n\t\t\t}\n\t\t}\n\t}\n\treturn argv, nil\n}", "title": "" }, { "docid": "eac4549bb50be96df53ed62aa12f977e", "score": "0.48278907", "text": "func main() {\n\tflag.Parse()\n\to := strings.Split(*checkFlag, \",\")\n\terrs := check(o...)\n\tif len(errs) > 0 {\n\t\tos.Exit(1)\n\t} else {\n\t\tos.Exit(0)\n\t}\n}", "title": "" }, { "docid": "ae4352505eed296e86727299fbf00378", "score": "0.4821209", "text": "func (cmd *Cmd) doParse(args []string) error {\n\tfor i := 0; i < len(args); i++ {\n\n\t\t// parse the current argument\n\t\targ := parseOptArg(args[i])\n\n\t\t// if it is an operand, bail out!\n\t\tif arg == nil {\n\t\t\tcmd.args = args[i:]\n\t\t\treturn nil\n\t\t}\n\n\t\t// if is a bunch of flags in 'compressed' form,\n\t\t// process them all, except the last one\n\t\tif err := cmd.processMultiArgs(arg); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// find the entry.\n\t\t// if no entry exists, this argument is unknown\n\t\tentry := cmd.findOpt(arg.name)\n\t\tif entry == nil {\n\t\t\treturn unknownArgErr{arg: arg.name}\n\t\t}\n\n\t\t// some argument types have automatic values in certain cases\n\t\t// fill them in, if necessary\n\t\tentry.fillAutoValue(arg)\n\n\t\t// check if we need to look at the next argument\n\t\t// long params with '=' should not be considered\n\t\tif !arg.isEq && arg.value == \"\" {\n\t\t\tif i+1 == len(args) {\n\t\t\t\treturn noValueErr{arg: arg.name}\n\t\t\t}\n\n\t\t\targ.value = args[i+1]\n\t\t\ti++\n\t\t}\n\n\t\tif err := entry.setValue(arg); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e63d1942a74f7aa28192e55e20cf76df", "score": "0.48203042", "text": "func (p *LsCmd) ValidateLocalArgs() error {\n\tif len(p.Args) == 0 {\n\t\treturn errors.New(StatusNotEnoughArgs)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4de539f49cee21e75b05ba1d15db0a87", "score": "0.481952", "text": "func parseArgs(args []string) (opts *AppConfig, err error) {\n\topts = &AppConfig{}\n\n\t_, err = goflags.ParseArgs(opts, args)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// fix bad values...\n\tif opts.Clients < MIN_LOAD {\n\t\topts.Clients = MIN_LOAD\n\t}\n\n\tif opts.Duration < MIN_RUN_TIME {\n\t\topts.Duration = MIN_RUN_TIME\n\t}\n\n\topts.d = time.Duration(opts.Duration) * time.Second\n\treturn\n}", "title": "" }, { "docid": "c94e5397952c55d33d132e4af440df61", "score": "0.48145998", "text": "func (c Check) Args() []string {\n\tvar args []string\n\tif c.Tags != \"\" {\n\t\targs = append(args, \"-tags\", c.Tags)\n\t}\n\treturn args\n}", "title": "" }, { "docid": "52c5671f7ea6821bbd04905158950d6f", "score": "0.4797043", "text": "func TestNonCombinedShortBools(t *testing.T) {\n\tClearAll()\n\tvar regErr error\n\tregErr = RegisterOpt(\"test1\", \"\", \"t\", true, false, \"test usage\")\n\tregErr = RegisterOpt(\"test2\", \"\", \"u\", true, false, \"test usage\")\n\tregErr = RegisterOpt(\"test3\", \"\", \"v\", true, false, \"test usage\")\n\n\tif regErr != nil {\n\t\tt.Error(\"Parse() test: Testing opt parsing but got reg error: \" + regErr.Error())\n\t}\n\n\t// Now to wipe out os.Args\n\tos.Args = []string{\"ignoreme\", \"-t\", \"foo\", \"-u\", \"-v\"}\n\n\t// Parse the args, check for errors and correct val\n\tParse()\n\tif HasError() {\n\t\tt.Error(\"Parse() test: Got a parse error: \" + GetError().Error())\n\t}\n\n\tval1 := GetBool(\"test1\")\n\tval2 := GetBool(\"test2\")\n\tval3 := GetBool(\"test3\")\n\tif !val1 || !val2 || !val3 {\n\t\tt.Error(\"Parse() test: Didn't get a positive boolean when expecting one\")\n\t}\n}", "title": "" }, { "docid": "a173ba84e4b03d99b030ba0a59c6681d", "score": "0.47946966", "text": "func (p *ArgumentParser) MustParseArgs(args ...string) Namespace {\n\tns, err := p.ParseArgs(args...)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn ns\n}", "title": "" }, { "docid": "b542f71427dd77c619e9e1720a3613c7", "score": "0.47831643", "text": "func (a *allocator) ValidateArgs(data []byte) error {\n\tc := new(Config)\n\terr := c.Unmarshal(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif c.NetworkType == \"bridged\" {\n\t\tdevices, err := virtualizers.BridgedDevices()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbridgedDevice := false\n\t\tfor _, device := range devices {\n\t\t\tif device == c.NetworkDevice {\n\t\t\t\tbridgedDevice = true\n\t\t\t}\n\t\t}\n\t\tif !bridgedDevice {\n\t\t\treturn fmt.Errorf(\"bridged device %s does not exist on virtualbox\", c.NetworkDevice)\n\t\t}\n\t}\n\n\tif c.NetworkType == \"hostonly\" {\n\t\tdevices, err := virtualizers.HostDevices()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\thostDevice := false\n\t\tfor _, device := range devices {\n\t\t\tif device == c.NetworkDevice {\n\t\t\t\thostDevice = true\n\t\t\t}\n\t\t}\n\t\tif !hostDevice {\n\t\t\treturn fmt.Errorf(\"host device %s does not exist on virtualbox\", c.NetworkDevice)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "fc581d6440cb97e5fbd63464d1b9033a", "score": "0.4781622", "text": "func TestStringEqualsVals(t *testing.T) {\n\tconst VAL1 = \"val1\"\n\tconst VAL2 = \"val2\"\n\n\tClearAll()\n\tvar regErr error\n\tregErr = RegisterOpt(\"test1\", \"\", \"t\", false, false, \"test usage\")\n\tregErr = RegisterOpt(\"test2\", \"wow\", \"\", false, false, \"test usage\")\n\n\tif regErr != nil {\n\t\tt.Error(\"Parse() test: Testing opt parsing but got reg error: \" + regErr.Error())\n\t}\n\n\t// Now to wipe out os.Args\n\tos.Args = []string{\"ignoreme\", \"-t=\" + VAL1, \"--wow=\" + VAL2, \"foo\"}\n\n\t// Parse the args, check for errors and correct val\n\tParse()\n\tif HasError() {\n\t\tt.Error(\"Parse() test: Got a parse error: \" + GetError().Error())\n\t}\n\n\tval1 := GetString(\"test1\")\n\tval2 := GetString(\"test2\")\n\n\tif val1 != VAL1 {\n\t\tt.Error(\"Parse() test: Didn't get a string val for short equals expr. Got: \" + val1 + \". Expected: \" + VAL1)\n\t}\n\n\tif val2 != VAL2 {\n\t\tt.Error(\"Parse() test: Didn't get a string val for long equals expr. Got: \" + val2 + \". Expected: \" + VAL2)\n\t}\n}", "title": "" }, { "docid": "93c4bd58c26ed890eb88b2002404f340", "score": "0.47812253", "text": "func ValidateNumArgs(args []string, numExpected int, usage string) error {\n\tif len(args) < numExpected {\n\t\treturn program.SimpleError{fmt.Sprintf(\"missing %d required argument(s)\\nUsage: %s\",\n\t\t\tnumExpected-len(args), usage)}\n\t} else if len(args) > numExpected {\n\t\treturn program.SimpleError{fmt.Sprintf(\"too many arguments supplied\\nUsage: %s\", usage)}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "258df21c83feb1ddb21df5fb0e0a9f59", "score": "0.47752255", "text": "func (toValidate Args) validate() error {\n\tif *toValidate.Interval == 0 {\n\t\treturn errors.New(\"interval parameter is required\")\n\t}\n\n\tif len(strings.TrimSpace(*toValidate.A10Config)) == 0 {\n\t\treturn errors.New(\"a10-config parameter is required\")\n\t}\n\n\tif _, err := os.Stat(*toValidate.A10Config); os.IsNotExist(err) {\n\t\treturn errors.New(\"a10-config parameter points to notexistent file\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1ff52cde3ec1a6c803ad3994924c278c", "score": "0.47731638", "text": "func parseCommandLine() (algorithm int, minSize, maxSize int64, suffixes, files []string) {\n\t// defines a integer flag -algorithm, stored in the pointer algorithm\n\tflag.IntVar(&algorithm, \"algorithm\", 1, \"1 [pipe style] or 2 [goroutine style]\")\n\t// defines a int64 flag -min stored in the pointer minSize\n\tflag.Int64Var(&minSize, \"min\", -1, \"minimum file size, default: -1 for no limit)\")\n\t// defines a int64 flag -max stored in the pointer maxSize\n\tflag.Int64Var(&maxSize, \"max\", -1, \"maximum file size, default: -1 for no limit)\")\n\t// defines a string flag -suffixes stored in the pointer suffixesOpt\n\tvar suffixesOpt *string = flag.String(\"suffixes\", \"\", \"comma separated list of file suffixes\")\n\n\tflag.Usage = func() {\n\t\tfmt.Fprintf(os.Stderr, \"usage: %s -algorithm <int> -min <int64> -max <int64> -suffixes <string>\\n\", filepath.Base(os.Args[0]))\n\t\tflag.PrintDefaults()\n\t\tos.Exit(2)\n\t}\n\n\t// parse the command line into defined vars\n\tflag.Parse()\n\tif flag.NFlag() == 0 {\n\t\tflag.Usage()\n\t}\n\n\tif algorithm != 1 && algorithm != 2 {\n\t\talgorithm = 1\n\t}\n\tif minSize > maxSize && maxSize != -1 {\n\t\tlog.Fatalln(\"minimum size must be less that maximum size\")\n\t}\n\n\tsuffixes = []string{}\n\tif *suffixesOpt != \"\" {\n\t\tsuffixes = strings.Split(*suffixesOpt, \",\")\n\t}\n\n\t// return non-flag command line arguments\n\tfiles = flag.Args()\n\n\treturn algorithm, minSize, maxSize, suffixes, files\n}", "title": "" }, { "docid": "4cce73a6e73350b03546edf4e74c9de4", "score": "0.4772498", "text": "func parseArgs() (flags flags, args []string) {\n\t// initialize default config\n\tflags.base = 10\n\tflags.precision = 2\n\t//flags.sort = typeAlphaSort // see notice at the top of the file\n\tflags.sort = alphaSort // see notice at the top of the file\n\tflags.interactive = isTerminal()\n\tflags.multiColumn = flags.interactive\n\t//flags.colors = flags.interactive\n\t//flags.sep = \"\\t\" // tab\n\tflags.sep = \" \" // tab\n\tflags.recursive = false\n\t//flags.sep = \" \" // space\n\n\treoa := false // reached end of arguments\n\n\tvar i int\n\tfor i = 1; i < len(os.Args); i++ {\n\t\tif os.Args[i][0] == '-' && !reoa {\n\t\t\tfor _, c := range os.Args[i][1:] {\n\t\t\t\tif reoa {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\n\t\t\t\tswitch c {\n\t\t\t\tcase '-':\n\t\t\t\t\treoa = true\n\n\t\t\t\tcase 'l': // long format, displaying Unix file types etc...\n\t\t\t\t\tflags.permissions = true\n\t\t\t\t\t//flags.linkCount = true\n\t\t\t\t\tflags.linkCount = true\n\t\t\t\t\tflags.size = true\n\t\t\t\t\tflags.group = true\n\t\t\t\t\tflags.owner = true\n\t\t\t\t\tflags.multiColumn = false\n\t\t\t\t\tflags.date = true\n\n\t\t\t\tcase 'o': // like -l without group\n\t\t\t\t\tflags.permissions = true\n\t\t\t\t\tflags.linkCount = true\n\t\t\t\t\tflags.size = true\n\t\t\t\t\tflags.group = false\n\t\t\t\t\tflags.owner = true\n\t\t\t\t\tflags.multiColumn = false\n\t\t\t\t\tflags.date = true\n\n\t\t\t\t\t// ...\n\t\t\t\tcase 'F': // reveal nature of a file\n\t\t\t\t\tflags.classify = true\n\n\t\t\t\tcase 'f': // do not sort\n\t\t\t\t\tflags.sort = noSort\n\n\t\t\t\tcase 'A': // list all files except . and ..\n\t\t\t\t\tflags.all = true\n\t\t\t\t\tflags.hideObvious = true\n\n\t\t\t\tcase 'a': // list all files\n\t\t\t\t\tflags.all = true\n\t\t\t\t\tflags.hideObvious = false\n\n\t\t\t\tcase 'r':\n\t\t\t\t\tflags.reverse = true\n\n\t\t\t\tcase 'R': // recursively list\n\t\t\t\t\tflags.recursive = true\n\n\t\t\t\tcase 'd': // info about file, not contents\n\t\t\t\t\tflags.nolisting = true\n\n\t\t\t\tcase 't': // sort by mod time\n\t\t\t\t\tflags.sort = modTimeSort\n\n\t\t\t\tcase 'g': // same as -l without owner\n\t\t\t\t\tflags.permissions = true\n\t\t\t\t\tflags.linkCount = true\n\t\t\t\t\tflags.size = true\n\t\t\t\t\tflags.group = true\n\t\t\t\t\tflags.owner = false\n\t\t\t\t\tflags.multiColumn = false\n\t\t\t\t\tflags.date = true\n\n\t\t\t\tcase 'q':\n\t\t\t\t\tflags.nonGraphic = true\n\n\t\t\t\tcase 'p':\n\t\t\t\t\tflags.revealDir = true\n\t\t\t\t\tfmt.Fprintf(os.Stderr, \"WARNING: flag '-p' is not implemented!\")\n\n\t\t\t\tcase 'u':\n\t\t\t\t\tflags.sort = accessTimeSort\n\n\t\t\t\tcase 'm':\n\t\t\t\t\tflags.sep = \",\"\n\t\t\t\t\tflags.multiColumn = true\n\n\t\t\t\tcase 's': // size\n\t\t\t\t\tflags.size = true\n\n\t\t\t\tcase 'S': // sort by size\n\t\t\t\t\tflags.sort = sizeSort\n\n\t\t\t\tcase 'n': // numeric ids\n\t\t\t\t\tflags.numericIds = true\n\t\t\t\t\tflags.permissions = true\n\t\t\t\t\tflags.size = true\n\t\t\t\t\tflags.group = true\n\t\t\t\t\tflags.owner = true\n\t\t\t\t\tflags.multiColumn = false\n\t\t\t\t\tflags.date = true\n\n\t\t\t\tcase 'i': // inode number\n\t\t\t\t\tflags.inode = true\n\n\t\t\t\tcase 'h': // human\n\t\t\t\t\tflags.human = true\n\n\t\t\t\tcase 'L':\n\t\t\t\t\tflags.dereferenceLink = true\n\n\t\t\t\tcase 'H':\n\t\t\t\t\tfmt.Fprintf(os.Stderr, \"WARNING: flag '-h' is not implemented!\")\n\n\t\t\t\tcase 'x': // multi-column output\n\t\t\t\t\tflags.multiColumn = true\n\n\t\t\t\tcase '1': // one column per line\n\t\t\t\t\tflags.multiColumn = false\n\n\t\t\t\tcase 'G': // colors\n\t\t\t\t\tflags.colors = true\n\n\t\t\t\tdefault:\n\t\t\t\t\terr := errors.New(\"unknown flag \" + os.Args[0] + \" ignoring.\")\n\t\t\t\t\tprintError(err)\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\t// stop at first non-flag argument, and threat the rest as files\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// treat the rest of the arguments as files\n\tfor ; i < len(os.Args); i++ {\n\t\targs = append(args, os.Args[i])\n\t}\n\n\tif flags.human && !flags.size {\n\t\tfmt.Printf(\"Usage: %s [-1acdfFgGhilmnpqRsStux] [file ...]\\n\", os.Args[0])\n\t\tos.Exit(1)\n\t}\n\n\tif flags.multiColumn && flags.sep != \",\" {\n\t\tflags.sep = \" \"\n\t}\n\n\treturn flags, args\n}", "title": "" }, { "docid": "bea0506aa85d073c81b19695d6f7fc5b", "score": "0.47724202", "text": "func parseArgs() string {\n\tparser := argparse.NewParser(\"print\", \"Prints provided string to stdout\")\n\ts := parser.String(\"s\", \"string\", &argparse.Options{Required: true, Help: \"String to print 's'\"})\n\terr := parser.Parse(os.Args)\n\tcheck(err)\n\treturn *s\n}", "title": "" }, { "docid": "0a69afc6d74f77d19fc7ff3c2c0a9dd7", "score": "0.4771309", "text": "func (c *Cmd) parseArgs(originalArgs, lowerArgs []string) (err error) {\n\tc.Flags = flag.NewFlagSet(\"apc\", flag.ContinueOnError)\n\t// We leave this empty to overwrite the default behavior of Flags.Usage, but do not\n\t// print help so that we can avoid double-printing command help.\n\tc.Flags.Usage = func() {}\n\taddGlobalFlags(c.Flags)\n\n\t// Lookup the definition for the command we want to run. Get first non-command index.\n\tfirstArg := 0\n\tif c.def, firstArg, err = FindCommand(lowerArgs); err != nil {\n\t\treturn err\n\t}\n\toriginalArgs = originalArgs[firstArg:]\n\n\t// Allow the command to define its flags\n\tif c.def.flagParser != nil {\n\t\tc.def.flagParser(c)\n\t}\n\t// Flags are defined at this point so walk the flags and create a map of\n\t// all allowed flags and not which flags are booleans since they will\n\t// not have a following argument unless it is of the form -x=true.\n\tflagMap := map[string]bool{}\n\tc.Flags.VisitAll(func(f *flag.Flag) {\n\t\tboo := false\n\t\tif gv, ok := f.Value.(flag.Getter); ok {\n\t\t\t_, boo = gv.Get().(bool)\n\t\t}\n\t\tflagMap[\"-\"+f.Name] = boo\n\t\tflagMap[\"--\"+f.Name] = boo\n\t})\n\n\t// Add aliases for help to flagMap; these should always be defined.\n\t// NOTE: these must be in our special map, but gostdlib's flag parsing has\n\t// special cases for help flags that allow us to show help without\n\thelpFlags := []string{\"-h\", \"--h\", \"-help\", \"--help\"}\n\tfor _, h := range helpFlags {\n\t\tflagMap[h] = true\n\t}\n\n\t// Separate the flags and their values, if any, from the arguments.\n\tc.Args = []string{}\n\tvar flagArgs []string\n\n\t// Tracks if sub flags are present. Sub flags are any flags after --\n\t// Eg. apc service create servicename -- --ip 5.5.5.5\n\tsubFlags := false\n\n\t// Use an index so it can be incremented to skip over flag values more\n\t// easily.\n\tfor i := 0; i < len(originalArgs); i++ {\n\t\ta := originalArgs[i]\n\n\t\t// Ensure the argument has at least one character. If this it isn't, add it\n\t\t// to the Args so that the command can handle this oddity. This can happen\n\t\t// if you do: apc app create \"\"\n\t\tif len(a) < 1 {\n\t\t\tc.Args = append(c.Args, a)\n\t\t\tcontinue\n\t\t}\n\n\t\t// If we hit \"--\"\" in the args, then break. Anything after this shouldn't be parsed\n\t\t// Only stored so we can use it within a specific command.\n\t\t// NOTE: this does not support quoted strings as arguments in tests!\n\t\tif a == \"--\" {\n\t\t\tsubFlags = true\n\t\t\tcontinue\n\t\t}\n\t\tif subFlags {\n\t\t\tc.RawSubFlags = append(c.RawSubFlags, a)\n\t\t\tcontinue\n\t\t}\n\n\t\t// If no - prefix then it is an argument\n\t\tif a[0] != '-' {\n\t\t\tc.Args = append(c.Args, a)\n\t\t\tcontinue\n\t\t}\n\t\t// Must be a flag. Find out if it has an = embedded.\n\t\teq := strings.IndexByte(a, '=')\n\t\t// If it has an = embedded then it is a flag with the value\n\t\t// included in the arg.\n\t\tif eq > 0 {\n\t\t\tflagArgs = append(flagArgs, a)\n\t\t\tcontinue\n\t\t}\n\t\t// Check the flag to see if it is a boolean flag. If it is then\n\t\t// just add it to the flag args. If not then a value is expected\n\t\t// to grab the next arg as the value.\n\t\tboo, found := flagMap[a]\n\t\tif !found {\n\t\t\treturn fmt.Errorf(\"%s is not a valid flag\", a)\n\t\t}\n\t\tflagArgs = append(flagArgs, a)\n\t\tif !boo {\n\t\t\ti++\n\n\t\t\t// Check to ensure that we won't go out of bounds here.\n\t\t\tif i < len(originalArgs) {\n\t\t\t\tflagArgs = append(flagArgs, originalArgs[i])\n\t\t\t}\n\t\t}\n\t}\n\t// Parse the flags to populate ValidatedInput.\n\tif err := c.Flags.Parse(flagArgs); err != nil {\n\t\treturn err\n\t}\n\t// Validate the args using the ValidatedInput function.\n\tif c.ValidatedInput != nil {\n\t\treturn c.ValidatedInput.ParseArgs(c.Args)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "65af326014e41ddb2147dc2a48e02a82", "score": "0.47690958", "text": "func (p *LsCmd) ValidateCloudArgs() error {\n return ValidatePfsPath(p.Path)\n}", "title": "" }, { "docid": "83d204a73d2ada05263b3d33d6ae971b", "score": "0.4766881", "text": "func (command *Command) sanitizeArguments(){\n if packagePath != \"\" {\n for i, argument := range command.Arguments{\n if argument == \"$1\" {\n command.Arguments[i] = packagePath\n }\n }\n }\n}", "title": "" }, { "docid": "b792f589307919b613b0e3a87ee27ec1", "score": "0.47639012", "text": "func unrecognizedArguments(tls *libc.TLS, argv0 uintptr, nArg int32, azArg uintptr) { /* mptest.c:1265:13: */\n\tbp := tls.Alloc(16)\n\tdefer tls.Free(16)\n\n\tvar i int32\n\tlibc.Xfprintf(tls, libc.Xstderr, ts+2289 /* \"%s: unrecognized...\" */, libc.VaList(bp, argv0))\n\tfor i = 0; i < nArg; i++ {\n\t\tlibc.Xfprintf(tls, libc.Xstderr, ts+2317 /* \" %s\" */, libc.VaList(bp+8, *(*uintptr)(unsafe.Pointer(azArg + uintptr(i)*4))))\n\t}\n\tlibc.Xfprintf(tls, libc.Xstderr, ts+2321 /* \"\\n\" */, 0)\n\tlibc.Xexit(tls, 1)\n}", "title": "" }, { "docid": "69ccb330328fce7d7d8a69ef5e5e4ec7", "score": "0.47581708", "text": "func main() {\n\tif len(os.Args) < 2 {\n\t\tusage()\n\t}\n\n\ts := strings.TrimSpace(os.Args[1])\n\n\tfmt.Println(\"Calculating:\", s)\n\n\tr, err := calculate(s)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\tfmt.Println(\"Result:\", r)\n}", "title": "" }, { "docid": "1251a9b11f4e3bc6f0f6fe3716391ce6", "score": "0.47505528", "text": "func Example_errorText() {\n\t// These are the args you would pass in on the command line\n\tos.Args = split(\"./example --optimize INVALID\")\n\n\tvar args struct {\n\t\tInput string `arg:\"positional,required\"`\n\t\tOutput []string `arg:\"positional\"`\n\t\tVerbose bool `arg:\"-v\" help:\"verbosity level\"`\n\t\tDataset string `help:\"dataset to use\"`\n\t\tOptimize int `arg:\"-O,help:optimization level\"`\n\t}\n\n\t// This is only necessary when running inside golang's runnable example harness\n\tmustParseExit = func(int) {}\n\n\tMustParse(&args)\n\n\t// output:\n\t// Usage: example [--verbose] [--dataset DATASET] [--optimize OPTIMIZE] INPUT [OUTPUT [OUTPUT ...]]\n\t// error: error processing --optimize: strconv.ParseInt: parsing \"INVALID\": invalid syntax\n}", "title": "" }, { "docid": "8d2ca65decb85c0c061eb6288c31ad9c", "score": "0.4747987", "text": "func checkListArgs(cmd *cobra.Command, args []string) error {\n\targsLen := len(args)\n\n\tif argsLen == 0 {\n\t\tcmd.Usage()\n\t\tos.Exit(0)\n\t}\n\n\tif argsLen > 2 {\n\t\treturn fmt.Errorf(\"requires only ORG_SLUG and optionally NAME argument\")\n\t}\n\n\tif err := ak.SetOrgSlug(args[0]); err != nil {\n\t\treturn err\n\t}\n\n\tif argsLen == 2 {\n\t\tif err := ak.SetName(args[1]); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif token, err := common.GetToken(cmd); err == nil {\n\t\tak.SetToken(token)\n\t} else {\n\t\treturn fmt.Errorf(\"failed to get authorization token: %s\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e485e9b3129109ebb1ed46a1f06d5bd0", "score": "0.47342277", "text": "func validateRequiredArgs(cmd *Command, cmdArgs interface{}, rawArgs args.RawArgs) error {\n\tfor _, arg := range cmd.ArgSpecs {\n\t\tif !arg.Required {\n\t\t\tcontinue\n\t\t}\n\n\t\tfieldName := strcase.ToPublicGoName(arg.Name)\n\t\tfieldValues, err := getValuesForFieldByName(reflect.ValueOf(cmdArgs), strings.Split(fieldName, \".\"))\n\t\tif err != nil {\n\t\t\tvalidationErr := fmt.Errorf(\"could not validate arg value for '%v': invalid field name '%v': %v\", arg.Name, fieldName, err.Error())\n\t\t\tif !arg.Required {\n\t\t\t\tlogger.Infof(validationErr.Error())\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tpanic(validationErr)\n\t\t}\n\n\t\t// Either fieldsValues have a length for 1 and we check for existence in the rawArgs\n\t\t// or it has multiple values and we loop through each one to get the right element in\n\t\t// the corresponding rawArgs array and replace {index} by the element's index.\n\t\t// TODO handle required maps\n\t\tfor i := range fieldValues {\n\t\t\tif !rawArgs.ExistsArgByName(strings.Replace(arg.Name, \"{index}\", strconv.Itoa(i), 1)) {\n\t\t\t\treturn MissingRequiredArgumentError(strings.Replace(arg.Name, \"{index}\", strconv.Itoa(i), 1))\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "59c61241fbe9a4eb239caaf3e2a41b94", "score": "0.4732296", "text": "func checkParameters(cmd string, name string) {\n\tif flag.NArg() == 0 || flag.NArg() > 2 {\n\t\tflag.Usage()\n\t}\n\tif (cmd == \"start\" || cmd == \"stop\") && name == \"\" {\n\t\tfmt.Fprint(os.Stderr, \"Please specify the name of the timer.\\n\")\n\t\tos.Exit(1)\n\t}\n\tif cmd == \"exec\" && name == \"\" {\n\t\tfmt.Fprint(os.Stderr, \"Please specify a task to execute.\\n\")\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "3f275b7fb87ee573b42ee176576a0b37", "score": "0.47115496", "text": "func checkversOutdated(baseArgs []string) ([]string, error) {\n cmd := exec.Command(\"xbps-checkvers\", baseArgs...)\n out, err := cmd.Output()\n if err != nil {\n return []string{}, fmt.Errorf(\"Error %w while running %v\", err, cmd.Args)\n }\n return str.Split(string(out[:]), \"\\n\"), nil\n}", "title": "" }, { "docid": "fe114c4686529ccd14bb85b9913ab9de", "score": "0.4710708", "text": "func checkversAll(baseArgs []string) ([]string, error) {\n args := append(baseArgs, \"-s\")\n cmd := exec.Command(\"xbps-checkvers\", args...)\n out, err := cmd.Output()\n if err != nil {\n return []string{}, fmt.Errorf(\"Error %w while running %v\", err, cmd.Args)\n }\n return str.Split(string(out[:]), \"\\n\"), nil\n}", "title": "" }, { "docid": "4d604d04e7e15a0d515e4199278bf0ec", "score": "0.47011593", "text": "func parseOneArgument(conf *SSHConfig, i int, unparsed []string) ([]string, int) {\n\tvar err error\n\tswitch os.Args[i] {\n\tcase \"-b\":\n\t\tconf.bufSize, err = strconv.Atoi(os.Args[i+1])\n\t\ti++\n\t\tif err != nil{\n\t\t\tusage(\"Buffer size not correct. Should be integer.\", conf)\n\t\t}\n\tcase \"-h\":\n\t\tusage(\"\", conf)\n\tcase \"-l\":\n\t\tconf.listen = true\n\tcase \"-L\":\n\t\tif conf.remotePortForwarding{\n\t\t\tusage(\"Cannot create remote and local port forwarding from a single call\", conf)\n\t\t}\n\t\tconf.localPortForwarding = true\n\t\tstr := strings.Split(os.Args[i+1], \":\")\n\t\tif len(str) < 3{\n\t\t\tusage(\"Bad argument for local port forwarding\", conf)\n\t\t}\n\t\tval, err := strconv.Atoi(str[0])\n\t\tconf.localPort = uint16(val)\n\t\tif err != nil {\n\t\t\tusage(\"Local port not correct. Should be integer.\", conf)\n\t\t}\n\t\tval , err = strconv.Atoi(str[len(str)-1])\n\t\tconf.remotePort = uint16(val)\n\t\tif err != nil {\n\t\t\tusage(\"Remote port not correct. Should be integer.\", conf)\n\t\t}\n\t\thostnameStr := os.Args[i+1][len(str[0])+1:len(os.Args[i+1])-(len(str[len(str)-1])+1)]\n\t\tif strings.Index(hostnameStr, \"[\") == 0 &&\n\t\t\tstrings.LastIndex(hostnameStr, \"]\") == len(hostnameStr)-1 {\n\t\t\thostnameStr = hostnameStr [1:len(hostnameStr)-1]\n\t\t}\n\t\terr, remoteIP := resolveHostname(hostnameStr)\n\t\tif err != nil{\n\t\t\tusage(\"Remote hostname cannot be resolved.\", conf)\n\t\t}\n\t\tconf.remoteIP = remoteIP\n\t\ti++\n\tcase \"-N\":\n\t\tconf.onlyForwardPort = true\n\tcase \"-R\":\n\t\tif conf.localPortForwarding{\n\t\t\tusage(\"Cannot create remote and local port forwarding from a single call\", conf)\n\t\t}\n\t\tconf.remotePortForwarding = true\n\t\tstr := strings.Split(os.Args[i+1], \":\")\n\t\tif len(str) != 3{\n\t\t\tusage(\"Bad argument for remote port forwarding\", conf)\n\t\t}\n\t\tval, err := strconv.Atoi(str[0])\n\t\tconf.localPort = uint16(val)\n\t\tif err != nil {\n\t\t\tusage(\"Local port not correct. Should be integer.\", conf)\n\t\t}\n\t\tval , err = strconv.Atoi(str[len(str)-1])\n\t\tconf.remotePort = uint16(val)\n\t\tif err != nil {\n\t\t\tusage(\"Remote port not correct. Should be integer.\", conf)\n\t\t}\n\t\thostnameStr := os.Args[i+1][len(str[0])+1:len(os.Args[i+1])-(len(str[len(str)-1])+1)]\n\t\tif strings.Index(hostnameStr, \"[\") == 0 &&\n\t\t\tstrings.LastIndex(hostnameStr, \"]\") == len(hostnameStr)-1 {\n\t\t\thostnameStr = hostnameStr [1:len(hostnameStr)-1]\n\t\t}\n\t\terr, remoteIP := resolveHostname(hostnameStr)\n\t\tif err != nil{\n\t\t\tusage(\"Remote hostname cannot be resolved.\", conf)\n\t\t}\n\t\tconf.remoteIP = remoteIP\n\t\ti++\n\tcase \"--priv\":\n\t\tconf.privKeyFile = os.Args[i+1]\n\t\ti++\n\tcase \"--pub\":\n\t\tconf.pubKeyFile = os.Args[i+1]\n\t\ti++\n\tcase \"--req\":\n\t\tconf.authorizedPublicKeysFile = os.Args[i+1]\n\t\ti++\n\tcase \"--user\":\n\t\tconf.username = os.Args[i+1]\n\t\ti++\n\tcase \"--pass\":\n\t\tconf.password = os.Args[i+1]\n\t\ti++\n\tdefault:\n\t\tunparsed = append(unparsed, os.Args[i])\n\t}\n\treturn unparsed, i\n}", "title": "" }, { "docid": "c7ebce29998b95f8fe9a2b3e9be864cf", "score": "0.47000375", "text": "func parseArgs() {\r\n\tflag.Parse()\r\n\tinputargs := flag.Args()\r\n\tvar err error\r\n svaddr = make(map[int]*net.TCPAddr)\r\n\tif len(inputargs) < 7 {\r\n\t\tfmt.Printf(\"Not enough inputs.\\n\")\r\n\t\treturn\r\n\t}\r\n\tname = inputargs[0]\r\n\tmyaddr, err = net.ResolveTCPAddr(\"tcp\", inputargs[1])\r\n\tcheckError(err)\r\n getNodeAddr(inputargs[2])\r\n\ttrainset = inputargs[3]\r\n\ttestset = inputargs[4]\r\n\tmodeltype = inputargs[5]\r\n\tlogger = govec.InitGoVector(inputargs[0], inputargs[6])\r\n}", "title": "" } ]
212d971e4103b2704b64bf641c72315a
tell the server to shut itself down. please do not change this function.
[ { "docid": "c14091a7f2d0b14e2f6946911162dca6", "score": "0.0", "text": "func (pb *PBServer) kill() {\n pb.dead = true\n pb.l.Close()\n}", "title": "" } ]
[ { "docid": "52f03fd5ec79e88807f3d8f2bc9de78b", "score": "0.7385331", "text": "func (srv *Server) Shutdown(ctx context.Context) error", "title": "" }, { "docid": "99ee642e4bf6002f10acc83cd5d2a600", "score": "0.7261399", "text": "func (s *Server) ShutDown() {\n\tif err := s.httpServer.Shutdown(context.Background()); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "59e6a8e0c4e4d88e5fc65eab2a31c63a", "score": "0.71634483", "text": "func (s *Server) Shutdown() {\n\t// ... Do business Logic for shutdown\n\t// Shutdown works by:\n\t// first closing open listener for income packet and refuse all new packet,\n\t// then closing all idle connections,\n\t// and then waiting indefinitely for connections to return to idle\n\t// and then shut down\n\n\t// Send signal to DNS & Certificate server to revoke app data.\n\n\t// it must change to 0 otherwise it means app can't close normally\n\ts.Status = 1\n}", "title": "" }, { "docid": "988e57c5b8dc1f9d9363fd4536e650e3", "score": "0.70787966", "text": "func (s *Server) Stop() { s.s.Stop() }", "title": "" }, { "docid": "536c7d1350ee939e30ff3cd897e3445d", "score": "0.6902872", "text": "func shutdown(server *HashHttpServer, resp http.ResponseWriter, req *http.Request) {\n if req.Method != \"GET\" {\n\t// ensure GET only \n\tresp.WriteHeader(405) // Return 405 Method Not Allowed.\n\treturn\n }\n // Stop new requests from coming in\n server.shutdown = true\n\n // Wait for threads and server to shutdown in another thread so we can close this connection\n go func() {\n // Wait for in progress request routines to finish\n server.waitg.Wait()\n\n\tif err := server.htserver.Shutdown(context.Background()); err != nil {\n\t\t// Error from closing listeners, or context timeout:\n\t\tlog.Fatal(err)\n\t\t}\n\n\t}()\n\n fmt.Fprintf(resp, \"shutting down\")\n}", "title": "" }, { "docid": "fcbccf3db8aaaaacda0744a4f882a252", "score": "0.684196", "text": "func (s *Server) Shutdown(ctx context.Context) error { return s.srv.Shutdown(ctx) }", "title": "" }, { "docid": "c052c4e45569f88d3989a82172f4223d", "score": "0.68343884", "text": "func (s *Server) Shutdown() {\n\ts.cancel()\n}", "title": "" }, { "docid": "fe85fc85557b25112d2dc4618c7e86c9", "score": "0.67329663", "text": "func (server *Server) Shutdown() {\n\tserver.mutex.Lock()\n\tserver.running = false\n\tserver.mutex.Unlock()\n\n\tclose(server.closingChannel)\n\n\twg.Wait() //Wait for all the receivers to end\n\n\tlog.Println(\"[SOCKET] -> Shutting down the socket server...\")\n\n\tserver.mutex.Lock()\n\tif server.listener != nil {\n\t\t(*server.listener).Close()\n\t\tcbroadcast.Broadcast(BSocketClose, nil)\n\t}\n\tserver.mutex.Unlock()\n}", "title": "" }, { "docid": "f406681e3f44a5cf9d4c4bbe09169568", "score": "0.67294466", "text": "func shutDown(ctx context.Context, conn *grpc.ClientConn, signal chan struct{}) {\n\t<-ctx.Done()\n\tconn.Close()\n\tclose(signal)\n}", "title": "" }, { "docid": "df8a3c34534781e0d93948ef6f46222b", "score": "0.6724029", "text": "func (c *Config) ShutDown() {\n\tc.listener.shutDown()\n}", "title": "" }, { "docid": "138b8606055e4396272e4f197d97092f", "score": "0.66721094", "text": "func (s *Server) Stop() {\n\ts.srv.Shutdown(context.Background())\n}", "title": "" }, { "docid": "36ee626c0c854d1df8f6c44cb8661cfb", "score": "0.6656988", "text": "func (s *Srv) Stop() error {\n\tfmt.Printf(\"Shutting down server running on port %s.\\n\", s.server.Addr)\n\treturn s.server.Shutdown(context.Background())\n}", "title": "" }, { "docid": "93347c6061df2a02d4a3d15c22362171", "score": "0.6634661", "text": "func (s *Server) Stop() {\n\tif s.closed {\n\t\treturn\n\t}\n\ts.closed = true\n\tif err := s.server.Close(); err != nil {\n\t\tlog.Printf(\"close redcon err: %+v\\n\", err)\n\t}\n\tif err := s.db.Close(); err != nil {\n\t\tlog.Printf(\"close julenkv err: %+v\\n\", err)\n\t}\n}", "title": "" }, { "docid": "d5b0913e3ae50c67644fe5f94e89cdbd", "score": "0.66345036", "text": "func (s *server) Stop() error {\n\t// Make sure this only happens once.\n\tif atomic.AddInt32(&s.shutdown, 1) != 1 {\n\t\tsrvrLog.Infof(\"Server is already in the process of shutting down\")\n\t\treturn nil\n\t}\n\n\tsrvrLog.Warnf(\"Server shutting down\")\n\n\t// Stop all the listeners. There will not be any listeners if\n\t// listening is disabled.\n\tfor _, listener := range s.listeners {\n\t\terr := listener.Close()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Stop the CPU miner if needed\n\ts.cpuMiner.Stop()\n\n\t// Shutdown the RPC server if it's not disabled.\n\tif !cfg.DisableRPC {\n\t\ts.rpcServer.Stop()\n\t}\n\n\t// Signal the remaining goroutines to quit.\n\tclose(s.quit)\n\treturn nil\n}", "title": "" }, { "docid": "e1b30ed3f94621b1c575e494eb0e2d4c", "score": "0.6628133", "text": "func (*Server) Shutdown(conn protocol.Conn) error {\n\n\tconn.ShowMessage(&protocol.ShowMessageParams{\n\t\tType: protocol.Warning,\n\t\tMessage: \"Cadence language server is shutting down\",\n\t})\n\n\treturn nil\n}", "title": "" }, { "docid": "63aedce31c52004d6502d1a1568c9f14", "score": "0.6604342", "text": "func (s *Server) Shutdown() {\n\t// Note: You might get clever and think you can do this in handler() as a defer, you can't.\n\t_ = s.s.Shutdown(context.Background())\n}", "title": "" }, { "docid": "e56adf34a3445c7f3b0b6eba85386fa9", "score": "0.6598739", "text": "func shutDownGracefully(srv *http.Server) {\n infoLog.Println(\"Server is shutting down...\")\n ctx, cancel := context.WithTimeout(context.Background(), 10 * time.Second)\n defer cancel()\n\n if err := srv.Shutdown(ctx); err != nil {\n errLog.Fatalf(\"Graceful shut down failed - error: %v\\n\", err)\n }\n}", "title": "" }, { "docid": "49a2da3b8b67c7e3e8bac259ee2550b9", "score": "0.65981835", "text": "func (h *HTTP) Stop() error {\n\th.log.Info().Msgf(\"Shutting down the server...%s\", h.Name())\n\n\tctx, _ := context.WithTimeout(context.Background(), 25*time.Second)\n\n\terr := h.s.Shutdown(ctx)\n\tclose(h.closing)\n\th.log.Info().Msg(\"Server gracefully stopped\")\n\treturn err\n}", "title": "" }, { "docid": "feb2a0e8311a2872d2f31e3009de4ae7", "score": "0.65797704", "text": "func (s *server) Stop() error {\n\t// Make sure this only happens once.\n\tif atomic.AddInt32(&s.shutdown, 1) != 1 {\n\t\tlog.Infof(\"server is already in the process of shutting down\")\n\t\treturn nil\n\t}\n\n\tlog.Warnf(\"server shutting down\")\n\n\t// Signal the remaining goroutines to quit.\n\tclose(s.quit)\n\ts.WaitForShutdown()\n\treturn nil\n}", "title": "" }, { "docid": "17b3c5922a6bc2bd4ad300a8e0c7d30a", "score": "0.6571267", "text": "func (srv *Server) Stop() {\n\t_ = srv.server.Close()\n}", "title": "" }, { "docid": "7870e717bbe294c08b3499b278352b56", "score": "0.6564795", "text": "func (s *Server) Shutdown() error {\n\tselect {\n\tcase <-s.done:\n\t\treturn fmt.Errorf(\"shutdown but not serving\")\n\tdefault:\n\t\tclose(s.done)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a4b4ab6d07c4652f7ed3118c6163cc69", "score": "0.65635264", "text": "func (s *server) Shutdown() error {\n\t// Create a deadline to wait for.\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second*10)\n\tdefer cancel()\n\t// Doesn't block if no connections, but will otherwise wait\n\t// until the timeout deadline.\n\tif err := s.s.Shutdown(ctx); err != nil {\n\t\treturn err\n\t}\n\t// Optionally, you could run srv.Shutdown in a goroutine and block on\n\t// <-ctx.Done() if your application should wait for other services\n\t// to finalize based on context cancellation.\n\tlog.Println(\"shutting down\")\n\treturn nil\n}", "title": "" }, { "docid": "6b28802dc737cacff3485dfbdd12e539", "score": "0.6556488", "text": "func (ms TestServer) Stop() {\n\t_ = ms.server.Close()\n}", "title": "" }, { "docid": "106c8463df51493cc0b03978889ee842", "score": "0.65528214", "text": "func (mcfg *newMuxConfig) ShutDown(ctx context.Context) error {\n\tif mcfg.srv != nil {\n\t\treturn mcfg.srv.Shutdown(ctx)\n\t}\n\treturn errors.New(serverDoesNotExist)\n}", "title": "" }, { "docid": "6e0d59b52659741a03015e387ff338b4", "score": "0.65523547", "text": "func (s *Server) Shutdown() error {\n\treturn nil\n}", "title": "" }, { "docid": "51dad25d73ccbf3d453236314cf3cfbc", "score": "0.65476304", "text": "func (e *express) Shutdown(ctx context.Context) error {\n log.Println(\"Stopping the server\")\n return e.server.Shutdown(ctx)\n}", "title": "" }, { "docid": "3f185c525d5635e314eda12b4b7ecd4c", "score": "0.6543074", "text": "func shutdown() {\n\n\tlog.Println(\"Entering shutdown\")\n\n\tif appServer != nil {\n\n\t\tlog.Println(\"Shutting down application server\")\n\t\terr := appServer.Shutdown()\n\n\t\tif err != nil {\n\t\t\tlog.Println(\"Error received when shutting down application server: \" + err.Error())\n\t\t}\n\t}\n\n\tlog.Println(\"Exiting shutdown\")\n}", "title": "" }, { "docid": "50c8cc740eb20d70c33b8a19f5a4a08a", "score": "0.653312", "text": "func (s *Server) Stop(ctx context.Context) {\n\tif err := s.echo.Shutdown(ctx); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "85c76900dec976fdcf8af6284e7616eb", "score": "0.65327567", "text": "func (s *server) Shutdown(context.Context) error {\n\treturn nil\n}", "title": "" }, { "docid": "5a8c23f85a7d9a38b3109e31434d9ee9", "score": "0.6519606", "text": "func (s *Server) Stop(_ context.Context) error {\n\tatomic.StoreInt32(&s.active, 0)\n\ts.srv.GracefulStop()\n\n\tlevel.Info(s.logger).Log(\"msg\", \"closed cluster server\", \"bind_addr\", s.getAddress())\n\treturn nil\n}", "title": "" }, { "docid": "54ba901a5927f60ac2e9f08c46c877d2", "score": "0.6518043", "text": "func (server *Server) Stop() error {\n\treturn server.telnet.Disconnect()\n}", "title": "" }, { "docid": "63712302987b5557ed65395afc32060b", "score": "0.65090793", "text": "func (srv *Server) Shutdown() {\n\tsrv.logInfo.Printf(\n\t\t\"Shutting down Thermomatic server listening at %s\\n\",\n\t\tsrv.listener.Addr())\n\n\tif err := srv.httpServer.Shutdown(context.Background()); err != nil {\n\t\tsrv.logError.Println(err)\n\t}\n\n\tclose(srv.stop)\n\t<-srv.exited\n\tsrv.logInfo.Println(\"Finished shutting down Thermomatic server.\")\n}", "title": "" }, { "docid": "c70364ef9441c22defff0facd59aad2f", "score": "0.6506802", "text": "func (dockness *Dockness) Shutdown() error {\n\tdockness.Log(\"Shutting down DNS server.\")\n\n\tdns.HandleRemove(dockness.Tld + \".\")\n\tdockness.Client.Close()\n\n\treturn dockness.Server.Shutdown()\n}", "title": "" }, { "docid": "30adac48e0f7f1359be3a2c753c6249e", "score": "0.65057814", "text": "func (s *serverImpl) Teardown() error {\n\ts.deliverer.Close()\n\treturn s.broadcaster.Close()\n}", "title": "" }, { "docid": "81a9fd219e0734de48eff9463409d2c8", "score": "0.6483431", "text": "func (s *Server) Stop() {\n\tlog.Printf(\"-> Stop(%s):%d\\n\", s.cluster.key, s.cfg.Port)\n\n\tif s.cancelWatcher != nil {\n\t\ts.cancelWatcher()\n\t}\n\ts.cluster.unjoin()\n\ts.rpc.Stop()\n}", "title": "" }, { "docid": "5740af1d83aa2587057569cdc8bd883a", "score": "0.64816874", "text": "func (ps *PhishingServer) Shutdown() error {\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second*10)\n\tdefer cancel()\n\treturn ps.server.Shutdown(ctx)\n}", "title": "" }, { "docid": "cf5d8192a7cafc1e7b1c759568c2e34c", "score": "0.64747167", "text": "func (server *Server) Shutdown() {\n\tserver.cancel()\n\tserver.wg.Wait()\n}", "title": "" }, { "docid": "6c72ecaa935bc1d98af21e818c07e64a", "score": "0.6467401", "text": "func (s *Server) Stop() {\n\tq := make(chan struct{})\n\ts.quit <- q\n\t<-q\n\ts.logGeneric(\"server stopped\")\n}", "title": "" }, { "docid": "7eae06089a564d86a4acc72a78d29cf1", "score": "0.64656234", "text": "func (s *Server) Stop() error {\n\ts.started = false\n\tif err := s.listener.Close(); err != nil {\n\t\tlog.Errorf(\"error shutting down RPC, %v\\n\", err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4249e737ee1fca0d9f78605521ac8fdb", "score": "0.64649916", "text": "func (s *Server) Shutdown() {\n\tfor i := 0; i < shutdownChannels; i++ {\n\t\ts.shutdown <- true\n\t}\n\n\t// Unblock the switchboard listener to get the shutdown message delivered\n\tswitch s.config.ServerAddress.Type {\n\tcase connection.TCP:\n\t\tif conn, err := net.Dial(s.Addr().Network(), s.Addr().String()); err == nil {\n\t\t\tconn.Close()\n\t\t}\n\tcase connection.SCION:\n\t\ts.packetConn.Close()\n\tdefault:\n\t\tlog.Warn(\"Unsupported Network address type.\")\n\t}\n\n\ts.caches.ConnCache.CloseAndRemoveAllConnections()\n\ts.queues.Normal <- util.MsgSectionSender{}\n\ts.queues.Prio <- util.MsgSectionSender{}\n\ts.queues.Notify <- util.MsgSectionSender{}\n\tlog.Info(\"Server shut down\")\n}", "title": "" }, { "docid": "cd3c80ccd2370316e00318b78ba8f71f", "score": "0.6461226", "text": "func (s *Server) Stop() {\n\ts.once.Do(func() {\n\t\tclose(s.done)\n\t})\n}", "title": "" }, { "docid": "6ec0fc4f66bc3457c0233f4ebfa0aaeb", "score": "0.645082", "text": "func (s *Server) Stop() {\n\ts.Conn.Stop()\n}", "title": "" }, { "docid": "f4d83731b715e51a19ba5d0b4b6afa93", "score": "0.6442184", "text": "func (s *Server) Shutdown() error {\n\tvar e error\n\te = s.listener.Close()\n\tif s.addr.Network == \"unix\" {\n\t\tif rme := os.Remove(s.addr.NetAddr); rme != nil {\n\t\t\tif e != nil {\n\t\t\t\te = fmt.Errorf(\"shutdown errors: %s, %s\", e, rme)\n\t\t\t} else {\n\t\t\t\te = fmt.Errorf(\"shutdown error: %s\", rme)\n\t\t\t}\n\t\t}\n\t}\n\treturn e\n}", "title": "" }, { "docid": "7275c71f775c86e8211a41c293a7630b", "score": "0.64381915", "text": "func (s *Server) Shutdown() {\n\ts.sshServer.Close()\n}", "title": "" }, { "docid": "3aa15b33148ce7d39c68c74b70c9ebe2", "score": "0.64351094", "text": "func (s *Server) Shutdown() {\n\ts.dnsServer.Shutdown()\n}", "title": "" }, { "docid": "49836b4f38bf84d8faed77b5420c0a0d", "score": "0.6434553", "text": "func (s *Server) Stop() {\n\tlog.LogTrace(\"SMTP shutdown requested, connections will be drained\")\n\ts.shutdown = true\n\ts.listener.Close()\n}", "title": "" }, { "docid": "8e54155e25a1f023c608c6399de3ef57", "score": "0.6430176", "text": "func (htmlServer *HTMLServer) Stop() error {\n\t// Create a context to attempt a graceful 5 second shutdown.\n\tconst timeout = 5 * time.Second\n\tctx, cancel := context.WithTimeout(context.Background(), timeout)\n\tdefer cancel()\n\n\tfmt.Printf(\"\\nTest Server : Service stopping\\n\")\n\n\t// Attempt the graceful shutdown by closing the listener\n\t// and completing all inflight requests\n\tif err := htmlServer.server.Shutdown(ctx); err != nil {\n\t\t// Looks like we timed out on the graceful shutdown. Force close.\n\t\tif err := htmlServer.server.Close(); err != nil {\n\t\t\tfmt.Printf(\"\\nTest Server : Service stopping : Error=%v\\n\", err)\n\t\t\treturn err\n\t\t}\n\t}\n\t// Wait for the listener to report that it is closed.\n\thtmlServer.wg.Wait()\n\tfmt.Printf(\"\\nTest Server : Stopped\\n\")\n\treturn nil\n}", "title": "" }, { "docid": "a088ca9336ba96f89f7f4f27ab62a482", "score": "0.6424569", "text": "func (s *Server) Shutdown() error {\n\ts.api.ServerShutdown()\n\treturn nil\n}", "title": "" }, { "docid": "f78df12a364b781ac8d3a89998581c0e", "score": "0.642268", "text": "func (s *Server) Stop() {\n\ts.server.Stop()\n}", "title": "" }, { "docid": "6c8deb8d14012b04ef7c6a49ba4d586a", "score": "0.6409769", "text": "func (w *Server) Stop() {\n\tlogger.Info(\"Wallet Server Stop Running\")\n\tw.bus.Unsubscribe(eventbus.TopicUtxoUpdate, w.onUtxoChange)\n\tw.proc.Close()\n}", "title": "" }, { "docid": "be5b7fd079ea2f19fc32f36b1d1c8f3a", "score": "0.64013535", "text": "func (s *Server) Stop() {\n\tif err := s.stsServer.Shutdown(context.TODO()); err != nil {\n\t\tstsServerLog.Errorf(\"failed to shut down STS server: %v\", err)\n\t}\n}", "title": "" }, { "docid": "31267df87db40aed638c68fcab3c061a", "score": "0.64010704", "text": "func (srv *Server) Quit() {\n\tsrv.listener.Close()\n}", "title": "" }, { "docid": "d45ec325ba620e1d62b25ebe41cef9c8", "score": "0.6400278", "text": "func (a *api) Stop() error {\n\ta.Lock()\n\tdefer a.Unlock()\n\tif !a.started {\n\t\treturn fmt.Errorf(\"web server is already down\")\n\t}\n\tif a.shutdown == nil {\n\t\treturn fmt.Errorf(\"shutdown channel is not defined\")\n\t}\n\tclose(a.shutdown)\n\tctx, cancel := context.WithTimeout(context.Background(), a.ShutdownTimeout)\n\tdefer cancel()\n\treturn a.e.Shutdown(ctx)\n}", "title": "" }, { "docid": "deee82af1e7110c4ef90c0040e62324a", "score": "0.63915324", "text": "func shutdown() {\n\tlog.Println(\"My Shutting down..\")\n\n\ts.Stop()\n\n\tos.Exit(0)\n}", "title": "" }, { "docid": "edabe6ecfb435d6191ffff1f0d835591", "score": "0.63884574", "text": "func (srv *Server) Shutdown() {\n\tif srv.shuttingDown() {\n\t\treturn\n\t}\n\n\tatomic.AddInt32(&srv.inShutdown, 1)\n\tdefer atomic.AddInt32(&srv.inShutdown, -1)\n\t// stop transaction layer\n\tsrv.tx.Cancel()\n\t<-srv.tx.Done()\n\t// stop transport layer\n\tsrv.tp.Cancel()\n\t<-srv.tp.Done()\n\t// wait for handlers\n\tsrv.hwg.Wait()\n}", "title": "" }, { "docid": "bf43a5ddf9927cfed658dcad95dece1d", "score": "0.6380521", "text": "func (htmlServer *HTMLServer) Stop() error {\n\t// Create a context to attempt a graceful 5 second shutdown.\n\tconst timeout = 5 * time.Second\n\tctx, cancel := context.WithTimeout(context.Background(), timeout)\n\tdefer cancel()\n\n\tfmt.Printf(\"\\nHTMLServer : Service stopping\\n\")\n\n\t// Attempt the graceful shutdown by closing the listener\n\t// and completing all inflight requests\n\tif err := htmlServer.server.Shutdown(ctx); err != nil {\n\t\t// Looks like we timed out on the graceful shutdown. Force close.\n\t\tif err := htmlServer.server.Close(); err != nil {\n\t\t\tfmt.Printf(\"\\nHTMLServer : Service stopping : Error=%v\\n\", err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Wait for the listener to report that it is closed.\n\thtmlServer.wg.Wait()\n\tfmt.Printf(\"\\nHTMLServer : Stopped\\n\")\n\treturn nil\n}", "title": "" }, { "docid": "45468b91895780deea69af6ba4b84de3", "score": "0.6377058", "text": "func (ls *LMSServer) Stop() {\n\tls.update <- true\n\tif ls.sses.active {\n\t\tclose(ls.sses.events)\n\t}\n\tls.Player.Stop()\n}", "title": "" }, { "docid": "f916154463e455b5a776a990f9d8b6bb", "score": "0.6374267", "text": "func (p *Server) Stop() {\n\tp.up = false\n\tif p.listener != nil {\n\t\tif err := p.listener.Close(); err != nil {\n\t\t\tlogrus.Errorf(\"Could not stop listener %s\", err.Error())\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "801579a17712fa523a66990f53cfb0f2", "score": "0.6372295", "text": "func (s *Server) Stop() {\n\ts.s.Stop()\n}", "title": "" }, { "docid": "4ecf91f24cfc79c622c3e2755ac8ba84", "score": "0.63719565", "text": "func (s *Server) Shutdown() error {\n\ts.logger.Printf(\"[INFO] consul: shutting down server\")\n\ts.shutdownLock.Lock()\n\tdefer s.shutdownLock.Unlock()\n\n\tif s.shutdown {\n\t\treturn nil\n\t}\n\n\ts.shutdown = true\n\tclose(s.shutdownCh)\n\n\tif s.serfLAN != nil {\n\t\ts.serfLAN.Shutdown()\n\t}\n\n\tif s.serfWAN != nil {\n\t\ts.serfWAN.Shutdown()\n\t}\n\n\tif s.raft != nil {\n\t\ts.raftTransport.Close()\n\t\ts.raftLayer.Close()\n\t\tfuture := s.raft.Shutdown()\n\t\tif err := future.Error(); err != nil {\n\t\t\ts.logger.Printf(\"[WARN] consul: Error shutting down raft: %s\", err)\n\t\t}\n\t\tif s.raftStore != nil {\n\t\t\ts.raftStore.Close()\n\t\t}\n\n\t\t// Clear the peer set on a graceful leave to avoid\n\t\t// triggering elections on a rejoin.\n\t\tif s.left {\n\t\t\ts.raftPeers.SetPeers(nil)\n\t\t}\n\t}\n\n\tif s.rpcListener != nil {\n\t\ts.rpcListener.Close()\n\t}\n\n\t// Close the connection pool\n\ts.connPool.Shutdown()\n\n\treturn nil\n}", "title": "" }, { "docid": "21feef35212a4ea233d1f1e7ee6f1d2f", "score": "0.63709664", "text": "func (s *Server) Stop() {\n\tif s.quitting {\n\t\treturn\n\t}\n\ts.quitting = true\n\ts.listener.Close()\n}", "title": "" }, { "docid": "dbc5bd26eff5c0e4beb80d871bf46d56", "score": "0.6366249", "text": "func (self *UnicastServer) Stop() error {\n\terr := self.Socket.Close()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9a171accd38647cc681473c8b173f634", "score": "0.6364396", "text": "func (h *Handler) shutdown() error {\n\tif h.httpServer == nil {\n\t\treturn nil\n\t}\n\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\tdefer cancel()\n\treturn h.httpServer.Shutdown(ctx)\n}", "title": "" }, { "docid": "854b648d39fc425b4cbcdd5d8415bc56", "score": "0.6363828", "text": "func (mmhb *MMHB) Shutdown() {\n\tdefer mmhb.session.Close()\n\tserver := mmhb.getServer()\n\terr := mmhb.serverC.Remove(bson.M{\"ServerGroup\": server.ServerGroup, \"ServerName\": server.ServerName})\n\tif err != nil {\n\t\tlog.Err.Println(err)\n\t}\n}", "title": "" }, { "docid": "34c0965fc42e4bb7d4a1b1117ba3c6fc", "score": "0.6352978", "text": "func (sv *Server) Stop(stop func()) {\n\tdone := <-sv.done()\n\tlog.Printf(\"Received shutdown OS signal : --%s--\", done.String())\n\tstop()\n\tos.Exit(0)\n}", "title": "" }, { "docid": "a92593937ab64bb473c06da3b04aa7f6", "score": "0.63527375", "text": "func (server *Server) Stop() {\n\tserver.closeAll()\n}", "title": "" }, { "docid": "50b4c36661219e63ba043330e16a9eef", "score": "0.63411313", "text": "func (b *grpcServer) Shutdown() {\n\tb.mu.Lock()\n\tdefer b.mu.Unlock()\n\n\tos.Unsetenv(BrokerAddressEnv)\n\tb.grpcServer.Stop()\n\tb.mux.Close()\n\tb.s.Clear()\n\tb.waitGroup.Wait()\n\tb.started = false\n}", "title": "" }, { "docid": "ac57ea949b365dda1ed95110d135e9be", "score": "0.6339239", "text": "func (s *HTTPServer) Stop(err error) {\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\tdefer cancel()\n\tlog.Print(\"Stopping HTTP Server\")\n\n\terr = s.server.Shutdown(ctx)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n}", "title": "" }, { "docid": "5d35b2d55c30083a72d0708e3699c079", "score": "0.6335638", "text": "func Stop() {\n\tserver.Close()\n}", "title": "" }, { "docid": "0395b792b76c54e7b1f0274963f87462", "score": "0.6333559", "text": "func (a *ArgoCDServer) Shutdown() {\n\tlog.Info(\"Shut down requested\")\n\tstopCh := a.stopCh\n\ta.stopCh = nil\n\tif stopCh != nil {\n\t\tclose(stopCh)\n\t}\n}", "title": "" }, { "docid": "f8b5b9b91a1b1c52be4487b1f6a89a51", "score": "0.63283217", "text": "func (srv *Server) Shutdown(ctx context.Context, wg *sync.WaitGroup) error {\n\tdefer wg.Done()\n\treturn srv.Server.Shutdown(ctx)\n}", "title": "" }, { "docid": "f8b5b9b91a1b1c52be4487b1f6a89a51", "score": "0.63283217", "text": "func (srv *Server) Shutdown(ctx context.Context, wg *sync.WaitGroup) error {\n\tdefer wg.Done()\n\treturn srv.Server.Shutdown(ctx)\n}", "title": "" }, { "docid": "bb28fe6982f87a2f187168962e414d56", "score": "0.63257986", "text": "func (s *Server) Shutdown() {\n\ts.conn.Close()\n\tq := make(chan struct{})\n\ts.quit <- q\n\t<-q\n\ts.wg.Wait()\n}", "title": "" }, { "docid": "6252ac34f9d10443d347380e1140b750", "score": "0.6316986", "text": "func (s *host) Stop(reason string, exitCode int) error {\n\tec := &exitCode\n\t_, err := s.shutdown(nil, reason, ec)\n\treturn err\n}", "title": "" }, { "docid": "eed97ae23a84918bcd63dd8fba43c573", "score": "0.6313258", "text": "func (srv *WebServer) Shutdown() {\n\tsrv.shutdown <- true\n}", "title": "" }, { "docid": "79647f77ad1e414d8c33a00f1945fbfd", "score": "0.63127", "text": "func (me *SSHServer) Shutdown(ctx context.Context) error {\n\tlog.Print(\"Stopping SSH server\", \"addr\", me.server.Addr)\n\treturn me.server.Shutdown(ctx)\n}", "title": "" }, { "docid": "58b0e3b9ae1b0ff7fa760ac8440e0a7e", "score": "0.6309716", "text": "func (s *Server) Shutdown(ctx context.Context) error {\n\tif !s.started {\n\t\treturn errors.New(\"server not started\")\n\t}\n\treturn s.svr.Shutdown(ctx)\n}", "title": "" }, { "docid": "2985826769f044aa995abdf75f567422", "score": "0.6308513", "text": "func (s *Server) Shutdown() {\n\ts.Registry.Deregister(s.uuid)\n}", "title": "" }, { "docid": "2980ef63719df7e2d1424974fbbb8968", "score": "0.63067555", "text": "func (server *Server) Stop(ctx context.Context) {\n\tserver.scheduleStopper <- true\n\tserver.http.Shutdown(ctx)\n}", "title": "" }, { "docid": "83a7a87cd49c12dcbe24511c56965133", "score": "0.63066185", "text": "func (s *Server) Stop() {\n\ts.srv.Stop()\n}", "title": "" }, { "docid": "c67d9d6b8f9860817affa2b02c760230", "score": "0.6306576", "text": "func (s *MysqlctlServer) Shutdown(ctx context.Context, args *time.Duration, reply *rpc.Unused) error {\n\twaitForMysqld := false\n\tif *args != 0 {\n\t\t// if a duration was passed in, add it to the Context.\n\t\tvar cancel context.CancelFunc\n\t\tctx, cancel = context.WithTimeout(ctx, *args)\n\t\tdefer cancel()\n\t\twaitForMysqld = true\n\t}\n\treturn s.mysqld.Shutdown(ctx, waitForMysqld)\n}", "title": "" }, { "docid": "3a8e2d369d234d18fae4ee9f1cee7a39", "score": "0.6303328", "text": "func (s *Server) Shutdown() {\n\ts.ac.shutdown()\n}", "title": "" }, { "docid": "48e43f72fab156bbf207a9565eb7c350", "score": "0.63011956", "text": "func (s *Server) Shutdown(_ context.Context) error {\n\treturn nil\n}", "title": "" }, { "docid": "968b2f2d27f8a082760baed5a424d255", "score": "0.6297447", "text": "func (h *APIServer) Stop() error {\n\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\tdefer cancel()\n\tif err := h.srv.Shutdown(ctx); err != nil {\n\t\treturn fmt.Errorf(\"failed to shutdown web server: %q\", err)\n\t}\n\tclose(h.sessCleanup)\n\treturn nil\n}", "title": "" }, { "docid": "5d2675c057bb5d2a4f2c57628ba6a5af", "score": "0.62959844", "text": "func (server RaftMachine) Shutdown(cl *mock.MockCluster) {\n\tserver.SM.Status = FOLL\n\tcl.Servers[int(server.SM.Id)].Close()\n\tresp := sm.Alarm{T: FTO} //200\n\tserver.SM.CommMedium.ActionCh <- resp\n\tserver.SM.VotedFor = 0 //Reinitialize VoteFor\n\tserver.SM.LeaderId = 0\n\tserver.SM.VoteGrant[0] = 0 //This is positive VoteGrant counter initialized to 1 i.e. self vote\n\tserver.SM.VoteGrant[1] = 0 //This is negative VoteGrant counter initialized to 0\n\tfor i := 0; i < 1; i++ {\n\t\tserver.SM.CommMedium.ShutdownCh <- nil\n\t}\n}", "title": "" }, { "docid": "c857c4db7e76240d6840c8eee11b3429", "score": "0.62934303", "text": "func (s *Server) Shutdown() {\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\tif s.stopped {\n\t\treturn\n\t}\n\n\tlogging.Infof(s.Context, \"Shutting down the server...\")\n\n\t// Tell all RunInBackground goroutines to stop.\n\tclose(s.bgrDone)\n\n\t// Stop all http.Servers in parallel. Each Shutdown call blocks until the\n\t// corresponding server is stopped.\n\twg := sync.WaitGroup{}\n\twg.Add(len(s.ports))\n\tfor _, port := range s.ports {\n\t\tport := port\n\t\tgo func() {\n\t\t\tdefer wg.Done()\n\t\t\tport.shutdown(s.Context)\n\t\t}()\n\t}\n\twg.Wait()\n\n\t// Wait for all background goroutines to stop.\n\ts.bgrWg.Wait()\n\n\t// Notify Serve that it can exit now.\n\ts.stopped = true\n\tclose(s.done)\n}", "title": "" }, { "docid": "242c63360c021f263493b778c72cc630", "score": "0.6287937", "text": "func (sb *ServerBase) Shutdown() error {\n\tclose(sb.stop)\n\tsb.waitStop.Wait()\n\treturn nil\n}", "title": "" }, { "docid": "5ed94ce22eb3a947e9e03434340a6af5", "score": "0.6286247", "text": "func (ar *Runner) Stop(ctx context.Context) error {\n\tconst timeOut = 5\n\n\tinslogger.FromContext(ctx).Infof(\"Shutting down server gracefully ...(waiting for %d seconds)\", timeOut)\n\tctxWithTimeout, cancel := context.WithTimeout(ctx, time.Duration(timeOut)*time.Second)\n\tdefer cancel()\n\terr := ar.server.Shutdown(ctxWithTimeout)\n\tif err != nil {\n\t\treturn throw.W(err, \"Can't gracefully stop API server\")\n\t}\n\n\tar.SeedManager.Stop()\n\n\treturn nil\n}", "title": "" }, { "docid": "771786812088e4b8455f79df766404b2", "score": "0.6283246", "text": "func (p *ProxyServer) Teardown() {\n\tp.tcpConn.Close()\n\tp.wsConn.Close()\n\n\t// Decrement Prometheus counters\n\ttcpConnCounter.Dec()\n\twsConnCounter.Dec()\n}", "title": "" }, { "docid": "d77ba46d5ffae501cf004b46910923a0", "score": "0.62826467", "text": "func (g *GitSSHServer) Shutdown() error {\n\tvar err error\n\tif g.srv != nil {\n\t\terr = g.srv.Close()\n\t}\n\treturn errors.WithStack(err)\n}", "title": "" }, { "docid": "03e36928ce9b264e554026a41fd0fed9", "score": "0.62764513", "text": "func (s *GoServer) Shutdown(ctx context.Context, in *pbl.ShutdownRequest) (*pbl.ShutdownResponse, error) {\n\ts.LameDuck = true\n\tdefer func() {\n\t\tgo func() {\n\t\t\ttime.Sleep(time.Second * 5)\n\t\t\ts.DLog(ctx, \"Doing shutdown now\")\n\t\t\tos.Exit(1)\n\t\t}()\n\t}()\n\n\terr := s.Register.Shutdown(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconn, err := s.FDialServer(ctx, \"discovery\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer conn.Close()\n\n\tregistry := pb.NewDiscoveryServiceV2Client(conn)\n\n\t_, err = registry.Unregister(ctx, &pb.UnregisterRequest{Reason: \"requested-shutdown\", Service: s.Registry})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &pbl.ShutdownResponse{}, nil\n}", "title": "" }, { "docid": "72de6bae6a1c784c7d8b890611dccaca", "score": "0.6274923", "text": "func (s *server) Stop() {\n\t// Stop the started pub/sub message processes.\n\ts.processes.Stop()\n\tlog.Printf(\"info: stopped all subscribers\\n\")\n\n\t// Stop the errorKernel.\n\ts.errorKernel.stop()\n\tlog.Printf(\"info: stopped the errorKernel\\n\")\n\n\t// Stop the main context.\n\ts.cancel()\n\tlog.Printf(\"info: stopped the main context\\n\")\n\n\t// Delete the socket file when the program exits.\n\tsocketFilepath := filepath.Join(s.configuration.SocketFolder, \"steward.sock\")\n\n\tif _, err := os.Stat(socketFilepath); !os.IsNotExist(err) {\n\t\terr = os.Remove(socketFilepath)\n\t\tif err != nil {\n\t\t\ter := fmt.Errorf(\"error: could not delete sock file: %v\", err)\n\t\t\tlog.Printf(\"%v\\n\", er)\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "4d91712ffb200b31d44e515f48e7d7d0", "score": "0.6272239", "text": "func (fx *TestFixture) Stop() {\n\tif err := fx.Server.Shutdown(context.Background()); err != nil {\n\t\tfx.T.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "9e897b24fe269ea28e5254bbae21a1f0", "score": "0.6268838", "text": "func (s *Server) Stop() {\n\ts.done <- true\n}", "title": "" }, { "docid": "0009d7255d5fd002ee5e21f263dcc6ff", "score": "0.626683", "text": "func (server *Server) Shutdown(_ context.Context) error {\n\treturn server.listener.Close()\n}", "title": "" }, { "docid": "96598199172f3fa493e20daebd8426b6", "score": "0.62659633", "text": "func (s *Server) Shutdown() {\n\tlog.Warnf(\"trying to shutdown rest api sever, please use close channel to shutdown \")\n\ts.httpServer.Close()\n}", "title": "" }, { "docid": "ee9cd852b2f120d9e70f7d231f1d3c31", "score": "0.62633467", "text": "func (s *Server) Stop() (err error) {\n\tlog.Info(\"Stopping http server with 5 seconds timeout\")\n\tctx, _ := context.WithTimeout(context.Background(), 5*time.Second)\n\treturn s.Server.Shutdown(ctx)\n}", "title": "" }, { "docid": "817bfe6c63d9a3e865c6f17ffccb00bb", "score": "0.6259436", "text": "func (s *Server) Shutdown() error {\n\ts.logInfo(\"Service stopping\")\n\t// Close the channel, this will automatically release the block\n\ts.shutdown = make(chan struct{})\n\tclose(s.exit)\n\t// Wait for the shutdown to complete\n\t_ = <-s.shutdown\n\treturn nil\n}", "title": "" }, { "docid": "03f5d1e2bf06637361742e73f6fccab1", "score": "0.6257185", "text": "func (s *Server) Stop() {\n\tif atomic.CompareAndSwapInt32(&s.run, 1, 0) {\n\t\tdlog.Debug(\"RPC Server shutdown initiatied\")\n\t\ts.codecsMu.Lock()\n\t\tdefer s.codecsMu.Unlock()\n\t\ts.codecs.Each(func(c interface{}) bool {\n\t\t\tc.(ServerCodec).Close()\n\t\t\treturn true\n\t\t})\n\t}\n}", "title": "" }, { "docid": "cee03670e4e5ada380aedd6aeb1802b3", "score": "0.62451005", "text": "func (dm *Daemon) Shutdown() {\n\tif dm.DHT != nil {\n\t\tdm.DHT.Shutdown()\n\t}\n\n\tdm.Peers.Shutdown()\n\tdm.Pool.Shutdown() //send disconnect message first\n\n\tdm.Pool = nil\n\tdm.DHT = nil\n\tdm.Peers = nil\n}", "title": "" }, { "docid": "9f4719d643325bb2a988667d8b2573c3", "score": "0.62441933", "text": "func (s *Server) Stop() {\n\tlog.Info(\"stopping http server\")\n\tif s.h == nil {\n\t\tlog.Warn(\"http server is not even started, but asked to stop\")\n\t\treturn\n\t}\n\tctx, _ := context.WithTimeout(context.Background(), 5*time.Second)\n\tif err := s.h.Shutdown(ctx); err != nil {\n\t\tlog.Warnf(\"didn't stop gracefully in 5s %v\", err)\n\t}\n\tlog.Info(\"http server stopped\")\n}", "title": "" } ]
237da1b0d7af819a093b48f8647ff39d
SetLastSuccessfulServicePipelineDeploymentId sets the LastSuccessfulServicePipelineDeploymentId field's value.
[ { "docid": "128db2ee61a0b28a125e59886a8b25e6", "score": "0.94028234", "text": "func (s *ServiceInstanceState) SetLastSuccessfulServicePipelineDeploymentId(v string) *ServiceInstanceState {\n\ts.LastSuccessfulServicePipelineDeploymentId = &v\n\treturn s\n}", "title": "" } ]
[ { "docid": "7c2b80df2320ef75f91765d3767679f9", "score": "0.7983427", "text": "func (s *ServiceInstanceState) SetLastSuccessfulEnvironmentDeploymentId(v string) *ServiceInstanceState {\n\ts.LastSuccessfulEnvironmentDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "a4725843d1ad0dc1cf1b49375497af4a", "score": "0.7423998", "text": "func (s *ServicePipeline) SetLastSucceededDeploymentId(v string) *ServicePipeline {\n\ts.LastSucceededDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "59579c0de28ecbb0186a0ab1fdf57f11", "score": "0.7298301", "text": "func (s *ServiceInstanceSummary) SetLastSucceededDeploymentId(v string) *ServiceInstanceSummary {\n\ts.LastSucceededDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "fd009d6b6f1be06c86ec206a5c138c16", "score": "0.7285236", "text": "func (s *EnvironmentSummary) SetLastSucceededDeploymentId(v string) *EnvironmentSummary {\n\ts.LastSucceededDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "68614bffc623542c096afc075a9da4e0", "score": "0.72830015", "text": "func (s *ComponentSummary) SetLastSucceededDeploymentId(v string) *ComponentSummary {\n\ts.LastSucceededDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "9f73c75c71b19a26eba0654c58fbf3fa", "score": "0.7226926", "text": "func (s *Component) SetLastSucceededDeploymentId(v string) *Component {\n\ts.LastSucceededDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "4d3265769961864b04a2adb00ec4bb0b", "score": "0.72222674", "text": "func (s *ServiceInstance) SetLastSucceededDeploymentId(v string) *ServiceInstance {\n\ts.LastSucceededDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "c4900581ea27487b1fb4a6a9529e2e34", "score": "0.7213906", "text": "func (s *DeploymentSummary) SetLastSucceededDeploymentId(v string) *DeploymentSummary {\n\ts.LastSucceededDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "35e92554833900ef77d54d1f51793a8e", "score": "0.72082144", "text": "func (s *Environment) SetLastSucceededDeploymentId(v string) *Environment {\n\ts.LastSucceededDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "57f6e02340c4857850b1722e2978a65a", "score": "0.7182538", "text": "func (s *Deployment) SetLastSucceededDeploymentId(v string) *Deployment {\n\ts.LastSucceededDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "82c11c9ed4138f47b99b07706a4cd226", "score": "0.64553165", "text": "func (s *ServiceInstanceState) SetLastSuccessfulComponentDeploymentIds(v []*string) *ServiceInstanceState {\n\ts.LastSuccessfulComponentDeploymentIds = v\n\treturn s\n}", "title": "" }, { "docid": "7a7630f67365a6b8d4a08505abaf61f1", "score": "0.60220206", "text": "func (s *ListServicePipelineOutputsInput) SetDeploymentId(v string) *ListServicePipelineOutputsInput {\n\ts.DeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "3315eba7edf510d1999bed395fb48efd", "score": "0.5923943", "text": "func (s *ServicePipeline) SetLastAttemptedDeploymentId(v string) *ServicePipeline {\n\ts.LastAttemptedDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "92a49c1cd93ea87fd08a2881efdb40e2", "score": "0.58826226", "text": "func (s *ComponentSummary) SetLastAttemptedDeploymentId(v string) *ComponentSummary {\n\ts.LastAttemptedDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "8792c01c4b2b18157e74f1319cfd03d1", "score": "0.5872879", "text": "func (s *ListServiceInstanceOutputsInput) SetDeploymentId(v string) *ListServiceInstanceOutputsInput {\n\ts.DeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "643011bb07e21a43385f05af3d6ccbc8", "score": "0.5842466", "text": "func (s *ServiceInstanceSummary) SetLastAttemptedDeploymentId(v string) *ServiceInstanceSummary {\n\ts.LastAttemptedDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "591992bf14eedc1849341a7118b98a33", "score": "0.58356416", "text": "func (s *Component) SetLastAttemptedDeploymentId(v string) *Component {\n\ts.LastAttemptedDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "bf7ee6e912cc0c8ddc1ff5dca76aacd7", "score": "0.5805687", "text": "func (s *ListJobsByPipelineInput) SetPipelineId(v string) *ListJobsByPipelineInput {\n\ts.PipelineId = &v\n\treturn s\n}", "title": "" }, { "docid": "455482dfa407e6350b06c5b08820ab0e", "score": "0.5805006", "text": "func (s *ListComponentOutputsInput) SetDeploymentId(v string) *ListComponentOutputsInput {\n\ts.DeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "fa4d786b8025f56d8e0bc2775f8f15f4", "score": "0.5799751", "text": "func (s *ListEnvironmentOutputsInput) SetDeploymentId(v string) *ListEnvironmentOutputsInput {\n\ts.DeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "cdcf0110034204b2646c023d27b76a86", "score": "0.57755584", "text": "func (s *EnvironmentSummary) SetLastAttemptedDeploymentId(v string) *EnvironmentSummary {\n\ts.LastAttemptedDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "4119ac8d369987c59704f519bcaffde6", "score": "0.5769094", "text": "func (s *ServiceInstance) SetLastAttemptedDeploymentId(v string) *ServiceInstance {\n\ts.LastAttemptedDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "22e67f4be5db35cafb66584d1fe23517", "score": "0.5751819", "text": "func (s *CreateJobInput) SetPipelineId(v string) *CreateJobInput {\n\ts.PipelineId = &v\n\treturn s\n}", "title": "" }, { "docid": "33a034c3a309f8e037f1eb877cc52e63", "score": "0.5735552", "text": "func (s *Job) SetPipelineId(v string) *Job {\n\ts.PipelineId = &v\n\treturn s\n}", "title": "" }, { "docid": "0f5ec32eb1dc72117b4910eb75cc5c8f", "score": "0.5728551", "text": "func (s *Environment) SetLastAttemptedDeploymentId(v string) *Environment {\n\ts.LastAttemptedDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "5b75b2f0f8eed52d3e5586f20d09180a", "score": "0.56400293", "text": "func (s *DeploymentSummary) SetLastAttemptedDeploymentId(v string) *DeploymentSummary {\n\ts.LastAttemptedDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "3b22d28076907af329bcd0f7f8bba4fd", "score": "0.563912", "text": "func (s *NotifyResourceDeploymentStatusChangeInput) SetDeploymentId(v string) *NotifyResourceDeploymentStatusChangeInput {\n\ts.DeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "5343180094dd663a2ccd20223b3cd14c", "score": "0.56115985", "text": "func (s *Deployment) SetLastAttemptedDeploymentId(v string) *Deployment {\n\ts.LastAttemptedDeploymentId = &v\n\treturn s\n}", "title": "" }, { "docid": "420c24d863af6c6e84d8711bcf0e72c0", "score": "0.53688353", "text": "func (s *ServicePipeline) SetLastDeploymentSucceededAt(v time.Time) *ServicePipeline {\n\ts.LastDeploymentSucceededAt = &v\n\treturn s\n}", "title": "" }, { "docid": "31e1213d6bdc792531cd5a3cffaf9e05", "score": "0.5355087", "text": "func (o *GetDeploymentByIDV3UsingGETParams) SetDeploymentID(deploymentID strfmt.UUID) {\n\to.DeploymentID = deploymentID\n}", "title": "" }, { "docid": "7fb9566af3df2a946e2b5f0341a96bf7", "score": "0.5288316", "text": "func (s *ComponentSummary) SetLastDeploymentSucceededAt(v time.Time) *ComponentSummary {\n\ts.LastDeploymentSucceededAt = &v\n\treturn s\n}", "title": "" }, { "docid": "f87fd7967ae8217c13adf3407bb0548a", "score": "0.52574867", "text": "func (s *Component) SetLastDeploymentSucceededAt(v time.Time) *Component {\n\ts.LastDeploymentSucceededAt = &v\n\treturn s\n}", "title": "" }, { "docid": "8d92b28e92a3364bad01cec326ebe906", "score": "0.5211895", "text": "func (s *EnvironmentSummary) SetLastDeploymentSucceededAt(v time.Time) *EnvironmentSummary {\n\ts.LastDeploymentSucceededAt = &v\n\treturn s\n}", "title": "" }, { "docid": "685a85eef957e4c2a3a8d5d0b5ac5b4d", "score": "0.5172188", "text": "func (s *Environment) SetLastDeploymentSucceededAt(v time.Time) *Environment {\n\ts.LastDeploymentSucceededAt = &v\n\treturn s\n}", "title": "" }, { "docid": "2f322aea11f415618bd2bc6aba22fdd8", "score": "0.51389444", "text": "func (db *DBClient) FindLastSuccessDeployment(runtimeId uint64) (*Deployment, error) {\n\tvar deployment Deployment\n\tr := db.Where(\"runtime_id = ?\", runtimeId).\n\t\tWhere(\"status = ?\", apistructs.DeploymentStatusOK).\n\t\tOrder(\"id desc\").Limit(1).\n\t\tFind(&deployment)\n\tif r.Error != nil {\n\t\tif r.RecordNotFound() {\n\t\t\treturn nil, nil\n\t\t}\n\t\treturn nil, errors.Wrapf(r.Error, \"failed to find last deployment, runtimeId: %v\", runtimeId)\n\t}\n\treturn &deployment, nil\n}", "title": "" }, { "docid": "684b77d06c1d7073a1bc7bb42c88ad01", "score": "0.5120989", "text": "func (s *ServiceInstanceSummary) SetLastDeploymentSucceededAt(v time.Time) *ServiceInstanceSummary {\n\ts.LastDeploymentSucceededAt = &v\n\treturn s\n}", "title": "" }, { "docid": "c8c16ea9c1f679fd47e54e2cdc4bb8ce", "score": "0.51189977", "text": "func (s *ServiceInstance) SetLastDeploymentSucceededAt(v time.Time) *ServiceInstance {\n\ts.LastDeploymentSucceededAt = &v\n\treturn s\n}", "title": "" }, { "docid": "a5732546e205f00a6fafb7d8dc42ce7b", "score": "0.5099362", "text": "func (s *DeploymentState) SetServicePipeline(v *ServicePipelineState) *DeploymentState {\n\ts.ServicePipeline = v\n\treturn s\n}", "title": "" }, { "docid": "26fc1b8c46891409821ef4f9ffdf93df", "score": "0.5035937", "text": "func (o LookupPipelineResultOutput) PipelineId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupPipelineResult) string { return v.PipelineId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d5caff0f055728f6a9983e4c11466088", "score": "0.49991637", "text": "func (s *DescribeEndpointOutput) SetLastDeploymentConfig(v *DeploymentConfig) *DescribeEndpointOutput {\n\ts.LastDeploymentConfig = v\n\treturn s\n}", "title": "" }, { "docid": "c0139fe0ffd06c476a98b087e8fcb17f", "score": "0.4727711", "text": "func (r ApiApiProjectsIdDeploymentsGetRequest) DeploymentTargetId(deploymentTargetId string) ApiApiProjectsIdDeploymentsGetRequest {\n\tr.deploymentTargetId = &deploymentTargetId\n\treturn r\n}", "title": "" }, { "docid": "9332cedcee59de93b110a22e0a8e5ea1", "score": "0.46842578", "text": "func SetDeploymentID(deploymentID string) {\n\tglobalDeploymentID = deploymentID\n}", "title": "" }, { "docid": "2c1aa9f9e93fbf1ee2b9e7a4356d92fa", "score": "0.46307448", "text": "func (o *ListMachineDeploymentNodesParams) SetMachineDeploymentID(machinedeploymentID string) {\n\to.MachineDeploymentID = machinedeploymentID\n}", "title": "" }, { "docid": "1f9d11f6b9390aecc372e89a56c439fd", "score": "0.46269146", "text": "func (o PatchDeploymentOutput) PatchDeploymentId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *PatchDeployment) pulumi.StringOutput { return v.PatchDeploymentId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "bef076af54ff027a4cc9472dc8f7a8e7", "score": "0.4618497", "text": "func (o AiIndexDeployedIndexOutput) DeployedIndexId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AiIndexDeployedIndex) *string { return v.DeployedIndexId }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c71330bbd4eae3cb4359633317587ace", "score": "0.4617653", "text": "func (o *Job) SetLastSuccess(v time.Time) {\n\to.LastSuccess = &v\n}", "title": "" }, { "docid": "d05d0e1a2f40c63c33530737bbbca952", "score": "0.4481697", "text": "func (o DefinitionAuthorizationOutput) ServicePrincipalId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v DefinitionAuthorization) string { return v.ServicePrincipalId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2cb390462c09af7ae44b495252c78b8a", "score": "0.44572154", "text": "func (o ResponsePlanIntegrationPagerdutyOutput) ServiceId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ResponsePlanIntegrationPagerduty) string { return v.ServiceId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "5d530aa50d46294cc76f02188b3eb9d0", "score": "0.44493583", "text": "func (o EcsLaunchTemplateOutput) DeploymentSetId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *EcsLaunchTemplate) pulumi.StringPtrOutput { return v.DeploymentSetId }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "431106147956c356c230bc55e380df70", "score": "0.44084018", "text": "func (o GetResponsePlanIntegrationPagerdutyOutput) ServiceId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetResponsePlanIntegrationPagerduty) string { return v.ServiceId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "0dd0874cfebce48426da5bbe0ba3976b", "score": "0.44037026", "text": "func (o *InlineResponse20033Milestones) SetCompanyId(v string) {\n\to.CompanyId = &v\n}", "title": "" }, { "docid": "e958f5f32cc6fa195e618054d3d12e1e", "score": "0.43992096", "text": "func (c *ProjectsPatchDeploymentsCreateCall) PatchDeploymentId(patchDeploymentId string) *ProjectsPatchDeploymentsCreateCall {\n\tc.urlParams_.Set(\"patchDeploymentId\", patchDeploymentId)\n\treturn c\n}", "title": "" }, { "docid": "6527d81d5e27c33059181552a2530091", "score": "0.4388221", "text": "func (s *Scheduler) finishPipelineRun(r *gaia.PipelineRun, status gaia.PipelineRunStatus) {\n\t// Mark pipeline run as success\n\tr.Status = status\n\n\t// Finish date\n\tr.FinishDate = time.Now()\n\n\t// Store it\n\terr := s.storeService.PipelinePutRun(r)\n\tif err != nil {\n\t\tgaia.Cfg.Logger.Error(\"cannot store finished pipeline\", \"error\", err.Error())\n\t}\n}", "title": "" }, { "docid": "6f2e9e3ae3ea81ed862ef4a27af9d7ee", "score": "0.43670967", "text": "func LatestDeploymentIDForConfig(config *deployapi.DeploymentConfig) string {\n\treturn config.Name + \"-\" + strconv.Itoa(config.LatestVersion)\n}", "title": "" }, { "docid": "d2dcf18f51b8da59899a28ec40d5e331", "score": "0.43567517", "text": "func (s *EdgeDeploymentPlanSummary) SetEdgeDeploymentSuccess(v int64) *EdgeDeploymentPlanSummary {\n\ts.EdgeDeploymentSuccess = &v\n\treturn s\n}", "title": "" }, { "docid": "aa35cde9a5d50cb08244a3b30c8f69c7", "score": "0.43191764", "text": "func (o SynchronizationJobOutput) ServicePrincipalId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *SynchronizationJob) pulumi.StringOutput { return v.ServicePrincipalId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "3062ee36d65231f683cac70b87ac72f3", "score": "0.4315533", "text": "func (o LookupApiResultOutput) LatestRevisionId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupApiResult) string { return v.LatestRevisionId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "362c6966e6cab15f72d4fa9b0e701a9e", "score": "0.430973", "text": "func (o ApiOutput) LatestRevisionId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Api) pulumi.StringOutput { return v.LatestRevisionId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "6bd8e841cf59ac67c709a525fd9db10b", "score": "0.42996863", "text": "func (o *InlineResponse20027Person) SetCompanyId(v string) {\n\to.CompanyId = &v\n}", "title": "" }, { "docid": "0f872006c1f431660701e01f410a3825", "score": "0.42990804", "text": "func (o LinuxWebAppOutput) ServicePlanId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *LinuxWebApp) pulumi.StringOutput { return v.ServicePlanId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d5052f582499bb4e88b45abf79aa12c9", "score": "0.42889178", "text": "func (s *PipelineExecutionSummary) SetPipelineExecutionStatus(v string) *PipelineExecutionSummary {\n\ts.PipelineExecutionStatus = &v\n\treturn s\n}", "title": "" }, { "docid": "63aff54e767fdf36937b3ca4f00a966b", "score": "0.42813542", "text": "func (o *NormalizedProjectRevisionHook) SetProjectRevisionId(v string) {\n\to.ProjectRevisionId = &v\n}", "title": "" }, { "docid": "d38095c29ebe5542523fd74329d96834", "score": "0.42809293", "text": "func (s *UpdateAccountSettingsInput) SetPipelineServiceRoleArn(v string) *UpdateAccountSettingsInput {\n\ts.PipelineServiceRoleArn = &v\n\treturn s\n}", "title": "" }, { "docid": "c28c666041980db01c05b56b2ff627c8", "score": "0.42761528", "text": "func (s *PipelineExecution) SetPipelineExecutionStatus(v string) *PipelineExecution {\n\ts.PipelineExecutionStatus = &v\n\treturn s\n}", "title": "" }, { "docid": "0af7d8662845d4e7099d1736e98d5a69", "score": "0.42736092", "text": "func (o PipelineTriggerOutput) PipelineTriggerId() pulumi.IntOutput {\n\treturn o.ApplyT(func(v *PipelineTrigger) pulumi.IntOutput { return v.PipelineTriggerId }).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "37b7bf0ec5110d68e7463b9880da2e14", "score": "0.42659414", "text": "func (o *InlineResponse2004People) SetCompanyId(v string) {\n\to.CompanyId = &v\n}", "title": "" }, { "docid": "18291c6015e0e5102071d6afd89325c4", "score": "0.42597812", "text": "func (id GroupID) DeploymentID() DeploymentID {\n\treturn DeploymentID{\n\t\tOwner: id.Owner,\n\t\tDSeq: id.DSeq,\n\t}\n}", "title": "" }, { "docid": "37930bd3feeeff63759e96a14e6f2702", "score": "0.42516774", "text": "func (o *MicrosoftGraphAppIdentity) SetServicePrincipalId(v string) {\n\to.ServicePrincipalId = &v\n}", "title": "" }, { "docid": "2b8858331d3f12d8b2bcf5654d96ca20", "score": "0.42505255", "text": "func NewPipelineApiService() PipelineApiServicer {\n\treturn &PipelineApiService{}\n}", "title": "" }, { "docid": "c655fabe8682aac1dd38aa3a0732bea8", "score": "0.42412108", "text": "func (s *EdgeDeploymentStatus) SetEdgeDeploymentSuccessInStage(v int64) *EdgeDeploymentStatus {\n\ts.EdgeDeploymentSuccessInStage = &v\n\treturn s\n}", "title": "" }, { "docid": "95a288eccad5a20d4119e17095b814bc", "score": "0.4228572", "text": "func (s *DescribeEdgeDeploymentPlanOutput) SetEdgeDeploymentSuccess(v int64) *DescribeEdgeDeploymentPlanOutput {\n\ts.EdgeDeploymentSuccess = &v\n\treturn s\n}", "title": "" }, { "docid": "8d60be1fabc89c58259b0d24b3fd5d7c", "score": "0.4225012", "text": "func (o *ComponentReferenceDTO) SetVersionedComponentId(v string) {\n\to.VersionedComponentId = &v\n}", "title": "" }, { "docid": "a69245acd3415888fee819a6f5e94fbd", "score": "0.42092738", "text": "func (r ApiApiProjectsIdDeploymentsGetRequest) DataServiceId(dataServiceId string) ApiApiProjectsIdDeploymentsGetRequest {\n\tr.dataServiceId = &dataServiceId\n\treturn r\n}", "title": "" }, { "docid": "c5e0bce363a4c9cff911ac09aa07274d", "score": "0.41970214", "text": "func (s *AccountSettings) SetPipelineServiceRoleArn(v string) *AccountSettings {\n\ts.PipelineServiceRoleArn = &v\n\treturn s\n}", "title": "" }, { "docid": "60c04c1b9c12c3e264793c652ab395fa", "score": "0.41787204", "text": "func (o *InlineResponse20051TodoItems) SetCompanyId(v string) {\n\to.CompanyId = &v\n}", "title": "" }, { "docid": "1b952b9d4d4d33c3c8750a75d10e3547", "score": "0.41615564", "text": "func (o *ExpenseApplicationsIndexResponseExpenseApplications) SetCurrentStepId(v int32) {\n\to.CurrentStepId.Set(&v)\n}", "title": "" }, { "docid": "29c2a48d8a52ac609a3a5fe6c8bb1d7d", "score": "0.41521734", "text": "func (s *DescribePipelineExecutionOutput) SetPipelineExecutionStatus(v string) *DescribePipelineExecutionOutput {\n\ts.PipelineExecutionStatus = &v\n\treturn s\n}", "title": "" }, { "docid": "f1a9cc6fcf530c019f686caaa891a168", "score": "0.4149136", "text": "func (o DatasetAccessAuthorizedDatasetDatasetOutput) ProjectId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v DatasetAccessAuthorizedDatasetDataset) string { return v.ProjectId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "08e835afec678972e66784eaa2d7ae2f", "score": "0.41419518", "text": "func (m *ServicePlanInfo) SetServicePlanId(value *string)() {\n m.servicePlanId = value\n}", "title": "" }, { "docid": "bb5ad107525b09813c7f74499a689437", "score": "0.413732", "text": "func (s *ServicePipeline) SetDeploymentStatus(v string) *ServicePipeline {\n\ts.DeploymentStatus = &v\n\treturn s\n}", "title": "" }, { "docid": "8b1d84d1a2d661ed72b39b9e5e3b1ebd", "score": "0.4135273", "text": "func LoadPipelineByID(ctx context.Context, db gorp.SqlExecutor, pipelineID int64, deep bool) (*sdk.Pipeline, error) {\n\tvar end func()\n\tctx, end = observability.Span(ctx, \"pipeline.LoadPipelineByID\",\n\t\tobservability.Tag(observability.TagPipelineID, pipelineID),\n\t\tobservability.Tag(observability.TagPipelineDeep, deep),\n\t)\n\tdefer end()\n\n\tvar lastModified time.Time\n\tvar p sdk.Pipeline\n\tquery := `SELECT pipeline.name, pipeline.description, project.projectKey, pipeline.last_modified, pipeline.from_repository\n\tFROM pipeline\n\t\tJOIN project on pipeline.project_id = project.id\n\tWHERE pipeline.id = $1`\n\n\terr := db.QueryRow(query, pipelineID).Scan(&p.Name, &p.Description, &p.ProjectKey, &lastModified, &p.FromRepository)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn nil, sdk.ErrPipelineNotFound\n\t\t}\n\t\treturn nil, err\n\t}\n\tp.LastModified = lastModified.Unix()\n\tp.ID = pipelineID\n\n\tif deep {\n\t\tif err := loadPipelineDependencies(ctx, db, &p); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\tparameters, err := GetAllParametersInPipeline(ctx, db, p.ID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tp.Parameter = parameters\n\t}\n\n\treturn &p, nil\n}", "title": "" }, { "docid": "3cdf49e92adb88ba37316fb150f6bb72", "score": "0.41252255", "text": "func (o LedgerAzureadBasedServicePrincipalOutput) PrincipalId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LedgerAzureadBasedServicePrincipal) string { return v.PrincipalId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "02e33616c4aaf69ed864fb53e830c178", "score": "0.41239783", "text": "func (s *SearchRecord) SetPipelineExecution(v *PipelineExecution) *SearchRecord {\n\ts.PipelineExecution = v\n\treturn s\n}", "title": "" }, { "docid": "588e24ffe0cb338eb1a39e02ef681b40", "score": "0.41123798", "text": "func (o JobQueryDefaultDatasetOutput) ProjectId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v JobQueryDefaultDataset) *string { return v.ProjectId }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "aa492c47590a06e3adc937cfec1ea716", "score": "0.41108015", "text": "func (o *ListDeploymentsParams) SetDeploymentToken(deploymentToken string) {\n\to.DeploymentToken = deploymentToken\n}", "title": "" }, { "docid": "411c56ea1b892cc07056e323739da70d", "score": "0.41006327", "text": "func (o *PostV1ServicesServiceLinksParams) SetPostV1ServicesServiceLinks(postV1ServicesServiceLinks *models.PostV1ServicesServiceLinks) {\n\to.PostV1ServicesServiceLinks = postV1ServicesServiceLinks\n}", "title": "" }, { "docid": "17d841c9a497f94875c06ccc3dfbc934", "score": "0.41004288", "text": "func (o *Content) SetLastDeployedTime(v time.Time) {\n\to.LastDeployedTime = &v\n}", "title": "" }, { "docid": "69e40d4b16e7c3a4889567c78a320748", "score": "0.40930447", "text": "func (m *ManagedTenantsManagementTemplateStepVersionsItemDeploymentsRequestBuilder) ByManagementTemplateStepDeploymentId(managementTemplateStepDeploymentId string)(*ManagedTenantsManagementTemplateStepVersionsItemDeploymentsManagementTemplateStepDeploymentItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.BaseRequestBuilder.PathParameters {\n urlTplParams[idx] = item\n }\n if managementTemplateStepDeploymentId != \"\" {\n urlTplParams[\"managementTemplateStepDeployment%2Did\"] = managementTemplateStepDeploymentId\n }\n return NewManagedTenantsManagementTemplateStepVersionsItemDeploymentsManagementTemplateStepDeploymentItemRequestBuilderInternal(urlTplParams, m.BaseRequestBuilder.RequestAdapter)\n}", "title": "" }, { "docid": "8094566caa59e661d33b43bd463edddd", "score": "0.40889323", "text": "func (o DeploymentArtifactOutput) ArtifactId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *DeploymentArtifact) pulumi.StringOutput { return v.ArtifactId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "a3826a52e942234a20653039a61c9984", "score": "0.40868357", "text": "func (o *UploadDeployFileParams) SetDeployID(deployID string) {\n\to.DeployID = deployID\n}", "title": "" }, { "docid": "dfb1aec34dd294dade4ba6432cdd9392", "score": "0.40734786", "text": "func (o *ExpenseApplicationsIndexResponseExpenseApplications) SetCompanyId(v int32) {\n\to.CompanyId = v\n}", "title": "" }, { "docid": "fce348ce570064c5f5a0472fa992f566", "score": "0.40724143", "text": "func (s *PipelineApiService) GetPipeline(id string) (interface{}, error) {\n\t// TODO - update GetPipeline with the required logic for this service method.\n\t// Add api_pipeline_service.go to the .openapi-generator-ignore to avoid overwriting this service implementation when updating open api generation.\n\treturn nil, errors.New(\"service method 'GetPipeline' not implemented\")\n}", "title": "" }, { "docid": "89561e1e153ca6850ed9f0cbc9b0abf0", "score": "0.4057388", "text": "func (c *Config) DefaultPipelineRoot() string {\n\t// The key defaultPipelineRoot is optional in launcher config.\n\tif c == nil || c.data[configKeyDefaultPipelineRoot] == \"\" {\n\t\treturn defaultPipelineRoot\n\t}\n\treturn c.data[configKeyDefaultPipelineRoot]\n}", "title": "" }, { "docid": "62c198b09904b3236856f310e6f7803d", "score": "0.40361473", "text": "func (db *DBClient) FindLastDeployment(runtimeId uint64) (*Deployment, error) {\n\tvar deployment Deployment\n\tr := db.\n\t\tWhere(\"runtime_id = ?\", runtimeId).Order(\"id desc\").Limit(1).\n\t\tFind(&deployment)\n\tif r.Error != nil {\n\t\tif r.RecordNotFound() {\n\t\t\treturn nil, nil\n\t\t}\n\t\treturn nil, errors.Wrapf(r.Error, \"failed to find last deployment, runtimeId: %v\", runtimeId)\n\t}\n\treturn &deployment, nil\n}", "title": "" }, { "docid": "f60be8c799fef23d31dc2219e7195216", "score": "0.40307304", "text": "func (s *Component) SetDeploymentStatus(v string) *Component {\n\ts.DeploymentStatus = &v\n\treturn s\n}", "title": "" }, { "docid": "23864f044969ad7e8086dc4711e458bf", "score": "0.40295947", "text": "func (o *TransferParams) SetCompanyId(v int32) {\n\to.CompanyId = v\n}", "title": "" }, { "docid": "819037fa5327468121613fafd5ca5d25", "score": "0.40236315", "text": "func (s *ComponentSummary) SetDeploymentStatus(v string) *ComponentSummary {\n\ts.DeploymentStatus = &v\n\treturn s\n}", "title": "" }, { "docid": "55fab2dd9a2f3a06601a7ef686021f6b", "score": "0.40204734", "text": "func (a *DeploymentsApiService) ApiProjectsIdDeploymentsPostExecute(r ApiApiProjectsIdDeploymentsPostRequest) (*ModelsDeployment, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *ModelsDeployment\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"DeploymentsApiService.ApiProjectsIdDeploymentsPost\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/projects/{id}/deployments\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", url.PathEscape(parameterToString(r.id, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.body == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"body is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.localOnly != nil {\n\t\tlocalVarHeaderParams[\"Local-Only\"] = parameterToString(*r.localOnly, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.body\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"ApiKeyAuth\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "3ce5daac3e48a8feac4e43c67d817c8d", "score": "0.40103102", "text": "func (o DatasetAccessAuthorizedDatasetDatasetPtrOutput) ProjectId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *DatasetAccessAuthorizedDatasetDataset) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.ProjectId\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "eef902b64de483774c9363a9ad3be205", "score": "0.4005435", "text": "func (m *executionResponse) SetExecutionID(val string) {\n\tm.executionIdField = val\n}", "title": "" } ]
0784fb15c3fc964fda6ab9cb1c7fe6ad
ListUsers returns all users in the database
[ { "docid": "30225a9bdc3b885bd38349c8d1fd339c", "score": "0.8032403", "text": "func (e *Engine) ListUsers(ctx context.Context) (users []User, err error) {\n\tvar query = \"select id, email, username from users\"\n\trows, err := e.db.QueryContext(ctx, query)\n\tdefer rows.Close()\n\tif err != nil {\n\t\treturn\n\t}\n\tfor rows.Next() {\n\t\tuser := User{}\n\t\terr = rows.Scan(&user.ID, &user.Email, &user.Username)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tusers = append(users, user)\n\t}\n\treturn\n}", "title": "" } ]
[ { "docid": "106074d66850a9448581e7d0ea87848c", "score": "0.8376404", "text": "func (a *App) ListUsers(w http.ResponseWriter, r *http.Request) {\n\thandler.ListUsers(a.DB, w, r)\n}", "title": "" }, { "docid": "00de0cfa783054003e7898cdde15f02b", "score": "0.8371973", "text": "func (u *User) List() (boiled.UserSlice, error) {\n\treturn boiled.Users().All(context.Background(), u.db)\n}", "title": "" }, { "docid": "700952515192c3363b159333a1f6e123", "score": "0.83307123", "text": "func (r repository) List(ctx context.Context, list *ListUsersRequest) ([]model.User, error) {\n\tusers := make([]model.User, 0)\n\toffset := (list.Page - 1) * list.Limit\n\terr := r.db.Select(&users, ListUsersSQL, offset, list.Limit)\n\tif err != nil {\n\t\tr.logger.Errorf(\"Failed to get list of users %s\", err)\n\t\treturn nil, err\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "57f2f87d8cca98055892ca6eeaafdf5d", "score": "0.82780284", "text": "func (c *UserController) List() {\n\tdefer c.ServeJSON()\n\tusers, err := orm.FindUsers()\n\tif err != nil {\n\t\tc.SetResult(err, nil, 400)\n\t\treturn\n\t}\n\tc.SetResult(nil, users, 200)\n}", "title": "" }, { "docid": "feaf8045161717f7290134c054a4f383", "score": "0.82424486", "text": "func ListUsers(w http.ResponseWriter, r *http.Request) {\n\thr := HTTPResponse{w}\n\tusers, err := models.ListUsers()\n\tif err != nil {\n\t\thr.JSONError(http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\thr.JSON(http.StatusOK, users)\n}", "title": "" }, { "docid": "a39af89d92208906ddda840875054d3d", "score": "0.8232423", "text": "func (db *UserStorage) List() ([]socialnet.User, error) {\n\tq := \"SELECT * FROM users\"\n\tvar uu []socialnet.User\n\n\terr := db.Select(&uu, q)\n\tif err != nil {\n\t\treturn []socialnet.User{}, err\n\t}\n\n\treturn uu, nil\n}", "title": "" }, { "docid": "6362712a247401a1a8eb09cfd77d77ee", "score": "0.82281613", "text": "func (us *Users) ListUsers(db *sql.DB) error {\n\trows, err := db.Query(\"SELECT id, title, author FROM users\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tvar u User\n\t\tif err := rows.Scan(&u.ID, &u.Email, &u.DateJoined); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tus.Users = append(us.Users, u)\n\t\tus.getCount()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d4e894e4499b21cf2583f1dc8af3ada4", "score": "0.8205913", "text": "func (c *UsersController) List(ctx *app.ListUsersContext) error {\n\treturn application.Transactional(c.db, func(appl application.Application) error {\n\t\tvar err error\n\t\tvar users []*account.User\n\t\tvar result *app.UserArray\n\t\tusers, err = appl.Users().List(ctx.Context)\n\t\tif err == nil {\n\t\t\tresult, err = LoadKeyCloakIdentities(appl, ctx.RequestData, users)\n\t\t\tif err == nil {\n\t\t\t\treturn ctx.OK(result)\n\t\t\t}\n\t\t}\n\t\treturn jsonapi.JSONErrorResponse(ctx, errors.Wrap(err, \"Error listing users\"))\n\t})\n}", "title": "" }, { "docid": "2137c14dffdcd858c8f7be0adbe5c834", "score": "0.82016087", "text": "func (s *UserStore) List() ([]models.User, error) {\n\tvar users []models.User\n\tresult := s.db.Find(&users)\n\tif result.Error != nil {\n\t\treturn nil, result.Error\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "7d48c5a14947fa7d68e0fac4daa7d289", "score": "0.8183633", "text": "func ListUsers(db *mgo.DbQueue) ([]User, error) {\n\tvar list []User\n\terr := db.Find(\"users\", &list, nil)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn list, nil\n}", "title": "" }, { "docid": "b7e540fc9320c60479ca2df58b6789bb", "score": "0.8177504", "text": "func (v UsersResource) List(c buffalo.Context) error {\n\t// Get the DB connection from the context\n\ttx, ok := c.Value(\"tx\").(*pop.Connection)\n\tif !ok {\n\t\treturn InternalError(c)\n\t}\n\n\tusers := &models.Users{}\n\n\t// Paginate results. Params \"page\" and \"per_page\" control pagination.\n\t// Default values are \"page=1\" and \"per_page=20\".\n\tq := tx.PaginateFromParams(c.Params())\n\n\t// Retrieve all Users from the DB\n\tif err := q.All(users); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\treturn c.Render(http.StatusOK, r.JSON(Response{Data: users}))\n}", "title": "" }, { "docid": "69b6ebba935c1b4c383c0439e617abe1", "score": "0.8177109", "text": "func ListUsers(db *sql.DB) []User {\n\tresults, err := db.Query(\"SELECT id, user_name FROM user\")\n\tif err != nil {\n\t\t// could use log.Panicln() but still\n\t\tlog.Println(\"Error fetching user list:\", err)\n\t\tpanic(err.Error())\n\t}\n\n\t// to hold the results\n\tvar users []User\n\tvar user User\n\tfor results.Next() {\n\t\t// scan tuple into the user var\n\t\terr = results.Scan(&user.ID, &user.UserName)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Error parsing user:\", err)\n\t\t\t// return whatever's parsed so far\n\t\t\treturn users\n\t\t}\n\n\t\t// append to users slice\n\t\tusers = append(users, user)\n\t}\n\n\treturn users\n}", "title": "" }, { "docid": "44436d2b44c0bdea577f2faa1a4a4435", "score": "0.81466377", "text": "func ListUsers(handle tools.Handle, db *mgo.DbQueue) (interface{}, error) {\n\tlist, err := models.ListUsers(db)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor i := range list {\n\t\tlist[i].Password = \"\"\n\t\tlist[i].Salt = \"\"\n\t}\n\n\treturn ListUsersResponse{\n\t\tStatus: \"ok\",\n\t\tUsers: list,\n\t}, nil\n}", "title": "" }, { "docid": "e8ae0ffef1c149ff62bbe1476b5376e6", "score": "0.8135143", "text": "func (b *Backend) ListUsers() ([]string, error) {\n\tvar res []string\n\trows, err := b.listUsers.Query()\n\tif err != nil {\n\t\treturn res, wrapErr(err, \"ListUsers\")\n\t}\n\tfor rows.Next() {\n\t\tvar id uint64\n\t\tvar name string\n\t\tif err := rows.Scan(&id, &name); err != nil {\n\t\t\treturn res, wrapErr(err, \"ListUsers\")\n\t\t}\n\t\tres = append(res, name)\n\t}\n\tif err := rows.Err(); err != nil {\n\t\treturn res, wrapErr(err, \"ListUsers\")\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "d88d152dc718eabe31398cc25a65b84f", "score": "0.81263506", "text": "func (s *pgStore) ListUsers(ctx context.Context) (users []User, err error) {\n\terr = s.db.Select(&users, \"SELECT * FROM users WHERE soft_delete = false ORDER BY first_name ASC\")\n\terr = s.db.Select(&users, listUsersQuery)\n\tif err != nil {\n\t\tlogger.WithField(\"err\", err.Error()).Error(\"Error listing users\")\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "6713fcc7c30912295cc9fdc281f1c2ed", "score": "0.80774635", "text": "func (a *App) ListUsers() ([]User, error) {\n\tvar users []User\n\terr := a.DB_u.Find(&users).Error\n\treturn users, err\n}", "title": "" }, { "docid": "4a35e2d258bffcbe70df2a3eb20f0454", "score": "0.8076422", "text": "func ListUsers(c *fiber.Ctx) error {\n\ttypeUser := c.Query(\"type\")\n\tpage := c.Query(\"page\")\n\tsearch := c.Query(\"search\")\n\n\tpagTemp, err := strconv.Atoi(page)\n\n\tif err != nil {\n\t\treturn c.Status(fiber.StatusBadRequest).JSON(fiber.Map{\"status\": \"error\", \"message\": \"Page must be bigger that 0\", \"data\": err.Error()})\n\t}\n\n\tpag := int64(pagTemp)\n\n\t//Get the JWT\n\ttk := c.Locals(\"user\").(*jwt.Token)\n\n\t//Verify if user exits, And is the same ID or get the UserID from the Token\n\tif err := ProcessToken(tk); err != nil {\n\t\treturn c.Status(400).JSON(fiber.Map{\"status\": \"error\", \"message\": \"Error proccesing the token\", \"data\": err.Error()})\n\t}\n\n\tresult, status := db.ReadAllUsers(UserID, pag, search, typeUser)\n\n\tif status == false {\n\t\treturn c.Status(400).JSON(fiber.Map{\"status\": \"error\", \"message\": \"Error proccesing the Users\"})\n\t}\n\n\treturn c.Status(fiber.StatusAccepted).JSON(result)\n}", "title": "" }, { "docid": "c427e7bf1bd920cb00461e0e17c70157", "score": "0.8062132", "text": "func (r *UserRepository) List() ([]*models.User, error) {\n\tsql := fmt.Sprintf(\"SELECT * FROM %s;\", tableName)\n\n\trows, err := r.db.Query(sql)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tusers := []*models.User{}\n\n\tfor rows.Next() {\n\t\tuser := models.User{}\n\n\t\terr := rows.Scan(&user.ID, &user.Name, &user.Surname, &user.Age)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tusers = append(users, &user)\n\t}\n\n\treturn users, nil\n}", "title": "" }, { "docid": "d5283869e6d3f322285112af6e63e184", "score": "0.8040616", "text": "func (m *GormUserRepository) List(ctx context.Context) ([]User, error) {\n\tdefer goa.MeasureSince([]string{\"goa\", \"db\", \"user\", \"list\"}, time.Now())\n\tvar rows []User\n\n\terr := m.db.Model(&User{}).Order(\"email\").Find(&rows).Error\n\tif err != nil && err != gorm.ErrRecordNotFound {\n\t\treturn nil, errs.WithStack(err)\n\t}\n\treturn rows, nil\n}", "title": "" }, { "docid": "9d7168cae7c904e283c515f1ad9426d3", "score": "0.8034433", "text": "func (c *UserController) List(ctx *app.ListUserContext) error {\n\tusers := udb.ListUser(ctx.Context)\n\treturn ctx.OK(users)\n}", "title": "" }, { "docid": "7311288d86854b9e819f5813f75292f2", "score": "0.8031163", "text": "func (r *UserDB) List() ([]*entity.User, error) {\n\tstmt, err := r.db.Prepare(`\n\t\tselect id, email, username, password, client_id, created_at, updated_at\n\t\tfrom user\n\t`)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar users []*entity.User\n\trows, err := stmt.Query()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer stmt.Close()\n\n\tfor rows.Next() {\n\t\tvar u entity.User\n\t\terr = rows.Scan(&u.ID, &u.Email, &u.Username, &u.Password, &u.ClientID, &u.CreatedAt, &u.UpdatedAt)\n\t\t// TODO: -handle row scan with null datetime values (updated_at column)\n\t\t// if err != nil {\n\t\t// \treturn nil, err\n\t\t// }\n\t\tusers = append(users, &u)\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "466b031f2bed0e637821977d2935df48", "score": "0.80259764", "text": "func (m *UserDB) List(ctx context.Context) ([]*User, error) {\n\tdefer goa.MeasureSince([]string{\"goa\", \"db\", \"user\", \"list\"}, time.Now())\n\n\tvar objs []*User\n\terr := m.Db.Table(m.TableName()).Find(&objs).Error\n\tif err != nil && err != gorm.ErrRecordNotFound {\n\t\treturn nil, err\n\t}\n\n\treturn objs, nil\n}", "title": "" }, { "docid": "e82a8cd37fe663139f4fdc7c350092df", "score": "0.80248076", "text": "func (db *DB) ListUsers() ([]User, error) {\n\trows, err := db.Query(listUsersSQL)\n\tif err != nil {\n\t\tlog.Printf(\"Error retrieving database users: %v\\n\", err)\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\treturn db.rowsToUsers(rows)\n}", "title": "" }, { "docid": "3e403b7ebc67466b92c76c414a2fc45d", "score": "0.7987508", "text": "func (s *UserStore) List(ctx context.Context) ([]*models.User, error) {\n\tlog := s.Logger.With().Str(\"func\", \"List\").Logger()\n\t// Select all users.\n\tvar result []*models.User\n\tf := func(tx pgx.Tx) error {\n\t\trows, err := tx.Query(ctx, \"select id, email, display_name, last_login from users\")\n\t\tif err != nil {\n\t\t\tif errors.Is(err, pgx.ErrNoRows) {\n\t\t\t\treturn &kerr.QueryError{\n\t\t\t\t\tQuery: \"select all users\",\n\t\t\t\t\tErr: kerr.ErrNotFound,\n\t\t\t\t}\n\t\t\t}\n\t\t\tlog.Debug().Err(err).Msg(\"Failed to query users.\")\n\t\t\treturn &kerr.QueryError{\n\t\t\t\tQuery: \"select all users\",\n\t\t\t\tErr: fmt.Errorf(\"failed to list all users: %w\", err),\n\t\t\t}\n\t\t}\n\n\t\tfor rows.Next() {\n\t\t\tvar (\n\t\t\t\tid int\n\t\t\t\temail string\n\t\t\t\tdisplayName string\n\t\t\t\tlastLogin time.Time\n\t\t\t)\n\t\t\tif err := rows.Scan(&id, &email, &displayName, &lastLogin); err != nil {\n\t\t\t\tlog.Debug().Err(err).Msg(\"Failed to scan.\")\n\t\t\t\treturn &kerr.QueryError{\n\t\t\t\t\tQuery: \"select all users\",\n\t\t\t\t\tErr: fmt.Errorf(\"failed to scan: %w\", err),\n\t\t\t\t}\n\t\t\t}\n\t\t\tuser := &models.User{\n\t\t\t\tDisplayName: displayName,\n\t\t\t\tID: id,\n\t\t\t\tEmail: email,\n\t\t\t\tLastLogin: lastLogin,\n\t\t\t}\n\t\t\tresult = append(result, user)\n\t\t}\n\t\treturn nil\n\t}\n\tif err := s.Connector.ExecuteWithTransaction(ctx, log, f); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to execute List all users: %w\", err)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "c727c2c9fda032ea0e8d9b0dfe3fbeee", "score": "0.7986857", "text": "func (s *Service) ListUsers(ctx context.Context, params *public.FindAllUsersParams) ([]*model.User, error) {\n\tusers, err := s.repository.FindAll(ctx, params)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn users, nil\n}", "title": "" }, { "docid": "39fa308bc76cc3b1dbb525df9ecdba40", "score": "0.7957299", "text": "func (conn StorageConn) ListUsers() ([]User, error) {\n\treturn conn.users(\"SELECT * FROM users WHERE suspended IS FALSE AND not_found IS FALSE ORDER BY last_scan\")\n}", "title": "" }, { "docid": "5f520fd62aa9978e9a91fc8af8fdcc34", "score": "0.7944823", "text": "func (b *Badger) ListUsers() (users []*User, err error) {\n\terr = b.db.View(func(tx *badger.Txn) error {\n\t\topts := badger.DefaultIteratorOptions\n\t\topts.Prefix = []byte(\"user:\")\n\n\t\tit := tx.NewIterator(opts)\n\t\tdefer it.Close()\n\n\t\tfor it.Rewind(); it.Valid(); it.Next() {\n\t\t\titem := it.Item()\n\n\t\t\terr := item.Value(func(val []byte) error {\n\t\t\t\tuser := &User{}\n\t\t\t\terr := json.Unmarshal(val, user)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"failed to unmarshal user value for user key %s: %w\", string(item.Key()), err)\n\t\t\t\t}\n\n\t\t\t\tusers = append(users, user)\n\n\t\t\t\treturn nil\n\t\t\t})\n\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t})\n\n\treturn\n}", "title": "" }, { "docid": "35dbd58f8626dc3725d475d9482eb80a", "score": "0.7892927", "text": "func ListUsers(db sqlx.DB) ([]User, error) {\n\t// retrieve only users with assessment runs\n\tquery := \"SELECT distinct(users.ID),email,username,role,district_state,provider,grades_range FROM users INNER JOIN assessment_runs ON (users.ID=assessment_runs.user_id)\"\n\tusers := []User{}\n\terr := db.Select(&users, query)\n\tif err != nil {\n\t\tglog.Errorf(\"Error retrieving users: %v\", err)\n\t\treturn nil, err\n\t}\n\tglog.Infof(\"Retrieved %d users\", len(users))\n\treturn users, err\n}", "title": "" }, { "docid": "87379e7cac433949c9380c321bb595c4", "score": "0.7853939", "text": "func (s Service) ListUsers(ctx context.Context, offset, limit int) (total int, users []UserEntity, err error) {\n\tvar countRow struct {\n\t\tCount int `kissorm:\"count\"`\n\t}\n\terr = s.usersTable.QueryOne(ctx, &countRow, \"SELECT count(*) as count FROM users\")\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\treturn countRow.Count, users, s.usersTable.Query(ctx, &users, \"SELECT * FROM users OFFSET ? LIMIT ?\", offset, limit)\n}", "title": "" }, { "docid": "0f151de0de2c63610065fce61c8f1056", "score": "0.7841591", "text": "func (u *UserService) List(ctx context.Context, param *schema.UserQueryParam) (*[]models.User, error) {\n\tif param.Limit > config.Config.DefaultLimit {\n\t\tparam.Limit = config.Config.MaxLimit\n\t} else if param.Limit <= 0 {\n\t\tparam.Limit = config.Config.DefaultLimit\n\t}\n\n\tuser, err := u.userRepo.List(param)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn user, nil\n}", "title": "" }, { "docid": "a63e3c7fc76e57d123327b833c2ec273", "score": "0.7833565", "text": "func (s *UsersService) List(ctx context.Context, limit, offset int) ([]*User, *http.Response, error) {\n\tif limit < 1 {\n\t\treturn nil, nil, fmt.Errorf(\"limit must be above 0, but %d is not\", limit)\n\t}\n\tif limit > 500 {\n\t\treturn nil, nil, fmt.Errorf(\"limit must be 500 or below, but %d is not\", limit)\n\t}\n\tu := fmt.Sprintf(\"v1/users?limit=%d&offset=%d\", limit, offset)\n\treq, err := s.client.NewRequest(\"GET\", u, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treq.Header.Set(\"Accept\", \"application/json\")\n\n\tvar users []*User\n\tresp, err := s.client.Do(ctx, req, &users)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn users, resp, nil\n}", "title": "" }, { "docid": "9e8012efebff1b5f3f3a3fbee86e83d0", "score": "0.7822119", "text": "func (repo Users) List(queryValue string) ([]models.User, error) {\n\tqueryValue = fmt.Sprintf(\"%%%s%%\", queryValue)\n\n\tquery, err := repo.db.Query(\n\t\t\"select id, name, nick, email, createdat from users where name like ? or nick like ?\",\n\t\tqueryValue, queryValue,\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer query.Close()\n\n\tvar users []models.User\n\n\tfor query.Next() {\n\t\tvar user models.User\n\t\tif err = query.Scan(\n\t\t\t&user.ID,\n\t\t\t&user.Name,\n\t\t\t&user.Nick,\n\t\t\t&user.Email,\n\t\t\t&user.CreatedAt,\n\t\t); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tusers = append(users, user)\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "107d1856d1b1d457f3f486b547ecb140", "score": "0.7820556", "text": "func (s *UserCRUDService) ListUsers(req *userpb.ListUsersReq, stream userpb.UserCRUDService_ListUsersServer) error {\n\tdata := &UserAccount{}\n\n\tcursor, err := userdb.Find(context.Background(), bson.M{})\n\tif err != nil {\n\t\treturn status.Errorf(codes.Internal, fmt.Sprintf(\"Unknown internal error: %v\", err))\n\t}\n\n\tdefer cursor.Close(context.Background())\n\n\tfor cursor.Next(context.Background()) {\n\t\terr := cursor.Decode(data)\n\t\tif err != nil {\n\t\t\treturn status.Errorf(codes.Unavailable, fmt.Sprintf(\"Could not decode data: %v\", err))\n\t\t}\n\n\t\tstream.Send(&userpb.ListUsersRes{\n\t\t\tUser: &userpb.User{\n\t\t\t\tId: data.ID.Hex(),\n\t\t\t\tEmail: data.Email,\n\t\t\t\tName: data.Name,\n\t\t\t\tUserName: data.UserName,\n\t\t\t},\n\t\t})\n\t}\n\n\tif err := cursor.Err(); err != nil {\n\t\treturn status.Errorf(codes.Internal, fmt.Sprintf(\"Unknown cursor error: %v\", err))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "89bfc56e81e37868b749ce1d1f5b9550", "score": "0.78123593", "text": "func (h *Handlers) List(c *gin.Context) {\n\tuser := &models.User{}\n\tuserSlice := models.Users{}\n\n\tusers := h.conn.Collection(\"users\").Find(bson.M{})\n\tfor users.Next(user) {\n\t\tuserSlice = append(userSlice, *user)\n\t}\n\n\tc.JSON(200, userSlice)\n}", "title": "" }, { "docid": "b4ac978d39814f3c0e740ae315009aed", "score": "0.7797979", "text": "func (n *Nexus) ListUsers(req UserListRequest) ([]User, error) {\n\tparams := make(url.Values)\n\tif req.UserIDPrefix != \"\" {\n\t\tparams[\"userId\"] = []string{req.UserIDPrefix}\n\t}\n\tif req.Source != \"\" {\n\t\tparams[\"source\"] = []string{req.Source}\n\t}\n\n\tvar body bytes.Buffer\n\thttpResp, err := n.hc.Get(n.Addr).Path(\"/service/rest/beta/security/users\").\n\t\tHeader(HeaderAuthorization, n.basicAuthBase64Value()).\n\t\tParams(params).\n\t\tDo().Body(&body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !httpResp.IsOK() {\n\t\treturn nil, ErrNotOK(httpResp.StatusCode(), body.String())\n\t}\n\n\tvar users []User\n\tif err := json.NewDecoder(&body).Decode(&users); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn users, nil\n}", "title": "" }, { "docid": "9ae9a9ed90a2a4a12223c614c5245fa0", "score": "0.7791048", "text": "func (u *UserDBClient) List(db *gorm.DB, qp *models.ListQuery, p *models.Pagination) ([]models.User, error) {\n\tvar users []models.User\n\t// Inner Join users with Role\n\tif qp != nil {\n\t\tif err := db.Set(\"gorm:auto_preload\", true).Offset(p.Offset).Limit(p.Limit).Where(qp.Query, qp.ID).Find(&users).Order(\"lastname asc\").Error; err != nil {\n\t\t\tlog.Panicln(fmt.Sprintf(\"db connection error %v\", err))\n\t\t\treturn users, err\n\t\t}\n\t} else {\n\t\tif err := db.Set(\"gorm:auto_preload\", true).Offset(p.Offset).Limit(p.Limit).Find(&users).Order(\"lastname asc\").Error; err != nil {\n\t\t\tlog.Panicln(fmt.Sprintf(\"db connection error %v\", err))\n\t\t\treturn users, err\n\t\t}\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "e55f0224715b46dfc9f92124485f88cd", "score": "0.7788374", "text": "func (s *UsersService) List(ctx context.Context) ([]*User, *Response, error) {\n\tctx = context.WithValue(ctx, rateLimitCategoryCtxKey, rateLimitCoreCategory)\n\n\tpath := fmt.Sprintf(\"users?limit=%d\", 200)\n\tvar acc []*User\n\n\treturn s.listPaginated(ctx, path, acc)\n}", "title": "" }, { "docid": "123f0a3a1a27d1036ed64e4718061726", "score": "0.7786403", "text": "func (uc UserController) List(c *gin.Context) {\n\tvar page models.Page\n\tif err := c.Bind(&page); err != nil {\n\t\tr.JSON(c.Writer, http.StatusBadRequest, gin.H{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\n\tusers, err := uc.UserDao.List(page)\n\tif err != nil {\n\t\tr.JSON(c.Writer, http.StatusInternalServerError, gin.H{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tr.JSON(c.Writer, http.StatusOK, gin.H{\n\t\t\"data\": users,\n\t})\n}", "title": "" }, { "docid": "a582d8bc3760b3773379fec16664db75", "score": "0.7782924", "text": "func (s *UserService) List(ctx context.Context, realm string) ([]UserRepresentation, error) {\n\n\tpath := \"/realms/{realm}/users\"\n\n\tvar users []UserRepresentation\n\n\t_, err := s.client.newRequest(ctx).\n\t\tSetPathParams(map[string]string{\n\t\t\t\"realm\": s.client.Realm,\n\t\t}).\n\t\tSetResult(&users).\n\t\tGet(path)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn users, nil\n}", "title": "" }, { "docid": "e37a3720ada7eeec2dff38095ad33a6e", "score": "0.7782877", "text": "func (ds *DS) ListUsers() ([]*User, error) {\n\n\tc := ds.Ctx\n\tcs := make([]*User, 0)\n\tq := datastore.NewQuery(\"user\").Order(\"Id\")\n\tks, err := q.GetAll(c, &cs)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Get usery list error\")\n\t}\n\tfor i, k := range ks {\n\t\tcs[i].Id = k.IntID()\n\t}\n\treturn cs, nil\n\n}", "title": "" }, { "docid": "823f022bbdb26bfceb153452d8f91a1e", "score": "0.77687186", "text": "func (a *Client) ListUsers(ctx context.Context, params *ListUsersParams) (*ListUsersOK, error) {\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"listUsers\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/user\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &ListUsersReader{formats: a.formats},\n\t\tAuthInfo: a.authInfo,\n\t\tContext: ctx,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*ListUsersOK), nil\n\n}", "title": "" }, { "docid": "842e45eb67d00351ca7ed26302d2d01e", "score": "0.7736919", "text": "func (c *UserController) List(ctx *app.ListUserContext) error {\n\t// UserController_List: start_implement\n\n\tusers, _ := c.db.GetUsers()\n\tres := make(app.UserCollection, len(users))\n\tfor i, user := range users {\n\t\tres[i] = ToUserMedia(&user)\n\n\t}\n\n\t// UserController_List: end_implement\n\treturn ctx.OK(res)\n}", "title": "" }, { "docid": "38465583311782fd532e6d28217ce3c6", "score": "0.7726628", "text": "func (lgc *Logic) UserList() ([]graylog.User, error) {\n\treturn lgc.store.GetUsers()\n}", "title": "" }, { "docid": "54a1e5d596273c77b7c117c487e2018a", "score": "0.76839256", "text": "func (t *User) Listusers(w http.ResponseWriter, r *http.Request) {\n\n\tu := viewmodels.DbUser{}\n\tres, err := u.Cache(g.Mgosesion).GetAll()\n\tif err != nil {\n\t\tt.Error500(w, err.Error(), \"user.ListUsers\")\n\t\treturn\n\t}\n\n\tt.JSON(w, res)\n}", "title": "" }, { "docid": "464cc285e8300fc6d9e5d271833b5fbb", "score": "0.76818156", "text": "func ListUsers() {\n\tusers, _, err := git.Users.ListUsers(nil)\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\tfor _, user := range users {\n\t\tfmt.Println(user.Name)\n\t}\n}", "title": "" }, { "docid": "ffc55ae3f835100352242eeeffce045a", "score": "0.7681082", "text": "func List(c *deis.Client, results int) (api.Users, int, error) {\n\tbody, count, reqErr := c.LimitedRequest(\"/v2/users/\", results)\n\n\tif reqErr != nil && !deis.IsErrAPIMismatch(reqErr) {\n\t\treturn []api.User{}, -1, reqErr\n\t}\n\n\tvar users []api.User\n\tif err := json.Unmarshal([]byte(body), &users); err != nil {\n\t\treturn []api.User{}, -1, err\n\t}\n\n\treturn users, count, reqErr\n}", "title": "" }, { "docid": "705a3ba589d7dedf7ccea509cfb74255", "score": "0.7676636", "text": "func (u *UserServiceHandler) List(ctx context.Context, options *ListOptions) ([]User, *Meta, error) {\n\treq, err := u.client.NewRequest(ctx, http.MethodGet, path, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tnewValues, err := query.Values(options)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treq.URL.RawQuery = newValues.Encode()\n\n\tusers := new(usersBase)\n\tif err = u.client.DoWithContext(ctx, req, &users); err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treturn users.Users, users.Meta, nil\n}", "title": "" }, { "docid": "91fa1922e3cc1c70e74ec16e3ef2cddb", "score": "0.76590395", "text": "func (s *Service) List(w http.ResponseWriter, r *http.Request) {\n\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\n\t// Retrieve the full list of users\n\tresources, err, statusCode := s.GetResources(ResourceParser)\n\n\tif err != nil {\n\t\tw.WriteHeader(statusCode)\n\t\tw.Write([]byte(`{\"error\":\"could not read users\"}`))\n\t\treturn\n\t}\n\n\t// Get the list and assert them to the proper type\n\tresourceList := resources.([]interface{})\n\tuserList := make([]models.User, len(resourceList))\n\tfor i, r := range resourceList {\n\t\tuserList[i] = r.(models.User)\n\t}\n\n\t// Retrieve any query parameters\n\tparams := r.URL.Query()\n\n\t// If the query URI is used and query parameters exist, then apply the filters\n\tif len(params) > 0 && strings.Index(r.RequestURI, \"/users/query?\") != -1 {\n\t\tuserList, err = s.filter(userList, params)\n\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tw.Write([]byte(fmt.Sprintf(`{\"error\":\"%s\"}`, err.Error())))\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Convert the list of users to byte data\n\trespData, err := json.Marshal(userList)\n\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write([]byte(`{\"error\":\"user data error\"}`))\n\t}\n\n\t// Write the response; no need to write the response code as 200 is the default\n\t_, err = w.Write(respData)\n\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write([]byte(`{\"error\":\"unknown user error\"}`))\n\t}\n}", "title": "" }, { "docid": "73866791045f1225efada384edbccd44", "score": "0.764028", "text": "func (cli *OpsGenieUserClient) List(req user.ListUsersRequest) (*user.ListUsersResponse, error) {\n\treq.APIKey = cli.apiKey\n\tresp, err := cli.sendRequest(cli.buildGetRequest(userURL, req))\n\n\tif resp == nil {\n\t\treturn nil, errors.New(err.Error())\n\t}\n\tdefer resp.Body.Close()\n\n\tvar listUsersResp user.ListUsersResponse\n\n\tif err = resp.Body.FromJsonTo(&listUsersResp); err != nil {\n\t\tmessage := \"Server response can not be parsed, \" + err.Error()\n\t\tlogging.Logger().Warn(message)\n\t\treturn nil, errors.New(message)\n\t}\n\treturn &listUsersResp, nil\n}", "title": "" }, { "docid": "44440f8592acede374446f4c5d85cc96", "score": "0.7629598", "text": "func (h userHTTP) List(w http.ResponseWriter, r *http.Request) {\n\tlistRequest := listRequestDecoder(r)\n\tusers, err := h.svc.ListUsers(r.Context(), listRequest)\n\tif err != nil {\n\t\th.Logger.With(r.Context()).Errorf(\"list users error : %s\", err)\n\t\trender.Render(w, r, e.BadRequest(err, \"bad request\"))\n\t\treturn\n\t}\n\trender.Respond(w, r, users)\n}", "title": "" }, { "docid": "0a27ea9d6af3861a7055c7745e298a0a", "score": "0.7613689", "text": "func UserList(w http.ResponseWriter, r *http.Request) {\n\ttypeUser := r.URL.Query().Get(\"type\")\n\tpage := r.URL.Query().Get(\"page\")\n\tsearch := r.URL.Query().Get(\"search\")\n\n\tpagTemp, err := strconv.Atoi(page)\n\tif err != nil {\n\t\thttp.Error(w, \"You must send the page parameter with a value greater than zero\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tpag := int64(pagTemp)\n\n\tresult, status := bd.ReadAllUsers(IDUser, pag, search, typeUser)\n\tif !status {\n\t\thttp.Error(w, \"Error while reading users\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusCreated)\n\tjson.NewEncoder(w).Encode(result)\n}", "title": "" }, { "docid": "6f9c3063200bba52b3920b9293c850a6", "score": "0.76125133", "text": "func GetListUsers(db *sql.DB) ([]model.User, error) {\n\tusers := []model.User{}\n\tuser := model.User{}\n\tr, err1 := db.Query(\"select * from users\")\n\tif err1 != nil {\n\t\treturn users, err1\n\t}\n\tfor r.Next() {\n\t\terr := r.Scan(&user.Email, pq.Array(&user.Friends), pq.Array(&user.Subscription), pq.Array(&user.Blocked))\n\t\tif err != nil {\n\t\t\treturn users, err\n\t\t}\n\t\tusers = append(users, user)\n\t}\n\n\treturn users, nil\n}", "title": "" }, { "docid": "8a3b15e4366e9b5ac178ccfc6eda4b91", "score": "0.7609507", "text": "func (c *AlloyDBAdminClient) ListUsers(ctx context.Context, req *alloydbpb.ListUsersRequest, opts ...gax.CallOption) *UserIterator {\n\treturn c.internalClient.ListUsers(ctx, req, opts...)\n}", "title": "" }, { "docid": "ce0231aa081742a7eced12b5a0703bd5", "score": "0.7584293", "text": "func (e *UserService) List(opts *ListOptions) ([]User, *Response, error) {\n\tendpoint := \"/system/users\"\n\tusers := new([]User)\n\tresp, err := e.client.getRequestListDecode(endpoint, users, opts)\n\treturn *users, resp, err\n}", "title": "" }, { "docid": "616d6ecacd1b18fa026f2fe4a3a2406a", "score": "0.7582724", "text": "func (c *CloudSQLClient) ListUsers(project string, instance string) (*sqladmin.UsersListResponse, error) {\n\treturn c.Users.List(project, instance).Do()\n}", "title": "" }, { "docid": "ad18d7b008ac17d7cebde55654a2c31c", "score": "0.756992", "text": "func ListUsers(settings *models.Settings) {\n\thelpers.SignIn(settings)\n\tenvUsers := helpers.ListEnvironmentUsers(settings)\n\tfor _, userID := range envUsers.Users {\n\t\tif userID == settings.UsersID {\n\t\t\tfmt.Printf(\"%s (you)\\n\", userID)\n\t\t} else {\n\t\t\tdefer fmt.Printf(\"%s\\n\", userID)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "998e28d1cb1a9837dca852ccd506864f", "score": "0.7551574", "text": "func (c Client) ListUsers(query *queries.ListUsers) (responses.ListUsers, error) {\n\turl := fmt.Sprintf(\"%s/PasswordVault/api/Users%s\", c.BaseURL, httpJson.GetURLQuery(query))\n\n\tresponse, err := httpJson.Get(url, c.SessionToken, c.InsecureTLS, c.Logger)\n\tif err != nil {\n\t\treturnedError, _ := json.Marshal(response)\n\t\treturn responses.ListUsers{}, fmt.Errorf(\"Failed to list users. %s. %s\", string(returnedError), err)\n\t}\n\n\tjsonString, _ := json.Marshal(response)\n\tListUsersResponse := responses.ListUsers{}\n\terr = json.Unmarshal(jsonString, &ListUsersResponse)\n\treturn ListUsersResponse, err\n}", "title": "" }, { "docid": "3ed4e378d875d3c5a96d5f0bede711dd", "score": "0.7545881", "text": "func (s *API) ListUsers(req *ListUsersRequest, opts ...scw.RequestOption) (*ListUsersResponse, error) {\n\tvar err error\n\n\tdefaultPageSize, exist := s.client.GetDefaultPageSize()\n\tif (req.PageSize == nil || *req.PageSize == 0) && exist {\n\t\treq.PageSize = &defaultPageSize\n\t}\n\n\tquery := url.Values{}\n\tparameter.AddToQuery(query, \"order_by\", req.OrderBy)\n\tparameter.AddToQuery(query, \"page_size\", req.PageSize)\n\tparameter.AddToQuery(query, \"page\", req.Page)\n\tparameter.AddToQuery(query, \"organization_id\", req.OrganizationID)\n\tparameter.AddToQuery(query, \"user_ids\", req.UserIDs)\n\n\tscwReq := &scw.ScalewayRequest{\n\t\tMethod: \"GET\",\n\t\tPath: \"/iam/v1alpha1/users\",\n\t\tQuery: query,\n\t\tHeaders: http.Header{},\n\t}\n\n\tvar resp ListUsersResponse\n\n\terr = s.client.Do(scwReq, &resp, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resp, nil\n}", "title": "" }, { "docid": "561bbe30b19f87c18268db8eb0afd778", "score": "0.7544916", "text": "func (c *UserController) List(ctx *app.ListUserContext) error {\n\t// UserController_List: start_implement\n\tvar (\n\t\tquery = ctx.Request.URL.Query()\n\t\tuserType = query.Get(\"type\")\n\t\tarea = query.Get(\"area\")\n\t\taccess = domain.AuthorisationService{}\n\t\tactor = ctx.Value(\"actor\").(domain.Actor)\n\t)\n\tif userType == \"\" || area == \"\" {\n\t\treturn goa.ErrBadRequest(\"expected a user type and area\", 400)\n\t}\n\tuserRepo := domain.UserRepo{Config: config.Conf, Actor: actor, Authorisor: access}\n\tdomainUsers, err := userRepo.FindAllByTypeAndArea(userType, area)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// UserController_List: end_implement\n\tres := app.GoaLocalUserCollection{}\n\tfor _, du := range domainUsers {\n\t\tres = append(res, domainUserToLocalUser(du))\n\t}\n\treturn ctx.OK(res)\n}", "title": "" }, { "docid": "3b8f83f30d21dfbcb49eb373bc6a5a00", "score": "0.7509081", "text": "func ListUsers(directory string) ([]upspin.UserName, error) {\n\tconst op = \"dir/server/tree.ListUsers\"\n\treturn userGlob(op, \"*@*\", directory)\n}", "title": "" }, { "docid": "e7159ec4eba83558ab3dfb913191ce40", "score": "0.74891484", "text": "func (c *Controller) ListAllUsers(response http.ResponseWriter, request *http.Request) {\n\tc.ListAll(response, request, &[]types.User{})\n}", "title": "" }, { "docid": "34e1ce46dc916edbefb24ab11c2a300a", "score": "0.7485597", "text": "func ListUsers(attributes []string, query, outputFormat string) {\n\t// Grab all system users (with their tags if this is a Tags org):\n\tuserList, err := apiClientV1.GetSystemUsers(!isGroups)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not read system users, err='%s'\\n\", err)\n\t}\n\n\toutputData(outputFormat, query, userList)\n\n}", "title": "" }, { "docid": "b43b856e15345b879908bf6a02108eb5", "score": "0.74822026", "text": "func (c *Client) ListUsers(ctx context.Context, params *ListUsersInput, optFns ...func(*Options)) (*ListUsersOutput, error) {\n\tif params == nil {\n\t\tparams = &ListUsersInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"ListUsers\", params, optFns, addOperationListUsersMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*ListUsersOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "5f0755645f5a29061b1b4088efef3702", "score": "0.7475527", "text": "func (ic *Intercom) ListUsers(page int64, order, sort string) (userList UserList, err error) {\n\n\tparams := UserListRequestParams{\n\t\tPage: page,\n\t\tOrder: order,\n\t\tSort: sort,\n\t}\n\n\tvar data []byte\n\tdata, err = ic.sendRequest(\"GET\", API_USERS, params, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t//s := string(data)\n\t//fmt.Println(s)\n\n\terr = json.Unmarshal(data, &userList)\n\tif err != nil {\n\t\terr = errors.New(string(data))\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "2bc9c55e6363d010ac22ea7fe9a75fa1", "score": "0.74744034", "text": "func (c *Client) ListUsers(ctx context.Context, params *ListUsersInput, optFns ...func(*Options)) (*ListUsersOutput, error) {\n\tif params == nil {\n\t\tparams = &ListUsersInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"ListUsers\", params, optFns, c.addOperationListUsersMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*ListUsersOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "57dbccf1c01e070e1f70799e0184e98b", "score": "0.7472467", "text": "func (uls *UserListService) ListAllUsers() serializers.Response {\n\tvar users []models.User\n\t//\tvar roles []models.Role\n\ttotal := 0\n\tqueryUser := \"%\" + uls.UserName + \"%\"\n\n\tif uls.PageSize == 0 {\n\t\tuls.PageSize = 10\n\t}\n\n\tif err := database.DB.Model(models.User{}).Where(\"is_deleted = 0 and user_name like ?\", queryUser).Count(&total).Error; err != nil {\n\t\treturn serializers.Response{\n\t\t\tCode: 50000,\n\t\t\tMessage: \"Query database error\",\n\t\t\tError: err.Error(),\n\t\t}\n\t}\n\n\tif err := database.DB.Limit(uls.PageSize).Offset(uls.Page).Preload(\"Roles\").Where(\"is_deleted = 0 and user_name like ?\", queryUser).Find(&users).Error; err != nil {\n\t\treturn serializers.Response{\n\t\t\tCode: 50000,\n\t\t\tMessage: \"Error connect database\",\n\t\t\tError: err.Error(),\n\t\t}\n\t}\n\n\treturn serializers.BuildListResponse(BuildUserList(users), total)\n}", "title": "" }, { "docid": "eb9d9b58447ef2ce6141504772a0e78b", "score": "0.74706495", "text": "func ListUsers(client *OpenshiftClient, ch chan<- *o7tuserv1.UserList) {\n\tusers, err := client.userClient.Users().List(listOptions)\n\tif err != nil {\n\t\tlogrus.Fatal(err)\n\t}\n\tch <- users\n}", "title": "" }, { "docid": "56f50af2a3340f3ae535aed06d23809a", "score": "0.74657446", "text": "func (mongo MongoDB) List() []entities.User {\n\treturn []entities.User{}\n}", "title": "" }, { "docid": "47359f3d7c27f8e65031e11f675f9466", "score": "0.7465172", "text": "func (users *Users) ListAll(rw http.ResponseWriter, r *http.Request) {\n\tusers.logger.Info(\"Getting users\")\n\trw.Header().Add(\"Content-Type\", \"application/json\")\n\targs := r.URL.Query()\n\n\tresult, err := users.Db.GetUsers(args)\n\tif err != nil {\n\t\trw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJson(&GenericError{Message: err.Error()}, rw)\n\t\treturn\n\t}\n\n\terr = data.ToJson(result, rw)\n\tif err != nil {\n\t\t// we should never be here but log the error just incase\n\t\tusers.logger.Error(\"Unable to serializing user\", \"error\", err)\n\t}\n}", "title": "" }, { "docid": "897b4816a0eb28316ec7579c71760bcf", "score": "0.74454033", "text": "func (c *Client) ListUsers(ctx context.Context, opts *ListOptions) ([]User, error) {\n\tresponse := UsersPagedResponse{}\n\terr := c.listHelper(ctx, &response, opts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response.Data, nil\n}", "title": "" }, { "docid": "61db037846b2f23422f96d96d1fe2107", "score": "0.7414731", "text": "func (s *API) ListUsers(req *ListUsersRequest, opts ...scw.RequestOption) (*ListUsersResponse, error) {\n\tvar err error\n\n\tif req.Region == \"\" {\n\t\tdefaultRegion, _ := s.client.GetDefaultRegion()\n\t\treq.Region = defaultRegion\n\t}\n\n\tdefaultPageSize, exist := s.client.GetDefaultPageSize()\n\tif (req.PageSize == nil || *req.PageSize == 0) && exist {\n\t\treq.PageSize = &defaultPageSize\n\t}\n\n\tquery := url.Values{}\n\tparameter.AddToQuery(query, \"name\", req.Name)\n\tparameter.AddToQuery(query, \"order_by\", req.OrderBy)\n\tparameter.AddToQuery(query, \"page\", req.Page)\n\tparameter.AddToQuery(query, \"page_size\", req.PageSize)\n\n\tif fmt.Sprint(req.Region) == \"\" {\n\t\treturn nil, errors.New(\"field Region cannot be empty in request\")\n\t}\n\n\tif fmt.Sprint(req.InstanceID) == \"\" {\n\t\treturn nil, errors.New(\"field InstanceID cannot be empty in request\")\n\t}\n\n\tscwReq := &scw.ScalewayRequest{\n\t\tMethod: \"GET\",\n\t\tPath: \"/rdb/v1/regions/\" + fmt.Sprint(req.Region) + \"/instances/\" + fmt.Sprint(req.InstanceID) + \"/users\",\n\t\tQuery: query,\n\t\tHeaders: http.Header{},\n\t}\n\n\tvar resp ListUsersResponse\n\n\terr = s.client.Do(scwReq, &resp, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resp, nil\n}", "title": "" }, { "docid": "e91cd2912fa6e6a01b6721cd096b5e13", "score": "0.7409828", "text": "func (c *Client) ListUsers() goa.Endpoint {\n\treturn func(ctx context.Context, v interface{}) (interface{}, error) {\n\t\tinv := goagrpc.NewInvoker(\n\t\t\tBuildListUsersFunc(c.grpccli, c.opts...),\n\t\t\tEncodeListUsersRequest,\n\t\t\tDecodeListUsersResponse)\n\t\tres, err := inv.Invoke(ctx, v)\n\t\tif err != nil {\n\t\t\tresp := goagrpc.DecodeError(err)\n\t\t\tswitch message := resp.(type) {\n\t\t\tcase *goapb.ErrorResponse:\n\t\t\t\treturn nil, goagrpc.NewServiceError(message)\n\t\t\tdefault:\n\t\t\t\treturn nil, goa.Fault(err.Error())\n\t\t\t}\n\t\t}\n\t\treturn res, nil\n\t}\n}", "title": "" }, { "docid": "8a6ad7acf0ca4fc443fc90b25be51e65", "score": "0.7408835", "text": "func (a *ApplicationAPI) ListUsers(ctx context.Context, in *pb.ListApplicationUsersRequest) (*pb.ListApplicationUsersResponse, error) {\n\tif err := a.validator.Validate(ctx,\n\t\tauth.ValidateApplicationMembersAccess(in.Id, auth.List),\n\t); err != nil {\n\t\treturn nil, grpc.Errorf(codes.Unauthenticated, \"authentication failed: %s\", err)\n\t}\n\n\ttotal, err := storage.GetApplicationUsersCount(a.ctx.DB, in.Id)\n\tif nil != err {\n\t\treturn nil, errToRPCError(err)\n\t}\n\n\tuserAccess, err := storage.GetApplicationUsers(a.ctx.DB, in.Id, int(in.Limit), int(in.Offset))\n\tif nil != err {\n\t\treturn nil, errToRPCError(err)\n\t}\n\n\tappUsers := make([]*pb.GetApplicationUserResponse, len(userAccess))\n\tfor i, ua := range userAccess {\n\t\t// Get the user information\n\t\tappUsers[i] = &pb.GetApplicationUserResponse{\n\t\t\tId: ua.UserID,\n\t\t\tUsername: ua.Username,\n\t\t\tIsAdmin: ua.IsAdmin,\n\t\t}\n\t}\n\treturn &pb.ListApplicationUsersResponse{TotalCount: total, Result: appUsers}, nil\n}", "title": "" }, { "docid": "e5428d8264f19319fb1828266e1b4b5c", "score": "0.7398944", "text": "func getAllUsers() []user {\n\n\tif len(userList) == 0 {\n\t\tcreateExampleUsers()\n\t}\n\n\treturn userList\n}", "title": "" }, { "docid": "a846d61cfcdbaf105125816f151ebff2", "score": "0.7385227", "text": "func (p *UserServiceClient) List(ctx context.Context, page, size int) ([]User, *Response, error) {\n\n\treturn nil, nil, nil\n}", "title": "" }, { "docid": "9c6865b7c383d3e8b02f2f525bea6181", "score": "0.7380005", "text": "func (s ObjectsUsersServiceOperations) List(ctx context.Context, modifiers ...ListRequestModifier) ([]ObjectsUser, error) {\n\tpath := objectsUsersBasePath\n\n\treq, err := s.client.NewRequest(ctx, http.MethodGet, path, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, modifier := range modifiers {\n\t\tmodifier(req)\n\t}\n\n\tObjectsUser := []ObjectsUser{}\n\terr = s.client.Do(ctx, req, &ObjectsUser)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ObjectsUser, nil\n}", "title": "" }, { "docid": "4ddda2eb8c1331585eb2be10a0565fb1", "score": "0.73679674", "text": "func (s *Service) ListUsers(ctx context.Context) ([]User, error) {\n\treturn s.ListUsersWithFields(ctx, nil)\n}", "title": "" }, { "docid": "5853bd545fea166c21e71892c6355431", "score": "0.7353588", "text": "func List(o int, l int) ([]User, error) {\n\tvar e error\n\tqry := `SELECT username, ad, admin, namespaces, created_at FROM users\n\t\t\t\t\t\tOFFSET $1 LIMIT $2\n `\n\tvar ul []User\n\tif l > 50 {\n\t\tl = 50\n\t}\n\trows, err := db.DB.Query(qry, o, l)\n\tif err != nil {\n\t\treturn ul, errors.New(http.StatusText(http.StatusUnauthorized))\n\t}\n\tfor rows.Next() {\n\t\tvar u User\n\t\tserr := rows.Scan(&u.Username, &u.AD, &u.Admin, pq.Array(&u.Namespaces), &u.CreatedAt)\n\t\tif serr != nil {\n\t\t\treturn ul, errors.New(http.StatusText(http.StatusUnauthorized))\n\t\t}\n\t\tul = append(ul, u)\n\t}\n\treturn ul, e\n}", "title": "" }, { "docid": "52cc9fe61963bf77489b8a42358f0ddc", "score": "0.7350364", "text": "func (a *UserManagementApiService) ListUsers(ctx context.Context, accountname string) ApiListUsersRequest {\n\treturn ApiListUsersRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\taccountname: accountname,\n\t}\n}", "title": "" }, { "docid": "534eb2c0fd7d790afb1e77377c3c1554", "score": "0.7348652", "text": "func (s *RepoUserService) List(path string) ([]*api.User, error) {\n\treturn s.ListFunc(path)\n}", "title": "" }, { "docid": "3433b653414668179b315607e762df09", "score": "0.7326853", "text": "func List(client client.Client) (users []User, err error) {\n\tclient.Logger.Debug(\"Retriving all users\")\n\n\tlines, err := utils.FileGetLines(\"/etc/passwd\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor _, line := range lines {\n\t\tvar user User\n\t\tparts := strings.Split(line, \":\")\n\t\tuser, err = Read(client, parts[0])\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tusers = append(users, user)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "a676dc2ca2aed98d834f4a9b144e3b41", "score": "0.73098576", "text": "func (s *Server) ListUsers(ctx context.Context, Empty *pbUser.Empty) (*pbUser.UserListResponse, error) {\n\n\tvar users []model.User\n\tvar results pbUser.UserListResponse\n\n\terr := s.db.NewSelect().\n\t\tModel(&users).\n\t\tScan(ctx)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, user := range users {\n\t\tvar result pbUser.UserPrivateResponse\n\t\tresult.Id = uuid.UUID.String(user.ID)\n\t\tresult.Username = user.Username\n\t\tresult.FullName = user.FullName\n\t\tresult.FirstName = user.FirstName\n\t\tresult.LastName = user.LastName\n\t\tresult.Member = user.Member\n\t\tresult.RoleId = user.RoleID\n\t\tresult.TenantId = user.TenantID\n\t\tresult.NewsletterNotification = user.NewsletterNotification\n\t\tresult.FollowedGroups = uuidpkg.ConvertUUIDToStrArray(user.FollowedGroups)\n\t\tresults.User = append(results.User, &result)\n\t}\n\n\treturn &results, nil\n}", "title": "" }, { "docid": "ee5f9ce286f9ab682052db35931968b5", "score": "0.73065495", "text": "func (sa *StaticAssignment) ListUsers() (users []*User) {\n\tfor _, user := range sa.Users {\n\t\tusers = append(users, user)\n\t}\n\treturn users\n}", "title": "" }, { "docid": "91740039104701317b645aaff4d1e670", "score": "0.7304013", "text": "func List(c *gin.Context) {\n\tuserList, _ := models.GetList()\n\tc.JSON(200, userList)\n\treturn\n}", "title": "" }, { "docid": "6cf5a52b2245541812a5d737d5acc05f", "score": "0.7250186", "text": "func (a *DefaultApiService) ListUsers(ctx _context.Context) ([]User, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []User\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/users\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v []User\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 503 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "a3f02989051d8d8d925f6c90e183686d", "score": "0.72301775", "text": "func (s *TeamsServer) ListUsers(\n\tctx context.Context,\n\treq *connect.Request[teams.ListUsersRequest],\n) (*connect.Response[teams.ListUsersResponse], error) {\n\t// if !current.Admin {\n\t// \treturn nil, connect.NewError(\n\t// \t\tconnect.CodePermissionDenied,\n\t// \t\tfmt.Errorf(\"only admins can access this resource\"),\n\t// \t)\n\t// }\n\n\tif err := ctx.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tlog.Debug().Msgf(\"%+v\", req)\n\n\t// records, err := s.repository.List(ctx)\n\n\t// if err != nil {\n\t// \treturn nil, connect.NewError(connect.CodeInternal, err)\n\t// }\n\n\t// payload := make([]*types.Team, len(records))\n\t// for id, record := range records {\n\t// \tpayload[id] = convertTeam(record)\n\t// }\n\n\t// return connect.NewResponse(&teams.ListResponse{\n\t// \tTeams: payload,\n\t// }), nil\n\n\treturn nil, errors.New(\"not implemented\")\n}", "title": "" }, { "docid": "679370bb97b0de81546251778ee5ee2b", "score": "0.7223834", "text": "func (h *Handler) ListUser(c echo.Context) error {\n\tpayload := c.Get(\"parsedQuery\").(utils.CommonRequest)\n\tlog.Println(payload)\n\tres, totalData, err := h.userStore.ListUser(payload)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\tc.Response().Header().Set(\"Content-Range\", \"users \"+strconv.Itoa(payload.StartIndex)+\"-\"+strconv.Itoa(payload.EndIndex)+\"/\"+strconv.Itoa(totalData))\n\treturn c.JSON(http.StatusOK, res)\n\n}", "title": "" }, { "docid": "6aa0f0687fdd64715a8d934f74c04c32", "score": "0.7205903", "text": "func GetUserList() ([]User, error) {\n\tInfo.Println(\"GetUserList()\")\n\tvar users []User\n\terr := db.Select(&users, \"select * from \\\"user\\\"\")\n\tif err != nil {\n\t\treturn []User{}, err\n\t}\n\treturn users, nil\n}", "title": "" }, { "docid": "c412c79a9cf17ecf237708d5c617cb42", "score": "0.7191857", "text": "func getUsers(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t//Make db connection\n\tdb := opendb()\n\tdefer db.Close()\n\n\t//Create and execute SQL statement\n\tsqlStatement := `SELECT * FROM \"user\"`\n\trows, err := db.Query(sqlStatement)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer rows.Close()\n\n\t//Format results from database\n\tvar users []User\n\tfor rows.Next() {\n\t\tvar user User\n\t\terr = rows.Scan(&user.UserID, &user.FirstName, &user.LastName, &user.CookieID, &user.Password)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tusers = append(users, user)\n\t}\n\terr = rows.Err()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t//Send back to web app\n\tjson.NewEncoder(w).Encode(users)\n}", "title": "" }, { "docid": "43415c4f915bc7dcec8260cf08f5a417", "score": "0.7161106", "text": "func (a *UsersApiService) ListUsers(ctx _context.Context) ApiListUsersRequest {\n\treturn ApiListUsersRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "b35b5d5fe1629dee8a3ec191f1930012", "score": "0.7155964", "text": "func AllUsers(c *gin.Context) {\n\tlogrus.Info(\"Admin: reading all users\")\n\n\t// send API call to capture all users\n\tu, err := database.FromContext(c).GetUserList()\n\tif err != nil {\n\t\tretErr := fmt.Errorf(\"unable to capture all users: %w\", err)\n\n\t\tutil.HandleError(c, http.StatusInternalServerError, retErr)\n\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, u)\n}", "title": "" }, { "docid": "a558f1648ba4372fba027f755a06f464", "score": "0.7152776", "text": "func Users() ([]*domain.User, error) {\n\n\treturn persistence.NewUserRepositoryWithRDB().GetAll()\n}", "title": "" }, { "docid": "d5372ee81dde7af5898939cb3e0dfdf0", "score": "0.71470666", "text": "func (s *ProjectsService) ListUsers(projectKey string) ([]*User, *Response, error) {\n\tu := \"projects/\" + projectKey + \"/users\"\n\treq, err := s.client.NewRequest(\"GET\", u, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tusers := []*User{}\n\tresp, err := s.client.Do(req, &users)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\treturn users, resp, nil\n}", "title": "" }, { "docid": "ad23e3d5b27870cf0225d7ebf8a0ca9a", "score": "0.7142348", "text": "func (s *ProjectsServiceOp) ListUsers(ctx context.Context, projectID string, opts *ListOptions) ([]*User, *Response, error) {\n\tpath := fmt.Sprintf(\"%s/%s/users\", projectBasePath, projectID)\n\n\tpath, err := setQueryParams(path, opts)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treq, err := s.Client.NewRequest(ctx, http.MethodGet, path, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\troot := new(UsersResponse)\n\tresp, err := s.Client.Do(ctx, req, root)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\tif l := root.Links; l != nil {\n\t\tresp.Links = l\n\t}\n\n\treturn root.Results, resp, nil\n}", "title": "" }, { "docid": "44981b47aedf2d1f794091b4a13e49f2", "score": "0.7121103", "text": "func (c *alloyDBAdminRESTClient) ListUsers(ctx context.Context, req *alloydbpb.ListUsersRequest, opts ...gax.CallOption) *UserIterator {\n\tit := &UserIterator{}\n\treq = proto.Clone(req).(*alloydbpb.ListUsersRequest)\n\tunm := protojson.UnmarshalOptions{AllowPartial: true, DiscardUnknown: true}\n\tit.InternalFetch = func(pageSize int, pageToken string) ([]*alloydbpb.User, string, error) {\n\t\tresp := &alloydbpb.ListUsersResponse{}\n\t\tif pageToken != \"\" {\n\t\t\treq.PageToken = pageToken\n\t\t}\n\t\tif pageSize > math.MaxInt32 {\n\t\t\treq.PageSize = math.MaxInt32\n\t\t} else if pageSize != 0 {\n\t\t\treq.PageSize = int32(pageSize)\n\t\t}\n\t\tbaseUrl, err := url.Parse(c.endpoint)\n\t\tif err != nil {\n\t\t\treturn nil, \"\", err\n\t\t}\n\t\tbaseUrl.Path += fmt.Sprintf(\"/v1alpha/%v/users\", req.GetParent())\n\n\t\tparams := url.Values{}\n\t\tparams.Add(\"$alt\", \"json;enum-encoding=int\")\n\t\tif req.GetFilter() != \"\" {\n\t\t\tparams.Add(\"filter\", fmt.Sprintf(\"%v\", req.GetFilter()))\n\t\t}\n\t\tif req.GetOrderBy() != \"\" {\n\t\t\tparams.Add(\"orderBy\", fmt.Sprintf(\"%v\", req.GetOrderBy()))\n\t\t}\n\t\tif req.GetPageSize() != 0 {\n\t\t\tparams.Add(\"pageSize\", fmt.Sprintf(\"%v\", req.GetPageSize()))\n\t\t}\n\t\tif req.GetPageToken() != \"\" {\n\t\t\tparams.Add(\"pageToken\", fmt.Sprintf(\"%v\", req.GetPageToken()))\n\t\t}\n\n\t\tbaseUrl.RawQuery = params.Encode()\n\n\t\t// Build HTTP headers from client and context metadata.\n\t\thds := append(c.xGoogHeaders, \"Content-Type\", \"application/json\")\n\t\theaders := gax.BuildHeaders(ctx, hds...)\n\t\te := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\t\tif settings.Path != \"\" {\n\t\t\t\tbaseUrl.Path = settings.Path\n\t\t\t}\n\t\t\thttpReq, err := http.NewRequest(\"GET\", baseUrl.String(), nil)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\thttpReq.Header = headers\n\n\t\t\thttpRsp, err := c.httpClient.Do(httpReq)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer httpRsp.Body.Close()\n\n\t\t\tif err = googleapi.CheckResponse(httpRsp); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tbuf, err := io.ReadAll(httpRsp.Body)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif err := unm.Unmarshal(buf, resp); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\treturn nil\n\t\t}, opts...)\n\t\tif e != nil {\n\t\t\treturn nil, \"\", e\n\t\t}\n\t\tit.Response = resp\n\t\treturn resp.GetUsers(), resp.GetNextPageToken(), nil\n\t}\n\n\tfetch := func(pageSize int, pageToken string) (string, error) {\n\t\titems, nextPageToken, err := it.InternalFetch(pageSize, pageToken)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tit.items = append(it.items, items...)\n\t\treturn nextPageToken, nil\n\t}\n\n\tit.pageInfo, it.nextFunc = iterator.NewPageInfo(fetch, it.bufLen, it.takeBuf)\n\tit.pageInfo.MaxSize = int(req.GetPageSize())\n\tit.pageInfo.Token = req.GetPageToken()\n\n\treturn it\n}", "title": "" }, { "docid": "5102775c4128c33cc12affd36237be62", "score": "0.7105855", "text": "func (conn StorageConn) ListRegisteredUsers() ([]User, error) {\n\treturn conn.users(\"SELECT * FROM users ORDER BY last_scan DESC\")\n}", "title": "" }, { "docid": "5fe41018d2402b1bae58230bba88a61c", "score": "0.7102337", "text": "func (svc *UserDomService) GetList(ctx context.Context, f []*filters.Filter) ([]*domain.User, error) {\n\treturn svc.store.User.GetList(ctx, f)\n}", "title": "" }, { "docid": "0c8535fbcc680f0ccaa72b49941adf66", "score": "0.7089386", "text": "func (s *initServer) UserList(ctx context.Context, in *pb.UserListRequest) (*pb.UserListResponse, error) {\n\tattr, err := s.handlers.HandleList(in, s.store)\n\tif err != nil {\n\t\treturn userListResp([]*pb.Users{}, err.Error(), \"400\")\n\t}\n\n\treturn userListResp(attr, userListStatus, \"200\")\n}", "title": "" }, { "docid": "39ca15ad0983697b334369fe9d7fe468", "score": "0.7032666", "text": "func (r *UserRepository) getAllUsers() ([]*User, error) {\n\tusers := []*User{}\n\n\terr := DB.Select(&users, `SELECT * from \"user\";`)\n\treturn users, err\n}", "title": "" }, { "docid": "3a5ba662082b51c253e7774db9633199", "score": "0.70260495", "text": "func AllUsers() ([]User, error) {\n\tq := \"SELECT * FROM users ORDER BY ID ASC\"\n\n\trows, err := config.DB.Query(q)\n\n\tif err != nil {\n\t\tlog.Printf(\"[ERROR - USERS - MODEL] => %v\", err)\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tusrs := make([]User, 0)\n\n\tfor rows.Next() {\n\t\tusr := User{}\n\t\terr := rows.Scan(&usr.ID, &usr.FirstName, &usr.LastName, &usr.Email, &usr.Password, &usr.CreatedAt, &usr.UpdatedAt)\n\n\t\tif err != nil {\n\t\t\tlog.Printf(\"[ERROR - USERS - MODEL] => %v\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\tusrs = append(usrs, usr)\n\t}\n\n\tif err = rows.Err(); err != nil {\n\t\tlog.Printf(\"[ERROR - USERS - MODEL] => %v\", err)\n\t\treturn nil, err\n\t}\n\treturn usrs, nil\n}", "title": "" } ]
5d31af2e8b3663575cbc60ee48cf41cb
Validate validates this user
[ { "docid": "8384b51d2d53bba31a1cef0fe6a737c4", "score": "0.61814404", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateEULAAccepted(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateAdded(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateExpires(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLastLogin(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateNoncomplianceStatus(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateOrganizations(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUserID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "6cbd7613b544bb09fe9b5c3c85119608", "score": "0.7034004", "text": "func (m *User) Validate() error {\n\treturn nil\n}", "title": "" }, { "docid": "653d596bf2fd0738fcb2eb50febabc7f", "score": "0.70297706", "text": "func (user *User) Validate() bool {\n user.Errors = make(map[string]string)\n\n if strings.TrimSpace(user.Name) == \"\" {\n user.Errors[\"Name\"] = \"usr name can not be empty\"\n }\n\n if strings.TrimSpace(user.Password) == \"\" {\n user.Errors[\"Password\"] = \"password can not be empty\"\n }\n\n return len(user.Errors) == 0\n}", "title": "" }, { "docid": "43ea2fcdb2dad7f62aabb7b85ea6c370", "score": "0.70212185", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "35acd333178f60941b38753052a43b8b", "score": "0.6992407", "text": "func (u *User) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.UUIDIsPresent{Field: u.LoginGovUUID, Name: \"LoginGovUUID\"},\n\t\t&validators.StringIsPresent{Field: u.LoginGovEmail, Name: \"LoginGovEmail\"},\n\t), nil\n}", "title": "" }, { "docid": "36ddbf04c42cdb460f99aad3e5d6bbd8", "score": "0.69503397", "text": "func (mt *User) Validate() (err error) {\n\n\tif mt.FirstName == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"first_name\"))\n\t}\n\tif mt.FamilyName == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"family_name\"))\n\t}\n\tif mt.Email == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"email\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "d508382480d64ce7a6cbe41b231b7407", "score": "0.6915083", "text": "func (mt *User) Validate() (err error) {\n\n\tif mt.Name == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"name\"))\n\t}\n\tif mt.Email == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"email\"))\n\t}\n\tif mt.Bio == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"bio\"))\n\t}\n\tif err2 := goa.ValidateFormat(goa.FormatEmail, mt.Email); err2 != nil {\n\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`response.email`, mt.Email, goa.FormatEmail, err2))\n\t}\n\tif ok := goa.ValidatePattern(`\\S`, mt.Name); !ok {\n\t\terr = goa.MergeErrors(err, goa.InvalidPatternError(`response.name`, mt.Name, `\\S`))\n\t}\n\tif utf8.RuneCountInString(mt.Name) > 256 {\n\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`response.name`, mt.Name, utf8.RuneCountInString(mt.Name), 256, false))\n\t}\n\treturn\n}", "title": "" }, { "docid": "f8f777c7fab705f6bda7c347203e96f1", "score": "0.68662095", "text": "func (u *User) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: u.Name, Name: \"Name\"},\n\t\t&validators.StringIsPresent{Field: u.Email, Name: \"Email\"},\n\t), nil\n}", "title": "" }, { "docid": "e00ae7af2e2ef3bcc3581f0ce028b14d", "score": "0.68614995", "text": "func (u *User) Validate() error {\n\tif !u.Language.Validate() {\n\t\treturn apperr.Validation{\n\t\t\tWhere: \"User\",\n\t\t\tField: \"language\",\n\t\t\tCause: apperr.ValidationInvalid,\n\t\t}\n\t}\n\tif !u.Gender.Validate() {\n\t\treturn apperr.Validation{\n\t\t\tWhere: \"User\",\n\t\t\tField: \"gender\",\n\t\t\tCause: apperr.ValidationInvalid,\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f33aaa8b4a1fc3ae745e6ff3bf032ff2", "score": "0.6857247", "text": "func (mt *User) Validate() (err error) {\n\tif mt.CreatedAt != \"\" {\n\t\tif err2 := goa.ValidateFormat(goa.FormatDateTime, mt.CreatedAt); err2 != nil {\n\t\t\terr = goa.InvalidFormatError(`response.created_at`, mt.CreatedAt, goa.FormatDateTime, err2, err)\n\t\t}\n\t}\n\tif mt.Email != \"\" {\n\t\tif err2 := goa.ValidateFormat(goa.FormatEmail, mt.Email); err2 != nil {\n\t\t\terr = goa.InvalidFormatError(`response.email`, mt.Email, goa.FormatEmail, err2, err)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "f23ce04e88afa94e31a56c3171362583", "score": "0.6843689", "text": "func (u *User) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: u.Name, Name: \"Name\"},\n\t\t&validators.StringIsPresent{Field: u.Avatar, Name: \"Avatar\"},\n\t\t&validators.StringIsPresent{Field: u.Status, Name: \"Status\"},\n\t), nil\n}", "title": "" }, { "docid": "fb2f07bef2f8e8930ab842cd84bca9a1", "score": "0.68161887", "text": "func (u *User) Validate(vr *ValidationResults) {\n\tu.Permissions.Validate(vr)\n\tu.Limits.Validate(vr)\n\t// When BearerToken is true server will ignore any nonce-signing verification\n}", "title": "" }, { "docid": "22746a7f3e038ad5f1473585d8ec1281", "score": "0.6767145", "text": "func (u User) Validate() error {\n\terr := u.validateName()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = u.validateEmail()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = u.validateAddress()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "07e17ef89f254979fd0bdf86e77ca3f7", "score": "0.6741826", "text": "func (u User) Validate() error {\n\tif u.Name == \"\" {\n\t\treturn errors.New(\"name cannot be empty\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "77ee92b8c370ab164aeb293812a4d75f", "score": "0.6712385", "text": "func (u *User) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: u.Name, Name: \"Name\"},\n\t\t&validators.StringIsPresent{Field: u.Username, Name: \"Username\"},\n\t\t&validators.StringIsPresent{Field: u.Email, Name: \"Email\"},\n\t\t&validators.EmailIsPresent{Name: \"Email\", Field: u.Email},\n\t\t&validators.StringIsPresent{Field: u.Username, Name: \"Username\"},\n\t\t&validators.StringIsPresent{Field: u.Password, Name: \"Password\"},\n\t\t&validators.StringsMatch{Name: \"Password\", Field: u.PasswordHash, Field2: u.PasswordConfirm, Message: \"Passwords do not match.\"},\n\t), nil\n}", "title": "" }, { "docid": "82b6a7c77ea25d25cb836205a5ea7160", "score": "0.6701477", "text": "func (u *User) Validate(tx *Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: u.Name.String, Name: \"Name\"},\n\t), nil\n}", "title": "" }, { "docid": "a37d640208789b6594a4cd9197f198c9", "score": "0.6698409", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateCompartmentID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateDescription(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLifecycleState(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateName(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTimeCreated(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1bdc33668d8119966215df7dfbf6bc82", "score": "0.66976184", "text": "func (m *SessionUser) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "bd14d941191c8e17385efd8a1949f6d1", "score": "0.66749495", "text": "func (m *LdapUser) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "1ebaaeac7da78851904b3d9140fc15b8", "score": "0.6663294", "text": "func (d *DpsUser) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: d.LoginGovEmail, Name: \"LoginGovEmail\"},\n\t), nil\n}", "title": "" }, { "docid": "1ebaaeac7da78851904b3d9140fc15b8", "score": "0.6663294", "text": "func (d *DpsUser) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: d.LoginGovEmail, Name: \"LoginGovEmail\"},\n\t), nil\n}", "title": "" }, { "docid": "1d336c49bf16e9d467627249d01a7e12", "score": "0.6642696", "text": "func (user *User) Validate() *errors.RestErr {\n\t// trim spaces of email\n\tuser.Email = strings.TrimSpace(strings.ToLower(user.Email))\n\tuser.FirstName = strings.TrimSpace(user.FirstName)\n\tuser.LastName = strings.TrimSpace(user.LastName)\n\tif user.Email == \"\" {\n\t\treturn errors.NewBadRequestError(\"invalid email address\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "70fc98f2467d6de7be6a5f92fc41b6d8", "score": "0.663673", "text": "func (user *User) Validate() *errors.RestErr {\n\tuser.Email = strings.TrimSpace(strings.ToLower(user.Email))\n\tif user.Email == \"\" {\n\t\treturn errors.NewBadRequest(\"invalid Email address\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6de8743579a2a1e1f6380c9cf8a94d97", "score": "0.65875757", "text": "func (u *User) Validate() error {\n\tif u.Login == \"\" || strings.TrimSpace(u.Login) == \"\" {\n\t\treturn errors.New(\"login property cant be empty\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "737f128e89e4cf05404b3ceea6606beb", "score": "0.658079", "text": "func (u *User) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: u.Email, Name: \"Email\"},\n\t\t&validators.StringInclusion{Field: u.Type, Name: \"Type\", List: USER_VALID_TYPES},\n\t), nil\n}", "title": "" }, { "docid": "40379179389b4418bd9aeb56e3f2b540", "score": "0.6579636", "text": "func (u User) Validate() error {\n\treturn validation.ValidateStruct(&u,\n\t\tvalidation.Field(&u.Name, validation.Required),\n\t\tvalidation.Field(&u.Created, validation.Required))\n}", "title": "" }, { "docid": "c1a83f2eeb96e67d9e7ef5112f2b1d6b", "score": "0.6578212", "text": "func (a *User) Validate() error {\n\ta.Username = strings.TrimSpace(a.Username)\n\n\treturn validation.ValidateStruct(a,\n\t\tvalidation.Field(&a.Username, validation.Required, is.ASCII),\n\t)\n}", "title": "" }, { "docid": "e9643189fbaa87c523a2fbc054b34dec", "score": "0.65777653", "text": "func (u *User) Validate() bool {\n\tif u.Username == \"\" {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "9ec3342fc9864a65f433245046a79d02", "score": "0.6574069", "text": "func (usr *User) validate(conn redis.Conn) error {\n\tif !reutils.MatchName(usr.Name) {\n\t\treturn ErrValidation(\"Your username is invalid!\")\n\t}\n\n\tfor _, name := range invalidUser {\n\t\tif strings.Contains(usr.Name, name) {\n\t\t\treturn ErrValidation(\"You cannot choose that name!\")\n\t\t}\n\t}\n\n\treg, err := redisGetUser(conn, usr.Name)\n\tif err != nil && err != redis.ErrNil {\n\t\treturn err\n\t}\n\tif reg != nil {\n\t\treturn ErrValidation(\"A user with the same name already exist!\")\n\t}\n\n\tif !reutils.MatchEmail(usr.Email) {\n\t\treturn ErrValidation(\"Your email is invalid!\")\n\t}\n\n\tif len(usr.Password) < 8 {\n\t\treturn ErrValidation(\"Your password is too short!\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a7eb64beaaba2f04d0d0eb5497cc4f93", "score": "0.65656966", "text": "func (user *User) Validate() bool {\n\n\tuser.Error = \"\"\n\n\t// define validation of each field of the purchase request\n\terr := validation.ValidateStruct(user,\n\t\tvalidation.Field(&user.Email, validation.Required, is.Email),\n\t\tvalidation.Field(&user.Name, validation.Required),\n\t)\n\n\t// add potential error text to user.Error\n\tif err != nil {\n\t\tuser.Error = err.Error()\n\t}\n\n\t// return true if no error, false otherwise\n\treturn user.Error == \"\"\n}", "title": "" }, { "docid": "ff408c43bc033062fbb299b3c735901c", "score": "0.6548712", "text": "func (u *User) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\tuserCount, err := u.ExistingUsernameCount(tx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: u.Username, Name: \"Username\"},\n\t\t&validators.IntIsLessThan{Name: \"count\", Field: userCount, Compared: 1, Message: fmt.Sprintf(\"duplicate username: \\\"%s\\\"\", u.Username)},\n\t), nil\n}", "title": "" }, { "docid": "d5309f21aa0603667be3df7211c9662f", "score": "0.6547744", "text": "func (user *User) Validate() *errors.RestError {\n\tuser.Email = strings.TrimSpace(strings.ToLower(user.Email))\n\n\tif user.Email == \"\" {\n\t\treturn errors.NewBadRequestError(\"Invalid email address.\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1dd048bc6cb1b6219a30c9732a382e89", "score": "0.6545172", "text": "func (u User) Validate() error {\n\treturn validation.ValidateStruct(&u,\n\t\tvalidation.Field(&u.Name, validation.Required))\n}", "title": "" }, { "docid": "bdc16bf0b3e71fd3315e15feedb086f2", "score": "0.65430474", "text": "func (u *User) Validate(isInsert bool) aperrors.Errors {\n\terrors := make(aperrors.Errors)\n\tif u.Name == \"\" {\n\t\terrors.Add(\"name\", \"must not be blank\")\n\t}\n\tif u.Email == \"\" {\n\t\terrors.Add(\"email\", \"must not be blank\")\n\t}\n\tif u.ID == 0 && u.NewPassword == \"\" {\n\t\terrors.Add(\"password\", \"must not be blank\")\n\t}\n\tif u.NewPassword != \"\" && (u.NewPassword != u.NewPasswordConfirmation) {\n\t\terrors.Add(\"password_confirmation\", \"must match password\")\n\t}\n\n\treturn errors\n}", "title": "" }, { "docid": "a2bc0fb4be2c17c5431674a482380a44", "score": "0.654192", "text": "func (u *User) Validate() []error {\n\tvar errs []error\n\tif u.ID == \"\" {\n\t\terrs = append(errs, errors.New(\"ID primary key cannot be empty\"))\n\t}\n\tif u.Name == \"\" {\n\t\terrs = append(errs, errors.New(\"Please provide a user name.\"))\n\t}\n\n\treturn errs\n}", "title": "" }, { "docid": "39733b3259de2cb97c7d942b618b0b6c", "score": "0.65400165", "text": "func (u *User) Validate() *validation.Errors {\n\terrors := &validation.Errors{}\n\n\tif u.Login == \"\" {\n\t\terrors.Add(\"required field\", \"Login\")\n\t}\n\n\tif errors.Has() {\n\t\treturn errors\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6b4c3191fde94dc9f274cbd4b2144f21", "score": "0.6527138", "text": "func (m *User) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif !_User_Username_Pattern.MatchString(m.GetUsername()) {\n\t\treturn UserValidationError{\n\t\t\tfield: \"Username\",\n\t\t\treason: \"value does not match regex pattern \\\"^[a-z0-9_-]{3,16}$\\\"\",\n\t\t}\n\t}\n\n\tif err := m._validateEmail(m.GetEmail()); err != nil {\n\t\treturn UserValidationError{\n\t\t\tfield: \"Email\",\n\t\t\treason: \"value must be a valid email address\",\n\t\t\tcause: err,\n\t\t}\n\t}\n\n\tif utf8.RuneCountInString(m.GetFirstName()) < 1 {\n\t\treturn UserValidationError{\n\t\t\tfield: \"FirstName\",\n\t\t\treason: \"value length must be at least 1 runes\",\n\t\t}\n\t}\n\n\tif utf8.RuneCountInString(m.GetLastName()) < 1 {\n\t\treturn UserValidationError{\n\t\t\tfield: \"LastName\",\n\t\t\treason: \"value length must be at least 1 runes\",\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7007c07f1d9e50f67b8ba11a08cb6b36", "score": "0.6509448", "text": "func (m *AuthUser) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validatePrimaryGroup(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e036ce387f1bbc73eb84f9c2b52aebbf", "score": "0.64991426", "text": "func (nu *NewUser) Validate() error {\n\temail, err := mail.ParseAddress(nu.Email)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"%v is an invalid email adress: %v\", email, err)\n\t}\n\tif len(nu.Password) < 6 {\n\t\treturn fmt.Errorf(\"password must be at least 6 characters\")\n\t}\n\tif nu.Password != nu.PasswordConf {\n\t\treturn fmt.Errorf(\"password and passwordconf must match\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5e15346613843865298324e8c2033e22", "score": "0.64798605", "text": "func (u User) Validate() error {\n\n\tif !isEmail(u.Email) {\n\t\treturn fmt.Errorf(errInvalidEmail)\n\t}\n\n\tif len(u.Password) < minPassLen {\n\t\treturn fmt.Errorf(errPasswordLenght)\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "0cdb5c84698994afb8ec1e2e1a208231", "score": "0.64760405", "text": "func (u *User) Validate() *errors.RestErr {\n\tif u.Email == \"\" {\n\t\treturn errors.NewBadRequestError(\"invalid email address\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1b9f5358e77b7199fbd22cab38eb17ea", "score": "0.6449082", "text": "func (user *User) Validate() error {\n\tif match, _ := regexp.MatchString(`^\\w*$`, user.Name); !match {\n\t\treturn &HTTPError{http.StatusBadRequest, fmt.Sprintf(\"Invalid username %q\", user.Name)}\n\t} else if (user.Name == \"\") != (user.PasswordHash == nil) {\n\t\treturn &HTTPError{http.StatusBadRequest, \"Invalid password\"}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "807b5bd008272f151e46ed11649dc3aa", "score": "0.64481616", "text": "func (ut *createUserPayload) Validate() (err error) {\n\tif ut.UserID == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"userId\"))\n\t}\n\tif ut.Username == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"username\"))\n\t}\n\tif ut.UserID != nil {\n\t\tif ok := goa.ValidatePattern(`^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-4[0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}$`, *ut.UserID); !ok {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidPatternError(`request.userId`, *ut.UserID, `^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-4[0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}$`))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "a01bdb8ad4d29d76728aa4c803867c77", "score": "0.64457816", "text": "func (u *PrivateUser) Validate() bool {\n\tif u.Username == \"\" {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "16aa995bd43993bf1cecf976a042c4ff", "score": "0.6436165", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validatePriority(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ed186aabb21a819a0bfb0b8eb74ff784", "score": "0.6429962", "text": "func (nu *NewUser) Validate() error {\n\tif _, emailErr := mail.ParseAddress(nu.Email); emailErr != nil {\n\t\treturn emailErr\n\t}\n\n\tif len(nu.Password) < 6 {\n\t\treturn fmt.Errorf(\"Password must be at least 6 characters\")\n\t}\n\n\tif nu.Password != nu.PasswordConf {\n\t\treturn fmt.Errorf(\"Password and confirmation must match\")\n\t}\n\n\tif len(nu.UserName) == 0 || strings.Contains(nu.UserName, \" \") {\n\t\treturn fmt.Errorf(\"UserName must be non-zero length and may not contain spaces\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e2411abed230835d8da1e1ee9b14e909", "score": "0.642246", "text": "func (m *GetUserResponse) Validate() error {\n\tif err := m.User.Validate(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "40e1a554ce80b712b07047ef3cfd2ef3", "score": "0.641774", "text": "func (up UserSignin) Validate(errors *binding.Errors, req *http.Request) {\n\tif len(up.UPwd) < 4 {\n\t\terrors.Fields[\"upwd\"] = \"Too short; minimum 4 characters\"\n\t} else if len(up.UPwd) > 30 {\n\t\terrors.Fields[\"upwd\"] = \"Too long; maximum 30 characters\"\n\t}\n\tif m, _ := regexp.MatchString(\"^[0-9a-zA-Z]+$\", up.UPwd); !m {\n\t\terrors.Fields[\"upwd\"] = \"only alpha number\"\n\t}\n\n\tif len(up.UEmail) < 4 {\n\t\terrors.Fields[\"uemail\"] = \"Too short; minimum 4 characters\"\n\t} else if len(up.UEmail) > 30 {\n\t\terrors.Fields[\"uemail\"] = \"Too long; maximum 30 characters\"\n\t}\n\tif m, _ := regexp.MatchString(`^([\\w\\.\\_]{2,10})@(\\w{1,}).([a-z]{2,4})$`, up.UEmail); !m {\n\t\terrors.Fields[\"uemail\"] = \"It is not correct email adress\"\n\t}\n}", "title": "" }, { "docid": "4ee75b73b5175004815f926384ce7d0e", "score": "0.6411607", "text": "func (u *UserCreateSerializer) Validate(context *context.Context) *validator.Result {\n\tv := validator.New()\n\tv[\"name\"] = models.ValidateUserName()\n\tv[\"email\"] = validator.ValidateEmail()\n\tv[\"username\"] = models.ValidateUserUsername()\n\tv[\"password\"] = models.ValidatePassword()\n\tresult := v.Validate(u)\n\n\tif u.Password != u.PasswordRetype {\n\t\tresult.AddFieldError(\"password_retype\", errors.New(\"passwords_dont_match\"))\n\t}\n\n\tum := models.NewUserManager(context)\n\t// check duplicate username\n\tif !result.HasFieldErrors(\"username\") {\n\t\tif err := um.Get(um.NewUser(), utils.QueryFilterWhere(\"username = ?\", u.Username)); err == nil {\n\t\t\tresult.AddFieldError(\"username\", errors.New(\"already_exists\"))\n\t\t}\n\t}\n\n\t// check duplicaate email\n\tif !result.HasFieldErrors(\"email\") {\n\t\tif err := um.Get(um.NewUser(), utils.QueryFilterWhere(\"email = ?\", u.Email)); err == nil {\n\t\t\tresult.AddFieldError(\"email\", errors.New(\"already_exists\"))\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "c0f10ee6275796c3c3269a2dfe92a288", "score": "0.63908523", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAttributes(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateOrganisationID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateVersion(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "822989735b5ac041084bcc7a501fcbdd", "score": "0.6376684", "text": "func (u PublicUser) Validate() (bool, error) {\n\treturn govalidator.ValidateStruct(u)\n}", "title": "" }, { "docid": "59f7437da42304869e9e55450bb1240e", "score": "0.6372124", "text": "func (u User) Valid() bool {\n\treturn u.ID != \"\" && u.Email != \"\"\n}", "title": "" }, { "docid": "a412327b2e30b4227fc56119debd469e", "score": "0.636021", "text": "func (ut *CreateUserPayload) Validate() (err error) {\n\tif ut.UserID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"userId\"))\n\t}\n\tif ut.Username == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"username\"))\n\t}\n\tif ok := goa.ValidatePattern(`^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-4[0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}$`, ut.UserID); !ok {\n\t\terr = goa.MergeErrors(err, goa.InvalidPatternError(`type.userId`, ut.UserID, `^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-4[0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}$`))\n\t}\n\treturn\n}", "title": "" }, { "docid": "b76d4270d9e05bc92a42a30d1e9f03b7", "score": "0.6348301", "text": "func (m *User) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAddedAt(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateAvatarURL(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateEmail(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateSSHKeys(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f5fc17631c35880d9d25a44f270504e4", "score": "0.6332006", "text": "func (u *User) Validate() error {\n\t// verify the Name field is populated\n\tif len(u.Name.String) == 0 {\n\t\treturn ErrEmptyUserName\n\t}\n\n\t// verify the Token field is populated\n\tif len(u.Token.String) == 0 {\n\t\treturn ErrEmptyUserToken\n\t}\n\n\t// verify the Hash field is populated\n\tif len(u.Hash.String) == 0 {\n\t\treturn ErrEmptyUserHash\n\t}\n\n\t// verify the Name field is valid\n\tif !userRegex.MatchString(u.Name.String) {\n\t\treturn ErrInvalidUserName\n\t}\n\n\t// calculate total size of favorites\n\ttotal := 0\n\tfor _, f := range u.Favorites {\n\t\ttotal += len(f)\n\t}\n\n\t// verify the Favorites field is within the database constraints\n\tif total > constants.FavoritesMaxSize {\n\t\treturn ErrExceededFavoritesLimit\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4d6b3076ff5dc437f533b9e49368164b", "score": "0.631859", "text": "func (o *TspUser) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\n\treturn validate.Validate(\n\t\t&validators.StringIsPresent{Field: o.LastName, Name: \"LastName\"},\n\t\t&validators.StringIsPresent{Field: o.FirstName, Name: \"FirstName\"},\n\t\t&validators.StringIsPresent{Field: o.Email, Name: \"Email\"},\n\t\t&validators.StringIsPresent{Field: o.Telephone, Name: \"Telephone\"},\n\t\t&validators.UUIDIsPresent{Field: o.TransportationServiceProviderID, Name: \"TransportationServiceProviderID\"},\n\t), nil\n}", "title": "" }, { "docid": "07cbdc5af47aab7c42d30bf98f312119", "score": "0.63179266", "text": "func (m *CreateUserResponse) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Id\n\n\t// no validation rules for Err\n\n\treturn nil\n}", "title": "" }, { "docid": "da3d605f32492da526466a2937e1c1fb", "score": "0.63063407", "text": "func (m *UserState) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "2e131be31e7fc59eafc1ac42cabdec6f", "score": "0.6287274", "text": "func (u *User) Validate(sessionID *string, checkRelConsist func(map[string]string) error) error {\n\treturn nil\n}", "title": "" }, { "docid": "2adc9797ed04aba2c74960ae5007f150", "score": "0.62862444", "text": "func (m *UserContext) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validatePermissions(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateStrategyID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTenantID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTenantName(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUserID(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUsername(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4e3caab779085b13d1e7d5e1c2ee453b", "score": "0.6279357", "text": "func (user *User) Validate() error {\n\tvar results *multierror.Error\n\tif user.ID == \"\" {\n\t\tresults = multierror.Append(results, ErrNoID)\n\t}\n\tif uuid.Parse(user.ID) == nil {\n\t\tresults = multierror.Append(results, ErrBadID)\n\t}\n\tif user.Username == \"\" {\n\t\tresults = multierror.Append(results, ErrNoUsername)\n\t}\n\tif user.Email == \"\" {\n\t\tresults = multierror.Append(results, ErrNoEmail)\n\t}\n\tif _, err := mail.ParseAddress(user.Email); err != nil {\n\t\tresults = multierror.Append(results, err)\n\t}\n\tif user.Metadata == nil {\n\t\tresults = multierror.Append(results, ErrNilMetadata)\n\t}\n\treturn results.ErrorOrNil()\n}", "title": "" }, { "docid": "6437b1cc9f77b21c77c59cbf451c9f98", "score": "0.62697786", "text": "func (m *User) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Role\n\n\t// no validation rules for Name\n\n\t// no validation rules for Surname\n\n\t// no validation rules for Email\n\n\t// no validation rules for CategoryId\n\n\t// no validation rules for AddressId\n\n\treturn nil\n}", "title": "" }, { "docid": "c61a48e0eafb50122674ec8057cecc62", "score": "0.62641364", "text": "func (nu *NewUser) Validate() error {\n\t//TODO: validate the new user according to these rules:\n\t//- Email field must be a valid email address (hint: see mail.ParseAddress)\n\t//- Password must be at least 6 characters\n\t//- Password and PasswordConf must match\n\t//- UserName must be non-zero length and may not contain spaces\n\t//use fmt.Errorf() to generate appropriate error messages if\n\t//the new user doesn't pass one of the validation rules\n\t_, err := mail.ParseAddress(nu.FirstName + \" \" + nu.LastName + \"<\" + nu.Email + \">\")\n\tif err != nil {\n\t\treturn errors.New(\"Invalid Email Address\")\n\t}\n\tif len(nu.Password) < 6 {\n\t\treturn errors.New(\"Password is less than 6 characters\")\n\t}\n\tif nu.Password != nu.PasswordConf {\n\t\treturn errors.New(\"Password and PasswordConf do not match\")\n\t}\n\tif len(nu.UserName) < 1 || strings.Contains(nu.UserName, \" \") {\n\t\treturn errors.New(\"UserName length is zero or contains spaces\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8c492ea1a2d18aea19347bb556d951ba", "score": "0.62468994", "text": "func (m *UserProperties) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateEmail(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateFirstName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLastName(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e5fdaf7808d4b71a3248606d8a315dc3", "score": "0.6233219", "text": "func (u User) Valid() (bool, error) {\n\treturn govalidator.ValidateStruct(u)\n}", "title": "" }, { "docid": "578ae9b854c773d88e90d1b039163c3f", "score": "0.6227731", "text": "func (ut *UserPayload) Validate() (err error) {\n\tif ut.Fullname == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"fullname\"))\n\t}\n\tif ut.Email == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"email\"))\n\t}\n\tif err2 := goa.ValidateFormat(goa.FormatEmail, ut.Email); err2 != nil {\n\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`type.email`, ut.Email, goa.FormatEmail, err2))\n\t}\n\tif ok := goa.ValidatePattern(`^([a-zA-Z0-9 ]{4,30})$`, ut.Fullname); !ok {\n\t\terr = goa.MergeErrors(err, goa.InvalidPatternError(`type.fullname`, ut.Fullname, `^([a-zA-Z0-9 ]{4,30})$`))\n\t}\n\tif ut.Password != nil {\n\t\tif utf8.RuneCountInString(*ut.Password) < 6 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`type.password`, *ut.Password, utf8.RuneCountInString(*ut.Password), 6, true))\n\t\t}\n\t}\n\tif ut.Password != nil {\n\t\tif utf8.RuneCountInString(*ut.Password) > 30 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`type.password`, *ut.Password, utf8.RuneCountInString(*ut.Password), 30, false))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "ffd05f465c994e75e2eafb22ac7ddd66", "score": "0.6222766", "text": "func (mt *ProjectUser) Validate() (err error) {\n\tif mt.User == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"user\"))\n\t}\n\tif mt.Role == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"role\"))\n\t}\n\tif mt.Membership == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"membership\"))\n\t}\n\tif mt.User != nil {\n\t\tif err2 := mt.User.Validate(); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, err2)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "64b6a8589762e4ac2b9d81397e58d9b2", "score": "0.62168944", "text": "func (u User) Valid() error {\n\tvErr := new(jwt.ValidationError)\n\tnow := jwt.TimeFunc().Unix()\n\n\texpires := u.Expires.Unix()\n\tif expires != 0 && now > expires {\n\t\tvErr.Inner = ErrTokenExpired\n\t\tvErr.Errors |= jwt.ValidationErrorExpired\n\t}\n\n\tissued := u.Issued.Unix()\n\tif issued != 0 && now < issued {\n\t\tvErr.Inner = ErrTokenUsedBeforeIssued\n\t\tvErr.Errors |= jwt.ValidationErrorIssuedAt\n\t}\n\n\tif vErr.Errors == 0 {\n\t\treturn nil\n\t}\n\n\treturn vErr\n}", "title": "" }, { "docid": "7816c7d48afc590ad933fef38c2114ea", "score": "0.62091917", "text": "func (us *UserSession) Valid() error {\n\tif us.UserID == 0 {\n\t\treturn errors.New(\"user id can not be 0\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "aadcd049d968b652dd6c12788c989a08", "score": "0.62025946", "text": "func (u *UserDTO) Validate() error {\n\treturn validation.ValidateStruct(\n\t\tu,\n\t\tvalidation.Field(&u.Login, validation.Length(6, 30), is.Alpha),\n\t\tvalidation.Field(&u.FirstName, validation.Length(2, 40), is.Alpha),\n\t\tvalidation.Field(&u.SurName, validation.Length(2, 40), is.Alpha),\n\t\tvalidation.Field(&u.Email, is.EmailFormat),\n\t)\n}", "title": "" }, { "docid": "1a90ae164aec4963f9711657d9312dc0", "score": "0.6201732", "text": "func (u *User) Validate(action string) error {\n\tswitch strings.ToLower(action) {\n\tcase \"update\":\n\t\tif u.Username == \"\" {\n\t\t\treturn errors.New(\"Required: Username\")\n\t\t}\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Required: Password\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required: Email\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\t\treturn nil\n\tcase \"login\":\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Required: Password\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required: Email\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\t\treturn nil\n\tdefault:\n\t\tif u.Username == \"\" {\n\t\t\treturn errors.New(\"Required: Username\")\n\t\t}\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Required: Password\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required: Email\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "04ca85fbf6798fbdabe761d58d643d5f", "score": "0.6197051", "text": "func (urr *UserRegistrationRequest) Validate(tx *sql.Tx) error {\n\tvar errs = []error{}\n\tif urr.Role == 0 {\n\t\terrs = append(errs, errors.New(\"role: required and cannot be zero\"))\n\t}\n\n\tif urr.TenantID == 0 {\n\t\terrs = append(errs, errors.New(\"tenantId: required and cannot be zero\"))\n\t}\n\n\t// This can only happen if an email isn't present in the request; the JSON parse handles actually\n\t// invalid email addresses.\n\tif urr.Email.Address.Address == \"\" {\n\t\terrs = append(errs, errors.New(\"email: required\"))\n\t}\n\n\treturn util.JoinErrs(errs)\n}", "title": "" }, { "docid": "c294370dc183032bc48b5cc9856d6c96", "score": "0.6192017", "text": "func (f *AdminCreateUserForm) Validate(req *http.Request, errs binding.Errors) binding.Errors {\n\tctx := context.GetValidateContext(req)\n\treturn middleware.Validate(errs, ctx.Data, f, ctx.Locale)\n}", "title": "" }, { "docid": "1a5ae0ff97e834f9ff76e32f26eaf786", "score": "0.61826396", "text": "func (s *ServiceMember) Validate(_ *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.UUIDIsPresent{Field: s.UserID, Name: \"UserID\"},\n\t), nil\n}", "title": "" }, { "docid": "1f1e989a9056d673d6139f3cc66c2518", "score": "0.6153554", "text": "func (m *OpenpitrixUserDetail) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateUser(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d090f3d9a343defc6d8f57d422ca06f4", "score": "0.61530125", "text": "func (ut *userPayload) Validate() (err error) {\n\tif ut.Fullname == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"fullname\"))\n\t}\n\tif ut.Email == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"email\"))\n\t}\n\tif ut.Email != nil {\n\t\tif err2 := goa.ValidateFormat(goa.FormatEmail, *ut.Email); err2 != nil {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidFormatError(`request.email`, *ut.Email, goa.FormatEmail, err2))\n\t\t}\n\t}\n\tif ut.Fullname != nil {\n\t\tif ok := goa.ValidatePattern(`^([a-zA-Z0-9 ]{4,30})$`, *ut.Fullname); !ok {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidPatternError(`request.fullname`, *ut.Fullname, `^([a-zA-Z0-9 ]{4,30})$`))\n\t\t}\n\t}\n\tif ut.Password != nil {\n\t\tif utf8.RuneCountInString(*ut.Password) < 6 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`request.password`, *ut.Password, utf8.RuneCountInString(*ut.Password), 6, true))\n\t\t}\n\t}\n\tif ut.Password != nil {\n\t\tif utf8.RuneCountInString(*ut.Password) > 30 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(`request.password`, *ut.Password, utf8.RuneCountInString(*ut.Password), 30, false))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "868e713a3067629915866b51580a8324", "score": "0.6150114", "text": "func (u *User) Validate(action string) error {\n\tswitch strings.ToLower(action) {\n\tcase \"update\":\n\t\tif u.Firstname == \"\" {\n\t\t\treturn errors.New(\"Required Firstname\")\n\t\t}\n\t\tif u.Lastname == \"\" {\n\t\t\treturn errors.New(\"Required Lastname\")\n\t\t}\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Required Password\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required Email\")\n\t\t}\n\t\tif u.Phone == \"\" {\n\t\t\treturn errors.New(\"Required Phone\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\n\t\treturn nil\n\tcase \"login\":\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Required Password\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required Email\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\t\treturn nil\n\n\tdefault:\n\t\tif u.Firstname == \"\" {\n\t\t\treturn errors.New(\"Required Firstname\")\n\t\t}\n\t\tif u.Lastname == \"\" {\n\t\t\treturn errors.New(\"Required Lastname\")\n\t\t}\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Required Password\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required Email\")\n\t\t}\n\t\tif u.Phone == \"\" {\n\t\t\treturn errors.New(\"Required Phone\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "57b1308af0deb91565139d0db466dca2", "score": "0.6147443", "text": "func (m *ModelsUser) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\tif err := m.validatePlatformID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\tif err := m.validatePlatformUserID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\tif err := m.validateStatus(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\tif err := m.validateUpdatedAt(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "713a036f8c0a17bc3c96b0b998506f6e", "score": "0.61405015", "text": "func (m *CreateUserV1Response) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for UserId\n\n\treturn nil\n}", "title": "" }, { "docid": "aebd102e7edd0204ef57fa3db4d55890", "score": "0.61341393", "text": "func (u *UserAccessToken) Validate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.Validate(\n\t\t&validators.IntIsPresent{Field: u.UserID, Name: \"UserID\"},\n\t\t&validators.StringIsPresent{Field: u.AccessToken, Name: \"AccessToken\"},\n\t\t&validators.TimeIsPresent{Field: u.ExpiresAt, Name: \"ExpiresAt\"},\n\t), nil\n}", "title": "" }, { "docid": "81d15db3897c3581573700300cb47998", "score": "0.6126259", "text": "func (u *Users) Validate(ctx context.Context, req *pb.ValidateRequest, rsp *pb.ValidateResponse) error {\n\t// validate the request\n\tif len(req.Token) == 0 {\n\t\treturn ErrMissingToken\n\t}\n\n\treturn u.DB.Transaction(func(tx *gorm.DB) error {\n\t\t// lookup the token\n\t\tvar token Token\n\t\tif err := tx.Where(&Token{Key: req.Token}).Preload(\"User\").First(&token).Error; err == gorm.ErrRecordNotFound {\n\t\t\treturn ErrInvalidToken\n\t\t} else if err != nil {\n\t\t\tlogger.Errorf(\"Error reading from the database: %v\", err)\n\t\t\treturn errors.InternalServerError(\"DATABASE_ERROR\", \"Error connecting to the database\")\n\t\t}\n\n\t\t// ensure the token is valid\n\t\tif u.Time().After(token.ExpiresAt) {\n\t\t\treturn ErrTokenExpired\n\t\t}\n\n\t\t// extend the token for another lifetime\n\t\ttoken.ExpiresAt = u.Time().Add(tokenTTL)\n\t\tif err := tx.Save(&token).Error; err != nil {\n\t\t\tlogger.Errorf(\"Error writing to the database: %v\", err)\n\t\t\treturn errors.InternalServerError(\"DATABASE_ERROR\", \"Error connecting to the database\")\n\t\t}\n\n\t\t// serialize the response\n\t\trsp.User = token.User.Serialize()\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "cb646a0c0574a37007220c3ea9a32b3a", "score": "0.6125749", "text": "func (o *PostRolesRoleIDUsersUserIDBadRequestBodyAO1Errors) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "fb03f525e4b0d8718f3c23df5194e7dd", "score": "0.61257005", "text": "func (u *User) Validate(action string) error {\n\t\tswitch action {\n\t\tcase \"update\":\n\t\t\tif u.UserName == \"\" {\n\t\t\t\treturn errors.New(\"Required UserName\")\n\t\t\t}\n\t\t\tif u.Email == \"\" {\n\t\t\t\treturn errors.New(\"Required email\")\n\t\t\t}\n\t\t\n\t\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\t\treturn errors.New(\"Invalid email\")\n\t\t\t}\n\t\t\treturn nil\n\t\tcase \"login\":\n\t\t\tif u.Email == \"\" {\n\t\t\t\treturn errors.New(\"Required email\")\n\t\t\t}\n\t\t\n\t\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\t\treturn errors.New(\"Invalid email\")\n\t\t\t}\n\t\t\tif u.Password == \"\" {\n\t\t\t\treturn errors.New(\"Required password\")\n\t\t\t}\n\t\t\treturn nil\n\t\tcase \"signup\" :\n\t\t\tif u.Email == \"\" {\n\t\t\t\treturn errors.New(\"Required email\")\n\t\t\t}\n\t\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\t\treturn errors.New(\"Invalid email\")\n\t\t\t}\n\t\t\tif u.Password == \"\" {\n\t\t\t\treturn errors.New(\"Required password\")\n\t\t\t}\n\t\t\treturn nil\n\t\tdefault:\n\t\t\tif u.UserName == \"\" {\n\t\t\t\treturn errors.New(\"Required username\")\n\t\t\t}\n\t\t\tif u.Password == \"\" {\n\t\t\t\treturn errors.New(\"Required password\")\n\t\t\t}\n\t\t\tif u.Email == \"\" {\n\t\t\t\treturn errors.New(\"Required email\")\n\t\t\t}\n\t\t\n\t\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\t\treturn errors.New(\"Invalid email\")\n\t\t\t}\n\t\t\treturn nil\n\t\t}\n\t}", "title": "" }, { "docid": "ca4f80fe02f050a22883c4600d84fbc2", "score": "0.6108511", "text": "func (m *UserInfo) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5f7a9cf21b6688fb12e17e387aecaaf4", "score": "0.61051804", "text": "func (up UserPost) Validate(errors *binding.Errors, req *http.Request) {\n\tif len(up.UName) < 4 {\n\t\terrors.Fields[\"uname\"] = \"Too short; minimum 4 characters\"\n\t} else if len(up.UName) > 30 {\n\n\t\terrors.Fields[\"uname\"] = \"Too long; maximum 30 characters\"\n\t}\n\tif m, _ := regexp.MatchString(\"^[0-9a-zA-Z]+$\", up.UName); !m {\n\t\terrors.Fields[\"uname\"] = \"only alpha number\"\n\t}\n\n\tif len(up.UPwd) < 4 {\n\t\terrors.Fields[\"upwd\"] = \"Too short; minimum 4 characters\"\n\t} else if len(up.UPwd) > 30 {\n\t\terrors.Fields[\"upwd\"] = \"Too long; maximum 30 characters\"\n\t}\n\tif m, _ := regexp.MatchString(\"^[0-9a-zA-Z]+$\", up.UPwd); !m {\n\t\terrors.Fields[\"upwd\"] = \"only alpha number\"\n\t}\n\n\tif len(up.UEmail) < 4 {\n\t\terrors.Fields[\"uemail\"] = \"Too short; minimum 4 characters\"\n\t} else if len(up.UEmail) > 30 {\n\t\terrors.Fields[\"uemail\"] = \"Too long; maximum 30 characters\"\n\t}\n\tif m, _ := regexp.MatchString(`^([\\w\\.\\_]{2,10})@(\\w{1,}).([a-z]{2,4})$`, up.UEmail); !m {\n\t\terrors.Fields[\"uemail\"] = \"It is not correct email adress\"\n\t}\n}", "title": "" }, { "docid": "9a2010a72d19b012c63ef6f4f41c376f", "score": "0.60973716", "text": "func (u *User) Validate(v ...interface{}) error {\n\n\tif len(v) == 0 { // CREATE\n\t\temail := u.Email\n\t\tm := validEmail.FindStringSubmatch(email)\n\t\tif m == nil {\n\t\t\treturn DSErr{When: time.Now(), What: \"Validate error: invalid email \" + email}\n\t\t}\n\t\tpassword := u.Password\n\t\tif len(password) < 6 {\n\t\t\treturn DSErr{When: time.Now(), What: \"Validate error: password too short \" + password}\n\t\t} else {\n\t\t\thash, _ := bcrypt.GenerateFromPassword([]byte(password), 10)\n\t\t\tu.Password = string(hash)\n\t\t\treturn nil\n\t\t}\n\n\t} else { // UPDATE / DELETE\n\t\tv0 := v[0]\n\t\tif reflect.TypeOf(v0).Kind() != reflect.Ptr {\n\t\t\treturn DSErr{When: time.Now(), What: \"Validate User pointer reqd\"}\n\t\t}\n\t\ts := reflect.TypeOf(v0).Elem()\n\t\tif _, ok := entities[s.Name()]; !ok {\n\t\t\treturn DSErr{When: time.Now(), What: \"Validate want User got \" + s.Name()}\n\t\t}\n\t\tswitch s.Name() {\n\t\tcase \"User\":\n\t\t\tv0v := reflect.ValueOf(v0).Elem()\n\t\t\tif v0v.Kind() != reflect.Struct {\n\t\t\t\treturn DSErr{When: time.Now(), What: \"Validate needs struct arg got \" + v0v.Kind().String()}\n\t\t\t}\n\t\t\tif u.Id == int64(-999) {\n\t\t\t\tif u.Name == v0v.FieldByName(\"Name\").String() {\n\t\t\t\t\treturn nil\n\t\t\t\t} else {\n\t\t\t\t\treturn DSErr{When: time.Now(), What: \"delete validate name \" + u.Name}\n\t\t\t\t}\n\t\t\t}\n\t\t\tset := 0\n\t\t\tfor i := 0; i < v0v.NumField(); i++ {\n\t\t\t\tuu := reflect.ValueOf(u).Elem()\n\t\t\t\tfi := uu.Field(i)\n\t\t\t\tvi := v0v.Field(i)\n\t\t\t\tif reflect.DeepEqual(fi.Interface(), reflect.Zero(fi.Type()).Interface()) {\n\t\t\t\t\tif vi.IsValid() {\n\t\t\t\t\t\tfi.Set(vi)\n\t\t\t\t\t\tset++\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\temail := u.Email\n\t\t\tm := validEmail.FindStringSubmatch(email)\n\t\t\tif m == nil {\n\t\t\t\treturn DSErr{When: time.Now(), What: \"Validate invalid email \" + email}\n\t\t\t}\n\t\t\tpassword := u.Password\n\t\t\tif len(password) < 6 {\n\t\t\t\treturn DSErr{When: time.Now(), What: \"validate pswrd too short \" + u.Name + email + password + strconv.Itoa(set)}\n\t\t\t} else {\n\t\t\t\thash, _ := bcrypt.GenerateFromPassword([]byte(password), 10)\n\t\t\t\tu.Password = string(hash)\n\t\t\t\treturn nil\n\t\t\t}\n\t\tdefault:\n\t\t\treturn DSErr{When: time.Now(), What: \"Validate want User got : \" + s.Name()}\n\t\t}\n\t\treturn nil\n\t}\n\n}", "title": "" }, { "docid": "e7c555f592f8fef2a509889fa6fa4893", "score": "0.6075921", "text": "func (f *UserEditForm) Validate() *http_utils.Report {\n\treport := http_utils.NewReport()\n\treport.Fields[\"username\"] = f.ValidateUsername()\n\treport.Fields[\"password\"] = f.ValidatePassword()\n\treport.Fields[\"email\"] = f.ValidateEmail()\n\treport.Fields[\"name\"] = f.ValidateFirstName()\n\treport.Fields[\"lastname\"] = f.ValidateLastName()\n\treport.Fields[\"date\"] = f.ValidateBirthDate()\n\treport.Fields[\"img\"] = f.ValidateImg()\n\treport.Fields[\"gender\"] = f.ValidateGender()\n\n\treport.Ok = report.Fields[\"username\"].Ok && report.Fields[\"password\"].Ok &&\n\t\treport.Fields[\"email\"].Ok && report.Fields[\"name\"].Ok &&\n\t\treport.Fields[\"lastname\"].Ok && report.Fields[\"date\"].Ok &&\n\t\treport.Fields[\"img\"].Ok && f.ValidateGender().Ok\n\tf.ok = report.Ok\n\treturn report\n}", "title": "" }, { "docid": "2ba7f940845b434885acef2ab64de8da", "score": "0.6075165", "text": "func (user *User) IsValid(isUpdate bool) *u.AppError {\n\tif !isUpdate {\n\t\tif len(user.WebID) != 26 {\n\t\t\treturn u.NewLocAppError(\"user.IsValid\", \"model.user.is_valid.WebID.app_error\", nil, \"\")\n\t\t}\n\n\t\tif len(user.Email) == 0 {\n\t\t\treturn u.NewLocAppError(\"user.IsValid\", \"model.user.is_valid.Email.app_error\", nil, \"user_webID=\"+user.WebID)\n\t\t}\n\n\t\tif len(user.Password) == 0 {\n\t\t\treturn u.NewLocAppError(\"user.IsValid\", \"model.user.is_valid.auth_data_pwd.app_error\", nil, \"user_webID=\"+user.WebID)\n\t\t}\n\t}\n\n\tif !IsValidUsername(user.Username) {\n\t\treturn u.NewLocAppError(\"user.IsValid\", \"model.user.is_valid.Username.app_error\", nil, \"user_webID=\"+user.WebID)\n\t}\n\n\tif len(user.Email) > 128 || !IsValidEmail(user.Email) {\n\t\treturn u.NewLocAppError(\"user.IsValid\", \"model.user.is_valid.Email.app_error\", nil, \"user_webID=\"+user.WebID)\n\t}\n\n\tif utf8.RuneCountInString(user.NickName) > 64 {\n\t\treturn u.NewLocAppError(\"user.IsValid\", \"model.user.is_valid.NickName.app_error\", nil, \"user_webID=\"+user.WebID)\n\t}\n\n\tif utf8.RuneCountInString(user.FirstName) > 64 {\n\t\treturn u.NewLocAppError(\"user.IsValid\", \"model.user.is_valid.first_name.app_error\", nil, \"user_webID=\"+user.WebID)\n\t}\n\n\tif utf8.RuneCountInString(user.LastName) > 64 {\n\t\treturn u.NewLocAppError(\"user.IsValid\", \"model.user.is_valid.last_name.app_error\", nil, \"user_webID=\"+user.WebID)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0928283350fc33a769e6cbd506775573", "score": "0.60732603", "text": "func (u *User) Validate(action string) error {\n\tswitch strings.ToLower(action) {\n\tcase \"register\":\n\t\tif u.Name == \"\" {\n\t\t\treturn errors.New(\"Required Name\")\n\t\t}\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Required Password\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required Email\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\n\t\treturn nil\n\tcase \"login\":\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Required Password\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required Email\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\t\treturn nil\n\n\tcase \"forgotpassword\":\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required Email\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\t\treturn nil\n\n\tdefault:\n\t\tif u.Name == \"\" {\n\t\t\treturn errors.New(\"Required Name\")\n\t\t}\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Required Password\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Required Email\")\n\t\t}\n\t\tif err := checkmail.ValidateFormat(u.Email); err != nil {\n\t\t\treturn errors.New(\"Invalid Email\")\n\t\t}\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "ddee6fe6211e46d28a0040fe97b8f26c", "score": "0.6071708", "text": "func (u User) Validate() ([]ValidationError, error) {\n\tvar vErrs []ValidationError\n\n\tif len(u.ID) != 36 {\n\t\tvErrs = append(vErrs, ValidationError{\n\t\t\tField: \"ID\",\n\t\t\tError: errors.New(\"length of ID must be 36 characters\"),\n\t\t})\n\t}\n\n\tif u.Age < 18 {\n\t\tvErrs = append(vErrs, ValidationError{\n\t\t\tField: \"Age\",\n\t\t\tError: errors.New(\"Age must be greater than 18\"),\n\t\t})\n\t}\n\n\tif u.Age > 50 {\n\t\tvErrs = append(vErrs, ValidationError{\n\t\t\tField: \"Age\",\n\t\t\tError: errors.New(\"Age must be less than 50\"),\n\t\t})\n\t}\n\n\tuEmailRE, err := regexp.Compile(`^\\\\w+@\\\\w+\\\\.\\\\w+$`)\n\tif err != nil {\n\t\treturn vErrs, err\n\t}\n\tif !uEmailRE.Match([]byte(u.Email)) {\n\t\tvErrs = append(vErrs, ValidationError{\n\t\t\tField: \"Email\",\n\t\t\tError: errors.New(`Email is not matching regexp \"^\\\\w+@\\\\w+\\\\.\\\\w+$\"`),\n\t\t})\n\t}\n\n\t// validation of UserRole start\n\t// validation of UserRole end\n\n\tfor _, item := range u.Phones {\n\t\tif len(item) != 11 {\n\t\t\tvErrs = append(vErrs, ValidationError{\n\t\t\t\tField: \"Phones\",\n\t\t\t\tError: errors.New(\"length of each element in Phones must be 11 characters\"),\n\t\t\t})\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn vErrs, nil\n}", "title": "" }, { "docid": "1bdf8f6de2c837b07f1a4f011f6d5054", "score": "0.60607517", "text": "func (u User) IsValid() bool {\n\tswitch {\n\tcase u.Email == \"\":\n\t\treturn false\n\tcase u.FirstName == \"\":\n\t\treturn false\n\tcase u.LastName == \"\":\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "d800b819dacc132c3130c6fca1c6fae1", "score": "0.60600585", "text": "func (o *PutUserBody) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := o.validateUsers(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "56eb293c32eefa235cf1281e6236d55a", "score": "0.60590357", "text": "func (u User) IsValidated() bool {\n\treturn u.validated\n}", "title": "" }, { "docid": "89a91f9082b1fa6066a800f49ba226df", "score": "0.6056693", "text": "func (m *UpdateUser) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAlerts(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateEmail(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateHomeScreen(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateID(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRole(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTotpAuthEnabled(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateUsername(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7407a70d0a0ea903917aa376a15c9f46", "score": "0.6055021", "text": "func (u *User) Validate(action string) error {\n\tv := truemail.Validator{}\n\tswitch strings.ToLower(action) {\n\tcase \"login\":\n\t\tif u.Password == \"\" {\n\t\t\treturn errors.New(\"Password musn't be empty\")\n\t\t}\n\t\tif u.Email == \"\" {\n\t\t\treturn errors.New(\"Email musn't be empty\")\n\t\t}\n\t\tif err := v.Validate(u.Email); err != nil {\n\t\t\treturn errors.New(\"Email format is Invalid\")\n\t\t}\n\t\treturn nil\n\tcase \"update\":\n\t\treturn u.validateAll()\n\tdefault:\n\t\treturn u.validateAll()\n\t}\n}", "title": "" }, { "docid": "73656541f664f2761473b8496cbdc56d", "score": "0.60460585", "text": "func (u *User) Validate() {\n\tu.User.Validate()\n\tu.AddError(index.CheckUnique(u, u.rt.stores(\"users\").Items()))\n\tu.SetValid()\n\tfor _, rName := range u.Roles {\n\t\tr := u.rt.find(\"roles\", rName)\n\t\tif r == nil {\n\t\t\tu.Errorf(\"Role %s does not exist\", rName)\n\t\t} else {\n\t\t\trole := AsRole(r)\n\t\t\tif !role.Available {\n\t\t\t\tu.Errorf(\"Role %s is not available\", rName)\n\t\t\t}\n\t\t}\n\t}\n\tu.SetAvailable()\n}", "title": "" }, { "docid": "b524bfe04baf7c19c0d4d33ff73d3943", "score": "0.6028694", "text": "func (u AuthentifiedUser) IsValid() error {\n\tif err := IsValidUsername(u.Username); err != nil {\n\t\treturn err\n\t}\n\tif u.Fullname == \"\" {\n\t\treturn NewErrorFrom(ErrWrongRequest, \"invalid given fullname\")\n\t}\n\n\tswitch u.Ring {\n\tcase UserRingAdmin, UserRingMaintainer, UserRingUser:\n\t\treturn nil\n\t}\n\treturn NewErrorFrom(ErrWrongRequest, \"invalid given ring value\")\n}", "title": "" }, { "docid": "ff802f0b20e502b4401b08544ad09a57", "score": "0.6026724", "text": "func ValidateCreateUser(c *gin.Context) (user model.CreateUser, err error) {\n\terr = c.BindJSON(&user)\n\treturn\n}", "title": "" }, { "docid": "358a26bd474c71f29867fcf5f1fabf58", "score": "0.6011997", "text": "func (m *GetUserRequest) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif utf8.RuneCountInString(m.GetUsername()) < 1 {\n\t\treturn GetUserRequestValidationError{\n\t\t\tfield: \"Username\",\n\t\t\treason: \"value length must be at least 1 runes\",\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a9ee9fdfd81cc4546dd279aa48692e24", "score": "0.6006016", "text": "func (ut *CreateStackOverflowUserPayload) Validate() (err error) {\n\tif ut.UserID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"userId\"))\n\t}\n\n\tif ok := goa.ValidatePattern(`^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-4[0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}$`, ut.UserID); !ok {\n\t\terr = goa.MergeErrors(err, goa.InvalidPatternError(`type.userId`, ut.UserID, `^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-4[0-9a-fA-F]{3}-[89abAB][0-9a-fA-F]{3}-[0-9a-fA-F]{12}$`))\n\t}\n\treturn\n}", "title": "" }, { "docid": "ac00b401e763e9cb077daa5038ec62a1", "score": "0.6005619", "text": "func (m *ListUser) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateAccessMode(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" } ]
d4249488da2af8335fd6fb6275e44723
Stop will halt the session
[ { "docid": "2c94eadaf13b346b58f7f051ff965546", "score": "0.811032", "text": "func (s *session) Stop() {\n\ts.active.Store(false)\n}", "title": "" } ]
[ { "docid": "988e57c5b8dc1f9d9363fd4536e650e3", "score": "0.7090475", "text": "func (s *Server) Stop() { s.s.Stop() }", "title": "" }, { "docid": "b190058adff813f98cfaae8f7a02d31d", "score": "0.7084779", "text": "func (sl *ScrapeSuite) stop() {\n\tsl.cancel()\n}", "title": "" }, { "docid": "4fe7f97a7dd7a4c5ff0adf7c7a590074", "score": "0.6968114", "text": "func (s *server) Stop() {\n\t// TODO(miek)\n\t//s.group.Add(-2)\n}", "title": "" }, { "docid": "4fe7f97a7dd7a4c5ff0adf7c7a590074", "score": "0.6968114", "text": "func (s *server) Stop() {\n\t// TODO(miek)\n\t//s.group.Add(-2)\n}", "title": "" }, { "docid": "fd91a9b2058dc65b6cf45c4a4a648dc2", "score": "0.69410324", "text": "func (session *Session) Stop() {\n\tsession.stop.Done()\n\tclose(session.reconnectChan)\n}", "title": "" }, { "docid": "968b2f2d27f8a082760baed5a424d255", "score": "0.6893835", "text": "func (h *APIServer) Stop() error {\n\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\tdefer cancel()\n\tif err := h.srv.Shutdown(ctx); err != nil {\n\t\treturn fmt.Errorf(\"failed to shutdown web server: %q\", err)\n\t}\n\tclose(h.sessCleanup)\n\treturn nil\n}", "title": "" }, { "docid": "8d4af752e8a4d176e61b72b6e58841a6", "score": "0.68917984", "text": "func Stop() {\n\tsetup().cancel()\n\tsetup().client.Close()\n}", "title": "" }, { "docid": "40d99fcb55465f11aadfa75290635621", "score": "0.68881786", "text": "func Stop() (err error) {\n\treturn nil\n}", "title": "" }, { "docid": "a1811b5e371afe43412bd279284767f8", "score": "0.68875", "text": "func Stop() {\n\tstopped <- true\n}", "title": "" }, { "docid": "5d35b2d55c30083a72d0708e3699c079", "score": "0.68804276", "text": "func Stop() {\n\tserver.Close()\n}", "title": "" }, { "docid": "a15683203529b3f7569b51a3fd961737", "score": "0.68628085", "text": "func (a *Agent) stop() error {\n\n\treturn nil\n}", "title": "" }, { "docid": "11de0febb3b46d3dd7de0abfb0bdd9fe", "score": "0.68443376", "text": "func (s *Session) Stop() {\n\tclose(s.messageRecv)\n\ts.conn.Close()\n\tfmt.Printf(\"%s is disconnected\", s.conn.RemoteAddr().String())\n}", "title": "" }, { "docid": "1b2779339a05870a946a6f14d0eee5a4", "score": "0.6835177", "text": "func (this *Manager) Stop() error {\n\tselect {\n\tcase <-this.quit:\n\t\treturn errors.New(\"already stopped\")\n\tdefault:\n\t\tclose(this.quit)\n\t}\n\n\t// stop running sessions\n\tthis.sessions.Range(func(k, v interface{}) bool {\n\t\twrap := v.(*container)\n\t\twrap.rmLock.Lock()\n\t\tses := wrap.ses\n\t\twrap.rmLock.Unlock()\n\n\t\tif ses != nil {\n\t\t\tses.stop(mqttp.CodeServerShuttingDown)\n\t\t} else {\n\t\t\tthis.sessionsCount.Done()\n\t\t}\n\n\t\texp := wrap.expiry.Load()\n\t\tif exp != nil {\n\t\t\te := exp.(*expiry)\n\t\t\tif !e.cancel() {\n\t\t\t\t_ = this.persistence.ExpiryStore([]byte(k.(string)), e.persistedState())\n\t\t\t} else {\n\t\t\t\tthis.expiryCount.Done()\n\t\t\t}\n\t\t}\n\n\t\treturn true\n\t})\n\n\tthis.sessionsCount.Wait()\n\tthis.expiryCount.Wait()\n\n\treturn nil\n}", "title": "" }, { "docid": "48cb79e5778fe9a7c9df5a8087acc242", "score": "0.6825781", "text": "func (t *Tessend) Stop() error {\n\tt.cancel()\n\tclose(t.errChan)\n\treturn nil\n}", "title": "" }, { "docid": "45468b91895780deea69af6ba4b84de3", "score": "0.68029624", "text": "func (ls *LMSServer) Stop() {\n\tls.update <- true\n\tif ls.sses.active {\n\t\tclose(ls.sses.events)\n\t}\n\tls.Player.Stop()\n}", "title": "" }, { "docid": "c62cb10c1f4d5acccddd0f9b8717ceed", "score": "0.67807484", "text": "func (s *healthCheckSession) Stop() {\n\ts.intervalTimer.stop()\n}", "title": "" }, { "docid": "88d8dc53cda030916199386019a7439a", "score": "0.6775327", "text": "func (s *Server) StopSession(resp http.ResponseWriter, req *http.Request) {\n\n}", "title": "" }, { "docid": "bcd7bd69a589c858897cfca1a18b9994", "score": "0.67630816", "text": "func (c *ConnectorHTTPServer) Stop() {\n\n}", "title": "" }, { "docid": "c4e4461952d659b2e7a76f4b76381793", "score": "0.67616475", "text": "func Stop() {\n\tsrv.Shutdown(nil)\n}", "title": "" }, { "docid": "ea001cec450a2bb528cb7f312241294e", "score": "0.67364883", "text": "func (s *Simulator) Stop() {\n\tclose(s.done)\n\ts.end = time.Now()\n}", "title": "" }, { "docid": "58ad50cebd7c0a4a75bf5e430dc8096d", "score": "0.6725093", "text": "func (s *SpheroOllieDriver) Stop() {\n\ts.Roll(0, 0)\n}", "title": "" }, { "docid": "a884caf317302c8ea184e42036a2858e", "score": "0.67197853", "text": "func (s *StopRequest) Stop() error {\n\tvar err error\n\tgencount := len(s.Generators)\n\tswitch s.Gun {\n\tcase \"gatling\":\n\t\tstr := \"kill `jps | grep \\\"Launcher\\\" | cut -d \\\" \\\" -f 1`\"\n\t\tfor i := 0; i < gencount; i++ {\n\t\t\tgo StopScenario(s.RunID, s.Generators[i].Host, str)\n\t\t}\n\tcase \"jmeter\":\n\t\tstr := os.Getenv(\"JMETERPATH\") + \"./shutdown.sh\"\n\t\tfor i := 0; i < gencount; i++ {\n\t\t\tgo StopScenario(s.RunID, s.Generators[i].Host, str)\n\t\t}\n\t}\n\terr = PgClient.SetStopTest(strconv.FormatInt(s.RunID, 10))\n\treturn err\n}", "title": "" }, { "docid": "347ac20727016d79824c2ae27685b5e1", "score": "0.6715553", "text": "func (sl *scrapeLoop) stop() {\n\tsl.cancel()\n\t<-sl.stopped\n}", "title": "" }, { "docid": "347ac20727016d79824c2ae27685b5e1", "score": "0.6715553", "text": "func (sl *scrapeLoop) stop() {\n\tsl.cancel()\n\t<-sl.stopped\n}", "title": "" }, { "docid": "18a236565a136268bb3b2ea95748a756", "score": "0.67126185", "text": "func (se *stripeExecutor) stop() {\n\tclose(se.quit)\n\tse.wg.Wait()\n}", "title": "" }, { "docid": "5be23c1199d4446786c6a575423befbd", "score": "0.6694783", "text": "func (w *Wallet) Stop() {\n\tselect {\n\tcase <-w.quit:\n\tdefault:\n\t\tclose(w.quit)\n\t\tw.chainSvrLock.Lock()\n\t\tif w.chainSvr != nil {\n\t\t\tw.chainSvr.Stop()\n\t\t}\n\t\tw.chainSvrLock.Unlock()\n\t}\n}", "title": "" }, { "docid": "7fb7dbf70ef3dabc6175ecf4b7b5ea15", "score": "0.6687469", "text": "func (p Proxy) Stop() {\n\tp.Auth.Stop()\n\tp.Collector.Stop()\n\tp.Ranker.Stop()\n\tp.Token.Stop()\n}", "title": "" }, { "docid": "8841b3432fd998de69ca01eea7fba039", "score": "0.66832125", "text": "func Stop(params *trakt.Params) error {\n\treturn getC().Stop(params)\n}", "title": "" }, { "docid": "7d74f3cb0021a96b00c813d1cc799254", "score": "0.6675455", "text": "func (tsc *TestServerControl) Stop() {\n\tlog.Printf(\"stopping servers\")\n\tclose(tsc.closer)\n\ttsc.Await()\n}", "title": "" }, { "docid": "7a70625e9782ec0e2c1ddecc8c0b3320", "score": "0.6667108", "text": "func Stop() {\n\tlog.Println(\"Stopping...\")\n}", "title": "" }, { "docid": "3dab8d084a0d3bcc0e3ded609b8847f3", "score": "0.6666332", "text": "func stop() {\n\tif manners.Close() {\n\t\tlogrus.Info(\"http server stopped\")\n\t}\n}", "title": "" }, { "docid": "c0e30441af74d294c2fe47603f7eb09f", "score": "0.6656782", "text": "func (c *cafeApi) stop() error {\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second)\n\tdefer cancel()\n\tif err := c.server.Shutdown(ctx); err != nil {\n\t\tlog.Errorf(\"error shutting down cafe api: %s\", err)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c0e30441af74d294c2fe47603f7eb09f", "score": "0.6656782", "text": "func (c *cafeApi) stop() error {\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second)\n\tdefer cancel()\n\tif err := c.server.Shutdown(ctx); err != nil {\n\t\tlog.Errorf(\"error shutting down cafe api: %s\", err)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "47722ae0435cbbfbf6eae391d15c092d", "score": "0.6649258", "text": "func (g *SlackGateway) Stop() {\n\n}", "title": "" }, { "docid": "d45ec325ba620e1d62b25ebe41cef9c8", "score": "0.66457415", "text": "func (a *api) Stop() error {\n\ta.Lock()\n\tdefer a.Unlock()\n\tif !a.started {\n\t\treturn fmt.Errorf(\"web server is already down\")\n\t}\n\tif a.shutdown == nil {\n\t\treturn fmt.Errorf(\"shutdown channel is not defined\")\n\t}\n\tclose(a.shutdown)\n\tctx, cancel := context.WithTimeout(context.Background(), a.ShutdownTimeout)\n\tdefer cancel()\n\treturn a.e.Shutdown(ctx)\n}", "title": "" }, { "docid": "3f268841f73281586bd93dddc827c7df", "score": "0.6641199", "text": "func (native Native) Stop() error {\n\t// TODO: stop what??\n\treturn nil\n}", "title": "" }, { "docid": "94a783706cb15ca505be5953da58c930", "score": "0.6639797", "text": "func (ed *SipStack) Stop() {\n\tlog.Log.Info(\"Stopping SIPStack...\")\n\ted.Alive = false\n}", "title": "" }, { "docid": "87b65d202dae43d220d7a6a1c0cecafe", "score": "0.66266763", "text": "func (s *MockToastServer) Stop() {\n\t_ = s.e.Close()\n}", "title": "" }, { "docid": "779dd426469de0a70520c9bc85eb1844", "score": "0.6626116", "text": "func (tm *TimeoutManager) Stop() error {\n\ttm.exit <- true\n\treturn nil\n}", "title": "" }, { "docid": "0f4e1e46ba2ce7f6c2e512a45c43f5d9", "score": "0.6617138", "text": "func (e *BotEngine) Stop() error {\n\tif !e.active {\n\t\treturn nil\n\t}\n\n\tlog.Println(\"[WARNING] Sending stop signal to bot: \")\n\te.quit <- true\n\n\treturn nil\n}", "title": "" }, { "docid": "b386f80d06bc654ad53d36df4838ccf7", "score": "0.6608087", "text": "func (c *Client) Stop() {\n\tc.connection.post(\"stop\", nil)\n}", "title": "" }, { "docid": "d09a588ba765ae0c9c35abe6825634d2", "score": "0.66001093", "text": "func (cli *TelegramCLI) Stop() {\n\tcli.stop <- struct{}{}\n}", "title": "" }, { "docid": "e0c32342b8198f1260e8a538899d945c", "score": "0.6590758", "text": "func (d *Driver) Stop() {\n\tif err := d.macRPC.Call(\"driver.Quit\", nil, nil); err != nil {\n\t\td.stopchan <- err\n\t}\n}", "title": "" }, { "docid": "6e776b7f3f1be7c2c8ddff1b8fe37ec7", "score": "0.659066", "text": "func (h *scriptOutputHandler) stop() error {\n\treturn nil\n}", "title": "" }, { "docid": "a99d11be0e59fdf91ec94cfacad7cf25", "score": "0.65882707", "text": "func (kamux *Kamux) Stop() error {\n\treturn kamux.StopWithError(nil)\n}", "title": "" }, { "docid": "80c80dd267c237c662bed43bde5d1c76", "score": "0.65807813", "text": "func (vs *VisitService) Stop() {\n\tclose(vs.shutdown)\n\tvs.wg.Wait()\n}", "title": "" }, { "docid": "77ab9b03b81d583c24fb44be9e55a6aa", "score": "0.6580754", "text": "func (game *Game) Stop() {\n\tgame.stop <- true\n}", "title": "" }, { "docid": "7fbaed47e10b1b2fed7c7c844c778eae", "score": "0.657937", "text": "func (rp *ReplProtocol) Stop() {\n\trp.exitedMu.Lock()\n\tdefer rp.exitedMu.Unlock()\n\tif atomic.LoadInt32(&rp.exited) == ReplRuning {\n\t\tif rp.exitC != nil {\n\t\t\tclose(rp.exitC)\n\t\t}\n\t\tatomic.StoreInt32(&rp.exited, ReplExiting)\n\t}\n\n}", "title": "" }, { "docid": "5b5336ad015211777829dc5bada0a41d", "score": "0.6577969", "text": "func (s *Execution) Stop() {\n\ts.cancel()\n}", "title": "" }, { "docid": "2797e284e17aa412369c078343edeb9e", "score": "0.6575492", "text": "func (h *htlcIncomingContestResolver) Stop() {\n\tclose(h.Quit)\n}", "title": "" }, { "docid": "e50827cf703996c1ee46a9b6c8f1dcdf", "score": "0.6575035", "text": "func (a *Anagent) Stop() {\n\ta.StartedAccess.Lock()\n\tdefer a.StartedAccess.Unlock()\n\ta.Started = false\n}", "title": "" }, { "docid": "5479612042b45162110ebc860ec6b387", "score": "0.65650904", "text": "func (s *Shell) Stop() {\n\ts.reader.scanner.Close()\n\tif !s.Active() {\n\t\treturn\n\t}\n\ts.activeMutex.Lock()\n\ts.active = false\n\ts.activeMutex.Unlock()\n\tgo func() {\n\t\ts.haltChan <- struct{}{}\n\t}()\n}", "title": "" }, { "docid": "5ff0c3b24a7b47593cc76be2bf295d95", "score": "0.6563692", "text": "func (h *htlcOutgoingContestResolver) Stop() {\n\tclose(h.Quit)\n}", "title": "" }, { "docid": "1d48298e73b89ffe8e40562243a73cfa", "score": "0.6555087", "text": "func (t *Telegram) Stop(ctx context.Context) {\n\tt.Bot.Stop()\n}", "title": "" }, { "docid": "b58d13ca89f404ec082a4a44f9a348ed", "score": "0.65481365", "text": "func Stop() bool { return player.Stop() }", "title": "" }, { "docid": "03509266f3823aaa117317f5850400cb", "score": "0.6543666", "text": "func (w WpaSupplicant) Stop () (err error) {\n _, _, err = w.Run(\"terminate\")\n return\n}", "title": "" }, { "docid": "4084c946819fb032dec6fb53276e6d88", "score": "0.65434664", "text": "func (h *htlcSuccessResolver) Stop() {\n\tclose(h.Quit)\n}", "title": "" }, { "docid": "a43e5cbb81a00643b59c33c1e4bcb57e", "score": "0.6540932", "text": "func (h *htlcTimeoutResolver) Stop() {\n\tclose(h.Quit)\n}", "title": "" }, { "docid": "8128d437d587fbc274f69307837ce814", "score": "0.65345174", "text": "func (p *kataBuiltInProxy) stop(sandbox *Sandbox, pid int) error {\n\tif p.conn != nil {\n\t\tp.conn.Close()\n\t\tp.conn = nil\n\t\tp.sandboxID = \"\"\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9abd57fb119041f2e398cad18b477af2", "score": "0.6533153", "text": "func (_EV3SpeedMonitor *EV3SpeedMonitorSession) Stop() (*types.Transaction, error) {\n\treturn _EV3SpeedMonitor.Contract.Stop(&_EV3SpeedMonitor.TransactOpts)\n}", "title": "" }, { "docid": "34c0965fc42e4bb7d4a1b1117ba3c6fc", "score": "0.6531591", "text": "func (sv *Server) Stop(stop func()) {\n\tdone := <-sv.done()\n\tlog.Printf(\"Received shutdown OS signal : --%s--\", done.String())\n\tstop()\n\tos.Exit(0)\n}", "title": "" }, { "docid": "350027b8691dd142791fd6266cbac112", "score": "0.6530918", "text": "func (e *RainEngine) Stop() {\n\tlog.Println(\"rain engine stopping...\")\n\te.stopping <- true\n\t<-e.stopped\n\tlog.Println(\"rain engine stopped...\")\n}", "title": "" }, { "docid": "a078884a30be3cc1f8d3a6e2edc877d6", "score": "0.65304464", "text": "func (r *Raft) Stop() {\n\tr.mu.Lock()\n\tdefer r.mu.Unlock()\n\tr.stopping = true\n}", "title": "" }, { "docid": "a26dcb94ad47abdb0b79eddceb06c72e", "score": "0.6530327", "text": "func (elb *ELB) Stop() {\n\tclose(elb.quit)\n}", "title": "" }, { "docid": "029a33d92d06b4d55fa747903f755166", "score": "0.6523289", "text": "func (b *Driver) Stop() {\n\tb.Roll(0, 0)\n}", "title": "" }, { "docid": "59b350f0b764dc03388599f97729c0ed", "score": "0.6521976", "text": "func (this *Reporter) Stop() {\n\tthis.Status = REPORT_STATUS_STOP\n}", "title": "" }, { "docid": "5dd7b09948e9e7272b81bdf551e5497d", "score": "0.65153915", "text": "func (rs *raftServer) stop() {\n\tlogger.Info().Msg(\"stop raft server\")\n\n\trs.stopHTTP()\n\tclose(rs.commitC)\n\tclose(rs.errorC)\n\trs.node.Stop()\n}", "title": "" }, { "docid": "a8239b14ba09694e74c76f7410158aa5", "score": "0.64950866", "text": "func (s *Controller) Stop() {\n\ts.stop <- nil\n}", "title": "" }, { "docid": "642d44e775122d466dd31b519386dc11", "score": "0.64940083", "text": "func (e *Engine) Stop() {\n\tprintln(\"do DSP stop\")\n}", "title": "" }, { "docid": "bd2b5a7ed0ca8e2f2fa2bc4d40784836", "score": "0.64765936", "text": "func (s *Server) Stop(cmd *cobra.Command, args []string) {\n\tStop(s.Config, s.Metrics)\n\treturn\n}", "title": "" }, { "docid": "9e897b24fe269ea28e5254bbae21a1f0", "score": "0.64741904", "text": "func (s *Server) Stop() {\n\ts.done <- true\n}", "title": "" }, { "docid": "43715c4eec38051ff8f0ae9c5bdbd2d4", "score": "0.6471566", "text": "func (s *Sincronia) Stop() {\n\tclose(s.stop)\n}", "title": "" }, { "docid": "801579a17712fa523a66990f53cfb0f2", "score": "0.64708245", "text": "func (s *Server) Stop() {\n\ts.s.Stop()\n}", "title": "" }, { "docid": "246d110c0314ba873e9638b36c75b79f", "score": "0.6468764", "text": "func (a *appsec) stop() {\n\tif !a.started {\n\t\treturn\n\t}\n\ta.started = false\n\t// Disable RC blocking first so that the following is guaranteed not to be concurrent anymore.\n\ta.disableRCBlocking()\n\n\t// Disable the currently applied instrumentation\n\tdyngo.SwapRootOperation(nil)\n\tif a.wafHandle != nil {\n\t\ta.wafHandle.Close()\n\t\ta.wafHandle = nil\n\t}\n\t// TODO: block until no more requests are using dyngo operations\n\n\ta.limiter.Stop()\n}", "title": "" }, { "docid": "992e35b5c395ddf711b68d90c396b9f7", "score": "0.6465019", "text": "func (fsm *stateMachine) Stop() {\n\tfsm.flag &= ^fsm_flag_running\n\tfsm.flag |= fsm_flag_stopped\n}", "title": "" }, { "docid": "c36333941808fcced041ecd0df4e7615", "score": "0.6463919", "text": "func (s *Sampler) Stop() {\n\ts.exit <- struct{}{}\n\t<-s.exit\n\ts.engine.Stop()\n}", "title": "" }, { "docid": "50c8cc740eb20d70c33b8a19f5a4a08a", "score": "0.64633894", "text": "func (s *Server) Stop(ctx context.Context) {\n\tif err := s.echo.Shutdown(ctx); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "52f4810ef0cd463e5af2ccd0c59fbfd1", "score": "0.64617383", "text": "func (s *ZKBPoller) Stop() {\n\ts.stop = true\n}", "title": "" }, { "docid": "2828cf2e1707090fc216790e6f33c370", "score": "0.64578885", "text": "func (t *Simulator) Stop() {\n\tt.stateChan <- Interrupted\n}", "title": "" }, { "docid": "17b3c5922a6bc2bd4ad300a8e0c7d30a", "score": "0.6456899", "text": "func (srv *Server) Stop() {\n\t_ = srv.server.Close()\n}", "title": "" }, { "docid": "d3c71b786ea4d62b0643484a6e92dfd6", "score": "0.6455338", "text": "func (c *Client) Stop() {\n\tc.blockScanner.Stop()\n}", "title": "" }, { "docid": "138b8606055e4396272e4f197d97092f", "score": "0.64527994", "text": "func (s *Server) Stop() {\n\ts.srv.Shutdown(context.Background())\n}", "title": "" }, { "docid": "55237ef0a11ca6385b66b9bfb17855d6", "score": "0.645184", "text": "func (t *Tab) Stop() error {\n\treturn chromedp.Stop().Do(t.executor())\n}", "title": "" }, { "docid": "ebc4c58346b2ce5244ee1e08065ab4ed", "score": "0.6445319", "text": "func (b *ServerBackend) Stop() {\n\tb.client.Disconnect()\n}", "title": "" }, { "docid": "9f300597215ffe433694d44ed9b0ec54", "score": "0.64434594", "text": "func (exp *Expvar) Stop(shutdownTimeout time.Duration) {\n\tctx, cancel := context.WithTimeout(context.Background(), shutdownTimeout)\n\tdefer cancel()\n\n\texp.log.Info(ctx, \"expvar\", \"status\", \"start shutdown...\")\n\tdefer exp.log.Info(ctx, \"expvar: Completed\")\n\n\tif err := exp.server.Shutdown(ctx); err != nil {\n\t\texp.log.Error(ctx, \"expvar\", \"status\", \"graceful shutdown did not complete\", \"msg\", err, \"shutdownTimeout\", shutdownTimeout)\n\t\tif err := exp.server.Close(); err != nil {\n\t\t\texp.log.Error(ctx, \"expvar\", \"status\", \"could not stop http server\", \"msg\", err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "079f89f84d133182ba2834428e7757ef", "score": "0.6440655", "text": "func (s *ContextImpl) stop() {\n\ts.wLock()\n\ts.transitionLocked(contextRequestFinishStop{})\n\tengine := s.engine\n\ts.engine = nil\n\ts.wUnlock()\n\n\t// Stop the engine if it was running (outside the lock but before returning)\n\tif engine != nil {\n\t\ts.contextTaggedLogger.Info(\"\", tag.LifeCycleStopping, tag.ComponentShardEngine)\n\t\tengine.Stop()\n\t\ts.contextTaggedLogger.Info(\"\", tag.LifeCycleStopped, tag.ComponentShardEngine)\n\t}\n\n\t// Cancel lifecycle context after engine is stopped\n\ts.lifecycleCancel()\n}", "title": "" }, { "docid": "139f4fa8bccad9645f9e1864ec99dac9", "score": "0.6439228", "text": "func (c *Client) Stop() {\n\tc.run = false\n\tc.wg.Wait()\n}", "title": "" }, { "docid": "139f4fa8bccad9645f9e1864ec99dac9", "score": "0.6439228", "text": "func (c *Client) Stop() {\n\tc.run = false\n\tc.wg.Wait()\n}", "title": "" }, { "docid": "cbf16c2ac1c608ebce3c0cba4937ecbc", "score": "0.6436516", "text": "func (a API) Stop(ctx context.Context) error {\n\treturn a.srv.Shutdown(ctx)\n}", "title": "" }, { "docid": "6707bf9de30334a136b8d7963a6ccfd1", "score": "0.6435501", "text": "func (s *Server) Stop(_ error) {\n\tagent.Close()\n\n\tclose(s.done)\n}", "title": "" }, { "docid": "6c72ecaa935bc1d98af21e818c07e64a", "score": "0.64302635", "text": "func (s *Server) Stop() {\n\tq := make(chan struct{})\n\ts.quit <- q\n\t<-q\n\ts.logGeneric(\"server stopped\")\n}", "title": "" }, { "docid": "b4854e36ff66b01d02733045fc7593b3", "score": "0.64268214", "text": "func (s *Server) Stop() {\n\ts.quitF()\n\ts.l.Close()\n}", "title": "" }, { "docid": "651cd884c9d674d3801b059750ce8ccb", "score": "0.6426126", "text": "func (d *Driver) Stop() error {\n\tlog.Debug(\"Stop...\")\n\terr := d.getClient().ShutdownInstance(context.TODO(), d.InstanceID)\n\treturn err\n}", "title": "" }, { "docid": "f8d0fda7af67a378562ede61fff3e49f", "score": "0.64245623", "text": "func (h *HTTPServer) Stop() error {\n\tif h.isRun {\n\t\th.isRun = false\n\t\tif h.CloseFunc != nil {\n\t\t\th.CloseFunc()\n\t\t}\n\t\treturn h.svr.Close()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6c8deb8d14012b04ef7c6a49ba4d586a", "score": "0.642321", "text": "func (w *Server) Stop() {\n\tlogger.Info(\"Wallet Server Stop Running\")\n\tw.bus.Unsubscribe(eventbus.TopicUtxoUpdate, w.onUtxoChange)\n\tw.proc.Close()\n}", "title": "" }, { "docid": "c7bf90ba0531cf0c0cfa95ae0b7bb231", "score": "0.64230144", "text": "func (tca *TCA) Stop() {\n\ttca.srvp.Stop()\n\ttca.srva.Stop()\n}", "title": "" }, { "docid": "c3e9520e7dec90a429a3db37b94aa9e6", "score": "0.6422196", "text": "func (a *Agent) Stop() {\n\ta.forAllInstances(func(idx int, inst instance) {\n\t\tinst.Stop()\n\t})\n}", "title": "" }, { "docid": "49a2da3b8b67c7e3e8bac259ee2550b9", "score": "0.6419428", "text": "func (h *HTTP) Stop() error {\n\th.log.Info().Msgf(\"Shutting down the server...%s\", h.Name())\n\n\tctx, _ := context.WithTimeout(context.Background(), 25*time.Second)\n\n\terr := h.s.Shutdown(ctx)\n\tclose(h.closing)\n\th.log.Info().Msg(\"Server gracefully stopped\")\n\treturn err\n}", "title": "" }, { "docid": "13941edf13c57bb44ab5ee6928861bdc", "score": "0.6418708", "text": "func (i *Instance) Stop() (err error) {\n\t_, err = i.in.Write([]byte(\"stop\\n\"))\n\tif err == nil {\n\t\terr = i.cmd.Wait()\n\t}\n\treturn\n}", "title": "" }, { "docid": "97765a3a58e721a7911ec62616b468a0", "score": "0.6418559", "text": "func (lt *LoadTester) Stop() error {\n\tlt.mut.Lock()\n\tdefer lt.mut.Unlock()\n\n\tif lt.status.State != Running {\n\t\treturn ErrNotRunning\n\t}\n\tlt.status.State = Stopping\n\tfor range lt.controllers {\n\t\tif err := lt.removeUser(); err != nil {\n\t\t\tmlog.Error(err.Error())\n\t\t}\n\t}\n\tlt.wg.Wait()\n\tclose(lt.statusChan)\n\tlt.status.NumUsers = 0\n\tlt.status.State = Stopped\n\treturn nil\n}", "title": "" } ]
89e0f465b56d87f8191e9a20603c751b
NewRandomServer returns a server backed by a RandomRegistry.
[ { "docid": "45d97e1eb9eb173652c4167dd7866853", "score": "0.75614816", "text": "func NewRandomServer(port int, authenticator Authenticator) *Server {\n\treturn NewServer(port, authenticator,\n\t\tNewRandomRegistry(time.Minute, 12*time.Hour))\n}", "title": "" } ]
[ { "docid": "9f8592c798bf1489719567e890d8165e", "score": "0.6580255", "text": "func NewServer(logger *log.Logger, workers *worker.Server, rpmMetadata rpmmd.RPMMD, distros *distro.Registry, kojiServers map[string]koji.GSSAPICredentials) *Server {\n\ts := &Server{\n\t\tlogger: logger,\n\t\tworkers: workers,\n\t\trpmMetadata: rpmMetadata,\n\t\tdistros: distros,\n\t\tkojiServers: kojiServers,\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "274e593cdbac8991524175f4ef39c512", "score": "0.65781766", "text": "func NewServer(conf *rpc.ServerConfig, regConf *ProviderRegistryConfig) (*Server, error) {\n\tvar (\n\t\terr error\n\t\trpcServer *rpc.Server\n\t\tregistry gxregistry.Registry\n\t)\n\n\tif err = regConf.CheckValidity(); err != nil {\n\t\treturn nil, jerrors.Trace(err)\n\t}\n\n\tif rpcServer, err = rpc.NewServer(conf); err != nil {\n\t\treturn nil, jerrors.Trace(err)\n\t}\n\n\tregAddrList := strings.Split(regConf.RegAddr, \",\")\n\tswitch regConf.Type {\n\tcase \"etcd\":\n\t\tregistry, err = gxetcd.NewRegistry(\n\t\t\tgxregistry.WithAddrs(regAddrList...),\n\t\t\tgxregistry.WithTimeout(time.Duration(1e9*regConf.KeepaliveTimeout)),\n\t\t\tgxregistry.WithRoot(regConf.Root),\n\t\t)\n\tcase \"zookeeper\":\n\t\tregistry, err = gxzookeeper.NewRegistry(\n\t\t\tgxregistry.WithAddrs(regAddrList...),\n\t\t\tgxregistry.WithTimeout(time.Duration(1e9*regConf.KeepaliveTimeout)),\n\t\t\tgxregistry.WithRoot(regConf.Root),\n\t\t)\n\tdefault:\n\t\treturn nil, jerrors.Errorf(ErrIllegalConf+\"registry type %s\", regConf.Type)\n\t}\n\tif err != nil {\n\t\treturn nil, jerrors.Trace(err)\n\t}\n\n\tvar localAddrArr []string\n\tfor _, p := range conf.Ports {\n\t\tport, err := strconv.Atoi(p)\n\t\tif err != nil {\n\t\t\treturn nil, jerrors.Trace(err)\n\t\t}\n\n\t\tif port <= 0 || 65535 < port {\n\t\t\treturn nil, jerrors.Errorf(\"illegal port %s\", p)\n\t\t}\n\n\t\tlocalAddrArr = append(localAddrArr, net.JoinHostPort(conf.Host, p))\n\t}\n\n\tfor _, svr := range regConf.ServiceArray {\n\t\taddr := gxnet.HostAddress(svr.LocalHost, svr.LocalPort)\n\t\tif ok := gxstrings.Contains(gxstrings.Strings2Ifs(localAddrArr), addr); !ok {\n\t\t\treturn nil, jerrors.Errorf(\"can not find ServiceConfig addr %s in conf address array %#v\",\n\t\t\t\taddr, localAddrArr)\n\t\t}\n\t}\n\n\treturn &Server{\n\t\tServer: rpcServer,\n\t\tregConf: *regConf,\n\t\tregistry: registry,\n\t}, nil\n}", "title": "" }, { "docid": "37d44c41c721ac41c8a502f9eec764ab", "score": "0.6571373", "text": "func NewServer(ctx context.Context, options ...func(Party) error) (Server, error) {\n\tinfo, dbg := buildInfoDebugLogger(log.NewLogfmtLogger(os.Stderr), false)\n\tlifetimeManager := newLifeTimeManager(info)\n\tserver := &server{\n\t\tlifetimeManager: &lifetimeManager,\n\t\tdefaultHubClients: &defaultHubClients{\n\t\t\tlifetimeManager: &lifetimeManager,\n\t\t\tallCache: allClientProxy{lifetimeManager: &lifetimeManager},\n\t\t},\n\t\tgroupManager: &defaultGroupManager{\n\t\t\tlifetimeManager: &lifetimeManager,\n\t\t},\n\t\tpartyBase: newPartyBase(ctx, info, dbg),\n\t\treconnectAllowed: true,\n\t}\n\tfor _, option := range options {\n\t\tif option != nil {\n\t\t\tif err := option(server); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\tif server.transports == nil {\n\t\tserver.transports = []string{\"WebSockets\", \"ServerSentEvents\"}\n\t}\n\tif server.newHub == nil {\n\t\treturn server, errors.New(\"cannot determine hub type. Neither UseHub, HubFactory or SimpleHubFactory given as option\")\n\t}\n\treturn server, nil\n}", "title": "" }, { "docid": "f61130ebde328dc37ada2a80ca19f4c3", "score": "0.6554083", "text": "func newRegistryServer() *httptest.Server {\n\tregHandler := registry.New()\n\tsrv := httptest.NewServer(&tagListHandler{\n\t\tregistryHandler: regHandler,\n\t\timagetags: convenientTags,\n\t})\n\treturn srv\n}", "title": "" }, { "docid": "d0aad8be76d5ad1ecc349e4f523b25a9", "score": "0.645748", "text": "func NewServer(config *Config, dialOptions ...grpc.DialOption) registryserver.Registry {\n\tnseChain := chain.NewNetworkServiceEndpointRegistryServer(\n\t\tserialize.NewNetworkServiceEndpointRegistryServer(),\n\t\texpire.NewNetworkServiceEndpointRegistryServer(config.ChainCtx, config.ExpirePeriod),\n\t\tcheckid.NewNetworkServiceEndpointRegistryServer(),\n\t\tetcd.NewNetworkServiceEndpointRegistryServer(config.ChainCtx, config.Namespace, config.ClientSet),\n\t\tproxy.NewNetworkServiceEndpointRegistryServer(config.ProxyRegistryURL),\n\t\tconnect.NewNetworkServiceEndpointRegistryServer(config.ChainCtx, connect.WithDialOptions(dialOptions...)),\n\t)\n\tnsChain := chain.NewNetworkServiceRegistryServer(\n\t\tserialize.NewNetworkServiceRegistryServer(),\n\t\tetcd.NewNetworkServiceRegistryServer(config.ChainCtx, config.Namespace, config.ClientSet),\n\t\tproxy.NewNetworkServiceRegistryServer(config.ProxyRegistryURL),\n\t\tconnect.NewNetworkServiceRegistryServer(config.ChainCtx, connect.WithDialOptions(dialOptions...)),\n\t)\n\n\treturn registryserver.NewServer(nsChain, nseChain)\n}", "title": "" }, { "docid": "feb4d90a23345dc73be0a35af685c85c", "score": "0.63833207", "text": "func NewServer(r *network.Router, pkey abstract.Scalar) *Server {\n\tc := &Server{\n\t\tprivate: pkey,\n\t\tstatusReporterStruct: newStatusReporterStruct(),\n\t\tRouter: r,\n\t\tprotocols: newProtocolStorage(),\n\t\tstarted: time.Now(),\n\t}\n\tc.overlay = NewOverlay(c)\n\tc.websocket = NewWebSocket(r.ServerIdentity)\n\tc.serviceManager = newServiceManager(c, c.overlay)\n\tc.statusReporterStruct.RegisterStatusReporter(\"Status\", c)\n\tfor name, inst := range protocols.instantiators {\n\t\tlog.Lvl4(\"Registering global protocol\", name)\n\t\tc.ProtocolRegister(name, inst)\n\t}\n\treturn c\n}", "title": "" }, { "docid": "c75be942e47f4c53e4a2c3ddbf017669", "score": "0.62473094", "text": "func NewServer(addr string, registry prometheus.Gatherer, secret *v1.Secret) (*Server, error) {\n\ts := Server{\n\t\tServer: &http.Server{\n\t\t\tAddr: addr,\n\t\t\tReadTimeout: 10 * time.Second,\n\t\t\tWriteTimeout: 10 * time.Second,\n\t\t},\n\t\tURL: fmt.Sprintf(\"http://%s/\", addr),\n\t\tRegistry: registry,\n\t}\n\t// Secrets are read from K8s API. If the secret for Prometheus is present\n\t// we configure Metrics Server with the key and cert.\n\tif secret != nil {\n\t\ttlsCert, err := makeCert(secret)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to create TLS cert: %w\", err)\n\t\t}\n\t\ts.Server.TLSConfig = &tls.Config{\n\t\t\tCertificates: []tls.Certificate{tlsCert},\n\t\t\tMinVersion: tls.VersionTLS12,\n\t\t}\n\t\ts.URL = fmt.Sprintf(\"https://%s/\", addr)\n\t}\n\treturn &s, nil\n}", "title": "" }, { "docid": "a046fd5fb1b0ae1a484be6bbe0360e95", "score": "0.6242472", "text": "func NewServer(id byte, transport Transport, regs *Regs, debug int) *Server {\n\treturn &Server{\n\t\tid: id,\n\t\ttransport: transport,\n\t\tregs: regs,\n\t\tchDone: make(chan bool),\n\t\tdebug: debug,\n\t}\n}", "title": "" }, { "docid": "86d547ab3dfd27de5d7bbc75a1049b7b", "score": "0.6220888", "text": "func NewServer() Server {\n\treturn &server{make(boolChan, 1), 0, DefaultResolver, DefaultLogger, DefaultRuler}\n}", "title": "" }, { "docid": "bfb6be1f3ff6a86a11d014eebcf2e625", "score": "0.6196203", "text": "func newServer(name, desc string, cfg *GlobalConfig) *Server {\n\treturn &Server{\n\t\tName: name,\n\t\tDescription: desc,\n\t\tServerConfig: cfg,\n\t}\n}", "title": "" }, { "docid": "423595f73d7a6a9f55a77350c32757b4", "score": "0.6189727", "text": "func NewServer(store *store.MemoryStore, raft *raft.Node, securityConfig *ca.SecurityConfig, pg plugingetter.PluginGetter, dr *drivers.DriverProvider) *Server {\n\treturn &Server{\n\t\tstore: store,\n\t\tdr: dr,\n\t\traft: raft,\n\t\tsecurityConfig: securityConfig,\n\t\tpg: pg,\n\t}\n}", "title": "" }, { "docid": "a5387c5763a478d791c2605911dea787", "score": "0.61608285", "text": "func NewServer(addr string, rpcHandler RPCHandler) (*Server, error) {\n\treturn &Server{\n\t\taddr: addr,\n\t\trpcHandler: rpcHandler,\n\t}, nil\n}", "title": "" }, { "docid": "2ba420a3942da525544c3b8738889213", "score": "0.61394936", "text": "func NewServer() *Server {\n\tvar S Server\n\treturn &S\n}", "title": "" }, { "docid": "63e94570a0056fd3d696c7c5fad0925c", "score": "0.6123239", "text": "func NewServer() *Server {\n\treturn &Server{serviceMap: make(map[string]*service)}\n}", "title": "" }, { "docid": "63e94570a0056fd3d696c7c5fad0925c", "score": "0.6123239", "text": "func NewServer() *Server {\n\treturn &Server{serviceMap: make(map[string]*service)}\n}", "title": "" }, { "docid": "31e82a85cf990d86c673841376225568", "score": "0.6119403", "text": "func NewServer(infoLog *log.Logger, errorLog *log.Logger) *ServerType {\r\n\tnewMap := make(map[int]types.IDData)\r\n\treturn &ServerType{\r\n\t\tIDMap: newMap,\r\n\t\tshutdown: false,\r\n\t\tinfoLog: infoLog,\r\n\t\terrorLog: errorLog,\r\n\t}\r\n}", "title": "" }, { "docid": "5981107a0e0ae7f0625686991d30644c", "score": "0.61185443", "text": "func NewServer(a string, p uint16) *Server {\n\ts := &Server{\n\t\tAddress: a,\n\t\tPort: p,\n\t}\n\treturn s\n}", "title": "" }, { "docid": "eb372ecf388bad790ef8105ff380385e", "score": "0.61079425", "text": "func NewServer(args PilotArgs) (*Server, error) {\n\t// If the namespace isn't set, try looking it up from the environment.\n\n\tif args.Config.ClusterRegistriesNamespace == \"\" {\n\t\tif args.Namespace != \"\" {\n\t\t\targs.Config.ClusterRegistriesNamespace = args.Namespace\n\t\t} else {\n\t\t\targs.Config.ClusterRegistriesNamespace = \"default\"\n\t\t}\n\t}\n\n\ts := &Server{}\n\n\t// Apply the arguments to the configuration.\n\tif err := s.initKubeClient(&args); err != nil {\n\t\treturn nil, fmt.Errorf(\"local kube client: %v\", err)\n\t}\n\n\tif err := s.initRemoteClient(&args); err != nil {\n\t\treturn nil, fmt.Errorf(\"remote kube client: %v\", err)\n\t}\n\n\tcontroller := newController(s.kubeClient, \"default\", s.kubeconfig, s.remoteKubeClient, s.remoteKubeconfig)\n\tstopCh := make(chan struct{})\n\tgo controller.Run(stopCh)\n\ttime.Sleep(300 * time.Second)\n\treturn s, nil\n}", "title": "" }, { "docid": "de81da25a3f16822fb8f0168eadf6bc6", "score": "0.6105142", "text": "func newRegistrationServer(driverName string, endpoint string, versions []string) registerapi.RegistrationServer {\n\treturn &registrationServer{\n\t\tdriverName: driverName,\n\t\tendpoint: endpoint,\n\t\tversion: versions,\n\t}\n}", "title": "" }, { "docid": "b0d65184e1512a211152fb66d1763467", "score": "0.6085097", "text": "func NewServer(commands map[int32]Handler, cfg *ServerConfig) *Server {\n\treturn &Server{hs: commands, cf: cfg.norm()}\n}", "title": "" }, { "docid": "3ed6d060034d3d603da82a6eb2b64755", "score": "0.6078823", "text": "func NewServer(ctx context.Context, core core.Core, nickServerAddress string) (*Server, error) {\n\tdictionary, err := loadDictionary()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"could not load the dictionary\")\n\t}\n\n\thumanizer, err := humanizer.New(ctx, core.Identity(), nickServerAddress, dictionary)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"could not create the humanizer\")\n\t}\n\n\trv := &Server{\n\t\tcore: core,\n\t\thumanizer: humanizer,\n\t}\n\treturn rv, nil\n}", "title": "" }, { "docid": "fb7a5c1c720fbae74b4cc79e4ca0a5f0", "score": "0.6076739", "text": "func NewServer(\n\tname string,\n\tdescription string,\n\thost string,\n\tport string,\n\tlogger Logger,\n) (*Server, error) {\n\n\t// Retrieve the bootstrap nodes\n\tbootstrapNodes, err := bootstrapGossipNodes()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tserver := &Server{\n\t\tName: name,\n\t\tDescription: description,\n\t\tLogger: logger,\n\t\tHost: host,\n\t\tPort: port,\n\n\t\t// @TODO(mark): Make flag/config based or modifable\n\t\tworkersPerHandler: 5,\n\n\t\thandlers: make(map[*RequestHandler]struct{}, 100),\n\t\tnodes: bootstrapNodes,\n\t\tmessagesSeen: make(map[string]struct{}, 1000),\n\t\tterminate: make(chan struct{}, 1),\n\t\tincomingMessage: make(chan *envelope.Envelope, 5),\n\t}\n\n\tfor _, handler := range defaultHandlers {\n\t\tserver.Handle(handler.Matcher, handler.HandlerFunc)\n\t}\n\n\tserver.setupSignals()\n\n\treturn server, nil\n}", "title": "" }, { "docid": "b7359d0ebc9f50dc124d7f4e83bdf5a7", "score": "0.6074008", "text": "func NewServer(conf *Config) *Server {\n s := &Server{\n config: conf,\n conns: NewConnMap(),\n secert: conf.Secert,\n lock: &sync.RWMutex{},\n epoller: make([]*epoll, 0),\n timerWheel: timingwheel.NewTimingWheel(time.Millisecond, 64),\n }\n s.ctx, s.cancel = context.WithCancel(conf.Ctx)\n s.SetName(fmt.Sprint(s))\n go s.timerWheel.Start()\n return s\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "96944a9f8a84858c9c4aac34f0a09730", "score": "0.6070205", "text": "func NewServer() *Server {\n\treturn &Server{}\n}", "title": "" }, { "docid": "a8f6f9f33d2c247a202e265b03f6a41b", "score": "0.6068875", "text": "func NewServer(addr string, darkSky *astidarksky.Client, redis *astiredis.Client) *Server {\n\treturn &Server{\n\t\taddr: addr,\n\t\tchannelQuit: make(chan bool),\n\t\tdarkSky: darkSky,\n\t\tredis: redis,\n\t}\n}", "title": "" }, { "docid": "cef037c19303cb5a5fcaeea628ddf47d", "score": "0.6066719", "text": "func NewServer() *Server {\n\treturn &Server{\n\t\tRunBehavior: defaultRunBehavior,\n\t}\n}", "title": "" }, { "docid": "acaf448323ea4c57ed6e44d8016a64ee", "score": "0.60610324", "text": "func NewServer(t mockConstructorTestingTNewServer) *Server {\n\tmock := &Server{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "5accc71bad02e5dad46026375af85177", "score": "0.6057048", "text": "func newServer(c *ServerConfig) (*server, error) {\n\ts := &server{\n\t\tconfig: c,\n\n\t\tresult: make(chan *Token, 1),\n\t\terr: make(chan error, 1),\n\t}\n\n\terr := c.Validate()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"could not validate new server\")\n\t}\n\n\terr = s.bind(c)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"could not open a port\")\n\t}\n\n\treturn s, nil\n}", "title": "" }, { "docid": "00605f45320346e57cbec86d6fb7c869", "score": "0.6054882", "text": "func NewServer(cfg *Config) *Server {\n\tserver := Server{\n\t\tcfg: cfg,\n\t\tworkerClients: make(map[string]workerrpc.Client),\n\t\ttaskWorkers: make(map[string][]string),\n\t\tlockKeeper: NewLockKeeper(),\n\t\tsqlOperatorHolder: operator.NewHolder(),\n\t\tidGen: tracing.NewIDGen(),\n\t\tap: NewAgentPool(&RateLimitConfig{rate: cfg.RPCRateLimit, burst: cfg.RPCRateBurst}),\n\t}\n\tserver.closed.Set(true)\n\n\treturn &server\n}", "title": "" }, { "docid": "e52b1783df27a33e1bb04c841d640a3f", "score": "0.6054068", "text": "func NewServer(listenAddr, domain string, globalShutdown chan bool, ds DataStore) *Server {\n\treturn &Server{\n\t\tlistenAddr: listenAddr,\n\t\tdomain: domain,\n\t\tmaxRecips: 50,\n\t\tmaxIdleSeconds: 600,\n\t\tmaxMessageBytes: 1024 * 1024 * 4,\n\t\tglobalShutdown: globalShutdown,\n\t\tdataStore: ds,\n\t\twaitgroup: new(sync.WaitGroup),\n\t}\n}", "title": "" }, { "docid": "6b9c957f262acc0ed97f6575f347591f", "score": "0.60539395", "text": "func NewServer(handlers ...Handler) *Server {\n\treturn &Server{\n\t\thandlers: handlers,\n\t\tlog: zap.S().Named(\"server\"),\n\t}\n}", "title": "" }, { "docid": "e9d19a391a8fca848beb8621d3586b05", "score": "0.60499305", "text": "func NewServer(quickTestService rona.QuickTestService) (*Server, error) {\n\ts := &Server{\n\t\tQuickTestService: quickTestService,\n\t}\n\trouter := chi.NewRouter()\n\n\trouter.Use(middleware.RequestID)\n\trouter.Use(middleware.RealIP)\n\trouter.Use(middleware.Logger)\n\trouter.Use(middleware.Recoverer)\n\n\trouter.Use(middleware.Timeout(30 * time.Second))\n\n\trouter.Route(\"/tests\", func(r chi.Router) {\n\t\tr.Get(\"/\", s.showTestForm)\n\t\tr.Post(\"/\", s.createTest)\n\t\tr.Get(\"/{testID}\", s.getTest)\n\t})\n\n\ttc, err := NewTemplateCache()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ts.Router = router\n\ts.TC = tc\n\n\treturn s, nil\n}", "title": "" }, { "docid": "8037d04ff15df07aecc9ea7cc9e8236d", "score": "0.6049349", "text": "func NewServer(port uint16) *Server {\n\treturn &Server{\n\t\tport: uint16(port),\n\t\tdevices: make(map[string]Device),\n\t\tnotify: make(chan struct{}, 10),\n\t\tlisteners: make([]chan bool, 0),\n\t\tlog: Log.New(\"obj\", \"example_server\", \"id\", logext.RandId(8)),\n\t\tstop: make(chan struct{}),\n\t}\n}", "title": "" }, { "docid": "ac906abb1b060fc1db2d93a66613c724", "score": "0.60460186", "text": "func NewServer() *Server {\n\treturn &Server{\n\t\tdone: make(chan struct{}),\n\t}\n}", "title": "" }, { "docid": "2ed9e769fe8d482ecdf2f62bf3481360", "score": "0.6044325", "text": "func NewServer(timeout time.Duration, signalChan chan os.Signal) Server {\n\treturn &serverImpl{\n\t\tstopChan: make(chan int, 1),\n\t\tsignalChan: signalChan,\n\t\tshutdown: false,\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "2ed9e769fe8d482ecdf2f62bf3481360", "score": "0.6044325", "text": "func NewServer(timeout time.Duration, signalChan chan os.Signal) Server {\n\treturn &serverImpl{\n\t\tstopChan: make(chan int, 1),\n\t\tsignalChan: signalChan,\n\t\tshutdown: false,\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "d81fa35a98536c05ac5040643a7efc1b", "score": "0.6039959", "text": "func NewServer() *Server {\n\treturn &Server{\n\t\trooms: make(map[string]*room),\n\t}\n}", "title": "" }, { "docid": "7ea3a472ad613130ad108f5b112b999d", "score": "0.6033589", "text": "func NewServer(addr string) *Server {\n\treturn &Server{\n\t\taddr: addr,\n\t\tapis: make([]*API, 0),\n\t\trouter: httprouter.New(),\n\t}\n}", "title": "" }, { "docid": "34ad3b4bc301d4e73fedc8b476ae2271", "score": "0.60245526", "text": "func NewServer(host, route string, headers map[string]string) *Server {\n\ts := &Server{\n\t\tHost: host,\n\t\tRoute: route,\n\t\tMethods: make(map[string]MethodWithContext),\n\t\tHeaders: headers,\n\t}\n\n\ts.Methods[\"jrpc2.register\"] = MethodWithContext{Method: s.RegisterRPC}\n\n\treturn s\n}", "title": "" }, { "docid": "059dd188eba2bc557fd5bb715b4aecbe", "score": "0.60245275", "text": "func NewServer() *Server {\n\ts := new(Server)\n\tlog.Info(\"server: create %d bucket for store sub channel\", Conf.Bucket)\n\ts.buckets = make([]*Bucket, Conf.Bucket)\n\tfor i := 0; i < Conf.Bucket; i++ {\n\t\ts.buckets[i] = NewBucket(Conf.Channel, Conf.CliProto, Conf.SvrProto)\n\t}\n\tlog.Info(\"server: create %d reader buffer pool\", Conf.ReadBuf)\n\ts.rPool = make([]*sync.Pool, Conf.ReadBuf)\n\tfor i := 0; i < Conf.ReadBuf; i++ {\n\t\ts.rPool[i] = new(sync.Pool)\n\t}\n\tlog.Info(\"server: create %d writer buffer pool\", Conf.WriteBuf)\n\ts.wPool = make([]*sync.Pool, Conf.WriteBuf)\n\tfor i := 0; i < Conf.WriteBuf; i++ {\n\t\ts.wPool[i] = new(sync.Pool)\n\t}\n\tlog.Info(\"server: create %d time\", Conf.Timer)\n\ts.timers = make([]*Timer, Conf.Timer)\n\tfor i := 0; i < Conf.Timer; i++ {\n\t\ts.timers[i] = NewTimer(Conf.TimerSize)\n\t}\n\tlog.Info(\"server: use default server codec\")\n\ts.codec = new(DefaultServerCodec)\n\treturn s\n}", "title": "" }, { "docid": "147fc2287fd5bdeb7a9fc58828b506b5", "score": "0.60224944", "text": "func NewServer(idx *indexer.Index, in chan *internal.ScrapeRequest, dir string, debug bool) (*Server, error) {\n\n\tsvr := &Server{\n\t\trouter: chi.NewRouter(),\n\t\tindex: idx,\n\t\tchannel: in,\n\t\ttemplateDir: dir,\n\t\tdebug: debug,\n\t}\n\tsvr.routes()\n\terr := svr.loadTemplates()\n\treturn svr, err\n\n}", "title": "" }, { "docid": "a040df7a055968928ca89341184326c4", "score": "0.60178393", "text": "func NewServer(port int, authenticator Authenticator,\n\tregistry Registry) *Server {\n\tmux := http.NewServeMux()\n\tserver := &Server{\n\t\thttp.Server{Addr: fmt.Sprintf(\"localhost:%d\", port), Handler: mux},\n\t\tregistry,\n\t\tauthenticator,\n\t}\n\tmux.HandleFunc(\"/register\", server.handleRegister)\n\tmux.HandleFunc(\"/deregister\", server.handleDeregister)\n\tmux.HandleFunc(\"/discover\", server.handleDiscover)\n\tmux.HandleFunc(\"/list\", server.handleList)\n\tmux.HandleFunc(\"/ping\", server.handlePing)\n\treturn server\n}", "title": "" }, { "docid": "137d6803eb72bc9f18717161557ed12f", "score": "0.6017751", "text": "func NewServer(remote remotes.Remote) api.RepositoryDiscoveryServer {\n\trepositoryStore := store.NewRepositoryStore()\n\n\tgo func() {\n\t\tload(remote, repositoryStore)\n\t\tfor range time.Tick(30 * time.Minute) {\n\t\t\tload(remote, repositoryStore)\n\t\t}\n\t}()\n\n\treturn &repositoryDiscoveryService{\n\t\trepositoryStore: repositoryStore,\n\t}\n}", "title": "" }, { "docid": "26889d2f10f2719b7fcf8c4b8d4ae8e6", "score": "0.60177267", "text": "func NewServer() *Server {\n\tserver := &Server{}\n\treturn server\n}", "title": "" }, { "docid": "de5230409815d330ee86d3cdf9151a93", "score": "0.60151714", "text": "func NewServer() (*Server, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "eeaf62cca2833364ce5e47ceacb83237", "score": "0.6014322", "text": "func NewServer(addr string) *Server {\n\treturn &Server{addr: addr, funcs: make(map[string]reflect.Value)}\n}", "title": "" }, { "docid": "4b41268184aec4144636932145f04fbd", "score": "0.6011563", "text": "func NewServer(config *Config, storage Storage) *Server {\n\treturn &Server{\n\t\tConfig: config,\n\t\tStorage: storage,\n\t\tAuthorizeTokenGen: &AuthorizeTokenGenDefault{},\n\t\tAccessTokenGen: &AccessTokenGenDefault{},\n\t\tNow: time.Now,\n\t}\n}", "title": "" }, { "docid": "91d45fb74d7a62e844ced6e90d401e7d", "score": "0.60099584", "text": "func NewServer() *Server {\n\ts := &Server{}\n\n\t// Allocate Modbus memory maps.\n\ts.DiscreteInputs = make([]byte, 65536)\n\ts.Coils = make([]byte, 65536)\n\ts.HoldingRegisters = make([]uint16, 65536)\n\ts.InputRegisters = make([]uint16, 65536)\n\n\t// Add default functions.\n\ts.function[1] = ReadCoils\n\ts.function[2] = ReadDiscreteInputs\n\ts.function[3] = ReadHoldingRegisters\n\ts.function[4] = ReadInputRegisters\n\ts.function[5] = WriteSingleCoil\n\ts.function[6] = WriteHoldingRegister\n\ts.function[15] = WriteMultipleCoils\n\ts.function[16] = WriteHoldingRegisters\n\n\ts.requestChan = make(chan *Request)\n\ts.portsCloseChan = make(chan struct{})\n\n\tgo s.handler()\n\n\treturn s\n}", "title": "" }, { "docid": "b87299d077a47d5de6499aa3cd5e1ce7", "score": "0.59954125", "text": "func NewServer(ctx *pulumi.Context,\n\tname string, args *ServerArgs, opts ...pulumi.ResourceOption) (*Server, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:dbformysql/v20210501preview:Server\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:dbformysql/v20200701preview:Server\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:dbformysql/v20200701preview:Server\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:dbformysql/v20200701privatepreview:Server\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:dbformysql/v20200701privatepreview:Server\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource Server\n\terr := ctx.RegisterResource(\"azure-native:dbformysql/v20210501preview:Server\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "c3f9c1ec4bb4c51d3d563a420395badf", "score": "0.59869754", "text": "func NewServer(host, port string) *Server {\n\n\ts := &Server{\n\t\thost: host,\n\t\tport: port,\n\t\trouter: mux.NewRouter(),\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "423efeee89ca23d1369588f13223c67c", "score": "0.5977494", "text": "func NewServer(address string) (S Server) {\n\treturn &server{\n\t\taddress: address,\n\t\thandlers: make(map[string]Handler),\n\t}\n}", "title": "" }, { "docid": "8aab588e36f2b678b588d615401322d0", "score": "0.5974433", "text": "func NewServer(ip, port string) *server {\n\treturn &server{\n\t\tip: ip,\n\t\tport: port,\n\t\tHub: hub.NewHub(),\n\t}\n}", "title": "" }, { "docid": "45bfd71b10f9d789a8f58c5934f33acf", "score": "0.5972914", "text": "func NewServer(handler *event.Handler) *Server {\n\treturn &Server{\n\t\thandler: handler,\n\t\tclients: make([]*Client, 32),\n\t}\n}", "title": "" }, { "docid": "ce939e5975bb57c469898ecbb26624f4", "score": "0.59679776", "text": "func NewServer() *Server {\n\treturn &Server{newHandler()}\n}", "title": "" }, { "docid": "0942f33b2936e5222f98915303defa6e", "score": "0.59679437", "text": "func newServer() *server {\n\tserver := server{\n\t\tchannels: make(map[string]*channel),\n\t\tsystemChannel: make(chan systemMessage),\n\t}\n\n\tserver.newChannel(\"general\")\n\n\treturn &server\n}", "title": "" }, { "docid": "94d81368979d90202b948ea3ccc404a4", "score": "0.59587795", "text": "func NewServer(c Config) Server {\n\treturn Server{c: c}\n}", "title": "" }, { "docid": "984a8ad4f420006313c34b2fa9bd5ef3", "score": "0.59535354", "text": "func NewServer(cfg *config.Config, tkr *tracker.Tracker) *Server {\n\treturn &Server{\n\t\tconfig: cfg,\n\t\ttracker: tkr,\n\t}\n}", "title": "" }, { "docid": "b73d1b99daec83bd28bbb182894010cd", "score": "0.5949704", "text": "func NewServer(syscall *bridge.SyscallService) *Server {\n\treturn &Server{\n\t\tmethods: parseMethods(syscall),\n\t\tsyscall: syscall,\n\t\tvsyscall: reflect.ValueOf(syscall),\n\t}\n}", "title": "" }, { "docid": "ff122c2512f3dd5eb8e217cd9389bf13", "score": "0.59496343", "text": "func NewServer() (*Server, error) {\n\ts := new(Server)\n\treturn s, nil\n}", "title": "" }, { "docid": "57d753095db9de2d4b78bb03a936e6f6", "score": "0.59449214", "text": "func New() *Server {\n\ts := Server{}\n\treturn &s\n}", "title": "" }, { "docid": "039b68d4d680fcc377f50717e7047f8e", "score": "0.5943332", "text": "func NewServer() *Server {\n\tconf := config.GetConfig()\n\treturn &Server{\n\t\tconf: conf,\n\t\tcastService: cast.NewService(),\n\t\tinfraService: infrared.NewService(conf),\n\t\trouter: mux.NewRouter(),\n\t}\n}", "title": "" }, { "docid": "46ffb9217ca65560020ba7d974ed0b5c", "score": "0.5934265", "text": "func NewServer(port int) *Server {\n\treturn &Server{\n\t\trouter: NewRouter(),\n\t\tport: \":\" + strconv.Itoa(port),\n\t}\n}", "title": "" }, { "docid": "873bbb6e5e10cb950e3a9d83d0105143", "score": "0.59328014", "text": "func NewServer() *Server {\n\treturn &Server{devs: make(map[uint8]Device), messages: make(chan *Message)}\n}", "title": "" }, { "docid": "9b93176fa3ef241eaa9b5f9056a3ac09", "score": "0.5930866", "text": "func NewServer(throttle int, period time.Duration, timeout time.Duration) *Server {\n\ts := &Server{\n\t\tthrottle: throttle,\n\t\tperiod: period,\n\t\ttimeout: timeout,\n\t\tsessions: make(map[SessionID]*freq),\n\t\tcurSessionID: 0,\n\t}\n\treturn s\n}", "title": "" }, { "docid": "09aa8031e5b9da3867acf7ce08cd74fe", "score": "0.59298235", "text": "func New() *Server {\n\treturn &Server{\n\t}\n}", "title": "" }, { "docid": "17a001f3c9380c7e9d719e9379986f50", "score": "0.5925723", "text": "func NewServer() (*server.Server, error) {\n\twire.Build(server.New)\n\treturn &server.Server{}, nil\n}", "title": "" }, { "docid": "e0a69cf668171dbd19cd8157e3b0c98c", "score": "0.59188646", "text": "func NewServer(c *Config) *Server {\n\ts := new(Server)\n\ts.Done = make(chan struct{})\n\ts.Setup(c)\n\treturn s\n}", "title": "" }, { "docid": "a8cd283e1be6325eded02f3af2119078", "score": "0.5917685", "text": "func NewServer(options ...ServerOptions) (*Server, error) {\n\t// Create default logger\n\tlogger, err := util.NewLogger(\"info\", serviceName)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to create Logger\")\n\t}\n\t// Sane defaults\n\trc, _ := NewRedisClient(\"redis://127.0.0.1:6380/0\")\n\n\ts := &Server{\n\t\taddress: \":8090\",\n\t\tendpoint: \"http://127.0.0.1:8091\",\n\t\titemService: \"http://127.0.0.1:8080\",\n\t\tredis: rc,\n\t\tlogger: logger,\n\t\trouter: util.NewRouter(),\n\t\tpromReg: prometheus.NewRegistry(),\n\t}\n\n\t// for _ ,fn := rane options {\n\t// \tif err := fn(s); err != nil {\n\t// \t\treturn nil, errors.Wrap(err, \"failed to set server options\")\n\t// \t}\n\t// }\n}", "title": "" }, { "docid": "829c6a20a0a187a32e527db32c9149f2", "score": "0.59176433", "text": "func NewServer(pattern string) *Server {\n\tlocations := []*Location{}\n\tclients := make(map[int]*Client)\n\taddCh := make(chan *Client)\n\tdelCh := make(chan *Client)\n\tsendAllCh := make(chan *Location)\n\tdoneCh := make(chan bool)\n\terrCh := make(chan error)\n\n\treturn &Server{\n\t\tpattern,\n\t\tlocations,\n\t\tclients,\n\t\taddCh,\n\t\tdelCh,\n\t\tsendAllCh,\n\t\tdoneCh,\n\t\terrCh,\n\t}\n}", "title": "" }, { "docid": "bc99e8fc9a55b4dde7ee18ea2da18c61", "score": "0.5917462", "text": "func NewServer(host string, port uint16) *Server {\n\ts := new(Server)\n\ts.Addr = fmt.Sprintf(\"%v:%v\", host, port)\n\ts.setupRoutes()\n\treturn s\n}", "title": "" }, { "docid": "0039ff4fd8d51f37aaa4b9e400d80ce9", "score": "0.5911677", "text": "func NewServer(host, port string) *Server {\n\treturn &Server{\n\t\tHost: host,\n\t\tPort: port,\n\t}\n}", "title": "" }, { "docid": "f893ea2e3b912b9a50af8c82e3b3f2b3", "score": "0.5900283", "text": "func NewServer(manager manager.BuildManager, secret string) Server {\n\tr := chi.NewRouter()\n\tr.Use(middleware.Recoverer)\n\tr.Use(middleware.NoCache)\n\tr.Use(authorization(secret))\n\tr.Post(\"/nodes/:machine\", HandleJoin())\n\tr.Delete(\"/nodes/:machine\", HandleLeave())\n\tr.Post(\"/ping\", HandlePing())\n\tr.Post(\"/stage\", HandleRequest(manager))\n\tr.Post(\"/stage/{stage}\", HandleAccept(manager))\n\tr.Get(\"/stage/{stage}\", HandleInfo(manager))\n\tr.Put(\"/stage/{stage}\", HandleUpdateStage(manager))\n\tr.Put(\"/step/{step}\", HandleUpdateStep(manager))\n\tr.Post(\"/build/{build}/watch\", HandleWatch(manager))\n\tr.Post(\"/step/{step}/logs/batch\", HandleLogBatch(manager))\n\tr.Post(\"/step/{step}/logs/upload\", HandleLogUpload(manager))\n\treturn Server(r)\n}", "title": "" }, { "docid": "a64c1bfe785333ea295562ebdc256bdb", "score": "0.58970064", "text": "func NewServer() *Server {\n\tn := network.NewNetStack()\n\tq := make(chan bool)\n\n\ts := Server{\n\t\tnetstack: n,\n\t\tquit: q,\n\t}\n\treturn &s\n}", "title": "" }, { "docid": "61261d82f6a9628713f41727594e1548", "score": "0.5896684", "text": "func NewServer(addr string) *Server {\n return nil\n}", "title": "" }, { "docid": "ac670a0a77051ddb79da4d36654fb9de", "score": "0.58966506", "text": "func NewServer(rabbitMQClient *rabbitmq.Client, chatroomDB *models.ChatroomDB,\n\tjwtSecret, botSymbol string, logger *log.Entry) *Server {\n\tif botSymbol == \"\" {\n\t\tbotSymbol = \"/\"\n\t}\n\n\treturn &Server{\n\t\trooms: make(map[uint]map[*WSClient]bool),\n\t\tregister: make(chan *Subscription),\n\t\tDeregister: make(chan *Subscription),\n\t\tbroadcast: make(chan MessagePayload),\n\t\trabbitMQClient: rabbitMQClient,\n\t\tchatroomDB: chatroomDB,\n\t\tjwtSecret: jwtSecret,\n\t\tbotSymbol: botSymbol,\n\t\tlogger: logger,\n\t}\n}", "title": "" }, { "docid": "f84104aec3fb854a6d2726e2d8aed594", "score": "0.5887837", "text": "func NewServer() *Server {\n\treturn &Server{\n\t\tstatus: serverStatusInit,\n\t\texitChan: make(chan struct{}),\n\t\tclients: make(map[string]*Client),\n\t\tmsgRouter: make(chan *msgRouter, DefaultMsgRouterLen),\n\t\tregister: make(chan *register, DefaultRegisterLen),\n\t\tunregister: make(chan *unregister, DefaultUnRegisterLen),\n\t\tretainedMsg: make(map[string]*packets.Publish),\n\t\tsubscriptionsDB: &subscriptionsDB{\n\t\t\ttopicsByName: make(map[string]map[string]packets.Topic),\n\t\t\ttopicsByID: make(map[string]map[string]packets.Topic),\n\t\t},\n\t\tconfig: &config{\n\t\t\tdeliveryRetryInterval: DefaultDeliveryRetryInterval,\n\t\t\tqueueQos0Messages: DefaultQueueQos0Messages,\n\t\t\tmaxInflightMessages: DefaultMaxInflightMessages,\n\t\t\tmaxQueueMessages: DefaultMaxQueueMessages,\n\t\t},\n\t\tMonitor: &Monitor{\n\t\t\tRepository: &MonitorStore{\n\t\t\t\tclients: make(map[string]ClientInfo),\n\t\t\t\tsessions: make(map[string]SessionInfo),\n\t\t\t\tsubscriptions: make(map[string]map[string]SubscriptionsInfo),\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "10f6991fec4e5400a2aa2f4f5064bbcc", "score": "0.58857864", "text": "func NewServer(logger *zap.Logger, source events.Source, address, certFile, keyFile string) *Hub {\n\treturn &Hub{\n\t\tlogger: logger,\n\t\tsource: source,\n\t\taddress: address,\n\t\tcertFile: certFile,\n\t\tkeyFile: keyFile,\n\t}\n}", "title": "" }, { "docid": "d3e33e3904cd7567ebff026c0c67f767", "score": "0.58806986", "text": "func NewServer(userRepo challenge.UserRepository, attestRepo challenge.AttestationRepository, signingKey string) Server {\n\trouter := mux.NewRouter()\n\treturn &server{\n\t\tr: router,\n\t\tusrRepo: userRepo,\n\t\tattestRepo: attestRepo,\n\t\tsigningKey: signingKey,\n\t}\n}", "title": "" }, { "docid": "84409f40f1abeb4b35866ed2490e14b6", "score": "0.5880642", "text": "func newServer(port int, handler http.Handler, timeout time.Duration, logger *log.Logger) *server {\n\treturn &server{\n\t\ts: &http.Server{\n\t\t\tAddr: fmt.Sprintf(\":%d\", port),\n\t\t\tHandler: handler,\n\t\t\tErrorLog: logger,\n\t\t},\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "72abbe0911a46d7a4dcd904fdadded0c", "score": "0.5880273", "text": "func NewServer(l net.Listener) (*Server, error) {\n\tkey, err := rsa.GenerateKey(rand.Reader, 1024)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to generate new RSA key\")\n\t}\n\n\tsigner, err := ssh.NewSignerFromKey(key)\n\tif err != nil {\n\t\terrors.Wrap(err, \"unable to convert RSA key to signer\")\n\t}\n\n\tattemptCh := make(chan *UsernamePasswordAttempt)\n\n\tconfig := &ssh.ServerConfig{\n\t\tPasswordCallback: handlePassword(attemptCh),\n\t\tMaxAuthTries: 100,\n\t}\n\tconfig.AddHostKey(signer)\n\n\treturn &Server{\n\t\tlistener: l,\n\t\tconfig: config,\n\t\tattemptCh: attemptCh,\n\t}, nil\n}", "title": "" }, { "docid": "7fcbb32fca6098badf293d8903446d1b", "score": "0.5878687", "text": "func NewServer(addr string) *Server {\n\n\tpsManager := PubSubManager{\n\t\tsubscribers: make(map[chan []byte]bool),\n\t\tcloseConn: make(chan chan []byte),\n\t\topenConn: make(chan chan []byte),\n\t}\n\n\tmux := http.NewServeMux()\n\tmux.Handle(\"/\", psManager)\n\n\treturn &Server{\n\t\tAddress: addr,\n\t\tMux: mux,\n\t}\n}", "title": "" }, { "docid": "79c7942e024e02b51457527eb68eda73", "score": "0.58785903", "text": "func NewServer(host string, port int, client *redis.Client) *Server {\n\taddress := host + \":\" + strconv.Itoa(port)\n\treturn &Server{address, client}\n}", "title": "" }, { "docid": "9d30d37fceb8f3411eaee13f1b08e935", "score": "0.58740956", "text": "func NewServer() Server {\n\trouter := gin.Default()\n\tstorage := storage.NewStorage()\n\n\ts := server{\n\t\t// storage: storage.NewStorage(),\n\t\tengine: router,\n\t}\n\n\tapiMW := router.Group(\"/api\")\n\n\tapiMW.GET(\"/rooms\", handlers.GetAllRooms(storage))\n\tapiMW.GET(\"/rooms/:roomid\", handlers.GetRoomByRoomID(storage))\n\tapiMW.POST(\"/rooms\", handlers.AddNewRoom(storage))\n\n\tapiMW.GET(\"/roomtypes\", handlers.GetAllRoomTypes(storage))\n\tapiMW.POST(\"/roomtypes\", handlers.AddNewRoomType(storage))\n\n\treturn &s\n}", "title": "" }, { "docid": "080eb0f3ddcab697be7b735b840628c8", "score": "0.587105", "text": "func Node_NewServer(s Node_Server, policy *server.Policy) *server.Server {\n\tc, _ := s.(server.Shutdowner)\n\treturn server.New(Node_Methods(nil, s), s, c, policy)\n}", "title": "" }, { "docid": "6e547651d154c56ef9bdd84457708ff4", "score": "0.5869874", "text": "func RwDirectory_NewServer(s RwDirectory_Server, policy *server.Policy) *server.Server {\n\tc, _ := s.(server.Shutdowner)\n\treturn server.New(RwDirectory_Methods(nil, s), s, c, policy)\n}", "title": "" }, { "docid": "e42e28f7b4a543f328646aff608bd493", "score": "0.5865624", "text": "func NewServer(registrar tchannel.Registrar) *Server {\n\tmetaHandler := newMetaHandler()\n\tserver := &Server{\n\t\tch: registrar,\n\t\tlog: registrar.Logger(),\n\t\thandlers: make(map[string]handler),\n\t\tmetaHandler: metaHandler,\n\t\tctxFn: defaultContextFn,\n\t}\n\tserver.Register(newTChanMetaServer(metaHandler))\n\tif ch, ok := registrar.(*tchannel.Channel); ok {\n\t\t// Register the meta endpoints on the \"tchannel\" service name.\n\t\tNewServer(ch.GetSubChannel(\"tchannel\"))\n\t}\n\treturn server\n}", "title": "" }, { "docid": "b6343157416ebf3ccc95a251262410f6", "score": "0.5864787", "text": "func NewServer() *httptest.Server {\n\treturn httptest.NewServer(\n\t\thttp.HandlerFunc(router),\n\t)\n}", "title": "" }, { "docid": "04d60245b447ecfe079ebb3eb410f08d", "score": "0.5863977", "text": "func New(cfg Config) *Server {\n\treturn &Server{\n\t\tnodeName: cfg.NodeName,\n\t\tnamespace: cfg.Namespace,\n\t\tk8sClient: cfg.Client,\n\t\tresourceManager: cfg.ResourceManager,\n\t\tprovider: cfg.Provider,\n\t\tpodSyncWorkers: cfg.PodSyncWorkers,\n\t\tpodInformer: cfg.PodInformer,\n\t\treadyCh: make(chan struct{}),\n\t}\n}", "title": "" }, { "docid": "204f88a568d4e2a327b7da42f71edb97", "score": "0.5860518", "text": "func NewServer(m *sync.Mutex, sc *ServiceCollection) *Server {\n\treturn &Server{\n\t\trouter: http.NewServeMux(),\n\t\tmutex: m,\n\t\tservices: sc,\n\t}\n}", "title": "" }, { "docid": "9493d172f961ff3fb6f9afae799d73eb", "score": "0.58597565", "text": "func NewServer(options ...func(s *Server) error) (*Server, error) {\n\tr := chi.NewRouter()\n\tr.Use(\n\t\trender.SetContentType(render.ContentTypeJSON),\n\t\tmiddleware.Logger,\n\t\tmiddleware.RedirectSlashes,\n\t\tmiddleware.Recoverer,\n\t)\n\n\ts := &Server{\n\t\tRouter: r,\n\t\tnatsTimeout: 100 * time.Millisecond,\n\t}\n\ts.routesHandler = s\n\n\tfor _, o := range options {\n\t\tif err := o(s); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif err := s.routes(s.Router); err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to install routes\")\n\t}\n\n\treturn s, nil\n}", "title": "" } ]
ef5f0ff5b90d4a3d81c125d0a6396ccd
expandDashboardWidgetXyChartDataSetsTimeSeriesQueryMap expands the contents of DashboardWidgetXyChartDataSetsTimeSeriesQuery into a JSON request object.
[ { "docid": "af94afc654f775ce7d332b497bacb1a7", "score": "0.79664344", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQuery) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQuery(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" } ]
[ { "docid": "8b01118282fea8027a6f843362cc411f", "score": "0.8219895", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQuery(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQuery) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter(c, f.TimeSeriesFilter); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding TimeSeriesFilter into timeSeriesFilter: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"timeSeriesFilter\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio(c, f.TimeSeriesFilterRatio); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding TimeSeriesFilterRatio into timeSeriesFilterRatio: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"timeSeriesFilterRatio\"] = v\n\t}\n\tif v := f.TimeSeriesQueryLanguage; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"timeSeriesQueryLanguage\"] = v\n\t}\n\tif v := f.ApiSource; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"apiSource\"] = v\n\t}\n\tif v := f.UnitOverride; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"unitOverride\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "54b13756522e54e959d8a9a496f912ef", "score": "0.78959507", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQuery(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQuery {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQuery{}\n\tr.TimeSeriesFilter = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter(c, m[\"timeSeriesFilter\"])\n\tr.TimeSeriesFilterRatio = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio(c, m[\"timeSeriesFilterRatio\"])\n\tr.TimeSeriesQueryLanguage = dcl.FlattenString(m[\"timeSeriesQueryLanguage\"])\n\tr.ApiSource = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryApiSourceEnum(m[\"apiSource\"])\n\tr.UnitOverride = dcl.FlattenString(m[\"unitOverride\"])\n\n\treturn r\n}", "title": "" }, { "docid": "cbd60fe1da0a9b9e7c1dd758ae5b6818", "score": "0.77691054", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.Filter; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"filter\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation(c, f.Aggregation); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Aggregation into aggregation: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"aggregation\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c, f.SecondaryAggregation); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding SecondaryAggregation into secondaryAggregation: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"secondaryAggregation\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c, f.PickTimeSeriesFilter); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding PickTimeSeriesFilter into pickTimeSeriesFilter: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"pickTimeSeriesFilter\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "96d3498521caf371c3c2917d20875ec3", "score": "0.7690381", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "3da28ad850ec4401abf235bfd7f854c4", "score": "0.76201934", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQuerySlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQuery) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQuery(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "f61c9eaff77b78bc5b2b142a2b984d28", "score": "0.7433929", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQuery {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQuery{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQuery{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQuery)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQuery(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "01dd7d80cc1671f2e39d8ca2db6b594d", "score": "0.74094856", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "90f4f924ca850a5cca236dd21a13da66", "score": "0.7356449", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.AlignmentPeriod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"alignmentPeriod\"] = v\n\t}\n\tif v := f.PerSeriesAligner; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"perSeriesAligner\"] = v\n\t}\n\tif v := f.CrossSeriesReducer; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"crossSeriesReducer\"] = v\n\t}\n\tif v := f.GroupByFields; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"groupByFields\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParams(c, f.ReduceFractionLessThanParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceFractionLessThanParams into reduceFractionLessThanParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceFractionLessThanParams\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams(c, f.ReduceMakeDistributionParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceMakeDistributionParams into reduceMakeDistributionParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceMakeDistributionParams\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "f293f5780fb80d77ad8ec25f78c1baee", "score": "0.72176826", "text": "func expandDashboardWidgetXyChartDataSets(c *Client, f *DashboardWidgetXyChartDataSets) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQuery(c, f.TimeSeriesQuery); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding TimeSeriesQuery into timeSeriesQuery: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"timeSeriesQuery\"] = v\n\t}\n\tif v := f.PlotType; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"plotType\"] = v\n\t}\n\tif v := f.LegendTemplate; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"legendTemplate\"] = v\n\t}\n\tif v := f.MinAlignmentPeriod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"minAlignmentPeriod\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "e3c1db0bb8b19abab1b272dc09669cb8", "score": "0.71966875", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilterMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "bf9eea00225d6df05335e0aa9be147ca", "score": "0.7154063", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "c35c04b139921a219cbc4916c68425be", "score": "0.71406835", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.RankingMethod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"rankingMethod\"] = v\n\t}\n\tif v := f.NumTimeSeries; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"numTimeSeries\"] = v\n\t}\n\tif v := f.Direction; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"direction\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "d2aee121132ac508babd43fafbc25742", "score": "0.7123588", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "60954359ba5b95fd0c7901e3ae9829f7", "score": "0.7074052", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter{}\n\tr.Filter = dcl.FlattenString(m[\"filter\"])\n\tr.Aggregation = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation(c, m[\"aggregation\"])\n\tr.SecondaryAggregation = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c, m[\"secondaryAggregation\"])\n\tr.PickTimeSeriesFilter = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c, m[\"pickTimeSeriesFilter\"])\n\n\treturn r\n}", "title": "" }, { "docid": "89b8e2c26a9f01052c41a7660d20c106", "score": "0.70630014", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "7707050fa7191240e64c98a19357ac31", "score": "0.70333284", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation{}\n\tr.AlignmentPeriod = dcl.FlattenString(m[\"alignmentPeriod\"])\n\tr.PerSeriesAligner = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationPerSeriesAlignerEnum(m[\"perSeriesAligner\"])\n\tr.CrossSeriesReducer = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationCrossSeriesReducerEnum(m[\"crossSeriesReducer\"])\n\tr.GroupByFields = dcl.FlattenStringSlice(m[\"groupByFields\"])\n\tr.ReduceFractionLessThanParams = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParams(c, m[\"reduceFractionLessThanParams\"])\n\tr.ReduceMakeDistributionParams = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams(c, m[\"reduceMakeDistributionParams\"])\n\n\treturn r\n}", "title": "" }, { "docid": "7f95704b937fb9192e11453245eaeacc", "score": "0.69816506", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator(c, f.Numerator); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Numerator into numerator: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"numerator\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator(c, f.Denominator); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Denominator into denominator: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"denominator\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation(c, f.SecondaryAggregation); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding SecondaryAggregation into secondaryAggregation: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"secondaryAggregation\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter(c, f.PickTimeSeriesFilter); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding PickTimeSeriesFilter into pickTimeSeriesFilter: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"pickTimeSeriesFilter\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "daae27db42dddef90a134833deb9fe69", "score": "0.6882361", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "08597c00f311f2a2406ea7306ede5678", "score": "0.6882068", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "dcebca74195acd6f83b090f43dc347b2", "score": "0.6766059", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilterMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "830ed498a514a34844f82fdd144ffd1e", "score": "0.67628103", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQuerySlice(c *Client, i interface{}) []DashboardWidgetXyChartDataSetsTimeSeriesQuery {\n\ta, ok := i.([]interface{})\n\tif !ok {\n\t\treturn []DashboardWidgetXyChartDataSetsTimeSeriesQuery{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn []DashboardWidgetXyChartDataSetsTimeSeriesQuery{}\n\t}\n\n\titems := make([]DashboardWidgetXyChartDataSetsTimeSeriesQuery, 0, len(a))\n\tfor _, item := range a {\n\t\titems = append(items, *flattenDashboardWidgetXyChartDataSetsTimeSeriesQuery(c, item.(map[string]interface{})))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "2986320eecf41dfef65b325cd30c8811", "score": "0.67552215", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryMap(c *Client, f map[string]DashboardWidgetScorecardTimeSeriesQuery) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetScorecardTimeSeriesQuery(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "986e3fe577d88ef1a139c67237991041", "score": "0.6751846", "text": "func expandDashboardWidgetScorecardTimeSeriesQuery(c *Client, f *DashboardWidgetScorecardTimeSeriesQuery) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter(c, f.TimeSeriesFilter); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding TimeSeriesFilter into timeSeriesFilter: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"timeSeriesFilter\"] = v\n\t}\n\tif v, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterRatio(c, f.TimeSeriesFilterRatio); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding TimeSeriesFilterRatio into timeSeriesFilterRatio: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"timeSeriesFilterRatio\"] = v\n\t}\n\tif v := f.TimeSeriesQueryLanguage; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"timeSeriesQueryLanguage\"] = v\n\t}\n\tif v := f.ApiSource; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"apiSource\"] = v\n\t}\n\tif v := f.UnitOverride; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"unitOverride\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "f42784c7d69d81c83d8d49a19684b299", "score": "0.6751771", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.RankingMethod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"rankingMethod\"] = v\n\t}\n\tif v := f.NumTimeSeries; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"numTimeSeries\"] = v\n\t}\n\tif v := f.Direction; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"direction\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "75dd75be4b825cdf1685b58ef883a76c", "score": "0.6713514", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.Filter; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"filter\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregation(c, f.Aggregation); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Aggregation into aggregation: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"aggregation\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "85dc396b479bd0d9a4ca3a3716ff2d1d", "score": "0.671129", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.AlignmentPeriod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"alignmentPeriod\"] = v\n\t}\n\tif v := f.PerSeriesAligner; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"perSeriesAligner\"] = v\n\t}\n\tif v := f.CrossSeriesReducer; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"crossSeriesReducer\"] = v\n\t}\n\tif v := f.GroupByFields; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"groupByFields\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceFractionLessThanParams(c, f.ReduceFractionLessThanParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceFractionLessThanParams into reduceFractionLessThanParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceFractionLessThanParams\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParams(c, f.ReduceMakeDistributionParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceMakeDistributionParams into reduceMakeDistributionParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceMakeDistributionParams\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "5e292bd6b7758a5a230ac9015f359742", "score": "0.66687214", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "c8dbcbebbf6def8af58e33c203e2caff", "score": "0.66650265", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "48935795c341e6306ff57473ddbe5fb4", "score": "0.6625322", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterMap(c *Client, f map[string]DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "80236b722564836fc15424caf7be8a5c", "score": "0.66140413", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "c8fec4eac7f62687175ec9eb1881292c", "score": "0.6606335", "text": "func flattenDashboardWidgetScorecardTimeSeriesQuery(c *Client, i interface{}) *DashboardWidgetScorecardTimeSeriesQuery {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetScorecardTimeSeriesQuery{}\n\tr.TimeSeriesFilter = flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter(c, m[\"timeSeriesFilter\"])\n\tr.TimeSeriesFilterRatio = flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterRatio(c, m[\"timeSeriesFilterRatio\"])\n\tr.TimeSeriesQueryLanguage = dcl.FlattenString(m[\"timeSeriesQueryLanguage\"])\n\tr.ApiSource = flattenDashboardWidgetScorecardTimeSeriesQueryApiSourceEnum(m[\"apiSource\"])\n\tr.UnitOverride = dcl.FlattenString(m[\"unitOverride\"])\n\n\treturn r\n}", "title": "" }, { "docid": "5b17ad0796242d9dc3f425f41cd39d45", "score": "0.6588533", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "a7b1b1d98c6d135f5e98e0200e398160", "score": "0.65673614", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter(c *Client, f *DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.Filter; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"filter\"] = v\n\t}\n\tif v, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation(c, f.Aggregation); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Aggregation into aggregation: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"aggregation\"] = v\n\t}\n\tif v, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c, f.SecondaryAggregation); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding SecondaryAggregation into secondaryAggregation: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"secondaryAggregation\"] = v\n\t}\n\tif v, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c, f.PickTimeSeriesFilter); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding PickTimeSeriesFilter into pickTimeSeriesFilter: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"pickTimeSeriesFilter\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "92a4ae105fee9e859e465ecf213b7e06", "score": "0.65547144", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "86987db2c8b50f6b21fa6bcd6037e823", "score": "0.6546944", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "83652f9993311320df429fa15040b1b2", "score": "0.65244395", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "87e2026033ba83ab17a105562afa2ed8", "score": "0.647253", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilterSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "5d9d49aef8362ce8cdb391f49f0e6828", "score": "0.64547884", "text": "func flattenDashboardWidgetXyChartDataSets(c *Client, i interface{}) *DashboardWidgetXyChartDataSets {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSets{}\n\tr.TimeSeriesQuery = flattenDashboardWidgetXyChartDataSetsTimeSeriesQuery(c, m[\"timeSeriesQuery\"])\n\tr.PlotType = flattenDashboardWidgetXyChartDataSetsPlotTypeEnum(m[\"plotType\"])\n\tr.LegendTemplate = dcl.FlattenString(m[\"legendTemplate\"])\n\tr.MinAlignmentPeriod = dcl.FlattenString(m[\"minAlignmentPeriod\"])\n\n\treturn r\n}", "title": "" }, { "docid": "8eec0c4467bd0983aaf466f6a527455d", "score": "0.6425213", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "468f1fe22e6421efbe64dbc49a993bca", "score": "0.64197886", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.Filter; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"filter\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation(c, f.Aggregation); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Aggregation into aggregation: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"aggregation\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "6ae843eed608960d959a6f6f9380216a", "score": "0.6413461", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "381fb929da8df15aae60401642fe9eec", "score": "0.6392331", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilterMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "8a9d9f98a45c0f2dbfdb44199e1d14a6", "score": "0.6386602", "text": "func expandDashboardWidgetXyChartDataSetsMap(c *Client, f map[string]DashboardWidgetXyChartDataSets) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSets(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "8fc07f6b771f6c74431048a264431277", "score": "0.63701093", "text": "func expandDashboardWidgetScorecardTimeSeriesQuerySlice(c *Client, f []DashboardWidgetScorecardTimeSeriesQuery) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetScorecardTimeSeriesQuery(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "1ef1a8899e81e90cec2a43b4bdc1b013", "score": "0.6342838", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatio{}\n\tr.Numerator = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator(c, m[\"numerator\"])\n\tr.Denominator = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator(c, m[\"denominator\"])\n\tr.SecondaryAggregation = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation(c, m[\"secondaryAggregation\"])\n\tr.PickTimeSeriesFilter = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter(c, m[\"pickTimeSeriesFilter\"])\n\n\treturn r\n}", "title": "" }, { "docid": "3d4080e1945c6cab29dc3b4c81fbaf5e", "score": "0.6341991", "text": "func flattenDashboardWidgetScorecardTimeSeriesQueryMap(c *Client, i interface{}) map[string]DashboardWidgetScorecardTimeSeriesQuery {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetScorecardTimeSeriesQuery{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetScorecardTimeSeriesQuery{}\n\t}\n\n\titems := make(map[string]DashboardWidgetScorecardTimeSeriesQuery)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetScorecardTimeSeriesQuery(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "08298d7b8d6d87f5b81d618ec411af13", "score": "0.6333927", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregationMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregation) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "3cbcf17371a35c583341cf44f927d559", "score": "0.63027036", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.AlignmentPeriod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"alignmentPeriod\"] = v\n\t}\n\tif v := f.PerSeriesAligner; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"perSeriesAligner\"] = v\n\t}\n\tif v := f.CrossSeriesReducer; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"crossSeriesReducer\"] = v\n\t}\n\tif v := f.GroupByFields; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"groupByFields\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceFractionLessThanParams(c, f.ReduceFractionLessThanParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceFractionLessThanParams into reduceFractionLessThanParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceFractionLessThanParams\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceMakeDistributionParams(c, f.ReduceMakeDistributionParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceMakeDistributionParams into reduceMakeDistributionParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceMakeDistributionParams\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "4ed7bf664aac186654cbafc0c1b5f3be", "score": "0.62937653", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregationMap(c *Client, f map[string]DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "12a272bc5ec8875b95f036c1d4114667", "score": "0.6272974", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "1c727c723d82e20afc2f8aad8030c713", "score": "0.6263098", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation{}\n\tr.AlignmentPeriod = dcl.FlattenString(m[\"alignmentPeriod\"])\n\tr.PerSeriesAligner = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationPerSeriesAlignerEnum(m[\"perSeriesAligner\"])\n\tr.CrossSeriesReducer = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationCrossSeriesReducerEnum(m[\"crossSeriesReducer\"])\n\tr.GroupByFields = dcl.FlattenStringSlice(m[\"groupByFields\"])\n\tr.ReduceFractionLessThanParams = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceFractionLessThanParams(c, m[\"reduceFractionLessThanParams\"])\n\tr.ReduceMakeDistributionParams = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParams(c, m[\"reduceMakeDistributionParams\"])\n\n\treturn r\n}", "title": "" }, { "docid": "91e13a5774cd134c814474453ea33a6a", "score": "0.62598974", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParamsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParams) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "86061890f6cc61067ede26a82496ac3b", "score": "0.6247912", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceFractionLessThanParamsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceFractionLessThanParams) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceFractionLessThanParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "9727a50fcd37e73d796a608af1226aa2", "score": "0.62424386", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParamsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParams) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "f6a30795db45a9df9813277d651e54b1", "score": "0.6234472", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilterMap(c *Client, f map[string]DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "94144ed18b883fcf5fc3a10d1d134246", "score": "0.62296695", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter{}\n\tr.RankingMethod = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilterRankingMethodEnum(m[\"rankingMethod\"])\n\tr.NumTimeSeries = dcl.FlattenInteger(m[\"numTimeSeries\"])\n\tr.Direction = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilterDirectionEnum(m[\"direction\"])\n\n\treturn r\n}", "title": "" }, { "docid": "832d39432413faeccc79111674553b3d", "score": "0.6201913", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceFractionLessThanParamsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceFractionLessThanParams) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceFractionLessThanParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "391138d4fdb0bc7296d3a510880abbb8", "score": "0.6194348", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSlice(c *Client, i interface{}) []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter {\n\ta, ok := i.([]interface{})\n\tif !ok {\n\t\treturn []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter{}\n\t}\n\n\titems := make([]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter, 0, len(a))\n\tfor _, item := range a {\n\t\titems = append(items, *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilter(c, item.(map[string]interface{})))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "39c41171c1f4e8f93470a14cae714841", "score": "0.61902255", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "0aa1356b2c704bb67c81aca86dd773bc", "score": "0.6180324", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregation(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregation) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.AlignmentPeriod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"alignmentPeriod\"] = v\n\t}\n\tif v := f.PerSeriesAligner; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"perSeriesAligner\"] = v\n\t}\n\tif v := f.CrossSeriesReducer; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"crossSeriesReducer\"] = v\n\t}\n\tif v := f.GroupByFields; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"groupByFields\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregationReduceFractionLessThanParams(c, f.ReduceFractionLessThanParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceFractionLessThanParams into reduceFractionLessThanParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceFractionLessThanParams\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregationReduceMakeDistributionParams(c, f.ReduceMakeDistributionParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceMakeDistributionParams into reduceMakeDistributionParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceMakeDistributionParams\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "f92dc4b783c623d6c1aa09951fa1a79d", "score": "0.6162894", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilterMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "b5e709a8889c628fb30b426ee4292633", "score": "0.6161058", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "73543b67489ccb38cd091cdab2a660e6", "score": "0.6157929", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.AlignmentPeriod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"alignmentPeriod\"] = v\n\t}\n\tif v := f.PerSeriesAligner; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"perSeriesAligner\"] = v\n\t}\n\tif v := f.CrossSeriesReducer; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"crossSeriesReducer\"] = v\n\t}\n\tif v := f.GroupByFields; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"groupByFields\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceFractionLessThanParams(c, f.ReduceFractionLessThanParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceFractionLessThanParams into reduceFractionLessThanParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceFractionLessThanParams\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceMakeDistributionParams(c, f.ReduceMakeDistributionParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceMakeDistributionParams into reduceMakeDistributionParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceMakeDistributionParams\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "b366926bb1287865037b768b0c0e1927", "score": "0.6149348", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "7b84a3ff4441fe0bb39740de71f4573f", "score": "0.61136925", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationSlice(c *Client, i interface{}) []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation {\n\ta, ok := i.([]interface{})\n\tif !ok {\n\t\treturn []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation{}\n\t}\n\n\titems := make([]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation, 0, len(a))\n\tfor _, item := range a {\n\t\titems = append(items, *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregation(c, item.(map[string]interface{})))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "6fb3e60b57580ce541eb9bf830081ba4", "score": "0.6095922", "text": "func flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter(c *Client, i interface{}) *DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter{}\n\tr.Filter = dcl.FlattenString(m[\"filter\"])\n\tr.Aggregation = flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation(c, m[\"aggregation\"])\n\tr.SecondaryAggregation = flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c, m[\"secondaryAggregation\"])\n\tr.PickTimeSeriesFilter = flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c, m[\"pickTimeSeriesFilter\"])\n\n\treturn r\n}", "title": "" }, { "docid": "b66dc3deb75c8d8cf3ce927454e3df62", "score": "0.6065303", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceMakeDistributionParamsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceMakeDistributionParams) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceMakeDistributionParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "ff7a0ff44c19a225f5b1d207346fa21c", "score": "0.60642105", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter(c *Client, f *DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterPickTimeSeriesFilter) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.RankingMethod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"rankingMethod\"] = v\n\t}\n\tif v := f.NumTimeSeries; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"numTimeSeries\"] = v\n\t}\n\tif v := f.Direction; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"direction\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "0d0649365c83f9876f826550aa90ed8e", "score": "0.6062577", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceFractionLessThanParamsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceFractionLessThanParams) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceFractionLessThanParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "95b4b50d60ac2d2d4dc200427044b771", "score": "0.60502505", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterSlice(c *Client, f []DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "3158f39b620babab1af695e7a0d83a54", "score": "0.6049392", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilterSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "be0354973cfc43ddb99db75a771330c5", "score": "0.6041506", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation(c *Client, f *DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v := f.AlignmentPeriod; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"alignmentPeriod\"] = v\n\t}\n\tif v := f.PerSeriesAligner; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"perSeriesAligner\"] = v\n\t}\n\tif v := f.CrossSeriesReducer; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"crossSeriesReducer\"] = v\n\t}\n\tif v := f.GroupByFields; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"groupByFields\"] = v\n\t}\n\tif v, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParams(c, f.ReduceFractionLessThanParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceFractionLessThanParams into reduceFractionLessThanParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceFractionLessThanParams\"] = v\n\t}\n\tif v, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams(c, f.ReduceMakeDistributionParams); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ReduceMakeDistributionParams into reduceMakeDistributionParams: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"reduceMakeDistributionParams\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "cee8d17e41f4a43acd40f46862f08fcf", "score": "0.6010966", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsBucketOptions(c, f.BucketOptions); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding BucketOptions into bucketOptions: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"bucketOptions\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsExemplarSampling(c, f.ExemplarSampling); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ExemplarSampling into exemplarSampling: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"exemplarSampling\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "7cd872cf9ef2a51e9d292c88605c07a0", "score": "0.6005851", "text": "func expandDashboardWidgetXyChartDataSetsSlice(c *Client, f []DashboardWidgetXyChartDataSets) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSets(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "907d790c3aeb93b4b72ed0792de23f58", "score": "0.5976656", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterRatioMap(c *Client, f map[string]DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterRatio) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterRatio(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "0b343e39e2c5feb6fbdcb614a382d2a2", "score": "0.5968719", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceMakeDistributionParamsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceMakeDistributionParams) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceMakeDistributionParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "ba0323bf71fe7f0edd53c66507bcbedf", "score": "0.596737", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsBucketOptionsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsBucketOptions) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsBucketOptions(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "4a74a1f890c3f088a8b6921fd06a34ca", "score": "0.595179", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilter{}\n\tr.RankingMethod = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilterRankingMethodEnum(m[\"rankingMethod\"])\n\tr.NumTimeSeries = dcl.FlattenInteger(m[\"numTimeSeries\"])\n\tr.Direction = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioPickTimeSeriesFilterDirectionEnum(m[\"direction\"])\n\n\treturn r\n}", "title": "" }, { "docid": "fd5202fcb8342b7637d6bfd6b938bef3", "score": "0.5951056", "text": "func flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterMap(c *Client, i interface{}) map[string]DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter{}\n\t}\n\n\titems := make(map[string]DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilter(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "83f342d5142e1a97b18b10c58dc89052", "score": "0.59379596", "text": "func expandDashboardWidgetXyChart(c *Client, f *DashboardWidgetXyChart) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v, err := expandDashboardWidgetXyChartDataSetsSlice(c, f.DataSets); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding DataSets into dataSets: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"dataSets\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartSourceDrilldown(c, f.SourceDrilldown); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding SourceDrilldown into sourceDrilldown: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"sourceDrilldown\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartMetricDrilldown(c, f.MetricDrilldown); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding MetricDrilldown into metricDrilldown: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"metricDrilldown\"] = v\n\t}\n\tif v := f.TimeshiftDuration; !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"timeshiftDuration\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartThresholdsSlice(c, f.Thresholds); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Thresholds into thresholds: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"thresholds\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartXAxis(c, f.XAxis); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding XAxis into xAxis: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"xAxis\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartYAxis(c, f.YAxis); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding YAxis into yAxis: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"yAxis\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartChartOptions(c, f.ChartOptions); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ChartOptions into chartOptions: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"chartOptions\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "7519e1f26532db0ed9d65e85e6f869fb", "score": "0.5919056", "text": "func flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation(c *Client, i interface{}) *DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation{}\n\tr.AlignmentPeriod = dcl.FlattenString(m[\"alignmentPeriod\"])\n\tr.PerSeriesAligner = flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregationPerSeriesAlignerEnum(m[\"perSeriesAligner\"])\n\tr.CrossSeriesReducer = flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregationCrossSeriesReducerEnum(m[\"crossSeriesReducer\"])\n\tr.GroupByFields = dcl.FlattenStringSlice(m[\"groupByFields\"])\n\tr.ReduceFractionLessThanParams = flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParams(c, m[\"reduceFractionLessThanParams\"])\n\tr.ReduceMakeDistributionParams = flattenDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams(c, m[\"reduceMakeDistributionParams\"])\n\n\treturn r\n}", "title": "" }, { "docid": "e5433d937210491c787fb459da2eeaa7", "score": "0.59162295", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregationSlice(c *Client, f []DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "d60359a365ed2b0dcca8bebb6b51178a", "score": "0.59086627", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "c9890e7d153f343e6f9b6f6e963b5be8", "score": "0.5907616", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregation{}\n\tr.AlignmentPeriod = dcl.FlattenString(m[\"alignmentPeriod\"])\n\tr.PerSeriesAligner = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationPerSeriesAlignerEnum(m[\"perSeriesAligner\"])\n\tr.CrossSeriesReducer = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationCrossSeriesReducerEnum(m[\"crossSeriesReducer\"])\n\tr.GroupByFields = dcl.FlattenStringSlice(m[\"groupByFields\"])\n\tr.ReduceFractionLessThanParams = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceFractionLessThanParams(c, m[\"reduceFractionLessThanParams\"])\n\tr.ReduceMakeDistributionParams = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioSecondaryAggregationReduceMakeDistributionParams(c, m[\"reduceMakeDistributionParams\"])\n\n\treturn r\n}", "title": "" }, { "docid": "e07d89eba1f64326f77c4a8f829969a7", "score": "0.5883759", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "00b062f20ed5770e1465727eb1b07246", "score": "0.5871071", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "d909283c0d619af440b4546ad5ff064b", "score": "0.5870469", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregationSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregation) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "924e2dd5ad9990fb73e0b04d178a3b76", "score": "0.58564085", "text": "func expandDashboardWidgetXyChartXAxisMap(c *Client, f map[string]DashboardWidgetXyChartXAxis) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartXAxis(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "b69d493550c83a77743b4c755b908a35", "score": "0.5848294", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParamsBucketOptionsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParamsBucketOptions) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParamsBucketOptions(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "089cca0d5af6a668f74fe07cf2593e2a", "score": "0.5845294", "text": "func expandDashboardWidgetXyChartMap(c *Client, f map[string]DashboardWidgetXyChart) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChart(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "6e15a0f2f627abe88b61b1abc5a04b36", "score": "0.58417386", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominator(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "ace51205e3fbb552ab8312db422aba43", "score": "0.582506", "text": "func flattenDashboardWidgetXyChartDataSetsMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSets {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSets{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSets{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSets)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSets(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "f399cbab4bbb819785e5f80c0f6b5b0d", "score": "0.5819313", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParams(c *Client, f *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParams) (map[string]interface{}, error) {\n\tif dcl.IsEmptyValueIndirect(f) {\n\t\treturn nil, nil\n\t}\n\n\tm := make(map[string]interface{})\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParamsBucketOptions(c, f.BucketOptions); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding BucketOptions into bucketOptions: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"bucketOptions\"] = v\n\t}\n\tif v, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterSecondaryAggregationReduceMakeDistributionParamsExemplarSampling(c, f.ExemplarSampling); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding ExemplarSampling into exemplarSampling: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"exemplarSampling\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "f7a200614f4f21ce658f9bdadf9890ef", "score": "0.5816844", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation{}\n\tr.AlignmentPeriod = dcl.FlattenString(m[\"alignmentPeriod\"])\n\tr.PerSeriesAligner = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationPerSeriesAlignerEnum(m[\"perSeriesAligner\"])\n\tr.CrossSeriesReducer = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationCrossSeriesReducerEnum(m[\"crossSeriesReducer\"])\n\tr.GroupByFields = dcl.FlattenStringSlice(m[\"groupByFields\"])\n\tr.ReduceFractionLessThanParams = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceFractionLessThanParams(c, m[\"reduceFractionLessThanParams\"])\n\tr.ReduceMakeDistributionParams = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationReduceMakeDistributionParams(c, m[\"reduceMakeDistributionParams\"])\n\n\treturn r\n}", "title": "" }, { "docid": "a4c80a51c1f5eed56af1487524cad2b1", "score": "0.58061075", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsExemplarSamplingMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsExemplarSampling) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceMakeDistributionParamsExemplarSampling(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "6d645df7f8c77f11e652e3da779c7d68", "score": "0.57977456", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParamsSlice(c *Client, f []DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParams) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterAggregationReduceFractionLessThanParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "b4b1cf82c018ef684dbd50e6984310af", "score": "0.5796637", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregationMap(c *Client, i interface{}) map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation{}\n\t}\n\n\titems := make(map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation)\n\tfor k, item := range a {\n\t\titems[k] = *flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioDenominatorAggregation(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "085e81a9b3de8d36f957b6a1b430e1fa", "score": "0.5793624", "text": "func expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterSecondaryAggregationMap(c *Client, f map[string]DashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterSecondaryAggregation) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetScorecardTimeSeriesQueryTimeSeriesFilterSecondaryAggregation(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "6b9b3384bd37e1c7040dbe1bbce5264e", "score": "0.5789276", "text": "func flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator(c *Client, i interface{}) *DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tr := &DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumerator{}\n\tr.Filter = dcl.FlattenString(m[\"filter\"])\n\tr.Aggregation = flattenDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregation(c, m[\"aggregation\"])\n\n\treturn r\n}", "title": "" }, { "docid": "0e6dab0d50f335d84602f3bc933dab2f", "score": "0.5786969", "text": "func expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregationReduceMakeDistributionParamsMap(c *Client, f map[string]DashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregationReduceMakeDistributionParams) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandDashboardWidgetXyChartDataSetsTimeSeriesQueryTimeSeriesFilterRatioNumeratorAggregationReduceMakeDistributionParams(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" } ]
4f95bf0278ac7d1a2ebcaa70341f6e6d
WithTimeout adds the timeout to the delete menu item params
[ { "docid": "5d599b3f334e8c00d3877cce2df4213d", "score": "0.77401066", "text": "func (o *DeleteMenuItemParams) WithTimeout(timeout time.Duration) *DeleteMenuItemParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" } ]
[ { "docid": "d24d68ffde864e01e032420d82e03cd4", "score": "0.7576793", "text": "func (o *DeleteMenuItemParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "ae48bb15d3f2d2da8fb0d70131e26d3b", "score": "0.6944923", "text": "func NewDeleteMenuItemParamsWithTimeout(timeout time.Duration) *DeleteMenuItemParams {\n\tvar ()\n\treturn &DeleteMenuItemParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "a7a86f3146f03e0cebaec1fe84050a14", "score": "0.6517099", "text": "func (s *IndicesDeleteService) Timeout(timeout string) *IndicesDeleteService {\r\n\ts.timeout = timeout\r\n\treturn s\r\n}", "title": "" }, { "docid": "2c133f75b8dc3bc01867c0223e1a5f9a", "score": "0.6500177", "text": "func NewDeleteACartParamsWithTimeout(timeout time.Duration) *DeleteACartParams {\n\tvar (\n\t\tacceptDefault = string(\"application/json\")\n\t\tcontentTypeDefault = string(\"application/json\")\n\t)\n\treturn &DeleteACartParams{\n\t\tAccept: acceptDefault,\n\t\tContentType: contentTypeDefault,\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "65e9f89dbcbb51b723c486dcb586ce54", "score": "0.6375702", "text": "func (o *DeleteTodoParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "7aec0d6bc090a4c25e5a5e06231dec03", "score": "0.63704544", "text": "func (o *IntegrationsDeleteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "9baabb5fad864826253d62582a312fce", "score": "0.63571435", "text": "func (o *DeleteACartParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "0ad30af9954a128c5f233722a1b4919c", "score": "0.6271222", "text": "func (o *EmployeesByIDDeleteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "21000b1297ea1d7baaebadaf570eba07", "score": "0.62612134", "text": "func (o *DeleteTodoParams) WithTimeout(timeout time.Duration) *DeleteTodoParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "915a28a311e339d9a3b5dcc4ab2c74b7", "score": "0.6252189", "text": "func (o *DeleteACartParams) WithTimeout(timeout time.Duration) *DeleteACartParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "0dc6c4a56dee43de8025443e8943407c", "score": "0.6239842", "text": "func (o *DeleteUsingDELETE2Params) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "ab24b18d98da79fd98ac2f24e4c9c0de", "score": "0.6187664", "text": "func (o *DeleteMultifactorByProviderParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "85f787b07c7bcc039734d2268b7cc4b3", "score": "0.6162901", "text": "func (o *EmployeePrioritiesByIDDeleteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "649d6e7b5ce641a6fd38c29d803af418", "score": "0.616234", "text": "func (o *SupportContactDeleteListParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "47aac7f64ee8329c72d260fd3066b0ba", "score": "0.61574614", "text": "func (o *VaultDeleteVaultItemParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "96317f4e152d8dcd64062d1780cb06f7", "score": "0.6137324", "text": "func (o *DeleteEnvironmentUsingDELETEParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "5c0ef09fafaef3421be4e9a7d2ba8e5a", "score": "0.6117665", "text": "func (o *DeleteTransactionParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "1a9d8d6737f7bec1746a38bf618ac702", "score": "0.6099015", "text": "func (o *DeleteMultifactorByProviderParams) WithTimeout(timeout time.Duration) *DeleteMultifactorByProviderParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "4be66a28a11cc77256ca1a440747685b", "score": "0.6097738", "text": "func (o *DeleteWidgetByIDParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "a0a73e1e7a5edfd896f674b2c54a46c3", "score": "0.6095565", "text": "func (o *DeletePageByIDParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "4489d6f68e7e53be3cd9b7a9a5224b1d", "score": "0.6084654", "text": "func (o *CatalogCategoryLinkRepositoryV1DeleteByIdsDeleteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "2245681ac2aecaf336664a201ee06e34", "score": "0.60827744", "text": "func (o *DeleteNodeParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "dd7c41255051d55b20dacc625f71623c", "score": "0.6046955", "text": "func (o *SMSInboundAutomationDeleteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "467d42f18760e92905c1c3c30d77468b", "score": "0.6017545", "text": "func (o *DeleteTransactionParams) WithTimeout(timeout time.Duration) *DeleteTransactionParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "4ec38cfd78f8358d50a2b6311c100882", "score": "0.6012775", "text": "func (o *VaultDeleteVaultItemParams) WithTimeout(timeout time.Duration) *VaultDeleteVaultItemParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "117ac23d4c932d472160813baa6e57ca", "score": "0.5999221", "text": "func (o *SafeObjectDeleteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "2811b1eee59ecb1333ffe68b122eeaed", "score": "0.5991947", "text": "func (o *DeleteByCrnParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "173800652d5ce1aa03b11c7fe4607c4e", "score": "0.5984583", "text": "func NewDeleteNodeParamsWithTimeout(timeout time.Duration) *DeleteNodeParams {\n\treturn &DeleteNodeParams{\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "ac086723c534a826f1f0ebfa1fbf7be0", "score": "0.59768975", "text": "func (o *DeleteTimesheetEntryIDParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "b44f8c0380fa8fefe82f50d1356bb526", "score": "0.5948617", "text": "func (o *ContractDeleteListParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "01c513ad7edcaf7dc12e26f207d0f9cd", "score": "0.591533", "text": "func (o *DeleteStoragepoolTiersParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "1fd288940b08faf1d4ed72fd8168e7cd", "score": "0.5899034", "text": "func (o *SafeObjectDeleteParams) WithTimeout(timeout time.Duration) *SafeObjectDeleteParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "5182d79da957c0b1cc72d2e892415a41", "score": "0.5894632", "text": "func (o *DeleteLeasesParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "9c397da5aa31499e417a83b6fadac210", "score": "0.5890322", "text": "func (o *DeleteUsingDELETE2Params) WithTimeout(timeout time.Duration) *DeleteUsingDELETE2Params {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "c4500cdae4cf388a4c30464959aba00c", "score": "0.58872825", "text": "func (o *DeleteProjectIDParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "72d3b95cef596b1491dbcbf9deec514d", "score": "0.5882097", "text": "func (o *DeleteFoodsLogParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "3dd1648a294c55b7e41a35b5c050d29a", "score": "0.5872801", "text": "func (o *DeleteStoreParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "3f8c06289e40b85d73cfe2b85a0a70c1", "score": "0.5857672", "text": "func (o *DeleteUserPermissionParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "87b0b2a00e906fe040ea5d324ff595da", "score": "0.5856656", "text": "func (o *DeleteRecordsIDParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "c9b6c5221cc9c79edb5bdfb111c9290c", "score": "0.58434856", "text": "func (o *DeleteInstanceStackV4Params) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "a50d7b22f43e1810517349c883bb9f57", "score": "0.5825931", "text": "func (o *DeleteTimesheetEntryIDParams) WithTimeout(timeout time.Duration) *DeleteTimesheetEntryIDParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "805b3624b53593e0859b1c207da56c53", "score": "0.5817587", "text": "func (o *RepoDeleteHookParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "716f919820bbb7f0d27c2b382f437384", "score": "0.58170414", "text": "func (o *DeleteNodeParams) WithTimeout(timeout time.Duration) *DeleteNodeParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "63b9ed7bee6281ee8b41179ca25b8e38", "score": "0.58169997", "text": "func (o *DeleteGroupMappingGivenGroupIDUsingDELETEParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "6c58944aeedb4d5458df9c5f75abf0fb", "score": "0.5805335", "text": "func (o *DeleteAppcompsParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "99772bc0fa2c88c4ecb4be64ea08e90d", "score": "0.58050764", "text": "func (o *DeleteUserParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "4d5ccdcf88058d745d2e1b633f476ad0", "score": "0.5797845", "text": "func (o *DeleteBuildFileParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "0077767b323690beab099d41a22d9e3e", "score": "0.5784411", "text": "func (o *DeleteGroupParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "01435e043e6f20a142f8c7055e47396a", "score": "0.5778917", "text": "func NewDeleteTodoParamsWithTimeout(timeout time.Duration) *DeleteTodoParams {\n\tvar ()\n\treturn &DeleteTodoParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "8a4ad3baa60c58f957da97392455b123", "score": "0.5753345", "text": "func (o *DeleteCustomRuleParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "033f4c8b831fddcedc18bd27d7d34272", "score": "0.5745061", "text": "func (o *DeleteInventoryModelJposEntriesParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "8247a6f761a1059c8cf728deed503347", "score": "0.5733236", "text": "func (o *EndpointDeleteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "51714124442cda776acd379a73200622", "score": "0.57181114", "text": "func (o *GetNcosLevelitemsParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "02997626c862b6e97b7158c82469c866", "score": "0.57077575", "text": "func (o *DeleteFoodsLogParams) WithTimeout(timeout time.Duration) *DeleteFoodsLogParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "ca6603b5df65dbb209bd86a2e42e8fb8", "score": "0.56937975", "text": "func (o *DeleteUserRoleParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "d74382ddfcc74655b033a42829cd7a68", "score": "0.56913507", "text": "func (o *DeleteCreditNoteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "f6480cee3fa410c93a8ac417dd2ba3d9", "score": "0.56793165", "text": "func (o *CifsSymlinkMappingDeleteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "73dc39a1820f864b8582a40f6bfdbdb6", "score": "0.56703746", "text": "func (o *ControllersPublicV1ProxyBatchDeleteVcenterNfsStorageParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "c204593221197200f30664fbc9d3969b", "score": "0.56661934", "text": "func NewDeleteMultifactorByProviderParamsWithTimeout(timeout time.Duration) *DeleteMultifactorByProviderParams {\n\tvar ()\n\treturn &DeleteMultifactorByProviderParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "ac046fc743445733fc232b8afc763838", "score": "0.5663258", "text": "func (o *DeleteMappingIdentityParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "31b6db1573b57971cd421f281b805186", "score": "0.5660858", "text": "func (o *DeleteStackV2Params) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "226da3250fe807cd4c159164d99dc54a", "score": "0.5653669", "text": "func (o *DeleteSitesByIDAbTestsByIDParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "de7c46219a51ee71f5975f3da9de93bb", "score": "0.5644361", "text": "func NewSafeObjectDeleteParamsWithTimeout(timeout time.Duration) *SafeObjectDeleteParams {\n\tvar ()\n\treturn &SafeObjectDeleteParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "5b832711b0763d84bd88c2efa93cd8ad", "score": "0.5637909", "text": "func NewDeleteTransactionParamsWithTimeout(timeout time.Duration) *DeleteTransactionParams {\n\tvar ()\n\treturn &DeleteTransactionParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "642432e74977f7fc75db8e2b8cc2d6c4", "score": "0.5634934", "text": "func (o *DeleteRelationTupleParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "0f3f417bc672a919c84a508c9a3eba97", "score": "0.56225353", "text": "func (o *DeleteAPI24ActiveDirectoryParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "a8dfa9d3e3b61b40ad4393cef54f7bf8", "score": "0.5612822", "text": "func (o *DeleteCustomRuleParams) WithTimeout(timeout time.Duration) *DeleteCustomRuleParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "4d8e100a92db1aeca73ab7d50d7016ff", "score": "0.56068766", "text": "func (o *DeleteAuthConfigParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "f72a213db700baf2251a0630340c8ae3", "score": "0.5591145", "text": "func (o *CircuitsCircuitsDeleteParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "e531beb34818e61895f79b5218c3011c", "score": "0.5590161", "text": "func (o *CreateHardeningRevertItemParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "e58e4551ebff7a4edff38dd80897c601", "score": "0.5587724", "text": "func (o *DeleteContentMetadataAccessParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "c1f6bf7b41eb01300ad8fd49f602fb47", "score": "0.5585955", "text": "func (o *IntegrationsDeleteParams) WithTimeout(timeout time.Duration) *IntegrationsDeleteParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "1d2e13f14ebd96de4cdc44225f72106a", "score": "0.5579438", "text": "func (o *DeleteUserPermissionParams) WithTimeout(timeout time.Duration) *DeleteUserPermissionParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "ae92971214e72c16f024e259581f2315", "score": "0.55657774", "text": "func (o *DeleteUserParams) WithTimeout(timeout time.Duration) *DeleteUserParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "40f11ed13ce644a1f813161d2eb71e34", "score": "0.5562176", "text": "func (o *DeleteLeasesParams) WithTimeout(timeout time.Duration) *DeleteLeasesParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "3ee0a7773073dcaf1840cc3e3d96ad6c", "score": "0.5557209", "text": "func (o *DeleteSwiftAccountParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "570b2496418d060506518b403920a5f5", "score": "0.5553388", "text": "func (o *DeleteSubjectParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "cfe81b6735617267fc420861a7ad2bc6", "score": "0.55524325", "text": "func (kvclient *MockResKVClient) Delete(key string, timeout int) error {\n\treturn nil\n}", "title": "" }, { "docid": "118d6d3d6bb7f30aa5e974d9d9ccee37", "score": "0.55494845", "text": "func (o *DeleteAuthGroupParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "4156bd809f549480eadf1fbeedde6607", "score": "0.5541481", "text": "func (o *SMSInboundAutomationDeleteParams) WithTimeout(timeout time.Duration) *SMSInboundAutomationDeleteParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "25d7ff275054172a074aa36616895204", "score": "0.5530413", "text": "func (o *DeletePdusRackParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "9759be35f58d2fd18b039e1cea6e57b8", "score": "0.5529433", "text": "func (o *DeleteProjectUserParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "f198b07f33379cd27eeaf66c86a127c6", "score": "0.55070645", "text": "func (o *DeleteHyperflexLocalCredentialPoliciesMoidParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "1323cc1289a0bb201e900cf80f03586d", "score": "0.5501436", "text": "func (o *DeleteAppcompsParams) WithTimeout(timeout time.Duration) *DeleteAppcompsParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "95070110005026e7fc41c75fba79098a", "score": "0.54957235", "text": "func NewDeleteCustomRuleParamsWithTimeout(timeout time.Duration) *DeleteCustomRuleParams {\n\tvar ()\n\treturn &DeleteCustomRuleParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "add7ecb2902a5f293a83714ee26fbaaa", "score": "0.5487699", "text": "func ForDelete(ctx context.Context, d *pluginsdk.ResourceData) (context.Context, context.CancelFunc) {\n\treturn buildWithTimeout(ctx, d.Timeout(pluginsdk.TimeoutDelete))\n}", "title": "" }, { "docid": "04a49bd1085d087c4e0dc5388ce63ead", "score": "0.54866314", "text": "func (o *DeleteStoragepoolTiersParams) WithTimeout(timeout time.Duration) *DeleteStoragepoolTiersParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "5d19140364975daa1261b64ba7337c4b", "score": "0.5485216", "text": "func (o *CloudNFSExportRemoveParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "083b772d66664bd33315ac33bdbc8e7c", "score": "0.54783434", "text": "func NewDeleteByCrnParamsWithTimeout(timeout time.Duration) *DeleteByCrnParams {\n\tvar ()\n\treturn &DeleteByCrnParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "9cc3942f9188da888aa4a0067d144459", "score": "0.54779524", "text": "func (o *DeleteAccountAPIKeysClientIDParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "174e938968efe8d49686d13ce3566557", "score": "0.54775137", "text": "func (o *RepoDeleteFileParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "2b660bdb93e8f97320ba7b99979dc83a", "score": "0.54701734", "text": "func (o *DeleteTravelExpenseCostIDParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "6e6fb3555ccff66d9dc8bee438b27f5a", "score": "0.5459757", "text": "func (o *DeleteRuntimeMapEntryParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "2351e31d57385175c853cd5250da2a3d", "score": "0.5444261", "text": "func (o *DeleteJobsByIDExecutionsByIDParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "b8b21c09bb25cd0ae99862901ede1dbb", "score": "0.5442892", "text": "func (o *DeleteCacheParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "6f841c4db209ecd71dc7aa5144725aa3", "score": "0.5433692", "text": "func NewDeleteBuildFileParamsWithTimeout(timeout time.Duration) *DeleteBuildFileParams {\n\tvar ()\n\treturn &DeleteBuildFileParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "9c606b762a50ad741fab2059f0708db9", "score": "0.5433452", "text": "func (o *CifsSymlinkMappingDeleteParams) WithTimeout(timeout time.Duration) *CifsSymlinkMappingDeleteParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "268a8727e8835650b613868d5bca6e0c", "score": "0.5430196", "text": "func (o *RemoveAccessControlListsParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" }, { "docid": "da365b0b1c5e839f3563a14a5d2ffbc0", "score": "0.5430062", "text": "func (o *DeleteByCrnParams) WithTimeout(timeout time.Duration) *DeleteByCrnParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "b8052ff1d695ddf53ca030b9983e5388", "score": "0.5429461", "text": "func (o *WorkflowsDeleteTasksByNameParams) SetTimeout(timeout time.Duration) {\n\to.timeout = timeout\n}", "title": "" } ]
a80bef87baffa7e12ef22b2e1485a3cd
SetPage adds the page to the get v1 post mortems reports report Id sections report step params
[ { "docid": "b0ef0c1ea0ca2f13fc0dbd98b15bfb54", "score": "0.48283556", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) SetPage(page *int32) {\n\to.Page = page\n}", "title": "" } ]
[ { "docid": "67747008fc80ec9de85c0f4299bc81be", "score": "0.6710182", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Page != nil {\n\n\t\t// query param page\n\t\tvar qrPage int32\n\t\tif o.Page != nil {\n\t\t\tqrPage = *o.Page\n\t\t}\n\t\tqPage := swag.FormatInt32(qrPage)\n\t\tif qPage != \"\" {\n\t\t\tif err := r.SetQueryParam(\"page\", qPage); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.PerPage != nil {\n\n\t\t// query param per_page\n\t\tvar qrPerPage int32\n\t\tif o.PerPage != nil {\n\t\t\tqrPerPage = *o.PerPage\n\t\t}\n\t\tqPerPage := swag.FormatInt32(qrPerPage)\n\t\tif qPerPage != \"\" {\n\t\t\tif err := r.SetQueryParam(\"per_page\", qPerPage); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param report_id\n\tif err := r.SetPathParam(\"report_id\", o.ReportID); err != nil {\n\t\treturn err\n\t}\n\n\t// path param report_step\n\tif err := r.SetPathParam(\"report_step\", o.ReportStep); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bab8343e25a8ae0bde7994f6771cb007", "score": "0.63311774", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) WithPage(page *int32) *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\to.SetPage(page)\n\treturn o\n}", "title": "" }, { "docid": "836a3a18d0b8378b34f2eb8602f5f490", "score": "0.552083", "text": "func NewGetV1PostMortemsReportsReportIDSectionsReportStepParamsWithHTTPClient(client *http.Client) *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\tvar ()\n\treturn &GetV1PostMortemsReportsReportIDSectionsReportStepParams{\n\t\tHTTPClient: client,\n\t}\n}", "title": "" }, { "docid": "660391094beda7e8ec558be0330e6863", "score": "0.5515175", "text": "func (this *Handle) pageSet(w http.ResponseWriter, r *http.Request) {\n\tif this.CheckLogin(w, r) == false {\n\t\treturn\n\t}\n\tthis.UpdateLanguage()\n\tthis.ShowTemplate(w, r, \"set.html\", nil)\n}", "title": "" }, { "docid": "9ba9fea5bcaf08858928da615ce530a5", "score": "0.5408337", "text": "func NewGetV1PostMortemsReportsReportIDSectionsReportStepParams() *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\tvar ()\n\treturn &GetV1PostMortemsReportsReportIDSectionsReportStepParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "6b55700d4710cda291db47cded002618", "score": "0.5297199", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) WithHTTPClient(client *http.Client) *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "9e32409d3283cec426718d410acd3d32", "score": "0.5053266", "text": "func NewGetV1PostMortemsReportsReportIDSectionsReportStepParamsWithTimeout(timeout time.Duration) *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\tvar ()\n\treturn &GetV1PostMortemsReportsReportIDSectionsReportStepParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "0936ca5ecd3d36e01cb53e999023ca4b", "score": "0.5015288", "text": "func SetPageIntegrations(response *applications.HTTPResponse, IntegrationType PageIntergrationType) {\n\tresponse.Headers[\"x-cube-integrations\"] = &applications.HTTPResponse_HTTPHeaderParameter{Values: []string{string(IntegrationType)}}\n}", "title": "" }, { "docid": "2360d7126c220153d942394e038f7c67", "score": "0.5014857", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) WithPerPage(perPage *int32) *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\to.SetPerPage(perPage)\n\treturn o\n}", "title": "" }, { "docid": "3fd60823bf7362ccda23a0bb7296dbc3", "score": "0.5004945", "text": "func (h *Paged) setPage(ctx *gin.Context) int {\n\tq := ctx.Request.URL.Query()\n\tpage := model.Page{\n\t\tLimit: int(^uint(0) >> 1),\n\t\tOffset: 0,\n\t}\n\tpLimit := q.Get(\"limit\")\n\tif len(pLimit) != 0 {\n\t\tnLimit, err := strconv.Atoi(pLimit)\n\t\tif err != nil || nLimit < 0 {\n\t\t\treturn http.StatusBadRequest\n\t\t}\n\t\tpage.Limit = nLimit\n\t}\n\tpOffset := q.Get(\"offset\")\n\tif len(pOffset) != 0 {\n\t\tnOffset, err := strconv.Atoi(pOffset)\n\t\tif err != nil || nOffset < 0 {\n\t\t\treturn http.StatusBadRequest\n\t\t}\n\t\tpage.Offset = nOffset\n\t}\n\n\th.Page = page\n\treturn http.StatusOK\n}", "title": "" }, { "docid": "799c6cb9e477a3f8ebaa784fa039fc9b", "score": "0.49549294", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) WithReportStep(reportStep string) *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\to.SetReportStep(reportStep)\n\treturn o\n}", "title": "" }, { "docid": "42c0c84c4db5b42e71a93fb895a48300", "score": "0.49116734", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) WithContext(ctx context.Context) *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\to.SetContext(ctx)\n\treturn o\n}", "title": "" }, { "docid": "0d85888d65e05ea66a138a5edf2f66da", "score": "0.49031195", "text": "func (p *attachmentActionProps) setPage(page *types.Page) *attachmentActionProps {\n\tp.page = page\n\treturn p\n}", "title": "" }, { "docid": "c152dcfe9fdfde3828a1d102c93842f4", "score": "0.4902116", "text": "func (cli *condition) SetPage(page types.MapStr) error {\n\n\tpageInfo := metadata.BasePage{}\n\tif err := page.MarshalJSONInto(&pageInfo); nil != err {\n\t\treturn err\n\t}\n\tcli.start = int64(pageInfo.Start)\n\tcli.limit = int64(pageInfo.Limit)\n\tcli.sort = pageInfo.Sort\n\treturn nil\n}", "title": "" }, { "docid": "14fe3f4abc806c9e9ba8ed087e6d1f15", "score": "0.48582563", "text": "func PostPage(w http.ResponseWriter, r *http.Request) {\n\tdummyData := NewDummyData(\"name test\", 12345, 25)\n\tjsonDummy, err := json.Marshal(dummyData)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tlog.Printf(\"JSON Sent : %s\", jsonDummy)\n\n\theader := &ut.ReqHeader{ContentType: \"Content-Type\", Content: \"application/json\"}\n\tapiRes, status := ut.CallRequest(\"http://dummy.restapiexample.com/api/v1/create\", jsonDummy, \"POST\", header)\n\n\tif status == false {\n\t\tfmt.Fprintf(w, \"Request Not OK!\")\n\t\treturn\n\t}\n\n\tlog.Printf(\"JSON Received : %s\", apiRes)\n\tfmt.Fprintf(w, \"%s\", string(apiRes))\n}", "title": "" }, { "docid": "681211edb3204ff0c5e51c37809dab8c", "score": "0.48048905", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) WithReportID(reportID string) *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\to.SetReportID(reportID)\n\treturn o\n}", "title": "" }, { "docid": "49696b2598f9210a87cf179c3da706a7", "score": "0.47812313", "text": "func (exp *explorerUI) ParametersPage(w http.ResponseWriter, r *http.Request) {\n\tparams := exp.ChainParams\n\taddrPrefix := types.AddressPrefixes(params)\n\tactualTicketPoolSize := int64(params.TicketPoolSize * params.TicketsPerBlock)\n\n\texp.pageData.RLock()\n\tvar maxBlockSize int64\n\tif exp.pageData.BlockchainInfo != nil {\n\t\tmaxBlockSize = exp.pageData.BlockchainInfo.MaxBlockSize\n\t} else {\n\t\tmaxBlockSize = int64(params.MaximumBlockSizes[0])\n\t}\n\texp.pageData.RUnlock()\n\n\ttype ExtendedParams struct {\n\t\tMaximumBlockSize int64\n\t\tActualTicketPoolSize int64\n\t\tAddressPrefix []types.AddrPrefix\n\t}\n\n\tstr, err := exp.templates.exec(\"parameters\", struct {\n\t\t*CommonPageData\n\t\tExtendedParams\n\t}{\n\t\tCommonPageData: exp.commonData(r),\n\t\tExtendedParams: ExtendedParams{\n\t\t\tMaximumBlockSize: maxBlockSize,\n\t\t\tAddressPrefix: addrPrefix,\n\t\t\tActualTicketPoolSize: actualTicketPoolSize,\n\t\t},\n\t})\n\n\tif err != nil {\n\t\tlog.Errorf(\"Template execute failure: %v\", err)\n\t\texp.StatusPage(w, defaultErrorCode, defaultErrorMessage, \"\", ExpStatusError)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Type\", \"text/html\")\n\tw.WriteHeader(http.StatusOK)\n\tio.WriteString(w, str)\n}", "title": "" }, { "docid": "b7754eaca0f276cfc24243d396cda5aa", "score": "0.4768979", "text": "func (m *OnenoteRequestBuilder) PagesById(id string)(*i9ffb03d414d6abd9f024bf2d1f19d7b7fa97959d1245465fdaef4d163ddd6de4.OnenotePageItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.pathParameters {\n urlTplParams[idx] = item\n }\n if id != \"\" {\n urlTplParams[\"onenotePage%2Did\"] = id\n }\n return i9ffb03d414d6abd9f024bf2d1f19d7b7fa97959d1245465fdaef4d163ddd6de4.NewOnenotePageItemRequestBuilderInternal(urlTplParams, m.requestAdapter);\n}", "title": "" }, { "docid": "1498a7ade60d0bfdb433fc1268884e21", "score": "0.47578612", "text": "func (this CourseController) PostPage(w http.ResponseWriter, r *http.Request) {\n\tcourse_name := strings.TrimPrefix(r.URL.Path, \"/courses/\")\n\tif course_name == \"\" {\n\t\tthis.WriteErrorMessageWithStatus(w, 400, \"Unable to determine course name\")\n\t\treturn\n\t}\n\n\tactivity_string := r.URL.Query().Get(\"activity\")\n\tif activity_string == \"\" {\n\t\tthis.WriteErrorMessageWithStatus(w, 400, \"Missing 'activity' query parameter\")\n\t\treturn\n\t}\n\n\tactivity_num, err := strconv.Atoi(activity_string)\n\tif err != nil {\n\t\tthis.WriteErrorMessageWithStatus(w, 400, \"Invalid 'activity' query parameter\")\n\t\treturn\n\t}\n\n\t_, activity, act_err := this.course_service.GetCourseAndActivity(course_name, activity_num)\n\tif act_err != nil {\n\t\tfmt.Println(\"Error returned from GetCourseActivity. Err: \", act_err.Error())\n\t\tthis.WriteErrorMessageWithStatus(w, 500, \"internal_server_error\")\n\t\treturn\n\t}\n\t_ = activity.GetType()\n\t//TODO check the posted request against the activity returned\n\n\tactivity_num++ //increment to next page\n\n\tfmt.Println(\"Redirecting to next page...\")\n\n\tr.Method = \"GET\"\n\tnew_url := fmt.Sprintf(GET_PAGE_TEMPLATE, strings.Split(r.URL.Path, \"?\")[0], activity_num)\n\thttp.Redirect(w, r, new_url, 302)\n}", "title": "" }, { "docid": "7bc02476290357dd1230aa2a724db7a4", "score": "0.4721739", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) WithTimeout(timeout time.Duration) *GetV1PostMortemsReportsReportIDSectionsReportStepParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "01041471217d2ad068f732ce04ce50db", "score": "0.4708902", "text": "func (o *GetPageParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// query param api-version\n\tqrAPIVersion := o.APIVersion\n\tqAPIVersion := qrAPIVersion\n\tif qAPIVersion != \"\" {\n\t\tif err := r.SetQueryParam(\"api-version\", qAPIVersion); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.IncludeContent != nil {\n\n\t\t// query param includeContent\n\t\tvar qrIncludeContent bool\n\t\tif o.IncludeContent != nil {\n\t\t\tqrIncludeContent = *o.IncludeContent\n\t\t}\n\t\tqIncludeContent := swag.FormatBool(qrIncludeContent)\n\t\tif qIncludeContent != \"\" {\n\t\t\tif err := r.SetQueryParam(\"includeContent\", qIncludeContent); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param organization\n\tif err := r.SetPathParam(\"organization\", o.Organization); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Path != nil {\n\n\t\t// query param path\n\t\tvar qrPath string\n\t\tif o.Path != nil {\n\t\t\tqrPath = *o.Path\n\t\t}\n\t\tqPath := qrPath\n\t\tif qPath != \"\" {\n\t\t\tif err := r.SetQueryParam(\"path\", qPath); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param project\n\tif err := r.SetPathParam(\"project\", o.Project); err != nil {\n\t\treturn err\n\t}\n\n\tif o.RecursionLevel != nil {\n\n\t\t// query param recursionLevel\n\t\tvar qrRecursionLevel string\n\t\tif o.RecursionLevel != nil {\n\t\t\tqrRecursionLevel = *o.RecursionLevel\n\t\t}\n\t\tqRecursionLevel := qrRecursionLevel\n\t\tif qRecursionLevel != \"\" {\n\t\t\tif err := r.SetQueryParam(\"recursionLevel\", qRecursionLevel); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.VersionDescriptorVersion != nil {\n\n\t\t// query param versionDescriptor.version\n\t\tvar qrVersionDescriptorVersion string\n\t\tif o.VersionDescriptorVersion != nil {\n\t\t\tqrVersionDescriptorVersion = *o.VersionDescriptorVersion\n\t\t}\n\t\tqVersionDescriptorVersion := qrVersionDescriptorVersion\n\t\tif qVersionDescriptorVersion != \"\" {\n\t\t\tif err := r.SetQueryParam(\"versionDescriptor.version\", qVersionDescriptorVersion); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.VersionDescriptorVersionOptions != nil {\n\n\t\t// query param versionDescriptor.versionOptions\n\t\tvar qrVersionDescriptorVersionOptions string\n\t\tif o.VersionDescriptorVersionOptions != nil {\n\t\t\tqrVersionDescriptorVersionOptions = *o.VersionDescriptorVersionOptions\n\t\t}\n\t\tqVersionDescriptorVersionOptions := qrVersionDescriptorVersionOptions\n\t\tif qVersionDescriptorVersionOptions != \"\" {\n\t\t\tif err := r.SetQueryParam(\"versionDescriptor.versionOptions\", qVersionDescriptorVersionOptions); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.VersionDescriptorVersionType != nil {\n\n\t\t// query param versionDescriptor.versionType\n\t\tvar qrVersionDescriptorVersionType string\n\t\tif o.VersionDescriptorVersionType != nil {\n\t\t\tqrVersionDescriptorVersionType = *o.VersionDescriptorVersionType\n\t\t}\n\t\tqVersionDescriptorVersionType := qrVersionDescriptorVersionType\n\t\tif qVersionDescriptorVersionType != \"\" {\n\t\t\tif err := r.SetQueryParam(\"versionDescriptor.versionType\", qVersionDescriptorVersionType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param wikiIdentifier\n\tif err := r.SetPathParam(\"wikiIdentifier\", o.WikiIdentifier); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a858e6f98479c1842154395d8e4de9da", "score": "0.47081736", "text": "func (c *ConfluenceClient) AddPage(title, spaceKey, body string, ancestor int64) {\n page := newPage(title, spaceKey)\n if ancestor > 0 {\n page.Ancestors = []ConfluencePageAncestor{\n ConfluencePageAncestor{ancestor},\n }\n }\n response := &ConfluencePage{}\n page.Body.Storage.Value = body\n //page.Body.Storage.Representation = \"wiki\"\n c.doRequest(\"POST\", \"/rest/api/content/\", page, response)\n log.Println(\"Confluence page added with ID\", response.ID, \"and version\", response.Version.Number)\n}", "title": "" }, { "docid": "2cd049e7b29079064d433dd6c57f54b1", "score": "0.45997524", "text": "func NewGetV1PostMortemsReportsReportIDEventsParams() *GetV1PostMortemsReportsReportIDEventsParams {\n\tvar ()\n\treturn &GetV1PostMortemsReportsReportIDEventsParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "6549e58b14841bb383434e17cfeffacf", "score": "0.45951027", "text": "func testPostArticle(w http.ResponseWriter, r *http.Request) {\n\tdataPOSTPage := \"Endpoint: postpage\"\n\tio.WriteString(w, dataPOSTPage)\n}", "title": "" }, { "docid": "7ebec4c4e12f97e74215f38f4fa94e0b", "score": "0.4592818", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) SetReportStep(reportStep string) {\n\to.ReportStep = reportStep\n}", "title": "" }, { "docid": "dffc3eb288f735465a56a3f35dbf8d8a", "score": "0.45918745", "text": "func (o *GetTasksParams) SetPage(page float64) {\n\to.Page = page\n}", "title": "" }, { "docid": "1628154b5e2f78a745632ffbad1a71b9", "score": "0.4586236", "text": "func (m *OnenoteRequestBuilder) Pages()(*iae2d6340b64994bda52b72186cf936e932db0b6d72196a85d99b8d63141db19b.PagesRequestBuilder) {\n return iae2d6340b64994bda52b72186cf936e932db0b6d72196a85d99b8d63141db19b.NewPagesRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "title": "" }, { "docid": "b0e6ffadfa43f2c90a244687bbf1d296", "score": "0.4584336", "text": "func populatePageValues(req *scm.Request, resp *scm.Response) {\n\t// get last\n\tlast, totalError := strconv.Atoi(resp.Header.Get(\"total_page\"))\n\tif totalError != nil {\n\t\treturn\n\t}\n\t// get curren page\n\treqURL, err := url.Parse(req.Path)\n\tif err != nil {\n\t\treturn\n\t}\n\tcurrentPageStr := reqURL.Query().Get(\"page\")\n\tvar current int\n\tif currentPageStr == \"\" {\n\t\tcurrent = 1\n\t} else {\n\t\tcurrentPage, currentError := strconv.Atoi(currentPageStr)\n\t\tif currentError != nil {\n\t\t\treturn\n\t\t}\n\t\tcurrent = currentPage\n\t}\n\n\t// first, prev\n\tif current <= 1 {\n\t\tresp.Page.First = 0\n\t\tresp.Page.Prev = 0\n\t} else {\n\t\tresp.Page.First = 1\n\t\tresp.Page.Prev = current - 1\n\t}\n\t// last, next\n\tif current >= last {\n\t\tresp.Page.Last = 0\n\t\tresp.Page.Next = 0\n\t} else {\n\t\tresp.Page.Last = last\n\t\tresp.Page.Next = current + 1\n\t}\n}", "title": "" }, { "docid": "f1263c2791f2e476f37a5d80e449a8b6", "score": "0.45525452", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) SetPerPage(perPage *int32) {\n\to.PerPage = perPage\n}", "title": "" }, { "docid": "d94b39b3b62681e6d134b0709e007cff", "score": "0.4532911", "text": "func (p *PdfiumImplementation) FPDFPageObjMark_SetStringParam(request *requests.FPDFPageObjMark_SetStringParam) (*responses.FPDFPageObjMark_SetStringParam, error) {\n\tp.Lock()\n\tdefer p.Unlock()\n\n\tdocumentHandle, err := p.getDocumentHandle(request.Document)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpageObjectHandle, err := p.getPageObjectHandle(request.PageObject)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpageObjectMarkHandle, err := p.getPageObjectMarkHandle(request.PageObjectMark)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tkeyPointer, err := p.CString(request.Key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer keyPointer.Free()\n\n\tvaluePointer, err := p.CString(request.Value)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer valuePointer.Free()\n\n\tres, err := p.Module.ExportedFunction(\"FPDFPageObjMark_SetStringParam\").Call(p.Context, *documentHandle.handle, *pageObjectHandle.handle, *pageObjectMarkHandle.handle, keyPointer.Pointer, valuePointer.Pointer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsuccess := *(*int32)(unsafe.Pointer(&res[0]))\n\tif int(success) == 0 {\n\t\treturn nil, errors.New(\"could not set value\")\n\t}\n\n\treturn &responses.FPDFPageObjMark_SetStringParam{}, nil\n}", "title": "" }, { "docid": "941e2de914be5033da13fa7c50f15842", "score": "0.4527681", "text": "func PageConfig(jDoc *gabs.Container) {\n\tif !jDoc.Exists(\"report\", \"pageconfig\") {\n\t\tmessage(\"Not exist page config.!!!!\")\n\t\treturn\n\t}\n\tif jDoc.Exists(\"report\", \"pageconfig\", \"orientation\") {\n\t\torientation, ok = jDoc.Path(\"report.pageconfig.orientation\").Data().(string)\n\t}\n\tif jDoc.Exists(\"report\", \"pageconfig\", \"unit\") {\n\t\tunit, ok = jDoc.Path(\"report.pageconfig.unit\").Data().(string)\n\t}\n\tif jDoc.Exists(\"report\", \"pageconfig\", \"size\") {\n\t\tsize, ok = jDoc.Path(\"report.pageconfig.size\").Data().(string)\n\t}\n\tif jDoc.Exists(\"report\", \"pageconfig\", \"Wd\") {\n\t\tWd, ok = jDoc.Path(\"report.pageconfig.Wd\").Data().(float64)\n\t}\n\tif jDoc.Exists(\"report\", \"pageconfig\", \"Ht\") {\n\t\tHt, ok = jDoc.Path(\"report.pageconfig.Ht\").Data().(float64)\n\t}\n\n\t//pdf = gofpdf.New(orientation, unit, size, \"\")\n\tpdf = gofpdf.NewCustom(&gofpdf.InitType{\n\t\tOrientationStr: orientation,\n\t\tUnitStr: unit,\n\t\tSize: gofpdf.SizeType{Wd: Wd, Ht: Ht},\n\t})\n}", "title": "" }, { "docid": "7a50332006052660dab59191f9eed230", "score": "0.44755495", "text": "func (d *dbNodeRunVulenrabilitiesReport) PostGet(db gorp.SqlExecutor) error {\n\tvar reportS sql.NullString\n\tquery := \"SELECT report from workflow_node_run_vulnerability WHERE id = $1\"\n\tif err := db.QueryRow(query, d.ID).Scan(&reportS); err != nil {\n\t\treturn sdk.WrapError(err, \"Unable to report\")\n\t}\n\n\tvar report sdk.WorkflowNodeRunVulnerability\n\tif err := gorpmapping.JSONNullString(reportS, &report); err != nil {\n\t\treturn sdk.WrapError(err, \"Unable to unmarshal report\")\n\t}\n\n\td.Report = report\n\treturn nil\n}", "title": "" }, { "docid": "8319a6dac260ecc391c5564616dab48f", "score": "0.4427529", "text": "func (p *Post) PostPage(w http.ResponseWriter, r *http.Request) {\n\tp.NewView.Render(w, r, nil)\n}", "title": "" }, { "docid": "c4fe69e4ec5fe5b654d502ad8966dd0f", "score": "0.44015226", "text": "func Set(e *echo.Echo) {\n\n\t// Code to get the token\n\n\t//Project Management\n\te.POST(\"/recommend\", engine.Recommend) //Listing all the release under a project\n\te.POST(\"/samplePrint\", engine.Sample)\n}", "title": "" }, { "docid": "efb412cf2b58707b9c278a15f6b4c4a6", "score": "0.43623075", "text": "func (convert *Converter) Page(line string, elements []string) {\n\tconvert.pdf = new(gopdf.GoPdf)\n\n\tcheckLength(line, elements, 4)\n\tswitch elements[2] {\n\t/* A0 ~ A5 Paper pixel representation:\n\t'A0': [2383.94, 3370.39],\n\t'A1': [1683.78, 2383.94],\n\t'A2': [1190.55, 1683.78],\n\t'A3': [841.89, 1190.55],\n\t'A4': [595.28, 841.89],\n\t'A5': [419.53, 595.28],\n\t*/\n\tcase \"A3\":\n\t\tconfig := defaultConfigs[\"A3\"]\n\t\tconvert.setunit(elements[1])\n\t\tif elements[3] == \"P\" {\n\t\t\tconvert.start(config.width, config.height)\n\t\t} else if elements[3] == \"L\" {\n\t\t\tconvert.start(config.height, config.width)\n\t\t} else {\n\t\t\tpanic(\"Page Orientation accept P or L\")\n\t\t}\n\tcase \"A4\":\n\t\tconfig := defaultConfigs[\"A4\"]\n\t\tconvert.setunit(elements[1])\n\t\tif elements[3] == \"P\" {\n\t\t\tconvert.start(config.width, config.height)\n\t\t} else if elements[3] == \"L\" {\n\t\t\tconvert.start(config.height, config.width)\n\t\t} else {\n\t\t\tpanic(\"Page Orientation accept P or L\")\n\t\t}\n\tcase \"LTR\":\n\t\tconfig := defaultConfigs[\"LTR\"]\n\t\tconvert.setunit(elements[1])\n\t\tif elements[3] == \"P\" {\n\t\t\tconvert.start(config.width, config.height)\n\t\t} else if elements[3] == \"L\" {\n\t\t\tconvert.start(config.height, config.width)\n\t\t} else {\n\t\t\tpanic(\"Page Orientation accept P or L\")\n\t\t}\n\tdefault:\n\t\tpanic(\"This size not supported yet:\" + elements[2])\n\t}\n\tconvert.AddFont()\n\tconvert.pdf.AddPage()\n}", "title": "" }, { "docid": "826437dfecbaa9f68df2fe987d80eb96", "score": "0.43616226", "text": "func (o *GetV1PostMortemsReportsReportIDEventsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param report_id\n\tif err := r.SetPathParam(\"report_id\", o.ReportID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7d87a9146cd977547c231d9fc760cb48", "score": "0.43428499", "text": "func (o *GetDatabasesDatabaseIDDependentsParams) SetPage(page *int64) {\n\to.Page = page\n}", "title": "" }, { "docid": "363fcf296e27e084115550a6d60fd435", "score": "0.43419477", "text": "func (p *PdfiumImplementation) FPDFPageObjMark_SetStringParam(request *requests.FPDFPageObjMark_SetStringParam) (*responses.FPDFPageObjMark_SetStringParam, error) {\n\tp.Lock()\n\tdefer p.Unlock()\n\n\tdocumentHandle, err := p.getDocumentHandle(request.Document)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpageObjectHandle, err := p.getPageObjectHandle(request.PageObject)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpageObjectMarkHandle, err := p.getPageObjectMarkHandle(request.PageObjectMark)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tkey := C.CString(request.Key)\n\tdefer C.free(unsafe.Pointer(key))\n\n\tvalue := C.CString(request.Value)\n\tdefer C.free(unsafe.Pointer(value))\n\n\tsuccess := C.FPDFPageObjMark_SetStringParam(documentHandle.handle, pageObjectHandle.handle, pageObjectMarkHandle.handle, key, value)\n\tif int(success) == 0 {\n\t\treturn nil, errors.New(\"could not set value\")\n\t}\n\n\treturn &responses.FPDFPageObjMark_SetStringParam{}, nil\n}", "title": "" }, { "docid": "0f545d26d7416d32d0e8b1ac750e1085", "score": "0.43258756", "text": "func HandleRequest(ctx context.Context, report lib.Report) (*lib.Report, error) {\n\tlog.WithField(\"report\", report).Info(\"start\")\n\n\tparams, err := buildParameters(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpages, err := lib.FetchReportPages(params.tableName, params.region, report.ID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlog.WithField(\"pages\", pages).Info(\"Fetched pages\")\n\n\tc := &report.Content\n\tc.OpponentHosts = map[string]lib.ReportOpponentHost{}\n\tc.AlliedHosts = map[string]lib.ReportAlliedHost{}\n\n\tfor _, page := range pages {\n\t\tfor _, r := range page.OpponentHosts {\n\t\t\tlog.WithField(\"id\", r.ID).Info(\"set section to remote\")\n\t\t\th, _ := c.OpponentHosts[r.ID]\n\t\t\th.Merge(r)\n\t\t\tc.OpponentHosts[r.ID] = h\n\t\t}\n\n\t\tfor _, r := range page.AlliedHosts {\n\t\t\tlog.WithField(\"id\", r.ID).Info(\"set section to local\")\n\t\t\th, _ := c.AlliedHosts[r.ID]\n\t\t\th.Merge(r)\n\t\t\tc.AlliedHosts[r.ID] = h\n\t\t}\n\n\t\tfor _, r := range page.SubjectUser {\n\t\t\tlog.WithField(\"userName\", r.UserName).Info(\"set section to local\")\n\t\t\th, _ := c.SubjectUsers[r.UserName]\n\t\t\th.Merge(r)\n\t\t\tc.SubjectUsers[r.UserName] = h\n\t\t}\n\t}\n\n\treturn &report, nil\n}", "title": "" }, { "docid": "df72a916d5131f8ac7574be5decc96dd", "score": "0.43161857", "text": "func SetStepOfRegisterLog(reqt data.ReqtData) (resp data.RespData) {\n\n\tlog.Println(\"SetStepOfRegisterLog Start\")\n\tdefer log.Println(\"SetStepOfRegisterLog End\")\n\n\t// Output data\n\toutData := make(map[string]interface{})\n\n\t// Input data\n\tinData := reqt.InData\n\tvar err error\n\n\tif inData != nil {\n\n\t\tuserID := inData[\"userId\"]\n\t\teventID := inData[\"eventId\"]\n\t\tstep := inData[\"step\"]\n\n\t\tif userID != nil && eventID != nil && step != nil {\n\n\t\t\t// Convert data\n\t\t\tuID := userID.(string)\n\t\t\teID := int64(eventID.(float64))\n\n\t\t\t// Load Register Log data\n\t\t\trLog, err2 := dbexec.LoadRegisterLog(uID, eID)\n\t\t\tif err2 == nil {\n\n\t\t\t\tif rLog.RegisterLogID > 0 {\n\t\t\t\t\tfStep := step.(float64)\n\t\t\t\t\trLog.Step = int64(fStep)\n\n\t\t\t\t\t// Update step into database\n\t\t\t\t\terr = dbexec.SetStepRegisterLog(rLog)\n\n\t\t\t\t\t// Return success\n\t\t\t\t\tif err == nil {\n\t\t\t\t\t\tresp.Success = true\n\t\t\t\t\t}\n\n\t\t\t\t} else {\n\t\t\t\t\tif err == nil {\n\t\t\t\t\t\terr = errors.New(\"No register data in DB\")\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t} else {\n\t\t\t\terr = err2\n\t\t\t}\n\n\t\t} else {\n\n\t\t\tresp.Msg = \"Bad Request, userId or eventId or step is nil\"\n\t\t\tresp.Code = 400\n\t\t}\n\n\t} else {\n\t\tresp.Msg = \"Bad Request\"\n\t\tresp.Code = 400\n\t}\n\n\t// Footer response\n\tresp.OutData = outData\n\tresp.Err = err\n\treturn resp\n\n}", "title": "" }, { "docid": "25f6f5ba80cd60f7aabc14dcc73c33a9", "score": "0.42775834", "text": "func (o *GetDeliveryNotesParams) SetPage(page *int32) {\n\to.Page = page\n}", "title": "" }, { "docid": "2420e213606233f2ea5cbf7933026169", "score": "0.42688188", "text": "func (o *GetTimeTrackingsParams) SetPage(page *int64) {\n\to.Page = page\n}", "title": "" }, { "docid": "760df38aeca12a3b6ab1c039ba581645", "score": "0.42675918", "text": "func (o *GetEventsByStackNameInWorkspaceParams) SetPage(page *int32) {\n\to.Page = page\n}", "title": "" }, { "docid": "dde9271d2e9c0b83286f917affd1dbd1", "score": "0.42468315", "text": "func (o *GetShipmentsParams) SetPage(page *int32) {\n\to.Page = page\n}", "title": "" }, { "docid": "6dd354c583dad87859dfc9457b2f85e2", "score": "0.42453682", "text": "func (settlement *Settlement) Reports(queryParams map[string]interface{}, extraHeaders map[string]string) (map[string]interface{}, error) {\n\turl := fmt.Sprintf(\"/%s%s/recon/combined\", constants.VERSION_V1, constants.SETTLEMENT_URL)\n\treturn settlement.Request.Get(url, queryParams, extraHeaders)\n}", "title": "" }, { "docid": "d3ec5e06967c7adf201121b613d2c857", "score": "0.42402893", "text": "func NewGetV1PostMortemsReportsReportIDEventsParamsWithHTTPClient(client *http.Client) *GetV1PostMortemsReportsReportIDEventsParams {\n\tvar ()\n\treturn &GetV1PostMortemsReportsReportIDEventsParams{\n\t\tHTTPClient: client,\n\t}\n}", "title": "" }, { "docid": "ba367cc24f87c86d45cb6b94d9484b58", "score": "0.42385203", "text": "func initAssessmentSubmits(submitpostid string){\r\n\tfor i,_:=range assessmentsubmits{\r\n\t\tassessmentsubmits[i].Post=submitpostid;//**\r\n\t}\r\n}", "title": "" }, { "docid": "3c1d7b5aed46a5316af96f5d084d2b48", "score": "0.42212287", "text": "func SetPageContent(ctx *context.Context, c func() types.Panel) {\n\tuser := ctx.UserValue[\"user\"].(auth.User)\n\tpanel := c()\n\tglobalConfig := config.Get()\n\ttmpl, tmplName := view.Get(globalConfig.THEME).GetTemplate(ctx.Request.Header.Get(\"X-PJAX\") == \"true\")\n\tctx.Response.Header.Add(\"Content-Type\", \"text/html; charset=utf-8\")\n\tbuf := new(bytes.Buffer)\n\ttmpl.ExecuteTemplate(buf, tmplName, types.Page{\n\t\tUser: user,\n\t\tMenu: menu.GetGlobalMenu(user),\n\t\tSystem: types.SystemInfo{\n\t\t\tglobalConfig.VERSION,\n\t\t},\n\t\tPanel: panel,\n\t\tAssertRootUrl: \"/\" + globalConfig.PREFIX,\n\t\tTitle: globalConfig.TITLE,\n\t\tLogo: globalConfig.LOGO,\n\t\tMiniLogo: globalConfig.MINILOGO,\n\t})\n\tctx.WriteString(buf.String())\n}", "title": "" }, { "docid": "3b6a2bfddd8f1ed7548035f4b6a9e6ef", "score": "0.4196293", "text": "func GetPage(w http.ResponseWriter, r *http.Request) {\n\tapiRes, status := ut.CallRequest(\"http://dummy.restapiexample.com/api/v1/employees\", nil, \"GET\", nil)\n\n\tif status == false {\n\t\tfmt.Fprintf(w, \"Request Not OK!\")\n\t\treturn\n\t}\n\n\tvar data []Dummy2\n\tvar counter int\n\tjson.Unmarshal(apiRes, &data)\n\tcounter = 0\n\tfmt.Fprintf(w, \"%30v | %v | %v\\n\", \"Name\", \"Age\", \"Salary\")\n\tfor k := range data {\n\t\tfmt.Fprintf(w, \"%30v | %v | %v\\n\", data[k].Name, data[k].Age, data[k].Salary)\n\t\tcounter++\n\t\tif counter == 10 {\n\t\t\treturn\n\t\t}\n\t}\n\tlog.Printf(\"JSON Received : %s\", apiRes)\n}", "title": "" }, { "docid": "4b491f8ae02dc35fb7b3bf4bde78b3d4", "score": "0.41862375", "text": "func (in *ActionHelpBoxCreateInput) SetPage(value string) *ActionHelpBoxCreateInput {\n\tin.Page = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin._selectedParameters[\"Page\"] = nil\n\treturn in\n}", "title": "" }, { "docid": "8aea157e362c829023cfee604d3a1685", "score": "0.41839397", "text": "func (i *WalReplicationFrameInfo) Pages(numbers []PageNumber, data unsafe.Pointer) {\n\ti.aPgno = (*C.unsigned)(&numbers[0])\n\ti.aPage = data\n}", "title": "" }, { "docid": "4a836a7f69e020b50558fe3bee3fddc5", "score": "0.41730148", "text": "func (c *ConfluenceClient) UpdatePage(title, spaceKey, body string, ID string, version, ancestor int64) {\n page := newPage(title, spaceKey)\n page.ID = ID\n page.Version = &ConfluencePageVersion{version}\n if ancestor > 0 {\n page.Ancestors = []ConfluencePageAncestor{\n ConfluencePageAncestor{ancestor},\n }\n }\n response := &ConfluencePage{}\n page.Body.Storage.Value = body\n //page.Body.Storage.Representation = \"wiki\"\n c.doRequest(\"PUT\", \"/rest/api/content/\"+ID, page, response)\n log.Println(\"Confluence page updated with ID\", response.ID, \"and version\", response.Version.Number)\n}", "title": "" }, { "docid": "9ea587d7eaca580179bc1ddc99492507", "score": "0.4168789", "text": "func (p Page) Set(key string, val interface{}) {\n\tp[key] = val\n}", "title": "" }, { "docid": "9ea587d7eaca580179bc1ddc99492507", "score": "0.4168789", "text": "func (p Page) Set(key string, val interface{}) {\n\tp[key] = val\n}", "title": "" }, { "docid": "2f56d6dff7875c328d506d7d1bf36513", "score": "0.41617683", "text": "func (m *AttackSimulationLandingPagesItemDetailsLandingPageDetailItemRequestBuilder) Get(ctx context.Context, requestConfiguration *AttackSimulationLandingPagesItemDetailsLandingPageDetailItemRequestBuilderGetRequestConfiguration)(ie233ee762e29b4ba6970aa2a2efce4b7fde11697ca9ea81099d0f8269309c1be.LandingPageDetailable, error) {\n requestInfo, err := m.ToGetRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return nil, err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n }\n res, err := m.BaseRequestBuilder.RequestAdapter.Send(ctx, requestInfo, ie233ee762e29b4ba6970aa2a2efce4b7fde11697ca9ea81099d0f8269309c1be.CreateLandingPageDetailFromDiscriminatorValue, errorMapping)\n if err != nil {\n return nil, err\n }\n if res == nil {\n return nil, nil\n }\n return res.(ie233ee762e29b4ba6970aa2a2efce4b7fde11697ca9ea81099d0f8269309c1be.LandingPageDetailable), nil\n}", "title": "" }, { "docid": "3ff5d45ac9ed0ae47f2bad1868c9f7d6", "score": "0.41391572", "text": "func (o *GetReportsByTicketParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// path param namespace\n\tif err := r.SetPathParam(\"namespace\", o.Namespace); err != nil {\n\t\treturn err\n\t}\n\n\t// path param ticketId\n\tif err := r.SetPathParam(\"ticketId\", o.TicketID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Offset != nil {\n\n\t\t// query param offset\n\t\tvar qrOffset int64\n\t\tif o.Offset != nil {\n\t\t\tqrOffset = *o.Offset\n\t\t}\n\t\tqOffset := swag.FormatInt64(qrOffset)\n\t\tif qOffset != \"\" {\n\t\t\tif err := r.SetQueryParam(\"offset\", qOffset); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// setting the default header value\n\tif err := r.SetHeaderParam(\"User-Agent\", utils.UserAgentGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif err := r.SetHeaderParam(\"X-Amzn-Trace-Id\", utils.AmazonTraceIDGen()); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0697a0b3429279b77134702b4e13577a", "score": "0.41308966", "text": "func (a *MeActionsApiService) MeOnenoteSectionsPagesCopyToSection(ctx _context.Context, onenoteSectionId string, onenotePageId string, inlineObject395 InlineObject395) (AnyOfmicrosoftGraphOnenoteOperation, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue AnyOfmicrosoftGraphOnenoteOperation\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/me/onenote/sections({onenoteSection-id})/pages({onenotePage-id})/copyToSection\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenoteSection-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenoteSectionId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject395\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v AnyOfmicrosoftGraphOnenoteOperation\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "5a0b54ed4b36e5528c30514250837582", "score": "0.41235226", "text": "func (a *MeActionsApiService) MeOnenoteSectionGroupsSectionsPagesOnenotePatchContent(ctx _context.Context, sectionGroupId string, onenoteSectionId string, onenotePageId string, inlineObject384 InlineObject384) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/me/onenote/sectionGroups({sectionGroup-id})/sections({onenoteSection-id})/pages({onenotePage-id})/onenotePatchContent\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"sectionGroup-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", sectionGroupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenoteSection-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenoteSectionId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject384\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "65e06449f46de9cff966903d3406e645", "score": "0.41184276", "text": "func (m *OnenoteRequestBuilder) SectionsById(id string)(*ibe60e1baafd5c0c7f830c971df51a300df66822516c0cfcd8a43fd2adc385c80.OnenoteSectionItemRequestBuilder) {\n urlTplParams := make(map[string]string)\n for idx, item := range m.pathParameters {\n urlTplParams[idx] = item\n }\n if id != \"\" {\n urlTplParams[\"onenoteSection%2Did\"] = id\n }\n return ibe60e1baafd5c0c7f830c971df51a300df66822516c0cfcd8a43fd2adc385c80.NewOnenoteSectionItemRequestBuilderInternal(urlTplParams, m.requestAdapter);\n}", "title": "" }, { "docid": "6c4d762cfd5314457faee9b0ac3e212d", "score": "0.4117945", "text": "func (q setQuery) Page(pageNum int) (sets []*Set, totalSetCount int, err error) {\n\treturn q.PageS(pageNum, 500)\n}", "title": "" }, { "docid": "a6c43cfd2d380d2147333f44ddec0985", "score": "0.41073462", "text": "func (p *PageIterator) setQueryParam(key, value string) {\n\tif p.paramsCount == 0 {\n\t\tp.nextURL = p.nextURL + \"?\" + fmt.Sprintf(queryPairFormat, key, url.QueryEscape(value))\n\t} else {\n\t\tp.nextURL = p.nextURL + \"&\" + fmt.Sprintf(queryPairFormat, key, url.QueryEscape(value))\n\t}\n\tp.paramsCount++\n}", "title": "" }, { "docid": "5234ff0fdd8c0631a8bcfd3aef5fad9f", "score": "0.4105696", "text": "func (a *MeActionsApiService) MeOnenotePagesParentSectionPagesOnenotePatchContent(ctx _context.Context, onenotePageId string, onenotePageId1 string, inlineObject360 InlineObject360) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/me/onenote/pages({onenotePage-id})/parentSection/pages({onenotePage-id1})/onenotePatchContent\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id1\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId1)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject360\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "78de02d17f86bd8806bf56281483573c", "score": "0.41036645", "text": "func (s *Service) Report(c context.Context, proStr, cidStr, tpStr, subType, realtimeStr, aidStr, midstr, sidStr, epidStr, dtStr, tsStr string) (err error) {\n\tvar (\n\t\ttp, stp, dt int\n\t)\n\tif tp, err = strconv.Atoi(tpStr); err != nil {\n\t\tlog.Warn(\"Report type:%s\", tpStr)\n\t}\n\tstp, _ = strconv.Atoi(subType)\n\tmid, _ := strconv.ParseInt(midstr, 10, 64)\n\taid, _ := strconv.ParseInt(aidStr, 10, 64)\n\tsid, _ := strconv.ParseInt(sidStr, 10, 64)\n\tepid, _ := strconv.ParseInt(epidStr, 10, 64)\n\tcid, _ := strconv.ParseInt(cidStr, 10, 64)\n\tif aid == 0 && cid == 0 {\n\t\treturn ecode.RequestErr\n\t}\n\tpro, _ := strconv.ParseInt(proStr, 10, 64)\n\trealtime, _ := strconv.ParseInt(realtimeStr, 10, 64)\n\tif dt, err = strconv.Atoi(dtStr); err != nil {\n\t\tdt = 2\n\t}\n\tip := metadata.String(c, metadata.RemoteIP)\n\tts, _ := strconv.ParseInt(tsStr, 10, 64)\n\thistory := &hmdl.History{Aid: aid, Sid: sid, Epid: epid, TP: int8(tp), STP: int8(stp), Cid: cid, DT: int8(dt), Pro: pro, Unix: ts}\n\targ := &hmdl.ArgHistory{Mid: mid, Realtime: realtime, RealIP: ip, History: history}\n\treturn s.hisRPC.Add(c, arg)\n}", "title": "" }, { "docid": "fd9b8eecb3eb27601b9f21253ce0b039", "score": "0.4102507", "text": "func (o *GetClubAdminsByIDParams) SetPage(page *int64) {\n\to.Page = page\n}", "title": "" }, { "docid": "b2d4e897f616e1ef1bbad6fcaae037e7", "score": "0.4101749", "text": "func (o *GetPlacementsParams) SetPage(page *int64) {\n\to.Page = page\n}", "title": "" }, { "docid": "34897b46d65d46c188a51df05a0261cf", "score": "0.40940306", "text": "func (p *PdfiumImplementation) FPDFPageObj_SetMatrix(request *requests.FPDFPageObj_SetMatrix) (*responses.FPDFPageObj_SetMatrix, error) {\n\tp.Lock()\n\tdefer p.Unlock()\n\n\tpageObjectHandle, err := p.getPageObjectHandle(request.PageObject)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmatrixPointer, _, err := p.CStructFS_MATRIX(&request.Transform)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer p.Free(matrixPointer)\n\n\tres, err := p.Module.ExportedFunction(\"FPDFPageObj_SetMatrix\").Call(p.Context, *pageObjectHandle.handle, matrixPointer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsuccess := *(*int32)(unsafe.Pointer(&res[0]))\n\tif int(success) == 0 {\n\t\treturn nil, errors.New(\"could not set page object matrix\")\n\t}\n\n\treturn &responses.FPDFPageObj_SetMatrix{}, nil\n}", "title": "" }, { "docid": "9fbb506ea39541a6efe37860070e17a6", "score": "0.40917748", "text": "func NewPostInSeries(w http.ResponseWriter, r *http.Request) {\n\tpagevars := mux.Vars(r)\n\tpageData := context.Get(r, \"PageData\").(*x.PageData)\n\tc := appengine.NewContext(r)\n\tpageData.Misc[\"SeriesJTitle\"] = pagevars[\"seriesjtitle\"]\n\tif r.Method == \"GET\" {\n\t\tif err := newPostTmpl.Execute(w, pageData); err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t}\n\t} else if r.Method == \"POST\" {\n\t\tq := datastore.NewQuery(\"PostSeries\").Filter(\"JoinedTitle = \", pagevars[\"seriesjtitle\"]).Limit(10)\n\t\tif n, err := q.Count(c); err == nil && n == 1 {\n\t\t\tvar postseries = make([]models.PostSeries, 0, 1)\n\t\t\tif keys, err := q.GetAll(c, &postseries); err == nil {\n\t\t\t\tserieskey := keys[0]\n\t\t\t\tvar post models.Post\n\t\t\t\tpost.Series = serieskey\n\t\t\t\tif title := r.PostFormValue(\"Title\"); title != \"\" {\n\t\t\t\t\tpost.Title = title\n\t\t\t\t\tpost.JoinedTitle = strings.Join(strings.Split(strings.ToLower(title), \" \"), \"-\")\n\t\t\t\t}\n\t\t\t\tif abstractmd := r.PostFormValue(\"AbstractMD\"); abstractmd != \"\" {\n\t\t\t\t\tpost.AbstractMD = abstractmd\n\t\t\t\t\tpost.AbstractHTML = string(blackfriday.MarkdownBasic([]byte(abstractmd)))\n\t\t\t\t}\n\t\t\t\tif bodymd := r.PostFormValue(\"BodyMD\"); bodymd != \"\" {\n\t\t\t\t\tpost.BodyMD = bodymd\n\t\t\t\t\tpost.BodyHTML = string(blackfriday.MarkdownBasic([]byte(bodymd)))\n\t\t\t\t}\n\t\t\t\tif tagstr := r.PostFormValue(\"Tags\"); tagstr != \"\" {\n\t\t\t\t\ttags := strings.Split(tagstr, \",\")\n\t\t\t\t\tfor i, tag := range tags {\n\t\t\t\t\t\ttags[i] = strings.Trim(tag, \" \\t\")\n\t\t\t\t\t}\n\t\t\t\t\tpost.Tags = tags\n\t\t\t\t}\n\t\t\t\tq := datastore.NewQuery(\"Post\").Filter(\"Series = \", serieskey)\n\t\t\t\tif n, err := q.Count(c); err == nil {\n\t\t\t\t\tpost.PositionInSeries = n + 1\n\t\t\t\t} else {\n\t\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tpost.Author = pageData.Author.Key\n\t\t\t\tpost.DateAdded = time.Now()\n\t\t\t\tpost.YearAdded = time.Now().Year()\n\t\t\t\tpost.MonthAdded = int(time.Now().Month())\n\t\t\t\tpost.DayAdded = time.Now().Day()\n\n\t\t\t\tif _, err := datastore.Put(c, datastore.NewIncompleteKey(c, \"Post\", nil), &post); err == nil {\n\t\t\t\t\thttp.Redirect(w, r, \"/author/\", http.StatusFound)\n\t\t\t\t\treturn\n\t\t\t\t} else {\n\t\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t} else {\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f5d835e51be4c28308ed653490c9e5d4", "score": "0.4089899", "text": "func (o *GetSyncReportsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Dir != nil {\n\n\t\t// query param dir\n\t\tvar qrDir string\n\t\tif o.Dir != nil {\n\t\t\tqrDir = *o.Dir\n\t\t}\n\t\tqDir := qrDir\n\t\tif qDir != \"\" {\n\t\t\tif err := r.SetQueryParam(\"dir\", qDir); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.NewerThan != nil {\n\n\t\t// query param newer_than\n\t\tvar qrNewerThan int64\n\t\tif o.NewerThan != nil {\n\t\t\tqrNewerThan = *o.NewerThan\n\t\t}\n\t\tqNewerThan := swag.FormatInt64(qrNewerThan)\n\t\tif qNewerThan != \"\" {\n\t\t\tif err := r.SetQueryParam(\"newer_than\", qNewerThan); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.PolicyName != nil {\n\n\t\t// query param policy_name\n\t\tvar qrPolicyName string\n\t\tif o.PolicyName != nil {\n\t\t\tqrPolicyName = *o.PolicyName\n\t\t}\n\t\tqPolicyName := qrPolicyName\n\t\tif qPolicyName != \"\" {\n\t\t\tif err := r.SetQueryParam(\"policy_name\", qPolicyName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.ReportsPerPolicy != nil {\n\n\t\t// query param reports_per_policy\n\t\tvar qrReportsPerPolicy int64\n\t\tif o.ReportsPerPolicy != nil {\n\t\t\tqrReportsPerPolicy = *o.ReportsPerPolicy\n\t\t}\n\t\tqReportsPerPolicy := swag.FormatInt64(qrReportsPerPolicy)\n\t\tif qReportsPerPolicy != \"\" {\n\t\t\tif err := r.SetQueryParam(\"reports_per_policy\", qReportsPerPolicy); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Resume != nil {\n\n\t\t// query param resume\n\t\tvar qrResume string\n\t\tif o.Resume != nil {\n\t\t\tqrResume = *o.Resume\n\t\t}\n\t\tqResume := qrResume\n\t\tif qResume != \"\" {\n\t\t\tif err := r.SetQueryParam(\"resume\", qResume); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Sort != nil {\n\n\t\t// query param sort\n\t\tvar qrSort string\n\t\tif o.Sort != nil {\n\t\t\tqrSort = *o.Sort\n\t\t}\n\t\tqSort := qrSort\n\t\tif qSort != \"\" {\n\t\t\tif err := r.SetQueryParam(\"sort\", qSort); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.State != nil {\n\n\t\t// query param state\n\t\tvar qrState string\n\t\tif o.State != nil {\n\t\t\tqrState = *o.State\n\t\t}\n\t\tqState := qrState\n\t\tif qState != \"\" {\n\t\t\tif err := r.SetQueryParam(\"state\", qState); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "68b796bbdf6c596e513a91e46475d69a", "score": "0.40898806", "text": "func (a *MeActionsApiService) MeOnenoteSectionsPagesOnenotePatchContent(ctx _context.Context, onenoteSectionId string, onenotePageId string, inlineObject396 InlineObject396) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/me/onenote/sections({onenoteSection-id})/pages({onenotePage-id})/onenotePatchContent\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenoteSection-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenoteSectionId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject396\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "a34ac61277da7c11cdc511c3c3382f39", "score": "0.40895295", "text": "func (a *MeActionsApiService) MeOnenotePagesParentSectionPagesCopyToSection(ctx _context.Context, onenotePageId string, onenotePageId1 string, inlineObject359 InlineObject359) (AnyOfmicrosoftGraphOnenoteOperation, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue AnyOfmicrosoftGraphOnenoteOperation\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/me/onenote/pages({onenotePage-id})/parentSection/pages({onenotePage-id1})/copyToSection\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id1\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId1)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject359\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v AnyOfmicrosoftGraphOnenoteOperation\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "46cb929e795a96fff3f4ef019534c089", "score": "0.40876988", "text": "func (a *MeActionsApiService) MeOnenotePagesCopyToSection(ctx _context.Context, onenotePageId string, inlineObject340 InlineObject340) (AnyOfmicrosoftGraphOnenoteOperation, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue AnyOfmicrosoftGraphOnenoteOperation\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/me/onenote/pages({onenotePage-id})/copyToSection\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject340\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v AnyOfmicrosoftGraphOnenoteOperation\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "46efdc35f12ab9c877b7c0faf220c65a", "score": "0.4084143", "text": "func (a *MeActionsApiService) MeOnenotePagesParentNotebookSectionGroupsSectionsPagesOnenotePatchContent(ctx _context.Context, onenotePageId string, sectionGroupId string, onenoteSectionId string, onenotePageId1 string, inlineObject347 InlineObject347) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/me/onenote/pages({onenotePage-id})/parentNotebook/sectionGroups({sectionGroup-id})/sections({onenoteSection-id})/pages({onenotePage-id1})/onenotePatchContent\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"sectionGroup-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", sectionGroupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenoteSection-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenoteSectionId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id1\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId1)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &inlineObject347\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "29b0d0cb5da1d6cb7b0803d423b0e73f", "score": "0.40825325", "text": "func (o *GetV1PostMortemsReportsReportIDEventsParams) WithContext(ctx context.Context) *GetV1PostMortemsReportsReportIDEventsParams {\n\to.SetContext(ctx)\n\treturn o\n}", "title": "" }, { "docid": "af15374f75c67238e83f42866fd1df80", "score": "0.40824595", "text": "func (o *GetV1PostMortemsReportsReportIDEventsParams) WithHTTPClient(client *http.Client) *GetV1PostMortemsReportsReportIDEventsParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "71c858bd62be5fe5513fd1d01e8a349f", "score": "0.40812376", "text": "func (o *GetV1PostMortemsReportsReportIDSectionsReportStepParams) SetReportID(reportID string) {\n\to.ReportID = reportID\n}", "title": "" }, { "docid": "3f022ad8ef63b05ee3821ec966c123c7", "score": "0.40793943", "text": "func (m *DeviceManagement) SetReports(value DeviceManagementReportsable)() {\n err := m.GetBackingStore().Set(\"reports\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "c60c0632683e786cbba3493abde36170", "score": "0.40789652", "text": "func CmdSimpleReport(w http.ResponseWriter, r *http.Request, xbiz *rlib.XBusiness, ui *RRuiSupport) {\n\taction := r.FormValue(\"action\")\n\t// fmt.Printf(\"Simple report: xbiz.P.BID = %d, action = %s\\n\", xbiz.P.BID, action)\n\tif xbiz.P.BID > 0 {\n\t\tui.ReportContent = websvcReportHandler(action, xbiz, ui)\n\t}\n}", "title": "" }, { "docid": "084fd6f261822bbdf2b26ee8ac53c4ea", "score": "0.4071499", "text": "func (o *PostV1PostMortemsReportsReportIDParticipantsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.V1PostMortemsReportsReportIDParticipants != nil {\n\t\tif err := r.SetBodyParam(o.V1PostMortemsReportsReportIDParticipants); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param report_id\n\tif err := r.SetPathParam(\"report_id\", o.ReportID); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cb79747106df3b9e860e8c6d4eb48a13", "score": "0.407138", "text": "func (m *ItemPreviewInfo) SetPostParameters(value *string)() {\n m.postParameters = value\n}", "title": "" }, { "docid": "bf482b458b489c6bd65e49eda4cb2d49", "score": "0.4069352", "text": "func (p *PdfiumImplementation) FPDFPageObj_SetDashArray(request *requests.FPDFPageObj_SetDashArray) (*responses.FPDFPageObj_SetDashArray, error) {\n\tp.Lock()\n\tdefer p.Unlock()\n\n\tpageObjectHandle, err := p.getPageObjectHandle(request.PageObject)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdashCountSize := uint64(uint64(len(request.DashArray)))\n\n\t// Create an array that's big enough.\n\tvalueDataPointer, err := p.FloatArrayPointer(dashCountSize)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer valueDataPointer.Free()\n\n\t// Put the values in the array.\n\tfor i := range request.DashArray {\n\t\tp.Module.Memory().WriteFloat32Le(uint32(valueDataPointer.Pointer+(p.CSizeFloat()*uint64(i))), request.DashArray[i])\n\t}\n\n\t_, err = p.Module.ExportedFunction(\"FPDFPageObj_SetDashArray\").Call(p.Context, *pageObjectHandle.handle, valueDataPointer.Pointer, dashCountSize, *(*uint64)(unsafe.Pointer(&request.DashPhase)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &responses.FPDFPageObj_SetDashArray{}, nil\n}", "title": "" }, { "docid": "b8cd116e9c088f21c3243fd02fe8c6bf", "score": "0.40668154", "text": "func (o *DeletePageParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\t// query param api-version\n\tqrAPIVersion := o.APIVersion\n\tqAPIVersion := qrAPIVersion\n\tif qAPIVersion != \"\" {\n\t\tif err := r.SetQueryParam(\"api-version\", qAPIVersion); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.Comment != nil {\n\n\t\t// query param comment\n\t\tvar qrComment string\n\t\tif o.Comment != nil {\n\t\t\tqrComment = *o.Comment\n\t\t}\n\t\tqComment := qrComment\n\t\tif qComment != \"\" {\n\t\t\tif err := r.SetQueryParam(\"comment\", qComment); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param organization\n\tif err := r.SetPathParam(\"organization\", o.Organization); err != nil {\n\t\treturn err\n\t}\n\n\t// query param path\n\tqrPath := o.Path\n\tqPath := qrPath\n\tif qPath != \"\" {\n\t\tif err := r.SetQueryParam(\"path\", qPath); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// path param project\n\tif err := r.SetPathParam(\"project\", o.Project); err != nil {\n\t\treturn err\n\t}\n\n\tif o.VersionDescriptorVersion != nil {\n\n\t\t// query param versionDescriptor.version\n\t\tvar qrVersionDescriptorVersion string\n\t\tif o.VersionDescriptorVersion != nil {\n\t\t\tqrVersionDescriptorVersion = *o.VersionDescriptorVersion\n\t\t}\n\t\tqVersionDescriptorVersion := qrVersionDescriptorVersion\n\t\tif qVersionDescriptorVersion != \"\" {\n\t\t\tif err := r.SetQueryParam(\"versionDescriptor.version\", qVersionDescriptorVersion); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.VersionDescriptorVersionOptions != nil {\n\n\t\t// query param versionDescriptor.versionOptions\n\t\tvar qrVersionDescriptorVersionOptions string\n\t\tif o.VersionDescriptorVersionOptions != nil {\n\t\t\tqrVersionDescriptorVersionOptions = *o.VersionDescriptorVersionOptions\n\t\t}\n\t\tqVersionDescriptorVersionOptions := qrVersionDescriptorVersionOptions\n\t\tif qVersionDescriptorVersionOptions != \"\" {\n\t\t\tif err := r.SetQueryParam(\"versionDescriptor.versionOptions\", qVersionDescriptorVersionOptions); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.VersionDescriptorVersionType != nil {\n\n\t\t// query param versionDescriptor.versionType\n\t\tvar qrVersionDescriptorVersionType string\n\t\tif o.VersionDescriptorVersionType != nil {\n\t\t\tqrVersionDescriptorVersionType = *o.VersionDescriptorVersionType\n\t\t}\n\t\tqVersionDescriptorVersionType := qrVersionDescriptorVersionType\n\t\tif qVersionDescriptorVersionType != \"\" {\n\t\t\tif err := r.SetQueryParam(\"versionDescriptor.versionType\", qVersionDescriptorVersionType); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// path param wikiIdentifier\n\tif err := r.SetPathParam(\"wikiIdentifier\", o.WikiIdentifier); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d24dd647bedc6b7911c9996fc24f91d6", "score": "0.40652522", "text": "func setNewEntity(w http.ResponseWriter, r *http.Request, modelVar string) {\n\tc := appengine.NewContext(r)\n\tmodelName := modelNames[modelVar]\n\tmodelStruct := models[modelVar]\n\ts := reflect.ValueOf(modelStruct).Elem()\n\ttypeOfT := s.Type()\n\tkeyName := r.FormValue(\"url\")\n\tif keyName == \"\" {\n\t\tkeyName = time.Now().Format(\"20060102150405\")\n\t}\n\tkey := datastore.NewKey(c, modelName, keyName, 0, nil)\n\tfor i := 0; i < s.NumField(); i++ {\n\t\t//log.Println(typeOfT.Field(i).Name)\n\t\t//log.Println(typeOfT.Field(i).Tag.Get(\"datastore_type\"))\n\t\t//log.Println(r.FormValue(typeOfT.Field(i).Tag.Get(\"json\")))\n\t\tif typeOfT.Field(i).Tag.Get(\"verbose_name\") == \"-\" {\n\t\t\tsetDefaultErr := reflections.SetField(modelStruct, typeOfT.Field(i).Name, defaultValues[typeOfT.Field(i).Tag.Get(\"datastore_type\")])\n\t\t\tif setDefaultErr != nil {\n\t\t\t\tcontinue\n\t\t\t\t//http.Error(w, setDefaultErr.Error(), http.StatusInternalServerError)\n\t\t\t\t//return\n\t\t\t}\n\t\t\tif typeOfT.Field(i).Name == \"PageOrder\" {\n\t\t\t\tmaxPageOrder := getPageOrderMaxValue(c, modelVar)\n\t\t\t\tmaxPageOrder = maxPageOrder + 1\n\t\t\t\tsetPageOrderErr := reflections.SetField(modelStruct, \"PageOrder\", maxPageOrder)\n\t\t\t\tif setPageOrderErr != nil {\n\t\t\t\t\tc.Errorf(\"cannot set value of max page order\") //use default value\n\t\t\t\t}\n\t\t\t\tpageOrderIncre(c, modelVar)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\tswitch typeOfT.Field(i).Tag.Get(\"datastore_type\") {\n\t\tcase \"Boolean\":\n\t\t\terr := reflections.SetField(modelStruct, typeOfT.Field(i).Name, r.FormValue(typeOfT.Field(i).Tag.Get(\"json\")) == \"on\")\n\t\t\tif err != nil {\n\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\tcase \"Integer\":\n\t\t\ttmpStringInt, _ := strconv.Atoi(r.FormValue(typeOfT.Field(i).Tag.Get(\"json\")))\n\t\t\terr := reflections.SetField(modelStruct, typeOfT.Field(i).Name, tmpStringInt)\n\t\t\tif err != nil {\n\t\t\t\tsetDefaultErr := reflections.SetField(modelStruct, typeOfT.Field(i).Name, 0)\n\t\t\t\tif setDefaultErr != nil {\n\t\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\tcase \"DateTime\":\n\t\t\tif r.FormValue(typeOfT.Field(i).Tag.Get(\"json\")) == \"\" {\n\t\t\t\terr := reflections.SetField(modelStruct, typeOfT.Field(i).Name, defaultValues[typeOfT.Field(i).Tag.Get(\"datastore_type\")])\n\t\t\t\tif err != nil {\n\t\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tdateyyyymmddhhmm, _ := time.Parse(\"2006-01-02 15:04\", r.FormValue(typeOfT.Field(i).Tag.Get(\"json\")))\n\t\t\terr := reflections.SetField(modelStruct, typeOfT.Field(i).Name, dateyyyymmddhhmm)\n\t\t\tif err != nil {\n\t\t\t\tsetDefaultErr := reflections.SetField(modelStruct, typeOfT.Field(i).Name, defaultValues[typeOfT.Field(i).Tag.Get(\"datastore_type\")])\n\t\t\t\tif setDefaultErr != nil {\n\t\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\terr := reflections.SetField(modelStruct, typeOfT.Field(i).Name, r.FormValue(typeOfT.Field(i).Tag.Get(\"json\")))\n\t\t\tif err != nil {\n\t\t\t\tsetDefaultErr := reflections.SetField(modelStruct, typeOfT.Field(i).Name, defaultValues[typeOfT.Field(i).Tag.Get(\"datastore_type\")])\n\t\t\t\tif setDefaultErr != nil {\n\t\t\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\turlValue, err := reflections.GetField(modelStruct, \"URL\")\n\tif urlValue == \"\" {\n\t\tsetURLErr := reflections.SetField(modelStruct, \"URL\", keyName)\n\t\tif setURLErr != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t}\n\tbeforePut(modelStruct)\n\t_, putErr := datastore.Put(c, key, modelStruct)\n\tif putErr != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tchildKey := datastore.NewIncompleteKey(c, modelName, key)\n\tsetErr := reflections.SetField(modelStruct, \"Archive\", true)\n\tif setErr != nil {\n\t\thttp.Error(w, setErr.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\t_, childPutErr := datastore.Put(c, childKey, modelStruct)\n\tif childPutErr != nil {\n\t\thttp.Error(w, putErr.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tsetDataSearchIndex(modelVar, keyName, modelStruct, c, w)\n}", "title": "" }, { "docid": "5a39926d3f2f4c7c50c963a2a13457d2", "score": "0.4062095", "text": "func (o *GetCallRecordingitemsParams) SetPage(page string) {\n\to.Page = page\n}", "title": "" }, { "docid": "7b5ff9835465ea89fdda61ee257e027b", "score": "0.40602955", "text": "func (m *PrinterCapabilities) SetPagesPerSheet(value []int32)() {\n err := m.GetBackingStore().Set(\"pagesPerSheet\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "80a266ae5611e44884c741359df01d39", "score": "0.40518832", "text": "func RegisterReportPostHandler(a Adder, router *mux.Router) {\n\tpost := router.Methods(\"POST\").Subrouter()\n\tpost.HandleFunc(\"/topology-api/report\", requestContextDecorator(func(ctx context.Context, w http.ResponseWriter, r *http.Request) {\n\t\tvar (\n\t\t\tbuf = &bytes.Buffer{}\n\t\t\treader = io.TeeReader(r.Body, buf)\n\t\t)\n\n\t\tgzipped := strings.Contains(r.Header.Get(\"Content-Encoding\"), \"gzip\")\n\t\tif !gzipped {\n\t\t\treader = io.TeeReader(r.Body, gzip.NewWriter(buf))\n\t\t}\n\n\t\tcontentType := r.Header.Get(\"Content-Type\")\n\t\tvar isMsgpack int\n\t\tswitch {\n\t\tcase strings.HasPrefix(contentType, \"application/msgpack\"):\n\t\t\tisMsgpack = 1\n\t\tcase strings.HasPrefix(contentType, \"application/json\"):\n\t\t\tisMsgpack = 0\n\t\tcase strings.HasPrefix(contentType, \"application/binc\"):\n\t\t\tisMsgpack = 2\n\t\tdefault:\n\t\t\trespondWith(ctx, w, http.StatusBadRequest, fmt.Errorf(\"Unsupported Content-Type: %v\", contentType))\n\t\t\treturn\n\t\t}\n\n\t\trpt, err := report.MakeFromBinary(ctx, reader, gzipped, isMsgpack)\n\t\tif err != nil {\n\t\t\trespondWith(ctx, w, http.StatusBadRequest, err)\n\t\t\treturn\n\t\t}\n\n\t\t// a.Add(..., buf) assumes buf is gzip'd msgpack\n\t\t//if !isMsgpack {\n\t\t//\tbuf, _ = rpt.WriteBinary()\n\t\t//}\n\n\t\t//if err := a.Add(ctx, *rpt, buf.Bytes()); err != nil {\n\t\tvar unusedParam []byte\n\t\tif err := a.Add(ctx, *rpt, unusedParam); err != nil {\n\t\t\tlog.Errorf(\"Error Adding report: %v\", err)\n\t\t\trespondWith(ctx, w, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\tw.WriteHeader(http.StatusOK)\n\t}))\n}", "title": "" }, { "docid": "2dda2ee257b92246ba4e01eb0b21a0bd", "score": "0.40501946", "text": "func (p *PdfiumImplementation) FPDFPageObjMark_SetIntParam(request *requests.FPDFPageObjMark_SetIntParam) (*responses.FPDFPageObjMark_SetIntParam, error) {\n\tp.Lock()\n\tdefer p.Unlock()\n\n\tdocumentHandle, err := p.getDocumentHandle(request.Document)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpageObjectHandle, err := p.getPageObjectHandle(request.PageObject)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpageObjectMarkHandle, err := p.getPageObjectMarkHandle(request.PageObjectMark)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tkeyPointer, err := p.CString(request.Key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer keyPointer.Free()\n\n\tres, err := p.Module.ExportedFunction(\"FPDFPageObjMark_SetIntParam\").Call(p.Context, *documentHandle.handle, *pageObjectHandle.handle, *pageObjectMarkHandle.handle, keyPointer.Pointer, *(*uint64)(unsafe.Pointer(&request.Value)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsuccess := *(*int32)(unsafe.Pointer(&res[0]))\n\tif int(success) == 0 {\n\t\treturn nil, errors.New(\"could not set value\")\n\t}\n\n\treturn &responses.FPDFPageObjMark_SetIntParam{}, nil\n}", "title": "" }, { "docid": "906cd949290d9d7b40123d2e2329ed24", "score": "0.40497547", "text": "func prepareSubmissionPost(assessmentpost string,user string,notanswered,correct,score,attempts int) SubmissionPost{\r\n\tvar submissionpost SubmissionPost\r\n\tanswered:=len(assessments)-notanswered\r\n\tsubmissionpost.Submittable=true\r\n\tsubmissionpost.Parent=assessmentpost//**\r\n\tsubmissionpost.Type=\"Assessment\"\r\n\tsubmissionpost.ResponseType=\"submission\"\r\n\tsubmissionpost.Author=user\r\n\tsubmissionpost.Assessment.Answered=answered\r\n\tsubmissionpost.Assessment.Correct=correct\r\n\tsubmissionpost.Assessment.Status=\"success\"\r\n\tsubmissionpost.Assessment.Timespent=30\r\n\tsubmissionpost.Assessment.Attempts=attempts+1\r\n\tsubmissionpost.Assessment.Score=score\r\n\tsubmissionpost.Task.Grade=score\r\n\tsubmissionpost.Task.Graded=true\r\n\tsubmissionpost.Stars=1\r\n\treturn submissionpost\r\n}", "title": "" }, { "docid": "a06e7ef99ab11abc5638ec08ed64c969", "score": "0.40321925", "text": "func (o *AllHomepageSectionsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Fields != nil {\n\n\t\t// query param fields\n\t\tvar qrFields string\n\t\tif o.Fields != nil {\n\t\t\tqrFields = *o.Fields\n\t\t}\n\t\tqFields := qrFields\n\t\tif qFields != \"\" {\n\t\t\tif err := r.SetQueryParam(\"fields\", qFields); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Sorts != nil {\n\n\t\t// query param sorts\n\t\tvar qrSorts string\n\t\tif o.Sorts != nil {\n\t\t\tqrSorts = *o.Sorts\n\t\t}\n\t\tqSorts := qrSorts\n\t\tif qSorts != \"\" {\n\t\t\tif err := r.SetQueryParam(\"sorts\", qSorts); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "241a0623a3eea8eb6fbd6d770db5bdd4", "score": "0.40314585", "text": "func (p *PdfiumImplementation) FPDFPageObj_SetDashPhase(request *requests.FPDFPageObj_SetDashPhase) (*responses.FPDFPageObj_SetDashPhase, error) {\n\tp.Lock()\n\tdefer p.Unlock()\n\n\tpageObjectHandle, err := p.getPageObjectHandle(request.PageObject)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tres, err := p.Module.ExportedFunction(\"FPDFPageObj_SetDashPhase\").Call(p.Context, *pageObjectHandle.handle, *(*uint64)(unsafe.Pointer(&request.DashPhase)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsuccess := *(*int32)(unsafe.Pointer(&res[0]))\n\tif int(success) == 0 {\n\t\treturn nil, errors.New(\"could not set dash phase\")\n\t}\n\n\treturn &responses.FPDFPageObj_SetDashPhase{}, nil\n}", "title": "" }, { "docid": "18e22ef0e6bc8b54c81305ff7187928a", "score": "0.40286034", "text": "func (g *GameResultsPage) setTotalPages(p int) {\n\tg.TotalPages = p\n}", "title": "" }, { "docid": "a90e6fe84907e4f398800de383e3f8e5", "score": "0.4027809", "text": "func (o *GetPlacementsParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Accept != nil {\n\n\t\t// header param Accept\n\t\tif err := r.SetHeaderParam(\"Accept\", *o.Accept); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\tif o.ContentType != nil {\n\n\t\t// header param Content-Type\n\t\tif err := r.SetHeaderParam(\"Content-Type\", *o.ContentType); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\tif o.Limit != nil {\n\n\t\t// query param limit\n\t\tvar qrLimit int64\n\t\tif o.Limit != nil {\n\t\t\tqrLimit = *o.Limit\n\t\t}\n\t\tqLimit := swag.FormatInt64(qrLimit)\n\t\tif qLimit != \"\" {\n\t\t\tif err := r.SetQueryParam(\"limit\", qLimit); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.Page != nil {\n\n\t\t// query param page\n\t\tvar qrPage int64\n\t\tif o.Page != nil {\n\t\t\tqrPage = *o.Page\n\t\t}\n\t\tqPage := swag.FormatInt64(qrPage)\n\t\tif qPage != \"\" {\n\t\t\tif err := r.SetQueryParam(\"page\", qPage); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.TemplateFile != nil {\n\n\t\t// query param template_file\n\t\tvar qrTemplateFile string\n\t\tif o.TemplateFile != nil {\n\t\t\tqrTemplateFile = *o.TemplateFile\n\t\t}\n\t\tqTemplateFile := qrTemplateFile\n\t\tif qTemplateFile != \"\" {\n\t\t\tif err := r.SetQueryParam(\"template_file\", qTemplateFile); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.WidgetTemplateKind != nil {\n\n\t\t// query param widget_template_kind\n\t\tvar qrWidgetTemplateKind string\n\t\tif o.WidgetTemplateKind != nil {\n\t\t\tqrWidgetTemplateKind = *o.WidgetTemplateKind\n\t\t}\n\t\tqWidgetTemplateKind := qrWidgetTemplateKind\n\t\tif qWidgetTemplateKind != \"\" {\n\t\t\tif err := r.SetQueryParam(\"widget_template_kind\", qWidgetTemplateKind); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.WidgetTemplateUUID != nil {\n\n\t\t// query param widget_template_uuid\n\t\tvar qrWidgetTemplateUUID strfmt.UUID\n\t\tif o.WidgetTemplateUUID != nil {\n\t\t\tqrWidgetTemplateUUID = *o.WidgetTemplateUUID\n\t\t}\n\t\tqWidgetTemplateUUID := qrWidgetTemplateUUID.String()\n\t\tif qWidgetTemplateUUID != \"\" {\n\t\t\tif err := r.SetQueryParam(\"widget_template_uuid\", qWidgetTemplateUUID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.WidgetUUID != nil {\n\n\t\t// query param widget_uuid\n\t\tvar qrWidgetUUID strfmt.UUID\n\t\tif o.WidgetUUID != nil {\n\t\t\tqrWidgetUUID = *o.WidgetUUID\n\t\t}\n\t\tqWidgetUUID := qrWidgetUUID.String()\n\t\tif qWidgetUUID != \"\" {\n\t\t\tif err := r.SetQueryParam(\"widget_uuid\", qWidgetUUID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f20acaff158e59392d349a2ce7b4e47a", "score": "0.40229344", "text": "func (a *API) DoctorReportsGet(r *gin.Context) {\n\tvar (\n\t\tincludeLesion = r.Query(\"include_lesion\") == \"true\"\n\t\tincludeBodyPart = r.Query(\"include_body_part\") == \"true\"\n\t\tincludeAnswers = r.Query(\"include_answers\") == \"true\"\n\t\tincludeQuestions = r.Query(\"include_questions\") == \"true\"\n\t)\n\n\tidString := r.Param(\"report\")\n\tid, err := types.StringToUUID(idString)\n\tif err != nil {\n\t\tr.AbortWithStatusJSON(http.StatusBadRequest, gin.H{\n\t\t\t\"error\": \"Invalid ID supplied: \" + err.Error(),\n\t\t})\n\t\treturn\n\t}\n\n\treport, err := models.GetReport(r, a.DB, id)\n\tif err != nil {\n\t\tr.AbortWithStatusJSON(http.StatusNotFound, gin.H{\n\t\t\t\"error\": \"Report not found\",\n\t\t})\n\t\treturn\n\t}\n\n\tvar lesion *models.Lesion\n\tif includeLesion {\n\t\tlesion, err = models.GetLesion(r, a.DB, report.LesionID)\n\t\tif err != nil {\n\t\t\tr.AbortWithStatusJSON(http.StatusNotFound, gin.H{\n\t\t\t\t\"error\": \"Lesion not found\",\n\t\t\t})\n\t\t\treturn\n\t\t}\n\t}\n\n\tvar bodyPart *models.BodyPart\n\tif includeLesion && includeBodyPart {\n\t\tbodyPart, err = models.GetBodyPart(r, a.DB, lesion.BodyPartID)\n\t\tif err != nil {\n\t\t\tr.AbortWithStatusJSON(http.StatusNotFound, gin.H{\n\t\t\t\t\"error\": \"Body part not found\",\n\t\t\t})\n\t\t\treturn\n\t\t}\n\t}\n\n\tvar answers []*extAnswer\n\tif includeAnswers {\n\t\tsubrows, err := a.DB.QueryEx(\n\t\t\tr,\n\t\t\t`SELECT\n\t\t\t\t\treport_answers.id,\n\t\t\t\t\treport_answers.report_id,\n\t\t\t\t\treport_answers.question_id,\n\t\t\t\t\treport_answers.answer,\n\t\t\t\t\tquestions.id,\n\t\t\t\t\tquestions.name,\n\t\t\t\t\tquestions.type,\n\t\t\t\t\tquestions.answers,\n\t\t\t\t\tquestions.displayed,\n\t\t\t\t\tquestions.order,\n\t\t\t\t\tquestions.created_at,\n\t\t\t\t\tquestions.updated_at\n\t\t\t\tFROM report_answers\n\t\t\t\tLEFT JOIN questions ON questions.id = report_answers.question_id\n\t\t\t\tWHERE report_answers.report_id = $1\n\t\t\t\tORDER BY questions.order ASC`,\n\t\t\tnil,\n\t\t\t&report.ID,\n\t\t)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Error while querying the answers\", err)\n\t\t\tr.AbortWithStatusJSON(http.StatusInternalServerError, gin.H{\n\t\t\t\t\"error\": \"Unable to query the answers\",\n\t\t\t})\n\t\t\treturn\n\t\t}\n\n\t\tfor subrows.Next() {\n\t\t\tsubitem := &extAnswer{\n\t\t\t\tReportAnswer: &models.ReportAnswer{},\n\t\t\t\tQuestion: &models.Question{},\n\t\t\t}\n\n\t\t\tif err := subrows.Scan(\n\t\t\t\t&subitem.ReportAnswer.ID, // report_answers.id,\n\t\t\t\t&subitem.ReportAnswer.ReportID, // report_answers.report_id,\n\t\t\t\t&subitem.ReportAnswer.QuestionID, // report_answers.question_id,\n\t\t\t\t&subitem.ReportAnswer.Answer, // report_answers.answer,\n\t\t\t\t&subitem.Question.ID, // questions.id,\n\t\t\t\t&subitem.Question.Name, // questions.name,\n\t\t\t\t&subitem.Question.Type, // questions.type,\n\t\t\t\t&subitem.Question.Answers, // questions.answers,\n\t\t\t\t&subitem.Question.Displayed, // questions.displayed,\n\t\t\t\t&subitem.Question.Order, // questions.order,\n\t\t\t\t&subitem.Question.CreatedAt, // questions.created_at,\n\t\t\t\t&subitem.Question.UpdatedAt, // questions.updated_at\n\t\t\t); err != nil {\n\t\t\t\tr.AbortWithStatusJSON(http.StatusInternalServerError, gin.H{\n\t\t\t\t\t\"error\": \"Unable to scan the answers\",\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif !includeQuestions {\n\t\t\t\tsubitem.Question = nil\n\t\t\t}\n\n\t\t\tanswers = append(answers, subitem)\n\t\t}\n\t}\n\n\tr.JSON(http.StatusOK, doctorReport{\n\t\tReport: report,\n\t\tLesion: lesion,\n\t\tBodyPart: bodyPart,\n\t\tAnswers: answers,\n\t})\n}", "title": "" }, { "docid": "8db2cf05bea04957c1d1e50e92391674", "score": "0.4012219", "text": "func (o *GetParkingGaragesParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tr.SetTimeout(o.timeout)\n\tvar res []error\n\n\tif o.CentreID != nil {\n\n\t\t// query param centre_id\n\t\tvar qrCentreID string\n\t\tif o.CentreID != nil {\n\t\t\tqrCentreID = *o.CentreID\n\t\t}\n\t\tqCentreID := qrCentreID\n\t\tif qCentreID != \"\" {\n\t\t\tif err := r.SetQueryParam(\"centre_id\", qCentreID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tvaluesFields := o.Fields\n\n\tjoinedFields := swag.JoinByFormat(valuesFields, \"csv\")\n\t// query array param fields\n\tif err := r.SetQueryParam(\"fields\", joinedFields...); err != nil {\n\t\treturn err\n\t}\n\n\tif o.Page != nil {\n\n\t\t// query param page\n\t\tvar qrPage int64\n\t\tif o.Page != nil {\n\t\t\tqrPage = *o.Page\n\t\t}\n\t\tqPage := swag.FormatInt64(qrPage)\n\t\tif qPage != \"\" {\n\t\t\tif err := r.SetQueryParam(\"page\", qPage); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif o.PerPage != nil {\n\n\t\t// query param per_page\n\t\tvar qrPerPage int64\n\t\tif o.PerPage != nil {\n\t\t\tqrPerPage = *o.PerPage\n\t\t}\n\t\tqPerPage := swag.FormatInt64(qrPerPage)\n\t\tif qPerPage != \"\" {\n\t\t\tif err := r.SetQueryParam(\"per_page\", qPerPage); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "521af41ba97d37ef70ff0dd49f1fd539", "score": "0.40120703", "text": "func (b *Book) SetPages(numPages int) {\n\tb.pages = numPages;\n}", "title": "" }, { "docid": "059b3a4e942fee8d0380710642e6ad66", "score": "0.4010866", "text": "func (this *Controller4) Get() {\n \n \n this.Ctx.ResponseWriter.Write([]byte(page)) \n}", "title": "" }, { "docid": "11d69bb0f0e55ced4f42dae3df260677", "score": "0.40085584", "text": "func (o *GetTimeTrackingsParams) WithPage(page *int64) *GetTimeTrackingsParams {\n\to.SetPage(page)\n\treturn o\n}", "title": "" }, { "docid": "00fd0aa21271706ca92b76f9f1457930", "score": "0.40071175", "text": "func (this *Device) controlSetReport(data []byte) (n int, err error) {\n\n\treturn this.Control(\n\t\tReqDirectionOut | ReqTypeClass | ReqRecipInterface,\n\t\tReqSetReport,\n\t\tFeatureReport,\n\t\tControlInterface,\n\t\tdata,\n\t)\n}", "title": "" }, { "docid": "e0373d7c41995205d4eba11cfdf88c86", "score": "0.40069786", "text": "func PostProcess() {\n\t// Set REPORT_DIR to ARTIFACTS if ARTIFACTS is set.\n\tartifacts := viper.GetString(Artifacts)\n\tif artifacts != \"\" {\n\t\tlog.Printf(\"Found an ARTIFACTS directory, using that for the REPORT_DIR.\")\n\t\tviper.Set(ReportDir, artifacts)\n\t}\n}", "title": "" }, { "docid": "df9b6c67b3d8ba91d6ab821fd440045e", "score": "0.39957514", "text": "func (o *PostV1PostMortemsReportsReportIDParticipantsParams) WithV1PostMortemsReportsReportIDParticipants(v1PostMortemsReportsReportIDParticipants *models.PostV1PostMortemsReportsReportIDParticipants) *PostV1PostMortemsReportsReportIDParticipantsParams {\n\to.SetV1PostMortemsReportsReportIDParticipants(v1PostMortemsReportsReportIDParticipants)\n\treturn o\n}", "title": "" }, { "docid": "56b54694715a365fbc7a49479e2eecd1", "score": "0.39912245", "text": "func handleBuilderPagePost(c *router.Context) error {\n\tif allow, err := auth.IsMember(c.Context, changeBuilderSettingsGroup); err != nil {\n\t\treturn err\n\t} else if !allow {\n\t\tlogging.Warningf(c.Context, \"%s cannot change builder settings\", auth.CurrentIdentity(c.Context))\n\t\thttp.Error(c.Writer, \"Access denied\", http.StatusForbidden)\n\t\treturn nil\n\t}\n\n\tid, err := parseBuilderIDFromRequest(&c.Params)\n\tif err != nil {\n\t\thttp.Error(c.Writer, err.Error(), http.StatusBadRequest)\n\t\treturn nil\n\t}\n\n\tbuilder := &storage.Builder{ID: id}\n\tswitch err := datastore.Get(c.Context, builder); {\n\tcase err == datastore.ErrNoSuchEntity:\n\t\thttp.NotFound(c.Writer, c.Request)\n\t\treturn nil\n\tcase err != nil:\n\t\treturn err\n\t}\n\n\tswitch c.Request.FormValue(\"action\") {\n\tcase \"update\":\n\t\treturn updateBuilder(c, builder)\n\tcase \"analyze\":\n\t\treturn analyzeBuilder(c, builder)\n\tdefault:\n\t\thttp.Error(c.Writer, \"invalid action\", http.StatusBadRequest)\n\t\treturn nil\n\t}\n}", "title": "" } ]
d5cb9c89482ebca97cc1bf019e9e81a9
Add a new validation method for a given struct tag. If a validation method already exists this will return an error
[ { "docid": "8cc21ac870e5fa8be7e6d06ab53db092", "score": "0.77093893", "text": "func Add(tag string, method ValidatorFunc) (err error) {\n\tif _, ok := rules[tag]; ok {\n\t\treturn fmt.Errorf(\"Validation method for '%s' already exists\", tag)\n\t}\n\n\trules[tag] = method\n\treturn\n}", "title": "" } ]
[ { "docid": "08a311a90be49bbff6cde0fa77090a1f", "score": "0.6299513", "text": "func AddCustomValidation(tagName string, isValid func(string) bool) {\n\tcustomValidation[tagName] = isValid\n}", "title": "" }, { "docid": "bd9ad13625e4078abd2add91b08574ee", "score": "0.57914436", "text": "func Get(tag string) (method ValidatorFunc, err error) {\n\tif m, ok := rules[tag]; !ok {\n\t\treturn nil, ErrNoValidationMethod{Tag: tag}\n\t} else {\n\t\treturn m, nil\n\t}\n}", "title": "" }, { "docid": "5555c73fd02b64f4755ccfa0105bb59d", "score": "0.53545463", "text": "func (m *MethodExpr) Validate() error {\n\tverr := new(eval.ValidationErrors)\n\tverr.Merge(m.Payload.Validate(\"payload\", m))\n\t// validate security scheme requirements\n\tvar requirements []*SecurityExpr\n\tif len(m.Requirements) > 0 {\n\t\trequirements = m.Requirements\n\t} else if len(m.Service.Requirements) > 0 {\n\t\trequirements = m.Service.Requirements\n\t} else if len(Root.API.Requirements) > 0 {\n\t\trequirements = Root.API.Requirements\n\t}\n\tvar (\n\t\thasBasicAuth bool\n\t\thasAPIKey bool\n\t\thasJWT bool\n\t\thasOAuth bool\n\t)\n\tfor _, r := range requirements {\n\t\tfor _, s := range r.Schemes {\n\t\t\tverr.Merge(s.Validate())\n\t\t\tswitch s.Kind {\n\t\t\tcase BasicAuthKind:\n\t\t\t\thasBasicAuth = true\n\t\t\t\tif !hasTag(m.Payload, \"security:username\") {\n\t\t\t\t\tverr.Add(m, \"payload of method %q of service %q does not define a username attribute, use Username to define one\", m.Name, m.Service.Name)\n\t\t\t\t}\n\t\t\t\tif !hasTag(m.Payload, \"security:password\") {\n\t\t\t\t\tverr.Add(m, \"payload of method %q of service %q does not define a password attribute, use Password to define one\", m.Name, m.Service.Name)\n\t\t\t\t}\n\t\t\tcase APIKeyKind:\n\t\t\t\thasAPIKey = true\n\t\t\t\tif !hasTag(m.Payload, \"security:apikey:\"+s.SchemeName) {\n\t\t\t\t\tverr.Add(m, \"payload of method %q of service %q does not define an API key attribute, use APIKey to define one\", m.Name, m.Service.Name)\n\t\t\t\t}\n\t\t\tcase JWTKind:\n\t\t\t\thasJWT = true\n\t\t\t\tif !hasTag(m.Payload, \"security:token\") {\n\t\t\t\t\tverr.Add(m, \"payload of method %q of service %q does not define a JWT attribute, use Token to define one\", m.Name, m.Service.Name)\n\t\t\t\t}\n\t\t\tcase OAuth2Kind:\n\t\t\t\thasOAuth = true\n\t\t\t\tif !hasTag(m.Payload, \"security:accesstoken\") {\n\t\t\t\t\tverr.Add(m, \"payload of method %q of service %q does not define a OAuth2 access token attribute, use AccessToken to define one\", m.Name, m.Service.Name)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tfor _, scope := range r.Scopes {\n\t\t\tfound := false\n\t\t\tfor _, s := range r.Schemes {\n\t\t\t\tif s.Kind == BasicAuthKind || s.Kind == APIKeyKind || s.Kind == OAuth2Kind || s.Kind == JWTKind {\n\t\t\t\t\tfor _, se := range s.Scopes {\n\t\t\t\t\t\tif se.Name == scope {\n\t\t\t\t\t\t\tfound = true\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !found {\n\t\t\t\tverr.Add(m, \"security scope %q not found in any of the security schemes.\", scope)\n\t\t\t}\n\t\t}\n\t}\n\tif !hasBasicAuth {\n\t\tif hasTag(m.Payload, \"security:username\") {\n\t\t\tverr.Add(m, \"payload of method %q of service %q defines a username attribute, but no basic auth security scheme exist\", m.Name, m.Service.Name)\n\t\t}\n\t\tif hasTag(m.Payload, \"security:password\") {\n\t\t\tverr.Add(m, \"payload of method %q of service %q defines a password attribute, but no basic auth security scheme exist\", m.Name, m.Service.Name)\n\t\t}\n\t}\n\tif !hasAPIKey {\n\t\tif hasTagPrefix(m.Payload, \"security:apikey\") {\n\t\t\tverr.Add(m, \"payload of method %q of service %q defines an API key attribute, but no APIKey security scheme exist\", m.Name, m.Service.Name)\n\t\t}\n\t}\n\tif !hasJWT {\n\t\tif hasTag(m.Payload, \"security:token\") {\n\t\t\tverr.Add(m, \"payload of method %q of service %q defines a JWT token attribute, but no JWT auth security scheme exist\", m.Name, m.Service.Name)\n\t\t}\n\t}\n\tif !hasOAuth {\n\t\tif hasTag(m.Payload, \"security:accesstoken\") {\n\t\t\tverr.Add(m, \"payload of method %q of service %q defines a OAuth2 access token attribute, but no OAuth2 security scheme exist\", m.Name, m.Service.Name)\n\t\t}\n\t}\n\tif m.StreamingPayload.Type != Empty {\n\t\tverr.Merge(m.StreamingPayload.Validate(\"streaming_payload\", m))\n\t}\n\tif m.Result.Type != Empty {\n\t\tverr.Merge(m.Result.Validate(\"result\", m))\n\t}\n\tfor i, e := range m.Errors {\n\t\tif err := e.Validate(); err != nil {\n\t\t\tif verrs, ok := err.(*eval.ValidationErrors); ok {\n\t\t\t\tverr.Merge(verrs)\n\t\t\t}\n\t\t}\n\t\tfor j, e2 := range m.Errors {\n\t\t\t// If an object type is used to define more than one errors validate the\n\t\t\t// presence of struct:error:name meta in the object type.\n\t\t\tif i != j && e.Type == e2.Type && IsObject(e.Type) {\n\t\t\t\tvar found bool\n\t\t\t\twalkAttribute(e.AttributeExpr, func(name string, att *AttributeExpr) error {\n\t\t\t\t\tif _, ok := att.Meta[\"struct:error:name\"]; ok {\n\t\t\t\t\t\tfound = true\n\t\t\t\t\t\treturn fmt.Errorf(\"struct:error:name found: stop iteration\")\n\t\t\t\t\t}\n\t\t\t\t\treturn nil\n\t\t\t\t})\n\t\t\t\tif !found {\n\t\t\t\t\tverr.Add(e, \"type %q is used to define multiple errors and must identify the attribute containing the error name with ErrorName\", e.AttributeExpr.Type.Name())\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn verr\n}", "title": "" }, { "docid": "11d9cacafc1767e50d20cfea7f877184", "score": "0.5309165", "text": "func WithValidMethods(valid []string) ParserOption {\n\treturn func(p *Parser) {\n\t\tp.validMethods = valid\n\t}\n}", "title": "" }, { "docid": "37176aed330f037ca922bfe4172f780b", "score": "0.5290069", "text": "func (v *Validator) Add(n string, fn ValidatorFunc) *Validator {\n\tv.validators[n] = fn\n\n\treturn v\n}", "title": "" }, { "docid": "c635a526885eac3057cfb92110b2b59f", "score": "0.5162613", "text": "func (c *CFlags) AddValidator(name string, fn OptCheckFn) {\n\tc.ConfigOpt(name, func(opt *FlagOpt) {\n\t\topt.Validator = fn\n\t})\n}", "title": "" }, { "docid": "50204a6aba449d73b655b8056071adad", "score": "0.5003736", "text": "func (t *Named) AddMethod(m *Func)", "title": "" }, { "docid": "bcaf38025392623d740ff0085deccb33", "score": "0.497939", "text": "func ValidateStruct(v interface{}, d func() string) error {\n\tclient := kernel.GetClient()\n\treturn client.Types().ValidateStruct(v, d)\n}", "title": "" }, { "docid": "b37986f5a0f7ecff4a26c2799470d381", "score": "0.4978082", "text": "func getValidatorFromTag(field reflect.StructField) Validator {\n\ttags := field.Tag\n\ttypes := field.Type.Kind()\n\tswitch types {\n\tcase reflect.String:\n\t\tv := validators.StringValidator{}\n\t\tvp := &v\n\t\tvp.SetProperties(tags)\n\t\treturn vp\n\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\n\t\tv := validators.IntegerNumberValidator{}\n\t\tvp := &v\n\t\tvp.SetProperties(tags, types)\n\t\treturn vp\n\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64:\n\t\tv := validators.IntegerNumberValidator{}\n\t\tvp := &v\n\t\tvp.SetProperties(tags, types)\n\t\treturn vp\n\tcase reflect.Float32, reflect.Float64:\n\t\tv := validators.FloatNumberValidator{}\n\t\tvp := &v\n\t\tvp.SetProperties(tags, types)\n\t\treturn vp\n\tdefault:\n\t\treturn &validators.DefaultValidator{}\n\t}\n\t// switch tags.Get(constants.Validate) {\n\t// case constants.NumTag:\n\t// \tv := validators.NumberValidator{}\n\t// \tvp := &v\n\t// \tvp.SetProperties(tags, types)\n\t// \treturn vp\n\t// case constants.StringTag:\n\t// \tv := validators.StringValidator{}\n\t// \tvp := &v\n\t// \tvp.SetProperties(tags)\n\t// \treturn vp\n\t// default:\n\t// \treturn &validators.DefaultValidator{}\n\t// }\n}", "title": "" }, { "docid": "545601e6be7e9df59cd586bc3fd58dc5", "score": "0.49616167", "text": "func ValidateStruct(i interface{}) *Errors {\n\n\tvar (\n\t\terrs = NewErrors()\n\t)\n\n\tv, ok := IsStruct(i)\n\tif !ok {\n\t\treturn errs\n\t}\n\n\tfor index := 0; index < v.NumField(); index++ {\n\t\tval := v.Field(index)\n\t\tname := v.Type().Field(index).Name\n\t\ttags := v.Type().Field(index).Tag.Get(\"validate\")\n\t\tvar validations []string\n\t\tif tags != \"\" {\n\t\t\tvalidations = strings.Split(tags, \";\")\n\t\t}\n\n\t\tif len(validations) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tfor _, validation := range validations {\n\t\t\tvar (\n\t\t\t\tacts []string\n\t\t\t\tact string\n\t\t\t\terrsVal *Errors\n\t\t\t\tfVal string\n\t\t\t\tsVal string\n\t\t\t)\n\n\t\t\tacts = strings.Split(validation, \"=\")\n\t\t\tact = acts[0]\n\t\t\tif len(acts) > 1 {\n\t\t\t\tfor index, param := range strings.Split(acts[1], \",\") {\n\t\t\t\t\tswitch index {\n\t\t\t\t\tcase 0:\n\t\t\t\t\t\tfVal = param\n\t\t\t\t\tcase 1:\n\t\t\t\t\t\tsVal = param\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tswitch act {\n\t\t\tcase \"required\":\n\t\t\t\terrsVal = Required(name, val.Interface())\n\t\t\tcase \"min\":\n\t\t\t\tparam, _ := strconv.Atoi(fVal)\n\t\t\t\terrsVal = LengthMin(name, val.Interface().(string), param)\n\t\t\tcase \"max\":\n\t\t\t\tparam, _ := strconv.Atoi(fVal)\n\t\t\t\terrsVal = LengthMax(name, val.Interface().(string), param)\n\t\t\tcase \"range\":\n\t\t\t\tparam1, _ := strconv.Atoi(fVal)\n\t\t\t\tparam2, _ := strconv.Atoi(sVal)\n\t\t\t\terrsVal = Range(name, val.Interface().(int), param1, param2)\n\t\t\t}\n\n\t\t\terrs.AppendErrors(errsVal)\n\t\t}\n\t}\n\n\treturn errs\n}", "title": "" }, { "docid": "7d60a5d3e6d78e432a74ef7c4b482f5e", "score": "0.49043053", "text": "func (res *Resource) AddValidator(fc func(record interface{}, metaValues *MetaValues, ctx *core.Context) error) {\n\tres.Validators = append(res.Validators, fc)\n}", "title": "" }, { "docid": "5194a6f1c10576e0be43ae261effcd0e", "score": "0.48998806", "text": "func (r *Router) AddValidator(n string, f func(string) bool) {\n\tif n == \"\" {\n\t\treturn\n\t} else if n[0] == ':' || n[0] == '$' {\n\t\tn = n[1:]\n\t}\n\n\tif r.Validators == nil {\n\t\tr.Validators = Validators{n: f}\n\t} else {\n\t\tr.Validators[n] = f\n\t}\n}", "title": "" }, { "docid": "ab371586657a3435de5d67d8ec26e0bc", "score": "0.48962405", "text": "func (q *Query) AddValidation(NameAndTags string, v ValidationFunc) *Query {\n\tif q.validations == nil {\n\t\tq.validations = Validations{}\n\t}\n\tq.validations[NameAndTags] = v\n\treturn q\n}", "title": "" }, { "docid": "dbaa4d383f0cfee7686755d18b37efb9", "score": "0.48867404", "text": "func (c *ContractMD) AddMethod(md *MethodAndPrice, desc *manifest.Method, safe bool) {\n\tc.Manifest.ABI.Methods = append(c.Manifest.ABI.Methods, *desc)\n\tmd.MD = desc\n\tc.Methods[desc.Name] = *md\n\tif safe {\n\t\tc.Manifest.SafeMethods.Add(desc.Name)\n\t}\n}", "title": "" }, { "docid": "c5875788b6d8ca482e6fd12f251080a4", "score": "0.48351583", "text": "func AddValidator(validatorObj ValidatorStruct) string {\n\tvalidatorObj.Index = NewIndex()\n\tif validationAdd(validatorObj) {\n\t\tValidatorCreate(validatorObj)\n\t\tValidatorsLstObj = append(ValidatorsLstObj, validatorObj)\n\t\treturn \"\"\n\t}\n\treturn errorpk.AddError(\"Add Validator validator package\", \"enter correct validator object not exist before\", \"hack error\")\n}", "title": "" }, { "docid": "acbace77feb60fb5b6663b8438ac4a93", "score": "0.48134285", "text": "func (m *Model) addMethod(methodName string, fnct interface{}) *Method {\n\tmeth, exists, inModel := m.methods.get(methodName)\n\tif exists && !inModel {\n\t\t// We are trying to add an existing mixin method as a new method\n\t\tlog.Panic(\"Call to NewMethod (addMethod) with an existing method name\", \"model\", m.name, \"method\", methodName)\n\t}\n\t// meth might not exist if it has not been declared in pool package\n\tif !exists {\n\t\tmeth = m.AddEmptyMethod(methodName)\n\t}\n\tmeth.finalize(fnct)\n\treturn meth\n}", "title": "" }, { "docid": "f52b330e6b4807bb03e8c69dbda93406", "score": "0.47911403", "text": "func (v *defaultValidator) validateStruct(obj interface{}) error {\n\tv.lazyinit()\n\treturn v.validate.Struct(obj)\n}", "title": "" }, { "docid": "9536f483a0e46b8a9a475b5e53db9940", "score": "0.47785026", "text": "func (method ApiMethod) validate() {\n // Check the definitions.\n if (method.path == \"\") {\n method.log.Panic(\"Bad path for API handler\");\n }\n\n if (method.handler == nil) {\n method.log.Panic(fmt.Sprintf(\"Nil handler for API handler for path: %s\", method.path));\n }\n\n for _, param := range(method.params) {\n if (param.Name == \"\") {\n method.log.Panic(fmt.Sprintf(\"Empty name for param for API handler for path: %s\", method.path));\n }\n\n if (!(param.ParamType == API_PARAM_TYPE_INT || param.ParamType == API_PARAM_TYPE_STRING || param.ParamType == API_PARAM_TYPE_FILE)) {\n method.log.Panic(fmt.Sprintf(\"Param (%s) for API handler (%s) has bad type (%d)\", param.Name, method.path, param.ParamType));\n }\n }\n\n // Check parameter semantics.\n\n var handlerType reflect.Type = reflect.TypeOf(method.handler);\n\n var numParams int = handlerType.NumIn();\n var additionalParams = 0;\n\n for i := 0; i < numParams; i++ {\n var ParamType reflect.Type = handlerType.In(i);\n\n if (ParamType.String() == \"goapi.Token\") {\n additionalParams++;\n\n if (!method.auth) {\n method.log.Panic(fmt.Sprintf(\"API handler (%s) requested a token without authentication\", method.path));\n }\n } else if (ParamType.String() == \"goapi.UserId\") {\n additionalParams++;\n\n if (!method.auth) {\n method.log.Panic(fmt.Sprintf(\"API handler (%s) requested a user id without authentication\", method.path));\n }\n } else if (ParamType.String() == \"goapi.UserName\") {\n additionalParams++;\n\n if (!method.auth) {\n method.log.Panic(fmt.Sprintf(\"API handler (%s) requested a user name without authentication\", method.path));\n }\n } else if (ParamType.String() == \"*http.Request\") {\n additionalParams++;\n } else if (ParamType.String() == \"http.ResponseWriter\") {\n additionalParams++;\n } else {\n if (!(ParamType.String() == \"int\" || ParamType.String() == \"string\" || ParamType.String() == \"goapi.File\")) {\n method.log.Panic(fmt.Sprintf(\"API handler (%s) has an actual parameter with incorrect type (%s) must be string or int\", method.path, ParamType.String()));\n }\n }\n }\n\n if (numParams != len(method.params) + additionalParams) {\n method.log.Panic(fmt.Sprintf(\"API handler (%s) actually expects %d parameters, but is defined to expect %d (%d defined, %d implicit)\", method.path, numParams, len(method.params) + additionalParams, len(method.params), additionalParams));\n }\n\n // Check the return semantics.\n var numReturns int = handlerType.NumOut();\n\n if (numReturns > 4) {\n method.log.Panic(fmt.Sprintf(\"API handler (%s) has too many return values. Got %d. Maximum is 4.\", method.path, numReturns));\n }\n\n // All of the return types are unique.\n var seenReturnTypes map[string]bool = make(map[string]bool);\n for i := 0; i < numReturns; i++ {\n var returnType string = handlerType.Out(i).String();\n\n if (!(returnType == \"interface {}\" || returnType == \"int\" || returnType == \"string\" || returnType == \"error\")) {\n method.log.Panic(fmt.Sprintf(\"API handler (%s) has an bad return type (%s) must be interface{}, int, string, or error\", method.path, returnType));\n }\n\n if (seenReturnTypes[returnType]) {\n method.log.Panic(fmt.Sprintf(\"API handler (%s) has duplicate return types (%s). Can only have up to four return types and each must be a unique type (interface{}, int, string, or error).\", method.path, returnType));\n }\n seenReturnTypes[returnType] = true;\n }\n}", "title": "" }, { "docid": "d3c5680cc70ea8c59fd146cbd7b2536d", "score": "0.47643796", "text": "func (cls object) AddMethod(selector string, fn interface{}) {\n\tclsName := cls.className()\n\tclsInfo := classMap[clsName]\n\n\t// Check if this method has already implicitly been\n\t// added by an IBOutlet tagged struct field.\n\tif _, isSetter := clsInfo.setters[selector]; isSetter {\n\t\tpanic(\"objc: unable to add method '\" + selector + \"'; would shadow IBOutlet setter with same name.\")\n\t}\n\n\tclassAddMethod(unsafe.Pointer(cls.Pointer()), selector, funcTypeInfo(fn))\n\n\t// Add the method to the class's method map\n\tclsInfo.methodMap[selector] = fn\n}", "title": "" }, { "docid": "275fa396181da2c5ff6893f71b301171", "score": "0.4729417", "text": "func ValidatorTag(tag string) Option {\n\treturn func(o *options) {\n\t\to.validatorTag = tag\n\t}\n}", "title": "" }, { "docid": "2d379fd816ec017c4494ce009cd541bd", "score": "0.47000468", "text": "func (s *Struct) StructMethod() {}", "title": "" }, { "docid": "bc692ace6c253d90a91208d058480bba", "score": "0.4644252", "text": "func MissingMethod(V Type, T *Interface, static bool) (method *Func, wrongType bool)", "title": "" }, { "docid": "4693481b810784c80f94a6cbb640c349", "score": "0.46276888", "text": "func ValidateStruct(s interface{}) []error {\n\terrs := []error{}\n\n\t// ValueOf returns a Value representing the run-time data\n\tv := reflect.ValueOf(s)\n\n\tfor i := 0; i < v.NumField(); i++ {\n\t\t// Get the field tag value\n\t\ttag := v.Type().Field(i).Tag\n\t\tvalidation := tag.Get(tagValidation)\n\n\t\t// Skip if tag is not defined or ignored\n\t\tif validation == \"\" || validation == \"-\" {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Get a validators that corresponds to tag's validation\n\t\tvalidators := getValidatorsFromTag(validation)\n\t\tfield := v.Field(i).Interface()\n\t\tfieldName := tag.Get(tagJSON)\n\n\t\tfor _, validator := range validators {\n\t\t\t// Perform validation\n\t\t\tvalid, err := validator.Validate(field)\n\n\t\t\t// Append error to results\n\t\t\tif !valid && err != nil {\n\t\t\t\terrs = append(errs, fmt.Errorf(\"%s %s\", fieldName, err.Error()))\n\t\t\t}\n\t\t}\n\t}\n\n\treturn errs\n}", "title": "" }, { "docid": "e4e63bb92e5508cfa7005a527f7cf6f0", "score": "0.4621093", "text": "func ValidateTags(s interface{}) error {\n\tvValue := reflect.ValueOf(s)\n\tif vValue.Kind() == reflect.Ptr {\n\t\tvValue = vValue.Elem()\n\t}\n\n\ttValue := reflect.TypeOf(s)\n\tif tValue.Kind() == reflect.Ptr {\n\t\ttValue = tValue.Elem()\n\t}\n\n\tfor i := 0; i < vValue.NumField(); i++ {\n\t\tvField := vValue.Field(i)\n\t\ttField := tValue.Field(i)\n\n\t\tif vField.Kind() == reflect.Struct {\n\t\t\tif tField.Name != strings.Title(tField.Name) {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\ts := vValue.Field(i).Addr().Interface()\n\t\t\tif err := ValidateTags(s); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tz := reflect.Zero(vField.Type())\n\n\t\tif requiredTag := tField.Tag.Get(\"required\"); requiredTag == \"true\" {\n\t\t\tswitch vField.Kind() {\n\t\t\tcase reflect.String:\n\t\t\t\tif vField.Interface() == z.Interface() {\n\t\t\t\t\treturn fmt.Errorf(\"missing input: %s\", tField.Name)\n\t\t\t\t}\n\t\t\tcase reflect.Slice:\n\t\t\t\tif vField.Interface() == nil {\n\t\t\t\t\treturn fmt.Errorf(\"missing input: %s\", tField.Name)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif !vField.CanSet() {\n\t\t\tcontinue\n\t\t}\n\n\t\tif defaultTag := tField.Tag.Get(\"default\"); defaultTag != \"\" {\n\t\t\tif vField.Interface() == z.Interface() {\n\t\t\t\tswitch tField.Type.Name() {\n\t\t\t\tcase \"bool\":\n\t\t\t\t\tswitch defaultTag {\n\t\t\t\t\tcase \"true\":\n\t\t\t\t\t\tvValue.Field(i).SetBool(true)\n\t\t\t\t\tcase \"false\":\n\t\t\t\t\t\tvValue.Field(i).SetBool(false)\n\t\t\t\t\t}\n\n\t\t\t\tcase \"int\":\n\t\t\t\t\tv, err := strconv.ParseInt(defaultTag, 10, 64)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\n\t\t\t\t\tvValue.Field(i).SetInt(v)\n\n\t\t\t\tcase \"string\":\n\t\t\t\t\tvValue.Field(i).SetString(defaultTag)\n\t\t\t\t}\n\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "06b741e7faf76ef984c1c45f430dd06d", "score": "0.46206605", "text": "func MethodExists(any interface{}, name string) bool {\n\tmethod := reflect.ValueOf(any).MethodByName(name)\n\tif method.IsValid() {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "33e4ac8e2f457054ec4af2f2b51418df", "score": "0.46137246", "text": "func (d *Describers) Add(fns ...interface{}) error {\n\tfor _, fn := range fns {\n\t\tfv := reflect.ValueOf(fn)\n\t\tft := fv.Type()\n\t\tif ft.Kind() != reflect.Func {\n\t\t\treturn fmt.Errorf(\"expected func, got: %v\", ft)\n\t\t}\n\t\tnumIn := ft.NumIn()\n\t\tif numIn == 0 {\n\t\t\treturn fmt.Errorf(\"expected at least one 'in' params, got: %v\", ft)\n\t\t}\n\t\tif ft.NumOut() != 2 {\n\t\t\treturn fmt.Errorf(\"expected two 'out' params - (string, error), got: %v\", ft)\n\t\t}\n\t\ttypes := make([]reflect.Type, 0, numIn)\n\t\tfor i := 0; i < numIn; i++ {\n\t\t\ttypes = append(types, ft.In(i))\n\t\t}\n\t\tif ft.Out(0) != reflect.TypeOf(string(\"\")) {\n\t\t\treturn fmt.Errorf(\"expected string return, got: %v\", ft)\n\t\t}\n\t\tvar forErrorType error\n\t\t// This convolution is necessary, otherwise TypeOf picks up on the fact\n\t\t// that forErrorType is nil.\n\t\terrorType := reflect.TypeOf(&forErrorType).Elem()\n\t\tif ft.Out(1) != errorType {\n\t\t\treturn fmt.Errorf(\"expected error return, got: %v\", ft)\n\t\t}\n\n\t\texact := types[0]\n\t\textra := types[1:]\n\t\tif d.searchFns == nil {\n\t\t\td.searchFns = make(map[reflect.Type][]typeFunc)\n\t\t}\n\t\tfns := d.searchFns[exact]\n\t\tfn := typeFunc{Extra: extra, Fn: fv}\n\t\tfns = append(fns, fn)\n\t\td.searchFns[exact] = fns\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6bf022f5014f4f119f9b91bb47e9860c", "score": "0.45898032", "text": "func validWebserviceMethod(method string) (err error) {\n\tswitch method {\n\tcase http.MethodGet:\n\t\treturn\n\tcase http.MethodPost:\n\t\treturn\n\t}\n\n\treturn http.ErrNotSupported\n}", "title": "" }, { "docid": "c14bdb5796416569a1cc07d2dfbc121f", "score": "0.45728567", "text": "func (v Validate) ValidateStruct(data interface{}) error {\n\treturn v.validator.Struct(data)\n}", "title": "" }, { "docid": "6eac57dbd46c92f5b6f376dd9dc69e93", "score": "0.4528244", "text": "func (s *StructMeta) Method(name string) *StructMeta {\n\tif s.err != nil {\n\t\treturn s\n\t}\n\tm, ok := s.structType.MethodByName(name)\n\tif ok {\n\t\ts.method = m\n\t} else {\n\t\ts.err = ErrMethodDoesNotExist\n\t}\n\treturn s\n}", "title": "" }, { "docid": "7ca601a2b62ee57fd12a1f16b3b89c34", "score": "0.45251048", "text": "func (d *Device) AddMethod(method *Method) error {\n\tif method.Index == 0 {\n\t\treturn fmt.Errorf(\"method %s has invalid index 0\", method.Name)\n\t}\n\tif m := d.MethodByIndex(method.Index); m != nil {\n\t\treturn fmt.Errorf(\"method %s and %s has the same index %d\",\n\t\t\tm.Name, method.Name, m.Index)\n\t}\n\td.Methods = append(d.Methods, method)\n\treturn nil\n}", "title": "" }, { "docid": "441960ff94a0e31b7af6384de0acbdb3", "score": "0.4524063", "text": "func Tag(structTag, validateTag string) ConfigOptions {\n\treturn func(h *Config) error {\n\t\th.tag = structTag\n\t\th.validateTag = validateTag\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "0ea2b33c968979aae88603b815c53428", "score": "0.45207042", "text": "func ValidateStruct(s interface{}) (bool, error) {\n\tif s == nil {\n\t\treturn true, nil\n\t}\n\tresult := true\n\tvar err error\n\tval := reflect.ValueOf(s)\n\tif val.Kind() == reflect.Interface || val.Kind() == reflect.Ptr {\n\t\tval = val.Elem()\n\t}\n\t// we only accept structs\n\tif val.Kind() != reflect.Struct {\n\t\treturn false, fmt.Errorf(\"function only accepts structs; got %s\", val.Kind())\n\t}\n\tvar errs Errors\n\tfor i := 0; i < val.NumField(); i++ {\n\t\tvalueField := val.Field(i)\n\t\ttypeField := val.Type().Field(i)\n\t\tif typeField.PkgPath != \"\" {\n\t\t\tcontinue // Private field\n\t\t}\n\t\tstructResult := true\n\t\tif valueField.Kind() == reflect.Interface {\n\t\t\tvalueField = valueField.Elem()\n\t\t}\n\t\tif (valueField.Kind() == reflect.Struct ||\n\t\t\t(valueField.Kind() == reflect.Ptr && valueField.Elem().Kind() == reflect.Struct)) &&\n\t\t\ttypeField.Tag.Get(tagName) != \"-\" {\n\t\t\tvar err error\n\t\t\tstructResult, err = ValidateStruct(valueField.Interface())\n\t\t\tif err != nil {\n\t\t\t\terr = PrependPathToErrors(err, typeField.Name)\n\t\t\t\terrs = append(errs, err)\n\t\t\t}\n\t\t}\n\t\tresultField, err2 := typeCheck(valueField, typeField, val, nil)\n\t\tif err2 != nil {\n\n\t\t\t// Replace structure name with JSON name if there is a tag on the variable\n\t\t\tjsonTag := toJSONName(typeField.Tag.Get(\"json\"))\n\t\t\tif jsonTag != \"\" {\n\t\t\t\tswitch jsonError := err2.(type) {\n\t\t\t\tcase Error:\n\t\t\t\t\tjsonError.Name = jsonTag\n\t\t\t\t\terr2 = jsonError\n\t\t\t\tcase Errors:\n\t\t\t\t\tfor i2, err3 := range jsonError {\n\t\t\t\t\t\tswitch customErr := err3.(type) {\n\t\t\t\t\t\tcase Error:\n\t\t\t\t\t\t\tcustomErr.Name = jsonTag\n\t\t\t\t\t\t\tjsonError[i2] = customErr\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\terr2 = jsonError\n\t\t\t\t}\n\t\t\t}\n\n\t\t\terrs = append(errs, err2)\n\t\t}\n\t\tresult = result && resultField && structResult\n\t}\n\tif len(errs) > 0 {\n\t\terr = errs\n\t}\n\treturn result, err\n}", "title": "" }, { "docid": "3f808d19b05d2d33913f5be5817daeff", "score": "0.45202044", "text": "func (m *Model) AddEmptyMethod(methodName string) *Method {\n\tif m.methods.bootstrapped {\n\t\tlog.Panic(\"Create/ExtendMethod must be run before BootStrap\", \"model\", m.name, \"method\", methodName)\n\t}\n\tmeth, exists, inModel := m.methods.get(methodName)\n\tif exists && inModel {\n\t\tlog.Panic(\"Call to NewMethod (AddEmptyMethod) with an existing method name\", \"model\", m.name, \"method\", methodName)\n\t}\n\tif !exists {\n\t\tmeth = &Method{\n\t\t\tmodel: m,\n\t\t\tname: methodName,\n\t\t\tnextLayer: make(map[*methodLayer]*methodLayer),\n\t\t\tgroups: make(map[*security.Group]bool),\n\t\t\tgroupsCallers: make(map[callerGroup]bool),\n\t\t}\n\t}\n\tm.methods.set(methodName, meth)\n\treturn meth\n}", "title": "" }, { "docid": "67283ec624dd653e87b1eb223a867d2e", "score": "0.45024326", "text": "func MustParseMethod(s string) Method {\n\tv, err := AsMethod(s)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn v\n}", "title": "" }, { "docid": "a7ae548508ff4f0dd88997dcef807b18", "score": "0.44677484", "text": "func (z *Zero) AddValidator(name string, validatorFunc validator.Func, message string) {\n\tz.validator.RegisterValidation(name, validatorFunc)\n\tz.SetMessage(name, message)\n}", "title": "" }, { "docid": "46c7bfd1cea6aeef32facddb400e0a83", "score": "0.44657376", "text": "func (v *Validator) Field(value interface{}, tag string) (res *Response) {\n\tres = NewResponse()\n\n\ttags, err := v.fetchTag(tag)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar e string\n\tfor _, t := range tags {\n\t\tif res.Valid, e = t.Fn(value, t.Param); !res.Valid {\n\t\t\tres.SetError(t.Name, e)\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "8a6223f39055a2129db74f3cc72ef789", "score": "0.44541752", "text": "func ValidateStruct(s interface{}) (bool, error) {\n\tvalid, err := govalidator.ValidateStruct(s)\n\n\treturn valid, err\n}", "title": "" }, { "docid": "34f837f6db6717a932ea79b6a3febbde", "score": "0.4442683", "text": "func (scope *ScopeDescriptor) AddMethod(method *MethodDescriptor) {\r\n\tscope.Methods = append(scope.Methods, method)\r\n}", "title": "" }, { "docid": "b5c1d362fc96e3f4845c8fa4d0bd9d01", "score": "0.44323647", "text": "func Validator(method auth.DeliveryMethod) func(s string) bool {\n\tif method == auth.Email {\n\t\treturn IsEmailValid\n\t}\n\n\tif method == auth.Phone {\n\t\treturn IsPhoneValid\n\t}\n\n\treturn func(s string) bool {\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "48e8274a18a0327287ed77d575227139", "score": "0.44245082", "text": "func (check *Checker) missingMethod(V Type, T *Interface, static bool) (method, alt *Func) {\n\tif T.NumMethods() == 0 {\n\t\treturn\n\t}\n\n\t// V is an interface\n\tif u, _ := under(V).(*Interface); u != nil {\n\t\ttset := u.typeSet()\n\t\tfor _, m := range T.typeSet().methods {\n\t\t\t_, f := tset.LookupMethod(m.pkg, m.name, false)\n\n\t\t\tif f == nil {\n\t\t\t\tif !static {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn m, nil\n\t\t\t}\n\n\t\t\tif !Identical(f.typ, m.typ) {\n\t\t\t\treturn m, f\n\t\t\t}\n\t\t}\n\n\t\treturn\n\t}\n\n\t// V is not an interface\n\tfor _, m := range T.typeSet().methods {\n\t\t// TODO(gri) should this be calling LookupFieldOrMethod instead (and why not)?\n\t\tobj, _, _ := lookupFieldOrMethod(V, false, m.pkg, m.name, false)\n\n\t\t// check if m is on *V, or on V with case-folding\n\t\tfound := obj != nil\n\t\tif !found {\n\t\t\t// TODO(gri) Instead of NewPointer(V) below, can we just set the \"addressable\" argument?\n\t\t\tobj, _, _ = lookupFieldOrMethod(NewPointer(V), false, m.pkg, m.name, false)\n\t\t\tif obj == nil {\n\t\t\t\tobj, _, _ = lookupFieldOrMethod(V, false, m.pkg, m.name, true /* fold case */)\n\t\t\t}\n\t\t}\n\n\t\t// we must have a method (not a struct field)\n\t\tf, _ := obj.(*Func)\n\t\tif f == nil {\n\t\t\treturn m, nil\n\t\t}\n\n\t\t// methods may not have a fully set up signature yet\n\t\tif check != nil {\n\t\t\tcheck.objDecl(f, nil)\n\t\t}\n\n\t\tif !found || !Identical(f.typ, m.typ) {\n\t\t\treturn m, f\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "7feb9f2a3ebc4dd7a234c549bf83357f", "score": "0.4415626", "text": "func (s *ValidationService) Add(userID int64, code string) error {\n\t_, err := s.db.Exec(\"INSERT INTO validations (userId, code) VALUES($1, $2)\", userID, code)\n\treturn err\n}", "title": "" }, { "docid": "30ffe1447aa73e014bbf772b34fa932f", "score": "0.4415206", "text": "func (v *Validation) BindStruct(ptr any) error {\n\treturn v.BindSafeData(ptr)\n}", "title": "" }, { "docid": "5b6e97e3bcafde295dbcac1a2adaea8f", "score": "0.44128564", "text": "func (gs *GenStruct) add(s *Struct) (err error) {\n\tif t, ok := gs.Structs[s.Name]; ok {\n\t\tvar setOE bool\n\t\tfor name, f := range s.Fields {\n\t\t\tif g, ok := t.Fields[name]; !ok {\n\t\t\t\tt.Fields[name] = s.Fields[name]\n\t\t\t} else {\n\t\t\t\tif !reflect.DeepEqual(f, g) {\n\t\t\t\t\treturn fmt.Errorf(\"Fields differ: %#v != %#v\", f, g)\n\t\t\t\t}\n\t\t\t\tsetOE = true\n\t\t\t}\n\t\t}\n\n\t\tif setOE {\n\t\t\tfor _, f := range t.Fields {\n\t\t\t\tf.OmitEmpty = true\n\t\t\t}\n\t\t}\n\t} else {\n\t\tgs.Structs[s.Name] = s\n\t\tgs.Order = append(gs.Order, s.Name)\n\t}\n\treturn\n}", "title": "" }, { "docid": "c6bda60647fca4647d10f260b42851ef", "score": "0.4390661", "text": "func Validate(metadata reflect.Type, b interface{}, name, resourcetype string) (out interface{}, err error) {\n\tout = b\n\ttag, found := metadata.FieldByName(name)\n\n\t//This should not happen\n\tif !found {\n\t\terr = fmt.Errorf(\"Struct attribute %s not found\", name)\n\t\treturn\n\t}\n\n\t// Processing scalar\n\tif cftag, ok := tag.Tag.Lookup(\"aws\"); ok {\n\t\tisRef := false\n\t\ttagInfo := &awsTag{}\n\t\ttagInfo.Parse(cftag)\n\n\t\tif b == nil {\n\t\t\t// Missing required parameter\n\t\t\tif tagInfo.Required {\n\t\t\t\tlog.Printf(\"%s field not provided %s\\n\", resourcetype, name)\n\t\t\t\terr = ErrMissingRequiredField\n\t\t\t\treturn\n\t\t\t}\n\t\t\treturn\n\t\t}\n\n\t\tif tagInfo.Primitive {\n\t\t\tout, _ = refFlatter(b)\n\t\t\treturn\n\t\t}\n\n\t\t/* List/Maps and complex types */\n\t\tif tagInfo.Type == \"List\" {\n\t\t\tinnerList, ok := b.([]interface{})\n\t\t\tif !ok {\n\t\t\t\terr = fmt.Errorf(\"Entry error wrong type in template %s %+v expected a list\", name, b)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// checking for references\n\t\t\tfor i, item := range innerList {\n\t\t\t\tcontainsRef := false\n\t\t\t\tinnerList[i], containsRef = refFlatter(item)\n\t\t\t\t// It's not a reference and not a primitive type then it's a property\n\t\t\t\tif !containsRef && !tagInfo.PrimitiveItem {\n\t\t\t\t\t// More patches special case for Tag\n\t\t\t\t\tFQDNResource := tagInfo.ItemType\n\t\t\t\t\tif FQDNResource != \"Tag\" {\n\t\t\t\t\t\tFQDNResource = resourcetype + \".\" + FQDNResource\n\t\t\t\t\t}\n\n\t\t\t\t\tproperty, propError := getProperty(FQDNResource, item)\n\n\t\t\t\t\tif propError != nil {\n\t\t\t\t\t\terr = propError\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\tinnerList[i] = property\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// set out\n\t\t\tout = innerList\n\t\t\treturn\n\t\t}\n\n\t\tif tagInfo.Type == \"Map\" {\n\t\t\tinnerMap, ok := b.(map[string]interface{})\n\t\t\tif !ok {\n\t\t\t\terr = fmt.Errorf(\"Entry error wrong type in template %s %+v expected a map\", name, b)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tfor key, value := range innerMap {\n\t\t\t\tcontainsRef := false\n\t\t\t\tinnerMap[key], containsRef = refFlatter(value)\n\n\t\t\t\tif !containsRef && !tagInfo.PrimitiveItem {\n\n\t\t\t\t\tFQDNResource := tagInfo.ItemType\n\t\t\t\t\tif FQDNResource != \"Tag\" {\n\t\t\t\t\t\tFQDNResource = resourcetype + \".\" + FQDNResource\n\t\t\t\t\t}\n\n\t\t\t\t\tproperty, propError := getProperty(FQDNResource, value)\n\t\t\t\t\tif propError != nil {\n\t\t\t\t\t\terr = propError\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tinnerMap[key] = property\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tout = innerMap\n\t\t\treturn\n\t\t}\n\n\t\t// if we are reaching this is is an standalone property\n\t\tout, isRef = refFlatter(b)\n\n\t\tif !isRef {\n\n\t\t\tFQDNResource := tagInfo.Type\n\t\t\tif FQDNResource != \"Tag\" {\n\t\t\t\tFQDNResource = resourcetype + \".\" + FQDNResource\n\t\t\t}\n\n\t\t\tproperty, propError := getProperty(FQDNResource, b)\n\n\t\t\tif propError != nil {\n\t\t\t\terr = propError\n\t\t\t\treturn\n\t\t\t}\n\t\t\tout = property\n\t\t}\n\t}\n\n\tfmt.Printf(\"%s Property provided field %s with %+v\\n\", resourcetype, name, out)\n\n\treturn\n}", "title": "" }, { "docid": "aff6ac6df2a302c32e1a6427c960b207", "score": "0.4389229", "text": "func (v *Validator) AddFunction(key string, f ValidationFunc) error {\n\n\tif len(key) == 0 {\n\t\treturn errors.New(\"Function Key cannot be empty\")\n\t}\n\n\tif f == nil {\n\t\treturn errors.New(\"Function cannot be empty\")\n\t}\n\n\tv.validationFuncs[key] = f\n\n\treturn nil\n}", "title": "" }, { "docid": "46656558b5e667b40b00a4a1855df5d9", "score": "0.43819517", "text": "func (r *InterceptorChain) AddPermission(method string, ops []bakery.Op) error {\n\tr.Lock()\n\tdefer r.Unlock()\n\n\tif _, ok := r.permissionMap[method]; ok {\n\t\treturn fmt.Errorf(\"detected duplicate macaroon constraints \"+\n\t\t\t\"for path: %v\", method)\n\t}\n\n\tr.permissionMap[method] = ops\n\treturn nil\n}", "title": "" }, { "docid": "5975bed436043e17370b2495191869e3", "score": "0.4381028", "text": "func (v *DefaultValidator) ValidateStruct(obj interface{}) error {\n\n\tif kindOfData(obj) == reflect.Struct {\n\n\t\tv.lazyinit()\n\n\t\tif err := v.validate.Struct(obj); err != nil {\n\t\t\treturn error(err)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "98b557221b8bdc383ab869c98e30a390", "score": "0.43727404", "text": "func RegisterSigningMethod(alg string, f func() SigningMethod) {\n\tsigningMethodLock.Lock()\n\tdefer signingMethodLock.Unlock()\n\n\tsigningMethods[alg] = f\n}", "title": "" }, { "docid": "05e3f1a2b5e00f1b7ac85c6231f494db", "score": "0.43677923", "text": "func (a *API) addShapeValidations() {\n\tfor _, o := range a.Operations {\n\t\tresolveShapeValidations(o.InputRef.Shape)\n\t}\n}", "title": "" }, { "docid": "9dd91351416395b8ce791d91478ddc2e", "score": "0.43572", "text": "func (p *Provider) AddMissingMethod(f interface{}) *Provider {\n\tp.methodManager.AddMissingMethod(f)\n\treturn p\n}", "title": "" }, { "docid": "8eeb138572e8a0d8bbb35336148e1282", "score": "0.43541598", "text": "func addTagIfFoundAndValid(\n\ttags models.Tags,\n\tval []byte,\n\tdestinationName []byte,\n\tdestinationValRegex []byte,\n\tregex *regexp.Regexp,\n) (models.Tag, bool) {\n\tindices := regex.FindSubmatchIndex(val)\n\tif indices == nil {\n\t\treturn models.Tag{}, false\n\t}\n\n\tdestinationVal := regex.Expand([]byte{}, destinationValRegex, val, indices)\n\treturn models.Tag{Name: destinationName, Value: destinationVal}, true\n}", "title": "" }, { "docid": "2f0174600d7589f5f3d7dd5393dab3da", "score": "0.43475103", "text": "func (b *Manager) bindMethod(object interface{}) error {\n\n\tobjectType := reflect.TypeOf(object)\n\tbaseName := objectType.String()\n\n\t// Strip pointer if there\n\tif baseName[0] == '*' {\n\t\tbaseName = baseName[1:]\n\t}\n\n\tb.log.Debugf(\"Processing struct: %s\", baseName)\n\n\t// Calc actual name\n\tactualName := strings.TrimPrefix(baseName, \"main.\")\n\tif b.structList[actualName] == nil {\n\t\tb.structList[actualName] = []string{}\n\t}\n\n\t// Iterate over method definitions\n\tfor i := 0; i < objectType.NumMethod(); i++ {\n\n\t\t// Get method definition\n\t\tmethodDef := objectType.Method(i)\n\t\tmethodName := methodDef.Name\n\t\tfullMethodName := baseName + \".\" + methodName\n\t\tmethod := reflect.ValueOf(object).MethodByName(methodName)\n\n\t\tb.structList[actualName] = append(b.structList[actualName], methodName)\n\n\t\t// Skip unexported methods\n\t\tif !unicode.IsUpper([]rune(methodName)[0]) {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Create a new boundMethod\n\t\tnewMethod, err := newBoundMethod(methodName, fullMethodName, method, objectType)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Check if it's a wails init function\n\t\tif newMethod.isWailsInit {\n\t\t\tb.log.Debugf(\"Detected WailsInit function: %s\", fullMethodName)\n\t\t\tb.initMethods = append(b.initMethods, newMethod)\n\t\t} else if newMethod.isWailsShutdown {\n\t\t\tb.log.Debugf(\"Detected WailsShutdown function: %s\", fullMethodName)\n\t\t\tb.shutdownMethods = append(b.shutdownMethods, newMethod)\n\t\t} else {\n\t\t\t// Save boundMethod\n\t\t\tb.log.Infof(\"Bound Method: %s()\", fullMethodName)\n\t\t\tb.methods[fullMethodName] = newMethod\n\n\t\t\t// Inform renderer of new binding\n\t\t\tb.renderer.NewBinding(fullMethodName)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "04c784e64f4b828bd62255fc48159d7f", "score": "0.4346418", "text": "func (v *Validator) ValidateStruct(s interface{}) *StructValidationErrors {\n\n\treturn v.validateStructRecursive(s, s, s)\n}", "title": "" }, { "docid": "0ea4f6ed75e0d599514e2356c22d395f", "score": "0.4340361", "text": "func (object Tag) Validate() error {\n\terrs := validate.Struct(object)\n\tif errs != nil {\n\t\treturn fmt.Errorf(\"%v\", errs)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "28471f6855e8ae07c7476cb399ae1ae7", "score": "0.43331352", "text": "func (cv *CustomValidator) Validate(i interface{}) error {\n\treturn cv.Validator.Struct(i)\n}", "title": "" }, { "docid": "0e60feae17939d990ca70e5c9c57557a", "score": "0.4324029", "text": "func (p *RecordAddDNSParam) Validate() []error {\n\terrors := []error{}\n\t{\n\t\tvalidator := validateRequired\n\t\terrs := validator(\"--name\", p.Name)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := define.Resources[\"DNS\"].Commands[\"record-add\"].Params[\"name\"].ValidateFunc\n\t\terrs := validator(\"--name\", p.Name)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := validateRequired\n\t\terrs := validator(\"--type\", p.Type)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := define.Resources[\"DNS\"].Commands[\"record-add\"].Params[\"type\"].ValidateFunc\n\t\terrs := validator(\"--type\", p.Type)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := define.Resources[\"DNS\"].Commands[\"record-add\"].Params[\"ttl\"].ValidateFunc\n\t\terrs := validator(\"--ttl\", p.Ttl)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := define.Resources[\"DNS\"].Commands[\"record-add\"].Params[\"mx-priority\"].ValidateFunc\n\t\terrs := validator(\"--mx-priority\", p.MxPriority)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := define.Resources[\"DNS\"].Commands[\"record-add\"].Params[\"srv-priority\"].ValidateFunc\n\t\terrs := validator(\"--srv-priority\", p.SrvPriority)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := define.Resources[\"DNS\"].Commands[\"record-add\"].Params[\"srv-weight\"].ValidateFunc\n\t\terrs := validator(\"--srv-weight\", p.SrvWeight)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := define.Resources[\"DNS\"].Commands[\"record-add\"].Params[\"srv-port\"].ValidateFunc\n\t\terrs := validator(\"--srv-port\", p.SrvPort)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := define.Resources[\"DNS\"].Commands[\"record-add\"].Params[\"srv-target\"].ValidateFunc\n\t\terrs := validator(\"--srv-target\", p.SrvTarget)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\tvalidator := validateSakuraID\n\t\terrs := validator(\"--id\", p.Id)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\n\t{\n\t\tvalidator := schema.ValidateInStrValues(define.AllowOutputTypes...)\n\t\terrs := validator(\"--output-type\", p.OutputType)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\terrs := validateInputOption(p)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\t{\n\t\terrs := validateOutputOption(p)\n\t\tif errs != nil {\n\t\t\terrors = append(errors, errs...)\n\t\t}\n\t}\n\n\treturn errors\n}", "title": "" }, { "docid": "26ff6b2cbd5492de515afdea4edb09ff", "score": "0.43230283", "text": "func (m Method) IsValid() bool {\n\treturn m == DeflateMethod\n}", "title": "" }, { "docid": "d43bd51805d5a00fe100ba8aa50738b8", "score": "0.43134844", "text": "func (Operation) Validate(v interface{}) error {\n\treturn nil\n}", "title": "" }, { "docid": "bbb53a9096a0f34b53c69b1c06776b0b", "score": "0.43060428", "text": "func MissingMethod(V Type, T *Interface, static bool) (method *Func, wrongType bool) {\n\tm, alt := (*Checker)(nil).missingMethod(V, T, static)\n\t// Only report a wrong type if the alternative method has the same name as m.\n\treturn m, alt != nil && alt.name == m.name // alt != nil implies m != nil\n}", "title": "" }, { "docid": "4c18aec7af748313395a44c1ab20f79e", "score": "0.43017328", "text": "func (rd *Resource) addMethod(r *raml.Resource, m *raml.Method, methodName string,\n\tsmc ServerMethodConstructor, cmc ClientMethodConstructor) {\n\tvar im MethodInterface\n\tvar err error\n\n\tif m == nil {\n\t\treturn\n\t}\n\n\tif rd.IsServer {\n\t\tim = smc(rd.APIDef, r, rd, m, methodName)\n\t} else {\n\t\tim, err = cmc(r, rd, m, methodName)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"client interface method error, err = %v\", err)\n\t\t\treturn\n\t\t}\n\t}\n\trd.Methods = append(rd.Methods, im)\n}", "title": "" }, { "docid": "c371ce165c2df7c314e0d68f50387e87", "score": "0.42927215", "text": "func (s *ServiceHdlr) AddMethod(n string, m apiserver.Method) apiserver.Method {\n\ts.Methods[n] = m\n\treturn s.Methods[n]\n}", "title": "" }, { "docid": "91f6934786d09c71806b05ce62e0b4ea", "score": "0.4281817", "text": "func (v *Validators) Add(validator Validator) {\n\t*v = append(*v, validator)\n}", "title": "" }, { "docid": "98eb31190065c1ac38eb3330609ad0f4", "score": "0.42786255", "text": "func (m *DetailedTag) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateLabels(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateScanOverview(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "460502963a7cceb08f6800592875c24a", "score": "0.42780632", "text": "func ValidateStruct(v interface{}) error {\n\treturn validate.Struct(v)\n}", "title": "" }, { "docid": "4b6a02fef8c0302c06e28d266dd3e1b7", "score": "0.42764065", "text": "func (m *Method) checkMethodAndFnctType(fnct interface{}) {\n\tif m.model.methods.bootstrapped {\n\t\tlog.Panic(\"Create/ExtendMethod must be run before BootStrap\", \"model\", m.name, \"method\", m.name)\n\t}\n\tval := reflect.ValueOf(fnct)\n\tif val.Kind() != reflect.Func {\n\t\tlog.Panic(\"fnct parameter must be a function\", \"model\", m.name, \"method\", m.name, \"fnct\", fnct)\n\t}\n\tfuncType := val.Type()\n\tif funcType.NumIn() == 0 || !funcType.In(0).Implements(reflect.TypeOf((*RecordSet)(nil)).Elem()) {\n\t\tlog.Panic(\"Function must have a `RecordSet` as first argument to be used as method.\",\n\t\t\t\"model\", m.model.name, \"method\", m.name, \"type\", funcType.In(0))\n\t}\n}", "title": "" }, { "docid": "95b8054172e54cf101573dee5a72591b", "score": "0.42740306", "text": "func (p *Pkg) addMethod(t *Type, m *Item) {\n\ttarg := p.getPointer(t, true)\n\ttarg.Method = append(targ.Method, m)\n}", "title": "" }, { "docid": "1555eb1852e1b5821b65b3f5648b15b7", "score": "0.42704794", "text": "func (r *Router) register(method, path string, op *openAPIOperation) {\n\t// First, make sure the operation and handler make sense, as well as pre-\n\t// generating any schemas for use later during request handling.\n\top.validate(method, path)\n\n\t// Add the operation to the list of operations for the path entry.\n\tif r.api.Paths[path] == nil {\n\t\tr.api.Paths[path] = make(map[string]*openAPIOperation)\n\t}\n\n\tr.api.Paths[path][method] = op\n\n\t// Next, figure out which Gin function to call.\n\tvar f func(string, ...gin.HandlerFunc) gin.IRoutes\n\n\tswitch method {\n\tcase \"OPTIONS\":\n\t\tf = r.engine.OPTIONS\n\tcase \"HEAD\":\n\t\tf = r.engine.HEAD\n\tcase \"GET\":\n\t\tf = r.engine.GET\n\tcase \"POST\":\n\t\tf = r.engine.POST\n\tcase \"PUT\":\n\t\tf = r.engine.PUT\n\tcase \"PATCH\":\n\t\tf = r.engine.PATCH\n\tcase \"DELETE\":\n\t\tf = r.engine.DELETE\n\tdefault:\n\t\tpanic(\"unsupported HTTP method \" + method)\n\t}\n\n\tif strings.Contains(path, \"{\") {\n\t\t// Convert from OpenAPI-style parameters to gin-style params\n\t\tpath = paramRe.ReplaceAllString(path, \":$1$2\")\n\t}\n\n\t// Then call it to register our handler function.\n\tf(path, func(c *gin.Context) {\n\t\tvar method reflect.Value\n\t\tif op.unsafe() {\n\t\t\tmethod = reflect.ValueOf(op.handler.(*unsafeHandler).handler)\n\t\t} else {\n\t\t\tmethod = reflect.ValueOf(op.handler)\n\t\t}\n\n\t\tin := make([]reflect.Value, 0, len(op.dependencies)+len(op.params)+1)\n\n\t\t// Limit the body size\n\t\tif c.Request.Body != nil {\n\t\t\tmaxBody := op.maxBodyBytes\n\t\t\tif maxBody == 0 {\n\t\t\t\t// 1 MiB default\n\t\t\t\tmaxBody = 1024 * 1024\n\t\t\t}\n\n\t\t\t// -1 is a special value which means set no limit.\n\t\t\tif maxBody != -1 {\n\t\t\t\tc.Request.Body = http.MaxBytesReader(c.Writer, c.Request.Body, maxBody)\n\t\t\t}\n\t\t}\n\n\t\t// Process any dependencies first.\n\t\tfor _, dep := range op.dependencies {\n\t\t\theaders, value, err := dep.resolve(c, op)\n\t\t\tif err != nil {\n\t\t\t\tif !c.IsAborted() {\n\t\t\t\t\t// Nothing else has handled the error, so treat it like a general\n\t\t\t\t\t// internal server error.\n\t\t\t\t\tabortWithError(c, http.StatusInternalServerError, \"Couldn't get dependency\")\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor k, v := range headers {\n\t\t\t\tc.Header(k, v)\n\t\t\t}\n\n\t\t\tin = append(in, reflect.ValueOf(value))\n\t\t}\n\n\t\tfor _, param := range op.params {\n\t\t\tpv, ok := getParamValue(c, param)\n\t\t\tif !ok {\n\t\t\t\t// Error has already been handled.\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tin = append(in, reflect.ValueOf(pv))\n\t\t}\n\n\t\treadTimeout := op.bodyReadTimeout\n\t\tif op.requestSchema != nil {\n\t\t\tif readTimeout == 0 {\n\t\t\t\t// Default to 15s when reading/parsing/validating automatically.\n\t\t\t\treadTimeout = 15 * time.Second\n\t\t\t}\n\n\t\t\tif conn := getConn(c.Request); readTimeout > 0 && conn != nil {\n\t\t\t\tconn.SetReadDeadline(time.Now().Add(readTimeout))\n\t\t\t}\n\n\t\t\t// Parse body\n\t\t\ti := len(in)\n\n\t\t\tvar bodyType reflect.Type\n\t\t\tif op.unsafe() {\n\t\t\t\tbodyType = reflect.TypeOf(map[string]interface{}{})\n\t\t\t} else {\n\t\t\t\tbodyType = method.Type().In(i)\n\t\t\t}\n\n\t\t\tb, success := getRequestBody(c, bodyType, op)\n\t\t\tif !success {\n\t\t\t\t// Error was already handled in `getRequestBody`.\n\t\t\t\treturn\n\t\t\t}\n\t\t\tbval := reflect.ValueOf(b)\n\t\t\tif bval.Kind() == reflect.Ptr {\n\t\t\t\tbval = bval.Elem()\n\t\t\t}\n\t\t\tin = append(in, bval)\n\t\t} else if readTimeout > 0 {\n\t\t\t// We aren't processing the input, but still set the timeout.\n\t\t\tif conn := getConn(c.Request); conn != nil {\n\t\t\t\tconn.SetReadDeadline(time.Now().Add(readTimeout))\n\t\t\t}\n\t\t}\n\n\t\tout := method.Call(in)\n\n\t\tif op.unsafe() {\n\t\t\t// Normal handlers return multiple values. Unsafe handlers return one\n\t\t\t// single list of response values. Here we convert.\n\t\t\tnewOut := make([]reflect.Value, out[0].Len())\n\n\t\t\tfor i := 0; i < out[0].Len(); i++ {\n\t\t\t\tnewOut[i] = out[0].Index(i)\n\t\t\t}\n\n\t\t\tout = newOut\n\t\t}\n\n\t\t// Find and return the first non-zero response. The status code comes\n\t\t// from the registered `huma.Response` struct.\n\t\t// This breaks down with scalar types... so they need to be passed\n\t\t// as a pointer and we'll dereference it automatically.\n\t\tfor i, o := range out[len(op.responseHeaders):] {\n\t\t\tif o.Kind() == reflect.Interface {\n\t\t\t\t// Unsafe handlers return slices of interfaces and IsZero will never\n\t\t\t\t// evaluate to true on items within them. Instead, pull out the\n\t\t\t\t// underlying data which may or may not be zero.\n\t\t\t\to = o.Elem()\n\t\t\t}\n\n\t\t\tif !o.IsZero() {\n\t\t\t\tbody := o.Interface()\n\n\t\t\t\tr := op.responses[i]\n\n\t\t\t\t// Set response headers\n\t\t\t\tfor j, header := range op.responseHeaders {\n\t\t\t\t\tvalue := out[j]\n\n\t\t\t\t\tfound := false\n\t\t\t\t\tfor _, name := range r.Headers {\n\t\t\t\t\t\tif name == header.Name {\n\t\t\t\t\t\t\tfound = true\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\tif !found {\n\t\t\t\t\t\tif !value.IsZero() {\n\t\t\t\t\t\t\t// Log an error to be fixed later if using the logging middleware.\n\t\t\t\t\t\t\tif l, ok := c.Get(\"log\"); ok {\n\t\t\t\t\t\t\t\tif log, ok := l.(*zap.SugaredLogger); ok {\n\t\t\t\t\t\t\t\t\tlog.Errorf(\"Header '%s' with value '%v' set on a response that did not declare it\", header.Name, value)\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\t// Skip this header as the response doesn't list it.\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\tif !value.IsZero() {\n\t\t\t\t\t\tv := value.Interface()\n\t\t\t\t\t\tif value.Kind() == reflect.Ptr {\n\t\t\t\t\t\t\tv = value.Elem().Interface()\n\t\t\t\t\t\t}\n\t\t\t\t\t\tc.Header(header.Name, fmt.Sprintf(\"%v\", v))\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif r.ContentType == \"\" {\n\t\t\t\t\t// No body allowed, e.g. for HTTP 204.\n\t\t\t\t\tc.Status(r.StatusCode)\n\t\t\t\t\tbreak\n\t\t\t\t}\n\n\t\t\t\tif err, ok := body.(*ErrorModel); ok {\n\t\t\t\t\t// This is an error response. Automatically set some values if missing.\n\t\t\t\t\tif err.Status == 0 {\n\t\t\t\t\t\terr.Status = r.StatusCode\n\t\t\t\t\t}\n\n\t\t\t\t\tif err.Title == \"\" {\n\t\t\t\t\t\terr.Title = http.StatusText(r.StatusCode)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif strings.HasPrefix(r.ContentType, \"application/json\") || strings.HasSuffix(r.ContentType, \"+json\") {\n\t\t\t\t\tc.JSON(r.StatusCode, body)\n\t\t\t\t} else if strings.HasPrefix(r.ContentType, \"application/yaml\") || strings.HasSuffix(r.ContentType, \"+yaml\") {\n\t\t\t\t\tc.YAML(r.StatusCode, body)\n\t\t\t\t} else {\n\t\t\t\t\tif o.Kind() == reflect.Ptr {\n\t\t\t\t\t\t// This is a pointer to something, so we derefernce it and get\n\t\t\t\t\t\t// its value before converting to a string because Printf will\n\t\t\t\t\t\t// by default print pointer addresses instead of their value.\n\t\t\t\t\t\tbody = o.Elem().Interface()\n\t\t\t\t\t}\n\t\t\t\t\tc.Data(r.StatusCode, r.ContentType, []byte(fmt.Sprintf(\"%v\", body)))\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t})\n}", "title": "" }, { "docid": "49ac3e5e6330dd99a882db5298212e37", "score": "0.4269001", "text": "func validMethod(method string) bool {\n /*\n Method = \"GET\" ; Section 9.3\n | \"POST\" ; Section 9.5\n */\n switch method {\n case \"GET\", \"POST\":\n return true\n }\n return false\n}", "title": "" }, { "docid": "a57c4ade3c7d61b7197b53513eb1d496", "score": "0.42583227", "text": "func (m *Method) IsAdd() bool {\n\treturn m.name.Equals(nomenclator.Add)\n}", "title": "" }, { "docid": "1ecdee7ce7a2a92b1a7c2bc6f6c6c98c", "score": "0.4253498", "text": "func (mr *MockValidationProviderMockRecorder) ValidateStruct(typeName, entity interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ValidateStruct\", reflect.TypeOf((*MockValidationProvider)(nil).ValidateStruct), typeName, entity)\n}", "title": "" }, { "docid": "e12e97d76090e93fac2236dadcd28d4e", "score": "0.4252137", "text": "func (ve *ValidationErrors) Add(field string, err error) {\n\tve.errors = append(ve.errors, &ValidationError{field: field, err: err})\n}", "title": "" }, { "docid": "0235ccf77d91072cf215c9d2d883bacc", "score": "0.42518255", "text": "func WithValidator(fn func(val string) error) CliOptFn {\n\treturn func(opt *CliOpt) { opt.Validator = fn }\n}", "title": "" }, { "docid": "98b8b39d97302b2ebd2eda2834594f28", "score": "0.42490372", "text": "func (s *Store) FirewallRuleAddTag(ctx context.Context, id, tag string) error {\n\tobjID, err := primitive.ObjectIDFromHex(id)\n\tif err != nil {\n\t\treturn FromMongoError(err)\n\t}\n\n\tresult, err := s.db.Collection(\"firewall_rules\").UpdateOne(ctx, bson.M{\"_id\": objID}, bson.M{\"$addToSet\": bson.M{\"filter.tags\": tag}})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif result.ModifiedCount <= 0 {\n\t\treturn store.ErrNoDocuments\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "224e42e741ff8e2d54f6358513262456", "score": "0.42420205", "text": "func (cv *CustomValidator) Validate(i interface{}) error {\n\treturn cv.validator.Struct(i)\n}", "title": "" }, { "docid": "4c18a7586402ce5b8872eb3df9e772c9", "score": "0.42419013", "text": "func (l *Lifecycle) Method(method string) *Lifecycle {\n\tl.filters = append(l.filters, func(v interface{}) bool {\n\t\trule := convert(v)\n\t\tif rule == nil {\n\t\t\treturn false\n\t\t}\n\t\tshared.Debugf(\"%s like %s -> %t\\n\", method, aws.StringValue(rule.ID), strings.EqualFold(method, aws.StringValue(rule.ID)))\n\t\treturn strings.EqualFold(method, aws.StringValue(rule.ID))\n\t})\n\treturn l\n}", "title": "" }, { "docid": "a84e51e6a771435e469ddaca93df16df", "score": "0.42407447", "text": "func (cv *CustomValidator) Validate(i interface{}) error {\n\treturn cv.V.Struct(i)\n}", "title": "" }, { "docid": "34fc771598ee35c20d4b25c0c1da2b13", "score": "0.42372638", "text": "func RegisterMethod(method string) {\n\tif method == \"\" {\n\t\treturn\n\t}\n\tmethod = strings.ToUpper(method)\n\tif _, ok := methodMap[method]; ok {\n\t\treturn\n\t}\n\tn := len(methodMap)\n\tif n > strconv.IntSize-2 {\n\t\tpanic(fmt.Sprintf(\"chi: max number of methods reached (%d)\", strconv.IntSize))\n\t}\n\tmt := methodTyp(2 << n)\n\tmethodMap[method] = mt\n\tmALL |= mt\n}", "title": "" }, { "docid": "49e03113e38a32e738c77045184986cf", "score": "0.4229406", "text": "func UserStructLevelValidation(sl validator.StructLevel) {\n\n\tuser := sl.Current().Interface().(User)\n\n\tif len(user.FirstName) == 0 && len(user.LastName) == 0 {\n\t\tsl.ReportError(user.FirstName, \"fname\", \"FirstName\", \"fnameorlname\", \"\")\n\t\tsl.ReportError(user.LastName, \"lname\", \"LastName\", \"fnameorlname\", \"\")\n\t}\n\n\t// plus can do more, even with different tag than \"fnameorlname\"\n}", "title": "" }, { "docid": "0c4cf950e8b5a8a1fc81c9496a69278c", "score": "0.4226158", "text": "func (r *Binding) ValidationString() (ret string){\n\tt:=reflect.TypeOf(r.i)\n\tvar methodType reflect.Type\n\tfirst := 0;\n\tif (r.elemNum >= 0) {\n\t\tmethodType = t.Method(r.elemNum).Type\n\t\tfirst =1\n\t} else {\n\t\tmethodType = t\n\t}\n\targCount := methodType.NumIn();\n\tfor n:=first;n < argCount;n++ {\n\t\t// If a injection is found for this parameter it will\n\t\t// be ignored in the validation string.\n\t\tif _,found := r.injections[n]; found {\n\t\t\tcontinue\n\t\t}\n\n\t\tat:= methodType.In(n)\n\t\tret += string(kindMapping[at.Kind()])\n\t}\n\treturn\n}", "title": "" }, { "docid": "ae305b7237ad7d35ac08849589197996", "score": "0.42196718", "text": "func (v *Validator) Add(rules ...Rule) {\n\tv.Rules = append(v.Rules, rules...)\n}", "title": "" }, { "docid": "e3ff6a4de7f16a679d457990154001d5", "score": "0.42152768", "text": "func (i *InterfaceSpec) Method(spec *FuncSpec) *InterfaceSpec {\n\ti.Methods = append(i.Methods, spec)\n\treturn i\n}", "title": "" }, { "docid": "5c79f9ac024af71efc9f67fc2ccf3b4b", "score": "0.42072082", "text": "func (v Method) IsValid() bool {\n\treturn v.Ordinal() >= 0\n}", "title": "" }, { "docid": "becc96f08fec1b904b5585eb1af05813", "score": "0.4196778", "text": "func (m *Model) NewMethod(methodName string, fnct interface{}) *Method {\n\tmeth, exists, inModel := m.methods.get(methodName)\n\tif exists && !inModel {\n\t\t// We are trying to add an existing mixin method as a new method\n\t\tlog.Panic(\"Call to NewMethod (NewMethod) with an existing method name\", \"model\", m.name, \"method\", methodName)\n\t}\n\t// meth might not exist if it has not been declared in pool package\n\tif !exists {\n\t\tmeth = m.AddEmptyMethod(methodName)\n\t}\n\tmeth.finalize(fnct)\n\treturn meth\n}", "title": "" }, { "docid": "c3c560164aa197631c4ed5023a506c59", "score": "0.41923982", "text": "func (va *validator) SetValidateTag(validateTag string) {\n\tva.validateTag = validateTag\n}", "title": "" }, { "docid": "d173d5efaeb2ed98915848dbdf2817c2", "score": "0.41895187", "text": "func (o *Operation) AddTag(mutatorTag tag.Mutator) {\n\to.mutatorTags = append(o.mutatorTags, mutatorTag)\n}", "title": "" }, { "docid": "5ad7643ef74da97912ca4dc8f54f97d4", "score": "0.4188033", "text": "func AddTag(tag *models.Tag) (error, *models.Tag) {\n\tif len(strings.TrimSpace(tag.Name)) == 0 {\n\t\treturn errors.New(\"Tried to add tag with null or empty name\"), nil\n\t}\n\n\tfmt.Printf(\"Adding tag '%s'\\n\", tag.Name)\n\treturn nil, tag\n}", "title": "" }, { "docid": "bc00ca77de778afc35b5a4cec84948c2", "score": "0.4186557", "text": "func (p *baseParser) HasMethod(name string) bool {\n\tfor _, method := range p.File.Methods {\n\t\tif method.Name == name {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "97e043e2ed77cbd5295ac5f4f7878c5f", "score": "0.41862142", "text": "func AddMethodHook(hookPoint boil.HookPoint, methodHook MethodHook) {\n\tswitch hookPoint {\n\tcase boil.BeforeInsertHook:\n\t\tmethodBeforeInsertHooks = append(methodBeforeInsertHooks, methodHook)\n\tcase boil.BeforeUpdateHook:\n\t\tmethodBeforeUpdateHooks = append(methodBeforeUpdateHooks, methodHook)\n\tcase boil.BeforeDeleteHook:\n\t\tmethodBeforeDeleteHooks = append(methodBeforeDeleteHooks, methodHook)\n\tcase boil.BeforeUpsertHook:\n\t\tmethodBeforeUpsertHooks = append(methodBeforeUpsertHooks, methodHook)\n\tcase boil.AfterInsertHook:\n\t\tmethodAfterInsertHooks = append(methodAfterInsertHooks, methodHook)\n\tcase boil.AfterSelectHook:\n\t\tmethodAfterSelectHooks = append(methodAfterSelectHooks, methodHook)\n\tcase boil.AfterUpdateHook:\n\t\tmethodAfterUpdateHooks = append(methodAfterUpdateHooks, methodHook)\n\tcase boil.AfterDeleteHook:\n\t\tmethodAfterDeleteHooks = append(methodAfterDeleteHooks, methodHook)\n\tcase boil.AfterUpsertHook:\n\t\tmethodAfterUpsertHooks = append(methodAfterUpsertHooks, methodHook)\n\t}\n}", "title": "" }, { "docid": "4eb6bdcab7421ea83b5e83fe75386cc8", "score": "0.4181393", "text": "func ValidateStruct(model interface{}) (bool, error) {\n\tvalidate := validator.New()\n\tif err := validate.Struct(model); err != nil {\n\t\treturn false, err\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "ca7e3f1f501168032e0d1e98217a6b93", "score": "0.4179427", "text": "func (l *localSchemaManager) validateCanAddClass(knd kind.Kind, class *models.SemanticSchemaClass) error {\n\t// First check if there is a name clash.\n\terr := l.validateClassNameUniqueness(class.Class)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = l.validateClassNameOrKeywordsCorrect(knd, class.Class, class.Keywords)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Check properties\n\tfoundNames := map[string]bool{}\n\tfor _, property := range class.Properties {\n\t\terr = l.validatePropertyNameOrKeywordsCorrect(class.Class, property.Name, property.Keywords)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif foundNames[property.Name] == true {\n\t\t\treturn fmt.Errorf(\"Name '%s' already in use as a property name for class '%s'\", property.Name, class.Class)\n\t\t}\n\n\t\tfoundNames[property.Name] = true\n\n\t\t// Validate data type of property.\n\t\tschema := l.GetSchema()\n\t\t_, err := (&schema).FindPropertyDataType(property.AtDataType)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Data type fo property '%s' is invalid; %v\", property.Name, err)\n\t\t}\n\t}\n\n\t// all is fine!\n\treturn nil\n}", "title": "" }, { "docid": "e66fed2f508a4a45170001b3094e7d94", "score": "0.41706336", "text": "func (s *Strct) AddSubstruct(name string) *Strct {\n\tres := Struct(s.useString)\n\tres.addPrimitive(\"Valid\", \"bool\")\n\ts.fields = append(s.fields, FieldDef{\n\t\tName: name,\n\t\tType: res,\n\t})\n\treturn res\n}", "title": "" }, { "docid": "94a5a702cfec769465ab013a53501b12", "score": "0.41634896", "text": "func (_Validators *ValidatorsTransactor) AddValidator(opts *bind.TransactOpts, _validator common.Address, _madID [2]*big.Int) (*types.Transaction, error) {\n\treturn _Validators.contract.Transact(opts, \"addValidator\", _validator, _madID)\n}", "title": "" }, { "docid": "e9ea89f7a658442b8e512b1226364f65", "score": "0.4160426", "text": "func (v *Validator) Struct(s interface{}) error {\n\tif err := v.Validate.Struct(s); err != nil {\n\t\tvalidationErrors := err.(validator.ValidationErrors)\n\t\tfields := make([]string, 0, len(validationErrors))\n\t\tfor _, err := range err.(validator.ValidationErrors) {\n\t\t\tfields = append(fields, err.Namespace())\n\t\t}\n\n\t\treturn errors.ValidationError.New(strings.Join(fields, \",\"))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ada19284d7538f0791486623b845dda3", "score": "0.4159581", "text": "func ValidatePush(spec v1alpha1.OCIBuilderSpec) error {\n\tif spec.Push == nil {\n\t\treturn errors.New(\"at least one push spec must be provided\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c1586e9fb416f5712bc8ad5070b99741", "score": "0.4154024", "text": "func ValidateReservation() {\n\n}", "title": "" }, { "docid": "fd9140ca9656d0631bddd5e43263609a", "score": "0.41438335", "text": "func validTag(val string) {\n\tif invalidTagOrAttr(val) {\n\t\tpanic(fmt.Errorf(`[gax] invalid tag name %q`, val))\n\t}\n}", "title": "" }, { "docid": "9ca3718f4cc50c625fa21a53baf120d4", "score": "0.41385826", "text": "func (v *defaultValidator) ValidateStruct(obj interface{}) error {\n\tif obj == nil {\n\t\treturn nil\n\t}\n\n\tvalue := reflect.ValueOf(obj)\n\tswitch value.Kind() {\n\tcase reflect.Ptr:\n\t\treturn v.ValidateStruct(value.Elem().Interface())\n\tcase reflect.Struct:\n\t\treturn v.validateStruct(obj)\n\tcase reflect.Slice, reflect.Array:\n\t\tcount := value.Len()\n\t\tvalidateRet := make(sliceValidateError, 0)\n\t\tfor i := 0; i < count; i++ {\n\t\t\tif err := v.ValidateStruct(value.Index(i).Interface()); err != nil {\n\t\t\t\tvalidateRet = append(validateRet, err)\n\t\t\t}\n\t\t}\n\t\tif len(validateRet) == 0 {\n\t\t\treturn nil\n\t\t}\n\t\treturn validateRet\n\tdefault:\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "ad8c8a214aacf41de3f7796bbc55be4a", "score": "0.41354334", "text": "func New(funcs ...Func) *analysis.Analyzer {\n\tvar flagFuncs []Func\n\treturn &analysis.Analyzer{\n\t\tName: \"musttag\",\n\t\tDoc: \"enforce field tags in (un)marshaled structs\",\n\t\tFlags: flags(&flagFuncs),\n\t\tRequires: []*analysis.Analyzer{inspect.Analyzer},\n\t\tRun: func(pass *analysis.Pass) (any, error) {\n\t\t\tl := len(builtin) + len(funcs) + len(flagFuncs)\n\t\t\tm := make(map[string]Func, l)\n\t\t\ttoMap := func(slice []Func) {\n\t\t\t\tfor _, fn := range slice {\n\t\t\t\t\tm[fn.Name] = fn\n\t\t\t\t}\n\t\t\t}\n\t\t\ttoMap(builtin)\n\t\t\ttoMap(funcs)\n\t\t\ttoMap(flagFuncs)\n\t\t\treturn run(pass, m)\n\t\t},\n\t}\n}", "title": "" }, { "docid": "4dc1a4ac32640b8fba07c7e5a3ccfd22", "score": "0.41331446", "text": "func (r *Resource) AddMethod(method *Method) {\n\tif method != nil {\n\t\tr.methods = append(r.methods, method)\n\t\tsort.Sort(r.methods)\n\t\tmethod.SetOwner(r)\n\t}\n}", "title": "" }, { "docid": "c9a7337eb2051e68fe3a9783c434f517", "score": "0.41314527", "text": "func ReturnIfInvalidMethod(req *http.Request,method string,w http.ResponseWriter) bool {\n\tif req.Method != method {\n\t\tres.SendError(w,\"Invalid method\",nil,422)\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" } ]
07d4be11494d169d849d930985ce3a70
GetFuncs returns map of names to functions, that are supported by template provider.
[ { "docid": "bbd31289b263a1ec2f23940b5db7fb11", "score": "0.81997484", "text": "func GetFuncs() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"AddFloat\": addFloat,\n\t\t\"AddInt\": addInt,\n\t\t\"DefaultParam\": defaultParam,\n\t\t\"DivideFloat\": divideFloat,\n\t\t\"DivideInt\": divideInt,\n\t\t\"IfThenElse\": ifThenElse,\n\t\t\"IncludeFile\": includeFile,\n\t\t\"Loop\": loop,\n\t\t\"MaxFloat\": maxFloat,\n\t\t\"MaxInt\": maxInt,\n\t\t\"MinFloat\": minFloat,\n\t\t\"MinInt\": minInt,\n\t\t\"Mod\": mod,\n\t\t\"MultiplyFloat\": multiplyFloat,\n\t\t\"MultiplyInt\": multiplyInt,\n\t\t\"RandInt\": randInt,\n\t\t\"RandIntRange\": randIntRange,\n\t\t\"Seq\": seq,\n\t\t\"SliceOfZeros\": sliceOfZeros,\n\t\t\"SubtractFloat\": subtractFloat,\n\t\t\"SubtractInt\": subtractInt,\n\t\t\"YamlQuote\": yamlQuote,\n\t}\n}", "title": "" } ]
[ { "docid": "4682c055b0a6e7b033c46bfe5334062b", "score": "0.74222434", "text": "func GetFuncMap() template.FuncMap {\n\tf := sprig.TxtFuncMap()\n\n\textra := template.FuncMap{\n\t\t\"get\": TmplGet,\n\t\t\"string\": TmplString,\n\t\t\"array\": TmplArray,\n\t\t\"objectArray\": TmplObjectArray,\n\t\t\"strConst\": TmplStrConst,\n\t\t\"int\": TmplInt,\n\t\t\"is\": TmplIs,\n\t\t\"isnt\": TmplIsnt,\n\t\t\"toYaml\": TmplToYaml,\n\t\t\"fromYaml\": TmplFromYaml,\n\t\t\"getFiles\": TmplGetFiles,\n\t\t\"getFileContent\": TmplGetFileContent,\n\t\t\"fileExists\": TmplFileExists,\n\t\t\"trim\": strings.TrimSpace,\n\t\t\"upperFirst\": TmplUpperFirst,\n\t\t\"rightPad\": TmplRightPad,\n\t}\n\n\tfor k, v := range extra {\n\t\tf[k] = v\n\t}\n\n\treturn f\n}", "title": "" }, { "docid": "7763889c72476feba8eca56b4365b578", "score": "0.6903892", "text": "func (t *HTMLTemplateEngine) TemplateFuncs() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"identifier\": ParseIdentifier,\n\t}\n}", "title": "" }, { "docid": "b796754b7feea1fe806930fd087c856e", "score": "0.686314", "text": "func (plugin *Plugin) GetFunctions() map[string]interface{} {\n\tfunctions := make(map[string]interface{})\n\tfunctions[\"http\"] = map[string]interface{}{\n\t\t\"get\": plugin.Get,\n\t}\n\treturn functions\n}", "title": "" }, { "docid": "93bcae647e4a84c91be0d6472c2816da", "score": "0.65720415", "text": "func (p *Generator) GetFuncMap() template.FuncMap {\n\tf := template.FuncMap{\n\n\t\t/* Mermaid Diagram functions */\n\t\t\"IntegrationMermaid\": p.IntegrationMermaid,\n\t\t\"SequenceMermaid\": p.SequenceMermaid,\n\t\t\"DataModelReturnMermaid\": p.DataModelReturnMermaid,\n\t\t\"DataModelMermaid\": p.DataModelMermaid,\n\t\t\"DataModelAliasMermaid\": p.DataModelAliasMermaid,\n\t\t\"DataModelAppMermaid\": p.DataModelAppMermaid,\n\n\t\t// Datamodel table functions\n\t\t\"DataModelReturnTable\": p.DataModelReturnTable,\n\t\t\"DataModelAliasTable\": p.DataModelAliasTable,\n\t\t\"DataModelTable\": p.DataModelTable,\n\n\t\t/* Plantuml Diagram functions */\n\n\t\t\"IntegrationPlantuml\": p.IntegrationPlantuml,\n\t\t\"SequencePlantuml\": p.SequencePlantuml,\n\t\t\"DataModelReturnPlantuml\": p.DataModelReturnPlantuml,\n\t\t\"DataModelParamPlantuml\": p.DataModelParamPlantuml,\n\t\t\"DataModelAppPlantuml\": p.DataModelAppPlantuml,\n\t\t\"DataModelPlantuml\": p.DataModelPlantuml,\n\t\t\"DataModelAliasPlantuml\": p.DataModelAliasPlantuml,\n\n\t\t/* Redoc Functions */\n\t\t\"CreateRedoc\": p.CreateRedoc,\n\n\t\t/* Utility functions */\n\t\t\"GetParamType\": p.GetParamType,\n\t\t\"GetReturnType\": p.GetReturnType,\n\t\t\"SourcePath\": p.SourcePath,\n\t\t\"Packages\": p.Packages,\n\t\t\"MacroPackages\": p.MacroPackages,\n\t\t\"hasPattern\": syslutil.HasPattern,\n\t\t\"ModuleAsPackages\": p.ModuleAsPackages,\n\t\t\"ModulePackageName\": ModulePackageName,\n\t\t\"ModuleNamespace\": ModuleNamespace,\n\t\t\"SortedKeys\": SortedKeys,\n\t\t\"Attribute\": Attribute,\n\t\t\"ServiceMetadata\": ServiceMetadata,\n\t\t\"Fields\": Fields,\n\t\t\"FieldType\": FieldType,\n\t\t\"SanitiseOutputName\": SanitiseOutputName,\n\t\t\"SimpleName\": SimpleName,\n\t\t\"ToLower\": strings.ToLower,\n\t\t\"ToCamel\": strcase.ToCamel,\n\t\t\"Remove\": Remove,\n\t\t\"ToTitle\": strings.ToTitle,\n\t\t\"Base\": filepath.Base,\n\t\t\"Last\": Last,\n\t}\n\tfor name, function := range sprig.FuncMap() {\n\t\tf[name] = function\n\t}\n\treturn f\n}", "title": "" }, { "docid": "1e8d120c20f783c7d38f74ea4309d0ad", "score": "0.6561879", "text": "func NewFuncs(ctx context.Context, _ string) (template.FuncMap, error) {\n\tdriver, _, _ := xo.DriverDbSchema(ctx)\n\tfuncs := &Funcs{\n\t\tdriver: driver,\n\t\tconstraint: Constraint(ctx),\n\t\tescCols: Esc(ctx, \"columns\"),\n\t\tescTypes: Esc(ctx, \"types\"),\n\t\tengine: Engine(ctx),\n\t\ttrimComment: TrimComment(ctx),\n\t}\n\treturn template.FuncMap{\n\t\t\"coldef\": funcs.coldef,\n\t\t\"viewdef\": funcs.viewdef,\n\t\t\"procdef\": funcs.procdef,\n\t\t\"driver\": funcs.driverfn,\n\t\t\"constraint\": funcs.constraintfn,\n\t\t\"esc\": funcs.escType,\n\t\t\"fields\": funcs.fields,\n\t\t\"engine\": funcs.enginefn,\n\t\t\"literal\": funcs.literal,\n\t\t\"isEndConstraint\": funcs.isEndConstraint,\n\t\t\"comma\": comma,\n\t}, nil\n}", "title": "" }, { "docid": "02eece2af8095c0b637f81494a708d05", "score": "0.6556127", "text": "func (v *View) GetFuncMap() template.FuncMap {\n\tfm := make(template.FuncMap)\n\tfor k, v := range defaultFuncMap {\n\t\tfm[k] = v\n\t}\n\tfor k, v := range v.FuncMap {\n\t\tfm[k] = v\n\t}\n\treturn fm\n}", "title": "" }, { "docid": "fcf71fe342a419cd865abae4be07154a", "score": "0.6501904", "text": "func (p *Project) GetFuncmap() template.FuncMap {\n\tfm := template.FuncMap{\n \"dir\": p.Dir,\n \"cmdnamedir\": p.CMDNameDir,\n \"license\": p.License,\n\t}\n\n\treturn fm\n}", "title": "" }, { "docid": "f5281e6e28c2ac5281628e2e2d8f31fc", "score": "0.63765466", "text": "func FuncMap(funcs map[string]interface{}) (f template.FuncMap) {\n\t// For more documentation about templating see http://masterminds.github.io/sprig/\n\tf = sprig.TxtFuncMap()\n\n\t// marshaling functions that be be inserted into the templated files\n\tf[\"toJson\"] = toJson\n\tf[\"toYaml\"] = toYaml\n\tf[\"toToml\"] = toToml\n\n\tfor name, fun := range funcs {\n\t\tf[name] = fun\n\t}\n\treturn f\n}", "title": "" }, { "docid": "c8cbafc575974fe5931fbe90b498ec5a", "score": "0.6369581", "text": "func TemplateFuncMap(tmpl *template.Template) (funcMap template.FuncMap) {\n\tfuncMap = make(template.FuncMap)\n\tfuncMap[\"include\"] = func(name string, data interface{}) (string, error) {\n\t\tbuf := bytes.NewBuffer(nil)\n\t\tif err := tmpl.ExecuteTemplate(buf, name, data); err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\treturn buf.String(), nil\n\t}\n\treturn funcMap\n}", "title": "" }, { "docid": "8cb69b1246905c06148afc1f34a496ed", "score": "0.630393", "text": "func AllFuncs() template.FuncMap {\n\treturn Join(Booleans, Console, Dotpath, Iterables, Math, Page, Path, Strings, Time, Url, RegExp, TextTools)\n}", "title": "" }, { "docid": "3755aee5f917662d55f82927adc9ed7a", "score": "0.6268085", "text": "func FuncDefs() template.FuncMap {\n\treturn template.FuncMap(egFuncMap)\n}", "title": "" }, { "docid": "a9e73a48ba9b45afc2582bac9f4471ed", "score": "0.6230169", "text": "func (rig *Rig) getGetFunctions() error {\n\tvar funcList []string\n\n\tfor f, fStr := range FuncName {\n\t\tif res, err := rig.HasGetFunc(f); err != nil {\n\t\t\treturn err\n\t\t} else {\n\t\t\tif res > 0 {\n\t\t\t\tfuncList = append(funcList, fStr)\n\t\t\t}\n\t\t}\n\t}\n\tsort.Strings(funcList)\n\trig.Caps.GetFunctions = funcList\n\treturn nil\n}", "title": "" }, { "docid": "b7407a62b91f60a6f79fd36df832da7d", "score": "0.6204076", "text": "func TemplateFunctions() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"encryptAWS\": render.EncryptAWS,\n\t\t\"decryptAWS\": render.DecryptAWS,\n\t\t\"encryptGCP\": render.EncryptGCP,\n\t\t\"decryptGCP\": render.DecryptGCP,\n\t\t\"encryptAzure\": render.EncryptAzure,\n\t\t\"decryptAzure\": render.DecryptAzure,\n\t}\n}", "title": "" }, { "docid": "c11bdc2e9775318bd6a2258b92def617", "score": "0.61649084", "text": "func TemplateFuncs(a template.FuncMap, b ...template.FuncMap) template.FuncMap {\n\tfor _, v := range b {\n\t\tfor k, fn := range v {\n\t\t\ta[k] = fn // override existing maps\n\t\t}\n\t}\n\n\treturn a\n}", "title": "" }, { "docid": "75d2d5102d160a15a8e7e820207f1630", "score": "0.616006", "text": "func (o Output) TemplateFuncs() template.FuncMap {\n\treturn TemplateFuncs(o.Profile)\n}", "title": "" }, { "docid": "5aa4056f77b558e9b01204ac54f55f5c", "score": "0.6159371", "text": "func FuncMap() template.FuncMap {\n\treturn template.FuncMap(GenericFuncMap())\n}", "title": "" }, { "docid": "54cbdd9924f7fcb8aa33d0f434716acc", "score": "0.6143363", "text": "func MakeTemplateFuncs(fo TemplateFunctionOptions) map[string]interface{} {\n\tr := map[string]interface{}{\n\t\t// DateFormat returns a time Formatted to the given layout and timezone.\n\t\t// If the timezone is unset, it defaults to \"New_York.\"\n\t\t\"DateFormat\": func(when time.Time, layout string, timezone string) string {\n\t\t\tif len(timezone) == 0 {\n\t\t\t\ttimezone = \"America/New_York\" // I ♥ NY\n\t\t\t}\n\t\t\tloc, err := time.LoadLocation(timezone)\n\t\t\tif err != nil {\n\t\t\t\treturn when.Format(layout)\n\t\t\t}\n\n\t\t\twhenTZ := when.In(loc)\n\t\t\treturn whenTZ.Format(layout)\n\t\t},\n\n\t\t// Static returns a link to a static file.\n\t\t\"Static\": func(filetype, filename string) string {\n\t\t\treturn fmt.Sprintf(\"/static/%s/%s\", filetype, filename)\n\t\t},\n\n\t\t// GetTimezone returns the timezone for a user.\n\t\t// Defaults to \"New_York\".\n\t\t\"GetTimezone\": func(u gimlet.User) string {\n\t\t\tusr, ok := u.(*user.DBUser)\n\t\t\tif ok && usr != nil && usr.Settings.Timezone != \"\" {\n\t\t\t\treturn usr.Settings.Timezone\n\t\t\t}\n\t\t\treturn \"America/New_York\"\n\t\t},\n\t\t\"GetRegion\": func(u gimlet.User) string {\n\t\t\tusr, ok := u.(*user.DBUser)\n\t\t\tif ok && usr != nil && usr.Settings.Region != \"\" {\n\t\t\t\treturn usr.Settings.Region\n\t\t\t}\n\t\t\treturn evergreen.DefaultEC2Region\n\t\t},\n\t\t// Trunc cuts off a string to be n characters long.\n\t\t\"Trunc\": func(s string, n int) string {\n\t\t\tif n > len(s) {\n\t\t\t\treturn s\n\t\t\t}\n\t\t\treturn s[0:n]\n\t\t},\n\n\t\t// HelpUrl returns the address of the Evergreen help page,\n\t\t// if one is set.\n\t\t\"HelpUrl\": func() string {\n\t\t\tif fo.HelpHome != \"\" {\n\t\t\t\treturn fo.HelpHome\n\t\t\t}\n\t\t\treturn defaultHelpURL\n\t\t},\n\t}\n\n\tr[\"BuildRevision\"] = func() string {\n\t\treturn evergreen.BuildRevision\n\t}\n\treturn r\n\n}", "title": "" }, { "docid": "07ed48d41ffdc99169f9fc69cc72cfa9", "score": "0.6086206", "text": "func (a *Generator) newTemplateFuncs() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"filterFields\": a.filterFields,\n\t\t\"shortName\": a.shortName,\n\t\t\"nullcheck\": a.nullcheck,\n\n\t\t\"hasColumn\": a.hasColumn,\n\t\t\"columnNames\": a.columnNames,\n\t\t\"columnNamesQuery\": a.columnNamesQuery,\n\t\t\"columnPrefixNames\": a.columnPrefixNames,\n\n\t\t\"hasField\": a.hasField,\n\t\t\"fieldNames\": a.fieldNames,\n\n\t\t\"goParam\": a.goParam,\n\t\t\"goEncodedParam\": a.goEncodedParam,\n\t\t\"goParams\": a.goParams,\n\t\t\"goEncodedParams\": a.goEncodedParams,\n\n\t\t\"escape\": a.escape,\n\t\t\"toLower\": a.toLower,\n\t\t\"pluralize\": a.pluralize,\n\t}\n}", "title": "" }, { "docid": "ccd92fb9254ea7bed1ad91c98ab081e2", "score": "0.6031099", "text": "func (c *Callable) Funcs() []template.Function {\n\treturn []template.Function{\n\t\t{\n\t\t\tName: \"depend\",\n\t\t\tFunc: types.NewDepend,\n\t\t},\n\t\t{\n\t\t\tName: \"flag\",\n\t\t\tFunc: c.defineOrGetParameter,\n\t\t},\n\t\t{\n\t\t\tName: \"param\",\n\t\t\tFunc: c.defineOrGetParameter,\n\t\t},\n\t\t{\n\t\t\tName: \"listflag\",\n\t\t\tFunc: c.defineOrGetParameterList,\n\t\t},\n\t\t{\n\t\t\tName: \"listparam\",\n\t\t\tFunc: c.defineOrGetParameterList,\n\t\t},\n\t\t{\n\t\t\tName: \"fetch\",\n\t\t\tFunc: func(p string, opt ...interface{}) (string, error) {\n\t\t\t\t// Overrides the base 'file' to account for the fact that\n\t\t\t\t// some variables in the flag building phase are not set and would\n\t\t\t\t// cause errors. In general, use include for loading files whose\n\t\t\t\t// paths are computed from some flags. Use 'source' for including\n\t\t\t\t// sibling templates that also include other flag definitions.\n\t\t\t\tif c.exec {\n\t\t\t\t\tcontent, err := c.Template.Fetch(p, opt...)\n\t\t\t\t\tif err == nil {\n\t\t\t\t\t\treturn content, nil\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn \"\", nil\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tName: \"include\",\n\t\t\tFunc: func(p string, opt ...interface{}) (string, error) {\n\t\t\t\t// Overrides the base 'include' to account for the fact that\n\t\t\t\t// some variables in the flag building phase are not set and would\n\t\t\t\t// cause errors. In general, use include for loading files whose\n\t\t\t\t// paths are computed from some flags. Use 'source' for including\n\t\t\t\t// sibling templates that also include other flag definitions.\n\t\t\t\tif c.exec {\n\t\t\t\t\tcontent, err := c.Template.Include(p, opt...)\n\t\t\t\t\tif err == nil {\n\t\t\t\t\t\treturn content, nil\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn \"{}\", nil\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tName: \"file\",\n\t\t\tFunc: func(p string, content interface{}) (string, error) {\n\t\t\t\tif c.exec {\n\t\t\t\t\tvar buff []byte\n\t\t\t\t\tswitch content := content.(type) {\n\t\t\t\t\tcase []byte:\n\t\t\t\t\t\tbuff = content\n\t\t\t\t\tcase string:\n\t\t\t\t\t\tbuff = []byte(content)\n\t\t\t\t\tdefault:\n\t\t\t\t\t\tbuff = []byte(fmt.Sprintf(\"%v\", content))\n\t\t\t\t\t}\n\t\t\t\t\treturn \"\", ioutil.WriteFile(p, buff, 0644)\n\t\t\t\t}\n\t\t\t\treturn \"\", nil\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tName: \"cond\",\n\t\t\tFunc: func(b interface{}, optional ...interface{}) func() (bool, interface{}) {\n\n\t\t\t\t// Technique here is to capture the value in the pipeline from the last stage,\n\t\t\t\t// store it, and return a function that will evaluate to the boolean value of\n\t\t\t\t// the first argument. By doing so we captured the output of the previous stage\n\t\t\t\t// and allow the next stage to determine if it needs to continue. If the next\n\t\t\t\t// stage chooses to not continue, then it can access the value from the stage\n\t\t\t\t// before the cond.\n\t\t\t\t//\n\t\t\t\t// Example {{ $x := flag `foo` `string` `foo flag` | cond $y | prompt `foo?` `string` }}\n\t\t\t\t// So if $y evaluates to false, then prompt will not execute.\n\n\t\t\t\tvar capture interface{}\n\t\t\t\tif len(optional) > 0 {\n\t\t\t\t\tcapture = optional[0]\n\t\t\t\t}\n\n\t\t\t\treturn func() (bool, interface{}) {\n\n\t\t\t\t\tswitch b := b.(type) {\n\t\t\t\t\tcase bool:\n\t\t\t\t\t\treturn b, capture\n\t\t\t\t\tcase string:\n\t\t\t\t\t\tp, err := parseBool(b)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn false, capture\n\t\t\t\t\t\t}\n\t\t\t\t\t\treturn p, capture\n\t\t\t\t\tdefault:\n\t\t\t\t\t\treturn b != nil, capture\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tName: \"prompt\",\n\t\t\tFunc: func(prompt, ftype string, optional ...interface{}) (interface{}, error) {\n\n\t\t\t\tif ftype == \"\" {\n\t\t\t\t\treturn nil, fmt.Errorf(\"missing type for variable prompted\")\n\t\t\t\t}\n\t\t\t\tif !c.exec {\n\t\t\t\t\treturn \"\", nil\n\t\t\t\t}\n\n\t\t\t\tif len(optional) > 0 {\n\n\t\t\t\t\tend := optional[len(optional)-1]\n\n\t\t\t\t\t// if the last argument is actually a function that is generated\n\t\t\t\t\t// by the 'cond' function\n\t\t\t\t\tif cond, is := end.(func() (bool, interface{})); is {\n\t\t\t\t\t\tok, last := cond()\n\t\t\t\t\t\tif !ok {\n\t\t\t\t\t\t\treturn last, nil\n\t\t\t\t\t\t}\n\t\t\t\t\t\t// if the condition evaluates to true, then we'd continue\n\t\t\t\t\t\t// so the trailing arg must look like the cond was not\n\t\t\t\t\t\t// inserted before this -- hence using the value from\n\t\t\t\t\t\t// stage before the cond as the end\n\t\t\t\t\t\tend = last\n\t\t\t\t\t}\n\n\t\t\t\t\t// The last value in the optional var args is the value from the previous\n\t\t\t\t\t// pipeline.\n\t\t\t\t\tif !Missing(ftype, end) {\n\t\t\t\t\t\treturn end, nil\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\treturn c.Options.Prompter(prompt, ftype, *c.AcceptDefaults, optional...)\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tName: \"listprompt\",\n\t\t\tFunc: func(prompt, ftype string, optional ...interface{}) ([]string, error) {\n\n\t\t\t\tif ftype == \"\" {\n\t\t\t\t\treturn nil, fmt.Errorf(\"missing type for variable prompted\")\n\t\t\t\t}\n\t\t\t\tif ftype == \"\" {\n\t\t\t\t\treturn nil, fmt.Errorf(\"listprompt only support string\")\n\t\t\t\t}\n\t\t\t\tvar pl []string\n\t\t\t\tif !c.exec {\n\t\t\t\t\treturn pl, nil\n\t\t\t\t}\n\n\t\t\t\tif len(optional) > 0 {\n\t\t\t\t\tend := optional[len(optional)-1]\n\t\t\t\t\tif cond, is := end.(func() (bool, interface{})); is {\n\t\t\t\t\t\tok, last := cond()\n\t\t\t\t\t\tif !ok {\n\t\t\t\t\t\t\treturn pl, nil\n\t\t\t\t\t\t}\n\t\t\t\t\t\t// if the condition evaluates to true, then we'd continue\n\t\t\t\t\t\t// so the trailing arg must look like the cond was not\n\t\t\t\t\t\t// inserted before this -- hence using the value from\n\t\t\t\t\t\t// stage before the cond as the end\n\t\t\t\t\t\tend = last\n\t\t\t\t\t}\n\n\t\t\t\t\t// The last value in the optional var args is the value from the previous\n\t\t\t\t\t// pipeline.\n\t\t\t\t\tif len(end.([]string)) > 1 {\n\t\t\t\t\t\treturn end.([]string), nil\n\t\t\t\t\t}\n\n\t\t\t\t}\n\t\t\t\tp, err := c.Options.Prompter(prompt, ftype, *c.AcceptDefaults, optional...)\n\t\t\t\tpl = strings.Split(p.(string), \",\")\n\t\t\t\treturn pl, err\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "7caa2d0d1fce33b2496311111422e8db", "score": "0.6003021", "text": "func (tfs *TemplateService) Funcs(funcMap template.FuncMap) *TemplateService {\n\tfor k, v := range funcMap {\n\t\ttfs.funcMap[k] = v\n\t\tif k == \"content\" {\n\t\t\ttfs.useCustomContent = true\n\t\t}\n\t}\n\treturn tfs\n}", "title": "" }, { "docid": "3ec51eaf06adcaa8ec4d710362968091", "score": "0.59407854", "text": "func TemplateFuncs(p Profile) template.FuncMap {\n\tif p == Ascii {\n\t\treturn noopTemplateFuncs\n\t}\n\n\treturn template.FuncMap{\n\t\t\"Color\": func(values ...interface{}) string {\n\t\t\ts := p.String(values[len(values)-1].(string))\n\t\t\tswitch len(values) {\n\t\t\tcase 2:\n\t\t\t\ts = s.Foreground(p.Color(values[0].(string)))\n\t\t\tcase 3:\n\t\t\t\ts = s.\n\t\t\t\t\tForeground(p.Color(values[0].(string))).\n\t\t\t\t\tBackground(p.Color(values[1].(string)))\n\t\t\t}\n\n\t\t\treturn s.String()\n\t\t},\n\t\t\"Foreground\": func(values ...interface{}) string {\n\t\t\ts := p.String(values[len(values)-1].(string))\n\t\t\tif len(values) == 2 {\n\t\t\t\ts = s.Foreground(p.Color(values[0].(string)))\n\t\t\t}\n\n\t\t\treturn s.String()\n\t\t},\n\t\t\"Background\": func(values ...interface{}) string {\n\t\t\ts := p.String(values[len(values)-1].(string))\n\t\t\tif len(values) == 2 {\n\t\t\t\ts = s.Background(p.Color(values[0].(string)))\n\t\t\t}\n\n\t\t\treturn s.String()\n\t\t},\n\t\t\"Bold\": styleFunc(p, Style.Bold),\n\t\t\"Faint\": styleFunc(p, Style.Faint),\n\t\t\"Italic\": styleFunc(p, Style.Italic),\n\t\t\"Underline\": styleFunc(p, Style.Underline),\n\t\t\"Overline\": styleFunc(p, Style.Overline),\n\t\t\"Blink\": styleFunc(p, Style.Blink),\n\t\t\"Reverse\": styleFunc(p, Style.Reverse),\n\t\t\"CrossOut\": styleFunc(p, Style.CrossOut),\n\t}\n}", "title": "" }, { "docid": "921bed9419b8c761d28e864a4d227599", "score": "0.5914775", "text": "func FuncMap() template.FuncMap {\n\treturn HtmlFuncMap()\n}", "title": "" }, { "docid": "9dd635fa274333619afaba980500fdb6", "score": "0.5903898", "text": "func (t *Template) Funcs(funcMap template.FuncMap) *Template {\n\tt.Template.Funcs(funcMap)\n\tif t.FuncMap == nil {\n\t\tt.FuncMap = template.FuncMap{}\n\t}\n\tfor name, f := range funcMap {\n\t\tif _, ok := t.FuncMap[name]; !ok {\n\t\t\tt.FuncMap[name] = f\n\t\t}\n\t}\n\treturn t\n}", "title": "" }, { "docid": "a41136e94496f62ed50a6547fbd6d842", "score": "0.5900857", "text": "func FuncMap() []template.FuncMap {\n\tfuncMapOnce.Do(func() {\n\t\tfuncMap = []template.FuncMap{map[string]any{\n\t\t\t\"BuildCommit\": func() string {\n\t\t\t\treturn conf.BuildCommit\n\t\t\t},\n\t\t\t\"Year\": func() int {\n\t\t\t\treturn time.Now().Year()\n\t\t\t},\n\t\t\t\"UseHTTPS\": func() bool {\n\t\t\t\treturn conf.Server.URL.Scheme == \"https\"\n\t\t\t},\n\t\t\t\"AppName\": func() string {\n\t\t\t\treturn conf.App.BrandName\n\t\t\t},\n\t\t\t\"AppSubURL\": func() string {\n\t\t\t\treturn conf.Server.Subpath\n\t\t\t},\n\t\t\t\"AppURL\": func() string {\n\t\t\t\treturn conf.Server.ExternalURL\n\t\t\t},\n\t\t\t\"AppVer\": func() string {\n\t\t\t\treturn conf.App.Version\n\t\t\t},\n\t\t\t\"AppDomain\": func() string {\n\t\t\t\treturn conf.Server.Domain\n\t\t\t},\n\t\t\t\"DisableGravatar\": func() bool {\n\t\t\t\treturn conf.Picture.DisableGravatar\n\t\t\t},\n\t\t\t\"ShowFooterTemplateLoadTime\": func() bool {\n\t\t\t\treturn conf.Other.ShowFooterTemplateLoadTime\n\t\t\t},\n\t\t\t\"LoadTimes\": func(startTime time.Time) string {\n\t\t\t\treturn fmt.Sprint(time.Since(startTime).Nanoseconds()/1e6) + \"ms\"\n\t\t\t},\n\t\t\t\"AvatarLink\": tool.AvatarLink,\n\t\t\t\"AppendAvatarSize\": tool.AppendAvatarSize,\n\t\t\t\"Safe\": Safe,\n\t\t\t\"Sanitize\": bluemonday.UGCPolicy().Sanitize,\n\t\t\t\"Str2HTML\": Str2HTML,\n\t\t\t\"NewLine2br\": NewLine2br,\n\t\t\t\"TimeSince\": tool.TimeSince,\n\t\t\t\"RawTimeSince\": tool.RawTimeSince,\n\t\t\t\"FileSize\": tool.FileSize,\n\t\t\t\"Subtract\": tool.Subtract,\n\t\t\t\"Add\": func(a, b int) int {\n\t\t\t\treturn a + b\n\t\t\t},\n\t\t\t\"ActionIcon\": ActionIcon,\n\t\t\t\"DateFmtLong\": func(t time.Time) string {\n\t\t\t\treturn t.Format(time.RFC1123Z)\n\t\t\t},\n\t\t\t\"DateFmtShort\": func(t time.Time) string {\n\t\t\t\treturn t.Format(\"Jan 02, 2006\")\n\t\t\t},\n\t\t\t\"SubStr\": func(str string, start, length int) string {\n\t\t\t\tif str == \"\" {\n\t\t\t\t\treturn \"\"\n\t\t\t\t}\n\t\t\t\tend := start + length\n\t\t\t\tif length == -1 {\n\t\t\t\t\tend = len(str)\n\t\t\t\t}\n\t\t\t\tif len(str) < end {\n\t\t\t\t\treturn str\n\t\t\t\t}\n\t\t\t\treturn str[start:end]\n\t\t\t},\n\t\t\t\"Join\": strings.Join,\n\t\t\t\"EllipsisString\": strutil.Ellipsis,\n\t\t\t\"DiffFileTypeToStr\": DiffFileTypeToStr,\n\t\t\t\"DiffLineTypeToStr\": DiffLineTypeToStr,\n\t\t\t\"Sha1\": Sha1,\n\t\t\t\"ShortSHA1\": tool.ShortSHA1,\n\t\t\t\"ActionContent2Commits\": ActionContent2Commits,\n\t\t\t\"EscapePound\": EscapePound,\n\t\t\t\"RenderCommitMessage\": RenderCommitMessage,\n\t\t\t\"ThemeColorMetaTag\": func() string {\n\t\t\t\treturn conf.UI.ThemeColorMetaTag\n\t\t\t},\n\t\t\t\"FilenameIsImage\": func(filename string) bool {\n\t\t\t\tmimeType := mime.TypeByExtension(filepath.Ext(filename))\n\t\t\t\treturn strings.HasPrefix(mimeType, \"image/\")\n\t\t\t},\n\t\t\t\"TabSizeClass\": func(ec *editorconfig.Editorconfig, filename string) string {\n\t\t\t\tif ec != nil {\n\t\t\t\t\tdef, err := ec.GetDefinitionForFilename(filename)\n\t\t\t\t\tif err == nil && def.TabWidth > 0 {\n\t\t\t\t\t\treturn fmt.Sprintf(\"tab-size-%d\", def.TabWidth)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn \"tab-size-8\"\n\t\t\t},\n\t\t\t\"InferSubmoduleURL\": gitutil.InferSubmoduleURL,\n\t\t}}\n\t})\n\treturn funcMap\n}", "title": "" }, { "docid": "76d17080dd30bd0294cddb3cb1274b0a", "score": "0.59004694", "text": "func (fm FuncsMap) Get(key string) (fns *Funcs, err error) {\n\tvar ok bool\n\tif fns, ok = fm[key]; ok {\n\t\treturn\n\t}\n\n\tif fns, ok = fm[\"default\"]; ok {\n\t\treturn\n\t}\n\n\terr = ErrNoFuncsMatch\n\treturn\n}", "title": "" }, { "docid": "7941787c017f863daf3f36e6498f692b", "score": "0.58705574", "text": "func (ctx ShipContext) FuncMap() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"AmazonEKS\": ctx.amazonEKS,\n\t\t\"GoogleGKE\": ctx.googleGKE,\n\t\t\"AzureAKS\": ctx.azureAKS,\n\t\t\"GetCaKey\": ctx.makeCaKey,\n\t\t\"GetCaCert\": ctx.getCaCert,\n\t\t\"GetKey\": ctx.makeCertKey,\n\t\t\"GetCert\": ctx.getCert,\n\t}\n}", "title": "" }, { "docid": "d47aaaffdc621c981cd4fc0ce2db8c53", "score": "0.58673584", "text": "func (p *Platform) GetFunctions(getOptions *platform.GetOptions) ([]platform.Function, error) {\n\treturn p.getter.get(p.consumer, getOptions)\n}", "title": "" }, { "docid": "4f11f13cb39b571a610d3213a5762aea", "score": "0.5785285", "text": "func (f *tmplFuncs) funcMap() template.FuncMap {\n\treturn map[string]interface{}{\n\t\t\"labelString\": labelString,\n\t\t\"typeBaseName\": typeBaseName,\n\t\t\"fieldType\": fieldType,\n\t\t\"trimExt\": trimExt,\n\t\t\"typeURL\": f.typeURL,\n\t\t\"location\": f.location,\n\t\t\"allMessages\": util.AllMessages,\n\t\t\"allEnums\": util.AllEnums,\n\t\t\"markdown\": func(source string) template.HTML {\n\t\t\treturn template.HTML(blackfriday.Run([]byte(source)))\n\t\t},\n\t\t\"lastProtoFile\": func() *descriptor.FileDescriptorProto {\n\t\t\treturn f.protoFiles[len(f.protoFiles)-1]\n\t\t},\n\t}\n}", "title": "" }, { "docid": "913ac0e09150639178bf92cf7814042e", "score": "0.5774702", "text": "func (p *EstafetteVersionParams) GetFuncMap() template.FuncMap {\n\n\treturn template.FuncMap{\n\t\t\"auto\": func() string { return fmt.Sprint(p.AutoIncrement) },\n\t\t\"branch\": func() string { return p.Branch },\n\t\t\"revision\": func() string { return p.Revision },\n\t}\n}", "title": "" }, { "docid": "e648a8552effe5e1c7eac629513a3676", "score": "0.57215816", "text": "func TxtFuncMap() ttemplate.FuncMap {\n\treturn ttemplate.FuncMap(genericMap)\n}", "title": "" }, { "docid": "2283a4ac9545b76327fdd4ab1396f662", "score": "0.57052124", "text": "func (tmpl *Template) funcMapMaker(req *http.Request, writer http.ResponseWriter) template.FuncMap {\n\tvar funcMap = template.FuncMap{}\n\n\tfor key, fc := range tmpl.render.funcMaps {\n\t\tfuncMap[key] = fc\n\t}\n\n\tif tmpl.render.Config.FuncMapMaker != nil {\n\t\tfor key, fc := range tmpl.render.Config.FuncMapMaker(tmpl.render, req, writer) {\n\t\t\tfuncMap[key] = fc\n\t\t}\n\t}\n\n\tfor key, fc := range tmpl.funcMap {\n\t\tfuncMap[key] = fc\n\t}\n\treturn funcMap\n}", "title": "" }, { "docid": "c81dadfd284a5a12f0310a4f951ee619", "score": "0.5703119", "text": "func HtmlFuncMap() template.FuncMap {\n\treturn template.FuncMap(genericMap)\n}", "title": "" }, { "docid": "71976700372824adcf24b293f52e0753", "score": "0.565803", "text": "func templateFuncMap(opts map[string]interface{}) map[string]interface{} {\n\treturn map[string]interface{}{\n\t\t// Template flow, errors, debugging.\n\t\t\"stderrPrint\": stderrPrint, // v0.13.0\n\t\t\"stderrPrintf\": stderrPrintf, // v0.7.0\n\t\t\"exit\": exit, // v0.7.0\n\t\t\"minVersion\": minVersion, // v0.7.0\n\t\t\"dump\": spew.Sdump, // v0.13.0\n\t\t\"hasField\": hasField, // v0.13.0\n\n\t\t// Schema type helpers.\n\t\t\"isBasicType\": isCoreType, // v0.7.0 (deprecated in v0.9.0)\n\t\t\"isCoreType\": isCoreType, // v0.9.0\n\t\t\"isStructType\": isStructType, // v0.7.0\n\t\t\"isEnumType\": isEnumType, // v0.7.0\n\t\t\"isMapType\": isMapType, // v0.7.0\n\t\t\"isListType\": isListType, // v0.7.0\n\t\t\"mapKeyType\": mapKeyType, // v0.7.0\n\t\t\"mapValueType\": mapValueType, // v0.7.0\n\t\t\"listElemType\": listElemType, // v0.7.0\n\n\t\t// Dictionary (map[string]any).\n\t\t\"dict\": dict, // v0.7.0\n\t\t\"get\": get, // v0.7.0\n\t\t\"set\": set, // v0.7.0\n\t\t\"exists\": exists, // v0.7.0\n\n\t\t// Generic utils.\n\t\t\"array\": array, // v0.11.2 (string support since v0.8.0)\n\t\t\"append\": appendFn, // v0.11.2 (string support since v0.7.0)\n\t\t\"first\": first, // v0.11.2 (string support since v0.7.0)\n\t\t\"last\": last, // v0.11.2 (string support since v0.7.0)\n\t\t\"sort\": sortFn, // v0.11.2 (string support since v0.8.0)\n\t\t\"coalesce\": coalesce, // v0.7.0\n\t\t\"default\": defaultFn, // v0.7.0\n\t\t\"in\": in, // v0.7.0\n\t\t\"ternary\": ternary, // v0.7.0\n\n\t\t// String utils.\n\t\t\"join\": join, // v0.7.0\n\t\t\"split\": split, // v0.7.0\n\t\t\"hasPrefix\": strings.HasPrefix, // v0.7.0\n\t\t\"hasSuffix\": strings.HasSuffix, // v0.7.0\n\t\t\"trimPrefix\": strings.TrimPrefix, // v0.8.0\n\t\t\"trimSuffix\": strings.TrimSuffix, // v0.8.0\n\t\t\"toLower\": applyStringFunction(\"toLower\", strings.ToLower), // v0.7.0\n\t\t\"toUpper\": applyStringFunction(\"toLower\", strings.ToUpper), // v0.7.0\n\t\t\"firstLetterToLower\": applyStringFunction(\"firstLetterToLower\", func(input string) string { // v0.7.0\n\t\t\tif input == \"\" {\n\t\t\t\treturn \"\"\n\t\t\t}\n\t\t\treturn strings.ToLower(input[:1]) + input[1:]\n\t\t}),\n\t\t\"firstLetterToUpper\": applyStringFunction(\"firstLetterToUpper\", func(input string) string { // v0.7.0\n\t\t\tif input == \"\" {\n\t\t\t\treturn \"\"\n\t\t\t}\n\t\t\treturn strings.ToUpper(input[:1]) + input[1:]\n\t\t}),\n\t\t\"camelCase\": applyStringFunction(\"camelCase\", textcase.CamelCase), // v0.7.0\n\t\t\"pascalCase\": applyStringFunction(\"pascalCase\", textcase.PascalCase), // v0.7.0\n\t\t\"snakeCase\": applyStringFunction(\"snakeCase\", textcase.SnakeCase), // v0.7.0\n\t\t\"kebabCase\": applyStringFunction(\"kebabCase\", textcase.KebabCase), // v0.7.0\n\t}\n}", "title": "" }, { "docid": "02330461b8ac63ffd317782560d4dad1", "score": "0.5634169", "text": "func (t *Tmpl) Funcs(funcMap template.FuncMap) {\n\tt.Template = t.Template.Funcs(funcMap)\n\tt.funcs = funcMap\n}", "title": "" }, { "docid": "1d4690cf57e5aefc9cea83c88e16ecc1", "score": "0.56189454", "text": "func registerTemplateFunctions() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"datetime\": templateDatetime,\n\t}\n}", "title": "" }, { "docid": "9fe2727d99635598ae8f1c0e7cfd9044", "score": "0.5586368", "text": "func GetNewAndDeleteFuncs(newFuncs cfunction.CronFunctions, oldFuncs cfunction.ScheduledFunctions) (cfunction.CronFunctions, cfunction.ScheduledFunctions) {\n\taddFuncs := make(cfunction.CronFunctions, 0)\n\tdeleteFuncs := make(cfunction.ScheduledFunctions, 0)\n\n\tfor _, function := range newFuncs {\n\t\tif !oldFuncs.Contains(&function) {\n\t\t\taddFuncs = append(addFuncs, function)\n\t\t}\n\t}\n\n\tfor _, function := range oldFuncs {\n\t\tif !newFuncs.Contains(&function.Function) {\n\t\t\tdeleteFuncs = append(deleteFuncs, function)\n\t\t}\n\t}\n\n\treturn addFuncs, deleteFuncs\n}", "title": "" }, { "docid": "93d736b1bf2e056db56ad6d7724e2e9f", "score": "0.5579351", "text": "func (tmpl Template) Funcs(funcMap... template.FuncMap) Template {\n\terr := tmpl.funcs.Append(funcMap...)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn tmpl\n}", "title": "" }, { "docid": "dda972fcf302dd130fe316803a6e483d", "score": "0.55699563", "text": "func (g *Generator) Funcs() map[string]func(*ast.FuncDecl) {\n\tnop := func(*ast.FuncDecl) {}\n\treturn map[string]func(*ast.FuncDecl){\n\t\t\"Set\": func(f *ast.FuncDecl) {\n\t\t\tg.replaceItem(f.Type.Params)\n\t\t},\n\t\t\"SetDefault\": func(f *ast.FuncDecl) {\n\t\t\tg.replaceItem(f.Type.Params)\n\t\t},\n\t\t\"Get\": func(f *ast.FuncDecl) {\n\t\t\tg.replaceItem(f.Type.Results)\n\t\t},\n\t\t\"Delete\": nop,\n\t\t\"DeleteExpired\": nop,\n\t\t\"ItemCount\": nop,\n\t\t\"Flush\": nop,\n\t\t\"Run\": nop,\n\t\t\"stopJanitor\": nop,\n\t\t\"runJanitor\": nop,\n\t\t\"newCache\": nop,\n\t\t\"newCacheWithJanitor\": nop,\n\t\t\"New\": nop,\n\t\t\"memhash\": nop,\n\t\t\"keyToHash\": nop,\n\t\t\"nanoTime\": nop,\n\t}\n}", "title": "" }, { "docid": "06eef7580c522e188c4801ecbff9a7ca", "score": "0.5562376", "text": "func (tmpl *Template) Funcs(funcMap template.FuncMap) *Template {\n\ttmpl.funcMap = funcMap\n\treturn tmpl\n}", "title": "" }, { "docid": "7977ca0c874c99f8031a97e81171e34e", "score": "0.5507331", "text": "func TemplateFunctions() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"createCSPListFromUIDs\": newListFromUIDs,\n\t\t\"createCSPListFromUIDNodeMap\": newListFromUIDNode,\n\t}\n}", "title": "" }, { "docid": "7a85ce8e758eec7f29ea082acaf142f5", "score": "0.54781055", "text": "func getFunctionHooks(ctx context.Context) map[string][]string {\n\tobj := ctx.Value(functionHooksKey)\n\tif obj == nil {\n\t\treturn map[string][]string{}\n\t}\n\n\treturn obj.(map[string][]string)\n}", "title": "" }, { "docid": "3b063b05e3e069a616cdb19f2edccb6e", "score": "0.5469185", "text": "func MakeTemplateFuncMap(params *chaincfg.Params) template.FuncMap {\n\tnetTheme := \"theme-\" + strings.ToLower(netName(params))\n\n\treturn template.FuncMap{\n\t\t\"add\": func(args ...int64) int64 {\n\t\t\tvar sum int64\n\t\t\tfor _, a := range args {\n\t\t\t\tsum += a\n\t\t\t}\n\t\t\treturn sum\n\t\t},\n\t\t\"subtract\": func(a, b int64) int64 {\n\t\t\treturn a - b\n\t\t},\n\t\t\"floatsubtract\": func(a, b float64) float64 {\n\t\t\treturn a - b\n\t\t},\n\t\t\"intSubtract\": func(a, b int) int {\n\t\t\treturn a - b\n\t\t},\n\t\t\"divide\": func(n, d int64) int64 {\n\t\t\treturn n / d\n\t\t},\n\t\t\"divideFloat\": func(n, d float64) float64 {\n\t\t\treturn n / d\n\t\t},\n\t\t\"multiply\": func(a, b int64) int64 {\n\t\t\treturn a * b\n\t\t},\n\t\t\"intMultiply\": func(a, b int) int {\n\t\t\treturn a * b\n\t\t},\n\t\t\"theme\": func() string {\n\t\t\treturn netTheme\n\t\t},\n\t\t\"hashlink\": func(hash string, link string) [2]string {\n\t\t\treturn [2]string{hash, link}\n\t\t},\n\t\t\"hashStart\": func(hash string) string {\n\t\t\tclipLen := 6\n\t\t\thashLen := len(hash) - clipLen\n\t\t\tif hashLen < 1 {\n\t\t\t\treturn \"\"\n\t\t\t}\n\t\t\treturn hash[0:hashLen]\n\t\t},\n\t\t\"hashEnd\": func(hash string) string {\n\t\t\tclipLen := 6\n\t\t\thashLen := len(hash) - clipLen\n\t\t\tif hashLen < 0 {\n\t\t\t\treturn hash\n\t\t\t}\n\t\t\treturn hash[hashLen:]\n\t\t},\n\t\t\"redirectToMainnet\": func(netName string, message string) bool {\n\t\t\tif netName != \"Mainnet\" && strings.Contains(message, \"mainnet\") {\n\t\t\t\treturn true\n\t\t\t}\n\t\t\treturn false\n\t\t},\n\t\t\"neq\": func(a, b interface{}) bool {\n\t\t\treturn a != b\n\t\t},\n\t\t\"redirectToTestnet\": func(netName string, message string) bool {\n\t\t\tif netName != TestnetNetName && strings.Contains(message, \"testnet\") {\n\t\t\t\treturn true\n\t\t\t}\n\t\t\treturn false\n\t\t},\n\t\t\"strListContains\": func(stringList []string, needle string) bool {\n\t\t\tfor _, value := range stringList {\n\t\t\t\tif value == needle {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn false\n\t\t},\n\t\t\"PKAddr2PKHAddr\": func(address string) (p2pkh string) {\n\t\t\t// Attempt to decode the pay-to-pubkey address.\n\t\t\tvar addr dcrutil.Address\n\t\t\taddr, err := dcrutil.DecodeAddress(address, params)\n\t\t\tif err != nil {\n\t\t\t\tlog.Errorf(err.Error())\n\t\t\t\treturn \"\"\n\t\t\t}\n\n\t\t\t// Extract the pubkey hash.\n\t\t\taddrHash := addr.Hash160()\n\n\t\t\t// Create a new pay-to-pubkey-hash address.\n\t\t\taddrPKH, err := dcrutil.NewAddressPubKeyHash(addrHash[:], params, dcrec.STEcdsaSecp256k1)\n\t\t\tif err != nil {\n\t\t\t\tlog.Errorf(err.Error())\n\t\t\t\treturn \"\"\n\t\t\t}\n\t\t\treturn addrPKH.Address()\n\t\t},\n\t\t\"float64AsDecimalParts\": Float64Formatting,\n\t\t\"amountAsDecimalParts\": func(v int64, useCommas bool) []string {\n\t\t\treturn Float64Formatting(dcrutil.Amount(v).ToCoin(), 8, useCommas)\n\t\t},\n\t\t\"durationToShortDurationString\": func(d time.Duration) string {\n\t\t\treturn FormattedDuration(d, shortPeriods)\n\t\t},\n\t\t\"amountAsDecimalPartsTrimmed\": amountAsDecimalPartsTrimmed,\n\t\t\"secondsToLongDurationString\": func(d int64) string {\n\t\t\treturn formattedDuration(time.Duration(d)*time.Second, longPeriods)\n\t\t},\n\t\t\"secondsToShortDurationString\": func(d int64) string {\n\t\t\treturn formattedDuration(time.Duration(d)*time.Second, shortPeriods)\n\t\t},\n\t\t\"uint16Mul\": func(a uint16, b int) (result int) {\n\t\t\tresult = int(a) * b\n\t\t\treturn\n\t\t},\n\t\t\"int64\": toInt64,\n\t\t\"intComma\": func(v interface{}) string {\n\t\t\treturn humanize.Comma(toInt64(v))\n\t\t},\n\t\t\"percentage\": func(a, b int64) float64 {\n\t\t\treturn (float64(a) / float64(b)) * 100\n\t\t},\n\t\t\"convertByteArrayToString\": func(arr []byte) (inString string) {\n\t\t\tinString = hex.EncodeToString(arr)\n\t\t\treturn\n\t\t},\n\t\t\"normalizeBalance\": func(balance float64) string {\n\t\t\treturn fmt.Sprintf(\"%010.8f DCR\", balance)\n\t\t},\n\t\t\"timestamp\": func() int64 {\n\t\t\treturn time.Now().Unix()\n\t\t},\n\t\t\"removeStartingSlash\": func(url string) string {\n\t\t\tif strings.HasPrefix(url, \"/\") {\n\t\t\t\turl = url[1:]\n\t\t\t}\n\t\t\treturn url\n\t\t},\n\t\t\"toAbsValue\": math.Abs,\n\t\t\"toFloat64\": func(x uint32) float64 {\n\t\t\treturn float64(x)\n\t\t},\n\t\t\"toInt\": func(str string) int {\n\t\t\tintStr, err := strconv.Atoi(str)\n\t\t\tif err != nil {\n\t\t\t\treturn 0\n\t\t\t}\n\t\t\treturn intStr\n\t\t},\n\t\t\"x100\": func(v float64) float64 {\n\t\t\treturn v * 100\n\t\t},\n\t\t\"f32x100\": func(v float32) float32 {\n\t\t\treturn v * 100\n\t\t},\n\t\t\"TimeConversion\": func(a uint64) string {\n\t\t\tif a == 0 {\n\t\t\t\treturn \"N/A\"\n\t\t\t}\n\t\t\tdateTime := time.Unix(int64(a), 0).UTC()\n\t\t\treturn dateTime.Format(\"2006-01-02 15:04:05 MST\")\n\t\t},\n\t\t\"dateTimeWithoutTimeZone\": func(a uint64) string {\n\t\t\tif a == 0 {\n\t\t\t\treturn \"N/A\"\n\t\t\t}\n\t\t\tdateTime := time.Unix(int64(a), 0).UTC()\n\t\t\treturn dateTime.Format(\"2006-01-02 15:04:05\")\n\t\t},\n\t\t\"floor\": math.Floor,\n\t\t\"commonPair\": func(pair string) string {\n\t\t\tif v, f := pairMap[pair]; f {\n\t\t\t\treturn v\n\t\t\t}\n\t\t\treturn pair\n\t\t},\n\t\t\"stringsReplace\": func(input string, old string, new string) string {\n\t\t\treturn strings.Replace(input, old, new, -1)\n\t\t},\n\t\t\"humanizeInt\": func(number int64) string {\n\t\t\ts := strconv.Itoa(int(number))\n\t\t\tr1 := \"\"\n\t\t\tidx := 0\n\n\t\t\t// Reverse and interleave the separator.\n\t\t\tfor i := len(s) - 1; i >= 0; i-- {\n\t\t\t\tidx++\n\t\t\t\tif idx == 4 {\n\t\t\t\t\tidx = 1\n\t\t\t\t\tr1 = r1 + \",\"\n\t\t\t\t}\n\t\t\t\tr1 = r1 + string(s[i])\n\t\t\t}\n\n\t\t\t// Reverse back and return.\n\t\t\tr2 := \"\"\n\t\t\tfor i := len(r1) - 1; i >= 0; i-- {\n\t\t\t\tr2 = r2 + string(r1[i])\n\t\t\t}\n\t\t\treturn r2\n\t\t},\n\t}\n}", "title": "" }, { "docid": "c748c187d573fd645b0f1a84caa368f4", "score": "0.545608", "text": "func runCommandFuncs() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"delete\": delete,\n\t\t\"get\": get,\n\t\t\"lst\": list,\n\t\t\"create\": create,\n\t\t\"patch\": patch,\n\t\t\"update\": update,\n\t\t\"jiva\": jiva,\n\t\t\"cstor\": cstor,\n\t\t\"volume\": volume,\n\t\t\"withoption\": withoption,\n\t\t\"run\": run,\n\t\t\"runlog\": runlog,\n\t\t\"select\": slect,\n\t}\n}", "title": "" }, { "docid": "84d80d037741f44491e57eeeba129192", "score": "0.54361755", "text": "func (e *Environment) FuncMap() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"Username\": func() string {\n\t\t\treturn e.Username\n\t\t},\n\t\t\"Language\": func() string {\n\t\t\treturn e.Language\n\t\t},\n\t\t\"Name\": func() Name {\n\t\t\treturn e.Namer()\n\t\t},\n\t\t\"bind\": func(dot interface{}, prop, label string) *BoundValue {\n\t\t\tname := e.Namer()\n\t\t\tbv := &BoundValue{\n\t\t\t\tdot,\n\t\t\t\tprop,\n\t\t\t\tlabel,\n\t\t\t\tname,\n\t\t\t}\n\t\t\te.BoundValue[name] = bv \n\t\t\treturn bv\n\t\t},\n\t}\n}", "title": "" }, { "docid": "3bbb07730dea09f9206ef4be07fccb8e", "score": "0.54273164", "text": "func FuncMap() template.FuncMap {\n\tfuncs := template.FuncMap{\n\t\t\"jobStatusTableClass\": jobStatusTableClass,\n\t}\n\treturn funcs\n}", "title": "" }, { "docid": "48182f770b4ee6f930b6a08e77da2fbd", "score": "0.54110813", "text": "func (eng *Engine) AddFuncs(funcs map[string]Func) {\n\tfor k, fn := range funcs {\n\t\tif fn == nil {\n\t\t\tcontinue\n\t\t}\n\t\teng.Funcs[k] = fn\n\t}\n}", "title": "" }, { "docid": "942b83445d75f2278eae4cc0f1176b80", "score": "0.540924", "text": "func (e Engine) initFunMap(t *template.Template, referenceTpls map[string]renderable) {\n\tfuncMap := funcMap()\n\tincludedNames := make(map[string]int)\n\n\t// Add the 'include' function here so we can close over t.\n\tfuncMap[\"include\"] = func(name string, data interface{}) (string, error) {\n\t\tvar buf strings.Builder\n\t\tif v, ok := includedNames[name]; ok {\n\t\t\tif v > recursionMaxNums {\n\t\t\t\treturn \"\", errors.Wrapf(fmt.Errorf(\"unable to execute template\"), \"rendering template has a nested reference name: %s\", name)\n\t\t\t}\n\t\t\tincludedNames[name]++\n\t\t} else {\n\t\t\tincludedNames[name] = 1\n\t\t}\n\t\terr := t.ExecuteTemplate(&buf, name, data)\n\t\tincludedNames[name]--\n\t\treturn buf.String(), err\n\t}\n\n\t// Add the 'tpl' function here\n\tfuncMap[\"tpl\"] = func(tpl string, vals chartutil.Values) (string, error) {\n\t\tbasePath, err := vals.PathValue(\"Template.BasePath\")\n\t\tif err != nil {\n\t\t\treturn \"\", errors.Wrapf(err, \"cannot retrieve Template.Basepath from values inside tpl function: %s\", tpl)\n\t\t}\n\n\t\ttemplateName, err := vals.PathValue(\"Template.Name\")\n\t\tif err != nil {\n\t\t\treturn \"\", errors.Wrapf(err, \"cannot retrieve Template.Name from values inside tpl function: %s\", tpl)\n\t\t}\n\n\t\ttemplates := map[string]renderable{\n\t\t\ttemplateName.(string): {\n\t\t\t\ttpl: tpl,\n\t\t\t\tvals: vals,\n\t\t\t\tbasePath: basePath.(string),\n\t\t\t},\n\t\t}\n\n\t\tresult, err := e.renderWithReferences(templates, referenceTpls)\n\t\tif err != nil {\n\t\t\treturn \"\", errors.Wrapf(err, \"error during tpl function execution for %q\", tpl)\n\t\t}\n\t\treturn result[templateName.(string)], nil\n\t}\n\n\t// Add the `required` function here so we can use lintMode\n\tfuncMap[\"required\"] = func(warn string, val interface{}) (interface{}, error) {\n\t\tif val == nil {\n\t\t\tif e.LintMode {\n\t\t\t\t// Don't fail on missing required values when linting\n\t\t\t\tlog.Printf(\"[INFO] Missing required value: %s\", warn)\n\t\t\t\treturn \"\", nil\n\t\t\t}\n\t\t\treturn val, errors.Errorf(warnWrap(warn))\n\t\t} else if _, ok := val.(string); ok {\n\t\t\tif val == \"\" {\n\t\t\t\tif e.LintMode {\n\t\t\t\t\t// Don't fail on missing required values when linting\n\t\t\t\t\tlog.Printf(\"[INFO] Missing required value: %s\", warn)\n\t\t\t\t\treturn \"\", nil\n\t\t\t\t}\n\t\t\t\treturn val, errors.Errorf(warnWrap(warn))\n\t\t\t}\n\t\t}\n\t\treturn val, nil\n\t}\n\n\t// Override sprig fail function for linting and wrapping message\n\tfuncMap[\"fail\"] = func(msg string) (string, error) {\n\t\tif e.LintMode {\n\t\t\t// Don't fail when linting\n\t\t\tlog.Printf(\"[INFO] Fail: %s\", msg)\n\t\t\treturn \"\", nil\n\t\t}\n\t\treturn \"\", errors.New(warnWrap(msg))\n\t}\n\n\t// If we are not linting and have a cluster connection, provide a Kubernetes-backed\n\t// implementation.\n\tif !e.LintMode && e.config != nil {\n\t\tfuncMap[\"lookup\"] = NewLookupFunction(e.config)\n\t}\n\n\t// When DNS lookups are not enabled override the sprig function and return\n\t// an empty string.\n\tif !e.EnableDNS {\n\t\tfuncMap[\"getHostByName\"] = func(name string) string {\n\t\t\treturn \"\"\n\t\t}\n\t}\n\n\tt.Funcs(funcMap)\n}", "title": "" }, { "docid": "551dd85d86c73100ea3e78bbb0a5c10f", "score": "0.5366272", "text": "func (t *Template) Funcs(funcs template.FuncMap) *Template {\n\tt.tmpl.Funcs(funcs)\n\treturn t\n}", "title": "" }, { "docid": "1f8224195a1275e900a93379282465b7", "score": "0.53578794", "text": "func FuncMap() map[string]any {\n\treturn map[string]any{\n\t\t\"iterate\": FuncIterate,\n\t\t\"fileContent\": FuncFileContent,\n\t\t\"env\": FuncGetEnv,\n\t\t\"expandenv\": FuncExpandEnv,\n\t\t\"split\": FuncStringSplit,\n\t\t\"splitList\": FuncStringSplitList,\n\t\t\"join\": FuncElemsJoin,\n\t\t\"contains\": FuncStringContains,\n\t\t\"hasPrefix\": FuncStringHasPrefix,\n\t\t\"hasSuffix\": FuncStringHasSuffix,\n\t\t\"lower\": strings.ToLower,\n\t\t\"keys\": FuncKeys,\n\t\t\"sortAlpha\": FuncSortAlpha,\n\t\t\"upper\": strings.ToUpper,\n\t\t\"title\": strings.ToTitle,\n\t\t\"trim\": strings.TrimSpace,\n\t\t\"trimAll\": FuncStringTrimAll,\n\t\t\"trimSuffix\": FuncStringTrimSuffix,\n\t\t\"trimPrefix\": FuncStringTrimPrefix,\n\t\t\"replace\": FuncStringReplace,\n\t\t\"quote\": FuncStringQuote,\n\t\t\"sha1sum\": FuncHashSum(sha1.New),\n\t\t\"sha256sum\": FuncHashSum(sha256.New),\n\t\t\"sha512sum\": FuncHashSum(sha512.New),\n\t\t\"squote\": FuncStringSQuote,\n\t\t\"now\": time.Now,\n\t\t\"b64enc\": FuncB64Enc,\n\t\t\"b64dec\": FuncB64Dec,\n\t\t\"b32enc\": FuncB32Enc,\n\t\t\"b32dec\": FuncB32Dec,\n\t\t\"list\": FuncList,\n\t\t\"dict\": FuncDict,\n\t\t\"get\": FuncGet,\n\t\t\"set\": FuncSet,\n\t\t\"isAbs\": path.IsAbs,\n\t\t\"base\": path.Base,\n\t\t\"dir\": path.Dir,\n\t\t\"ext\": path.Ext,\n\t\t\"clean\": path.Clean,\n\t\t\"osBase\": filepath.Base,\n\t\t\"osClean\": filepath.Clean,\n\t\t\"osDir\": filepath.Dir,\n\t\t\"osExt\": filepath.Ext,\n\t\t\"osIsAbs\": filepath.IsAbs,\n\t\t\"deepEqual\": reflect.DeepEqual,\n\t\t\"typeOf\": FuncTypeOf,\n\t\t\"typeIs\": FuncTypeIs,\n\t\t\"typeIsLike\": FuncTypeIsLike,\n\t\t\"kindOf\": FuncKindOf,\n\t\t\"kindIs\": FuncKindIs,\n\t\t\"default\": FuncDefault,\n\t\t\"empty\": FuncEmpty,\n\t\t\"indent\": FuncIndent,\n\t\t\"nindent\": FuncNewlineIndent,\n\t\t\"uuidv4\": FuncUUIDv4,\n\t\t\"urlquery\": url.QueryEscape,\n\t\t\"urlunquery\": url.QueryUnescape,\n\t}\n}", "title": "" }, { "docid": "a405b5f3d048f9c010a97b993e61a3ad", "score": "0.5313807", "text": "func (g *Group) Funcs(f template.FuncMap) {\n\tif g.funcs == nil {\n\t\tg.funcs = template.FuncMap{}\n\t}\n\tfor k, v := range f {\n\t\tg.funcs[k] = v\n\t}\n\tg.layouts.Funcs(f)\n\t// To support late Funcs calls, we would need a registry of our page\n\t// templates. Not sure it's worth it.\n}", "title": "" }, { "docid": "aa192fee3a56e674e84f30bc3c81159c", "score": "0.53052145", "text": "func (s *Site) Funcs(m template.FuncMap) {\n\tif s.funcs == nil {\n\t\ts.funcs = make(template.FuncMap)\n\t}\n\tfor k, v := range m {\n\t\ts.funcs[k] = v\n\t}\n}", "title": "" }, { "docid": "c7f98d7698b7cd68bdc3fdccf11919db", "score": "0.53007597", "text": "func embeddedTemplateFunctions() template.FuncMap {\n\n\t// Supporting functions embedded in template invoked with \"{{value | <functioname}}\"\n\treturn template.FuncMap{\n\t\t\"ISO8601\": shared.TimeMillisecondsToString,\n\t\t\"OrderedList\": HMTLOrderedList,\n\t\t\"PrettyPrint\": prettyPrintAttribute,\n\t}\n}", "title": "" }, { "docid": "0523e9662b45b0d1dac18e7c9ef7bf18", "score": "0.527229", "text": "func GetImageFunctions(mimeType string) ImageFunctions {\n\tval, ok := mimeMappings[mimeType]\n\tif !ok {\n\t\treturn mimeMappings[\"image/png\"]\n\t}\n\treturn val\n}", "title": "" }, { "docid": "32ee7e2ffec7ee90273ff63d326769ce", "score": "0.5272183", "text": "func (q *Query) GetFunctions(name string) []*Function {\n\tcacheKey := \"Functions\" + sep + name\n\tif data, ok := q.cache[cacheKey]; ok {\n\t\tif functions, ok := data.([]*Function); ok {\n\t\t\treturn functions\n\t\t}\n\t}\n\tfunctions := q.store.GetFunctions(name)\n\tq.cache[cacheKey] = functions\n\treturn functions\n}", "title": "" }, { "docid": "261c72f87fb9e6c1532fb6a4bd91297c", "score": "0.52514166", "text": "func NewFuncMap() map[string]interface{} {\n\tfuncs := template.FuncMap{}\n\tfuncs[\"iterate\"] = func(start interface{}, count interface{}) []int64 {\n\t\tvar i int64\n\t\tvar Items []int64\n\n\t\tst := reflect.ValueOf(start)\n\t\tcn := reflect.ValueOf(count)\n\n\t\tfor i = st.Int(); i <= st.Int()+cn.Int()-1; i++ {\n\t\t\tItems = append(Items, i)\n\t\t}\n\t\treturn Items\n\t}\n\n\tfuncs[\"add\"] = add\n\tfuncs[\"subtract\"] = subtract\n\tfuncs[\"multiply\"] = multiply\n\tfuncs[\"divide\"] = divide\n\tfuncs[\"iterate\"] = iterate\n\tfuncs[\"ToLower\"] = strings.ToLower\n\tfuncs[\"ToTitle\"] = strings.ToTitle\n\tfuncs[\"HasPrefix\"] = strings.HasPrefix\n\tfuncs[\"Contains\"] = strings.Contains\n\tfuncs[\"mustache\"] = mustache\n\tfuncs[\"attr\"] = attr\n\tfuncs[\"toText\"] = toText\n\tfuncs[\"stringInSlice\"] = StringInSlice\n\tfuncs[\"now\"] = func() time.Time { return time.Now().Local() }\n\n\tfuncs[\"Int64ToStr\"] = Int64ToStr\n\n\tfuncs[\"ieq\"] = ieq\n\tfuncs[\"startNewRow\"] = startNewRow\n\tfuncs[\"firstDateYear\"] = func() time.Time {\n\t\ty, _, _ := time.Now().Date()\n\t\treturn time.Date(y, time.January, 1, 0, 0, 0, 0, time.UTC)\n\t}\n\tfuncs[\"lastDateYear\"] = func() time.Time {\n\t\ty, _, _ := time.Now().Date()\n\t\treturn time.Date(y, time.December, 31, 0, 0, 0, 0, time.UTC)\n\t}\n\n\treturn funcs\n}", "title": "" }, { "docid": "7d568447c190528ca4e4a202850a8736", "score": "0.5236196", "text": "func HermeticTxtFuncMap() ttemplate.FuncMap {\n\tr := TxtFuncMap()\n\tfor _, name := range nonhermeticFunctions {\n\t\tdelete(r, name)\n\t}\n\treturn r\n}", "title": "" }, { "docid": "77c23a732c7c5dcec173f3103fd81a5a", "score": "0.52236354", "text": "func (wc *WerfSubchart) SetupTemplateFuncs(t *template.Template, funcMap template.FuncMap) {\n}", "title": "" }, { "docid": "d3f01d28fecdf41668da29bc3ca12b70", "score": "0.5202723", "text": "func getEnabledGatheringFunctions(gathererName string,\n\tallGatheringFunctions map[string]gatherers.GatheringClosure,\n\tgathererConfigs []v1alpha1.GathererConfig) map[string]gatherers.GatheringClosure {\n\tenabledGatheringFunctions := make(map[string]gatherers.GatheringClosure)\n\n\t// disabling a complete gatherer - e.g workloads\n\tif isGathererDisabled(gathererConfigs, gathererName) {\n\t\tklog.Infof(\"%s gatherer is completely disabled\", gathererName)\n\t\treturn enabledGatheringFunctions\n\t}\n\n\tfor fName, gatherinClosure := range allGatheringFunctions {\n\t\tfullGathererName := fmt.Sprintf(\"%s/%s\", gathererName, fName)\n\t\tif !isGathererDisabled(gathererConfigs, fullGathererName) {\n\t\t\tenabledGatheringFunctions[fName] = gatherinClosure\n\t\t}\n\t}\n\treturn enabledGatheringFunctions\n}", "title": "" }, { "docid": "261e4240fc1fd53891b2a9c6823269b8", "score": "0.5182632", "text": "func AddTemplateFunc(name string, f interface{}) {\n\tdefaultFuncs[name] = f\n}", "title": "" }, { "docid": "1e035872c462f6caa57695e96701bc28", "score": "0.5178864", "text": "func LoadWithFuncMap(opt Options) (map[string]*template.Template, error) {\n\treturn Load(opt)\n}", "title": "" }, { "docid": "dbe0575293164a6e2b3deb1461402a94", "score": "0.51744205", "text": "func getTestFuncsFromFile(filePath string) ([]string, error) {\n\tfileSet := token.NewFileSet()\n\tf, err := parser.ParseFile(fileSet, filePath, nil, parser.AllErrors)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttestFuncs := make([]string, 0)\n\tfor _, decl := range f.Decls {\n\t\tfuncDecl, ok := decl.(*ast.FuncDecl)\n\t\t// not a function declaration\n\t\tif !ok {\n\t\t\tcontinue\n\t\t}\n\t\tif strings.HasPrefix(funcDecl.Name.Name, \"Test\") {\n\t\t\ttestFuncs = append(testFuncs, funcDecl.Name.Name)\n\t\t}\n\t}\n\treturn testFuncs, nil\n}", "title": "" }, { "docid": "84a069699daeb5522683d6adefd464a1", "score": "0.51589537", "text": "func (tpl *Template) AddFuncMap(key string, funname interface{}) error {\n\ttpl.FuncMap[key] = funname\n\treturn nil\n}", "title": "" }, { "docid": "38ed7bbfa1c86979ce17b8b72a0742b5", "score": "0.5157357", "text": "func GetIncludeFunc(tmpl *template.Template) interface{} {\n\tif tmpl == nil {\n\t\tlog.Panic(\"Template cannot be nil\")\n\t}\n\n\treturn func(templateName string, data interface{}) (string, error) {\n\t\tvar err error\n\n\t\t// Execute the named template\n\t\tvar resultBytes []byte\n\t\tresultBytes, err = ExecuteNamedTemplate(tmpl, templateName, data)\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"Failed to execute named template \\\"%s\\\":\\n%s\", templateName, err)\n\t\t}\n\n\t\t// Get the result as a string\n\t\tvar result = string(resultBytes)\n\n\t\treturn result, nil\n\t}\n}", "title": "" }, { "docid": "b853e0e68e30d52520121d58e6085865", "score": "0.5148825", "text": "func builtins(ctx iface.Context) map[string]interface{} {\n\tviewCtx := ctx.ViewContext().Get()\n\tuser := ctx.User()\n\tret := map[string]interface{}{\n\t\t\"get\": func(s ...string) interface{} {\n\t\t\treturn get(viewCtx, s...)\n\t\t},\n\t\t\"date\": date,\n\t\t\"is_stranger\": func() bool {\n\t\t\treturn user.Level() == 0\n\t\t},\n\t\t\"logged_in\": func() bool {\n\t\t\treturn user.Level() > 0\n\t\t},\n\t\t\"is_moderator\": func() bool {\n\t\t\treturn user.Level() >= 200\n\t\t},\n\t\t\"is_admin\": func() bool {\n\t\t\treturn user.Level() >= 300\n\t\t},\n\t\t\"is_map\": isMap,\n\t\t\"eq\": eq,\n\t\t\"html\": html,\n\t\t\"format_float\": formatFloat,\n\t\t\"fallback\": fallback,\n\t\t\"type_of\":\ttypeOf,\n\t\t\"same_kind\": sameKind,\n\t\t\"title\": strings.Title,\n\t\t\"url\": func(action_name string, i ...interface{}) string {\n\t\t\treturn _url(ctx, action_name, i...) \n\t\t},\n\t\t\"form\": func(action_name string) *Form {\n\t\t\treturn form(ctx, action_name)\n\t\t},\n\t\t\"counter\": newcounter,\n\t\t\"get_sub\": func(str string, params ...interface{}) []interface{} {\n\t\t\treturn getSub(ctx, str, params...)\n\t\t},\n\t\t\"get_list\": func(str string, params ...interface{}) []interface{} {\n\t\t\treturn getList(ctx, str, params...)\n\t\t},\n\t\t\"elem\": elem,\n\t\t\"pager\": func(pagesl []string, count, limited int) []paging.Pelem {\n\t\t\tvar pagestr string\n\t\t\tif len(pagesl) == 0 {\n\t\t\t\tpagestr = \"1\"\n\t\t\t} else {\n\t\t\t\tpagestr = pagesl[0]\n\t\t\t}\n\t\t\treturn pager(ctx, pagestr, count, limited)\n\t\t},\n\t}\n\tctx.Conducting().Hooks().Select(\"AddTemplateBuiltin\").Fire(ret)\n\treturn ret\n}", "title": "" }, { "docid": "e19c1e2d6363526e6d5408482e9b65ea", "score": "0.5123273", "text": "func renderFuncs(bucketURL string, album state.Album) template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"getPhotoPublicURL\": func(photo state.Photo, size string) string {\n\t\t\treturn photo.PublicURL(bucketURL, album, state.PhotoSizeType(size))\n\t\t},\n\t\t\"getPhotoRawURL\": func(photo state.Photo, size string) string {\n\t\t\treturn photo.PublicURLRaw(bucketURL, state.PhotoSizeType(size))\n\t\t},\n\t}\n}", "title": "" }, { "docid": "b4fe62dbaffef6023055602f6ac781bc", "score": "0.5109694", "text": "func getProviderFunc(issuer string, clientIds []string) openid.GetProvidersFunc {\n\treturn func() ([]openid.Provider, error) {\n\t\tprovider, err := openid.NewProvider(issuer, clientIds)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn []openid.Provider{provider}, nil\n\t}\n}", "title": "" }, { "docid": "6f0491b2311e9b3cf0e640e5e2b0f45e", "score": "0.5097594", "text": "func GetEventHandlerFuncs(shouldObserve observeFilter, eventTypes EventTypes, msgBroker *messaging.Broker) cache.ResourceEventHandlerFuncs {\n\tif shouldObserve == nil {\n\t\tshouldObserve = func(obj interface{}) bool { return true }\n\t}\n\n\treturn cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: func(obj interface{}) {\n\t\t\tif !shouldObserve(obj) {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tlogResourceEvent(log, eventTypes.Add, obj)\n\t\t\tns := getNamespace(obj)\n\t\t\tmetricsstore.DefaultMetricsStore.K8sAPIEventCounter.WithLabelValues(eventTypes.Add.String(), ns).Inc()\n\t\t\tmsgBroker.GetQueue().AddRateLimited(events.PubSubMessage{\n\t\t\t\tKind: eventTypes.Add,\n\t\t\t\tNewObj: obj,\n\t\t\t\tOldObj: nil,\n\t\t\t})\n\t\t},\n\n\t\tUpdateFunc: func(oldObj, newObj interface{}) {\n\t\t\tif !shouldObserve(newObj) {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tlogResourceEvent(log, eventTypes.Update, newObj)\n\t\t\tns := getNamespace(newObj)\n\t\t\tmetricsstore.DefaultMetricsStore.K8sAPIEventCounter.WithLabelValues(eventTypes.Update.String(), ns).Inc()\n\t\t\tmsgBroker.GetQueue().AddRateLimited(events.PubSubMessage{\n\t\t\t\tKind: eventTypes.Update,\n\t\t\t\tNewObj: newObj,\n\t\t\t\tOldObj: oldObj,\n\t\t\t})\n\t\t},\n\n\t\tDeleteFunc: func(obj interface{}) {\n\t\t\tif !shouldObserve(obj) {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tlogResourceEvent(log, eventTypes.Delete, obj)\n\t\t\tns := getNamespace(obj)\n\t\t\tmetricsstore.DefaultMetricsStore.K8sAPIEventCounter.WithLabelValues(eventTypes.Delete.String(), ns).Inc()\n\t\t\tmsgBroker.GetQueue().AddRateLimited(events.PubSubMessage{\n\t\t\t\tKind: eventTypes.Delete,\n\t\t\t\tNewObj: nil,\n\t\t\t\tOldObj: obj,\n\t\t\t})\n\t\t},\n\t}\n}", "title": "" }, { "docid": "d63ec02abaf4e54eec98936a43c87294", "score": "0.509747", "text": "func AddReFuncs(f map[string]interface{}) {\n\tfor k, v := range CreateReFuncs(context.Background()) {\n\t\tf[k] = v\n\t}\n}", "title": "" }, { "docid": "642597f43460c3d22d929e1474b1c7f6", "score": "0.50835425", "text": "func (r RunFns) getFunctionsFromFunctions() ([]kio.Filter, error) {\n\treturn r.getFunctionFilters(true, r.Functions...)\n}", "title": "" }, { "docid": "de30e8d6f22d124a2d20727c674637ae", "score": "0.5076792", "text": "func (this *BaseModule) GetFunc(f string) (interface{}, error) {\n\tif function, ok := this.Functions[f]; ok {\n\t\treturn function, nil\n\t}\n\treturn nil, fmt.Errorf(\"Unknonwn function=%s topic=%s\", f, this.GetTopic())\n}", "title": "" }, { "docid": "1dee2d96312d07a86ccd3ac93e3f6a56", "score": "0.50727826", "text": "func NewFuncsMap(mfn MarshalFn, ufn UnmarshalFn) (fm FuncsMap) {\n\tfm = make(FuncsMap)\n\tfm.Put(\"default\", mfn, ufn)\n\treturn fm\n}", "title": "" }, { "docid": "47c07f2cb7ccea1311d76de76d02ab9f", "score": "0.5072247", "text": "func (ctx versionCtx) FuncMap() template.FuncMap {\n\treturn template.FuncMap{\n\t\t\"Sequence\": ctx.sequence,\n\t\t\"Cursor\": ctx.cursor,\n\t\t\"ChannelName\": ctx.channelName,\n\t\t\"VersionLabel\": ctx.versionLabel,\n\t\t\"IsRequired\": ctx.isRequired,\n\t\t\"ReleaseNotes\": ctx.releaseNotes,\n\t\t\"IsAirgap\": ctx.isAirgap,\n\t\t\"ReplicatedRegistryDomain\": ctx.replicatedRegistryDomain,\n\t\t\"ReplicatedProxyDomain\": ctx.replicatedProxyDomain,\n\t}\n}", "title": "" }, { "docid": "16dfab3e3a2d9709524817b60945e3e0", "score": "0.5039051", "text": "func GetFunction(n a.Name) (a.Function, bool) {\n\tif f, ok := builtInFuncs[n]; ok {\n\t\treturn f, true\n\t}\n\treturn nil, false\n}", "title": "" }, { "docid": "fbcf41466ab4ef1a3ff98025c2c5d83c", "score": "0.5033737", "text": "func FuncGet(m map[string]any, key string) any {\n\tif val, ok := m[key]; ok {\n\t\treturn val\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "53deb6f47af355a24deb339dbee26aee", "score": "0.5017859", "text": "func AddFuncMap(key string, funname interface{}) error {\r\n\tif _, ok := beegoTplFuncMap[key]; ok {\r\n\t\tbeegoTplFuncMap[key] = funname\r\n\t\treturn nil\r\n\t}\r\n\treturn errors.New(\"funcmap already has the key\")\r\n}", "title": "" }, { "docid": "161f6431875951eeeee513e34c05ac7f", "score": "0.49949545", "text": "func addFuncs(values map[string]reflect.Value, funcMap FuncMap) {\n\tfor name, fn := range funcMap {\n\t\tv := reflect.ValueOf(fn)\n\t\tif v.Kind() != reflect.Func {\n\t\t\tpanic(\"value for \" + name + \" not a function\")\n\t\t}\n\t\tif !goodFunc(v.Type()) {\n\t\t\tpanic(fmt.Errorf(\"can't handle multiple results from method/function %q\", name))\n\t\t}\n\t\tvalues[name] = v\n\t}\n}", "title": "" }, { "docid": "79e663b2e7751373694afc7c37c87bd9", "score": "0.4991128", "text": "func QueryFuncs(pageIndex, pageSize int, where interface{}) ([]models.Func, error) {\n\tvar funcs []models.Func\n\tfuncModel = &models.Func{}\n\tresult, err := funcModel.GetSome(pageIndex, pageSize, where)\n\tif err != nil {\n\t\treturn funcs, err\n\t}\n\tfuncs, ok := result.([]models.Func)\n\tif !ok {\n\t\terr = errors.New(\"failed to cast query result to system function models\")\n\t\treturn funcs, err\n\t}\n\treturn funcs, nil\n}", "title": "" }, { "docid": "8aa6dbe59d3f71e16498532c33057316", "score": "0.49908298", "text": "func writeFuncs(funcs map[string]exports.Func, subheader string, md *markdown.Writer) {\n\tif len(funcs) == 0 {\n\t\treturn\n\t}\n\titems := make([]string, len(funcs))\n\ti := 0\n\tfor k, v := range funcs {\n\t\tparams := \"\"\n\t\tif v.Params != nil {\n\t\t\tparams = *v.Params\n\t\t}\n\t\treturns := \"\"\n\t\tif v.Returns != nil {\n\t\t\treturns = *v.Returns\n\t\t\tif strings.Index(returns, \",\") > -1 {\n\t\t\t\treturns = fmt.Sprintf(\"(%s)\", returns)\n\t\t\t}\n\t\t}\n\t\titems[i] = fmt.Sprintf(\"1. %s(%s) %s\", k, params, returns)\n\t\ti++\n\t}\n\tsort.Strings(items)\n\tmd.WriteHeader(subheader)\n\tfor _, item := range items {\n\t\tmd.WriteLine(item)\n\t}\n}", "title": "" }, { "docid": "fe60aa4ea0a2b8b7be1ae3117c956de5", "score": "0.49899882", "text": "func HermeticHtmlFuncMap() template.FuncMap {\n\tr := HtmlFuncMap()\n\tfor _, name := range nonhermeticFunctions {\n\t\tdelete(r, name)\n\t}\n\treturn r\n}", "title": "" }, { "docid": "dec09b295f0393149080728db821cb89", "score": "0.4963928", "text": "func GetInterfacesFunc(matcher InterfaceMatcher) ([]net.Interface, error) {\n\tifaces, err := interfaceGetter()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tret := make([]net.Interface, 0)\n\tfor _, iface := range ifaces {\n\t\tif matcher(iface) {\n\t\t\tret = append(ret, iface)\n\t\t}\n\t}\n\treturn ret, nil\n}", "title": "" }, { "docid": "ee3acdfa82f8ac877b406d113bf08b5c", "score": "0.49272364", "text": "func (rig *Rig) getSetFunctions() error {\n\tvar funcList []string\n\n\tfor f, fStr := range FuncName {\n\t\tif res, err := rig.HasSetFunc(f); err != nil {\n\t\t\treturn err\n\t\t} else {\n\t\t\tif res > 0 {\n\t\t\t\tfuncList = append(funcList, fStr)\n\t\t\t}\n\t\t}\n\t}\n\tsort.Strings(funcList)\n\trig.Caps.SetFunctions = funcList\n\treturn nil\n}", "title": "" }, { "docid": "1e2f9b6c43fde88d8cbe3f6a85bc6fff", "score": "0.4923621", "text": "func StringFunctions() map[string]func(cell.I) cell.I {\n\treturn map[string]func(cell.I) cell.I{\n\t\t\"format\": sprintf,\n\t\t\"length\": slength,\n\t\t\"lower\": lower,\n\t\t\"replace\": sreplace,\n\t\t\"slice\": sslice,\n\t\t\"trim-prefix\": trimPrefix,\n\t\t\"trim-suffix\": trimSuffix,\n\t\t\"upper\": upper,\n\t}\n}", "title": "" }, { "docid": "3e4ce8c37f7b03a152fd0edea6c04a08", "score": "0.48941502", "text": "func (wc *WerfChartStub) SetupTemplateFuncs(t *template.Template, funcMap template.FuncMap) {\n\thelpers.SetupWerfSecretFile(wc.SecretsRuntimeData, funcMap)\n\thelpers.SetupIncludeWrapperFuncs(funcMap)\n\thelpers.SetupWerfImageDeprecationFunc(wc.ChartExtenderContext, funcMap)\n}", "title": "" }, { "docid": "573195371d63ff1d1ed2108c587121fa", "score": "0.48939654", "text": "func HashFuncs() []string {\n\thashes := make([]string, len(metas))\n\tfor i, m := range metas {\n\t\thashes[i] = string(m.name)\n\t}\n\treturn hashes\n}", "title": "" }, { "docid": "cd720aca01f5cf17ce93f351d0500105", "score": "0.48807716", "text": "func GetFuncIn(name string, i int) interface{} {\n\treturn DefalutFuncs.GetFuncIn(name, i)\n}", "title": "" }, { "docid": "bd4e15bb3592cff63199dc94d4736c57", "score": "0.48750302", "text": "func WithTemplateFuncs(funcMap template.FuncMap) Option {\n\treturn func(o *RunConfig) error {\n\t\to.funcs = funcMap\n\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "640579ab152acd5f18af867e40cb55a0", "score": "0.48694086", "text": "func (c *Context) Functions() map[string]interface{} {\n\tfunctions := map[string]interface{}{\n\t\t\"environment\": environment(),\n\t\t\"lower\": lower(),\n\t\t\"now\": now(),\n\t\t\"split\": split(),\n\t\t\"upper\": upper(),\n\t\t\"variable\": variable(c.Variables),\n\t}\n\tfor name, content := range c.Scripts {\n\t\tfunctions[name] = script(name, content)\n\t}\n\treturn functions\n}", "title": "" }, { "docid": "7c3c11dc527c6a2e05486c6eeb21d9d3", "score": "0.4868845", "text": "func (_m *MockSettings) GetTemplates() (map[string]Template, error) {\n\tret := _m.Called()\n\n\tvar r0 map[string]Template\n\tif rf, ok := ret.Get(0).(func() map[string]Template); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(map[string]Template)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func() error); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "5df920ab772b9735465434606aca82bd", "score": "0.48673958", "text": "func findFuncs(name string) ([]*FuncExtent, error) {\n\tfset := token.NewFileSet()\n\tparsedFile, err := parser.ParseFile(fset, name, nil, 0)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvisitor := &FuncVisitor{fset: fset}\n\tast.Walk(visitor, parsedFile)\n\treturn visitor.funcs, nil\n}", "title": "" }, { "docid": "31291372777419fb57118831a88067a6", "score": "0.48540187", "text": "func (o *Environment) GetFunctions() []FunctionDef {\n\tif o == nil {\n\t\tvar ret []FunctionDef\n\t\treturn ret\n\t}\n\n\treturn o.Functions\n}", "title": "" }, { "docid": "8718679920d3828bcaf65c9b7df15c36", "score": "0.48513272", "text": "func ExampleTryGetString_mapFunc() {\n\tin := map[string]interface{}{\n\t\t\"foo\": func() string {\n\t\t\treturn \"bar\"\n\t\t},\n\t}\n\tout := TryGetString(in, \"foo\", \"\")\n\tfmt.Println(out)\n\t// Output: bar\n}", "title": "" }, { "docid": "41045588e6a9ad158c5ea158fc3e99b8", "score": "0.4817034", "text": "func (o *LogRegMulti) GetFunctionsForPlotting() (ffcn fun.Sv, ffcns []fun.Sv) {\n\tffcn = func(x la.Vector) float64 {\n\t\tclass, _ := o.Predict(x)\n\t\treturn float64(class)\n\t}\n\tffcns = []fun.Sv{\n\t\to.models[0].Predict,\n\t\to.models[1].Predict,\n\t\to.models[2].Predict,\n\t}\n\treturn\n}", "title": "" }, { "docid": "dfa048ec5351a0440b5951acb8a1ccc7", "score": "0.48103556", "text": "func getStreamFuncs(wfConf *WorkflowConfig, connMap *sync.Map) []GetStreamFunc {\n\t//init workflow\n\tfuncs := make([]GetStreamFunc, 0)\n\n\tfor _, app := range wfConf.Functions {\n\t\tfuncs = append(funcs, createStreamFunc(app, connMap, core.ConnTypeStreamFunction))\n\t}\n\n\treturn funcs\n}", "title": "" }, { "docid": "36032c7071be00b409c1facba7763c5f", "score": "0.48023403", "text": "func GetFunction(name string, conf map[string]interface{}) (Function, error) {\n\tcreator, ok := functions[name]\n\tif ok {\n\t\ta := creator()\n\t\tb, err := json.Marshal(conf)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\terr = json.Unmarshal(b, a)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn a, nil\n\t}\n\treturn nil, ErrNotFound{name}\n}", "title": "" }, { "docid": "10cba4b0830fa7ed92b6639863a96998", "score": "0.47908556", "text": "func LensFuncs() map[string]source.LensFunc {\n\treturn map[string]source.LensFunc{\n\t\tsource.CommandUpgradeDependency.Name: upgradeLens,\n\t\tsource.CommandTidy.Name: tidyLens,\n\t\tsource.CommandVendor.Name: vendorLens,\n\t}\n}", "title": "" }, { "docid": "f41db55c28b2090d34b5edfd0fdc04a6", "score": "0.47860134", "text": "func createFunctionHandlerMap(fn *serverlessv1alpha1.Function) map[string]string {\n\tdata := make(map[string]string)\n\tdata[\"handler\"] = \"handler.main\"\n\tdata[\"handler.js\"] = fn.Spec.Function\n\n\tdata[\"package.json\"] = \"{}\"\n\tif strings.Trim(fn.Spec.Deps, \" \") != \"\" {\n\t\tdata[\"package.json\"] = fn.Spec.Deps\n\t}\n\n\treturn data\n}", "title": "" }, { "docid": "1c66d76eec684254b9a474b7ebeff13d", "score": "0.47697276", "text": "func (i *Implementation) Functions() []string {\n\ti.mergeStdlib()\n\n\ti.mu.RLock()\n\tdefer i.mu.RUnlock()\n\n\tstr := make([]string, 0)\n\tfor _, f := range i.funcs {\n\t\tstr = append(str, f.syntax())\n\t}\n\n\tsort.Strings(str)\n\n\treturn str\n}", "title": "" }, { "docid": "af3bd001bdb887366ce9679df1679eac", "score": "0.47691834", "text": "func Get() []configprovider.Factory {\n\treturn []configprovider.Factory{\n\t\tenvvarconfigsource.NewFactory(),\n\t\tetcd2configsource.NewFactory(),\n\t\tincludeconfigsource.NewFactory(),\n\t\tvaultconfigsource.NewFactory(),\n\t\tzookeeperconfigsource.NewFactory(),\n\t}\n}", "title": "" }, { "docid": "52c079e9dc8ae2efc51e582ab3fa6727", "score": "0.4750453", "text": "func (trans *Transformer) Get(\n\tctx context.Context,\n\ttplStr string,\n) (string, error) {\n\ttpl := template.New(\"config\").\n\t\tFuncs(sprig.TxtFuncMap()).\n\t\tFuncs(templates.TxtFuncMap())\n\tfor _, funcs := range trans.funcs {\n\t\ttpl = tpl.Funcs(funcs.TxtFuncMap(ctx))\n\t}\n\ttpl, err := tpl.Parse(tplStr)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"cannot parse template <<< %s >>>: %v\", tplStr, err)\n\t}\n\tdata := map[string]interface{}{}\n\tw := &bytes.Buffer{}\n\tif err := tpl.Execute(w, data); err != nil {\n\t\treturn \"\", fmt.Errorf(\"cannot expand template <<< %s >>>: %v\", tplStr, err)\n\t}\n\treturn w.String(), nil\n}", "title": "" }, { "docid": "5a64d3481159e95353310e474553fed2", "score": "0.4730192", "text": "func New() *Funcs {\n\treturn new(Funcs)\n}", "title": "" } ]
98a665b847362e874331c1f7d56be483
Whether SSIS package property override value is sensitive data. Value will be encrypted in SSISDB if it is true
[ { "docid": "71ad0552709fc8b4c3b29cdb7f69cb66", "score": "0.59101784", "text": "func (o SSISPropertyOverrideResponseOutput) IsSensitive() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v SSISPropertyOverrideResponse) *bool { return v.IsSensitive }).(pulumi.BoolPtrOutput)\n}", "title": "" } ]
[ { "docid": "96fde7ed3a7c8c474d12543ca24e5d82", "score": "0.62575275", "text": "func (o SSISPropertyOverrideOutput) IsSensitive() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v SSISPropertyOverride) *bool { return v.IsSensitive }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "2ff38527eb575aa34a3774c1872bdfce", "score": "0.51775235", "text": "func (a Attribute) IsSensitive() bool {\n\treturn a.Sensitive\n}", "title": "" }, { "docid": "49bad50864dbade01671ce8cc8a01124", "score": "0.5151708", "text": "func (me TxsdDatabaseClass) IsAltkey() bool { return me == \"altkey\" }", "title": "" }, { "docid": "858dbcaceb37bf670f85d0845b0ed2fb", "score": "0.5141967", "text": "func (me TKeyTypes) IsEncryption() bool { return me.String() == \"encryption\" }", "title": "" }, { "docid": "0ed48d7078db831fa6b3dc762b3af56a", "score": "0.5137397", "text": "func (d *OntapStorageDriverConfig) HideSensitiveWithSecretName(secretName string) {\n\tif d.ClientPrivateKey != \"\" {\n\t\td.ClientPrivateKey = secretName\n\t}\n\tif d.Username != \"\" {\n\t\td.Username = secretName\n\t\td.Password = secretName\n\t}\n\n\t// CHAP settings\n\tif d.UseCHAP {\n\t\td.ChapUsername = secretName\n\t\td.ChapInitiatorSecret = secretName\n\t\td.ChapTargetUsername = secretName\n\t\td.ChapTargetInitiatorSecret = secretName\n\t}\n}", "title": "" }, { "docid": "dfc1ad34975a7ef167f0b46409d36ccc", "score": "0.51314646", "text": "func (m *ManagedDevice) SetIsEncrypted(value *bool)() {\n err := m.GetBackingStore().Set(\"isEncrypted\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "9dacf3830e775a61810a066b7533c7a7", "score": "0.5107912", "text": "func (d *FakeStorageDriverConfig) HideSensitiveWithSecretName(secretName string) {\n\td.Username = secretName\n\td.Password = secretName\n}", "title": "" }, { "docid": "b072234243a6b5398946022e7e6eacb1", "score": "0.5090819", "text": "func (o UserPoolUsernameConfigurationOutput) CaseSensitive() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v UserPoolUsernameConfiguration) bool { return v.CaseSensitive }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "aaa696c32f39273ab0dc56cdfbf2f25e", "score": "0.508875", "text": "func (starkdb *Db) setEncryption(val bool) error {\n\tif val == false {\n\t\tstarkdb.cipherKey = nil\n\t\treturn nil\n\t}\n\n\t// check for the env variable\n\tpassword, exists := os.LookupEnv(DefaultStarkEnvVariable)\n\tif !exists {\n\t\treturn ErrNoEnvSet\n\t}\n\n\t// convert password to cipher key\n\tcipherKey, err := starkcrypto.Password2cipherkey(password)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// set the key\n\tstarkdb.cipherKey = cipherKey\n\treturn nil\n}", "title": "" }, { "docid": "cf05438f58fb83cc47dbc5843b04785d", "score": "0.4940012", "text": "func (m *PasswordCredential) Defaults(ver string) bool {\n\treturn false\n}", "title": "" }, { "docid": "8b9e2eacad000a2c15306aaed07ea738", "score": "0.49229226", "text": "func (o *ParameterDTO) GetSensitive() bool {\n\tif o == nil || o.Sensitive == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Sensitive\n}", "title": "" }, { "docid": "b9c679086c889c51f3c31028fd269ec3", "score": "0.4889881", "text": "func (cgpr ContainerGetPropertiesResponse) DenyEncryptionScopeOverride() string {\n\treturn cgpr.rawResponse.Header.Get(\"x-ms-deny-encryption-scope-override\")\n}", "title": "" }, { "docid": "b37ca757ab4fabb957668d833cbadd01", "score": "0.48200133", "text": "func HasSensitiveInfo(obj *unstructured.Unstructured) bool {\n\tgk := obj.GroupVersionKind().GroupKind()\n\treturn gk.Group == \"\" && gk.Kind == \"Secret\"\n}", "title": "" }, { "docid": "6aa1cdcd7c980d2ebc9216cb5b30e760", "score": "0.48184174", "text": "func (m *DeviceManagementSettings) SetSecureByDefault(value *bool)() {\n m.secureByDefault = value\n}", "title": "" }, { "docid": "aa5f1a27d3dc76e88de02c4a69155479", "score": "0.47935638", "text": "func (o *ParameterDTO) HasSensitive() bool {\n\tif o != nil && o.Sensitive != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "6a098ff5b48990853324b96d827e0074", "score": "0.4761561", "text": "func (dgpr DirectoryGetPropertiesResponse) IsServerEncrypted() string {\n\treturn dgpr.rawResponse.Header.Get(\"x-ms-server-encrypted\")\n}", "title": "" }, { "docid": "b8413a3201d6856c811a8005ddf14976", "score": "0.47584382", "text": "func IsSourceEncrypted(metadata map[string]string) bool {\n\tif _, ok := metadata[xhttp.AmzServerSideEncryptionCustomerAlgorithm]; ok {\n\t\treturn true\n\t}\n\tif _, ok := metadata[xhttp.AmzServerSideEncryption]; ok {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "eefb8fa6f9e4675ca0a7c1fde214322c", "score": "0.47433004", "text": "func (o VMSSExtensionOutput) ProtectedSettings() pulumi.AnyOutput {\n\treturn o.ApplyT(func(v VMSSExtension) interface{} { return v.ProtectedSettings }).(pulumi.AnyOutput)\n}", "title": "" }, { "docid": "b4e88621e68420deaab299f9e9b491bc", "score": "0.47364813", "text": "func (fgpr FileGetPropertiesResponse) IsServerEncrypted() string {\n\treturn fgpr.rawResponse.Header.Get(\"x-ms-server-encrypted\")\n}", "title": "" }, { "docid": "b94ec079646105f4ab561556630bbe7c", "score": "0.47213733", "text": "func (m *Windows10GeneralConfiguration) SetPasswordRequired(value *bool)() {\n err := m.GetBackingStore().Set(\"passwordRequired\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "2379836dd7e683063e38a4f4b62df116", "score": "0.47200903", "text": "func (m *WorkbookWorksheetProtection) SetProtected(value *bool)() {\n m.protected = value\n}", "title": "" }, { "docid": "0f6d0bee5e2231e21c85749b5fc3a758", "score": "0.47103694", "text": "func (bgpr BlobGetPropertiesResponse) IsServerEncrypted() string {\n\treturn bgpr.rawResponse.Header.Get(\"x-ms-server-encrypted\")\n}", "title": "" }, { "docid": "148bcace97485819e00708c23b974849", "score": "0.4708561", "text": "func (d *GCPNFSStorageDriverConfig) HideSensitiveWithSecretName(secretName string) {\n\td.APIKey.PrivateKey = secretName\n\td.APIKey.PrivateKeyID = secretName\n}", "title": "" }, { "docid": "7e764d250b38fd00ef31cfae11f2772c", "score": "0.47076097", "text": "func (d *AzureNASStorageDriverConfig) HideSensitiveWithSecretName(secretName string) {\n\td.ClientID = secretName\n\td.ClientSecret = secretName\n}", "title": "" }, { "docid": "817788c623feb1286533a3e20f935d85", "score": "0.4703345", "text": "func (o Options) Protect() bool {\n\treturn (uint8(o) >> 1) == 1\n}", "title": "" }, { "docid": "465c047faf351dbd8a038133fd0759df", "score": "0.4697255", "text": "func (m *Windows10GeneralConfiguration) SetDefenderRequireCloudProtection(value *bool)() {\n err := m.GetBackingStore().Set(\"defenderRequireCloudProtection\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "94d813b560da444f5f4e41c9f95f6f6f", "score": "0.46923783", "text": "func StripSensitive(txt string) string {\n\ttxt2 := StripPassword(txt)\n\n\treturn txt2\n}", "title": "" }, { "docid": "4ad488071ad4154ffc31d2d45f16aa9f", "score": "0.46621352", "text": "func (m *Windows10GeneralConfiguration) SetWindowsStoreEnablePrivateStoreOnly(value *bool)() {\n err := m.GetBackingStore().Set(\"windowsStoreEnablePrivateStoreOnly\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "69d4aba45dd972e51a642bcfb1cf31c3", "score": "0.46597552", "text": "func (o GetPoolExtensionOutput) ProtectedSettings() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetPoolExtension) string { return v.ProtectedSettings }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "f38a792b1aa5ba6941bbaf2f861503f0", "score": "0.4646982", "text": "func (m *UserSimulationDetails) SetIsCompromised(value *bool)() {\n err := m.GetBackingStore().Set(\"isCompromised\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "83cb6de99a288f4068de0fa84b22093b", "score": "0.46408534", "text": "func (m *dialogModel) Salt() string { return m.Get(\"salt\") }", "title": "" }, { "docid": "3d747041848e9f12f47b96169071813f", "score": "0.45920938", "text": "func (m *Certification) SetIsCertifiedByMicrosoft(value *bool)() {\n m.isCertifiedByMicrosoft = value\n}", "title": "" }, { "docid": "dca829842903efe0e2b7300dfe22fc3f", "score": "0.4591715", "text": "func (m *SensitivityLabel) SetHasProtection(value *bool)() {\n err := m.GetBackingStore().Set(\"hasProtection\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "552136d122417e9a083679030b19b036", "score": "0.45714265", "text": "func (schema *tableSchema) NeedToEncrypt(columnName string) bool {\n\tif schema.mapEncryptedColumns == nil {\n\t\tschema.initMap()\n\t}\n\t_, ok := schema.mapEncryptedColumns[columnName]\n\treturn ok\n}", "title": "" }, { "docid": "af5348eab839dbac207da7a512677f0c", "score": "0.45600492", "text": "func (v *PersistenceSetting) IsSetKey() bool {\n\treturn v != nil && v.Key != nil\n}", "title": "" }, { "docid": "f729b16d1294cb87499571f2ac1438bc", "score": "0.4558438", "text": "func (l *Language) IsSet(key string) bool {\n\tkey = strings.ToLower(key)\n\tif !globalOnlySettings[key] {\n\t\treturn l.Provider.IsSet(key)\n\t}\n\treturn l.Cfg.IsSet(key)\n}", "title": "" }, { "docid": "a524c6e1cf8a29deeba5470c1b2e1f82", "score": "0.4552859", "text": "func (d *FakeStorageDriverConfig) GetAndHideSensitive(secretName string) map[string]string {\n\treturn map[string]string{}\n}", "title": "" }, { "docid": "fd64cbcbec6ff1b4ac3ea2ee6602bf08", "score": "0.45404348", "text": "func (m *Windows10GeneralConfiguration) SetPasswordBlockSimple(value *bool)() {\n err := m.GetBackingStore().Set(\"passwordBlockSimple\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "b5e802f35235533b3130502f524443a4", "score": "0.4539184", "text": "func (cluster *Cluster) GetInsecure() *StringBool {\n\tif cluster == nil {\n\t\treturn nil\n\t}\n\treturn cluster.Insecure\n}", "title": "" }, { "docid": "e81d1564ed56e80091a93e40c9bc32cb", "score": "0.45354867", "text": "func (m *DepMacOSEnrollmentProfile) SetDontAutoPopulatePrimaryAccountInfo(value *bool)() {\n err := m.GetBackingStore().Set(\"dontAutoPopulatePrimaryAccountInfo\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "8868d4e2998b622c345976995c11ff99", "score": "0.45253298", "text": "func Insecure(i bool) Option {\n\treturn func(o *Options) {\n\t\to.Insecure = i\n\t}\n}", "title": "" }, { "docid": "66ce9278c83c3613ded3d0dd67d7bd62", "score": "0.4520591", "text": "func (d *SolidfireStorageDriverConfig) GetAndHideSensitive(secretName string) map[string]string {\n\tsecretMap := d.ExtractSecrets()\n\td.HideSensitiveWithSecretName(secretName)\n\n\treturn secretMap\n}", "title": "" }, { "docid": "0ac92edda550e5eb23c078c226a54e0d", "score": "0.4515939", "text": "func (b Boolean) EqualSensitive(value interface{}) bool {\n\treturn false\n}", "title": "" }, { "docid": "3ed65c24e30be33e133866d654effc54", "score": "0.45117468", "text": "func skipOverride(key string) bool {\n\tskipOverrideList := []string{\"PATH\"}\n\tfor _, k := range skipOverrideList {\n\t\tif key == k {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "a8e13561a1b81239f7131632bbdedcb3", "score": "0.4504815", "text": "func (s RocksDBSpec) IsEncrypted() bool {\n\treturn s.Encryption.IsEncrypted()\n}", "title": "" }, { "docid": "10c283cace3a64b95bac7a7fcd9ab438", "score": "0.45029327", "text": "func (d *SolidfireStorageDriverConfig) HideSensitiveWithSecretName(secretName string) {\n\td.EndPoint = secretName\n}", "title": "" }, { "docid": "9c0c3f84f90d0d1c45d7468fc52dc2d7", "score": "0.4500136", "text": "func (s SeedStr) SecureNoLogString() string {\n\treturn string(s)\n}", "title": "" }, { "docid": "0be49ae808154d318e71a616b6277917", "score": "0.44968328", "text": "func (schema *TableSchema) NeedToEncrypt(columnName string) bool {\n\tif schema.mapEncryptedColumns == nil {\n\t\tschema.initMap()\n\t}\n\t_, ok := schema.mapEncryptedColumns[columnName]\n\treturn ok\n}", "title": "" }, { "docid": "e88103aab047911fe3ff8aabe0f26335", "score": "0.44780615", "text": "func (o *ParameterDTO) GetSensitiveOk() (*bool, bool) {\n\tif o == nil || o.Sensitive == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Sensitive, true\n}", "title": "" }, { "docid": "cdd14ca371c0867e9312b92d0472218e", "score": "0.4476481", "text": "func TestResourceHack( t *testing.T ) {\n testHack := IsResourceHackDisabled()\n // Irrespective of the environment variable value\n // if it is defined, resource hack is disabled\n os.Setenv(DisableResourceHackEnvVar, \"test\")\n trueHack := IsResourceHackDisabled()\n if ((testHack != FalseStr) || (trueHack != TrueStr)) {\n t.Errorf(\"FAILED\")\n }\n os.Unsetenv(DisableResourceHackEnvVar)\n}", "title": "" }, { "docid": "be5a82299c899303e217435028f921bc", "score": "0.446582", "text": "func (d *OntapStorageDriverConfig) GetAndHideSensitive(secretName string) map[string]string {\n\tsecretMap := d.ExtractSecrets()\n\td.HideSensitiveWithSecretName(secretName)\n\n\treturn secretMap\n}", "title": "" }, { "docid": "5bd5200057c05b20ead05ddbd13bd261", "score": "0.44642264", "text": "func Secure(b bool) registry.Option {\n\treturn func(o *registry.Options) {\n\t\to.Secure = b\n\t}\n}", "title": "" }, { "docid": "7204c01d37e057d831e6ed526a692f0f", "score": "0.44580132", "text": "func (m *DepEnrollmentBaseProfile) SetSiriDisabled(value *bool)() {\n err := m.GetBackingStore().Set(\"siriDisabled\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "f0625fbb01e65d4317b92d559ec5ce56", "score": "0.44518334", "text": "func (me TxsdDatabaseClass) IsKey1() bool { return me == \"key1\" }", "title": "" }, { "docid": "91145fcf0daa40cb022f9620a7c79fb2", "score": "0.44512793", "text": "func (m *FieldTypeMutation) Sensitive() (r []byte, exists bool) {\n\tv := m.sensitive\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "d4867e364a30d3c5d8f2db154a8874a5", "score": "0.44489452", "text": "func (m *WorkbookWorksheetProtection) GetProtected()(*bool) {\n return m.protected\n}", "title": "" }, { "docid": "0c609bff4b8a9cd639bb6b89728145ef", "score": "0.4444245", "text": "func Secure(b bool) Option {\n\treturn func(cfg *Config) {\n\t\tcfg.Secure = b\n\t}\n}", "title": "" }, { "docid": "3f108988a752c6ef681e09c3d74dccd4", "score": "0.44435126", "text": "func (d *GCPNFSStorageDriverConfig) GetAndHideSensitive(secretName string) map[string]string {\n\tsecretMap := d.ExtractSecrets()\n\td.HideSensitiveWithSecretName(secretName)\n\n\treturn secretMap\n}", "title": "" }, { "docid": "89b3285c34c6f79bc96f085710ce111a", "score": "0.44399256", "text": "func OverrideJMeterProperty(c *gin.Context) {\n\tvar jMeterProperty model.JMeterProperty\n\tif err := c.ShouldBindJSON(&jMeterProperty); err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\t// save the JMeterProperty\n\tif err := jMeterProperty.WriteFile(); err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, gin.H{\"status\": \"success\"})\n\treturn\n}", "title": "" }, { "docid": "4a46220eff2f01011848ac2658b7f2d4", "score": "0.44398147", "text": "func (c *AWXConfig) Insecure() bool {\n\treturn c.insecure\n}", "title": "" }, { "docid": "16ed829e7f61b20655421d19cfc3850d", "score": "0.4432962", "text": "func (o PoolExtensionOutput) ProtectedSettings() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PoolExtension) *string { return v.ProtectedSettings }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5b4174d8dc36e27aa796539906db64d0", "score": "0.4423941", "text": "func (d *AzureNASStorageDriverConfig) GetAndHideSensitive(secretName string) map[string]string {\n\tsecretMap := d.ExtractSecrets()\n\td.HideSensitiveWithSecretName(secretName)\n\n\treturn secretMap\n}", "title": "" }, { "docid": "d48052b1bbbdd10cc6de814e7446487c", "score": "0.44193628", "text": "func (o SSISExecutionCredentialOutput) Password() SecureStringOutput {\n\treturn o.ApplyT(func(v SSISExecutionCredential) SecureString { return v.Password }).(SecureStringOutput)\n}", "title": "" }, { "docid": "6d9417da2b4dc39f0e424d48b85b2285", "score": "0.44163626", "text": "func (o *Entry) SpecifyEncryption(v int) {\n if len(o.Encryption) == 0 {\n return\n }\n\n nv := make([]string, len(o.Encryption))\n switch v {\n case 2:\n for i := range o.Encryption {\n switch o.Encryption[i] {\n case EncryptionDes:\n nv[i] = \"des\"\n case Encryption3des:\n nv[i] = \"3des\"\n case EncryptionAes128:\n nv[i] = \"aes-128-cbc\"\n case EncryptionAes192:\n nv[i] = \"aes-192-cbc\"\n case EncryptionAes256:\n nv[i] = \"aes-256-cbc\"\n case EncryptionAes128Gcm:\n nv[i] = \"aes-128-gcm\"\n case EncryptionAes256Gcm:\n nv[i] = \"aes-256-gcm\"\n case EncryptionNull:\n nv[i] = \"null\"\n default:\n nv[i] = o.Encryption[i]\n }\n }\n case 1:\n for i := range o.Encryption {\n switch o.Encryption[i] {\n case Encryption3des:\n nv[i] = \"3des\"\n case EncryptionAes128:\n nv[i] = \"aes128\"\n case EncryptionAes192:\n nv[i] = \"aes192\"\n case EncryptionAes256:\n nv[i] = \"aes256\"\n case EncryptionNull:\n nv[i] = \"null\"\n default:\n nv[i] = o.Encryption[i]\n }\n }\n default:\n copy(nv, o.Encryption)\n }\n\n o.Encryption = nv\n}", "title": "" }, { "docid": "6977ff850d6436b6782e8d6d1d9240ad", "score": "0.44155234", "text": "func (bgpr BlobGetPropertiesResponse) IsSealed() string {\n\treturn bgpr.rawResponse.Header.Get(\"x-ms-blob-sealed\")\n}", "title": "" }, { "docid": "1dad60929d1f162abb41a9a47406d8eb", "score": "0.4405815", "text": "func (d Default) Password() string {\n\treturn d.Credentials[\"password\"]\n}", "title": "" }, { "docid": "8bfa12383c0ab789fac65d2e2813b884", "score": "0.43989533", "text": "func TestAdminPassword( t *testing.T ) {\n testPass := GetAdminPassword()\n SetAdminPassword(\"password\")\n setPass := GetAdminPassword()\n if ((testPass != DefaultAdminPassword) || (setPass != \"password\")) {\n t.Errorf(\"FAILED\")\n }\n os.Unsetenv(AdminPasswordEnvVar)\n}", "title": "" }, { "docid": "a8a0dd57d9071c0b4a76358d3f03b968", "score": "0.43983814", "text": "func Password(name string) {\n\tvar c pio.ConfigFile\n\tpub, priv, err := box.GenerateKey(rand.Reader)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not generate site key: %s\", err.Error())\n\t}\n\n\tconfig, err := pio.GetConfigPath()\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not get config file name: %s\", err.Error())\n\t}\n\n\t// Read the master public key.\n\tconfigContents, err := ioutil.ReadFile(config)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not get config file contents: %s\", err.Error())\n\t}\n\n\terr = json.Unmarshal(configContents, &c)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not unmarshal config file contents: %s\", err.Error())\n\t}\n\n\tmasterPub := c.MasterPubKey\n\n\tsitePass, err := pio.PromptPass(fmt.Sprintf(\"Enter password for %s\", name))\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not get password for site: %s\", err.Error())\n\t}\n\n\tpassSealed, err := pc.SealAsym([]byte(sitePass), &masterPub, priv)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not seal new site password: %s\", err.Error())\n\t}\n\n\tsi := pio.SiteInfo{\n\t\tPubKey: *pub,\n\t\tName: name,\n\t\tPassSealed: passSealed,\n\t}\n\n\terr = si.AddFile(passSealed, name)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not save site file: %s\", err.Error())\n\t}\n}", "title": "" }, { "docid": "ffdc59029a562fc91850e5d0b8a98447", "score": "0.43949115", "text": "func (s RocksDBEncryptionSpec) IsEncrypted() bool {\n\treturn s.GetKeySecretName() != \"\"\n}", "title": "" }, { "docid": "b3ef8ff59c3e50965e1c7b5f65eb0673", "score": "0.43945986", "text": "func (o VMSSExtensionResponseOutput) ProtectedSettings() pulumi.AnyOutput {\n\treturn o.ApplyT(func(v VMSSExtensionResponse) interface{} { return v.ProtectedSettings }).(pulumi.AnyOutput)\n}", "title": "" }, { "docid": "0b3735dedc6c00ac2091b7c8e85adad0", "score": "0.43940794", "text": "func (m *Windows10GeneralConfiguration) GetDefenderRequireCloudProtection()(*bool) {\n val, err := m.GetBackingStore().Get(\"defenderRequireCloudProtection\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "title": "" }, { "docid": "5f13eb21bd516402002d8639f4c85da2", "score": "0.43762603", "text": "func (connectionSettings *ConnectionSettings) AllowUntrusted() bool {\n\treturn connectionSettings.Allowuntrusted\n}", "title": "" }, { "docid": "32ba6d328ceee68edd203fc8f2008faf", "score": "0.4369211", "text": "func (me TxsdDatabaseClass) IsKey2() bool { return me == \"key2\" }", "title": "" }, { "docid": "e9c161f0e30eed6f5ce8e05a4dd60336", "score": "0.43677205", "text": "func (c *Config) ShouldStorePassword(fingerprint fingerprint.Fingerprint) bool {\n\treturn c.getConfig(fingerprint).StorePassword\n}", "title": "" }, { "docid": "ede608b004061f62c80bc78f284fea03", "score": "0.43669614", "text": "func (m *SharedPCConfiguration) SetAllowLocalStorage(value *bool)() {\n err := m.GetBackingStore().Set(\"allowLocalStorage\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "780c97392ef24e4fe79bf06c4ee81dd7", "score": "0.4364857", "text": "func (vb *MaterializedViewBuilder) Secure() string {\n\treturn fmt.Sprintf(`ALTER MATERIALIZED VIEW %v SET SECURE`, vb.QualifiedName())\n}", "title": "" }, { "docid": "abc633865b4962e45045ed89504fb7e3", "score": "0.43595293", "text": "func (o UserPoolUsernameConfigurationPtrOutput) CaseSensitive() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *UserPoolUsernameConfiguration) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.CaseSensitive\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "b34ddb3be94752f12f97ad9af55e3a18", "score": "0.4357215", "text": "func HideSensitiveInfo(obj *unstructured.Unstructured) (*unstructured.Unstructured, bool) {\n\tif obj == nil {\n\t\treturn obj, false\n\t}\n\tif !HasSensitiveInfo(obj) {\n\t\treturn obj, false\n\t}\n\n\tclone := obj.DeepCopy()\n\tfor _, section := range []string{\"data\", \"stringData\"} {\n\t\tsecretData, _, _ := unstructured.NestedMap(obj.Object, section)\n\t\tchanged := obfuscateMap(secretData)\n\t\tif changed != nil {\n\t\t\tclone.Object[section] = changed\n\t\t}\n\t}\n\treturn clone, true\n}", "title": "" }, { "docid": "1b1819303e146b1b96fce121590bfa1e", "score": "0.43512672", "text": "func (m *KerberosSingleSignOnExtension) SetPasswordEnableLocalSync(value *bool)() {\n err := m.GetBackingStore().Set(\"passwordEnableLocalSync\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "41ecee6102598f2a1af5b70a99c2f480", "score": "0.43476948", "text": "func (storage *HubicStorage) IsStrongConsistent() (bool) { return false }", "title": "" }, { "docid": "012578f992237c4699f266d25759ca3a", "score": "0.43453243", "text": "func (o SSISPackageLocationOutput) PackagePassword() pulumi.AnyOutput {\n\treturn o.ApplyT(func(v SSISPackageLocation) interface{} { return v.PackagePassword }).(pulumi.AnyOutput)\n}", "title": "" }, { "docid": "caab280f4add20c336218596ea303466", "score": "0.43416253", "text": "func (o *ParameterDTO) SetSensitive(v bool) {\n\to.Sensitive = &v\n}", "title": "" }, { "docid": "4f27cff5cb3a10e7bd2985ee9c2a76aa", "score": "0.43343648", "text": "func (me TxsdDbCommonAttributesRevisionflag) IsOff() bool { return me == \"off\" }", "title": "" }, { "docid": "ca951d086c6d7fbfbd00a7e95d96d956", "score": "0.43291855", "text": "func (runner *Runner) PackageProperty(name string, key string, target interface{}) bool {\n\n\tif pkg, ok := runner.Package(name); ok {\n\t\tif v, ok := pkg.Properties[key]; ok {\n\t\t\tcontent, _ := json.Marshal(v)\n\n\t\t\tjson.Unmarshal(content, target)\n\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "2a7e941cea60b400817fd1b647a337bd", "score": "0.4323595", "text": "func (m *Windows10EndpointProtectionConfiguration) SetBitLockerEncryptDevice(value *bool)() {\n m.bitLockerEncryptDevice = value\n}", "title": "" }, { "docid": "c57713d2be57eb90b26ad325a64cb6b1", "score": "0.43195915", "text": "func (m *Windows10GeneralConfiguration) GetWindowsStoreEnablePrivateStoreOnly()(*bool) {\n val, err := m.GetBackingStore().Get(\"windowsStoreEnablePrivateStoreOnly\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "title": "" }, { "docid": "6b037cd8da10bb638e6a2d11a3546d51", "score": "0.4313575", "text": "func isOciEncrypted(mediatype string) bool {\n\treturn strings.HasSuffix(mediatype, \"+encrypted\")\n}", "title": "" }, { "docid": "3d178aeed7ab60d782db8324a5b34058", "score": "0.43080413", "text": "func (m *MacOSKerberosSingleSignOnExtension) SetPasswordEnableLocalSync(value *bool)() {\n err := m.GetBackingStore().Set(\"passwordEnableLocalSync\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "ea3805c44d58d130cf41958668adc5c7", "score": "0.43057153", "text": "func (c *ClusterNodeSshKeys) IsPersistedToSecret() bool {\n\tif sshKeysSecret, err := c.GetKeysDataSecret(); err == nil {\n\t\treturn sshKeysSecret.Data != nil && sshKeysSecret.Data[\"pub\"] != nil && sshKeysSecret.Data[\"key\"] != nil\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "0042daa6a9adbccc4c6cdd893f998370", "score": "0.4303933", "text": "func (e *EncryptedFormatter) UsesDeterministicKeyFormatting() bool {\n\treturn e.useDeterministicDocumentIDs\n}", "title": "" }, { "docid": "80d2019ef4ecfe07c005670d1a2336df", "score": "0.4299761", "text": "func (d *Secure) EncryptAll(encrypt bool) error {\n\tif _, err := os.Stat(d.key); err != nil && encrypt {\n\t\td.secrets.GenerateKey()\n\t\td.secrets.SaveKey(d.key)\n\t} else {\n\t\td.secrets.ReadKey(d.key)\n\t}\n\n\tif !encrypt {\n\t\treturn nil\n\t}\n\n\tfor key, env := range d.secrets.Envs {\n\t\tfiles := env.foundFiles()\n\t\tif files[0] == \"\" && files[1] != \"\" {\n\t\t\t// encrypt the file\n\t\t\tenv.load(key, false)\n\t\t\tif err := env.save(true); err != nil {\n\t\t\t\treturn fmt.Errorf(\"Unable to encrypt '%s'. %s\", files[1], err)\n\t\t\t}\n\t\t\tif err := os.Remove(files[1]); err != nil {\n\t\t\t\treturn fmt.Errorf(\"Unable to remove unencrypted '%s'. %s\", files[1], err)\n\t\t\t}\n\t\t\tenv.files[0] = env.credFile\n\t\t\tenv.files[1] = \"\"\n\t\t} else if files[0] != \"\" && files[1] != \"\" {\n\t\t\t// remove unencrypted one\n\t\t\tif err := os.Remove(files[1]); err != nil {\n\t\t\t\treturn fmt.Errorf(\"Unable to remove unencrypted '%s'. %s\", files[1], err)\n\t\t\t}\n\t\t\tenv.files[1] = \"\"\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7af4c557a061c8846137234feabc0c60", "score": "0.4298051", "text": "func (m *Windows10EndpointProtectionConfiguration) SetBitLockerDisableWarningForOtherDiskEncryption(value *bool)() {\n m.bitLockerDisableWarningForOtherDiskEncryption = value\n}", "title": "" }, { "docid": "694108fad3d792d653811397cce92036", "score": "0.42951488", "text": "func (o GatewaySmbActiveDirectorySettingsOutput) Password() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GatewaySmbActiveDirectorySettings) string { return v.Password }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d6ed55c8a857ea1ebdf3a741b4758a85", "score": "0.42942947", "text": "func (o SSISAccessCredentialOutput) Password() pulumi.AnyOutput {\n\treturn o.ApplyT(func(v SSISAccessCredential) interface{} { return v.Password }).(pulumi.AnyOutput)\n}", "title": "" }, { "docid": "e71b3ed609c5a39ad35d13de363aaec3", "score": "0.42939824", "text": "func (dr downloadResponse) IsServerEncrypted() string {\n\treturn dr.rawResponse.Header.Get(\"x-ms-server-encrypted\")\n}", "title": "" }, { "docid": "e71b3ed609c5a39ad35d13de363aaec3", "score": "0.42939824", "text": "func (dr downloadResponse) IsServerEncrypted() string {\n\treturn dr.rawResponse.Header.Get(\"x-ms-server-encrypted\")\n}", "title": "" }, { "docid": "e420855c15255bd99760bd1ee9a13387", "score": "0.42865807", "text": "func (m *Windows10GeneralConfiguration) SetSearchDisableIndexingEncryptedItems(value *bool)() {\n err := m.GetBackingStore().Set(\"searchDisableIndexingEncryptedItems\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "8be334db5f97484afef2cc0e0582dd64", "score": "0.42794877", "text": "func (m *SynchronizationTemplate) SetDefaultEscaped(value *bool)() {\n err := m.GetBackingStore().Set(\"defaultEscaped\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "069d0404f9cfc662515bcfbe81baa7a5", "score": "0.42779732", "text": "func (self Lefs) ThereSensitive() bool {\n\treturn !self.IsTransSensib.isEmpty()\n}", "title": "" }, { "docid": "bf172ee6aefc156ea1b3e6cf8bb8c32b", "score": "0.4276543", "text": "func (s ContextSource) IsSet(value ContextSource) bool { return s&value != 0 }", "title": "" } ]
a056880b379ef39840dba3a1b2b18556
SetValue sets the Value field's value.
[ { "docid": "2235d3238a7172b04fe9def73ba69a6c", "score": "0.7456491", "text": "func (s *TagRef) SetValue(v string) *TagRef {\n\ts.Value = &v\n\treturn s\n}", "title": "" } ]
[ { "docid": "3003a746a8cc74fd2a2e0bef1e14db04", "score": "0.7910065", "text": "func (o *DataValue) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "3acd3fc68789878a0282891f9a672e7c", "score": "0.777589", "text": "func (s *NormalizedValue) SetValue(v string) *NormalizedValue {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "059c48f3b0e9e4342135d642ab97ef6b", "score": "0.775284", "text": "func (instance *InstanceImpl) SetValue(value interface{}) {\n\tif reflect.ValueOf(value).Kind() != instance.instanceType.ValueType() {\n\t\tpanic(\"invalid type used when setting value\")\n\t}\n\tinstance.value = value\n}", "title": "" }, { "docid": "35162a13f450aed529faf1072ce368f2", "score": "0.76756376", "text": "func (s *UserDefined) SetValue(v float64) *UserDefined {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "b86408a322e5e36a8f12e84c8f557743", "score": "0.7649714", "text": "func (s *JsonFormatRef) SetValue(v string) *JsonFormatRef {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "70af4a023fefb5d24869b6905692e991", "score": "0.76429576", "text": "func (s *CacheNodeTypeSpecificValue) SetValue(v string) *CacheNodeTypeSpecificValue {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "384340c8d9e6a819b2051d4f8d0c21b3", "score": "0.76048446", "text": "func (s setterStruct) SetValue(v any) {\n\ts.Struct.Field(s.Field).Set(reflect.ValueOf(v))\n}", "title": "" }, { "docid": "1430798eaa1684051ef0464175f7746c", "score": "0.75934255", "text": "func (node *Node) SetValue(value Value) {\n\tnode.value = value\n}", "title": "" }, { "docid": "caff77e8667b188c1b733f2b91fe0bf1", "score": "0.7580267", "text": "func (o *Facts) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "3e400b6818eba2e43772733badfcc513", "score": "0.757243", "text": "func (s *AttributeKeyAndValue) SetValue(v *TypedAttributeValue) *AttributeKeyAndValue {\n\ts.Value = v\n\treturn s\n}", "title": "" }, { "docid": "d7b600d4ca07b0f3a6a7fd168eff35c3", "score": "0.7561407", "text": "func (s *AttributeNameAndValue) SetValue(v *TypedAttributeValue) *AttributeNameAndValue {\n\ts.Value = v\n\treturn s\n}", "title": "" }, { "docid": "16a65e713fbb6a6cdbbe44f6f099f790", "score": "0.75592893", "text": "func (s *Tag) SetValue(v string) *Tag {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "16a65e713fbb6a6cdbbe44f6f099f790", "score": "0.75592893", "text": "func (s *Tag) SetValue(v string) *Tag {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "16a65e713fbb6a6cdbbe44f6f099f790", "score": "0.75592893", "text": "func (s *Tag) SetValue(v string) *Tag {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "16a65e713fbb6a6cdbbe44f6f099f790", "score": "0.75592893", "text": "func (s *Tag) SetValue(v string) *Tag {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "16a65e713fbb6a6cdbbe44f6f099f790", "score": "0.75592893", "text": "func (s *Tag) SetValue(v string) *Tag {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "16a65e713fbb6a6cdbbe44f6f099f790", "score": "0.75592893", "text": "func (s *Tag) SetValue(v string) *Tag {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "16a65e713fbb6a6cdbbe44f6f099f790", "score": "0.75592893", "text": "func (s *Tag) SetValue(v string) *Tag {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "16a65e713fbb6a6cdbbe44f6f099f790", "score": "0.75592893", "text": "func (s *Tag) SetValue(v string) *Tag {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "16a65e713fbb6a6cdbbe44f6f099f790", "score": "0.7558539", "text": "func (s *Tag) SetValue(v string) *Tag {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "43ac5da3270f7e5b10850aaa58affe86", "score": "0.7551654", "text": "func (r *RegisterNode) SetValue(val interface{}) {\n\tr.value = val\n}", "title": "" }, { "docid": "19e9d6d2937fd72042ce22b7d812bf12", "score": "0.752606", "text": "func (n *node) SetValue(value uint32) {\n\tn.value = value\n}", "title": "" }, { "docid": "b940de258b8d68869c5f1f9f376559e0", "score": "0.7514723", "text": "func (s *Duration) SetValue(v int64) *Duration {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "b940de258b8d68869c5f1f9f376559e0", "score": "0.7514723", "text": "func (s *Duration) SetValue(v int64) *Duration {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "0d527ea7ee8271750250e0b900ecf14b", "score": "0.74977136", "text": "func (s *ServiceQuota) SetValue(v float64) *ServiceQuota {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "8f5250f18c1ef0b2dda89c4a1fc7a574", "score": "0.74663234", "text": "func (s *Setting) SetValue(v string) *Setting {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "9b138bcb5edbd3eccd38f1f83f393b36", "score": "0.7444304", "text": "func (s *StringValue) SetValue(val interface{}) {\n\t*s = StringValue(val.(string))\n}", "title": "" }, { "docid": "d104288280a72d2a9dcbf4e59c4ae573", "score": "0.7437131", "text": "func (node *node) SetValue(value proto.Message) {\n\tnode.value = value\n\tnode.dataUpdated = true\n}", "title": "" }, { "docid": "84d3a8fba35c4b44dbd1677771d8a685", "score": "0.7434216", "text": "func (s *GameProperty) SetValue(v string) *GameProperty {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "d4fe32384f53a510431d32f895f1338e", "score": "0.7420002", "text": "func (i *Integer) SetValue(value int64) {\n\ti.value = value\n}", "title": "" }, { "docid": "358509bf4ac6c2ac70ff7160a7d59b26", "score": "0.7419871", "text": "func (v *FunctionValidator) SetValue(value interface{}) {\n\tv.Value = value\n}", "title": "" }, { "docid": "bea7f194a87d4161f467c88d626882d2", "score": "0.74065226", "text": "func (s *PlatformInput_) SetValue(v string) *PlatformInput_ {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "bed90856b141cdf6ce452ee47265c723", "score": "0.7397016", "text": "func (t *TimeValue) SetValue(val interface{}) {\n\t*t = TimeValue(val.(time.Time))\n}", "title": "" }, { "docid": "debcb576218eae24f82ee35abec4f959", "score": "0.73638964", "text": "func (o *CounterDTO) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "84691c335ddfa092c8e986792357ea7b", "score": "0.7345225", "text": "func (p *Properties) SetValue(key string, value interface{}) error {\n\t_, _, err := p.Set(key, fmt.Sprintf(\"%v\", value))\n\treturn err\n}", "title": "" }, { "docid": "ae24c6fd49da36824b6c7aa700968973", "score": "0.7342981", "text": "func (s *Attribute) SetValue(v string) *Attribute {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "eca09d49551d8aeaf75a0ec571a99926", "score": "0.7331749", "text": "func (o *JsonMDNUserSettingAllOf) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "0f40556e3da718f077cef9d672637d7f", "score": "0.7331055", "text": "func (o *TenantToken) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "324b2d811dbdbdaff7d6ebb2ff7d3254", "score": "0.7327102", "text": "func (s *AwsCloudMapInstanceAttribute) SetValue(v string) *AwsCloudMapInstanceAttribute {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "7f4df4959d9bfb09d98ec6802481540f", "score": "0.7323425", "text": "func (s *SavingsPlanRateProperty) SetValue(v string) *SavingsPlanRateProperty {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "0b59a9b44d9f237d9d61b17ecabd9dc8", "score": "0.7314311", "text": "func (s *SecretOptions) SetValue(val string) *SecretOptions {\n\ts.Value = &val\n\treturn s\n}", "title": "" }, { "docid": "584d0fed0cef1e90141ea20f1d900739", "score": "0.73124653", "text": "func (tkn *ValueToken) SetValue(value string) {\n\ttkn.tokenValue = value\n}", "title": "" }, { "docid": "3ac4e067431e8a678bdbc4de01c5c92a", "score": "0.73054683", "text": "func (ms *MockSouthbound) SetValue(key string, value proto.Message, metadata Metadata, origin ValueOrigin, isDerived bool) {\n\tms.Lock()\n\tdefer ms.Unlock()\n\n\tms.setValueUnsafe(key, value, metadata, origin, isDerived)\n}", "title": "" }, { "docid": "1182594c928605020eebb8b8e16451a5", "score": "0.7304102", "text": "func (o *Literal) SetValue(v string) {\n\to.Value = v\n}", "title": "" }, { "docid": "5df1f8dd37452ed5d01ca5f599e630d4", "score": "0.7296759", "text": "func (s *Observation) SetValue(v float64) *Observation {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "d46df41c3a329ad128a4963ecfaac9e6", "score": "0.7294878", "text": "func (d *Device) SetValue(name string, value interface{}) error {\n\t_, err := d.client.Call(\n\t\t\"setValue\",\n\t\t[]interface{}{d.Address, name, value})\n\treturn err\n}", "title": "" }, { "docid": "78fb694809c1d9e934e37063543f06ac", "score": "0.729478", "text": "func (kvs *KeyValues) SetValue(obj, field ident.Id, value interface{}) (err error) {\n\tinst, ok := kvs.objects[obj]\n\tif !ok {\n\t\tinst, err = kvs.Cache(obj)\n\t}\n\tif err != nil {\n\t\tpanic(err)\n\t} else {\n\t\terr = inst.SetValue(field, value)\n\t}\n\treturn\n}", "title": "" }, { "docid": "97c25f4f411f15a0bbf271c668733175", "score": "0.72935957", "text": "func (o *ParameterDTO) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "08c953dcab73b1ef69740ffd707f8f8e", "score": "0.72921157", "text": "func (s *GetModelTemplateOutput) SetValue(v string) *GetModelTemplateOutput {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "10f4da46fc4011c2b807f3717132d72e", "score": "0.7289196", "text": "func (o *LoadBalancerTag) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "36e6f237e488b6e1a6fc795d3183bfc1", "score": "0.7286565", "text": "func (o *VariableDTO) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "b8c48519ca65481f811d72f7f434a4de", "score": "0.7272723", "text": "func (s *InstanceIdFilter) SetValue(v string) *InstanceIdFilter {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "95431b4e198f920f622bb6442967b872", "score": "0.72651327", "text": "func (s *Prediction) SetValue(v string) *Prediction {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "7014824626b9dc87d705ed64a3c26b54", "score": "0.72639626", "text": "func (u *PlayerIdentifierUpsert) SetValue(v string) *PlayerIdentifierUpsert {\n\tu.Set(playeridentifier.FieldValue, v)\n\treturn u\n}", "title": "" }, { "docid": "1c10cb96219c07a376a10f85eff609be", "score": "0.7256468", "text": "func (s *FakeSecret) SetValue(value []byte) error {\n\ts.rec.Rec(\"SetValue\", fmt.Sprintf(\"% x\", value))\n\treturn nil\n}", "title": "" }, { "docid": "990007a42c8d22cdec87ab848835a62a", "score": "0.7256084", "text": "func (o *ResourceTag) SetValue(v string) {\n\to.Value = v\n}", "title": "" }, { "docid": "8021e3dcc7c53660a80561bae0745b6e", "score": "0.7249728", "text": "func (m *Model) SetValue(s string) {\n\tm.Reset()\n\tm.InsertString(s)\n}", "title": "" }, { "docid": "1bdba4306656e4588553c0db0e9d4faf", "score": "0.72396636", "text": "func (s *TagListEntry) SetValue(v string) *TagListEntry {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "adabb54e29994c348e7b0a7bea8d1b53", "score": "0.7229847", "text": "func (d *DelegateData) SetValue(value *big.Int) *DelegateData {\n\td.Value = value\n\treturn d\n}", "title": "" }, { "docid": "5b4dd8247418959c0a668f0d30d718e7", "score": "0.72140896", "text": "func (o *PluginEnv) SetValue(v string) {\n\to.Value = v\n}", "title": "" }, { "docid": "241d2cf6abf053355765705149c5aaf2", "score": "0.72134495", "text": "func (s *SavingsPlanOfferingRateProperty) SetValue(v string) *SavingsPlanOfferingRateProperty {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "d4e712288969ddee3be022c7054d8345", "score": "0.7206983", "text": "func (a *attr) SetValue(value string) {\n\ta.value = value\n}", "title": "" }, { "docid": "a3436087e50cf4b4f4e298fcee752c69", "score": "0.7205231", "text": "func (s *TagForCreateTagsInput) SetValue(v string) *TagForCreateTagsInput {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "e268a17a3a6cddfd5c890593df0e67b9", "score": "0.7202813", "text": "func (u *PlayerIdentifierUpsertOne) SetValue(v string) *PlayerIdentifierUpsertOne {\n\treturn u.Update(func(s *PlayerIdentifierUpsert) {\n\t\ts.SetValue(v)\n\t})\n}", "title": "" }, { "docid": "7f84dc523e23d37fcafea373f55057fb", "score": "0.7188171", "text": "func (s *FilterRule) SetValue(v string) *FilterRule {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "9b15c4fc622c23b01507c558776f6bb4", "score": "0.7167441", "text": "func (o *UserActionPropertyFilter) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "c0569d6783000ed4548d4446122fc767", "score": "0.71655333", "text": "func (o *PortfolioPerformancePositions) SetValue(v float64) {\n\to.Value = v\n}", "title": "" }, { "docid": "eb8c78b3d072202215e2de07a8798f69", "score": "0.71621895", "text": "func (vuo *VocaUpdateOne) SetValue(s string) *VocaUpdateOne {\n\tvuo.mutation.SetValue(s)\n\treturn vuo\n}", "title": "" }, { "docid": "7221586d2da9e078a29615ff632102fc", "score": "0.7136093", "text": "func (o *ErrorParameter) SetValue(v string) {\n\to.Value = v\n}", "title": "" }, { "docid": "324955d91ea3e20afcfd3d4965de9353", "score": "0.7121422", "text": "func (ui *UserInput) SetValue(newValue string) {\n\tui.Value = newValue\n}", "title": "" }, { "docid": "922115e0385294145dd6bfc1bc5dc988", "score": "0.7112665", "text": "func (vu *VocaUpdate) SetValue(s string) *VocaUpdate {\n\tvu.mutation.SetValue(s)\n\treturn vu\n}", "title": "" }, { "docid": "b7ffec51c1124ef0df7b8fd582528c7b", "score": "0.70836955", "text": "func (o *AddOrUpdateConfigItemParams) SetValue(value *models.ConfigValue) {\n\to.Value = value\n}", "title": "" }, { "docid": "5a7c951d9c5fa63110b36aa61076d236", "score": "0.7080792", "text": "func (c *Context) SetValue(key string, value interface{}) {\n\tc.Parent.SetUserValue(key, value)\n}", "title": "" }, { "docid": "63973e39b463121a841120972ba5fff3", "score": "0.70618856", "text": "func (o *ProcessesRanOnParams) SetValue(value string) {\n\to.Value = value\n}", "title": "" }, { "docid": "1b16dcb1a8ab5c775d61995a8fa37eab", "score": "0.70539606", "text": "func (m *Option) SetValue(v string) *Option {\n\tm.Value = &v\n\treturn m\n}", "title": "" }, { "docid": "66e84e111da208a58486266e24d915a5", "score": "0.7045684", "text": "func (sv *SyncValue) Set(val interface{}) {\n\tsv.mutex.Lock()\n\tsv.value = val\n\tsv.mutex.Unlock()\n}", "title": "" }, { "docid": "b67aec7bd3a77223f617d74658c82476", "score": "0.703682", "text": "func (o *SetDiscountEffectProps) SetValue(v float32) {\n\to.Value = v\n}", "title": "" }, { "docid": "d09dd950cea35e398e5717486f245813", "score": "0.70335567", "text": "func (s *SavingsPlanOfferingProperty) SetValue(v string) *SavingsPlanOfferingProperty {\n\ts.Value = &v\n\treturn s\n}", "title": "" }, { "docid": "e3b6c0e3c53facc533b339c531e0ee1b", "score": "0.7021998", "text": "func (_this *SVGNumber) SetValue(value float32) {\n\tinput := value\n\t_this.Value_JS.Set(\"value\", input)\n}", "title": "" }, { "docid": "3f5995214d88e90f964416bba288ee46", "score": "0.7020727", "text": "func (m *GroupPolicyPresentationValueText) SetValue(value *string)() {\n err := m.GetBackingStore().Set(\"value\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "e8f29932afc047d96d6b1463535fe88f", "score": "0.7018464", "text": "func (opt *Uint32) SetValue(val uint32) {\n\topt.value = &val\n}", "title": "" }, { "docid": "21a2bdc53830b2735ff8b8083833be5a", "score": "0.70183516", "text": "func (f *StringFlag) SetValue(value string) {\n\tf.value = value\n\tf.updated = true\n}", "title": "" }, { "docid": "60879b324ca8946939257e5a4e33dd05", "score": "0.7017985", "text": "func (bc *BlobCreate) SetValue(b []byte) *BlobCreate {\n\tbc.value = &b\n\treturn bc\n}", "title": "" }, { "docid": "3bf8065071cf9c91f65d5d12a8f5f37c", "score": "0.70127696", "text": "func (neuron *Neuron) SetValue(x float64) {\n\tneuron.Value = &x\n}", "title": "" }, { "docid": "9dbcb5783d62c24d2598843187fc1e4d", "score": "0.69976246", "text": "func (cli *BusinessWrapper) SetValue(key string, val interface{}) error {\n\treturn cli.business.SetValue(key, val)\n}", "title": "" }, { "docid": "9d5fbe2c7e148772a3589dd795668982", "score": "0.6996021", "text": "func (f *Float64Value) SetValue(val interface{}) {\n\t*f = Float64Value(val.(float64))\n}", "title": "" }, { "docid": "883987a81e85646a0d713bf66b0989cf", "score": "0.69892466", "text": "func (o *EnvironmentVariableCreation) SetValue(v string) {\n\to.Value = v\n}", "title": "" }, { "docid": "4bb2c7d06f7de4514b82a3f389cd35ef", "score": "0.69822097", "text": "func (s *RedAgentService) SetValue(k, v string) error {\n\t//TODO implement SetValue, returning an error until implemented\n\tmkey := s.Confbase + k\n\tkey := strings.TrimPrefix(mkey, \"/\")\n\tkp := consul.KVPair{Key: key, Value: []byte(v)}\n\tlog.Printf(\"kp: %+v\", kp)\n\tkv := s.client.KV()\n\twm, err := kv.Put(&kp, nil)\n\tlog.Printf(\"Put got '%+v'\", wm)\n\treturn err\n}", "title": "" }, { "docid": "7bf68eb46d0bdb974430a349cb8e0e8c", "score": "0.6975901", "text": "func (o *AddOrUpdateNodePoolConfigItemParams) SetValue(value *models.ConfigValue) {\n\to.Value = value\n}", "title": "" }, { "docid": "c322d09e21c285d82d69f14d69fc45d2", "score": "0.69689494", "text": "func (e *EnvironmentVariable) SetValue(val string) *EnvironmentVariable {\n\te.Value = &val\n\treturn e\n}", "title": "" }, { "docid": "e52b6166061374fc867b74776155945e", "score": "0.6962961", "text": "func (o *HttpMethodComparisonInfoAllOf) SetValue(v string) {\n\to.Value = &v\n}", "title": "" }, { "docid": "85e288c6cc669f60c64d92fb2cf0de5f", "score": "0.69480276", "text": "func (s setterList) SetValue(v any) {\n\tel := s.List.Index(s.Index)\n\tel.Set(reflect.ValueOf(v))\n}", "title": "" }, { "docid": "6450ad3a4eee1f6f5ccb305e5492cb0e", "score": "0.69435054", "text": "func (keu *K8sEventUpdate) SetValue(f float64) *K8sEventUpdate {\n\tkeu.mutation.ResetValue()\n\tkeu.mutation.SetValue(f)\n\treturn keu\n}", "title": "" }, { "docid": "c19c17efb07531c5aad81f3a9edbb8ff", "score": "0.69406796", "text": "func (r *Room) SetValue(val int) {\n\tr.val = val\n}", "title": "" }, { "docid": "d0cc7c2f2346798ae5edf3cb3c3bfa64", "score": "0.6936773", "text": "func (prop *ModelProperty) SetValue(data map[string]interface{}, valuename string, entity reflect.Value) {\n\tvalue, ok := data[valuename]\n\tif !ok {\n\t\treturn\n\t}\n\n\tname := entity.Type().Name()\n\tif len(name) == 0 {\n\t\treturn\n\t}\n\n\tfield := entity.FieldByName(prop.StructField)\n\tif !field.IsValid() {\n\t\treturn\n\t}\n\n\tfield.Set(reflect.ValueOf(convert(value, field.Type())))\n}", "title": "" }, { "docid": "19de4e3ab07c572753ee7f4b80fed805", "score": "0.69360065", "text": "func (m *InsightValueDouble) SetValue(value *float64)() {\n err := m.GetBackingStore().Set(\"value\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "9d2c16176a02c7eae6322db4421e3b10", "score": "0.6911192", "text": "func SetValue(sel interface{}, value string, opts ...QueryOption) QueryAction {\n\treturn SetJavascriptAttribute(sel, \"value\", value, opts...)\n}", "title": "" }, { "docid": "5f7b02fe2d58b01b4e2d4372255d3ff7", "score": "0.69089127", "text": "func (u *PlayerIdentifierUpsertBulk) SetValue(v string) *PlayerIdentifierUpsertBulk {\n\treturn u.Update(func(s *PlayerIdentifierUpsert) {\n\t\ts.SetValue(v)\n\t})\n}", "title": "" }, { "docid": "71cac08b23dac835c6ec009c793c0b26", "score": "0.688921", "text": "func (p *parameter) SetValue(value interface{}) error {\n\tif toInternalType(value) != p.paramtype {\n\t\treturn fmt.Errorf(\"can't set %s to %v since type is %T\", p.name, value, value)\n\t}\n\tswitch p.paramtype {\n\tcase stringType:\n\t\tp.value = value.(string)\n\tcase uintType:\n\t\tp.value = value.(uint)\n\tcase intType:\n\t\tp.value = value.(int)\n\tcase floatType:\n\t\tp.value = value.(float64)\n\tcase boolType:\n\t\tp.value = value.(bool)\n\tcase durationType:\n\t\tv := value.(time.Duration)\n\t\tp.value = v\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown type: %v\", p.paramtype)\n\t}\n\tp.isSet = true\n\treturn nil\n}", "title": "" }, { "docid": "5f82b210a8c7ca355fe45ef80b57a7de", "score": "0.68804663", "text": "func (c *Cell) SetValue(value uint8) error {\n\tif value < 0 || value > 9 {\n\t\treturn fmt.Errorf(ErrInvalidValueMsg, value)\n\t}\n\tif c.value == nil {\n\t\tvar v uint8\n\t\tv = value\n\t\tc.value = &v\n\t} else {\n\t\t*c.value = value\n\t}\n\treturn nil\n}", "title": "" } ]
d87112df5b1fe714af82b8218960a3cf
forceRestore restores an instance from a backup. This method should be invoked only when the force flag in restore spec is set to true.
[ { "docid": "494f90777ee78639531ccc4aef89e4f1", "score": "0.792318", "text": "func (r *InstanceReconciler) forceRestore(ctx context.Context, req ctrl.Request, inst *v1alpha1.Instance, iReadyCond *v1.Condition, sts *appsv1.StatefulSet, sp controllers.StsParams, log logr.Logger) (ctrl.Result, error) {\n\tk8s.InstanceUpsertCondition(&inst.Status, k8s.Ready, v1.ConditionFalse, k8s.RestoreInProgress, fmt.Sprintf(\"Starting a restore on %s-%d from backup %s (type %s)\", time.Now().Format(dateFormat), time.Now().Nanosecond(), inst.Spec.Restore.BackupID, inst.Spec.Restore.BackupType))\n\tinst.Status.LastRestoreTime = inst.Spec.Restore.RequestTime.DeepCopy()\n\tinst.Status.BackupID = \"\"\n\n\tif err := r.Status().Update(ctx, inst); err != nil {\n\t\tlog.Error(err, \"failed to update an Instance status (starting a restore)\")\n\t\treturn ctrl.Result{}, err\n\t}\n\n\tbackup, err := r.findBackupForRestore(ctx, *inst, req.Namespace)\n\tif err != nil {\n\t\tlog.Error(err, \"could not find a matching backup\")\n\t\tr.Recorder.Eventf(inst, corev1.EventTypeWarning, \"RestoreFailed\", \"Could not find a matching backup for BackupID: %v, BackupType: %v\", inst.Spec.Restore.BackupID, inst.Spec.Restore.BackupType)\n\t\tk8s.InstanceUpsertCondition(&inst.Status, iReadyCond.Type, v1.ConditionFalse, k8s.RestoreFailed, err.Error())\n\t\treturn ctrl.Result{}, nil\n\t}\n\n\tswitch inst.Spec.Restore.BackupType {\n\tcase \"Snapshot\":\n\t\tif err := r.restoreSnapshot(ctx, *inst, sts, &sp); err != nil {\n\t\t\treturn ctrl.Result{}, err\n\t\t}\n\t\tlog.Info(\"restore from a storage snapshot: DONE\")\n\n\tcase \"Physical\":\n\t\toperation, err := r.restorePhysical(ctx, *inst, backup, req)\n\t\tif err != nil {\n\t\t\tif !controllers.IsAlreadyExistsError(err) {\n\t\t\t\tr.Log.Error(err, \"PhysicalRestore failed\")\n\t\t\t\treturn ctrl.Result{}, err\n\t\t\t}\n\t\t} else {\n\t\t\tif operation.Done {\n\t\t\t\t// we're dealing with non LRO version of restore\n\t\t\t\tlog.V(6).Info(\"encountered synchronous version of PhysicalRestore\")\n\t\t\t\tlog.Info(\"PhysicalRestore DONE\")\n\n\t\t\t\tmessage := fmt.Sprintf(\"Physical restore done. Elapsed Time: %v\", k8s.ElapsedTimeFromLastTransitionTime(k8s.FindCondition(inst.Status.Conditions, k8s.Ready), time.Second))\n\t\t\t\tr.Recorder.Eventf(inst, corev1.EventTypeNormal, \"RestoreComplete\", message)\n\t\t\t\t// non-LRO version sets condition to false, so that it will be set to true and cleaned up in the next reconcile loop\n\t\t\t\tk8s.InstanceUpsertCondition(&inst.Status, k8s.Ready, v1.ConditionFalse, k8s.RestoreComplete, message)\n\t\t\t} else {\n\t\t\t\tr.Log.Info(\"PhysicalRestore started\")\n\t\t\t}\n\t\t}\n\n\tdefault:\n\t\t// Not playing games here. A restore (especially the in-place restore)\n\t\t// is destructive. It's not about being user-friendly. A user is to\n\t\t// be specific as to what kind of backup they want to restore from.\n\t\treturn ctrl.Result{}, fmt.Errorf(\"a BackupType is a mandatory parameter for a restore\")\n\t}\n\n\treturn ctrl.Result{}, nil\n}", "title": "" } ]
[ { "docid": "9105f4f92549f8c74f3c5cc3bd899163", "score": "0.62966704", "text": "func (runner *runner) Restore(args []string) error {\n\treturn nil\n}", "title": "" }, { "docid": "85ef5d430d697619eb4d9ecbe186271c", "score": "0.62835455", "text": "func (a *actuator) Restore(ctx context.Context, be *extensionsv1alpha1.BackupEntry) error {\n\treturn a.Reconcile(ctx, be)\n}", "title": "" }, { "docid": "68ac575a7c21bfd2fc65ae83958975e2", "score": "0.61369914", "text": "func Restore(withLock bool) {\n\tlog.Println(\"start restore from database\")\n\tdefer log.Println(\"end restore from database\")\n\tstart := time.Now()\n\tif withLock {\n\t\tMuModel.Lock()\n\t\tdefer MuModel.Unlock()\n\t}\n\tlock := time.Now()\n\tdefer WarnLongExec(start, lock, conf.Game.Service.Perf.Restore.D, \"restore\", true)\n\n\tsetNextID()\n\tfetchStatic()\n\tresolveStatic()\n\tfor _, l := range Model.RailLines {\n\t\tlineValidation(l) // [DEBUG]\n\t}\n\tgenDynamics()\n}", "title": "" }, { "docid": "8c15bae3fbbbe3719b5cd835a84e2946", "score": "0.6011436", "text": "func (b *backupEntry) Restore(ctx context.Context, _ *gardencorev1alpha1.ShootState) error {\n\treturn b.Deploy(ctx)\n}", "title": "" }, { "docid": "cd519d7bfc2bccfdf721a110dcbe6b7b", "score": "0.6001803", "text": "func (r *InstanceReconciler) restorePhysical(ctx context.Context, inst v1alpha1.Instance, backup *v1alpha1.Backup, req ctrl.Request) (*lropb.Operation, error) {\n\t// Confirm that an external LB is ready.\n\tif err := restorePhysicalPreflightCheck(ctx, r, req.Namespace, inst.Name); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !*backup.Spec.Backupset {\n\t\treturn nil, fmt.Errorf(\"preflight check: located a physical backup, but in this release the auto-restore is only supported from a Backupset backup: %v\", backup.Spec.Backupset)\n\t}\n\n\tif backup.Spec.Subtype != \"Instance\" {\n\t\treturn nil, fmt.Errorf(\"preflight check: located a physical backup, but in this release the auto-restore is only supported from a Backupset taken at the Instance level: %q\", backup.Spec.Subtype)\n\t}\n\n\tbackupReadyCond := k8s.FindCondition(backup.Status.Conditions, k8s.Ready)\n\tif !k8s.ConditionStatusEquals(backupReadyCond, v1.ConditionTrue) {\n\t\treturn nil, fmt.Errorf(\"preflight check: located a physical backup, but it's not in the ready state: %q\", backup.Status)\n\t}\n\tr.Log.Info(\"preflight check for a restore from a physical backup - all DONE\", \"backup\", backup)\n\n\tdop := restoreDOP(inst.Spec.Restore.Dop, backup.Spec.Dop)\n\n\tcaClient, closeConn, err := r.ClientFactory.New(ctx, r, req.Namespace, backup.Spec.Instance)\n\tif err != nil {\n\t\tr.Log.Error(err, \"failed to create config agent client\")\n\t\treturn nil, err\n\t}\n\tdefer closeConn()\n\n\ttimeLimitMinutes := controllers.PhysBackupTimeLimitDefault * 3\n\tif inst.Spec.Restore.TimeLimitMinutes != 0 {\n\t\ttimeLimitMinutes = time.Duration(inst.Spec.Restore.TimeLimitMinutes) * time.Minute\n\t}\n\n\tctxRestore, cancel := context.WithTimeout(context.Background(), timeLimitMinutes)\n\tdefer cancel()\n\n\tresp, err := caClient.PhysicalRestore(ctxRestore, &capb.PhysicalRestoreRequest{\n\t\tInstanceName: inst.Name,\n\t\tCdbName: inst.Spec.CDBName,\n\t\tDop: dop,\n\t\tLocalPath: backup.Spec.LocalPath,\n\t\tGcsPath: backup.Spec.GcsPath,\n\t\tLroInput: &capb.LROInput{OperationId: lroOperationID(physicalRestore, &inst)},\n\t})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed on PhysicalRestore gRPC call: %v\", err)\n\t}\n\n\tr.Log.Info(\"caClient.PhysicalRestore\", \"response\", resp)\n\treturn resp, nil\n}", "title": "" }, { "docid": "57e6128dba09efd711587d975e65c4f8", "score": "0.5915721", "text": "func (m *Manager) Restore(content []byte) error {\n\n\tfmt.Println(\"Restoring agent from backup...\")\n\trs, err := m.ac.RestoreAgent(context.Background(), &dfproto.RestoreAgentRequest{\n\t\tParent: \"projects/\" + m.prj,\n\t\tAgent: &dfproto.RestoreAgentRequest_AgentContent{\n\t\t\tAgentContent: content,\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := rs.Wait(context.Background()); err != nil {\n\t\treturn err\n\t}\n\n\tfmt.Println(\"Restore completed successfully\")\n\treturn nil\n\n}", "title": "" }, { "docid": "233f9dc242cbbd911c33e8809a768689", "score": "0.58512104", "text": "func (a *Agent) Restore(r pbm.RestoreCmd, opid pbm.OPID, ep pbm.Epoch) {\n\tl := a.log.NewEvent(string(pbm.CmdRestore), r.BackupName, opid.String(), ep.TS())\n\n\tnodeInfo, err := a.node.GetInfo()\n\tif err != nil {\n\t\tl.Error(\"get node info: %v\", err)\n\t\treturn\n\t}\n\tif !nodeInfo.IsPrimary {\n\t\tl.Info(\"node is not primary so it unsuitable to do restore\")\n\t\treturn\n\t}\n\n\tepts := ep.TS()\n\tlock := a.pbm.NewLock(pbm.LockHeader{\n\t\tType: pbm.CmdRestore,\n\t\tReplset: nodeInfo.SetName,\n\t\tNode: nodeInfo.Me,\n\t\tOPID: opid.String(),\n\t\tEpoch: &epts,\n\t})\n\n\tgot, err := a.aquireLock(lock, l, nil)\n\tif err != nil {\n\t\tl.Error(\"acquiring lock: %v\", err)\n\t\treturn\n\t}\n\tif !got {\n\t\tl.Debug(\"skip: lock not acquired\")\n\t\tl.Error(\"unbale to run the restore while another operation running\")\n\t\treturn\n\t}\n\n\tdefer func() {\n\t\tl.Debug(\"releasing lock\")\n\t\terr := lock.Release()\n\t\tif err != nil {\n\t\t\tl.Error(\"release lock: %v\", err)\n\t\t}\n\t}()\n\n\tl.Info(\"restore started\")\n\terr = restore.New(a.pbm, a.node).Snapshot(r, opid, l)\n\tif err != nil {\n\t\tif errors.Is(err, restore.ErrNoDatForShard) {\n\t\t\tl.Info(\"no data for the shard in backup, skipping\")\n\t\t} else {\n\t\t\tl.Error(\"restore: %v\", err)\n\t\t}\n\t\treturn\n\t}\n\tl.Info(\"restore finished successfully\")\n\n\tif nodeInfo.IsLeader() {\n\t\tepch, err := a.pbm.ResetEpoch()\n\t\tif err != nil {\n\t\t\tl.Error(\"reset epoch\")\n\t\t\treturn\n\t\t}\n\n\t\tl.Debug(\"epoch set to %v\", epch)\n\t}\n}", "title": "" }, { "docid": "27d081b6c19e82e7693acf5e6514530e", "score": "0.58294356", "text": "func (t *testOperation) Restore(backupCtx Context, serviceName string, verifier ObjectVerifier, progChan chan OperationProgress) error {\n\treturn nil\n}", "title": "" }, { "docid": "2cd6ab4b54dbad1811f2c9e0a14360bc", "score": "0.5809692", "text": "func (w *worker) Restore(ctx context.Context, shootState *gardencorev1alpha1.ShootState) error {\n\treturn common.RestoreExtensionWithDeployFunction(\n\t\tctx,\n\t\tw.client,\n\t\tshootState,\n\t\textensionsv1alpha1.WorkerResource,\n\t\tw.values.Namespace,\n\t\tw.deploy,\n\t)\n}", "title": "" }, { "docid": "189927a229dcc8e6ae479cb35e9e84f5", "score": "0.57929313", "text": "func (cc *Cluster) Restore(args ...interface{}) *redis.Reply {\n\treturn cc.Call(cmdRestore, args...)\n}", "title": "" }, { "docid": "a23087491a6737efda4e27fc8dad8f1a", "score": "0.5620577", "text": "func (z *Input) Restore() {\n\tif z.restore != nil {\n\t\tz.restore()\n\t\tz.restore = nil\n\t}\n}", "title": "" }, { "docid": "77142fc847747f5830457ed1f9221c09", "score": "0.56089175", "text": "func (o TairInstanceOutput) ForceUpgrade() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *TairInstance) pulumi.BoolPtrOutput { return v.ForceUpgrade }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "bdc1cdbcdf237e1f05c1874e27bd4230", "score": "0.55989796", "text": "func (x *Database) Restore(ctx context.Context, src DatabaseBackup) error {\n\t// truncate existing dbs\n\tif err := x.Parts.DeleteAll(ctx); err != nil {\n\t\treturn fmt.Errorf(\"parts.DeleteAll() failed: %w\", err)\n\t}\n\t// save the new parts\n\tif err := x.Parts.Save(ctx, src.Parts); err != nil {\n\t\treturn fmt.Errorf(\"parts.Save() failed: %w\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "29d6d714a95e506ad8dbc6f4af02f463", "score": "0.5576777", "text": "func (m *MetadataWriterOperation) Restore(backupCtx Context, serviceName string, verifier ObjectVerifier, progChan chan OperationProgress) error {\n\treturn nil\n}", "title": "" }, { "docid": "386a0d3f4bffbaf3b0823ce3af895aa4", "score": "0.5562437", "text": "func (store *Store) Restore(from string, to string) error {\n\tstore.Count++\n\tlog.Debug(\"restore \", from, \" to \", to)\n\n\tif !store.Dry {\n\t\terr := os.Rename(from, to)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "61cff33186edf401fa0df86d2e0a5215", "score": "0.55565065", "text": "func Restore() {\n\tSetEnv(New(OptFromEnv()))\n}", "title": "" }, { "docid": "b4cf3db96c2f3b637d3ec0430f18c14e", "score": "0.55250984", "text": "func TestRestoreFromBackup(t *testing.T) {\n\tt.Run(\"Restore from PV backup of old cluster\", func(t *testing.T) {\n\t\ttestRestoreWithBackupPolicy(t, e2eutil.NewPVBackupPolicy(false, \"\"))\n\t})\n\tt.Run(\"Restore from S3 backup of old cluster\", func(t *testing.T) {\n\t\tt.Run(\"per cluster s3 policy\", func(t *testing.T) {\n\t\t\ttestRestoreWithBackupPolicy(t, e2eutil.NewS3BackupPolicy(false))\n\t\t})\n\t})\n}", "title": "" }, { "docid": "bfce2e5c61e9153ac0a768f0d7104d3b", "score": "0.5509745", "text": "func (f *fsm) Restore(rc io.ReadCloser) error {\n\tvar fs fsmSnapshot\n\tif err := json.NewDecoder(rc).Decode(&fs); err != nil {\n\t\treturn err\n\t}\n\n\t// Set the groups state from the snapshot,\n\t// no lock required according to the hashicorp/raft docs.\n\tgroups := make(map[int]Group, len(fs.Groups))\n\tfor i, s := range fs.Groups {\n\t\tgroups[i] = f.newGroup(i, s.Servers)\n\t}\n\tf.groups = groups\n\n\t// Set the slots state from the snapshot,\n\t// no lock required according to the hashicorp/raft docs.\n\tslots := make(map[int]*Slot, len(fs.Slots))\n\tfor i, s := range fs.Slots {\n\t\tslots[i] = NewSlot(i, s.State, groups[s.GroupID], groups[s.FromGroupID])\n\t}\n\tf.slots = slots\n\n\treturn nil\n}", "title": "" }, { "docid": "757037fa46f6ed8fb6215643f7930bb5", "score": "0.5491573", "text": "func (s *Server) Restore(snapshot io.ReadCloser) error {\n\ts.logger.Debug(\"fsm: Restoring Raft state from snapshot...\")\n\tdefer snapshot.Close()\n\n\t// Read snapshot size.\n\tsizeBuf := make([]byte, 4)\n\tif _, err := io.ReadFull(snapshot, sizeBuf); err != nil {\n\t\treturn err\n\t}\n\t// Read snapshot.\n\tsize := binary.BigEndian.Uint32(sizeBuf)\n\tbuf := make([]byte, size)\n\tif _, err := io.ReadFull(snapshot, buf); err != nil {\n\t\treturn err\n\t}\n\tsnap := &proto.MetadataSnapshot{}\n\tif err := snap.Unmarshal(buf); err != nil {\n\t\treturn err\n\t}\n\n\t// Drop state and restore.\n\tif err := s.metadata.Reset(); err != nil {\n\t\treturn err\n\t}\n\tfor _, stream := range snap.Streams {\n\t\tif err := s.applyCreateStream(stream, false, 0); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tfor _, group := range snap.Groups {\n\t\tif err := s.applyCreateConsumerGroup(group, false); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\ts.logger.Debugf(\"fsm: Finished restoring Raft state from snapshot, recovered %s\",\n\t\tenglish.Plural(len(snap.Streams), \"stream\", \"\"))\n\treturn nil\n}", "title": "" }, { "docid": "f2e7be7b11fd541fa333611be9aa3e9c", "score": "0.5465029", "text": "func (c *RstrController) syncRestore(rstr *apis.ZFSRestore) error {\n\tvar err error = nil\n\t// ZFSRestore should not be deleted. Check if deletion timestamp is set\n\tif !c.isDeletionCandidate(rstr) {\n\t\t// if status is Init, then only do the restore\n\t\tif rstr.Status == apis.RSTZFSStatusInit {\n\t\t\terr = zfs.CreateRestore(rstr)\n\t\t\tif err == nil {\n\t\t\t\tklog.Infof(\"restore %s done %s\", rstr.Name, rstr.Spec.VolumeName)\n\t\t\t\terr = zfs.UpdateRestoreInfo(rstr, apis.RSTZFSStatusDone)\n\t\t\t} else {\n\t\t\t\tklog.Errorf(\"restore %s failed %s err %v\", rstr.Name, rstr.Spec.VolumeName, err)\n\t\t\t\terr = zfs.UpdateRestoreInfo(rstr, apis.RSTZFSStatusFailed)\n\t\t\t}\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "b2299a20e77d42f960a25290b2972aa8", "score": "0.5444818", "text": "func (s *Spec) RestoreDB() func() {\n\treturn func() {\n\n\t\terr := s.DBManager.DropSchema()\n\t\tgomega.Expect(err).To(gomega.BeNil(), \"dropping database tables\")\n\n\t\terr = s.DBManager.CreateSchema()\n\t\tgomega.Expect(err).To(gomega.BeNil(), \"creating database tables\")\n\n\t\terr = s.DBManager.InsertSchema()\n\t\tgomega.Expect(err).To(gomega.BeNil(), \"migrating data\")\n\t}\n}", "title": "" }, { "docid": "0aac156ddc4f1bf334657335fe252a91", "score": "0.54409343", "text": "func (t *Test) Restore(path string) {\n\tt.AssertNoError(os.Rename(path+\".backup\", path))\n}", "title": "" }, { "docid": "d95956064019fa2c6402c9e9ecc009ab", "score": "0.54404527", "text": "func Restore(appName string) error {\n\tscheduler := common.GetAppScheduler(appName)\n\tif err := common.PlugnTrigger(\"scheduler-pre-restore\", []string{scheduler, appName}...); err != nil {\n\t\treturn fmt.Errorf(\"Error running scheduler-pre-restore: %s\", err)\n\t}\n\n\tcommon.LogInfo1(\"Clearing potentially invalid proxy configuration\")\n\tif err := common.PlugnTrigger(\"proxy-clear-config\", []string{appName}...); err != nil {\n\t\tcommon.LogWarn(fmt.Sprintf(\"Error clearing proxy config: %s\", err))\n\t}\n\n\tif !common.IsDeployed(appName) {\n\t\tcommon.LogWarn(fmt.Sprintf(\"App %s has not been deployed\", appName))\n\t\treturn nil\n\t}\n\n\tb, _ := common.PlugnTriggerOutput(\"config-get\", []string{appName, \"DOKKU_APP_RESTORE\"}...)\n\trestore := strings.TrimSpace(string(b[:]))\n\tif restore == \"0\" {\n\t\tcommon.LogWarn(fmt.Sprintf(\"Skipping ps:restore for %s as DOKKU_APP_RESTORE=%s\", appName, restore))\n\t\treturn nil\n\t}\n\n\tcommon.LogInfo1(\"Starting app\")\n\treturn Start(appName)\n}", "title": "" }, { "docid": "bbb62c0b14fe19b7ad9a059e1927ec08", "score": "0.5439141", "text": "func (r *Raft) restoreSnapshot() error {\n\tsnapshots, err := r.snapshotStore.List()\n\tif err != nil {\n\t\tklog.Errorf(fmt.Sprintf(\"failed to list snapshotStore err:%v\", err))\n\t\treturn err\n\t}\n\n\t// Try to load in order of newest to oldest\n\tfor _, snapshot := range snapshots {\n\t\tif !r.config().NoSnapshotRestoreOnStart {\n\t\t\t_, source, err := r.snapshotStore.Open(snapshot.ID)\n\t\t\tif err != nil {\n\t\t\t\tklog.Errorf(fmt.Sprintf(\"failed to open snapshot id:%s err:%v\", snapshot.ID, err))\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif err := r.fsm.Restore(source); err != nil {\n\t\t\t\tsource.Close()\n\t\t\t\tklog.Errorf(fmt.Sprintf(\"failed to restore snapshot id:%s err:%v\", snapshot.ID, err))\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tsource.Close()\n\t\t\tklog.Infof(fmt.Sprintf(\"restored from snapshot id:%s\", snapshot.ID))\n\t\t}\n\n\t\t// Update the lastApplied so we don't replay old logs\n\t\tr.setLastApplied(snapshot.Index)\n\n\t\t// Update the last stable snapshot info\n\t\tr.setLastSnapshot(snapshot.Index, snapshot.Term)\n\n\t\t// Update the configuration\n\t\tr.setCommittedConfiguration(snapshot.Configuration, snapshot.ConfigurationIndex)\n\t\tr.setLatestConfiguration(snapshot.Configuration, snapshot.ConfigurationIndex)\n\n\t\t// Success!\n\t\treturn nil\n\t}\n\n\t// If we had snapshotStore and failed to load them, its an error\n\tif len(snapshots) > 0 {\n\t\treturn fmt.Errorf(\"failed to load any existing snapshotStore\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ee3d963efdc6b87a99be808ca9328489", "score": "0.54316515", "text": "func (m *Market) Restore(ownerId int, itemId int) (resp responses.Ok, err error) {\n\tparams := map[string]interface{}{}\n\n\tparams[\"owner_id\"] = ownerId\n\n\tparams[\"item_id\"] = itemId\n\n\terr = m.SendObjRequest(\"market.restore\", params, &resp)\n\n\treturn\n}", "title": "" }, { "docid": "550defbdb376510fc17e95763ab8deb8", "score": "0.5426067", "text": "func Restore(s string) error { return hometrash.Restore(s) }", "title": "" }, { "docid": "35b5c7d371554ea2ddc5b110da0a450b", "score": "0.5419181", "text": "func (f *fsm) Restore(rc io.ReadCloser) error {\n\to := make(map[string][]byte)\n\tif err := json.NewDecoder(rc).Decode(&o); err != nil {\n\t\treturn err\n\t}\n\n\t// Set the state from the snapshot, no lock required according to\n\t// Hashicorp docs.\n\tf.m = o\n\treturn nil\n}", "title": "" }, { "docid": "74fa894e19af8f37d0222e5513d3028f", "score": "0.53903574", "text": "func (c *Container) Restore(conf *config.Config, restoreFile string) error {\n\tlog.Debugf(\"Restore container, cid: %s\", c.ID)\n\tif err := c.Saver.lock(BlockAcquire); err != nil {\n\t\treturn err\n\t}\n\tdefer c.Saver.UnlockOrDie()\n\n\tif err := c.requireStatus(\"restore\", Created); err != nil {\n\t\treturn err\n\t}\n\n\t// \"If any prestart hook fails, the runtime MUST generate an error,\n\t// stop and destroy the container\" -OCI spec.\n\tif c.Spec.Hooks != nil && len(c.Spec.Hooks.StartContainer) > 0 {\n\t\tlog.Warningf(\"StartContainer hook skipped because running inside container namespace is not supported\")\n\t}\n\n\tif err := c.Sandbox.Restore(conf, c.ID, restoreFile); err != nil {\n\t\treturn err\n\t}\n\tc.changeStatus(Running)\n\treturn c.saveLocked()\n}", "title": "" }, { "docid": "3d20e173b057a296e3cc002664b4508a", "score": "0.5387088", "text": "func (esop *ElasticsearchOperation) Restore(backupCtx Context, serviceName string, verifier ObjectVerifier, progChan chan OperationProgress) error {\n\tbackupID := backupCtx.restoreTask.Backup.TaskID()\n\n\tbackupCtxDeadline, _ := backupCtx.ctx.Deadline()\n\tlog := logrus.WithFields(logrus.Fields{\n\t\t\"backup_id\": backupID,\n\t\t\"restore_id\": backupCtx.restoreTask.TaskID(),\n\t\t\"service_name\": esop.ServiceName,\n\t\t\"operation\": \"elasticsearch_snapshot\",\n\t\t\"action\": \"restore\",\n\t\t\"deadline\": backupCtxDeadline.Format(time.RFC3339),\n\t})\n\tlog.Info(\"Running backup operation\")\n\n\tconn, err := backupCtx.connFactory.DialContext(backupCtx.ctx, \"es-sidecar-service\", backupCtx.esSidecarInfo.Address())\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Could not connect to es-sidecar-service for restore operation\")\n\t}\n\tdefer conn.Close()\n\n\tclient := es_sidecar.NewEsSidecarServiceClient(conn)\n\n\t_, err = client.RestoreSnapshot(backupCtx.ctx, &es_sidecar.RestoreSnapshotRequest{\n\t\tServiceName: esop.ServiceName,\n\t\tBackupId: backupID,\n\t})\n\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"es-sidecar-service failed to restore snapshot\")\n\t}\n\n\treturn monitorEsProgress(backupCtx.ctx, esop.String(), log, progChan, func() (esProgress, error) {\n\t\treturn client.RestoreSnapshotStatus(backupCtx.ctx, &es_sidecar.RestoreSnapshotStatusRequest{\n\t\t\tServiceName: esop.ServiceName,\n\t\t\tBackupId: backupID,\n\t\t})\n\t})\n}", "title": "" }, { "docid": "9de30810edfdfe18153826ba51a38ab2", "score": "0.5377704", "text": "func (f *fsm) Restore(rc io.ReadCloser) error {\n\to := make(map[string]string)\n\tif err := json.NewDecoder(rc).Decode(&o); err != nil {\n\t\treturn err\n\t}\n\n\t// Set the state from the snapshot, no lock required according to\n\t// Hashicorp docs.\n\tf.m = o\n\treturn nil\n}", "title": "" }, { "docid": "e2b46a5c5c814684e54f18c09e489734", "score": "0.5365295", "text": "func (d *DatabaseDumpOperationV2) Restore(backupCtx Context, serviceName string, verifier ObjectVerifier, progChan chan OperationProgress) error {\n\t// Make sure the context isn't dead before we start the operation\n\tselect {\n\tcase <-backupCtx.ctx.Done():\n\t\treturn backupCtx.ctx.Err()\n\tdefault:\n\t}\n\n\tprogChan <- OperationProgress{\n\t\tName: d.String(),\n\t\tProgress: float64(0),\n\t}\n\n\tobjectName := path.Join(path.Join(d.ObjectName...), fmt.Sprintf(\"%s.fc\", d.Name))\n\n\tbackupCtxDeadline, _ := backupCtx.ctx.Deadline()\n\tlogrus.WithFields(logrus.Fields{\n\t\t\"name\": d.Name,\n\t\t\"backup_id\": backupCtx.backupTask.TaskID(),\n\t\t\"restore_id\": backupCtx.restoreTask.TaskID(),\n\t\t\"object_name\": objectName,\n\t\t\"operation\": \"database_dump_v2\",\n\t\t\"action\": \"restore\",\n\t\t\"deadline\": backupCtxDeadline.Format(time.RFC3339),\n\t}).Info(\"Running backup operation\")\n\n\tif err := verifier.ObjectValid(objectName); err != nil {\n\t\treturn err\n\t}\n\n\treader, err := backupCtx.bucket.NewReader(backupCtx.ctx, objectName, verifier)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"could not open object with name %s\", objectName)\n\t}\n\tdefer reader.Close()\n\n\tp := &pg.DatabaseExporter{\n\t\tName: d.Name,\n\t\tDisableRoleCreate: true,\n\t\tCmdExecutor: d.cmdExecutor,\n\t\tConnInfo: backupCtx.pgConnInfo,\n\t\tStdin: reader,\n\t\tUseCustomFormat: true,\n\t}\n\n\tif err := p.Import(false); err != nil {\n\t\treturn errors.Wrapf(err, \"failed to import database dump from %s\", objectName)\n\t}\n\n\tprogChan <- OperationProgress{\n\t\tName: d.String(),\n\t\tProgress: float64(100),\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "013835512cba2a5aeac436efba8c3645", "score": "0.53311557", "text": "func (o DdrInstanceOutput) ForceRestart() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v *DdrInstance) pulumi.BoolOutput { return v.ForceRestart }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "4966d847fbe206631ff62b3923eb5516", "score": "0.53212583", "text": "func Restore(encoded []byte) (snapshots Snapshots, err error) {\n\tvar decoded []byte\n\tif decoded, err = snappy.Decode(decoded, encoded); err == nil {\n\t\terr = binary.Unmarshal(decoded, &snapshots)\n\t}\n\treturn\n}", "title": "" }, { "docid": "917c92e8322eae3bb65a9009582ac054", "score": "0.531485", "text": "func (mr *MockDropletActionsServiceMockRecorder) Restore(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Restore\", reflect.TypeOf((*MockDropletActionsService)(nil).Restore), arg0, arg1)\n}", "title": "" }, { "docid": "0ba0d01944181fd32f713624db3a4b99", "score": "0.530335", "text": "func Restore(o Operator) error {\n\tif !IsInTrash(o) {\n\t\treturn nil\n\t}\n\treturn os.Rename(o.Path(), OriginalPath(o))\n}", "title": "" }, { "docid": "4f5415bb01c0fc2ca94ac6d20c5c37e5", "score": "0.52965707", "text": "func (f *fsm) Restore(rc io.ReadCloser) error {\n\n\to := make(map[string]interface{})\n\tif err := json.NewDecoder(rc).Decode(&o); err != nil {\n\t\treturn err\n\t}\n\tostore, _ := o[\"store\"].(map[string]string)\n\tometa, _ := o[\"meta\"].(map[string]interface{})\n\n\t// Set the state from the snapshot, no lock required according to\n\t// Hashicorp docs.\n\tm := &f.m\n\tmeta := &f.meta\n\tm.Range(func(key, value interface{}) bool {\n\t\tm.Delete(key)\n\t\treturn true\n\t})\n\tmeta.Range(func(key, value interface{}) bool {\n\t\tm.Delete(key)\n\t\treturn true\n\t})\n\tfor k, v := range ostore {\n\t\tm.Store(k, v)\n\t}\n\n\tfor k, v := range ometa {\n\t\tmeta.Store(k, v)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a5a46512c2b60d006c9479ccc0e8d6e6", "score": "0.5289419", "text": "func (kv *RaftKV) restore() {\n\tclientID, ok := kv.persister.LoadInt64(clientIDKey)\n\tif ok {\n\t\tkv.clientID = clientID\n\t}\n}", "title": "" }, { "docid": "393219fc646eaeb09f1095ebbc126c27", "score": "0.5289122", "text": "func (tfsm *fsm) Restore(serialized io.ReadCloser) error {\n\tvar snapshot fsmSnapshot\n\tif err := json.NewDecoder(serialized).Decode(&snapshot); err != nil {\n\t\treturn err\n\t}\n\tmapshot := fsm{}\n\tfor _,i := range snapshot.KV{\n\t\tmapshot.KV[i.Key] = i.Value\n\t}\n\ttfsm.KV = mapshot.KV\n\treturn nil\n}", "title": "" }, { "docid": "2740f4f025f0d00e8f2108b3f9b04ace", "score": "0.5285488", "text": "func (w *Worker) Restore(id string) error {\n\tif status := ValidateHexString(id); !status {\n\t\treturn fmt.Errorf(\"invalid format id = %s on worker restore\", id)\n\t}\n\n\tworker, err := workers.Get(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif worker == nil {\n\t\treturn nil\n\t}\n\n\tw.mutex.Lock()\n\tworker.mutex.Lock()\n\n\ttemp := worker.Addr\n\tworker.Addr = w.Addr\n\tw.Addr = temp\n\tw.User = worker.User\n\tw.Hash = worker.Hash\n\tw.Pool.Addr = worker.Pool.Addr\n\tworker.client = w.client\n\tw.client = nil\n\tworker.client.State.Set(\"worker\", worker)\n\n\twAddr := worker.Addr\n\twUser := worker.User\n\twDifficulty := worker.difficulty\n\twHash := worker.Hash\n\tpAddr := worker.Pool.Addr\n\n\tworker.mutex.Unlock()\n\tw.mutex.Unlock()\n\n\t// Activating of metrics.\n\tmWorkerUp.WithLabelValues(tag, wAddr, wUser).Set(1)\n\tmDifficulty.WithLabelValues(tag, wAddr, wUser, wHash, pAddr).Set(wDifficulty)\n\n\tgo w.Death()\n\n\treturn nil\n}", "title": "" }, { "docid": "420cb97897d90f1f7ad94f850caf32d3", "score": "0.5278361", "text": "func (cl *Client) ForceRebalance() {\n\tg, ok := cl.consumer.loadGroup()\n\tif ok {\n\t\tg.rejoin()\n\t}\n}", "title": "" }, { "docid": "610961e1a59ea95f904c45ffb05a227f", "score": "0.5278317", "text": "func (s *Service) RestoreBackup(r *request.RestoreBackupRequest) error {\n\t_, err := s.client.PerformJSONPostRequest(s.client.CreateRequestURL(r.RequestURL()), nil)\n\n\tif err != nil {\n\t\treturn parseJSONServiceError(err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a1c90ed03a00e384bb773ae9b25fc24c", "score": "0.52645695", "text": "func (o *Operator) Restore(cluster, name string) error {\n\tif _, err := os.Stat(path.Join(cluster, \"postmaster.pid\")); err == nil {\n\t\treturn errors.New(\"attempt to overwrite a live data directory\")\n\t}\n\trs, err := o.s.Restore(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err = os.MkdirAll(path.Dir(cluster), 0700); err != nil {\n\t\treturn err\n\t}\n\tfor _, r := range rs {\n\t\tpipe, err := pipeline.PipeRead(r, lzoReadPipeline)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err = Unite(cluster, pipe); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err = pipe.Close(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "60473add7f1716811e0b39ae47d8061c", "score": "0.52580667", "text": "func (c *CommandExecuteOperation) Restore(backupCtx Context, serviceName string, verifier ObjectVerifier, progChan chan OperationProgress) error {\n\t// Make sure the context isn't dead before we start the operation\n\tselect {\n\tcase <-backupCtx.ctx.Done():\n\t\treturn backupCtx.ctx.Err()\n\tdefault:\n\t}\n\n\tprogChan <- OperationProgress{\n\t\tName: c.String(),\n\t\tProgress: float64(0),\n\t}\n\n\t// Exit early if a restore command is not set\n\tif c.Cmd.Restore == nil {\n\t\tprogChan <- OperationProgress{\n\t\t\tName: c.String(),\n\t\t\tProgress: float64(100),\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tvar pkgSpec string\n\tif backupCtx.releaseManifest != nil {\n\t\tpkg := manifest.VersionedPackageFromManifest(backupCtx.releaseManifest, c.PkgName)\n\t\tif pkg != nil {\n\t\t\tpkgSpec = fmt.Sprintf(\"%s/%s/%s/%s\", pkg.Origin(), pkg.Name(), pkg.Version(), pkg.Release())\n\t\t}\n\t}\n\n\tif pkgSpec == \"\" {\n\t\tpkgSpec = fmt.Sprintf(\"%s/%s\", c.PkgOrigin, c.PkgName)\n\t}\n\n\tcmd := []string{\"hab\", \"pkg\", \"exec\", pkgSpec}\n\tcmd = append(cmd, c.Cmd.Restore...)\n\n\tobjectName := path.Join(path.Join(c.ObjectName...), c.Cmd.Name)\n\n\tif err := verifier.ObjectValid(objectName); err != nil {\n\t\treturn err\n\t}\n\n\treader, err := backupCtx.bucket.NewReader(backupCtx.ctx, objectName, verifier)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"could not open object with name %s\", objectName)\n\t}\n\tdefer reader.Close()\n\n\terr = c.cmdExecutor.Run(cmd[0], command.Args(cmd[1:]...), command.Stdin(reader))\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"command %s failed with error '%s'\", strings.Join(cmd, \" \"), command.StderrFromError(err))\n\t}\n\n\tprogChan <- OperationProgress{\n\t\tName: c.String(),\n\t\tProgress: float64(100),\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3490bf3c1e65a7ad3dd9bf6a692961cc", "score": "0.5252623", "text": "func Restore(plan config.Plan, archive string) (string, error) {\n\terr := startMongoToRestore()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer shutdownMongo()\n\trestore := fmt.Sprintf(\"mongorestore --archive=%v --gzip --host=%v --port=%d \",\n\t\tarchive, host, port)\n\toutput, err := sh.Command(\"/bin/sh\", \"-c\", restore).SetTimeout(time.Duration(plan.Scheduler.Timeout) * time.Minute).CombinedOutput()\n\tif err != nil {\n\t\tex := \"\"\n\t\tif len(output) > 0 {\n\t\t\tex = strings.Replace(string(output), \"\\n\", \" \", -1)\n\t\t}\n\t\treturn \"\", errors.Wrapf(err, \"mongorestore log %v\", ex)\n\t}\n\tfmt.Printf(\"%s\\n\", output)\n\tcheckMsg, err := checkRestore(host, port, plan.Restore.Database, plan.Restore)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn checkMsg, nil\n}", "title": "" }, { "docid": "915d8edc70493d37220d249099f1f19a", "score": "0.5252391", "text": "func (r *InstancesService) RestoreBackup(project string, instance string, backupConfigurationid string, dueTime string) *InstancesRestoreBackupCall {\n\tc := &InstancesRestoreBackupCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.project = project\n\tc.instance = instance\n\tc.urlParams_.Set(\"backupConfiguration\", backupConfigurationid)\n\tc.urlParams_.Set(\"dueTime\", dueTime)\n\treturn c\n}", "title": "" }, { "docid": "845b3c1612b5d99f3a345d7bda02964c", "score": "0.52500015", "text": "func (mr *MockMetadataRestorerMockRecorder) Restore(arg0, arg1, arg2, arg3 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Restore\", reflect.TypeOf((*MockMetadataRestorer)(nil).Restore), arg0, arg1, arg2, arg3)\n}", "title": "" }, { "docid": "564d35adafbe3deaae29baa70015f733", "score": "0.52452123", "text": "func Restore(restclient *rest.RESTClient, namespace string, clientset *kubernetes.Clientset, task *crv1.Pgtask) {\n\n\tclusterName := task.Spec.Parameters[config.LABEL_PGBASEBACKUP_RESTORE_FROM_CLUSTER]\n\tlog.Debugf(\"restore workflow: started for cluster %s\", clusterName)\n\n\tcluster := crv1.Pgcluster{}\n\n\tfound, err := kubeapi.Getpgcluster(restclient, &cluster, clusterName, namespace)\n\tif !found || err != nil {\n\t\tlog.Errorf(\"restore workflow error: could not find a pgcluster in Restore Workflow for %s\", clusterName)\n\t\treturn\n\t}\n\n\t//use the storage config from the pgcluster for the restored pvc\n\tstorage := cluster.Spec.PrimaryStorage\n\n\t//create the \"to-cluster\" PVC to hold the new data\n\tpvcName, err := createRestorePVC(storage, clusterName, restclient, namespace, clientset, task)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\treturn\n\t}\n\n\t//create the Job to run the pg_basebackup restore container\n\tworkflowID := task.Spec.Parameters[crv1.PgtaskWorkflowID]\n\tjobFields := restorejobTemplateFields{\n\t\tJobName: \"pgbasebackup-restore-\" + task.Spec.Parameters[config.LABEL_PGBASEBACKUP_RESTORE_FROM_CLUSTER] + \"-\" + util.RandStringBytesRmndr(4),\n\t\tTaskName: task.Name,\n\t\tClusterName: task.Spec.Parameters[config.LABEL_PGBASEBACKUP_RESTORE_FROM_CLUSTER],\n\t\tSecurityContext: util.CreateSecContext(storage.Fsgroup, storage.SupplementalGroups),\n\t\tToClusterPVCName: pvcName,\n\t\tBackupPVCName: task.Spec.Parameters[config.LABEL_PGBASEBACKUP_RESTORE_FROM_PVC],\n\t\tWorkflowID: workflowID,\n\t\tCCPImagePrefix: operator.Pgo.Cluster.CCPImagePrefix,\n\t\tCCPImageTag: operator.Pgo.Cluster.CCPImageTag,\n\t\tNodeSelector: operator.GetAffinity(task.Spec.Parameters[\"NodeLabelKey\"], task.Spec.Parameters[\"NodeLabelValue\"], \"In\"),\n\t\tBackupPath: task.Spec.Parameters[config.LABEL_PGBASEBACKUP_RESTORE_BACKUP_PATH],\n\t\tPgdataPath: pvcName,\n\t}\n\n\tvar doc2 bytes.Buffer\n\terr = config.PgBasebackupRestoreJobTemplate.Execute(&doc2, jobFields)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\tlog.Error(\"restore workflow: error executing job template\")\n\t\treturn\n\t}\n\n\tif operator.CRUNCHY_DEBUG {\n\t\tconfig.PgBasebackupRestoreJobTemplate.Execute(os.Stdout, jobFields)\n\t}\n\n\tnewjob := v1batch.Job{}\n\terr = json.Unmarshal(doc2.Bytes(), &newjob)\n\tif err != nil {\n\t\tlog.Error(\"restore workflow: error unmarshalling json into Job \" + err.Error())\n\t\treturn\n\t}\n\n\tjobName, err := kubeapi.CreateJob(clientset, &newjob, namespace)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\tlog.Error(\"restore workflow: error in creating restore job\")\n\t\treturn\n\t}\n\tlog.Debugf(\"restore workflow: restore job %s created\", jobName)\n\n\terr = updateWorkflow(restclient, workflowID, namespace, crv1.PgtaskWorkflowPgbasebackupRestoreJobCreatedStatus)\n\tif err != nil {\n\t\tlog.Error(err)\n\t\tlog.Error(\"restore workflow: error in updating workflow status\")\n\t}\n}", "title": "" }, { "docid": "c3c11cace3cd9b9ad3db96d08689e385", "score": "0.52378774", "text": "func (f *flotillaState) Restore(in io.ReadCloser) error {\n\t// stream to filePath.tmp\n\ttempData := f.tempPath + \"/data.mdb\"\n\t_ = os.Remove(tempData)\n\ttempFile, err := os.Create(tempData)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer tempFile.Close()\n\tif _, err = io.Copy(tempFile, in); err != nil {\n\t\treturn err\n\t}\n\t// unlink existing DB and move new one into place\n\t// can't atomically rename directories so have to lock for this\n\tf.l.Lock()\n\tdefer f.l.Unlock()\n\tif err = syscall.Unlink(f.dataPath + \"/data.mdb\"); err != nil {\n\t\treturn err\n\t}\n\tif err = syscall.Unlink(f.dataPath + \"/lock.mdb\"); err != nil {\n\t\treturn err\n\t}\n\tif err = os.Rename(tempData, f.dataPath+\"/data.mdb\"); err != nil {\n\t\treturn err\n\t}\n\t// mark existing env as closeable when all outstanding txns finish\n\t// posix holds onto our data until we release FD\n\tf.env.Close()\n\t// re-initialize env\n\tf.env, err = newenv(f.dataPath)\n\treturn err\n}", "title": "" }, { "docid": "792025851ca9fa55283ead7558d5ba83", "score": "0.5235716", "text": "func (s *SemaProperties) Restore(orig SemaProperties) {\n\t*s = orig\n}", "title": "" }, { "docid": "50c3b331e6d0a16329f8cfd5efbeed54", "score": "0.52333045", "text": "func (w *FileWiper) Restore(ctx context.Context, path string) error {\n\t_, err := w.r.Run(ctx, \"mv\", \"--\", path+backupSuffix, path)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to restore data\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ed15b808a34574eb720e243ca0456276", "score": "0.5232995", "text": "func (s *Cli) RestoreRoute() error {\n\t// Route will be auto removed when tun device destroyed\n\treturn nil\n}", "title": "" }, { "docid": "38a1fa032302c71f686d8cb1020427d2", "score": "0.52201676", "text": "func (c *FSM) Restore(old io.ReadCloser) error {\n\tdefer old.Close()\n\n\tmembers := newDaprHostMemberState()\n\tif err := members.restore(old); err != nil {\n\t\treturn err\n\t}\n\n\tc.stateLock.Lock()\n\tc.state = members\n\tc.stateLock.Unlock()\n\n\treturn nil\n}", "title": "" }, { "docid": "f8f4f9bd465debcacb05a9935c80f611", "score": "0.52172965", "text": "func (c *Client) Restore(ctx context.Context, backup string) (Bundle, error) {\n\tpath := \"/certificates/restore\"\n\n\tbundle := Bundle{}\n\n\tbody := struct {\n\t\tValue string `json:\"value\"`\n\t}{\n\t\tValue: backup,\n\t}\n\n\terr := c.Conn.Call(ctx, conn.Post, path, nil, body, &bundle)\n\treturn bundle, err\n}", "title": "" }, { "docid": "2671fe37554f497e72893f33c06f4ab5", "score": "0.5208977", "text": "func Restore() error {\n\terr := syscall.Seteuid(savedUID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif syscall.Geteuid() != savedUID {\n\t\treturn errors.New(\"failed to reset effective UID\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "16d9c84d058ed464c68cbfba29815b58", "score": "0.52028656", "text": "func (ck *Clerk) restore() {\n\tfor i := 0; i < len(ck.isLeader); i++ {\n\t\tck.isLeader[i] = true\n\t}\n}", "title": "" }, { "docid": "16d9c84d058ed464c68cbfba29815b58", "score": "0.52028656", "text": "func (ck *Clerk) restore() {\n\tfor i := 0; i < len(ck.isLeader); i++ {\n\t\tck.isLeader[i] = true\n\t}\n}", "title": "" }, { "docid": "7185f7d43eedb7ea9c9dad2a5a609e42", "score": "0.5198971", "text": "func (c *ContentTransformer) Restore(content []byte) []byte {\n\treturn c.addBom(c.replaceLFWithEOl(content))\n}", "title": "" }, { "docid": "e9b39683def871bdd80af71d598ed26c", "score": "0.51903915", "text": "func (a *windowHandler) Restore(req *agent.RestoreRequest) (*agent.RestoreResponse, error) {\n\tbuf := bytes.NewReader(req.Snapshot)\n\tdec := gob.NewDecoder(buf)\n\terr := dec.Decode(&a.state)\n\tmsg := \"\"\n\tif err != nil {\n\t\tmsg = err.Error()\n\t}\n\treturn &agent.RestoreResponse{\n\t\tSuccess: err == nil,\n\t\tError: msg,\n\t}, nil\n}", "title": "" }, { "docid": "0e3204ff27bbf6d5b00a4102886aa15d", "score": "0.5188912", "text": "func (kv *KV) Restore(rc io.ReadCloser) error {\n\n\tbytes, err := ioutil.ReadAll(rc)\n\tif err != nil {\n\t\tlogger.Error(\"Restore ReadAll\", err)\n\t\treturn err\n\t}\n\tvar snapshot kvSnapshot\n\terr = bson.FromBytes(bytes, &snapshot)\n\tif err != nil {\n\t\treturn err\n\t}\n\tkv.mu.Lock()\n\tkv.meta = snapshot.meta\n\tkv.data = snapshot.data\n\tif kv.meta == nil {\n\t\tkv.meta = make(map[string]string)\n\t}\n\tif kv.data == nil {\n\t\tkv.data = make(map[string]*AliveEndPoints)\n\t}\n\tkv.mu.Unlock()\n\tsnapshot.meta = nil\n\tsnapshot.data = nil\n\n\treturn nil\n}", "title": "" }, { "docid": "779112583343849827143e9325fbc820", "score": "0.5180584", "text": "func (f *File) Restore() error {\n\tif err := os.Rename(f.tmp, f.orig); err != nil {\n\t\treturn err\n\t}\n\tf.tmp = \"\"\n\treturn nil\n}", "title": "" }, { "docid": "867af5b19836d37e576c0ee03250d5bd", "score": "0.5179249", "text": "func (s *Server) restore() error {\n\tdataDir, err := shared.FindDirectory(shared.DataDirectory)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdata, err := ioutil.ReadFile(filepath.Join(dataDir, \"containerservice.yaml\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar cs *internalapi.OpenShiftManagedCluster\n\tif err := yaml.Unmarshal(data, &cs); err != nil {\n\t\treturn err\n\t}\n\ts.write(cs)\n\treturn nil\n}", "title": "" }, { "docid": "dad0371a1d54ac22c14900ccfcd0c3db", "score": "0.51780355", "text": "func (r *InstanceReconciler) restoreSnapshot(ctx context.Context, inst v1alpha1.Instance, sts *appsv1.StatefulSet, sp *controllers.StsParams) error {\n\tif err := r.Delete(ctx, sts); err != nil {\n\t\tr.Log.Error(err, \"restoreSnapshot: failed to delete the old StatefulSet\")\n\t}\n\tr.Log.Info(\"restoreSnapshot: old StatefulSet deleted\")\n\n\tpvcs, err := controllers.NewPVCs(*sp)\n\tif err != nil {\n\t\tr.Log.Error(err, \"NewPVCs failed\")\n\t\treturn err\n\t}\n\tr.Log.Info(\"restoreSnapshot: old PVCs to delete constructed\", \"pvcs\", pvcs)\n\n\tfor i, pvc := range pvcs {\n\t\tpvc.Name = fmt.Sprintf(\"%s-%s-0\", pvc.Name, sp.StsName)\n\t\tif err := r.Delete(ctx, &pvc); err != nil {\n\t\t\tr.Log.Error(err, \"restoreSnapshot: failed to delete the old PVC\", \"pvc#\", i, \"pvc\", pvc)\n\t\t}\n\t\tr.Log.Info(\"restoreSnapshot: old PVC deleted\", \"pvc\", pvc.Name)\n\n\t\tapplyOpts := []client.PatchOption{client.ForceOwnership, client.FieldOwner(\"instance-controller\")}\n\t\tif err := r.Patch(ctx, &pvc, client.Apply, applyOpts...); err != nil {\n\t\t\tr.Log.Error(err, \"restoreSnapshot: failed to patch the deleting of the old PVC\")\n\t\t}\n\t}\n\n\tsp.Restore = inst.Spec.Restore\n\n\tnewPVCs, err := controllers.NewPVCs(*sp)\n\tif err != nil {\n\t\tr.Log.Error(err, \"NewPVCs failed\")\n\t\treturn err\n\t}\n\tnewPodTemplate := controllers.NewPodTemplate(*sp, inst.Spec.CDBName, controllers.GetDBDomain(&inst))\n\tstsRestored, err := controllers.NewSts(*sp, newPVCs, newPodTemplate)\n\tif err != nil {\n\t\tr.Log.Error(err, \"restoreSnapshot: failed to construct the restored StatefulSet\")\n\t\treturn err\n\t}\n\tsts = stsRestored\n\n\tapplyOpts := []client.PatchOption{client.ForceOwnership, client.FieldOwner(\"instance-controller\")}\n\tif err := r.Patch(ctx, sts, client.Apply, applyOpts...); err != nil {\n\t\tr.Log.Error(err, \"failed to patch the restored StatefulSet\")\n\t\treturn err\n\t}\n\tr.Log.Info(\"restoreSnapshot: StatefulSet constructed\", \"statefulSet\", sts, \"sts.Status\", sts.Status)\n\n\treturn nil\n}", "title": "" }, { "docid": "0b9e4e18750a803dedb8845fcd13a56f", "score": "0.51724654", "text": "func (kr *kubernetesRestorer) Restore(\n\treq *Request,\n\tactions []riav2.RestoreItemAction,\n\tvolumeSnapshotterGetter VolumeSnapshotterGetter,\n) (results.Result, results.Result) {\n\tresolver := framework.NewRestoreItemActionResolverV2(actions)\n\treturn kr.RestoreWithResolvers(req, resolver, volumeSnapshotterGetter)\n}", "title": "" }, { "docid": "bb0501b29e32c932b0e5d7906291fdfc", "score": "0.5156532", "text": "func (s *subnetGroup) Restore() error {\n\treturn s.Create()\n}", "title": "" }, { "docid": "44bee5f53d9447f4ca876ecb1c7c5533", "score": "0.5154894", "text": "func (c *Config) Restore(file string) error {\n\targs := []string{}\n\targs = append(args, fmt.Sprintf(\"--uri=%q\", c.URI()))\n\targs = append(args, \"--gzip\")\n\targs = append(args, \"--drop\")\n\targs = append(args, fmt.Sprintf(\"--archive=%q\", file))\n\n\tcommand := exec.Command(\"mongorestore\", args...)\n\tvar stderr bytes.Buffer\n\tcommand.Stderr = &stderr\n\tif err := command.Run(); err != nil {\n\t\treturn fmt.Errorf(\"failed to restore: %s\\n%v\", stderr.String(), err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2628d58c6cdbe930d18a5b734500b51f", "score": "0.5134497", "text": "func (s *State) Restore(backend Backend) (func() error, error) {\n\ts.backend = backend\n\n\tvar resurrect []*host.ActiveJob\n\tif err := s.stateDB.View(func(tx *bolt.Tx) error {\n\t\tjobsBucket := tx.Bucket([]byte(\"jobs\"))\n\t\tbackendJobsBucket := tx.Bucket([]byte(\"backend-jobs\"))\n\t\tbackendGlobalBucket := tx.Bucket([]byte(\"backend-global\"))\n\t\tresurrectionBucket := tx.Bucket([]byte(\"resurrection-jobs\"))\n\n\t\t// restore jobs\n\t\tif err := jobsBucket.ForEach(func(k, v []byte) error {\n\t\t\tjob := &host.ActiveJob{}\n\t\t\tif err := json.Unmarshal(v, job); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif job.ContainerID != \"\" {\n\t\t\t\ts.containers[job.ContainerID] = job\n\t\t\t}\n\t\t\ts.jobs[string(k)] = job\n\n\t\t\treturn nil\n\t\t}); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// hand opaque blobs back to backend so it can do its restore\n\t\tbackendJobsBlobs := make(map[string][]byte)\n\t\tif err := backendJobsBucket.ForEach(func(k, v []byte) error {\n\t\t\tbackendJobsBlobs[string(k)] = v\n\t\t\treturn nil\n\t\t}); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbackendGlobalBlob := backendGlobalBucket.Get([]byte(\"backend\"))\n\t\tif err := backend.UnmarshalState(s.jobs, backendJobsBlobs, backendGlobalBlob); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif resurrectionBucket == nil {\n\t\t\ts.mtx.Lock()\n\t\t\tfor _, job := range s.jobs {\n\t\t\t\t// if there was an unclean shutdown, we resurrect all jobs marked\n\t\t\t\t// that were running at shutdown and are no longer running.\n\t\t\t\tif job.Job.Resurrect && job.Status != host.StatusRunning {\n\t\t\t\t\tresurrect = append(resurrect, job)\n\t\t\t\t}\n\t\t\t}\n\t\t\ts.mtx.Unlock()\n\t\t} else {\n\t\t\tdefer tx.DeleteBucket([]byte(\"resurrection-jobs\"))\n\t\t\tif err := resurrectionBucket.ForEach(func(k, v []byte) error {\n\t\t\t\tjob := &host.ActiveJob{}\n\t\t\t\tif err := json.Unmarshal(v, job); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tresurrect = append(resurrect, job)\n\t\t\t\treturn nil\n\t\t\t}); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}); err != nil && err != io.EOF {\n\t\treturn nil, fmt.Errorf(\"could not restore from host persistence db: %s\", err)\n\t}\n\tresurrectJobs := func(manifest bool) error {\n\t\tfor _, job := range resurrect {\n\t\t\tif manifest && job.ManifestID == \"\" || !manifest && job.ManifestID != \"\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// generate a new job id, this is a new job\n\t\t\tnewID := cluster.RandomJobID(\"\")\n\t\t\tlog.Printf(\"resurrecting %s (%s) as %s\", job.Job.ID, job.ManifestID, newID)\n\t\t\tjob.Job.ID = newID\n\t\t\tconfig := &RunConfig{\n\t\t\t\t// TODO(titanous): Use jobs instead of ActiveJobs in\n\t\t\t\t// resurrection bucket once ManifestID is gone.\n\t\t\t\tManifestID: job.ManifestID,\n\t\t\t\t// TODO(titanous): Passing the IP is a hack, remove it once the\n\t\t\t\t// postgres appliance doesn't use it to calculate its ID in the\n\t\t\t\t// state machine.\n\t\t\t\tIP: net.ParseIP(job.InternalIP),\n\t\t\t}\n\t\t\tif err := backend.Run(job.Job, config); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\tif err := resurrectJobs(true); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn func() error { return resurrectJobs(false) }, nil\n}", "title": "" }, { "docid": "6a099820f09ff047f74bc760bfb01985", "score": "0.51222354", "text": "func (m *Mover) Restore(action dmplugin.Action) error {\n\tutil.Log(pipeline.LogDebug, fmt.Sprintf(\"%s id:%d restore %s %s\", m.name, action.ID(), action.PrimaryPath(), action.UUID()))\n\trate.Mark(1)\n\n\tvar pacer util.Pacer\n\n\tstart := time.Now()\n\tif m.config.Bandwidth != 0 {\n\t\tutil.Log(pipeline.LogDebug, fmt.Sprintf(\"Starting pacer with bandwith %d MBPS\\n\", m.config.Bandwidth))\n\t\tpacer = util.NewTokenBucketPacer(int64(m.config.Bandwidth*1024*1024), int64(0))\n\t\tdefer pacer.Close()\n\t}\n\tif action.UUID() == \"\" {\n\t\treturn errors.Errorf(\"Missing file_id on action %d\", action.ID())\n\t}\n\tcontainer, srcObj, version, err := m.fileIDtoContainerPath(action.UUID())\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"fileIDtoContainerPath failed\")\n\t}\n\n\tcontentLen, err := core.Restore(core.RestoreOptions{\n\t\tAccountName: m.config.AzStorageAccount,\n\t\tAccountSuffix: m.config.AzStorageSuffix,\n\t\tContainerName: container,\n\t\tResourceSAS: m.getSASToken(),\n\t\tBlobName: srcObj,\n\t\tCredential: m.cred,\n\t\tDestinationPath: action.WritePath(),\n\t\tParallelism: uint16(m.config.NumThreads),\n\t\tBlockSize: m.config.UploadPartSize,\n\t\tExportPrefix: m.config.ExportPrefix,\n\t\tBlobVersionID: version,\n\t\tPacer: pacer,\n\t\tHTTPClient: m.httpClient,\n\t})\n\n\tif err != nil {\n\t\treturn errors.Errorf(\"az.Download() of %s failed: %s\", srcObj, err)\n\t}\n\n\tutil.Log(pipeline.LogDebug, fmt.Sprintf(\"%s id:%d Restored %d bytes in %v from %s to %s\", m.name, action.ID(), contentLen,\n\t\ttime.Since(start),\n\t\tsrcObj,\n\t\taction.PrimaryPath()))\n\n\taction.SetActualLength(contentLen)\n\treturn nil\n}", "title": "" }, { "docid": "cc026bbf8e95bc040573a5bd134fd13b", "score": "0.51180047", "text": "func siteRestore(primarySite bool) {\n\thostsToPowerOn := fds.secondarySiteHosts\n\tif primarySite {\n\t\thostsToPowerOn = fds.primarySiteHosts\n\t}\n\tframework.Logf(\"hosts to power on: %v\", hostsToPowerOn)\n\tpowerOnHostParallel(hostsToPowerOn)\n}", "title": "" }, { "docid": "e0ee2b9bd4735037ccf6a68388d67b17", "score": "0.5106173", "text": "func (r *PhysRestore) Snapshot(cmd *pbm.RestoreCmd, opid pbm.OPID, l *log.Event, stopAgentC chan<- struct{}, pauseHB func()) (err error) {\n\tl.Debug(\"port: %d\", r.tmpPort)\n\n\tmeta := &pbm.RestoreMeta{\n\t\tType: pbm.PhysicalBackup,\n\t\tOPID: opid.String(),\n\t\tName: cmd.Name,\n\t\tBackup: cmd.BackupName,\n\t\tStartTS: time.Now().Unix(),\n\t\tStatus: pbm.StatusInit,\n\t\tReplsets: []pbm.RestoreReplset{{Name: r.nodeInfo.Me}},\n\t}\n\tif r.nodeInfo.IsClusterLeader() {\n\t\tmeta.Leader = r.nodeInfo.Me + \"/\" + r.rsConf.ID\n\t}\n\n\tvar progress nodeStatus\n\tdefer func() {\n\t\t// set failed status of node on error, but\n\t\t// don't mark node as failed after the local restore succeed\n\t\tif err != nil && !progress.is(restoreDone) && !errors.Is(err, ErrNoDataForShard) {\n\t\t\tr.MarkFailed(meta, err, !progress.is(restoreStared))\n\t\t}\n\n\t\tr.close(err == nil, progress.is(restoreStared) && !progress.is(restoreDone))\n\t}()\n\n\terr = r.init(cmd.Name, opid, l)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"init\")\n\t}\n\n\terr = r.prepareBackup(cmd.BackupName)\n\tif err != nil {\n\t\treturn err\n\t}\n\tmeta.Type = r.bcp.Type\n\terr = r.setTmpConf()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"set tmp config\")\n\t}\n\n\tif meta.Type == pbm.IncrementalBackup {\n\t\tmeta.BcpChain = make([]string, 0, len(r.files))\n\t\tfor i := len(r.files) - 1; i >= 0; i-- {\n\t\t\tmeta.BcpChain = append(meta.BcpChain, r.files[i].BcpName)\n\t\t}\n\t}\n\n\t_, err = r.toState(pbm.StatusStarting)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"move to running state\")\n\t}\n\tl.Debug(\"%s\", pbm.StatusStarting)\n\n\t// don't write logs to the mongo anymore\n\t// but dump it on storage\n\tr.cn.Logger().SefBuffer(&logBuff{\n\t\tbuf: new(bytes.Buffer),\n\t\tpath: fmt.Sprintf(\"%s/%s/rs.%s/log/%s\", pbm.PhysRestoresDir, r.name, r.rsConf.ID, r.nodeInfo.Me),\n\t\tlimit: 1 << 20, // 1Mb\n\t\twrite: func(name string, data io.Reader) error { return r.stg.Save(name, data, -1) },\n\t})\n\tr.cn.Logger().PauseMgo()\n\n\t_, err = r.toState(pbm.StatusRunning)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"moving to state %s\", pbm.StatusRunning)\n\t}\n\n\t// On this stage, the agent has to be closed on any outcome as mongod\n\t// is gonna be turned off. Besides, the agent won't be able to listen to\n\t// the cmd stream anymore and will flood logs with errors on that.\n\tl.Info(\"send to stopAgent chan\")\n\tif stopAgentC != nil {\n\t\tstopAgentC <- struct{}{}\n\t}\n\t// anget will be stopped only after we exit this func\n\t// so stop heartbeats not to spam logs while the restore is running\n\tl.Debug(\"stop agents heartbeats\")\n\tpauseHB()\n\n\tl.Info(\"stopping mongod and flushing old data\")\n\terr = r.flush()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// A point of no return. From now on, we should clean the dbPath if an\n\t// error happens before the node is restored successfully.\n\t// The mongod most probably won't start anyway (or will start in an\n\t// inconsistent state). But the clean path will allow starting the cluster\n\t// and doing InitialSync on this node should the restore succeed on other\n\t// nodes.\n\t//\n\t// Should not be set before `r.flush()` as `flush` cleans the dbPath on its\n\t// own (which sets the no-return point).\n\tprogress |= restoreStared\n\n\tl.Info(\"copying backup data\")\n\tdstat, err := r.copyFiles()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"copy files\")\n\t}\n\terr = r.writeStat(dstat)\n\tif err != nil {\n\t\tr.log.Warning(\"write download stat: %v\", err)\n\t}\n\n\tl.Info(\"preparing data\")\n\terr = r.prepareData()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"prepare data\")\n\t}\n\n\tl.Info(\"recovering oplog as standalone\")\n\terr = r.recoverStandalone()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"recover oplog as standalone\")\n\t}\n\n\tl.Info(\"clean-up and reset replicaset config\")\n\terr = r.resetRS()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"clean-up, rs_reset\")\n\t}\n\n\tl.Info(\"restore on node succeed\")\n\t// The node at this stage was restored successfully, so we shouldn't\n\t// clean up dbPath nor write error status for the node whatever happens\n\t// next.\n\tprogress |= restoreDone\n\n\tstat, err := r.toState(pbm.StatusDone)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"moving to state %s\", pbm.StatusDone)\n\t}\n\n\tr.log.Info(\"writing restore meta\")\n\terr = r.dumpMeta(meta, stat, \"\")\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"writing restore meta to storage\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "030bcdca9ea80494bfc7893fe4bf14b4", "score": "0.50913906", "text": "func (canvas *Canvas) Restore() {\n\ttoimpl()\n}", "title": "" }, { "docid": "56d1220240a0fb7afe5eadad13545427", "score": "0.5070853", "text": "func (client *Client) RestoreDBInstance(request *RestoreDBInstanceRequest) (_result *RestoreDBInstanceResponse, _err error) {\n\truntime := &util.RuntimeOptions{}\n\t_result = &RestoreDBInstanceResponse{}\n\t_body, _err := client.RestoreDBInstanceWithOptions(request, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_result = _body\n\treturn _result, _err\n}", "title": "" }, { "docid": "245c18557b936658b631ffaf170966e0", "score": "0.5065201", "text": "func Restore(params RestoreParams) error {\n\tif err := params.Validate(); err != nil {\n\t\treturn err\n\t}\n\n\treturn api.ReturnErrOnly(params.V1API.Deployments.RestoreDeploymentResource(\n\t\tdeployments.NewRestoreDeploymentResourceParams().\n\t\t\tWithRestoreSnapshot(&params.RestoreSnapshot).\n\t\t\tWithResourceKind(params.Kind).\n\t\t\tWithDeploymentID(params.DeploymentID).\n\t\t\tWithRefID(params.RefID),\n\t\tparams.AuthWriter,\n\t))\n}", "title": "" }, { "docid": "12b179251c947ca9494bbc3f7e62f785", "score": "0.5061615", "text": "func recovery() {\n\trecover()\n}", "title": "" }, { "docid": "1cc00c9d3337cf446e26049924209fc6", "score": "0.5054592", "text": "func RestoreFromBackup(apiClient apiextensionsclientset.Interface, kubeClient kubernetes.Interface, namespace string, backupName string) error {\n\tif backupName == \"\" {\n\t\treturn errors.Errorf(\"\")\n\t}\n\tlog.Logger().Infof(\"Using backup '%s'\", backupName)\n\n\targs := []string{\"create\", \"restore\", \"--from-backup\", backupName, \"--namespace\", namespace}\n\tcmd := util.Command{\n\t\tName: \"velero\",\n\t\tArgs: args,\n\t}\n\n\toutput, err := cmd.RunWithoutRetry()\n\tif err != nil {\n\t\treturn errors.Wrap(err, fmt.Sprintf(\"executing '%s %v' command\", cmd.Name, cmd.Args))\n\t}\n\n\tlog.Logger().Infof(output)\n\n\treturn nil\n}", "title": "" }, { "docid": "043f52b9cbea1c77fb7c12ff1fdeeafc", "score": "0.5039018", "text": "func (c *ConfigFSM) Restore(r io.ReadCloser) error {\n\tb, err := ioutil.ReadAll(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar cs ConfigSnapshot\n\terr = json.Unmarshal(b, &cs)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.handleSlotNodeChange(&cs)\n\treturn nil\n}", "title": "" }, { "docid": "83e96e844533c1f64037194f0f6b24d4", "score": "0.5009409", "text": "func (client *Client) RestoreDBInstanceWithOptions(request *RestoreDBInstanceRequest, runtime *util.RuntimeOptions) (_result *RestoreDBInstanceResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.BackupId)) {\n\t\tquery[\"BackupId\"] = request.BackupId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.DBInstanceId)) {\n\t\tquery[\"DBInstanceId\"] = request.DBInstanceId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.OwnerAccount)) {\n\t\tquery[\"OwnerAccount\"] = request.OwnerAccount\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.OwnerId)) {\n\t\tquery[\"OwnerId\"] = request.OwnerId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceOwnerAccount)) {\n\t\tquery[\"ResourceOwnerAccount\"] = request.ResourceOwnerAccount\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceOwnerId)) {\n\t\tquery[\"ResourceOwnerId\"] = request.ResourceOwnerId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.SecurityToken)) {\n\t\tquery[\"SecurityToken\"] = request.SecurityToken\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"RestoreDBInstance\"),\n\t\tVersion: tea.String(\"2015-12-01\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &RestoreDBInstanceResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "title": "" }, { "docid": "1efcebe8b86c7cc0a0548183cb9025e0", "score": "0.5007463", "text": "func resetRaftDB(db *util.OvsDbProperties) error {\n\tdbFile := filepath.Base(db.DbAlias)\n\tbackupFile := strings.TrimSuffix(dbFile, filepath.Ext(dbFile)) +\n\t\ttime.Now().UTC().Format(\"2006-01-02_150405\") + \"db_bak\"\n\tbackupDB := filepath.Join(filepath.Dir(db.DbAlias), backupFile)\n\terr := os.Rename(db.DbAlias, backupDB)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to back up the db to backupFile: %s, error: %s\", backupDB, err)\n\t}\n\n\tklog.Infof(\"Backed up the db to backupFile: %s\", backupFile)\n\t_, stderr, err := db.AppCtl(5, \"exit\")\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to restart the ovn db: %s ,\"+\n\t\t\t\"stderr: %v, err: %v\", db.DbName, stderr, err)\n\t}\n\tklog.Infof(\"Stopped %s db after backing up the db: %s\", db.DbName, backupFile)\n\n\treturn nil\n}", "title": "" }, { "docid": "c5839532a902ee60314d31ec836523f5", "score": "0.50048774", "text": "func (*resInjectorHandler) Restore(req *agent.RestoreRequest) (*agent.RestoreResponse, error) {\n\treturn &agent.RestoreResponse{\n\t\tSuccess: true,\n\t}, nil\n}", "title": "" }, { "docid": "2dc587c94d62876a9c7b4c29b34795cb", "score": "0.500426", "text": "func (gc *defaultGaleraControl) scheduleGaleraRestore(\n\tgalera *apigalera.Galera,\n\tstatus *apigalera.GaleraStatus,\n\trevision string,\n\tpods []*corev1.Pod,\n\tclaims []*corev1.PersistentVolumeClaim,\n\tmapCredGalera map[string]string) error {\n\tvar readyPods []*corev1.Pod\n\tvar unreadyPods []*corev1.Pod\n\tvar podSuffix []string\n\n\t// Check pods and short them between ready and unready pods\n\tfor _, pod := range pods {\n\t\tstatus.Replicas++\n\n\t\tvalue, exist := pod.Labels[apigalera.GaleraRoleLabel]\n\t\tif exist && value == apigalera.Restore && getPodRevision(pod) == revision {\n\t\t\t// Create two slices, one with running and ready pods and one with unready pods\n\t\t\tif isRunningAndReady(pod) {\n\t\t\t\treadyPods = append(readyPods, pod)\n\t\t\t} else {\n\t\t\t\tunreadyPods = append(unreadyPods, pod)\n\t\t\t}\n\t\t\tstatus.CurrentReplicas++\n\t\t} else {\n\t\t\t// Delete pod\n\t\t\treturn gc.podControl.ForceDeletePodAndClaim(galera, pod)\n\t\t}\n\n\t\tpodSuffix = append(podSuffix, getPodSuffix(pod))\n\t}\n\n\tstatus.Members.Ready, status.Members.Unready = getMembersName(readyPods, unreadyPods)\n\n\tdefaultSCName, err := gc.storageControl.GetNameDefaultStorageClass()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Delete backup claim not mapped by a pod and return a suffixes' list of unused claims\n\tunusedClaimSuffixes, op, err := gc.deleteNoMatchingClaimsAndListUnusedClaims(galera, podSuffix, []string{}, claims, defaultSCName)\n\tif err != nil || op == true {\n\t\treturn err\n\t}\n\n\tif int32(len(readyPods)) < *galera.Spec.Replicas {\n\t\treturn gc.checkUnreadyPodBeforeCreatingPod(\n\t\t\tgalera,\n\t\t\tstatus,\n\t\t\tunreadyPods,\n\t\t\trevision, revision, revision,\n\t\t\tapigalera.Restore,\n\t\t\t\"\",\n\t\t\tmapCredGalera,\n\t\t\tpodSuffix,\n\t\t\tunusedClaimSuffixes)\n\t}\n\n\t// At this point, all of the current Replicas are Running and Ready, we can consider termination.\n\treturn gc.considerPodAndClaimTermination(\n\t\tgalera,\n\t\tstatus,\n\t\treadyPods,\n\t\tunreadyPods,\n\t\tclaims,\n\t\tunusedClaimSuffixes,\n\t\t*galera.Spec.Replicas,\n\t\trevision, revision,\n\t\tmapCredGalera)\n}", "title": "" }, { "docid": "b80115b3b14643bfa45667902ce1df38", "score": "0.49833506", "text": "func (su *storageUnstable) restoreSnapshot(snap raftpb.Snapshot) {\n\tsu.indexOffset = snap.Metadata.Index + 1\n\tsu.entries = nil\n\tsu.snapshot = &snap\n}", "title": "" }, { "docid": "5d83944c6c8c5e205315358aefc985ca", "score": "0.49818993", "text": "func Restore(ctx context.Context, nodeid string) error {\n\targs := []string{\"restore\", nodeid}\n\t_, err := RunCIAOCmdAsAdmin(ctx, \"\", args)\n\treturn err\n}", "title": "" }, { "docid": "2033c1d04a36aef9427e893d1e32cbcd", "score": "0.49810246", "text": "func (d *DatabaseDumpOperation) Restore(backupCtx Context, serviceName string, verifier ObjectVerifier, progChan chan OperationProgress) error {\n\t// Make sure the context isn't dead before we start the operation\n\tselect {\n\tcase <-backupCtx.ctx.Done():\n\t\treturn backupCtx.ctx.Err()\n\tdefault:\n\t}\n\n\tprogChan <- OperationProgress{\n\t\tName: d.String(),\n\t\tProgress: float64(0),\n\t}\n\n\tobjectName := path.Join(path.Join(d.ObjectName...), fmt.Sprintf(\"%s.sql\", d.Name))\n\n\tbackupCtxDeadline, _ := backupCtx.ctx.Deadline()\n\tlogrus.WithFields(logrus.Fields{\n\t\t\"name\": d.Name,\n\t\t\"backup_id\": backupCtx.backupTask.TaskID(),\n\t\t\"restore_id\": backupCtx.restoreTask.TaskID(),\n\t\t\"user\": d.User,\n\t\t\"object_name\": objectName,\n\t\t\"operation\": \"database_dump\",\n\t\t\"action\": \"restore\",\n\t\t\"deadline\": backupCtxDeadline.Format(time.RFC3339),\n\t}).Info(\"Running backup operation\")\n\n\tif err := verifier.ObjectValid(objectName); err != nil {\n\t\treturn err\n\t}\n\n\treader, err := backupCtx.bucket.NewReader(backupCtx.ctx, objectName, verifier)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"could not open object with name %s\", objectName)\n\t}\n\tdefer reader.Close()\n\n\tp := &pg.DatabaseExporter{\n\t\tName: d.Name,\n\t\tUser: d.User,\n\t\tDisableRoleCreate: backupCtx.IsExternalPG(),\n\t\tCmdExecutor: d.cmdExecutor,\n\t\tConnInfo: backupCtx.pgConnInfo,\n\t\tStdin: reader,\n\t}\n\n\tif err := p.Import(false); err != nil {\n\t\treturn errors.Wrapf(err, \"failed to import database dump from %s\", objectName)\n\t}\n\n\tprogChan <- OperationProgress{\n\t\tName: d.String(),\n\t\tProgress: float64(100),\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e2c925574135c7288434d8709d118e97", "score": "0.4978644", "text": "func (c *RstrController) deleteRestore(obj interface{}) {\n\trstr, ok := obj.(*apis.ZFSRestore)\n\tif !ok {\n\t\ttombstone, ok := obj.(cache.DeletedFinalStateUnknown)\n\t\tif !ok {\n\t\t\truntime.HandleError(fmt.Errorf(\"Couldn't get object from tombstone %#v\", obj))\n\t\t\treturn\n\t\t}\n\t\trstr, ok = tombstone.Obj.(*apis.ZFSRestore)\n\t\tif !ok {\n\t\t\truntime.HandleError(fmt.Errorf(\"Tombstone contained object that is not a zfsbackup %#v\", obj))\n\t\t\treturn\n\t\t}\n\t}\n\n\tif zfs.NodeID != rstr.Spec.OwnerNodeID {\n\t\treturn\n\t}\n\n\tklog.Infof(\"Got delete event for Restore %s\", rstr.Spec.VolumeName)\n\tc.enqueueRestore(rstr)\n}", "title": "" }, { "docid": "23ef492db5699b0837a4302529a93d3e", "score": "0.49695444", "text": "func (c *Client) Restore(path, rev string) (meta *Metadata, err error) {\n\tparams := c.makeParams(true)\n\tparams.Set(\"rev\", rev)\n\terr = c.getJSON(RestoreURL+c.filePath(path), params, &meta)\n\treturn\n}", "title": "" }, { "docid": "b12bc004bec0bc67c7268ba21415d1e3", "score": "0.49691775", "text": "func doRestore() error {\n\t// initialize the gcs client and get handles to the meta and backup objects\n\tlog.Debug(\"initing cloud storage\")\n\tclient, err := gcs.NewGCSClientFromCredentials(secretPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer client.Close()\n\n\t// read metadata to the meta file\n\tlog.Debug(\"reading metadata\")\n\tn, err := readMetadata(client)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// build the asrestore command\n\tcmd := exec.Command(\"asrestore\", \"-h\", host, \"-p\", strconv.Itoa(port), \"-i\", \"-\", \"-n\", fmt.Sprintf(\"%s,%s\", n.Namespace, namespace), \"-v\")\n\t// get a handle to stdin\n\ti, err := cmd.StdinPipe()\n\t// capture asrestore's stderr\n\terrw := log.New().Writer()\n\tdefer errw.Close()\n\tcmd.Stderr = errw\n\n\t// give some feedback about what is going to be executed\n\tlog.Debug(\"==== asrestore ====\")\n\tlog.Debug(strings.Join(cmd.Args, \" \"))\n\tlog.Debug(\"===================\")\n\n\t// launch the asrestore process\n\tlog.Debug(\"running asrestore and streaming from cloud storage\")\n\tif err := cmd.Start(); err != nil {\n\t\treturn err\n\t}\n\t// transfer data from gcs to asrestore's stdin\n\tif err := client.TransferFromGCS(i, bucketName, backuprestore.GetBackupObjectName(name)); err != nil {\n\t\treturn err\n\t}\n\t// close stdin when we're done\n\tif err := i.Close(); err != nil {\n\t\treturn err\n\t}\n\t// wait for asrestore to terminate\n\treturn cmd.Wait()\n}", "title": "" }, { "docid": "2b23a7b521c4ced97bebf599f3440686", "score": "0.49656126", "text": "func restoreSystemBoot() error {\n\t// Mount the restore path\n\terr := core.Mount(core.PartitionTable.Restore, core.RestorePath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Unmount the boot path\n\t_ = core.Unmount(core.PartitionTable.SystemBoot)\n\n\t// Write partition content back\n\terr = core.UnzipToDevice(core.BackupImageSystemBoot, core.PartitionTable.SystemBoot)\n\n\t// Unmount the restore partition\n\t_ = core.Unmount(core.RestorePath)\n\n\treturn err\n}", "title": "" }, { "docid": "c1231d00cce724f273be51ed40cb9047", "score": "0.49564248", "text": "func (o SpotInstanceRequestMaintenanceOptionsOutput) AutoRecovery() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SpotInstanceRequestMaintenanceOptions) *string { return v.AutoRecovery }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c243363bc8f0a4324eb9f1edb4a48de0", "score": "0.49558583", "text": "func (m *Machine) Restore(raw []byte) {\n\tvar state savedState\n\n\tdec := gob.NewDecoder(bytes.NewReader(raw))\n\tdec.Decode(&state)\n\tfor reg, value := range state.Registers {\n\t\tm.setRegister(reg, value)\n\t}\n\tfor addr, value := range state.RAM {\n\t\tm.ram[addr] = &baseInteger{\n\t\t\tmachine: m,\n\t\t\taddress: addr,\n\t\t\tVal: value,\n\t\t}\n\t}\n\tm.model.restore(state.ModelData)\n}", "title": "" }, { "docid": "12a2d65412c86f2cb93fdde57fd5e86b", "score": "0.49507892", "text": "func veleroRestore(ctx context.Context, veleroCLI string, veleroNamespace string, restoreName string, backupName string) error {\n\trestoreCmd := exec.CommandContext(ctx, veleroCLI, \"--namespace\", veleroNamespace, \"create\", \"restore\", restoreName,\n\t\t\"--from-backup\", backupName, \"--wait\")\n\n\trestoreCmd.Stdout = os.Stdout\n\trestoreCmd.Stderr = os.Stderr\n\tfmt.Printf(\"restore cmd =%v\\n\", restoreCmd)\n\terr := restoreCmd.Run()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn checkRestorePhase(ctx, veleroCLI, veleroNamespace, restoreName, velerov1api.RestorePhaseCompleted)\n}", "title": "" }, { "docid": "14c90214d5d153354b5f0e99a9a00046", "score": "0.4949065", "text": "func (tx *Tx) DoRestore(actor string, table string, id string) bool {\n\tkvparams := M.SX{}\n\tkvparams[`is_deleted`] = false\n\tkvparams[`restored_by`] = actor\n\tquery, params := GenUpdateId(table, id, kvparams)\n\treturn tx.DoExec(query, params...) == nil\n}", "title": "" }, { "docid": "20d5d371511f526e194629dbd005366c", "score": "0.4943743", "text": "func (ms *MaintenanceState) Restore(project string) error {\n\tdata, err := ioutil.ReadFile(ms.filename)\n\tif err != nil {\n\t\tlog.Printf(\"ERROR: Failed to read state data from %s: %s\", ms.filename, err)\n\t\tmetrics.Error.WithLabelValues(\"readfile\", \"maintenancestate.Restore\").Inc()\n\t\treturn err\n\t}\n\n\terr = json.Unmarshal(data, &ms.state)\n\tif err != nil {\n\t\tlog.Printf(\"ERROR: Failed to unmarshal JSON: %s\", err)\n\t\tmetrics.Error.WithLabelValues(\"unmarshaljson\", \"maintenancestate.Restore\").Inc()\n\t\treturn err\n\t}\n\n\t// Restore machine maintenance state.\n\tfor machine := range ms.state.Machines {\n\t\tupdateMetrics(machine, project, EnterMaintenance, metrics.Machine)\n\t}\n\n\t// Restore site maintenance state.\n\tfor site := range ms.state.Sites {\n\t\tupdateMetrics(site, project, EnterMaintenance, metrics.Site)\n\t}\n\n\tlog.Printf(\"INFO: Successfully restored %s from disk.\", ms.filename)\n\treturn nil\n}", "title": "" }, { "docid": "873742e795d6f9c54cc1d15bf4692376", "score": "0.49298254", "text": "func syncRestoreDb(s Specification) {\n\trestoreCommand(\"db\", s)\n}", "title": "" }, { "docid": "40ef3c8a4aea0aff5f538698eb231c87", "score": "0.49244127", "text": "func (o SpotInstanceRequestMaintenanceOptionsPtrOutput) AutoRecovery() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *SpotInstanceRequestMaintenanceOptions) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.AutoRecovery\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2c3637ae1bc794c6ed5df0bd8ebaa87e", "score": "0.4917163", "text": "func (b *batchAPI) Restore(r Restore) *ReplyOK {\n\tb.args.Key(r.Key)\n\tb.args.Arg(Milliseconds(r.TTL))\n\tb.args.String(r.Value)\n\tif r.Replace {\n\t\tb.args.String(\"REPLACE\")\n\t}\n\tif r.AbsoluteTTL {\n\t\tb.args.String(\"ABSTTL\")\n\t}\n\tif r.IdleTime > time.Second {\n\t\tb.args.Append(String(\"IDLETIIME\"), Seconds(r.IdleTime))\n\t}\n\tif r.Frequency > 0 {\n\t\tb.args.Append(String(\"FREQ\"), Int64(r.Frequency))\n\t}\n\treturn b.doSimpleStringOK(\"RESTORE\", 0)\n}", "title": "" }, { "docid": "b8929de5705fbc971c4c10626f5a9446", "score": "0.49097767", "text": "func restore() (bool, error) {\n\t// Initialize storage engine\n\tstorage.Init()\n\n\t//\n\tif !setupComplete {\n\t\tvar tableErr int\n\t\tnow := time.Now()\n\t\ttable, tableErr = keystore.Restore(tableName)\n\t\tsince := time.Since(now).Seconds()\n\t\tif tableErr != 0 {\n\t\t\treturn false, errors.New(\"Fatal restore error: \" + strconv.Itoa(tableErr))\n\t\t} else if table.Size() == 0 {\n\t\t\treturn false, errors.New(\"Restored 0 entries! Skipping benchmarks...\")\n\t\t}\n\t\tfmt.Printf(\"Restore success! Took %v seconds to restore %v keys.\\n\", since, table.Size())\n\t\tsetupComplete = true\n\t\treturn true, nil\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "f12810a943150dea7a7b4b5d8230a4ec", "score": "0.49064827", "text": "func (in *Restore) DeepCopy() *Restore {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Restore)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "f12810a943150dea7a7b4b5d8230a4ec", "score": "0.49064827", "text": "func (in *Restore) DeepCopy() *Restore {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Restore)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "1a1d516154fb0cee6dd169f6c1df4196", "score": "0.49049515", "text": "func (tfs *TarFS) Restore() {\n\tfor i, f := range tfs.List {\n\t\tif f.Original != nil {\n\t\t\ttfs.List[i].Data = f.Original\n\t\t\ttfs.List[i].Original = nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "92092078b60da79ca3b05d36d8333801", "score": "0.49023354", "text": "func (o *ModelsDeploymentTargetCapabilities) SetRestore(v string) {\n\to.Restore = &v\n}", "title": "" }, { "docid": "385de41e960879dc9e52b65ff7122d05", "score": "0.49006826", "text": "func (b *DownloadBuilder) RestoreTimestamp(val time.Time) *DownloadBuilder {\n\tb.object.Spec.RestoreTimestamp = &metav1.Time{Time: val}\n\treturn b\n}", "title": "" } ]
f8b1837f4ee7e2a5e858ba013d02088a
SSL configuration for the MySQL connection.
[ { "docid": "9175d7f011cc63b5bf9c02acf5ba035a", "score": "0.5634312", "text": "func (o MysqlProfilePtrOutput) SslConfig() MysqlSslConfigPtrOutput {\n\treturn o.ApplyT(func(v *MysqlProfile) *MysqlSslConfig {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SslConfig\n\t}).(MysqlSslConfigPtrOutput)\n}", "title": "" } ]
[ { "docid": "32a6ced4200c3eb852736e404881f2a7", "score": "0.70963514", "text": "func (self *SSLDBConnector) Configure(opts options.ToolOptions) error {\n\n\tvar err error\n\tself.ctx, err = setupCtx(opts)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"openssl configuration: %v\", err)\n\t}\n\n\tvar flags openssl.DialFlags\n\tflags = 0\n\tif opts.SSLAllowInvalidCert || opts.SSLAllowInvalidHost {\n\t\tflags = openssl.InsecureSkipHostVerification\n\t}\n\t// create the dialer func that will be used to connect\n\tdialer := func(addr *mgo.ServerAddr) (net.Conn, error) {\n\t\tconn, err := openssl.Dial(\"tcp\", addr.String(), self.ctx, flags)\n\t\tif err != nil {\n\t\t\t// mgo discards dialer errors so log it now\n\t\t\tlog.Logvf(log.Always, \"error dialing %v: %v\", addr.String(), err)\n\t\t\treturn nil, err\n\t\t}\n\t\t// enable TCP keepalive\n\t\terr = util.EnableTCPKeepAlive(conn.UnderlyingConn(), time.Duration(opts.TCPKeepAliveSeconds)*time.Second)\n\t\tif err != nil {\n\t\t\t// mgo discards dialer errors so log it now\n\t\t\tlog.Logvf(log.Always, \"error enabling TCP keepalive on connection to %v: %v\", addr.String(), err)\n\t\t\tconn.Close()\n\t\t\treturn nil, err\n\t\t}\n\t\treturn conn, nil\n\t}\n\n\ttimeout := time.Duration(opts.Timeout) * time.Second\n\n\t// set up the dial info\n\tself.dialInfo = &mgo.DialInfo{\n\t\tTimeout: timeout,\n\t\tDirect: opts.Direct,\n\t\tReplicaSetName: opts.ReplicaSetName,\n\t\tDialServer: dialer,\n\t\tUsername: opts.Auth.Username,\n\t\tPassword: opts.Auth.Password,\n\t\tSource: opts.GetAuthenticationDatabase(),\n\t\tMechanism: opts.Auth.Mechanism,\n\t}\n\n\t// create or fetch the addresses to be used to connect\n\tif opts.URI != nil && opts.URI.ConnectionString != \"\" {\n\t\tself.dialInfo.Addrs = opts.URI.GetConnectionAddrs()\n\t} else {\n\t\tself.dialInfo.Addrs = util.CreateConnectionAddrs(opts.Host, opts.Port)\n\t}\n\tkerberos.AddKerberosOpts(opts, self.dialInfo)\n\treturn nil\n\n}", "title": "" }, { "docid": "52f2f8ec7fe2a19d2b1f1253f86f9473", "score": "0.6816591", "text": "func (c *PostgresConfig) SSLMode() string { return c.sslMode }", "title": "" }, { "docid": "aa89beb3642c82c4b0a02211dadaee4f", "score": "0.6639328", "text": "func (GWV *WebServer) ConfigSSL(port int, sslkey string, sslcert string, spdy bool) {\n\tGWV.secureport = port\n\tGWV.secureconf = append(GWV.secureconf, sslconf{sslkey: sslkey, sslcert: sslcert})\n\tGWV.spdy = spdy\n}", "title": "" }, { "docid": "8e66f2929f73447661acff66aa1b5c3e", "score": "0.6623241", "text": "func setupTLS() {\n // don't setup TLS if TLS toggle is disabled\n enableTLS := config.Get().GetBool(\"feature_toggles.enableTLS\")\n if !enableTLS {\n\tlog.Printf(\"feature is disabled toggle: %v\\n\", config.Get().GetBool(\"feature_toggles.enableTLS\"))\n return\n }\n\n // with TLS connection string must look like: ?charset=utf8&tls=kpcustom\n dbConnectString = dbConnectString + \"&tls=\" + tlsConfigName\n\n // setup TLS config (see https://godoc.org/github.com/go-sql-driver/mysql#RegisterTLSConfig)\n rootCertPool := x509.NewCertPool()\n caCert, err := ioutil.ReadFile(config.Get().GetString(\"certs.base_path\") + \"/\" + config.Get().GetString(\"certs.ca_cert_pem\"))\n if err != nil {\n // certificates are required, so fail fast\n panic(fmt.Sprintf(\"CA pem required:\\n%v\\n\", err))\n }\n if ok := rootCertPool.AppendCertsFromPEM(caCert); !ok {\n // something is wrong, so fail fast\n panic(fmt.Sprintf(\"Failed to append PEM:\\n%v\\n\", err))\n }\n\n clientCert := make([]tls.Certificate, 0, 1)\n certs, err := tls.LoadX509KeyPair(config.Get().GetString(\"certs.base_path\")+\"/\"+config.Get().GetString(\"certs.client_cert_pem\"),\n config.Get().GetString(\"certs.base_path\")+\"/\"+config.Get().GetString(\"certs.client_key_pem\"))\n\n if err != nil {\n // client cert key pair is required, so fail fast\n panic(fmt.Sprintf(\"Client certs required:\\n%v\\n\", err))\n }\n\n clientCert = append(clientCert, certs)\n\n // Note: Although we've registered better ciphers, the current version of mysql fails with `handshake failures` except for this cipher: tls.TLS_RSA_WITH_AES_256_GCM_SHA384\n mysql.RegisterTLSConfig(tlsConfigName, &tls.Config{\n RootCAs: rootCertPool,\n Certificates: clientCert,\n MinVersion: tls.VersionTLS12,\n CipherSuites: []uint16{\n tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,\n tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\n tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,\n tls.TLS_RSA_WITH_AES_256_GCM_SHA384,\n },\n ServerName: config.Get().GetString(\"certs.server_name\"),\n //InsecureSkipVerify: true,\n })\n}", "title": "" }, { "docid": "33c2fc1e93a02eccf42e7c9a0483e5ff", "score": "0.6419228", "text": "func WithSSL(keyStore, keyStorePassword, trustStore, trustStorePassword string) Option {\n\treturn func(config *connectionConfig) {\n\t\tconfig.keyStore = keyStore\n\t\tconfig.keyStorePassword = keyStorePassword\n\t\tconfig.trustStore = trustStore\n\t\tconfig.trustStorePassword = trustStorePassword\n\t}\n}", "title": "" }, { "docid": "cf7d710c131252ce6984b7bff9209ba2", "score": "0.6274616", "text": "func (a *Adaptor) UseSSL() bool { return a.useSSL }", "title": "" }, { "docid": "a2a0bce4ad73bf2d111bf524a6db8e4b", "score": "0.6129887", "text": "func (o MysqlProfileOutput) SslConfig() MysqlSslConfigPtrOutput {\n\treturn o.ApplyT(func(v MysqlProfile) *MysqlSslConfig { return v.SslConfig }).(MysqlSslConfigPtrOutput)\n}", "title": "" }, { "docid": "34165612936d567ae0b6cd57b7ce652a", "score": "0.61228657", "text": "func (c *Conn) UseSSL(insecureSkipVerify bool) {\n\tc.tlsConfig = &tls.Config{InsecureSkipVerify: insecureSkipVerify}\n}", "title": "" }, { "docid": "efdb8b0f8d6b98dc180a1f29592bfce1", "score": "0.6046822", "text": "func (s *PostgresScanner) DoSSL(sql *Connection) error {\n\tvar conn *zgrab2.TLSConnection\n\tvar err error\n\tif conn, err = s.Config.TLSFlags.GetTLSConnection(sql.Connection); err != nil {\n\t\treturn err\n\t}\n\tif err = conn.Handshake(); err != nil {\n\t\treturn err\n\t}\n\t// Replace sql.Connection to allow future calls to go over the secure connection\n\tsql.Connection = conn\n\treturn nil\n}", "title": "" }, { "docid": "408812af799d558f40b3be9d014ddb26", "score": "0.6015593", "text": "func (s *SingleUseConnector) handleSSL() error {\n\ttlsConf, err := ssl.NewDbSSLMode(\n\t\ts.connectionDetails.SSLOptions,\n\t\ttrue)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif !tlsConf.UseTLS {\n\t\treturn nil\n\t}\n\n\t// Start SSL Check\n\t/*\n\t * First determine if SSL is allowed by the backend. To do this, send an\n\t * SSL request. The response from the backend will be a single byte\n\t * message. If the value is 'S', then SSL connections are allowed and an\n\t * upgrade to the connection should be attempted. If the value is 'N',\n\t * then the backend does not support SSL connections.\n\t */\n\n\t/* Create the SSL request message. */\n\tmessage := protocol.NewMessageBuffer([]byte{})\n\tmessage.WriteInt32(8)\n\tmessage.WriteInt32(protocol.SSLRequestCode)\n\n\t/* Send the SSL request message. */\n\t_, err = s.backendConn.Write(message.Bytes())\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t/* Receive SSL response message. */\n\tresponse := make([]byte, 4096)\n\t_, err = s.backendConn.Read(response)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t/*\n\t * If SSL is not allowed by the backend then close the connection and\n\t * throw an error.\n\t */\n\tif len(response) > 0 && response[0] != 'S' {\n\t\ts.backendConn.Close()\n\t\treturn fmt.Errorf(\"the backend does not allow SSL connections\")\n\t}\n\t// End SSL Check\n\n\t// Accept renegotiation requests initiated by the backend.\n\t//\n\t// Renegotiation was deprecated then removed from PostgreSQL 9.5, but\n\t// the default configuration of older versions has it enabled. Redshift\n\t// also initiates renegotiations and cannot be reconfigured.\n\t// Switch to TLS\n\ts.backendConn, err = ssl.HandleSSLUpgrade(s.backendConn, tlsConf)\n\treturn err\n}", "title": "" }, { "docid": "7b69c1be26f9a2418bed91160537efab", "score": "0.60074383", "text": "func ApplySSLConfig() KafkaIngestionSpecOptions {\n\treturn func(spec *KafkaIngestionSpec) {\n\t\tspec.IOConfig.ConsumerProperties.SecurityProtocol = stringPointer(\"SSL\")\n\t\tspec.IOConfig.ConsumerProperties.SSLTruststoreType = stringPointer(\"PKCS12\")\n\t\tspec.IOConfig.ConsumerProperties.SSLEnabledProtocols = stringPointer(\"TLSv1.2\")\n\t\tspec.IOConfig.ConsumerProperties.SSLTruststoreLocation = stringPointer(\"/var/private/ssl/truststore.p12\")\n\t\tspec.IOConfig.ConsumerProperties.SSLTruststorePassword = &PasswordProvider{\n\t\t\tType: \"environment\",\n\t\t\tVariable: \"DRUID_TRUSTSTORE_PASSWORD\",\n\t\t}\n\t\tspec.IOConfig.ConsumerProperties.SSLKeystoreLocation = stringPointer(\"/var/private/ssl/keystore.p12\")\n\t\tspec.IOConfig.ConsumerProperties.SSLKeystorePassword = &PasswordProvider{\n\t\t\tType: \"environment\",\n\t\t\tVariable: \"DRUID_KEYSTORE_PASSWORD\",\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fc6d954b4d92475998210ef525c135ea", "score": "0.5941578", "text": "func (a *Adaptor) SetUseSSL(val bool) { a.useSSL = val }", "title": "" }, { "docid": "a26a24cb584a29df18effb2b0be2d5c0", "score": "0.587598", "text": "func (s *CloudSQL) RequireSSL(ctx context.Context, projectID string, instance string) error {\n\top, err := s.client.PatchInstance(ctx, projectID, instance, &sqladmin.DatabaseInstance{\n\t\tName: instance,\n\t\tProject: projectID,\n\t\tSettings: &sqladmin.Settings{\n\t\t\tIpConfiguration: &sqladmin.IpConfiguration{\n\t\t\t\tRequireSsl: true,\n\t\t\t},\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := s.wait(projectID, op); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "345f62645ec58ff06c0d6d1fc70f6145", "score": "0.58446646", "text": "func (o MysqlProfileResponseOutput) SslConfig() MysqlSslConfigResponseOutput {\n\treturn o.ApplyT(func(v MysqlProfileResponse) MysqlSslConfigResponse { return v.SslConfig }).(MysqlSslConfigResponseOutput)\n}", "title": "" }, { "docid": "cae6837a11a5d95ccb62b819a0e5fdcc", "score": "0.58319694", "text": "func (cp *ConnParams) EnableSSL() {\n\tcp.Flags |= CapabilityClientSSL\n}", "title": "" }, { "docid": "6bac691b3e165d20b560b6d85f04274b", "score": "0.5811634", "text": "func TestSSLConnection(t *testing.T) {\n\tmaybeSkipSSLTests(t)\n\t// Environment sanity check: should fail without SSL\n\tcheckSSLSetup(t, \"sslmode=disable user=pqgossltest\")\n\n\tdb, err := openSSLConn(t, \"sslmode=require user=pqgossltest\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\trows, err := db.Query(\"SELECT 1\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\trows.Close()\n}", "title": "" }, { "docid": "16bd7026df8cc9528bdda2c747d95a1a", "score": "0.5807114", "text": "func (o ConnectionProfileMysqlProfileOutput) SslConfig() ConnectionProfileMysqlProfileSslConfigPtrOutput {\n\treturn o.ApplyT(func(v ConnectionProfileMysqlProfile) *ConnectionProfileMysqlProfileSslConfig { return v.SslConfig }).(ConnectionProfileMysqlProfileSslConfigPtrOutput)\n}", "title": "" }, { "docid": "ee588f9dc3b7a8cc07cff8d5011b078f", "score": "0.58014125", "text": "func configureTLS(tlsConfig *tls.Config) {\n}", "title": "" }, { "docid": "160b614e600d8e60bec29bae3180b884", "score": "0.57887733", "text": "func (o GetDatabaseInstanceSettingIpConfigurationOutput) RequireSsl() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v GetDatabaseInstanceSettingIpConfiguration) bool { return v.RequireSsl }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "a12f6f02b24f97d8c6361dac16e73ba1", "score": "0.57677525", "text": "func addSSL(d *mgo.DialInfo, SslInsecureSkipVerify bool, SslCaCerts string) {\n\ttlsConfig := &tls.Config{\n\t\tInsecureSkipVerify: SslInsecureSkipVerify,\n\t}\n\n\t// If the user has defined a CA certificate file\n\tif SslCaCerts != \"\" {\n\t\troots := x509.NewCertPool()\n\n\t\tif ca, err := ioutil.ReadFile(SslCaCerts); err != nil {\n\t\t\tlog.Error(\"Failed to open SSL CA Certs file: %v\", err)\n\t\t} else if !roots.AppendCertsFromPEM(ca) {\n\t\t\tlog.Warn(\"No certificates were found in SSL CA certs file: %s\", SslCaCerts)\n\t\t} else {\n\t\t\ttlsConfig.RootCAs = roots\n\t\t}\n\t}\n\n\t// Use TLS to dial the server\n\td.DialServer = func(addr *mgo.ServerAddr) (net.Conn, error) {\n\t\tconn, err := tls.Dial(\"tcp\", addr.String(), tlsConfig)\n\t\treturn conn, err\n\t}\n}", "title": "" }, { "docid": "b91a2eb8198a247688e3da2aaf5411d1", "score": "0.5725367", "text": "func (g *GenericDatabaseInitializer) getEnableHTTPS() string {\n\tif strings.HasPrefix(g.Vdb.Spec.Communal.Endpoint, \"https://\") {\n\t\treturn \"1\"\n\t}\n\treturn \"0\"\n}", "title": "" }, { "docid": "9461a4937e6261d869f5cf18a7875bf2", "score": "0.5683485", "text": "func (c *cluster) SSL() SSL {\n\treturn c.ssl\n}", "title": "" }, { "docid": "ac3bb9a307b8760dfddecfdade1fb529", "score": "0.5639007", "text": "func (s Checker) isSSL() bool {\n\treturn s.SSL\n}", "title": "" }, { "docid": "a32014e4b137c4bffaf0492eca6ff8aa", "score": "0.563395", "text": "func (o ConnectionProfileCloudsqlSettingsIpConfigOutput) RequireSsl() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v ConnectionProfileCloudsqlSettingsIpConfig) *bool { return v.RequireSsl }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "a9499431f8a4599a352d35d5e83123c5", "score": "0.56192225", "text": "func (c *config) prodcutionConfig() {\n\tif c.DBSslMode == \"\" {\n\t\tc.DBSslMode = \"enabled\"\n\t}\n\tc.DSN = fmt.Sprintf(\"host=%s dbname=%s port=%s timezone=%s user=%s password=%s sslmode=%s\", c.DBHost, c.DBName, c.DBPort, c.DBTimeZone, c.DBUser, c.DBPassword, c.DBSslMode)\n\tc.Debug = false\n\n}", "title": "" }, { "docid": "2d5b4fdc9628de91dbeaadae597392af", "score": "0.56027204", "text": "func getConnStr() string {\n\treturn fmt.Sprintf(\"host=%s port=%d user=%s password=%s dbname=%s sslmode=disable\",\n\t\thost, port, user, password, dbName)\n}", "title": "" }, { "docid": "ce104f0a7099e6bb67928fe6816b2d48", "score": "0.5574884", "text": "func SSLMode(mode string) Option {\n\treturn func(options *ClientOptions) error {\n\t\toptions.SSLMode = mode\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "36f63d47b253bd0790a55b0983ca860a", "score": "0.5573007", "text": "func getConnectorTLSConfig(insecure bool, clientCertFile string, clientKeyFile string, caFile string) (*tls.Config, error) {\n\ttlsConfig := tls.Config{InsecureSkipVerify: insecure}\n\n\tif len(clientCertFile) > 0 {\n\t\tif len(clientKeyFile) == 0 {\n\t\t\treturn nil, fmt.Errorf(\"Please provide key file for client certificate\")\n\t\t}\n\n\t\tcert, err := tls.LoadX509KeyPair(clientCertFile, clientKeyFile)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Failed to load client cert/key pair: %v\", err)\n\t\t}\n\n\t\ttlsConfig.Certificates = []tls.Certificate{cert}\n\t}\n\n\tif len(caFile) > 0 {\n\t\tcaCert, err := os.ReadFile(caFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcaCertPool := x509.NewCertPool()\n\t\tcaCertPool.AppendCertsFromPEM(caCert)\n\n\t\ttlsConfig.RootCAs = caCertPool\n\t}\n\n\ttlsConfig.BuildNameToCertificate()\n\n\treturn &tlsConfig, nil\n}", "title": "" }, { "docid": "0c423f3b5b6959602bd41527630855de", "score": "0.5561396", "text": "func configureTLS(tlsConfig *tls.Config) {\n // Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "499c4610335f536ade630c18ad17708e", "score": "0.55301064", "text": "func (o ConnectionProfileMysqlOutput) Ssl() ConnectionProfileMysqlSslPtrOutput {\n\treturn o.ApplyT(func(v ConnectionProfileMysql) *ConnectionProfileMysqlSsl { return v.Ssl }).(ConnectionProfileMysqlSslPtrOutput)\n}", "title": "" }, { "docid": "3151f0a70c6c0c0ee1e250e5673c4a81", "score": "0.5512554", "text": "func (GWV *WebServer) ConfigSSLAddCert(sslkey, sslcert string) {\n\tGWV.secureconf = append(GWV.secureconf, sslconf{sslkey: sslkey, sslcert: sslcert})\n}", "title": "" }, { "docid": "6cacc5dbf5ee914c8c210cbbb2674458", "score": "0.5512138", "text": "func (m *AndroidEasEmailProfileConfiguration) SetRequireSsl(value *bool)() {\n err := m.GetBackingStore().Set(\"requireSsl\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "377889841cd631addf234bec46902245", "score": "0.550462", "text": "func (a *Auth) GetTLSConfig(ctx context.Context, sessionCtx *Session) (*tls.Config, error) {\n\taddr, err := utils.ParseAddr(sessionCtx.Server.GetURI())\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\ttlsConfig := &tls.Config{\n\t\tServerName: addr.Host(),\n\t\tRootCAs: x509.NewCertPool(),\n\t}\n\t// Add CA certificate to the trusted pool if it's present, e.g. when\n\t// connecting to RDS/Aurora which require AWS CA.\n\tif len(sessionCtx.Server.GetCA()) != 0 {\n\t\tif !tlsConfig.RootCAs.AppendCertsFromPEM(sessionCtx.Server.GetCA()) {\n\t\t\treturn nil, trace.BadParameter(\"invalid server CA certificate\")\n\t\t}\n\t} else if sessionCtx.Server.IsRDS() {\n\t\tif rdsCA, ok := a.cfg.RDSCACerts[sessionCtx.Server.GetRegion()]; ok {\n\t\t\tif !tlsConfig.RootCAs.AppendCertsFromPEM(rdsCA) {\n\t\t\t\treturn nil, trace.BadParameter(\"invalid RDS CA certificate\")\n\t\t\t}\n\t\t} else {\n\t\t\ta.cfg.Log.Warnf(\"No RDS CA certificate for %v.\", sessionCtx.Server)\n\t\t}\n\t}\n\t// RDS/Aurora auth is done via an auth token so don't generate a client\n\t// certificate and exit here.\n\tif sessionCtx.Server.IsRDS() {\n\t\treturn tlsConfig, nil\n\t}\n\t// Otherwise, when connecting to an onprem database, generate a client\n\t// certificate. The database instance should be configured with\n\t// Teleport's CA obtained with 'tctl auth sign --type=db'.\n\tcert, cas, err := a.getClientCert(ctx, sessionCtx)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\ttlsConfig.Certificates = []tls.Certificate{*cert}\n\tfor _, ca := range cas {\n\t\tif !tlsConfig.RootCAs.AppendCertsFromPEM(ca) {\n\t\t\treturn nil, trace.BadParameter(\"failed to append CA certificate to the pool\")\n\t\t}\n\t}\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "a138591e89875e3ce159690072e8c3cc", "score": "0.5467753", "text": "func (c *ClientOptions) SetSSL(ssl *SSLOpt) *ClientOptions {\n\tc.ConnString.SSL = ssl.Enabled\n\tc.ConnString.SSLSet = true\n\n\tc.ConnString.SSLClientCertificateKeyFile = ssl.ClientCertificateKeyFile\n\tc.ConnString.SSLClientCertificateKeyFileSet = true\n\n\tc.ConnString.SSLClientCertificateKeyPassword = ssl.ClientCertificateKeyPassword\n\tc.ConnString.SSLClientCertificateKeyPasswordSet = true\n\n\tc.ConnString.SSLInsecure = ssl.Insecure\n\tc.ConnString.SSLInsecureSet = true\n\n\tc.ConnString.SSLCaFile = ssl.CaFile\n\tc.ConnString.SSLCaFileSet = true\n\n\treturn c\n}", "title": "" }, { "docid": "f62689bc0d0cb13b3bf2378538755195", "score": "0.5466449", "text": "func (a *dbAuth) getTLSConfigVerifyFull(ctx context.Context, sessionCtx *Session) (*tls.Config, error) {\n\ttlsConfig := &tls.Config{}\n\n\t// Add CA certificate to the trusted pool if it's present, e.g. when\n\t// connecting to RDS/Aurora which require AWS CA or when was provided in config file.\n\t//\n\t// Some databases may also require the system cert pool, e.g Azure Redis.\n\tif err := setupTLSConfigRootCAs(tlsConfig, sessionCtx); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\t// You connect to Cloud SQL instances by IP and the certificate presented\n\t// by the instance does not contain IP SANs so the default \"full\" certificate\n\t// verification will always fail.\n\t//\n\t// In the docs they recommend disabling hostname verification when connecting\n\t// e.g. with psql (verify-ca mode) reasoning that it's not required since\n\t// CA is instance-specific:\n\t// https://cloud.google.com/sql/docs/postgres/connect-admin-ip\n\t//\n\t// They do encode <project-id>:<instance-id> in the CN field, which also\n\t// wouldn't validate by default since CN has been deprecated and server\n\t// name verification ignores it starting from Go 1.15.\n\t//\n\t// For this reason we're setting ServerName to <project-id>:<instance-id>,\n\t// disabling default certificate verification and validating it ourselves.\n\t//\n\t// See the following Go issue for more context:\n\t// https://github.com/golang/go/issues/40748\n\tif sessionCtx.Database.IsCloudSQL() {\n\t\t// Cloud SQL server presented certificates encode instance names as\n\t\t// \"<project-id>:<instance-id>\" in CommonName. This is verified against\n\t\t// the ServerName in a custom connection verification step (see below).\n\t\ttlsConfig.ServerName = sessionCtx.Database.GetGCP().GetServerName()\n\t\t// This just disables default verification.\n\t\ttlsConfig.InsecureSkipVerify = true\n\t\t// This will verify CN and cert chain on each connection.\n\t\ttlsConfig.VerifyConnection = getVerifyCloudSQLCertificate(tlsConfig.RootCAs)\n\t}\n\n\t// Setup server name for verification.\n\tif err := setupTLSConfigServerName(tlsConfig, sessionCtx); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\t// RDS/Aurora/Redshift/ElastiCache and Cloud SQL auth is done with an auth\n\t// token so don't generate a client certificate and exit here.\n\tif sessionCtx.Database.IsCloudHosted() {\n\t\treturn tlsConfig, nil\n\t}\n\n\t// MongoDB Atlas doesn't not require client certificates if is using AWS\n\t// authentication.\n\tif awsutils.IsRoleARN(sessionCtx.DatabaseUser) && sessionCtx.Database.GetType() == types.DatabaseTypeMongoAtlas {\n\t\treturn tlsConfig, nil\n\t}\n\n\t// Otherwise, when connecting to an onprem database, generate a client\n\t// certificate. The database instance should be configured with\n\t// Teleport's CA obtained with 'tctl auth sign --type=db'.\n\treturn a.appendClientCert(ctx, sessionCtx, tlsConfig)\n}", "title": "" }, { "docid": "795653e8a4e6f3f07506854d57e59bcc", "score": "0.5445614", "text": "func (o DatabaseInstanceSettingsIpConfigurationOutput) RequireSsl() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v DatabaseInstanceSettingsIpConfiguration) *bool { return v.RequireSsl }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "5d58364de7e642b10541e98245c3bc69", "score": "0.5407649", "text": "func getSSLMode() string {\n\tif os.Getenv(\"GO_ENV\") == \"local\" {\n\t\treturn \"sslmode=disable\"\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "974601513e17d3b3b732b7896983da51", "score": "0.5404957", "text": "func (i *dbInstance) fetchConfig(ctx context.Context) error {\n\t// TODO(cbro): implement retries.\n\tdbConfig, err := i.client.api.Instances.Get(i.project, i.name).Context(ctx).Do()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// TODO(cbro): verify region, SECOND_GEN, presence of IP address, etc.\n\tserverCert, err := parseCert(dbConfig.ServerCaCert.Cert)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not parse server cert: %v\", err)\n\t}\n\tserverCerts := x509.NewCertPool()\n\tserverCerts.AddCert(serverCert)\n\n\t// TODO(cbro): implement retries.\n\tcertResp, err := i.client.api.SslCerts.CreateEphemeral(i.project, i.name, &sqladmin.SslCertsCreateEphemeralRequest{\n\t\tPublicKey: i.client.publicKeyPem,\n\t}).Context(ctx).Do()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tclientCert, err := parseCert(certResp.Cert)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not parse client cert: %v\", err)\n\t}\n\n\tserverName := i.project + \":\" + i.name\n\ttlsConfig := &tls.Config{\n\t\tCertificates: []tls.Certificate{\n\t\t\t{\n\t\t\t\tCertificate: [][]byte{clientCert.Raw},\n\t\t\t\tPrivateKey: i.client.privateKey,\n\t\t\t\tLeaf: clientCert,\n\t\t\t},\n\t\t},\n\t\tRootCAs: serverCerts,\n\n\t\t// We need to set InsecureSkipVerify to true due to\n\t\t// https://github.com/GoogleCloudPlatform/cloudsql-proxy/issues/194\n\t\t// https://tip.golang.org/doc/go1.11#crypto/x509\n\t\t//\n\t\t// Since we have a secure channel to the Cloud SQL API which we use to retrieve the\n\t\t// certificates, we instead need to implement our own VerifyPeerCertificate function\n\t\t// that will verify that the certificate is OK.\n\t\tInsecureSkipVerify: true,\n\t\tVerifyPeerCertificate: func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {\n\t\t\tif len(rawCerts) == 0 {\n\t\t\t\treturn errors.New(\"need cert\")\n\t\t\t}\n\t\t\tcert, err := x509.ParseCertificate(rawCerts[0])\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"VerifyPeerCertificate: %v\", err)\n\t\t\t}\n\t\t\tif _, err = cert.Verify(x509.VerifyOptions{Roots: serverCerts}); err != nil {\n\t\t\t\treturn fmt.Errorf(\"Verify: %v\", err)\n\t\t\t}\n\t\t\tif cert.Subject.CommonName != serverName {\n\t\t\t\treturn fmt.Errorf(\"certificate had CN %q, expected %q\", cert.Subject.CommonName, serverName)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\n\ti.dbConfig = dbConfig\n\ti.tlsConfig = tlsConfig\n\ti.expires = clientCert.NotAfter\n\treturn nil\n}", "title": "" }, { "docid": "752919c7b0c903d34f9bd13b7c201374", "score": "0.53975576", "text": "func SecureConn(conf *config.Config) ([]grpc.ServerOption, error) {\n\tif conf.IPTService.TLS.Enabled {\n\t\tlog.Info().Msgf(\"Conf cert-file: %s, cert-key: %s ca: %s\", conf.IPTService.TLS.CertFile, conf.IPTService.TLS.CertKey, conf.IPTService.TLS.CAFile)\n\t\tcreds, err := GetCreds(*conf)\n\n\t\tif err != nil {\n\t\t\treturn []grpc.ServerOption{}, errors.New(\"Error on retrieving certificates: \" + err.Error())\n\t\t}\n\t\tlog.Printf(\"Server is running in secure mode !\")\n\t\treturn []grpc.ServerOption{grpc.Creds(creds)}, nil\n\t}\n\treturn []grpc.ServerOption{}, nil\n}", "title": "" }, { "docid": "ac5c5d9ac32224a92663700af436f522", "score": "0.53951865", "text": "func (m *Model) SSL() string {\n\treturn m.ssl\n}", "title": "" }, { "docid": "d6e00158c3ca38698a00403b030f912e", "score": "0.53609866", "text": "func WithHTTPS() Option {\n\treturn func(p *Config) { p.scheme = \"https\" }\n}", "title": "" }, { "docid": "43efdf22dfa972de3c3965f99802b905", "score": "0.53566754", "text": "func (db *MysqlDatabase) Config(\n\tuname string,\n\tpasswd string,\n\thost string,\n\tport string,\n\tdatabase string,\n\tcharset string) (err error) {\n\tdb.connStr = uname + \":\" + passwd + \"@tcp(\" + host + \":\" + port + \")/\" + database + \"?charset=\" + charset\n\tdbo, err = sql.Open(\"mysql\", db.connStr)\n\tif err != nil {\n\t\tdbo = nil\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7d9e0afbe5a028639aa672959e972479", "score": "0.53480726", "text": "func main() {\n\tdataSourceName := \"host=postgresql.example.com port=5432 sslmode=disable user=postgres password=postgres dbname=postgres\"\n\tdataSourceNameSsl := strings.Replace(dataSourceName, \"sslmode=disable\", \"sslmode=verify-full\", -1)\n\n\tfmt.Println(\"PostgreSQL Version:\")\n\tfmt.Println(sqlExecuteScalar(dataSourceName, \"select version()\"))\n\n\tfmt.Println(\"PostgreSQL Version:\")\n\tfmt.Println(sqlExecuteScalar(dataSourceName, \"show server_version\"))\n\n\tfmt.Println(\"PostgreSQL User Name (postgres; username/password credentials; non-encrypted TCP/IP connection):\")\n\tfmt.Println(sqlExecuteScalar(dataSourceName, \"select current_user\"))\n\n\tfmt.Println(\"Is this PostgreSQL connection encrypted? (postgres; username/password credentials; non-encrypted TCP/IP connection):\")\n\tfmt.Println(sqlExecuteScalar(dataSourceName, \"select case when ssl then concat('YES (', version, ')') else 'NO' end as ssl from pg_stat_ssl where pid=pg_backend_pid()\"))\n\n\tfmt.Println(\"Is this PostgreSQL connection encrypted? (postgres; username/password credentials; encrypted TCP/IP connection):\")\n\tfmt.Println(sqlExecuteScalar(dataSourceNameSsl, \"select case when ssl then concat('YES (', version, ')') else 'NO' end as ssl from pg_stat_ssl where pid=pg_backend_pid()\"))\n}", "title": "" }, { "docid": "17cdc70516e18e0bc5f58cbc039268f2", "score": "0.53430957", "text": "func initTLSConfig(props *utils.SortedProperties) (*tls.Config, types.TGError) {\n\tlogger.Log(fmt.Sprint(\"======> Entering SSLChannel:initTLSConfig\"))\n\n\t// Load System certificate\n\trootCertPool, err := x509.SystemCertPool()\n\tif err != nil {\n\t\terrMsg := fmt.Sprint(\"ERROR: Returning SSLChannel::initTLSConfig Failed to read system certificate pool\")\n\t\tlogger.Error(errMsg)\n\t\treturn nil, exception.GetErrorByType(types.TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, err.Error())\n\t}\n\n\t//sysTrustFile := fmt.Sprintf(\"%s%slib%ssecurity%scacerts\", os.Getenv(\"JRE_HOME\"), string(os.PathSeparator), string(os.PathSeparator), string(os.PathSeparator))\n\t//logger.Debug(fmt.Sprintf(\"======> Inside SSLChannel:initTLSConfig about to ReadFile '%+v'\", sysTrustFile))\n\t//pem, err := ioutil.ReadFile(sysTrustFile)\n\t//if err != nil {\n\t//\terrMsg := fmt.Sprintf(\"ERROR: Returning SSLChannel::initTLSConfig Failed to read client certificate authority: %s\", sysTrustFile)\n\t//\tlogger.Error(errMsg)\n\t//\treturn nil, exception.GetErrorByType(types.TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, err.Error())\n\t//}\n\n\tcertPool := x509.NewCertPool()\n\tclientCertificates := make([]tls.Certificate, 0)\n\n\t//logger.Debug(fmt.Sprint(\"======> Inside SSLChannel:initTLSConfig about to add system certificate to certificate pool\"))\n\t//if !certPool.AppendCertsFromPEM(pem) {\n\t//\terrMsg := fmt.Sprintf(\"ERROR: Returning SSLChannel::initTLSConfig Can't parse client certificate data from '%s\", sysTrustFile)\n\t//\tlogger.Error(errMsg)\n\t//\t//return nil, exception.GetErrorByType(types.TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, \"\")\n\t//}\n\n\t// Load the user defined certificates.\n\ttrustedCerts := props.GetProperty(utils.GetConfigFromKey(utils.TlsTrustedCertificates), \"\")\n\tif trustedCerts == \"\" {\n\t\terrMsg := fmt.Sprint(\"WARNING: Returning SSLChannel::initTLSConfig There are no user defined certificates\")\n\t\tlogger.Warning(errMsg)\n\t\t//return nil, nil\n\t} else {\n\t\tuserCertificateFilePaths := strings.Split(trustedCerts, \",\")\n\t\tfor _, userCertFile := range userCertificateFilePaths {\n\t\t\tuserCertData, err := ioutil.ReadFile(userCertFile)\n\t\t\tif err != nil {\n\t\t\t\terrMsg := fmt.Sprintf(\"ERROR: Returning SSLChannel::initTLSConfig Failed to read user certificate file: %s\", userCertFile)\n\t\t\t\tlogger.Error(errMsg)\n\t\t\t\treturn nil, exception.GetErrorByType(types.TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, err.Error())\n\t\t\t}\n\t\t\tif !certPool.AppendCertsFromPEM(userCertData) {\n\t\t\t\terrMsg := fmt.Sprintf(\"ERROR: Returning SSLChannel::initTLSConfig Can't parse client certificate data from '%s\", userCertFile)\n\t\t\t\tlogger.Error(errMsg)\n\t\t\t\treturn nil, exception.GetErrorByType(types.TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, \"\")\n\t\t\t}\n\t\t\tclientCertificates = append(clientCertificates)\n\t\t}\n\t}\n\n\ttlsConfig := &tls.Config{\n\t\tCertificates: clientCertificates,\n\t\tClientAuth: tls.RequireAndVerifyClientCert,\n\t\tClientCAs: certPool,\n\t\tInsecureSkipVerify: false,\n\t\tRand: rand.Reader,\n\t\tRootCAs: rootCertPool,\n\t}\n\t// TODO: This list may change if GO Language supports more or different - Ref. https://golang.org/pkg/crypto/tls/\n\t// TODO: Revisit later to find out if there is any API in GO to get this as a list.\n\tsuites := []uint16{\n\t\t// TLS 1.0 - 1.2 cipher suites.\n\t\ttls.TLS_RSA_WITH_RC4_128_SHA,\n\t\ttls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,\n\t\ttls.TLS_RSA_WITH_AES_128_CBC_SHA,\n\t\ttls.TLS_RSA_WITH_AES_256_CBC_SHA,\n\t\ttls.TLS_RSA_WITH_AES_128_CBC_SHA256,\n\t\ttls.TLS_RSA_WITH_AES_128_GCM_SHA256,\n\t\ttls.TLS_RSA_WITH_AES_256_GCM_SHA384,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_RC4_128_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,\n\t\ttls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,\n\t\t// TLS 1.3 cipher suites.\n\t\t//tls.TLS_AES_128_GCM_SHA256,\n\t\t//tls.TLS_AES_256_GCM_SHA384,\n\t\t//tls.TLS_CHACHA20_POLY1305_SHA256,\n\t\t// TLS_FALLBACK_SCSV isn't a standard cipher suite but an indicator\n\t\t// that the client is doing version fallback. See RFC 7507.\n\t\ttls.TLS_FALLBACK_SCSV,\n\t}\n\tsupportedSuites := FilterSuitesById(suites)\n\ttlsConfig.CipherSuites = supportedSuites\n\n\tlogger.Log(fmt.Sprint(\"======> Returning SSLChannel:initTLSConfig\"))\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "565f9ece6bc761ae3068425447e30d5b", "score": "0.53346145", "text": "func (o ConnectionProfileMysqlPtrOutput) Ssl() ConnectionProfileMysqlSslPtrOutput {\n\treturn o.ApplyT(func(v *ConnectionProfileMysql) *ConnectionProfileMysqlSsl {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Ssl\n\t}).(ConnectionProfileMysqlSslPtrOutput)\n}", "title": "" }, { "docid": "6768938ada9beaeede4c5c7a872a5a78", "score": "0.53341943", "text": "func (o ConnectionProfileMysqlProfilePtrOutput) SslConfig() ConnectionProfileMysqlProfileSslConfigPtrOutput {\n\treturn o.ApplyT(func(v *ConnectionProfileMysqlProfile) *ConnectionProfileMysqlProfileSslConfig {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SslConfig\n\t}).(ConnectionProfileMysqlProfileSslConfigPtrOutput)\n}", "title": "" }, { "docid": "06d20f737b75ed9d438f4e3cb729fc19", "score": "0.5332673", "text": "func (a *dbAuth) getTLSConfigInsecure(ctx context.Context, sessionCtx *Session) (*tls.Config, error) {\n\ttlsConfig, err := a.getTLSConfigVerifyFull(ctx, sessionCtx)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\t// Accept any certificate provided by database.\n\ttlsConfig.InsecureSkipVerify = true\n\t// Remove certificate validation if set.\n\ttlsConfig.VerifyConnection = nil\n\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "9b8a4f633e199072e60d8efaab478a08", "score": "0.53142726", "text": "func LDAPUseSSL() bool {\n\treturn loadedConfig.LDAPConfig.UseSSL\n}", "title": "" }, { "docid": "4b5aba9829907170b1c5beb3b4469511", "score": "0.530035", "text": "func setupTLSConfigServerName(tlsConfig *tls.Config, sessionCtx *Session) error {\n\t// Use user provided server name if set. Override the current value if needed.\n\tif dbTLSConfig := sessionCtx.Database.GetTLS(); dbTLSConfig.ServerName != \"\" {\n\t\ttlsConfig.ServerName = dbTLSConfig.ServerName\n\t\treturn nil\n\t}\n\n\t// If server name is set prior to this function, use that.\n\tif tlsConfig.ServerName != \"\" {\n\t\treturn nil\n\t}\n\n\tswitch sessionCtx.Database.GetProtocol() {\n\tcase defaults.ProtocolMongoDB:\n\t\t// Don't set the ServerName when connecting to a MongoDB cluster - in case\n\t\t// of replica set the driver may dial multiple servers and will set\n\t\t// ServerName itself.\n\t\treturn nil\n\tcase defaults.ProtocolDynamoDB:\n\t\t// Don't set the server name for DynamoDB - the engine may dial different endpoints\n\t\t// based on the client request and will set ServerName itself.\n\t\treturn nil\n\tcase defaults.ProtocolRedis:\n\t\t// Azure Redis servers always serve the certificates with the proper\n\t\t// hostnames. However, OSS cluster mode may redirect to an IP address,\n\t\t// and without correct ServerName the handshake will fail as the IPs\n\t\t// are not in SANs.\n\t\tif sessionCtx.Database.IsAzure() {\n\t\t\tserverName, err := azureutils.GetHostFromRedisURI(sessionCtx.Database.GetURI())\n\t\t\tif err != nil {\n\t\t\t\treturn trace.Wrap(err)\n\t\t\t}\n\n\t\t\ttlsConfig.ServerName = serverName\n\t\t\treturn nil\n\t\t}\n\n\t\t// Redis is using custom URI schema.\n\t\treturn nil\n\tcase defaults.ProtocolClickHouse, defaults.ProtocolClickHouseHTTP:\n\t\tu, err := url.Parse(sessionCtx.Database.GetURI())\n\t\tif err != nil {\n\t\t\treturn trace.Wrap(err)\n\t\t}\n\t\taddr, err := utils.ParseAddr(u.Host)\n\t\tif err != nil {\n\t\t\treturn trace.Wrap(err)\n\t\t}\n\t\ttlsConfig.ServerName = addr.Host()\n\t\treturn nil\n\tdefault:\n\t\t// For other databases we're always connecting to the server specified\n\t\t// in URI so set ServerName ourselves.\n\t\taddr, err := utils.ParseAddr(sessionCtx.Database.GetURI())\n\t\tif err != nil {\n\t\t\treturn trace.Wrap(err)\n\t\t}\n\t\ttlsConfig.ServerName = addr.Host()\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "91d90a93190c001baa7cbda8437f4c62", "score": "0.5299344", "text": "func AddTLSConfigToURI(uri string) string {\n\tcaFile := os.Getenv(\"MONGO_GO_DRIVER_CA_FILE\")\n\tif len(caFile) == 0 {\n\t\treturn uri\n\t}\n\n\treturn AddOptionsToURI(uri, \"ssl=true&sslCertificateAuthorityFile=\", caFile)\n}", "title": "" }, { "docid": "cad5c68a6299a0799f1c8e117221b1a9", "score": "0.5273189", "text": "func init() {\n\tusername := \"knifpeviokvltf\"\n\tpassword := \"7d75ad000e2f5aca266780785f2839e142cc3d277ba8b45aca5bd69aa685063c\"\n\tdbName := \"d5bqhoj50lgam1\"\n\tdbHost := \"ec2-107-22-160-102.compute-1.amazonaws.com\"\n\tdbPort := \"5432\"\n\tDbUri = fmt.Sprintf(\"host=%s port=%s user=%s dbname=%s sslmode=disable password=%s\", dbHost, dbPort, username, dbName, password)\n}", "title": "" }, { "docid": "8a00c97f5f42a1eee789158e3d970e9c", "score": "0.5259396", "text": "func (l *networkListener) Config(certInfo *cert.Info) {\n\tconfig := cert.ServerTLSConfig(certInfo, l.logger)\n\n\tl.mutex.Lock()\n\tdefer l.mutex.Unlock()\n\n\tl.config = config\n}", "title": "" }, { "docid": "18e00fc31a80df33c5be147540256290", "score": "0.52469957", "text": "func initTLSConfig(props *SortedProperties) (*tls.Config, tgdb.TGError) {\n\tif logger.IsDebug() {\n\t\tlogger.Debug(fmt.Sprint(\"======> Entering SSLChannel:initTLSConfig\"))\n\t}\n\n\t// Load System certificate\n\trootCertPool, err := x509.SystemCertPool()\n\tif err != nil {\n\t\terrMsg := fmt.Sprint(\"ERROR: Returning SSLChannel::initTLSConfig Failed to read system certificate pool\")\n\t\tlogger.Error(errMsg)\n\t\treturn nil, GetErrorByType(TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, err.Error())\n\t}\n\n\t//sysTrustFile := fmt.Sprintf(\"%s%slib%ssecurity%scacerts\", os.Getenv(\"JRE_HOME\"), string(os.PathSeparator), string(os.PathSeparator), string(os.PathSeparator))\n\t//logger.Debug(fmt.Sprintf(\"======> Inside SSLChannel:initTLSConfig about to ReadFile '%+v'\", sysTrustFile))\n\t//pem, err := ioutil.ReadFile(sysTrustFile)\n\t//if err != nil {\n\t//\terrMsg := fmt.Sprintf(\"ERROR: Returning SSLChannel::initTLSConfig Failed to read client certificate authority: %s\", sysTrustFile)\n\t//\tlogger.Error(errMsg)\n\t//\treturn nil, exception.GetErrorByType(types.TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, err.Error())\n\t//}\n\n\tcertPool := x509.NewCertPool()\n\tclientCertificates := make([]tls.Certificate, 0)\n\n\t//logger.Debug(fmt.Sprint(\"======> Inside SSLChannel:initTLSConfig about to add system certificate to certificate pool\"))\n\t//if !certPool.AppendCertsFromPEM(pem) {\n\t//\terrMsg := fmt.Sprintf(\"ERROR: Returning SSLChannel::initTLSConfig Can't parse client certificate data from '%s\", sysTrustFile)\n\t//\tlogger.Error(errMsg)\n\t//\t//return nil, exception.GetErrorByType(types.TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, \"\")\n\t//}\n\n\t// Load the user defined certificates.\n\ttrustedCerts := props.GetProperty(GetConfigFromKey(TlsTrustedCertificates), \"\")\n\tif trustedCerts == \"\" {\n\t\terrMsg := fmt.Sprint(\"WARNING: Returning SSLChannel::initTLSConfig There are no user defined certificates\")\n\t\tlogger.Warning(errMsg)\n\t\t//return nil, nil\n\t} else {\n\t\tuserCertificateFilePaths := strings.Split(trustedCerts, \",\")\n\t\tfor _, userCertFile := range userCertificateFilePaths {\n\t\t\tuserCertData, err := ioutil.ReadFile(userCertFile)\n\t\t\tif err != nil {\n\t\t\t\terrMsg := fmt.Sprintf(\"ERROR: Returning SSLChannel::initTLSConfig Failed to read user certificate file: %s\", userCertFile)\n\t\t\t\tlogger.Error(errMsg)\n\t\t\t\treturn nil, GetErrorByType(TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, err.Error())\n\t\t\t}\n\t\t\tif !certPool.AppendCertsFromPEM(userCertData) {\n\t\t\t\terrMsg := fmt.Sprintf(\"ERROR: Returning SSLChannel::initTLSConfig Can't parse client certificate data from '%s\", userCertFile)\n\t\t\t\tlogger.Error(errMsg)\n\t\t\t\treturn nil, GetErrorByType(TGErrorGeneralException, \"TGErrorProtocolNotSupported\", errMsg, \"\")\n\t\t\t}\n\t\t\tclientCertificates = append(clientCertificates)\n\t\t}\n\t}\n\n\ttlsConfig := &tls.Config{\n\t\tCertificates: clientCertificates,\n\t\tClientAuth: tls.RequireAndVerifyClientCert,\n\t\tClientCAs: certPool,\n\t\tInsecureSkipVerify: false,\n\t\tRand: rand.Reader,\n\t\tRootCAs: rootCertPool,\n\t}\n\t// TODO: This list may change if GO Language supports more or different - Ref. https://golang.org/pkg/crypto/tls/\n\t// TODO: Revisit later to find out if there is any API in GO to get this as a list.\n\tsuites := []uint16{\n\t\t// TLS 1.0 - 1.2 cipher suites.\n\t\ttls.TLS_RSA_WITH_RC4_128_SHA,\n\t\ttls.TLS_RSA_WITH_3DES_EDE_CBC_SHA,\n\t\ttls.TLS_RSA_WITH_AES_128_CBC_SHA,\n\t\ttls.TLS_RSA_WITH_AES_256_CBC_SHA,\n\t\ttls.TLS_RSA_WITH_AES_128_CBC_SHA256,\n\t\ttls.TLS_RSA_WITH_AES_128_GCM_SHA256,\n\t\ttls.TLS_RSA_WITH_AES_256_GCM_SHA384,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_RC4_128_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,\n\t\ttls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,\n\t\t// TLS 1.3 cipher suites.\n\t\t//tls.TLS_AES_128_GCM_SHA256,\n\t\t//tls.TLS_AES_256_GCM_SHA384,\n\t\t//tls.TLS_CHACHA20_POLY1305_SHA256,\n\t\t// TLS_FALLBACK_SCSV isn't a standard cipher suite but an indicator\n\t\t// that the client is doing version fallback. See RFC 7507.\n\t\ttls.TLS_FALLBACK_SCSV,\n\t}\n\tsupportedSuites := FilterSuitesById(suites)\n\ttlsConfig.CipherSuites = supportedSuites\n\n\tif logger.IsDebug() {\n\t\tlogger.Debug(fmt.Sprint(\"======> Returning SSLChannel:initTLSConfig\"))\n\t}\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "59dee907fbab90426712b0ceafe8b173", "score": "0.5240706", "text": "func (o ConnectionProfileCloudsqlSettingsIpConfigPtrOutput) RequireSsl() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ConnectionProfileCloudsqlSettingsIpConfig) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.RequireSsl\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "693ed9c5b9e28a944d2e472b1e32291e", "score": "0.5234536", "text": "func parseMySQLURL(dbUrl string) (*MySQLConfig, error) {\n\tvar caCert string\n\tvar tlsValue string\n\tif strings.Contains(dbUrl, \"?\") {\n\t\tu, err := url.ParseQuery(strings.Split(dbUrl, \"?\")[1])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\turlParam := url.Values{}\n\t\tfor k, v := range u {\n\t\t\tif k == \"sslrootcert\" {\n\t\t\t\tcaCert = v[0]\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif k == \"tls\" {\n\t\t\t\ttlsValue = v[0]\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\turlParam.Add(k, v[0])\n\t\t}\n\t\tdbUrl = fmt.Sprintf(\"%s?%s\", strings.Split(dbUrl, \"?\")[0], urlParam.Encode())\n\t}\n\n\tconfig, err := mysql.ParseDSN(dbUrl)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconfig.ParseTime = true\n\n\tif tlsValue != \"\" {\n\t\tconfig.TLSConfig = tlsValue\n\t}\n\n\treturn &MySQLConfig{\n\t\tconfig: config,\n\t\tcert: caCert,\n\t}, nil\n}", "title": "" }, { "docid": "8d8c8ba7ce7ff84c5d463a91cfcd8f18", "score": "0.5221821", "text": "func ConnectTLS() (conn *grpc.ClientConn, err error) {\n\n\tconf := assets.ServerConfig\n\n\t// Setup TLS\n\ttlsConfig, err := getTLSConfig(conf.CACertificate, conf.Certificate, conf.PrivateKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Set gRPC options\n\tcreds := credentials.NewTLS(tlsConfig)\n\t_ = []grpc.DialOption{\n\t\t// options := []grpc.DialOption{\n\t\tgrpc.WithTimeout(defaultTimeout),\n\t\tgrpc.WithTransportCredentials(creds),\n\t\tgrpc.WithBlock(),\n\t\tgrpc.WithDefaultCallOptions(grpc.MaxCallRecvMsgSize(ClientMaxReceiveMessageSize)),\n\t}\n\n\t// Dial server with these certificates\n\tserver := fmt.Sprintf(\"%s:%d\", conf.LHost, conf.LPort)\n\tconn, err = grpc.Dial(server, grpc.WithInsecure())\n\t// conn, err = grpc.Dial(server, options...)\n\tif err != nil {\n\t\tfmt.Println(\"Failed to connect to gRPC\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "4701a0717a2b91715942a0e4b74a83a3", "score": "0.5209627", "text": "func configureTLS(c *transportConfig) (*tls.Config, error) {\n\ttlsConfig := utils.TLSConfig(c.cipherSuites)\n\n\t// Don't verify the server's certificate if Teleport was started with\n\t// the --insecure flag, or 'insecure_skip_verify' was specifically requested in\n\t// the application config.\n\ttlsConfig.InsecureSkipVerify = (lib.IsInsecureDevMode() || c.app.GetInsecureSkipVerify())\n\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" }, { "docid": "1fc675c73de182e01105489b165298f5", "score": "0.5204296", "text": "func configureTLS(tlsConfig *tls.Config) {\n\t// Make all necessary changes to the TLS configuration here.\n}", "title": "" } ]
b6088e956ffe7397b7a5882d536d2c27
statusHandler retrieves status about an instance via the ID
[ { "docid": "e334428069103ef512c73a4fe3caf5b9", "score": "0.7669837", "text": "func (i instanceHandler) statusHandler(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tid := vars[\"instID\"]\n\n\tresp, err := i.client.Status(id, true)\n\tif err != nil {\n\t\tlog.Error(\"Error getting Status\", log.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"id\": id,\n\t\t})\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\terr = json.NewEncoder(w).Encode(resp)\n\tif err != nil {\n\t\tlog.Error(\"Error Marshaling Response\", log.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"response\": resp,\n\t\t})\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n}", "title": "" } ]
[ { "docid": "c336dac57bb0b01380c3d52978573ef4", "score": "0.62929356", "text": "func (svc Service) statusHandler(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tjson := GetStatusAsJSON()\n\tfmt.Println(json)\n\tfmt.Fprintf(w, \"%s\\n\\r\", json)\n}", "title": "" }, { "docid": "8fd5830b2b450df2f130a604d3b23fa5", "score": "0.6241771", "text": "func (s *Service) statusGetHandler(w http.ResponseWriter, _ *http.Request) {\n\tlogger := s.logger.WithName(\"get_status\").Build()\n\n\tif s.beeMode == DevMode {\n\t\tlogger.Warning(\"status endpoint is disabled in dev mode\")\n\t\tjsonhttp.BadRequest(w, errUnsupportedDevNodeOperation)\n\t\treturn\n\t}\n\n\tss, err := s.statusService.LocalSnapshot()\n\tif err != nil {\n\t\tlogger.Debug(\"status snapshot\", \"error\", err)\n\t\tlogger.Error(nil, \"status snapshot\")\n\t\tjsonhttp.InternalServerError(w, err)\n\t\treturn\n\t}\n\n\tjsonhttp.OK(w, statusSnapshotResponse{\n\t\tPeer: s.overlay.String(),\n\t\tBeeMode: ss.BeeMode,\n\t\tReserveSize: ss.ReserveSize,\n\t\tPullsyncRate: ss.PullsyncRate,\n\t\tStorageRadius: uint8(ss.StorageRadius),\n\t\tConnectedPeers: ss.ConnectedPeers,\n\t\tNeighborhoodSize: ss.NeighborhoodSize,\n\t\tBatchCommitment: ss.BatchCommitment,\n\t\tIsReachable: ss.IsReachable,\n\t})\n}", "title": "" }, { "docid": "67da4091542df9642f6cbb23d436ba23", "score": "0.6174448", "text": "func (staticMgr *staticManager) GetInstanceStatus(ctx context.Context, host *host.Host) (CloudStatus, error) {\n\treturn StatusRunning, nil\n}", "title": "" }, { "docid": "9cabc8f198acf806387281e1e2f1cad0", "score": "0.6121047", "text": "func statusHandler(w http.ResponseWriter, r *http.Request) {\n\tjobid := toInt(r.FormValue(\"jobid\"))\n\tstatus, err := core.JobStatus(jobid)\n\tif strings.Contains(status, \"No job found with id\") {\n\t\tfmt.Printf(\"No job found with id %d\\n\", jobid)\n\t\thttp.Error(w, status, http.StatusGone)\n\t\treturn\n\t}\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"%s\", err), http.StatusInternalServerError)\n\t}\n\tfmt.Printf(\"Status %d is %s\\n\", jobid, status)\n\tfmt.Fprintf(w, \"%s\", status)\n}", "title": "" }, { "docid": "2eaf24a4d5d01d5c094c06497e7dcf91", "score": "0.60792834", "text": "func statusHandler(c buffalo.Context) error {\n\tif !models.IsDBConnected() {\n\t\treturn c.Render(http.StatusInternalServerError, r.JSON(map[string]string{\"status\": \"error\"}))\n\t}\n\treturn c.Render(200, r.JSON(map[string]string{\"status\": \"good\"}))\n}", "title": "" }, { "docid": "b9030615b635c138968e6e4e426f4532", "score": "0.6038298", "text": "func (d *Dao) Status(c context.Context, mid int64) (st *medal.Status, err error) {\n\tvar (\n\t\treq *http.Request\n\t\tparams = url.Values{}\n\t)\n\tparams.Set(\"uid\", strconv.FormatInt(mid, 10))\n\tparams.Set(\"source\", \"2\")\n\tif req, err = http.NewRequest(\"GET\", d.checkStatusURI+\"?\"+params.Encode(), nil); err != nil {\n\t\tlog.Error(\"Status url(%s) error(%v)\", d.checkStatusURI+\"?\"+params.Encode(), err)\n\t\terr = ecode.CreativeFansMedalErr\n\t\treturn\n\t}\n\treq.Header.Set(\"X-BiliLive-UID\", strconv.FormatInt(mid, 10))\n\tvar res struct {\n\t\tCode int `json:\"code\"`\n\t\tData *medal.Status `json:\"data\"`\n\t}\n\tif err = d.client.Do(c, req, &res); err != nil {\n\t\tlog.Error(\"d.Status url(%s) res(%+v) err(%v)\", d.checkStatusURI+\"?\"+params.Encode(), res, err)\n\t\terr = ecode.CreativeFansMedalErr\n\t\treturn\n\t}\n\tif res.Code != 0 {\n\t\tlog.Error(\"Status url(%s) res(%v)\", d.checkStatusURI+\"?\"+params.Encode(), res)\n\t\terr = ecode.Int(res.Code)\n\t\treturn\n\t}\n\tst = res.Data\n\treturn\n}", "title": "" }, { "docid": "8c19ad7ac9632cec14eb60402b4c1342", "score": "0.59853184", "text": "func lookupAppInstanceStatus(ctx *zedmanagerContext, key string) *types.AppInstanceStatus {\n\n\tpub := ctx.pubAppInstanceStatus\n\tst, _ := pub.Get(key)\n\tif st == nil {\n\t\tlog.Tracef(\"lookupAppInstanceStatus(%s) not found\", key)\n\t\treturn nil\n\t}\n\tstatus := st.(types.AppInstanceStatus)\n\treturn &status\n}", "title": "" }, { "docid": "d3c176f13882e032b08cf8e2cc1cede8", "score": "0.5975438", "text": "func SendInstanceStatus(status string) error {\n\t// use for debug enviromnent\n\tif metavars.ServerID == \"\" {\n\t\tlog.Warnf(\"Skiped sending status to API(serverid is empty): %s\", status)\n\t\treturn nil\n\t}\n\n\tvalues := url.Values{}\n\tvalues.Set(\"instance_id\", metavars.ServerID)\n\tvalues.Set(\"stack_id\", c.getConfig().StackID)\n\tvalues.Set(\"status\", status)\n\n\terr := Post(RoutesV2.InstanceStatus, values, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "78818d0529dacf2b1c26a77562f03a49", "score": "0.59702736", "text": "func GetStatus(id, instanceURL, accessToken string) (Status, error) {\n\turl, err := url.Parse(instanceURL + \"/api/v1/statuses/\" + id)\n\tif err != nil {\n\t\treturn Status{}, err\n\t}\n\n\tvar result Status\n\n\t_, err = resty.New().R().\n\t\tSetAuthToken(accessToken).\n\t\tSetResult(&result).\n\t\tGet(url.String())\n\tif err != nil {\n\t\treturn Status{}, err\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "645e4131454391edd6c6c8942709324b", "score": "0.5857037", "text": "func GetStatus() (string, error) {\n\n\tvar url bytes.Buffer\n\taddr := GetURL()\n\tif addr == \"\" {\n\t\treturn \"\", util.MAPIADDRNotSet\n\t}\n\turl.WriteString(addr + \"/latest/meta-data/instance-id\")\n\tresp, err := http.Get(url.String())\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn string(body[:]), err\n}", "title": "" }, { "docid": "6c53cd1f294da77b2f4cb10bbccb4ba4", "score": "0.585", "text": "func (*StatusResource) Get() restful.Exchanger { return &StatusHandler{} }", "title": "" }, { "docid": "f9d094ad4e03857e7ab24154be37a29f", "score": "0.58123744", "text": "func Status(args ...string) {\n runInstances(\"Status\", func(i int, id string) error {\n on := running()\n logger.Log(fmt.Sprintf(\"Container ID: %s\\n\", id))\n logger.Log(fmt.Sprintf(\" Running: %s\\n\", strconv.FormatBool(on)))\n\n if on {\n net := networkSettings(i)\n logger.Log(fmt.Sprintf(\" IP: %s\\n\", net.Ip))\n logger.Log(fmt.Sprintf(\" Public Port: %s\\n\", net.Public.tcp))\n logger.Log(fmt.Sprintf(\"Private Port: %s\\n\", net.Private.tcp))\n }\n\n return nil\n })\n}", "title": "" }, { "docid": "fb0d58270c3a4cdb5c20af97b22b7d75", "score": "0.5786232", "text": "func (c *TestClient) InstanceStatus(project, zone, name string) (string, error) {\n\tif c.InstanceStatusFn != nil {\n\t\treturn c.InstanceStatusFn(project, zone, name)\n\t}\n\treturn c.client.InstanceStatus(project, zone, name)\n}", "title": "" }, { "docid": "0b50cdda88f1dfe3dc8f2c197d7ed2d8", "score": "0.57738495", "text": "func (i instanceHandler) getHandler(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tid := vars[\"instID\"]\n\tvar resp interface{}\n\tvar err error\n\n\tif r.URL.Query().Get(\"full\") == \"true\" {\n\t\tresp, err = i.client.GetFull(id)\n\t} else {\n\t\tresp, err = i.client.Get(id)\n\t}\n\n\tif err != nil {\n\t\tlog.Error(\"Error getting Instance\", log.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"id\": id,\n\t\t})\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\terr = json.NewEncoder(w).Encode(resp)\n\tif err != nil {\n\t\tlog.Error(\"Error Marshaling Response\", log.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"response\": resp,\n\t\t})\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "a85fd6f87e83de59e3cf283038ff3f9f", "score": "0.5773782", "text": "func (hnd *Handlers) StatusHandler() http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tblob := GetStatusAsJSON(hnd.cfg)\n\n\t\tlog.Info(\"status: %s\", blob)\n\n\t\tlog.Info(blob)\n\t\tfmt.Fprintf(w, \"%s\\n\\r\", blob)\n\t}\n}", "title": "" }, { "docid": "f3654ee8c01103254935d04ecff7b017", "score": "0.5765637", "text": "func (i instanceHandler) queryHandler(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tid := vars[\"instID\"]\n\tapiVersion := r.URL.Query().Get(\"ApiVersion\")\n\tkind := r.URL.Query().Get(\"Kind\")\n\tname := r.URL.Query().Get(\"Name\")\n\tlabels := r.URL.Query().Get(\"Labels\")\n\tif apiVersion == \"\" {\n\t\thttp.Error(w, \"Missing ApiVersion mandatory parameter\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tif kind == \"\" {\n\t\thttp.Error(w, \"Missing Kind mandatory parameter\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tresp, err := i.client.Query(id, apiVersion, kind, name, labels)\n\tif err != nil {\n\t\tlog.Error(\"Error getting Query results\", log.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"id\": id,\n\t\t\t\"apiVersion\": apiVersion,\n\t\t\t\"kind\": kind,\n\t\t\t\"name\": name,\n\t\t\t\"labels\": labels,\n\t\t})\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\terr = json.NewEncoder(w).Encode(resp)\n\tif err != nil {\n\t\tlog.Error(\"Error Marshaling Response\", log.Fields{\n\t\t\t\"error\": err,\n\t\t\t\"response\": resp,\n\t\t})\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "4eb0e78c72355ab4fa1014fd9c3631d9", "score": "0.573804", "text": "func (client *Client) Status(handle string) {\n job := newJob(common.REQ, common.GET_STATUS, []byte(handle))\n client.writeJob(job)\n}", "title": "" }, { "docid": "92ab285ca72ab1dbafe48002786ae944", "score": "0.5697112", "text": "func StatusHandler(w http.ResponseWriter, r *http.Request) {\n\tstatus_requests_cnt.Inc()\n\n\tw.Write([]byte(\"API is up and running\"))\n}", "title": "" }, { "docid": "faa111629a21758ed6282f3b7519d82a", "score": "0.5667617", "text": "func (c *Client) GetSpannerInstanceStatus(ctx context.Context, instanceID string) (*SpannerInstanceStatus, error) {\n\tnow := time.Now()\n\tstartTime := now.UTC().Add(c.syncPeriod)\n\tendTime := now.UTC()\n\n\tfilter := fmt.Sprintf(`\n\t\tmetric.type = \"spanner.googleapis.com/instance/cpu/utilization_by_priority\" AND\n\t\tmetric.label.priority = \"high\" AND\n\t\tmetric.label.database = \"%s\"\n`, instanceID)\n\n\treq := &monitoringpb.ListTimeSeriesRequest{\n\t\tName: fmt.Sprintf(\"projects/%s\", c.projectID),\n\t\t// TODO: Fix metrics type and enable to specify with argument.\n\t\tFilter: filter,\n\t\tInterval: &monitoringpb.TimeInterval{\n\t\t\tStartTime: &timestamp.Timestamp{\n\t\t\t\tSeconds: startTime.Unix(),\n\t\t\t},\n\t\t\tEndTime: &timestamp.Timestamp{\n\t\t\t\tSeconds: endTime.Unix(),\n\t\t\t},\n\t\t},\n\t\tView: monitoringpb.ListTimeSeriesRequest_FULL,\n\t}\n\n\tit := c.monitoringMetricClient.ListTimeSeries(ctx, req)\n\tfor {\n\t\tresp, err := it.Next()\n\t\tif err == iterator.Done {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn &SpannerInstanceStatus{\n\t\t\tName: resp.GetMetric().Labels[\"database\"],\n\t\t\tSpannerInstanceStatus: spannerhorizontalautoscalerv1alpha1.SpannerInstanceStatus{\n\t\t\t\tCPUUtilization: pointer.Int32(int32(resp.GetPoints()[0].GetValue().GetDoubleValue())),\n\t\t\t},\n\t\t}, nil\n\t}\n\n\treturn nil, errors.New(\"no such spanner instance metrics\")\n}", "title": "" }, { "docid": "4602b166033e4fc3852afb7a520c48a4", "score": "0.5655597", "text": "func (self *client) GetStatus() {\n\n}", "title": "" }, { "docid": "3fabed3f968fd40ea98df2ab3ba070d4", "score": "0.56554174", "text": "func (at *Attacker) Status(uuid string) (string, error) {\n\tat.lock.RLock()\n\tdefer at.lock.RUnlock()\n\tentry, ok := at.scheduler[uuid]\n\tif !ok {\n\t\treturn \"\", fmt.Errorf(\"attack reference %s not found\", uuid)\n\t}\n\treturn entry.Status(), nil\n}", "title": "" }, { "docid": "083bf92ad0964b5309ced063ee7e457a", "score": "0.56474763", "text": "func (awsI *Ec2Instance) Status() error {\n\t_, err := getInstanceValues(awsI)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tawsI.Ctx.ConsoleLog(1, \"Stardog: %s\\n\", fmt.Sprintf(\"http://%s:5821\", awsI.StardogContact))\n\tawsI.Ctx.ConsoleLog(1, \"SSH: %s\\n\", awsI.BastionContact)\n\treturn nil\n}", "title": "" }, { "docid": "9820d8e8bb8444e1272d204fdccbac10", "score": "0.56431633", "text": "func statusHandler(c *gin.Context) {\n\tprovide.Render(nil, 204, c)\n}", "title": "" }, { "docid": "edec11bfa7c5e17d0365459b3051a34e", "score": "0.563563", "text": "func handleAppInstanceStatusDelete(ctxArg interface{}, key string,\n\tstatusArg interface{}) {\n\tctx := ctxArg.(*zedmanagerContext)\n\tpublishAppInstanceSummary(ctx)\n}", "title": "" }, { "docid": "bfc3a433b053eea6bb322470150f4dc4", "score": "0.56266713", "text": "func (d *Dao) LiveStatus(c context.Context, mid int64, ip string) (ok int8, err error) {\n\tvar req *http.Request\n\tparams := url.Values{}\n\tparams.Set(\"uid\", strconv.FormatInt(mid, 10))\n\tif req, err = http.NewRequest(\"GET\", d.liveStatusURL+\"?\"+params.Encode(), nil); err != nil {\n\t\tlog.Error(\"LiveStatus url(%s) error(%v)\", d.liveStatusURL+\"?\"+params.Encode(), err)\n\t\terr = ecode.CreativeLiveErr\n\t\treturn\n\t}\n\treq.Header.Set(\"X-BiliLive-UID\", strconv.FormatInt(mid, 10))\n\tvar res struct {\n\t\tCode int `json:\"code\"`\n\t}\n\tif err = d.client.Do(c, req, &res); err != nil {\n\t\tlog.Error(\"LiveStatus url(%s) response(%+v) error(%v)\", d.liveStatusURL+\"?\"+params.Encode(), res, err)\n\t\terr = ecode.CreativeLiveErr\n\t\treturn\n\t}\n\tif res.Code == 500401 {\n\t\treturn\n\t}\n\tif res.Code != 0 {\n\t\tlog.Error(\"LiveStatus url(%s) res(%v)\", d.liveStatusURL+\"?\"+params.Encode(), res)\n\t\terr = ecode.Int(res.Code)\n\t\treturn\n\t}\n\tok = 1\n\treturn\n}", "title": "" }, { "docid": "cb388c942a287a7f669d972ab585261d", "score": "0.56227165", "text": "func statusHandler(w http.ResponseWriter, user datastore.User, apiCall bool, authorityID, keyName string) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\n\terr := auth.CheckUserPermissions(user, datastore.Admin, apiCall)\n\tif err != nil {\n\t\tresponse.FormatStandardResponse(false, response.ErrorAuth.Code, \"\", err.Error(), w)\n\t\treturn\n\t}\n\n\t// Check that the user has permissions to this authority-id\n\tif !datastore.Environ.DB.CheckUserInAccount(user.Username, authorityID) {\n\t\tresponse.FormatStandardResponse(false, response.ErrorAuth.Code, \"\", \"Your user does not have permissions for the Signing Authority\", w)\n\t\treturn\n\t}\n\n\tks, err := datastore.Environ.DB.GetKeypairStatus(authorityID, keyName)\n\tif err != nil {\n\t\tresponse.FormatStandardResponse(false, response.ErrorInvalidKeypair.Code, \"\", \"Cannot find the status of the keypair\", w)\n\t\treturn\n\t}\n\n\t// Return successful JSON response with the list of models\n\tw.WriteHeader(http.StatusOK)\n\tresponse.FormatStandardResponse(true, \"\", \"\", ks.Status, w)\n}", "title": "" }, { "docid": "5773400911522e79d92ff41e75a2e3c6", "score": "0.5601309", "text": "func (client *Client) Status(handle string) (status *Status, err error) {\n\tif client.conn == nil {\n\t\treturn nil, ErrLostConn\n\t}\n\tvar mutex sync.Mutex\n\tmutex.Lock()\n\tclient.innerHandler.put(\"s\"+handle, func(resp *Response) {\n\t\tdefer mutex.Unlock()\n\t\tvar err error\n\t\tstatus, err = resp._status()\n\t\tif err != nil {\n\t\t\tclient.err(err)\n\t\t}\n\t})\n\treq := getRequest()\n\treq.DataType = dtGetStatus\n\treq.Data = []byte(handle)\n\tclient.write(req)\n\tmutex.Lock()\n\treturn\n}", "title": "" }, { "docid": "ccba174aada2961858735a99e032e904", "score": "0.5581031", "text": "func StatusHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintf(w, \"Status: OK\")\n}", "title": "" }, { "docid": "98ba4410597296fce3562ec9ca8d206f", "score": "0.5579641", "text": "func (c *Client) State(id string) (string, error) {\n\tvar (\n\t\tmethod = \"GET\"\n\t\turi = fmt.Sprintf(\"%s/%s\", \"server\", id)\n\t)\n\n\tdata, err := c.newRequest(method, uri, nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tvar s sakura.Response\n\tif err := json.Unmarshal(data, &s); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn s.Server.Instance.Status, nil\n}", "title": "" }, { "docid": "3c850dcd589fee1f539ed0f1225ff97c", "score": "0.5578098", "text": "func (px *Paxos) Status(seq int) (bool, interface{}) {\n // Your code here.\n px.mu.Lock()\n defer px.mu.Unlock()\n instance, ok := px.instances[seq]\n if !ok {\n return false, nil\n }\n\n return instance.decidedValue != nil, instance.decidedValue\n}", "title": "" }, { "docid": "74fdfb695d7f4f8ee590375f0b266e4a", "score": "0.5564277", "text": "func (inf *meshInformer) OnPartOfServiceInstanceStatus(serviceName, instanceID string, gjsonPath GJSONPath, fn ServiceInstanceStatusFunc) error {\n\tstoreKey := layout.ServiceInstanceStatusKey(serviceName, instanceID)\n\tsyncerKey := fmt.Sprintf(\"service-instance-status-%s-%s-%s\", serviceName, instanceID, gjsonPath)\n\n\tspecFunc := func(event Event, value string) bool {\n\t\tinstanceStatus := &spec.ServiceInstanceStatus{}\n\t\tif event.EventType != EventDelete {\n\t\t\tif err := yaml.Unmarshal([]byte(value), instanceStatus); err != nil {\n\t\t\t\tlogger.Errorf(\"BUG: unmarshal %s to yaml failed: %v\", value, err)\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t\treturn fn(event, instanceStatus)\n\t}\n\n\treturn inf.onSpecPart(storeKey, syncerKey, gjsonPath, specFunc)\n}", "title": "" }, { "docid": "543e3aaa13e9ddd773ba0e4d989c7850", "score": "0.5536098", "text": "func handleAppInstanceStatusModify(ctxArg interface{}, key string,\n\tstatusArg interface{}, oldStatusArg interface{}) {\n\tctx := ctxArg.(*zedmanagerContext)\n\tpublishAppInstanceSummary(ctx)\n}", "title": "" }, { "docid": "bd630392e64eaf908e20856087de356f", "score": "0.5530309", "text": "func (i *InstanceServiceHandler) ISOStatus(ctx context.Context, instanceID string) (*Iso, error) {\n\turi := fmt.Sprintf(\"%s/%s/iso\", instancePath, instanceID)\n\treq, err := i.client.NewRequest(ctx, http.MethodGet, uri, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tiso := new(isoStatusBase)\n\tif err = i.client.DoWithContext(ctx, req, iso); err != nil {\n\t\treturn nil, err\n\t}\n\treturn iso.IsoStatus, nil\n}", "title": "" }, { "docid": "fca3a365e5d8be6a27f0a99ca29fcd23", "score": "0.55233663", "text": "func (r *versionResolver) Status(ctx context.Context, obj *restModel.APIVersion) (string, error) {\n\tversionId := utility.FromStringPtr(obj.Id)\n\tv, err := model.VersionFindOneId(versionId)\n\tif err != nil {\n\t\treturn \"\", InternalServerError.Send(ctx, fmt.Sprintf(\"Error finding version '%s': %s\", versionId, err.Error()))\n\t}\n\tif v == nil {\n\t\treturn \"\", ResourceNotFound.Send(ctx, fmt.Sprintf(\"Version '%s' not found\", versionId))\n\t}\n\treturn getDisplayStatus(v)\n}", "title": "" }, { "docid": "4df64b7e1fd405e39dd807e2dbecc0c8", "score": "0.5498883", "text": "func toInstanceStatus(status string) *cloudprovider.InstanceStatus {\n\tstate := &cloudprovider.InstanceStatus{}\n\n\tswitch status {\n\tcase \"INSTALLING\", \"REDEPLOYING\":\n\t\tstate.State = cloudprovider.InstanceCreating\n\tcase \"DELETING\":\n\t\tstate.State = cloudprovider.InstanceDeleting\n\tcase \"READY\":\n\t\tstate.State = cloudprovider.InstanceRunning\n\tdefault:\n\t\tstate.ErrorInfo = &cloudprovider.InstanceErrorInfo{\n\t\t\tErrorClass: cloudprovider.OtherErrorClass,\n\t\t\tErrorCode: status,\n\t\t\tErrorMessage: \"error\",\n\t\t}\n\t}\n\n\treturn state\n}", "title": "" }, { "docid": "8f804db60164086d01e11e077d73f01b", "score": "0.5487271", "text": "func (e *entry) getStatus() int {\n\te.mu.Lock()\n\tdefer e.mu.Unlock()\n\n\treturn e.status\n}", "title": "" }, { "docid": "32f140d9ab37ba5f50bdf50a98f1f8a8", "score": "0.54857504", "text": "func (c *StatusRClient) Get(ctx context.Context, id int) (*StatusR, error) {\n\treturn c.Query().Where(statusr.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "d0e9b627c4af2483a1cc49e4b60f462b", "score": "0.54677904", "text": "func (px *Paxos) Status(seq int) (Fate, interface{}) {\n\t// Your code here.\n\tif seq < px.min {\n\t\treturn Forgotten, nil\n\t}\n\n\tinstance, ok := px.getInstance(seq)\n\tif !ok {\n\t\treturn Unknown, nil\n\t}\n\treturn instance.status, instance.aValue\n}", "title": "" }, { "docid": "890b5df01f31104d0ad57127c1ea6320", "score": "0.54613215", "text": "func (lh *AuthorizationCodeLocalhost) statusGetHandler(w http.ResponseWriter, r *http.Request) {\n\tw.WriteHeader(http.StatusOK)\n\tw.Write([]byte(\"Status OK\"))\n\treturn\n}", "title": "" }, { "docid": "c1a06d2388df1e46328b6e1963b127d9", "score": "0.54304105", "text": "func (c *StatusdClient) Get(ctx context.Context, id int) (*Statusd, error) {\n\treturn c.Query().Where(statusd.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "758244f918526acb375e8ac0a3876f67", "score": "0.5396334", "text": "func (r *CustomDomainReconciler) statusUpdate(reqLogger logr.Logger, instance *customdomainv1alpha1.CustomDomain) error {\n\terr := r.Client.Status().Update(context.TODO(), instance)\n\tif err != nil {\n\t\treqLogger.Error(err, fmt.Sprintf(\"Status update for %s failed\", instance.Name))\n\t}\n\t//reqLogger.Info(fmt.Sprintf(\"Status updated for %s\", instance.Name))\n\treturn err\n}", "title": "" }, { "docid": "b74159ef06c9fe94536efcfcb23b8314", "score": "0.5387295", "text": "func StatusInstanceIAMInstanceProfile(ctx context.Context, conn *ec2.EC2, id string) retry.StateRefreshFunc {\n\treturn func() (interface{}, string, error) {\n\t\tinstance, err := FindInstanceByID(ctx, conn, id)\n\n\t\tif tfresource.NotFound(err) {\n\t\t\treturn nil, \"\", nil\n\t\t}\n\n\t\tif err != nil {\n\t\t\treturn nil, \"\", err\n\t\t}\n\n\t\tif instance.IamInstanceProfile == nil || instance.IamInstanceProfile.Arn == nil {\n\t\t\treturn instance, \"\", nil\n\t\t}\n\n\t\tname, err := InstanceProfileARNToName(aws.StringValue(instance.IamInstanceProfile.Arn))\n\n\t\tif err != nil {\n\t\t\treturn instance, \"\", err\n\t\t}\n\n\t\treturn instance, name, nil\n\t}\n}", "title": "" }, { "docid": "3c278a5ae207e4e940bc0d3e46bed32b", "score": "0.5385481", "text": "func InstanceHandler(w http.ResponseWriter, request *http.Request) {\n\tvars := mux.Vars(request)\n\tlog.Trace(fmt.Sprintf(\"%s /v2/service_instances/:instance_id :: %+v\", request.Method, vars))\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\n\tswitch request.Method {\n\tcase \"PUT\":\n\t\ttype instanceRequest struct {\n\t\t\tServiceId string `json:\"service_id\"`\n\t\t\tPlan string `json:\"plan_id\"`\n\t\t\tOrganizationId string `json:\"organization_guid\"`\n\t\t\tSpaceId string `json:\"space_guid\"`\n\t\t}\n\t\tir := instanceRequest{}\n\t\tbody, err := ioutil.ReadAll(request.Body)\n\t\tif err != nil {\n\t\t\tlog.Error(fmt.Sprintf(\"%s /v2/service_instances/:instance_id %s\", request.Method, err))\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tfmt.Fprintf(w, `{\"status\": %d,\"description\": %s}`, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\terr = json.Unmarshal(body, &ir)\n\t\tif err != nil {\n\t\t\tlog.Error(fmt.Sprintf(\"%s /v2/service_instances/:instance_id %s\", request.Method, err))\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tfmt.Fprintf(w, `{\"status\": %d,\"description\": %s}`, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\n\t\tinstance, err := NewInstance(\n\t\t\tvars[\"instance_id\"],\n\t\t\tir.ServiceId,\n\t\t\tir.Plan,\n\t\t\tir.OrganizationId,\n\t\t\tir.SpaceId,\n\t\t)\n\t\tif err != nil {\n\t\t\tlog.Error(fmt.Sprintf(\"%s /v2/service_instances/:instance_id %s\", request.Method, err))\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tfmt.Fprintf(w, `{\"status\": %d,\"description\": %s}`, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\n\t\terr = instance.Provision()\n\t\tif err != nil {\n\t\t\tlog.Error(fmt.Sprintf(\"%s /v2/service_instances/:instance_id %s\", request.Method, err))\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tfmt.Fprintf(w, `{\"status\": %d,\"description\": %s}`, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\tw.WriteHeader(http.StatusOK)\n\t\tfmt.Fprintf(w, `{\"status\": %d,\"description\": \"Instance Provisioned Successfully\"}`, http.StatusOK)\n\t\treturn\n\tcase \"DELETE\":\n\t\tinstance, err := FindInstance(vars[\"instance_id\"])\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tfmt.Fprintf(w, `{\"status\": %d,\"description\": %s}`, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\n\t\terr = instance.Remove()\n\t\tif err != nil {\n\t\t\tlog.Error(fmt.Sprintf(\"%s /v2/service_instances/:instance_id %s\", request.Method, err))\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tfmt.Fprintf(w, `{\"status\": %d,\"description\": %s}`, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\tw.WriteHeader(http.StatusOK)\n\t\tfmt.Fprintf(w, `{\"status\": %d,\"description\": \"Successfully Deprovisioned %s\"}`, http.StatusOK, instance.InstanceId)\n\tdefault:\n\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t\tfmt.Fprintf(w, `{\"status\": %d,\"description\": \"Allowed Methods: PUT, DELETE\"}`, http.StatusMethodNotAllowed)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "999112364107c56e9693163faec95667", "score": "0.5385436", "text": "func (app *Application) GetStatus() *Status {\n if app.status == nil {\n app.status = app.Get(\"status\").(*Status)\n }\n\n return app.status\n}", "title": "" }, { "docid": "df85263bc028d9cb018667287fd7ed7a", "score": "0.53722537", "text": "func statusHandler(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tenc := json.NewEncoder(w)\n\terr := enc.Encode(getCurrentStatus())\n\tif err != nil {\n\t\tsklog.Errorf(\"Failed to write or encode output: %s\", err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "9e2b17f34455033c76747766d98f9db4", "score": "0.5340904", "text": "func getStatus(status string) gitea.StatusState {\n\tswitch status {\n\tcase model.StatusPending, model.StatusBlocked:\n\t\treturn gitea.StatusPending\n\tcase model.StatusRunning:\n\t\treturn gitea.StatusPending\n\tcase model.StatusSuccess:\n\t\treturn gitea.StatusSuccess\n\tcase model.StatusFailure, model.StatusError:\n\t\treturn gitea.StatusFailure\n\tcase model.StatusKilled:\n\t\treturn gitea.StatusFailure\n\tcase model.StatusDeclined:\n\t\treturn gitea.StatusWarning\n\tdefault:\n\t\treturn gitea.StatusFailure\n\t}\n}", "title": "" }, { "docid": "57b662cdbf45c38e81d1c245a1e57bb8", "score": "0.53398097", "text": "func (uc *InstanceController) GetInstanceByID(c *gin.Context) {\n\tid, exists := c.Params.Get(\"id\")\n\tif !exists {\n\t\tutil.SendError(c, \"id is null\")\n\t\treturn\n\t}\n\n\tidUint64, errConv := strconv.ParseUint(id, 10, 64)\n\tif errConv != nil {\n\t\tutil.SendError(c, \"id conv failed\")\n\t\treturn\n\t}\n\n\tapi, err := uc.getCtl().Service.FindInstanceById(idUint64)\n\n\tif err != nil {\n\t\tutil.SendError(c, err.Error())\n\t\treturn\n\t}\n\n\tutil.SendMessage(c, util.Message{\n\t\tCode: 0,\n\t\tMessage: \"OK\",\n\t\tData: api,\n\t})\n}", "title": "" }, { "docid": "989a8b52cdddc51b60330411c9a915c3", "score": "0.5337327", "text": "func handleAppInstanceStatusCreate(ctxArg interface{}, key string,\n\tstatusArg interface{}) {\n\tctx := ctxArg.(*zedmanagerContext)\n\tpublishAppInstanceSummary(ctx)\n}", "title": "" }, { "docid": "0078207007dd11ce390bd6526fd4dead", "score": "0.53317326", "text": "func (h *Handler) UpdateStatus(w http.ResponseWriter, r *http.Request) {\n\n\tcmd := sigstat.Command{\n\t\tStatus: \"running\",\n\t}\n\n\th.client.CommandService().UpdateStatus(cmd)\n}", "title": "" }, { "docid": "fc010ab1447275bb625f358d84ead771", "score": "0.5316273", "text": "func (o InstanceOutput) Status() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringOutput { return v.Status }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "fc010ab1447275bb625f358d84ead771", "score": "0.5316273", "text": "func (o InstanceOutput) Status() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringOutput { return v.Status }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "f5e4c9c550ea8865fe19f1a8bd152f31", "score": "0.52950454", "text": "func (h BaseHandler) Status(ctx *fasthttp.RequestCtx, status int) error {\n\treturn Status(ctx, status)\n}", "title": "" }, { "docid": "5bb6fa8f693fa5dce796466ae247c89e", "score": "0.5286812", "text": "func GetSnapshotInstanceStatusFile(snapshotID string) string {\n\treturn filepath.Join(GetSnapshotDir(snapshotID), SnapshotInstanceStatusFilename)\n}", "title": "" }, { "docid": "5f322bde70212daac58fe0a599ea05de", "score": "0.5285543", "text": "func (i instanceHandler) deleteHandler(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tid := vars[\"instID\"]\n\n\terr := i.client.Delete(id)\n\tif err != nil {\n\t\tlog.Error(\"Error Deleting Instance\", log.Fields{\n\t\t\t\"error\": err,\n\t\t})\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusAccepted)\n}", "title": "" }, { "docid": "dee85b2e164fe42d1b5d620d6c8fd38b", "score": "0.52843124", "text": "func (e EurekaConnection) UpdateInstanceStatus(ins *Instance, status StatusType) error {\n\tslug := fmt.Sprintf(\"%s/%s/%s/status\", EurekaURLSlugs[\"Apps\"], ins.App, ins.Id())\n\treqURL := e.generateURL(slug)\n\n\tparams := map[string]string{\"value\": string(status)}\n\n\tlog.Debugf(\"Updating instance status url=%s value=%s\", reqURL, status)\n\tbody, rcode, err := putKV(reqURL, params)\n\tif err != nil {\n\t\tlog.Error(\"Could not complete update, error: \", err.Error())\n\t\treturn err\n\t}\n\tif rcode < 200 || rcode >= 300 {\n\t\tlog.Warningf(\"HTTP returned %d updating status Instance=%s App=%s Body=\\\"%s\\\"\", rcode,\n\t\t\tins.Id(), ins.App, string(body))\n\t\treturn &unsuccessfulHTTPResponse{rcode, \"possible failure updating instance status\"}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4a9b46b9a161c726a1ea76e68fb28bb7", "score": "0.52760285", "text": "func statusHandler(w http.ResponseWriter, _ *http.Request) {\n\tbToMb := func(b uint64) string {\n\t\treturn fmt.Sprintf(\"%v MiB\", b/1024/1024)\n\t}\n\tvar m runtime.MemStats\n\truntime.ReadMemStats(&m)\n\n\trowData := [][2]string{\n\t\t{\"Total Files:\", fmt.Sprintf(\"%v\", uint64(fileCount(config.Global.Root)))},\n\t\t{\"Media Folder Size:\", bToMb(uint64(folderSize(config.Global.Root)))},\n\t\t{\"Thumbnail Folder Size:\", bToMb(uint64(folderSize(config.Global.Cache)))},\n\t\t{\"Folders Watched:\", fmt.Sprint(gallery.WatchedFolders)},\n\t\t{\"Public Url:\", config.Global.PublicUrl},\n\t\t{\"Prefix:\", config.Global.Prefix},\n\t\t{\"-\", \"\"},\n\t\t{\"Alloc Memory:\", bToMb(m.Alloc)},\n\t\t{\"Sys Memory:\", bToMb(m.Sys)},\n\t\t{\"Goroutines:\", fmt.Sprint(runtime.NumGoroutine())},\n\t\t{\"-\", \"\"},\n\t\t{\"App Version:\", BuildVersion},\n\t\t{\"App Build Date:\", BuildTimestamp},\n\t\t{\"Service Uptime:\", time.Since(startTime).String()},\n\t}\n\n\tpage := templates.TwoColTable{\n\t\tPage: templates.Page{\n\t\t\tTitle: \"System Status\",\n\t\t\tPrefix: urlPrefix,\n\t\t\tAppVersion: BuildVersion,\n\t\t\tAppBuildTime: BuildTimestamp,\n\t\t},\n\t\tRows: rowData,\n\t}\n\t_ = templates.Html.ExecuteTemplate(w, \"table\", &page)\n}", "title": "" }, { "docid": "fe1ace758de7753c7763a1d4403af3ad", "score": "0.52529997", "text": "func (this ResponseDetailsViewV5) GetStatus() int { return this.Status }", "title": "" }, { "docid": "5a9b38d479d05cf133c5f8f7fbd08685", "score": "0.5238682", "text": "func (px *Paxos) Status(seq int) (bool, interface{}) {\n\t// Your code here.\n\tcurMin := px.Min()\n\tpx.mu.Lock()\n\tdefer px.mu.Unlock()\n\n\ttargetIns := px.instances[seq]\n\tif seq < curMin || targetIns == nil {\n\t\treturn false, nil\n\t} else {\n\t\t//debug\n\t\t// fmt.Printf(\"Status: isDecided=%t, va=%v, me=%d, seq %d\\n\", targetIns.isDecided, targetIns.vDecided, px.me, seq)\n\t\treturn targetIns.isDecided, targetIns.vDecided\n\t}\n}", "title": "" }, { "docid": "b7775d8bd614630b389648b51972a664", "score": "0.5228529", "text": "func (server StatusServer) GetStatusHandler(w http.ResponseWriter, r *http.Request) {\n\tstatus, err := server.GetCompetitionAllStatus()\n\tif err != nil {\n\t\tutil.RespondJsonResult(w, http.StatusInternalServerError, util.HTTP500ErrorRetrievingData, err.Error())\n\t\treturn\n\t}\n\n\tdata := make([]viewmodel.CompetitionStatus, 0)\n\tfor _, each := range status {\n\t\tdata = append(data, viewmodel.CompetitionStatusDataModelToViewModel(each))\n\t}\n\toutput, _ := json.Marshal(data)\n\tw.Write(output)\n\n}", "title": "" }, { "docid": "44efbd0f47ce91c9d3f918b5fbe42b9b", "score": "0.5209013", "text": "func checkStatus() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tc.JSON(http.StatusOK, \"Server is running successfully !!!!!\")\n\t}\n}", "title": "" }, { "docid": "65f06d21d61cdff7f70c6acd77674b0a", "score": "0.5178351", "text": "func (s *Store) Get(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\tvars := mux.Vars(r)\n\tinstanceID := vars[\"instance_id\"]\n\teTag := getIfMatch(r)\n\tlogData := log.Data{\"instance_id\": instanceID}\n\n\tlog.Info(ctx, \"get instance\", logData)\n\n\tinstance, err := s.GetInstance(ctx, instanceID, eTag)\n\tif err != nil {\n\t\tlog.Error(ctx, \"get instance: failed to retrieve instance\", err, logData)\n\t\thandleInstanceErr(ctx, err, w, logData)\n\t\treturn\n\t}\n\n\tlog.Info(ctx, \"get instance: checking instance state\", logData)\n\t// Early return if instance state is invalid\n\tif err = models.CheckState(\"instance\", instance.State); err != nil {\n\t\tlogData[\"state\"] = instance.State\n\t\tlog.Error(ctx, \"get instance: instance has an invalid state\", err, logData)\n\t\thandleInstanceErr(ctx, err, w, logData)\n\t\treturn\n\t}\n\n\tlog.Info(ctx, \"get instance: marshalling instance json\", logData)\n\tb, err := json.Marshal(instance)\n\tif err != nil {\n\t\tlog.Error(ctx, \"get instance: failed to marshal instance to json\", err, logData)\n\t\thandleInstanceErr(ctx, err, w, logData)\n\t\treturn\n\t}\n\n\tsetJSONContentType(w)\n\tdpresponse.SetETag(w, instance.ETag)\n\twriteBody(ctx, w, b, logData)\n\tlog.Info(ctx, \"get instance: request successful\", logData)\n}", "title": "" }, { "docid": "2e58f18a87f6a448c49770729b9265f6", "score": "0.51768285", "text": "func (o *WorkflowServiceItemActionInstance) GetStatus() string {\n\tif o == nil || o.Status == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Status\n}", "title": "" }, { "docid": "e86515b7a9189dbe8de82b3954bef156", "score": "0.51733196", "text": "func (h HealthController) Status(c *gin.Context) {\n\tc.JSON(200, gin.H{\n\t\t\"status\": \"ok\",\n\t})\n}", "title": "" }, { "docid": "64e64f85fed076293772e570c605af96", "score": "0.51663756", "text": "func (o ReservedInstanceOutput) Status() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ReservedInstance) pulumi.StringOutput { return v.Status }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "276f9c79d4bf51472ba0e9c0779602d3", "score": "0.51588666", "text": "func (hc *httpClient) GetInstanceById(instanceId string) (*InstanceInfo, error) {\n\tparam := &requestParam{\n\t\tURL: hc.serviceUrl + \"/instances/\" + instanceId,\n\t\tMethod: http.MethodGet,\n\t\tHeaders: hc.headers,\n\t\tUsername: hc.username,\n\t\tPassword: hc.password,\n\t}\n\n\tvar result InstanceInfo\n\terr := hc.requestAndFormatResult(param, &result)\n\n\treturn &result, err\n}", "title": "" }, { "docid": "abd5cc55b475ea2f031b55587aad76fb", "score": "0.5156735", "text": "func (g *AzureSqlActionManager) GetStatus(obj runtime.Object) (*v1alpha1.ASOStatus, error) {\n\tinstance, err := g.convert(obj)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &instance.Status, nil\n}", "title": "" }, { "docid": "5041c0e00992e08aaf347172695b1f1e", "score": "0.5151572", "text": "func (li *LinkInst) Status() model.LinkStatus {\n\treturn li.status\n}", "title": "" }, { "docid": "3f22075083acb90c12a731b3c9165f01", "score": "0.5133724", "text": "func GetStatus(cfg *Config) Status {\n\tnow := time.Now().Unix()\n\n\ts := Status{\n\t\tPID: os.Getpid(),\n\t\tService: \"list-service\",\n\t}\n\n\ts.Status = \"ok\"\n\ts.Version = Version()\n\ts.CPUs = runtime.NumCPU()\n\ts.GoVers = runtime.Version()\n\ts.TimeStamp = now\n\ts.UpTime = now - InstanceStartTime\n\ts.LogLevel = log.GetLevel()\n\n\tif host, err := os.Hostname(); err == nil {\n\t\ts.Hostname = host\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "420c1f7afe287c9b629e63d881a45796", "score": "0.5131561", "text": "func StatusHandler(cfg *config.Config, nomadClient *nomad.Client, consulClient *consul.Client) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tvar healthy *bool\n\n\t\tstatus := struct {\n\t\t\tHealty *bool\n\t\t\tConsul map[string]interface{}\n\t\t\tNomad map[string]interface{}\n\t\t}{\n\t\t\tConsul: make(map[string]interface{}),\n\t\t\tNomad: make(map[string]interface{}),\n\t\t}\n\n\t\thealthy = nil\n\t\tif nomadClient != nil {\n\t\t\tleader, err := nomadClient.Status().Leader()\n\t\t\tstatus.Nomad[\"enabled\"] = true\n\t\t\tstatus.Nomad[\"status\"] = struct {\n\t\t\t\tLeader string\n\t\t\t\tError error\n\t\t\t}{leader, err}\n\n\t\t\tif err != nil {\n\t\t\t\thealthy = newBool(false)\n\t\t\t} else {\n\t\t\t\thealthy = newBool(true)\n\t\t\t}\n\t\t} else {\n\t\t\tstatus.Nomad[\"enabled\"] = false\n\t\t}\n\n\t\tif consulClient != nil {\n\t\t\tleader, err := consulClient.Status().Leader()\n\t\t\tstatus.Consul[\"enabled\"] = true\n\t\t\tstatus.Consul[\"status\"] = struct {\n\t\t\t\tLeader string\n\t\t\t\tError error\n\t\t\t}{leader, err}\n\n\t\t\tif err != nil {\n\t\t\t\thealthy = newBool(false)\n\t\t\t} else {\n\t\t\t\tif healthy != nil {\n\t\t\t\t\thealthy = newBool(*healthy && true)\n\t\t\t\t} else {\n\t\t\t\t\thealthy = newBool(true)\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tstatus.Consul[\"enabled\"] = false\n\t\t}\n\t\tif healthy != nil {\n\t\t\tstatus.Healty = healthy\n\t\t} else {\n\t\t\tstatus.Healty = newBool(false)\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\n\t\tif *healthy {\n\t\t\tw.WriteHeader(http.StatusOK)\n\t\t} else {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t}\n\n\t\tjson.NewEncoder(w).Encode(status)\n\t}\n}", "title": "" }, { "docid": "bb683cc2ffe2dcd0f6ba93033162f786", "score": "0.5129626", "text": "func (c *Client) Status() (*Status, error) {\n\tstatus := &Status{}\n\terr := c.Get().UsePath(\"/status\").Do().Unmarshal(status)\n\treturn status, err\n}", "title": "" }, { "docid": "1f069ed0412aa15dea4026a2183b43c5", "score": "0.5122583", "text": "func (h HealthController) Status(c *gin.Context) {\n\tc.String(http.StatusOK, \"Working!\")\n}", "title": "" }, { "docid": "0ad83c5e5c6b5d6bc1b3f99a8aa24afc", "score": "0.511879", "text": "func (o LookupInstanceResultOutput) Status() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupInstanceResult) string { return v.Status }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "0ad83c5e5c6b5d6bc1b3f99a8aa24afc", "score": "0.511879", "text": "func (o LookupInstanceResultOutput) Status() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupInstanceResult) string { return v.Status }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "c3c3868163efd8506e2d8298ee54d4da", "score": "0.5118542", "text": "func (c *BillingstatusClient) Get(ctx context.Context, id int) (*Billingstatus, error) {\n\treturn c.Query().Where(billingstatus.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "a52cbed5811dda99cc8cd3328cfd6a09", "score": "0.5112624", "text": "func healthHandler(response http.ResponseWriter, req *http.Request, rcvr *receiver.Receiver) {\n\tdefer req.Body.Close()\n\tresponse.Header().Set(\"Content-Type\", \"application/json\")\n\n\trcvr.StateLock.Lock()\n\tdefer rcvr.StateLock.Unlock()\n\n\tvar lastChanged time.Time\n\tif rcvr.CurrentState != nil {\n\t\tlastChanged = rcvr.CurrentState.LastChanged\n\t}\n\n\tmessage, _ := json.Marshal(ApiStatus{\n\t\tMessage: \"Healthy!\",\n\t\tLastChanged: lastChanged,\n\t\tServiceChanged: rcvr.LastSvcChanged,\n\t})\n\n\tresponse.Write(message)\n}", "title": "" }, { "docid": "0470ab8d6f6afe5bef90d714236a500a", "score": "0.5112297", "text": "func (s *Server) apiStatusShow(\n\tctx context.Context,\n\treq *http.Request,\n\t_params httprouter.Params,\n) (response, error) {\n\tstatus, err := CollectAppStatus(ctx, s.pool, s.routesStore, s.neighborsStore)\n\treturn status, err\n}", "title": "" }, { "docid": "6414e103bf9f878e2344faa7a5567a6a", "score": "0.5109204", "text": "func (wsm *impl) StatusByMessageID(id uint64) (status *Status, err error) {\n\tconst keyStatus = `status`\n\tvar obj *websmsTypes.RequestStatus\n\tvar req request.Interface\n\tvar rsp *websmsTypes.Status\n\n\t// Авторизация\n\tobj = &websmsTypes.RequestStatus{\n\t\tAuth: websmsTypes.Auth{\n\t\t\tUsername: wsm.cfg.Username,\n\t\t\tPassword: wsm.cfg.Password,\n\t\t},\n\t\tID: id,\n\t\tValue: keyStatus,\n\t}\n\t// Флаги\n\tif wsm.extd {\n\t\tobj.Extended = 1\n\t}\n\t// Запрос\n\treq = singletonTransport.RequestGet().\n\t\tUserAgent(userAgent).\n\t\tMethod(singletonTransport.Method().Post()).\n\t\tContentType(mime.ApplicationXMLCharsetUTF8).\n\t\tDataXML(obj).\n\t\tURL(apiXMLURI)\n\tdefer singletonTransport.RequestPut(req)\n\tsingletonTransport.Do(req)\n\t// Результат\n\trsp = new(websmsTypes.Status)\n\tif err = wsm.SendResponse(req, rsp); err != nil {\n\t\treturn\n\t}\n\t// Конвертирование статуса во вменяемый формат\n\tstatus, err = wsm.statusConvertor(rsp)\n\n\treturn\n}", "title": "" }, { "docid": "834ab9db202b8bf92d884402f1ce5829", "score": "0.50982463", "text": "func (v *Volume) Status() (err error) {\n\tresp, err := http.Get(fmt.Sprintf(\"%s/status\", v.PublicUrl()))\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdefer resp.Body.Close()\n\n\tstatus := new(volumeStatus)\n\tdecoder := json.NewDecoder(resp.Body)\n\tif err = decoder.Decode(status); err != nil {\n\t\treturn\n\t}\n\n\tif status.Error != \"\" {\n\t\terr = errors.New(status.Error)\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "38603ecdf1ed2802dc9742ff38c47e21", "score": "0.50946784", "text": "func HandleSetStatus(s *StatusReq, asc *AppStatChg) {\n\tfound := false\n\tfor i := 0; i < len(UEnv.Instances) && !found; i++ {\n\t\tif UEnv.Instances[i].InstName != s.InstName {\n\t\t\tcontinue\n\t\t}\n\t\tasc.inst = i // found the instance\n\t\tfor j := 0; j < len(UEnv.Instances[i].Apps) && !found; j++ {\n\t\t\tif s.UID != UEnv.Instances[i].Apps[j].UID {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfound = true\n\t\t\tasc.app = j // found the app index\n\t\t\tst := stateToInt(s.State)\n\t\t\tif st < 0 {\n\t\t\t\ts.updateEnv = false\n\t\t\t\thttplog(s, \"Unrecognized State: %s\", s.State)\n\t\t\t\tBadState(s)\n\t\t\t} else {\n\t\t\t\tasc.state = st\n\t\t\t\tSendOKReply(s)\n\t\t\t}\n\t\t}\n\t}\n\tif !found {\n\t\ts.updateEnv = false\n\t\tBadInstUIDCombo(s)\n\t}\n}", "title": "" }, { "docid": "994c7b7902ccd59f49fb1fe05a306784", "score": "0.50925946", "text": "func StatusHandler(srv *httpServ) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tif !validMethod(w, r, srv.Gateway, []string{http.MethodGet}) {\n\t\t\treturn\n\t\t}\n\n\t\tskyAddr := r.URL.Query().Get(\"skyaddr\")\n\t\tif skyAddr == \"\" {\n\t\t\terrorResponse(w, srv.Gateway, http.StatusBadRequest, \"Missing skyaddr\")\n\t\t\treturn\n\t\t}\n\n\t\tif !verifySkycoinAddress(w, srv.Gateway, skyAddr) {\n\t\t\treturn\n\t\t}\n\n\t\tif !readyToStart(w, srv.Gateway, srv.StartAt) {\n\t\t\treturn\n\t\t}\n\n\t\tcxt, cancel := context.WithTimeout(r.Context(), proxyRequestTimeout)\n\t\tdefer cancel()\n\n\t\tstReq := daemon.StatusRequest{SkyAddress: skyAddr}\n\n\t\tsrv.Println(\"Sending StatusRequest to teller, skyaddr\", skyAddr)\n\n\t\trsp, err := srv.Gateway.GetDepositStatuses(cxt, &stReq)\n\t\tif err != nil {\n\t\t\thandleGatewayResponseError(w, srv.Gateway, err)\n\t\t\treturn\n\t\t}\n\n\t\tsrv.Printf(\"Received response to StatusRequest: %+v\\n\", *rsp)\n\n\t\tif rsp.Error != \"\" {\n\t\t\thttputil.ErrResponse(w, http.StatusBadRequest, rsp.Error)\n\t\t\tsrv.Println(rsp.Error)\n\t\t\treturn\n\t\t}\n\n\t\tif err := httputil.JSONResponse(w, makeStatusHTTPResponse(*rsp)); err != nil {\n\t\t\tsrv.Println(err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1e952dca57a9e96a3348b61e38857b30", "score": "0.5089809", "text": "func (h Handler) Status(w http.ResponseWriter, r *http.Request) {\n\tresponses := h.healthchecker.Status()\n\tfor _, r := range responses {\n\t\tif r.Error != nil {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "b02f0347db8a7df689919f63b5260578", "score": "0.5082543", "text": "func (client *Client) StatusGet() (status *Status, err error) {\n\terr = client.get(client.buildPath(\"/status/\"), &status)\n\treturn\n}", "title": "" }, { "docid": "db509a5cc6c8d325402a95439203d892", "score": "0.50764483", "text": "func StatusHandler() http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(http.StatusOK)\n\t}\n}", "title": "" }, { "docid": "081b65b911395bee511ba2211910746a", "score": "0.5071469", "text": "func (dateService) Status(ctx context.Context) (string, error) {\n\treturn \"ok\", nil\n}", "title": "" }, { "docid": "60b0336be7cf59959670057091be5783", "score": "0.5061119", "text": "func GetStatusSniffer(uuid string) (running bool, status bool) {\n owlh, err := ndb.GetStapServerInformation(uuid)\n if err != nil {\n logs.Error(\"Error retrieving stap server information\")\n }\n logs.Info(\"Checking Sniffer status for uuid: \" + uuid)\n\n running, pid, cpu, mem := GetStatusSnifferSSH(uuid)\n cpuStatus := GetStatusCPU(owlh, cpu, uuid)\n memStatus := GetStatusMEM(owlh, mem, uuid)\n storageStatus := GetStatusStorage(owlh, uuid)\n\n logs.Alert(\"Checking \" + owlh[\"name\"] + \" - \" + owlh[\"ip\"] + \" - PID:\" + pid + \" CPU: \" + strconv.FormatBool(cpuStatus) + \" MEM: \" + strconv.FormatBool(memStatus) + \" STORAGE: \" + strconv.FormatBool(storageStatus))\n if cpuStatus && memStatus && storageStatus {\n return running, true\n }\n return running, false\n}", "title": "" }, { "docid": "1ce34da13c02b0ac21075738b591711b", "score": "0.50600797", "text": "func (i *DeleteOrUpdateInvTask) StatusUpdate(_ *taskrunner.TaskContext, _ object.ObjMetadata) {}", "title": "" }, { "docid": "cfabde69b84d2d41ab5314955fff977d", "score": "0.5058098", "text": "func (px *Paxos) Status(seq int) (Fate, interface{}) {\n \n if seq < px.Min() {\n return Forgotten, nil\n }\n\n instance := px.getInstance(seq)\n return instance.Fate, instance.Va\n}", "title": "" }, { "docid": "9b494a49d5e1c1dbeeb4736dd89a1c00", "score": "0.5057923", "text": "func (a *Client) ShowStatus(ctx context.Context, params *ShowStatusParams) (*ShowStatusOK, error) {\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"showStatus\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/status\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &ShowStatusReader{formats: a.formats},\n\t\tAuthInfo: a.authInfo,\n\t\tContext: ctx,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*ShowStatusOK), nil\n\n}", "title": "" }, { "docid": "8d5a956188f4644e5c315687e144c9f8", "score": "0.50565976", "text": "func (jj *Juju) Status(user, service string) (*simplejson.Json, error) {\n //TODO Without id, should return every services matching {user}-*, not everything\n id := jj.id(user, service)\n args := []string{\"status\", \"--format\", \"json\"}\n if service != \"\" {\n args = append(args, id)\n }\n log.Infof(\"fetch juju status (%s)\\n\", id)\n\n cmd := exec.Command(\"juju\", args...)\n output, err := cmd.CombinedOutput()\n if err != nil {\n return EmptyJSON(), err\n }\n log.Debugf(\"successful request: %v\\n\", string(output))\n\n jsonOutput, err := simplejson.NewJson(output)\n if err != nil {\n return EmptyJSON(), err\n }\n\n mapping, _ := vmSshForward(user, jj.Controller, jsonOutput)\n jsonOutput.Set(\"ssh-port\", mapping)\n\n return jsonOutput, err\n}", "title": "" }, { "docid": "3935c70e61c02583c08cd3c91a428823", "score": "0.5055267", "text": "func (c *MetricsService) GetInstanceByID(id string, options ...OptionFunc) (*Instance, *Response, error) {\n\treq, err := c.client.newRequest(CONSOLE, \"GET\", \"v3/metrics/instances/\"+id, nil, options)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\tvar response struct {\n\t\tData Instance `json:\"data\"`\n\t\tStatus string `json:\"status\"`\n\t\tError Error `json:\"error,omitempty\"`\n\t}\n\n\tresp, err := c.client.do(req, &response)\n\tif err != nil {\n\t\tif resp != nil {\n\t\t\tresp.Error = response.Error\n\t\t}\n\t\treturn nil, resp, err\n\t}\n\treturn &response.Data, resp, err\n}", "title": "" }, { "docid": "48d14956c8174c2197aeaa4188cf0ded", "score": "0.50496495", "text": "func (w WaitListStatusRepository) GetByID(id int) (interface{}, error) {\n\tvar sqlStm = `\n\t\tSELECT\ta.id,\n\t\t\t\ta.value,\n\t\t\t\ta.description\n\t\tFROM create_waitlist_status a\n\t\tWHERE a.id = $1`\n\n\tvar object models.WaitListStatusModel\n\n\tif err := w.DB.QueryRow(\n\t\tsqlStm,\n\t\tid,\n\t).Scan(\n\t\t&object.ID,\n\t\t&object.Value,\n\t\t&object.Description,\n\t); err != nil {\n\t\treturn nil, fmt.Errorf(\"%s\", err)\n\t}\n\n\treturn object, nil\n}", "title": "" }, { "docid": "4dfce15e8c436d20e2c9045a04757263", "score": "0.50493205", "text": "func (s *Shell) Status(_ *cli.Context) error {\n\tresp, err := s.HTTP.Get(\"/health?full=1\", nil)\n\tif err != nil {\n\t\treturn s.errorOut(err)\n\t}\n\tdefer func() {\n\t\tif cerr := resp.Body.Close(); cerr != nil {\n\t\t\terr = multierr.Append(err, cerr)\n\t\t}\n\t}()\n\n\treturn s.renderAPIResponse(resp, &HealthCheckPresenters{})\n}", "title": "" }, { "docid": "b9bc7f0a6874ef38602171be8fc16362", "score": "0.50433356", "text": "func (px *Paxos) Status(seq int) (bool, interface{}) {\n\t//DPrintf(\"Status(%d)\\n\", seq)\n\n\tif pi, ok := px.instances[seq]; ok {\n\t\treturn pi.Decided, pi.V_a\n\t}\n\n\t// instace for the seq no does not exist yet\n\tif seq > px.nseq {\n\t\tpx.nseq = seq\n\t}\n\n\treturn false, -1\n}", "title": "" }, { "docid": "e2c6885c2668ca348f14be71d2f9c253", "score": "0.50406784", "text": "func (s *Session) status() (string, error) {\n\tif s.task == nil {\n\t\treturn \"\", errors.New(\"snap task is not running or not found\")\n\t}\n\n\ttask := s.pClient.GetTask(s.task.ID)\n\tif task.Err != nil {\n\t\treturn \"\", errors.Wrapf(task.Err, \"could not get task name:%q, ID:%q\",\n\t\t\ts.task.Name, s.task.ID)\n\t}\n\n\treturn task.State, nil\n}", "title": "" }, { "docid": "2ab0e21f78abb4b243a779c5d5a52680", "score": "0.5034923", "text": "func instanceID(resourceSpec *runtime.RawExtension) (string, error) {\n\tif resourceSpec == nil {\n\t\treturn \"\", nil\n\t}\n\n\tspec := partialSpec{}\n\terr := json.Unmarshal(resourceSpec.Raw, &spec)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"unmarshalling StateResource spec failed\")\n\t}\n\n\treturn spec.InstanceID, nil\n}", "title": "" }, { "docid": "7d848ff50ebfdb1ce10550d8c7755d8b", "score": "0.502712", "text": "func (i *InstanceServiceHandler) Get(ctx context.Context, instanceID string) (*Instance, error) {\n\turi := fmt.Sprintf(\"%s/%s\", instancePath, instanceID)\n\n\treq, err := i.client.NewRequest(ctx, http.MethodGet, uri, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tinstance := new(instanceBase)\n\tif err = i.client.DoWithContext(ctx, req, instance); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn instance.Instance, nil\n}", "title": "" }, { "docid": "adfb074634494c138bde25281742ca21", "score": "0.50220066", "text": "func (imageService Service) ImageStatus(Id string) (Status string, err error) {\n\n\n\turl := strings.TrimSuffix(imageService.URL, \"/\") + \"/images/\" + Id\n\tvar headers http.Header\n\theaders, err = misc.GetHeader(url, imageService.TokenID, imageService.Client)\n\tif err != nil {\n\t\treturn \"\", err\n\t} else {\n\t\tfor header, value := range headers {\n\t\t\t//log.Printf (\"header '%s'='%s'\", header, value[0])\n\t\t\tif strings.ToLower(header) == \"x-image-meta-status\" {\n\t\t\t\tStatus = value[0]\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\treturn Status, nil\n}", "title": "" }, { "docid": "4c007f9076909c56f513b4197dfec609", "score": "0.50201803", "text": "func (c *UserStatusClient) Get(ctx context.Context, id int) (*UserStatus, error) {\n\treturn c.Query().Where(userstatus.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "73ba9c2fe127bb8aa3c74f94ff418045", "score": "0.5019298", "text": "func (s *Server) Status(c *gin.Context) {\n\tc.JSON(200, system.Info())\n}", "title": "" }, { "docid": "bc7e39d23fca0e740b8e080d874ab600", "score": "0.5019047", "text": "func (px *Paxos) Status(seq int) (bool, interface{}) {\n\tstatus := false\n\tvar value interface{} = nil\n\tpx.mu.Lock()\n\tif px.instances[seq] != nil {\n\t\tstatus = px.instances[seq].decided\n\t\tvalue = px.instances[seq].v_a\n\t}\n\tpx.mu.Unlock()\n\treturn status, value\n}", "title": "" } ]
5a88535f204d215b1c1f662389d52b94
Lerp returns the linear interpolation of a to b by the given ratio.
[ { "docid": "48314f97332148495f254635b4ea8dda", "score": "0.9124514", "text": "func Lerp(a, b, ratio float64) float64 { return (b-a)*ratio + a }", "title": "" } ]
[ { "docid": "6b6c760117ab507637e2c15f8d66050a", "score": "0.76151353", "text": "func (a Vec) Lerp(b Vec, p float64) Vec {\n\treturn a.Add(b.Subtract(a).Scale(p))\n}", "title": "" }, { "docid": "b903f3cf23fd8f6d27649005ee6cb43b", "score": "0.72278714", "text": "func Lerp(a, b Vec, t float64) Vec {\n\treturn a.Scaled(1 - t).Add(b.Scaled(t))\n}", "title": "" }, { "docid": "974d8ad622aa07eef54e98c8ea0b9189", "score": "0.7075818", "text": "func Lerp[T vector.Number](a, b Vector[T], t float64) Vector[T] {\n\treturn b.Sub(a).Scale(t).Add(a)\n}", "title": "" }, { "docid": "f4979a93318a156a3b305aef470a7628", "score": "0.7066081", "text": "func lerp(min, max, t float64) float64 {\n\treturn min*(1.0-t) + max*t\n}", "title": "" }, { "docid": "523fe4e6db874d495a7a06c8327dd3d0", "score": "0.69612825", "text": "func lerp(v0, v1 float64, t float64) float64 {\n\treturn (1.0-t)*v0 + t*v1\n}", "title": "" }, { "docid": "4534ef4b20c0a254aa780eff59a80fb0", "score": "0.6610985", "text": "func lerp(value, istart, istop, ostart, ostop float32) float32 {\n\treturn ostart + (ostop-ostart)*((value-istart)/(istop-istart))\n}", "title": "" }, { "docid": "0ef2a89c8234760a1613789304408dd0", "score": "0.64187527", "text": "func linearInterpolation(pointA, pointB GPSCoord, ratio float64) GPSCoord {\n\ta := GPSCoord{pointA.Lat * (1 - ratio), pointA.Lon * (1 - ratio)}\n\tb := GPSCoord{pointB.Lat * ratio, pointB.Lon * ratio}\n\n\treturn GPSCoord{a.Lat + b.Lat, a.Lon + b.Lon}\n}", "title": "" }, { "docid": "a4306480ec255fc8bf54d21938c73c79", "score": "0.6262666", "text": "func (v Vec2) Lerp(w Vec2, t float32) Vec2 {\n\t// return v.Add(w.Sub(v).Mul(t))\n\treturn Vec2{lerp(v.X, w.X, t), lerp(v.Y, w.Y, t)}\n}", "title": "" }, { "docid": "c7f01496fdb54be6292375dedf11ebe3", "score": "0.5943657", "text": "func (l *Line) Interpolate(percent float64) *Point {\n\treturn &Point{\n\t\tl.a[0] + percent*(l.b[0]-l.a[0]),\n\t\tl.a[1] + percent*(l.b[1]-l.a[1]),\n\t}\n}", "title": "" }, { "docid": "de1593069344c4925da0673042552004", "score": "0.58540887", "text": "func FColorLerp(a, b *FColor, n float64) *FColor {\n\tclampFloat64(&n)\n\treturn a.Cl().Multiply(1 - n).Add(b.Cl().Multiply(n))\n}", "title": "" }, { "docid": "359956064ed7d975dfe19e801ff0ab7f", "score": "0.5789858", "text": "func (v vec3) lerp(vOther vec3, t float64) vec3 {\n\treturn vec3{\n\t\tA: lerp(v.A, vOther.A, t),\n\t\tB: lerp(v.B, vOther.B, t),\n\t\tC: lerp(v.C, vOther.C, t),\n\t}\n}", "title": "" }, { "docid": "edb22a791b8d633a8c438a2e675629da", "score": "0.56547946", "text": "func interpolate(a0, a1, w float64) float64 {\n\treturn a0 + (w*w*w*(w*(w*(w*6-15)+10)))*(a1-a0)\n}", "title": "" }, { "docid": "c9000d311ac96c357ce8bdc4138699ce", "score": "0.55430865", "text": "func LagrangeInterpolation(a *big.Int, points map[*big.Int]*big.Int, prime *big.Int) *big.Int {\n\tvalue := big.NewInt(0)\n\tfor key, val := range points {\n\t\tnumerator := big.NewInt(1)\n\t\tdenominator := big.NewInt(1)\n\t\tt := new(big.Int)\n\t\tfor key1 := range points {\n\t\t\tif key == key1 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tt.Sub(a, key1)\n\t\t\tnumerator.Mul(numerator, t)\n\t\t\tnumerator.Mod(numerator, prime)\n\n\t\t\tt.Sub(key, key1)\n\t\t\tdenominator.Mul(denominator, t)\n\t\t\tdenominator.Mod(denominator, prime)\n\t\t}\n\t\tt1 := new(big.Int)\n\t\tdenominator_inv := new(big.Int)\n\t\tdenominator_inv.ModInverse(denominator, prime)\n\t\tt1.Mul(numerator, denominator_inv)\n\t\tt1.Mod(t1, prime)\n\n\t\tt2 := new(big.Int)\n\t\t// (prime + value + t1 * val) % prime\n\t\tt2.Mul(val, t1)\n\t\tt2.Add(t2, prime)\n\t\tt2.Add(t2, prime)\n\n\t\tvalue.Add(value, t2)\n\t\tvalue.Add(value, prime)\n\t}\n\tvalue.Mod(value, prime)\n\treturn value\n}", "title": "" }, { "docid": "a4bfd1e587f77afe50333fda60dc0d6d", "score": "0.5278038", "text": "func (lc *LerpColor) Lerp() (newColor color.Color) {\n\tif !lc.isEnabled {\n\t\tnewColor = color.White\n\t\treturn\n\t}\n\tif lc.start.Add(lc.duration).Before(time.Now()) {\n\t\tlc.isEnabled = false\n\t\tnewColor = lc.endColor\n\t\treturn\n\t}\n\telapsed := time.Since(lc.start).Nanoseconds()\n\tdestNano := lc.start.Add(lc.duration).Sub(lc.start).Nanoseconds()\n\tt := float64(float64(elapsed) / float64(destNano))\n\taR, aB, aG, aA := lc.startColor.RGBA()\n\tbR, bB, bG, bA := lc.endColor.RGBA()\n\tnewColor = color.RGBA64{\n\t\tR: uint16((1-t)*float64(aR) + t*float64(bR)),\n\t\tG: uint16((1-t)*float64(aG) + t*float64(bG)),\n\t\tB: uint16((1-t)*float64(aB) + t*float64(bB)),\n\t\tA: uint16((1-t)*float64(aA) + t*float64(bA)),\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "f56e9a973cad60c5f7364e96527088e9", "score": "0.5164414", "text": "func LagrangeInterpolate(degree int, x []*gmp.Int, y []*gmp.Int, mod *gmp.Int) (Polynomial, error) {\n\t// initialize variables\n\ttmp, err := New(1)\n\tif err != nil {\n\t\treturn Polynomial{}, err\n\t}\n\n\tinter, err := New(degree)\n\tif err != nil {\n\t\treturn Polynomial{}, err\n\t}\n\n\tproduct := NewOne()\n\n\tresultPoly, err := New(degree)\n\tif err != nil {\n\t\treturn Polynomial{}, err\n\t}\n\n\tdenominator := gmp.NewInt(0)\n\n\t// tmp(x) = x - x[i]\n\ttmp.SetCoefficient(1, 1)\n\t// note only the first degree points are used\n\tfor i := 0; i <= degree; i++ {\n\t\ttmp.GetPtrToConstant().Neg(x[i])\n\t\tproduct.MulSelf(tmp)\n\t}\n\n\tfor i := 0; i <= degree; i++ {\n\t\tdenominator.Set(gmp.NewInt(1))\n\t\t// compute denominator and numerator\n\n\t\t// tmp = x - x[i]\n\t\ttmp.SetCoefficient(1, 1) // i don't think this needed...\n\t\ttmp.GetPtrToConstant().Neg(x[i])\n\n\t\t// inner(x) = (x-1)(x_2)...(x-n) except for (x-i)\n\t\terr = inter.Div2(product, tmp)\n\t\tif err != nil {\n\t\t\treturn Polynomial{}, err\n\t\t}\n\n\t\t// lambda_i(x) = inner(x) * y[i] / inner(x[i])\n\n\t\tinter.Mod(mod)\n\t\tinter.EvalMod(x[i], mod, denominator)\n\n\t\t// panic if denominator == 0\n\t\tif 0 == denominator.CmpInt32(0) {\n\t\t\treturn Polynomial{}, errors.New(\"internal error: check duplication in x[]\")\n\t\t}\n\n\t\tdenominator.ModInverse(denominator, mod)\n\t\tdenominator.Mul(denominator, y[i])\n\t\tresultPoly.AddMul(inter, denominator)\n\t}\n\n\tresultPoly.Mod(mod)\n\n\treturn resultPoly, nil\n}", "title": "" }, { "docid": "b015c760c440c683a7cab771fe2ea426", "score": "0.5160353", "text": "func (e *ease) Interpolate(t float64) float64 {\n\treturn e.fp(t)\n}", "title": "" }, { "docid": "d07396ab4507f8cf6c8e0865cca4b4ee", "score": "0.5077015", "text": "func (e *Map) LerpPosition(endPosition common.Vector, duration time.Duration, isDestroyed bool, endFunc func()) {\n\te.lerpPosition.start = time.Now()\n\te.lerpPosition.startPosition = &common.Vector{X: e.shape.Min.X, Y: e.shape.Min.Y}\n\te.lerpPosition.endPosition = &common.Vector{X: endPosition.X, Y: endPosition.Y}\n\te.lerpPosition.duration = duration\n\te.lerpPosition.isEnabled = true\n\te.lerpPosition.endFunc = endFunc\n\te.lerpPosition.isDestroyed = isDestroyed\n}", "title": "" }, { "docid": "e420dd5a1c84092236aada484e1a5b26", "score": "0.5026978", "text": "func (gdt *Vector2) LinearInterpolate(b Vector2, t Real) Vector2 {\n\targ0 := gdt.getBase()\n\targ1 := b.getBase()\n\targ2 := t.getBase()\n\n\tret := C.go_godot_vector2_linear_interpolate(GDNative.api, arg0, arg1, arg2)\n\n\treturn Vector2{base: &ret}\n\n}", "title": "" }, { "docid": "ea474379c1c4383676b9fe167ab9d4cc", "score": "0.49537563", "text": "func LinearBackoff(base, max time.Duration) Backoff {\n\treturn func(n int) time.Duration {\n\t\td := base * time.Duration(n)\n\t\tif d > max {\n\t\t\treturn max\n\t\t}\n\n\t\treturn d\n\t}\n}", "title": "" }, { "docid": "56da4ad05924a1e9c8824ff2a2ded5e8", "score": "0.49495268", "text": "func LinearWithJitter(waitBetween time.Duration, jitterFraction float64) Func {\n\tr := rand.New(rand.NewSource(time.Now().UnixNano()))\n\treturn func(attempt int) time.Duration {\n\t\tmultiplier := jitterFraction * (r.Float64()*2 - 1)\n\t\treturn time.Duration(float64(waitBetween) * (1 + multiplier))\n\t}\n}", "title": "" }, { "docid": "3a26fb955639e38d2ab19746f880c4fe", "score": "0.49149978", "text": "func (p *Path) Interpolate(percent float64) *Point {\n\n\tif percent <= 0 {\n\t\treturn p.First()\n\t} else if percent >= 1 {\n\t\treturn p.Last()\n\t}\n\n\tdestination := p.Distance() * percent\n\ttravelled := 0.0\n\n\tfor i := 0; i < len(p.PointSet)-1; i++ {\n\t\tseg := NewLine(&p.PointSet[i], &p.PointSet[i+1])\n\t\tsegDistance := seg.Distance()\n\t\tif (travelled + segDistance) > destination {\n\t\t\tvar remainder = destination - travelled\n\t\t\treturn seg.Interpolate(remainder / segDistance)\n\t\t}\n\t\ttravelled += segDistance\n\t}\n\n\treturn p.First()\n}", "title": "" }, { "docid": "b62cb841e3a2f8bcf0b297098ce772d8", "score": "0.48604086", "text": "func Perlin(x, y, z float64) float64 {\n\txi := int(math.Floor(x)) & 255\n\tyi := int(math.Floor(y)) & 255\n\tzi := int(math.Floor(z)) & 255\n\tx -= math.Floor(x)\n\ty -= math.Floor(y)\n\tz -= math.Floor(z)\n\tu := fade(x)\n\tv := fade(y)\n\tw := fade(z)\n\ta := p[xi] + yi\n\taa := p[a] + zi\n\tab := p[a+1] + zi\n\tb := p[xi+1] + yi\n\tba := p[b] + zi\n\tbb := p[b+1] + zi\n\n\tval := Lerp(\n\t\tLerp(\n\t\t\tLerp(\n\t\t\t\tgrad(p[aa], x, y, z),\n\t\t\t\tgrad(p[ba], x-1, y, z),\n\t\t\t\tu),\n\t\t\tLerp(\n\t\t\t\tgrad(p[ab], x, y-1, z),\n\t\t\t\tgrad(p[bb], x-1, y-1, z),\n\t\t\t\tu),\n\t\t\tv),\n\t\tLerp(\n\t\t\tLerp(\n\t\t\t\tgrad(p[aa+1], x, y, z-1),\n\t\t\t\tgrad(p[ba+1], x-1, y, z-1),\n\t\t\t\tu),\n\t\t\tLerp(\n\t\t\t\tgrad(p[ab+1], x, y-1, z-1),\n\t\t\t\tgrad(p[bb+1], x-1, y-1, z-1),\n\t\t\t\tu),\n\t\t\tv),\n\t\tw)\n\n\t// Actual range is between -1 and +1, change to 0 to +1.\n\treturn (val + 1) / 2\n}", "title": "" }, { "docid": "101e9cc77ece52c865eff0710f0221a1", "score": "0.48311922", "text": "func Linear(base time.Duration) Delay {\n\treturn func(iteration int) time.Duration {\n\t\treturn base * time.Duration(iteration)\n\t}\n}", "title": "" }, { "docid": "72695ce4163eff4b91a2f8c42ea7097a", "score": "0.47675523", "text": "func LinearBackoff(backoff time.Duration) RetryStrategy {\n\treturn linearBackoff(backoff)\n}", "title": "" }, { "docid": "b15bd6c46689dcdecf98cf1db9efc217", "score": "0.47097096", "text": "func InterpolateOnRange(values []fr.Element) []fr.Element {\n\tnEvals := len(values)\n\tlagrange := GetLagrangePolynomial(nEvals)\n\tresult := make([]fr.Element, nEvals)\n\tvar tmp fr.Element\n\n\tfor i, value := range values {\n\t\tfor j, lagrangeCoeff := range lagrange[i] {\n\t\t\ttmp.Set(&lagrangeCoeff)\n\t\t\ttmp.Mul(&tmp, &value)\n\t\t\tresult[j].Add(&result[j], &tmp)\n\t\t}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "e4ff0399c7b5e18eee0e82ce3a0dd419", "score": "0.4654994", "text": "func NewLinearBackoff(minInterval, addInterval, maxInterval time.Duration) Backoff {\n\tb := &linearBackoff{\n\t\tminInterval: minInterval,\n\t\taddInterval: addInterval,\n\t\tmaxInterval: maxInterval,\n\t}\n\n\tb.Reset()\n\treturn b\n}", "title": "" }, { "docid": "678480420943b76c61b1e78d9b16561c", "score": "0.46418864", "text": "func (dst Buffer) LinearRamp(initial, target float32) {\n\tdelta := (target - initial) / float32(len(dst))\n\tfor i := range dst {\n\t\tdst[i] *= initial\n\t\tinitial += delta\n\t}\n}", "title": "" }, { "docid": "b2ca428925d395992ce2d76890f1031c", "score": "0.46327442", "text": "func BackoffLinearWithJitter(waitBetween time.Duration, jitterFraction float64) BackoffFunc {\n\treturn func(ctx context.Context, attempt uint) time.Duration {\n\t\treturn jitterUp(waitBetween, jitterFraction)\n\t}\n}", "title": "" }, { "docid": "b8118de7f88f41a8357a8220e6f8319a", "score": "0.45671004", "text": "func (tube *Tube) RateInterpolation() {\n\ttube.CurData.GlotPitch += tube.CurDelta.GlotPitch\n\ttube.CurData.GlotVol += tube.CurDelta.GlotVol\n\ttube.CurData.AspVol += tube.CurDelta.AspVol\n\ttube.CurData.FricVol += tube.CurDelta.FricVol\n\ttube.CurData.FricPos += tube.CurDelta.FricPos\n\ttube.CurData.FricCf += tube.CurDelta.FricCf\n\ttube.CurData.FricBw += tube.CurDelta.FricBw\n\tfor i := 0; i < OroPharynxRegCnt; i++ {\n\t\ttube.CurData.Radii[i] += tube.CurDelta.Radii[i]\n\t}\n\ttube.CurData.Velum += tube.CurDelta.Velum\n}", "title": "" }, { "docid": "22831d6b630bcda32023a9f5354a51ad", "score": "0.45520216", "text": "func perlin(x, y float64) (value float64) {\n\t// determine the gradient vector to interpolate with\n\t// by snapping to gradientField coordinates\n\tx0 := int(x) // left side\n\tx1 := x0 + 1 // right side\n\ty0 := int(y) // top side\n\ty1 := y0 + 1 // bottom side\n\n\tsx := x - float64(x0) // determine x-axis interpolation weight\n\tsy := y - float64(y0) // determine y-axis interpolation weight\n\n\tn0 := dotWithGradient(x0, y0, x, y) // top left corner\n\tn1 := dotWithGradient(x1, y0, x, y) // top right corner\n\tix0 := interpolate(n0, n1, sx) // interpolate along the top\n\n\tn0 = dotWithGradient(x0, y1, x, y) // bottom left corner\n\tn1 = dotWithGradient(x1, y1, x, y) // bottom right corner\n\tix1 := interpolate(n0, n1, sx) // interpolate along the bottom\n\n\tvalue = interpolate(ix0, ix1, sy) // interpolate along the y-axis\n\n\treturn\n}", "title": "" }, { "docid": "5e4704d65290aaf1824c96d79179f438", "score": "0.4512746", "text": "func (i *ClosestInterpolator) Interpolate(ts float64) (dp *pipescript.Datapoint, err error) {\n\n\tfor i.curDatapoint != nil && i.curDatapoint.Timestamp <= ts {\n\t\ti.prevDatapoint = i.curDatapoint\n\t\ti.curDatapoint, err = i.Iterator.Next()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif i.prevDatapoint == nil {\n\t\treturn i.curDatapoint, nil\n\t}\n\tif i.curDatapoint == nil {\n\t\treturn i.prevDatapoint, nil\n\t}\n\t//Both prev and cur are not nil. Find which one is closer to ts\n\tif math.Abs(i.prevDatapoint.Timestamp-ts) <= math.Abs(i.curDatapoint.Timestamp-ts) {\n\t\treturn i.prevDatapoint, nil\n\t}\n\treturn i.curDatapoint, nil\n}", "title": "" }, { "docid": "dc8f51170bb4aaefce2b1310251d54bf", "score": "0.44572052", "text": "func ratio(a, b string) float64 {\n\tt := float64(len(a) + len(b))\n\tm := 0.0\n\tsa := strings.Split(a, \"\")\n\tsb := strings.Split(b, \"\")\n\tfor idx := range sb {\n\t\taidx := strings.Index(a, sb[idx])\n\t\tif aidx > -1 {\n\t\t\tsa = append(sa[:aidx], sa[aidx+1:]...)\n\t\t\ta = strings.Join(sa, \"\")\n\t\t\tm = m + 1.0\n\t\t}\n\t}\n\treturn 2.0 * m / t\n}", "title": "" }, { "docid": "84fed466a97d68d184e21971f8e08932", "score": "0.4445603", "text": "func BackoffLinear(waitBetween time.Duration) BackoffFunc {\n\treturn func(ctx context.Context, attempt uint) time.Duration {\n\t\treturn waitBetween\n\t}\n}", "title": "" }, { "docid": "aaa2496d84d83fbaee0c69fefee3b586", "score": "0.44118473", "text": "func NewLinearRetryer(interval time.Duration, maxRetries int) Retryer {\n\treturn RetryerFunc(func(action ActionFunc) (retries int) {\n\t\tfor retries = 1; !action() && retries < maxRetries; retries++ {\n\t\t\ttime.Sleep(interval)\n\t\t}\n\t\treturn\n\t})\n}", "title": "" }, { "docid": "783b5a22d4990f4439d763c8ae1638a3", "score": "0.4351275", "text": "func Interpolate(ic hieraapi.Invocation, value px.Value, allowMethods bool) px.Value {\n\tresult, _ := doInterpolate(ic, value, allowMethods)\n\treturn result\n}", "title": "" }, { "docid": "cda3aa61d34c3a1fc09a4dbdee5dab2b", "score": "0.43258005", "text": "func (s LineString) InterpolatePoint(fraction float64) Point {\n\tif s.IsEmpty() {\n\t\treturn Point{}.ForceCoordinatesType(s.CoordinatesType())\n\t}\n\tinterp := newLinearInterpolator(s.Coordinates())\n\treturn interp.interpolate(fraction)\n}", "title": "" }, { "docid": "f8281a02a1db9612068410017d21d597", "score": "0.42823842", "text": "func (g *gameLayer) Interpolate(interpolation float64) {\n\tvalue := g.angularMotion.Interpolate(interpolation)\n\tg.rectNode.SetRotation(value.(float64))\n}", "title": "" }, { "docid": "e849c1675c42a855869947a603e5d9eb", "score": "0.41993785", "text": "func LinearScale(dmin, dmax, min, max float64) Scale {\n return func(x float64) float64 {\n return ((x - dmin) * (max - min) / (dmax - dmin)) + min\n }\n}", "title": "" }, { "docid": "da6e906c1b07d0b9b02c4c9cc77dd640", "score": "0.4168331", "text": "func Blend(v ...float64) float64 {\n\tt := (v[2] + 1) / 2\n\treturn (1-t)*v[0] + t*v[1]\n}", "title": "" }, { "docid": "c41263dea36ce1ec318edac3a17cfa89", "score": "0.4097039", "text": "func (a *dbeat) calculateLoad(oldValue uint64, newValue uint64, duration uint64) float64 {\n\tvalue := int64(oldValue - newValue)\n\tif value < 0 || duration == 0 {\n\t\treturn float64(0)\n\t}\n\treturn float64(value) / (float64(duration) * float64(1000000000))\n}", "title": "" }, { "docid": "0e39416ca190d07f9c8fe48fb9d246f8", "score": "0.40810895", "text": "func Slope(start Coord, end Coord) Fraction {\n\t// rise := end.Y - start.Y they flipped the y axis, so a y value of 10 is above a y value of 12\n\trise := start.Y - end.Y\n\trun := end.X - start.X\n\treturn Fraction{Numerator: rise, Denominator: run}\n}", "title": "" }, { "docid": "598aa86a296fa5f7ee3ddb05c9e1a51f", "score": "0.40672126", "text": "func NewLinear(min, max floatgeom.Point3) Range {\n\tif max == min {\n\t\treturn Constant(min)\n\t}\n\tmin2 := min.LesserOf(max)\n\tmax2 := max.GreaterOf(min)\n\treturn linear{min2, max2, nowRand()}\n}", "title": "" }, { "docid": "d3c0d19ca6675ccce803b8c8288fb98a", "score": "0.40537363", "text": "func (i *MyImage) GetColorWithLinearInterpolation(x float64, y float64) *mycolor.MyColor {\n\t// the 4 neighboring pixel indices\n\tx0 := utils.IntClamp(int(x-0.5), 0, i.xres-1)\n\tx1 := utils.IntClamp(int(x+0.5), 0, i.xres-1)\n\ty0 := utils.IntClamp(int(y-0.5), 0, i.yres-1)\n\ty1 := utils.IntClamp(int(y+0.5), 0, i.yres-1)\n\n\t// percent of the way from x0 to x1\n\txPct := (x - 0.5) - float64(int(x-0.5))\n\tyPct := (y - 0.5) - float64(int(y-0.5))\n\t// get pixels and interpolate\n\tc00 := i.pixels[x0][y0]\n\tc01 := i.pixels[x0][y1]\n\tc10 := i.pixels[x1][y0]\n\tc11 := i.pixels[x1][y1]\n\tr := uint8((float64(c00.R)*(1-xPct)+float64(c10.R)*xPct)*(1-yPct) + (float64(c01.R)*(1-xPct)+float64(c11.R)*xPct)*yPct)\n\tg := uint8((float64(c00.G)*(1-xPct)+float64(c10.G)*xPct)*(1-yPct) + (float64(c01.G)*(1-xPct)+float64(c11.G)*xPct)*yPct)\n\tb := uint8((float64(c00.B)*(1-xPct)+float64(c10.B)*xPct)*(1-yPct) + (float64(c01.B)*(1-xPct)+float64(c11.B)*xPct)*yPct)\n\tcResult := &mycolor.MyColor{r, g, b, 255, 0, 0, 0, 0}\n\tcResult.ComputeHSV()\n\treturn cResult\n}", "title": "" }, { "docid": "5163b508898115c526c17d7160d3657e", "score": "0.40450317", "text": "func (m *Mockinterpolator) Interpolate(s string) (string, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Interpolate\", s)\n\tret0, _ := ret[0].(string)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "3d6331a0ead4c8420d793344254654f3", "score": "0.40446618", "text": "func (b *bytewatch) Lap(bytes int64) (dur time.Duration, bps int64) {\n\tdur = time.Since(b.begin)\n\tdur -= dur % time.Second\n\tif dur < time.Second {\n\t\tdur = time.Second\n\t}\n\treturn dur, bytes / int64(dur.Seconds())\n}", "title": "" }, { "docid": "7b49a8b2a7749687ab9a64d3916fdca7", "score": "0.4031884", "text": "func rParameter(p1, p2, p geom.Coord) float64 {\n\tvar r float64\n\t// compute maximum delta, for numerical stability\n\t// also handle case of p1-p2 being vertical or horizontal\n\tif dx, dy := math.Abs(p2[0]-p1[0]), math.Abs(p2[1]-p1[1]); dx > dy {\n\t\tr = (p[0] - p1[0]) / (p2[0] - p1[0])\n\t} else {\n\t\tr = (p[1] - p1[1]) / (p2[1] - p1[1])\n\t}\n\treturn r\n}", "title": "" }, { "docid": "4b46fc78e950afeccc0dd8e788898943", "score": "0.40210006", "text": "func NewRatioSampler(r float64) Sampler {\n\tif r < 0 || r > 1.0 {\n\t\tpanic(errors.Errorf(\"ratio %v out of range [0,1.0]\", r))\n\t}\n\tr = roundSampleRate(r)\n\tvar x big.Float\n\tx.SetUint64(math.MaxUint64)\n\tx.Mul(&x, big.NewFloat(r))\n\tceil, _ := x.Uint64()\n\treturn ratioSampler{r, ceil}\n}", "title": "" }, { "docid": "a1c1c5f6da9dfda39fea3efea13b7335", "score": "0.40131357", "text": "func (z *InfraComplex) CrossRatioL(v, w, x, y *InfraComplex) *InfraComplex {\n\ttemp := new(InfraComplex)\n\tz.Sub(w, x)\n\tz.Inv(z)\n\ttemp.Sub(v, x)\n\tz.Mul(z, temp)\n\ttemp.Sub(v, y)\n\ttemp.Inv(temp)\n\tz.Mul(z, temp)\n\ttemp.Sub(w, y)\n\treturn z.Mul(z, temp)\n}", "title": "" }, { "docid": "47ea7ffa247490604d2e8d2f6280712a", "score": "0.40061665", "text": "func (lfr Linear) Poll() float64 {\n\treturn ((lfr.Max - lfr.Min) * lfr.rng.Float64()) + lfr.Min\n}", "title": "" }, { "docid": "cdf6f45ca388e0ecc1c023866bb6e357", "score": "0.40014505", "text": "func NewRatioStrategy(config *viper.Viper, inv Inventory, mon Monitor, log *logrus.Entry) (Strategy, error) {\n\treturn &RatioStrategy{Config: config, Inventory: inv, Monitor: mon, log: log}, nil\n}", "title": "" }, { "docid": "f0302ff6233cf15cc0cd5a16fb4c5673", "score": "0.3990646", "text": "func (z *Ultra) Scal(y *Ultra, a *big.Rat) *Ultra {\n\tz.l.Scal(&y.l, a)\n\tz.r.Scal(&y.r, a)\n\treturn z\n}", "title": "" }, { "docid": "236624b5134ca27a0652fd93e4b90cab", "score": "0.3990141", "text": "func (p *PJ) LPDist(a, b Coord) float64 {\n\tp.context.Lock()\n\tdefer p.context.Unlock()\n\treturn (float64)(C.proj_lp_dist(p.pj, *(*C.PJ_COORD)(unsafe.Pointer(&a)), *(*C.PJ_COORD)(unsafe.Pointer(&b))))\n}", "title": "" }, { "docid": "11dec348b3b64778f986d2614c94bc18", "score": "0.39853033", "text": "func (c SRGBnA) Linear() (r, g, b, a float32) {\n\ta = c.A\n\tr = srgbToLinear(a * c.R)\n\tg = srgbToLinear(a * c.G)\n\tb = srgbToLinear(a * c.B)\n\treturn r, g, b, a\n}", "title": "" }, { "docid": "2f90159a5f056d0dc7ff5c70d6e09be4", "score": "0.3982223", "text": "func Mod(a, b float64) float64 {\n\tab := a / b\n\treturn a - b*Floor(ab)\n}", "title": "" }, { "docid": "20ae6dbe265900a362b11a46a54687c7", "score": "0.39028436", "text": "func NewLinear(min, max float64) Range {\n\treturn Linear{min, max, nowRand()}\n}", "title": "" }, { "docid": "2be835a075e645253fa31b20c8f783c3", "score": "0.38993445", "text": "func (lc *LerpColor) Init(start time.Time, startColor color.Color, endColor color.Color, duration time.Duration, endFunc func(), isDestroyedAtEnd bool) {\n\tlc.start = time.Now()\n\tlc.startColor = startColor\n\tlc.endColor = endColor\n\tlc.duration = duration\n\tlc.endFunc = endFunc\n\tlc.isEnabled = true\n\tlc.isDestroyed = isDestroyedAtEnd\n}", "title": "" }, { "docid": "3e7c7956b3eceb2b9a4c4f34a6670c86", "score": "0.38989747", "text": "func NewLinear() *Linear {\n\treturn &Linear{step: 1.0}\n}", "title": "" }, { "docid": "ed71d53824a9e0c4919801ad791180f1", "score": "0.38797522", "text": "func (z *Hamilton) CrossRatioL(v, w, x, y *Hamilton) *Hamilton {\n\ttemp := new(Hamilton)\n\tz.Sub(w, x)\n\tz.Inv(z)\n\ttemp.Sub(v, x)\n\tz.Mul(z, temp)\n\ttemp.Sub(v, y)\n\ttemp.Inv(temp)\n\tz.Mul(z, temp)\n\ttemp.Sub(w, y)\n\treturn z.Mul(z, temp)\n}", "title": "" }, { "docid": "84a1c025fdd1e1938909cc84893fe5cd", "score": "0.38789153", "text": "func NewClosestInterpolator(dpi pipescript.DatapointIterator) (*ClosestInterpolator, error) {\n\tpd, err := dpi.Next()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcd, err := dpi.Next()\n\n\treturn &ClosestInterpolator{dpi, pd, cd}, err\n}", "title": "" }, { "docid": "ce7beb796f32af42be90521bb5801d47", "score": "0.3859213", "text": "func (z *Rat43) Scale(y *Rat43, a *big.Rat) *Rat43 {\n\tz.l.Mul(&y.l, a)\n\tz.r.Mul(&y.r, a)\n\treturn z\n}", "title": "" }, { "docid": "aecdfbad91a6455f358d9c40aacbe897", "score": "0.38459826", "text": "func Blend(dst []byte, src []byte) int", "title": "" }, { "docid": "e698bcd7ff0078310a610112f37a1f98", "score": "0.38386512", "text": "func (lfr Linear) Mult(f float64) Range {\n\tlfr.Max *= f\n\tlfr.Min *= f\n\treturn lfr\n}", "title": "" }, { "docid": "b4f6da0bd50221a2c1560ec3f5625d09", "score": "0.38309547", "text": "func Interpolation(i Interpolator) optFunc {\n\treturn func(o *options) {\n\t\to.interpolation = i\n\t}\n}", "title": "" }, { "docid": "2786d78ad1bb2bd0a5768599bbcb8a15", "score": "0.38035274", "text": "func (lfr Linear) Percentile(f float64) float64 {\n\treturn ((lfr.Max - lfr.Min) * f) + lfr.Min\n}", "title": "" }, { "docid": "cad6b4edbcb309c0072087b66c0823e5", "score": "0.3758596", "text": "func ChangeToFunnelPct(v float64) float64 { return v * 100.0 }", "title": "" }, { "docid": "dfc42114652bcce7640e037b32774565", "score": "0.3754191", "text": "func Interpolate(data interface{}) options.DataType {\n\tcount := make(map[options.DataType]float64)\n\tvals := data.([]interface{})\n\tif n := GetInterpolationMaximum(); len(vals) > n {\n\t\tvals = vals[:n]\n\t}\n\tfor _, val := range vals {\n\t\tswitch val.(type) {\n\t\tcase float32, float64:\n\t\t\tcount[options.Float64]++\n\t\tcase int, int8, int16, int32, int64, uint, uint8, uint16, uint32, uint64:\n\t\t\tcount[options.Int64]++\n\t\tcase string:\n\t\t\tcount[options.String]++\n\t\tcase bool:\n\t\t\tcount[options.Bool]++\n\t\tcase time.Time:\n\t\t\tcount[options.DateTime]++\n\t\t}\n\t}\n\ttype ratios struct {\n\t\tFloat64 float64\n\t\tInt64 float64\n\t\tString float64\n\t\tBool float64\n\t\tDateTime float64\n\t}\n\tr := ratios{\n\t\tFloat64: count[options.Float64] / float64(len(vals)),\n\t\tInt64: count[options.Int64] / float64(len(vals)),\n\t\tString: count[options.String] / float64(len(vals)),\n\t\tBool: count[options.Bool] / float64(len(vals)),\n\t\tDateTime: count[options.DateTime] / float64(len(vals)),\n\t}\n\tvar max float64\n\tvar maxType string\n\tv := reflect.ValueOf(r)\n\tfor i := 0; i < v.NumField(); i++ {\n\t\tif ratio := v.Field(i).Float(); ratio > max {\n\t\t\tmax = ratio\n\t\t\tmaxType = v.Type().Field(i).Name\n\t\t}\n\t}\n\tif max >= GetInterpolationThreshold() {\n\t\treturn options.DT(maxType)\n\t}\n\tif r.Float64+r.Int64 >= GetInterpolationThreshold() {\n\t\treturn options.Float64\n\t}\n\treturn options.Interface\n}", "title": "" }, { "docid": "e53c28fa40287ea0d1cefbc005c749c7", "score": "0.37524837", "text": "func (selector *Select2D) Get2D(x float64, y float64) (v float64) {\n\tcontrol := selector.Control.Get2D(x, y)\n\n\t// process the lack of edge falloff first\n\tif selector.EdgeFalloff <= 0.0 {\n\t\tif selector.LowerBound < control && control < selector.UpperBound {\n\t\t\treturn selector.SourceB.Get2D(x, y)\n\t\t}\n\t\treturn selector.SourceA.Get2D(x, y)\n\t}\n\n\t// if we got here, then edge falloff is positive\n\tif control < selector.LowerBound-selector.EdgeFalloff {\n\t\treturn selector.SourceA.Get2D(x, y)\n\t}\n\tif control < selector.LowerBound+selector.EdgeFalloff {\n\t\tlower := selector.LowerBound - selector.EdgeFalloff\n\t\tupper := selector.LowerBound + selector.EdgeFalloff\n\t\tv := (control - lower) / (upper - lower)\n\t\tlerpControl := calcCubicSCurve(v)\n\t\ta := selector.SourceA.Get2D(x, y)\n\t\tb := selector.SourceB.Get2D(x, y)\n\t\treturn lerp(a, b, lerpControl)\n\t}\n\tif control < selector.UpperBound-selector.EdgeFalloff {\n\t\treturn selector.SourceB.Get2D(x, y)\n\t}\n\tif control < selector.UpperBound+selector.EdgeFalloff {\n\t\tlower := selector.UpperBound - selector.EdgeFalloff\n\t\tupper := selector.UpperBound + selector.EdgeFalloff\n\t\tv := (control - lower) / (upper - lower)\n\t\tlerpControl := calcCubicSCurve(v)\n\t\ta := selector.SourceA.Get2D(x, y)\n\t\tb := selector.SourceB.Get2D(x, y)\n\t\treturn lerp(b, a, lerpControl)\n\t}\n\treturn selector.SourceA.Get2D(x, y)\n}", "title": "" }, { "docid": "c8d9614d8400a7e1f4c5c61b668b746d", "score": "0.37376037", "text": "func increaseDelay(oldDelay time.Duration, factor float64, min, max time.Duration) time.Duration {\n\tdelay := time.Duration(float64(oldDelay) * factor)\n\tif delay < min {\n\t\tdelay = min\n\t}\n\tif delay > max {\n\t\tdelay = max\n\t}\n\treturn delay\n}", "title": "" }, { "docid": "9c21738606d9e9d54ffd13530b8523b7", "score": "0.37253475", "text": "func (o TargetPoolOutput) FailoverRatio() pulumi.Float64PtrOutput {\n\treturn o.ApplyT(func(v *TargetPool) pulumi.Float64PtrOutput { return v.FailoverRatio }).(pulumi.Float64PtrOutput)\n}", "title": "" }, { "docid": "3577fb51687af4ba3ff0d2b2736fd216", "score": "0.3721644", "text": "func translatePercentages(ps []Percent) {\n\tvar prev Percent = 0\n\tfor i, p := range ps {\n\t\tprev, ps[i] = p, p-prev\n\t}\n}", "title": "" }, { "docid": "20ca2353969e373f232dd683731ce653", "score": "0.37213898", "text": "func Lagrange(f []big.Int, x []big.Int) big.Int {\n\n\tdegree := len(x) - 1\n\n\tb := evaluateB(x)\n\n\t//fmt.Println(\"b\", b)\n\n\ts := big.NewInt(0)\n\n\ttemp1 := big.NewInt(1)\n\n\tfor i := 0; i < degree+1; i++ {\n\t\ttemp1.Mul(&f[i], &b[i])\n\t\ts.Add(s, temp1)\n\t\ts.Mod(s, secp256k1_N)\n\t}\n\n\treturn *s\n}", "title": "" }, { "docid": "91de09ee7e39b3bdc4ec3097c740d62e", "score": "0.37147048", "text": "func newBackoff(min, max time.Duration, factor float64) *backoff {\n\t// In case of 0 min/max values apply defaults\n\tif min <= 0 {\n\t\tmin = defaultMinDuration\n\t}\n\tif max <= 0 {\n\t\tmax = defaultMaxDuration\n\t}\n\tif factor <= 0 {\n\t\tfactor = defaultFactor\n\t}\n\treturn &backoff{\n\t\tlock: sync.Mutex{},\n\t\tMin: min,\n\t\tMax: max,\n\t\tFactor: factor,\n\t}\n}", "title": "" }, { "docid": "6af67ebfa8bb10403c4e04f7c182530b", "score": "0.37106755", "text": "func Rate(pv, fv, periods float64) float64 {\n\treturn math.Pow(fv/pv, 1.0/periods) - 1\n}", "title": "" }, { "docid": "660c38d6edb94003db305ec44ec09cd0", "score": "0.3709272", "text": "func Multiplier(ratio float64) Adjuster {\n\treturn func(i float64) float64 {\n\t\treturn i * ratio\n\t}\n}", "title": "" }, { "docid": "4033e09ad1c040a78a33b16ded618a5e", "score": "0.36996436", "text": "func (p *ParabolaWithOrigin) LenghtOfLatusRation() float64 {\n\treturn (p.A * 4)\n}", "title": "" }, { "docid": "9e77f088ef2a0548089f86989d330a4c", "score": "0.3696232", "text": "func Diff(u, v float64) float64 {\n\tt := (u - v + 2) / 4\n\treturn (1-t)*u + t*v\n}", "title": "" }, { "docid": "8d378de34f771776e40ec95ffe983d30", "score": "0.36781844", "text": "func ResLmt(f_in, res float64) (f_out float64) {\n return math.Trunc(f_in*res+0.499) / res //' round rather than simply truncate\n}", "title": "" }, { "docid": "d9c017383799a2e0dff34400b82807e7", "score": "0.3676775", "text": "func ScaleValueBetweenTwoRanges(value, oldRangeMin, oldRangeMax, newRangeMin, newRangeMax float64) float64 {\n\tif value <= oldRangeMin {\n\t\treturn newRangeMin\n\t}\n\n\tif value >= oldRangeMax {\n\t\treturn newRangeMax\n\t}\n\n\tdistanceAcrossOldRange := oldRangeMax - oldRangeMin\n\tvalueDistanceAcrossOldRange := value - oldRangeMin\n\tratioAcrossRange := valueDistanceAcrossOldRange / distanceAcrossOldRange\n\tdistanceAcrossNewRange := newRangeMax - newRangeMin\n\treturn (ratioAcrossRange * distanceAcrossNewRange) + newRangeMin\n}", "title": "" }, { "docid": "14a7922349d35379fa72b30b274661eb", "score": "0.36745453", "text": "func ratio(percent int) float64 {\n\treturn float64(percent) / 100\n}", "title": "" }, { "docid": "9f022dbea438777864e06042601936ad", "score": "0.36721417", "text": "func RGB2HSL(c RGB) HSL {\n\tR, G, B := float64(c.R)/255.0, float64(c.G)/255.0, float64(c.B)/255.0\n\n\tmax := math.Max(math.Max(R, G), B)\n\tmin := math.Min(math.Min(R, G), B)\n\n\th, s, l := 0.0, 0.0, (min+max)/2.0\n\n\tif max != min {\n\t\td := max - min\n\n\t\tif l > 0.5 {\n\t\t\ts = d / (2.0 - max - min)\n\t\t} else {\n\t\t\ts = d / (max + min)\n\t\t}\n\n\t\th = calcHUE(max, R, G, B, d)\n\t}\n\n\treturn HSL{h, s, l}\n}", "title": "" }, { "docid": "4a46949d5430b3749debd92f1946ad65", "score": "0.36687946", "text": "func (_Crypto *CryptoCallerSession) LagrangeInterpolationG1(pointsG1 [][2]*big.Int, indices []*big.Int, threshold *big.Int, invArray []*big.Int) ([2]*big.Int, error) {\n\treturn _Crypto.Contract.LagrangeInterpolationG1(&_Crypto.CallOpts, pointsG1, indices, threshold, invArray)\n}", "title": "" }, { "docid": "df20f17a6a2982389770a473472f1668", "score": "0.366385", "text": "func NewRat(a, b int64) *Rat", "title": "" }, { "docid": "5d7ec4c8eb7457e7f70f4b436201850f", "score": "0.36529034", "text": "func (_Crypto *CryptoSession) LagrangeInterpolationG1(pointsG1 [][2]*big.Int, indices []*big.Int, threshold *big.Int, invArray []*big.Int) ([2]*big.Int, error) {\n\treturn _Crypto.Contract.LagrangeInterpolationG1(&_Crypto.CallOpts, pointsG1, indices, threshold, invArray)\n}", "title": "" }, { "docid": "ed5efba68c62fd5bf2f6f95392c8cd34", "score": "0.3648295", "text": "func (boid Boid) matchVel(local []Boid, i BoidInfo) {\n\tvar avg geom.Point\n\tfor _, b := range local {\n\t\tavg = avg.Add(b.Vel)\n\t}\n\tif len(local) == 0 {\n\t\treturn\n\t}\n\tbias := geom.Pt(i.MatchBias, i.MatchBias)\n\tn := float64(len(local))\n\tavg = avg.Div(geom.Pt(n, n)).Normalize().Mul(bias)\n\tboid.Vel = boid.Vel.Add(avg)\n}", "title": "" }, { "docid": "0bcd0f0c48fce4d5d282ee26b53214d5", "score": "0.36408174", "text": "func (p Lab) LCh() LCh {\n\tc := math.Sqrt(sqr(p.A()) + sqr(p.B()))\n\th := 180.0 * math.Atan2(p.B(), p.A()) / math.Pi\n\tif h < 0.0 {\n\t\th += 360.0\n\t}\n\tp[1], p[2] = c, h\n\treturn LCh(p)\n}", "title": "" }, { "docid": "bd6fcbfae2714e9832688be65e2f59f1", "score": "0.3640202", "text": "func (l *Linear) CompareBetween(m *Linear, s int64, t int64) LinearCompare {\n ls := l.Eval(s)\n lt := l.Eval(t)\n ms := m.Eval(s)\n mt := m.Eval(t)\n\n switch {\n case ls == ms && lt == mt:\n return LINEAR_COMPARE_EQUAL\n case ls >= ms && lt >= mt:\n return LINEAR_COMPARE_GREATER_OR_EQUAL\n case ls <= ms && lt <= mt:\n return LINEAR_COMPARE_LESS_OR_EQUAL\n }\n return LINEAR_COMPARE_INTERSECTS\n}", "title": "" }, { "docid": "b45e122266e8a3a275a2e12f0d42a9c9", "score": "0.36393926", "text": "func NewSpread(base, spread float64) Range {\n\treturn Linear{base - spread, base + spread, nowRand()}\n}", "title": "" }, { "docid": "436eda002ea831b5e76e73b251014d1c", "score": "0.36327463", "text": "func Interp1d(x, y []float64) func(x float64) float64 {\n\tif len(x) < 2 || len(x) != len(y) {\n\t\tpanic(fmt.Errorf(\"interp1d lenx:%d leny:%d\", len(x), len(y)))\n\t}\n\n\tvar both *xy\n\tif sort.Float64sAreSorted(x) {\n\t\tboth = &xy{x, y}\n\t} else {\n\t\tboth = &xy{make([]float64, len(x)), make([]float64, len(x))}\n\t\tcopy(both.x, x)\n\t\tcopy(both.y, y)\n\t\tsort.Sort(both)\n\t}\n\treturn func(x float64) float64 {\n\t\tix := sort.SearchFloat64s(both.x, x) - 1\n\t\tif ix < 0 {\n\t\t\tix = 0\n\t\t}\n\t\tif ix > len(both.x)-2 {\n\t\t\tix = len(both.x) - 2\n\t\t}\n\t\tix1 := ix + 1\n\t\tfor ix > 0 && math.IsNaN(both.y[ix]) {\n\t\t\tix--\n\t\t}\n\t\tfor ix1 < len(both.x)-1 && math.IsNaN(both.y[ix1]) {\n\t\t\tix1++\n\t\t}\n\t\t//fmt.Println(x, both.x, both.y, ix, ix1)\n\t\treturn interpolate2points(both.x[ix], both.y[ix], both.x[ix1], both.y[ix1])(x)\n\t}\n}", "title": "" }, { "docid": "97d7f1ecee8f2bd644b8d0c36ab8dbb1", "score": "0.36261913", "text": "func adapt(delta, numPoints int32, firstTime bool) int32 {\n\tif firstTime {\n\t\tdelta /= damp\n\t} else {\n\t\tdelta /= 2\n\t}\n\tdelta += delta / numPoints\n\tk := int32(0)\n\tfor delta > ((base-tmin)*tmax)/2 {\n\t\tdelta /= base - tmin\n\t\tk += base\n\t}\n\treturn k + (base-tmin+1)*delta/(delta+skew)\n}", "title": "" }, { "docid": "9b34217427f87ba6e7247d93dffb5d78", "score": "0.3624387", "text": "func (i *Interval) Div(x, y Interval) {\n\tif y.In(0.0) {\n\t\ti.A, i.B = math.NaN(), math.NaN()\n\t\treturn\n\t}\n\ti.A = min([]float64{x.A/y.A, x.A/y.B, x.B/y.A, x.B/y.B})\n\ti.B = max([]float64{x.A/y.A, x.A/y.B, x.B/y.A, x.B/y.B})\n}", "title": "" }, { "docid": "b228aff7a4bb3ab7a0961785856e5570", "score": "0.36143443", "text": "func Deflect(v Coord2D, mag, deflAngle float64, fromEnd bool) (float64, float64) {\n\tangl := math.Pi - deflAngle\n\treturn Extend(v, mag, angl, fromEnd)\n}", "title": "" }, { "docid": "dc5512c779c30dc6b5a55ed2f2ba0ecc", "score": "0.361238", "text": "func (r *f32cival) clamp(v float32) float32 {\n\tswitch {\n\tcase v < r.a:\n\t\tv = r.a\n\tcase v > r.b:\n\t\tv = r.b\n\t}\n\treturn v\n}", "title": "" }, { "docid": "fd1823f15e585d48703cd1a2bcff6bef", "score": "0.36062688", "text": "func RGBToHSL(r float64, g float64, b float64) (h float64, s float64, l float64) {\n\tr = r / 255\n\tg = g / 255\n\tb = b / 255\n\tmax := math.Max(r, g)\n\tmax = math.Max(max, b)\n\tmin := math.Min(r, g)\n\tmin = math.Min(min, b)\n\tl = (max + min) / 2\n\tif max == min {\n\t\th = 0\n\t\ts = 0\n\t} else {\n\t\td := max - min\n\t\tif l > 0.5 {\n\t\t\ts = d / (2 - max - min)\n\t\t} else {\n\t\t\ts = d / (max + min)\n\t\t}\n\t\tswitch max {\n\t\tcase r:\n\t\t\tif g < b {\n\t\t\t\th = (g-b)/d + 6\n\t\t\t} else {\n\t\t\t\th = (g-b)/d + 0\n\t\t\t}\n\t\t\tbreak\n\t\tcase g:\n\t\t\th = (b-r)/d + 2\n\t\t\tbreak\n\t\tcase b:\n\t\t\th = (r-g)/d + 4\n\t\t\tbreak\n\t\t}\n\t}\n\th = math.Round(h * 60)\n\ts = math.Round(s*1000) / 10\n\tl = math.Round(l*1000) / 10\n\treturn\n}", "title": "" }, { "docid": "5e25aad97376aeeaf32e6cf68756d6ae", "score": "0.3601678", "text": "func PercentIncrease(val1, val2 decimal.Decimal) decimal.Decimal {\n\treturn val1.Mul(decimal.New(1, 0).Add(val2.Div(decimal.New(100, 0))))\n}", "title": "" }, { "docid": "c38f8fb9edf1959f3015822fc017a43e", "score": "0.35992125", "text": "func (gdt *Vector2) CubicInterpolate(b Vector2, preA Vector2, postB Vector2, t Real) Vector2 {\n\targ0 := gdt.getBase()\n\targ1 := b.getBase()\n\targ2 := preA.getBase()\n\targ3 := postB.getBase()\n\targ4 := t.getBase()\n\n\tret := C.go_godot_vector2_cubic_interpolate(GDNative.api, arg0, arg1, arg2, arg3, arg4)\n\n\treturn Vector2{base: &ret}\n\n}", "title": "" }, { "docid": "72bd443d9c85a8d6d94b7c6cdbe1f9fb", "score": "0.35926825", "text": "func (policy *RollingUpgradePolicy) AssignProperties_From_RollingUpgradePolicy(source *v1beta20220301s.RollingUpgradePolicy) error {\n\n\t// EnableCrossZoneUpgrade\n\tif source.EnableCrossZoneUpgrade != nil {\n\t\tenableCrossZoneUpgrade := *source.EnableCrossZoneUpgrade\n\t\tpolicy.EnableCrossZoneUpgrade = &enableCrossZoneUpgrade\n\t} else {\n\t\tpolicy.EnableCrossZoneUpgrade = nil\n\t}\n\n\t// MaxBatchInstancePercent\n\tif source.MaxBatchInstancePercent != nil {\n\t\tmaxBatchInstancePercent := *source.MaxBatchInstancePercent\n\t\tpolicy.MaxBatchInstancePercent = &maxBatchInstancePercent\n\t} else {\n\t\tpolicy.MaxBatchInstancePercent = nil\n\t}\n\n\t// MaxUnhealthyInstancePercent\n\tif source.MaxUnhealthyInstancePercent != nil {\n\t\tmaxUnhealthyInstancePercent := *source.MaxUnhealthyInstancePercent\n\t\tpolicy.MaxUnhealthyInstancePercent = &maxUnhealthyInstancePercent\n\t} else {\n\t\tpolicy.MaxUnhealthyInstancePercent = nil\n\t}\n\n\t// MaxUnhealthyUpgradedInstancePercent\n\tif source.MaxUnhealthyUpgradedInstancePercent != nil {\n\t\tmaxUnhealthyUpgradedInstancePercent := *source.MaxUnhealthyUpgradedInstancePercent\n\t\tpolicy.MaxUnhealthyUpgradedInstancePercent = &maxUnhealthyUpgradedInstancePercent\n\t} else {\n\t\tpolicy.MaxUnhealthyUpgradedInstancePercent = nil\n\t}\n\n\t// PauseTimeBetweenBatches\n\tpolicy.PauseTimeBetweenBatches = genruntime.ClonePointerToString(source.PauseTimeBetweenBatches)\n\n\t// PrioritizeUnhealthyInstances\n\tif source.PrioritizeUnhealthyInstances != nil {\n\t\tprioritizeUnhealthyInstance := *source.PrioritizeUnhealthyInstances\n\t\tpolicy.PrioritizeUnhealthyInstances = &prioritizeUnhealthyInstance\n\t} else {\n\t\tpolicy.PrioritizeUnhealthyInstances = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "title": "" }, { "docid": "d6eb941a1e445566bd5c50ee0163a64c", "score": "0.35911673", "text": "func (_Crypto *CryptoCaller) LagrangeInterpolationG1(opts *bind.CallOpts, pointsG1 [][2]*big.Int, indices []*big.Int, threshold *big.Int, invArray []*big.Int) ([2]*big.Int, error) {\n\tvar out []interface{}\n\terr := _Crypto.contract.Call(opts, &out, \"LagrangeInterpolationG1\", pointsG1, indices, threshold, invArray)\n\n\tif err != nil {\n\t\treturn *new([2]*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([2]*big.Int)).(*[2]*big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "7650520c178f8d64ee55d04b5747ec56", "score": "0.35902852", "text": "func TestInverseQuadracticInterpolationt(t *testing.T) {\n xr := -10.0\n p := 1e-6\n es := 0.0001\n maxit := 50\n f := func(x float64) float64 {\n return 2.0*x - 3.0\n }\n rootwant := 1.5\n fxwant := 0.0\n root, fx, ea, iter, err := InverseQuadracticInterpolation(f, p, xr, es, maxit)\n msg := fmt.Sprintf(\"%f, %f, %f, %d\", root, fx, ea, iter)\n want := fmt.Sprintf(\"%f, %f, %f, %d < %d\", rootwant, fxwant, 0.0, iter, maxit)\n rootwithininterval := (root <= rootwant + es) && (root >= rootwant - es)\n fxwithininterval := (fx <= fxwant + es) && (fx >= fxwant - es)\n if !rootwithininterval || !fxwithininterval || ea > es || iter > maxit || err != nil {\n t.Fatalf(`InverseQuadracticInterpolation(f: x->2x-3, 1e-6, -10, 0.0001, 50) = %q, %v, want match for %#v, nil`, msg, err, want)\n }\n}", "title": "" }, { "docid": "2b1133de05f5b0a3d76bbc136cfaba4f", "score": "0.35778055", "text": "func testInterp(t *testing.T, w int, h int, direction, prefix, suffix string) {\n\tf, err := os.Open(\"../testdata/\" + prefix + suffix)\n\tif err != nil {\n\t\tt.Fatalf(\"Open: %v\", err)\n\t}\n\tdefer f.Close()\n\tsrc, _, err := image.Decode(f)\n\tif err != nil {\n\t\tt.Fatalf(\"Decode: %v\", err)\n\t}\n\n\top, scale := Src, 3.75\n\tif prefix == \"tux\" {\n\t\top, scale = Over, 0.125\n\t}\n\tgreen := image.NewUniform(color.RGBA{0x00, 0x22, 0x11, 0xff})\n\n\ttestCases := map[string]Interpolator{\n\t\t\"nn\": NearestNeighbor,\n\t\t\"ab\": ApproxBiLinear,\n\t\t\"bl\": BiLinear,\n\t\t\"cr\": CatmullRom,\n\t}\n\tfor name, q := range testCases {\n\t\tgoldenFilename := fmt.Sprintf(\"../testdata/%s-%s-%s.png\", prefix, direction, name)\n\n\t\tgot := image.NewRGBA(image.Rect(0, 0, w, h))\n\t\tCopy(got, image.Point{}, green, got.Bounds(), Src, nil)\n\t\tif direction == \"rotate\" {\n\t\t\tq.Transform(got, transformMatrix(scale, 40, 10), src, src.Bounds(), op, nil)\n\t\t} else {\n\t\t\tq.Scale(got, got.Bounds(), src, src.Bounds(), op, nil)\n\t\t}\n\n\t\tif *genGoldenFiles {\n\t\t\tif err := encode(goldenFilename, got); err != nil {\n\t\t\t\tt.Error(err)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\tg, err := os.Open(goldenFilename)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Open: %v\", err)\n\t\t\tcontinue\n\t\t}\n\t\tdefer g.Close()\n\t\twantRaw, err := png.Decode(g)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Decode: %v\", err)\n\t\t\tcontinue\n\t\t}\n\t\t// convert wantRaw to RGBA.\n\t\twant, ok := wantRaw.(*image.RGBA)\n\t\tif !ok {\n\t\t\tb := wantRaw.Bounds()\n\t\t\twant = image.NewRGBA(b)\n\t\t\tDraw(want, b, wantRaw, b.Min, Src)\n\t\t}\n\n\t\tif !reflect.DeepEqual(got, want) {\n\t\t\tt.Errorf(\"%s: actual image differs from golden image\", goldenFilename)\n\t\t\tcontinue\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4a81f635890979d52d8fa9152a6ddfe3", "score": "0.3566922", "text": "func LineariseImage(dst draw.Image, src image.Image, parallelism int) {\n\tlinear.TransformImageColor(dst, src, parallelism, LineariseColor)\n}", "title": "" } ]
60192d57c59a37ff4383d7ddc5a7919d
EnrichmentProperties_STATUS_ARMGenerator returns a generator of EnrichmentProperties_STATUS_ARM instances for property testing.
[ { "docid": "73670b453a1f59464a2eafa5a9f0ea0a", "score": "0.88072217", "text": "func EnrichmentProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif enrichmentProperties_STATUS_ARMGenerator != nil {\n\t\treturn enrichmentProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForEnrichmentProperties_STATUS_ARM(generators)\n\tenrichmentProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(EnrichmentProperties_STATUS_ARM{}), generators)\n\n\treturn enrichmentProperties_STATUS_ARMGenerator\n}", "title": "" } ]
[ { "docid": "6b6f98138f97028afbe7193c516b5cc6", "score": "0.8656075", "text": "func ResourceGroupProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif resourceGroupProperties_STATUS_ARMGenerator != nil {\n\t\treturn resourceGroupProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForResourceGroupProperties_STATUS_ARM(generators)\n\tresourceGroupProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ResourceGroupProperties_STATUS_ARM{}), generators)\n\n\treturn resourceGroupProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "98494dfb55bab5b6998eca5677d1cd23", "score": "0.8604629", "text": "func ApiProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif apiProperties_STATUS_ARMGenerator != nil {\n\t\treturn apiProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForApiProperties_STATUS_ARM(generators)\n\tapiProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ApiProperties_STATUS_ARM{}), generators)\n\n\treturn apiProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "3c2a50606be2d9d8c5e81b00ba337fd5", "score": "0.8546139", "text": "func RoutingProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif routingProperties_STATUS_ARMGenerator != nil {\n\t\treturn routingProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForRoutingProperties_STATUS_ARM(generators)\n\troutingProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RoutingProperties_STATUS_ARM{}), generators)\n\n\treturn routingProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "5963c5bb918df233d06d124ce2a1ebb0", "score": "0.85324585", "text": "func AdministratorProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif administratorProperties_STATUS_ARMGenerator != nil {\n\t\treturn administratorProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForAdministratorProperties_STATUS_ARM(generators)\n\tadministratorProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(AdministratorProperties_STATUS_ARM{}), generators)\n\n\treturn administratorProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "50834d0cce8438ffabdb0ec247aa8e37", "score": "0.85072833", "text": "func RouteProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif routeProperties_STATUS_ARMGenerator != nil {\n\t\treturn routeProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRouteProperties_STATUS_ARM(generators)\n\trouteProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RouteProperties_STATUS_ARM{}), generators)\n\n\treturn routeProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "9aebb7e524ae3a90201df96252ef1134", "score": "0.85041285", "text": "func FeedbackProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif feedbackProperties_STATUS_ARMGenerator != nil {\n\t\treturn feedbackProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForFeedbackProperties_STATUS_ARM(generators)\n\tfeedbackProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(FeedbackProperties_STATUS_ARM{}), generators)\n\n\treturn feedbackProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "5c1a6d1e2c5d0bd86f4216ce246abed5", "score": "0.8456035", "text": "func MessagingEndpointProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif messagingEndpointProperties_STATUS_ARMGenerator != nil {\n\t\treturn messagingEndpointProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForMessagingEndpointProperties_STATUS_ARM(generators)\n\tmessagingEndpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(MessagingEndpointProperties_STATUS_ARM{}), generators)\n\n\treturn messagingEndpointProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "09c16ba63fc944bd0ba2df624981977e", "score": "0.84211993", "text": "func DatabaseProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif databaseProperties_STATUS_ARMGenerator != nil {\n\t\treturn databaseProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDatabaseProperties_STATUS_ARM(generators)\n\tdatabaseProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DatabaseProperties_STATUS_ARM{}), generators)\n\n\treturn databaseProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "957b5360efb50b5e3574a331be9a1988", "score": "0.84169316", "text": "func EventHubProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif eventHubProperties_STATUS_ARMGenerator != nil {\n\t\treturn eventHubProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForEventHubProperties_STATUS_ARM(generators)\n\teventHubProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(EventHubProperties_STATUS_ARM{}), generators)\n\n\treturn eventHubProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "693678dc9f7a151645d8d0803acdf150", "score": "0.8388656", "text": "func StorageAccounts_TableService_Properties_STATUS_ARMGenerator() gopter.Gen {\n\tif storageAccounts_TableService_Properties_STATUS_ARMGenerator != nil {\n\t\treturn storageAccounts_TableService_Properties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForStorageAccounts_TableService_Properties_STATUS_ARM(generators)\n\tstorageAccounts_TableService_Properties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(StorageAccounts_TableService_Properties_STATUS_ARM{}), generators)\n\n\treturn storageAccounts_TableService_Properties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "519699418cb428acff56364f22b56a7a", "score": "0.83690435", "text": "func FailoverGroupProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif failoverGroupProperties_STATUS_ARMGenerator != nil {\n\t\treturn failoverGroupProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForFailoverGroupProperties_STATUS_ARM(generators)\n\tfailoverGroupProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(FailoverGroupProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForFailoverGroupProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForFailoverGroupProperties_STATUS_ARM(generators)\n\tfailoverGroupProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(FailoverGroupProperties_STATUS_ARM{}), generators)\n\n\treturn failoverGroupProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "0f523cdddb8aa891730e87b1fb9e7cdc", "score": "0.8367921", "text": "func VulnerabilityAssessmentRecurringScansProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif vulnerabilityAssessmentRecurringScansProperties_STATUS_ARMGenerator != nil {\n\t\treturn vulnerabilityAssessmentRecurringScansProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForVulnerabilityAssessmentRecurringScansProperties_STATUS_ARM(generators)\n\tvulnerabilityAssessmentRecurringScansProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(VulnerabilityAssessmentRecurringScansProperties_STATUS_ARM{}), generators)\n\n\treturn vulnerabilityAssessmentRecurringScansProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "32dbb758ee85e8bb72442442914138ce", "score": "0.83422196", "text": "func ARecord_STATUS_ARMGenerator() gopter.Gen {\n\tif aRecord_STATUS_ARMGenerator != nil {\n\t\treturn aRecord_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForARecord_STATUS_ARM(generators)\n\taRecord_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ARecord_STATUS_ARM{}), generators)\n\n\treturn aRecord_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "ce9ca8764dad52d217d48cfaeb96c16b", "score": "0.83170617", "text": "func MxRecord_STATUS_ARMGenerator() gopter.Gen {\n\tif mxRecord_STATUS_ARMGenerator != nil {\n\t\treturn mxRecord_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForMxRecord_STATUS_ARM(generators)\n\tmxRecord_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(MxRecord_STATUS_ARM{}), generators)\n\n\treturn mxRecord_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "7f8f90e62e631f2556063e0b7cb2ff4a", "score": "0.8310819", "text": "func NetworkRuleSetProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif networkRuleSetProperties_STATUS_ARMGenerator != nil {\n\t\treturn networkRuleSetProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForNetworkRuleSetProperties_STATUS_ARM(generators)\n\tnetworkRuleSetProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(NetworkRuleSetProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForNetworkRuleSetProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForNetworkRuleSetProperties_STATUS_ARM(generators)\n\tnetworkRuleSetProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(NetworkRuleSetProperties_STATUS_ARM{}), generators)\n\n\treturn networkRuleSetProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "02e11e14db5b05e9189a926c9fb46e47", "score": "0.8310098", "text": "func KeyVaultProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif keyVaultProperties_STATUS_ARMGenerator != nil {\n\t\treturn keyVaultProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForKeyVaultProperties_STATUS_ARM(generators)\n\tkeyVaultProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(KeyVaultProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForKeyVaultProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForKeyVaultProperties_STATUS_ARM(generators)\n\tkeyVaultProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(KeyVaultProperties_STATUS_ARM{}), generators)\n\n\treturn keyVaultProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "f0aad3cbd723659a25c75c8d593bfb2f", "score": "0.83003163", "text": "func MonitoringSettings_STATUS_ARMGenerator() gopter.Gen {\n\tif monitoringSettings_STATUS_ARMGenerator != nil {\n\t\treturn monitoringSettings_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForMonitoringSettings_STATUS_ARM(generators)\n\tmonitoringSettings_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(MonitoringSettings_STATUS_ARM{}), generators)\n\n\treturn monitoringSettings_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "721539965fc5bf46c2323c5e8619f4ad", "score": "0.8297226", "text": "func RecordSetProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif recordSetProperties_STATUS_ARMGenerator != nil {\n\t\treturn recordSetProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRecordSetProperties_STATUS_ARM(generators)\n\trecordSetProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RecordSetProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRecordSetProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForRecordSetProperties_STATUS_ARM(generators)\n\trecordSetProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RecordSetProperties_STATUS_ARM{}), generators)\n\n\treturn recordSetProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "13f38f85449462244d78b3b2bdbbc103", "score": "0.8294771", "text": "func EndpointProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif endpointProperties_STATUS_ARMGenerator != nil {\n\t\treturn endpointProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForEndpointProperties_STATUS_ARM(generators)\n\tendpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(EndpointProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForEndpointProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForEndpointProperties_STATUS_ARM(generators)\n\tendpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(EndpointProperties_STATUS_ARM{}), generators)\n\n\treturn endpointProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "de7c26e939e0dd9c999b47b03914a1a4", "score": "0.828803", "text": "func ResourceReference_STATUS_ARMGenerator() gopter.Gen {\n\tif resourceReference_STATUS_ARMGenerator != nil {\n\t\treturn resourceReference_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForResourceReference_STATUS_ARM(generators)\n\tresourceReference_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ResourceReference_STATUS_ARM{}), generators)\n\n\treturn resourceReference_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "06ae61b9ce8bf27aafa2cece3a8b35f4", "score": "0.82847506", "text": "func ManagementPolicyProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif managementPolicyProperties_STATUS_ARMGenerator != nil {\n\t\treturn managementPolicyProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForManagementPolicyProperties_STATUS_ARM(generators)\n\tmanagementPolicyProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicyProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForManagementPolicyProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForManagementPolicyProperties_STATUS_ARM(generators)\n\tmanagementPolicyProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicyProperties_STATUS_ARM{}), generators)\n\n\treturn managementPolicyProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "987211ac086c1e27ee2fd1b13019124b", "score": "0.82832545", "text": "func SnapshotProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif snapshotProperties_STATUS_ARMGenerator != nil {\n\t\treturn snapshotProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSnapshotProperties_STATUS_ARM(generators)\n\tsnapshotProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(SnapshotProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSnapshotProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForSnapshotProperties_STATUS_ARM(generators)\n\tsnapshotProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(SnapshotProperties_STATUS_ARM{}), generators)\n\n\treturn snapshotProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "17aee003b0427e4aa2c4c75f94d02536", "score": "0.82816726", "text": "func FailoverPolicy_STATUS_ARMGenerator() gopter.Gen {\n\tif failoverPolicy_STATUS_ARMGenerator != nil {\n\t\treturn failoverPolicy_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForFailoverPolicy_STATUS_ARM(generators)\n\tfailoverPolicy_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(FailoverPolicy_STATUS_ARM{}), generators)\n\n\treturn failoverPolicy_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "73493897b438e95eadb4595c644d4115", "score": "0.82811093", "text": "func ConsistencyPolicy_STATUS_ARMGenerator() gopter.Gen {\n\tif consistencyPolicy_STATUS_ARMGenerator != nil {\n\t\treturn consistencyPolicy_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForConsistencyPolicy_STATUS_ARM(generators)\n\tconsistencyPolicy_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ConsistencyPolicy_STATUS_ARM{}), generators)\n\n\treturn consistencyPolicy_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "1e77da5f568ac642f7827866eed0f5fe", "score": "0.82693696", "text": "func ManagementPolicyRule_STATUS_ARMGenerator() gopter.Gen {\n\tif managementPolicyRule_STATUS_ARMGenerator != nil {\n\t\treturn managementPolicyRule_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForManagementPolicyRule_STATUS_ARM(generators)\n\tmanagementPolicyRule_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicyRule_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForManagementPolicyRule_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForManagementPolicyRule_STATUS_ARM(generators)\n\tmanagementPolicyRule_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicyRule_STATUS_ARM{}), generators)\n\n\treturn managementPolicyRule_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "5209da109af7452d963b39aebf320bf5", "score": "0.8267979", "text": "func ManagementPolicyVersion_STATUS_ARMGenerator() gopter.Gen {\n\tif managementPolicyVersion_STATUS_ARMGenerator != nil {\n\t\treturn managementPolicyVersion_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForManagementPolicyVersion_STATUS_ARM(generators)\n\tmanagementPolicyVersion_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicyVersion_STATUS_ARM{}), generators)\n\n\treturn managementPolicyVersion_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "2e19a0c222636c77028820a4717aba9e", "score": "0.8256102", "text": "func ManagementPolicyDefinition_STATUS_ARMGenerator() gopter.Gen {\n\tif managementPolicyDefinition_STATUS_ARMGenerator != nil {\n\t\treturn managementPolicyDefinition_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForManagementPolicyDefinition_STATUS_ARM(generators)\n\tmanagementPolicyDefinition_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicyDefinition_STATUS_ARM{}), generators)\n\n\treturn managementPolicyDefinition_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "f5854925a511e067fbfbc2eb69617582", "score": "0.8252824", "text": "func Namespace_Properties_STATUS_ARMGenerator() gopter.Gen {\n\tif namespace_Properties_STATUS_ARMGenerator != nil {\n\t\treturn namespace_Properties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForNamespace_Properties_STATUS_ARM(generators)\n\tnamespace_Properties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Namespace_Properties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForNamespace_Properties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForNamespace_Properties_STATUS_ARM(generators)\n\tnamespace_Properties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Namespace_Properties_STATUS_ARM{}), generators)\n\n\treturn namespace_Properties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "2949431cf4567e87a64935f317035fb7", "score": "0.82349735", "text": "func AaaaRecord_STATUS_ARMGenerator() gopter.Gen {\n\tif aaaaRecord_STATUS_ARMGenerator != nil {\n\t\treturn aaaaRecord_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForAaaaRecord_STATUS_ARM(generators)\n\taaaaRecord_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(AaaaRecord_STATUS_ARM{}), generators)\n\n\treturn aaaaRecord_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "220e010d195e1a51e91fa0b1cf8b4b7d", "score": "0.8214369", "text": "func DeliveryRule_STATUS_ARMGenerator() gopter.Gen {\n\tif deliveryRule_STATUS_ARMGenerator != nil {\n\t\treturn deliveryRule_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDeliveryRule_STATUS_ARM(generators)\n\tdeliveryRule_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DeliveryRule_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDeliveryRule_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForDeliveryRule_STATUS_ARM(generators)\n\tdeliveryRule_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DeliveryRule_STATUS_ARM{}), generators)\n\n\treturn deliveryRule_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "f7af97edc7ab8533b6f71f1ee800e8fe", "score": "0.8197154", "text": "func IpFilterRule_STATUS_ARMGenerator() gopter.Gen {\n\tif ipFilterRule_STATUS_ARMGenerator != nil {\n\t\treturn ipFilterRule_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForIpFilterRule_STATUS_ARM(generators)\n\tipFilterRule_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(IpFilterRule_STATUS_ARM{}), generators)\n\n\treturn ipFilterRule_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "1465a9d7ffa1ab501f4346b7f4682db7", "score": "0.8188761", "text": "func ServiceEndpointPropertiesFormat_STATUS_ARMGenerator() gopter.Gen {\n\tif serviceEndpointPropertiesFormat_STATUS_ARMGenerator != nil {\n\t\treturn serviceEndpointPropertiesFormat_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForServiceEndpointPropertiesFormat_STATUS_ARM(generators)\n\tserviceEndpointPropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ServiceEndpointPropertiesFormat_STATUS_ARM{}), generators)\n\n\treturn serviceEndpointPropertiesFormat_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "0dcad0494a1b96bf29e54ec6bdb9d83b", "score": "0.8187612", "text": "func UserAssignedIdentityProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif userAssignedIdentityProperties_STATUS_ARMGenerator != nil {\n\t\treturn userAssignedIdentityProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForUserAssignedIdentityProperties_STATUS_ARM(generators)\n\tuserAssignedIdentityProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(UserAssignedIdentityProperties_STATUS_ARM{}), generators)\n\n\treturn userAssignedIdentityProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "0588ed110fead6f96e443e7bcd9c6abd", "score": "0.81839037", "text": "func ManagementPolicySchema_STATUS_ARMGenerator() gopter.Gen {\n\tif managementPolicySchema_STATUS_ARMGenerator != nil {\n\t\treturn managementPolicySchema_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForManagementPolicySchema_STATUS_ARM(generators)\n\tmanagementPolicySchema_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicySchema_STATUS_ARM{}), generators)\n\n\treturn managementPolicySchema_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "6da921c2c812276fb9e214891980b864", "score": "0.8181886", "text": "func PartnerInfo_STATUS_ARMGenerator() gopter.Gen {\n\tif partnerInfo_STATUS_ARMGenerator != nil {\n\t\treturn partnerInfo_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForPartnerInfo_STATUS_ARM(generators)\n\tpartnerInfo_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(PartnerInfo_STATUS_ARM{}), generators)\n\n\treturn partnerInfo_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "a63d0863263964842b25e656487a2d9a", "score": "0.8160583", "text": "func RoutingEndpoints_STATUS_ARMGenerator() gopter.Gen {\n\tif routingEndpoints_STATUS_ARMGenerator != nil {\n\t\treturn routingEndpoints_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForRoutingEndpoints_STATUS_ARM(generators)\n\troutingEndpoints_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RoutingEndpoints_STATUS_ARM{}), generators)\n\n\treturn routingEndpoints_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "a0980e25529d02ff12085a7748674482", "score": "0.8154621", "text": "func SoaRecord_STATUS_ARMGenerator() gopter.Gen {\n\tif soaRecord_STATUS_ARMGenerator != nil {\n\t\treturn soaRecord_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSoaRecord_STATUS_ARM(generators)\n\tsoaRecord_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(SoaRecord_STATUS_ARM{}), generators)\n\n\treturn soaRecord_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "ebcdc548e75e45bedb5f6461a4336f39", "score": "0.8152258", "text": "func ClusterProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif clusterProperties_STATUS_ARMGenerator != nil {\n\t\treturn clusterProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForClusterProperties_STATUS_ARM(generators)\n\tclusterProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ClusterProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForClusterProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForClusterProperties_STATUS_ARM(generators)\n\tclusterProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ClusterProperties_STATUS_ARM{}), generators)\n\n\treturn clusterProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "1e7969b43b259e2ad8664bd0d9d63acd", "score": "0.81462514", "text": "func BackupPolicy_STATUS_ARMGenerator() gopter.Gen {\n\tif backupPolicy_STATUS_ARMGenerator != nil {\n\t\treturn backupPolicy_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForBackupPolicy_STATUS_ARM(generators)\n\n\t// handle OneOf by choosing only one field to instantiate\n\tvar gens []gopter.Gen\n\tfor propName, propGen := range generators {\n\t\tgens = append(gens, gen.Struct(reflect.TypeOf(BackupPolicy_STATUS_ARM{}), map[string]gopter.Gen{propName: propGen}))\n\t}\n\tbackupPolicy_STATUS_ARMGenerator = gen.OneGenOf(gens...)\n\n\treturn backupPolicy_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "324248fd6e5070be22a3b8416c7b66c3", "score": "0.81283474", "text": "func DeliveryRuleCondition_STATUS_ARMGenerator() gopter.Gen {\n\tif deliveryRuleCondition_STATUS_ARMGenerator != nil {\n\t\treturn deliveryRuleCondition_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForDeliveryRuleCondition_STATUS_ARM(generators)\n\n\t// handle OneOf by choosing only one field to instantiate\n\tvar gens []gopter.Gen\n\tfor propName, propGen := range generators {\n\t\tgens = append(gens, gen.Struct(reflect.TypeOf(DeliveryRuleCondition_STATUS_ARM{}), map[string]gopter.Gen{propName: propGen}))\n\t}\n\tdeliveryRuleCondition_STATUS_ARMGenerator = gen.OneGenOf(gens...)\n\n\treturn deliveryRuleCondition_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "f2ec8487a606be6bdda60860fb9aa8c5", "score": "0.81206757", "text": "func AnalyticalStorageConfiguration_STATUS_ARMGenerator() gopter.Gen {\n\tif analyticalStorageConfiguration_STATUS_ARMGenerator != nil {\n\t\treturn analyticalStorageConfiguration_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForAnalyticalStorageConfiguration_STATUS_ARM(generators)\n\tanalyticalStorageConfiguration_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(AnalyticalStorageConfiguration_STATUS_ARM{}), generators)\n\n\treturn analyticalStorageConfiguration_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "ec0781ff560fa389ea3a8efff4f8d11b", "score": "0.8110602", "text": "func ResourceMoveDetails_STATUS_ARMGenerator() gopter.Gen {\n\tif resourceMoveDetails_STATUS_ARMGenerator != nil {\n\t\treturn resourceMoveDetails_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForResourceMoveDetails_STATUS_ARM(generators)\n\tresourceMoveDetails_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ResourceMoveDetails_STATUS_ARM{}), generators)\n\n\treturn resourceMoveDetails_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "90593f2346baddbfd0fd67a65499706f", "score": "0.8108341", "text": "func SrvRecord_STATUS_ARMGenerator() gopter.Gen {\n\tif srvRecord_STATUS_ARMGenerator != nil {\n\t\treturn srvRecord_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSrvRecord_STATUS_ARM(generators)\n\tsrvRecord_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(SrvRecord_STATUS_ARM{}), generators)\n\n\treturn srvRecord_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "62413aab7c7541939033aee11d42255e", "score": "0.81062335", "text": "func StorageEndpointProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif storageEndpointProperties_STATUS_ARMGenerator != nil {\n\t\treturn storageEndpointProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForStorageEndpointProperties_STATUS_ARM(generators)\n\tstorageEndpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(StorageEndpointProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForStorageEndpointProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForStorageEndpointProperties_STATUS_ARM(generators)\n\tstorageEndpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(StorageEndpointProperties_STATUS_ARM{}), generators)\n\n\treturn storageEndpointProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "6c0ab610c55017656a4b049c3e146f87", "score": "0.810293", "text": "func FallbackRouteProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif fallbackRouteProperties_STATUS_ARMGenerator != nil {\n\t\treturn fallbackRouteProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForFallbackRouteProperties_STATUS_ARM(generators)\n\tfallbackRouteProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(FallbackRouteProperties_STATUS_ARM{}), generators)\n\n\treturn fallbackRouteProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "5be65b3c882820e3e015f14e7826dcf4", "score": "0.8095615", "text": "func RoutingEventHubProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif routingEventHubProperties_STATUS_ARMGenerator != nil {\n\t\treturn routingEventHubProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRoutingEventHubProperties_STATUS_ARM(generators)\n\troutingEventHubProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RoutingEventHubProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRoutingEventHubProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForRoutingEventHubProperties_STATUS_ARM(generators)\n\troutingEventHubProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RoutingEventHubProperties_STATUS_ARM{}), generators)\n\n\treturn routingEventHubProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "eedff754adbbea78d5714022636440e0", "score": "0.80891865", "text": "func ServiceDelegationPropertiesFormat_STATUS_ARMGenerator() gopter.Gen {\n\tif serviceDelegationPropertiesFormat_STATUS_ARMGenerator != nil {\n\t\treturn serviceDelegationPropertiesFormat_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForServiceDelegationPropertiesFormat_STATUS_ARM(generators)\n\tserviceDelegationPropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ServiceDelegationPropertiesFormat_STATUS_ARM{}), generators)\n\n\treturn serviceDelegationPropertiesFormat_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "aa9f079cf08f08629396b1001a7ba9bb", "score": "0.80838686", "text": "func HealthProbeParameters_STATUS_ARMGenerator() gopter.Gen {\n\tif healthProbeParameters_STATUS_ARMGenerator != nil {\n\t\treturn healthProbeParameters_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForHealthProbeParameters_STATUS_ARM(generators)\n\thealthProbeParameters_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(HealthProbeParameters_STATUS_ARM{}), generators)\n\n\treturn healthProbeParameters_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "e34a41142f9f9ab96ee42cebdc362757", "score": "0.808256", "text": "func OutboundEndpointProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif outboundEndpointProperties_STATUS_ARMGenerator != nil {\n\t\treturn outboundEndpointProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForOutboundEndpointProperties_STATUS_ARM(generators)\n\toutboundEndpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(OutboundEndpointProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForOutboundEndpointProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForOutboundEndpointProperties_STATUS_ARM(generators)\n\toutboundEndpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(OutboundEndpointProperties_STATUS_ARM{}), generators)\n\n\treturn outboundEndpointProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "7ae1869ec0365f50a8de89d09af1b6cb", "score": "0.8077946", "text": "func DeliveryRuleAction_STATUS_ARMGenerator() gopter.Gen {\n\tif deliveryRuleAction_STATUS_ARMGenerator != nil {\n\t\treturn deliveryRuleAction_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForDeliveryRuleAction_STATUS_ARM(generators)\n\n\t// handle OneOf by choosing only one field to instantiate\n\tvar gens []gopter.Gen\n\tfor propName, propGen := range generators {\n\t\tgens = append(gens, gen.Struct(reflect.TypeOf(DeliveryRuleAction_STATUS_ARM{}), map[string]gopter.Gen{propName: propGen}))\n\t}\n\tdeliveryRuleAction_STATUS_ARMGenerator = gen.OneGenOf(gens...)\n\n\treturn deliveryRuleAction_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "ddc1294e17b6977c9a2d25a7a9e1ba5a", "score": "0.80764925", "text": "func DnsResolverProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif dnsResolverProperties_STATUS_ARMGenerator != nil {\n\t\treturn dnsResolverProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDnsResolverProperties_STATUS_ARM(generators)\n\tdnsResolverProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DnsResolverProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDnsResolverProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForDnsResolverProperties_STATUS_ARM(generators)\n\tdnsResolverProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DnsResolverProperties_STATUS_ARM{}), generators)\n\n\treturn dnsResolverProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "720ceebbb5eaeb2c0dc1f63d94994071", "score": "0.8075075", "text": "func ManagedIdentity_STATUS_ARMGenerator() gopter.Gen {\n\tif managedIdentity_STATUS_ARMGenerator != nil {\n\t\treturn managedIdentity_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForManagedIdentity_STATUS_ARM(generators)\n\tmanagedIdentity_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagedIdentity_STATUS_ARM{}), generators)\n\n\treturn managedIdentity_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "8dc45512d5d3b372ade4aff15fd7ac11", "score": "0.8066516", "text": "func SecurityRulePropertiesFormat_STATUS_ARMGenerator() gopter.Gen {\n\tif securityRulePropertiesFormat_STATUS_ARMGenerator != nil {\n\t\treturn securityRulePropertiesFormat_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSecurityRulePropertiesFormat_STATUS_ARM(generators)\n\tsecurityRulePropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(SecurityRulePropertiesFormat_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSecurityRulePropertiesFormat_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForSecurityRulePropertiesFormat_STATUS_ARM(generators)\n\tsecurityRulePropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(SecurityRulePropertiesFormat_STATUS_ARM{}), generators)\n\n\treturn securityRulePropertiesFormat_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "4575549d668d7f80a38be3a8c4d04344", "score": "0.8062064", "text": "func ResourceNavigationLink_STATUS_ARMGenerator() gopter.Gen {\n\tif resourceNavigationLink_STATUS_ARMGenerator != nil {\n\t\treturn resourceNavigationLink_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForResourceNavigationLink_STATUS_ARM(generators)\n\tresourceNavigationLink_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ResourceNavigationLink_STATUS_ARM{}), generators)\n\n\treturn resourceNavigationLink_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "9a8d50ce720f962672c9cc4da206955b", "score": "0.80554426", "text": "func PeriodicModeProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif periodicModeProperties_STATUS_ARMGenerator != nil {\n\t\treturn periodicModeProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForPeriodicModeProperties_STATUS_ARM(generators)\n\tperiodicModeProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(PeriodicModeProperties_STATUS_ARM{}), generators)\n\n\treturn periodicModeProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "16b3959bf5a43abef9d8daaeba888295", "score": "0.80532664", "text": "func ImmutabilitySettings_STATUS_ARMGenerator() gopter.Gen {\n\tif immutabilitySettings_STATUS_ARMGenerator != nil {\n\t\treturn immutabilitySettings_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForImmutabilitySettings_STATUS_ARM(generators)\n\timmutabilitySettings_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ImmutabilitySettings_STATUS_ARM{}), generators)\n\n\treturn immutabilitySettings_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "f1c74f769a75e9eeb96c676dfc447487", "score": "0.805275", "text": "func ManagementPolicyAction_STATUS_ARMGenerator() gopter.Gen {\n\tif managementPolicyAction_STATUS_ARMGenerator != nil {\n\t\treturn managementPolicyAction_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForManagementPolicyAction_STATUS_ARM(generators)\n\tmanagementPolicyAction_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicyAction_STATUS_ARM{}), generators)\n\n\treturn managementPolicyAction_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "cd988cc6a6188e2504edd2459a87a230", "score": "0.8047431", "text": "func DeepCreatedOriginProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif deepCreatedOriginProperties_STATUS_ARMGenerator != nil {\n\t\treturn deepCreatedOriginProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDeepCreatedOriginProperties_STATUS_ARM(generators)\n\tdeepCreatedOriginProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DeepCreatedOriginProperties_STATUS_ARM{}), generators)\n\n\treturn deepCreatedOriginProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "edefa47ffde3ffae9b31ad9cac207b10", "score": "0.80458105", "text": "func BackupVaultResource_STATUS_ARMGenerator() gopter.Gen {\n\tif backupVaultResource_STATUS_ARMGenerator != nil {\n\t\treturn backupVaultResource_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForBackupVaultResource_STATUS_ARM(generators)\n\tbackupVaultResource_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(BackupVaultResource_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForBackupVaultResource_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForBackupVaultResource_STATUS_ARM(generators)\n\tbackupVaultResource_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(BackupVaultResource_STATUS_ARM{}), generators)\n\n\treturn backupVaultResource_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "0d8ecc0cb5552bb65578693e33b767a5", "score": "0.8041025", "text": "func IotHubProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif iotHubProperties_STATUS_ARMGenerator != nil {\n\t\treturn iotHubProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForIotHubProperties_STATUS_ARM(generators)\n\tiotHubProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(IotHubProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForIotHubProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForIotHubProperties_STATUS_ARM(generators)\n\tiotHubProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(IotHubProperties_STATUS_ARM{}), generators)\n\n\treturn iotHubProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "e590864c76a4f6dc6b5b79150d835c29", "score": "0.8040185", "text": "func EndpointProperties_WebApplicationFirewallPolicyLink_STATUS_ARMGenerator() gopter.Gen {\n\tif endpointProperties_WebApplicationFirewallPolicyLink_STATUS_ARMGenerator != nil {\n\t\treturn endpointProperties_WebApplicationFirewallPolicyLink_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForEndpointProperties_WebApplicationFirewallPolicyLink_STATUS_ARM(generators)\n\tendpointProperties_WebApplicationFirewallPolicyLink_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(EndpointProperties_WebApplicationFirewallPolicyLink_STATUS_ARM{}), generators)\n\n\treturn endpointProperties_WebApplicationFirewallPolicyLink_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "fbc22a08349cff5ef4718c392254337d", "score": "0.80315596", "text": "func AzureMonitorAlertSettings_STATUS_ARMGenerator() gopter.Gen {\n\tif azureMonitorAlertSettings_STATUS_ARMGenerator != nil {\n\t\treturn azureMonitorAlertSettings_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForAzureMonitorAlertSettings_STATUS_ARM(generators)\n\tazureMonitorAlertSettings_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(AzureMonitorAlertSettings_STATUS_ARM{}), generators)\n\n\treturn azureMonitorAlertSettings_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "cd34cd29a9c1e635eac6ab8fe7c2299a", "score": "0.8024331", "text": "func CnameRecord_STATUS_ARMGenerator() gopter.Gen {\n\tif cnameRecord_STATUS_ARMGenerator != nil {\n\t\treturn cnameRecord_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForCnameRecord_STATUS_ARM(generators)\n\tcnameRecord_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(CnameRecord_STATUS_ARM{}), generators)\n\n\treturn cnameRecord_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "56e6e3ab54151ac57c1e0a020371dbb4", "score": "0.80166095", "text": "func BackupVault_STATUS_ARMGenerator() gopter.Gen {\n\tif backupVault_STATUS_ARMGenerator != nil {\n\t\treturn backupVault_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForBackupVault_STATUS_ARM(generators)\n\tbackupVault_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(BackupVault_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForBackupVault_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForBackupVault_STATUS_ARM(generators)\n\tbackupVault_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(BackupVault_STATUS_ARM{}), generators)\n\n\treturn backupVault_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "f268c3420a920d43a7748a3fffdc108a", "score": "0.79961866", "text": "func FeatureSettings_STATUS_ARMGenerator() gopter.Gen {\n\tif featureSettings_STATUS_ARMGenerator != nil {\n\t\treturn featureSettings_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForFeatureSettings_STATUS_ARM(generators)\n\tfeatureSettings_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(FeatureSettings_STATUS_ARM{}), generators)\n\n\treturn featureSettings_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "7537862054d434d6c8350f2d3733536e", "score": "0.79938924", "text": "func VirtualNetworkRule_STATUS_ARMGenerator() gopter.Gen {\n\tif virtualNetworkRule_STATUS_ARMGenerator != nil {\n\t\treturn virtualNetworkRule_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForVirtualNetworkRule_STATUS_ARM(generators)\n\tvirtualNetworkRule_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(VirtualNetworkRule_STATUS_ARM{}), generators)\n\n\treturn virtualNetworkRule_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "a40969a0f42c9226bf8e7f99b8964381", "score": "0.7990709", "text": "func FailoverGroupReadWriteEndpoint_STATUS_ARMGenerator() gopter.Gen {\n\tif failoverGroupReadWriteEndpoint_STATUS_ARMGenerator != nil {\n\t\treturn failoverGroupReadWriteEndpoint_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForFailoverGroupReadWriteEndpoint_STATUS_ARM(generators)\n\tfailoverGroupReadWriteEndpoint_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(FailoverGroupReadWriteEndpoint_STATUS_ARM{}), generators)\n\n\treturn failoverGroupReadWriteEndpoint_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "6741299efbe13d86430413debe72fb1b", "score": "0.7988182", "text": "func ManagementPolicySnapShot_STATUS_ARMGenerator() gopter.Gen {\n\tif managementPolicySnapShot_STATUS_ARMGenerator != nil {\n\t\treturn managementPolicySnapShot_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForManagementPolicySnapShot_STATUS_ARM(generators)\n\tmanagementPolicySnapShot_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicySnapShot_STATUS_ARM{}), generators)\n\n\treturn managementPolicySnapShot_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "3ac2bfc01585542bdceb93a902d8f1bc", "score": "0.79876935", "text": "func NetworkRuleSetIpRule_STATUS_ARMGenerator() gopter.Gen {\n\tif networkRuleSetIpRule_STATUS_ARMGenerator != nil {\n\t\treturn networkRuleSetIpRule_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForNetworkRuleSetIpRule_STATUS_ARM(generators)\n\tnetworkRuleSetIpRule_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(NetworkRuleSetIpRule_STATUS_ARM{}), generators)\n\n\treturn networkRuleSetIpRule_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "23993bffa6fbf717f5f14f0368f16b4e", "score": "0.7987629", "text": "func PublicIPAddressPropertiesFormat_STATUS_ARMGenerator() gopter.Gen {\n\tif publicIPAddressPropertiesFormat_STATUS_ARMGenerator != nil {\n\t\treturn publicIPAddressPropertiesFormat_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForPublicIPAddressPropertiesFormat_STATUS_ARM(generators)\n\tpublicIPAddressPropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(PublicIPAddressPropertiesFormat_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForPublicIPAddressPropertiesFormat_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForPublicIPAddressPropertiesFormat_STATUS_ARM(generators)\n\tpublicIPAddressPropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(PublicIPAddressPropertiesFormat_STATUS_ARM{}), generators)\n\n\treturn publicIPAddressPropertiesFormat_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "8b94671d23ce66b4c3db6083066c9f80", "score": "0.7983174", "text": "func DatabaseAccountGetProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif databaseAccountGetProperties_STATUS_ARMGenerator != nil {\n\t\treturn databaseAccountGetProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDatabaseAccountGetProperties_STATUS_ARM(generators)\n\tdatabaseAccountGetProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DatabaseAccountGetProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDatabaseAccountGetProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForDatabaseAccountGetProperties_STATUS_ARM(generators)\n\tdatabaseAccountGetProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DatabaseAccountGetProperties_STATUS_ARM{}), generators)\n\n\treturn databaseAccountGetProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "c9d7452c860bd54ae242fe7f6f50b5e8", "score": "0.7975912", "text": "func StorageAccounts_ManagementPolicy_STATUS_ARMGenerator() gopter.Gen {\n\tif storageAccounts_ManagementPolicy_STATUS_ARMGenerator != nil {\n\t\treturn storageAccounts_ManagementPolicy_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForStorageAccounts_ManagementPolicy_STATUS_ARM(generators)\n\tstorageAccounts_ManagementPolicy_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(StorageAccounts_ManagementPolicy_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForStorageAccounts_ManagementPolicy_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForStorageAccounts_ManagementPolicy_STATUS_ARM(generators)\n\tstorageAccounts_ManagementPolicy_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(StorageAccounts_ManagementPolicy_STATUS_ARM{}), generators)\n\n\treturn storageAccounts_ManagementPolicy_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "d8568e0712994b028b94fc096b34f796", "score": "0.79631424", "text": "func DatabaseSecurityAlertPoliciesSecurityAlertsPolicyProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif databaseSecurityAlertPoliciesSecurityAlertsPolicyProperties_STATUS_ARMGenerator != nil {\n\t\treturn databaseSecurityAlertPoliciesSecurityAlertsPolicyProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDatabaseSecurityAlertPoliciesSecurityAlertsPolicyProperties_STATUS_ARM(generators)\n\tdatabaseSecurityAlertPoliciesSecurityAlertsPolicyProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DatabaseSecurityAlertPoliciesSecurityAlertsPolicyProperties_STATUS_ARM{}), generators)\n\n\treturn databaseSecurityAlertPoliciesSecurityAlertsPolicyProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "0cf7efe0ed3a0b31605924069f92fe0d", "score": "0.7961242", "text": "func ResourceGroup_STATUS_ARMGenerator() gopter.Gen {\n\tif resourceGroup_STATUS_ARMGenerator != nil {\n\t\treturn resourceGroup_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForResourceGroup_STATUS_ARM(generators)\n\tresourceGroup_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ResourceGroup_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForResourceGroup_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForResourceGroup_STATUS_ARM(generators)\n\tresourceGroup_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ResourceGroup_STATUS_ARM{}), generators)\n\n\treturn resourceGroup_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "146844575775f014d89deea1eeed238a", "score": "0.7949271", "text": "func IPConfigurationProfile_STATUS_ARMGenerator() gopter.Gen {\n\tif ipConfigurationProfile_STATUS_ARMGenerator != nil {\n\t\treturn ipConfigurationProfile_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForIPConfigurationProfile_STATUS_ARM(generators)\n\tipConfigurationProfile_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(IPConfigurationProfile_STATUS_ARM{}), generators)\n\n\treturn ipConfigurationProfile_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "ec04f52993067bd7ac620e36d831437c", "score": "0.7947154", "text": "func RoutingServiceBusQueueEndpointProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif routingServiceBusQueueEndpointProperties_STATUS_ARMGenerator != nil {\n\t\treturn routingServiceBusQueueEndpointProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRoutingServiceBusQueueEndpointProperties_STATUS_ARM(generators)\n\troutingServiceBusQueueEndpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RoutingServiceBusQueueEndpointProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRoutingServiceBusQueueEndpointProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForRoutingServiceBusQueueEndpointProperties_STATUS_ARM(generators)\n\troutingServiceBusQueueEndpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RoutingServiceBusQueueEndpointProperties_STATUS_ARM{}), generators)\n\n\treturn routingServiceBusQueueEndpointProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "8e01f3e989f6e7ba91c8386fd176b288", "score": "0.79437256", "text": "func StorageSetting_STATUS_ARMGenerator() gopter.Gen {\n\tif storageSetting_STATUS_ARMGenerator != nil {\n\t\treturn storageSetting_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForStorageSetting_STATUS_ARM(generators)\n\tstorageSetting_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(StorageSetting_STATUS_ARM{}), generators)\n\n\treturn storageSetting_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "cc3438f43fe611a92e4cac5a28247416", "score": "0.79275584", "text": "func Profiles_Endpoint_STATUS_ARMGenerator() gopter.Gen {\n\tif profiles_Endpoint_STATUS_ARMGenerator != nil {\n\t\treturn profiles_Endpoint_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForProfiles_Endpoint_STATUS_ARM(generators)\n\tprofiles_Endpoint_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Profiles_Endpoint_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForProfiles_Endpoint_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForProfiles_Endpoint_STATUS_ARM(generators)\n\tprofiles_Endpoint_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Profiles_Endpoint_STATUS_ARM{}), generators)\n\n\treturn profiles_Endpoint_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "70eb39319fa6e19278d61d23ea84e361", "score": "0.7914621", "text": "func IpTag_STATUS_ARMGenerator() gopter.Gen {\n\tif ipTag_STATUS_ARMGenerator != nil {\n\t\treturn ipTag_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForIpTag_STATUS_ARM(generators)\n\tipTag_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(IpTag_STATUS_ARM{}), generators)\n\n\treturn ipTag_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "d261214df3fec5270b2b9538024d52c5", "score": "0.7911789", "text": "func Sku_STATUS_ARMGenerator() gopter.Gen {\n\tif sku_STATUS_ARMGenerator != nil {\n\t\treturn sku_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSku_STATUS_ARM(generators)\n\tsku_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Sku_STATUS_ARM{}), generators)\n\n\treturn sku_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "d261214df3fec5270b2b9538024d52c5", "score": "0.7911789", "text": "func Sku_STATUS_ARMGenerator() gopter.Gen {\n\tif sku_STATUS_ARMGenerator != nil {\n\t\treturn sku_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSku_STATUS_ARM(generators)\n\tsku_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Sku_STATUS_ARM{}), generators)\n\n\treturn sku_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "d261214df3fec5270b2b9538024d52c5", "score": "0.7911789", "text": "func Sku_STATUS_ARMGenerator() gopter.Gen {\n\tif sku_STATUS_ARMGenerator != nil {\n\t\treturn sku_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSku_STATUS_ARM(generators)\n\tsku_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Sku_STATUS_ARM{}), generators)\n\n\treturn sku_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "9b6edd347fdb8546ce77d1727718cda8", "score": "0.7905372", "text": "func Location_STATUS_ARMGenerator() gopter.Gen {\n\tif location_STATUS_ARMGenerator != nil {\n\t\treturn location_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForLocation_STATUS_ARM(generators)\n\tlocation_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Location_STATUS_ARM{}), generators)\n\n\treturn location_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "63bfeff5b93f67afcabb952316c32540", "score": "0.7895757", "text": "func ArmIdentity_STATUS_ARMGenerator() gopter.Gen {\n\tif armIdentity_STATUS_ARMGenerator != nil {\n\t\treturn armIdentity_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForArmIdentity_STATUS_ARM(generators)\n\tarmIdentity_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ArmIdentity_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForArmIdentity_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForArmIdentity_STATUS_ARM(generators)\n\tarmIdentity_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ArmIdentity_STATUS_ARM{}), generators)\n\n\treturn armIdentity_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "3bc4852b368f7d0097b96af364a0f05b", "score": "0.78933066", "text": "func BastionHostPropertiesFormat_STATUS_ARMGenerator() gopter.Gen {\n\tif bastionHostPropertiesFormat_STATUS_ARMGenerator != nil {\n\t\treturn bastionHostPropertiesFormat_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForBastionHostPropertiesFormat_STATUS_ARM(generators)\n\tbastionHostPropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(BastionHostPropertiesFormat_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForBastionHostPropertiesFormat_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForBastionHostPropertiesFormat_STATUS_ARM(generators)\n\tbastionHostPropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(BastionHostPropertiesFormat_STATUS_ARM{}), generators)\n\n\treturn bastionHostPropertiesFormat_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "a2048f5394bbe264e11311c39b3bdbe0", "score": "0.78886354", "text": "func CloudToDeviceProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif cloudToDeviceProperties_STATUS_ARMGenerator != nil {\n\t\treturn cloudToDeviceProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForCloudToDeviceProperties_STATUS_ARM(generators)\n\tcloudToDeviceProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(CloudToDeviceProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForCloudToDeviceProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForCloudToDeviceProperties_STATUS_ARM(generators)\n\tcloudToDeviceProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(CloudToDeviceProperties_STATUS_ARM{}), generators)\n\n\treturn cloudToDeviceProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "b4b61db7e720d6def0a0fa732338d6b9", "score": "0.78803235", "text": "func EndpointProperties_DeliveryPolicy_STATUS_ARMGenerator() gopter.Gen {\n\tif endpointProperties_DeliveryPolicy_STATUS_ARMGenerator != nil {\n\t\treturn endpointProperties_DeliveryPolicy_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForEndpointProperties_DeliveryPolicy_STATUS_ARM(generators)\n\tendpointProperties_DeliveryPolicy_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(EndpointProperties_DeliveryPolicy_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForEndpointProperties_DeliveryPolicy_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForEndpointProperties_DeliveryPolicy_STATUS_ARM(generators)\n\tendpointProperties_DeliveryPolicy_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(EndpointProperties_DeliveryPolicy_STATUS_ARM{}), generators)\n\n\treturn endpointProperties_DeliveryPolicy_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "f16769424b2a5532d61a77b3a0dae7af", "score": "0.78771496", "text": "func RedisEnterprise_STATUS_ARMGenerator() gopter.Gen {\n\tif redisEnterprise_STATUS_ARMGenerator != nil {\n\t\treturn redisEnterprise_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRedisEnterprise_STATUS_ARM(generators)\n\tredisEnterprise_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RedisEnterprise_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRedisEnterprise_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForRedisEnterprise_STATUS_ARM(generators)\n\tredisEnterprise_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RedisEnterprise_STATUS_ARM{}), generators)\n\n\treturn redisEnterprise_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "d37bd6b70a811348c73dc5dcad5c5de3", "score": "0.7870594", "text": "func RoutingServiceBusTopicEndpointProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif routingServiceBusTopicEndpointProperties_STATUS_ARMGenerator != nil {\n\t\treturn routingServiceBusTopicEndpointProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRoutingServiceBusTopicEndpointProperties_STATUS_ARM(generators)\n\troutingServiceBusTopicEndpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RoutingServiceBusTopicEndpointProperties_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForRoutingServiceBusTopicEndpointProperties_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForRoutingServiceBusTopicEndpointProperties_STATUS_ARM(generators)\n\troutingServiceBusTopicEndpointProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(RoutingServiceBusTopicEndpointProperties_STATUS_ARM{}), generators)\n\n\treturn routingServiceBusTopicEndpointProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "86d4ab6bfee8d792d55f0b0fa91060c4", "score": "0.7869303", "text": "func Delegation_STATUS_ARMGenerator() gopter.Gen {\n\tif delegation_STATUS_ARMGenerator != nil {\n\t\treturn delegation_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDelegation_STATUS_ARM(generators)\n\tdelegation_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Delegation_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDelegation_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForDelegation_STATUS_ARM(generators)\n\tdelegation_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Delegation_STATUS_ARM{}), generators)\n\n\treturn delegation_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "86d22b117b4cad3c9d08c3dda4e53ab6", "score": "0.78681093", "text": "func TxtRecord_STATUS_ARMGenerator() gopter.Gen {\n\tif txtRecord_STATUS_ARMGenerator != nil {\n\t\treturn txtRecord_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForTxtRecord_STATUS_ARM(generators)\n\ttxtRecord_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(TxtRecord_STATUS_ARM{}), generators)\n\n\treturn txtRecord_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "80318ae0ff70724cd607f58f4d54fdb7", "score": "0.7863614", "text": "func CacheConfiguration_STATUS_ARMGenerator() gopter.Gen {\n\tif cacheConfiguration_STATUS_ARMGenerator != nil {\n\t\treturn cacheConfiguration_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForCacheConfiguration_STATUS_ARM(generators)\n\tcacheConfiguration_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(CacheConfiguration_STATUS_ARM{}), generators)\n\n\treturn cacheConfiguration_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "567de4a30019e7d51852d9e3a8968aa0", "score": "0.7860069", "text": "func Snapshot_STATUS_ARMGenerator() gopter.Gen {\n\tif snapshot_STATUS_ARMGenerator != nil {\n\t\treturn snapshot_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSnapshot_STATUS_ARM(generators)\n\tsnapshot_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Snapshot_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSnapshot_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForSnapshot_STATUS_ARM(generators)\n\tsnapshot_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Snapshot_STATUS_ARM{}), generators)\n\n\treturn snapshot_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "1f47b29011a8619cb5822e03bd7a12b2", "score": "0.78530186", "text": "func ManagedServiceIdentity_STATUS_ARMGenerator() gopter.Gen {\n\tif managedServiceIdentity_STATUS_ARMGenerator != nil {\n\t\treturn managedServiceIdentity_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForManagedServiceIdentity_STATUS_ARM(generators)\n\tmanagedServiceIdentity_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagedServiceIdentity_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForManagedServiceIdentity_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForManagedServiceIdentity_STATUS_ARM(generators)\n\tmanagedServiceIdentity_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagedServiceIdentity_STATUS_ARM{}), generators)\n\n\treturn managedServiceIdentity_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "13b94ebe93cc756732d33a040b2f85b6", "score": "0.7852969", "text": "func DatabaseAccount_STATUS_ARMGenerator() gopter.Gen {\n\tif databaseAccount_STATUS_ARMGenerator != nil {\n\t\treturn databaseAccount_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDatabaseAccount_STATUS_ARM(generators)\n\tdatabaseAccount_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DatabaseAccount_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForDatabaseAccount_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForDatabaseAccount_STATUS_ARM(generators)\n\tdatabaseAccount_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(DatabaseAccount_STATUS_ARM{}), generators)\n\n\treturn databaseAccount_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "7ec6a71819b796c647f9a13793ea77d9", "score": "0.78486377", "text": "func Namespace_STATUS_ARMGenerator() gopter.Gen {\n\tif namespace_STATUS_ARMGenerator != nil {\n\t\treturn namespace_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForNamespace_STATUS_ARM(generators)\n\tnamespace_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Namespace_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForNamespace_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForNamespace_STATUS_ARM(generators)\n\tnamespace_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(Namespace_STATUS_ARM{}), generators)\n\n\treturn namespace_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "141d686fdc45b0d432d1a8af9833afad", "score": "0.78412926", "text": "func SecuritySettings_STATUS_ARMGenerator() gopter.Gen {\n\tif securitySettings_STATUS_ARMGenerator != nil {\n\t\treturn securitySettings_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddRelatedPropertyGeneratorsForSecuritySettings_STATUS_ARM(generators)\n\tsecuritySettings_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(SecuritySettings_STATUS_ARM{}), generators)\n\n\treturn securitySettings_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "7347b8eb330cf1567361a15ff5fb9e6b", "score": "0.7823702", "text": "func ManagementPolicyFilter_STATUS_ARMGenerator() gopter.Gen {\n\tif managementPolicyFilter_STATUS_ARMGenerator != nil {\n\t\treturn managementPolicyFilter_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForManagementPolicyFilter_STATUS_ARM(generators)\n\tmanagementPolicyFilter_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicyFilter_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForManagementPolicyFilter_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForManagementPolicyFilter_STATUS_ARM(generators)\n\tmanagementPolicyFilter_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(ManagementPolicyFilter_STATUS_ARM{}), generators)\n\n\treturn managementPolicyFilter_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "1cfa4d8d9d5faa1c2ad0c7b8ba6ff80b", "score": "0.7815528", "text": "func AzureADOnlyAuthProperties_STATUS_ARMGenerator() gopter.Gen {\n\tif azureADOnlyAuthProperties_STATUS_ARMGenerator != nil {\n\t\treturn azureADOnlyAuthProperties_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForAzureADOnlyAuthProperties_STATUS_ARM(generators)\n\tazureADOnlyAuthProperties_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(AzureADOnlyAuthProperties_STATUS_ARM{}), generators)\n\n\treturn azureADOnlyAuthProperties_STATUS_ARMGenerator\n}", "title": "" }, { "docid": "3f833e30564eca5c67b3be5238b6691a", "score": "0.78083384", "text": "func SubnetPropertiesFormat_STATUS_ARMGenerator() gopter.Gen {\n\tif subnetPropertiesFormat_STATUS_ARMGenerator != nil {\n\t\treturn subnetPropertiesFormat_STATUS_ARMGenerator\n\t}\n\n\tgenerators := make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSubnetPropertiesFormat_STATUS_ARM(generators)\n\tsubnetPropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(SubnetPropertiesFormat_STATUS_ARM{}), generators)\n\n\t// The above call to gen.Struct() captures the map, so create a new one\n\tgenerators = make(map[string]gopter.Gen)\n\tAddIndependentPropertyGeneratorsForSubnetPropertiesFormat_STATUS_ARM(generators)\n\tAddRelatedPropertyGeneratorsForSubnetPropertiesFormat_STATUS_ARM(generators)\n\tsubnetPropertiesFormat_STATUS_ARMGenerator = gen.Struct(reflect.TypeOf(SubnetPropertiesFormat_STATUS_ARM{}), generators)\n\n\treturn subnetPropertiesFormat_STATUS_ARMGenerator\n}", "title": "" } ]
980c99fc0eb7423bf3accd4509ece436
NpmInstallUsingCommand runs the given install command in the specified npm project directory
[ { "docid": "e530f4135acde6bc087fd466b87de595", "score": "0.8093952", "text": "func (b *BaseBuilder) NpmInstallUsingCommand(sourceDir string, installCommand string, verbose bool) error {\n\n\tpackageJSON := filepath.Join(sourceDir, \"package.json\")\n\n\t// Check package.json exists\n\tif !fs.FileExists(packageJSON) {\n\t\t// No package.json, no install\n\t\treturn nil\n\t}\n\n\tinstall := false\n\n\t// Get the MD5 sum of package.json\n\tpackageJSONMD5 := fs.MustMD5File(packageJSON)\n\n\t// Check whether we need to npm install\n\tpackageChecksumFile := filepath.Join(sourceDir, \"package.json.md5\")\n\tif fs.FileExists(packageChecksumFile) {\n\t\t// Compare checksums\n\t\tstoredChecksum := fs.MustLoadString(packageChecksumFile)\n\t\tif storedChecksum != packageJSONMD5 {\n\t\t\tfs.MustWriteString(packageChecksumFile, packageJSONMD5)\n\t\t\tinstall = true\n\t\t}\n\t} else {\n\t\tinstall = true\n\t\tfs.MustWriteString(packageChecksumFile, packageJSONMD5)\n\t}\n\n\t// Install if node_modules doesn't exist\n\tnodeModulesDir := filepath.Join(sourceDir, \"node_modules\")\n\tif !fs.DirExists(nodeModulesDir) {\n\t\tinstall = true\n\t}\n\n\t// check if forced install\n\tif b.options.ForceBuild {\n\t\tinstall = true\n\t}\n\n\t// Shortcut installation\n\tif install == false {\n\t\tif verbose {\n\t\t\tpterm.Println(\"Skipping npm install\")\n\t\t}\n\t\treturn nil\n\t}\n\n\t// Split up the InstallCommand and execute it\n\tcmd := strings.Split(installCommand, \" \")\n\tstdout, stderr, err := shell.RunCommand(sourceDir, cmd[0], cmd[1:]...)\n\tif verbose || err != nil {\n\t\tfor _, l := range strings.Split(stdout, \"\\n\") {\n\t\t\tpterm.Printf(\" %s\\n\", l)\n\t\t}\n\t\tfor _, l := range strings.Split(stderr, \"\\n\") {\n\t\t\tpterm.Printf(\" %s\\n\", l)\n\t\t}\n\t}\n\n\treturn err\n}", "title": "" } ]
[ { "docid": "5bf0e7154abe7544985842c4d4e40364", "score": "0.6663681", "text": "func (b *BaseBuilder) NpmInstall(sourceDir string, verbose bool) error {\n\treturn b.NpmInstallUsingCommand(sourceDir, \"npm install\", verbose)\n}", "title": "" }, { "docid": "af08a830194c74b20f4c7173bd0f9d28", "score": "0.6081633", "text": "func install() error {\n\n\t// prepare the environment variables\n\tenvironmentVariables := cleanGoEnv()\n\tenvironmentVariables = setEnv(environmentVariables, GOBIN_ENVIRONMENT_VARIBALE, goBin)\n\tenvironmentVariables = setEnv(environmentVariables, GO15VENDOREXPERIMENT_ENVIRONMENT_VARIBALE, \"1\")\n\n\treturn runCommand(os.Stdout, os.Stderr, goPath, environmentVariables, \"go\", \"install\", fmt.Sprintf(\"%s/...\", ProjectNamespace))\n\n}", "title": "" }, { "docid": "f434cd74f12675d3be9f253beef2fc0b", "score": "0.59319705", "text": "func Install(ctx context.Context, dir string, production bool, stdout, stderr io.Writer) (string, error) {\n\tpkgManager, err := ResolvePackageManager(dir)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tname := pkgManager.Name()\n\n\terr = pkgManager.Install(ctx, dir, production, stdout, stderr)\n\tif err != nil {\n\t\treturn name, err\n\t}\n\n\t// Ensure the \"node_modules\" directory exists.\n\t// NB: This is only approperate for certain package managers.\n\t// Yarn with Plug'n'Play enabled won't produce a node_modules directory,\n\t// either for Yarn Classic or Yarn Berry.\n\tnodeModulesPath := filepath.Join(dir, \"node_modules\")\n\tif _, err := os.Stat(nodeModulesPath); err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn name, fmt.Errorf(\"%s install reported success, but node_modules directory is missing\", name)\n\t\t}\n\t\t// If the node_modules dir exists but we can't stat it, we might be able to proceed\n\t\t// without issue, but it's bizarre enough that we should warn.\n\t\tlogging.Warningf(\"failed to read node_modules metadata: %v\", err)\n\t}\n\n\treturn name, nil\n}", "title": "" }, { "docid": "7f2bb334112c93b7c040d281ea3ba7d0", "score": "0.5555155", "text": "func registryCommand(vargs Npm) *exec.Cmd {\n\treturn exec.Command(\"npm\", \"config\", \"set\", \"registry\", vargs.Registry)\n}", "title": "" }, { "docid": "877cf924e8103b1830a82123d0eba3e9", "score": "0.54959506", "text": "func (b *BaseBuilder) NpmRun(projectDir, buildTarget string, verbose bool) error {\n\tstdout, stderr, err := shell.RunCommand(projectDir, \"npm\", \"run\", buildTarget)\n\tif verbose || err != nil {\n\t\tfor _, l := range strings.Split(stdout, \"\\n\") {\n\t\t\tpterm.Printf(\" %s\\n\", l)\n\t\t}\n\t\tfor _, l := range strings.Split(stderr, \"\\n\") {\n\t\t\tpterm.Printf(\" %s\\n\", l)\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "dc0010c4d718188260b973924c31d7fa", "score": "0.5453537", "text": "func (b *BaseBuilder) NpmRunWithEnvironment(projectDir, buildTarget string, verbose bool, envvars []string) error {\n\tcmd := shell.CreateCommand(projectDir, \"npm\", \"run\", buildTarget)\n\tcmd.Env = append(os.Environ(), envvars...)\n\tvar stdo, stde bytes.Buffer\n\tcmd.Stdout = &stdo\n\tcmd.Stderr = &stde\n\terr := cmd.Run()\n\tif verbose || err != nil {\n\t\tfor _, l := range strings.Split(stdo.String(), \"\\n\") {\n\t\t\tpterm.Printf(\" %s\\n\", l)\n\t\t}\n\t\tfor _, l := range strings.Split(stde.String(), \"\\n\") {\n\t\t\tpterm.Printf(\" %s\\n\", l)\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "b251734a16238e9ded9b0036b0a69d4a", "score": "0.52985835", "text": "func executeNpmScan(config *ScanOptions, cmd *command.Command) error {\n\tnpmConfig := []byte(fmt.Sprintf(`{\n\t\t\"apiKey\": \"%s\",\n\t\t\"userKey\": \"%s\",\n\t\t\"checkPolicies\": true,\n\t\t\"productName\": \"%s\",\n\t\t\"projectName\": \"%s\",\n\t\t\"productVer\": \"%s\",\n\t\t\"devDep\": true\n\t}`, config.OrgToken, config.UserToken, config.ProductName, config.ProjectName, config.ProductVersion))\n\tif err := ioutil.WriteFile(\"whitesource.config.json\", npmConfig, 0644); err != nil {\n\t\treturn err\n\t}\n\tif err := cmd.RunExecutable(\"yarn\", \"global\", \"add\", \"whitesource\"); err != nil {\n\t\treturn err\n\t}\n\tif err := cmd.RunExecutable(\"yarn\", \"install\"); err != nil {\n\t\treturn err\n\t}\n\tif err := cmd.RunExecutable(\"whitesource\", \"yarn\"); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5d561d310e6ed8bd67239d13f1d0cc10", "score": "0.5297363", "text": "func newInstallCmd(cfg *action.C7nConfiguration, out io.Writer) *cobra.Command {\n\n\tcmd := &cobra.Command{\n\t\tUse: \"install\",\n\t\tShort: \"Install choerodon or component.\",\n\t\tLong: installDesc,\n\t}\n\n\tcmd.AddCommand(\n\t\tnewInstallC7nCmd(cfg, out),\n\t\tnewInstallComponentCmd(cfg),\n\t)\n\n\treturn cmd\n}", "title": "" }, { "docid": "f2b8e2b984effaca991625e35dd14c3a", "score": "0.52311504", "text": "func Install(args map[string]string, packages ...string) string {\n conda := \"/opt/anaconda/bin/conda\"\n if val, ok := args[\"conda\"]; ok {\n conda = val\n }\n cmd := fmt.Sprintf(\"%s %s\", conda, \"install\")\n\n for _, pkg := range packages {\n cmd = cmd + fmt.Sprintf(\" %s\", pkg)\n }\n\n if val, ok := args[\"name\"]; ok {\n if val != \"\" {\n cmd = cmd + fmt.Sprintf(\" %s %s\", \"-n\", val)\n }\n }\n\n if val, ok := args[\"path\"]; ok {\n if val != \"\" {\n cmd = cmd + fmt.Sprintf(\" %s %s\", \"-p\", val)\n }\n }\n\n if val, ok := args[\"channels\"]; ok {\n channels := strings.Split(val, \",\")\n for _, channel := range channels {\n cmd = cmd + fmt.Sprintf(\" -c %s\", channel)\n }\n }\n\n if val, ok := args[\"override-channels\"]; ok {\n if val == \"true\" {\n cmd = cmd + fmt.Sprintf(\" %s\", \"--override-channels\")\n }\n }\n\n if val, ok := args[\"dry\"]; ok {\n if val == \"true\" {\n cmd = cmd + fmt.Sprintf(\" %s\", \"--dry-run\")\n }\n }\n\n if val, ok := args[\"copy\"]; ok {\n if val == \"true\" {\n cmd = cmd + fmt.Sprintf(\" %s\", \"--copy\")\n }\n }\n\n cmd = cmd + fmt.Sprintf(\" %s\", \"-y -q\")\n return cmd\n}", "title": "" }, { "docid": "4586659ab26dd30d2e0d483b430c1b91", "score": "0.51238763", "text": "func newInstallCommand(ctx context.Context) *cobra.Command {\n\tvar installCmd = &cobra.Command{\n\t\tUse: \"install\",\n\t\tShort: install.LiqoctlInstallShortHelp,\n\t\tLong: install.LiqoctlInstallLongHelp,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tinstall.HandleInstallCommand(ctx, cmd, args)\n\t\t},\n\t}\n\n\tinstallCmd.Flags().StringP(\"provider\", \"p\", \"kubeadm\", \"Select the cluster provider type\")\n\tinstallCmd.Flags().IntP(\"timeout\", \"t\", 600, \"Configure the timeout for the installation process in seconds (default: 600)\")\n\tinstallCmd.Flags().StringP(\"version\", \"\", \"\", \"Select the Liqo version (default: latest stable release)\")\n\tinstallCmd.Flags().BoolP(\"devel\", \"\", false,\n\t\t\"Enable use development versions, too. Equivalent to version '>0.0.0-0'. If --version is set, this is ignored\")\n\tinstallCmd.Flags().BoolP(\"only-output-values\", \"\", false, \"Generate a values file for further customization\")\n\tinstallCmd.Flags().StringP(\"dump-values-path\", \"\", \"./values.yaml\", \"Path for the output value file\")\n\tinstallCmd.Flags().BoolP(\"dry-run\", \"\", false, \"Simulate an install\")\n\tinstallCmd.Flags().BoolP(\"enable-lan-discovery\", \"\", true, \"Enable LAN discovery (default: true)\")\n\tinstallCmd.Flags().StringP(\"cluster-labels\", \"\", \"\",\n\t\t\"Cluster Labels to append to Liqo Cluster, supports '='.(e.g. --cluster-labels key1=value1,key2=value2)\")\n\n\tfor _, p := range providers {\n\t\tinitFunc, ok := providerInitFunc[p]\n\t\tif !ok {\n\t\t\tklog.Fatalf(\"unknown provider: %v\", p)\n\t\t}\n\t\tinitFunc(installCmd.Flags())\n\t}\n\treturn installCmd\n}", "title": "" }, { "docid": "d5354184d44919e4518e47408bdca5c9", "score": "0.51050365", "text": "func (pip *PipPackageManager) Install(packageName string) (err error) {\n\tif err = command.ExecuteCommand(execCommand(pip.Path, \"install\", \"-U\", packageName)); err != nil {\n\t\treturn fmt.Errorf(\"Cannot %s install %s: %s\", pip.Name, packageName, err)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "83b364c3d17a4d62791042a2fb17e5b8", "score": "0.5058831", "text": "func installCmd(rootFlags *pflag.FlagSet) *cobra.Command {\n\tiopts := &installOptions{}\n\tcmd := &cobra.Command{\n\t\tUse: \"install <manifest>\",\n\t\tShort: \"Install Kubernetes\",\n\t\tLong: `\nInstall Kubernetes on pre-existing machines\n\nThis command takes KubeOne manifest which contains information about hosts and how the cluster should be provisioned.\nIt's possible to source information about hosts from Terraform output, using the '--tfjson' flag.\n`,\n\t\tArgs: cobra.ExactArgs(1),\n\t\tExample: `kubeone install mycluster.yaml -t terraformoutput.json`,\n\t\tRunE: func(_ *cobra.Command, args []string) error {\n\t\t\tgopts, err := persistentGlobalOptions(rootFlags)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"unable to get global flags\")\n\t\t\t}\n\n\t\t\tlogger := initLogger(gopts.Verbose)\n\t\t\tiopts.TerraformState = gopts.TerraformState\n\t\t\tiopts.Verbose = gopts.Verbose\n\t\t\tiopts.CredentialsFilePath = gopts.CredentialsFilePath\n\n\t\t\tiopts.Manifest = args[0]\n\t\t\tif iopts.Manifest == \"\" {\n\t\t\t\treturn errors.New(\"no cluster config file given\")\n\t\t\t}\n\n\t\t\treturn runInstall(logger, iopts)\n\t\t},\n\t}\n\n\tcmd.Flags().StringVarP(&iopts.BackupFile, \"backup\", \"b\", \"\", \"path to where the PKI backup .tar.gz file should be placed (default: location of cluster config file)\")\n\n\treturn cmd\n}", "title": "" }, { "docid": "5f241464f47f2c1dc5efaa3d40812d2e", "score": "0.50514364", "text": "func installPackage(c *gin.Context) {\n\tvar request installPackageRequest\n\tc.BindJSON(&request)\n\ttargetPath := filepath.Join(utilities.GetBasePath(), \"models\")\n\terr := runtime.InstallPackage(request.RemoteURL, targetPath)\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, messageResponse{\n\t\t\tMsg: err.Error(),\n\t\t})\n\t}\n\tc.JSON(http.StatusOK, messageResponse{\n\t\tCode: 200,\n\t\tMsg: \"submitted success\",\n\t})\n}", "title": "" }, { "docid": "595c04ff615285f03fc224d47b0e6588", "score": "0.5041002", "text": "func Install() error {\n\tmg.Deps(Vendor)\n\treturn sh.Run(goexe, \"install\", binary)\n}", "title": "" }, { "docid": "cfb63dea005ba3b8803399bcb9d40469", "score": "0.50127304", "text": "func InstallJS(packages []string, projectDir string) {\n\tcommand := exec.Command(\"yarn\", packages...)\n\tcommand.Dir = \"./\" + projectDir\n\toutput, err := command.Output()\n\tif err != nil {\n\t\t\tlog.Println(err)\n\t}\n\tfmt.Printf(\"%s\", output)\n}", "title": "" }, { "docid": "93f690e3ae4b1ebc50f4b6941b79f8cd", "score": "0.4989357", "text": "func installIfNotPresent(execName, goPackage string) error {\n\tusr, err := user.Current()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn err\n\t}\n\tpathOfExec := findOnPathOrGoPath(execName)\n\tif len(pathOfExec) == 0 {\n\t\tcmd := exec.Command(Go, \"get\", \"-u\", goPackage)\n\t\tcmd.Dir = usr.HomeDir\n\t\tif err := cmd.Start(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn cmd.Wait()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b3dd74d0941af87178f3d4e9d9a6658d", "score": "0.49735957", "text": "func InstallDependency(name, ver string, binDir string) error {\n\tname = strings.ToLower(name)\n\tdependency, ok := dependencies[name]\n\tif !ok {\n\t\treturn fmt.Errorf(\"dependency %s not found\", name)\n\t}\n\tif len(strings.TrimSpace(ver)) == 0 {\n\t\tver = dependency.Version\n\t}\n\tbin, err := dependency.GetPath(name, binDir)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif is.File(bin) {\n\t\tlog.Debugf(\"%s already exists\", bin)\n\t\treturn nil\n\t}\n\n\tvar urlPath string\n\tif runtime.GOOS == \"linux\" {\n\t\turlPath = dependency.Linux\n\t} else if runtime.GOOS == \"darwin\" {\n\t\turlPath = dependency.Macosx\n\t} else if runtime.GOOS == \"windows\" {\n\t\turlPath = dependency.Windows\n\t}\n\n\tdata := map[string]string{\"os\": runtime.GOOS, \"platform\": runtime.GOARCH, \"version\": ver}\n\tif urlPath == \"\" && dependency.Template != \"\" {\n\t\turlPath, err = text.Template(dependency.Template, data)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif urlPath != \"\" {\n\t\turl, err := text.Template(urlPath, data)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tlog.Infof(\"Installing %s@%s (from=%s, to:%s)\", name, ver, url, bin)\n\t\terr = download(url, bin)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to download %s: %+v\", name, err)\n\t\t}\n\t\tif err := os.Chmod(bin, 0755); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to make %s executable: %w\", name, err)\n\t\t}\n\t} else if dependency.Go != \"\" {\n\t\t//FIXME this only works if the PWD is in the GOPATH\n\t\turl, _ := text.Template(dependency.Go, data)\n\t\tlog.Infof(\"Installing via go get %s (%s) -> %s\", name, ver, url)\n\t\tif err := exec.Execf(\"GOPATH=$PWD/.go go get %s\", url); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := os.Rename(\".go/bin/\"+name, bin); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c50b62ae2625425d65a1454a5f3dc476", "score": "0.49333537", "text": "func NodeModuleInstall(moduleName string) NodeModuleResult {\n\tfinish := make(chan bool)\n\n\tgo func() {\n\t\tprint(\"\\n|\")\n\t\tprint(\"_\")\n\t\tprint(\"|\")\n\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase v := <-finish:\n\t\t\t\t{\n\t\t\t\t\tif v {\n\t\t\t\t\t\tprint(\"\\010\\010\\010\") // remove the loading chars\n\t\t\t\t\t\tclose(finish)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tprint(\"\\010\\010-\")\n\t\t\t\ttime.Sleep(time.Second / 2)\n\t\t\t\tprint(\"\\010\\\\\")\n\t\t\t\ttime.Sleep(time.Second / 2)\n\t\t\t\tprint(\"\\010|\")\n\t\t\t\ttime.Sleep(time.Second / 2)\n\t\t\t\tprint(\"\\010/\")\n\t\t\t\ttime.Sleep(time.Second / 2)\n\t\t\t\tprint(\"\\010-\")\n\t\t\t\ttime.Sleep(time.Second / 2)\n\t\t\t\tprint(\"|\")\n\t\t\t}\n\t\t}\n\t}()\n\tout, err := Command(\"npm\", \"install\", moduleName, \"-g\")\n\tfinish <- true\n\tif err != nil {\n\t\treturn fail(\"Error installing module %s. Trace: %s\", moduleName, err.Error())\n\t}\n\n\treturn success(\"\\n%s installed %s\", moduleName, out)\n}", "title": "" }, { "docid": "a8cb9e10be1ff6ad6296577f4f69b0d8", "score": "0.49143767", "text": "func (c *InstallCommand) install(pkg *model.AurPackageInfo) {\n\tfile, err := aur_util.Download(pkg.Url, pkg.Name, pkg.Version)\n\tif err != nil {\n\t\tc.printError(fmt.Sprintf(\"Failed to download package for '%s': %s\", pkg.Name, err.Error()))\n\t\treturn\n\t}\n\n\terr = io_util.Untargz(file)\n\tif err != nil {\n\t\tc.printError(fmt.Sprintf(\"Failed to extract package for '%s': '%s'\", pkg.Name, err.Error()))\n\t\treturn\n\t}\n\n\texecutable, _ := exec.LookPath(\"makepkg\")\n\targs := []string{executable, \"-si\"}\n\n\tif c.flags[\"skip-pgp\"].Value.(bool) {\n\t\targs = append(args, \"--skippgpcheck\")\n\t}\n\n\tcmd := &exec.Cmd{\n\t\tPath: executable,\n\t\tArgs: args,\n\t\tDir: path.Dir(file) + \"/\" + pkg.Name,\n\t\tStdout: os.Stdout,\n\t\tStdin: os.Stdin,\n\t\tStderr: os.Stderr,\n\t}\n\n\tif err := cmd.Run(); err != nil {\n\t\tc.printError(err.Error())\n\t\treturn\n\t}\n\n\t// TODO Check if current version already installed, prompt for install confirmation when it is\n\trepo, err := repository.NewLocalPackageRepository()\n\tif err != nil {\n\t\tc.printError(err.Error())\n\t\treturn\n\t}\n\n\trepo.Save(&repository.LocalPackage{pkg.Name, pkg.Version, pkg.Description, time.Now().Unix()})\n\terr = repo.Flush()\n\n\tif err != nil {\n\t\tc.printError(err.Error())\n\t}\n}", "title": "" }, { "docid": "0e5f4768da69f5659f9caa0e590954d1", "score": "0.49079558", "text": "func install() (err error) {\n\tcmd := exec.Command(\"kubectl\", \"create\", \"-f\", *installationPath)\n\tcmd.Stdin = strings.NewReader(\"\")\n\tcmdOutput := &bytes.Buffer{}\n\tcmd.Stdout = cmdOutput\n\tcmdErr := &bytes.Buffer{}\n\tcmd.Stderr = cmdErr\n\tfmt.Println(cmd.Args)\n\terr = cmd.Run()\n\tif err != nil {\n\t\treturn errors.New(fmt.Sprint(cmdErr))\n\t}\n\tfmt.Println(cmdOutput)\n\treturn nil\n}", "title": "" }, { "docid": "308a6021687fef6a30fcc580054783e4", "score": "0.4905024", "text": "func RunInstallation(n *map[string]NodeElement, version *string, architecture *string) string {\n\tif val, ok := (*n)[*version]; ok {\n\t\tlink := val.A7Link\n\t\tif *architecture == \"armv6l\" {\n\t\t\tlink = val.A6Link\n\t\t}\n\t\tcolorize(ColorGreen, \"Downloading: \"+link)\n\t\terr := DownloadFile(\"/tmp/node-v\"+*version+\"-linux-\"+*architecture+\".tar.gz\", link)\n\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tf, _ := os.Open(\"/tmp/node-v\" + *version + \"-linux-\" + *architecture + \".tar.gz\")\n\t\tdefer f.Close()\n\t\tcolorize(ColorGreen, \"Untaring: \"+\"/tmp/node-v\"+*version+\"-linux-\"+*architecture+\".tar.gz\")\n\t\tUntar(\"/tmp/node-v\"+*version+\"-linux-\"+*architecture, f)\n\t\tcolorize(ColorGreen, \"Copying files over to the appropriate location, and creating symlinks\")\n\t\terr = CopyDirectory(\"/tmp/node-v\"+*version+\"-linux-\"+*architecture+\"/node-v\"+*version+\"-linux-\"+*architecture, \"/opt/nodejs\")\n\n\t\tif err != nil {\n\t\t\tcolorize(ColorRed, \"There was a problem with making a copy of the nodeJs directory: node-v\"+*version)\n\t\t\tfmt.Println(err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\terr = CopyDirectory(\"/opt/nodejs/lib/node_modules\", \"/usr/lib/node_modules\")\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t\terr = CopyFile(\"/opt/nodejs/bin/node\", \"/usr/bin/node\")\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t\tcurrentDir, _ := os.Getwd()\n\t\tos.Chdir(\"/usr/bin\")\n\t\texec.Command(\"ln\", \"-sf\", \"../lib/node_modules/npm/bin/npm\", \"/usr/bin/npm\").Run()\n\t\texec.Command(\"ln\", \"-sf\", \"../lib/node_modules/npm/bin/npm-cli.js\", \"/usr/bin/npm-cli.js\").Run()\n\t\texec.Command(\"ln\", \"-sf\", \"../lib/node_modules/npm/bin/npx\", \"/usr/bin/npx\").Run()\n\t\texec.Command(\"ln\", \"-sf\", \"../lib/node_modules/\", \"/usr/bin/node_modules\").Run()\n\t\tos.Chdir(currentDir)\n\n\t} else {\n\t\tcolorize(ColorRed, *version+\" is not an available version for NodeJs on \"+*architecture)\n\t}\n\treturn \"/tmp/node\" + *version + \"-linux-\" + *architecture\n\n}", "title": "" }, { "docid": "a17af0ec31ee42c9f664e7ed4c7097b4", "score": "0.49021107", "text": "func NewGoInstallTask(args ...string) goauto.Tasker {\n\treturn &goPrjTask{gocmd: \"install\", args: args}\n}", "title": "" }, { "docid": "dd8c83fbead7ca048ac0999b954f6555", "score": "0.48940152", "text": "func resolveCommand(ctx *context.Context, publisher config.Publisher, artifact *artifact.Artifact) (*command, error) {\n\tvar err error\n\tdir := publisher.Dir\n\n\t// nolint:staticcheck\n\ttpl := tmpl.New(ctx).WithArtifact(artifact)\n\tif dir != \"\" {\n\t\tdir, err = tpl.Apply(dir)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tcmd := publisher.Cmd\n\tif cmd != \"\" {\n\t\tcmd, err = tpl.Apply(cmd)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\targs, err := shellwords.Parse(cmd)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tenv := make([]string, len(publisher.Env))\n\tfor i, e := range publisher.Env {\n\t\te, err = tpl.Apply(e)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tenv[i] = e\n\t}\n\n\treturn &command{\n\t\tCtx: ctx,\n\t\tDir: dir,\n\t\tEnv: env,\n\t\tArgs: args,\n\t}, nil\n}", "title": "" }, { "docid": "c815a9feae4c41f4810a19c573f0b176", "score": "0.48079222", "text": "func (apt *apt) Install(packs ...string) error {\n\tfatalErr := func(output string) error {\n\t\t// If we couldn't find the package don't retry.\n\t\t// apt-get will report \"Unable to locate package\"\n\t\tif strings.Contains(output, \"Unable to locate package\") {\n\t\t\treturn errors.New(\"unable to locate package\")\n\t\t}\n\t\treturn nil\n\t}\n\t_, _, err := RunCommandWithRetry(apt.cmder.InstallCmd(packs...), fatalErr)\n\treturn err\n}", "title": "" }, { "docid": "93f3e6bceb679fa09bc8cfa6bd3bfb1b", "score": "0.47419742", "text": "func (a *application) cmdInstall(repo scm.ReadOnlyRepo, modes []checks.Mode, noUpdate bool, prereqReady *sync.WaitGroup) (err error) {\n\terrCh := make(chan error, 1)\n\tgo func() {\n\t\tdefer prereqReady.Done()\n\t\terrCh <- a.cmdInstallPrereq(repo, modes, noUpdate)\n\t}()\n\n\tdefer func() {\n\t\tif err2 := <-errCh; err == nil {\n\t\t\terr = err2\n\t\t}\n\t}()\n\n\tif checks.IsContinuousIntegration() {\n\t\tlog.Printf(\"Running under CI; not installing hooks\")\n\t\treturn nil\n\t}\n\tlog.Printf(\"Installing hooks\")\n\thookDir, err2 := repo.HookPath()\n\tif err2 != nil {\n\t\treturn err2\n\t}\n\tfor _, t := range []string{\"pre-commit\", \"pre-push\"} {\n\t\t// Always remove hook first if it exists, in case it's a symlink.\n\t\tp := filepath.Join(hookDir, t)\n\t\t_ = os.Remove(p)\n\t\tif err = ioutil.WriteFile(p, []byte(fmt.Sprintf(hookContent, t)), 0777); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tlog.Printf(\"Installation done\")\n\treturn nil\n}", "title": "" }, { "docid": "21726b515573a17c95e12b7d8f8de71e", "score": "0.47416994", "text": "func (p *Plugin) installAddonViaHelm(release *types.Release) error {\n\tcb := commandbuilder.CommandBuilder{Name: constants.HelmBin}\n\tif p.Diffrun {\n\t\tlog.Println(\"Running Diff plugin:\", release.Name)\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"diff\"})\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"upgrade\"})\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"--allow-unreleased\"})\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"--suppress-secrets\"})\n\t} else {\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"upgrade\"})\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"--install\"})\n\t\tif release.History > 0 {\n\t\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeLongParam, Name: \"history-max\", Value: fmt.Sprint(release.History)})\n\t\t} else if p.ClusterConfig.Helm.DefaultHistory > 0 {\n\t\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeLongParam, Name: \"history-max\", Value: fmt.Sprint(p.ClusterConfig.Helm.DefaultHistory)})\n\t\t}\n\t}\n\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: release.Name})\n\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: release.ChartPath})\n\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeLongParam, Name: \"version\", Value: release.Version})\n\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeLongParam, Name: \"kube-context\", Value: p.KubeContext})\n\n\tif p.ClusterConfig.Helm.Debug {\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"--debug\"})\n\t}\n\n\t// Add namespaces to command\n\tif release.Namespace != \"\" {\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeLongParam, Name: \"namespace\", Value: release.Namespace})\n\t}\n\n\tif p.ClusterConfig.Helm.LogLevel != 0 {\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeLongParam, Name: \"v\", Value: fmt.Sprint(p.ClusterConfig.Helm.LogLevel)})\n\t}\n\tif release.ChartsSource != \"\" {\n\t\tlog.Println(\"Charts Source defined for:\", release.Name)\n\n\t\t_, err := p.downloadCharts(release)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error downloading charts: %s\", err)\n\t\t}\n\t}\n\t// Add Overrides\n\tfor _, override := range p.overrides(release) {\n\t\tcb.Add(override)\n\t}\n\n\t// Dry Run\n\tif p.Dryrun {\n\t\tlog.Println(\"Running Dry run:\", release.Name)\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"--dry-run\"})\n\t}\n\n\t// Execute helm upgrade\n\tif err := cb.Run(); err != nil {\n\t\treturn fmt.Errorf(\"error running helm: %v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7915ec5a272b30b946bf65eedd2ceecb", "score": "0.47405863", "text": "func (p *Plugin) installAddonViaKubectl(release *types.Release) error {\n\trenderedManifests, err := p.templateChart(release)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error rendering chart for kubectl apply: %s\", err)\n\t}\n\n\tcb := commandbuilder.CommandBuilder{Name: constants.KubectlBin}\n\t// kubectl apply -f -\n\tif release.Namespace != \"\" {\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeLongParam, Name: \"namespace\", Value: release.Namespace})\n\t}\n\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeLongParam, Name: \"context\", Value: p.KubeContext})\n\t// Diff Run\n\tif p.Diffrun {\n\t\tlog.Println(\"Running Diff run:\", release.Name)\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"diff\"})\n\t} else {\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"apply\"})\n\t}\n\t// Dry Run\n\tif p.Dryrun {\n\t\tlog.Println(\"Running Dry run:\", release.Name)\n\t\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeRaw, Value: \"--dry-run=server\"})\n\t}\n\n\tcb.Add(commandbuilder.Arg{Type: commandbuilder.ArgTypeLongParam, Name: \"filename\", Value: \"-\"})\n\n\t// Grab raw commandbuilder command so we can set stdin\n\tkubectlApplyCmd := cb.Command()\n\tkubectlApplyCmd.Stdin = strings.NewReader(renderedManifests)\n\t// We may need to run kubectl apply -f - twice if the helm chart\n\t// has dependant kubernetes resources. The first run will install\n\t// independent components and the second run will install the ones\n\t// that failed previously. If this command fails twice then the chart\n\t// is just broken\n\tif err := utils.Run(kubectlApplyCmd, false); err != nil && !(p.Diffrun && release.DeploymentMethod == \"kubectl\") {\n\t\tkubectlApplyCmd := cb.Command()\n\t\tkubectlApplyCmd.Stdin = strings.NewReader(renderedManifests)\n\t\treturn utils.Run(kubectlApplyCmd, false)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5a47242c191f5ca96aedd3a4e0b344e1", "score": "0.4714377", "text": "func (m *MuninRunner) initCommand(cache *CredentialCache, param string) (*exec.Cmd, error) {\n\tcommand := &exec.Cmd{}\n\n\tcommand.SysProcAttr = &syscall.SysProcAttr{}\n\tcommand.SysProcAttr.Credential = &syscall.Credential{}\n\tif err := m.setCredentials(command, cache); err != nil {\n\t\treturn nil, err\n\t}\n\n\tcommand.Path = path.Join(m.scriptPath, m.name)\n\tif param != \"\" {\n\t\tcommand.Args = []string{command.Path, param}\n\t}\n\n\tlog.Debug(\"[%s] Path: %s\", m.name, command.Path)\n\tlog.Debug(\"[%s] Args: %v\", m.name, command.Args)\n\n\tm.applyAdditionalEnv(command)\n\tm.applyPluginEnv(command)\n\n\tif log.IsEnabledFor(logging.DEBUG) {\n\t\tfor _, v := range command.Env {\n\t\t\tlog.Debug(\"[%s] Env: %s\", m.name, v)\n\t\t}\n\t}\n\n\treturn command, nil\n}", "title": "" }, { "docid": "10748ac6241e6e00a4187fe518e6c901", "score": "0.47114176", "text": "func NewInstallCmd(rootCmd *cobra.Command, executablePath, homeDir string) *cobra.Command {\n\tinstall := &installCommand{\n\t\trootCmd: rootCmd,\n\t\texecutablePath: executablePath,\n\t\thomeDir: homeDir,\n\t}\n\treturn &cobra.Command{\n\t\tUse: \"install\",\n\t\tShort: \"Install virtletctl as a kubectl plugin\",\n\t\tLong: dedent.Dedent(`\n This command install virtletctl as a kubectl plugin.\n\n After running this command, it becomes possible to run virtletctl\n via 'kubectl plugin virt'.`),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) != 0 {\n\t\t\t\treturn errors.New(\"This command does not accept arguments\")\n\t\t\t}\n\t\t\treturn install.Run()\n\t\t},\n\t}\n}", "title": "" }, { "docid": "de68949a8b447cbc1c67b2afabf24d71", "score": "0.46942756", "text": "func newPackageAddTaskCmd(fs afero.Fs, out io.Writer) *cobra.Command {\n\n\tpkg := &packageAddTaskCmd{out: out, fs: fs}\n\tcmd := &cobra.Command{\n\t\tUse: \"task\",\n\t\tShort: \"adds a task to the operator.yaml file\",\n\t\tLong: pkgAddTaskDesc,\n\t\tExample: pkgAddTaskExample,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tpath, err := generate.OperatorPath(fs)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tpkg.path = path\n\t\t\tif err := pkg.run(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tf := cmd.Flags()\n\tf.BoolVarP(&pkg.interactive, \"interactive\", \"i\", false, \"Interactive mode.\")\n\treturn cmd\n}", "title": "" }, { "docid": "748c63c0a597193e595f7a22bfd167d2", "score": "0.46875903", "text": "func Install(version string) error {\n\tif exist(filepath.Join(gvmnrootGo, version, \"bin\", \"go\")) {\n\t\treturn nil\n\t}\n\tif err := build(version); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "96bf92a69f771af2035868ac9a359bc7", "score": "0.4661012", "text": "func doPluginInstall(c *cli.Context) error {\n\targInstallTarget := c.Args().First()\n\tif argInstallTarget == \"\" {\n\t\treturn fmt.Errorf(\"Specify install target\")\n\t}\n\n\tit, err := newInstallTargetFromString(argInstallTarget)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Failed to install plugin while parsing install target\")\n\t}\n\n\tpluginDir, err := setupPluginDir(c.String(\"prefix\"))\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Failed to install plugin while setup plugin directory\")\n\t}\n\n\t// Create a work directory for downloading and extracting an artifact\n\tworkdir, err := ioutil.TempDir(filepath.Join(pluginDir, \"work\"), \"mkr-plugin-installer-\")\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Failed to install plugin while creating a work directory\")\n\t}\n\tdefer os.RemoveAll(workdir)\n\n\t// Download an artifact and install by it\n\tdownloadURL, err := it.makeDownloadURL()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Failed to install plugin while making a download URL\")\n\t}\n\tartifactFile, err := downloadPluginArtifact(downloadURL, workdir)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Failed to install plugin while downloading an artifact\")\n\t}\n\terr = installByArtifact(artifactFile, filepath.Join(pluginDir, \"bin\"), workdir, c.Bool(\"overwrite\"))\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Failed to install plugin while extracting and placing\")\n\t}\n\n\tlogger.Log(\"\", fmt.Sprintf(\"Successfully installed %s\", argInstallTarget))\n\treturn nil\n}", "title": "" }, { "docid": "34124fad766cbe785a083f4e623bd85b", "score": "0.46235833", "text": "func installerCommand(username string) string {\n\treturn fmt.Sprintf(`for i in {1..240}; do if [ -f /home/%[1]s/installer.tar.gz ]; then break; fi; sleep 5; done; \\\n tar -xf /home/%[1]s/installer.tar.gz -C /home/%[1]s/installer; \\\n /home/%[1]s/installer/install`, username)\n}", "title": "" }, { "docid": "ca3ded049fc54153dd431cb8236f0f38", "score": "0.45838684", "text": "func (npmCmd NpmCommand) view(m Module) (url string, err error) {\n\tvar out bytes.Buffer\n\tviewArgs := []string{\"npm\", \"view\", m.Name + \"@\" + m.Version, \"dist.tarball\"}\n\n\tcmd := exec.Cmd{\n\t\tPath: npmCmd.BinPath,\n\t\tArgs: viewArgs,\n\t\tStdout: &out,\n\t\tStderr: os.Stderr,\n\t}\n\n\terr = cmd.Start()\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\n\terr = cmd.Wait()\n\tif err != nil {\n\t\tlog.Println(out.String())\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\n\turl = strings.TrimSpace(out.String())\n\tlog.Printf(\"URL: %s\\n\", url)\n\n\treturn\n}", "title": "" }, { "docid": "e213888a5cd48606bad7c123f87b9933", "score": "0.45576882", "text": "func (a *Manager) InstallPackage(p string) (string, error) {\n\tif _, isInstalled := a.InstalledVersion(p); isInstalled {\n\t\treturn \"already installed\", nil\n\t}\n\tres, err := a.Sys.Run(fmt.Sprintf(\"apt-get install -y %s\", p))\n\treturn string(res), err\n}", "title": "" }, { "docid": "68147a6b7bbcd3dd1df05ac6f25653b0", "score": "0.45397332", "text": "func Install() error {\n\treturn sh.RunV(\"mage\", \"-d\", \"./tools\")\n}", "title": "" }, { "docid": "f6a912e3d5207a47e1250cc40db48d13", "score": "0.4536827", "text": "func NewPackageCommand(settings *environment.Settings) *cobra.Command {\n\tc := PackageCommand{}\n\n\tc.Settings = settings\n\n\tcmd := &cobra.Command{\n\t\tUse: \"package <chaincode-label> <chaincode-type> <path>\",\n\t\tShort: \"package a chaincode\",\n\t\tArgs: c.ParseArgs(),\n\t\tPreRunE: func(_ *cobra.Command, _ []string) error {\n\t\t\treturn c.Validate()\n\t\t},\n\t\tRunE: func(_ *cobra.Command, _ []string) error {\n\t\t\treturn c.Run()\n\t\t},\n\t}\n\n\tc.AddArg(&c.Label)\n\tc.AddArg(&c.Type)\n\tc.AddArg(&c.Path)\n\n\tcmd.SetOutput(c.Settings.Streams.Out)\n\n\treturn cmd\n}", "title": "" }, { "docid": "d12c03b45a87584aa49d9d8e592af9e2", "score": "0.45132497", "text": "func alwaysAuthCommand() *exec.Cmd {\n\treturn exec.Command(\"npm\", \"config\", \"set\", \"always-auth\", \"true\")\n}", "title": "" }, { "docid": "0063e71714ea7a84fd13bdfd73d5e342", "score": "0.44811162", "text": "func (a *AutoComplete) Install(cmd string) error {\n\treturn a.installer.Install(cmd)\n}", "title": "" }, { "docid": "7af50727bcbc4582545120e982be5122", "score": "0.4479184", "text": "func (p *pkgClient) createPackageInstall(o *tkgpackagedatamodel.PackageOptions, serviceAccountCreated, secretCreated bool) error {\n\t// construct the PackageInstall CR\n\tpackageInstall := &kappipkg.PackageInstall{\n\t\tObjectMeta: metav1.ObjectMeta{Name: o.PkgInstallName, Namespace: o.Namespace},\n\t\tSpec: kappipkg.PackageInstallSpec{\n\t\t\tServiceAccountName: o.ServiceAccountName,\n\t\t\tPackageRef: &kappipkg.PackageRef{\n\t\t\t\tRefName: o.PackageName,\n\t\t\t\tVersionSelection: &versions.VersionSelectionSemver{\n\t\t\t\t\tConstraints: o.Version,\n\t\t\t\t\tPrereleases: &versions.VersionSelectionSemverPrereleases{},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\t// if configuration data file was provided, reference the secret name in the PackageInstall\n\tif secretCreated {\n\t\tpackageInstall.Spec.Values = []kappipkg.PackageInstallValues{\n\t\t\t{\n\t\t\t\tSecretRef: &kappipkg.PackageInstallValuesSecretRef{\n\t\t\t\t\tName: fmt.Sprintf(tkgpackagedatamodel.SecretName, o.PkgInstallName, o.Namespace),\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t}\n\n\tif err := p.kappClient.CreatePackageInstall(packageInstall, serviceAccountCreated, secretCreated); err != nil {\n\t\treturn errors.Wrap(err, \"failed to create PackageInstall resource\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "00d82e2d776318b5aad545109fd970e0", "score": "0.4447973", "text": "func downloadNInstall(update *Updater) (err error) {\n\t// Downloading a file.\n\tupdateFile, err := DownloadFile(update.DownloadURL)\n\tif err != nil {\n\t\treturn err\n\t}\n\t//installing a file\n\terr = updateProcess(updateFile, update, \"sh\", \"-c\", \"pm install \"+updateFile.Name())\n\tif err == nil {\n\t\t// check if the app is installed or not\n\t\tresult, err := execute(\"sh\", \"-c\", \"pm list packages \"+update.PackageName)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif result == \"\" {\n\t\t\treturn errors.New(\"App not installed please check the command\")\n\t\t}\n\t\tlog.Println(update.PackageName, \" installed successfully.\")\n\t\treturn err\n\t}\n\treturn err\n}", "title": "" }, { "docid": "d1b46fef8ddd6974228d36e8dde3dd01", "score": "0.44277692", "text": "func cmdTest(cmd []string, cwd, name string) *test {\n\treturn &test{\n\t\tName: name,\n\t\tCmd: strings.Join(cmd, \" \"),\n\t\trun: func() (error, string) {\n\t\t\tcommand := exec.Command(cmd[0], cmd[1:]...)\n\t\t\tif cwd != \"\" {\n\t\t\t\tcommand.Dir = cwd\n\t\t\t}\n\t\t\toutput, err := command.CombinedOutput()\n\t\t\tif err != nil {\n\t\t\t\tif _, err2 := exec.LookPath(cmd[0]); err2 != nil {\n\t\t\t\t\treturn fmt.Errorf(ERR_NEED_INSTALL, cmd[0], err), string(output)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn err, string(output)\n\t\t},\n\t}\n}", "title": "" }, { "docid": "f59e8faf391e28e6724838c9c96e8ea7", "score": "0.44218677", "text": "func findNpm() string {\n\tnpmBin, err := exec.LookPath(\"npm\")\n\tif err == nil && npmBin != \"\" {\n\t\treturn npmBin\n\t}\n\tnpmBin, err = exec.LookPath(\"pnpm\")\n\tif err == nil && npmBin != \"\" {\n\t\treturn npmBin\n\t}\n\tnpmBin, err = exec.LookPath(\"yarn\")\n\tif err == nil && npmBin != \"\" {\n\t\treturn npmBin\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "1961ec8a252930ddbce01c5b70cd7f01", "score": "0.43980333", "text": "func (p *Provider) Install() error {\n\t// make api directory\n\troot, err := os.Getwd()\n\tif err != nil {\n\t\treturn err\n\t}\n\tapi := path.Join(root, \"api\")\n\terr = os.MkdirAll(api, 0755)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// create index.js in api directory\n\n\tindex := path.Join(api, \"index.js\")\n\terr = hosting.CreateFileWithContents(index, indexjs)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// create package.json\n\tpkg := path.Join(root, \"package.json\")\n\terr = hosting.CreateFileWithContents(pkg, packagejson)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// create vercel.json\n\tvc := path.Join(root, \"vercel.json\")\n\terr = hosting.CreateFileWithContents(vc, verceljson)\n\tif err != nil {\n\t\treturn err\n\t}\n\tpterm.Info.Println(\"Vercel provider installed.\")\n\tpterm.Info.Println(\"Run `npm install` to install dependencies.\")\n\n\treturn nil\n}", "title": "" }, { "docid": "fdf2a259b49c265bd01e2b92170e32f9", "score": "0.43928233", "text": "func TestInstallFromPackage(t *testing.T) {\n\tpdir := newTempDir()\n\tdefer os.RemoveAll(pdir)\n\n\tccpackfile := pdir + \"/ccpack.file\"\n\terr := createSignedCDSPackage([]string{\"-n\", \"somecc\", \"-p\", \"some/go/package\", \"-v\", \"0\", ccpackfile}, false)\n\tif err != nil {\n\t\tt.Fatalf(\"could not create package :%v\", err)\n\t}\n\n\tfsPath := \"/tmp/installtest\"\n\n\tcmd, mockCF := initInstallTest(fsPath, t)\n\tdefer cleanupInstallTest(fsPath)\n\n\tmockResponse := &pb.ProposalResponse{\n\t\tResponse: &pb.Response{Status: 200},\n\t\tEndorsement: &pb.Endorsement{},\n\t}\n\tmockEndorserClient := common.GetMockEndorserClient(mockResponse, nil)\n\tmockCF.EndorserClients = []pb.EndorserClient{mockEndorserClient}\n\n\targs := []string{ccpackfile}\n\tcmd.SetArgs(args)\n\n\tif err := cmd.Execute(); err != nil {\n\t\tt.Fatal(\"error executing install command from package\")\n\t}\n}", "title": "" }, { "docid": "4a9dce48ab10822857a6eb15f163c127", "score": "0.43885526", "text": "func installNew(filepath, installDir string) (string, error) {\n\tfmt.Printf(\"\\nNow extracting archive %v\\n\", filepath)\n\t// run the shell command: tar -C /usr/local -xzf go$VERSION.$OS-$ARCH.tar.gz\n\tcmd := exec.Command(\"tar\", \"-C\", installDir, \"-xzf\", filepath)\n\tout, err := cmd.Output()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn string(out), nil\n}", "title": "" }, { "docid": "ada22f85e7e1ef438ed0052aabb5132a", "score": "0.43840438", "text": "func Install() {\n\tif !(strings.Contains(os.Args[0], \"winupdt.exe\")) {\n\t\tghelper.Run(\"mkdir %APPDATA%\\\\Windows_Update\")\n\t\tghelper.Run(\"copy \" + os.Args[0] + \" %APPDATA%\\\\Windows_Update\\\\winupdt.exe\")\n\t\tghelper.Run(\"REG ADD HKCU\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run /V Windows_Update /t REG_SZ /F /D %APPDATA%\\\\Windows_Update\\\\winupdt.exe\")\n\t}\n}", "title": "" }, { "docid": "820eeb37b27cc2f28a875b8be2c9d719", "score": "0.43710017", "text": "func (p *Packages) Install() error {\n\tfor _, pkg := range p.Packages {\n\t\tif !p.Debug {\n\t\t\ts := spin.New(\"%s \")\n\t\t\ts.Set(spin.Spin8)\n\t\t\ts.Start()\n\t\t\tdefer s.Stop()\n\t\t\t// Allow the spinner to show when the install returns too quickly.\n\t\t\ttime.Sleep(5 * time.Millisecond)\n\t\t}\n\t\tfmt.Printf(\"Installing: %s\\n\", aurora.Cyan(pkg.URL))\n\n\t\tgoCmdArgs := []string{\"get\"}\n\t\tif p.Debug {\n\t\t\tgoCmdArgs = append(goCmdArgs, \"-v\")\n\t\t}\n\t\tgoCmdArgs = append(goCmdArgs, pkg.URL)\n\t\tif err := p.RunCmd(\"go\", goCmdArgs...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b00e601dafa6571453724425e5549860", "score": "0.43634474", "text": "func dockerInstall() {\n\t//use curl to get install script\n\tcurl := exec.Command(\"curl\", \"-fsSL\", \"https://get.docker.com\", \"-o\", \"get-docker.sh\")\n\tprint(\"1\")\n\tcurl.Stdout = os.Stdout\n\tcurl.Stderr = os.Stderr\n\terr := curl.Run()\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\t//run script retrieved in curl request\n\tsh := exec.Command(\"sh\", \"get-docker.sh\")\n\tprint(\"2\")\n\tsh.Stdout = os.Stdout\n\tsh.Stderr = os.Stderr\n\terr = sh.Run()\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n}", "title": "" }, { "docid": "291df7cc45311e659ef04ead9e828249", "score": "0.43611917", "text": "func InstallSteamCmd(destPath string) error {\n\tif err := os.MkdirAll(destPath, 0755); err != nil {\n\t\treturn err\n\t}\n\n\tlog.Infof(\"downloading steamcmd: url=%s\", steamCmdURL)\n\n\tdestFile := filepath.Join(destPath, \"steamcmd.zip\")\n\td, err := os.Create(destFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresp, err := http.Get(steamCmdURL)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tn, err := io.Copy(d, resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\td.Close()\n\n\tlog.Debugf(\"downloaded steamcmd: bytes=%d\", n)\n\n\tdefer os.Remove(destFile)\n\n\t// extract\n\tlog.Debugf(\"extracting steamcmd: path=%s\", destFile)\n\tif err := unzip(destFile, destPath); err != nil {\n\t\treturn err\n\t}\n\n\tlog.Infof(\"installed steam cmd: path=%s\", destPath)\n\n\treturn nil\n}", "title": "" }, { "docid": "a74a719bd1df892285bc0ef760c5f077", "score": "0.43521532", "text": "func (a RepositoryManagementAPI) CreateNPMHosted(r NPMHostedRepository) error {\n\tpath := fmt.Sprintf(\"beta/repositories/npm/hosted\")\n\n\tb := new(bytes.Buffer)\n\tjson.NewEncoder(b).Encode(r)\n\n\t_, err := a.client.sendRequest(http.MethodPost, path, b, nil)\n\treturn err\n}", "title": "" }, { "docid": "6c88c675f580314098e8539c540b9ac1", "score": "0.4345793", "text": "func InstallDependencies(ctx context.Context, appPath string) error {\n\terrb := &bytes.Buffer{}\n\terr := cmdrunner.\n\t\tNew(\n\t\t\tcmdrunner.DefaultStderr(errb),\n\t\t\tcmdrunner.DefaultWorkdir(appPath),\n\t\t).\n\t\tRun(ctx,\n\t\t\tstep.New(\n\t\t\t\tstep.Exec(\n\t\t\t\t\t\"go\",\n\t\t\t\t\t\"get\",\n\t\t\t\t\t// installs the gocosmos plugin.\n\t\t\t\t\t\"github.com/regen-network/cosmos-proto/protoc-gen-gocosmos\",\n\n\t\t\t\t\t// install Go code generation plugin.\n\t\t\t\t\t\"github.com/golang/protobuf/protoc-gen-go\",\n\n\t\t\t\t\t// install grpc-gateway plugins.\n\t\t\t\t\t\"github.com/grpc-ecosystem/grpc-gateway/protoc-gen-grpc-gateway\",\n\t\t\t\t\t\"github.com/grpc-ecosystem/grpc-gateway/protoc-gen-swagger\",\n\t\t\t\t\t\"github.com/grpc-ecosystem/grpc-gateway/v2/protoc-gen-openapiv2\",\n\t\t\t\t),\n\t\t\t),\n\t\t)\n\treturn errors.Wrap(err, errb.String())\n}", "title": "" }, { "docid": "1a535842e80e745d562b9f19b93d9637", "score": "0.43422377", "text": "func (projectStructure *ProjectStructure) UsesNpm() bool {\n\treturn projectStructure.anyFileExists(\"package.json\")\n}", "title": "" }, { "docid": "65cd61cdff2549116f317ba44a68859c", "score": "0.4324958", "text": "func runCommandAndPrintResult(cmd *exec.Cmd, installCmd func() error) error {\n\td, err := cmd.CombinedOutput()\n\tif err != nil && installCmd != nil && strings.Contains(err.Error(), \"executable file not found\") {\n\t\terr2 := installCmd()\n\t\tif err2 != nil {\n\t\t\ttool := strings.Join(cmd.Args, \" \")\n\t\t\tfmt.Printf(\"Running install command for tool '%s' failed with %s\\n\", tool, err2)\n\t\t\treturn err\n\t\t}\n\t\t// re-run command after installing it\n\t\tcmd = exec.Command(cmd.Args[0], cmd.Args[1:]...)\n\t\td, err = cmd.CombinedOutput()\n\t}\n\tif len(d) > 0 {\n\t\ttool := strings.Join(cmd.Args, \" \")\n\t\tfmt.Printf(\"%s:\\n%s\\n\", tool, d)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "8f5f0f12c4a443926dc99cb4bb336b5f", "score": "0.43245256", "text": "func InstallStandardPlugin(dir, name string) (string, error) {\n\tu := \"https://api.github.com/repos/jenkins-x-plugins/\" + name + \"/releases/latest\"\n\n\tclient := httphelpers.GetClient()\n\treq, err := http.NewRequest(\"GET\", u, http.NoBody)\n\tif err != nil {\n\t\treturn \"\", errors.Wrapf(err, \"failed to create http request for %s\", u)\n\t}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tif resp != nil {\n\t\t\treturn \"\", errors.Wrapf(err, \"failed to GET endpoint %s with status %s\", u, resp.Status)\n\t\t}\n\t\treturn \"\", errors.Wrapf(err, \"failed to GET endpoint %s\", u)\n\t}\n\tdefer resp.Body.Close()\n\tbody, err := io.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn \"\", errors.Wrapf(err, \"failed to read response from %s\", u)\n\t}\n\n\trelease := &githubRelease{}\n\terr = json.Unmarshal(body, release)\n\tif err != nil {\n\t\treturn \"\", errors.Wrapf(err, \"failed to unmarshal release from %s\", u)\n\t}\n\tlatestVersion := strings.TrimPrefix(release.TagName, \"v\")\n\tif latestVersion == \"\" {\n\t\treturn \"\", fmt.Errorf(\"can't find latest version of plugin: %s\", body)\n\t}\n\n\tplugin := extensions.CreateJXPlugin(\"jenkins-x-plugins\", strings.TrimPrefix(name, \"jx-\"), latestVersion)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn extensions.EnsurePluginInstalled(plugin, dir)\n}", "title": "" }, { "docid": "01221703dc21acd02214fac89c1ffe6c", "score": "0.43238637", "text": "func (m *MigrationRunner) runCommand(mig Migration) error {\n\tvar err error\n\n\tfrom, to := mig.Versions()\n\n\tswitch m.command {\n\tcase \"describe\":\n\t\t// Describe is not expected to be run by a script, but by a human, so\n\t\t// ignore the logger & print to stdout.\n\t\tfmt.Printf(\"\\n Migration from %d to %d:\", from, to)\n\t\tfmt.Println(mig.Describe())\n\tcase \"migrate\":\n\t\tif m.newRepoPath, err = CloneRepo(m.oldRepoOpt, to); err != nil {\n\t\t\treturn errors.Wrap(err, \"clone repo failed\")\n\t\t}\n\t\tm.logger.Printf(\"new repo will be at %s\", m.newRepoPath)\n\n\t\tif err = mig.Migrate(m.newRepoPath); err != nil {\n\t\t\treturn errors.Wrap(err, \"migration failed\")\n\t\t}\n\t\tif err = m.validateAndUpdateVersion(to, m.newRepoPath, mig); err != nil {\n\t\t\treturn errors.Wrap(err, \"validation failed\")\n\t\t}\n\t\tif err = InstallNewRepo(m.oldRepoOpt, m.newRepoPath); err != nil {\n\t\t\treturn errors.Wrap(err, \"installation failed\")\n\t\t}\n\tcase \"buildonly\":\n\t\tif m.newRepoPath, err = CloneRepo(m.oldRepoOpt, to); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tm.logger.Printf(\"new repo will be at %s\", m.newRepoPath)\n\n\t\tif err = mig.Migrate(m.newRepoPath); err != nil {\n\t\t\treturn errors.Wrap(err, \"migration failed\")\n\t\t}\n\t\tif err = m.validateAndUpdateVersion(to, m.newRepoPath, mig); err != nil {\n\t\t\treturn errors.Wrap(err, \"validation failed\")\n\t\t}\n\tcase \"install\":\n\t\tif m.newRepoPath == \"\" {\n\t\t\treturn errors.New(\"installation failed: new repo path not specified\")\n\t\t}\n\n\t\trepoVer, err := repo.ReadVersion(m.newRepoPath)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"installation failed\")\n\t\t}\n\t\t// quick check of version to help prevent install after a failed migration\n\t\tnewVer := strconv.FormatUint(uint64(to), 10) // to forestall parsing errors of version\n\t\tif repoVer != newVer {\n\t\t\treturn fmt.Errorf(\"installation failed: repo has version %s, expected version %s\", repoVer, newVer)\n\t\t}\n\n\t\tif err = InstallNewRepo(m.oldRepoOpt, m.newRepoPath); err != nil {\n\t\t\treturn errors.Wrap(err, \"installation failed\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f50666adba45b2a1bef670456a899b22", "score": "0.43238118", "text": "func installByArtifact(artifactFile, bindir, workdir string, overwrite bool) error {\n\t// unzip artifact to work directory\n\terr := archiver.Zip.Open(artifactFile, workdir)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Look for plugin files recursively, and place those to binPath\n\treturn filepath.Walk(workdir, func(path string, info os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif info.IsDir() {\n\t\t\treturn nil\n\t\t}\n\n\t\t// a plugin file should be executable, and have specified name.\n\t\tname := info.Name()\n\t\tisExecutable := (info.Mode() & 0111) != 0\n\t\tif isExecutable && looksLikePlugin(name) {\n\t\t\treturn placePlugin(path, filepath.Join(bindir, name), overwrite)\n\t\t}\n\n\t\t// `path` is a file but not plugin.\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "f4f33b28752ad85f42780f3c2c116461", "score": "0.43237898", "text": "func SetupCommand(host *host.Host) string {\n\tcmd := fmt.Sprintf(\"%s host setup\",\n\t\tfilepath.Join(\"~\", binaryName(&host.Distro)))\n\tif host.Distro.SetupAsSudo {\n\t\tcmd += \" --setup_as_sudo\"\n\t}\n\n\tcmd += fmt.Sprintf(\" --working_directory=%s\", host.Distro.WorkDir)\n\n\treturn cmd\n}", "title": "" }, { "docid": "8731515ba05b55678684dfc888c39b36", "score": "0.4304386", "text": "func NpmPkgExists(pkg string) (string, error) {\n\tout, err := exec.Command(\"npm\", \"list\", \"--parseable\", \"-g\", pkg).Output()\n\t_, ok := err.(*exec.ExitError)\n\tif ok {\n\t\treturn \"\", &PkgNotFoundError{pkg}\n\t}\n\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"npm exec failed\")\n\t}\n\n\treturn strings.TrimSpace(string(out)), nil\n}", "title": "" }, { "docid": "b4589e393e6286d841153a6b4b7c3c74", "score": "0.42965102", "text": "func addBuild(topLevel *cobra.Command) {\n\tpo := &options.PublishOptions{}\n\tbo := &options.BuildOptions{}\n\n\tbuild := &cobra.Command{\n\t\tUse: \"build IMPORTPATH...\",\n\t\tShort: \"Build and publish container images from the given importpaths.\",\n\t\tLong: `This sub-command builds the provided import paths into Go binaries, containerizes them, and publishes them.`,\n\t\tAliases: []string{\"publish\"},\n\t\tExample: `\n # Build and publish import path references to a Docker Registry as:\n # ${KO_DOCKER_REPO}/<package name>-<hash of import path>\n # When KO_DOCKER_REPO is ko.local, it is the same as if --local and\n # --preserve-import-paths were passed.\n # If the import path is not provided, the current working directory is the\n # default.\n ko build github.com/foo/bar/cmd/baz github.com/foo/bar/cmd/blah\n\n # Build and publish a relative import path as:\n # ${KO_DOCKER_REPO}/<package name>-<hash of import path>\n # When KO_DOCKER_REPO is ko.local, it is the same as if --local and\n # --preserve-import-paths were passed.\n ko build ./cmd/blah\n\n # Build and publish a relative import path as:\n # ${KO_DOCKER_REPO}/<import path>\n # When KO_DOCKER_REPO is ko.local, it is the same as if --local was passed.\n ko build --preserve-import-paths ./cmd/blah\n\n # Build and publish import path references to a Docker daemon as:\n # ko.local/<import path>\n # This always preserves import paths.\n ko build --local github.com/foo/bar/cmd/baz github.com/foo/bar/cmd/blah`,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := options.Validate(po, bo); err != nil {\n\t\t\t\treturn fmt.Errorf(\"validating options: %w\", err)\n\t\t\t}\n\n\t\t\tif len(args) == 0 {\n\t\t\t\t// Build the current directory by default.\n\t\t\t\targs = []string{\".\"}\n\t\t\t}\n\n\t\t\tctx := cmd.Context()\n\n\t\t\tbo.InsecureRegistry = po.InsecureRegistry\n\t\t\tbuilder, err := makeBuilder(ctx, bo)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error creating builder: %w\", err)\n\t\t\t}\n\t\t\tpublisher, err := makePublisher(po)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error creating publisher: %w\", err)\n\t\t\t}\n\t\t\tdefer publisher.Close()\n\t\t\timages, err := publishImages(ctx, args, publisher, builder)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"failed to publish images: %w\", err)\n\t\t\t}\n\t\t\tfor _, img := range images {\n\t\t\t\tfmt.Println(img)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\toptions.AddPublishArg(build, po)\n\toptions.AddBuildOptions(build, bo)\n\ttopLevel.AddCommand(build)\n}", "title": "" }, { "docid": "202bb58074e67e653fab01177f3bc77d", "score": "0.42874804", "text": "func (pkg *Package) GoInstall(envPath string) (err error) {\n\tcmd := exec.Command(\"go\", \"install\")\n\tif debug.Value >= 2 {\n\t\tcmd.Args = append(cmd.Args, \"-v\")\n\t}\n\tcmd.Args = append(cmd.Args, \"./...\")\n\n\tenvGOCACHE := os.Getenv(\"GOCACHE\")\n\tenvHOME := os.Getenv(\"HOME\")\n\n\tcmd.Env = append(cmd.Env, \"GO111MODULE=off\")\n\tcmd.Env = append(cmd.Env, \"GOPATH=\"+build.Default.GOPATH)\n\tcmd.Env = append(cmd.Env, \"PATH=\"+envPath)\n\tcmd.Env = append(cmd.Env, \"GOCACHE=\"+envGOCACHE)\n\tcmd.Env = append(cmd.Env, \"HOME=\"+envHOME)\n\tcmd.Dir = pkg.FullPath\n\tcmd.Stdout = defStdout\n\tcmd.Stderr = defStderr\n\n\tif debug.Value == 0 {\n\t\tfmt.Printf(\"= GoInstall %s\\n\", cmd.Dir)\n\t} else {\n\t\tfmt.Printf(\"= GoInstall %s\\n%s\\n%s\\n\", cmd.Dir, cmd.Env, cmd.Args)\n\t}\n\n\terr = cmd.Run()\n\n\treturn\n}", "title": "" }, { "docid": "98366a554acb800e0057673b5b3f98da", "score": "0.42841807", "text": "func performInstallPackage(installPackage pkgfile.InstallPackage) error {\n\treturn InstallPackage(installPackage.Url)\n}", "title": "" }, { "docid": "569bd4bab5d92a59825393a3241bb378", "score": "0.4270991", "text": "func initCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"init [name]\",\n\t\tShort: \"Initialize a new jamgo application\",\n\t\tArgs: cobra.ExactArgs(1),\n\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tos.MkdirAll(args[0], os.ModePerm)\n\t\t\tos.Chdir(args[0])\n\t\t\tdefer os.Chdir(\"..\")\n\t\t\tos.MkdirAll(\"pages/templates\", os.ModePerm)\n\t\t\tos.MkdirAll(\"assets/img\", os.ModePerm)\n\t\t\tos.MkdirAll(\"assets/css\", os.ModePerm)\n\t\t\tos.MkdirAll(\"assets/js\", os.ModePerm)\n\n\t\t\tvar wg sync.WaitGroup\n\t\t\twg.Add(5)\n\t\t\tgo func() {\n\t\t\t\tcreateDefault(\"pages/templates\", \"head\")\n\t\t\t\twg.Done()\n\t\t\t}()\n\t\t\tgo func() {\n\t\t\t\tgo createDefault(\"pages/templates\", \"header\")\n\t\t\t\twg.Done()\n\t\t\t}()\n\t\t\tgo func() {\n\t\t\t\tcreateDefault(\"pages/templates\", \"footer\")\n\t\t\t\twg.Done()\n\t\t\t}()\n\t\t\tgo func() {\n\t\t\t\tcmd := exec.Command(\"jamgo\", \"new\", \"page\", \"index\")\n\t\t\t\terr := cmd.Run()\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatalln(err)\n\t\t\t\t}\n\t\t\t\twg.Done()\n\t\t\t}()\n\n\t\t\tgo func() {\n\t\t\t\tcmd := exec.Command(\"go\", \"mod\", \"init\", args[0])\n\t\t\t\terr := cmd.Run()\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatalln(err)\n\t\t\t\t}\n\t\t\t\tcmd = exec.Command(\"go\", \"get\", \"github.com/SamtheSaint/jamgo\")\n\t\t\t\terr = cmd.Run()\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatalln(err)\n\t\t\t\t}\n\t\t\t\twg.Done()\n\t\t\t}()\n\n\t\t\twg.Wait()\n\t\t},\n\t}\n}", "title": "" }, { "docid": "92e76ac105d6ebf41fa155b84d160f0f", "score": "0.42650658", "text": "func NewApplyCommand(r *helmx.Runner, out io.Writer, cmdName string, installByDefault bool) *cobra.Command {\n\tupOpts := &helmx.UpgradeOpts{Out: out}\n\tpathOptions := clientcmd.NewDefaultPathOptions()\n\n\tcmd := &cobra.Command{\n\t\tUse: fmt.Sprintf(\"%s [RELEASE] [DIR_OR_CHART]\", cmdName),\n\t\tShort: \"Install or upgrade the helm release from the directory or the chart specified\",\n\t\tLong: `Install or upgrade the helm release from the directory or the chart specified\n\nUnder the hood, this generates Kubernetes manifests from (1)directory containing manifests/kustomization/local helm chart or (2)remote helm chart, then inject sidecars, and finally install the result as a Helm release\n\nWhen DIR_OR_CHART is a local helm chart, this copies it into a temporary directory, renders all the templates into manifests by running \"helm template\", and then run injectors to update manifests, and install the temporary chart by running \"helm upgrade --install\".\n\nIt's better than installing it with \"kubectl apply -f\", as you can leverage various helm sub-commands like \"helm test\" if you included tests in the \"templates/tests\" directory of the chart.\nIt's also better in regard to security and reproducibility, as creating a helm release allows helm to detect Kubernetes resources removed from the desired state but still exist in the cluster, and automatically delete unnecessary resources.\n\nWhen DIR_OR_CHART is a local directory containing Kubernetes manifests, this copies all the manifests into a temporary directory, and turns it into a local Helm chart by generating a Chart.yaml whose version and appVersion are set to the value of the --version flag.\n\nWhen DIR_OR_CHART contains kustomization.yaml, this runs \"kustomize build\" to generate manifests, and then run injectors to update manifests, and install the temporary chart by running \"helm upgrade --install\".\n`,\n\t\tArgs: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) != 2 {\n\t\t\t\treturn errors.New(\"requires two arguments\")\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\trelease := args[0]\n\t\t\tdir := args[1]\n\n\t\t\ttempLocalChartDir, err := r.Chartify(release, dir, upOpts.ChartifyOpts)\n\t\t\tif err != nil {\n\t\t\t\tcmd.SilenceUsage = true\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif !upOpts.Debug {\n\t\t\t\tdefer os.RemoveAll(tempLocalChartDir)\n\t\t\t} else {\n\t\t\t\tklog.Infof(\"helm chart has been written to %s for you to see. please remove it afterwards\", tempLocalChartDir)\n\t\t\t}\n\n\t\t\tif len(upOpts.Adopt) > 0 {\n\t\t\t\tif err := r.Adopt(\n\t\t\t\t\trelease,\n\t\t\t\t\tupOpts.Adopt,\n\t\t\t\t\tpathOptions,\n\t\t\t\t\thelmx.TillerNamespace(upOpts.TillerNamespace),\n\t\t\t\t\thelmx.Namespace(upOpts.Namespace),\n\t\t\t\t); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif err := r.Upgrade(release, tempLocalChartDir, *upOpts); err != nil {\n\t\t\t\tcmd.SilenceUsage = true\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\treturn nil\n\t\t},\n\t}\n\tf := cmd.Flags()\n\n\tupOpts.ChartifyOpts = chartifyOptsFromFlags(f)\n\tupOpts.ClientOpts = clientOptsFromFlags(f)\n\n\t//f.StringVar(&u.release, \"name\", \"\", \"release name (default \\\"release-name\\\")\")\n\tf.StringVar(&upOpts.Timeout, \"timeout\", \"300\", \"time in seconds to wait for any individual Kubernetes operation (like Jobs for hooks)\")\n\n\tf.BoolVar(&upOpts.DryRun, \"dry-run\", false, \"simulate an upgrade\")\n\n\tf.BoolVar(&upOpts.Install, \"install\", installByDefault, \"install the release if missing\")\n\n\tf.BoolVar(&upOpts.ResetValues, \"reset-values\", false, \"reset the values to the ones built into the chart and merge in any new values\")\n\n\tf.StringSliceVarP(&upOpts.Adopt, \"adopt\", \"\", []string{}, \"adopt existing k8s resources before apply\")\n\n\tf.StringVar(&pathOptions.LoadingRules.ExplicitPath, pathOptions.ExplicitFileFlag, pathOptions.LoadingRules.ExplicitPath, \"use a particular kubeconfig file\")\n\n\treturn cmd\n}", "title": "" }, { "docid": "09cc6764b42207bc30c11954dd88bab1", "score": "0.42619103", "text": "func installAPTPackages(ctx context.Context, exec Executer, packages []string) error {\n\tif len(packages) == 0 {\n\t\treturn nil\n\t}\n\targs := append([]string{\"apt-get\", \"install\", \"-y\"}, packages...)\n\t_, err := exec.Execute(ctx, args)\n\treturn errors.Wrapf(err, \"could not install %d apt_packages\", len(packages))\n}", "title": "" }, { "docid": "bc66d7023f9635a3f920fea26a862a5a", "score": "0.4239338", "text": "func newChannelCommand(cmd *cobra.Command, args []string, components *Components) (command Command, err error) {\n\tchannelId, err := getPaymentChannelId(cmd)\n\tif err != nil {\n\t\treturn\n\t}\n\tcommand = &channelCommand{\n\t\tstorage: *components.LockerStorage(),\n\t\tpaymentChannelId: channelId,\n\t}\n\treturn\n}", "title": "" }, { "docid": "7f907075de13ff8670606a399288cefa", "score": "0.42287996", "text": "func writeNpmrcFile(vargs Npm) error {\n\n\t// get the base64 encoded string\n\tauthString := fmt.Sprintf(\"%s:%s\", vargs.Username, vargs.Password)\n\tencoded := base64.StdEncoding.EncodeToString([]byte(authString))\n\n\t// create the file contents\n\tcontents := fmt.Sprintf(\"_auth = %s\\nemail = %s\", encoded, vargs.Email)\n\n\t// write the file\n\treturn ioutil.WriteFile(\"/root/.npmrc\", []byte(contents), 0644)\n}", "title": "" }, { "docid": "93a8821e87fd5f0e5947db659fc67da6", "score": "0.42271355", "text": "func NewPushCommand() *cobra.Command {\n\tcmd := cobra.Command{\n\t\tUse: \"push\",\n\t\tShort: \"push sheaf bundle config to registry\",\n\t\tArgs: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) != 2 {\n\t\t\t\treturn fmt.Errorf(\"requires path to bundle and destination\")\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tbundlePath := args[0]\n\t\t\tdest := args[1]\n\n\t\t\treturn fs.Write(bundlePath, dest)\n\t\t},\n\t}\n\n\treturn &cmd\n}", "title": "" }, { "docid": "6518879964dfe7092fbf3e772c1978e7", "score": "0.4223161", "text": "func NexusUploadCommand() *cobra.Command {\n\tconst STEP_NAME = \"nexusUpload\"\n\n\tmetadata := nexusUploadMetadata()\n\tvar stepConfig nexusUploadOptions\n\tvar startTime time.Time\n\tvar logCollector *log.CollectorHook\n\tvar splunkClient *splunk.Splunk\n\ttelemetryClient := &telemetry.Telemetry{}\n\n\tvar createNexusUploadCmd = &cobra.Command{\n\t\tUse: STEP_NAME,\n\t\tShort: \"Upload artifacts to Nexus Repository Manager\",\n\t\tLong: `Upload build artifacts to a Nexus Repository Manager.\n\nSupports MTA, npm and (multi-module) Maven projects.\nMTA files will be uploaded to a Maven repository.\n\nThe uploaded file-type depends on your project structure and step configuration.\nTo upload Maven projects, you need a pom.xml in the project root and set the mavenRepository option.\nTo upload MTA projects, you need a mta.yaml in the project root and set the mavenRepository option.\nTo upload npm projects, you need a package.json in the project root and set the npmRepository option.\n\nIf the 'format' option is set, the 'URL' can contain the full path including the repository ID. Providing the 'npmRepository' or the 'mavenRepository' parameter(s) is not necessary.\n\nnpm:\nPublishing npm projects makes use of npm's \"publish\" command.\nIt requires a \"package.json\" file in the project's root directory which has \"version\" set and is not delared as \"private\".\nTo find out what will be published, run \"npm publish --dry-run\" in the project's root folder.\nIt will use your gitignore file to exclude the mached files from publishing.\nNote: npm's gitignore parser might yield different results from your git client, to ignore a \"foo\" directory globally use the glob pattern \"**/foo\".\n\nIf an image for mavenExecute is configured, and npm packages are to be published, the image must have npm installed.`,\n\t\tPreRunE: func(cmd *cobra.Command, _ []string) error {\n\t\t\tstartTime = time.Now()\n\t\t\tlog.SetStepName(STEP_NAME)\n\t\t\tlog.SetVerbose(GeneralConfig.Verbose)\n\n\t\t\tGeneralConfig.GitHubAccessTokens = ResolveAccessTokens(GeneralConfig.GitHubTokens)\n\n\t\t\tpath, _ := os.Getwd()\n\t\t\tfatalHook := &log.FatalHook{CorrelationID: GeneralConfig.CorrelationID, Path: path}\n\t\t\tlog.RegisterHook(fatalHook)\n\n\t\t\terr := PrepareConfig(cmd, &metadata, STEP_NAME, &stepConfig, config.OpenPiperFile)\n\t\t\tif err != nil {\n\t\t\t\tlog.SetErrorCategory(log.ErrorConfiguration)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlog.RegisterSecret(stepConfig.Username)\n\t\t\tlog.RegisterSecret(stepConfig.Password)\n\n\t\t\tif len(GeneralConfig.HookConfig.SentryConfig.Dsn) > 0 {\n\t\t\t\tsentryHook := log.NewSentryHook(GeneralConfig.HookConfig.SentryConfig.Dsn, GeneralConfig.CorrelationID)\n\t\t\t\tlog.RegisterHook(&sentryHook)\n\t\t\t}\n\n\t\t\tif len(GeneralConfig.HookConfig.SplunkConfig.Dsn) > 0 {\n\t\t\t\tsplunkClient = &splunk.Splunk{}\n\t\t\t\tlogCollector = &log.CollectorHook{CorrelationID: GeneralConfig.CorrelationID}\n\t\t\t\tlog.RegisterHook(logCollector)\n\t\t\t}\n\n\t\t\tif err = log.RegisterANSHookIfConfigured(GeneralConfig.CorrelationID); err != nil {\n\t\t\t\tlog.Entry().WithError(err).Warn(\"failed to set up SAP Alert Notification Service log hook\")\n\t\t\t}\n\n\t\t\tvalidation, err := validation.New(validation.WithJSONNamesForStructFields(), validation.WithPredefinedErrorMessages())\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err = validation.ValidateStruct(stepConfig); err != nil {\n\t\t\t\tlog.SetErrorCategory(log.ErrorConfiguration)\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\treturn nil\n\t\t},\n\t\tRun: func(_ *cobra.Command, _ []string) {\n\t\t\tstepTelemetryData := telemetry.CustomData{}\n\t\t\tstepTelemetryData.ErrorCode = \"1\"\n\t\t\thandler := func() {\n\t\t\t\tconfig.RemoveVaultSecretFiles()\n\t\t\t\tstepTelemetryData.Duration = fmt.Sprintf(\"%v\", time.Since(startTime).Milliseconds())\n\t\t\t\tstepTelemetryData.ErrorCategory = log.GetErrorCategory().String()\n\t\t\t\tstepTelemetryData.PiperCommitHash = GitCommit\n\t\t\t\ttelemetryClient.SetData(&stepTelemetryData)\n\t\t\t\ttelemetryClient.Send()\n\t\t\t\tif len(GeneralConfig.HookConfig.SplunkConfig.Dsn) > 0 {\n\t\t\t\t\tsplunkClient.Initialize(GeneralConfig.CorrelationID,\n\t\t\t\t\t\tGeneralConfig.HookConfig.SplunkConfig.Dsn,\n\t\t\t\t\t\tGeneralConfig.HookConfig.SplunkConfig.Token,\n\t\t\t\t\t\tGeneralConfig.HookConfig.SplunkConfig.Index,\n\t\t\t\t\t\tGeneralConfig.HookConfig.SplunkConfig.SendLogs)\n\t\t\t\t\tsplunkClient.Send(telemetryClient.GetData(), logCollector)\n\t\t\t\t}\n\t\t\t\tif len(GeneralConfig.HookConfig.SplunkConfig.ProdCriblEndpoint) > 0 {\n\t\t\t\t\tsplunkClient.Initialize(GeneralConfig.CorrelationID,\n\t\t\t\t\t\tGeneralConfig.HookConfig.SplunkConfig.ProdCriblEndpoint,\n\t\t\t\t\t\tGeneralConfig.HookConfig.SplunkConfig.ProdCriblToken,\n\t\t\t\t\t\tGeneralConfig.HookConfig.SplunkConfig.ProdCriblIndex,\n\t\t\t\t\t\tGeneralConfig.HookConfig.SplunkConfig.SendLogs)\n\t\t\t\t\tsplunkClient.Send(telemetryClient.GetData(), logCollector)\n\t\t\t\t}\n\t\t\t}\n\t\t\tlog.DeferExitHandler(handler)\n\t\t\tdefer handler()\n\t\t\ttelemetryClient.Initialize(GeneralConfig.NoTelemetry, STEP_NAME)\n\t\t\tnexusUpload(stepConfig, &stepTelemetryData)\n\t\t\tstepTelemetryData.ErrorCode = \"0\"\n\t\t\tlog.Entry().Info(\"SUCCESS\")\n\t\t},\n\t}\n\n\taddNexusUploadFlags(createNexusUploadCmd, &stepConfig)\n\treturn createNexusUploadCmd\n}", "title": "" }, { "docid": "ebd1773ddcf01cab9236483cdd43a64d", "score": "0.420905", "text": "func init() {\n\tRootCmd.AddCommand(Addnewtask)\n}", "title": "" }, { "docid": "4d4269cdf9ac7142a12cea6f18a5c676", "score": "0.42081946", "text": "func (pkg *Package) Install() (err error) {\n\tvar logp = `Install`\n\n\tif pkg.vcsMode == VCSModeGit {\n\t\terr = pkg.gitInstall()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(`%s: %w`, logp, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "42cf556fe1fdc74538437ccbce425d54", "score": "0.42046195", "text": "func commandPush(chart Chart, repoUrl string) *exec.Cmd {\n\treturn exec.Command(\n\t\thelmExe, \"push\",\n\t\t\"-v\", chart.Version,\n\t\tchart.Path,\n\t\trepoUrl,\n\t)\n}", "title": "" }, { "docid": "db2e472e9fb6f66bca77e2bfe15ea0cf", "score": "0.42012584", "text": "func (inst *installCommand) Run() error {\n\tif inst.executablePath == \"\" {\n\t\tvar err error\n\t\tinst.executablePath, err = os.Executable()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"can't get executable path: %v\", err)\n\t\t}\n\t}\n\tif inst.homeDir == \"\" {\n\t\tinst.homeDir = homedir.HomeDir()\n\t}\n\toldUse := inst.rootCmd.Use\n\tinst.rootCmd.Use = pluginName\n\tdefer func() {\n\t\tinst.rootCmd.Use = oldUse\n\t}()\n\n\tpluginDir := filepath.Join(inst.homeDir, \".kube\", \"plugins\", inst.rootCmd.Name())\n\tif err := os.MkdirAll(pluginDir, 0755); err != nil {\n\t\treturn fmt.Errorf(\"MkdirAll(): %v\", err)\n\t}\n\n\tsrcPath := filepath.Clean(inst.executablePath)\n\tsrc, err := os.Open(srcPath)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"read opening virtletctl executable file %q: %v\", srcPath, err)\n\t}\n\tdefer src.Close()\n\n\tdstPath := filepath.Join(pluginDir, inst.rootCmd.Name())\n\tdst, err := os.OpenFile(dstPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0755)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error creating kubectl plugin binary file %q: %v\", dstPath, err)\n\t}\n\tdefer dst.Close()\n\tif _, err := io.Copy(dst, src); err != nil {\n\t\treturn fmt.Errorf(\"error copying virtletctl: %q -> %q: %v\", srcPath, dstPath, err)\n\t}\n\n\tpluginYaml := pluginYamlFromCobraCommand(inst.rootCmd)\n\tpluginYamlPath := filepath.Join(pluginDir, \"plugin.yaml\")\n\tif err := ioutil.WriteFile(pluginYamlPath, pluginYaml, 0644); err != nil {\n\t\treturn fmt.Errorf(\"error writing plugin.yaml: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d74c417c44669b5762b235b4b747fee1", "score": "0.4194002", "text": "func install() {\n\tif *osFile == \"\" {\n\t\tlog.Exit(\"No OS image path provided. Provide one with -os\")\n\t}\n\tif err := client.Install(ctx, *osFile, *version, *timeOut, *readChunkSize); err != nil {\n\t\tlog.Exit(\"Failed Install: \", err)\n\t}\n}", "title": "" }, { "docid": "d616d67def51cd0de6b69af536f2edd2", "score": "0.4188904", "text": "func newPackageNewCmd(fs afero.Fs, out io.Writer) *cobra.Command {\n\n\tpkg := &packageNewCmd{out: out, fs: fs}\n\tcmd := &cobra.Command{\n\t\tUse: \"new <operator name>\",\n\t\tShort: \"create new operator\",\n\t\tLong: pkgNewDesc,\n\t\tExample: pkgNewExample,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := validateOperatorArg(args); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tpkg.name = args[0]\n\t\t\tif err := pkg.run(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tf := cmd.Flags()\n\tf.BoolVarP(&pkg.interactive, \"interactive\", \"i\", false, \"Interactively create operator\")\n\tf.BoolVarP(&pkg.overwrite, \"overwrite\", \"w\", false, \"overwrite existing directory and operator.yaml file\")\n\treturn cmd\n}", "title": "" }, { "docid": "220ef702fd47c165a6db92b3ce45244f", "score": "0.4180759", "text": "func runInstall(logger *logrus.Logger, installOptions *installOptions) error {\n\tcluster, err := loadClusterConfig(installOptions.Manifest, installOptions.TerraformState, installOptions.CredentialsFilePath, logger)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to load cluster\")\n\t}\n\n\toptions, err := createInstallerOptions(installOptions.Manifest, cluster, installOptions)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to create installer options\")\n\t}\n\n\t// Validate credentials\n\t_, err = credentials.ProviderCredentials(cluster.CloudProvider.Name, installOptions.CredentialsFilePath)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to validate credentials\")\n\t}\n\n\treturn installer.NewInstaller(cluster, logger).Install(options)\n}", "title": "" }, { "docid": "842542e6c7dc5c95ba3b21590c8bb028", "score": "0.41700104", "text": "func (t *Task) executeCommand(cmd string) {\n\t// cd into the task's tempdir, execute the command, and cd back\n\tout, err := exec.Command(\"bash\", \"-c\", \"cd \"+t.TempDir()+\" && \"+cmd+\" && cd ..\").CombinedOutput()\n\tif err != nil {\n\t\tt.Failf(\"Command failed!\\nCommand:\\n%s\\n\\nOutput:\\n%s\\nOriginal error:%s\", cmd, string(out), err)\n\t}\n}", "title": "" }, { "docid": "b3c9b3a4610ff2e17c5ee33e6c5d38d2", "score": "0.4129561", "text": "func RunSetup(configFile string, target string, branch string, nodeps bool, c *cli.Context) {\n\tconfig := lib.GetProductConfig(configFile)\n\n\tsteps := config.Steps.Setup\n\n\tworkingDir, _ := filepath.Abs(target)\n\n\tif len(steps.Pre) > 0 {\n\t\tlib.Notice(\"Running 'setup:pre' commands...\\n\")\n\n\t\tlib.ExecuteStep(steps.Pre, workingDir)\n\t}\n\n\tlib.Catchy(\"Setup \\\"%s\\\" v%s\\n\", config.Name, config.Version)\n\n\tvar wg sync.WaitGroup\n\n\tif len(steps.Override) > 0 {\n\t\tlib.Warning(\"Running 'setup:override' commands... (CAUTION: This overrides hanteras core behavior!)\\n\")\n\n\t\tlib.ExecuteStep(steps.Override, workingDir)\n\t} else {\n\t\t// create and open .gitignore in target path - we put all dependencies into it\n\t\tgitignore, err := os.Create(path.Join(target, \".gitignore\"))\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tdefer gitignore.Close()\n\n\t\tfor key, value := range config.Dependencies {\n\t\t\twg.Add(1)\n\n\t\t\ttargetDir, err := filepath.Abs(path.Join(target, key))\n\t\t\tcheck(err)\n\n\t\t\tgo CloneRepository(key, targetDir, branch, value.Repository, nodeps, &wg)\n\t\t}\n\t}\n\n\twg.Wait()\n\n\tprintln(\"\")\n\n\tif nodeps == false {\n\t\tInstallDependencies(c)\n\t}\n\n\tif len(steps.Post) > 0 {\n\t\tlib.Notice(\"Running 'setup:post' commands...\\n\")\n\n\t\tlib.ExecuteStep(steps.Post, workingDir)\n\t}\n\n\tlib.Catchy(\"\\nDone with setup of %s!\\n\", config.Name)\n}", "title": "" }, { "docid": "f3e729f8d192ed718e64521957629184", "score": "0.4124827", "text": "func runTuck(args []string, opts tuckOptions) error {\n\tsourceDir := opts.sourceDir\n\ttargetDir := opts.targetDir\n\tif sourceDir == \"\" {\n\t\tcwd, err := os.Getwd()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsourceDir = cwd\n\t}\n\tif targetDir == \"\" {\n\t\ttargetDir = filepath.Clean(filepath.Join(sourceDir, \"../\"))\n\t}\n\tmode := process.TuckMode\n\tif opts.delete {\n\t\tmode = process.UntuckMode\n\t}\n\treturn process.Install(process.Config{\n\t\tSource: sourceDir,\n\t\tTarget: targetDir,\n\t\tModules: args,\n\t\tMode: mode,\n\t})\n}", "title": "" }, { "docid": "7bb169421be9fc4ba17eea802299c278", "score": "0.41197264", "text": "func (c *Client) Install(targets []string) error {\n\treturn cmd.Install(c.Backend, targets)\n}", "title": "" }, { "docid": "eaefab17da632b65d436365ffc1ff566", "score": "0.41122174", "text": "func NewAddImageCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"add-image\",\n\t\tShort: \"Add image to bundle\",\n\t}\n\n\tsetupAddImage(cmd)\n\treturn cmd\n}", "title": "" }, { "docid": "ad022287e8c3021184aadc4cd9f780ed", "score": "0.410955", "text": "func (repo *Repo) ExecCommand(name string, arg ...string) (string, error) {\n\tcmd := exec.Command(name, arg...)\n\tcmd.Dir = repo.Root\n\toutput, err := cmd.Output()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn strings.TrimSpace(string(output)), nil\n}", "title": "" }, { "docid": "9a10794d35f3f177f8b87b2847e9b55c", "score": "0.4108832", "text": "func NewCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: `inizio`,\n\t\tShort: `Golang boilerplate project generator`,\n\t\tSilenceErrors: true,\n\t\tSilenceUsage: true,\n\t\tArgs: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := cobra.ExactArgs(1)(cmd, args); err != nil {\n\t\t\t\treturn errors.New(`working directory argument is required`)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tlogger.GetLogger().Infoln(`Initialize backend...`)\n\t\t\tc, cleanup, err := newCore(cmd.Context(), cmd.Flags())\n\t\t\tif cleanup != nil {\n\t\t\t\tdefer cleanup()\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, `failed to bootstrap backend`)\n\t\t\t}\n\t\t\tlogger.GetLogger().Infoln(`Initialize user survey...`)\n\t\t\tdirectory, err := provideWorkingDirectory(args)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, `failed to bootstrap survey`)\n\t\t\t}\n\t\t\toptions, values, err := survey.Ask(directory)\n\t\t\tif err != nil {\n\t\t\t\tif !errors.Is(err, terminal.InterruptErr) {\n\t\t\t\t\treturn errors.Wrap(err, `failed to handle user survey`)\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tif err = c.Run(cmd.Context(), options, values); err != nil {\n\t\t\t\treturn errors.Wrap(err, `failed to generate project`)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\tcmd.Flags().String(`plugins.path`, `/usr/local/bin/inizio-plugins`, `path to plugins directory`)\n\tcmd.Flags().String(`plugins.config`, ``, `path to plugins config yaml file`)\n\tcmd.Flags().Bool(`plugins.fail-fast`, false, `stop after first plugin failure`)\n\tcmd.Flags().Bool(`layout.cleanup`, false, `cleanup working directory before generation`)\n\tcmd.Flags().String(`layout.template.dockerfile`, ``, fmt.Sprintf(`path to custom Dockerfile template (must have \"%s\" extension)`, layout.Extension))\n\tcmd.Flags().String(`layout.template.makefile`, ``, fmt.Sprintf(`path to custom Makefile template (must have \"%s\" extension)`, layout.Extension))\n\tcmd.Flags().String(`logger.level`, logrus.InfoLevel.String(), `log level`)\n\treturn cmd\n}", "title": "" }, { "docid": "ece11c1a9c5ef1f0312c8b28b4f76ac7", "score": "0.41066504", "text": "func validateCommandInstalled(t *testing.T, command string) {\n\t_, err := exec.LookPath(command)\n\tif err != nil {\n\t\tt.Fatalf(\"Command '%s' not found in PATH\", command)\n\t}\n}", "title": "" }, { "docid": "65df5d3fb41cd3a87354313287770339", "score": "0.4105496", "text": "func containerCommandFor(dbPath string, items []BundleItem, hasCA, skipTLSVerify bool, useHTTP bool) string { //nolint:unparam\n\tvar caFlag string\n\tif hasCA {\n\t\tcaFlag = \" --ca-file=/certs/cert.pem\"\n\t}\n\tadditions := &strings.Builder{}\n\tfor _, item := range items {\n\t\tadditions.WriteString(fmt.Sprintf(\"opm registry add -d /tmp/tmp.db -b %s --mode=%s%s --skip-tls-verify=%v --use-http=%v && \\\\\\n\", item.ImageTag, item.AddMode, caFlag, skipTLSVerify, useHTTP))\n\t}\n\n\treturn fmt.Sprintf(\"[[ -f %s ]] && cp %s /tmp/tmp.db; \\\\\\n%sopm registry serve -d /tmp/tmp.db -p 50051\\n\", dbPath, dbPath, additions.String())\n}", "title": "" }, { "docid": "549701b9cad3e84b563058a8953731a6", "score": "0.410405", "text": "func CreateCommand(cli *cli.SensuCli) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse:\t\t\"create [NAME] --cluster-role=NAME [--user=username] [--group=groupname]\",\n\t\tShort:\t\t\"create a new cluster role binding for a particular cluster role\",\n\t\tSilenceUsage:\ttrue,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := helpers.VerifyName(args); err != nil {\n\t\t\t\t_ = cmd.Help()\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tclusterRoleBinding := &v2.ClusterRoleBinding{\n\t\t\t\tObjectMeta: v2.ObjectMeta{\n\t\t\t\t\tName: args[0],\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tclusterRole, err := cmd.Flags().GetString(\"cluster-role\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif clusterRole == \"\" {\n\t\t\t\treturn errors.New(\"a ClusterRole must be provided\")\n\t\t\t}\n\t\t\tclusterRoleBinding.RoleRef = v2.RoleRef{\n\t\t\t\tType:\t\"ClusterRole\",\n\t\t\t\tName:\tclusterRole,\n\t\t\t}\n\n\t\t\tgroups, err := cmd.Flags().GetStringSlice(\"group\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tusers, err := cmd.Flags().GetStringSlice(\"user\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif len(groups) == 0 && len(users) == 0 {\n\t\t\t\treturn errors.New(\"at least one group or user must be provided\")\n\t\t\t}\n\n\t\t\t// Create our subjects list\n\t\t\tfor _, group := range groups {\n\t\t\t\tclusterRoleBinding.Subjects = append(clusterRoleBinding.Subjects,\n\t\t\t\t\tv2.Subject{\n\t\t\t\t\t\tType:\t\"Group\",\n\t\t\t\t\t\tName:\tgroup,\n\t\t\t\t\t},\n\t\t\t\t)\n\t\t\t}\n\t\t\tfor _, user := range users {\n\t\t\t\tclusterRoleBinding.Subjects = append(clusterRoleBinding.Subjects,\n\t\t\t\t\tv2.Subject{\n\t\t\t\t\t\tType:\t\"User\",\n\t\t\t\t\t\tName:\tuser,\n\t\t\t\t\t},\n\t\t\t\t)\n\t\t\t}\n\n\t\t\t// Assign the rule to our role and valiate it\n\t\t\tif err := clusterRoleBinding.Validate(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif err := cli.Client.CreateClusterRoleBinding(clusterRoleBinding); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\t_, err = fmt.Fprintln(cmd.OutOrStdout(), \"Created\")\n\t\t\treturn err\n\t\t},\n\t}\n\n\t_ = cmd.Flags().StringP(\"cluster-role\", \"c\", \"\",\n\t\t\"the cluster role this cluster role binding should reference\",\n\t)\n\t_ = cmd.Flags().StringSliceP(\"group\", \"g\", []string{},\n\t\t\"groups to bind to the cluster role\",\n\t)\n\t_ = cmd.Flags().StringSliceP(\"user\", \"u\", []string{},\n\t\t\"users to bind to the cluster role\",\n\t)\n\n\treturn cmd\n}", "title": "" }, { "docid": "8c96d71857d73d5a7284c989681b6a07", "score": "0.41031614", "text": "func (c *InstallClient) Install(cmd *cobra.Command, options *kubernetes.InstallationOptions) error {\n\tlog := c.Log.WithName(\"Install\")\n\tlog.Info(\"start\")\n\tdefer log.Info(\"return\")\n\tdetails := log.V(1) // NOTE: Increment of level, not absolute.\n\n\tc.ui.Note().Msg(\"FuseML installing...\")\n\n\tvar err error\n\tdetails.Info(\"process cli options\")\n\toptions, err = options.Populate(kubernetes.NewCLIOptionsReader(cmd))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tinteractive, err := cmd.Flags().GetBool(\"interactive\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif interactive {\n\t\tdetails.Info(\"query user for options\")\n\t\toptions, err = options.Populate(kubernetes.NewInteractiveOptionsReader(os.Stdout, os.Stdin))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tdetails.Info(\"fill defaults into options\")\n\t\toptions, err = options.Populate(kubernetes.NewDefaultOptionsReader())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tdetails.Info(\"show option configuration\")\n\tc.showInstallConfiguration(options)\n\n\t// TODO (post MVP): Run a validation phase which perform\n\t// additional checks on the values. For example range limits,\n\t// proper syntax of the string, etc. do it as pghase, and late\n\t// to report all problems at once, instead of early and\n\t// piecemal.\n\n\tdeployment := deployments.Istio{Timeout: DefaultTimeoutSec}\n\n\tdetails.Info(\"deploy\", \"Deployment\", deployment.ID())\n\terr = deployment.Deploy(c.kubeClient, c.ui, options.ForDeployment(deployment.ID()))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Try to give a nip.io domain if the user didn't specify one\n\tdomain, err := options.GetOpt(\"system_domain\", \"\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdetails.Info(\"ensure system-domain\")\n\terr = c.fillInMissingSystemDomain(domain)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif domain.Value.(string) == \"\" {\n\t\treturn errors.New(\"You didn't provide a system_domain and we were unable to setup a nip.io domain (couldn't find an ExternalIP)\")\n\t}\n\tif c.kubeClient.HasKnative() {\n\t\terr = c.setDomainForKnative(domain.Value.(string))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tc.ui.Success().Msg(\"Created system_domain: \" + domain.Value.(string))\n\n\tfor _, deployment := range []kubernetes.Deployment{\n\t\t&deployments.Workloads{Timeout: DefaultTimeoutSec},\n\t\t&deployments.Gitea{Timeout: DefaultTimeoutSec},\n\t\t&deployments.Registry{Timeout: DefaultTimeoutSec},\n\t\t&deployments.Tekton{Timeout: DefaultTimeoutSec},\n\t\t&deployments.Core{Timeout: DefaultTimeoutSec},\n\t} {\n\t\tdetails.Info(\"deploy\", \"Deployment\", deployment.ID())\n\n\t\terr := deployment.Deploy(c.kubeClient, c.ui, options.ForDeployment(deployment.ID()))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif err := downloadFuseMLCLI(c.ui, domain.Value.(string)); err != nil {\n\t\treturn err\n\t}\n\n\textensions, err := options.GetOpt(\"extensions\", \"\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tdetails.Info(\"installing extensions\")\n\tif err := c.handleExtensions(\"install\", extensions.Value.([]string), options, true); err != nil {\n\t\treturn err\n\t}\n\n\tc.ui.Success().WithStringValue(\"System domain\", domain.Value.(string)).Msg(\"FuseML installed.\")\n\n\treturn nil\n}", "title": "" }, { "docid": "241c75bfb1618da7355289efd67f8100", "score": "0.4100996", "text": "func (prg *Program) Install(vsrc VertSrc, fsrc FragSrc) error {\n\tif err := prg.Build(vsrc, fsrc); err != nil {\n\t\treturn err\n\t}\n\tprg.Use()\n\treturn nil\n}", "title": "" }, { "docid": "ef0bc1f7f54ddec077187de31fb6a16f", "score": "0.4098838", "text": "func (a RepositoryManagementAPI) CreateNPMProxy(r NPMProxyRepository) error {\n\tpath := fmt.Sprintf(\"beta/repositories/npm/proxy\")\n\n\tb := new(bytes.Buffer)\n\tjson.NewEncoder(b).Encode(r)\n\n\t_, err := a.client.sendRequest(http.MethodPost, path, b, nil)\n\treturn err\n}", "title": "" }, { "docid": "94a80b8fb6733dff5b8afcd8da2830b0", "score": "0.40947467", "text": "func SetupMakepkgDirectories(container container.Container) error {\n\terr := container.Exec(\"install -o builduser install -d {build,startdir,{pkg,srcpkg,src,log}dest}\")\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7d89e4e2076f7df087dbddebd0ea7b47", "score": "0.40943983", "text": "func Install(packs ...*Package) (output []byte, err error) {\n\targs := []string{\"install\", \"-y\"}\n\tfor _, pack := range packs {\n\t\tif pack == nil || pack.Name == \"\" {\n\t\t\treturn nil, fmt.Errorf(\"apt.Install: Invalid package with empty Name\")\n\t\t}\n\t\targs = append(args, pack.Name)\n\t}\n\tcmd := exec.Command(\"apt-get\", args...)\n\treturn cmd.CombinedOutput()\n}", "title": "" }, { "docid": "3e2931d800c43c56bd27cd778770fb8b", "score": "0.40926582", "text": "func AddPackageJSONScripts(r *Runner) error {\n\tif !r.App.WithWebpack {\n\t\treturn nil\n\t}\n\tfmt.Println(\"~~~ Patching package.json to add dev and build scripts ~~~\")\n\n\tb, err := ioutil.ReadFile(\"package.json\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tneedRewrite := false\n\tpackageJSON := map[string]interface{}{}\n\tif err := json.Unmarshal(b, &packageJSON); err != nil {\n\t\treturn fmt.Errorf(\"could not rewrite package.json: %s\", err.Error())\n\t}\n\n\tif _, ok := packageJSON[\"scripts\"]; !ok {\n\t\tneedRewrite = true\n\t\t// Add scripts\n\t\tpackageJSON[\"scripts\"] = map[string]string{\n\t\t\t\"dev\": \"webpack --watch\",\n\t\t\t\"build\": \"webpack -p --progress\",\n\t\t}\n\t} else {\n\t\t// Add missing scripts\n\t\tscripts, ok := packageJSON[\"scripts\"].(map[string]interface{})\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"could not rewrite package.json: invalid scripts section\")\n\t\t}\n\t\tif _, ok := scripts[\"dev\"]; !ok {\n\t\t\tneedRewrite = true\n\t\t\tscripts[\"dev\"] = \"webpack --watch\"\n\t\t}\n\t\tif _, ok := scripts[\"build\"]; !ok {\n\t\t\tneedRewrite = true\n\t\t\tscripts[\"build\"] = \"webpack -p --progress\"\n\t\t}\n\t\tpackageJSON[\"scripts\"] = scripts\n\t}\n\n\tif needRewrite {\n\t\tb, err = json.MarshalIndent(packageJSON, \"\", \" \")\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"could not rewrite package.json: %s\", err.Error())\n\t\t}\n\n\t\tioutil.WriteFile(\"package.json\", b, 644)\n\t} else {\n\t\tfmt.Println(\"~~~ package.json doesn't need to be patched, skipping. ~~~\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "36f632886000ce84e29c5033bb323772", "score": "0.40923598", "text": "func executeRpmCommand(program string, args ...string) (results []string, err error) {\n\tstdout, stderr, err := shell.Execute(program, args...)\n\tif err != nil {\n\t\t// When dealing with a SPEC/package intended for a different architecture, explicitly set the error message\n\t\t// to a known value so the invoker can check for it.\n\t\t//\n\t\t// All other errors will be treated normally.\n\t\tif strings.Contains(stderr, NoCompatibleArchError) {\n\t\t\tlogger.Log.Debug(stderr)\n\t\t\terr = fmt.Errorf(NoCompatibleArchError)\n\t\t} else {\n\t\t\tlogger.Log.Warn(stderr)\n\t\t}\n\n\t\treturn\n\t}\n\n\tresults = sanitizeOutput(stdout)\n\treturn\n}", "title": "" }, { "docid": "a3c4fbf60950235a79d1cf046455c945", "score": "0.40882647", "text": "func GoInstall(path ...string) error {\n\tfor _, p := range path {\n\t\tfmt.Printf(\"go get -u %s\\n\", p)\n\t\tcmd := exec.Command(\"go\", \"get\", \"-u\", p)\n\t\tcmd.Stdout = os.Stdout\n\t\tcmd.Stderr = os.Stderr\n\t\tif err := cmd.Run(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "acd3fd7f816d8016adcbb16a2e2daf7e", "score": "0.40878478", "text": "func (p *Plugin) runUpgradeCommand(args []string, extra *model.CommandArgs) (*model.CommandResponse, bool, error) {\n\tif len(args) == 0 || len(args[0]) == 0 {\n\t\treturn nil, true, errors.Errorf(\"must provide an installation name\")\n\t}\n\n\tname := standardizeName(args[0])\n\n\tinstalls, _, err := p.getInstallations()\n\tif err != nil {\n\t\treturn nil, false, err\n\t}\n\n\tvar installToUpgrade *Installation\n\tfor _, install := range installs {\n\t\tif install.OwnerID == extra.UserId && install.Name == name {\n\t\t\tinstallToUpgrade = install\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif installToUpgrade == nil {\n\t\treturn nil, true, errors.Errorf(\"no installation with the name %s found\", name)\n\t}\n\n\trequest, err := buildPatchInstallationRequestFromArgs(args)\n\tif err != nil {\n\t\treturn nil, true, err\n\t}\n\n\tif request.Version != nil || request.Image != nil {\n\t\tdockerTag := installToUpgrade.Version\n\t\tdockerRepository := installToUpgrade.Image\n\n\t\tif request.Version != nil {\n\t\t\tdockerTag = *request.Version\n\t\t}\n\t\tif request.Image != nil {\n\t\t\tdockerRepository = *request.Image\n\t\t}\n\t\t// Check that new version exists.\n\t\tvar exists bool\n\t\texists, err = p.dockerClient.ValidTag(dockerTag, dockerRepository)\n\t\tif err != nil {\n\t\t\tp.API.LogError(errors.Wrapf(err, \"unable to check if %s:%s exists\", dockerRepository, dockerTag).Error())\n\t\t}\n\t\tif !exists {\n\t\t\treturn nil, true, errors.Errorf(\"%s is not a valid docker tag for repository %s\", dockerTag, dockerRepository)\n\t\t}\n\t\tvar digest string\n\t\tdigest, err = p.dockerClient.GetDigestForTag(dockerTag, dockerRepository)\n\t\tif err != nil {\n\t\t\treturn nil, false, errors.Wrapf(err, \"failed to find a manifest digest for version %s\", dockerTag)\n\t\t}\n\t\tinstallToUpgrade.Tag = dockerTag\n\t\trequest.Version = &digest\n\t}\n\n\t// Obtain the new image value if there is one to properly apply a license.\n\timage := installToUpgrade.Image\n\tif request.Image != nil {\n\t\timage = *request.Image\n\t}\n\tif request.License != nil {\n\t\t// Translate the license option.\n\t\tlicenseValue := p.getLicenseValue(*request.License, image)\n\t\trequest.License = &licenseValue\n\t}\n\n\t_, err = p.cloudClient.UpdateInstallation(installToUpgrade.ID, request)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"failed to update installation\")\n\t}\n\n\terr = p.updateInstallation(installToUpgrade)\n\tif err != nil {\n\t\treturn nil, false, errors.Wrap(err, \"failed to store updated installation metadata\")\n\t}\n\n\treturn getCommandResponse(model.CommandResponseTypeEphemeral, fmt.Sprintf(\"Upgrade of installation %s has begun. You will receive a notification when it is ready. Use /cloud list to check on the status of your installations.\", name), extra), false, nil\n}", "title": "" }, { "docid": "52494126649a495277ac369a3e1d092b", "score": "0.4084271", "text": "func Install(name string, opts ...manifest.CfgFn) feature.StepFn {\n\n\treturn pod.Install(name, \"gcr.io/knative-samples/helloworld-go\",\n\t\tpod.WithLabels(map[string]string{\"app\": name}),\n\t\tpod.WithPort(8080))\n}", "title": "" }, { "docid": "c3c680c727b4091f00466e8e95d5b278", "score": "0.40830374", "text": "func InstallPackage(p XPackage, v string, prefix string) error {\n\tvsc := p.GetCurrentVersion(prefix)\n\tvs, err := p.GetRemoteVersion(v)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif vsc == vs {\n\t\tfmt.Println(\"The package is up to date.\")\n\t\treturn nil\n\t}\n\tfmt.Printf(\"Installing version %s\\n\", vs)\n\tos.RemoveAll(prefix)\n\terr = os.MkdirAll(prefix, 0755)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = p.UpdateFiles(prefix)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e5c2c632e6e32a29b30d828d819f909e", "score": "0.4082516", "text": "func (c *Cli) AddCommand(n string) *Command {\n\tcmd := NewCommand(n)\n\tc.cmds[n] = cmd\n\tcmd.setPreRun(func(c *cobra.Command, args []string) {\n\t\tif cmd.RunTask.init != nil {\n\t\t\tcmd.RunTask.init(cmd.RunTask, args)\n\t\t}\n\t})\n\tcmd.setRun(func(c *cobra.Command, args []string) {\n\t\tcmd.RunTask.f(cmd.RunTask, args)\n\t})\n\tc.cobra.AddCommand(cmd.cobra)\n\treturn cmd\n}", "title": "" }, { "docid": "2e4d0893c520b647d1fc781438029b2a", "score": "0.40812182", "text": "func addCommand(name string, aliases []string, requiredArgs int, usage string, handler cmdHandler, devOnly bool) {\n\tcmd := Command {\n\t\tname: name,\n\t\taliases: aliases,\n\t\trequiredArgs: requiredArgs,\n\t\tusage: usage,\n\t\thandler: handler,\n\t\tdev: devOnly}\n\n\tcommandMap[name] = cmd\n}", "title": "" }, { "docid": "00e20e35718507302b630ae0193f7a2b", "score": "0.4080917", "text": "func initEnvForCreateIdentityProviderCmd(cmd *cobra.Command, args []string) {\n\tif CreateIdentityProviderOpts.TargetDir == \"\" {\n\t\tpwd, err := os.Getwd()\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Failed to get current directory: %s\", err)\n\t\t}\n\n\t\tCreateIdentityProviderOpts.TargetDir = pwd\n\t}\n\n\tfPath, err := filepath.Abs(CreateIdentityProviderOpts.TargetDir)\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to resolve full path: %s\", err)\n\t}\n\n\t// create target dir if necessary\n\terr = provisioning.EnsureDir(fPath)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create target directory at %s\", fPath)\n\t}\n\n\t// create manifests dir if necessary\n\tmanifestsDir := filepath.Join(fPath, provisioning.ManifestsDirName)\n\terr = provisioning.EnsureDir(manifestsDir)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create manifests directory at %s\", manifestsDir)\n\t}\n}", "title": "" } ]
90e69646c294fc11a0cba602fb3de1c0
Deprecated: Use FirstContactRequestPayload.ProtoReflect.Descriptor instead.
[ { "docid": "07cc7bfe357bf0391bc3e75a7dca2e84", "score": "0.73831993", "text": "func (*FirstContactRequestPayload) Descriptor() ([]byte, []int) {\n\treturn file_api_egginc_proto_rawDescGZIP(), []int{1}\n}", "title": "" } ]
[ { "docid": "e548dba62f975f8c2308bbb2e6256db1", "score": "0.7024961", "text": "func (*FirstContact_Payload) Descriptor() ([]byte, []int) {\n\treturn file_api_egginc_proto_rawDescGZIP(), []int{3, 0}\n}", "title": "" }, { "docid": "37254a13c594d53c04525932aa829a41", "score": "0.68943983", "text": "func (*LocateContactRequest) Descriptor() ([]byte, []int) {\n\treturn file_contacts_contacts_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "115689cd1164c6225dc73442c7159dcf", "score": "0.68473476", "text": "func (*InputContactRequest) Descriptor() ([]byte, []int) {\n\treturn file_contacts_contacts_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "a1931ad892a969ce62e8f6f1d3fa75b5", "score": "0.67953837", "text": "func (x *fastReflection_MsgRequest) Get(descriptor protoreflect.FieldDescriptor) protoreflect.Value {\n\tswitch descriptor.FullName() {\n\tcase \"testpb.MsgRequest.u32\":\n\t\tvalue := x.U32\n\t\treturn protoreflect.ValueOfUint32(value)\n\tcase \"testpb.MsgRequest.u64\":\n\t\tvalue := x.U64\n\t\treturn protoreflect.ValueOfUint64(value)\n\tcase \"testpb.MsgRequest.str\":\n\t\tvalue := x.Str\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"testpb.MsgRequest.bz\":\n\t\tvalue := x.Bz\n\t\treturn protoreflect.ValueOfBytes(value)\n\tcase \"testpb.MsgRequest.timestamp\":\n\t\tvalue := x.Timestamp\n\t\treturn protoreflect.ValueOfMessage(value.ProtoReflect())\n\tcase \"testpb.MsgRequest.duration\":\n\t\tvalue := x.Duration\n\t\treturn protoreflect.ValueOfMessage(value.ProtoReflect())\n\tcase \"testpb.MsgRequest.i32\":\n\t\tvalue := x.I32\n\t\treturn protoreflect.ValueOfInt32(value)\n\tcase \"testpb.MsgRequest.i64\":\n\t\tvalue := x.I64\n\t\treturn protoreflect.ValueOfInt64(value)\n\tcase \"testpb.MsgRequest.a_bool\":\n\t\tvalue := x.ABool\n\t\treturn protoreflect.ValueOfBool(value)\n\tcase \"testpb.MsgRequest.an_enum\":\n\t\tvalue := x.AnEnum\n\t\treturn protoreflect.ValueOfEnum((protoreflect.EnumNumber)(value))\n\tcase \"testpb.MsgRequest.a_message\":\n\t\tvalue := x.AMessage\n\t\treturn protoreflect.ValueOfMessage(value.ProtoReflect())\n\tcase \"testpb.MsgRequest.a_coin\":\n\t\tvalue := x.ACoin\n\t\treturn protoreflect.ValueOfMessage(value.ProtoReflect())\n\tcase \"testpb.MsgRequest.an_address\":\n\t\tvalue := x.AnAddress\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"testpb.MsgRequest.page\":\n\t\tvalue := x.Page\n\t\treturn protoreflect.ValueOfMessage(value.ProtoReflect())\n\tcase \"testpb.MsgRequest.bools\":\n\t\tif len(x.Bools) == 0 {\n\t\t\treturn protoreflect.ValueOfList(&_MsgRequest_21_list{})\n\t\t}\n\t\tlistValue := &_MsgRequest_21_list{list: &x.Bools}\n\t\treturn protoreflect.ValueOfList(listValue)\n\tcase \"testpb.MsgRequest.uints\":\n\t\tif len(x.Uints) == 0 {\n\t\t\treturn protoreflect.ValueOfList(&_MsgRequest_22_list{})\n\t\t}\n\t\tlistValue := &_MsgRequest_22_list{list: &x.Uints}\n\t\treturn protoreflect.ValueOfList(listValue)\n\tcase \"testpb.MsgRequest.strings\":\n\t\tif len(x.Strings) == 0 {\n\t\t\treturn protoreflect.ValueOfList(&_MsgRequest_23_list{})\n\t\t}\n\t\tlistValue := &_MsgRequest_23_list{list: &x.Strings}\n\t\treturn protoreflect.ValueOfList(listValue)\n\tcase \"testpb.MsgRequest.enums\":\n\t\tif len(x.Enums) == 0 {\n\t\t\treturn protoreflect.ValueOfList(&_MsgRequest_24_list{})\n\t\t}\n\t\tlistValue := &_MsgRequest_24_list{list: &x.Enums}\n\t\treturn protoreflect.ValueOfList(listValue)\n\tcase \"testpb.MsgRequest.durations\":\n\t\tif len(x.Durations) == 0 {\n\t\t\treturn protoreflect.ValueOfList(&_MsgRequest_25_list{})\n\t\t}\n\t\tlistValue := &_MsgRequest_25_list{list: &x.Durations}\n\t\treturn protoreflect.ValueOfList(listValue)\n\tcase \"testpb.MsgRequest.some_messages\":\n\t\tif len(x.SomeMessages) == 0 {\n\t\t\treturn protoreflect.ValueOfList(&_MsgRequest_26_list{})\n\t\t}\n\t\tlistValue := &_MsgRequest_26_list{list: &x.SomeMessages}\n\t\treturn protoreflect.ValueOfList(listValue)\n\tcase \"testpb.MsgRequest.positional1\":\n\t\tvalue := x.Positional1\n\t\treturn protoreflect.ValueOfInt32(value)\n\tcase \"testpb.MsgRequest.positional2\":\n\t\tvalue := x.Positional2\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"testpb.MsgRequest.positional3_varargs\":\n\t\tif len(x.Positional3Varargs) == 0 {\n\t\t\treturn protoreflect.ValueOfList(&_MsgRequest_29_list{})\n\t\t}\n\t\tlistValue := &_MsgRequest_29_list{list: &x.Positional3Varargs}\n\t\treturn protoreflect.ValueOfList(listValue)\n\tcase \"testpb.MsgRequest.deprecated_field\":\n\t\tvalue := x.DeprecatedField\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"testpb.MsgRequest.shorthand_deprecated_field\":\n\t\tvalue := x.ShorthandDeprecatedField\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"testpb.MsgRequest.hidden_bool\":\n\t\tvalue := x.HiddenBool\n\t\treturn protoreflect.ValueOfBool(value)\n\tcase \"testpb.MsgRequest.a_validator_address\":\n\t\tvalue := x.AValidatorAddress\n\t\treturn protoreflect.ValueOfString(value)\n\tdefault:\n\t\tif descriptor.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: testpb.MsgRequest\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message testpb.MsgRequest does not contain field %s\", descriptor.FullName()))\n\t}\n}", "title": "" }, { "docid": "6aa6e5203616f55b80eb701718fad691", "score": "0.6744184", "text": "func (x *fastReflection_MsgRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_MsgRequest\n}", "title": "" }, { "docid": "141cd838948697a6eefc181e7d3be505", "score": "0.67137074", "text": "func (*InputContactsRequest) Descriptor() ([]byte, []int) {\n\treturn file_contacts_contacts_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "95741d6dc3a8fbb9ad2c3c48c259d8c2", "score": "0.66790634", "text": "func (*DeleteContactRequest) Descriptor() ([]byte, []int) {\n\treturn file_contacts_contacts_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "e20ab4400fb71b2744a089add406e66f", "score": "0.6677908", "text": "func (*CreateContactsRequest) Descriptor() ([]byte, []int) {\n\treturn file_contacts_contacts_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "9a6b76c61e07cfbc868f81f113a6a0c8", "score": "0.6674462", "text": "func (*LastContactRequest) Descriptor() ([]byte, []int) {\n\treturn file_raftadmin_proto_rawDescGZIP(), []int{12}\n}", "title": "" }, { "docid": "8ae9163a693ef5e12ffb35be1caa4deb", "score": "0.66225475", "text": "func (x *fastReflection_MsgRequest) Mutable(fd protoreflect.FieldDescriptor) protoreflect.Value {\n\tswitch fd.FullName() {\n\tcase \"testpb.MsgRequest.timestamp\":\n\t\tif x.Timestamp == nil {\n\t\t\tx.Timestamp = new(timestamppb.Timestamp)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.Timestamp.ProtoReflect())\n\tcase \"testpb.MsgRequest.duration\":\n\t\tif x.Duration == nil {\n\t\t\tx.Duration = new(durationpb.Duration)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.Duration.ProtoReflect())\n\tcase \"testpb.MsgRequest.a_message\":\n\t\tif x.AMessage == nil {\n\t\t\tx.AMessage = new(AMessage)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.AMessage.ProtoReflect())\n\tcase \"testpb.MsgRequest.a_coin\":\n\t\tif x.ACoin == nil {\n\t\t\tx.ACoin = new(v1beta1.Coin)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.ACoin.ProtoReflect())\n\tcase \"testpb.MsgRequest.page\":\n\t\tif x.Page == nil {\n\t\t\tx.Page = new(v1beta11.PageRequest)\n\t\t}\n\t\treturn protoreflect.ValueOfMessage(x.Page.ProtoReflect())\n\tcase \"testpb.MsgRequest.bools\":\n\t\tif x.Bools == nil {\n\t\t\tx.Bools = []bool{}\n\t\t}\n\t\tvalue := &_MsgRequest_21_list{list: &x.Bools}\n\t\treturn protoreflect.ValueOfList(value)\n\tcase \"testpb.MsgRequest.uints\":\n\t\tif x.Uints == nil {\n\t\t\tx.Uints = []uint32{}\n\t\t}\n\t\tvalue := &_MsgRequest_22_list{list: &x.Uints}\n\t\treturn protoreflect.ValueOfList(value)\n\tcase \"testpb.MsgRequest.strings\":\n\t\tif x.Strings == nil {\n\t\t\tx.Strings = []string{}\n\t\t}\n\t\tvalue := &_MsgRequest_23_list{list: &x.Strings}\n\t\treturn protoreflect.ValueOfList(value)\n\tcase \"testpb.MsgRequest.enums\":\n\t\tif x.Enums == nil {\n\t\t\tx.Enums = []Enum{}\n\t\t}\n\t\tvalue := &_MsgRequest_24_list{list: &x.Enums}\n\t\treturn protoreflect.ValueOfList(value)\n\tcase \"testpb.MsgRequest.durations\":\n\t\tif x.Durations == nil {\n\t\t\tx.Durations = []*durationpb.Duration{}\n\t\t}\n\t\tvalue := &_MsgRequest_25_list{list: &x.Durations}\n\t\treturn protoreflect.ValueOfList(value)\n\tcase \"testpb.MsgRequest.some_messages\":\n\t\tif x.SomeMessages == nil {\n\t\t\tx.SomeMessages = []*AMessage{}\n\t\t}\n\t\tvalue := &_MsgRequest_26_list{list: &x.SomeMessages}\n\t\treturn protoreflect.ValueOfList(value)\n\tcase \"testpb.MsgRequest.positional3_varargs\":\n\t\tif x.Positional3Varargs == nil {\n\t\t\tx.Positional3Varargs = []*v1beta1.Coin{}\n\t\t}\n\t\tvalue := &_MsgRequest_29_list{list: &x.Positional3Varargs}\n\t\treturn protoreflect.ValueOfList(value)\n\tcase \"testpb.MsgRequest.u32\":\n\t\tpanic(fmt.Errorf(\"field u32 of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.u64\":\n\t\tpanic(fmt.Errorf(\"field u64 of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.str\":\n\t\tpanic(fmt.Errorf(\"field str of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.bz\":\n\t\tpanic(fmt.Errorf(\"field bz of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.i32\":\n\t\tpanic(fmt.Errorf(\"field i32 of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.i64\":\n\t\tpanic(fmt.Errorf(\"field i64 of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.a_bool\":\n\t\tpanic(fmt.Errorf(\"field a_bool of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.an_enum\":\n\t\tpanic(fmt.Errorf(\"field an_enum of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.an_address\":\n\t\tpanic(fmt.Errorf(\"field an_address of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.positional1\":\n\t\tpanic(fmt.Errorf(\"field positional1 of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.positional2\":\n\t\tpanic(fmt.Errorf(\"field positional2 of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.deprecated_field\":\n\t\tpanic(fmt.Errorf(\"field deprecated_field of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.shorthand_deprecated_field\":\n\t\tpanic(fmt.Errorf(\"field shorthand_deprecated_field of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.hidden_bool\":\n\t\tpanic(fmt.Errorf(\"field hidden_bool of message testpb.MsgRequest is not mutable\"))\n\tcase \"testpb.MsgRequest.a_validator_address\":\n\t\tpanic(fmt.Errorf(\"field a_validator_address of message testpb.MsgRequest is not mutable\"))\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: testpb.MsgRequest\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message testpb.MsgRequest does not contain field %s\", fd.FullName()))\n\t}\n}", "title": "" }, { "docid": "d39456eb093e37f14898344ce6f58fcd", "score": "0.66166425", "text": "func (*FirstContact) Descriptor() ([]byte, []int) {\n\treturn file_api_egginc_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "cc887c1a7a9851979fa19d3d89543683", "score": "0.6594964", "text": "func (*DeleteContactsRequest) Descriptor() ([]byte, []int) {\n\treturn file_contacts_contacts_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "cd50c1f7e159024e776d802bdd7ddd91", "score": "0.64847267", "text": "func (*CMsgDOTAFantasyMessagesRequest) Descriptor() ([]byte, []int) {\n\treturn file_dota2_dota_gcmessages_client_fantasy_proto_rawDescGZIP(), []int{53}\n}", "title": "" }, { "docid": "eda4246760161c8752dd6941e1cbff9a", "score": "0.6430412", "text": "func (*SearchContactsRequest) Descriptor() ([]byte, []int) {\n\treturn file_contacts_contacts_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "e722062f802c10cbbae5195304bb136a", "score": "0.6416732", "text": "func (*WrappedContactData) Descriptor() ([]byte, []int) {\n\treturn file_fleetspeak_src_common_proto_fleetspeak_common_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "ff442438757236dbae5d85199a11051a", "score": "0.6410621", "text": "func (x *fastReflection_QuerySigningInfoRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QuerySigningInfoRequest\n}", "title": "" }, { "docid": "e64b69ad2c83343dc321e2e8abaf18c0", "score": "0.6410387", "text": "func (*ServiceRequest) Descriptor() ([]byte, []int) {\n\treturn file_feg_protos_csfb_proto_rawDescGZIP(), []int{16}\n}", "title": "" }, { "docid": "19dd331952761c24433ba0f6cd44c4ba", "score": "0.64076924", "text": "func (x *fastReflection_QuerySigningInfosRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QuerySigningInfosRequest\n}", "title": "" }, { "docid": "5693f3c3d3ad66a11bfbf7966f9b3f85", "score": "0.6374199", "text": "func (*HelloRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_v1_proto_message_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "b4e1a22b81003b34afda96191d9dfe52", "score": "0.6329421", "text": "func (x *fastReflection_QueryValidatorRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QueryValidatorRequest\n}", "title": "" }, { "docid": "07dc82bd570f231ce338b712badc5c7d", "score": "0.6314802", "text": "func (*ContactData) Descriptor() ([]byte, []int) {\n\treturn file_fleetspeak_src_common_proto_fleetspeak_common_proto_rawDescGZIP(), []int{8}\n}", "title": "" }, { "docid": "46e698c06ef07934c0ba065dafb7d3b5", "score": "0.6299417", "text": "func (x *fastReflection_ConfigRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_ConfigRequest\n}", "title": "" }, { "docid": "8654ae750abc2bf50c7ea14c8d4113f0", "score": "0.6285521", "text": "func (*CMsgTest_MessageToServer_Request) Descriptor() ([]byte, []int) {\n\treturn file_steammessages_unified_test_steamclient_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "479c6f1dcb62bcc0be783806f3242ede", "score": "0.6281912", "text": "func (*WebhookRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_dialogflow_cx_v3beta1_webhook_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "3aeaa6dba91c7ddaf359fbbc69ee27b0", "score": "0.6277424", "text": "func (*AlertRequest) Descriptor() ([]byte, []int) {\n\treturn file_feg_protos_csfb_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "69e34d8004cfd68671bbd6be3df80e8c", "score": "0.6261737", "text": "func (*CMsgTest_MessageToClient_Request) Descriptor() ([]byte, []int) {\n\treturn file_steammessages_unified_test_steamclient_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "4926c973a5c17c51a286210bc5639652", "score": "0.6251412", "text": "func (*UpdateStoredInfoTypeRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_privacy_dlp_v2_dlp_proto_rawDescGZIP(), []int{129}\n}", "title": "" }, { "docid": "b272723ad97b348461ebd7dcec61b94c", "score": "0.62228614", "text": "func (*CallRequest) Descriptor() ([]byte, []int) {\n\treturn file_call_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "2bcf5533424face4e7e6b3674c040782", "score": "0.6220496", "text": "func (x *fastReflection_StatusRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_StatusRequest\n}", "title": "" }, { "docid": "4991ece5780e0a2725589d8a167ff002", "score": "0.621602", "text": "func (*SayRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_hello_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "3dc5812a38d7479a08e09022b9196553", "score": "0.62072676", "text": "func (*CMsgDOTAEditFantasyTeamRequest) Descriptor() ([]byte, []int) {\n\treturn file_dota2_dota_gcmessages_client_fantasy_proto_rawDescGZIP(), []int{16}\n}", "title": "" }, { "docid": "ed1632ec428b29d7cb4e1e9cb0cf0e59", "score": "0.6202984", "text": "func (*GetServiceRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_appengine_v1_appengine_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "e957c80c2bbbe896b2e953acce5cc342", "score": "0.6201238", "text": "func (x *fastReflection_QueryHistoricalInfoRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QueryHistoricalInfoRequest\n}", "title": "" }, { "docid": "271a9236c7e820753f9b43c3bc33be9a", "score": "0.6184971", "text": "func (*GoToObjectRequest) Descriptor() ([]byte, []int) {\n\treturn file_messages_proto_rawDescGZIP(), []int{93}\n}", "title": "" }, { "docid": "aab0fa5cf9eae36a4c8cf731948d5f4e", "score": "0.61836517", "text": "func (*CreateStoredInfoTypeRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_privacy_dlp_v2_dlp_proto_rawDescGZIP(), []int{128}\n}", "title": "" }, { "docid": "e55f1b0621745f812517c40e03190356", "score": "0.61821616", "text": "func (*UpdateMessageRequest) Descriptor() ([]byte, []int) {\n\treturn file_protos_chatpb_chat_service_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "4786c78ad6b78c58fd125f80e8b76423", "score": "0.6180385", "text": "func (*ChatRequest) Descriptor() ([]byte, []int) {\n\treturn file_chat_chatpb_chat_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "383c28059b297493f6ea2cb59464cc29", "score": "0.6178765", "text": "func (*DeviceRequest_CodeX) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_device_request_proto_rawDescGZIP(), []int{0, 3}\n}", "title": "" }, { "docid": "dc67fcaf545cffb78ac16d97fff31d84", "score": "0.6178264", "text": "func (*MetadataKind_Request) Descriptor() ([]byte, []int) {\n\treturn file_github_com_solo_io_gloo_projects_gloo_api_external_envoy_type_metadata_v3_metadata_proto_rawDescGZIP(), []int{1, 0}\n}", "title": "" }, { "docid": "8032a75896032d3ca5a7f75cf67f905c", "score": "0.6176373", "text": "func (*GetWebhookRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_dialogflow_cx_v3beta1_webhook_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "fe2a1fa23993a040aed3172d1321e0dc", "score": "0.61756116", "text": "func (x *fastReflection_QueryDelegationRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QueryDelegationRequest\n}", "title": "" }, { "docid": "50a7cf6717174be7e69566c3dfd13c35", "score": "0.6174883", "text": "func (*ContactUpdate) Descriptor() ([]byte, []int) {\n\treturn file_isnic_isnic_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "07a1dc66a244a9bd4266f0f873b45b76", "score": "0.6171541", "text": "func (*DeleteStoredInfoTypeRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_privacy_dlp_v2_dlp_proto_rawDescGZIP(), []int{133}\n}", "title": "" }, { "docid": "725cfa77325bf6dc4163c5d6e4810cb7", "score": "0.61679673", "text": "func (x *fastReflection_QueryDelegatorValidatorRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QueryDelegatorValidatorRequest\n}", "title": "" }, { "docid": "39d8f322a0dd80ea6075816f2e251e84", "score": "0.6166317", "text": "func (x *fastReflection_MsgRequest) Clear(fd protoreflect.FieldDescriptor) {\n\tswitch fd.FullName() {\n\tcase \"testpb.MsgRequest.u32\":\n\t\tx.U32 = uint32(0)\n\tcase \"testpb.MsgRequest.u64\":\n\t\tx.U64 = uint64(0)\n\tcase \"testpb.MsgRequest.str\":\n\t\tx.Str = \"\"\n\tcase \"testpb.MsgRequest.bz\":\n\t\tx.Bz = nil\n\tcase \"testpb.MsgRequest.timestamp\":\n\t\tx.Timestamp = nil\n\tcase \"testpb.MsgRequest.duration\":\n\t\tx.Duration = nil\n\tcase \"testpb.MsgRequest.i32\":\n\t\tx.I32 = int32(0)\n\tcase \"testpb.MsgRequest.i64\":\n\t\tx.I64 = int64(0)\n\tcase \"testpb.MsgRequest.a_bool\":\n\t\tx.ABool = false\n\tcase \"testpb.MsgRequest.an_enum\":\n\t\tx.AnEnum = 0\n\tcase \"testpb.MsgRequest.a_message\":\n\t\tx.AMessage = nil\n\tcase \"testpb.MsgRequest.a_coin\":\n\t\tx.ACoin = nil\n\tcase \"testpb.MsgRequest.an_address\":\n\t\tx.AnAddress = \"\"\n\tcase \"testpb.MsgRequest.page\":\n\t\tx.Page = nil\n\tcase \"testpb.MsgRequest.bools\":\n\t\tx.Bools = nil\n\tcase \"testpb.MsgRequest.uints\":\n\t\tx.Uints = nil\n\tcase \"testpb.MsgRequest.strings\":\n\t\tx.Strings = nil\n\tcase \"testpb.MsgRequest.enums\":\n\t\tx.Enums = nil\n\tcase \"testpb.MsgRequest.durations\":\n\t\tx.Durations = nil\n\tcase \"testpb.MsgRequest.some_messages\":\n\t\tx.SomeMessages = nil\n\tcase \"testpb.MsgRequest.positional1\":\n\t\tx.Positional1 = int32(0)\n\tcase \"testpb.MsgRequest.positional2\":\n\t\tx.Positional2 = \"\"\n\tcase \"testpb.MsgRequest.positional3_varargs\":\n\t\tx.Positional3Varargs = nil\n\tcase \"testpb.MsgRequest.deprecated_field\":\n\t\tx.DeprecatedField = \"\"\n\tcase \"testpb.MsgRequest.shorthand_deprecated_field\":\n\t\tx.ShorthandDeprecatedField = \"\"\n\tcase \"testpb.MsgRequest.hidden_bool\":\n\t\tx.HiddenBool = false\n\tcase \"testpb.MsgRequest.a_validator_address\":\n\t\tx.AValidatorAddress = \"\"\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: testpb.MsgRequest\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message testpb.MsgRequest does not contain field %s\", fd.FullName()))\n\t}\n}", "title": "" }, { "docid": "aa6b45fe2cca3a48e9be39016a2bbb52", "score": "0.6165237", "text": "func (*CallRequest) Descriptor() ([]byte, []int) {\n\treturn file_rpc_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "c4bea557fa43ccbf5a4f54f2ccd83005", "score": "0.616379", "text": "func (*HelloRequest) Descriptor() ([]byte, []int) {\n\treturn file_helloworld_helloworld_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "dfcda2780495b09ab44e04601a36e1ec", "score": "0.61633855", "text": "func (*SdkCredentialUpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_api_proto_rawDescGZIP(), []int{120}\n}", "title": "" }, { "docid": "51825347b5a4cc093a3dcbbf7aaa7a09", "score": "0.6157882", "text": "func (*Demo3Request) Descriptor() ([]byte, []int) {\n\treturn file_protobuf_proto_demo3_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "9b68d3476a704e9cd7e3a00cfea4ffdb", "score": "0.61543345", "text": "func (*Request) Descriptor() ([]byte, []int) {\n\treturn file_proto_notification_notification_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "a6a48352feb738a19ceff43d61081c8e", "score": "0.6150059", "text": "func (*UpdatePatientRequest) Descriptor() ([]byte, []int) {\n\treturn file_heyrenee_v1_user_service_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "851324a7608d88cea749617298cc6aae", "score": "0.6149816", "text": "func (*CMsgDOTAFantasyTeamRosterRequest) Descriptor() ([]byte, []int) {\n\treturn file_dota2_dota_gcmessages_client_fantasy_proto_rawDescGZIP(), []int{48}\n}", "title": "" }, { "docid": "9a820f4fef26c2616cf3c156baed4c82", "score": "0.6146395", "text": "func (*GetStoredInfoTypeRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_privacy_dlp_v2_dlp_proto_rawDescGZIP(), []int{130}\n}", "title": "" }, { "docid": "f9530be07cdb763611546b41322795f7", "score": "0.6145191", "text": "func (*DeleteRequest) Descriptor() ([]byte, []int) {\n\treturn file_service_language_proto_skill_skill_service_proto_rawDescGZIP(), []int{10}\n}", "title": "" }, { "docid": "75af8813390e55f7d3b39673e088c6b3", "score": "0.61438274", "text": "func (*BroadCastRequest) Descriptor() ([]byte, []int) {\n\treturn file_ChatService_Chat_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "dd5323f1597b33e55a858d32a8651378", "score": "0.6138534", "text": "func (*UpdateWebhookRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_dialogflow_cx_v3beta1_webhook_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "e93f2b42098f6f8ad5004b45feabf694", "score": "0.61375636", "text": "func (*HelloReq) Descriptor() ([]byte, []int) {\n\treturn file_myproto_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "c60fc2c7a498ff977390a1f2fed98521", "score": "0.6133814", "text": "func (*MsgRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_synchronize_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "92286b05fcf4343f328a357755f3f250", "score": "0.6133242", "text": "func (*SayHelloRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_serviceA_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "6215eff106a80c59d8bc2eb3626ca4a4", "score": "0.6133024", "text": "func (*CreatePatientRequest) Descriptor() ([]byte, []int) {\n\treturn file_heyrenee_v1_user_service_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "0654ded40a49244c810cb7bb01f412ab", "score": "0.612558", "text": "func (*UpdateRequest) Descriptor() ([]byte, []int) {\n\treturn file_service_language_proto_skill_skill_service_proto_rawDescGZIP(), []int{8}\n}", "title": "" }, { "docid": "7dc5b5bf169f155faee11125251e9a91", "score": "0.6125048", "text": "func (*DeletePersonReq) Descriptor() ([]byte, []int) {\n\treturn file_proto_person_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "45e6eac1f085ebc5dd21db810b629320", "score": "0.6124883", "text": "func (*MessagesRequest) Descriptor() ([]byte, []int) {\n\treturn file_room_proto_rawDescGZIP(), []int{8}\n}", "title": "" }, { "docid": "0f2ff14377d219500332bfa527a59098", "score": "0.6122695", "text": "func (x *fastReflection_QueryBasketFeeRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QueryBasketFeeRequest\n}", "title": "" }, { "docid": "556d6a4fc90a58d3ed75b55eb0b0f019", "score": "0.6118421", "text": "func (*BroadcastReq) Descriptor() ([]byte, []int) {\n\treturn file_api_comet_grpc_api_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "d83f5adef548028702a24f6d10ee49d1", "score": "0.61175144", "text": "func (*HelloRequest) Descriptor() ([]byte, []int) {\n\treturn file_helloworld_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "d83f5adef548028702a24f6d10ee49d1", "score": "0.61175144", "text": "func (*HelloRequest) Descriptor() ([]byte, []int) {\n\treturn file_helloworld_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "e2863380a4da4cedeaa028c8935294ad", "score": "0.61173993", "text": "func (*DecorationsRequest) Descriptor() ([]byte, []int) {\n\treturn file_kythe_proto_xref_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "49209274419cb84b38fa1e2902f33d2f", "score": "0.6116599", "text": "func (*DeleteFriendInfoRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_firend_proto_rawDescGZIP(), []int{12}\n}", "title": "" }, { "docid": "61839651298e4169d92c02c992d8c163", "score": "0.6114225", "text": "func (x *fastReflection_SignedHeader) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_SignedHeader\n}", "title": "" }, { "docid": "2766f17a4ab25bfa672c0b02c7d821c6", "score": "0.6108768", "text": "func (*GetMembersRequest) Descriptor() ([]byte, []int) {\n\treturn file_Community_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "49091d2c37a0faa5a4a4ba6d49ff0f20", "score": "0.61071944", "text": "func (*CMsgDOTAFantasyTeamScoreRequest) Descriptor() ([]byte, []int) {\n\treturn file_dota2_dota_gcmessages_client_fantasy_proto_rawDescGZIP(), []int{22}\n}", "title": "" }, { "docid": "00064b833cd72d65f1809bb3bb6f2da5", "score": "0.6104482", "text": "func (*GetPatientRequest) Descriptor() ([]byte, []int) {\n\treturn file_heyrenee_v1_user_service_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "66ea41ce255a79bd64fdd1f2ece6079d", "score": "0.6103838", "text": "func (*SendEmailDtoRequest) Descriptor() ([]byte, []int) {\n\treturn file_users_proto_rawDescGZIP(), []int{17}\n}", "title": "" }, { "docid": "16c19400dc158c5d82223622d682866a", "score": "0.6099444", "text": "func (*TriggerRequest) Descriptor() ([]byte, []int) {\n\treturn file_v1_skaffold_proto_rawDescGZIP(), []int{28}\n}", "title": "" }, { "docid": "9ed520544a12caa8bf157beef6bfc7e6", "score": "0.60991806", "text": "func (*RequestDetails) Descriptor() ([]byte, []int) {\n\treturn file_person_person_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "e782cf575ed2a2f4d12856e36d340c0a", "score": "0.609708", "text": "func (*CreateWebhookRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_dialogflow_cx_v3beta1_webhook_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "4beb42ee145dc84a4e507c0973113c09", "score": "0.6088908", "text": "func (*NewRequest) Descriptor() ([]byte, []int) {\n\treturn file_chat_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "9eed2526c65cd6290446b671f9d63e38", "score": "0.6085314", "text": "func (*DeviceRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_device_request_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "f2a21137c3d2c1b412c30f906c0dd7f6", "score": "0.6084868", "text": "func (*EmptyRequestMessageRequest) Descriptor() ([]byte, []int) {\n\treturn file_pb_samplesvc_proto_rawDescGZIP(), []int{24}\n}", "title": "" }, { "docid": "d6ad8ff0fddc2d583c46ef941709b1af", "score": "0.60841304", "text": "func (*UpdateCaseRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_support_v1alpha1_cloud_support_proto_rawDescGZIP(), []int{9}\n}", "title": "" }, { "docid": "b8439819dbcf5aa53dcac40dbe42d39b", "score": "0.6084108", "text": "func (*TypeInfoRequest) Descriptor() ([]byte, []int) {\n\treturn file_requests_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "75c655356cdc7cced861a22cfe7ec804", "score": "0.6076967", "text": "func (*InsurancePlan_Contact) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_insurance_plan_proto_rawDescGZIP(), []int{0, 1}\n}", "title": "" }, { "docid": "069dc081372d48d9af1fae104cae2c23", "score": "0.60760975", "text": "func (*CreateRequest) Descriptor() ([]byte, []int) {\n\treturn file_service_language_proto_skill_skill_service_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "58029f9465aa9ea5e0c7e5a9dcc64c16", "score": "0.60760653", "text": "func (*CameraFeedRequest) Descriptor() ([]byte, []int) {\n\treturn file_messages_proto_rawDescGZIP(), []int{142}\n}", "title": "" }, { "docid": "d2fe62eab67fb09ce774086d7451f651", "score": "0.6075857", "text": "func (*GetSmallRequest) Descriptor() ([]byte, []int) {\n\treturn file_pb_samplesvc_proto_rawDescGZIP(), []int{14}\n}", "title": "" }, { "docid": "fbb3531e0b4053f46fd76af17ed000b4", "score": "0.60710394", "text": "func (x *fastReflection_QueryValidatorRequest) Get(descriptor protoreflect.FieldDescriptor) protoreflect.Value {\n\tswitch descriptor.FullName() {\n\tcase \"cosmos.staking.v1beta1.QueryValidatorRequest.validator_addr\":\n\t\tvalue := x.ValidatorAddr\n\t\treturn protoreflect.ValueOfString(value)\n\tdefault:\n\t\tif descriptor.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: cosmos.staking.v1beta1.QueryValidatorRequest\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message cosmos.staking.v1beta1.QueryValidatorRequest does not contain field %s\", descriptor.FullName()))\n\t}\n}", "title": "" }, { "docid": "9d43260aaf8c22dc598ccc0211effcfd", "score": "0.6068472", "text": "func (*GetMembersRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_podium_api_v1_podium_proto_rawDescGZIP(), []int{14}\n}", "title": "" }, { "docid": "c129d82bb659e2caf5f8fd0d72e60335", "score": "0.6067916", "text": "func (*SDKInitializationRequest) Descriptor() ([]byte, []int) {\n\treturn file_messages_proto_rawDescGZIP(), []int{148}\n}", "title": "" }, { "docid": "af8ee7298dc4007788e0b1638ff0f40e", "score": "0.6065144", "text": "func (*HelloRequest) Descriptor() ([]byte, []int) {\n\treturn file_protos_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "57405afd9a786775310a0de0bd592c03", "score": "0.60649586", "text": "func (*UpdateServiceRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_appengine_v1_appengine_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "8835a5a2fbb38bd71c829b608218eacf", "score": "0.6064902", "text": "func (*HelloRequest) Descriptor() ([]byte, []int) {\n\treturn file_tina_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "8b7cba08d40901e71ff1dc5d0754eb1c", "score": "0.6064572", "text": "func (x *fastReflection_QueryParamsRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QueryParamsRequest\n}", "title": "" }, { "docid": "8b7cba08d40901e71ff1dc5d0754eb1c", "score": "0.6064572", "text": "func (x *fastReflection_QueryParamsRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QueryParamsRequest\n}", "title": "" }, { "docid": "8b7cba08d40901e71ff1dc5d0754eb1c", "score": "0.6064572", "text": "func (x *fastReflection_QueryParamsRequest) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_QueryParamsRequest\n}", "title": "" }, { "docid": "272fdb05ac92a811da69bb535acc7354", "score": "0.60605454", "text": "func (*GreetRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_service_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "272fdb05ac92a811da69bb535acc7354", "score": "0.60605454", "text": "func (*GreetRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_service_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "4c7e1ceec4e3f75359e035d33c0ecc2d", "score": "0.60605365", "text": "func (*LanguageRequest) Descriptor() ([]byte, []int) {\n\treturn file_helloworld_helloworld_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "411a8730aa554ce78ad061ed94e1e799", "score": "0.6059641", "text": "func (*LeastRequest) Descriptor() ([]byte, []int) {\n\treturn file_envoy_extensions_load_balancing_policies_least_request_v3_least_request_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "b58bcf0ac24fc12f37c3c989acd769ad", "score": "0.60592073", "text": "func (*FunctionsRequest) Descriptor() ([]byte, []int) {\n\treturn file_telem_functions_request_proto_rawDescGZIP(), []int{0}\n}", "title": "" } ]
5dc418b15f897907cfdfae57a5ab13c3
Specify additional attributes or related resources to return in addition to the primary resources.
[ { "docid": "5a80b9226bfaa652e5b3b2ec3c283c99", "score": "0.0", "text": "func (r ApiGetIamEndPointPrivilegeListRequest) Expand(expand string) ApiGetIamEndPointPrivilegeListRequest {\n\tr.expand = &expand\n\treturn r\n}", "title": "" } ]
[ { "docid": "c2f83f4e9d1beab8ea8de281c5ea9486", "score": "0.5722806", "text": "func (e *ExtendedResource) Apply(resp http.ResponseWriter, req *http.Request) {\n\tbaseID, err := e.resource.ID(req)\n\tif err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tbase := e.resource.model.New()\n\tif err := base.FindByID(baseID); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tid, err := e.ID(req)\n\tif err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\titem := e.model.New()\n\tif err := item.FindByID(id); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\t// set the values specified in the PATCH body\n\tif err := req.Unmarshal(item); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\t// ensure all relationships are valid before validation\n\tif err := item.BelongsTo(base); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tif err := item.Validate(); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tif err := item.Save(); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tresp.WriteFormat(req, item)\n}", "title": "" }, { "docid": "60de32d37b1778318f05675104ad5121", "score": "0.56723773", "text": "func ResourceAttrs(ra []attribute.KeyValue) Option {\n\treturn func(o *Options) {\n\t\to.ResourceAttrs = append(o.ResourceAttrs, ra...)\n\t}\n}", "title": "" }, { "docid": "60deeea291c1d80d8e21f11024889dbe", "score": "0.562365", "text": "func (r *Resource) Extend(m blueprint.Model, optID ...func(req *http.Request) (string, error)) *ExtendedResource {\n\te := &ExtendedResource{\n\t\tmodel: m,\n\t\tID: func(req *http.Request) (string, error) {\n\t\t\treturn PathID(req, m.PathID())\n\t\t},\n\t\tresource: r,\n\t}\n\n\tif len(optID) > 0 {\n\t\te.ID = optID[0]\n\t}\n\n\treturn e\n}", "title": "" }, { "docid": "de3597428bdfa62607abc49c7dd055f9", "score": "0.55454105", "text": "func (e *ExtendedResource) Show(resp http.ResponseWriter, req *http.Request) {\n\tbaseID, err := e.resource.ID(req)\n\tif err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tbase := e.resource.model.New()\n\tif err := base.FindByID(baseID); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tid, err := e.ID(req)\n\tif err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\titem := e.model.New()\n\tif err := item.FindByID(id); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\t// items might not store its relationships in a database, so BelongsTo() will\n\t// ensure an item and its relationships are show in the reponse\n\tif err := item.BelongsTo(base); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tresp.WriteFormat(req, item)\n}", "title": "" }, { "docid": "ae44d1651c9f445e7c8d5cdf8dc8f40a", "score": "0.5409408", "text": "func withResourceDetails(db *gorm.DB) *gorm.DB {\n\treturn db.\n\t\tOrder(\"rating DESC, name\").\n\t\tScopes(withCatalogAndTags).\n\t\tPreload(\"Versions\", orderByVersion)\n}", "title": "" }, { "docid": "810cea5a80293e0f94fa32ed67a0b158", "score": "0.5331729", "text": "func (i *Interpolator) AddResourceAttributes(r string, a map[string]string) {\n\tsr := strings.Split(r, \".\")\n\t// This remove the provider from the resource as the reference will never have it\n\t// so from 'aws_instance' we transform to 'instance'\n\tsr[0] = strings.Join(strings.Split(sr[0], \"_\")[1:], \"_\")\n\tif _, ok := i.resources[sr[0]]; !ok {\n\t\ti.resources[sr[0]] = make(map[string]map[string]string)\n\t}\n\tif _, ok := i.resources[sr[0]][sr[1]]; !ok {\n\t\ti.resources[sr[0]][sr[1]] = make(map[string]string)\n\t}\n\ti.resources[sr[0]][sr[1]] = a\n\tfor k, v := range a {\n\t\ti.values[v] = fmt.Sprintf(\"${%s.%s}\", r, k)\n\t}\n}", "title": "" }, { "docid": "593d092a8ed476ef63e028181dc81534", "score": "0.5327392", "text": "func (e *ExtendedResource) Index(resp http.ResponseWriter, req *http.Request) {\n\tbaseID, err := e.resource.ID(req)\n\tif err != nil {\n\t\tresp.WriteErrs(req, err, errors.New(\"unable to identify resource id\"))\n\t\treturn\n\t}\n\n\tbase := e.resource.model.New()\n\tif err := base.FindByID(baseID); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\titems, err := e.model.FindAllByOwner(base)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tresp.WriteFormatList(req, items)\n}", "title": "" }, { "docid": "2723a6038bcf97140f4ea0070f7857ae", "score": "0.52106404", "text": "func withResourceVersionDetails(db *gorm.DB) *gorm.DB {\n\treturn db.\n\t\tPreload(\"Resource\").\n\t\tPreload(\"Resource.Catalog\").\n\t\tPreload(\"Resource.Tags\", orderByTags)\n}", "title": "" }, { "docid": "ee175e5aecbe87dafcb070e8d20731d9", "score": "0.52010596", "text": "func (self *BasicManager) UserResource() RestAll {\n\treturn &BasicResource{self.Sup}\n}", "title": "" }, { "docid": "24f9f3bf3a1d08a01cfe1ccfcada21ac", "score": "0.51616305", "text": "func dataSourceExtraPropertyAttributes(d *schema.ResourceData, data map[string]interface{}) error {\n solution_id := int(data[\"id\"].(float64))\n log.Printf(\"[DEBUG] Retrieved twcc_extra_property: %d\", solution_id)\n\n json_data, err := json.Marshal(data[\"site_extra_prop\"])\n if err != nil {\n return err\n }\n d.SetId(fmt.Sprintf(\"%d\", solution_id))\n d.Set(\"extra_property\", string(json_data))\n\n return nil\n}", "title": "" }, { "docid": "c2cdf0c39d1efb0e4dfc67eaaced189d", "score": "0.50939393", "text": "func (Aaa) RestObjects() map[string]sophos.RestObject { return defsAaa }", "title": "" }, { "docid": "fa49fc5be0599ee8b413b80279745225", "score": "0.50450385", "text": "func (svc *Service) Resource(collection Resourcer, filters ...Filter) *Resource {\n\t// reflect name from object's type\n\tcs := fmt.Sprintf(\"%T\", collection)\n\tname := strings.ToLower(cs[strings.LastIndex(cs, \".\")+1:])\n\tif name == \"\" {\n\t\tpanic(\"relax: Resource naming failed: \" + cs)\n\t}\n\n\tres := &Resource{\n\t\trouter: svc.router,\n\t\tname: name,\n\t\tpath: svc.getPath(name, false),\n\t\tcollection: collection,\n\t\tfilters: nil,\n\t\tlinks: make([]*Link, 0),\n\t}\n\n\t// user-specified filters\n\tif filters != nil {\n\t\tres.filters = append(res.filters, filters...)\n\t}\n\n\t// OPTIONS lists the methods allowed.\n\tres.Route(\"OPTIONS\", \"\", res.optionsHandler)\n\n\t// GET on the collection will access the Index handler\n\tres.Route(\"GET\", \"\", collection.Index)\n\n\t// Relation: index -> resource.path\n\tres.links = append(res.links, &Link{URI: svc.getPath(name, false), Rel: \"index\"})\n\n\t// update service resources list\n\tsvc.resources = append(svc.resources, res)\n\n\t// Relation: resource -> service\n\tsvc.links = append(svc.links, &Link{URI: svc.getPath(name, true), Rel: svc.getPath(\"rel/\"+name, true)})\n\n\treturn res\n}", "title": "" }, { "docid": "cb0f34082c60771df537856a00224f9c", "score": "0.5038844", "text": "func (ar *apiResources) Resources() map[schema.GroupVersionKind]*Resource {\n\treturn ar.resources\n}", "title": "" }, { "docid": "e219a6ea915ac13f41c8f6576cd0a40f", "score": "0.50210226", "text": "func (r *Resource) Add(nc *Resource) {\n\tr.CPU.Add(nc.CPU)\n\tr.Memory.Add(nc.Memory)\n\tr.Pods.Add(nc.Pods)\n\tr.EphemeralStorage.Add(nc.EphemeralStorage)\n\tif len(nc.Custom) == 0 {\n\t\treturn\n\t}\n\tfor name, quota := range nc.Custom {\n\t\tif r.Custom == nil {\n\t\t\tr.Custom = CustomResources{}\n\t\t}\n\t\told := r.Custom[name]\n\t\told.Add(quota)\n\t\tr.Custom[name] = old\n\t}\n}", "title": "" }, { "docid": "d66566c7e7692074549b42a4591f215a", "score": "0.49760023", "text": "func (n *PropertyFetch) Attributes() map[string]interface{} {\n\treturn nil\n}", "title": "" }, { "docid": "b7ac7e53cfbf9706e94110a9349242da", "score": "0.49259537", "text": "func AllResources() map[string]interface{} {\n\treturn map[string]interface{}{\n\t\t\"AWS::AmazonMQ::Broker\": AWSAmazonMQBroker{},\n\t\t\"AWS::AmazonMQ::Configuration\": AWSAmazonMQConfiguration{},\n\t\t\"AWS::ApiGateway::Account\": AWSApiGatewayAccount{},\n\t\t\"AWS::ApiGateway::ApiKey\": AWSApiGatewayApiKey{},\n\t\t\"AWS::ApiGateway::Authorizer\": AWSApiGatewayAuthorizer{},\n\t\t\"AWS::ApiGateway::BasePathMapping\": AWSApiGatewayBasePathMapping{},\n\t\t\"AWS::ApiGateway::ClientCertificate\": AWSApiGatewayClientCertificate{},\n\t\t\"AWS::ApiGateway::Deployment\": AWSApiGatewayDeployment{},\n\t\t\"AWS::ApiGateway::DocumentationPart\": AWSApiGatewayDocumentationPart{},\n\t\t\"AWS::ApiGateway::DocumentationVersion\": AWSApiGatewayDocumentationVersion{},\n\t\t\"AWS::ApiGateway::DomainName\": AWSApiGatewayDomainName{},\n\t\t\"AWS::ApiGateway::GatewayResponse\": AWSApiGatewayGatewayResponse{},\n\t\t\"AWS::ApiGateway::Method\": AWSApiGatewayMethod{},\n\t\t\"AWS::ApiGateway::Model\": AWSApiGatewayModel{},\n\t\t\"AWS::ApiGateway::RequestValidator\": AWSApiGatewayRequestValidator{},\n\t\t\"AWS::ApiGateway::Resource\": AWSApiGatewayResource{},\n\t\t\"AWS::ApiGateway::RestApi\": AWSApiGatewayRestApi{},\n\t\t\"AWS::ApiGateway::Stage\": AWSApiGatewayStage{},\n\t\t\"AWS::ApiGateway::UsagePlan\": AWSApiGatewayUsagePlan{},\n\t\t\"AWS::ApiGateway::UsagePlanKey\": AWSApiGatewayUsagePlanKey{},\n\t\t\"AWS::ApiGateway::VpcLink\": AWSApiGatewayVpcLink{},\n\t\t\"AWS::AppStream::DirectoryConfig\": AWSAppStreamDirectoryConfig{},\n\t\t\"AWS::AppStream::Fleet\": AWSAppStreamFleet{},\n\t\t\"AWS::AppStream::ImageBuilder\": AWSAppStreamImageBuilder{},\n\t\t\"AWS::AppStream::Stack\": AWSAppStreamStack{},\n\t\t\"AWS::AppStream::StackFleetAssociation\": AWSAppStreamStackFleetAssociation{},\n\t\t\"AWS::AppStream::StackUserAssociation\": AWSAppStreamStackUserAssociation{},\n\t\t\"AWS::AppStream::User\": AWSAppStreamUser{},\n\t\t\"AWS::AppSync::ApiKey\": AWSAppSyncApiKey{},\n\t\t\"AWS::AppSync::DataSource\": AWSAppSyncDataSource{},\n\t\t\"AWS::AppSync::GraphQLApi\": AWSAppSyncGraphQLApi{},\n\t\t\"AWS::AppSync::GraphQLSchema\": AWSAppSyncGraphQLSchema{},\n\t\t\"AWS::AppSync::Resolver\": AWSAppSyncResolver{},\n\t\t\"AWS::ApplicationAutoScaling::ScalableTarget\": AWSApplicationAutoScalingScalableTarget{},\n\t\t\"AWS::ApplicationAutoScaling::ScalingPolicy\": AWSApplicationAutoScalingScalingPolicy{},\n\t\t\"AWS::Athena::NamedQuery\": AWSAthenaNamedQuery{},\n\t\t\"AWS::AutoScaling::AutoScalingGroup\": AWSAutoScalingAutoScalingGroup{},\n\t\t\"AWS::AutoScaling::LaunchConfiguration\": AWSAutoScalingLaunchConfiguration{},\n\t\t\"AWS::AutoScaling::LifecycleHook\": AWSAutoScalingLifecycleHook{},\n\t\t\"AWS::AutoScaling::ScalingPolicy\": AWSAutoScalingScalingPolicy{},\n\t\t\"AWS::AutoScaling::ScheduledAction\": AWSAutoScalingScheduledAction{},\n\t\t\"AWS::AutoScalingPlans::ScalingPlan\": AWSAutoScalingPlansScalingPlan{},\n\t\t\"AWS::Batch::ComputeEnvironment\": AWSBatchComputeEnvironment{},\n\t\t\"AWS::Batch::JobDefinition\": AWSBatchJobDefinition{},\n\t\t\"AWS::Batch::JobQueue\": AWSBatchJobQueue{},\n\t\t\"AWS::Budgets::Budget\": AWSBudgetsBudget{},\n\t\t\"AWS::CertificateManager::Certificate\": AWSCertificateManagerCertificate{},\n\t\t\"AWS::Cloud9::EnvironmentEC2\": AWSCloud9EnvironmentEC2{},\n\t\t\"AWS::CloudFormation::CustomResource\": AWSCloudFormationCustomResource{},\n\t\t\"AWS::CloudFormation::Stack\": AWSCloudFormationStack{},\n\t\t\"AWS::CloudFormation::WaitCondition\": AWSCloudFormationWaitCondition{},\n\t\t\"AWS::CloudFormation::WaitConditionHandle\": AWSCloudFormationWaitConditionHandle{},\n\t\t\"AWS::CloudFront::CloudFrontOriginAccessIdentity\": AWSCloudFrontCloudFrontOriginAccessIdentity{},\n\t\t\"AWS::CloudFront::Distribution\": AWSCloudFrontDistribution{},\n\t\t\"AWS::CloudFront::StreamingDistribution\": AWSCloudFrontStreamingDistribution{},\n\t\t\"AWS::CloudTrail::Trail\": AWSCloudTrailTrail{},\n\t\t\"AWS::CloudWatch::Alarm\": AWSCloudWatchAlarm{},\n\t\t\"AWS::CloudWatch::Dashboard\": AWSCloudWatchDashboard{},\n\t\t\"AWS::CodeBuild::Project\": AWSCodeBuildProject{},\n\t\t\"AWS::CodeCommit::Repository\": AWSCodeCommitRepository{},\n\t\t\"AWS::CodeDeploy::Application\": AWSCodeDeployApplication{},\n\t\t\"AWS::CodeDeploy::DeploymentConfig\": AWSCodeDeployDeploymentConfig{},\n\t\t\"AWS::CodeDeploy::DeploymentGroup\": AWSCodeDeployDeploymentGroup{},\n\t\t\"AWS::CodePipeline::CustomActionType\": AWSCodePipelineCustomActionType{},\n\t\t\"AWS::CodePipeline::Pipeline\": AWSCodePipelinePipeline{},\n\t\t\"AWS::CodePipeline::Webhook\": AWSCodePipelineWebhook{},\n\t\t\"AWS::Cognito::IdentityPool\": AWSCognitoIdentityPool{},\n\t\t\"AWS::Cognito::IdentityPoolRoleAttachment\": AWSCognitoIdentityPoolRoleAttachment{},\n\t\t\"AWS::Cognito::UserPool\": AWSCognitoUserPool{},\n\t\t\"AWS::Cognito::UserPoolClient\": AWSCognitoUserPoolClient{},\n\t\t\"AWS::Cognito::UserPoolGroup\": AWSCognitoUserPoolGroup{},\n\t\t\"AWS::Cognito::UserPoolUser\": AWSCognitoUserPoolUser{},\n\t\t\"AWS::Cognito::UserPoolUserToGroupAttachment\": AWSCognitoUserPoolUserToGroupAttachment{},\n\t\t\"AWS::Config::AggregationAuthorization\": AWSConfigAggregationAuthorization{},\n\t\t\"AWS::Config::ConfigRule\": AWSConfigConfigRule{},\n\t\t\"AWS::Config::ConfigurationAggregator\": AWSConfigConfigurationAggregator{},\n\t\t\"AWS::Config::ConfigurationRecorder\": AWSConfigConfigurationRecorder{},\n\t\t\"AWS::Config::DeliveryChannel\": AWSConfigDeliveryChannel{},\n\t\t\"AWS::DAX::Cluster\": AWSDAXCluster{},\n\t\t\"AWS::DAX::ParameterGroup\": AWSDAXParameterGroup{},\n\t\t\"AWS::DAX::SubnetGroup\": AWSDAXSubnetGroup{},\n\t\t\"AWS::DMS::Certificate\": AWSDMSCertificate{},\n\t\t\"AWS::DMS::Endpoint\": AWSDMSEndpoint{},\n\t\t\"AWS::DMS::EventSubscription\": AWSDMSEventSubscription{},\n\t\t\"AWS::DMS::ReplicationInstance\": AWSDMSReplicationInstance{},\n\t\t\"AWS::DMS::ReplicationSubnetGroup\": AWSDMSReplicationSubnetGroup{},\n\t\t\"AWS::DMS::ReplicationTask\": AWSDMSReplicationTask{},\n\t\t\"AWS::DataPipeline::Pipeline\": AWSDataPipelinePipeline{},\n\t\t\"AWS::DirectoryService::MicrosoftAD\": AWSDirectoryServiceMicrosoftAD{},\n\t\t\"AWS::DirectoryService::SimpleAD\": AWSDirectoryServiceSimpleAD{},\n\t\t\"AWS::DynamoDB::Table\": AWSDynamoDBTable{},\n\t\t\"AWS::EC2::CustomerGateway\": AWSEC2CustomerGateway{},\n\t\t\"AWS::EC2::DHCPOptions\": AWSEC2DHCPOptions{},\n\t\t\"AWS::EC2::EIP\": AWSEC2EIP{},\n\t\t\"AWS::EC2::EIPAssociation\": AWSEC2EIPAssociation{},\n\t\t\"AWS::EC2::EgressOnlyInternetGateway\": AWSEC2EgressOnlyInternetGateway{},\n\t\t\"AWS::EC2::FlowLog\": AWSEC2FlowLog{},\n\t\t\"AWS::EC2::Host\": AWSEC2Host{},\n\t\t\"AWS::EC2::Instance\": AWSEC2Instance{},\n\t\t\"AWS::EC2::InternetGateway\": AWSEC2InternetGateway{},\n\t\t\"AWS::EC2::LaunchTemplate\": AWSEC2LaunchTemplate{},\n\t\t\"AWS::EC2::NatGateway\": AWSEC2NatGateway{},\n\t\t\"AWS::EC2::NetworkAcl\": AWSEC2NetworkAcl{},\n\t\t\"AWS::EC2::NetworkAclEntry\": AWSEC2NetworkAclEntry{},\n\t\t\"AWS::EC2::NetworkInterface\": AWSEC2NetworkInterface{},\n\t\t\"AWS::EC2::NetworkInterfaceAttachment\": AWSEC2NetworkInterfaceAttachment{},\n\t\t\"AWS::EC2::NetworkInterfacePermission\": AWSEC2NetworkInterfacePermission{},\n\t\t\"AWS::EC2::PlacementGroup\": AWSEC2PlacementGroup{},\n\t\t\"AWS::EC2::Route\": AWSEC2Route{},\n\t\t\"AWS::EC2::RouteTable\": AWSEC2RouteTable{},\n\t\t\"AWS::EC2::SecurityGroup\": AWSEC2SecurityGroup{},\n\t\t\"AWS::EC2::SecurityGroupEgress\": AWSEC2SecurityGroupEgress{},\n\t\t\"AWS::EC2::SecurityGroupIngress\": AWSEC2SecurityGroupIngress{},\n\t\t\"AWS::EC2::SpotFleet\": AWSEC2SpotFleet{},\n\t\t\"AWS::EC2::Subnet\": AWSEC2Subnet{},\n\t\t\"AWS::EC2::SubnetCidrBlock\": AWSEC2SubnetCidrBlock{},\n\t\t\"AWS::EC2::SubnetNetworkAclAssociation\": AWSEC2SubnetNetworkAclAssociation{},\n\t\t\"AWS::EC2::SubnetRouteTableAssociation\": AWSEC2SubnetRouteTableAssociation{},\n\t\t\"AWS::EC2::TrunkInterfaceAssociation\": AWSEC2TrunkInterfaceAssociation{},\n\t\t\"AWS::EC2::VPC\": AWSEC2VPC{},\n\t\t\"AWS::EC2::VPCCidrBlock\": AWSEC2VPCCidrBlock{},\n\t\t\"AWS::EC2::VPCDHCPOptionsAssociation\": AWSEC2VPCDHCPOptionsAssociation{},\n\t\t\"AWS::EC2::VPCEndpoint\": AWSEC2VPCEndpoint{},\n\t\t\"AWS::EC2::VPCEndpointConnectionNotification\": AWSEC2VPCEndpointConnectionNotification{},\n\t\t\"AWS::EC2::VPCEndpointServicePermissions\": AWSEC2VPCEndpointServicePermissions{},\n\t\t\"AWS::EC2::VPCGatewayAttachment\": AWSEC2VPCGatewayAttachment{},\n\t\t\"AWS::EC2::VPCPeeringConnection\": AWSEC2VPCPeeringConnection{},\n\t\t\"AWS::EC2::VPNConnection\": AWSEC2VPNConnection{},\n\t\t\"AWS::EC2::VPNConnectionRoute\": AWSEC2VPNConnectionRoute{},\n\t\t\"AWS::EC2::VPNGateway\": AWSEC2VPNGateway{},\n\t\t\"AWS::EC2::VPNGatewayRoutePropagation\": AWSEC2VPNGatewayRoutePropagation{},\n\t\t\"AWS::EC2::Volume\": AWSEC2Volume{},\n\t\t\"AWS::EC2::VolumeAttachment\": AWSEC2VolumeAttachment{},\n\t\t\"AWS::ECR::Repository\": AWSECRRepository{},\n\t\t\"AWS::ECS::Cluster\": AWSECSCluster{},\n\t\t\"AWS::ECS::Service\": AWSECSService{},\n\t\t\"AWS::ECS::TaskDefinition\": AWSECSTaskDefinition{},\n\t\t\"AWS::EFS::FileSystem\": AWSEFSFileSystem{},\n\t\t\"AWS::EFS::MountTarget\": AWSEFSMountTarget{},\n\t\t\"AWS::EKS::Cluster\": AWSEKSCluster{},\n\t\t\"AWS::EMR::Cluster\": AWSEMRCluster{},\n\t\t\"AWS::EMR::InstanceFleetConfig\": AWSEMRInstanceFleetConfig{},\n\t\t\"AWS::EMR::InstanceGroupConfig\": AWSEMRInstanceGroupConfig{},\n\t\t\"AWS::EMR::SecurityConfiguration\": AWSEMRSecurityConfiguration{},\n\t\t\"AWS::EMR::Step\": AWSEMRStep{},\n\t\t\"AWS::ElastiCache::CacheCluster\": AWSElastiCacheCacheCluster{},\n\t\t\"AWS::ElastiCache::ParameterGroup\": AWSElastiCacheParameterGroup{},\n\t\t\"AWS::ElastiCache::ReplicationGroup\": AWSElastiCacheReplicationGroup{},\n\t\t\"AWS::ElastiCache::SecurityGroup\": AWSElastiCacheSecurityGroup{},\n\t\t\"AWS::ElastiCache::SecurityGroupIngress\": AWSElastiCacheSecurityGroupIngress{},\n\t\t\"AWS::ElastiCache::SubnetGroup\": AWSElastiCacheSubnetGroup{},\n\t\t\"AWS::ElasticBeanstalk::Application\": AWSElasticBeanstalkApplication{},\n\t\t\"AWS::ElasticBeanstalk::ApplicationVersion\": AWSElasticBeanstalkApplicationVersion{},\n\t\t\"AWS::ElasticBeanstalk::ConfigurationTemplate\": AWSElasticBeanstalkConfigurationTemplate{},\n\t\t\"AWS::ElasticBeanstalk::Environment\": AWSElasticBeanstalkEnvironment{},\n\t\t\"AWS::ElasticLoadBalancing::LoadBalancer\": AWSElasticLoadBalancingLoadBalancer{},\n\t\t\"AWS::ElasticLoadBalancingV2::Listener\": AWSElasticLoadBalancingV2Listener{},\n\t\t\"AWS::ElasticLoadBalancingV2::ListenerCertificate\": AWSElasticLoadBalancingV2ListenerCertificate{},\n\t\t\"AWS::ElasticLoadBalancingV2::ListenerRule\": AWSElasticLoadBalancingV2ListenerRule{},\n\t\t\"AWS::ElasticLoadBalancingV2::LoadBalancer\": AWSElasticLoadBalancingV2LoadBalancer{},\n\t\t\"AWS::ElasticLoadBalancingV2::TargetGroup\": AWSElasticLoadBalancingV2TargetGroup{},\n\t\t\"AWS::Elasticsearch::Domain\": AWSElasticsearchDomain{},\n\t\t\"AWS::Events::EventBusPolicy\": AWSEventsEventBusPolicy{},\n\t\t\"AWS::Events::Rule\": AWSEventsRule{},\n\t\t\"AWS::GameLift::Alias\": AWSGameLiftAlias{},\n\t\t\"AWS::GameLift::Build\": AWSGameLiftBuild{},\n\t\t\"AWS::GameLift::Fleet\": AWSGameLiftFleet{},\n\t\t\"AWS::Glue::Classifier\": AWSGlueClassifier{},\n\t\t\"AWS::Glue::Connection\": AWSGlueConnection{},\n\t\t\"AWS::Glue::Crawler\": AWSGlueCrawler{},\n\t\t\"AWS::Glue::Database\": AWSGlueDatabase{},\n\t\t\"AWS::Glue::DevEndpoint\": AWSGlueDevEndpoint{},\n\t\t\"AWS::Glue::Job\": AWSGlueJob{},\n\t\t\"AWS::Glue::Partition\": AWSGluePartition{},\n\t\t\"AWS::Glue::Table\": AWSGlueTable{},\n\t\t\"AWS::Glue::Trigger\": AWSGlueTrigger{},\n\t\t\"AWS::GuardDuty::Detector\": AWSGuardDutyDetector{},\n\t\t\"AWS::GuardDuty::Filter\": AWSGuardDutyFilter{},\n\t\t\"AWS::GuardDuty::IPSet\": AWSGuardDutyIPSet{},\n\t\t\"AWS::GuardDuty::Master\": AWSGuardDutyMaster{},\n\t\t\"AWS::GuardDuty::Member\": AWSGuardDutyMember{},\n\t\t\"AWS::GuardDuty::ThreatIntelSet\": AWSGuardDutyThreatIntelSet{},\n\t\t\"AWS::IAM::AccessKey\": AWSIAMAccessKey{},\n\t\t\"AWS::IAM::Group\": AWSIAMGroup{},\n\t\t\"AWS::IAM::InstanceProfile\": AWSIAMInstanceProfile{},\n\t\t\"AWS::IAM::ManagedPolicy\": AWSIAMManagedPolicy{},\n\t\t\"AWS::IAM::Policy\": AWSIAMPolicy{},\n\t\t\"AWS::IAM::Role\": AWSIAMRole{},\n\t\t\"AWS::IAM::ServiceLinkedRole\": AWSIAMServiceLinkedRole{},\n\t\t\"AWS::IAM::User\": AWSIAMUser{},\n\t\t\"AWS::IAM::UserToGroupAddition\": AWSIAMUserToGroupAddition{},\n\t\t\"AWS::Inspector::AssessmentTarget\": AWSInspectorAssessmentTarget{},\n\t\t\"AWS::Inspector::AssessmentTemplate\": AWSInspectorAssessmentTemplate{},\n\t\t\"AWS::Inspector::ResourceGroup\": AWSInspectorResourceGroup{},\n\t\t\"AWS::IoT1Click::Device\": AWSIoT1ClickDevice{},\n\t\t\"AWS::IoT1Click::Placement\": AWSIoT1ClickPlacement{},\n\t\t\"AWS::IoT1Click::Project\": AWSIoT1ClickProject{},\n\t\t\"AWS::IoT::Certificate\": AWSIoTCertificate{},\n\t\t\"AWS::IoT::Policy\": AWSIoTPolicy{},\n\t\t\"AWS::IoT::PolicyPrincipalAttachment\": AWSIoTPolicyPrincipalAttachment{},\n\t\t\"AWS::IoT::Thing\": AWSIoTThing{},\n\t\t\"AWS::IoT::ThingPrincipalAttachment\": AWSIoTThingPrincipalAttachment{},\n\t\t\"AWS::IoT::TopicRule\": AWSIoTTopicRule{},\n\t\t\"AWS::KMS::Alias\": AWSKMSAlias{},\n\t\t\"AWS::KMS::Key\": AWSKMSKey{},\n\t\t\"AWS::Kinesis::Stream\": AWSKinesisStream{},\n\t\t\"AWS::KinesisAnalytics::Application\": AWSKinesisAnalyticsApplication{},\n\t\t\"AWS::KinesisAnalytics::ApplicationOutput\": AWSKinesisAnalyticsApplicationOutput{},\n\t\t\"AWS::KinesisAnalytics::ApplicationReferenceDataSource\": AWSKinesisAnalyticsApplicationReferenceDataSource{},\n\t\t\"AWS::KinesisFirehose::DeliveryStream\": AWSKinesisFirehoseDeliveryStream{},\n\t\t\"AWS::Lambda::Alias\": AWSLambdaAlias{},\n\t\t\"AWS::Lambda::EventSourceMapping\": AWSLambdaEventSourceMapping{},\n\t\t\"AWS::Lambda::Function\": AWSLambdaFunction{},\n\t\t\"AWS::Lambda::Permission\": AWSLambdaPermission{},\n\t\t\"AWS::Lambda::Version\": AWSLambdaVersion{},\n\t\t\"AWS::Logs::Destination\": AWSLogsDestination{},\n\t\t\"AWS::Logs::LogGroup\": AWSLogsLogGroup{},\n\t\t\"AWS::Logs::LogStream\": AWSLogsLogStream{},\n\t\t\"AWS::Logs::MetricFilter\": AWSLogsMetricFilter{},\n\t\t\"AWS::Logs::SubscriptionFilter\": AWSLogsSubscriptionFilter{},\n\t\t\"AWS::Neptune::DBCluster\": AWSNeptuneDBCluster{},\n\t\t\"AWS::Neptune::DBClusterParameterGroup\": AWSNeptuneDBClusterParameterGroup{},\n\t\t\"AWS::Neptune::DBInstance\": AWSNeptuneDBInstance{},\n\t\t\"AWS::Neptune::DBParameterGroup\": AWSNeptuneDBParameterGroup{},\n\t\t\"AWS::Neptune::DBSubnetGroup\": AWSNeptuneDBSubnetGroup{},\n\t\t\"AWS::OpsWorks::App\": AWSOpsWorksApp{},\n\t\t\"AWS::OpsWorks::ElasticLoadBalancerAttachment\": AWSOpsWorksElasticLoadBalancerAttachment{},\n\t\t\"AWS::OpsWorks::Instance\": AWSOpsWorksInstance{},\n\t\t\"AWS::OpsWorks::Layer\": AWSOpsWorksLayer{},\n\t\t\"AWS::OpsWorks::Stack\": AWSOpsWorksStack{},\n\t\t\"AWS::OpsWorks::UserProfile\": AWSOpsWorksUserProfile{},\n\t\t\"AWS::OpsWorks::Volume\": AWSOpsWorksVolume{},\n\t\t\"AWS::RDS::DBCluster\": AWSRDSDBCluster{},\n\t\t\"AWS::RDS::DBClusterParameterGroup\": AWSRDSDBClusterParameterGroup{},\n\t\t\"AWS::RDS::DBInstance\": AWSRDSDBInstance{},\n\t\t\"AWS::RDS::DBParameterGroup\": AWSRDSDBParameterGroup{},\n\t\t\"AWS::RDS::DBSecurityGroup\": AWSRDSDBSecurityGroup{},\n\t\t\"AWS::RDS::DBSecurityGroupIngress\": AWSRDSDBSecurityGroupIngress{},\n\t\t\"AWS::RDS::DBSubnetGroup\": AWSRDSDBSubnetGroup{},\n\t\t\"AWS::RDS::EventSubscription\": AWSRDSEventSubscription{},\n\t\t\"AWS::RDS::OptionGroup\": AWSRDSOptionGroup{},\n\t\t\"AWS::Redshift::Cluster\": AWSRedshiftCluster{},\n\t\t\"AWS::Redshift::ClusterParameterGroup\": AWSRedshiftClusterParameterGroup{},\n\t\t\"AWS::Redshift::ClusterSecurityGroup\": AWSRedshiftClusterSecurityGroup{},\n\t\t\"AWS::Redshift::ClusterSecurityGroupIngress\": AWSRedshiftClusterSecurityGroupIngress{},\n\t\t\"AWS::Redshift::ClusterSubnetGroup\": AWSRedshiftClusterSubnetGroup{},\n\t\t\"AWS::Route53::HealthCheck\": AWSRoute53HealthCheck{},\n\t\t\"AWS::Route53::HostedZone\": AWSRoute53HostedZone{},\n\t\t\"AWS::Route53::RecordSet\": AWSRoute53RecordSet{},\n\t\t\"AWS::Route53::RecordSetGroup\": AWSRoute53RecordSetGroup{},\n\t\t\"AWS::S3::Bucket\": AWSS3Bucket{},\n\t\t\"AWS::S3::BucketPolicy\": AWSS3BucketPolicy{},\n\t\t\"AWS::SDB::Domain\": AWSSDBDomain{},\n\t\t\"AWS::SES::ConfigurationSet\": AWSSESConfigurationSet{},\n\t\t\"AWS::SES::ConfigurationSetEventDestination\": AWSSESConfigurationSetEventDestination{},\n\t\t\"AWS::SES::ReceiptFilter\": AWSSESReceiptFilter{},\n\t\t\"AWS::SES::ReceiptRule\": AWSSESReceiptRule{},\n\t\t\"AWS::SES::ReceiptRuleSet\": AWSSESReceiptRuleSet{},\n\t\t\"AWS::SES::Template\": AWSSESTemplate{},\n\t\t\"AWS::SNS::Subscription\": AWSSNSSubscription{},\n\t\t\"AWS::SNS::Topic\": AWSSNSTopic{},\n\t\t\"AWS::SNS::TopicPolicy\": AWSSNSTopicPolicy{},\n\t\t\"AWS::SQS::Queue\": AWSSQSQueue{},\n\t\t\"AWS::SQS::QueuePolicy\": AWSSQSQueuePolicy{},\n\t\t\"AWS::SSM::Association\": AWSSSMAssociation{},\n\t\t\"AWS::SSM::Document\": AWSSSMDocument{},\n\t\t\"AWS::SSM::MaintenanceWindowTask\": AWSSSMMaintenanceWindowTask{},\n\t\t\"AWS::SSM::Parameter\": AWSSSMParameter{},\n\t\t\"AWS::SSM::PatchBaseline\": AWSSSMPatchBaseline{},\n\t\t\"AWS::SSM::ResourceDataSync\": AWSSSMResourceDataSync{},\n\t\t\"AWS::SageMaker::Endpoint\": AWSSageMakerEndpoint{},\n\t\t\"AWS::SageMaker::EndpointConfig\": AWSSageMakerEndpointConfig{},\n\t\t\"AWS::SageMaker::Model\": AWSSageMakerModel{},\n\t\t\"AWS::SageMaker::NotebookInstance\": AWSSageMakerNotebookInstance{},\n\t\t\"AWS::SageMaker::NotebookInstanceLifecycleConfig\": AWSSageMakerNotebookInstanceLifecycleConfig{},\n\t\t\"AWS::Serverless::Api\": AWSServerlessApi{},\n\t\t\"AWS::Serverless::Function\": AWSServerlessFunction{},\n\t\t\"AWS::Serverless::SimpleTable\": AWSServerlessSimpleTable{},\n\t\t\"AWS::ServiceCatalog::AcceptedPortfolioShare\": AWSServiceCatalogAcceptedPortfolioShare{},\n\t\t\"AWS::ServiceCatalog::CloudFormationProduct\": AWSServiceCatalogCloudFormationProduct{},\n\t\t\"AWS::ServiceCatalog::CloudFormationProvisionedProduct\": AWSServiceCatalogCloudFormationProvisionedProduct{},\n\t\t\"AWS::ServiceCatalog::LaunchNotificationConstraint\": AWSServiceCatalogLaunchNotificationConstraint{},\n\t\t\"AWS::ServiceCatalog::LaunchRoleConstraint\": AWSServiceCatalogLaunchRoleConstraint{},\n\t\t\"AWS::ServiceCatalog::LaunchTemplateConstraint\": AWSServiceCatalogLaunchTemplateConstraint{},\n\t\t\"AWS::ServiceCatalog::Portfolio\": AWSServiceCatalogPortfolio{},\n\t\t\"AWS::ServiceCatalog::PortfolioPrincipalAssociation\": AWSServiceCatalogPortfolioPrincipalAssociation{},\n\t\t\"AWS::ServiceCatalog::PortfolioProductAssociation\": AWSServiceCatalogPortfolioProductAssociation{},\n\t\t\"AWS::ServiceCatalog::PortfolioShare\": AWSServiceCatalogPortfolioShare{},\n\t\t\"AWS::ServiceCatalog::TagOption\": AWSServiceCatalogTagOption{},\n\t\t\"AWS::ServiceCatalog::TagOptionAssociation\": AWSServiceCatalogTagOptionAssociation{},\n\t\t\"AWS::ServiceDiscovery::Instance\": AWSServiceDiscoveryInstance{},\n\t\t\"AWS::ServiceDiscovery::PrivateDnsNamespace\": AWSServiceDiscoveryPrivateDnsNamespace{},\n\t\t\"AWS::ServiceDiscovery::PublicDnsNamespace\": AWSServiceDiscoveryPublicDnsNamespace{},\n\t\t\"AWS::ServiceDiscovery::Service\": AWSServiceDiscoveryService{},\n\t\t\"AWS::StepFunctions::Activity\": AWSStepFunctionsActivity{},\n\t\t\"AWS::StepFunctions::StateMachine\": AWSStepFunctionsStateMachine{},\n\t\t\"AWS::WAF::ByteMatchSet\": AWSWAFByteMatchSet{},\n\t\t\"AWS::WAF::IPSet\": AWSWAFIPSet{},\n\t\t\"AWS::WAF::Rule\": AWSWAFRule{},\n\t\t\"AWS::WAF::SizeConstraintSet\": AWSWAFSizeConstraintSet{},\n\t\t\"AWS::WAF::SqlInjectionMatchSet\": AWSWAFSqlInjectionMatchSet{},\n\t\t\"AWS::WAF::WebACL\": AWSWAFWebACL{},\n\t\t\"AWS::WAF::XssMatchSet\": AWSWAFXssMatchSet{},\n\t\t\"AWS::WAFRegional::ByteMatchSet\": AWSWAFRegionalByteMatchSet{},\n\t\t\"AWS::WAFRegional::IPSet\": AWSWAFRegionalIPSet{},\n\t\t\"AWS::WAFRegional::Rule\": AWSWAFRegionalRule{},\n\t\t\"AWS::WAFRegional::SizeConstraintSet\": AWSWAFRegionalSizeConstraintSet{},\n\t\t\"AWS::WAFRegional::SqlInjectionMatchSet\": AWSWAFRegionalSqlInjectionMatchSet{},\n\t\t\"AWS::WAFRegional::WebACL\": AWSWAFRegionalWebACL{},\n\t\t\"AWS::WAFRegional::WebACLAssociation\": AWSWAFRegionalWebACLAssociation{},\n\t\t\"AWS::WAFRegional::XssMatchSet\": AWSWAFRegionalXssMatchSet{},\n\t\t\"AWS::WorkSpaces::Workspace\": AWSWorkSpacesWorkspace{},\n\t}\n}", "title": "" }, { "docid": "232f7561ed29c4d19a565df2d2dbac9e", "score": "0.49156636", "text": "func merge(opts ...ResourceOption) *resourceOptions {\n\toptions := &resourceOptions{}\n\tfor _, o := range opts {\n\t\tif o != nil {\n\t\t\to.applyResourceOption(options)\n\t\t}\n\t}\n\treturn options\n}", "title": "" }, { "docid": "69bc061210174c6b23e5ccd45e8a18b3", "score": "0.49076942", "text": "func WithResourceAttributes(attrs []attribute.KeyValue) Option {\n\treturn option(func(cfg *config) {\n\t\tcfg.resourceAttributes = append(cfg.resourceAttributes, attrs...)\n\t})\n}", "title": "" }, { "docid": "d123b75d9027b59bd9e5c4eea3cee8f1", "score": "0.49048266", "text": "func (e *ExtendedResource) Update(resp http.ResponseWriter, req *http.Request) {\n\tbaseID, err := e.resource.ID(req)\n\tif err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tbase := e.resource.model.New()\n\tif err := base.FindByID(baseID); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\t// get ID in the URL path\n\tid, err := e.ID(req)\n\tif err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\titem := e.model.New()\n\tif err := item.FindByID(id); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tif err := req.Unmarshal(item); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tif err := item.SetID(id); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\t// items might not store its relationships in a database, so BelongsTo() will\n\t// ensure an item and its relationships are show in the reponse\n\tif err := item.BelongsTo(base); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tif err := item.Validate(); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tif err := item.Save(); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tresp.WriteFormat(req, item)\n}", "title": "" }, { "docid": "4ac56a4d0a900dff25b00aea6a28df91", "score": "0.48743802", "text": "func (p *NoteStoreClient) GetResourceAttributes(authenticationToken string, guid Types.Guid) (r *Types.ResourceAttributes, userException *Errors.EDAMUserException, systemException *Errors.EDAMSystemException, notFoundException *Errors.EDAMNotFoundException, err error) {\n\tif err = p.sendGetResourceAttributes(authenticationToken, guid); err != nil {\n\t\treturn\n\t}\n\treturn p.recvGetResourceAttributes()\n}", "title": "" }, { "docid": "9b8f07fb23d2087187c1cdf677aa8a7a", "score": "0.48427236", "text": "func (m ManagedResource) MarshalJSON() ([]byte, error) {\n\tvar _parts [][]byte\n\n\taO0, err := swag.WriteJSON(m.RevisionedResource)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_parts = append(_parts, aO0)\n\n\tvar data struct {\n\t\tCreateTime int64 `json:\"_create_time,omitempty\"`\n\n\t\tCreateUser string `json:\"_create_user,omitempty\"`\n\n\t\tLastModifiedTime int64 `json:\"_last_modified_time,omitempty\"`\n\n\t\tLastModifiedUser string `json:\"_last_modified_user,omitempty\"`\n\n\t\tSystemOwned *bool `json:\"_system_owned,omitempty\"`\n\n\t\tDescription string `json:\"description,omitempty\"`\n\n\t\tDisplayName string `json:\"display_name,omitempty\"`\n\n\t\tID string `json:\"id,omitempty\"`\n\n\t\tResourceType string `json:\"resource_type,omitempty\"`\n\n\t\tTags []*Tag `json:\"tags,omitempty\"`\n\t}\n\n\tdata.CreateTime = m.CreateTime\n\n\tdata.CreateUser = m.CreateUser\n\n\tdata.LastModifiedTime = m.LastModifiedTime\n\n\tdata.LastModifiedUser = m.LastModifiedUser\n\n\tdata.SystemOwned = m.SystemOwned\n\n\tdata.Description = m.Description\n\n\tdata.DisplayName = m.DisplayName\n\n\tdata.ID = m.ID\n\n\tdata.ResourceType = m.ResourceType\n\n\tdata.Tags = m.Tags\n\n\tjsonData, err := swag.WriteJSON(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_parts = append(_parts, jsonData)\n\n\treturn swag.ConcatJSON(_parts...), nil\n}", "title": "" }, { "docid": "cbed9c3838e676e40433e5aea32495cc", "score": "0.48390645", "text": "func GetUserAttributes(u *users.User) error {\n\terr := DefaultDb.GetUserAttributes(u)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, _ := range u.Addresses {\n\t\tu.Addresses[k].AddLinks()\n\t}\n\tfor k, _ := range u.Cards {\n\t\tu.Cards[k].AddLinks()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4ca59d320bbfaa7311eed9fb1e025eb7", "score": "0.48256344", "text": "func enabledAttributes() (attributes []string) {\n\tdefaultConfig := metadata.DefaultResourceAttributesConfig()\n\tif defaultConfig.K8sClusterUID.Enabled {\n\t\tattributes = append(attributes, clusterUID)\n\t}\n\tif defaultConfig.ContainerID.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeContainerID)\n\t}\n\tif defaultConfig.ContainerImageName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeContainerImageName)\n\t}\n\tif defaultConfig.ContainerImageTag.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeContainerImageTag)\n\t}\n\tif defaultConfig.K8sContainerName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SContainerName)\n\t}\n\tif defaultConfig.K8sCronjobName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SCronJobName)\n\t}\n\tif defaultConfig.K8sDaemonsetName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SDaemonSetName)\n\t}\n\tif defaultConfig.K8sDaemonsetUID.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SDaemonSetUID)\n\t}\n\tif defaultConfig.K8sDeploymentName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SDeploymentName)\n\t}\n\tif defaultConfig.K8sDeploymentUID.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SDeploymentUID)\n\t}\n\tif defaultConfig.K8sJobName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SJobName)\n\t}\n\tif defaultConfig.K8sJobUID.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SJobUID)\n\t}\n\tif defaultConfig.K8sNamespaceName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SNamespaceName)\n\t}\n\tif defaultConfig.K8sNodeName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SNodeName)\n\t}\n\tif defaultConfig.K8sPodHostname.Enabled {\n\t\tattributes = append(attributes, specPodHostName)\n\t}\n\tif defaultConfig.K8sPodName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SPodName)\n\t}\n\tif defaultConfig.K8sPodStartTime.Enabled {\n\t\tattributes = append(attributes, metadataPodStartTime)\n\t}\n\tif defaultConfig.K8sPodUID.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SPodUID)\n\t}\n\tif defaultConfig.K8sReplicasetName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SReplicaSetName)\n\t}\n\tif defaultConfig.K8sReplicasetUID.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SReplicaSetUID)\n\t}\n\tif defaultConfig.K8sStatefulsetName.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SStatefulSetName)\n\t}\n\tif defaultConfig.K8sStatefulsetUID.Enabled {\n\t\tattributes = append(attributes, conventions.AttributeK8SStatefulSetUID)\n\t}\n\treturn\n}", "title": "" }, { "docid": "24a377b98a13f65c6c13b0482c20d14b", "score": "0.48236784", "text": "func (res *Resource) Meta(meta *Meta) *Meta {\n\tif meta.Header == \"\" {\n\t\tmeta.Header = meta.Name\n\t}\n\n\tmeta.base = res\n\tmeta.updateMeta()\n\tres.Metas = append(res.Metas, meta)\n\treturn meta\n}", "title": "" }, { "docid": "ac924dcc4753513d43cafe5f908c6770", "score": "0.48075673", "text": "func RestGetAllResources(c echo.Context) error {\n\n\tnsId := c.Param(\"nsId\")\n\n\toptionFlag := c.QueryParam(\"option\")\n\tfilterKey := c.QueryParam(\"filterKey\")\n\tfilterVal := c.QueryParam(\"filterVal\")\n\n\tresourceType := strings.Split(c.Path(), \"/\")[5]\n\t// c.Path(): /tumblebug/ns/:nsId/resources/spec/:specId\n\n\tif optionFlag == \"id\" {\n\t\tcontent := common.IdList{}\n\t\tvar err error\n\t\tcontent.IdList, err = mcir.ListResourceId(nsId, resourceType)\n\t\tif err != nil {\n\t\t\tmapA := map[string]string{\"message\": \"Failed to list \" + resourceType + \"s' ID; \" + err.Error()}\n\t\t\treturn c.JSON(http.StatusNotFound, &mapA)\n\t\t}\n\n\t\treturn c.JSON(http.StatusOK, &content)\n\t} else {\n\n\t\tresourceList, err := mcir.ListResource(nsId, resourceType, filterKey, filterVal)\n\t\tif err != nil {\n\t\t\tmapA := map[string]string{\"message\": \"Failed to list \" + resourceType + \"s; \" + err.Error()}\n\t\t\treturn c.JSON(http.StatusNotFound, &mapA)\n\t\t}\n\n\t\tswitch resourceType {\n\t\tcase common.StrImage:\n\t\t\tvar content struct {\n\t\t\t\tImage []mcir.TbImageInfo `json:\"image\"`\n\t\t\t}\n\n\t\t\tcontent.Image = resourceList.([]mcir.TbImageInfo) // type assertion (interface{} -> array)\n\t\t\treturn c.JSON(http.StatusOK, &content)\n\t\tcase common.StrCustomImage:\n\t\t\tvar content struct {\n\t\t\t\tImage []mcir.TbCustomImageInfo `json:\"customImage\"`\n\t\t\t}\n\n\t\t\tcontent.Image = resourceList.([]mcir.TbCustomImageInfo) // type assertion (interface{} -> array)\n\t\t\treturn c.JSON(http.StatusOK, &content)\n\t\tcase common.StrSecurityGroup:\n\t\t\tvar content struct {\n\t\t\t\tSecurityGroup []mcir.TbSecurityGroupInfo `json:\"securityGroup\"`\n\t\t\t}\n\n\t\t\tcontent.SecurityGroup = resourceList.([]mcir.TbSecurityGroupInfo) // type assertion (interface{} -> array)\n\t\t\treturn c.JSON(http.StatusOK, &content)\n\t\tcase common.StrSpec:\n\t\t\tvar content struct {\n\t\t\t\tSpec []mcir.TbSpecInfo `json:\"spec\"`\n\t\t\t}\n\n\t\t\tcontent.Spec = resourceList.([]mcir.TbSpecInfo) // type assertion (interface{} -> array)\n\t\t\treturn c.JSON(http.StatusOK, &content)\n\t\tcase common.StrSSHKey:\n\t\t\tvar content struct {\n\t\t\t\tSshKey []mcir.TbSshKeyInfo `json:\"sshKey\"`\n\t\t\t}\n\n\t\t\tcontent.SshKey = resourceList.([]mcir.TbSshKeyInfo) // type assertion (interface{} -> array)\n\t\t\treturn c.JSON(http.StatusOK, &content)\n\t\tcase common.StrVNet:\n\t\t\tvar content struct {\n\t\t\t\tVNet []mcir.TbVNetInfo `json:\"vNet\"`\n\t\t\t}\n\n\t\t\tcontent.VNet = resourceList.([]mcir.TbVNetInfo) // type assertion (interface{} -> array)\n\t\t\treturn c.JSON(http.StatusOK, &content)\n\t\tcase common.StrDataDisk:\n\t\t\tvar content struct {\n\t\t\t\tDataDisk []mcir.TbDataDiskInfo `json:\"dataDisk\"`\n\t\t\t}\n\n\t\t\tcontent.DataDisk = resourceList.([]mcir.TbDataDiskInfo) // type assertion (interface{} -> array)\n\t\t\treturn c.JSON(http.StatusOK, &content)\n\t\tdefault:\n\t\t\treturn c.JSON(http.StatusBadRequest, nil)\n\n\t\t}\n\t\t// return c.JSON(http.StatusBadRequest, nil)\n\t}\n}", "title": "" }, { "docid": "2229d3e6bd4a4e8de6fa8e310cf06ecd", "score": "0.48034856", "text": "func (m *CloudPcBulkRemoteActionResult) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "9f0783f1c0d252e59698eb7c0d425f33", "score": "0.47896948", "text": "func (warehouse *Warehouse) GetAll() Resources {\n\treturn warehouse.resources\n}", "title": "" }, { "docid": "32ce19e660aa5bbc124700aaf68361dd", "score": "0.4761785", "text": "func (r *Resource) MarshalJSON() ([]byte, error) {\n\tvar msg json.RawMessage\n\tvar err error\n\n\t// Attach Common attribute to the map before marshal operation\n\tout := map[string]interface{}{\n\t\t\"id\": r.ID,\n\t\t\"schemas\": r.Schemas,\n\t\t\"meta\": r.Meta,\n\t}\n\tif r.ExternalID != \"\" {\n\t\tout[\"externalId\"] = r.ExternalID\n\t}\n\n\tresourceType := r.ResourceType()\n\tif resourceType == nil {\n\t\treturn nil, &core.ScimError{Msg: \"Unsupported Resource Type\"}\n\t}\n\tschema := resourceType.GetSchema()\n\tif schema == nil {\n\t\treturn nil, &core.ScimError{Msg: \"Unsupported Schema\"}\n\t}\n\n\t// Marshal schema attrs to the top level\n\tif values := r.Values(schema.GetIdentifier()); values != nil {\n\t\tfor key, value := range *values {\n\t\t\tif msg, err = json.Marshal(value); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tout[key] = msg\n\t\t}\n\t}\n\n\t// Marshal extensions to proper namespace key\n\tfor _, extSch := range resourceType.GetSchemaExtensions() {\n\t\tif extSch != nil {\n\t\t\tns := extSch.GetIdentifier()\n\t\t\tif values := r.Values(ns); values != nil {\n\t\t\t\tif msg, err = json.Marshal(&values); err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tout[ns] = msg\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn json.Marshal(out)\n}", "title": "" }, { "docid": "04a0457d7b9d6d99de882852d0049d2b", "score": "0.474583", "text": "func (o DatasetCosmosDBApiOutput) AdditionalProperties() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v *DatasetCosmosDBApi) pulumi.StringMapOutput { return v.AdditionalProperties }).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "b2f72fd93309c1b5fa3615025c681473", "score": "0.47292355", "text": "func (b *APIServerSourceBuilder) Resources(resources []v1.APIVersionKindSelector) *APIServerSourceBuilder {\n\tb.apiServerSource.Spec.Resources = resources\n\treturn b\n}", "title": "" }, { "docid": "9be2d554f42665fc3ffea7e41037a01b", "score": "0.47129276", "text": "func requiredResourceProperties() []string {\n\treturn []string{\n\t\t\"Name\",\n\t\t\"Properties\",\n\t}\n}", "title": "" }, { "docid": "72e9b49ff8ff62e66855e171c9d52d73", "score": "0.46861637", "text": "func (e *ExtendedResource) Store(resp http.ResponseWriter, req *http.Request) {\n\tbaseID, err := e.resource.ID(req)\n\tif err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tbase := e.resource.model.New()\n\tif err := base.FindByID(baseID); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\titem := e.model.New()\n\tif err := req.Unmarshal(item); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tif err := item.BelongsTo(base); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tif err := item.Validate(); err != nil {\n\t\tresp.WriteErrs(req, err)\n\t\treturn\n\t}\n\n\tif err := item.Save(); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tresp.Status(http.StatusCreated)\n\tresp.WriteFormat(req, item)\n}", "title": "" }, { "docid": "77e3353de7282b2747cf6203b75a7880", "score": "0.4684513", "text": "func AllSpecificRecipes(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tuuid := vars[\"id\"]\n\n\trecipes, err := getAllRecipes(uuid)\n\n\tif err != nil{\n\t\tfmt.Print(err)\n\t\tw.WriteHeader(422)\n\t\treturn\n\t}\n\n\tw.WriteHeader(200)\n\tjson.NewEncoder(w).Encode(recipes)\n\n}", "title": "" }, { "docid": "1cc52e43db6e3a57b4fe4cdce2397387", "score": "0.46754456", "text": "func ResourceMeta(ctx context.Context, ids []*path.ID, after *path.Command, r *path.ResolveConfig) ([]api.Resource, error) {\n\tresources, err := database.Build(ctx, &AllResourceDataResolvable{After: after, Config: r})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tres, ok := resources.(*ResolvedResources)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"Cannot resolve resources at command: %v\", after)\n\t}\n\tvalues := make([]api.Resource, len(ids))\n\tfor i, id := range ids {\n\t\tval, ok := res.resources[id.ID()]\n\t\tif !ok {\n\t\t\treturn nil, fmt.Errorf(\"Could not find resource %v\", id.ID())\n\t\t}\n\t\tvalues[i] = val\n\t}\n\treturn values, nil\n}", "title": "" }, { "docid": "31748e9bc8edb7c5b7424f2b82232265", "score": "0.4666112", "text": "func (self *RawDispatcher) AddResourceSeparate(node *RestNode, name string, wireExample interface{}, index RestIndex,\n\tfind RestFind, post RestPost, put RestPut, del RestDelete) {\n\n\tt := self.validateType(wireExample)\n\tobj := &restObj{\n\t\trestShared: restShared{\n\t\t\ttyp: t,\n\t\t\tname: name,\n\t\t\tindex: index,\n\t\t\tpost: post,\n\t\t},\n\t\tfind: find,\n\t\tdel: del,\n\t\tput: put,\n\t}\n\tnode.Res[strings.ToLower(name)] = obj\n}", "title": "" }, { "docid": "de2dc90b7195f7c698859e180066754e", "score": "0.46624273", "text": "func (r *Resources) Add(more Resources) {\n\tr.CPUs += more.CPUs\n\tr.Memory += more.Memory\n}", "title": "" }, { "docid": "7121e3245133fea85fb4f6dc2fc8aa06", "score": "0.46597478", "text": "func (m *EntitlementManagementResourceRequestsItemCatalogRequestBuilder) Resources()(*EntitlementManagementResourceRequestsItemCatalogResourcesRequestBuilder) {\n return NewEntitlementManagementResourceRequestsItemCatalogResourcesRequestBuilderInternal(m.BaseRequestBuilder.PathParameters, m.BaseRequestBuilder.RequestAdapter)\n}", "title": "" }, { "docid": "2dbdcd889831e9f628c6c825264840ec", "score": "0.46519133", "text": "func (m *ItemOnenoteRequestBuilder) Resources()(*ItemOnenoteResourcesRequestBuilder) {\n return NewItemOnenoteResourcesRequestBuilderInternal(m.BaseRequestBuilder.PathParameters, m.BaseRequestBuilder.RequestAdapter)\n}", "title": "" }, { "docid": "587e33449debf51a5e7214b9d12b80f3", "score": "0.46513447", "text": "func (m *DefaultUserRolePermissions) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "08643ae721ccef86d56a41b746af74b5", "score": "0.46343163", "text": "func (self *RawDispatcher) Resource(name string, wireExample interface{}, r RestAll) {\n\tself.ResourceSeparate(name, wireExample, r, r, r, r, r)\n}", "title": "" }, { "docid": "875dc0f03356910c10399542db3d3fd4", "score": "0.46237823", "text": "func dataSourceExtraPropertyRead(d *schema.ResourceData, meta interface{}) error {\n config := meta.(*PConfig)\n\n platform := d.Get(\"platform\").(string)\n project := d.Get(\"project\").(string)\n solution := d.Get(\"solution\").(string)\n resourcePath := fmt.Sprintf(\"api/v3/%s/projects/%s/solutions/%s/\", platform, project, solution)\n response, err := config.doNormalRequest(platform, resourcePath, \"GET\", nil)\n\n if err != nil {\n return fmt.Errorf(\"Unable to retrieve extra property: %v\", err)\n }\n\n var data map[string]interface{}\n if err = json.Unmarshal([]byte(response), &data); err != nil {\n return err\n }\n\n // remove volume-size & volume-type\n delete(data[\"site_extra_prop\"].(map[string]interface{}), \"volume-size\")\n delete(data[\"site_extra_prop\"].(map[string]interface{}), \"volume-type\")\n return dataSourceExtraPropertyAttributes(d, data)\n}", "title": "" }, { "docid": "52a253fbbf808f50b268abba9b793e5e", "score": "0.4615405", "text": "func (ouo *OrganizationUpdateOne) AddResources(r ...*Resource) *OrganizationUpdateOne {\n\tids := make([]int, len(r))\n\tfor i := range r {\n\t\tids[i] = r[i].ID\n\t}\n\treturn ouo.AddResourceIDs(ids...)\n}", "title": "" }, { "docid": "9d5d1271e93670488d69c433c4bec2b9", "score": "0.4613351", "text": "func Composite(opts ...ResourceOption) ResourceOption {\n\treturn resourceOption(func(ro *resourceOptions) {\n\t\tfor _, o := range opts {\n\t\t\to.applyResourceOption(ro)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "3ec855475caa3c803264f6529f055811", "score": "0.46028242", "text": "func (c *Included) Add(includes ...Resource) {\n\tfor i := range includes {\n\t\tc.add(includes[i])\n\t}\n}", "title": "" }, { "docid": "485bccbf1f3d7508b50dafe5709e2c78", "score": "0.45830068", "text": "func (inv *Invoice) All(queryParams map[string]interface{}, extraHeaders map[string]string) (map[string]interface{}, error) {\n\turl := fmt.Sprintf(\"/%s%s\", constants.VERSION_V1, constants.INVOICE_URL)\n\treturn inv.Request.Get(url, queryParams, extraHeaders)\n}", "title": "" }, { "docid": "d9949d9fb356675f934e1008fc6beee6", "score": "0.4576753", "text": "func (sp *sourceProcessor) processResource(res pdata.Resource) pdata.Resource {\n\tatts := res.Attributes()\n\n\tsp.enrichPodName(&atts)\n\tsp.fillOtherMeta(atts)\n\n\tsp.sourceHostFiller.fillResourceOrUseAnnotation(&atts,\n\t\tsp.annotationAttribute(sourceHostSpecialAnnotation),\n\t\tsp.keys,\n\t)\n\tsp.sourceCategoryFiller.fillResourceOrUseAnnotation(&atts,\n\t\tsp.annotationAttribute(sourceCategorySpecialAnnotation),\n\t\tsp.keys,\n\t)\n\tsp.sourceNameFiller.fillResourceOrUseAnnotation(&atts,\n\t\tsp.annotationAttribute(sourceNameSpecialAnnotation),\n\t\tsp.keys,\n\t)\n\n\treturn res\n}", "title": "" }, { "docid": "a3ef402389b07090bd8dc22a204520bd", "score": "0.45764747", "text": "func Canonical() *schema.Resource {\n\treturn &schema.Resource{\n\t\tCreate: Create,\n\t\tRead: Read,\n\t\tUpdate: Update,\n\t\tDelete: Delete,\n\n\t\tSchema: map[string]*schema.Schema{\n\t\t\t\"resource_name\": &schema.Schema{\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: true,\n\t\t\t},\n\t\t\t\"string1\": &schema.Schema{\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: true,\n\t\t\t},\n\n\t\t\t\"int1\": &schema.Schema{\n\t\t\t\tType: schema.TypeInt,\n\t\t\t\tRequired: true,\n\t\t\t},\n\n\t\t\t\"bool1\": &schema.Schema{\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tRequired: true,\n\t\t\t},\n\t\t\t\"float1\": &schema.Schema{\n\t\t\t\tType: schema.TypeFloat,\n\t\t\t\tRequired: true,\n\t\t\t},\n\t\t\t\"map1\": {\n\t\t\t\tType: schema.TypeMap,\n\t\t\t\tRequired: true,\n\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"set2\": &schema.Schema{\n\t\t\t\tType: schema.TypeSet,\n\t\t\t\tRequired: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\"int2\": {\n\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"string2\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"bool2\": {\n\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"float2\": {\n\t\t\t\t\t\t\tType: schema.TypeFloat,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tMinItems: 1,\n\t\t\t\tMaxItems: 1,\n\t\t\t},\n\t\t\t\"listset3\": &schema.Schema{\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tRequired: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\"int3\": {\n\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"string3\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"bool3\": {\n\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"float3\": {\n\t\t\t\t\t\t\tType: schema.TypeFloat,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tMinItems: 1,\n\t\t\t\tMaxItems: 1,\n\t\t\t},\n\t\t\t\"setnested4\": &schema.Schema{\n\t\t\t\tType: schema.TypeSet,\n\t\t\t\tRequired: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\"int4\": {\n\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"string4\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"bool4\": {\n\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"float4\": {\n\t\t\t\t\t\t\tType: schema.TypeFloat,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"setnested5\": {\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\"int5\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"string5\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"bool5\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"float5\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeFloat,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"setnested6\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\"int6\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"string6\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"bool6\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"float6\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeFloat,\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"listset7\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\"int7\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"string7\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"bool7\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\"float7\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeFloat,\n\t\t\t\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"listset8\": {\n\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\"int8\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"string8\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"bool8\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"float8\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeFloat,\n\t\t\t\t\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tMinItems: 1,\n\t\t\t\tMaxItems: 1,\n\t\t\t},\n\t\t\t\"liststring9\": &schema.Schema{\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tRequired: true,\n\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "0cbee81095911e90f5bf674aa0090142", "score": "0.45763966", "text": "func resourceVolterraSetTGWInfo() *schema.Resource {\n\treturn &schema.Resource{\n\t\tCreate: resourceVolterraSetTGWInfoCreate,\n\t\tRead: resourceVolterraSetTGWInfoRead,\n\t\tUpdate: resourceVolterraSetTGWInfoUpdate,\n\t\tDelete: resourceVolterraSetTGWInfoDelete,\n\n\t\tSchema: map[string]*schema.Schema{\n\t\t\t\"name\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: true,\n\t\t\t},\n\t\t\t\"tgw_id\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: true,\n\t\t\t},\n\t\t\t\"vpc_id\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: true,\n\t\t\t},\n\t\t\t\"subnet_ids\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tRequired: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\"az\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tDeprecated: \"use new_attribute instead\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"outside_subnet_id\": {\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tDeprecated: \"use new_attribute instead\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"inside_subnet_id\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tDeprecated: \"use new_attribute instead\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"workload_subnet_id\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tDeprecated: \"use new_attribute instead\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"outside_subnet\": {\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\"az_name\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"id\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"ipv4_prefix\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"inside_subnet\": {\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\"az_name\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"id\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"ipv4_prefix\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"workload_subnet\": {\n\t\t\t\t\t\t\tType: schema.TypeSet,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\"az_name\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"id\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\"ipv4_prefix\": {\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"public_ips\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tRequired: true,\n\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"private_ips\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tRequired: true,\n\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"direct_connect_info\": {\n\t\t\t\tType: schema.TypeSet,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\"direct_connect_gateway_id\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"vgw_id\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"asn\": {\n\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "182ae67bf9cf27e35cddef1fd11f21c9", "score": "0.45732123", "text": "func (m *EntitiesSummary) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "b4100d00a3a4920d82959bb4441c52ad", "score": "0.45707434", "text": "func (a *API) Resources() []api.Resource {\n\tresources := make([]api.Resource, len(a.resources))\n\n\tfor i, res := range a.resources {\n\t\tresources[i] = res\n\t}\n\n\treturn resources\n}", "title": "" }, { "docid": "5af229168a8bdbc805137353905b9c8a", "score": "0.45679858", "text": "func (i *IDrac9) Resources() []string {\n\treturn []string{\n\t\t\"user\",\n\t\t\"syslog\",\n\t\t\"network\",\n\t\t\"ntp\",\n\t\t\"ldap\",\n\t\t\"ldap_group\",\n\t\t\"bios\",\n\t\t\"https_cert\",\n\t}\n}", "title": "" }, { "docid": "3a14e195e697c9efb8d25fc4502dc82c", "score": "0.45638826", "text": "func (r *Resource) inheritResourceType(resourceTypes map[string]ResourceType, apiDef *APIDefinition) error {\n\t// get resource type object to inherit\n\trt, err := r.getResourceType(resourceTypes)\n\tif rt == nil || err != nil {\n\t\treturn err\n\t}\n\n\t// initialize dicts\n\tdicts := initResourceTypeDicts(r, r.Type.Parameters)\n\n\tr.Description = substituteParams(r.Description, rt.Description, dicts)\n\n\t// uri parameters\n\tif len(r.URIParameters) == 0 {\n\t\tr.URIParameters = map[string]NamedParameter{}\n\t}\n\tfor name, up := range rt.URIParameters {\n\t\tp, ok := r.URIParameters[name]\n\t\tif !ok {\n\t\t\tp = NamedParameter{}\n\t\t}\n\t\tp.inherit(up, dicts)\n\t\tr.URIParameters[name] = p\n\t}\n\n\t// methods\n\tr.inheritMethods(rt, apiDef)\n\n\treturn nil\n}", "title": "" }, { "docid": "8e95710b2facbc7e70d12e0e29acee68", "score": "0.45530227", "text": "func (r *crudResourceWrapper) Wrapped() controller.Resource {\n\treturn r.resource\n}", "title": "" }, { "docid": "e2f611c16749140f5a8cce9c4d000302", "score": "0.4538963", "text": "func (a *EventsAPIInstaller) restMapping() (*meta.RESTMapping, error) {\n\t// subresources must have parent resources, and follow the namespacing rules of their parent.\n\t// So get the storage of the resource (which is the parent resource in case of subresources)\n\tfqKindToRegister, err := a.getResourceKind(a.group.DynamicStorage)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to locate fully qualified kind for mapper resource for dynamic storage: %v\", err)\n\t}\n\treturn a.group.Mapper.RESTMapping(fqKindToRegister.GroupKind(), fqKindToRegister.Version)\n}", "title": "" }, { "docid": "55ce858a9128542f7b5dc4a4bb5112dd", "score": "0.45385632", "text": "func (r *ServiceAPIResource) Marshal() ([]byte, error) {\n\treturn json.Marshal(&r.a)\n}", "title": "" }, { "docid": "6f1fa306bcf228da3719729c50f4a2d7", "score": "0.45356238", "text": "func (AmazonVpc) RestObjects() map[string]sophos.RestObject { return defsAmazonVpc }", "title": "" }, { "docid": "d053da828823feaae0ffc7be533bb915", "score": "0.45304057", "text": "func (Network) RestObjects() map[string]sophos.RestObject { return defsNetwork }", "title": "" }, { "docid": "ce7cdcc78eb8d6e361310c83fb6d2b03", "score": "0.4527979", "text": "func (s ResourceMetadata) MarshalFields(e protocol.FieldEncoder) error {\n\tif s.Id != nil {\n\t\tv := *s.Id\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"Id\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.Name != nil {\n\t\tv := *s.Name\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"Name\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.OriginalName != nil {\n\t\tv := *s.OriginalName\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"OriginalName\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.Owner != nil {\n\t\tv := s.Owner\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"Owner\", v, metadata)\n\t}\n\tif s.ParentId != nil {\n\t\tv := *s.ParentId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"ParentId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif len(s.Type) > 0 {\n\t\tv := s.Type\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"Type\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif s.VersionId != nil {\n\t\tv := *s.VersionId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"VersionId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ce7cdcc78eb8d6e361310c83fb6d2b03", "score": "0.4527979", "text": "func (s ResourceMetadata) MarshalFields(e protocol.FieldEncoder) error {\n\tif s.Id != nil {\n\t\tv := *s.Id\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"Id\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.Name != nil {\n\t\tv := *s.Name\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"Name\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.OriginalName != nil {\n\t\tv := *s.OriginalName\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"OriginalName\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.Owner != nil {\n\t\tv := s.Owner\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"Owner\", v, metadata)\n\t}\n\tif s.ParentId != nil {\n\t\tv := *s.ParentId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"ParentId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif len(s.Type) > 0 {\n\t\tv := s.Type\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"Type\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif s.VersionId != nil {\n\t\tv := *s.VersionId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"VersionId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "750505aad9859373ce271d6a49c186e2", "score": "0.45217675", "text": "func (a CoreAttribute) SubAttributes() Attributes {\n\treturn a.subAttributes\n}", "title": "" }, { "docid": "9ff1e2afd9aea2533735b12daa01a787", "score": "0.4520949", "text": "func (_ *CollectionGorm) Resource(h GormHandlers, db *gorm.DB, p gin.Params) (interface{}, error) {\n\trtype, _ := h.ResourceClass()\n\n\tres := reflect.New(reflect.SliceOf(rtype)).Interface()\n\tif err := db.Find(res).Error; err != nil {\n\t\treturn nil, err\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "796893880c2876a4d716fddae15ad3e9", "score": "0.4512817", "text": "func (c *Credentials) Attributes() map[string]interface{} {\n\treturn c.attributes\n}", "title": "" }, { "docid": "5efede0672fd1761acfc28b72fb89c28", "score": "0.45121074", "text": "func (r *RDS) Resources() ([]types.Any, error) {\n\tingress_http, err := proto.Marshal(&v2.RouteConfiguration{\n\t\tName: \"ingress_http\", // TODO(dfc) matches LDS configuration?\n\t\tVirtualHosts: r.HTTP.Values(),\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tingress_https, err := proto.Marshal(&v2.RouteConfiguration{\n\n\t\tName: \"ingress_https\", // TODO(dfc) matches LDS configuration?\n\t\tVirtualHosts: r.HTTPS.Values(),\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn []types.Any{{\n\t\tTypeUrl: r.TypeURL(), Value: ingress_http,\n\t}, {\n\t\tTypeUrl: r.TypeURL(), Value: ingress_https,\n\t}}, nil\n}", "title": "" }, { "docid": "d6881776d93e8e63f33a108924c5ca76", "score": "0.45083", "text": "func (g GenericResourceExpanded) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulateTimeRFC3339(objectMap, \"changedTime\", g.ChangedTime)\n\tpopulateTimeRFC3339(objectMap, \"createdTime\", g.CreatedTime)\n\tpopulate(objectMap, \"id\", g.ID)\n\tpopulate(objectMap, \"identity\", g.Identity)\n\tpopulate(objectMap, \"kind\", g.Kind)\n\tpopulate(objectMap, \"location\", g.Location)\n\tpopulate(objectMap, \"managedBy\", g.ManagedBy)\n\tpopulate(objectMap, \"name\", g.Name)\n\tpopulate(objectMap, \"plan\", g.Plan)\n\tpopulate(objectMap, \"properties\", &g.Properties)\n\tpopulate(objectMap, \"provisioningState\", g.ProvisioningState)\n\tpopulate(objectMap, \"sku\", g.SKU)\n\tpopulate(objectMap, \"tags\", g.Tags)\n\tpopulate(objectMap, \"type\", g.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "7afc42e077a30ead483444b4271dac7d", "score": "0.45077437", "text": "func (m *RelatedContact) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "84dc53ee6e4116e04eec9d2fe20d41a9", "score": "0.4502622", "text": "func (m *M1000e) Resources() []string {\n\treturn []string{\n\t\t\"user\",\n\t\t\"syslog\",\n\t\t\"ntp\",\n\t\t\"ldap\",\n\t\t\"ldap_group\",\n\t\t//\"ssl\",\n\t}\n}", "title": "" }, { "docid": "e4b889e0e8aa7ad9dc3bf24e9aed6d4c", "score": "0.45007017", "text": "func (d *Directory) FetchAttributes() error {\n\theaders, err := d.fsc.getResourceHeaders(d.buildPath(), compNone, resourceDirectory, http.MethodHead)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\td.updateEtagAndLastModified(headers)\n\td.Metadata = getMetadataFromHeaders(headers)\n\n\treturn nil\n}", "title": "" }, { "docid": "13cbb2c9b9cbadbe13f296a7d12de8c6", "score": "0.44998944", "text": "func resourceAPIKey() *schema.Resource {\n\treturn &schema.Resource{\n\t\tCreate: resourceAPIKeyCreate,\n\t\tRead: resourceAPIKeyRead,\n\t\tUpdate: resourceAPIKeyUpdate,\n\t\tDelete: resourceAPIKeyDelete,\n\n\t\tImporter: &schema.ResourceImporter{\n\t\t\tState: schema.ImportStatePassthrough,\n\t\t},\n\n\t\tCustomizeDiff: customdiff.All(),\n\n\t\t// Naming is according to the names used in the offical Golang\n\t\t// client for Algolia\n\t\t// See: https://www.algolia.com/doc/api-reference/api-methods/add-api-key/\n\t\tSchema: map[string]*schema.Schema{\n\t\t\t// Required Input\n\t\t\t\"indexes\": &schema.Schema{\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t},\n\t\t\t\tRequired: true,\n\t\t\t\tDescription: \"List of target indexes. Supports the wildcard syntax.\",\n\t\t\t},\n\t\t\t\"acl\": &schema.Schema{\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t},\n\t\t\t\tRequired: true,\n\t\t\t\tDescription: \"List of permissions associated with this key.\",\n\t\t\t},\n\n\t\t\t// Optional Input\n\t\t\t\"description\": &schema.Schema{\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: false,\n\t\t\t\tOptional: true,\n\t\t\t\tDefault: \"\",\n\t\t\t\tDescription: \"Description of this key. Informative only.\",\n\t\t\t},\n\t\t\t\"validity\": &schema.Schema{\n\t\t\t\tType: schema.TypeInt,\n\t\t\t\tRequired: false,\n\t\t\t\tOptional: true,\n\t\t\t\tDefault: 0,\n\t\t\t\tDescription: \"A Unix timestamp used to define the expiration date of this key.\",\n\t\t\t},\n\t\t\t\"max_queries_per_ip_per_hour\": &schema.Schema{\n\t\t\t\tType: schema.TypeInt,\n\t\t\t\tRequired: false,\n\t\t\t\tOptional: true,\n\t\t\t\tDefault: 0,\n\t\t\t\tDescription: \"Specify the maximum number of API calls allowed from an IP address per hour. 0 = unlimited.\",\n\t\t\t},\n\t\t\t\"max_hits_per_query\": &schema.Schema{\n\t\t\t\tType: schema.TypeInt,\n\t\t\t\tRequired: false,\n\t\t\t\tOptional: true,\n\t\t\t\tDefault: 0,\n\t\t\t\tDescription: \"Specify the maximum number of hits this key can retrieve in one call. 0 = unlimited.\",\n\t\t\t},\n\n\t\t\t// Output\n\t\t\t\"key\": &schema.Schema{\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tComputed: true,\n\t\t\t\tDescription: \"API key that was created.\",\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "bb94316d48e2395d40d735e90be9d958", "score": "0.44954944", "text": "func Meta(target interface{}) RequestResource {\n\treturn func(w *wrapper) {\n\t\tw.addResource(\"meta\", target)\n\t}\n}", "title": "" }, { "docid": "e3955770aac9071750f4b032b0ce08b0", "score": "0.44914302", "text": "func (self *RawDispatcher) ResourceSeparate(name string, wireExample interface{}, index RestIndex,\n\tfind RestFind, post RestPost, put RestPut, del RestDelete) {\n\tself.AddResourceSeparate(self.Root, name, wireExample, index, find, post, put, del)\n}", "title": "" }, { "docid": "224b2f8a1815188aadc9961d17179430", "score": "0.4490705", "text": "func (a AaddsResourceDetails) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"domainName\", a.DomainName)\n\tpopulate(objectMap, \"initialSyncComplete\", a.InitialSyncComplete)\n\tpopulate(objectMap, \"ldapsEnabled\", a.LdapsEnabled)\n\tpopulate(objectMap, \"ldapsPublicCertificateInBase64\", a.LdapsPublicCertificateInBase64)\n\tpopulate(objectMap, \"resourceId\", a.ResourceID)\n\tpopulate(objectMap, \"subnetId\", a.SubnetID)\n\tpopulate(objectMap, \"tenantId\", a.TenantID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "cc9b97837f03a1be53bfa762d82a2325", "score": "0.44856733", "text": "func (m *MemoryStore) AutoResource(r *huma.Resource, dataStructure interface{}, options ...Option) *huma.Resource {\n\t// Validate input structure for ID and other fields\n\ttyp := reflect.TypeOf(dataStructure)\n\tif typ.Kind() == reflect.Ptr {\n\t\ttyp = typ.Elem()\n\t}\n\n\tm.validate(typ)\n\n\t// Setup defaults and then process any passed options.\n\tparts := strings.Split(r.Path(), \"/\")\n\tname := strings.ToLower(parts[len(parts)-1])\n\tcfg := &config{\n\t\tsingle: strings.TrimRight(name, \"s\"),\n\t\tplural: name,\n\t}\n\n\tfor _, option := range options {\n\t\toption(cfg)\n\t}\n\n\t// Figure out default summary fields\n\t// TODO... get from struct tags or via passed option? For now default to\n\t// the most useful fields to identify the object.\n\tsummaryFields := []string{\"id\", \"modified\", \"etag\"}\n\n\t// Collection name is based on the current path.\n\tcollectionName := slug.Make(r.Path())\n\n\t// Get a schema from the internal model (struct).\n\trs, _ := schema.GenerateWithMode(typ, schema.ModeRead, nil)\n\tws, _ := schema.GenerateWithMode(typ, schema.ModeWrite, nil)\n\n\t// Remove any existing path params from the external model. These will still\n\t// get set in the data store and hooks can read them, but we don't send\n\t// them over the wire.\n\tfor _, p := range r.PathParams() {\n\t\trs.RemoveProperty(p)\n\t\tws.RemoveProperty(p)\n\t}\n\n\tli, _ := copystructure.Copy(rs)\n\tlistItem := li.(*schema.Schema)\n\n\tpropModified := false\n\tpropETag := false\n\tfor name := range listItem.Properties {\n\t\tswitch name {\n\t\tcase \"modified\":\n\t\t\tpropModified = true\n\t\tcase \"etag\":\n\t\t\tpropETag = true\n\t\t}\n\t}\n\n\tif !propModified {\n\t\tlistItem.Properties[\"modified\"] = &schema.Schema{\n\t\t\tType: \"string\",\n\t\t\tFormat: \"date-time\",\n\t\t\tDescription: \"Last modified datetime as ISO8601\",\n\t\t}\n\t}\n\n\tif !propETag {\n\t\tlistItem.Properties[\"etag\"] = &schema.Schema{\n\t\t\tType: \"string\",\n\t\t\tDescription: \"Computed content hash\",\n\t\t}\n\t}\n\n\t// TODO: recursively make everything optional\n\tlistItem.Required = []string{}\n\n\tr.With(\n\t\t// TODO: filters?\n\t\thuma.QueryParam(\"fields\", \"List of fields to include\", summaryFields),\n\t\t// TODO: pagination\n\t\thuma.ResponseJSON(http.StatusOK, \"Success\", huma.Schema(schema.Schema{\n\t\t\tType: \"array\",\n\t\t\tItems: listItem,\n\t\t})),\n\t).List(\"List \"+cfg.plural, huma.UnsafeHandler(func(inputs ...interface{}) []interface{} {\n\t\ti := len(r.PathParams())\n\t\tfields := inputs[i].([]string)\n\n\t\titems := make([]interface{}, 0)\n\t\tc := m.collection(collectionName)\n\n\t\tc.Range(func(key, value interface{}) bool {\n\t\t\titem := make(map[string]interface{})\n\n\t\t\t// TODO: JSON-path style field selection for nested objects\n\t\t\tfor _, field := range fields {\n\t\t\t\titem[field] = value.(map[string]interface{})[field]\n\t\t\t}\n\n\t\t\titems = append(items, item)\n\t\t\treturn true\n\t\t})\n\n\t\treturn []interface{}{items}\n\t}))\n\n\titem := r.With(huma.PathParam(cfg.single+\"Id\", \"Item ID\"))\n\trs.RemoveProperty(\"id\")\n\tws.RemoveProperty(\"id\")\n\n\titem.With(\n\t\thuma.HeaderParam(\"if-none-match\", \"ETag-based conditional get\", \"\"),\n\t\thuma.HeaderParam(\"if-modified-since\", \"Only return if modified\", time.Time{}),\n\t\thuma.ResponseHeader(\"last-modified\", \"Last modified date/time\"),\n\t\thuma.ResponseHeader(\"etag\", \"Etag content hash\"),\n\t\thuma.ResponseError(http.StatusNotFound, \"Not found\"),\n\t\thuma.Response(http.StatusNotModified, \"Not modified\", huma.Headers(\"last-modified\", \"etag\")),\n\t\thuma.ResponseJSON(http.StatusOK, \"Success\", huma.Schema(*rs), huma.Headers(\"last-modified\", \"etag\")),\n\t).Get(\"Get a \"+cfg.single, huma.UnsafeHandler(func(inputs ...interface{}) []interface{} {\n\t\ti := len(r.PathParams())\n\t\tid := inputs[i].(string)\n\t\tifNoneMatch := inputs[i+1].(string)\n\t\tifModified := inputs[i+2].(time.Time)\n\n\t\tvar lastModified string\n\t\tvar etag string\n\t\tvar error404 *huma.ErrorModel\n\t\tvar notModified bool\n\t\tvar item interface{}\n\n\t\tc := m.collection(collectionName)\n\n\t\t// TODO: compute composite ID from any previous path params.\n\t\tloaded, ok := c.Load(id)\n\t\tif !ok {\n\t\t\terror404 = &huma.ErrorModel{\n\t\t\t\tDetail: cfg.single + \" not found with ID: \" + id,\n\t\t\t}\n\t\t\treturn []interface{}{lastModified, etag, error404, notModified, item}\n\t\t}\n\n\t\t// Copy the data to return (except id/headers)\n\t\titemMap := loaded.(map[string]interface{})\n\n\t\t// Set headers\n\t\tlastModified = itemMap[\"modified\"].(time.Time).Format(http.TimeFormat)\n\t\tetag = `W/\"` + itemMap[\"etag\"].(string) + `\"`\n\n\t\tif err := checkConditionals(itemMap, \"\", ifNoneMatch, time.Time{}, ifModified); err != nil {\n\t\t\tnotModified = true\n\t\t\treturn []interface{}{lastModified, etag, error404, notModified, item}\n\t\t}\n\n\t\t// Create the response structure.\n\t\tret := make(map[string]interface{})\n\t\tfor k, v := range itemMap {\n\t\t\tif k == \"id\" || k == \"modified\" || k == \"etag\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tret[k] = v\n\t\t}\n\t\titem = ret\n\n\t\treturn []interface{}{lastModified, etag, error404, notModified, item}\n\t}))\n\n\titem.With(\n\t\thuma.HeaderParam(\"if-match\", \"Etag-based conditional update\", \"\"),\n\t\thuma.HeaderParam(\"if-none-match\", \"Etag-based conditional update. Use `*` to mean any possible value.\", \"\"),\n\t\thuma.HeaderParam(\"if-unmodified-since\", \"Date-based conditional update\", time.Time{}),\n\t\thuma.RequestSchema(ws),\n\t\thuma.ResponseHeader(\"last-modified\", \"Last modified date/time\"),\n\t\thuma.ResponseHeader(\"etag\", \"Etag content hash\"),\n\t\thuma.ResponseJSON(http.StatusPreconditionFailed, \"Conditional update failed\"),\n\t\thuma.Response(http.StatusNoContent, \"Success\", huma.Headers(\"last-modified\", \"etag\")),\n\t).Put(\"Create or update \"+cfg.single, huma.UnsafeHandler(func(inputs ...interface{}) []interface{} {\n\t\ti := len(r.PathParams())\n\t\tid := inputs[i].(string)\n\t\tifMatch := inputs[i+1].(string)\n\t\tifNoneMatch := inputs[i+2].(string)\n\t\tifUnmodified := inputs[i+3].(time.Time)\n\t\titem := inputs[i+4].(map[string]interface{})\n\n\t\tvar lastModified string\n\t\tvar etag string\n\t\tvar errorPrecondition *huma.ErrorModel\n\t\tvar success bool\n\n\t\tif _, ok := dataStructure.(createHook); ok {\n\t\t\tt := reflect.TypeOf(dataStructure)\n\t\t\tif t.Kind() == reflect.Ptr {\n\t\t\t\tt = t.Elem()\n\t\t\t}\n\t\t\ttmp := reflect.New(t).Interface()\n\t\t\tmapstructure.Decode(item, &tmp)\n\t\t\ttmp.(createHook).OnCreate()\n\t\t\tfillMap(tmp, item)\n\t\t}\n\n\t\tc := m.collection(collectionName)\n\n\t\tif ifMatch != \"\" || ifNoneMatch != \"\" || !ifUnmodified.IsZero() {\n\t\t\tm.mu.Lock()\n\t\t\tdefer m.mu.Unlock()\n\t\t\tvar existing map[string]interface{}\n\t\t\tif e, ok := c.Load(id); ok {\n\t\t\t\texisting = e.(map[string]interface{})\n\t\t\t}\n\t\t\tif err := checkConditionals(existing, ifMatch, ifNoneMatch, ifUnmodified, time.Time{}); err != nil {\n\t\t\t\terrorPrecondition = &huma.ErrorModel{\n\t\t\t\t\tDetail: err.Error(),\n\t\t\t\t}\n\t\t\t\treturn []interface{}{lastModified, etag, errorPrecondition, success}\n\t\t\t}\n\t\t}\n\n\t\t// Set the ID from the path parameter\n\t\titem[\"id\"] = id\n\n\t\t// Generate an etag hash.\n\t\tencoded, _ := json.Marshal(item)\n\t\tsum := sha1.Sum(encoded)\n\t\tnewETag := base64.RawURLEncoding.EncodeToString(sum[:])\n\n\t\t// Update modified time & etag hash\n\t\titem[\"modified\"] = time.Now().UTC()\n\t\titem[\"etag\"] = newETag\n\n\t\tc.Store(id, item)\n\n\t\tlastModified = item[\"modified\"].(time.Time).Format(http.TimeFormat)\n\t\tetag = `W/\"` + newETag + `\"`\n\t\tsuccess = true\n\t\treturn []interface{}{lastModified, etag, errorPrecondition, success}\n\t}))\n\n\t// TODO: patch\n\n\titem.With(\n\t\thuma.HeaderParam(\"if-match\", \"Etag-based conditional update header\", \"\"),\n\t\thuma.HeaderParam(\"if-unmodified-since\", \"Date-based conditional update\", time.Time{}),\n\t\thuma.ResponseError(http.StatusNotFound, cfg.single+\" not found\"),\n\t\thuma.ResponseError(http.StatusPreconditionFailed, \"Conditional delete failed\"),\n\t\thuma.Response(http.StatusNoContent, \"Success\"),\n\t).Delete(\"Delete a \"+cfg.single, huma.UnsafeHandler(func(inputs ...interface{}) []interface{} {\n\t\ti := len(r.PathParams())\n\t\tid := inputs[i].(string)\n\t\tifMatch := inputs[i+1].(string)\n\t\tifUnmodified := inputs[i+2].(time.Time)\n\n\t\tvar error404 *huma.ErrorModel\n\t\tvar errorEtag *huma.ErrorModel\n\t\tvar success bool\n\n\t\tc := m.collection(collectionName)\n\n\t\tm.mu.Lock()\n\t\tdefer m.mu.Unlock()\n\t\titem, ok := c.Load(id)\n\n\t\tif !ok {\n\t\t\terror404 = &huma.ErrorModel{\n\t\t\t\tDetail: fmt.Sprintf(\"%s not found: %s\", cfg.single, id),\n\t\t\t}\n\t\t\treturn []interface{}{error404, errorEtag, success}\n\t\t}\n\n\t\tif err := checkConditionals(item.(map[string]interface{}), ifMatch, \"\", ifUnmodified, time.Time{}); err != nil {\n\t\t\terrorEtag = &huma.ErrorModel{\n\t\t\t\tDetail: err.Error(),\n\t\t\t}\n\t\t\treturn []interface{}{error404, errorEtag, success}\n\t\t}\n\n\t\tc.Delete(id)\n\t\tsuccess = true\n\t\treturn []interface{}{error404, errorEtag, success}\n\t}))\n\n\treturn item\n}", "title": "" }, { "docid": "d594f035f1d6525870fc7ac934001791", "score": "0.44781154", "text": "func (m *SpaApplication) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "854b89b6ebbf6b649e1ec2f1f2bca0b4", "score": "0.44751027", "text": "func (m *ConditionalAccessUsers) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "e0f79b70b1e72ae5fc395500d10859e1", "score": "0.44698533", "text": "func resourceLdapObjectCustomizeDiffFunc(diff *schema.ResourceDiff, meta interface{}) error {\n\to, n := diff.GetChange(\"attributes\")\n\toList := o.(*schema.Set).List()\n\tnList := n.(*schema.Set).List()\n\n\tlog.Printf(\"[DEBUG] Change %+v --> %+v\", oList, nList)\n\n\t// Calculate Map for As\n\tAsAttributes, _ := readAttributes(meta, diff.Get(\"dn\").(string))\n\tlog.Printf(\"[DEBUG] As Attributes: %+v\", AsAttributes)\n\tAsMd5HashAttributes := convertAttributesListToString(AsAttributes)\n\tAsMd5HashAttributesMap := convertAttributesStringToMap(AsMd5HashAttributes)\n\tlog.Printf(\"[DEBUG] As Hash: %+v\", AsMd5HashAttributesMap)\n\n\t// Calculate Map for An\n\tAnMd5HashAttributes := convertAttributesListToString(nList)\n\tAnMd5HashAttributesMap := convertAttributesStringToMap(AnMd5HashAttributes)\n\tlog.Printf(\"[DEBUG] An Hash: %+v\", AnMd5HashAttributesMap)\n\n\t// Calculate Map for Ao\n\tAoMd5HashAttributes := diff.Get(\"attributes_hash\").(string)\n\tAoMd5HashAttributesMap := convertAttributesStringToMap(AoMd5HashAttributes)\n\tlog.Printf(\"[DEBUG] Ao Hash: %+v\", AoMd5HashAttributesMap)\n\n\tfor _, k := range diff.GetChangedKeysPrefix(\"attributes\") {\n\t\tif strings.HasSuffix(k, \".#\") {\n\t\t\tk = strings.TrimSuffix(k, \".#\")\n\t\t}\n\t\tlog.Printf(\"[DEBUG] Subkey %v processing ...\", k)\n\t\tif k == \"attributes\" {\n\t\t\tcontinue\n\t\t}\n\t\tif strings.HasSuffix(k, \"%\") {\n\t\t\tcontinue\n\t\t}\n\n\t\tow, nw := diff.GetChange(k)\n\t\tlog.Printf(\"[DEBUG] Subkey Change %+v --> %+v\", nw, ow)\n\t\tif ow == nw {\n\t\t\tcontinue\n\t\t}\n\n\t\tif strings.Contains(k, \".\") {\n\t\t\tkeyList := strings.Split(k, \".\")\n\t\t\tsimpleKey := keyList[len(keyList)-1]\n\n\t\t\tlog.Printf(\"[DEBUG] Subkey diff %v, %v\", AnMd5HashAttributesMap[simpleKey], AsMd5HashAttributesMap[simpleKey])\n\n\t\t\t// An and As are aligned\n\t\t\tif AnMd5HashAttributesMap[simpleKey] == AsMd5HashAttributesMap[simpleKey] {\n\t\t\t\tlog.Printf(\"[DEBUG] Subkey %v: clearing (Same value on server)\", k)\n\t\t\t\treturn diff.Clear(k)\n\t\t\t}\n\n\t\t\t// An and Ao do not manage an attribute that is managed on server As\n\t\t\tAnExists := true\n\t\t\tAoExists := true\n\t\t\tif _, ok := AnMd5HashAttributesMap[simpleKey]; !ok {\n\t\t\t\tAnExists = false\n\t\t\t}\n\t\t\tif _, ok := AoMd5HashAttributesMap[simpleKey]; !ok {\n\t\t\t\tAoExists = false\n\t\t\t}\n\t\t\tif !AnExists && !AoExists {\n\t\t\t\tlog.Printf(\"[DEBUG] Subkey %v: clearing (The diff is on server but not locally managed)\", k)\n\t\t\t\treturn diff.Clear(k)\n\t\t\t}\n\n\t\t\tlog.Printf(\"[DEBUG] Subkey %v: keeping\", k)\n\t\t}\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "350da18f7173aeebe7a14314e30958d6", "score": "0.44661918", "text": "func resourceMAASInstance() *schema.Resource { // nolint: funlen\n\tlog.Println(\"[DEBUG] [resourceMAASInstance] Initializing data structure\")\n\treturn &schema.Resource{\n\t\tCreate: resourceMAASInstanceCreate,\n\t\tRead: resourceMAASInstanceRead,\n\t\tUpdate: resourceMAASInstanceUpdate,\n\t\tDelete: resourceMAASInstanceDelete,\n\n\t\tSchemaVersion: 1, // nolint: gomnd\n\n\t\tSchema: map[string]*schema.Schema{\n\t\t\t\"architecture\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"boot_type\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"cpu_count\": {\n\t\t\t\tType: schema.TypeInt,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"disable_ipv4\": {\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"distro_series\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"hostname\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"deploy_hostname\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"deploy_tags\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t\tElem: &schema.Schema{Type: schema.TypeString},\n\t\t\t},\n\n\t\t\t\"tags\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t\tElem: &schema.Schema{Type: schema.TypeString},\n\t\t\t},\n\n\t\t\t\"release_erase\": {\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: false,\n\t\t\t\tDefault: true,\n\t\t\t},\n\n\t\t\t\"release_erase_secure\": {\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: false,\n\t\t\t\tDefault: false,\n\t\t\t},\n\n\t\t\t\"release_erase_quick\": {\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: false,\n\t\t\t\tDefault: false,\n\t\t\t},\n\n\t\t\t\"install_kvm\": {\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: false,\n\t\t\t\tDefault: false,\n\t\t\t},\n\n\t\t\t\"install_rackd\": {\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: false,\n\t\t\t\tDefault: false,\n\t\t\t},\n\n\t\t\t\"ip_addresses\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t\tElem: &schema.Schema{Type: schema.TypeString},\n\t\t\t},\n\n\t\t\t\"macaddress_set\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\"mac_address\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tForceNew: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"resource_uri\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tForceNew: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\n\t\t\t\"memory\": {\n\t\t\t\tType: schema.TypeInt,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"netboot\": {\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"osystem\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"owner\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"physicalblockdevice_set\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\"block_size\": {\n\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"id\": {\n\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"id_path\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"model\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"path\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"serial\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"size\": {\n\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"tags\": {\n\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\tElem: &schema.Schema{Type: schema.TypeString},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\n\t\t\t\"power_state\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"power_type\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"pxe_mac\": {\n\t\t\t\tType: schema.TypeSet,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\"mac_address\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"resource_uri\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\n\t\t\t\"resource_uri\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"routers\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Schema{Type: schema.TypeString},\n\t\t\t},\n\n\t\t\t\"status\": {\n\t\t\t\tType: schema.TypeInt,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"storage\": {\n\t\t\t\tType: schema.TypeInt,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"swap_size\": {\n\t\t\t\tType: schema.TypeInt,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"system_id\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"tag_names\": {\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Schema{Type: schema.TypeString},\n\t\t\t},\n\n\t\t\t\"zone\": {\n\t\t\t\tType: schema.TypeSet,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\"description\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"resource_uri\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\n\t\t\t\"user_data\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t\tStateFunc: func(v interface{}) string {\n\t\t\t\t\tswitch val := v.(type) {\n\t\t\t\t\tcase string:\n\t\t\t\t\t\thash := sha1.Sum([]byte(val)) // nolint: gosec\n\t\t\t\t\t\treturn hex.EncodeToString(hash[:])\n\t\t\t\t\tdefault:\n\t\t\t\t\t\treturn \"\"\n\t\t\t\t\t}\n\t\t\t\t},\n\t\t\t},\n\n\t\t\t\"hwe_kernel\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"comment\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "b04fe3426fba84e4d20ef0d9b49f9c81", "score": "0.4466088", "text": "func Include(include string) RequestResource {\n\treturn queryParameter(\"include\", include, \",\")\n}", "title": "" }, { "docid": "24a60b3b4808f0ee653169db3eae9f8b", "score": "0.4459442", "text": "func (s GetResourcesInput) MarshalFields(e protocol.FieldEncoder) error {\n\te.SetValue(protocol.HeaderTarget, \"Content-Type\", protocol.StringValue(\"application/json\"), protocol.Metadata{})\n\n\tif s.AuthenticationToken != nil {\n\t\tv := *s.AuthenticationToken\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.HeaderTarget, \"Authentication\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif len(s.CollectionType) > 0 {\n\t\tv := s.CollectionType\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.QueryTarget, \"collectionType\", protocol.QuotedValue{ValueMarshaler: v}, metadata)\n\t}\n\tif s.Limit != nil {\n\t\tv := *s.Limit\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.QueryTarget, \"limit\", protocol.Int64Value(v), metadata)\n\t}\n\tif s.Marker != nil {\n\t\tv := *s.Marker\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.QueryTarget, \"marker\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.UserId != nil {\n\t\tv := *s.UserId\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.QueryTarget, \"userId\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "68383b8949edffc5c48b1f4e3b9f0fe0", "score": "0.4458514", "text": "func GetAllTradeInstanceResource(query map[string]string, fields []string, sortby []string, order []string,\n\toffset int64, limit int64) (ml []interface{}, err error) {\n\to := orm.NewOrm()\n\tqs := o.QueryTable(new(TradeInstanceResource))\n\t// query k=v\n\tfor k, v := range query {\n\t\t// rewrite dot-notation to Object__Attribute\n\t\tk = strings.Replace(k, \".\", \"__\", -1)\n\t\tif strings.Contains(k, \"isnull\") {\n\t\t\tqs = qs.Filter(k, (v == \"true\" || v == \"1\"))\n\t\t} else {\n\t\t\tqs = qs.Filter(k, v)\n\t\t}\n\t}\n\t// order by:\n\tvar sortFields []string\n\tif len(sortby) != 0 {\n\t\tif len(sortby) == len(order) {\n\t\t\t// 1) for each sort field, there is an associated order\n\t\t\tfor i, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[i] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[i] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"Error: Invalid order. Must be either [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t\tqs = qs.OrderBy(sortFields...)\n\t\t} else if len(sortby) != len(order) && len(order) == 1 {\n\t\t\t// 2) there is exactly one order, all the sorted fields will be sorted by this order\n\t\t\tfor _, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[0] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[0] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"Error: Invalid order. Must be either [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t} else if len(sortby) != len(order) && len(order) != 1 {\n\t\t\treturn nil, errors.New(\"Error: 'sortby', 'order' sizes mismatch or 'order' size is not 1\")\n\t\t}\n\t} else {\n\t\tif len(order) != 0 {\n\t\t\treturn nil, errors.New(\"Error: unused 'order' fields\")\n\t\t}\n\t}\n\n\tvar l []TradeInstanceResource\n\tqs = qs.OrderBy(sortFields...)\n\tif _, err = qs.Limit(limit, offset).All(&l, fields...); err == nil {\n\t\tif len(fields) == 0 {\n\t\t\tfor _, v := range l {\n\t\t\t\tml = append(ml, v)\n\t\t\t}\n\t\t} else {\n\t\t\t// trim unused fields\n\t\t\tfor _, v := range l {\n\t\t\t\tm := make(map[string]interface{})\n\t\t\t\tval := reflect.ValueOf(v)\n\t\t\t\tfor _, fname := range fields {\n\t\t\t\t\tm[fname] = val.FieldByName(fname).Interface()\n\t\t\t\t}\n\t\t\t\tml = append(ml, m)\n\t\t\t}\n\t\t}\n\t\treturn ml, nil\n\t}\n\treturn nil, err\n}", "title": "" }, { "docid": "3f3b362f0e6e0be983a802b3fb86752a", "score": "0.44573805", "text": "func extraAllAccessPerms(orgId platform.ID) []influxdb.Permission {\n\tperms := extraPerms()\n\tfor i := range perms {\n\t\tperms[i].Resource.OrgID = &orgId\n\t}\n\treturn perms\n}", "title": "" }, { "docid": "52d9f8f5f2300d64db607665ca3c7d2f", "score": "0.44564265", "text": "func (r *Resource) inheritMethods(rt *ResourceType, apiDef *APIDefinition) {\n\t// inherit all methods from resource type\n\t// if it doesn't have the methods, we create it\n\tfor _, rtm := range rt.methods {\n\t\tm := r.MethodByName(rtm.Name)\n\t\tif m == nil {\n\t\t\tm = newMethod(rtm.Name)\n\t\t\tr.assignMethod(m, m.Name)\n\t\t}\n\t\tm.resourceTypeName = r.Type.Name\n\t\tm.inheritFromResourceType(r, rtm, rt, apiDef)\n\t}\n\n\t// inherit optional methods if only the resource also has the method\n\tfor _, rtm := range rt.optionalMethods {\n\t\tm := r.MethodByName(rtm.Name)\n\t\tif m == nil {\n\t\t\tcontinue\n\t\t}\n\t\tm.resourceTypeName = r.Type.Name\n\t\tm.inheritFromResourceType(r, rtm, rt, apiDef)\n\t}\n\n}", "title": "" }, { "docid": "053f1ccb098f42a5db79dffb21e3c032", "score": "0.44519815", "text": "func (s Student) JSONAPIRelationshipLinks(relation string) *jsonapi.Links {\n\tif relation == \"parents\" {\n\t\treturn &jsonapi.Links{\n\t\t\t\"parents\": fmt.Sprintf(\"http://%s/students/%s/parents\", APIUrl, s.ID.String()),\n\t\t}\n\t}\n\tif relation == \"grades\" {\n\t\treturn &jsonapi.Links{\n\t\t\t\"grades\": fmt.Sprintf(\"http://%s/students/%s/grades\", APIUrl, s.ID.String()),\n\t\t}\n\t}\n\tif relation == \"class\" {\n\t\treturn &jsonapi.Links{\n\t\t\t\"class\": fmt.Sprintf(\"http://%s/classes/%s\", APIUrl, s.ClassID.UUID.String()),\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9f84899421dc49d8cd43b0e91ae4371e", "score": "0.4448937", "text": "func Resources(w http.ResponseWriter, r *http.Request) {\n\tresult := new(model.Resource)\n\tcpuR := 0\n\tmemR := 0\n\tps, _ := kubecli.GetAllPods()\n\tfor _, pv := range ps {\n\t\tfor _, c := range pv.Spec.Containers {\n\t\t\trc := c.Resources.Requests.Cpu().String()\n\t\t\trm := c.Resources.Requests.Memory().String()\n\t\t\tcpuR += getCPUInt(rc)\n\t\t\tmemR += convertMemoryToMBInt(rm, true)\n\t\t}\n\t}\n\tresult.CPU = cpuR\n\tresult.MemR = memR\n\tlogrus.Infof(\"get cpu %v and mem %v\", cpuR, memR)\n\tapi.ReturnSuccess(r, w, result)\n}", "title": "" }, { "docid": "f66daeedecd3484870509d56c7d3ff95", "score": "0.44477487", "text": "func BuildResourceResponse(resources []*DOMAIN.ResourceQuery) []*DOMAIN.Resource {\n\n\tresourceResponse := []*DOMAIN.Resource{}\n\n\tfor _, element := range resources {\n\n\t\t// ckeck if the resource is duplicated and takes the index\n\t\texists, index := ContainsResources(resourceResponse, element.ID)\n\t\t//validate it if the resource is duplicated , if it is duplicated\n\t\tif !exists {\n\t\t\t//Instance Resource structures and ResourceTypes\n\t\t\tresourcestruct := &DOMAIN.Resource{}\n\t\t\tresourceTypesCustom := &DOMAIN.ResourceTypesCustom{}\n\t\t\ttaskDetail := &DOMAIN.TaskDetail{}\n\t\t\t//Assigns values ​​to each attribute of the instantiated structure\n\t\t\tresourcestruct.ID = element.ID\n\t\t\tresourcestruct.Name = element.Name\n\t\t\tresourcestruct.LastName = element.LastName\n\t\t\tresourcestruct.Email = element.Email\n\t\t\tresourcestruct.Photo = element.Photo\n\t\t\tresourcestruct.EngineerRange = element.EngineerRange\n\t\t\tresourcestruct.Enabled = element.Enabled\n\t\t\tresourcestruct.VisaUS = element.VisaUS\n\n\t\t\t//Assigns values ​​to each attribute of the instantiated structure\n\t\t\tresourceTypesCustom.Name = element.NameTypeR\n\t\t\tresourceTypesCustom.ResourceId = element.ResourceId\n\t\t\tresourceTypesCustom.TypeId = element.TypeId\n\n\t\t\t//Add the structure to the slice of structures\n\t\t\tresourcestruct.ResourceType = append(resourcestruct.ResourceType, resourceTypesCustom)\n\n\t\t\ttaskDetail.ProjectName = element.ProjectName\n\t\t\ttaskDetail.StartDate = element.StartDate\n\t\t\ttaskDetail.EndDate = element.EndDate\n\t\t\ttaskDetail.Hours = element.HoursTask\n\t\t\ttaskDetail.Task = element.Task\n\t\t\ttaskDetail.AssignatedBy = element.AssignatedBy\n\t\t\ttaskDetail.Deliverable = element.Deliverable\n\t\t\ttaskDetail.Requirements = element.Requirements\n\t\t\ttaskDetail.Priority = element.Priority\n\t\t\ttaskDetail.AdditionalComments = element.AdditionalComments\n\n\t\t\tresourcestruct.TaskDetail = append(resourcestruct.TaskDetail, taskDetail)\n\n\t\t\t//Add the structure to the slice of structures included ResourceTypes\n\t\t\tresourceResponse = append(resourceResponse, resourcestruct)\n\n\t\t\tresourceTypesCustom = nil\n\t\t\tresourcestruct = nil\n\t\t} else {\n\t\t\ttaskDetail := &DOMAIN.TaskDetail{}\n\t\t\t//Instance ResourceTypes structure\n\t\t\tresourceTypesCustom := &DOMAIN.ResourceTypesCustom{}\n\n\t\t\t//Assigns values ​​to each attribute of the instantiated structure\n\t\t\tresourceTypesCustom.Name = element.NameTypeR\n\t\t\tresourceTypesCustom.ResourceId = element.ResourceId\n\t\t\tresourceTypesCustom.TypeId = element.TypeId\n\n\t\t\t//Add the structure to the slice of structures\n\t\t\tresourceResponse[index].ResourceType = append(resourceResponse[index].ResourceType, resourceTypesCustom)\n\n\t\t\ttaskDetail.ProjectName = element.ProjectName\n\t\t\ttaskDetail.StartDate = element.StartDate\n\t\t\ttaskDetail.EndDate = element.EndDate\n\t\t\ttaskDetail.Hours = element.HoursTask\n\t\t\ttaskDetail.Task = element.Task\n\t\t\ttaskDetail.AssignatedBy = element.AssignatedBy\n\t\t\ttaskDetail.Deliverable = element.Deliverable\n\t\t\ttaskDetail.Requirements = element.Requirements\n\t\t\ttaskDetail.Priority = element.Priority\n\t\t\ttaskDetail.AdditionalComments = element.AdditionalComments\n\n\t\t\tresourceResponse[index].TaskDetail = append(resourceResponse[index].TaskDetail, taskDetail)\n\t\t\tresourceTypesCustom = nil\n\t\t}\n\t}\n\treturn resourceResponse\n}", "title": "" }, { "docid": "91861d56c880a89092d29f10370041be", "score": "0.44471425", "text": "func (m *AppIdentity) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "4a9466b3605fc2137c05bc732d927383", "score": "0.44447413", "text": "func (m *ContentProperties) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "c719eef43862c0b29d33814a953c3fd1", "score": "0.44441462", "text": "func (p Parent) JSONAPIRelationshipLinks(relation string) *jsonapi.Links {\n\tif relation == \"user\" {\n\t\treturn &jsonapi.Links{\n\t\t\t\"user\": fmt.Sprintf(\"http://%s/users/%s\", APIUrl, p.UserID.String()),\n\t\t}\n\t}\n\tif relation == \"students\" {\n\t\treturn &jsonapi.Links{\n\t\t\t\"students\": fmt.Sprintf(\"http://%s/parents/%s/students\", APIUrl, p.ID.String()),\n\t\t}\n\t}\n\tif relation == \"appointments\" {\n\t\treturn &jsonapi.Links{\n\t\t\t\"appointments\": fmt.Sprintf(\"http://%s/parents/%s/appointments\", APIUrl, p.ID.String()),\n\t\t}\n\t}\n\tif relation == \"payments\" {\n\t\treturn &jsonapi.Links{\n\t\t\t\"payments\": fmt.Sprintf(\"http://%s/parents/%s/payments\", APIUrl, p.ID.String()),\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ec94cae10fa72bd8af38f7aa2ba23995", "score": "0.44434026", "text": "func Tags_get () {\n\n // GET /{resource}/{id}/tags.json\n\n }", "title": "" }, { "docid": "d73d08ddc564453298cacdcc45c233d3", "score": "0.44430348", "text": "func (a DocumentAttributesWithOverrides) All() DocumentAttributes {\n\tresult := DocumentAttributes{}\n\tfor k, v := range a.Content {\n\t\tresult[k] = v\n\t}\n\tfor k, v := range a.Overrides {\n\t\tresult[k] = v\n\t}\n\treturn result\n}", "title": "" }, { "docid": "2cb3088ff2ad59a9b1557d037264f33f", "score": "0.4442066", "text": "func (o *ProviderClient) List(resource SpecResource, responsePayload interface{}, parentIDs ...string) (*http.Response, error) {\n\tresourceURL, err := o.getResourceURL(resource, parentIDs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\toperation := resource.getResourceOperations().List\n\treturn o.performRequest(httpGet, resourceURL, operation, nil, responsePayload)\n}", "title": "" }, { "docid": "146eab75d390cc5eb9c1bfba05a4be58", "score": "0.44404593", "text": "func (b *PrivilegedAccessRequestBuilder) Resources() *PrivilegedAccessResourcesCollectionRequestBuilder {\n\tbb := &PrivilegedAccessResourcesCollectionRequestBuilder{BaseRequestBuilder: b.BaseRequestBuilder}\n\tbb.baseURL += \"/resources\"\n\treturn bb\n}", "title": "" }, { "docid": "678977fac6406c6117c214cc92f31dda", "score": "0.443846", "text": "func (m *OnPremisesExtensionAttributes) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "7b72ed498da53cfac90a6ad853730d2d", "score": "0.44382888", "text": "func (s Service) Resources() []togo.Resource {\n\treturn []togo.Resource{\n\t\t{\n\t\t\tPath: \"/cats\",\n\t\t\tMethod: http.MethodGet,\n\t\t\tHandler: GetCats(\"my-dependency\"),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "fc892b38dda65d11cd262b70d84401c7", "score": "0.44337648", "text": "func (m *AvailabilityItem) GetAdditionalData()(map[string]interface{}) {\n return m.additionalData\n}", "title": "" }, { "docid": "6e6265ae590ceda4a73fd5c12a3ac7a1", "score": "0.44337085", "text": "func (rst *ApiResult) GetExtras() map[string]interface{} {\n\treturn rst.Extras\n}", "title": "" }, { "docid": "5fead7805ae2cdcc08b436e7952dc3a6", "score": "0.4433381", "text": "func (s *service) List(ctx context.Context, p *resource.ListPayload) (res resource.ResourceCollection, err error) {\n\n\tq := s.db.Scopes(withResourceDetails).\n\t\tLimit(p.Limit)\n\n\treturn s.resourcesForQuery(q)\n}", "title": "" }, { "docid": "0f9a49914605f704b89b2b273d54c99f", "score": "0.44279778", "text": "func (m *AssignmentFilterStatusDetails) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "85d883b01bddbdb3b0e2b2296a695641", "score": "0.44278497", "text": "func (m *SubjectRightsRequestStageDetail) GetAdditionalData()(map[string]any) {\n val , err := m.backingStore.Get(\"additionalData\")\n if err != nil {\n panic(err)\n }\n if val == nil {\n var value = make(map[string]any);\n m.SetAdditionalData(value);\n }\n return val.(map[string]any)\n}", "title": "" }, { "docid": "1c5910e55782c2159c7d3bae8cc0281e", "score": "0.44276735", "text": "func (r *PrivilegedAccessResourcesCollectionRequest) Add(ctx context.Context, reqObj *GovernanceResource) (resObj *GovernanceResource, err error) {\n\terr = r.JSONRequest(ctx, \"POST\", \"\", reqObj, &resObj)\n\treturn\n}", "title": "" }, { "docid": "989e4de464b2e737644691b4373296c4", "score": "0.4426111", "text": "func (o PubsubTargetResponseOutput) Attributes() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v PubsubTargetResponse) map[string]string { return v.Attributes }).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "3b05821f777c5e04ff5dd223d0b1ce8b", "score": "0.44234616", "text": "func (a *GroupsApiService) ListAttributes1(ctx _context.Context, path string) ([]Attribute, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []Attribute\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/di/groups/directories/{path}/attributes\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"path\"+\"}\", _neturl.QueryEscape(parameterToString(path, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"x-refresh-token\"] = key\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ErrorEntity\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ErrorEntity\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v ErrorEntity\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ErrorEntity\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ErrorEntity\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" } ]
df0f8c87c3fadf0f17e8ffcf9782bb67
Write the body of the given HTTP response to disk at the given path
[ { "docid": "446f5fce43d29eb6b4efb14fff163ed5", "score": "0.6840662", "text": "func writeResonseToDisk(resp *http.Response, destPath string, withProgress bool) *FetchError {\n\tout, err := os.Create(destPath)\n\tif err != nil {\n\t\treturn wrapError(err)\n\t}\n\n\tdefer out.Close()\n\tdefer resp.Body.Close()\n\n\tvar readCloser io.Reader\n\tif withProgress {\n\t\treadCloser = io.TeeReader(resp.Body, newWriteCounter(resp.ContentLength))\n\t} else {\n\t\treadCloser = resp.Body\n\t}\n\t_, err = io.Copy(out, readCloser)\n\treturn wrapError(err)\n}", "title": "" } ]
[ { "docid": "09c26095a3308e31a2d19c3ccc7ffc75", "score": "0.7172879", "text": "func Write(w http.ResponseWriter, r *http.Request) {\n\tpath := r.URL.Query().Get(\"path\")\n\trc := r.Body\n\tdefer rc.Close()\n\n\t_, err := write(rc, &path)\n\tif err != nil {\n\t\tfmt.Fprintf(w, \"couldn't write file %s \\n\", path)\n\t\tlog.Println(err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "cb5e5cf12e676ddf8ccb615e5b527a5a", "score": "0.65577763", "text": "func (r *Response) WriteFile(fname string) (err error) {\n\t// Read response body\n\terr = r.Read()\n\tif err != nil {\n\t\treturn\n\t}\n\terr = ioutil.WriteFile(fname, r.Body, os.ModePerm)\n\treturn\n\n}", "title": "" }, { "docid": "98aedf9ba4ec3533a15cd2022df63e85", "score": "0.6504813", "text": "func Body(pr *proxy.ProxyRequest) (io.WriteCloser, error) {\n\tvar err error\n\n\tfile := proxy.Workdir + proxy.PS + \"server\" + proxy.PS + pr.FileName + proxy.PS + pr.Id + \".body\"\n\n\tif pr.Response.ContentLength != 0 {\n\t\tos.MkdirAll(path.Dir(file), os.ModeDir|os.FileMode(0755))\n\n\t\tfp, err := os.Create(file)\n\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif fp == nil {\n\t\t\terr = fmt.Errorf(ErrCantWriteFile.Error(), file)\n\t\t}\n\n\t\t// Don't close io.WriterCloser yet.\n\t\treturn fp, err\n\t}\n\n\treturn nil, err\n}", "title": "" }, { "docid": "68194d6a1246b7fd2af1d6c3a250746d", "score": "0.64895266", "text": "func Body(pr *proxy.ProxyRequest) io.WriteCloser {\n\n\tfile := proxy.Workdir + proxy.PS + \"server\" + proxy.PS + pr.FileName + proxy.PS + pr.Id + \".body\"\n\n\tif pr.Response.ContentLength != 0 {\n\t\tos.MkdirAll(path.Dir(file), os.ModeDir|os.FileMode(0755))\n\n\t\tfp, _ := os.Create(file)\n\n\t\tif fp == nil {\n\t\t\tfmt.Errorf(fmt.Sprintf(\"Could not open file %s for writing.\", file))\n\t\t}\n\n\t\treturn fp\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "93c54aa8778c3363c3b074c13ea723b9", "score": "0.6244839", "text": "func saveResponseToFile(contents, filepath string, appendToFile bool) (err error) {\n\tvar fd *os.File\n\tif appendToFile {\n\t\tfd, err = os.OpenFile(filepath, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644)\n\t} else {\n\t\tfd, err = os.Create(filepath)\n\t}\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer fd.Close()\n\tfd.WriteString(contents)\n\treturn\n}", "title": "" }, { "docid": "aea051fce945caeca77a47332ec5b1b3", "score": "0.594731", "text": "func (r *Response) Save(filename string) error {\n\tif r.Err != nil {\n\t\treturn r.Err\n\t}\n\n\tfile, err := os.OpenFile(filename, os.O_RDWR|os.O_CREATE, 0664)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer file.Close()\n\tdefer r.R.Body.Close()\n\n\t_, err = io.Copy(file, r.R.Body)\n\treturn err\n}", "title": "" }, { "docid": "912e8173ea994328f035177555a05e4b", "score": "0.5933142", "text": "func Response(pr *proxy.ProxyRequest) io.WriteCloser {\n\n\tfile := \"archive\" + proxy.PS + \"server\" + proxy.PS + pr.FileName + proxy.PS + pr.Id\n\n\tos.MkdirAll(path.Dir(file), os.ModeDir|os.FileMode(0755))\n\n\tfp, _ := os.Create(file)\n\n\tif fp == nil {\n\t\tfmt.Errorf(fmt.Sprintf(\"Could not open file %s for writing.\", file))\n\t} else {\n\t\tfp.WriteString(fmt.Sprintf(\"%s %s\\r\\n\", pr.Response.Proto, pr.Response.Status))\n\t\tpr.Response.Header.Write(fp)\n\t\tfp.WriteString(\"\\r\\n\")\n\t\treturn fp\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "983d610e0789f26e2066dbbfcdac5911", "score": "0.5898049", "text": "func writeResponse(w http.ResponseWriter, status int, body string) {\n\tw.Header().Set(\"Content-Length\", fmt.Sprintf(\"%v\", len(body)))\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(status)\n\tfmt.Fprintf(w, `%v`, body)\n}", "title": "" }, { "docid": "6af4a914885a81bce0455b41e41e8edf", "score": "0.58584744", "text": "func writeToFile(body io.ReadCloser, parsedURL *url.URL) io.ReadCloser {\n\tfPath := parsedURL.Host + parsedURL.Path\n\n\t// Set default filename\n\tif !strings.Contains(fPath, \"/\") {\n\t\t// For the domain index\n\t\tfPath += \"/\"\n\t}\n\tif strings.HasSuffix(fPath, \"/\") {\n\t\t// We assume it's a directory and want to avoid clashes with\n\t\t// subdirectories\n\t\tfPath += \"index.html\"\n\t}\n\n\tdirPath := filepath.Dir(fPath)\n\n\terr := os.MkdirAll(dirPath, os.ModePerm)\n\tif err != nil {\n\t\tlog.Print(err)\n\t\treturn body\n\t}\n\n\tcontents, err := ioutil.ReadAll(body)\n\tbody = ioutil.NopCloser(bytes.NewReader(contents))\n\tif err != nil {\n\t\tlog.Print(err)\n\t\treturn body\n\t}\n\n\terr = ioutil.WriteFile(fPath, contents, 0644)\n\tif err != nil {\n\t\tlog.Print(err)\n\t}\n\n\treturn body\n}", "title": "" }, { "docid": "52425e3023af410db0e9985f397e5c1b", "score": "0.5835765", "text": "func (t HTTP) WriteHTTPResponseFromDefinition(fr *definition.Response, w http.ResponseWriter, r *http.Request) {\n\tfmt.Println(fr.Body)\n\tif strings.HasPrefix(fr.Body, \"@\") {\n\t\tfile := fr.Body[1:]\n\t\tfmt.Println(file)\n\t\tserveFile(file, w, r)\n\t} else {\n\t\tfor header, values := range fr.Headers {\n\t\t\tfor _, value := range values {\n\t\t\t\tw.Header().Add(header, value)\n\t\t\t}\n\n\t\t}\n\t\tif len(fr.Cookies) > 0 {\n\t\t\tcookies := []string{}\n\t\t\tfor cookie, value := range fr.Cookies {\n\t\t\t\tcookies = append(cookies, fmt.Sprintf(\"%s=%s\", cookie, value))\n\t\t\t}\n\t\t\tw.Header().Add(\"Set-Cookie\", strings.Join(cookies, \";\"))\n\t\t}\n\n\t\tw.WriteHeader(fr.StatusCode)\n\n\t\tfmt.Printf(\"BODY %s \\n\", fr.Body)\n\t\tio.WriteString(w, fr.Body)\n\t}\n\n}", "title": "" }, { "docid": "02402fad0d0ef113d1bbbc65125b51b3", "score": "0.5825068", "text": "func (r *Resp) ToFile(name string) error {\n\tfile, err := os.Create(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer file.Close()\n\tif r.respBody != nil {\n\t\t_, err = file.Write(r.respBody)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\t_, err = io.Copy(file, r.resp.Body)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "98a50cc25a2ed9bcee59d609d8e763b1", "score": "0.5795793", "text": "func Response(pr *proxy.ProxyRequest) (io.WriteCloser, error) {\n\tvar err error\n\n\tfile := proxy.Workdir + proxy.PS + \"server\" + proxy.PS + pr.FileName + proxy.PS + pr.Id\n\n\tos.MkdirAll(path.Dir(file), os.ModeDir|os.FileMode(0755))\n\n\tfp, err := os.Create(file)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif fp == nil {\n\t\terr = fmt.Errorf(ErrCantWriteFile.Error(), file)\n\t} else {\n\t\t// Don't close io.WriterCloser yet.\n\t\tfp.WriteString(fmt.Sprintf(\"%s %s\\r\\n\", pr.Response.Proto, pr.Response.Status))\n\t\tpr.Response.Header.Write(fp)\n\t\tfp.WriteString(\"\\r\\n\")\n\t\treturn fp, nil\n\t}\n\n\treturn nil, err\n}", "title": "" }, { "docid": "8e130a72393be1cdd9417a9323c056b0", "score": "0.57122195", "text": "func Download(url string, headers http.Header, path string) (*http.Response, error) {\n\trequest, err := http.NewRequest(http.MethodGet, url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\trequest.Header = headers\n\tresp, err := Client.Do(request)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\t// Create the file\n\tout, err := os.Create(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer out.Close()\n\n\t// Write the body to file\n\t_, err = io.Copy(out, resp.Body)\n\treturn nil, err\n}", "title": "" }, { "docid": "ffc01ff07d2e20940bc0364e7711b034", "score": "0.5710631", "text": "func (r *response) writeBody(w http.ResponseWriter) error {\n\tif r.writer == nil {\n\t\treturn nil\n\t}\n\n\treturn r.writer(w)\n}", "title": "" }, { "docid": "e91a719f26cc298022828677bc7be5e1", "score": "0.5674769", "text": "func saveResponse(rs *result, respFile *os.File, resFile *os.File) error {\n\tdefer func() {\n\t\twgFile.Done()\n\t}()\n\n\tif rs.err == nil {\n\t\tmuFile.Lock()\n\t\t*successfulExecutions++\n\t\tline := fmt.Sprintf(\"%d %d %d\\n\", rs.fromStart, rs.duration,\n\t\t\trs.response.StatusCode)\n\t\t_, err := resFile.WriteString(line)\n\t\tmuFile.Unlock()\n\n\t\tmuFile.Lock()\n\t\tline = fmt.Sprintf(\"%v\\n\", rs.response)\n\t\t_, err = respFile.WriteString(line)\n\t\tmuFile.Unlock()\n\t\treturn err\n\t}\n\treturn rs.err\n}", "title": "" }, { "docid": "22342269bdc5d2cb5ea74fea1e157168", "score": "0.56714815", "text": "func WriteFile(w http.ResponseWriter, r *http.Request) {\n\tpath := r.URL.Query().Get(\"path\")\n\trc, _, err := r.FormFile(\"file\")\n\tdefer rc.Close()\n\tif err != nil {\n\t\tfmt.Fprintf(w, \"couldn't read file from request \\n\")\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\n\t_, err = write(rc, &path)\n\tif err != nil {\n\t\tfmt.Fprintf(w, \"couldn't write file %s \\n\", path)\n\t\tlog.Println(err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "400040545d46ca37e300d9d668a49c4b", "score": "0.562029", "text": "func (r *Response) Write(code int, b []byte) (n int, err error) {\n\tif !r.committed {\n\t\tr.WriteHeader(code)\n\t}\n\tn, err = r.writer.Write(b)\n\tr.Size += int64(n)\n\tr.body = append(r.body, b[0:]...)\n\treturn\n}", "title": "" }, { "docid": "dccb666a0703ff56b64e6cc18d46b3b6", "score": "0.5614156", "text": "func (server *server) writeResponse(client *client) error {\n\tclient.setTimeout(server.timeout)\n\tsize, err := client.bufout.WriteString(client.response)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = client.bufout.Flush()\n\tif err != nil {\n\t\treturn err\n\t}\n\tclient.response = client.response[size:]\n\treturn nil\n}", "title": "" }, { "docid": "daa8f2bc81c9751380953c1202bf4796", "score": "0.5595018", "text": "func writeResponse(w io.Writer, r io.ReadCloser) error {\n\tb := bufio.NewReader(r)\n\ts, err := readln(b)\n\tfor err == nil {\n\t\tfmt.Fprint(w, s)\n\t\ts, err = readln(b)\n\t}\n\n\tif err == nil || err == io.EOF {\n\t\terr = nil\n\t\tr.Close()\n\t}\n\treturn err\n}", "title": "" }, { "docid": "2ac2252cb417e131fe831635c1cb2406", "score": "0.5579587", "text": "func File(url, outPath string) error {\n\tout, err := os.Create(outPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer out.Close()\n\tresponse, err := doGet(url)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer response.Body.Close()\n\t_, err = io.Copy(out, response.Body)\n\treturn err\n}", "title": "" }, { "docid": "5423f93308461b4f44d4ffdfe59b37ad", "score": "0.5563448", "text": "func writeResponse(w http.ResponseWriter, err error) {\n\tvar body string\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tbody = err.Error()\n\t} else {\n\t\tbody = \"done\"\n\t}\n\tw.Write([]byte(fmt.Sprintf(\"%s\\n\", body)))\n}", "title": "" }, { "docid": "b0cceaff03c7e994d3a80f8dcb24f7bc", "score": "0.55567783", "text": "func ServeContent(w http.ResponseWriter, r *http.Request, body string, statusCode int) error {\n\tlogHeader := fmt.Sprintf(time.Now().Format(\"Jan 2 15:04:05 EST\"))\n\tpath := fmt.Sprintf(\", request on path '%s' \", r.URL.Path)\n\tstatus := fmt.Sprintf(\"returned status code: %d\", statusCode)\n\n\tif statusCode > 299 {\n\t\tw.Header().Set(\"Content-Type\", \"text/plain; charset=utf-8\")\n\t\tw.Header().Set(\"X-Content-Type-Options\", \"nosniff\")\n\t\terrString := fmt.Sprintf(\" with error: %s\", body)\n\t\tstatus = status + errString\n\t}\n\n\tlog.Println(logHeader + path + status)\n\tw.WriteHeader(statusCode)\n\tfmt.Fprintln(w, body)\n\n\treturn nil\n}", "title": "" }, { "docid": "48bf99983d608b7a34e69f9f7916462d", "score": "0.5539441", "text": "func (c *Client) Write(path string, data []byte, _ os.FileMode) error {\n\ts := c.put(path, bytes.NewReader(data))\n\tswitch s {\n\tcase 200, 201, 204:\n\t\treturn nil\n\tcase 409:\n\t\terr := c.createParentCollection(path)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\ts = c.put(path, bytes.NewReader(data))\n\t\tif s == 200 || s == 201 || s == 204 {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn newPathError(\"Write\", path, s)\n}", "title": "" }, { "docid": "af2ce524f6953794705d0cc17b355fd5", "score": "0.552604", "text": "func printHTMLBodyToFile(body io.Reader, fileDest string) {\n bytes, err := ioutil.ReadAll(body)\n checkErr(err)\n //ex: /home/colin/Desktop/go_webscraper/EGFTourney.html\n f, err := os.Create(fileDest)\n defer f.Close()\n checkErr(err)\n f.Write(bytes)\n fmt.Println(string(bytes))\n}", "title": "" }, { "docid": "2c1db8c99ac6d60421ab8f419d98cf8f", "score": "0.5467528", "text": "func Write(w http.ResponseWriter, response Response) {\n\tif response.HTTPStatus() != 200 {\n\t\tw.WriteHeader(response.HTTPStatus())\n\t}\n\tw.Write(response.Marshal())\n}", "title": "" }, { "docid": "131c099f38314db038661e9103c2abcc", "score": "0.54569", "text": "func (o *PostFileDefault) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(o._statusCode)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4979a03dda08147faddd6e4de38ec1ea", "score": "0.54429203", "text": "func (rw *ResponseWriter) Write(b []byte) (int, error) {\n\tbytesWritten, err := rw.innerResponse.Write(b)\n\trw.contentLength = rw.contentLength + bytesWritten\n\treturn bytesWritten, err\n}", "title": "" }, { "docid": "1f09decbd00c47fd68026317314b5b46", "score": "0.5437526", "text": "func write(w http.ResponseWriter, r *http.Request, response interface{}, status int) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(status)\n\n\tjsonRes, err := json.MarshalIndent(response, \"\", \"\\t\")\n\tif err == nil { // Just for safety as there are no cyclic structures.\n\t\tfmt.Fprint(w, string(jsonRes))\n\t}\n}", "title": "" }, { "docid": "21ba65807131315b5252c135a04bc1a2", "score": "0.5417749", "text": "func (o *PostFileCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(201)\n}", "title": "" }, { "docid": "d24d82b169202d9da058eedc0ab15f85", "score": "0.54054356", "text": "func SaveIt(bodyresponse string, downloadOut string) {\n\tfmt.Printf(\"\\n\\tSaving to %s ...\\n\", downloadOut)\n\tbyteit := []byte(bodyresponse)\n\t// writes the output file with read/write permissions\n\tioutil.WriteFile(downloadOut, byteit, 0644)\n}", "title": "" }, { "docid": "9197cd5cb481ffe89d94b43e7d87f194", "score": "0.5391575", "text": "func (o *DepositFileCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(201)\n\tpayload := o.Payload\n\tif err := producer.Produce(rw, payload); err != nil {\n\t\tpanic(err) // let the recovery middleware deal with this\n\t}\n\n}", "title": "" }, { "docid": "1d0bcb63d5e4b6c4f952ff067705ea9e", "score": "0.53789496", "text": "func (c *ResponseCacher) Write(buf []byte) (int, error) {\n\tif !c.wroteHeader {\n\t\tc.WriteHeader(200)\n\t}\n\tif c.Body != nil {\n\t\tc.Body.Write(buf)\n\t}\n\treturn len(buf), nil\n}", "title": "" }, { "docid": "4e3f7455a18bc11eb72109ce233207c8", "score": "0.53729963", "text": "func (o *DepositFileNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(404)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fc90fe673110ff4690e54c5ccc4ae7ee", "score": "0.53530043", "text": "func download(client httpDoer, path string, w io.Writer) error {\n\t// Input sanity checks.\n\tif client == nil {\n\t\treturn fmt.Errorf(\"empty http client: %w\", errConnect)\n\t}\n\tif path == \"\" {\n\t\treturn fmt.Errorf(\"image path was empty: %w\", errInput)\n\t}\n\tif w == nil {\n\t\treturn fmt.Errorf(\"no file to write to: %w\", errFile)\n\t}\n\n\t// Obtain the file including status updates.\n\treq, err := http.NewRequest(\"GET\", path, nil)\n\tif err != nil {\n\t\treturn fmt.Errorf(`http.NewRequest(\"GET\", %q, nil) returned %v`, path, err)\n\t}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"get for %q returned %v: %w\", path, err, errDownload)\n\t}\n\tdefer resp.Body.Close()\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn fmt.Errorf(\"%w for %q with response %d\", errStatus, path, resp.StatusCode)\n\t}\n\n\t// Provide updates during the download.\n\tfileName := regExFileName.FindString(path)\n\top := \"\\nDownload of \" + fileName\n\tr := console.ProgressReader(resp.Body, op, resp.ContentLength)\n\tif _, err := io.Copy(w, r); err != nil {\n\t\treturn fmt.Errorf(\"failed to write body of %q, %v: %w\", path, err, errIO)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b00bfcbf184614b417539694433d6269", "score": "0.5351708", "text": "func HTTPFileSuccessResponse(w http.ResponseWriter, r *http.Request, path string) {\n\tfile, err := os.Open(path)\n\tif err != nil {\n\t\tHTTPErrorResponse(w, err)\n\t\treturn\n\t}\n\tdefer file.Close()\n\tfileInfo, errInfo := file.Stat()\n\tif errInfo != nil {\n\t\tHTTPErrorResponse(w, errInfo)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Disposition\", \"attachment; filename=\"+fileInfo.Name())\n\tw.Header().Set(\"Content-Type\", r.Header.Get(\"Content-Type\"))\n\tw.Header().Set(\"Content-Length\", r.Header.Get(\"Content-Length\"))\n\tio.Copy(w, file)\n}", "title": "" }, { "docid": "ba572ea9e7e62c8108a358d42944ec41", "score": "0.5342272", "text": "func SaveTo(outPath string, rd io.Reader) error {\r\n\r\n\t// create or truncate output file\r\n\tf, err := os.OpenFile(outPath, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, 0644)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\tdefer f.Close()\r\n\r\n\t// copy request body into the file\r\n\t_, err = io.Copy(f, rd)\r\n\treturn err\r\n}", "title": "" }, { "docid": "19818ea9ccb70fa76e366cff6989af5d", "score": "0.53127927", "text": "func writeResponse(res http.ResponseWriter, contentType string, statusCode int, message []byte) {\n\tres.Header().Set(\"Content-Type\", contentType)\n\tres.WriteHeader(statusCode)\n\tres.Write(message)\n}", "title": "" }, { "docid": "d63cc3044ded23077f6365db01f5a4de", "score": "0.52783316", "text": "func WriteResponse(w http.ResponseWriter, resp Response) {\n\tw.Header().Set(\"Content-Type\", resp.ContentType())\n\tw.WriteHeader(resp.StatusCode())\n\tresp.WriteContent(w)\n}", "title": "" }, { "docid": "8d6f6e00a0712e7f21115c9d07d2a728", "score": "0.5265086", "text": "func (rw *responseWriter) Write(b []byte) (int, error) {\n\tif !rw.Written() {\n\t\trw.status = http.StatusOK\n\t}\n\n\tn, err := rw.w.Write(b)\n\trw.size += n\n\treturn n, err\n}", "title": "" }, { "docid": "8afd06c9d9ff764867a6cbf78b914f55", "score": "0.5263671", "text": "func (r *Response) Write(b []byte) (n int, err error) {\n\tn, err = r.ResponseWriter.Write(b)\n\tr.size += int64(n)\n\treturn n, err\n}", "title": "" }, { "docid": "1ba62a300e6f83fa7063f153695c19df", "score": "0.52621126", "text": "func (client *Client) Write(ctx context.Context, fileHandle [4]byte, offset int64, pathID byte, data []byte) error {\n\t_, err := client.call(ctx, write.RequestID, write.NewRequest(fileHandle, offset, pathID, data))\n\treturn err\n}", "title": "" }, { "docid": "33b64068b59906e9e4d32d351cb14360", "score": "0.5241802", "text": "func (m *responseWriter) Write(b []byte) (int, error) {\n\tm.LastBody = string(b)\n\treturn len(b), m.err\n}", "title": "" }, { "docid": "b69f2e2685e15a1259a43f78f3109409", "score": "0.52394855", "text": "func dumpResponseInFile(testNo int, testInfoString string, respRecord []byte) error {\n\tvar err error\n\tvar folderPath string\n\n\ttestInfoString += string(respRecord)\n\tdata := []byte(testInfoString)\n\tfilename := \"a\" + strconv.Itoa(testNo)\n\tif folderPath, err = osext.ExecutableFolder(); err != nil {\n\t\treturn err\n\t}\n\tfilePath := path.Join(folderPath, folderName, filename)\n\treturn ioutil.WriteFile(filePath, data, 0644)\n}", "title": "" }, { "docid": "14a36b3c3bf4018309d25311d5408015", "score": "0.5236297", "text": "func putCache(ctx *context.Context, req *http.Request, pagination string, body []byte) error {\n\tfilename := cacheEntryFilename(ctx, req.URL.String()+pagination)\n\tf, err := os.Create(filename)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to create cache file: %v\", err)\n\t}\n\tdefer f.Close()\n\n\t_, err = f.Write(body)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to write response in cache file: %v\", err)\n\t}\n\n\t_, err = readCachedResponse(filename, req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "fa1cd378c52f03f87bfb67f9bd36caaf", "score": "0.5235785", "text": "func (conn *Conn) WriteResponse(r *http.Response) (err error) {\n\tconn.wmu.Lock()\n\tdefer conn.wmu.Unlock()\n\tif err = conn.writeResponseDataLocked(r.StatusCode, r.ContentLength, r.Header); err == nil {\n\t\tif err == nil && r.Body != nil {\n\t\t\tif r.ContentLength > 0 {\n\t\t\t\t_, err = io.CopyN(conn, r.Body, r.ContentLength)\n\t\t\t} else {\n\t\t\t\t_, err = conn.readFrom(r.Body)\n\t\t\t}\n\t\t}\n\t\tif flushErr := conn.flushLocked(); err == nil {\n\t\t\terr = flushErr\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "16c23280251c28b67305601e1625a738", "score": "0.52103126", "text": "func (c *Context) Write(b []byte) (int, error) {\n\treturn c.resp.Write(b)\n}", "title": "" }, { "docid": "72309de750ab56e9a9c2d472b0f41ff6", "score": "0.5209677", "text": "func writeLogFile(b []byte, reqresp, method, urlPath string) {\n\turlPath = strings.Replace(urlPath, \"/\", \"_\", -1)\n\tfname := path.Join(os.TempDir(), fmt.Sprintf(\"swgohhelp%s-%s-%s.log\", urlPath, method, reqresp))\n\tlog.Printf(\"swgohhelp: writing log file %s: result: %v\", fname, ioutil.WriteFile(fname, b, 0644))\n}", "title": "" }, { "docid": "ce0a1a3a2b6210ebc2583e637c9cfca5", "score": "0.5209422", "text": "func (r *response) Write(w http.ResponseWriter) error {\n\tb, err := json.Marshal(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(r.Status)\n\t_, err = w.Write(b)\n\treturn err\n}", "title": "" }, { "docid": "e10d5688208867a2463e928e6529941b", "score": "0.5206025", "text": "func respondWithHtmlFile(w http.ResponseWriter, r *http.Request, path string) {\n\tw.Header().Set(\"Content-Type\", \"text/html\")\n\tdat, err := ioutil.ReadFile(path)\n\tif (err != nil) {\n\t\tpanic(err)\n\t}\n\tfmt.Fprintf(w, string(dat))\n}", "title": "" }, { "docid": "a9b9b1d4ebb05a0a06b7fc9754b5525d", "score": "0.51960284", "text": "func downloadFile(filepath string, url string) error {\n\tfmt.Printf(\"Writing %s \\nTo %s\", url, filepath)\n\t// Get the data\n\tresp, err := http.Get(url)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer resp.Body.Close()\n\n\t// Create the file\n\tout, err := os.Create(filepath)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer out.Close()\n\n\t// Write the body to file\n\t_, err = io.Copy(out, resp.Body)\n\treturn err\n}", "title": "" }, { "docid": "fc09b7a0dc76cb370d213204d4e7769e", "score": "0.51939183", "text": "func writeResponse(w http.ResponseWriter, body interface{}, e error) (err error) {\n\tvar payload []byte\n\tresponse := Response{\n\t\tResult: body,\n\t\tError: ResponseError{},\n\t}\n\tif e != nil {\n\t\tresponse.Error.Error = fmt.Sprintf(\"%v\", e)\n\t}\n\tpayload, err = json.MarshalIndent(response, \"\", \"\\t\")\n\n\tif !util.ErrorCheck(err) {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write(payload)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "a199d6f21e11a5125f380666bbb64f25", "score": "0.51933646", "text": "func (r *Response) Write(b []byte) (n int, err error) {\n\tif r.Response == nil {\n\t\tr.Response = newHTTPResponse(Request{})\n\t}\n\tswitch rc := r.Body.(type) {\n\t// In the \"regular\" case, the response body will be a bufCloser; we can write\n\tcase io.Writer:\n\t\tn, err = rc.Write(b)\n\t\tif err != nil {\n\t\t\treturn n, err\n\t\t}\n\t// If a caller manually sets Response.Body, then we may not be able to write to it. In that case, we need to be\n\t// cleverer.\n\tdefault:\n\t\tbuf := &bufCloser{}\n\t\tif rc != nil {\n\t\t\tif _, err := io.Copy(buf, rc); err != nil {\n\t\t\t\t// This can be quite bad; we have consumed (and possibly lost) some of the original body\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t\t// rc will never again be accessible: once it's copied it must be closed\n\t\t\trc.Close()\n\t\t}\n\t\tr.Body = buf\n\t\tn, err = buf.Write(b)\n\t\tif err != nil {\n\t\t\treturn n, err\n\t\t}\n\t}\n\n\tif r.ContentLength >= 0 {\n\t\tr.ContentLength += int64(n)\n\t\t// If this write pushed the content length above the chunking threshold,\n\t\t// set to -1 (unknown) to trigger chunked encoding\n\t\tif r.ContentLength >= chunkThreshold {\n\t\t\tr.ContentLength = -1\n\t\t}\n\t}\n\treturn n, nil\n}", "title": "" }, { "docid": "60be50383ab0e8f808acef4241da31ab", "score": "0.51817226", "text": "func (c *Client) Write(path string, data map[string]interface{}) error {\n\t_, err := c.client.Write(path, data)\n\treturn err\n}", "title": "" }, { "docid": "1eab8c67f6e4bd8d73430bea934b0e8b", "score": "0.51717025", "text": "func (r *Response) File(path string) {\n\tabspath, err := filepath.Abs(path)\n\n\tif err != nil {\n\t\tlog.Errorf(\"error while converting %s to absolute path\", path)\n\t\treturn\n\t}\n\n\tif !r.fileExists(abspath) {\n\t\treturn\n\t}\n\n\tr.file = abspath\n}", "title": "" }, { "docid": "5a4f489fe397721b8afba7b0992cc002", "score": "0.5170586", "text": "func (ro *redirectOperation) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\trw.Header().Set(\"Location\", ro.Location)\n\trw.WriteHeader(ro.StatusCode)\n\terr := producer.Produce(rw, nil)\n\n\tif err != nil {\n\t\tlog.Errorf(\"failed to send response to client error=%s\", err.Error())\n\t}\n}", "title": "" }, { "docid": "3f76641d81fdcde83cbbb929fc956567", "score": "0.51676416", "text": "func writeResponse(w http.ResponseWriter, resp response) {\n\tvar err error\n\tvar serializedPayload []byte\n\n\tif len(resp.Books) == 1 {\n\t\tserializedPayload, err = json.Marshal(resp.Books[0])\n\t} else {\n\t\tserializedPayload, err = json.Marshal(resp.Books)\n\t}\n\n\tif err != nil {\n\t\twriteError(w, http.StatusInternalServerError)\n\t\tfmt.Println(\"Error while serializing payload: \", err)\n\t} else {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(resp.StatusCode)\n\t\tw.Write(serializedPayload)\n\t}\n}", "title": "" }, { "docid": "5f2a5a64519705d391eedf6ac69a0f26", "score": "0.5167118", "text": "func (r *StreamResult) Write(ctx framework.WebContext) error {\n\n\tvar err error\n\n\t// If we have a ReadSeeker, delegate to http.ServeContent\n\tif rs, ok := r.Reader.(io.ReadSeeker); ok {\n\t\thttp.ServeContent(ctx, ctx.Req(), r.Name, r.ModTime, rs)\n\n\t} else {\n\t\t// Else, do a simple io.Copy.\n\n\t\tif r.Length != -1 {\n\t\t\tctx.Header().Set(\"Content-Length\", strconv.FormatInt(r.Length, 10))\n\t\t}\n\n\t\tctx.WriteHeader(http.StatusOK)\n\t\t//TODO: use a mime-type to file extension strategy like Revel does\n\t\t//ctx.ContentType(\"application/octet-stream\")\n\t\t//ctx.ContentType(ContentTypeByFilename(r.Name))\n\t\t_, err = io.Copy(ctx, r.Reader)\n\t}\n\n\t// Close the Reader if we can\n\tif v, ok := r.Reader.(io.Closer); ok {\n\t\tv.Close()\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "ab3f02f24b30f801a03a902a776c5443", "score": "0.5165534", "text": "func printBody(resp *http.Response) {\n\tbuf, bodyErr := ioutil.ReadAll(resp.Body)\n\tif bodyErr != nil {\n\t\tfmt.Print(\"bodyErr \", bodyErr.Error())\n\t\treturn\n\t}\n\n\trdr1 := ioutil.NopCloser(bytes.NewBuffer(buf))\n\trdr2 := ioutil.NopCloser(bytes.NewBuffer(buf))\n\tfmt.Printf(\"BODY: %q\", rdr1)\n\tresp.Body = rdr2\n}", "title": "" }, { "docid": "7bad562c5889330ba4bd3243b35a1cea", "score": "0.51610273", "text": "func WriteResponseLocation(request *restful.Request, response *restful.Response, identifier string) {\n\tlocation := request.Request.URL.Path\n\tif request.Request.Method == http.MethodPost {\n\t\tlocation = location + \"/\" + identifier\n\t}\n\tresponse.AddHeader(\"Content-Location\", location)\n\tresponse.WriteHeader(201)\n}", "title": "" }, { "docid": "a9ae71fd09c9f2df35b692f6442553ff", "score": "0.51441354", "text": "func (rw *ResponseRecorder) Write(buf []byte) (int, error) {\n\tif rw.Body != nil {\n\t\trw.Body.Write(buf)\n\t}\n\tif rw.Code == 0 {\n\t\trw.Code = http.StatusOK\n\t}\n\treturn len(buf), nil\n}", "title": "" }, { "docid": "f571c50a5e4617eb4f3e378c8d507cae", "score": "0.51399714", "text": "func readResponseBody(req *http.Request, resp *http.Response) string {\n\tif isRedirect(resp) || req.Method == http.MethodHead {\n\t\treturn \"\"\n\t}\n\n\tw := ioutil.Discard\n\tmsg := color.CyanString(\"Body discarded\")\n\n\tif args.SaveOutput == true || args.OutputFile != \"\" {\n\t\tfilename := args.OutputFile\n\n\t\tif args.SaveOutput == true {\n\t\t\t// try to get the filename from the Content-Disposition header\n\t\t\t// otherwise fall back to the RequestURI\n\t\t\tif filename = getFilenameFromHeaders(resp.Header); filename == \"\" {\n\t\t\t\tfilename = path.Base(req.URL.RequestURI())\n\t\t\t}\n\n\t\t\tif filename == \"/\" {\n\t\t\t\tlog.Fatalf(\"No remote filename; specify output filename with -o to save response body\")\n\t\t\t}\n\t\t}\n\n\t\tf, err := os.Create(filename)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"unable to create file %s: %v\", filename, err)\n\t\t}\n\t\tdefer f.Close()\n\t\tw = f\n\t\tmsg = color.CyanString(\"Body read\")\n\t}\n\n\tif _, err := io.Copy(w, resp.Body); err != nil {\n\t\tlog.Fatalf(\"failed to read response body: %v\", err)\n\t}\n\n\treturn msg\n}", "title": "" }, { "docid": "0fa32dc90027bd0a85fe2a5c084b5313", "score": "0.51386017", "text": "func (r *Response) Write(buf []byte) (int, error) {\n\t// Some http Handler will call Write directly.\n\tif !r.wroteHeader {\n\t\tr.WriteHeader(r.Status)\n\t}\n\treturn r.res.Write(buf)\n}", "title": "" }, { "docid": "a188b2f3456fc2a30e3e8e525c127101", "score": "0.51315033", "text": "func (h *HttpChannel) writeResponse(resp *http.Response, to IConn) (err error) {\n\tvar dumpWriter io.Writer\n\tif h.allowDump {\n\t\tdumpWriter = ToWriter(func(b []byte) (int, error) {\n\t\t\treturn dump.WriteResponse(h.id, b)\n\t\t})\n\t}\n\t// 分流器\n\tshunt := NewShunt(to, dumpWriter)\n\terr = resp.Write(shunt)\n\tif err != nil {\n\t\tif err != io.EOF {\n\t\t\tLogger.Errorf(\"ConnectID [%d] HttpChannel Transport [b]->c: %v\", to.GetID(), err)\n\t\t\treturn\n\t\t}\n\t}\n\tLogger.Debugf(\"ConnectID [%d] HttpChannel Transport return [b]->c\", to.GetID())\n\tif h.allowDump {\n\t\tgo func() {\n\t\t\tdump.Complete(h.id)\n\t\t}()\n\t}\n\tboxChan <- &Box{h.id, RecordStatus, RecordStatusCompleted}\n\th.id = 0\n\treturn\n}", "title": "" }, { "docid": "ef812ebe27bffd012395ae0bdf6f7265", "score": "0.51314974", "text": "func writePost(post *Post, path string) {\n f, err := os.Create(path)\n\n if err != nil {\n fmt.Printf(\"Error saving: %v\\n\", err)\n return\n }\n defer f.Close()\n\n b, err := json.Marshal(post)\n if err != nil {\n fmt.Printf(\"Error marshal: %v\\n\", err)\n return\n }\n f.Write(b)\n f.Write([]byte(\"\\n\"))\n}", "title": "" }, { "docid": "7255b6514de6dcabf542a695b9d39a7b", "score": "0.5129483", "text": "func (fs *FileSystem) Write(data []byte, p Path) (bool, error){\n\tlocStr := p.RefererUrl.String()\n\tif locStr == \"\" {\n\t\treturn false, fmt.Errorf(\"Write() - Parameter Path missing a URL referer.\")\n\t}\n\n\tif _, err := url.Parse(locStr); err != nil {\n\t\treturn false, err\n\t}\n\n\treq, _ := http.NewRequest(\"PUT\", locStr, bytes.NewBuffer(data)) \n\trsp, err := fs.client.Do(req)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\tif rsp.StatusCode != http.StatusOK && rsp.StatusCode != http.StatusCreated {\n\t\treturn false, fmt.Errorf(\"File not created. Server returned status %v\", rsp.StatusCode)\n\t}\n\n\treturn true, nil\n}", "title": "" }, { "docid": "bd5680c0f87564c428e6115849e6d51b", "score": "0.5127642", "text": "func writeBytes(w http.ResponseWriter, b []byte) {\n\t_, err := w.Write(b)\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"write error: %v\", err), http.StatusInternalServerError)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "d72098217bdcaae79c3fc95a3a29bc36", "score": "0.51225185", "text": "func writeResponse(w http.ResponseWriter, responseObject interface{}) {\n\tresponseDataAsBytes, err := json.Marshal(responseObject)\n\tif err != nil {\n\t\thttp.Error(w, errMessageInternalServerError, http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tfmt.Fprintf(w, \"%s\", string(responseDataAsBytes))\n}", "title": "" }, { "docid": "65db592dd29f9e3367bd3df94028a3c8", "score": "0.51203465", "text": "func WriteHTTPResponse(tf TextFormatter, wr io.Writer, req *http.Request, statusCode, contentLength int, contentType string, elapsed time.Duration) {\n\tio.WriteString(wr, webutil.GetRemoteAddr(req))\n\tio.WriteString(wr, Space)\n\tio.WriteString(wr, tf.Colorize(req.Method, ansi.ColorBlue))\n\tio.WriteString(wr, Space)\n\tio.WriteString(wr, req.URL.String())\n\tio.WriteString(wr, Space)\n\tio.WriteString(wr, ColorizeStatusCode(statusCode))\n\tio.WriteString(wr, Space)\n\tio.WriteString(wr, elapsed.String())\n\tif len(contentType) > 0 {\n\t\tio.WriteString(wr, Space)\n\t\tio.WriteString(wr, contentType)\n\t}\n\tio.WriteString(wr, Space)\n\tio.WriteString(wr, stringutil.FileSize(contentLength))\n}", "title": "" }, { "docid": "20959d3aeed1cc9482ba8518a0337b99", "score": "0.5118871", "text": "func (w *capture) Write(b []byte) (int, error) {\n\tw.body = b\n\treturn w.ResponseWriter.Write(b)\n}", "title": "" }, { "docid": "cf7e7ad989679260abd72e12e9fa3913", "score": "0.51128197", "text": "func (frw *FakeResponseWriter) Write(resp safehttp.Response) safehttp.Result {\n\tif err := frw.Dispatcher.Write(frw.ResponseWriter, resp); err != nil {\n\t\tpanic(err)\n\t}\n\treturn safehttp.Result{}\n}", "title": "" }, { "docid": "5de2fe3135573963723278a4b7b0abd9", "score": "0.5109372", "text": "func WriteResponse(rw http.ResponseWriter, status int, v interface{}) {\n\trw.Header().Set(\"Content-Type\", \"application/did+ld+json\")\n\trw.WriteHeader(status)\n\terr := json.NewEncoder(rw).Encode(v)\n\tif err != nil {\n\t\tlog.WriteResponseBodyError(logger, err)\n\t}\n}", "title": "" }, { "docid": "5ebd9c5ec36b35f1e9e693e4d90d4807", "score": "0.50968564", "text": "func (r *Response) Write(bs []byte) (int, error) {\n\tif !r.beforeExecuted {\n\t\tfor _, before := range r.befores {\n\t\t\tbefore(r)\n\t\t}\n\t\tr.beforeExecuted = true\n\t}\n\tsize, err := r.ResponseWriter.Write(bs)\n\tr.written += size\n\tif err != nil {\n\t\treturn size, err\n\t}\n\tif r.status == 0 {\n\t\tr.status = http.StatusOK\n\t}\n\treturn size, nil\n}", "title": "" }, { "docid": "70d0b4ee0bca324c673e4b007d1b4355", "score": "0.50857025", "text": "func (o *CheckCompressToZipStatusNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(404)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "44f788dcadc7dac67f334acfd2c4756e", "score": "0.50850517", "text": "func WriteResponse(w http.ResponseWriter, statusCode int, v interface{}) error {\n\tvBinary, errM := json.Marshal(v)\n\tif errM != nil {\n\t\treturn errM\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(statusCode)\n\t_, err := w.Write(vBinary)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b6b009b5c7c46efaf48e44d0576fb6c4", "score": "0.50701445", "text": "func Write(w http.ResponseWriter, body interface{}, status int) error {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(status)\n\tj, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = w.Write(j)\n\treturn err\n}", "title": "" }, { "docid": "7f0263d92c41c9a43bb02ddf676293cb", "score": "0.50662196", "text": "func (c *Context) ServeContent(content io.ReadSeeker, filename string, modtime time.Time) error {\n\tif t, err := time.Parse(TimeFormat, c.RequestHeader(HeaderIfModifiedSince)); err == nil && modtime.Before(t.Add(1*time.Second)) {\n\t\tc.Response.Header().Del(HeaderContentType)\n\t\tc.Response.Header().Del(HeaderContentLength)\n\t\tc.Response.WriteHeader(StatusNotModified)\n\t\treturn nil\n\t}\n\n\tc.Response.Header().Set(HeaderContentType, c.ContentTypeByExtension(filename))\n\tc.Response.Header().Set(HeaderLastModified, modtime.UTC().Format(TimeFormat))\n\n\tsize := func() int64 {\n\t\tsize, err := content.Seek(0, io.SeekEnd)\n\t\tif err != nil {\n\t\t\treturn 0\n\t\t}\n\t\t_, err = content.Seek(0, io.SeekStart)\n\t\tif err != nil {\n\t\t\treturn 0\n\t\t}\n\t\treturn size\n\t}()\n\n\tc.Response.Header().Set(HeaderContentLength, fmt.Sprintf(\"%v\", size))\n\tc.Response.WriteHeader(StatusOK)\n\t_, err := io.Copy(c.Response, content)\n\tc.Abort()\n\treturn err\n}", "title": "" }, { "docid": "62a4535295a904a945e7451598b780a4", "score": "0.5064014", "text": "func (r *responseWriter) Write(p []byte) (int, error) {\n\tif !r.headerWritten {\n\t\tr.prepareHeaders()\n\t}\n\n\tif r.text {\n\t\tr.buf = append(r.buf, p...)\n\t\tr.ResponseWriter.Write(r.encodeBase64())\n\t\treturn len(p), nil\n\t}\n\treturn r.ResponseWriter.Write(p)\n}", "title": "" }, { "docid": "97f74e2e7969e1c73fe1cef12acd9ca9", "score": "0.50587255", "text": "func (this *ResponseWriterAccessor) Write(data []byte) (int, error) {\n\tthis.Body = string(data)\n\treturn this.respWriter.Write(data)\n}", "title": "" }, { "docid": "931b5b8a154e947f1d371333682bf050", "score": "0.5053805", "text": "func (re Redirect) WriteBody(w http.ResponseWriter, r *http.Request, _ int) error {\n\thttp.Redirect(w, r, re.URL, re.StatusCode)\n\treturn nil\n}", "title": "" }, { "docid": "a9d145d858a7a32585e84d99737b1306", "score": "0.50269055", "text": "func (o *CreateHTTPCheckCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(201)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9d659f6c5174a93e3dd62c51a4768e40", "score": "0.50025594", "text": "func (ses *ht3xxSession) WriteResponse(rsp io.Writer) []byte {\n\treturn nil\n}", "title": "" }, { "docid": "6c48d24b3b13694a3b45d25991c2fcf8", "score": "0.500239", "text": "func (rw *ResponseWriter) Write(b []byte) (int, error) {\n\tbytesWritten, err := rw.ResponseWriter.Write(b)\n\trw.ContentLength += bytesWritten\n\treturn bytesWritten, err\n}", "title": "" }, { "docid": "42773dc4a59fe4d8167eca28b536083e", "score": "0.5002196", "text": "func WriteBytes(w http.ResponseWriter, status int, text []byte) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(status)\n\tw.Write(text)\n}", "title": "" }, { "docid": "874a92477a91c6d87db42a90e936214b", "score": "0.49908668", "text": "func dumpResponse(resp *http.Response, body []byte) string {\n\tout := &bytes.Buffer{}\n\tfmt.Fprintln(out, resp.Status)\n\tresp.Header.Write(out)\n\tfmt.Fprintln(out)\n\tif len(body) == 0 {\n\t\tfmt.Fprintln(out, \"<empty body>\")\n\t} else if isTextContent(resp.Header) {\n\t\tout.Write(body)\n\t\tif body[len(body)-1] != '\\n' {\n\t\t\tfmt.Fprintln(out)\n\t\t}\n\t\tif int64(len(body)) < resp.ContentLength {\n\t\t\tfmt.Fprintln(out, \"<truncated>\")\n\t\t}\n\t} else {\n\t\tfmt.Fprintln(out, \"<binary response>\")\n\t}\n\treturn out.String()\n}", "title": "" }, { "docid": "cbb8ce8a92d934abcef52ee8682645e8", "score": "0.49880695", "text": "func Write(path string, input []byte) error {\n\treturn WriteReader(path, bytes.NewReader(input), int64(len(input)))\n}", "title": "" }, { "docid": "ecde70c42d4c28fad0f77b2bb1e94860", "score": "0.49829033", "text": "func (o *GetLoglinesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(200)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6d05ee0214490c30417ba1baae9254fb", "score": "0.49825737", "text": "func (rec *statusRecorder) Write(r []byte) (int, error) {\n\tl := len(r)\n\tif l > responseLoggingLen {\n\t\tl = responseLoggingLen\n\t}\n\n\tif rec.status == http.StatusOK { // if request served correctly, cut response for logs\n\t\trec.response = string(r[:l])\n\t}\n\n\treturn rec.ResponseWriter.Write(r)\n}", "title": "" }, { "docid": "3db7315432479bcbbb32a96619a54cd8", "score": "0.49821806", "text": "func (w *responseWriter) Write(buf []byte) (int, error) {\n\tif !w.headersWritten {\n\t\tw.WriteHeader(http.StatusOK)\n\t}\n\tif w.statusCode >= 500 && w.statusCode < 599 {\n\t\t//record server errors for the log\n\t\tw.errorMessageBuf.Write(buf)\n\t}\n\tn, err := w.original.Write(buf)\n\tw.bytesWritten += uint64(n)\n\treturn n, err\n}", "title": "" }, { "docid": "49628705af5f14a198cbfa4c58488f8b", "score": "0.4981176", "text": "func (o *DownloadClusterISOCloneNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(404)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c38e7107a6c61b2dd2f77563f923a837", "score": "0.49807", "text": "func (r *Response) Write(w io.Writer) error {\n\tif len(r.Response.Text) != 0 {\n\t\tfmt.Fprintf(w, r.Response.Text)\n\t\treturn nil\n\t} else if len(r.Output) != 0 {\n\t\t_, err := w.Write(r.Output)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1678587a67bc944412b3c6ca61a6832d", "score": "0.49803588", "text": "func (w *Response) Write(b []byte) (int, error) {\n\tw.Size = binary.Size(b)\n\treturn w.ResponseWriter.Write(b)\n}", "title": "" }, { "docid": "42d9b35682a4e76bb3533f4d229fbe16", "score": "0.49780068", "text": "func (o *V2GetPresignedForClusterFilesNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(404)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f3078a2c0358263894449d3158e88511", "score": "0.4969043", "text": "func (w *HTTPResponseWriter) Write(b []byte) (int, error) {\n\n\tw.BytesServed += len(b)\n\tw.DataSent = true\n\n\treturn w.rw.Write(b)\n}", "title": "" }, { "docid": "e8119f8e55ac26a702b1d723faea06d3", "score": "0.49684587", "text": "func (c *ContainerOutputHandler) WriteResponse(rw http.ResponseWriter, producer httpkit.Producer) {\n\trw.WriteHeader(http.StatusOK)\n\trw.Header().Set(\"Content-Type\", \"application/octet-streaming\")\n\trw.Header().Set(\"Transfer-Encoding\", \"chunked\")\n\tif f, ok := rw.(http.Flusher); ok {\n\t\tc.outputStream.AddFlusher(f)\n\t}\n\t_, err := io.Copy(rw, c.outputStream)\n\n\tif err != nil {\n\t\tlog.Printf(\"Error copying %s stream for container %s: %s\", c.outputName, c.containerID, err)\n\t} else {\n\t\tlog.Printf(\"Finished copying %s stream for container %s\", c.outputName, c.containerID)\n\t}\n}", "title": "" }, { "docid": "34f6764b86108d0d1b665cb818aeeb59", "score": "0.49648634", "text": "func DownloadToTempFile(r *Request) (string, error) {\n\n // Create the download dir...\n downloadPath, err := CacheDownloadPath()\n err = os.MkdirAll(downloadPath, 0755)\n if err != nil {\n return \"\", err\n }\n\n to, err := ioutil.TempFile(downloadPath, \"download\")\n if err != nil {\n log.Fatal(err)\n }\n defer to.Close()\n\n r.Printf(\"downloading: %s\\n\", r.URL)\n err = HttpGet(r.URL, to)\n if err != nil {\n to.Close()\n os.Remove(to.Name())\n return \"\", err\n }\n r.Printf(\"done: %s\\n\", r.URL)\n return to.Name(), nil\n}", "title": "" }, { "docid": "106c009f39b1b847aaffda6387837395", "score": "0.49645913", "text": "func saveFile(w http.ResponseWriter, file multipart.File, handle *multipart.FileHeader) {\n data, err := ioutil.ReadAll(file)\n if err != nil {\n fmt.Fprintf(w, \"%v\", err)\n return\n }\n\n err = ioutil.WriteFile(\"./files/\"+handle.Filename, data, 0666)\n if err != nil {\n fmt.Fprintf(w, \"%v\", err)\n return\n }\n jsonResponse(w, http.StatusCreated, \"File uploaded successfully!.\")\n}", "title": "" }, { "docid": "8b9169c8fc875307f47bcce3dcee0541", "score": "0.49618804", "text": "func (o *UpdateMTOStatusServiceCounselingCompletedNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(404)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "11adb0f50e6ffe2642e2ddaf36f74098", "score": "0.49617103", "text": "func (h *Handle) Write(ctx context.Context,\n\treq *fuse.WriteRequest, resp *fuse.WriteResponse) (err error) {\n\ttime.Sleep(h.fs.latency)\n\tdefer func() {\n\t\tlog.Printf(\"Handle(%s).Write(): error=%v\",\n\t\t\th.f.Name(), err)\n\t}()\n\n\tif _, err = h.f.Seek(req.Offset, 0); err != nil {\n\t\treturn translateError(err)\n\t}\n\tn, err := h.f.Write(req.Data)\n\tresp.Size = n\n\treturn translateError(err)\n}", "title": "" }, { "docid": "220f1b273391b0701a7ed2b909c4c8a4", "score": "0.49614975", "text": "func (o *CommitUploadSessionDefault) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(o._statusCode)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "37fae62b5061f46a7120ea0900703b62", "score": "0.49595803", "text": "func (tm *timerResponseMiddleware) Write(b []byte) (int, error) {\n\tif !tm.ok {\n\t\ttm.WriteHeader(http.StatusOK)\n\t}\n\treturn tm.ResponseWriter.Write(b)\n}", "title": "" } ]
847df9500174809c1451a243f11e83d6
HandlerDeleteAllTracks is the handler for DELETE /admin/api/tracks. it deletes the tracks and responds of with the number of tracks deleted
[ { "docid": "b2bf3215d882168251814ad10b259ab2", "score": "0.8682046", "text": "func (aMgr *AdminMgr) HandlerDeleteAllTracks(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Add(\"content-type\", \"text/plain\")\n\ttrackCount, err := aMgr.DB.DeleteAllTracks()\n\tif err != nil {\n\t\thttp.Error(w, \"error getting count from database\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\tfmt.Fprint(w, trackCount)\n}", "title": "" } ]
[ { "docid": "b0d2c703f908c17da87c857e5e44284c", "score": "0.79564923", "text": "func TracksDeleteAllHandler() http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tresp := storage.TrackDB.CountTracks()\n\t\tstorage.TrackDB.DeleteTracks()\n\t\tjson.NewEncoder(w).Encode(resp)\n\t})\n}", "title": "" }, { "docid": "3446d5ef3c8fca06e40418ee264cf116", "score": "0.7563561", "text": "func (ah *AdminHandler) DeleteAllTracks(req *router.Request) {\n\t_, err := ah.db.Delete(mdb.TRACKS, nil)\n\tif err != nil {\n\t\treq.SendError(&router.Error{StatusCode: http.StatusInternalServerError, Message: \"Internal database error\"})\n\t\treturn\n\t}\n\treq.SendText(\"Everything deleted\", http.StatusOK)\n}", "title": "" }, { "docid": "48a71c7b6b4996dd888d171422458701", "score": "0.7067526", "text": "func AdminDeleteTracks(w http.ResponseWriter, _ *http.Request) {\n\t// Get the count of tracks in the database\n\tcount := trackDB.Count()\n\n\t// Check if the count is not -1\n\tif count != -1 {\n\t\t// Delete all tracks\n\t\terr := trackDB.DeleteAll()\n\n\t\t// Check if there was an error\n\t\tif err != nil {\n\t\t\t// Show 500, Internal Server Error\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\t// Set content-type to plain text\n\t\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\n\t\t// Print the feedback\n\t\tfmt.Fprintf(w, \"Deleted documents: %d\", count)\n\t} else {\n\t\t// Show 404, Not Found Error\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "55e0956b487faa416779d8870adecc29", "score": "0.6836573", "text": "func handlerAdminDeleteTrack(w http.ResponseWriter, r *http.Request) {\n\tsession, err := mgo.Dial(db.HostURL)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer session.Close()\n\t//Deletes all tracks in db\n\t_, err = session.DB(db.Databasename).C(db.TrackCollectionName).RemoveAll(bson.M{})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n}", "title": "" }, { "docid": "2953b5b4703dbb657b35f56d0dde31e7", "score": "0.59722877", "text": "func PostDeleteTrack(w http.ResponseWriter, r *http.Request) {\n\n\treqData := map[string]string{}\n\n\t// Parse JSON Data\n\tdec := json.NewDecoder(r.Body)\n\terr := dec.Decode(&reqData)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tt := reqData[\"track_id\"]\n\n\tcontext.tq.remove(t)\n\n\tw.WriteHeader(204)\n\tw.Write([]byte(`{\"status\":\"deleted\", \"track\":\"` + t + `\"}`))\n}", "title": "" }, { "docid": "988711c213221c5d581399fd6a3b12b9", "score": "0.5501134", "text": "func TracksCountHandler() http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tresp := storage.TrackDB.CountTracks()\n\t\tjson.NewEncoder(w).Encode(resp)\n\t})\n}", "title": "" }, { "docid": "7c487da544615393c4379a875f4ed044", "score": "0.549151", "text": "func (aMgr *AdminMgr) HandlerTrackCount(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Add(\"content-type\", \"text/plain\")\n\ttrackCount, err := aMgr.DB.GetTrackCount()\n\tif err != nil {\n\t\thttp.Error(w, \"error getting count from database\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\tfmt.Fprint(w, trackCount)\n}", "title": "" }, { "docid": "156149a4fe5b5907e4251b1afe00eaea", "score": "0.54123133", "text": "func (r *Router) DeleteHandler(c *gin.Context) {\n\tnDeleted, err := r.store.Stat().Delete()\n\tif err != nil {\n\t\trespond(c, http.StatusInternalServerError, \"\", err.Error())\n\t\treturn\n\t}\n\n\trespond(c, http.StatusOK, map[string]int{\n\t\t\"rows deleted\": nDeleted,\n\t}, \"\")\n}", "title": "" }, { "docid": "6c790b0c74b1dfc66c4433bd2b7fc2ce", "score": "0.5352572", "text": "func (ah *AdminHandler) GetTrackCount(req *router.Request) {\n\ttCnt, err := ah.db.Count(mdb.TRACKS)\n\tif err != nil {\n\t\treq.SendError(&router.Error{StatusCode: http.StatusInternalServerError, Message: \"Internal database error\"})\n\t\treturn\n\t}\n\treq.SendText(strconv.FormatInt(tCnt, 10), http.StatusOK)\n}", "title": "" }, { "docid": "16bb73bf87d24b1773e035528290528b", "score": "0.5318172", "text": "func (d *DBClient) DeleteAllRecordsHandler(w http.ResponseWriter, req *http.Request, next http.HandlerFunc) {\n\terr := d.Cache.DeleteData()\n\n\tvar en Entry\n\ten.ActionType = ActionTypeWipeDB\n\ten.Message = \"wipe\"\n\ten.Time = time.Now()\n\n\tif err := d.Hooks.Fire(ActionTypeWipeDB, &en); err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"error\": err.Error(),\n\t\t\t\"message\": en.Message,\n\t\t\t\"actionType\": ActionTypeWipeDB,\n\t\t}).Error(\"failed to fire hook\")\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tvar response messageResponse\n\tif err != nil {\n\t\tif err.Error() == \"bucket not found\" {\n\t\t\tresponse.Message = fmt.Sprintf(\"No records found\")\n\t\t\tw.WriteHeader(200)\n\t\t} else {\n\t\t\tresponse.Message = fmt.Sprintf(\"Something went wrong: %s\", err.Error())\n\t\t\tw.WriteHeader(500)\n\t\t}\n\t} else {\n\t\tresponse.Message = \"Proxy cache deleted successfuly\"\n\t\tw.WriteHeader(200)\n\t}\n\tb, err := json.Marshal(response)\n\n\tw.Write(b)\n\treturn\n}", "title": "" }, { "docid": "47090d935abd9e81ba3c9b38d92f2f69", "score": "0.52121836", "text": "func (ar AlbumDbRepository) Delete(entity *domain.Album) (err error) {\n\t// Delete all tracks.\n\tif len(entity.Tracks) == 0 {\n\t\tar.populateTracks(entity)\n\t}\n\ttracksRepo := TrackDbRepository{AppContext: ar.AppContext}\n\tfor i := range entity.Tracks {\n\t\ttracksRepo.Delete(&entity.Tracks[i])\n\t}\n\n\t// Then delete album.\n\t_, err = ar.AppContext.DB.Delete(entity)\n\treturn\n}", "title": "" }, { "docid": "b5aa439d7a898dc40ef9b7f9e9fd1c7e", "score": "0.5182665", "text": "func (s *Song) AfterAPIDelete(res http.ResponseWriter, req *http.Request) error {\n\taddr := req.RemoteAddr\n\tlog.Println(\"Song deleted by:\", addr, \"id:\", req.URL.Query().Get(\"id\"))\n\n\treturn nil\n}", "title": "" }, { "docid": "eda5d4649fd89c391e159d9bc78ef4d0", "score": "0.5076588", "text": "func (q cmfMusicQuery) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif q.Query == nil {\n\t\treturn 0, errors.New(\"models: no cmfMusicQuery provided for delete all\")\n\t}\n\n\tqueries.SetDelete(q.Query)\n\n\tresult, err := q.Query.ExecContext(ctx, exec)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from cmf_music\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for cmf_music\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "06e8e2fce039524c665d69baa0780242", "score": "0.5013574", "text": "func AdminTrackCount(w http.ResponseWriter, _ *http.Request) {\n\t// Set content-type to plain text\n\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\n\t// Get the count from the database\n\tcount := trackDB.Count()\n\n\t// Check if count is -1\n\tif count == -1 {\n\t\t// Show 404, Not Found Error\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\t// Print the count\n\tfmt.Fprintf(w, \"%d\", count)\n}", "title": "" }, { "docid": "284254b0d5829a41c23c698f2486945f", "score": "0.50029135", "text": "func (s *Song) Delete(res http.ResponseWriter, req *http.Request) error {\n\t// See BeforeAPIDelete above, how we have checked the request for some\n\t// form of auth. This could be done here instead, but if it is done once\n\t// above, it means the request is valid here too.\n\treturn nil\n}", "title": "" }, { "docid": "82f3f39ad52a75cb08ed0ceb1aa0ced2", "score": "0.49775693", "text": "func (s *service) DeleteAll(ctx context.Context, req *pb.Request, res *pb.Response) error {\n\tdone, err := s.repo.DeleteAll(\"\")\n\tif err != nil {\n\t\ttheerror := fmt.Sprintf(\"%v --from souscription_service\", err)\n\t\treturn errors.New(theerror)\n\t}\n\tres.Done = done\n\treturn nil\n}", "title": "" }, { "docid": "b84674b9104d3cbcd7405652f5869e25", "score": "0.49610013", "text": "func (a *apiServer) DeleteAll(ctx context.Context, request *emptypb.Empty) (response *emptypb.Empty, retErr error) {\n\tif _, err := a.DeletePipelines(ctx, &pps.DeletePipelinesRequest{All: true, Force: true}); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := a.env.KubeClient.CoreV1().Secrets(a.namespace).DeleteCollection(ctx, metav1.DeleteOptions{}, metav1.ListOptions{\n\t\tLabelSelector: \"secret-source=pachyderm-user\",\n\t}); err != nil {\n\t\treturn nil, errors.EnsureStack(err)\n\t}\n\treturn &emptypb.Empty{}, nil\n}", "title": "" }, { "docid": "61bc724a43187f9adceaedd321f15134", "score": "0.48343286", "text": "func (o CMFMusicSlice) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif len(o) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tif len(cmfMusicBeforeDeleteHooks) != 0 {\n\t\tfor _, obj := range o {\n\t\t\tif err := obj.doBeforeDeleteHooks(ctx, exec); err != nil {\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t}\n\t}\n\n\tvar args []interface{}\n\tfor _, obj := range o {\n\t\tpkeyArgs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(obj)), cmfMusicPrimaryKeyMapping)\n\t\targs = append(args, pkeyArgs...)\n\t}\n\n\tsql := \"DELETE FROM `cmf_music` WHERE \" +\n\t\tstrmangle.WhereClauseRepeated(string(dialect.LQ), string(dialect.RQ), 0, cmfMusicPrimaryKeyColumns, len(o))\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from cmfMusic slice\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for cmf_music\")\n\t}\n\n\tif len(cmfMusicAfterDeleteHooks) != 0 {\n\t\tfor _, obj := range o {\n\t\t\tif err := obj.doAfterDeleteHooks(ctx, exec); err != nil {\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "23a2ae581d75a6796dc759a76daca50d", "score": "0.48290044", "text": "func (handle ArtistHandler) Delete(w http.ResponseWriter, req *http.Request) {\n\tparams := mux.Vars(req)\n\n\tif err := model.NewArtistDAO(handle.db).Delete(params[\"id\"]); err != nil {\n\t\tlog.Println(err)\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t}\n\n\tlog.Printf(\"%s - %s - %s\\n\", req.Method, req.Host, req.URL.Path)\n\tw.Write([]byte(\"success!\"))\n}", "title": "" }, { "docid": "35d9e19fe96f1435d697f2b81242d340", "score": "0.48287705", "text": "func (c *TrackerController) Delete(ctx *app.DeleteTrackerContext) error {\n\tresult := application.Transactional(c.db, func(appl application.Application) error {\n\t\terr := appl.Trackers().Delete(ctx.Context, ctx.ID)\n\t\tif err != nil {\n\t\t\tswitch err.(type) {\n\t\t\tcase remoteworkitem.NotFoundError:\n\t\t\t\treturn goa.ErrNotFound(err.Error())\n\t\t\tdefault:\n\t\t\t\treturn goa.ErrInternal(err.Error())\n\t\t\t}\n\t\t}\n\t\treturn ctx.OK([]byte{})\n\t})\n\tc.scheduler.ScheduleAllQueries()\n\treturn result\n}", "title": "" }, { "docid": "5774cb956b7f522a05fbfe8d0370ffc8", "score": "0.48125577", "text": "func HandleDeleteAllJobs(cache job.JobCache, disableDeleteAll bool) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tif disableDeleteAll {\n\t\t\tw.WriteHeader(http.StatusForbidden)\n\t\t\treturn\n\t\t}\n\n\t\tif err := job.DeleteAll(cache); err != nil {\n\t\t\terrorEncodeJSON(err, http.StatusInternalServerError, w)\n\t\t} else {\n\t\t\tw.WriteHeader(http.StatusNoContent)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d8faad90339e966d8e1d0c065d491cad", "score": "0.4803588", "text": "func DeleteCounts(s http.ResponseWriter, r *http.Request) {\n\tcount = nil\n}", "title": "" }, { "docid": "c8be22fbc17e2ef72f0512f3da66e4df", "score": "0.4770371", "text": "func (serv *Server) DELETE(url string, handlers ...Handler) {\n\tserv.Handle(\"DELETE\", url, handlers...)\n}", "title": "" }, { "docid": "dce234e41aef78f9d2591381a6f78ad1", "score": "0.4731391", "text": "func handlerAdminCount(w http.ResponseWriter, r *http.Request) {\n\tsession, err := mgo.Dial(db.HostURL)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer session.Close()\n\t//Get the count of all the tracks in db\n\tcount, err := session.DB(db.Databasename).C(db.TrackCollectionName).Count()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t_, err = fmt.Fprintf(w, \"%d\", count)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "0f1811d8a0d120c8c599617e4f134227", "score": "0.47075742", "text": "func (o *ObjectNode) deleteObjectsHandler(w http.ResponseWriter, r *http.Request) {\n\tlog.LogInfof(\"deleteObjectsHandler: delete multiple objects, requestID(%v) remote(%v)\",\n\t\tRequestIDFromRequest(r), r.RemoteAddr)\n\t// check args\n\t_, _, _, vl, err := o.parseRequestParams(r)\n\n\tbytes, err := ioutil.ReadAll(r.Body)\n\tif err != nil && err != io.EOF {\n\t\tlog.LogErrorf(\"deleteObjectsHandler: read request body fail: requestID(%v) err(%v)\", RequestIDFromRequest(r), err)\n\t\t_ = InternalError.ServeResponse(w, r)\n\t\treturn\n\t}\n\n\tdeleteReq := DeleteRequest{}\n\terr = UnmarshalXMLEntity(bytes, &deleteReq)\n\tif err != nil {\n\t\tlog.LogErrorf(\"deleteObjectsHandler: unmarshal xml fail: requestID(%v) err(%v)\",\n\t\t\tRequestIDFromRequest(r), err)\n\t\t_ = InvalidArgument.ServeResponse(w, r)\n\t\treturn\n\t}\n\n\tif len(deleteReq.Objects) <= 0 {\n\t\tlog.LogDebugf(\"deleteObjectsHandler: non objects found in request: requestID(%v)\", RequestIDFromRequest(r))\n\t\t_ = InvalidArgument.ServeResponse(w, r)\n\t\treturn\n\t}\n\n\tvar wg sync.WaitGroup\n\tdeletesResult := DeletesResult{\n\t\tDeletedObjects: make([]Deleted, 0),\n\t\tDeletedErrors: make([]Error, 0),\n\t}\n\tdeletedObjectsCh := make(chan *Deleted, len(deleteReq.Objects))\n\tdeletedErrorsCh := make(chan *Error, len(deleteReq.Objects))\n\n\tfor _, object := range deleteReq.Objects {\n\t\twg.Add(1)\n\t\tgo func(obj Object) {\n\t\t\tdefer func() {\n\t\t\t\twg.Done()\n\t\t\t\tif errDelete := recover(); errDelete != nil {\n\t\t\t\t\tdeletedError := Error{\n\t\t\t\t\t\tKey: obj.Key,\n\t\t\t\t\t\tCode: strconv.Itoa(InternalError.StatusCode),\n\t\t\t\t\t\tMessage: InternalError.ErrorMessage,\n\t\t\t\t\t}\n\t\t\t\t\tdeletedErrorsCh <- &deletedError\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\terr = vl.DeleteFile(obj.Key)\n\t\t\tif err != nil {\n\t\t\t\tossError := transferError(obj.Key, err)\n\t\t\t\tdeletedErrorsCh <- &ossError\n\t\t\t} else {\n\t\t\t\tdeleted := Deleted{Key: obj.Key}\n\t\t\t\tdeletedObjectsCh <- &deleted\n\t\t\t\tlog.LogDebugf(\"deleteObjectsHandler: delete object: requestID(%v) key(%v)\", RequestIDFromRequest(r),\n\t\t\t\t\tdeleted.Key)\n\t\t\t}\n\t\t}(object)\n\t}\n\n\twg.Wait()\n\tclose(deletedObjectsCh)\n\tclose(deletedErrorsCh)\n\n\tfor {\n\t\tdeletedObject := <-deletedObjectsCh\n\t\tif deletedObject == nil {\n\t\t\tbreak\n\t\t}\n\t\tdeletesResult.DeletedObjects = append(deletesResult.DeletedObjects, *deletedObject)\n\t}\n\tfor {\n\t\tdeletedError := <-deletedErrorsCh\n\t\tif deletedError == nil {\n\t\t\tbreak\n\t\t}\n\t\tdeletesResult.DeletedErrors = append(deletesResult.DeletedErrors, *deletedError)\n\t}\n\n\tlog.LogDebugf(\"deleteObjectsHandler: delete objects: deletes(%v) errors(%v)\", len(deletesResult.DeletedObjects), len(deletesResult.DeletedErrors))\n\tvar bytesRes []byte\n\tvar marshalError error\n\tif bytesRes, marshalError = MarshalXMLEntity(deletesResult); marshalError != nil {\n\t\tlog.LogErrorf(\"deleteObjectsHandler: marshal xml entity fail: requestID(%v) err(%v)\", RequestIDFromRequest(r), err)\n\t\tif respErr := InternalError.ServeResponse(w, r); respErr != nil {\n\t\t\tlog.LogErrorf(\"deleteObjectsHandler: write response fail: requestID(%v) err(%v)\", RequestIDFromRequest(r), respErr)\n\t\t\treturn\n\t\t}\n\t\treturn\n\t}\n\n\t// set response header\n\tw.Header().Set(HeaderNameContentType, HeaderValueContentTypeXML)\n\tw.Header().Set(HeaderNameContentLength, strconv.Itoa(len(bytesRes)))\n\tif _, err = w.Write(bytesRes); err != nil {\n\t\tlog.LogErrorf(\"deleteObjectsHandler: write response body fail: requestID(%v) err(%v)\", RequestIDFromRequest(r), err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "2253f052ca30a152aa2913f90d0e1da3", "score": "0.46958187", "text": "func (d *Demo) DeleteAll(g *gom.Gom) {\n\ttoolkit.Println(\"===== Delete All =====\")\n\n\tvar err error\n\tif d.useParams {\n\t\t_, err = g.Set(&gom.SetParams{\n\t\t\tTableName: \"hero\",\n\t\t\tFilter: gom.EndWith(\"Name\", \"man\"),\n\t\t\tTimeout: 10,\n\t\t}).Cmd().DeleteAll()\n\t} else {\n\t\t_, err = g.Set(nil).Table(\"hero\").Timeout(10).Filter(gom.EndWith(\"Name\", \"man\")).Cmd().DeleteAll()\n\t}\n\n\tif err != nil {\n\t\ttoolkit.Println(err.Error())\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "d68e8e92adc8a5a5b90688ab6670cbf3", "score": "0.4687415", "text": "func (h *DBHandle) DeleteAll() error {\n\titer, err := h.GetIterator(nil, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer iter.Release()\n\n\t// use leveldb iterator directly to be more efficient\n\tdbIter := iter.Iterator\n\n\t// This is common code shared by all the leveldb instances. Because each leveldb has its own key size pattern,\n\t// each batch is limited by memory usage instead of number of keys. Once the batch memory usage reaches maxBatchSize,\n\t// the batch will be committed.\n\tnumKeys := 0\n\tbatchSize := 0\n\tbatch := &leveldb.Batch{}\n\tfor dbIter.Next() {\n\t\tif err := dbIter.Error(); err != nil {\n\t\t\treturn errors.Wrap(err, \"internal leveldb error while retrieving data from db iterator\")\n\t\t}\n\t\tkey := dbIter.Key()\n\t\tnumKeys++\n\t\tbatchSize = batchSize + len(key)\n\t\tbatch.Delete(key)\n\t\tif batchSize >= maxBatchSize {\n\t\t\tif err := h.db.WriteBatch(batch, true); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlogger.Infof(\"Have removed %d entries for channel %s in leveldb %s\", numKeys, h.dbName, h.db.conf.DBPath)\n\t\t\tbatchSize = 0\n\t\t\tbatch = &leveldb.Batch{}\n\t\t}\n\t}\n\tif batch.Len() > 0 {\n\t\treturn h.db.WriteBatch(batch, true)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "879dfcffa840ebbc5bc8d6d8d15d34d8", "score": "0.46742347", "text": "func uploadDeleteHandler(w http.ResponseWriter, r *http.Request) {\n\tupDownDelete(\"upload\", theCfg.uploadDir, false, w, r)\n\n}", "title": "" }, { "docid": "2ebd608e6bec2e3279bbdd161985a097", "score": "0.46667296", "text": "func trackHandler(w http.ResponseWriter, r *http.Request, id uuid.UUID) {\n\ttrack, ok := tracks.getTrack(id)\n\n\tif !ok {\n\t\thttp.NotFound(w, r)\n\t\treturn\n\t}\n\n\tjs, err := json.Marshal(track)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(js)\n}", "title": "" }, { "docid": "2e2a00ddf42b079bbf19f7813141f331", "score": "0.46235713", "text": "func (h *Handler) serveDeleteSeries(w http.ResponseWriter, r *http.Request) {}", "title": "" }, { "docid": "e679f22b8d8ef523f031121181cc2ca2", "score": "0.46163106", "text": "func (q channelQuery) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif q.Query == nil {\n\t\treturn 0, errors.New(\"models: no channelQuery provided for delete all\")\n\t}\n\n\tqueries.SetDelete(q.Query)\n\n\tresult, err := q.Query.ExecContext(ctx, exec)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from channels\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for channels\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "a6a0b4c444061d0405c0eeaacdfcf920", "score": "0.4616095", "text": "func (c *gitTracks) Delete(name string, options *v1.DeleteOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"gittracks\").\n\t\tName(name).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "65109130866d44ef0e5ddea8dd882980", "score": "0.46127382", "text": "func (c *BaseController) DeleteObjects(r *web.Request) (*web.Response, error) {\n\tctx := r.Context()\n\tlog.C(ctx).Debugf(\"Deleting %ss...\", c.objectType)\n\n\tisAsync := r.URL.Query().Get(web.QueryParamAsync)\n\tif isAsync == \"true\" {\n\t\treturn nil, &util.HTTPError{\n\t\t\tErrorType: \"BadRequest\",\n\t\t\tDescription: \"Only one resource can be deleted asynchronously at a time\",\n\t\t\tStatusCode: http.StatusBadRequest,\n\t\t}\n\t}\n\n\tcriteria := query.CriteriaForContext(ctx)\n\n\tlog.C(ctx).Debugf(\"Request will be executed synchronously\")\n\tif err := c.repository.Delete(ctx, c.objectType, criteria...); err != nil {\n\t\treturn nil, util.HandleStorageError(err, c.objectType.String())\n\t}\n\n\treturn util.NewJSONResponse(http.StatusOK, map[string]string{})\n}", "title": "" }, { "docid": "885b4c53451db61e6df7132ff9cad0ec", "score": "0.46114808", "text": "func (s *Storage) DeleteAll() error {\n\treturn s.restcli.Delete().RequestURI(s.listURI()).\n\t\tDo().Error()\n}", "title": "" }, { "docid": "3a95530d149b84480e20b0942cf182cd", "score": "0.46050534", "text": "func DeleteHandler(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\t// Pass the call to the model with params found in the path\n\tid := request.PathParameters[\"id\"]\n\tfmt.Println(\"Path vars: \", id)\n\terr := course.Delete(id)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"Failed to find course, %v\", err))\n\t}\n\n\tmsg := fmt.Sprintf(\"Deleted course with id: %s \\n\", id)\n\treturn events.APIGatewayProxyResponse{Body: msg, StatusCode: 200}, nil\n}", "title": "" }, { "docid": "62fa54cb8d08efeee34463e2e8ea12f7", "score": "0.46045145", "text": "func (c *Seaweed) DeleteChunks(cm *ChunkManifest, args url.Values) (err error) {\n\tif cm == nil || len(cm.Chunks) == 0 {\n\t\treturn nil\n\t}\n\n\tn := len(cm.Chunks)\n\tresult := make(chan error, n)\n\n\tfor _, ci := range cm.Chunks {\n\t\tgo c.deleteFileTask(ci.Fid, args, result)\n\t}\n\n\tfor i := 0; i < n; i++ {\n\t\tif e := <-result; e != nil {\n\t\t\terr = e\n\t\t\treturn\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "85bb6a868777e66b18bccced4417b052", "score": "0.45948574", "text": "func (s HTTPStore) RemoveAll() error {\n\turl, err := s.buildMetaURL(\"\")\n\tif err != nil {\n\t\treturn err\n\t}\n\treq, err := http.NewRequest(\"DELETE\", url.String(), nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\tresp, err := s.roundTrip.RoundTrip(req)\n\tif err != nil {\n\t\treturn NetworkError{Wrapped: err}\n\t}\n\tdefer resp.Body.Close()\n\treturn translateStatusToError(resp, \"DELETE metadata for GUN endpoint\")\n}", "title": "" }, { "docid": "9c3604d41479ff7e196007ae377a650a", "score": "0.45891464", "text": "func GetListTracks(w http.ResponseWriter, r *http.Request) {\n\tresponse := make(map[string]interface{})\n\tqueuedTracks := context.tq.list()\n\n\tresponse[\"queue\"] = queuedTracks\n\tresponse[\"now_playing\"] = map[string]interface{}{\n\t\t\"track\": context.np.current,\n\t\t\"time_remaining\": context.np.timeRemaining,\n\t}\n\n\tjresponse, _ := json.Marshal(response)\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(jresponse)\n}", "title": "" }, { "docid": "0672ca061182c7feeb1332fb73f4e236", "score": "0.45861435", "text": "func (o LatencySlice) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif len(o) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tif len(latencyBeforeDeleteHooks) != 0 {\n\t\tfor _, obj := range o {\n\t\t\tif err := obj.doBeforeDeleteHooks(ctx, exec); err != nil {\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t}\n\t}\n\n\tvar args []interface{}\n\tfor _, obj := range o {\n\t\tpkeyArgs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(obj)), latencyPrimaryKeyMapping)\n\t\targs = append(args, pkeyArgs...)\n\t}\n\n\tsql := \"DELETE FROM \\\"latencies\\\" WHERE \" +\n\t\tstrmangle.WhereClauseRepeated(string(dialect.LQ), string(dialect.RQ), 1, latencyPrimaryKeyColumns, len(o))\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from latency slice\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for latencies\")\n\t}\n\n\tif len(latencyAfterDeleteHooks) != 0 {\n\t\tfor _, obj := range o {\n\t\t\tif err := obj.doAfterDeleteHooks(ctx, exec); err != nil {\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "60b89707877a2867d514784e55e756e8", "score": "0.45842946", "text": "func updateMultipleTracks(store Datastore, r *http.Request, updatesForTracks Track) (result SearchResult, action string, err error) {\n\ttracks, totalPages, err := queryMultipleTracks(store, r)\n\tresult.TotalPages = totalPages\n\tif err != nil {\n\t\treturn\n\t}\n\tif err != nil {\n\t\treturn\n\t}\n\tonlyMissing := (r.Header.Get(\"If-None-Match\") == \"*\")\n\n\tresult.Tracks = make([]Track, 0)\n\taction = \"noChange\"\n\tfor i := range tracks {\n\t\ttrackupdates := updatesForTracks\n\t\ttrackupdates.ID = tracks[i].ID\n\t\tstoredTrack, trackAction, trackError := store.updateCreateTrackDataByField(\"id\", tracks[i].ID, trackupdates, tracks[i], onlyMissing)\n\t\tif trackError != nil {\n\t\t\terr = trackError\n\t\t\treturn\n\t\t}\n\t\tif trackAction == \"noChange\" {\n\t\t\tcontinue\n\t\t}\n\t\tif trackAction != \"trackUpdated\" {\n\t\t\terr = errors.New(\"Unexpected action \"+trackAction)\n\t\t\treturn\n\t\t}\n\t\tresult.Tracks = append(result.Tracks, storedTrack)\n\t\taction = \"tracksUpdated\"\n\t}\n\tif action != \"noChange\" {\n\t\tstore.Loganne.post(action, strconv.Itoa(len(result.Tracks)) + \" tracks updated\", Track{}, Track{})\n\t}\n\treturn\n}", "title": "" }, { "docid": "e147b45b0b34968d91e8917ea2bab16c", "score": "0.45788386", "text": "func (c *gitTracks) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"gittracks\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "7f876a45ea4ff375eb7bfe837d62530d", "score": "0.45740554", "text": "func (o ChannelSlice) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif len(o) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tif len(channelBeforeDeleteHooks) != 0 {\n\t\tfor _, obj := range o {\n\t\t\tif err := obj.doBeforeDeleteHooks(ctx, exec); err != nil {\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t}\n\t}\n\n\tvar args []interface{}\n\tfor _, obj := range o {\n\t\tpkeyArgs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(obj)), channelPrimaryKeyMapping)\n\t\targs = append(args, pkeyArgs...)\n\t}\n\n\tsql := \"DELETE FROM \\\"channels\\\" WHERE \" +\n\t\tstrmangle.WhereClauseRepeated(string(dialect.LQ), string(dialect.RQ), 1, channelPrimaryKeyColumns, len(o))\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from channel slice\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for channels\")\n\t}\n\n\tif len(channelAfterDeleteHooks) != 0 {\n\t\tfor _, obj := range o {\n\t\t\tif err := obj.doAfterDeleteHooks(ctx, exec); err != nil {\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "875a53a9015ba2986c732e94b9d78e3b", "score": "0.4573199", "text": "func DeleteHandler(w http.ResponseWriter, r *http.Request) {\n\t_, _, ok := r.BasicAuth()\n\tif !ok {\n\t\tw.Header().Set(\"WWW-Authenticate\", fmt.Sprintf(`Basic realm=\"%s\"`, BasicAuthRealm))\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tw.Write([]byte(http.StatusText(http.StatusUnauthorized) + \"\\n\"))\n\t\treturn\n\t}\n\tif !reqIsAdmin(r) {\n\t\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n\t\treturn\n\t}\n\tu := &User{\n\t\tUsername: strings.ToLower(r.FormValue(\"username\")),\n\t}\n\terr := u.Delete()\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusUnauthorized)\n\t\treturn\n\t}\n\tfmt.Fprintf(w, \"User Deleted\\n\")\n}", "title": "" }, { "docid": "76ee2772826cf773047ad4e51ae3c8e2", "score": "0.4570527", "text": "func (this *Route) DELETE(handlers ...HTTPHandler) *Route {\n\treturn this.addHandler(\"delete\", handlers...)\n}", "title": "" }, { "docid": "174bc787ae4909597cc8573569e5b718", "score": "0.45640543", "text": "func (q latencyQuery) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif q.Query == nil {\n\t\treturn 0, errors.New(\"models: no latencyQuery provided for delete all\")\n\t}\n\n\tqueries.SetDelete(q.Query)\n\n\tresult, err := q.Query.ExecContext(ctx, exec)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from latencies\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for latencies\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "adb48013d365379298574842878f7090", "score": "0.45640203", "text": "func DeleteQuestionHandler(w http.ResponseWriter, r *http.Request) {\n\tquestionId := r.FormValue(\"id\")\n\tif questionId == \"\" {\n\t\tfmt.Fprintln(w, \"not found id\")\n\t\treturn\n\t}\n\n\tqId, err := strconv.Atoi(questionId)\n\tif err != nil {\n\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif err := db.DeleteQuestion(qId); err != nil {\n\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tfmt.Fprintln(w, \"success\")\n}", "title": "" }, { "docid": "e40546617e9ca0dc6c6bc866bd48a2b6", "score": "0.45291382", "text": "func (u *StoreUploader) DeleteAll(ctx context.Context, bucket, prefix string) error {\n\tif len(prefix) == 0 {\n\t\treturn errors.New(\"prefix cannot be empty\")\n\t}\n\n\tdoneCh := make(chan struct{})\n\tdefer close(doneCh)\n\n\tlogger := u.logger.With(\"bucket\", bucket, \"prefix\", prefix)\n\n\tlogger.Debugw(\"Listing existing objects\")\n\n\tlistOpts := minio.ListObjectsOptions{\n\t\tRecursive: true,\n\t\tPrefix: fmt.Sprintf(\"%s-%s\", prefix, prefixSeparator),\n\t}\n\n\tvar existingObjects []minio.ObjectInfo\n\tfor object := range u.client.ListObjects(ctx, bucket, listOpts) {\n\t\tif object.Err != nil {\n\t\t\treturn object.Err\n\t\t}\n\t\texistingObjects = append(existingObjects, object)\n\t}\n\n\tlogger.Debugw(\"Done listing bucket\", \"objects\", len(existingObjects))\n\n\tfor _, object := range existingObjects {\n\t\tlogger.Infow(\"Removing object\", \"object\", object.Key)\n\t\tif err := u.client.RemoveObject(ctx, bucket, object.Key, minio.RemoveObjectOptions{}); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "be4df7bfde30e268437b90e7e587f53a", "score": "0.45233762", "text": "func (s *session) DeleteAll() {\n\ts.mutex.Lock()\n\tdefer s.mutex.Unlock()\n\n\ts.values = SessionValues{}\n}", "title": "" }, { "docid": "09a92199246e89fa7d53e6147de0bf12", "score": "0.4519663", "text": "func deleteSilenceAPICall(silencedAlert, silenceID string) error {\n\n\tapiURL := utils.ValidateURL(utils.ConfigJSON.Server.CMSMONURL, utils.ConfigJSON.Server.DeleteSilenceAPI)\n\tapiURL = utils.ValidateURL(apiURL, \"/\"+silenceID)\n\n\tvar headers [][]string\n\theaders = append(headers, []string{\"Content-Type\", \"application/json\"})\n\tresp := utils.HttpCall(\"DELETE\", apiURL, headers, nil)\n\tdefer resp.Body.Close()\n\n\tif utils.ConfigJSON.Server.Verbose > 2 {\n\t\tlog.Printf(\"Silence Deleted for:\\n%+v\\n\", silencedAlert)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5eee082a154b1b04f90b23d304816035", "score": "0.45089993", "text": "func (r *SmscSessionRepository) DeleteAll() error {\n\tids := make([]string, 0)\n\terr := app.BuntDBInMemory.View(func(tx *buntdb.Tx) error {\n\t\treturn tx.Ascend(SMSC_SESSION_PREFIX, func(key, value string) bool {\n\t\t\tids = append(ids, key)\n\t\t\treturn true\n\t\t})\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn app.BuntDBInMemory.Update(func(tx *buntdb.Tx) error {\n\t\tfor _, id := range ids {\n\t\t\t_, err := tx.Delete(id)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "7856d3643eba825e1bbddc974cda295d", "score": "0.4505895", "text": "func (g *RouterGroup) DELETE(url string, handler ...Handler) *RouterGroup {\n\tg.app.routeANY = false\n\tg.AppendReqAndResp(url, \"delete\", handler)\n\treturn g\n}", "title": "" }, { "docid": "38e37ac2d9ca159344d5814092438696", "score": "0.44846958", "text": "func (q vspQuery) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif q.Query == nil {\n\t\treturn 0, errors.New(\"models: no vspQuery provided for delete all\")\n\t}\n\n\tqueries.SetDelete(q.Query)\n\n\tresult, err := q.Query.ExecContext(ctx, exec)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from vsp\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for vsp\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "09b9ac19d266ed2a324e2b14da8be480", "score": "0.4480837", "text": "func DeleteBrowsing(c echo.Context) error {\n\t// TODO: implement delete browsing function\n\treturn c.JSON(http.StatusOK, \"{'hello': 'world'}\")\n}", "title": "" }, { "docid": "61b010e3eec22351a7207e55838fb58f", "score": "0.4475464", "text": "func Delete(config *HTTPConfig) (*HTTPResult, error) {\n\treturn HandleRequest(\"DELETE\", config)\n}", "title": "" }, { "docid": "f8c480298aaea09339b0e0098c7b8b58", "score": "0.44720936", "text": "func (ec *executionContext) field_Mutation_deleteAllVideoPlaylist_args(ctx context.Context, rawArgs map[string]interface{}) (map[string]interface{}, error) {\n\tvar err error\n\targs := map[string]interface{}{}\n\tvar arg0 int\n\tif tmp, ok := rawArgs[\"playlist_id\"]; ok {\n\t\targ0, err = ec.unmarshalNInt2int(ctx, tmp)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\targs[\"playlist_id\"] = arg0\n\treturn args, nil\n}", "title": "" }, { "docid": "20b3630899a1129f16753fa4040f0a8d", "score": "0.44709966", "text": "func (c *Client) ListTracks() ([]*jamsonic.Track, error) {\n\tpanic(\"should not be called.\")\n}", "title": "" }, { "docid": "530707d7aa034c95eda2c149f95e7139", "score": "0.44686577", "text": "func (w *ServerInterfaceWrapper) DeleteAllOrders(ctx echo.Context) error {\n\tvar err error\n\n\tctx.Set(ApiKeyAuthScopes, []string{\"\"})\n\n\t// Parameter object where we will unmarshal all parameters from the context\n\tvar params DeleteAllOrdersParams\n\t// ------------- Optional query parameter \"symbol\" -------------\n\n\terr = runtime.BindQueryParameter(\"form\", true, false, \"symbol\", ctx.QueryParams(), &params.Symbol)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter symbol: %s\", err))\n\t}\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.DeleteAllOrders(ctx, params)\n\treturn err\n}", "title": "" }, { "docid": "dd458cf5675dbffe534a5b427d315a80", "score": "0.44654498", "text": "func (c *BaseController) DeleteObjects(r *web.Request) (*web.Response, error) {\n\tctx := r.Context()\n\tlog.C(ctx).Debugf(\"Deleting %ss...\", c.objectType)\n\n\tcriteria := query.CriteriaForContext(ctx)\n\tif _, err := c.repository.Delete(ctx, c.objectType, criteria...); err != nil {\n\t\treturn nil, util.HandleStorageError(err, string(c.objectType))\n\t}\n\n\treturn util.NewJSONResponse(http.StatusOK, map[string]string{})\n}", "title": "" }, { "docid": "6fd8caf9e060d5917d0347812bc8ca5d", "score": "0.4465048", "text": "func DelKeyHandler(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tvars := r.URL.Query()\n\tkeys := vars[\"keys\"]\n\n\tresponse := models.OutResponse{}\n\tif len(keys) == 0 {\n\t\tresponse.Message = \"No keys provided\"\n\t\tresponse.Status = http.StatusUnprocessableEntity\n\t\tlog.Println(\"<Del keys> error: No keys provided\")\n\t\thttp.Error(w, utils.SerializeErrMessage(response), http.StatusUnprocessableEntity)\n\t\treturn\n\t}\n\terr := client.Del(keys...).Err()\n\n\tif err != nil {\n\t\tresponse.Message = \"Something went wrong\"\n\t\tresponse.Status = http.StatusInternalServerError\n\t\tlog.Printf(\"<Del keys> error: %v\\n\", err)\n\t\thttp.Error(w, utils.SerializeErrMessage(response), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tresponse.Message = fmt.Sprintf(\"Successfully deleted keys: %v\", keys)\n\tresponse.Status = http.StatusOK\n\tlog.Printf(\"<Del keys> success: Successfully deleted keys: %v\", keys)\n\n\tjson.NewEncoder(w).Encode(response)\n}", "title": "" }, { "docid": "991861d3eed017d02021b995e9e5e299", "score": "0.44642547", "text": "func (m *Manager) DeleteTicker(w http.ResponseWriter, r *http.Request) {\n\tm.Lock()\n\tdefer m.Unlock()\n\n\tlogger.Debugf(\"Got an API request to delete a ticker\")\n\n\tvars := mux.Vars(r)\n\tid := strings.ToUpper(vars[\"id\"])\n\n\tif _, ok := m.WatchingTicker[id]; !ok {\n\t\tlogger.Errorf(\"No ticker found: %s\", id)\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\t// send shutdown sign\n\tm.WatchingTicker[id].Shutdown()\n\ttickerCount.Dec()\n\n\t// remove from cache\n\tdelete(m.WatchingTicker, id)\n\n\tlogger.Infof(\"Deleted ticker %s\", id)\n\tw.WriteHeader(http.StatusNoContent)\n}", "title": "" }, { "docid": "490dfdf708e883dd9eab3495698d505e", "score": "0.4461229", "text": "func destroyHandler(s *search.SearchServer, w http.ResponseWriter, r *http.Request) {\n\tparams := r.URL.Query()\n\tcollection := params.Get(\"collection\")\n\n\tif collection == \"\" {\n\t\trespondWithError(w, r, \"Collection query parameter is required\")\n\t\treturn\n\t}\n\n\tif !s.Exists(collection) {\n\t\trespondWithError(w, r, \"Collection does not exist\")\n\t\treturn\n\t}\n\n\ts.Destroy(collection)\n\trespondWithSuccess(w, r, \"collection destroyed\")\n}", "title": "" }, { "docid": "93818c6764c2e60ccc76d589b47ecd44", "score": "0.4454284", "text": "func (q rawVisitQuery) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif q.Query == nil {\n\t\treturn 0, errors.New(\"models: no rawVisitQuery provided for delete all\")\n\t}\n\n\tqueries.SetDelete(q.Query)\n\n\tresult, err := q.Query.ExecContext(ctx, exec)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from raw_visits\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for raw_visits\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "f94f1c107456c27ac0831725ae2429b1", "score": "0.44508484", "text": "func Delete(h http.Handler) http.Handler {\n\treturn HTTP(h, DELETE)\n}", "title": "" }, { "docid": "305aaf1a6e613192c2da127e28b8e5a0", "score": "0.44488305", "text": "func HandlerReportsClearConfirm(aResponseWriter http.ResponseWriter, aRequest *http.Request) {\n\taRequest.ParseForm()\n\n\ttoken := GetCookieToken(aRequest)\n\tisValid, userId := DbIsTokenValid(token, nil)\n\tlog.Printf(\"HandlerReports, token=%s, isValid=%t, userId=%d\", token, isValid, userId)\n\tif !isValid {\n\t\tServeLogin(aResponseWriter, STR_MSG_login)\n\t\treturn\n\t}\n\n\tvar strApiKey string = STR_EMPTY\n\tvar strAppName string = STR_EMPTY\n\tsliceApiKeys := aRequest.Form[API_KEY_apikey]\n\tsliceAppNames := aRequest.Form[API_KEY_appname]\n\tlog.Printf(\"HandlerReportsClearConfirm, sliceApiKeys=%s, sliceApiNames=%s\", sliceApiKeys, sliceAppNames)\n\tif sliceApiKeys != nil && len(sliceApiKeys) > 0 {\n\t\tstrApiKey = sliceApiKeys[0]\n\t} else {\n\t\tstrApiKey = STR_EMPTY\n\t}\n\tif sliceAppNames != nil && len(sliceAppNames) > 0 {\n\t\tstrAppName = sliceAppNames[0]\n\t}\n\tif strApiKey == STR_EMPTY {\n\t\treturn\n\t}\n\n\tvar apiKey *objects.ApiKey = new(objects.ApiKey)\n\tapiKey.ApiKey = strApiKey\n\tapiKey.AppName = strAppName\n\n\ttemplateDeleteConfirm, err := template.ParseFiles(STR_template_reports_deleteconfirm_html)\n\tif err != nil {\n\t\tlog.Printf(\"HandlerReportsClearConfirm, Error parsing template %s, error=%s\", STR_template_reports_deleteconfirm_html, err.Error())\n\t}\n\terrorExecute := templateDeleteConfirm.Execute(aResponseWriter, apiKey)\n\tif errorExecute != nil {\n\t\tlog.Printf(\"HandlerReportsClearConfirm, Error executing template, %s, error=%s\", STR_template_reports_deleteconfirm_html, errorExecute.Error())\n\t}\n}", "title": "" }, { "docid": "de2fa4ea350fec0af82305fc1bb98009", "score": "0.44476813", "text": "func uploadAsyncDeleteHandler(w http.ResponseWriter, r *http.Request) {\n\tupDownDelete(\"upload\", theCfg.uploadDir, true, w, r)\n}", "title": "" }, { "docid": "256f33b171333a3c3d16b1b4071bcde6", "score": "0.4433369", "text": "func (q stockKeepingUnitContentQuery) DeleteAll(exec boil.Executor) (int64, error) {\n\tif q.Query == nil {\n\t\treturn 0, errors.New(\"db: no stockKeepingUnitContentQuery provided for delete all\")\n\t}\n\n\tqueries.SetDelete(q.Query)\n\n\tresult, err := q.Query.Exec(exec)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"db: unable to delete all from stock_keeping_unit_content\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"db: failed to get rows affected by deleteall for stock_keeping_unit_content\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "de154b7195117783fd367771f14d9cd7", "score": "0.44305375", "text": "func (db *Mngo) DeleteAll(c *store.Context, filter bson.M, model store.Model) (int64, error) {\n\tutils.EnsurePointer(model)\n\tmongoModel := store.EnsureGenericModel(model)\n\tcollection := db.database.Collection(mongoModel.GetCollection())\n\n\tres, err := collection.DeleteOne(db.context, filter)\n\tif err != nil {\n\t\tlogrus.WithError(err).Errorln(\"cannot delete model\")\n\t\treturn 0, errors.Wrap(err, \"cannot delete model\")\n\t}\n\n\treturn res.DeletedCount, nil\n}", "title": "" }, { "docid": "c3065dd516ddf5c0f9830a4136860e00", "score": "0.44268522", "text": "func (q filesStorageQuery) DeleteAll(exec boil.Executor) (int64, error) {\n\tif q.Query == nil {\n\t\treturn 0, errors.New(\"models: no filesStorageQuery provided for delete all\")\n\t}\n\n\tqueries.SetDelete(q.Query)\n\n\tresult, err := q.Query.Exec(exec)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from files_storages\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for files_storages\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "f67b220ddb2379a060c6ac0f541fc257", "score": "0.44237998", "text": "func HandleRemovePreparedQueries(adminMan *admin.Manager, syncman *syncman.Manager) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\n\t\tdefer utils.CloseTheCloser(r.Body)\n\n\t\t// Get the JWT token from header\n\t\ttoken := utils.GetTokenFromHeader(r)\n\n\t\t// Check if the request is authorised\n\t\tif err := adminMan.IsTokenValid(token); err != nil {\n\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\t_ = json.NewEncoder(w).Encode(map[string]string{\"error\": err.Error()})\n\t\t\treturn\n\t\t}\n\t\tctx, cancel := context.WithTimeout(r.Context(), 10*time.Second)\n\t\tdefer cancel()\n\n\t\tvars := mux.Vars(r)\n\t\tdbAlias := vars[\"dbAlias\"]\n\t\tproject := vars[\"project\"]\n\t\tid := vars[\"id\"]\n\n\t\tif err := syncman.RemovePreparedQueries(ctx, project, dbAlias, id); err != nil {\n\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\t_ = json.NewEncoder(w).Encode(map[string]string{\"error\": err.Error()})\n\t\t\treturn\n\t\t}\n\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusOK) // http status codee\n\t\t_ = json.NewEncoder(w).Encode(map[string]interface{}{})\n\t}\n}", "title": "" }, { "docid": "57abc3b39868e09a283f890e41ea97a0", "score": "0.4421245", "text": "func (m *MongoStore) DeleteAll() {\n\ts := m.session.Clone()\n\tdefer s.Close()\n\ts.DB(\"kittenserver\").C(\"kittens\").DropCollection()\n}", "title": "" }, { "docid": "fa25c72fe20c6753af6726335bb12d4c", "score": "0.44198743", "text": "func (c *Client) TrackList() ([]Track, error) {\n\tres, err := c.Exec(\"get_property\", \"track-list\")\n\tif res == nil {\n\t\treturn nil, err\n\t}\n\t//log.Errorf(\"Data %s\", string(res.Data))\n\tvar ta []Track\n\tif err = json.Unmarshal([]byte(res.Data), &ta); err != nil {\n\t\treturn nil, fmt.Errorf(\"data %s, err %v\", res.Data, err)\n\t}\n\treturn ta, nil\n}", "title": "" }, { "docid": "9e2d9a140777ad4ced19f807b116acf9", "score": "0.441196", "text": "func (c HTTPClient) Delete(ids []string) error {\n\treturn nil\n}", "title": "" }, { "docid": "019d086de84937501389be9cc2539a23", "score": "0.44079372", "text": "func getTracks(c *gin.Context) {\n\tartists := database.GetArtists()\n\talbums := database.GetAlbums()\n\ttracks := database.GetTracks()\n\tfull := fullJson{artists, albums, tracks}\n\n c.JSON(200, full)\n}", "title": "" }, { "docid": "e632704b99c3004bb40b12eb6037a31c", "score": "0.44077453", "text": "func (a *UtilsApiService) DeleteFeatureTrackUsingDelete(ctx context.Context, featureTrackId string) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\ta.client = NewAPIClient(&Configuration{\n\t\tBasePath: ctx.Value(\"BasePath\").(string),\n\t\tDefaultHeader: make(map[string]string),\n\t\tUserAgent: \"Swagger-Codegen/1.0.0/go\",\n\t})\n\tlocalVarPath := a.client.cfg.BasePath + \"/nucleus/v1/feature_track/{feature_track_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"feature_track_id\"+\"}\", fmt.Sprintf(\"%v\", featureTrackId), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"*/*\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\n\t\treturn localVarHttpResponse, newErr\n\t}\n\n\treturn localVarHttpResponse, nil\n}", "title": "" }, { "docid": "215c68ad01d6cd60b9e18d039b3b7aeb", "score": "0.44062635", "text": "func DeleteAllTask(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tcount := deleteAllTask()\n\tjson.NewEncoder(w).Encode(count)\n}", "title": "" }, { "docid": "9cfde403c67725f663ab6618e733191c", "score": "0.44051278", "text": "func DeleteClothes(c * gin.Context){\n\tdb := database.DBConn()\n\tid:= c.Param(\"id\")\n\t_, err := db.Query(\"Delete FROM clothes WHERE id = \" + id)\n\tif err != nil{\n\t\tc.JSON(500, gin.H{\n\t\t\t\"messages\" : \"Story not found\",\n\t\t});\n\t\tpanic(\"error delte clothes\")\n\t}\n\tc.JSON(200, gin.H{\n\t\t\"messages\": \"deleted\",\n\t})\n\tdefer db.Close() // Hoãn lại việc close database connect cho đến khi hàm Read() thực hiệc xong*/\n}", "title": "" }, { "docid": "277b99fba2e4a99d987a4ab1dec0fdae", "score": "0.4404481", "text": "func (rs *routeServer) deleteLocationHandler(w http.ResponseWriter, req *http.Request) {\n\tlog.Printf(\"Deleting location at %s\\n\", req.URL.Path)\n\n\tloc := mux.Vars(req)[\"location\"]\n\n\tif err := rs.store.DeleteLocation(loc); err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "c0613ad2278c8381e0962f265d36860c", "score": "0.44010565", "text": "func (c *TrialController) Delete(w http.ResponseWriter, r *http.Request,\n\tp httprouter.Params) {\n\n\tstudy, trial := p.ByName(\"study\"), p.ByName(\"trial\")\n\n\t// delete all items with these study + trial prefixes\n\tfor _, pre := range []string{\n\t\tfmt.Sprintf(\"/studies/%s/trials/%s\", study, trial),\n\t\tfmt.Sprintf(\"/files/%s/%s\", study, trial),\n\t} {\n\t\titems, err := c.studies.PrefixItems([]byte(pre))\n\t\tif err != nil {\n\t\t\te := fmt.Sprintf(\"couldn't retrieve items with prefix %q: %v\",\n\t\t\t\tpre,\n\t\t\t\terr,\n\t\t\t)\n\t\t\thttp.Error(w, e, 500)\n\t\t\treturn\n\t\t}\n\t\tfor _, item := range items {\n\t\t\tif err := c.studies.Delete(item.Key); err != nil {\n\t\t\t\te := fmt.Sprintf(\"couldn't delete item %q: %v\", item.Key, err)\n\t\t\t\thttp.Error(w, e, 500)\n\t\t\t}\n\t\t}\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "40a6de7f1073a1024158d554f7e83fea", "score": "0.4397829", "text": "func (ctx *HTTPHandlerContext) SessionDeleteHandler(w http.ResponseWriter, r *http.Request) {\n\n\t// HTTP URL Parameters\n\tvars := mux.Vars(r)\n\tif val, ok := vars[\"id\"]; ok {\n\n\t} else {\n\t\tfmt.Printf(\"Error getting url variable, id: %s\", val)\n\t\treturn\n\t}\n\n\terr := sessionmanager.DeleteSession(*ctx.cache, ctx.hConfig.RedisDB, vars[\"id\"])\n\tif err != nil {\n\t\tfmt.Printf(\"error deleting session %s\\n\", err)\n\t}\n\n\thttp.Redirect(w, r, \"/admin/sessions\", http.StatusSeeOther)\n}", "title": "" }, { "docid": "22472e3a8673227a97e3904ae884bddf", "score": "0.4394401", "text": "func DeleteSeries(w http.ResponseWriter, r *http.Request) {\n\timdbID := chi.URLParam(r, \"imdbID\")\n\n\terr := watchlist.DeleteSeries(imdbID, r)\n\n\tif err != nil {\n\t\thttpext.AbortAPI(w, \"Deleting Series failed\", 500)\n\t\treturn\n\t}\n\n\thttpext.SuccessAPI(w, \"Series deleted succesfully\")\n}", "title": "" }, { "docid": "1156dfcd265f5553a273aa0a41f036fe", "score": "0.43911114", "text": "func (hh *HealthCheckHandler) Delete(w http.ResponseWriter, r *http.Request) {\n\tuuid := utils.ExtractUUID(r.URL.String())\n\thh.db.Delete(uuid)\n}", "title": "" }, { "docid": "084cb5f8cb6e6ed898b4c76030a0dbd8", "score": "0.4388375", "text": "func (c *Command) DeleteAll() (int64, error) {\n\tclient := c.set.gom.GetClient()\n\n\tcollection := client.Database(c.set.gom.GetDatabase()).Collection(c.set.tableName)\n\n\tctx, cancelFunc := c.set.GetContext()\n\tdefer cancelFunc()\n\n\tres, err := collection.DeleteMany(ctx, c.set.filter)\n\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn res.DeletedCount, nil\n}", "title": "" }, { "docid": "603094f892d7e1bafc4ff8a02de2ea6f", "score": "0.43786842", "text": "func HandleDeleteTable(adminMan *admin.Manager, modules *modules.Modules, syncman *syncman.Manager) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\n\t\t// Get the JWT token from header\n\t\ttoken := utils.GetTokenFromHeader(r)\n\t\tdefer utils.CloseTheCloser(r.Body)\n\n\t\t// Check if the request is authorised\n\t\tif err := adminMan.IsTokenValid(token); err != nil {\n\t\t\t_ = utils.SendErrorResponse(w, http.StatusUnauthorized, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\t// Create a context of execution\n\t\tctx, cancel := context.WithTimeout(r.Context(), 60*time.Second)\n\t\tdefer cancel()\n\n\t\tvars := mux.Vars(r)\n\t\tdbAlias := vars[\"dbAlias\"]\n\t\tprojectID := vars[\"project\"]\n\t\tcol := vars[\"col\"]\n\n\t\tcrud := modules.DB()\n\t\tif err := crud.DeleteTable(ctx, dbAlias, col); err != nil {\n\t\t\t_ = utils.SendErrorResponse(w, http.StatusInternalServerError, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\tif err := syncman.SetDeleteCollection(ctx, projectID, dbAlias, col); err != nil {\n\t\t\t_ = utils.SendErrorResponse(w, http.StatusInternalServerError, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\t_ = utils.SendOkayResponse(w)\n\t}\n}", "title": "" }, { "docid": "3c32a8c3befbe9582f023e5dbae1f1f3", "score": "0.43774015", "text": "func (srv *Server) handleDelete(res http.ResponseWriter, req *http.Request) {\n\tfor _, rute := range srv.routeDeletes {\n\t\tvals, ok := rute.parse(req.URL.Path)\n\t\tif ok {\n\t\t\trute.endpoint.call(res, req, srv.evals, vals)\n\t\t\treturn\n\t\t}\n\t}\n\tres.WriteHeader(http.StatusNotFound)\n}", "title": "" }, { "docid": "12efaaf46dab9f2e0451de66727934d5", "score": "0.4372964", "text": "func DeleteHandler(w http.ResponseWriter, r *http.Request) {\n\n\tvars := mux.Vars(r)\n\tid := vars[\"id\"]\n\ttoken := r.URL.Query().Get(\"auth\")\n\n\t// parameters OK ?\n\tif isEmpty(id) || isEmpty(token) {\n\t\tstatus := http.StatusBadRequest\n\t\tencodeStandardResponse(w, status, http.StatusText(status), nil)\n\t\treturn\n\t}\n\n\t// validate the token\n\tif authtoken.Validate(config.Configuration.SharedSecret, token) == false {\n\t\tstatus := http.StatusForbidden\n\t\tencodeStandardResponse(w, status, http.StatusText(status), nil)\n\t\treturn\n\t}\n\n\t// get the request details\n\tcount, err := dao.Store.DeleteDepositAuthorizationByID(id)\n\tif err != nil {\n\t\tlogger.Log(fmt.Sprintf(\"ERROR: %s\", err.Error()))\n\t\tstatus := http.StatusInternalServerError\n\t\tencodeStandardResponse(w, status,\n\t\t\tfmt.Sprintf(\"%s (%s)\", http.StatusText(status), err),\n\t\t\tnil)\n\t\treturn\n\t}\n\n\tif count == 0 {\n\t\tstatus := http.StatusNotFound\n\t\tencodeStandardResponse(w, status, http.StatusText(status), nil)\n\t\treturn\n\t}\n\n\tstatus := http.StatusOK\n\tencodeStandardResponse(w, status, http.StatusText(status), nil)\n}", "title": "" }, { "docid": "b03faba46a630b0bd521cbdeb619a251", "score": "0.43718418", "text": "func (s *ShrikeServer) RemoveAllRoutes(w http.ResponseWriter, req *http.Request) {\n\tfor _, v := range s.ProxyStore.ToMap() {\n\t\ts.ProxyStore.Delete(v)\n\t\tv.Delete()\n\t}\n\n\tw.WriteHeader(http.StatusNoContent)\n}", "title": "" }, { "docid": "8912ce5bcc36d4b09dac927f93bf1194", "score": "0.43690997", "text": "func (s *SessionHandler) DeleteSessionHandler(w http.ResponseWriter, r *http.Request) {\n\tsessionID := mux.Vars(r)[\"id\"]\n\tif s.SessionManager.RemoveSession(sessionID) {\n\t\tLogger.Infof(\"Delete Session with ID => '%v'\", sessionID)\n\t\tutils.WriteStatusOK(w)\n\t} else {\n\t\tutils.WriteStatusNotFound(w)\n\t}\n}", "title": "" }, { "docid": "c5d24562b33f40ed43cae469ce02c4cb", "score": "0.43688363", "text": "func (q storeQuery) DeleteAll(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif q.Query == nil {\n\t\treturn 0, errors.New(\"models: no storeQuery provided for delete all\")\n\t}\n\n\tqueries.SetDelete(q.Query)\n\n\tresult, err := q.Query.ExecContext(ctx, exec)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from stores\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for stores\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "eeef688d74506b60bc69500e6b8dfa46", "score": "0.4368399", "text": "func (m *MockUploadService) DeleteUploads(v0 context.Context, v1 shared1.DeleteUploadsOptions) error {\n\tr0 := m.DeleteUploadsFunc.nextHook()(v0, v1)\n\tm.DeleteUploadsFunc.appendCall(UploadServiceDeleteUploadsFuncCall{v0, v1, r0})\n\treturn r0\n}", "title": "" }, { "docid": "081a83ed95d15f097fc448e2153ff7f0", "score": "0.43676734", "text": "func (node *Node) DELETE(functions ...interface{}) *Handler {\n\n\thandler := &Handler{}\n\n\tif len(functions) > 0 { handler.function = functions[0].(func (req web.RequestInterface) *web.ResponseStatus) }\n\n\tnode.addHandler(\"DELETE\", handler)\n\n\treturn handler\n}", "title": "" }, { "docid": "94edcd2a5284b2b4d3f52f20f0f69785", "score": "0.43632805", "text": "func DeletePhotoHandler(c *gin.Context) {\n\tif !service.VerifyAPIRequest(c, c.Request.Header[\"Token\"]) {\n\t\treturn\n\t}\n\tif photoid, err := strconv.Atoi(c.Param(\"photoID\")); err == nil {\n\t\terr := MyStore.DeletePhoto(photoid)\n\t\tif err == nil {\n\t\t\tc.JSON(http.StatusOK, []*entity.Joke{})\n\t\t} else {\n\t\t\tpanic(err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "cbf2936d285776cfab8f946054764c2e", "score": "0.43610853", "text": "func (q oauthClientQuery) DeleteAll(exec boil.Executor) (int64, error) {\n\tif q.Query == nil {\n\t\treturn 0, errors.New(\"models: no oauthClientQuery provided for delete all\")\n\t}\n\n\tqueries.SetDelete(q.Query)\n\n\tresult, err := q.Query.Exec(exec)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete all from oauth_clients\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by deleteall for oauth_clients\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "fcbbcc47a80397583bdb18d7794f702d", "score": "0.43597594", "text": "func (m *Manager) DeleteToken(w http.ResponseWriter, r *http.Request) {\n\tm.Lock()\n\tdefer m.Unlock()\n\n\tlogger.Debugf(\"Got an API request to delete a ticker\")\n\n\tvars := mux.Vars(r)\n\tid := strings.ToUpper(vars[\"id\"])\n\n\tif _, ok := m.Watching[id]; !ok {\n\t\tlogger.Error(\"Error: no ticker found\")\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tfmt.Fprint(w, \"Error: ticker not found\")\n\t\treturn\n\t}\n\t// send shutdown sign\n\tm.Watching[id].Shutdown()\n\n\t// remove from cache\n\tdelete(m.Watching, id)\n\n\tlogger.Infof(\"Deleted ticker %s\", id)\n\tw.WriteHeader(http.StatusNoContent)\n}", "title": "" }, { "docid": "c1dd0614be4472ea3e1a3f350c6bbef2", "score": "0.43543622", "text": "func (a *EventsApiService) DeleteEvents(ctx _context.Context, localVarOptionals *DeleteEventsOpts) ([]string, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []string\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/events\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Before.IsSet() {\n\t\tlocalVarQueryParams.Add(\"before\", parameterToString(localVarOptionals.Before.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Since.IsSet() {\n\t\tlocalVarQueryParams.Add(\"since\", parameterToString(localVarOptionals.Since.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Level.IsSet() {\n\t\tlocalVarQueryParams.Add(\"level\", parameterToString(localVarOptionals.Level.Value(), \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif localVarOptionals != nil && localVarOptionals.XAnchoreAccount.IsSet() {\n\t\tlocalVarHeaderParams[\"x-anchore-account\"] = parameterToString(localVarOptionals.XAnchoreAccount.Value(), \"\")\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ApiErrorResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "ba4627b8a81a4d1cb3cb3a9e5f85b59a", "score": "0.434834", "text": "func EndpointSaveTracks(ids []string) string {\n\treturn EndpointMe() + \"/tracks?ids=\" + strings.Join(ids, \",\")\n}", "title": "" }, { "docid": "38d4bf843b4d5e9bba20823e8ed7f702", "score": "0.43471158", "text": "func MakeDeleteHandler(client rancher.BridgeClient) VarsHandler {\n\treturn func(w http.ResponseWriter, r *http.Request, vars map[string]string) {\n\n\t\tdefer r.Body.Close()\n\n\t\tbody, _ := ioutil.ReadAll(r.Body)\n\n\t\trequest := requests.DeleteFunctionRequest{}\n\t\terr := json.Unmarshal(body, &request)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tif len(request.FunctionName) == 0 {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\t// This makes sure we don't delete non-labelled deployments\n\t\tservice, findErr := client.FindServiceByName(request.FunctionName)\n\t\tif findErr != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\treturn\n\t\t} else if service == nil {\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\n\t\tdelErr := client.DeleteService(service)\n\t\tif delErr != nil {\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tw.WriteHeader(http.StatusOK)\n\n\t}\n}", "title": "" }, { "docid": "1f7f928d2360ec05ea7e2ab2533327c9", "score": "0.43470266", "text": "func FileDeleteHandler(w http.ResponseWriter, r *http.Request) {\n\tr.ParseForm()\n\n\tfileSha1 := r.Form.Get(\"filehash\")\n\tfileMeta := meta.GetFileMeta(fileSha1)\n\n\t//delete file from disk\n\terr := os.Remove(fileMeta.FileAddr)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// delete file index\n\tmeta.RemoveFileMeta(fileSha1)\n\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "a963ae2c8bf237f87e2fca265bfda139", "score": "0.4346651", "text": "func (m *Manager) DelHandler(w http.ResponseWriter, r *http.Request) {\n\tif r.Method != http.MethodPost {\n\t\thttp.Error(w, \"Not support method\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tr.ParseForm()\n\tfuncName := r.FormValue(\"funcName\")\n\n\terr := m.platformManager.DeleteFunction(funcName)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\terr = m.scheduler.DeleteFunction(funcName)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tw.Write([]byte(\"Delete Successful\"))\n\n\treturn\n}", "title": "" }, { "docid": "59af5f2b9576e0c6ffb2b53609e8bb98", "score": "0.43455294", "text": "func getAllSongs(w http.ResponseWriter, req *http.Request) {\n\t// songs is an array of Song\n\tvar songs []Song\n\t// Query is uesed for actions wihch returns rows\n\t// Store all records in result from DB songs, if any\n\tresult, err := db.Query(\"SELECT * from songs\")\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\tdefer result.Close()\n\n\t// Checking each record stored in result and append it to songs\n\tfor result.Next() {\n\t\tvar song Song\n\t\terr := result.Scan(&song.ID, &song.Title, &song.Duration, &song.Singer)\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t\tsongs = append(songs, song)\n\t}\n\tlenSong = len(songs)\n\n\t// setting the header “Content-Type” to “application/json”.\n\tw.Header().Set(\"Content-type\", \"application/json\")\n\t// encode songs to JSON and send them to interface\n\tjson.NewEncoder(w).Encode(songs)\n}", "title": "" }, { "docid": "930fb626244113090343d4dc4efe62bf", "score": "0.43434963", "text": "func (engine *Engine) DELETE(relativePath string, handlers ...HandlerFunc) IRoutes {\n\treturn engine.handle(http.MethodDelete, relativePath, handlers)\n}", "title": "" } ]
bae98c00f41f2318a99dc958acc5d07d
test for requestGen(), with post data
[ { "docid": "64e5114929c651ee0535a8bf617c7a3b", "score": "0.7242647", "text": "func Test_requestGen_Case3(t *testing.T) {\n var data = []byte(`{\"a\":1}`)\n\n // invoke requestGen()\n req, err := requestGen(\"POST\", \"http://www.baidu.com\", \"\", \"0\", CONTENT_FORM, data, nil)\n if err != nil {\n t.Errorf(\"requestGen():%s\", err.Error())\n return\n }\n \n if req.ContentLength != int64(len(data)) {\n t.Errorf(\"req.ContentLength = %d\", req.ContentLength)\n }\n}", "title": "" } ]
[ { "docid": "59e94356475ef186914f2b2ba9898a80", "score": "0.66858655", "text": "func genSubmitRequest(jsontext string) *http.Request {\n\treq := httptest.NewRequest(\n\t\t\"POST\",\n\t\t\"http://localhost/api/v1/series\",\n\t\tstrings.NewReader(jsontext),\n\t)\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\t// log.Infof(\"generated POST request with body:\\n%s\", jsontext)\n\tfmt.Fprintf(os.Stdout, \"generated POST request with body:\\n%s\", jsontext)\n\treturn req\n}", "title": "" }, { "docid": "912ed8354b101e2eef89d228b950a729", "score": "0.6448975", "text": "func Test_requestGen_Case1(t *testing.T) {\n // invoke requestGen()\n req, err := requestGen(\"GET\", \"http://www.baidu.com/index.html?a=1#pos1\",\n \"\", \"80\", CONTENT_FORM, nil, nil)\n if err != nil {\n t.Errorf(\"requestGen():%s\", err.Error())\n return\n }\n \n // check area of req\n if req.Method != \"GET\" {\n t.Errorf(\"Method should be GET, now it's %s\", req.Method)\n }\n\n if req.Host != \"www.baidu.com\" {\n t.Errorf(\"Host should be www.baidu.com, now it's %s\", req.Host)\n }\n\n if req.URL.Host != \"www.baidu.com\" {\n t.Errorf(\"URL.Host should be www.baidu.com, now it's %s\", req.URL.Host)\n }\n \n if req.URL.Path != \"/index.html\" {\n t.Errorf(\"URL.Path should be /index.html, now it's %s\", req.URL.Path)\n }\n\n if req.URL.RawQuery != \"a=1\" {\n t.Errorf(\"URL.RawQuery should be a=1, now it's %s\", req.URL.RawQuery)\n }\n\n if req.URL.Fragment != \"pos1\" {\n t.Errorf(\"URL.Fragment should be pos1, now it's %s\", req.URL.Fragment)\n } \n}", "title": "" }, { "docid": "32c5514d59d7237afb859dd39536731f", "score": "0.6063723", "text": "func GenRequest(method HTTPMethod, url string, body interface{}) (*http.Request, error) {\n\tvar buf io.Reader = nil\n\tif body != nil {\n\t\tbj, err := json.Marshal(body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tbuf = bytes.NewBuffer(bj)\n\t}\n\n\treq, err := http.NewRequest(method.String(), url, buf)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif body != nil {\n\t\treq.Header.Add(\"Content-Type\", \"application/json\")\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "3f1bd080f7afcd9f4638a0351edf8bb6", "score": "0.59956217", "text": "func makeTestCallbackReq() *http.Request {\n\treq, _ := http.NewRequest(\"POST\", \"/\", strings.NewReader(`RecordingUrl=foobar.com/owl`))\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded; param=value\")\n\treturn req\n}", "title": "" }, { "docid": "eb08d1f5017811f69ccafe7b47124cb3", "score": "0.59386545", "text": "func PostTestRequest(uri string, body io.Reader, h http.Handler) *httptest.ResponseRecorder {\n\treq := httptest.NewRequest(\"POST\", uri, body)\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.PostForm = url.Values{}\n\trr := httptest.NewRecorder()\n\th.ServeHTTP(rr, req)\n\treturn rr\n}", "title": "" }, { "docid": "76f72bbbef662152ae63c01f89c81f1f", "score": "0.5899621", "text": "func (handler TestHandler) POST(path string, headers map[string]string) TestResponse {\n return handler.request(http.MethodPost, path, headers)\n}", "title": "" }, { "docid": "0582e93899acd5a6d2b0c9a78c08a99f", "score": "0.58725023", "text": "func TestReq(r *httprouter.Router, in string, exp []string) error {\n\tdata := struct {\n\t\tFlexIDType int\n\t\tFlexID string\n\t\tCMD string\n\t}{\n\t\tFlexIDType: 3,\n\t\tFlexID: \"0\",\n\t\tCMD: in,\n\t}\n\tbyt, err := json.Marshal(data)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to marshal req. %s\", err)\n\t}\n\tc, b := request(r, \"POST\", os.Getenv(\"ABOT_URL\")+\"/\", byt)\n\tif c != http.StatusOK {\n\t\treturn fmt.Errorf(\"expected %d, got %d. %s\", http.StatusOK, c, b)\n\t}\n\tvar found bool\n\tfor _, x := range exp {\n\t\tif strings.Contains(b, x) {\n\t\t\tfound = true\n\t\t\tbreak\n\t\t}\n\t}\n\tif !found {\n\t\treturn fmt.Errorf(\"expected %s, got %q for %q\", exp, b, in)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d5a3dafba37630ce7547de4d3055cfdf", "score": "0.5746789", "text": "func genRequest(url string, requestType string) (*http.Request, error) {\n\treq, err := http.NewRequest(requestType, url, nil)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn nil, err\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "e06a8367fed28423a085bd6eab37c40d", "score": "0.5716167", "text": "func makeTestRequest(t *testing.T, f http.HandlerFunc, method, url string, data []byte) *httptest.ResponseRecorder {\n\n\tbody := bytes.NewReader(data)\n\tw := httptest.NewRecorder()\n\tr, err := http.NewRequest(method, url, body)\n\tif err != nil {\n\n\t}\n\thandler := http.HandlerFunc(f)\n\thandler.ServeHTTP(w, r)\n\treturn w\n}", "title": "" }, { "docid": "7be494ef1a6620d984c14a04dbb56f22", "score": "0.56703043", "text": "func seedRequest() {\n\tfmt.Println(\" Not implemented\")\n}", "title": "" }, { "docid": "d672db724f5da58871873d544b3ccd1e", "score": "0.5666789", "text": "func (td *TestData_App01sqVendor) PostReq(target string, body string) {\n\n\ttd.T.Logf(\"Vendor.Setup()\\n\")\n\n\ttd.Req = httptest.NewRequest(http.MethodPost, target, strings.NewReader(body))\n\ttd.Req.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\ttd.ServeHttp() // Perform the test through the mux.\n\n\ttd.T.Logf(\"...end Vendor.Setup\\n\")\n\n}", "title": "" }, { "docid": "495a2cea4b1e2adfc21a6e3fb4dfc67b", "score": "0.5646657", "text": "func setupTestReq(t assert.TestingT, method, path string, data []byte) (*httptest.ResponseRecorder, *http.Request) {\n\tw := httptest.NewRecorder()\n\treq, err := http.NewRequest(method, path, bytes.NewReader(data))\n\tassert.NoError(t, err)\n\treturn w, req\n}", "title": "" }, { "docid": "5c003308e0de680be68282a495a49b3a", "score": "0.56303906", "text": "func buildTestRequest(method string, path string, body string, headers map[string][]string, cookies []*http.Cookie) *http.Request {\n host := \"127.0.0.1\"\n port := \"80\"\n rawurl := \"http://\" + host + \":\" + port + path\n url_, _ := url.Parse(rawurl)\n proto := \"HTTP/1.1\"\n\n if headers == nil {\n headers = map[string][]string{}\n }\n\n headers[\"User-Agent\"] = []string{\"web.go test\"}\n if method == \"POST\" {\n headers[\"Content-Length\"] = []string{fmt.Sprintf(\"%d\", len(body))}\n if headers[\"Content-Type\"] == nil {\n headers[\"Content-Type\"] = []string{\"text/plain\"}\n }\n }\n\n req := http.Request{Method: method,\n URL: url_,\n Proto: proto,\n Host: host,\n Header: http.Header(headers),\n Body: ioutil.NopCloser(bytes.NewBufferString(body)),\n }\n\n for _, cookie := range cookies {\n req.AddCookie(cookie)\n }\n return &req\n}", "title": "" }, { "docid": "df7e8f8f604a393a0d460df4c156bd89", "score": "0.56256235", "text": "func handlePost() http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\n\t\t// Right now we are simply taking the writer defined as an argument to this function\n\t\t// and using that to write the text \"Hello world!\". Using the README, follow the instructions\n\t\t// on how to update this function to make the test pass.\n\t\t//\n\t\t// Feel free to use the test for some ideas.\n\n\t\t//take r and \"decode it \" grab information and put it into a map ( refer to test code)\n\t\t// then send it back over in json just like code in test protram \n\n\n\tdecoder := json.NewDecoder(r.Body) //create new decoder\n var t Payload //struct to store the data \n err := decoder.Decode(&t) //put decode data into struct\n if err != nil { //protect against bad json \n fmt.Fprintf(w, \"shit\")\n }\n fmt.Println(\"Hey\", t)\n\n // populate result with data containted in t, map must read one: test1 two:test2 etc\n //cant figure out how to put data from body into map \n //resend data using responsewriter \n\n //json.marshall(result?) encode map into json so it can be sent with responsewriter\n //json.NewEncoder(w).Encode(t)\n\n\n\n\t\n \n\n\t\tfmt.Fprintf(w, \"Hello world!\")\n\t})\n}", "title": "" }, { "docid": "5de9c3d784ceb9c06a841b4e3bdefa9b", "score": "0.562363", "text": "func createRequest(tc testCase, url string) *nethttp.Request {\n\tmethod := \"POST\"\n\tif tc.method != \"\" {\n\t\tmethod = tc.method\n\t}\n\tbody, _ := json.Marshal(tc.body)\n\trequest, _ := nethttp.NewRequest(method, url+tc.path, bytes.NewBuffer(body))\n\tif tc.header != nil {\n\t\trequest.Header = tc.header\n\t}\n\tif tc.event != nil {\n\t\tmessage := binding.ToMessage(tc.event)\n\t\tdefer message.Finish(nil)\n\t\thttp.WriteRequest(context.Background(), message, request)\n\t}\n\treturn request\n}", "title": "" }, { "docid": "0048e2ca1badecd867eb73c9ed874685", "score": "0.56014055", "text": "func GenerateNewRequest(url, payload string, options model.Options) *http.Request {\n\treq, _ := http.NewRequest(\"GET\", url, nil)\n\t// Add the Accept header like browsers do.\n\treq.Header.Add(\"Accept\", \"text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9\")\n\tif options.Data != \"\" {\n\t\td := []byte(payload)\n\t\treq, _ = http.NewRequest(\"POST\", url, bytes.NewBuffer(d))\n\t\treq.Header.Add(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\t}\n\n\tif len(options.Header) > 0 {\n\t\tfor _,v := range options.Header {\n\t\t\th := strings.Split(v, \": \")\n\t\t\tif len(h) > 1 {\n\t\t\t\treq.Header.Add(h[0], h[1])\n\t\t\t}\n\t\t}\n\t}\n\tif options.Cookie != \"\" {\n\t\treq.Header.Add(\"Cookie\", options.Cookie)\n\t}\n\tif options.UserAgent != \"\" {\n\t\treq.Header.Add(\"User-Agent\", options.UserAgent)\n\t} else {\n\t\treq.Header.Add(\"User-Agent\", \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0\")\n\t}\n\tif options.Method != \"\" {\n\t\treq.Method = options.Method\n\t}\n\tif options.CookieFromRaw != \"\" {\n\t\trawFile := options.CookieFromRaw\n\t\trF, err := os.Open(rawFile)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\tos.Exit(1)\n\t\t} else {\n\t\t\trd := bufio.NewReader(rF)\n\t\t\trq, err := http.ReadRequest(rd)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err)\n\t\t\t\tos.Exit(1)\n\t\t\t} else {\n\t\t\t\treq.Header.Add(\"Cookie\", GetRawCookie(rq.Cookies()))\n\t\t\t}\n\t\t}\n\t}\n\treturn req\n}", "title": "" }, { "docid": "61a04c728edc123ca0779e241564f61f", "score": "0.55903566", "text": "func testRequest() {\n\n}", "title": "" }, { "docid": "3b3663ff1f7ae493e71777962b6af5ec", "score": "0.5575432", "text": "func genRequest(pn insolar.PulseNumber, payload []byte) *insolar.Reference {\n\tref := insolar.NewReference(*insolar.NewID(pn, hasher.Hash(payload)))\n\treturn ref\n}", "title": "" }, { "docid": "74263a3422198a10925d610b7f1ec0bb", "score": "0.5553239", "text": "func (tg *Tests) generateRequest(c *loader.Case) (*http.Request, error) {\n\n\tl, err := url.Parse(\"/\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// @todo start recording\n\n\t// @todo specify more then just the path\n\n\tl.Path = c.When.Path\n\n\treturn http.NewRequest(c.When.Method, l.String(), nil)\n}", "title": "" }, { "docid": "e9cc97e7f5f23497f0c8e77bcdcf9023", "score": "0.5536888", "text": "func generateRequest(retryClient *retryablehttp.Client, url string, method string, getTimeout time.Duration, postTimeout time.Duration) (*retryablehttp.Request, error) {\n\tswitch method {\n\tcase http.MethodGet:\n\t\tretryClient.HTTPClient.Timeout = getTimeout\n\t\treturn retryablehttp.NewRequest(http.MethodGet, url, nil)\n\tcase http.MethodPost:\n\t\tretryClient.HTTPClient.Timeout = postTimeout\n\t\treq, err := retryablehttp.NewRequest(http.MethodPost, url, strings.NewReader(\"\"))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treq.Header.Set(\"Content-Type\", \"application/json\")\n\t\treturn req, nil\n\t}\n\n\treturn nil, fmt.Errorf(\"unknown HTTP method %s\", method)\n}", "title": "" }, { "docid": "e156e9448e41f02ab58c8bbdb2347fde", "score": "0.55293494", "text": "func (a *Application) buildRequest(testRequest *TestRequest, location *config.TestLocation, testSet *config.TestSet) error {\n\treq, err := defaultRequest(testSet, http.MethodGet, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Close = true\n\tswitch strings.ToLower(location.Location) {\n\tcase \"header\":\n\t\ttestRequest.Request = req\n\t\ttestRequest.Request.Header.Del(location.Key)\n\t\t//url encoded header\n\t\tif a.TestRun.URLEncodeHeader {\n\t\t\ttestRequest.Request.Header.Add(location.Key, url.QueryEscape(testRequest.Payload))\n\t\t\ttestRequest.CheckPayload = url.QueryEscape(testRequest.Payload)\n\t\t\t//raw header\n\t\t} else {\n\t\t\ttestRequest.Request.Header.Add(location.Key, testRequest.Payload)\n\t\t\ttestRequest.CheckPayload = testRequest.Payload\n\t\t}\n\t\ttestRequest.Request.ContentLength = int64(0)\n\t\treturn nil\n\tcase \"path\":\n\t\ttestRequest.Request = req\n\t\t//url encoded path\n\t\tif a.TestRun.URLEncodePath {\n\t\t\ttestRequest.Request.URL.Path = \"/\" + testRequest.Payload\n\t\t\ttestRequest.CheckPayload = url.PathEscape(testRequest.Payload)\n\t\t} else {\n\t\t\t//raw path\n\t\t\ttestRequest.Request.URL = &url.URL{\n\t\t\t\tScheme: req.URL.Scheme,\n\t\t\t\tHost: req.Host,\n\t\t\t\tOpaque: \"/\" + testRequest.Payload,\n\t\t\t}\n\t\t\ttestRequest.CheckPayload = testRequest.Payload\n\t\t}\n\t\treturn nil\n\tcase \"queryarg\":\n\t\ttestRequest.Request = req\n\t\tif a.TestRun.URLEncodeQuery {\n\t\t\tparams := url.Values{}\n\t\t\tparams.Add(location.Key, testRequest.Payload)\n\t\t\ttestRequest.Request.URL.RawQuery = params.Encode()\n\t\t\ttestRequest.CheckPayload = params.Encode()\n\t\t} else {\n\t\t\ttestRequest.Request.URL.RawQuery = fmt.Sprintf(\"%s=%s\", location.Key, testRequest.Payload)\n\t\t\ttestRequest.CheckPayload = testRequest.Payload\n\t\t}\n\t\treturn nil\n\tcase \"body\":\n\t\t//url encoded body\n\t\tif a.TestRun.PostBodyType == \"urlencoded\" {\n\t\t\tdata := &url.Values{}\n\t\t\tdata.Add(location.Key, testRequest.Payload)\n\t\t\tpostReq, err := defaultRequest(testSet, http.MethodPost, strings.NewReader(data.Encode()))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\ttestRequest.Request = postReq\n\t\t\ttestRequest.Request.Close = true\n\t\t\ttestRequest.Request.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\t\t\ttestRequest.CheckPayload = url.QueryEscape(testRequest.Payload)\n\t\t} else if a.TestRun.PostBodyType == \"json\" {\n\t\t\t//json body\n\t\t\tjsonStr := []byte(`{\"` + location.Key + `\":\"` + testRequest.Payload + `\"}`)\n\t\t\tpostReq, err := defaultRequest(testSet, http.MethodPost, bytes.NewBuffer(jsonStr))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\ttestRequest.Request = postReq\n\t\t\ttestRequest.Request.Close = true\n\t\t\ttestRequest.Request.Header.Set(\"Content-Type\", \"application/json\")\n\t\t\ttestRequest.CheckPayload = testRequest.Payload\n\t\t} else {\n\t\t\t//raw body\n\t\t\tpostStr := []byte(location.Key + \"=\" + testRequest.Payload)\n\t\t\tpostReq, err := defaultRequest(testSet, http.MethodPost, bytes.NewBuffer(postStr))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\ttestRequest.Request = postReq\n\t\t\ttestRequest.Request.Close = true\n\t\t\ttestRequest.Request.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\t\t\ttestRequest.CheckPayload = testRequest.Payload\n\t\t}\n\t\treturn nil\n\tcase \"cookie\":\n\t\ttestRequest.Request = req\n\t\t//encoded cookies are base64 encoded per the recommendation of RFC 6265 section 4.1.1\n\t\tif a.TestRun.B64EncodeCookie {\n\t\t\ttestRequest.Request.Header.Add(\"Cookie\", fmt.Sprintf(`%v=%v`, location.Key, base64.RawStdEncoding.EncodeToString([]byte(testRequest.Payload))))\n\t\t\ttestRequest.CheckPayload = base64.RawStdEncoding.EncodeToString([]byte(testRequest.Payload))\n\t\t} else {\n\t\t\t//force add the payload to the cookie. This bypasses request.AddCookie() which will strip invalid\n\t\t\t//characters. We don't want to strip the characters, we want to show an invalid test.\n\t\t\ttestRequest.Request.Header.Add(\"Cookie\", fmt.Sprintf(`%v=%v`, location.Key, testRequest.Payload))\n\t\t\ttestRequest.CheckPayload = testRequest.Payload\n\t\t}\n\t\treturn nil\n\tdefault:\n\t\treturn fmt.Errorf(\"Unknown location: %v\", location.Location)\n\t}\n}", "title": "" }, { "docid": "2cc3a456882572da4e0214c2acc6d42f", "score": "0.55262494", "text": "func testReq(router *chi.Mux, method, path string, body io.Reader) (*httptest.ResponseRecorder, []byte) {\r\n\r\n\treq, err := http.NewRequest(method, path, body)\r\n\tif err != nil {\r\n\t\tFail(err.Error())\r\n\t}\r\n\r\n\tw := httptest.NewRecorder()\r\n\treq.Header.Set(\"Content-Type\", \"application/json\")\r\n\trouter.ServeHTTP(w, req)\r\n\r\n\trespBody, err := ioutil.ReadAll(w.Body)\r\n\tif err != nil {\r\n\t\tFail(err.Error())\r\n\t}\r\n\r\n\treturn w, respBody\r\n}", "title": "" }, { "docid": "fbacb59cd8843f609b0ad33bdf41c1b2", "score": "0.55253285", "text": "func handleCreateTicketRequest(w http.ResponseWriter, r *http.Request) {\r\n\tlog.Info.Println(\"Serving create new ticket request\")\r\n\tvars := mux.Vars(r)\r\n\tcount := vars[\"count\"]\r\n\tCount, err := strconv.Atoi(count) // pending\r\n\tif err != nil {\r\n\t\tlog.Error.Println(\"Error in Atoi operation, err :\", err)\r\n\t\treturn\r\n\t}\r\n\terr = generateNewTicket(w, Count)\r\n\tif err != nil {\r\n\t\tlog.Error.Println(\"handlePostRequest is failed\")\r\n\t\treturn\r\n\t}\r\n\tlog.Info.Println(\"Successfully created a new ticket\")\r\n}", "title": "" }, { "docid": "0bf7db79925bac6234a94aa838b87c3d", "score": "0.55186313", "text": "func PostConqueso(w http.ResponseWriter, r *http.Request) {\n}", "title": "" }, { "docid": "921c8b92a5d79893db6bc6c4253bf9d5", "score": "0.5516206", "text": "func test_api(w http.ResponseWriter, req *http.Request) {\n\treq.ParseForm()\n\tlog.Printf(\"test_api handle start\\n\")\n\tfmt.Println(\":::form1:::\", req.Form)\n\n\n\tfmt.Println(\":::form1:::\", req.PostFormValue)\n\ttargetHOST := req.PostFormValue(\"host\")\n\ttargetURL := req.PostFormValue(\"url\")\n\tfmt.Println(\":::host:::\", targetHOST)\n\tfmt.Println(\":::url:::\", targetURL)\n\tif targetURL[0:1] != \"/\" {\n\t\ttargetURL = strings.Join([]string{\"/\", targetURL}, \"\")\n\t}\n\n\t//solve post and get parameters\n\tpostParam, getParam := url.Values{}, url.Values{}\n\tfor key, _ := range req.Form {\n\t\tkeySplit := strings.Split(key, \":\")\n\t\tfmt.Println(\":::keySplit param:::\", keySplit)\n\t\tif len(keySplit) >= 2 && keySplit[1] != \"\" {\n\t\t\tif keySplit[0] == \"post\" {\n\t\t\t\tpostParam.Add(keySplit[1], req.PostFormValue(key))\n\t\t\t}else {\n\t\t\t\tgetParam.Add(keySplit[1], req.PostFormValue(key))\n\t\t\t}\n\t\t}\n\t}\n\tfinalURL := fmt.Sprintf(\"http://%v%v\", targetHOST, targetURL)\n\tif len(getParam) > 0 {\n\t\tfinalURL = fmt.Sprintf(\"http://%v?%v\", finalURL, getParam.Encode())\n\t}\n\n\tvar resp *http.Response\n\tvar respErr error\n\tif len(postParam) > 0 {\n\t\tfmt.Println(\":::url:::\", finalURL)\n\t\t/*file, err := os.Open(path)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdefer file.Close()*/\n\n\t\tbody := &bytes.Buffer{}\n\t\twriter := multipart.NewWriter(body)\n\t\t/*part, err := writer.CreateFormFile(paramName, path)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t_, err = io.Copy(part, file)*/\n\n\t\tfor key, _ := range postParam {\n\t\t\t_ = writer.WriteField(key, postParam.Get(key))\n\t\t}\n\t\terr := writer.Close()\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\trequest, err := http.NewRequest(\"POST\", finalURL, body)\n\t\trequest.Header.Set(\"Content-Type\", writer.FormDataContentType())\n\t\tif err == nil {\n\t\t\tresp, respErr = http.DefaultClient.Do(request)\n\t\t}\n\t}else {\n\t\tresp, respErr = http.Get(finalURL)\n\n\t}\n\n\tif respErr != nil {\n\t\tlog.Printf(\"test_api error:%v http.Get(%v)\\n\", respErr, finalURL)\n\t}else {\n\t\tfmt.Println(\":::resp:::\", resp)\n\t\tdefer resp.Body.Close()\n\t\tbody, err := ioutil.ReadAll(resp.Body)\n\t\tif err == nil {\n\t\t\tfmt.Println(\":::body:::\", string(body))\n\t\t\tapiResp := make(map[string]interface{})\n\n\t\t\tapiResp[\"Status\"] = resp.Status\n\t\t\tapiResp[\"StatusCode\"] = resp.StatusCode\n\t\t\tapiResp[\"Proto\"] = resp.Proto\n\t\t\tapiResp[\"Header\"] = resp.Header\n\t\t\tapiResp[\"Body\"] = string(body)\n\t\t\tapiResp[\"ContentLength\"] = resp.ContentLength\n\t\t\t//fmt.Fprint(w,string(body))\n\t\t\tif respData, err := json.Marshal(apiResp); err == nil {\n\t\t\t\tfmt.Fprint(w, string(respData))\n\t\t\t}\n\t\t}\n\t}\n\n\tif data, err := json.Marshal(req.Form); err == nil {\n\t\tfmt.Println(string(data))\n\t}\n\tlog.Printf(\"test_api handle end\\n\")\n}", "title": "" }, { "docid": "cfed295129d4f31a09240b4daec7d738", "score": "0.54910487", "text": "func Test_requestGen_Case2(t *testing.T) {\n // invoke requestGen()\n req, err := requestGen(\"GET\", \"http://www.baidu.com\",\n \"220.181.112.244\", \"80\", CONTENT_FORM, nil, nil)\n if err != nil {\n t.Errorf(\"requestGen():%s\", err.Error())\n return\n }\n \n if req.URL.Host != \"220.181.112.244:80\" {\n t.Errorf(\"URL.Fragment should be 220.181.112.244:80, now it's %s\", req.URL.Host)\n }\n}", "title": "" }, { "docid": "cde7b4d626cb0b551fc772141a1f17d7", "score": "0.5481748", "text": "func (testDefinition *TestDefinition) BuildAndSendRequest(\n\tdelay int,\n\ttargetHost string,\n\ttargetPort string,\n\tuniqueTestRunID string,\n) int64 {\n\tlog.Debugf(\"BEGIN \\\"%s\\\" testDefinition\\n-----\\n%+v\\n-----\\nEND \\\"%s\\\" testDefinition\\n\",\n\t\ttestDefinition.TestName,\n\t\ttestDefinition,\n\t\ttestDefinition.TestName,\n\t)\n\n\trandomDelay := rand.Intn(delay)\n\ttime.Sleep(time.Duration(randomDelay) * time.Millisecond)\n\n\t//Execute the PreThinkTime, if any.\n\tif testDefinition.PreThinkTime > 0 {\n\t\ttt := float64(testDefinition.PreThinkTime) / 1000\n\t\tlog.Infof(\"Think time: [%.2f] seconds.\", tt)\n\t}\n\ttime.Sleep(time.Duration(testDefinition.PreThinkTime) * time.Millisecond)\n\n\tvar req *http.Request\n\treqbody := \"N/A\" //for debug\n\n\t//Retrieve requestBaseURI and perform any necessary substitution\n\trequestBaseURI := substituteRequestValues(&testDefinition.BaseURI, uniqueTestRunID)\n\n\tif !testDefinition.Multipart {\n\t\tlog.Debug(\"Building non-Multipart request.\")\n\t\tif testDefinition.Payload != \"\" {\n\t\t\t//Retrieve Payload and perform any necessary substitution\n\t\t\tpayload := testDefinition.Payload\n\t\t\tnewPayload := substituteRequestValues(&payload, uniqueTestRunID)\n\t\t\treqbody = newPayload\n\t\t\treq, _ = http.NewRequest(testDefinition.HTTPMethod, \"http://\"+targetHost+\":\"+targetPort+requestBaseURI, strings.NewReader(newPayload))\n\t\t} else {\n\t\t\treq, _ = http.NewRequest(testDefinition.HTTPMethod, \"http://\"+targetHost+\":\"+targetPort+requestBaseURI, nil)\n\t\t}\n\t} else {\n\t\tlog.Debug(\"Building Multipart request.\")\n\t\tif testDefinition.HTTPMethod != \"POST\" {\n\t\t\tlog.Error(\"Multipart request must be 'POST' method.\")\n\t\t} else {\n\t\t\tbody := new(bytes.Buffer)\n\t\t\twriter := multipart.NewWriter(body)\n\t\t\tfor _, field := range testDefinition.MultipartPayload {\n\t\t\t\tif field.FileName == \"\" {\n\t\t\t\t\twriter.WriteField(field.FieldName, substituteRequestValues(&field.FieldValue, uniqueTestRunID))\n\t\t\t\t} else {\n\t\t\t\t\tpart, _ := writer.CreateFormFile(field.FieldName, field.FileName)\n\t\t\t\t\tio.Copy(part, bytes.NewReader(field.FileContent))\n\t\t\t\t}\n\t\t\t}\n\t\t\twriter.Close()\n\t\t\treq, _ = http.NewRequest(testDefinition.HTTPMethod, \"http://\"+targetHost+\":\"+targetPort+requestBaseURI, body)\n\t\t\treq.Header.Set(\"Content-Type\", writer.FormDataContentType())\n\n\t\t\t// For debug output\n\t\t\treqbody = body.String()\n\t\t}\n\t}\n\n\t// Add headers and perform and necessary substitution\n\tfor _, header := range testDefinition.Headers {\n\t\treq.Header.Add(header.Key, substituteRequestValues(&header.Value, uniqueTestRunID))\n\t}\n\n\tlog.Debugf(\n\t\t\"BEGIN \\\"%s\\\" Request:\\n-----\\nHEADER:%+v\\nURL:%s\\nREQ_BODY:%s\\n-----\\nEND [%s] Request\",\n\t\ttestDefinition.TestName,\n\t\treq.Header,\n\t\treq.URL,\n\t\treqbody,\n\t\ttestDefinition.TestName,\n\t)\n\n\tvar resp *http.Response\n\tvar err error\n\tstartTime := time.Now()\n\tif resp, err = (&http.Client{}).Do(req); err != nil {\n\t\tlog.Errorf(\"Connection failed for request [Name:%s]: %+v\", testDefinition.TestName, err)\n\t\treturn 0\n\t}\n\t// Mark response time.\n\ttimeTaken := time.Since(startTime)\n\t// Gather the response.\n\tbody, _ := ioutil.ReadAll(resp.Body)\n\tdefer resp.Body.Close()\n\n\tlog.Debugf(\n\t\t\"BEGIN \\\"%s\\\" Response:\\n-----\\nSTATUSCODE:%d\\nHEADER:%+v\\nRESP_BODY:%s\\n-----\\nEND [%s] Response\",\n\t\ttestDefinition.TestName,\n\t\tresp.StatusCode,\n\t\tresp.Header,\n\t\tstring(body),\n\t\ttestDefinition.TestName,\n\t)\n\n\t//Validate service response\n\tresponseCodeOk := perfTestUtils.ValidateResponseStatusCode(resp.StatusCode, testDefinition.ResponseStatusCode, testDefinition.TestName)\n\tresponseTimeOK := perfTestUtils.ValidateServiceResponseTime(timeTaken.Nanoseconds(), testDefinition.TestName)\n\n\tif !responseCodeOk || !responseTimeOK {\n\t\treturn 0\n\t}\n\n\tcontentType := detectContentType(resp.Header, body, testDefinition.ResponseContentType)\n\textractResponseValues(testDefinition.TestName, body, testDefinition.ResponseValues, uniqueTestRunID, contentType)\n\n\t//Execute the PostThinkTime, if any.\n\tif testDefinition.PostThinkTime > 0 {\n\t\ttt := float64(testDefinition.PostThinkTime) / 1000\n\t\tlog.Infof(\"Think time: [%.2f] seconds.\", tt)\n\t}\n\ttime.Sleep(time.Duration(testDefinition.PostThinkTime) * time.Millisecond)\n\n\treturn timeTaken.Nanoseconds()\n}", "title": "" }, { "docid": "d55f42e8b0040699a4ef7acc4f3966ff", "score": "0.5473657", "text": "func TestNewDataRequest(t *testing.T) {\n\tnodeId := validNodeId\n\tstart := time.Now()\n\tend := start.Add(1 * time.Hour)\n\n\tdataRequest := model.NewDataRequest(nodeId, start, end)\n\n\tcheckDataRequestValues(dataRequest, nodeId, start, end, t)\n}", "title": "" }, { "docid": "063b3dbba51c45fc38cd269364a62a62", "score": "0.546886", "text": "func handlePostRequest(writer http.ResponseWriter, request *http.Request) {\n // Get the id.\n id, err := getIdFromURL(request.URL.Path)\n\n // Parses the body.\n var value RequestBody\n jsonErr := json.NewDecoder(request.Body).Decode(&value)\n\n if err != nil {\n // Error on the ID.\n log.Println(\"[POST] 400 Bad request : \\\"\" + request.URL.Path + \"\\\"\")\n writer.WriteHeader(400)\n writer.Write([]byte(err.Error()))\n } else if jsonErr != nil || value.Value == \"\" {\n // Error on the value.\n writer.WriteHeader(400)\n\n if jsonErr != nil {\n log.Println(\"[POST] 400 error while parsing request body : \" + jsonErr.Error())\n writer.Write([]byte(\"Error while parsing request body : \" + jsonErr.Error()))\n } else {\n log.Println(\"[POST] 400 no value for id : \" + id)\n writer.Write([]byte(\"Value is empty.\"))\n }\n } else {\n // No error.\n // Lock & unlock the mutex to prevent data races.\n valuesMapMutex.Lock()\n _, found := valuesMap[id]\n valuesMapMutex.Unlock()\n\n // Check the id is not already used\n if found {\n log.Println(\"[POST] 409 ID already exists : \" + id)\n\n writer.WriteHeader(409)\n writer.Write([]byte(\"ID already exists.\"))\n } else {\n // Write the value in the store.\n // Lock & unlock the mutex to prevent data races.\n valuesMapMutex.Lock()\n valuesMap[id] = value.Value\n valuesMapMutex.Unlock()\n\n // Answer.\n log.Println(\"[POST] 200 created value for id : \" + id)\n\n writer.Header().Set(\"Content-Type\", \"application/json\")\n writer.WriteHeader(200)\n }\n }\n}", "title": "" }, { "docid": "39c7f5ea4e8afe599e00be3da401eafe", "score": "0.54600096", "text": "func testReq(router *chi.Mux, method, path string, body io.Reader) (*httptest.ResponseRecorder, []byte) {\n\n\treq, err := http.NewRequest(method, path, body)\n\tif err != nil {\n\t\tFail(err.Error())\n\t}\n\n\tw := httptest.NewRecorder()\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\trouter.ServeHTTP(w, req)\n\n\trespBody, err := ioutil.ReadAll(w.Body)\n\tif err != nil {\n\t\tFail(err.Error())\n\t}\n\n\treturn w, respBody\n}", "title": "" }, { "docid": "ea85dd5a25e5f594de801596ade85f33", "score": "0.54574174", "text": "func GenerateNewRequest(url, payload string, options model.Options) *http.Request {\n\treq, _ := http.NewRequest(\"GET\", url, nil)\n\tif options.Data != \"\" {\n\t\td := []byte(payload)\n\t\treq, _ = http.NewRequest(\"POST\", url, bytes.NewBuffer(d))\n\t\treq.Header.Add(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\t}\n\n\tif options.Header != \"\" {\n\t\th := strings.Split(options.Header, \": \")\n\t\tif len(h) > 1 {\n\t\t\treq.Header.Add(h[0], h[1])\n\t\t}\n\t}\n\tif options.Cookie != \"\" {\n\t\treq.Header.Add(\"Cookie\", options.Cookie)\n\t}\n\tif options.UserAgent != \"\" {\n\t\treq.Header.Add(\"User-Agent\", options.UserAgent)\n\t} else {\n\t\treq.Header.Add(\"User-Agent\", \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:75.0) Gecko/20100101 Firefox/75.0\")\n\t}\n\treturn req\n}", "title": "" }, { "docid": "525a9c40d603dde7d3ff16c7d6ae29c3", "score": "0.5456926", "text": "func gen(path string, values Values) ClientFunc {\n\treturn func(ctx context.Context, port int) ([]byte, error) {\n\t\t// Get form values.\n\t\turlValues := url.Values{}\n\t\tfor k, v := range values {\n\t\t\turlValues[k] = []string{*v}\n\t\t}\n\n\t\t// Send request.\n\t\tbChan, eChan := request(port, path, urlValues)\n\n\t\t// Await reply.\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\treturn nil, ErrTimeout\n\t\tcase e := <-eChan:\n\t\t\treturn nil, e\n\t\tcase body := <-bChan:\n\t\t\treturn body, nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4502c85727d2fd52f6f809c619c4cb66", "score": "0.5453124", "text": "func (r *PageCreate) Fill(req *http.Request) (err error) {\n\tif strings.ToLower(req.Header.Get(\"content-type\")) == \"application/json\" {\n\t\terr = json.NewDecoder(req.Body).Decode(r)\n\n\t\tswitch {\n\t\tcase err == io.EOF:\n\t\t\terr = nil\n\t\tcase err != nil:\n\t\t\treturn errors.Wrap(err, \"error parsing http request body\")\n\t\t}\n\t}\n\n\tif err = req.ParseForm(); err != nil {\n\t\treturn err\n\t}\n\n\tget := map[string]string{}\n\tpost := map[string]string{}\n\turlQuery := req.URL.Query()\n\tfor name, param := range urlQuery {\n\t\tget[name] = string(param[0])\n\t}\n\tpostVars := req.Form\n\tfor name, param := range postVars {\n\t\tpost[name] = string(param[0])\n\t}\n\n\tif val, ok := post[\"selfID\"]; ok {\n\t\tr.hasSelfID = true\n\t\tr.rawSelfID = val\n\t\tr.SelfID = parseUInt64(val)\n\t}\n\tif val, ok := post[\"moduleID\"]; ok {\n\t\tr.hasModuleID = true\n\t\tr.rawModuleID = val\n\t\tr.ModuleID = parseUInt64(val)\n\t}\n\tif val, ok := post[\"title\"]; ok {\n\t\tr.hasTitle = true\n\t\tr.rawTitle = val\n\t\tr.Title = val\n\t}\n\tif val, ok := post[\"handle\"]; ok {\n\t\tr.hasHandle = true\n\t\tr.rawHandle = val\n\t\tr.Handle = val\n\t}\n\tif val, ok := post[\"description\"]; ok {\n\t\tr.hasDescription = true\n\t\tr.rawDescription = val\n\t\tr.Description = val\n\t}\n\tif val, ok := post[\"weight\"]; ok {\n\t\tr.hasWeight = true\n\t\tr.rawWeight = val\n\t\tr.Weight = parseInt(val)\n\t}\n\tif val, ok := post[\"visible\"]; ok {\n\t\tr.hasVisible = true\n\t\tr.rawVisible = val\n\t\tr.Visible = parseBool(val)\n\t}\n\tif val, ok := post[\"blocks\"]; ok {\n\t\tr.hasBlocks = true\n\t\tr.rawBlocks = val\n\n\t\tif r.Blocks, err = parseJSONTextWithErr(val); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tr.hasNamespaceID = true\n\tr.rawNamespaceID = chi.URLParam(req, \"namespaceID\")\n\tr.NamespaceID = parseUInt64(chi.URLParam(req, \"namespaceID\"))\n\n\treturn err\n}", "title": "" }, { "docid": "7ff69d730563672db14d201ed23407a6", "score": "0.54513234", "text": "func testRequestHandler(w http.ResponseWriter, r *http.Request) {\n\ttestType := r.URL.Query().Get(\"type\")\n\n\tvar rparams perftest.RatingParams\n\tvar bparams perftest.BillingParams\n\tvar testID string\n\tvar e error\n\tdecoder := json.NewDecoder(r.Body)\n\tswitch testType {\n\tcase \"rating\":\n\t\tif e = decoder.Decode(&rparams); e != nil {\n\t\t\thttp.Error(w, e.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tif testID, e = StartRatingTest(&rparams); e != nil {\n\t\t\thttp.Error(w, e.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\tcase \"billing\":\n\t\tif e = decoder.Decode(&bparams); e != nil {\n\t\t\thttp.Error(w, e.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tif testID, e = StartBillingTest(&bparams); e != nil {\n\t\t\thttp.Error(w, e.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\tdefault:\n\t\thttp.Error(w, fmt.Sprintf(\"Invalid/Missing test type, valid types are 'billing' and 'rating', got %v\", testType), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(map[string]string{\"id\": testID})\n}", "title": "" }, { "docid": "56bb7199e3ed9ddafd05f47391f01e7c", "score": "0.54497766", "text": "func runRequest(s *server.Server, method, path, body string) {\n\tvar bodyReader io.Reader\n\tif body != \"\" {\n\t\tbodyReader = strings.NewReader(body)\n\t}\n\tr := httptest.NewRequest(method, path, bodyReader)\n\tr.Header.Set(\"Content-Type\", \"application/json\")\n\tw := httptest.NewRecorder()\n\ts.ServeHTTP(w, r)\n\tfmt.Print(w.Code)\n\tif w.Body.Len() != 0 {\n\t\tfmt.Print(\" \", w.Body)\n\t}\n\tfmt.Println()\n}", "title": "" }, { "docid": "59065bb2b0013705406b436503fea9f5", "score": "0.5420916", "text": "func request(t *testing.T, method, urlStr string, body io.Reader) *httptest.ResponseRecorder {\n\tw := httptest.NewRecorder()\n\tr, err := http.NewRequest(method, urlStr, body)\n\trequire.NoError(t, err)\n\tapp.ServeHTTP(w, r)\n\treturn w\n}", "title": "" }, { "docid": "718494d380378a7140deb43a23d30def", "score": "0.5418403", "text": "func getBodyGenerator(request *http.Request) io.Reader {\n\tif requestHasHeader(request, RequestBodyIsResponse) {\n\t\treturn request.Body\n\t} else if requestHasHeader(request, GenerateRandomResponse) {\n\t\tbodySizeField := getFirstHeaderValue(request, GenerateRandomResponse)\n\t\tbodySize, err := strconv.Atoi(bodySizeField)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Could not convert body size for random data: %s\", bodySizeField)\n\t\t\treturn strings.NewReader(\"\")\n\t\t}\n\t\treturn newRandomBodyGenerator(bodySize)\n\t} else if requestHasHeader(request, RandomJson) {\n\t\t// gather up all the values for the header into one string\n\t\tallHeaderValues := request.Header[RandomJson]\n\t\ttemplateInput, err := normalizeJsonTemplateParameters(allHeaderValues)\n\n\t\tvar generator jsonElementGenerator\n\t\tif err != nil {\n\t\t\tgenerator = newErrorGenerator(fmt.Sprintf(\"Could not process input %v\", err))\n\t\t} else {\n\t\t\tgenerator, err = createJsonTemplate(templateInput)\n\t\t\tif err != nil {\n\t\t\t\tgenerator = newErrorGenerator(fmt.Sprintf(\"Could not parse input for generator %v\", err))\n\t\t\t}\n\t\t}\n\n\t\treader, writer := io.Pipe()\n\t\tgo func() {\n\t\t\tgenerator.generate(writer)\n\t\t\twriter.Close()\n\t\t}()\n\t\treturn reader\n\t} else {\n\t\treturn strings.NewReader(\"\")\n\t}\n}", "title": "" }, { "docid": "26f3078d6d3647f24376d00348acec1d", "score": "0.5416397", "text": "func (ht *HTTPT) Post(\n\tpath string,\n\tform url.Values,\n\tmods ...func(*http.Request),\n) *httptest.ResponseRecorder {\n\treturn ht.RH.Post(path, form, mods...)\n}", "title": "" }, { "docid": "9abf87d6533bfe2111e3e3f74a862773", "score": "0.539714", "text": "func want(t *testing.T, path, method string, data map[string]string) func(r *http.Request) {\n\treturn func(r *http.Request) {\n\t\tif r.URL.Path != path {\n\t\t\tt.Errorf(\"URL.Path = %q, want %q\", r.URL.Path, path)\n\t\t}\n\t\tif r.Method != method {\n\t\t\tt.Errorf(\"URL.Method = %q, want %q\", r.Method, method)\n\t\t}\n\t\terr := r.ParseForm()\n\t\tif err != nil {\n\t\t\tt.Error(\"Error parsing form data:\", err)\n\t\t}\n\t\tfor k, v := range data {\n\t\t\tif r.Form.Get(k) != v {\n\t\t\t\tt.Errorf(\"parameter `%s` = %q, want %q\", k, r.Form.Get(k), v)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d932d18810d638ff20d7f9bb0850bb9e", "score": "0.5385222", "text": "func (g *WebhookTestingGateway) Request(kind, id string) (*http.Request, error) {\n\tpayload := g.SamplePayload(kind, id)\n\tsignature, err := g.SignPayload(payload)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tform := url.Values{}\n\tform.Add(\"bt_signature\", signature)\n\tform.Add(\"bt_payload\", payload)\n\n\tbody := form.Encode()\n\treturn &http.Request{\n\t\tMethod: \"POST\",\n\t\tHeader: http.Header{\"Content-Type\": {\"application/x-www-form-urlencoded\"}},\n\t\tContentLength: int64(len(body)),\n\t\tBody: ioutil.NopCloser(strings.NewReader(body)),\n\t}, nil\n}", "title": "" }, { "docid": "c64283d32aebaa245507233c285774bd", "score": "0.53831816", "text": "func TestPostProcessingGood(t *testing.T) {\n\ttestStore := &mockUsers{}\n\tmockEnv := config.Env{Datastore: testStore}\n\n\treq, err := http.NewRequest(http.MethodPost, \"/users/\",\n\t\tstrings.NewReader(`{\"firstName\":\"testUser\",\"lastName\":\"test1\",\"email\":\"test@email.com\",\"organization\":\"sales\"}`))\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\thandler := http.HandlerFunc(config.MakeHandler(ProcessRequestByType, &mockEnv))\n\trec := httptest.NewRecorder()\n\thandler.ServeHTTP(rec, req)\n\n\tcompareStatusCode(rec.Code, http.StatusOK, t)\n\n\tupdatedData := testStore.dataSet()\n\n\tvar userMap map[int]model.User\n\tjson.Unmarshal([]byte(updatedData), &userMap)\n\n\twant := model.User{ID: 3, FirstName: \"testUser\", LastName: \"test1\",\n\t\tEmail: \"test@email.com\", Organization: \"sales\"}\n\tgot := userMap[3]\n\tif want != got {\n\t\tt.Errorf(\"incorrect user save data, got %v want %v\",\n\t\t\tgot, want)\n\t}\n\n}", "title": "" }, { "docid": "f784d44f24bf97ce5bb48de053ff7e2a", "score": "0.5379765", "text": "func (provider *KongProvider) makePostRequest(service KongService) error {\n\tb := new(bytes.Buffer)\n\tjson.NewEncoder(b).Encode(service)\n\t_, err := http.Post(provider.Host, \"application/json; charset=utf-8\", b)\n\treturn err\n}", "title": "" }, { "docid": "e9f04b87e17ba6f1c8a50bb4fd9cf0e6", "score": "0.53774405", "text": "func PostRequest(url string, form url.Values, handler http.HandlerFunc) *httptest.ResponseRecorder {\n\treq, _ := http.NewRequest(\"POST\", url, strings.NewReader(form.Encode()))\n\treq.Header.Add(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\treq.Header.Add(\"Sec-Key\", os.Getenv(\"SERVER_KEY\"))\n\n\trr := httptest.NewRecorder()\n\thandler.ServeHTTP(rr, req)\n\treturn rr\n}", "title": "" }, { "docid": "5b460854dddfe4f7a7224ff88ac1052c", "score": "0.5377392", "text": "func post(router http.Handler, path string) *httptest.ResponseRecorder {\n\treturn request(router, \"POST\", path)\n}", "title": "" }, { "docid": "44b5c826e3990ae91a9ffcd56cbf6503", "score": "0.53402585", "text": "func makePostRequest(ctx context.Context, r *httpRequest, p payload) (*httpResponse, error) {\n\tr.addHeader(\"User-Agent\", MailgunGoUserAgent)\n\trsp, err := r.makePostRequest(ctx, p)\n\tif (err == nil) && notGood(rsp.Code, expected) {\n\t\treturn rsp, newError(r.URL, expected, rsp)\n\t}\n\treturn rsp, err\n}", "title": "" }, { "docid": "86535d82d494d00084525bab2b1d7827", "score": "0.53246444", "text": "func doTestRequest(target string, req *http.Request, handlerFunc http.HandlerFunc, w *httptest.ResponseRecorder) *httptest.ResponseRecorder {\n\tif w == nil {\n\t\tw = httptest.NewRecorder()\n\t}\n\trouter := mux.NewRouter()\n\trouter.HandleFunc(target, handlerFunc)\n\trouter.ServeHTTP(w, req)\n\treturn w\n}", "title": "" }, { "docid": "a5a434ab7d37f8fa6fa0a838fc229f25", "score": "0.5323795", "text": "func TestNewPoolRequest(t *testing.T) {\r\n\tassert.NoError(t, keyLoginex(1, \"3\"))\r\n\trnd := `@1NewPoolRequest`\r\n\tform := url.Values{\r\n\t\t`Logo`: {`1`},\r\n\t\t`Name`: {`amod`},\r\n\t\t`SettleType`: {`1`},\r\n\t\t`SettleRate`: {`1`},\r\n\t\t`SettleMinAmount`: {`1000000`},\r\n\t\t`SettleCycle`: {`12`},\r\n\t\t`WebUrl`: {`http://a.b.c`},\r\n\t\t`PoolAddr`: {`0454-4233-9004-4311-2470`},\r\n\t}\r\n\t_, _, err := postTxResult(rnd, &form)\r\n\tassert.NoError(t, err)\r\n}", "title": "" }, { "docid": "65be8493307f8b1aaa3d3e361c6606c9", "score": "0.5314357", "text": "func newTestRequest(method, urlStr string, contentLength int64, body io.ReadSeeker) (*http.Request, error) {\n\tif method == \"\" {\n\t\tmethod = \"POST\"\n\t}\n\n\t// Save for subsequent use\n\tvar hashedPayload string\n\tvar md5Base64 string\n\tswitch {\n\tcase body == nil:\n\t\thashedPayload = getSHA256Hash([]byte{})\n\tdefault:\n\t\tpayloadBytes, err := io.ReadAll(body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\thashedPayload = getSHA256Hash(payloadBytes)\n\t\tmd5Base64 = getMD5HashBase64(payloadBytes)\n\t}\n\t// Seek back to beginning.\n\tif body != nil {\n\t\tbody.Seek(0, 0)\n\t} else {\n\t\tbody = bytes.NewReader([]byte(\"\"))\n\t}\n\treq, err := http.NewRequest(method, urlStr, body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif md5Base64 != \"\" {\n\t\treq.Header.Set(\"Content-Md5\", md5Base64)\n\t}\n\treq.Header.Set(\"x-amz-content-sha256\", hashedPayload)\n\n\t// Add Content-Length\n\treq.ContentLength = contentLength\n\n\treturn req, nil\n}", "title": "" }, { "docid": "e6b448ffa108371bae423434f8c1ce58", "score": "0.53133863", "text": "func keygen(w http.ResponseWriter, r *http.Request) {\n\tvar request KeygenRequest\n\n\tbody, err := ioutil.ReadAll(io.LimitReader(r.Body, 2*1024))\n\tif err != nil {\n\t\tlogger.Println(\"Error reading web request:\", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif err := r.Body.Close(); err != nil {\n\t\tlogger.Println(\"Error closing submission request body:\", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t}\n\n\tif err := json.Unmarshal(body, &request); err != nil {\n\t\tlogger.Printf(\"Error unmarshalling keygen request. Error: %v\\nRequest: %v\\n\", err, string(body))\n\t\tsendErrorCode(w, http.StatusBadRequest, errors.New(\"Error unmarshalling keygen request.\"))\n\t\treturn\n\t}\n\n\tkey, err := submissionServer.KeyGen(&request)\n\tif err != nil {\n\t\t// Unprocessable entity\n\t\tsendErrorCode(w, 422, err)\n\t} else {\n\t\tw.WriteHeader(http.StatusOK)\n\t\tfmt.Fprintf(w, key)\n\t}\n\n}", "title": "" }, { "docid": "06f27afae896eed30e45c6323c836142", "score": "0.53116167", "text": "func newTestRequest(method, path string, body io.Reader, matchedPath string) (*http.Request, error) {\n\tr, err := http.NewRequest(method, path, body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tr = SetDetails(r, matchedPath, map[string]string{})\n\treturn r, nil\n}", "title": "" }, { "docid": "8f9376d5cb6e6c20c0cc1e715de5d8c5", "score": "0.5309985", "text": "func newTestRequest(method, urlStr string, contentLength int64, body io.ReadSeeker) (*http.Request, error) {\n\tif method == \"\" {\n\t\tmethod = \"POST\"\n\t}\n\n\t// Save for subsequent use\n\tvar hashedPayload string\n\tvar md5Base64 string\n\tswitch {\n\tcase body == nil:\n\t\thashedPayload = getSHA256Hash([]byte{})\n\tdefault:\n\t\tpayloadBytes, err := ioutil.ReadAll(body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\thashedPayload = getSHA256Hash(payloadBytes)\n\t\tmd5Base64 = getMD5HashBase64(payloadBytes)\n\t}\n\t// Seek back to beginning.\n\tif body != nil {\n\t\tbody.Seek(0, 0)\n\t} else {\n\t\tbody = bytes.NewReader([]byte(\"\"))\n\t}\n\treq, err := http.NewRequest(method, urlStr, body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif md5Base64 != \"\" {\n\t\treq.Header.Set(\"Content-Md5\", md5Base64)\n\t}\n\treq.Header.Set(\"x-amz-content-sha256\", hashedPayload)\n\n\t// Add Content-Length\n\treq.ContentLength = contentLength\n\n\treturn req, nil\n}", "title": "" }, { "docid": "44e3b3255fcfb1593287905a88c64df4", "score": "0.5308839", "text": "func TestPostUsageInfo(t *testing.T) {\n\treqCC := ReqCC{}\n\treqCC.AK = \"ak-e8KHNqsPvs5hsPGi\"\n\treqCC.SK = \"zUUGA25ITxzRP8PqLHbQ2S0kd0GZCIRU\"\n\treqCC.Now = \"1622438749\"\n\treqCC.Nonce = \"9285e594f69242e9810d5186bfa92d5a\"\n\t// nowStr := fmt.Sprintln(time.Now().Unix())\n\t// nonce := genUUID(nowStr)\n\treqCC.Body = genBody()\n\treqCC.updateSign()\n\tfmt.Println(\"---sign--\", reqCC.Sign)\n\n}", "title": "" }, { "docid": "83f30e2a648ee970bf43e86cc4003c02", "score": "0.53002584", "text": "func (request *Request) newGenerator(disablePayloads bool) *requestGenerator {\n\tgenerator := &requestGenerator{\n\t\trequest: request,\n\t\toptions: request.options,\n\t\tonceFlow: make(map[string]struct{}),\n\t}\n\n\tif len(request.Payloads) > 0 && !disablePayloads {\n\t\tgenerator.payloadIterator = request.generator.NewIterator()\n\t}\n\treturn generator\n}", "title": "" }, { "docid": "3796711ee85d06c425297326adaedcb9", "score": "0.5288776", "text": "func mustNewRequest(method string, urlStr string, contentLength int64, body io.ReadSeeker, t *testing.T) *http.Request {\n\treq, err := newTestRequest(method, urlStr, contentLength, body)\n\tif err != nil {\n\t\tt.Fatalf(\"Unable to initialize new http request %s\", err)\n\t}\n\treturn req\n}", "title": "" }, { "docid": "7595ad8f0f3b39e0989139d8df597bed", "score": "0.5276674", "text": "func runRequest(routeName, routePath, payload string, signFunc func(*http.Request)) (int, string, errors.Error) {\n\tvar (\n\t\trequestRoute *server.Route\n\t\troutePattern string\n\t)\n\n\tif routeName == \"index\" {\n\t\trequestRoute = getRoute(routeName)\n\t\troutePattern = \"/\"\n\t} else if routeName == \"humans\" {\n\t\trequestRoute = getRoute(routeName)\n\t\troutePattern = \"/humans.txt\"\n\t} else if routeName == \"robots\" {\n\t\trequestRoute = getRoute(routeName)\n\t\troutePattern = \"/robots.txt\"\n\t} else {\n\t\trequestRoute = getRoute(routeName)\n\t\troutePattern = requestRoute.RoutePattern()\n\t}\n\n\treq, err := http.NewRequest(\n\t\trequestRoute.Method,\n\t\troutePath,\n\t\tstrings.NewReader(payload),\n\t)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tcreateCommonRequestHeaders(req)\n\n\tsignFunc(req)\n\n\tw := httptest.NewRecorder()\n\tm := mux.NewRouter()\n\tm.\n\t\tHandleFunc(routePattern, server.CustomHandler(requestRoute, mainLogChan, errorLogChan, \"test\", false, true)).\n\t\tMethods(requestRoute.Method)\n\tm.ServeHTTP(w, req)\n\n\tbody := w.Body.String()\n\n\tif *doLogResponses {\n\t\tfmt.Printf(\"Got response: %#v with body %s\\n\", w, body)\n\t}\n\n\treturn w.Code, body, nil\n}", "title": "" }, { "docid": "a81c9179cd5bf70c92b182b60afc222f", "score": "0.5276084", "text": "func preparePostData(req *SmartRequest) (*JSONData, error) {\n var data JSONData\n var err error\n if req != nil {\n if validReq(req) {\n addReqData(req, &data)\n } else {\n err = errors.New(\"Invalid Request\")\n }\n } else {\n err = errors.New(\"SmartRequest cannot be nil\")\n }\n return &data, err\n}", "title": "" }, { "docid": "f4824b6a0c386311cc7e21eb616a2706", "score": "0.52736765", "text": "func (client *InputsClient) testCreateRequest(ctx context.Context, resourceGroupName string, jobName string, inputName string, options *InputsClientBeginTestOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.StreamAnalytics/streamingjobs/{jobName}/inputs/{inputName}/test\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif jobName == \"\" {\n\t\treturn nil, errors.New(\"parameter jobName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{jobName}\", url.PathEscape(jobName))\n\tif inputName == \"\" {\n\t\treturn nil, errors.New(\"parameter inputName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{inputName}\", url.PathEscape(inputName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\tif options != nil && options.Input != nil {\n\t\treturn req, runtime.MarshalAsJSON(req, *options.Input)\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "ff249e7b4cc8ba153c5ec55e9ada99e2", "score": "0.52687234", "text": "func handlePostHashRequest(writer http.ResponseWriter, request *http.Request) {\n\t// check if this is a POST request\n\tif request.Method != \"POST\" {\n\t\thttp.Error(writer, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// find the password parameter\n\tvalue := request.FormValue(\"password\")\n\tif value == \"\" {\n\t\thttp.Error(writer, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// get a new unique sequence number for this request\n\tsequenceNumber := atomic.AddUint64(&globalSequenceNumber, 1)\n\n\t// send the sequence number to the client\n\tfmt.Fprintf(writer, \"%d\", sequenceNumber)\n\n\t// this function needs to return in order to send the response,\n\t// so kick off a new thread to continue processing the password\n\tgo processHashRequest(value, sequenceNumber)\n}", "title": "" }, { "docid": "e66615e013f53af3ef31a6379ef0e191", "score": "0.5264673", "text": "func SeedRequestForXPage(input string) (string, error) {\n\tdefer func() {\n\t\terr := recover()\n\t\tif err != nil {\n\t\t\tlogger.Printf(logger.DebugLevel, \"Error on Request %#v\", err)\n\t\t\tlogger.Printf(logger.ErrorLevel, \"Error on Request %#v\", err)\n\t\t}\n\t}()\n\n\t// sanitize input , random choose of seedURL TODO()\n\thttpResp, err := webClient.Post(\n\t\tseedURL,\n\t\t\"application/x-www-form-urlencoded\",\n\t\tstrings.NewReader(fmt.Sprintf(\"q=%s\", input)),\n\t)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer httpResp.Body.Close()\n\n\tif httpResp.StatusCode != http.StatusOK {\n\t\treturn \"\", fmt.Errorf(\"Invalid Status %d\", httpResp.StatusCode)\n\t}\n\n\treturn func() (string, error) {\n\t\ttmp := make([]byte, 1024)\n\t\tfinalByts := make([]byte, 0)\n\n\t\tfor rdN, err := httpResp.Body.Read(tmp); rdN > 0; {\n\t\t\tif err != nil && err.Error() != \"EOF\" {\n\t\t\t\treturn \"\", err\n\t\t\t}\n\n\t\t\tfinalByts = append(finalByts, tmp[:rdN]...)\n\t\t\trdN, err = httpResp.Body.Read(tmp)\n\t\t}\n\n\t\treturn string(finalByts), nil\n\t}()\n}", "title": "" }, { "docid": "25ebcd6a03a74cd7f67115527ece618d", "score": "0.52631354", "text": "func (test *Client) Post(t *testing.T, path, contentType string, data ...interface{}) {\n\ttest.Invoke(t, \"POST\", path, contentType, data...)\n}", "title": "" }, { "docid": "99f3bb4e7a02a23f6fee5a7359426f1b", "score": "0.52600867", "text": "func processRequest(r *http.Request) error {\n\ttime.Sleep(time.Duration(rand.Int31n(50)) * time.Millisecond)\n\treturn nil\n}", "title": "" }, { "docid": "de015d89257447ebc8215100c1189d40", "score": "0.52599454", "text": "func request(method, url string, body io.Reader) (r *http.Request, err error) {\n\tvar (\n\t\tctx context.Context\n\t)\n\n\tif r, err = http.NewRequest(method, url, body); err != nil {\n\t\treturn\n\t}\n\n\tif method == \"POST\" || method == \"PUT\" {\n\t\tr.Header.Add(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\t}\n\n\tctx = context.WithValue(r.Context(), \"Id\", \"test_\"+method)\n\tr = r.WithContext(ctx)\n\n\treturn\n}", "title": "" }, { "docid": "57e433857fe521efe665e45b23f37bde", "score": "0.52507585", "text": "func verifyRequest(t *testing.T, method string, expectToken bool, status int, params url.Values, resultPath string) (func(w http.ResponseWriter, r *http.Request)) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tif val, ok := r.Header[AuthHeaderKey]; ok {\n\t\t\tassert.Equal(t, []string{TestToken}, val, \"Incorrect auth token in headers\")\n\t\t} else {\n\t\t\tif expectToken {\n\t\t\t\tassert.Fail(t, \"Failed to find auth token in headers\")\n\t\t\t}\n\t\t}\n\n\t\tif val, ok := r.Header[\"Content-Type\"]; ok {\n\t\t\tassert.Equal(t, []string{\"application/json\"}, val, \"Incorrect content-type in headers\")\n\t\t} else {\n\t\t\tassert.Fail(t, \"Failed to find content type in headers\")\n\t\t}\n\n\t\tassert.Equal(t, method, r.Method, \"Incorrect HTTP method\")\n\n\t\tif params != nil {\n\t\t\tincomingParams := r.URL.Query()\n\t\t\tfor k := range params {\n\t\t\t\tassert.Equal(t, params.Get(k), incomingParams.Get(k), \"Params do match for parameter '\"+k+\"': '\"+incomingParams.Get(k)+\"'\")\n\t\t\t}\n\t\t}\n\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(status)\n\t\t// Allow empty bodies\n\t\tif resultPath != \"\" {\n\t\t\tfmt.Fprintf(w, fixture(resultPath))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "02a849e9bc219c2fbe2cc972fefc5534", "score": "0.5246416", "text": "func newTestRequest(method, path string) (*httptest.ResponseRecorder, *http.Request) {\n\trequest, _ := http.NewRequest(method, path, nil)\n\trecorder := httptest.NewRecorder()\n\n\treturn recorder, request\n}", "title": "" }, { "docid": "02a849e9bc219c2fbe2cc972fefc5534", "score": "0.5246416", "text": "func newTestRequest(method, path string) (*httptest.ResponseRecorder, *http.Request) {\n\trequest, _ := http.NewRequest(method, path, nil)\n\trecorder := httptest.NewRecorder()\n\n\treturn recorder, request\n}", "title": "" }, { "docid": "66cad6967f6522fe45989149536c2cd1", "score": "0.52395487", "text": "func TestHashPost(t *testing.T) {\n\t// Create a request to pass to our handler. We don't have any query parameters for now, so we'll\n\t// pass 'nil' as the third parameter.\n\tform := url.Values{}\n\tform.Add(\"password\", \"angryMonkey\")\n\treq := httptest.NewRequest(\"POST\", \"/hash\", strings.NewReader(form.Encode()))\n\treq.Form = form\n\n\t// We create a ResponseRecorder (which satisfies http.ResponseWriter) to record the response.\n\trr := httptest.NewRecorder()\n\thandler := http.HandlerFunc(HashHandler)\n\n\t// Our handlers satisfy http.Handler, so we can call their ServeHTTP method\n\t// directly and pass in our Request and ResponseRecorder.\n\thandler.ServeHTTP(rr, req)\n\n\t// Check the status code is what we expect.\n\tif status := rr.Code; status != http.StatusOK {\n\t\tt.Errorf(\"handler returned wrong status code: got %v want %v\",\n\t\t\tstatus, http.StatusOK)\n\t}\n\n\t// Check the response body is what we expect.\n\texpected := `1`\n\tif rr.Body.String() != expected {\n\t\tt.Errorf(\"handler returned unexpected body: got %v want %v\",\n\t\t\trr.Body.String(), expected)\n\t}\n\n\ttime.Sleep(6 * time.Second)\n\n\treq = httptest.NewRequest(\"GET\", \"/hash/1\", nil)\n\t// We create a ResponseRecorder (which satisfies http.ResponseWriter) to record the response.\n\trr = httptest.NewRecorder()\n\thandler = http.HandlerFunc(HashHandler)\n\n\t// Our handlers satisfy http.Handler, so we can call their ServeHTTP method\n\t// directly and pass in our Request and ResponseRecorder.\n\thandler.ServeHTTP(rr, req)\n\n\t// Check the status code is what we expect.\n\tif status := rr.Code; status != http.StatusOK {\n\t\tt.Errorf(\"handler returned wrong status code: got %v want %v\",\n\t\t\tstatus, http.StatusOK)\n\t}\n\n\t// Check the response body is what we expect.\n\tt.Logf(\"Response body was: %s\", rr.Body.String())\n\n\treq = httptest.NewRequest(\"GET\", \"/stats\", nil)\n\t// We create a ResponseRecorder (which satisfies http.ResponseWriter) to record the response.\n\trr = httptest.NewRecorder()\n\thandler = http.HandlerFunc(StatsHandler)\n\n\t// Our handlers satisfy http.Handler, so we can call their ServeHTTP method\n\t// directly and pass in our Request and ResponseRecorder.\n\thandler.ServeHTTP(rr, req)\n\n\t// Check the status code is what we expect.\n\tif status := rr.Code; status != http.StatusOK {\n\t\tt.Errorf(\"handler returned wrong status code: got %v want %v\",\n\t\t\tstatus, http.StatusOK)\n\t}\n\n\t// Check the response body is what we expect.\n\tt.Logf(\"Response body was: %s\", rr.Body.String())\n}", "title": "" }, { "docid": "275f6c69e0cfcdc2a1e8520abb1c599b", "score": "0.5237049", "text": "func posting(c *gin.Context) {\n\n\tidstr := c.PostForm(\"id\")\n\tid64, err := strconv.ParseInt(c.PostForm(\"id\"),10,32)\n\tvar id int = int(id64)\n\tif err != nil {\n\t\tc.String(400,\"Not valid JSON\")\n\t}\n\ttext := c.PostForm(\"text\")\n\t//validate positive number in id and length of text\n\tif (len(text) > 100 && id < 0) {\n\t\tc.String(400,\"Not valid JSON\")\n\t\treturn\n\t} else {\n\t\tvar X int = id % 2\n\n\t\tparam := idstr + text + strconv.Itoa(X)\n\t\tvar hash [16] byte\n\t\thash = md5.Sum([]byte(param))\n\t\tc.String(200, hex.EncodeToString(hash[:]))\n\t}\n}", "title": "" }, { "docid": "90a2682e532bbd254da4c017e142d8a4", "score": "0.52369547", "text": "func NewPostReqeust(urlRequest string, vals url.Values) (*request.Request, error) {\n var valsBuffer *bytes.Buffer\n if vals != nil {\n vals = url.Values{}\n }\n \n valsBuffer = bytes.NewBufferString(vals.Encode())\n \n req, err := http.NewRequest(\"Post\", urlRequest, valsBuffer)\n if err != nil {\n return nil, err\n }\n \n req.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n \n return request.NewRequest(req), nil\n}", "title": "" }, { "docid": "dec3689b7b06c7f74b9c10d4b3200f57", "score": "0.52274483", "text": "func (r *Request) Post(URL string, requestData map[string]string) error {\n\treturn r.collector.scrape(r.AbsoluteURL(URL), \"POST\", r.Depth+1, createFormReader(requestData), r.Ctx, nil, true)\n}", "title": "" }, { "docid": "842bfe6a7e92f75bad88aadff56bd969", "score": "0.52117395", "text": "func (r MockAPIRequest) Post(endpoint string, data interface{}) (*http.Response, error) {\n\treturn r.response()\n}", "title": "" }, { "docid": "5af15d6e45c640fab1c58d6f63fb2263", "score": "0.52081704", "text": "func (r RequestStruct) Post(url string, ro *grequests.RequestOptions) (*grequests.Response, error) {\n\treturn r.Req(\"POST\", url, ro)\n}", "title": "" }, { "docid": "a32cc0c83cdfd8fc9c2cc2605621c993", "score": "0.52035993", "text": "func CreateTest(r string) {\n\t//http.PostForm(r, url.Values{\"mail\": \"rom@gmail.com\", \"role_id\": 2, \"organizations\": []int{1, 2}, \"is_active\": true})\n}", "title": "" }, { "docid": "9e2f21a5218605f39fb4c15c56f45c3d", "score": "0.52022076", "text": "func executeRequestTest(t *testing.T, tt requestTest, ctx context.Context) (*httptest.ResponseRecorder, bool) {\n\tvar req []byte\n\tvar rr io.Reader\n\tif tt.request != nil {\n\t\tvar ok bool\n\t\treq, ok = tt.request.([]byte)\n\t\tif !ok {\n\t\t\tvar err error\n\t\t\treq, err = json.Marshal(tt.request)\n\t\t\tif err != nil {\n\t\t\t\tt.Logf(\"\\t\\tGot err : %+v\", err)\n\t\t\t\tt.Logf(\"\\t\\tEncode request failed.\")\n\t\t\t\treturn nil, false\n\t\t\t}\n\t\t}\n\t\trr = bytes.NewReader(req)\n\t}\n\n\tr := httptest.NewRequest(tt.method, tt.url, rr).WithContext(ctx)\n\n\tw := httptest.NewRecorder()\n\n\tr.Header.Set(\"Content-Type\", web.MIMEApplicationJSONCharsetUTF8)\n\tif tt.token.AccessToken != \"\" {\n\t\tr.Header.Set(\"Authorization\", tt.token.AuthorizationHeader())\n\t}\n\n\ta.ServeHTTP(w, r)\n\n\tif w.Code != tt.statusCode {\n\t\tt.Logf(\"\\t\\tRequest : %s\\n\", string(req))\n\t\tt.Logf(\"\\t\\tBody : %s\\n\", w.Body.String())\n\t\tt.Logf(\"\\t\\tShould receive a status code of %d for the response : %v\", tt.statusCode, w.Code)\n\t\treturn w, false\n\t}\n\n\tif tt.error != nil {\n\t\tvar actual weberror.ErrorResponse\n\t\tif err := json.Unmarshal(w.Body.Bytes(), &actual); err != nil {\n\t\t\tt.Logf(\"\\t\\tBody : %s\\n\", w.Body.String())\n\t\t\tt.Logf(\"\\t\\tGot error : %+v\", err)\n\t\t\tt.Logf(\"\\t\\tShould get the expected error.\")\n\t\t\treturn w, false\n\t\t}\n\n\t\tif diff := cmp.Diff(actual, tt.error); diff != \"\" {\n\t\t\tt.Logf(\"\\t\\tDiff : %s\\n\", diff)\n\t\t\tt.Logf(\"\\t\\tShould get the expected error.\")\n\t\t\treturn w, false\n\t\t}\n\t}\n\n\treturn w, true\n}", "title": "" }, { "docid": "c435ff9277673703df2ceed1a3f0e4a5", "score": "0.5201682", "text": "func fakeInit(w http.ResponseWriter, r *http.Request) {\n\tdefer traceTime(here())()\n\n\tvar e FakeInitRequest\n\terr := json.NewDecoder(r.Body).Decode(&e)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\t// TODO Read here the desciptor content\n\n\tTResult.Printf(\"Fake initialization done : %s\", e.Location)\n\tw.WriteHeader(http.StatusCreated)\n}", "title": "" }, { "docid": "183293ac1bff4bf4783dc303e53d6443", "score": "0.5199209", "text": "func testRequest(t *testing.T, ts *httptest.Server, method, path string, body io.Reader, auth string) (*http.Response, string) {\n\treq, err := http.NewRequest(method, ts.URL+path, body)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t\treturn nil, \"\"\n\t}\n\tif auth != \"\" {\n\t\treq.Header.Add(\"Authorization\", \"Bearer \"+auth)\n\t}\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t\treturn nil, \"\"\n\t}\n\n\trespBody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t\treturn nil, \"\"\n\t}\n\tdefer resp.Body.Close()\n\n\treturn resp, string(respBody)\n}", "title": "" }, { "docid": "183293ac1bff4bf4783dc303e53d6443", "score": "0.5199209", "text": "func testRequest(t *testing.T, ts *httptest.Server, method, path string, body io.Reader, auth string) (*http.Response, string) {\n\treq, err := http.NewRequest(method, ts.URL+path, body)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t\treturn nil, \"\"\n\t}\n\tif auth != \"\" {\n\t\treq.Header.Add(\"Authorization\", \"Bearer \"+auth)\n\t}\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t\treturn nil, \"\"\n\t}\n\n\trespBody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t\treturn nil, \"\"\n\t}\n\tdefer resp.Body.Close()\n\n\treturn resp, string(respBody)\n}", "title": "" }, { "docid": "8b5dbfb35b0cc6ea9be70bd6b4adc788", "score": "0.5190209", "text": "func (r *RequestBuilder) Post() (Obj, int, error) {\n\treturn r.genericObjRequest(\"POST\")\n}", "title": "" }, { "docid": "6f6208110fa27da537ce2d08d4687735", "score": "0.518341", "text": "func handleRequest(req *dorahttp.HTTPRequest) []byte {\n\tswitch req.Method {\n\tcase \"GET\":\n\t\treturn dorahttp.ResponseS(\"200\", \"OK\", \"text/html\", tempTest.Get())\n\tcase \"POST\":\n\t\ttempTest.Set(\"New Value\")\n\t\treturn dorahttp.ResponseSNOBody(\"200\", \"OK\")\n\t}\n\n\treturn dorahttp.ResponseSNOBody(\"400\", \"Bad Request\")\n}", "title": "" }, { "docid": "587bc14be693b802004fca94fe24f0d2", "score": "0.51769036", "text": "func Post(arg1 http.ResponseWriter, arg2 *http.Request) {\n\n\tdecoder := json.NewDecoder(arg2.Body)\n\n\tvar e DTO\n\terr := decoder.Decode(&e)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\targ1.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\tvar j processing.Job\n\t//Cast the ExampleSpecificDTO into a generic DTO interface\n\tj.DTO = e\n\t//Setting up the post-processing function hook\n\tj.Process = func(j processing.Job) {\n\n\t\tvar castback = j.DTO.(DTO)\n\n\t\tif IsPrime(castback.PrimeCandidate) {\n\t\t\t//If this is prime then lets send to kafka\n\t\t\tkafka.GetServiceBus().Produce([]byte(fmt.Sprintf(\"%d\", castback.PrimeCandidate)))\n\t\t}\n\t}\n\n\tprocessing.GetDispatcher().JobQueue <- j\n\n\targ1.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "4c9698c20ec42c94838ef0cc3f2ef448", "score": "0.5173042", "text": "func UberPost(client *http.Client, otp, url string, bodyType string, body io.Reader) (resp *http.Response, err error) {\n\tnewUrl := addOneTimePassword(url, otp)\n\tlog.Println(\"New POST: \", newUrl)\n\treturn client.Post(newUrl, bodyType, body)\n}", "title": "" }, { "docid": "e235c6b90e5343e5ca59edb669c4873f", "score": "0.51723945", "text": "func testRequest(t *testing.T, ts *httptest.Server, method, path string, body io.Reader) (*http.Response, string) {\n\treq, err := http.NewRequest(method, ts.URL+path, body)\n\trequire.NoError(t, err)\n\n\tresp, err := http.DefaultClient.Do(req)\n\trequire.NoError(t, err)\n\n\trespBody, err := ioutil.ReadAll(resp.Body)\n\trequire.NoError(t, err)\n\n\tdefer resp.Body.Close()\n\n\treturn resp, string(respBody)\n}", "title": "" }, { "docid": "57073c5b595de12a2e8c16855031a627", "score": "0.5166887", "text": "func (f *HandlerFuncTest) Request(method, url string, values url.Values) error {\n\tw := httptest.NewRecorder()\n\n\treq, err := f.request(method, url, values)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tf.Handler(w, req)\n\n\tf.body = w.Body.Bytes()\n\tf.code = w.Code\n\n\treturn nil\n}", "title": "" }, { "docid": "74314136c8c29c5e3f8ccaafbdccf92f", "score": "0.5161974", "text": "func (m *Medium) generateFormRequestData(cr clientRequest) ([]byte, string, error) {\n\tvar body []byte\n\tswitch d := cr.data.(type) {\n\tcase string:\n\t\tbody = []byte(d)\n\tcase []byte:\n\t\tbody = d\n\tdefault:\n\t\treturn nil, \"\", Error{\"Invalid data passed for form request\", defaultCode}\n\t}\n\treturn body, \"application/x-www-form-urlencoded\", nil\n}", "title": "" }, { "docid": "3fa653a75445143356dcfe4a0d48e73b", "score": "0.51584184", "text": "func (s *SlackAPI) postRequest(input interface{}, action string, output interface{}) {\n\tvar buffer bytes.Buffer\n\tparams := s.dataToParams(output)\n\twriter := multipart.NewWriter(&buffer)\n\n\tfor name, value := range params {\n\t\t/* Check if the parameter is referencing a file */\n\t\tisfile, fpath, fname := s.checkFileReference(value)\n\n\t\tif !isfile {\n\t\t\tfwriter, _ := writer.CreateFormField(name)\n\t\t\tif _, err := fwriter.Write([]byte(value)); err != nil {\n\t\t\t\tlog.Println(\"http post; create field;\", err)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\t/* Read referenced file and attach to the request */\n\t\tresource, err := os.Open(fpath)\n\t\tif err != nil {\n\t\t\tlog.Println(\"file open;\", err)\n\t\t\treturn\n\t\t}\n\n\t\tdefer func() {\n\t\t\tif err := resource.Close(); err != nil {\n\t\t\t\tlog.Println(\"http post; file close;\", err)\n\t\t\t}\n\t\t}()\n\n\t\tfwriter, _ := writer.CreateFormFile(name, fpath)\n\t\tif _, err := io.Copy(fwriter, resource); err != nil {\n\t\t\tlog.Println(\"http post; copy param;\", err)\n\t\t\tcontinue\n\t\t}\n\n\t\tfwriter, _ = writer.CreateFormField(\"filename\")\n\t\tif _, err := fwriter.Write([]byte(fname)); err != nil {\n\t\t\tlog.Println(\"http post; write param;\", err)\n\t\t\tcontinue\n\t\t}\n\t}\n\n\tif err := writer.Close(); err != nil {\n\t\tlog.Println(\"http post; write close;\", err)\n\t\treturn\n\t}\n\n\t// Now that you have a form, you can submit it to your handler.\n\treq, err := s.httpRequest(\"POST\", &buffer, action, nil)\n\n\tif err != nil {\n\t\tlog.Println(\"http post;\", err)\n\t\treturn\n\t}\n\n\treq.Header.Set(\"Content-Type\", writer.FormDataContentType())\n\n\ts.printCurlCommand(req, params)\n\ts.executeRequest(req, &input)\n}", "title": "" }, { "docid": "74324d80c9ec73555a0d80602c9b678d", "score": "0.5152344", "text": "func TestPostPayloadRandom(t *testing.T) {\n\tgateway := New()\n\tgateway.setup()\n\n\ttests := []struct {\n\t\turl string\n\t}{\n\t\t{\n\t\t\turl: \"/tx/send\",\n\t\t},\n\t}\n\n\tfor _, tc := range tests {\n\t\tt.Run(tc.url, func(t *testing.T) {\n\t\t\tf := func(random1 [][]byte, random2 [][]byte) bool {\n\n\t\t\t\tvar payload []byte\n\t\t\t\tfor i := range random1 {\n\t\t\t\t\tpayload = append(payload, random1[i]...)\n\t\t\t\t}\n\n\t\t\t\tfor i := range random2 {\n\t\t\t\t\tpayload = append(payload, random2[i]...)\n\t\t\t\t}\n\n\t\t\t\trequest := httptest.NewRequest(\"POST\", \"http://localhost\"+tc.url, bytes.NewReader(payload))\n\n\t\t\t\tres, err := serve(gateway.router, request)\n\n\t\t\t\tassert.NoError(t, err)\n\n\t\t\t\tassert.NotNil(t, res)\n\t\t\t\tassert.NotEmpty(t, res.StatusCode)\n\n\t\t\t\treturn true\n\t\t\t}\n\n\t\t\tif err := quick.Check(f, &quick.Config{\n\t\t\t\tMaxCountScale: 10,\n\t\t\t}); err != nil {\n\t\t\t\tt.Error(err)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "ec2f5dc4b15e9b38f65d8f7b8e929d8e", "score": "0.51510906", "text": "func doPost(reqData string) *RPCResponse {\n\tendpoint := randomEndpoint()\n\trequest, err := http.NewRequest(\"POST\", endpoint, strings.NewReader(reqData))\n\tif err != nil {\n\t\tlog.Error(\"New request error, please check.\")\n\t\tlog.Error(\"[POST \" + endpoint + \"] \" + reqData)\n\t\tlog.Error(fmt.Sprintf(\"%v\", err))\n\t\tos.Exit(2)\n\t}\n\tresponse, err := client.Do(request)\n\tif err != nil {\n\t\tlog.Error(\"Send request error, please check.\")\n\t\tlog.Error(\"[POST \" + endpoint + \"] \" + reqData)\n\t\tlog.Error(fmt.Sprintf(\"%v\", err))\n\t\tos.Exit(2)\n\t}\n\tdefer response.Body.Close()\n\tblob, _ := ioutil.ReadAll(response.Body)\n\trecv := new(RPCResponse)\n\tjson.Unmarshal(blob, recv)\n\tif recv.Error != nil {\n\t\tlog.Error(\"Get response, but has error.\")\n\t\tlog.Error(\"[POST \" + endpoint + \"] \" + reqData)\n\t\tlog.Error(fmt.Sprintf(\"%v\", err))\n\t\tos.Exit(2)\n\t}\n\treturn recv\n}", "title": "" }, { "docid": "4a33e1d4095e4b7aa9503b8f9ea2c6a3", "score": "0.51510656", "text": "func (this *CommonController) Post() {\n\tre := this.Ctx.Input.Request\n\tbeego.Info(\"request method = post\")\n\n\tbeego.Info(\"request url=\" + re.URL.String())\n\tbeego.Info(\"body len=\", fmt.Sprintf(\"%d\", re.ContentLength))\n body := this.Ctx.Input.RequestBody\n//\tbody := this.Ctx.Input.Request.Body\n\tbeego.Info(\"body=\" + string(body))\n\tbuf := new(bytes.Buffer)\n\tbuf.Write(body)\n\n\turl := ProxyUrl(re)\n\tif url == \"\" {\n\t\tbeego.Info(\"error request\")\n\t\treturn\n\t}\n\tbeego.Info(\"new url=\" + url)\n\n\tclient := NewClient()\n\tresp, err := client.Post(url, \"application/x-www-form-urlencoded\", buf)\n/*\t\n\trequest, err := http.NewRequest(\"post\", url, buf)\n\tif err != nil {\n\t\tbeego.Info(err.Error())\n\t\tthis.Ctx.ResponseWriter.Write([]byte(err.Error() + \"\\n\"))\n\t\treturn\n\t}\n\trequest.Header.Set(\"Content-Type\",re.Header.Get(\"Content-Type\"))\n*/\n //request.Write(os.Stdout)\n\t/*\n buf3 := new(bytes.Buffer)\n\tbuf3.ReadFrom(request.Body)\n\tbeego.Info(buf3.String())\n\t*/\n\n//\tresp, err := client.Do(request)\n\tif err != nil {\n\t\tbeego.Info(err.Error())\n\t\tthis.Ctx.ResponseWriter.Write([]byte(err.Error() + \"\\n\"))\n\t\treturn\n\t}\n\n\tbeego.Info(\"reques head: \")\n//\tresp.Header.Write(os.Stdout)\n\n\tbuf2 := new(bytes.Buffer)\n\tbuf2.ReadFrom(resp.Body)\n\tbeego.Info(\"len=\", len(buf2.Bytes()))\n\tbeego.Info(\"response=\", string(buf2.Bytes()))\n\tthis.Ctx.ResponseWriter.Write(buf2.Bytes())\n}", "title": "" }, { "docid": "3bd71f46fbadac19accc805b21c55b9c", "score": "0.5151037", "text": "func newRequest(data interface{}, i *InOut) *request {\n\tvar c chan *Response\n\tif i.WantResponse == WantResponse {\n\t\tc = make(chan *Response)\n\t}\n\treturn &request{\n\t\tc: c,\n\t\tdata: data,\n\t\tp: i.Processor,\n\t}\n}", "title": "" }, { "docid": "74608af22182d5167259378191812bba", "score": "0.5141165", "text": "func createRequest(url string, method string, body io.Reader) (*http.Request, *httptest.ResponseRecorder, error) {\n\trequest, err := http.NewRequest(method, url, body)\n\tresponse := httptest.NewRecorder()\n\treturn request, response, err\n}", "title": "" }, { "docid": "875d8062a18598c562d73cfdf33a6868", "score": "0.5134374", "text": "func makePostFormReq(url string,body url.Values) ([]byte, error) {\n\tfmt.Printf(\"body %v \\n\",body.Encode())\n\treq, err := http.NewRequest(\"POST\",url,strings.NewReader(body.Encode()))\n\treq.Header.Add(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\treq.Header.Add(\"Content-Length\", strconv.Itoa(len(body.Encode())))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp, err := doReq(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, err\n}", "title": "" }, { "docid": "d4ea5142315faa30a7d603cae3f1a2fc", "score": "0.5132421", "text": "func (g *Gateway) POST(handler Handler, preprocessors ...Processor) {\n\tg.Handle(\"POST\", handler, preprocessors...)\n}", "title": "" }, { "docid": "f2e423fe307bc483690c9f45bd8ed47e", "score": "0.5123536", "text": "func TestNewRequest(t *testing.T) {\n\tclient := NewClient(nil)\n\tmethod := http.MethodGet\n\tpath := \"/test\"\n\tbody := struct {\n\t\tTestName string `json:\"name\"`\n\t\tPackageName string `json:\"pkg\"`\n\t}{\n\t\tTestName: \"TestNewRequest\",\n\t\tPackageName: \"github.com/billglover/transferwise\",\n\t}\n\tbodyJSON := `{\"name\":\"TestNewRequest\",\"pkg\":\"github.com/billglover/transferwise\"}`\n\n\tt.Run(\"invalid path\", func(st *testing.T) {\n\t\t_, err := client.NewRequest(method, path+string(byte(0x00)), body)\n\t\tif err == nil {\n\t\t\tst.Error(\"expected an error: got none\")\n\t\t}\n\t})\n\n\tt.Run(\"invalid body\", func(st *testing.T) {\n\t\tbody := struct {\n\t\t\tFunc func() error\n\t\t}{\n\t\t\tFunc: func() error { return nil },\n\t\t}\n\t\t_, err := client.NewRequest(method, path, body)\n\t\tif err == nil {\n\t\t\tst.Error(\"expected an error: got none\")\n\t\t}\n\t})\n\n\tt.Run(\"invalid method\", func(st *testing.T) {\n\t\t_, err := client.NewRequest(string(byte(0x00)), path, body)\n\t\tif err == nil {\n\t\t\tst.Error(\"expected an error: got none\")\n\t\t}\n\t})\n\n\tt.Run(\"valid request\", func(st *testing.T) {\n\t\treq, err := client.NewRequest(method, path, body)\n\n\t\tif err != nil {\n\t\t\tst.Fatalf(\"unexpected error: got %v\", err)\n\t\t}\n\n\t\tif got, want := req.URL.String(), SandboxURL+path; got != want {\n\t\t\tst.Errorf(\"invalid path: got %s, want %s\", got, want)\n\t\t}\n\n\t\tif got, want := req.UserAgent(), userAgent; got != want {\n\t\t\tst.Errorf(\"invalid user-agent: got %s, want %s\", got, want)\n\t\t}\n\n\t\tb, err := ioutil.ReadAll(req.Body)\n\t\tdefer req.Body.Close()\n\t\tif err != nil {\n\t\t\tst.Fatalf(\"unexpected error: got %v\", err)\n\t\t}\n\n\t\tif got, want := strings.TrimSpace(string(b)), bodyJSON; got != want {\n\t\t\tst.Errorf(\"unexpected body:\\n\\tgot %s\\n\\twant %s\", got, want)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "8c0a6dcf6088ed4681195d761d7bcea3", "score": "0.5118834", "text": "func TestPostmanPostRequests(t *testing.T) {\n\n\ttests := []HTTPTest{\n\t\t{\n\t\t\tName: \"Post Tester\",\n\t\t\tURL: \"http://localhost:8080/post\",\n\t\t\tMethod: \"POST\",\n\t\t\tBody: \"\",\n\t\t\tExpectedStatus: 200,\n\t\t\tExpectedContains: nil,\n\t\t}}\n\n\tfor _, v := range tests {\n\t\tt.Run(v.Name, func(t *testing.T) {\n\t\t\trun, err := RunHTTPTest(v)\n\t\t\tassert.Nil(t, err)\n\t\t\tbody, err := ioutil.ReadAll(run.Body)\n\t\t\tassert.Nil(t, err)\n\t\t\tassert.Equal(t, v.ExpectedStatus, run.StatusCode)\n\t\t\tif v.ExpectedContains != nil {\n\t\t\t\tstringBody := string(body)\n\t\t\t\tfor _, c := range v.ExpectedContains {\n\t\t\t\t\tassert.Contains(t, stringBody, c)\n\t\t\t\t}\n\t\t\t}\n\t\t\tt.Logf(\"Test %v got: %v\\n\", v.Name, string(body))\n\t\t})\n\t}\n\n}", "title": "" }, { "docid": "e97f21cae2155bfcceabfbb164fb88f7", "score": "0.51169455", "text": "func (c *Client) Post(url string, payload Serializable, processor HttpRequestProcessor) (*http.Response, error) {\n return c.MakeRequest(POST, url, payload, processor)\n}", "title": "" }, { "docid": "dc7a581f2bc7fb1a05acbc26c853cd25", "score": "0.511537", "text": "func makePost(uri string, data interface{}) bool {\n\tb, err := json.Marshal(data)\n\tif err == nil {\n\t\tres, err := http.Post(uri, \"application/json\", bytes.NewBuffer(b))\n\t\treturn err == nil && res.StatusCode == http.StatusOK\n\t}\n\treturn false\n}", "title": "" }, { "docid": "1a0c7642ffc1d0dca289558443bfc627", "score": "0.51140517", "text": "func MakeDataRequest(url string, initData map[string]interface{}) (DataResult, error) {\n\tresult := DataResult{}\n\n\tvals := toVals(initData)\n\tclient := http.DefaultClient\n\n\tresponse, err := client.PostForm(url, vals)\n\tif err != nil {\n\t\treturn result, err\n\t}\n\n\tbytes, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\treturn result, err\n\t}\n\tresult.String = string(bytes)\n\terr = json.Unmarshal(bytes, &result.Map)\n\treturn result, err\n}", "title": "" }, { "docid": "374183b9244d76b57627d05c1efc35e3", "score": "0.51097643", "text": "func (s *Wire) PostRequest(url string, payload interface{}) (req *http.Request, err error) {\n return s.NewRequest(\"POST\", url, payload)\n}", "title": "" }, { "docid": "aab1b0c2a9d1a61c087f9a24a47dadeb", "score": "0.51077193", "text": "func assertPostForm(t *testing.T, expected map[string]string, req *http.Request) {\n\treq.ParseForm() // parses request Body to put url.Values in r.Form/r.PostForm\n\texpectedValues := url.Values{}\n\tfor key, value := range expected {\n\t\texpectedValues.Add(key, value)\n\t}\n\tif !reflect.DeepEqual(expectedValues, req.PostForm) {\n\t\tt.Errorf(\"expected parameters %v, got %v\", expected, req.Form)\n\t}\n}", "title": "" }, { "docid": "92dcc490f8d7175b3b0ede043320c2ef", "score": "0.51059604", "text": "func responder(r *http.Request) writerFunc {\n\tif err := r.ParseForm(); err == nil && r.Form.Get(\"go-get\") == \"1\" {\n\t\treturn gogeter\n\t}\n\treturn jsonifier\n}", "title": "" }, { "docid": "410c2eb92f2eca7792719bb8f8fe88c4", "score": "0.51013565", "text": "func (ht *handlerTester) Request(method string, url string, params url.Values) *httptest.ResponseRecorder {\n\treq, err := http.NewRequest(method, url, strings.NewReader(params.Encode()))\n\tif err != nil {\n\t\tht.t.Errorf(\"%v\", err)\n\t}\n\tif params != nil {\n\t\treq.Header.Set(\n\t\t\t\"Content-Type\",\n\t\t\t\"application/x-www-form-urlencoded; param=value\",\n\t\t)\n\t}\n\tw := httptest.NewRecorder()\n\tht.h.ServeHTTP(w, req)\n\treturn w\n}", "title": "" } ]
dad96993f8bcf0f4aee97bc2c4e0dce8
syncMempools blocks until all nodes have identical mempools.
[ { "docid": "e18c265796ab7a56d187aa03897e5447", "score": "0.8236097", "text": "func syncMempools(nodes []*coinharness.Harness) error {\n\tpoolsMatch := false\n\n\tfor !poolsMatch {\n\tretry:\n\t\tfirstPool, err := nodes[0].NodeRPCClient().(*rpcclient.Client).GetRawMempool()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// If all nodes have an identical mempool with respect to the\n\t\t// first node, then we're done. Otherwise, drop back to the top\n\t\t// of the loop and retry after a short wait period.\n\t\tfor _, node := range nodes[1:] {\n\t\t\tnodePool, err := node.NodeRPCClient().(*rpcclient.Client).GetRawMempool()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif !reflect.DeepEqual(firstPool, nodePool) {\n\t\t\t\ttime.Sleep(time.Millisecond * 100)\n\t\t\t\tgoto retry\n\t\t\t}\n\t\t}\n\n\t\tpoolsMatch = true\n\t}\n\n\treturn nil\n}", "title": "" } ]
[ { "docid": "69fb20dbe9f1af742851ebd44b812ad7", "score": "0.58888125", "text": "func (c *Controller) syncNodes(nodeList []bcv1.BitcoinNetworkNode, secretName string, secretNamespace string) {\n\t// We create a hash map that only contains the IP addresses of the\n\t// nodes which are ready\n\treadyNodes := make(map[string]struct{})\n\tfor _, node := range nodeList {\n\t\tif node.Ready {\n\t\t\treadyNodes[node.IP] = struct{}{}\n\t\t}\n\t}\n\t// Create a configuration template. We make a copy\n\t// of the default configuration first which will\n\t// give us default credentials and the correct port\n\tconfig := c.rpcClient.GetConfig()\n\t// get credentials\n\tuser, password, err := secrets.CredentialsForSecret(secretName, secretNamespace, c.clientset)\n\tif err != nil {\n\t\tklog.Infof(\"Could not get credentials, using defaults\")\n\t} else {\n\t\tconfig.RPCUser = user\n\t\tconfig.RPCPassword = password\n\t}\n\t// We now go throught the list node by node\n\tfor nodeIP := range readyNodes {\n\t\tconfig.ServerIP = nodeIP\n\t\tc.connectNode(&config, readyNodes)\n\t}\n}", "title": "" }, { "docid": "8c6471567c0b8aa9111c0cd94ba589f7", "score": "0.5856366", "text": "func syncBlocks(nodes []*coinharness.Harness) error {\n\tblocksMatch := false\n\n\tfor !blocksMatch {\n\tretry:\n\t\tblockHeights := make(map[int64]struct{})\n\n\t\tfor _, node := range nodes {\n\t\t\tblockHeight, err := node.NodeRPCClient().(*rpcclient.Client).GetBlockCount()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tblockHeights[blockHeight] = struct{}{}\n\t\t\tif len(blockHeights) > 1 {\n\t\t\t\ttime.Sleep(time.Millisecond * 100)\n\t\t\t\tgoto retry\n\t\t\t}\n\t\t}\n\n\t\tblocksMatch = true\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3a9cdea1d46b76ba18c7b833e7c315f8", "score": "0.57781434", "text": "func (cluster *mongoCluster) syncServers() {\n\tselect {\n\tcase cluster.sync <- true:\n\tdefault:\n\t}\n}", "title": "" }, { "docid": "0e220e416a7705c090f12dfe878eb87f", "score": "0.5768732", "text": "func (m InkMiner) maintainMinerConnections() {\n\tfor {\n\t\tif connectedMiners.GetConnectionCount() < m.settings.MinNumMinerConnections {\n\t\t\toutLog.Println(\"Asking server for more miners...\")\n\t\t\tm.getNodesFromServer()\n\t\t}\n\t\ttime.Sleep(time.Duration(m.settings.HeartBeat) * time.Millisecond)\n\t}\n}", "title": "" }, { "docid": "4d12b4d7eaaf855fe16f8a1c13987376", "score": "0.5655486", "text": "func waitTillSync(cst1, cst2 *consensusSetTester, t *testing.T) {\n\t// blockchains should now match\n\tfor i := 0; i < 50; i++ {\n\t\tif cst1.cs.dbCurrentBlockID() != cst2.cs.dbCurrentBlockID() {\n\t\t\ttime.Sleep(250 * time.Millisecond)\n\t\t}\n\t}\n\t// log.Printf(\"cst1 %d, cst2 %d\", cst1.cs.dbBlockHeight(), cst2.cs.dbBlockHeight())\n\n\tif cst1.cs.dbCurrentBlockID() != cst2.cs.dbCurrentBlockID() {\n\t\tt.Fatal(\"Synchronize failed\")\n\t}\n}", "title": "" }, { "docid": "d69b62abcba68367ea9dc7e5503fa248", "score": "0.5643462", "text": "func TestSynchronize(t *testing.T) {\n\tif testing.Short() {\n\t\tt.SkipNow()\n\t}\n\n\tcst1, err := createConsensusSetTester(\"TestSynchronize1\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer cst1.closeCst()\n\tcst2, err := createConsensusSetTester(\"TestSynchronize2\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer cst2.closeCst()\n\n\t// mine on cst2 until it is above cst1\n\tfor cst1.cs.dbBlockHeight() >= cst2.cs.dbBlockHeight() {\n\t\tb, _ := cst2.miner.FindBlock()\n\t\terr = cst2.cs.AcceptBlock(b)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t}\n\n\t// connect gateways, triggering a Synchronize\n\terr = cst1.gateway.Connect(cst2.gateway.Address())\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// blockchains should now match\n\tfor cst1.cs.dbCurrentBlockID() != cst2.cs.dbCurrentBlockID() {\n\t\ttime.Sleep(10 * time.Millisecond)\n\t}\n\n\t// Mine on cst2 until it is more than 'MaxCatchUpBlocks' ahead of cst2.\n\t// NOTE: we have to disconnect prior to this, otherwise cst2 will relay\n\t// blocks to cst1.\n\terr = cst1.gateway.Disconnect(cst2.gateway.Address())\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\t// TODO: more than 30 causes a race condition!\n\tfor cst2.cs.dbBlockHeight() < cst1.cs.dbBlockHeight()+20 {\n\t\tb, _ := cst2.miner.FindBlock()\n\t\terr = cst2.cs.AcceptBlock(b)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t}\n\t// reconnect\n\terr = cst1.gateway.Connect(cst2.gateway.Address())\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// block heights should now match\n\tfor cst1.cs.dbBlockHeight() != cst2.cs.dbBlockHeight() {\n\t\ttime.Sleep(250 * time.Millisecond)\n\t}\n\n\t/*\n\t\t// extend cst2 with a \"bad\" (old) block, and synchronize. cst1 should\n\t\t// reject the bad block.\n\t\tlockID := cst2.cs.mu.Lock()\n\t\tcst2.cs.db.pushPath(cst2.cs.db.getPath(0))\n\t\tcst2.cs.mu.Unlock(lockID)\n\t\tif cst1.cs.db.pathHeight() == cst2.cs.db.pathHeight() {\n\t\t\tt.Fatal(\"cst1 did not reject bad block\")\n\t\t}\n\t*/\n}", "title": "" }, { "docid": "aa576e680495e4aae894be925c9ea669", "score": "0.5640375", "text": "func TestSynchronize(t *testing.T) {\n\tif testing.Short() {\n\t\tt.SkipNow()\n\t}\n\n\tcst1, err := createConsensusSetTester(\"TestSynchronize1\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer cst1.closeCst()\n\tcst2, err := createConsensusSetTester(\"TestSynchronize2\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer cst2.closeCst()\n\n\t// mine on cst2 until it is above cst1\n\tfor cst1.cs.Height() >= cst2.cs.Height() {\n\t\tb, _ := cst2.miner.FindBlock()\n\t\terr = cst2.cs.AcceptBlock(b)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t}\n\n\t// connect gateways, triggering a Synchronize\n\terr = cst1.gateway.Connect(cst2.gateway.Address())\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// blockchains should now match\n\tfor cst1.cs.currentBlockID() != cst2.cs.currentBlockID() {\n\t\ttime.Sleep(10 * time.Millisecond)\n\t}\n\n\t// Mine on cst2 until it is more than 'MaxCatchUpBlocks' ahead of cst2.\n\t// NOTE: we have to disconnect prior to this, otherwise cst2 will relay\n\t// blocks to cst1.\n\terr = cst1.gateway.Disconnect(cst2.gateway.Address())\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\t// TODO: more than 30 causes a race condition!\n\tfor cst2.cs.Height() < cst1.cs.Height()+20 {\n\t\tb, _ := cst2.miner.FindBlock()\n\t\terr = cst2.cs.AcceptBlock(b)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t}\n\t// reconnect\n\terr = cst1.gateway.Connect(cst2.gateway.Address())\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// block heights should now match\n\tfor cst1.cs.Height() != cst2.cs.Height() {\n\t\ttime.Sleep(10 * time.Millisecond)\n\t}\n\n\t// extend cst2 with a \"bad\" (old) block, and synchronize. cst1 should\n\t// reject the bad block.\n\tlockID := cst2.cs.mu.Lock()\n\tcst2.cs.db.pushPath(cst2.cs.db.getPath(0))\n\tcst2.cs.mu.Unlock(lockID)\n\tif cst1.cs.db.pathHeight() == cst2.cs.db.pathHeight() {\n\t\tt.Fatal(\"cst1 did not reject bad block\")\n\t}\n}", "title": "" }, { "docid": "018753f1cfaa92c222b34c1269b00d48", "score": "0.55895007", "text": "func (w *Worker) Sync() {\n\tvar result nm.MonoidResults\n\n\tif err := w.RPC.Call(\"Danse.SyncRequest\", true, &result); err != nil {\n\t\tpanic(err)\n\t}\n\n\tempty := true\n\n\tfor i := 0; i < len(result); i++ {\n\t\tif result[i] != 0 {\n\t\t\tempty = false\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif !empty {\n\t\tw.lastSync = time.Now()\n\n\t\tif debug {\n\t\t\tlog.Println(\"Got sync from\", w.Address, result)\n\t\t}\n\n\t\tw.Results <- result\n\t}\n}", "title": "" }, { "docid": "fab4aeb54f948379e56ef60aedf152c2", "score": "0.55490094", "text": "func walletSvrsSync(wsm *walletSvrManager, multiSigScripts []models.User) error {\n\tif wsm.serversLen == 1 {\n\t\treturn nil\n\t}\n\n\t// Check for connectivity and if unlocked.\n\tfor i := range wsm.servers {\n\t\tif wsm.servers[i] == nil {\n\t\t\tcontinue\n\t\t}\n\t\terr := checkIfWalletConnected(wsm.servers[i])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failure on startup sync: %s\",\n\t\t\t\terr.Error())\n\t\t}\n\t}\n\n\ttype ScriptHeight struct {\n\t\tScript []byte\n\t\tHeight int\n\t}\n\n\tfor i := range wsm.servers {\n\t\tif wsm.servers[i] == nil {\n\t\t\tcontinue\n\t\t}\n\t\t// Set watched address index to MaxUsers so all generated ticket\n\t\t// addresses show as 'ismine'.\n\t\terr := wsm.servers[i].AccountSyncAddressIndex(defaultAccountName,\n\t\t\tudb.ExternalBranch, MaxUsers)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Fetch the redeem scripts from each server.\n\tredeemScriptsPerServer := make([]map[chainhash.Hash]*ScriptHeight,\n\t\twsm.serversLen)\n\tallRedeemScripts := make(map[chainhash.Hash]*ScriptHeight)\n\n\t// add all scripts from db\n\tfor _, v := range multiSigScripts {\n\t\tbyteScript, err := hex.DecodeString(v.MultiSigScript)\n\t\tif err != nil {\n\t\t\tlog.Warnf(\"skipping script %s due to err %v\", v.MultiSigScript, err)\n\t\t\tcontinue\n\t\t}\n\t\tallRedeemScripts[chainhash.HashH(byteScript)] = &ScriptHeight{byteScript, int(v.HeightRegistered)}\n\t}\n\t// Go through each server and see who is synced to the most redeemscripts.\n\tlog.Info(\"Getting importscript information from wallets\")\n\tfor i := range wsm.servers {\n\t\tif wsm.servers[i] == nil {\n\t\t\tcontinue\n\t\t}\n\t\tredeemScripts, err := wsm.servers[i].ListScripts()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tredeemScriptsPerServer[i] = make(map[chainhash.Hash]*ScriptHeight)\n\t\tfor j := range redeemScripts {\n\t\t\tredeemScriptsPerServer[i][chainhash.HashH(redeemScripts[j])] = &ScriptHeight{redeemScripts[j], 0}\n\t\t\t_, ok := allRedeemScripts[chainhash.HashH(redeemScripts[j])]\n\t\t\tif !ok {\n\t\t\t\tallRedeemScripts[chainhash.HashH(redeemScripts[j])] = &ScriptHeight{redeemScripts[j], 0}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Synchronize the address indexes if needed, then synchronize the\n\t// redeemscripts. Ignore the errors when importing scripts and\n\t// assume it'll just skip reimportation if it already has it.\n\tlog.Info(\"Syncing wallets' redeem scripts\")\n\tdesynced := false\n\tfor i := range wsm.servers {\n\t\tif wsm.servers[i] == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Sync redeemscripts.\n\t\tfor k, v := range allRedeemScripts {\n\t\t\t_, ok := redeemScriptsPerServer[i][k]\n\t\t\tif !ok {\n\t\t\t\tlog.Infof(\"RedeemScript from DB not found on server %v. importscript for %x at height %v\", i, v.Script, v.Height)\n\t\t\t\terr := wsm.servers[i].ImportScriptRescanFrom(v.Script, true, v.Height)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tdesynced = true\n\t\t\t}\n\t\t}\n\t}\n\n\t// If we had to sync then we might be missing some tickets.\n\t// Scan for the tickets now and try to import any that another wallet may\n\t// be missing.\n\t// TODO we should block until the rescans triggered by importing the scripts\n\t// have been completed.\n\tif desynced {\n\t\tlog.Infof(\"desynced had been detected, now attempting to \" +\n\t\t\t\"resync all tickets acrosss each wallet.\")\n\t\tticketsPerServer := make([]map[chainhash.Hash]struct{},\n\t\t\twsm.serversLen)\n\t\tallTickets := make(map[chainhash.Hash]struct{})\n\n\t\t// Get the tickets and popular the maps.\n\t\tfor i := range wsm.servers {\n\t\t\tif wsm.servers[i] == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tticketsServer, err := wsm.servers[i].GetTickets(true)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tticketsPerServer[i] = make(map[chainhash.Hash]struct{})\n\t\t\tfor j := range ticketsServer {\n\t\t\t\tticketHash := ticketsServer[j]\n\t\t\t\tticketsPerServer[i][*ticketHash] = struct{}{}\n\t\t\t\tallTickets[*ticketHash] = struct{}{}\n\t\t\t}\n\t\t}\n\n\t\t// Look up the tickets and insert them into the servers\n\t\t// that are missing them.\n\t\t// TODO Don't look up more than once (cache)\n\t\tfor i := range wsm.servers {\n\t\t\tif wsm.servers[i] == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfor ticketHash := range allTickets {\n\t\t\t\t_, ok := ticketsPerServer[i][ticketHash]\n\t\t\t\tif !ok {\n\t\t\t\t\th := ticketHash\n\t\t\t\t\tlog.Infof(\"wallet %v: is missing ticket %v\", i, h)\n\t\t\t\t\ttx, err := wsm.fetchTransaction(&h)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\n\t\t\t\t\terr = wsm.servers[i].AddTicket(tx)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "50fb832af146588f640d5c160385a145", "score": "0.5537306", "text": "func (cluster *mongoCluster) syncServersLoop() {\n\tfor {\n\t\tdebugf(\"SYNC Cluster %p is starting a sync loop iteration.\", cluster)\n\n\t\tcluster.Lock()\n\t\tif cluster.references == 0 {\n\t\t\tcluster.Unlock()\n\t\t\tbreak\n\t\t}\n\t\tcluster.references++ // Keep alive while syncing.\n\t\tdirect := cluster.dialInfo.Direct\n\t\tcluster.Unlock()\n\n\t\tcluster.syncServersIteration(direct)\n\n\t\t// We just synchronized, so consume any outstanding requests.\n\t\tselect {\n\t\tcase <-cluster.sync:\n\t\tdefault:\n\t\t}\n\n\t\tcluster.Release()\n\n\t\t// Hold off before allowing another sync. No point in\n\t\t// burning CPU looking for down servers.\n\t\tif !cluster.dialInfo.FailFast {\n\t\t\ttime.Sleep(syncShortDelay)\n\t\t}\n\n\t\tcluster.Lock()\n\t\tif cluster.references == 0 {\n\t\t\tcluster.Unlock()\n\t\t\tbreak\n\t\t}\n\t\tcluster.syncCount++\n\t\t// Poke all waiters so they have a chance to timeout or\n\t\t// restart syncing if they wish to.\n\t\tcluster.serverSynced.Broadcast()\n\t\t// Check if we have to restart immediately either way.\n\t\trestart := !direct && cluster.masters.Empty() || cluster.servers.Empty()\n\t\tcluster.Unlock()\n\n\t\tif restart {\n\t\t\tlog(\"SYNC No masters found. Will synchronize again.\")\n\t\t\ttime.Sleep(syncShortDelay)\n\t\t\tcontinue\n\t\t}\n\n\t\tdebugf(\"SYNC Cluster %p waiting for next requested or scheduled sync.\", cluster)\n\n\t\t// Hold off until somebody explicitly requests a synchronization\n\t\t// or it's time to check for a cluster topology change again.\n\t\tselect {\n\t\tcase <-cluster.sync:\n\t\tcase <-time.After(syncServersDelay):\n\t\t}\n\t}\n\tdebugf(\"SYNC Cluster %p is stopping its sync loop.\", cluster)\n}", "title": "" }, { "docid": "35b6d7b905121b795de6fdb5c92905d9", "score": "0.55215985", "text": "func (pm *ProtocolManager) syncer() {\n\t// Start and ensure cleanup of sync mechanisms\n\t//pm.fetcher.Start()\n\t//defer pm.fetcher.Stop()\n\tdefer pm.downloader.Terminate()\n\n\t// Wait for different events to fire synchronisation operations\n\t//forceSync := time.Tick(forceSyncCycle)\n\tfor {\n\t\tselect {\n\t\tcase <-pm.newPeerCh:\n\t\t\t/*\t\t\t// Make sure we have peers to select from, then sync\n\t\t\t\t\t\tif pm.peers.Len() < minDesiredPeerCount {\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t\tgo pm.synchronise(pm.peers.BestPeer())\n\t\t\t*/\n\t\t/*case <-forceSync:\n\t\t// Force a sync even if not enough peers are present\n\t\tgo pm.synchronise(pm.peers.BestPeer())\n\t\t*/\n\t\tcase <-pm.noMorePeers:\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "10352e30d0b8744c95ecca988d8e3e4a", "score": "0.5448249", "text": "func (mpi *mempoolImpl) broadcast(m *pb.Message) {\n\tfor id := range mpi.peerMgr.Peers() {\n\t\tif id == mpi.localID {\n\t\t\tcontinue\n\t\t}\n\t\tgo func(id uint64) {\n\t\t\tif err := mpi.peerMgr.AsyncSend(id, m); err != nil {\n\t\t\t\tmpi.logger.Debugf(\"Send tx slice to peer %d failed, err: %s\", id, err.Error())\n\t\t\t}\n\t\t}(id)\n\t}\n}", "title": "" }, { "docid": "a926446414a8485e58aa898d8d421b99", "score": "0.5437609", "text": "func (w *WorkGenerator) SendMultiple(RPC rpc.Client, RPCWork rpc.Client, a *wallet.Account, destinations []wallet.SendDestination) (hashes []rpc.BlockHash, err error) {\r\n\tw.sendMutex.Lock()\r\n\tdefer func() {\r\n\t\tw.workMutex.Lock()\r\n\t\tdefer w.workMutex.Unlock()\r\n\t\tw.work = make(map[[32]byte][8]byte)\r\n\t\tw.activeTasks = make(map[[32]byte]WorkRequest)\r\n\t\tw.sendMutex.Unlock()\r\n\t}()\r\n\r\n\tblocks, err := a.SendBlocks(destinations)\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\t_, networkCurrent, _, _, _, _, err := RPC.ActiveDifficulty()\r\n\tif err != nil {\r\n\t\treturn\r\n\t}\r\n\tvar target [8]byte\r\n\tcopy(target[:], networkCurrent)\r\n\r\n\tfor i := range blocks {\r\n\t\tif len(blocks[i].Previous) != 32 {\r\n\t\t\treturn nil, stacktrace.NewError(\"invalid previous length\")\r\n\t\t}\r\n\t\tvar previous [32]byte\r\n\t\tcopy(previous[:], blocks[i].Previous)\r\n\t\tw.requestWork(previous, target)\r\n\t}\r\n\r\n\ttimeout := time.NewTimer(15 * time.Second)\r\n\tworkDelivered := w.workDelivered.Subscribe(event.AtLeastOnceGuarantee)\r\n\tdefer w.workDelivered.Unsubscribe(workDelivered)\r\n\tfor {\r\n\t\tdone := false\r\n\t\tselect {\r\n\t\tcase <-timeout.C:\r\n\t\t\tdone = true\r\n\t\tcase <-workDelivered:\r\n\t\t\tfunc() {\r\n\t\t\t\tw.workMutex.RLock()\r\n\t\t\t\tdefer w.workMutex.RUnlock()\r\n\t\t\t\tif len(w.activeTasks) == 0 {\r\n\t\t\t\t\t// surprisingly, everyone got their work done before the timeout!\r\n\t\t\t\t\tdone = true\r\n\t\t\t\t}\r\n\t\t\t}()\r\n\r\n\t\t}\r\n\t\tif done {\r\n\t\t\tbreak\r\n\t\t}\r\n\t}\r\n\r\n\tgetWork := func(previous rpc.BlockHash) ([]byte, error) {\r\n\t\t// first, see if our minions did it for us\r\n\t\tvar previousArray [32]byte\r\n\t\tcopy(previousArray[:], previous)\r\n\t\tw.workMutex.RLock()\r\n\t\twork, ok := w.work[previousArray]\r\n\t\tw.workMutex.RUnlock()\r\n\t\tif ok {\r\n\t\t\treturn work[:], nil\r\n\t\t}\r\n\t\t// looks like we'll have to do it using our work server\r\n\t\tif workSlice, _, _, err := RPCWork.WorkGenerate(previous, networkCurrent); err == nil {\r\n\t\t\treturn workSlice, nil\r\n\t\t}\r\n\t\t// looks like this will have to be an inside job\r\n\t\treturn pow.Generate(previous, networkCurrent)\r\n\t}\r\n\r\n\tblocksWithWorkChan := make(chan *rpc.Block, len(destinations))\r\n\terrChan := make(chan error)\r\n\tgo func() {\r\n\t\tfor i := range blocks {\r\n\t\t\tif blocks[i].Work, err = getWork(blocks[i].Previous); err != nil {\r\n\t\t\t\terrChan <- err\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t\tblocksWithWorkChan <- blocks[i]\r\n\t\t}\r\n\t\tclose(blocksWithWorkChan)\r\n\t}()\r\n\r\n\tfor {\r\n\t\tselect {\r\n\t\tcase block, ok := <-blocksWithWorkChan:\r\n\t\t\tif !ok {\r\n\t\t\t\treturn hashes, nil\r\n\t\t\t}\r\n\t\t\thash, err := RPC.Process(block, \"send\")\r\n\t\t\tif err != nil {\r\n\t\t\t\treturn nil, err\r\n\t\t\t}\r\n\t\t\thashes = append(hashes, hash)\r\n\t\tcase err := <-errChan:\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\t}\r\n}", "title": "" }, { "docid": "9a3d58b670e3a109091b0b498ee6c116", "score": "0.53909314", "text": "func (c *SiteReplicationSys) syncToAllPeers(ctx context.Context) error {\n\tobjAPI := newObjectLayerFn()\n\tif objAPI == nil {\n\t\treturn errSRObjectLayerNotReady\n\t}\n\n\tbuckets, err := objAPI.ListBuckets(ctx, BucketOptions{})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, bucketInfo := range buckets {\n\t\tbucket := bucketInfo.Name\n\n\t\tmeta, err := globalBucketMetadataSys.GetConfigFromDisk(ctx, bucket)\n\t\tif err != nil && !errors.Is(err, errConfigNotFound) {\n\t\t\treturn errSRBackendIssue(err)\n\t\t}\n\n\t\topts := MakeBucketOptions{\n\t\t\tLockEnabled: meta.ObjectLocking(),\n\t\t\tCreatedAt: bucketInfo.Created.UTC(),\n\t\t}\n\n\t\t// Now call the MakeBucketHook on existing bucket - this will\n\t\t// create buckets and replication rules on peer clusters.\n\t\tif err = c.MakeBucketHook(ctx, bucket, opts); err != nil {\n\t\t\treturn errSRBucketConfigError(err)\n\t\t}\n\n\t\t// Replicate bucket policy if present.\n\t\tpolicyJSON, tm := meta.PolicyConfigJSON, meta.PolicyConfigUpdatedAt\n\t\tif len(policyJSON) > 0 {\n\t\t\terr = c.BucketMetaHook(ctx, madmin.SRBucketMeta{\n\t\t\t\tType: madmin.SRBucketMetaTypePolicy,\n\t\t\t\tBucket: bucket,\n\t\t\t\tPolicy: policyJSON,\n\t\t\t\tUpdatedAt: tm,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRBucketMetaError(err)\n\t\t\t}\n\t\t}\n\n\t\t// Replicate bucket tags if present.\n\t\ttagCfg, tm := meta.TaggingConfigXML, meta.TaggingConfigUpdatedAt\n\t\tif len(tagCfg) > 0 {\n\t\t\ttagCfgStr := base64.StdEncoding.EncodeToString(tagCfg)\n\t\t\terr = c.BucketMetaHook(ctx, madmin.SRBucketMeta{\n\t\t\t\tType: madmin.SRBucketMetaTypeTags,\n\t\t\t\tBucket: bucket,\n\t\t\t\tTags: &tagCfgStr,\n\t\t\t\tUpdatedAt: tm,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRBucketMetaError(err)\n\t\t\t}\n\t\t}\n\n\t\t// Replicate object-lock config if present.\n\t\tobjLockCfgData, tm := meta.ObjectLockConfigXML, meta.ObjectLockConfigUpdatedAt\n\t\tif len(objLockCfgData) > 0 {\n\t\t\tobjLockStr := base64.StdEncoding.EncodeToString(objLockCfgData)\n\t\t\terr = c.BucketMetaHook(ctx, madmin.SRBucketMeta{\n\t\t\t\tType: madmin.SRBucketMetaTypeObjectLockConfig,\n\t\t\t\tBucket: bucket,\n\t\t\t\tTags: &objLockStr,\n\t\t\t\tUpdatedAt: tm,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRBucketMetaError(err)\n\t\t\t}\n\t\t}\n\n\t\t// Replicate existing bucket bucket encryption settings\n\t\tsseConfigData, tm := meta.EncryptionConfigXML, meta.EncryptionConfigUpdatedAt\n\t\tif len(sseConfigData) > 0 {\n\t\t\tsseConfigStr := base64.StdEncoding.EncodeToString(sseConfigData)\n\t\t\terr = c.BucketMetaHook(ctx, madmin.SRBucketMeta{\n\t\t\t\tType: madmin.SRBucketMetaTypeSSEConfig,\n\t\t\t\tBucket: bucket,\n\t\t\t\tSSEConfig: &sseConfigStr,\n\t\t\t\tUpdatedAt: tm,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRBucketMetaError(err)\n\t\t\t}\n\t\t}\n\n\t\tquotaConfigJSON, tm := meta.QuotaConfigJSON, meta.QuotaConfigUpdatedAt\n\t\tif len(quotaConfigJSON) > 0 {\n\t\t\terr = c.BucketMetaHook(ctx, madmin.SRBucketMeta{\n\t\t\t\tType: madmin.SRBucketMetaTypeQuotaConfig,\n\t\t\t\tBucket: bucket,\n\t\t\t\tQuota: quotaConfigJSON,\n\t\t\t\tUpdatedAt: tm,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRBucketMetaError(err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Order matters from now on how the information is\n\t// synced to remote sites.\n\n\t// Policies should be synced first.\n\t{\n\t\t// Replicate IAM policies on local to all peers.\n\t\tallPolicyDocs, err := globalIAMSys.ListPolicyDocs(ctx, \"\")\n\t\tif err != nil {\n\t\t\treturn errSRBackendIssue(err)\n\t\t}\n\n\t\tfor pname, pdoc := range allPolicyDocs {\n\t\t\tpolicyJSON, err := json.Marshal(pdoc.Policy)\n\t\t\tif err != nil {\n\t\t\t\treturn wrapSRErr(err)\n\t\t\t}\n\t\t\terr = c.IAMChangeHook(ctx, madmin.SRIAMItem{\n\t\t\t\tType: madmin.SRIAMItemPolicy,\n\t\t\t\tName: pname,\n\t\t\t\tPolicy: policyJSON,\n\t\t\t\tUpdatedAt: pdoc.UpdateDate,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRIAMError(err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Next should be userAccounts those are local users, OIDC and LDAP will not\n\t// may not have any local users.\n\t{\n\t\tuserAccounts := make(map[string]UserIdentity)\n\t\terr := globalIAMSys.store.loadUsers(ctx, regUser, userAccounts)\n\t\tif err != nil {\n\t\t\treturn errSRBackendIssue(err)\n\t\t}\n\n\t\tfor _, acc := range userAccounts {\n\t\t\tif err := c.IAMChangeHook(ctx, madmin.SRIAMItem{\n\t\t\t\tType: madmin.SRIAMItemIAMUser,\n\t\t\t\tIAMUser: &madmin.SRIAMUser{\n\t\t\t\t\tAccessKey: acc.Credentials.AccessKey,\n\t\t\t\t\tIsDeleteReq: false,\n\t\t\t\t\tUserReq: &madmin.AddOrUpdateUserReq{\n\t\t\t\t\t\tSecretKey: acc.Credentials.SecretKey,\n\t\t\t\t\t\tStatus: madmin.AccountStatus(acc.Credentials.Status),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tUpdatedAt: acc.UpdatedAt,\n\t\t\t}); err != nil {\n\t\t\t\treturn errSRIAMError(err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Next should be Groups for some of these users, LDAP might have some Group\n\t// DNs here\n\t{\n\t\tgroups := make(map[string]GroupInfo)\n\t\terr := globalIAMSys.store.loadGroups(ctx, groups)\n\t\tif err != nil {\n\t\t\treturn errSRBackendIssue(err)\n\t\t}\n\n\t\tfor gname, group := range groups {\n\t\t\tif err := c.IAMChangeHook(ctx, madmin.SRIAMItem{\n\t\t\t\tType: madmin.SRIAMItemGroupInfo,\n\t\t\t\tGroupInfo: &madmin.SRGroupInfo{\n\t\t\t\t\tUpdateReq: madmin.GroupAddRemove{\n\t\t\t\t\t\tGroup: gname,\n\t\t\t\t\t\tMembers: group.Members,\n\t\t\t\t\t\tStatus: madmin.GroupStatus(group.Status),\n\t\t\t\t\t\tIsRemove: false,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tUpdatedAt: group.UpdatedAt,\n\t\t\t}); err != nil {\n\t\t\t\treturn errSRIAMError(err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Followed by group policy mapping\n\t{\n\t\t// Replicate policy mappings on local to all peers.\n\t\tgroupPolicyMap := make(map[string]MappedPolicy)\n\t\terrG := globalIAMSys.store.loadMappedPolicies(ctx, unknownIAMUserType, true, groupPolicyMap)\n\t\tif errG != nil {\n\t\t\treturn errSRBackendIssue(errG)\n\t\t}\n\n\t\tfor group, mp := range groupPolicyMap {\n\t\t\terr := c.IAMChangeHook(ctx, madmin.SRIAMItem{\n\t\t\t\tType: madmin.SRIAMItemPolicyMapping,\n\t\t\t\tPolicyMapping: &madmin.SRPolicyMapping{\n\t\t\t\t\tUserOrGroup: group,\n\t\t\t\t\tUserType: -1,\n\t\t\t\t\tIsGroup: true,\n\t\t\t\t\tPolicy: mp.Policies,\n\t\t\t\t},\n\t\t\t\tUpdatedAt: mp.UpdatedAt,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRIAMError(err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Service accounts are the static accounts that should be synced with\n\t// valid claims.\n\t{\n\t\tserviceAccounts := make(map[string]UserIdentity)\n\t\terr := globalIAMSys.store.loadUsers(ctx, svcUser, serviceAccounts)\n\t\tif err != nil {\n\t\t\treturn errSRBackendIssue(err)\n\t\t}\n\n\t\tfor user, acc := range serviceAccounts {\n\t\t\tif user == siteReplicatorSvcAcc {\n\t\t\t\t// skip the site replicate svc account as it is\n\t\t\t\t// already replicated.\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tclaims, err := globalIAMSys.GetClaimsForSvcAcc(ctx, acc.Credentials.AccessKey)\n\t\t\tif err != nil {\n\t\t\t\treturn errSRBackendIssue(err)\n\t\t\t}\n\n\t\t\t_, policy, err := globalIAMSys.GetServiceAccount(ctx, acc.Credentials.AccessKey)\n\t\t\tif err != nil {\n\t\t\t\treturn errSRBackendIssue(err)\n\t\t\t}\n\n\t\t\tvar policyJSON []byte\n\t\t\tif policy != nil {\n\t\t\t\tpolicyJSON, err = json.Marshal(policy)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn wrapSRErr(err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\terr = c.IAMChangeHook(ctx, madmin.SRIAMItem{\n\t\t\t\tType: madmin.SRIAMItemSvcAcc,\n\t\t\t\tSvcAccChange: &madmin.SRSvcAccChange{\n\t\t\t\t\tCreate: &madmin.SRSvcAccCreate{\n\t\t\t\t\t\tParent: acc.Credentials.ParentUser,\n\t\t\t\t\t\tAccessKey: user,\n\t\t\t\t\t\tSecretKey: acc.Credentials.SecretKey,\n\t\t\t\t\t\tGroups: acc.Credentials.Groups,\n\t\t\t\t\t\tClaims: claims,\n\t\t\t\t\t\tSessionPolicy: json.RawMessage(policyJSON),\n\t\t\t\t\t\tStatus: acc.Credentials.Status,\n\t\t\t\t\t\tName: acc.Credentials.Name,\n\t\t\t\t\t\tDescription: acc.Credentials.Description,\n\t\t\t\t\t\tExpiration: &acc.Credentials.Expiration,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tUpdatedAt: acc.UpdatedAt,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRIAMError(err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Followed by policy mapping for the userAccounts we previously synced.\n\t{\n\t\t// Replicate policy mappings on local to all peers.\n\t\tuserPolicyMap := make(map[string]MappedPolicy)\n\t\terrU := globalIAMSys.store.loadMappedPolicies(ctx, regUser, false, userPolicyMap)\n\t\tif errU != nil {\n\t\t\treturn errSRBackendIssue(errU)\n\t\t}\n\n\t\tfor user, mp := range userPolicyMap {\n\t\t\terr := c.IAMChangeHook(ctx, madmin.SRIAMItem{\n\t\t\t\tType: madmin.SRIAMItemPolicyMapping,\n\t\t\t\tPolicyMapping: &madmin.SRPolicyMapping{\n\t\t\t\t\tUserOrGroup: user,\n\t\t\t\t\tUserType: int(regUser),\n\t\t\t\t\tIsGroup: false,\n\t\t\t\t\tPolicy: mp.Policies,\n\t\t\t\t},\n\t\t\t\tUpdatedAt: mp.UpdatedAt,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRIAMError(err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// and finally followed by policy mappings for for STS users.\n\t{\n\t\t// Replicate policy mappings on local to all peers.\n\t\tstsPolicyMap := make(map[string]MappedPolicy)\n\t\terrU := globalIAMSys.store.loadMappedPolicies(ctx, stsUser, false, stsPolicyMap)\n\t\tif errU != nil {\n\t\t\treturn errSRBackendIssue(errU)\n\t\t}\n\n\t\tfor user, mp := range stsPolicyMap {\n\t\t\terr := c.IAMChangeHook(ctx, madmin.SRIAMItem{\n\t\t\t\tType: madmin.SRIAMItemPolicyMapping,\n\t\t\t\tPolicyMapping: &madmin.SRPolicyMapping{\n\t\t\t\t\tUserOrGroup: user,\n\t\t\t\t\tUserType: int(stsUser),\n\t\t\t\t\tIsGroup: false,\n\t\t\t\t\tPolicy: mp.Policies,\n\t\t\t\t},\n\t\t\t\tUpdatedAt: mp.UpdatedAt,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errSRIAMError(err)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "922d0cc513c258bd0366adf1df8904fd", "score": "0.5388939", "text": "func PeerSync() {\n\tfmt.Println(\"Performing a sync\")\n\tfor addr, peer := range PeerList {\n\t\tvar blockchainResp []blockchain.Block\n\t\tempty := new(Empty)\n\t\terr := peer.Client.Call(\"Peer.GetBlockChain\", empty, &blockchainResp)\n\t\tif !CheckError(err, \"PeerSync:\"+addr) {\n\t\t\tpeer.LastHeartBeat = time.Now()\n\t\t\tfor _, block := range blockchainResp {\n\t\t\t\tInsertBlock(block)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "8b84b6b400b5ead9113294d6ba605303", "score": "0.53733146", "text": "func waitForNTxsInMempool(miner *rpcclient.Client, n int,\n\ttimeout time.Duration) ([]*chainhash.Hash, er.R) {\n\n\tbreakTimeout := time.After(timeout)\n\tticker := time.NewTicker(50 * time.Millisecond)\n\tdefer ticker.Stop()\n\n\tvar err er.R\n\tvar mempool []*chainhash.Hash\n\tfor {\n\t\tselect {\n\t\tcase <-breakTimeout:\n\t\t\treturn nil, er.Errorf(\"wanted %v, found %v txs \"+\n\t\t\t\t\"in mempool: %v\", n, len(mempool), mempool)\n\t\tcase <-ticker.C:\n\t\t\tmempool, err = miner.GetRawMempool()\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tif len(mempool) == n {\n\t\t\t\treturn mempool, nil\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b8f36ef6eb3dafb20109a4c4c827fdc7", "score": "0.53409356", "text": "func (localNode *LocalNode) SyncTxnPool() {\n\n\t// remove expired twt before sending request\n\tlocalNode.TxnPool.RemoveExpiredTwt()\n\n\tneighbors := localNode.GetNeighbors(nil)\n\tneighborCount := len(neighbors)\n\n\tif neighborCount <= 0 { // don't have any neighbor yet\n\t\treturn\n\t}\n\n\tif NumNbrToSyncTxnPool < neighborCount { // choose random neighbors\n\n\t\tr := rand.New(rand.NewSource(time.Now().UnixNano()))\n\t\tr.Shuffle(len(neighbors), func(i, j int) { neighbors[i], neighbors[j] = neighbors[j], neighbors[i] })\n\n\t\tneighbors = neighbors[:NumNbrToSyncTxnPool]\n\t}\n\n\tmyHash, _ := localNode.TxnPool.GetTwtFingerprintAndCount()\n\tmaxCount := uint32(0)\n\tvar maxMu sync.Mutex\n\tvar neighborToSync *node.RemoteNode // the neighbor which is sync txn target\n\tvar wg sync.WaitGroup\n\n\tfor _, neighbor := range neighbors {\n\t\twg.Add(1)\n\n\t\tgo func(nbr *node.RemoteNode) {\n\t\t\tdefer wg.Done()\n\n\t\t\treplyMsg, err := localNode.requestTxnPoolHash(nbr)\n\t\t\tif err != nil {\n\t\t\t\tlog.Warningf(\"sendReqTxnPoolHash neighbor %v error: %v\", nbr.GetAddr(), err)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif !bytes.Equal(replyMsg.PoolHash, myHash) {\n\t\t\t\tmaxMu.Lock()\n\t\t\t\tif replyMsg.TxnCount > maxCount { // Choose the neighbor which has most txn count in txn pool\n\t\t\t\t\tneighborToSync = nbr\n\t\t\t\t\tmaxCount = replyMsg.TxnCount\n\t\t\t\t}\n\t\t\t\tmaxMu.Unlock()\n\t\t\t}\n\t\t}(neighbor)\n\n\t}\n\n\twg.Wait()\n\n\t// request for syncing\n\tif neighborToSync != nil {\n\t\treplyMsg, err := localNode.requestSyncTxnPool(neighborToSync)\n\t\tif err != nil {\n\t\t\tlog.Error(\"req sync txn pool error: \", err)\n\t\t} else {\n\t\t\t// sort it by nonce to append them to txn pool.\n\t\t\tsort.Slice(replyMsg.Transactions, func(i, j int) bool {\n\t\t\t\treturn replyMsg.Transactions[i].UnsignedTx.Nonce < replyMsg.Transactions[j].UnsignedTx.Nonce\n\t\t\t})\n\n\t\t\tfor _, pbTxn := range replyMsg.Transactions {\n\t\t\t\ttxn := &transaction.Transaction{\n\t\t\t\t\tTransaction: pbTxn,\n\t\t\t\t}\n\n\t\t\t\tif localNode.ExistHash(txn.Hash()) {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tlocalNode.TxnPool.AppendTxnPool(txn)\n\t\t\t}\n\n\t\t\t// after update my txn pool, reset sync time.\n\t\t\tlocalNode.TxnPool.SetSyncTime()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "157ea874997ad1cf26832d5f8d09108f", "score": "0.53283876", "text": "func (client *ClientBookKeeper) Sync() {\n\tnodes := client.client.Nodes()\n\topts := kapi.ListOptions{LabelSelector: klabels.Everything()}\n\tif nodeList, err := nodes.List(opts); err == nil {\n\t\tfor name := range client.nodes {\n\t\t\tif !ContainsNodeName(name, nodeList) {\n\t\t\t\tglog.Errorf(\"Bookkeeper has node: %s that does not exist in api server\", name)\n\t\t\t\tclient.RemoveNode(name)\n\t\t\t}\n\t\t}\n\t}\n\t//Add Remove as needed\n\t//UnLock\n}", "title": "" }, { "docid": "96475fefdcc5a439b1057b62a9a1e35d", "score": "0.5324923", "text": "func SynchronizedWithMasterAndNetwork(peerAddr, join, networkPassword string) error {\n\tresult, status, err := getServerTime(join, networkPassword)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not join %q: %v\\n\", join, err)\n\t}\n\tvar peers []string\n\tfor _, peer := range status.Peers {\n\t\tif peer != peerAddr && peer != join {\n\t\t\tpeers = append(peers, peer)\n\t\t}\n\t}\n\tlog.Printf(\"Collecting time of remaining nodes %v\\n\", peers)\n\tresults, err := collectTime(peers, networkPassword)\n\tif err != nil {\n\t\tglog.Warningf(\"Could not collect time from all of %v: %v\\n\", peers, err)\n\t}\n\tresults = append(results, result)\n\treturn synchronizedWithNetwork(results)\n}", "title": "" }, { "docid": "9f919554923331a8dbd5f02c5dbb3877", "score": "0.5315212", "text": "func (this *P2PServer) syncUpRecentPeers() {\n\tperiodTime := common.RECENT_TIMEOUT\n\tt := time.NewTicker(time.Second * (time.Duration(periodTime)))\n\tfor {\n\t\tselect {\n\t\tcase <-t.C:\n\t\t\tthis.syncPeerAddr()\n\t\tcase <-this.quitSyncRecent:\n\t\t\tt.Stop()\n\t\t\tbreak\n\t\t}\n\t}\n\n}", "title": "" }, { "docid": "32af99502a511f41becf9c694b047ff3", "score": "0.5302153", "text": "func (m *mempool) UpdateMempoolTxes(txids []*chainhash.Hash) []*wire.MsgTx {\n\tm.Lock()\n\tdefer m.Unlock()\n\n\t// txesToNotify is a list of txes to be notified to the client.\n\ttxesToNotify := make([]*wire.MsgTx, 0, len(txids))\n\n\t// Set all mempool txs to false.\n\tm.unmarkAll()\n\n\t// We'll scan through the most recent txs in the mempool to see whether\n\t// there are new txs that we need to send to the client.\n\tfor _, txHash := range txids {\n\t\t// If the transaction is already in our local mempool, then we\n\t\t// have already sent it to the client.\n\t\tif m.containsTx(*txHash) {\n\t\t\t// Mark the tx as true so that we know not to remove it\n\t\t\t// from our internal mempool.\n\t\t\tm.mark(*txHash)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Grab full mempool transaction from hash.\n\t\ttx, err := m.client.GetRawTransaction(txHash)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"unable to fetch transaction %s from \"+\n\t\t\t\t\"mempool: %v\", txHash, err)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Add the transaction to our local mempool. Note that we only\n\t\t// do this after fetching the full raw transaction from\n\t\t// bitcoind. We do this so that if that call happens to\n\t\t// initially fail, then we will retry it on the next interval\n\t\t// since it is still not in our local mempool.\n\t\tm.add(tx.MsgTx())\n\n\t\t// Save the tx to the slice.\n\t\ttxesToNotify = append(txesToNotify, tx.MsgTx())\n\t}\n\n\t// Now, we clear our internal mempool of any unmarked transactions.\n\t// These are all the transactions that we still have in the mempool but\n\t// that were not returned in the latest GetRawMempool query.\n\tm.deleteUnmarked()\n\n\treturn txesToNotify\n}", "title": "" }, { "docid": "4146a10212eb6ae4573dc6f4a24e3804", "score": "0.5268721", "text": "func TestSyncer_SyncMetas(t *testing.T) {\n\tdir, err := ioutil.TempDir(\"\", \"test-syncer\")\n\ttestutil.Ok(t, err)\n\tdefer os.RemoveAll(dir)\n\n\tbkt, cleanup, err := testutil.NewObjectStoreBucket(t)\n\ttestutil.Ok(t, err)\n\tdefer cleanup()\n\n\tctx, cancel := context.WithTimeout(context.Background(), 120*time.Second)\n\tdefer cancel()\n\n\trandr := rand.New(rand.NewSource(0))\n\n\t// Generate 15 blocks. Initially the first 10 are on disk and the last\n\t// 10 are in the bucket.\n\t// After starting the Syncer, the first 10 should be loaded.\n\t// After the first synchronization the first 5 should be dropped and the\n\t// last 5 be loaded from the bucket.\n\tvar ids []ulid.ULID\n\tvar bdirs []string\n\n\tfor i := 0; i < 15; i++ {\n\t\tid, err := ulid.New(uint64(i), randr)\n\t\ttestutil.Ok(t, err)\n\n\t\tbdir := filepath.Join(dir, id.String())\n\t\tbdirs = append(bdirs, bdir)\n\t\tids = append(ids, id)\n\n\t\tvar meta block.Meta\n\t\tmeta.Version = 1\n\t\tmeta.ULID = id\n\n\t\ttestutil.Ok(t, os.MkdirAll(bdir, 0777))\n\t\ttestutil.Ok(t, block.WriteMetaFile(bdir, &meta))\n\t}\n\tfor i, id := range ids[5:] {\n\t\ttestutil.Ok(t, objstore.UploadDir(ctx, bkt, bdirs[i+5], id.String()))\n\t}\n\tfor _, d := range bdirs[10:] {\n\t\ttestutil.Ok(t, os.RemoveAll(d))\n\t}\n\n\tsy, err := NewSyncer(nil, nil, dir, bkt, 0)\n\ttestutil.Ok(t, err)\n\n\tgot, err := sy.Groups()[0].IDs()\n\ttestutil.Ok(t, err)\n\ttestutil.Equals(t, ids[:10], got)\n\n\ttestutil.Ok(t, sy.SyncMetas(ctx))\n\n\tgot, err = sy.Groups()[0].IDs()\n\ttestutil.Ok(t, err)\n\ttestutil.Equals(t, ids[5:], got)\n}", "title": "" }, { "docid": "9e87f3d930c965b983aac77cbc8872f8", "score": "0.52676064", "text": "func SyncBlocksByRange(client *ethclient.Client, _db *gorm.DB, redis *d.RedisInfo, queue *q.BlockProcessorQueue, fromBlock uint64, toBlock uint64, status *d.StatusHolder) {\n\n\t// Job to be submitted and executed by each worker\n\t//\n\t// Job specification is provided in `Job` struct\n\tjob := func(wp *workerpool.WorkerPool, j *d.Job, queue *q.BlockProcessorQueue) {\n\n\t\twp.Submit(func() {\n\n\t\t\tif !queue.Put(j.Block) {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif !FetchBlockByNumber(j.Client, j.Block, j.DB, j.Redis, false, queue, j.Status) {\n\t\t\t\tqueue.UnconfirmedFailed(j.Block)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tqueue.UnconfirmedDone(j.Block)\n\n\t\t})\n\t}\n\n\tlog.Printf(\"✅ Starting block syncer\\n\")\n\n\tif fromBlock < toBlock {\n\t\tSyncer(client, _db, redis, queue, fromBlock, toBlock, status, job)\n\t} else {\n\t\tSyncer(client, _db, redis, queue, toBlock, fromBlock, status, job)\n\t}\n\n\tlog.Printf(\"✅ Stopping block syncer\\n\")\n\n\t// Once completed first iteration of processing blocks upto last time where it left\n\t// off, we're going to start worker to look at DB & decide which blocks are missing\n\t// i.e. need to be fetched again\n\t//\n\t// And this will itself run as a infinite job, completes one iteration &\n\t// takes break for 1 min, then repeats\n\tgo SyncMissingBlocksInDB(client, _db, redis, queue, status)\n\n}", "title": "" }, { "docid": "91c58bf7eb3e986b6d454c4330a9fdfc", "score": "0.52624506", "text": "func (s *Syncer) handleMempool(ctx context.Context) error {\n\tconst mempoolEvictionTimeout = 60 * time.Minute\n\n\tfor {\n\t\tselect {\n\t\tcase txHash := <-s.mempoolAdds:\n\t\t\tgo func() {\n\t\t\t\tselect {\n\t\t\t\tcase <-ctx.Done():\n\t\t\t\tcase <-time.After(mempoolEvictionTimeout):\n\t\t\t\t\ts.mempool.Delete(*txHash)\n\t\t\t\t}\n\t\t\t}()\n\t\tcase <-ctx.Done():\n\t\t\treturn ctx.Err()\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ccd31f2f2d1583e3a33de9ddbd7ee903", "score": "0.5261365", "text": "func TestSyncPeers(t *testing.T) {\n\ttunnelServer := tunnel.NewTunnelServer()\n\tpm := &peerManager{\n\t\ttoken: tunnelServer.PeerToken,\n\t\turlFormat: \"wss://%s/usermanager/v1/websocket/connect\",\n\t\tserver: tunnelServer,\n\t\tpeers: map[string]bool{},\n\t}\n\terr := pm.syncPeers([]string{})\n\tif err == nil {\n\t\tt.Error(\"register and discovery should always can discovery self\")\n\t}\n}", "title": "" }, { "docid": "7c866497bff7a8663a23f38db0890105", "score": "0.5252673", "text": "func (c *ipamCache) sync() error {\n\tfor {\n\t\tc.l.Info(\"Reconciliating pools...\")\n\t\tpoolsList, err := c.client.IPPools().List(context.Background(), options.ListOptions{})\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"error listing pools\")\n\t\t}\n\t\tsweepMap := make(map[string]bool)\n\t\tfor _, pool := range poolsList.Items {\n\t\t\tsweepMap[pool.Spec.CIDR] = true\n\t\t\terr := c.update(pool, false)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"error processing startup pool update\")\n\t\t\t}\n\t\t}\n\t\t// Sweep phase\n\t\tfor key, pool := range c.m {\n\t\t\tfound := sweepMap[key]\n\t\t\tif !found {\n\t\t\t\tc.update(*pool, true)\n\t\t\t}\n\t\t}\n\n\t\tif !c.ready {\n\t\t\tc.ready = true\n\t\t\tc.readyCond.Broadcast()\n\t\t}\n\n\t\tpoolsWatcher, err := c.client.IPPools().Watch(\n\t\t\tcontext.Background(),\n\t\t\toptions.ListOptions{ResourceVersion: poolsList.ResourceVersion},\n\t\t)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"error watching pools\")\n\t\t}\n\twatch:\n\t\tfor update := range poolsWatcher.ResultChan() {\n\t\t\tdel := false\n\t\t\tpool := update.Object\n\t\t\tswitch update.Type {\n\t\t\tcase watch.Error:\n\t\t\t\tswitch update.Error.(type) {\n\t\t\t\tcase calicoerr.ErrorWatchTerminated:\n\t\t\t\t\tbreak watch\n\t\t\t\tdefault:\n\t\t\t\t\treturn errors.Wrap(update.Error, \"error while watching IPPools\")\n\t\t\t\t}\n\t\t\tcase watch.Deleted:\n\t\t\t\tdel = true\n\t\t\t\tpool = update.Previous\n\t\t\tcase watch.Added, watch.Modified:\n\t\t\t}\n\t\t\tif err = c.update(*pool.(*calicov3.IPPool), del); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"error processing pool update\")\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "10ce7e2a3fc6b59f71319efeb88d0271", "score": "0.52477014", "text": "func SyncMissingBlocksInDB(client *ethclient.Client, _db *gorm.DB, redis *d.RedisInfo, queue *q.BlockProcessorQueue, status *d.StatusHolder) {\n\n\tfor {\n\n\t\tlog.Printf(\"✅ Starting missing block finder\\n\")\n\n\t\tcurrentBlockNumber := db.GetCurrentBlockNumber(_db)\n\n\t\t// Safely reading shared variable\n\t\tblockCount := status.BlockCountInDB()\n\n\t\t// If all blocks present in between 0 to latest block in network\n\t\t// `ette` sleeps for 1 minute & again get to work\n\t\tif currentBlockNumber+1 == blockCount {\n\t\t\tlog.Printf(\"✅ No missing blocks found\\n\")\n\n\t\t\t<-time.After(time.Duration(1) * time.Minute)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Job to be submitted and executed by each worker\n\t\t//\n\t\t// Job specification is provided in `Job` struct\n\t\tjob := func(wp *workerpool.WorkerPool, j *d.Job, queue *q.BlockProcessorQueue) {\n\n\t\t\twp.Submit(func() {\n\n\t\t\t\t// Worker fetches block by number from local storage\n\t\t\t\tblock := db.GetBlock(j.DB, j.Block)\n\t\t\t\tif !(block == nil) {\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tif !queue.Put(j.Block) {\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tif !FetchBlockByNumber(j.Client, j.Block, j.DB, j.Redis, false, queue, j.Status) {\n\t\t\t\t\tqueue.UnconfirmedFailed(j.Block)\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tqueue.UnconfirmedDone(j.Block)\n\n\t\t\t})\n\n\t\t}\n\n\t\tSyncer(client, _db, redis, queue, 0, currentBlockNumber, status, job)\n\n\t\tlog.Printf(\"✅ Stopping missing block finder\\n\")\n\t\t<-time.After(time.Duration(1) * time.Minute)\n\n\t}\n\n}", "title": "" }, { "docid": "0c888526b17e188859987f7768f733f2", "score": "0.524754", "text": "func (c *Controller) syncMachineSets(clusterDeployment *cov1.ClusterDeployment, remoteClusterAPIClient clusterapiclient.Interface) error {\n\tmachineSetsToDelete := []*clusterapiv1.MachineSet{}\n\tmachineSetsToCreate := []*clusterapiv1.MachineSet{}\n\tmachineSetsToUpdate := []*clusterapiv1.MachineSet{}\n\n\tremoteMachineSets, err := remoteClusterAPIClient.ClusterV1alpha1().MachineSets(remoteClusterAPINamespace).List(metav1.ListOptions{})\n\n\tcoVersionNamespace, coVersionName := clusterDeployment.Spec.ClusterVersionRef.Namespace, clusterDeployment.Spec.ClusterVersionRef.Name\n\tcoClusterVersion, err := c.clusterVersionInformer.ClusterVersions(coVersionNamespace).Get(coVersionName)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"cannot retrieve cluster version %s/%s: %v\", coVersionNamespace, coVersionName, err)\n\t}\n\n\tclusterDeploymentComputeMachineSets, err := computeClusterAPIMachineSetsFromClusterDeployment(clusterDeployment, coClusterVersion)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// find items that need updating/creating\n\tfor _, ms := range clusterDeploymentComputeMachineSets {\n\t\tfound := false\n\t\tfor _, rMS := range remoteMachineSets.Items {\n\t\t\tif ms.Name == rMS.Name {\n\t\t\t\tfound = true\n\t\t\t\t// TODO what other fields do we want to check for?\n\t\t\t\tif *rMS.Spec.Replicas != *ms.Spec.Replicas {\n\t\t\t\t\tmachineSetsToUpdate = append(machineSetsToUpdate, ms)\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif !found {\n\t\t\tmachineSetsToCreate = append(machineSetsToCreate, ms)\n\t\t}\n\n\t}\n\n\t// find items that need deleting\n\tfor _, rMS := range remoteMachineSets.Items {\n\t\tfound := false\n\t\tfor _, ms := range clusterDeploymentComputeMachineSets {\n\t\t\tif rMS.Name == ms.Name {\n\t\t\t\tfound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !found {\n\t\t\tmachineSetsToDelete = append(machineSetsToDelete, &rMS)\n\t\t}\n\t}\n\n\tc.logger.Debugf(\"Creating %d machineset(s)\", len(machineSetsToCreate))\n\tc.logger.Debugf(\"Updating %d machineset(s)\", len(machineSetsToUpdate))\n\tc.logger.Debugf(\"Deleting %d machineset(s)\", len(machineSetsToDelete))\n\n\tfor _, ms := range machineSetsToCreate {\n\t\tc.logger.Debugf(\"creating ms %v\", ms.Name)\n\t\t_, err = remoteClusterAPIClient.ClusterV1alpha1().MachineSets(remoteClusterAPINamespace).Create(ms)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tfor _, ms := range machineSetsToUpdate {\n\t\tc.logger.Debugf(\"updating ms %v\", ms)\n\t\t_, err = remoteClusterAPIClient.ClusterV1alpha1().MachineSets(remoteClusterAPINamespace).Update(ms)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tfor _, ms := range machineSetsToDelete {\n\t\tc.logger.Debugf(\"deleting ms %v\", ms)\n\t\terr = remoteClusterAPIClient.ClusterV1alpha1().MachineSets(remoteClusterAPINamespace).Delete(ms.Name, &metav1.DeleteOptions{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "85b4f2a7eba5f729cca7241cf049dacc", "score": "0.5241923", "text": "func TestFromGossipSyncToNotSynced(t *testing.T) {\n\tlg := logtest.New(t).WithName(\"syncer\")\n\tticker := newMockLayerTicker()\n\tmf := newMockFetcher()\n\tmm := newMemMesh(t, lg)\n\tsyncer := newSyncerWithoutSyncTimer(context.TODO(), t, conf, ticker, mm, mf, lg)\n\n\tassert.False(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\n\tfirstLayer := types.GetEffectiveGenesis().Add(1)\n\tcurrent := firstLayer.Add(5)\n\tticker.advanceToLayer(current)\n\n\tsyncer.Start(context.TODO())\n\tt.Cleanup(func() {\n\t\tsyncer.Close()\n\t})\n\n\tvar wg sync.WaitGroup\n\twg.Add(1)\n\tgo func() {\n\t\tassert.True(t, syncer.synchronize(context.TODO()))\n\t\twg.Done()\n\t}()\n\tfeedLayerResult(firstLayer, firstLayer, mf, mm)\n\t// wait till firstLayer's content is requested to check whether sync state has changed\n\t<-mf.getLayerPollChan(firstLayer)\n\t// the node should remain not synced and not gossiping\n\tassert.False(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\tfeedLayerResult(firstLayer.Add(1), current.Sub(1), mf, mm)\n\twg.Wait()\n\t// node should be in gossip sync state\n\tassert.True(t, syncer.stateOnTarget())\n\tassert.True(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\n\t// cause the node to be out of sync again\n\tnewCurrent := current.Add(outOfSyncThreshold)\n\tticker.advanceToLayer(newCurrent)\n\twg.Add(1)\n\tgo func() {\n\t\tassert.True(t, syncer.synchronize(context.TODO()))\n\t\twg.Done()\n\t}()\n\tfeedLayerResult(current, current, mf, mm)\n\t<-mf.getLayerPollChan(current)\n\t// the node should fall to notSynced\n\tassert.False(t, syncer.stateOnTarget())\n\tassert.False(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\n\t// allow for sync to complete\n\tfeedLayerResult(current.Add(1), newCurrent.Sub(1), mf, mm)\n\twg.Wait()\n\n\t// the node should enter gossipSync again\n\tassert.True(t, syncer.stateOnTarget())\n\tassert.True(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\n\twaitOutGossipSync(t, newCurrent, syncer, ticker, mf, mm)\n}", "title": "" }, { "docid": "98b00afbd073fabe1e7e021beffd0445", "score": "0.5238005", "text": "func initialSync() {\n\n\tquitChan := make(chan bool)\n\tsyncChan := make(chan [][]MasterOrder, 5)\n\n\tnumFloors = masternetworkinterface.Init_MNI(syncChan, quitChan)\n\n\tfmt.Println(\"Got\", numFloors, \"Floors\")\n\n\torderList = make([][]MasterOrder, numFloors, numFloors)\n\tfor i := range orderList {\n\t\torderList[i] = make([]MasterOrder, 2, 2)\n\t}\n\n\ttimeOut := time.After(initWaitTime)\n\n\tdone := false\n\tfor done != true {\n\t\tselect {\n\t\tcase orderList = <-syncChan:\n\t\tcase <-timeOut:\n\t\t\tclose(quitChan)\n\t\t\tdone = true\n\t\t}\n\t}\n\ttime.Sleep(250 * time.Millisecond)\n\tfmt.Println(\"Done Initializing Master!\")\n}", "title": "" }, { "docid": "abedae6de33cb7c4bef24ce257e1e73e", "score": "0.5215822", "text": "func refreshPeersAndSigners(ss *server.MediorumServer, g registrar.PeerProvider) {\n\tlogger := slog.With(\"creatorNodeEndpoint\", os.Getenv(\"creatorNodeEndpoint\"))\n\tticker := time.NewTicker(30 * time.Minute)\n\tfor range ticker.C {\n\t\tvar peers, signers []server.Peer\n\t\tvar err error\n\n\t\teg := new(errgroup.Group)\n\t\teg.Go(func() error {\n\t\t\tpeers, err = g.Peers()\n\t\t\treturn err\n\t\t})\n\t\teg.Go(func() error {\n\t\t\tsigners, err = g.Signers()\n\t\t\treturn err\n\t\t})\n\t\tif err := eg.Wait(); err != nil {\n\t\t\tlogger.Error(\"failed to fetch registered nodes\", \"err\", err)\n\t\t\tcontinue\n\t\t}\n\n\t\tvar combined, configCombined []string\n\n\t\tfor _, peer := range append(peers, signers...) {\n\t\t\tcombined = append(combined, fmt.Sprintf(\"%s,%s\", httputil.RemoveTrailingSlash(strings.ToLower(peer.Host)), strings.ToLower(peer.Wallet)))\n\t\t}\n\n\t\tfor _, configPeer := range append(ss.Config.Peers, ss.Config.Signers...) {\n\t\t\tconfigCombined = append(configCombined, fmt.Sprintf(\"%s,%s\", httputil.RemoveTrailingSlash(strings.ToLower(configPeer.Host)), strings.ToLower(configPeer.Wallet)))\n\t\t}\n\n\t\tslices.Sort(combined)\n\t\tslices.Sort(configCombined)\n\t\tif !slices.Equal(combined, configCombined) {\n\t\t\tlogger.Info(\"peers or signers changed on chain. restarting...\", \"peers\", len(peers), \"signers\", len(signers), \"combined\", combined, \"configCombined\", configCombined)\n\t\t\tos.Exit(0) // restarting from inside the app is too error-prone so we'll let docker compose autoheal handle it\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2f321923354aa788b2f011aa881b68b9", "score": "0.51941305", "text": "func cleanupFollowNodes() {\n\tmutex.Lock()\n\tdefer mutex.Unlock()\n\tfor publicKey, status := range currentBeacons {\n\t\tif status.MsgID != tangle.EmptyMessageID {\n\t\t\tdur := clock.Since(time.Unix(0, status.SentTime))\n\t\t\tif dur.Seconds() > float64(SyncBeaconFollowerParameters.MaxTimeOffline) {\n\t\t\t\tcurrentBeacons[publicKey].Synced = false\n\t\t\t}\n\t\t}\n\t}\n\tupdateSynced()\n}", "title": "" }, { "docid": "3dda1164e56e28984d2eaf1d6ddd4104", "score": "0.5188073", "text": "func nodeMgmtSync(c *cli.Context) error {\n\tif err := adm.VerifyNoArgument(c); err != nil {\n\t\treturn err\n\t}\n\n\treturn adm.Perform(`get`, `/sync/node/`, `node-mgmt::sync`, nil, c)\n}", "title": "" }, { "docid": "c3393b7c2f0b67f71ba4cc09ba6c9dd4", "score": "0.51834166", "text": "func (g *ringWorkerGroup) Sync() (err error) {\n\n\treturn\n}", "title": "" }, { "docid": "4ba5735e5c4540fcf7683ad9fb240f71", "score": "0.51779383", "text": "func (p *StorageSetListPlanner) sync() ([]*unstructured.Unstructured, error) {\n\tvar storageSets []*unstructured.Unstructured\n\tfor uid, isNodeNoop := range p.IsNodeNoop {\n\t\tif !isNodeNoop {\n\t\t\tcontinue\n\t\t}\n\n\t\tglog.V(3).Infof(\n\t\t\t\"Will sync CStorClusterStorageSet %q / %q\",\n\t\t\tp.ObservedStorageSetObjs[uid].GetNamespace(),\n\t\t\tp.ObservedStorageSetObjs[uid].GetName(),\n\t\t)\n\n\t\tstorageSets = append(\n\t\t\tstorageSets,\n\t\t\tp.getDesiredStorageSet(\n\t\t\t\tp.ObservedStorageSetObjs[uid].GetName(), uid,\n\t\t\t),\n\t\t)\n\t}\n\treturn storageSets, nil\n}", "title": "" }, { "docid": "46ab7632a599882e50a68cdd70e8cf17", "score": "0.5160011", "text": "func SynchronizedWithNetwork(peerAddr string, peers []string, networkPassword string) error {\n\tvar collectPeers []string\n\tfor _, peer := range peers {\n\t\tif peer != peerAddr {\n\t\t\tcollectPeers = append(collectPeers, peer)\n\t\t}\n\t}\n\tlog.Printf(\"Collecting time of remaining nodes %v\\n\", collectPeers)\n\tresults, err := collectTime(collectPeers, networkPassword)\n\tif err != nil {\n\t\tglog.Warningf(\"Could not collect time from all of %v: %v\\n\", collectPeers, err)\n\t}\n\treturn synchronizedWithNetwork(results)\n}", "title": "" }, { "docid": "10e710071b197f8ef8c230ac189a6d29", "score": "0.51561004", "text": "func SyncRemoteMulticastSetupLoop(nsCli *nscli.Client) {\n\tfor {\n\t\tctxID, err := uuid.NewV4()\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Error(\"new uuid error\")\n\t\t}\n\n\t\tctx := context.Background()\n\t\tctx = context.WithValue(ctx, logging.ContextIDKey, ctxID)\n\n\t\terr = storage.Transaction(func(ctx context.Context, handler *store.Handler) error {\n\t\t\treturn syncRemoteMulticastSetup(ctx, handler, nsCli)\n\t\t})\n\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Error(\"sync remote multicast setup error\")\n\t\t}\n\t\ttime.Sleep(ctrl.s.SyncInterval)\n\t}\n}", "title": "" }, { "docid": "4b1648e483c80244d5b91b507cdda9c1", "score": "0.5154164", "text": "func TestFromNotSyncedToSynced(t *testing.T) {\n\tlg := logtest.New(t).WithName(\"syncer\")\n\tticker := newMockLayerTicker()\n\tmf := newMockFetcher()\n\tmm := newMemMesh(t, lg)\n\tsyncer := newSyncerWithoutSyncTimer(context.TODO(), t, conf, ticker, mm, mf, lg)\n\n\tassert.False(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\n\tfirstLayer := types.GetEffectiveGenesis().Add(1)\n\tcurrent := firstLayer.Add(5)\n\tticker.advanceToLayer(current)\n\tsyncer.Start(context.TODO())\n\tt.Cleanup(func() {\n\t\tsyncer.Close()\n\t})\n\n\tvar wg sync.WaitGroup\n\twg.Add(1)\n\tgo func() {\n\t\tassert.True(t, syncer.synchronize(context.TODO()))\n\t\twg.Done()\n\t}()\n\tfeedLayerResult(firstLayer, firstLayer, mf, mm)\n\t// wait till firstLayer's content is requested to check whether sync state has changed\n\t<-mf.getLayerPollChan(firstLayer)\n\t// the node should remain not synced and not gossiping\n\tassert.False(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\tfeedLayerResult(firstLayer.Add(1), current, mf, mm)\n\twg.Wait()\n\t// node should be in gossip sync state\n\tassert.True(t, syncer.stateOnTarget())\n\tassert.True(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\n\twaitOutGossipSync(t, current, syncer, ticker, mf, mm)\n}", "title": "" }, { "docid": "6f677cc2811544d27a5f257aeafc540d", "score": "0.5151661", "text": "func (ctrl *Controller) syncMachineConfigPool(key string) error {\n\tstartTime := time.Now()\n\tklog.V(4).Infof(\"Started syncing machineconfigpool %q (%v)\", key, startTime)\n\tdefer func() {\n\t\tklog.V(4).Infof(\"Finished syncing machineconfigpool %q (%v)\", key, time.Since(startTime))\n\t}()\n\n\t_, name, err := cache.SplitMetaNamespaceKey(key)\n\tif err != nil {\n\t\treturn err\n\t}\n\tmachineconfigpool, err := ctrl.mcpLister.Get(name)\n\tif errors.IsNotFound(err) {\n\t\tklog.V(2).Infof(\"MachineConfigPool %v has been deleted\", key)\n\t\treturn nil\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Deep-copy otherwise we are mutating our cache.\n\t// TODO: Deep-copy only when needed.\n\tpool := machineconfigpool.DeepCopy()\n\teverything := metav1.LabelSelector{}\n\tif reflect.DeepEqual(pool.Spec.MachineConfigSelector, &everything) {\n\t\tctrl.eventRecorder.Eventf(pool, corev1.EventTypeWarning, \"SelectingAll\", \"This machineconfigpool is selecting all machineconfigs. A non-empty selector is required.\")\n\t\treturn nil\n\t}\n\n\tselector, err := metav1.LabelSelectorAsSelector(pool.Spec.MachineConfigSelector)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// TODO(runcom): add tests in render_controller_test.go for this condition\n\tif err := mcfgv1.IsControllerConfigCompleted(ctrlcommon.ControllerConfigName, ctrl.ccLister.Get); err != nil {\n\t\treturn err\n\t}\n\n\tmcs, err := ctrl.mcLister.List(selector)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif len(mcs) == 0 {\n\t\treturn ctrl.syncFailingStatus(pool, fmt.Errorf(\"no MachineConfigs found matching selector %v\", selector))\n\t}\n\n\tif err := ctrl.syncGeneratedMachineConfig(pool, mcs); err != nil {\n\t\treturn ctrl.syncFailingStatus(pool, err)\n\t}\n\n\treturn ctrl.syncAvailableStatus(pool)\n}", "title": "" }, { "docid": "22c0057163c87b41e4a4805194cf245b", "score": "0.5151458", "text": "func (n *NodeController) Sync(objs []*kapi.Node) {}", "title": "" }, { "docid": "04de3450cfa9b7dec57e2eff91bbf4e5", "score": "0.5146556", "text": "func (pm *ProtocolManager) DoSyncMinerStatus(p *peer) {\n\tpm.Log.Noise(\"p2p sync miner status\")\n\tif atomic.LoadUint32(&pm.currentStatus) > 0 {\n\t\treturn // 正在同步状态,返回\n\t}\n\tpeerone := pm.peers.Len() == 1\n\tblkhash, peer_height := p.Head()\n\tif bytes.Compare(pm.miner.State.CurrentBlockHash(), blkhash) == 0 {\n\t\tpm.Log.News(\"all block status is sync ok, peer head match\")\n\t\tif peerone { // 开始挖矿\n\t\t\tpm.Log.Note(\"start mining ...\")\n\t\t\tpm.miner.StartMining()\n\t\t} else {\n\n\t\t}\n\t\treturn // 状态一致,不需要同步\n\t}\n\tself_height := pm.miner.State.CurrentHeight()\n\tif peer_height <= self_height {\n\t\tpm.Log.News(\"all block status is sync ok, peer height less than or equal with me\")\n\t\tif peerone { // 开始挖矿\n\t\t\tpm.Log.Note(\"start mining ...\")\n\t\t\tpm.miner.StartMining()\n\t\t}\n\t\treturn // 高度小于我,或各自在一条高度相同的分叉上,不需要同步,等待下一个区块的出现\n\t}\n\t// 对方区块高度大于我,开始同步\n\tpm.miner.StopMining() // 停止挖矿\n\tmatch_height, err := pm.checkBlockFork(p, peer_height, self_height)\n\tpm.Log.Note(\"peer\", p.Name(), \"height\", peer_height, \"more than me height\", self_height, \"to check block fork and sync blocks, match_height:\", match_height)\n\tif err != nil {\n\t\tpm.regainStatusToSimple() // 恢复状态\n\t\tpm.Log.Note(\"start mining ...\")\n\t\tpm.miner.StartMining() // 开始挖矿\n\t\tpm.Log.Error(\"check block fork error:\", err)\n\t\treturn\n\t}\n\tvar backblks []block.Block\n\tif match_height < self_height {\n\t\t// 回退区块\n\t\tpm.Log.Note(\"deal fork back chain block height from\", self_height, \"to\", match_height)\n\t\tbackblks, err = pm.miner.BackTheWorldToHeight(match_height)\n\t\tif err != nil {\n\t\t\tpm.Log.Error(\"check block fork back to height\", match_height, \"error:\", err)\n\t\t}\n\t}\n\n\t// 同步区块\n\terr = pm.syncBlocksFormPeer(p, match_height+1, peer_height)\n\tif err != nil {\n\t\tpm.Log.Error(\"check block fork sync blocks form peer\", p.Name(), \"error:\", err)\n\t\t// 重新插入 恢复区块\n\t\tpm.miner.BackTheWorldToHeight(match_height)\n\t\tpm.miner.InsertBlocks(backblks)\n\t}\n\t// 同步区块完成,开始挖矿\n\tpm.regainStatusToSimple() // 恢复状态\n\tpm.Log.Note(\"start mining ...\")\n\tpm.miner.StartMining()\n\n}", "title": "" }, { "docid": "99b764aad0ac8ccc6c36b428a9663944", "score": "0.5134325", "text": "func (sp *syncPartition) loop() {\n\t// send request for the missing messages\n\t// get node with the highest message\n\tmaxID, nodeID := sp.maxIDNode()\n\n\tpartitionName := sp.localPartition.Name()\n\tcmsg, err := sp.synchronizer.cluster.newEncoderMessage(mtSyncMessageRequest, &syncMessageRequest{\n\t\tPartition: partitionName,\n\t\tStartID: sp.lastID,\n\t\tEndID: maxID,\n\t})\n\tif err != nil {\n\t\tsp.synchronizer.logger.WithError(err).Error(\"Error creating sync message request\")\n\t\treturn\n\t}\n\n\terr = sp.synchronizer.cluster.sendMessageToNodeID(nodeID, cmsg)\n\tif err != nil {\n\t\tsp.synchronizer.logger.WithError(err).WithFields(log.Fields{\n\t\t\t\"nodeID\": nodeID,\n\t\t\t\"StartID\": sp.lastID,\n\t\t\t\"EndID\": maxID,\n\t\t}).Error(\"Error sending sync message request to node\")\n\t\treturn\n\t}\n\n\tfor {\n\t\t// wait to receive the message\n\t\t// end the loop in case we are stopping the process or we finished synchronizing\n\t\tselect {\n\t\tcase sm := <-sp.processC:\n\t\t\terr := sp.synchronizer.store.Store(partitionName, sm.ID, sm.Message)\n\t\t\tif err != nil {\n\t\t\t\tsp.synchronizer.logger.WithError(err).\n\t\t\t\t\tWithField(\"messageID\", sm.ID).\n\t\t\t\t\tError(\"Error storing synchronize message\")\n\t\t\t}\n\n\t\t\t// end loop if we reached the end\n\t\t\tsp.lastID = sm.ID\n\t\t\tif sm.ID >= maxID {\n\t\t\t\treturn\n\t\t\t}\n\t\tcase <-sp.synchronizer.stopC:\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7b99216ce490c966349f1972753fb8c7", "score": "0.51279944", "text": "func TestFromSyncedToNotSynced(t *testing.T) {\n\tlg := logtest.New(t).WithName(\"syncer\")\n\tticker := newMockLayerTicker()\n\tmf := newMockFetcher()\n\tmm := newMemMesh(t, lg)\n\tsyncer := newSyncerWithoutSyncTimer(context.TODO(), t, conf, ticker, mm, mf, lg)\n\tsyncedCh := make(chan struct{})\n\tsyncer.RegisterChForSynced(context.TODO(), syncedCh)\n\tassert.False(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\tsyncer.Start(context.TODO())\n\tt.Cleanup(func() {\n\t\tsyncer.Close()\n\t})\n\n\t// the node is synced when it starts syncing when current layer is 0\n\tvar wg sync.WaitGroup\n\twg.Add(1)\n\tgo func() {\n\t\tassert.True(t, syncer.synchronize(context.TODO()))\n\t\twg.Done()\n\t}()\n\t<-syncedCh\n\tassert.True(t, syncer.IsSynced(context.TODO()))\n\t// wait for the first synchronize to finish\n\twg.Wait()\n\n\t// cause the syncer to get out of synced and then wait again\n\tfirstLayer := types.GetEffectiveGenesis().Add(1)\n\tcurrent := mm.LatestLayer().Add(outOfSyncThreshold)\n\tticker.advanceToLayer(current)\n\twg.Add(1)\n\tgo func() {\n\t\tassert.True(t, syncer.synchronize(context.TODO()))\n\t\twg.Done()\n\t}()\n\t// wait till firstLayer's content is requested to check whether sync state has changed\n\t<-mf.getLayerPollChan(firstLayer)\n\t// the node should realize it's behind now and set the node to be notSynced\n\tassert.False(t, syncer.stateOnTarget())\n\tassert.False(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\n\tfeedLayerResult(firstLayer, current.Sub(1), mf, mm)\n\twg.Wait()\n\t// node should be in gossip sync state\n\tassert.True(t, syncer.stateOnTarget())\n\tassert.True(t, syncer.ListenToGossip())\n\tassert.False(t, syncer.IsSynced(context.TODO()))\n\n\twaitOutGossipSync(t, current, syncer, ticker, mf, mm)\n}", "title": "" }, { "docid": "33000a884ee50ff9859b4595e0a0f4b1", "score": "0.51134497", "text": "func defaultCheck(ctx context.Context, c *bee.Cluster, o Options) error {\n\tfmt.Println(\"running pushsync\")\n\trnds := random.PseudoGenerators(o.Seed, o.UploadNodeCount)\n\tfmt.Printf(\"seed: %d\\n\", o.Seed)\n\n\tif o.MetricsPusher != nil {\n\t\to.MetricsPusher.Collector(uploadedCounter)\n\t\to.MetricsPusher.Collector(uploadTimeGauge)\n\t\to.MetricsPusher.Collector(uploadTimeHistogram)\n\t\to.MetricsPusher.Collector(syncedCounter)\n\t\to.MetricsPusher.Collector(notSyncedCounter)\n\t\to.MetricsPusher.Format(expfmt.FmtText)\n\t}\n\n\toverlays, err := c.FlattenOverlays(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tclients, err := c.NodesClients(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsortedNodes := c.NodeNames()\n\tfor i := 0; i < o.UploadNodeCount; i++ {\n\n\t\tnodeName := sortedNodes[i]\n\t\tclient := clients[nodeName]\n\n\t\tbatchID, err := client.GetOrCreateBatch(ctx, o.PostageAmount, o.PostageDepth, o.GasPrice, o.PostageLabel)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"node %s: batch id %w\", nodeName, err)\n\t\t}\n\t\tfmt.Printf(\"node %s: batch id %s\\n\", nodeName, batchID)\n\t\ttime.Sleep(o.PostageWait)\n\n\t\tfor j := 0; j < o.ChunksPerNode; j++ {\n\t\t\tchunk, err := bee.NewRandomChunk(rnds[i])\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"node %s: %w\", nodeName, err)\n\t\t\t}\n\n\t\t\tt0 := time.Now()\n\t\t\taddr, err := client.UploadChunk(ctx, chunk.Data(), api.UploadOptions{Pin: false, BatchID: batchID})\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"node %s: %w\", nodeName, err)\n\t\t\t}\n\t\t\td0 := time.Since(t0)\n\t\t\tfmt.Printf(\"uploaded chunk %s to node %s\\n\", addr.String(), nodeName)\n\n\t\t\tuploadedCounter.WithLabelValues(overlays[nodeName].String()).Inc()\n\t\t\tuploadTimeGauge.WithLabelValues(overlays[nodeName].String(), addr.String()).Set(d0.Seconds())\n\t\t\tuploadTimeHistogram.Observe(d0.Seconds())\n\n\t\t\tclosestName, closestAddress, err := chunk.ClosestNodeFromMap(overlays)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"node %s: %w\", nodeName, err)\n\t\t\t}\n\t\t\tfmt.Printf(\"closest node %s overlay %s\\n\", closestName, closestAddress)\n\n\t\t\tcheckRetryCount := 0\n\n\t\t\tfor {\n\t\t\t\tcheckRetryCount++\n\t\t\t\tif checkRetryCount > o.Retries {\n\t\t\t\t\treturn fmt.Errorf(\"exceeded number of retries\")\n\t\t\t\t}\n\n\t\t\t\ttime.Sleep(o.RetryDelay)\n\t\t\t\tnode := clients[closestName]\n\t\t\t\tsynced, err := node.HasChunk(ctx, addr)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"node %s: %w\", nodeName, err)\n\t\t\t\t}\n\t\t\t\tif !synced {\n\t\t\t\t\tnotSyncedCounter.WithLabelValues(overlays[nodeName].String()).Inc()\n\t\t\t\t\tfmt.Printf(\"node %s overlay %s chunk %s not found on the closest node. retrying...\\n\", closestName, overlays[closestName], addr.String())\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tsyncedCounter.WithLabelValues(overlays[nodeName].String()).Inc()\n\t\t\t\tfmt.Printf(\"node %s overlay %s chunk %s found on the closest node.\\n\", closestName, overlays[closestName], addr.String())\n\n\t\t\t\t// check succeeded\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tif o.MetricsPusher != nil {\n\t\t\t\tif err := o.MetricsPusher.Push(); err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"node %s: %v\", nodeName, err)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f641228346e5c30d00782f08814f1ac0", "score": "0.510561", "text": "func syncFilesToServer(files []savegame) {\n\tfor _, f := range files {\n\t\tc, err := net.Dial(\"tcp\", syncServer)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\n\t\tfmt.Println(\"Syncing\", f.Name(), \"to the server...\")\n\n\t\tzipFilename := \"minesync_\" + strings.ReplaceAll(f.Name(), \" \", \"_\") + \".zip\"\n\t\tzipFile := os.TempDir() + zipFilename\n\t\tif err := zipSavegame(f, zipFile); err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn\n\t\t}\n\n\t\tdata, err := ioutil.ReadFile(zipFile)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn\n\t\t}\n\n\t\tgob.NewEncoder(c).Encode(syncObject{zipFilename, data})\n\n\t\tif err := os.Remove(zipFile); err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1e6aa0807651ce91362df9e3978911b5", "score": "0.5098947", "text": "func TestSyncer_GarbageCollect(t *testing.T) {\n\tdir, err := ioutil.TempDir(\"\", \"test-syncer\")\n\ttestutil.Ok(t, err)\n\tdefer os.RemoveAll(dir)\n\n\tbkt, cleanup, err := testutil.NewObjectStoreBucket(t)\n\ttestutil.Ok(t, err)\n\tdefer cleanup()\n\n\tctx, cancel := context.WithTimeout(context.Background(), 120*time.Second)\n\tdefer cancel()\n\n\t// Generate 10 source block metas and construct higher level blocks\n\t// that are higher compactions of them.\n\trandr := rand.New(rand.NewSource(0))\n\tvar metas []*block.Meta\n\tvar ids []ulid.ULID\n\n\tfor i := 0; i < 10; i++ {\n\t\tvar m block.Meta\n\n\t\tid, err := ulid.New(0, randr)\n\t\ttestutil.Ok(t, err)\n\n\t\tm.Version = 1\n\t\tm.ULID = id\n\t\tm.Compaction.Sources = []ulid.ULID{id}\n\t\tm.Compaction.Level = 1\n\n\t\tids = append(ids, id)\n\t\tmetas = append(metas, &m)\n\t}\n\n\tid1, err := ulid.New(100, randr)\n\ttestutil.Ok(t, err)\n\n\tvar m1 block.Meta\n\tm1.Version = 1\n\tm1.ULID = id1\n\tm1.Compaction.Level = 2\n\tm1.Compaction.Sources = ids[:4]\n\n\tid2, err := ulid.New(200, randr)\n\ttestutil.Ok(t, err)\n\n\tvar m2 block.Meta\n\tm2.Version = 1\n\tm2.ULID = id2\n\tm2.Compaction.Level = 2\n\tm2.Compaction.Sources = ids[4:8] // last two source IDs is not part of a level 2 block.\n\n\tid3, err := ulid.New(300, randr)\n\ttestutil.Ok(t, err)\n\n\tvar m3 block.Meta\n\tm3.Version = 1\n\tm3.ULID = id3\n\tm3.Compaction.Level = 3\n\tm3.Compaction.Sources = ids[:9] // last source ID is not part of level 3 block.\n\n\tmetas = append(metas, &m1, &m2, &m3)\n\n\t// Create all blocks in the bucket.\n\tfor _, m := range metas {\n\t\tbdir := filepath.Join(dir, m.ULID.String())\n\t\ttestutil.Ok(t, os.MkdirAll(bdir, 0777))\n\t\ttestutil.Ok(t, block.WriteMetaFile(bdir, m))\n\t\ttestutil.Ok(t, objstore.UploadFile(ctx, bkt,\n\t\t\tpath.Join(bdir, \"meta.json\"),\n\t\t\tpath.Join(m.ULID.String(), \"meta.json\")))\n\t}\n\n\t// Do one initial synchronization with the bucket.\n\tsy, err := NewSyncer(nil, nil, dir, bkt, 0)\n\ttestutil.Ok(t, err)\n\ttestutil.Ok(t, sy.SyncMetas(ctx))\n\n\ttestutil.Ok(t, sy.GarbageCollect(ctx))\n\n\t// Only the level 3 block and the last source block should be left.\n\texp := []ulid.ULID{metas[9].ULID, metas[12].ULID}\n\n\tvar rem []ulid.ULID\n\terr = bkt.Iter(ctx, \"\", func(n string) error {\n\t\trem = append(rem, ulid.MustParse(n[:len(n)-1]))\n\t\treturn nil\n\t})\n\ttestutil.Ok(t, err)\n\n\tsort.Slice(rem, func(i, j int) bool {\n\t\treturn rem[i].Compare(rem[j]) < 0\n\t})\n\ttestutil.Equals(t, exp, rem)\n\n\t// After another sync the changes should also be reflected in the local groups.\n\ttestutil.Ok(t, sy.SyncMetas(ctx))\n\n\trem, err = sy.Groups()[0].IDs()\n\ttestutil.Ok(t, err)\n\ttestutil.Equals(t, exp, rem)\n}", "title": "" }, { "docid": "d17c7b382eb2b560d8cab4502e3ca61b", "score": "0.5097921", "text": "func commSet(cw *wconn.WrappedConn, meta j, data *[]byte) {\n\tkey := meta[\"key\"].(string)\n\n\t// Check if data exists in current node bag.\n\t// Set it if so.\n\tif _, i := bag.Get(key); i {\n\t\tattemptSet(cw, meta, data, true)\n\t\treturn\n\t}\n\n\t// Wait group to sync all nodes\n\twg := sync.WaitGroup{}\n\tlocalMux := sync.Mutex{}\n\tfound := false\n\tremainingNodes := 0\n\tcommID, _ := lib.GenerateRandomString(glob.COMM_ID_LENGTH)\n\n\t// check if it exists among other nodes bags\n\tfor _, n := range nodes.GetNodes() {\n\t\twg.Add(1)\n\t\tremainingNodes++\n\n\t\tfMsgID, _ := lib.GenerateRandomString(glob.MSG_ID_LENGTH)\n\n\t\t// Push callback into queue\n\t\tn.PushCB(fMsgID, func(fName string, fWc *wconn.WrappedConn, fMeta j, fData *[]byte) {\n\n\t\t\tif fName == fMeta[\"msgID\"].(string) {\n\n\t\t\t\tlocalMux.Lock()\n\t\t\t\tif fMeta[\"code\"].(float64) == glob.RES_SUCCESS && !found {\n\t\t\t\t\tfound = true\n\n\t\t\t\t\t// Generate new IDs\n\t\t\t\t\tcbMsgID, _ := lib.GenerateRandomString(glob.MSG_ID_LENGTH)\n\t\t\t\t\tcbCommID, _ := lib.GenerateRandomString(glob.COMM_ID_LENGTH)\n\n\t\t\t\t\t// in case it's ok\n\t\t\t\t\treplied := false\n\n\t\t\t\t\t// Push waiter callback\n\t\t\t\t\tfWc.PushCB(cbMsgID, func(nFName string, nFWc *wconn.WrappedConn, nFMeta j, nFData *[]byte) {\n\t\t\t\t\t\tif nFName == nFMeta[\"msgID\"].(string) {\n\t\t\t\t\t\t\tif nFMeta[\"code\"].(float64) == glob.RES_SUCCESS {\n\t\t\t\t\t\t\t\tcw.ReplyMsg(meta[\"msgID\"].(string), glob.RES_SUCCESS, nil, nil)\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\t// Due to asynchronism it is possible that one client from another node\n\t\t\t\t\t\t\t// deletes the key from that node after we send the get command AND BEFORE we send the set command.\n\t\t\t\t\t\t\t//\n\t\t\t\t\t\t\t// In which case it means we must set the key in our node bag.\n\t\t\t\t\t\t\tif nFMeta[\"code\"].(float64) == glob.RES_NOT_FOUND && !replied {\n\t\t\t\t\t\t\t\tattemptSet(cw, meta, data, true)\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tif nFMeta[\"code\"].(float64) == glob.RES_ERROR && !replied {\n\t\t\t\t\t\t\t\tattemptSet(cw, meta, data, false)\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tfWc.DelCB(nFName)\n\t\t\t\t\t\t\treplied = true\n\t\t\t\t\t\t}\n\t\t\t\t\t})\n\n\t\t\t\t\t// Send command to set it!\n\t\t\t\t\tfWc.Send(j{\n\t\t\t\t\t\t\"msgID\": cbMsgID,\n\t\t\t\t\t\t\"type\": \"comm\",\n\t\t\t\t\t\t\"commID\": cbCommID,\n\t\t\t\t\t\t\"comm\": \"set\",\n\t\t\t\t\t\t\"key\": key,\n\t\t\t\t\t}, data)\n\n\t\t\t\t\t// timeout handler\n\t\t\t\t\t// set the key in our node if no reply in mean time\n\t\t\t\t\tgo func() {\n\t\t\t\t\t\ttime.Sleep(glob.NODE_TO_NODE_RES_TIMEOUT * time.Millisecond)\n\n\t\t\t\t\t\tif !replied {\n\t\t\t\t\t\t\tattemptSet(cw, meta, data, true)\n\t\t\t\t\t\t}\n\t\t\t\t\t}()\n\t\t\t\t}\n\t\t\t\tlocalMux.Unlock()\n\n\t\t\t\twg.Done()\n\t\t\t\tn.DelCB(fName)\n\n\t\t\t\tlocalMux.Lock()\n\t\t\t\tdefer localMux.Unlock()\n\t\t\t\tremainingNodes--\n\t\t\t}\n\n\t\t})\n\n\t\t// Send command message to node\n\t\tn.PushComm(commID)\n\t\tn.Send(j{\n\t\t\t\"msgID\": fMsgID,\n\t\t\t\"type\": \"comm\",\n\t\t\t\"commID\": commID,\n\t\t\t\"comm\": \"get\",\n\t\t\t\"key\": key,\n\t\t}, nil)\n\t}\n\n\t// wait for all responses from all nodes\n\tgo func() {\n\t\twg.Wait()\n\n\t\tif !found {\n\t\t\tattemptSet(cw, meta, data, true)\n\t\t}\n\t}()\n\n\t// timeout func\n\t// it releases the waitgroup if timeout is encountered\n\tgo func() {\n\t\ttime.Sleep(glob.NODE_TO_NODE_RES_TIMEOUT * time.Millisecond)\n\n\t\tlocalMux.Lock()\n\t\tdefer localMux.Unlock()\n\n\t\tif remainingNodes > 0 {\n\t\t\tfor remainingNodes > 0 {\n\t\t\t\twg.Done()\n\t\t\t\tremainingNodes--\n\t\t\t}\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "ebbf6a95ad1cbaccd85286de2fb26119", "score": "0.5093073", "text": "func (w *syncWorker) Sync() {\n\tw.mu.Lock()\n\tdefer w.mu.Unlock()\n\n\tpeers := w.p2p.GetPeers()\n\tif len(peers) == 0 {\n\t\tlogger.Debug().Msg(\"No peer exist to sync with.\")\n\t\treturn\n\t}\n\tintervals := w.buf.GetBlocksIntervalsToSync(w.targetHeight)\n\tif intervals != nil {\n\t\tlogger.Info().Interface(\"intervals\", intervals).Uint64(\"targetHeight\", w.targetHeight).Msg(\"block sync intervals.\")\n\t\tfor _, interval := range intervals {\n\t\t\tw.rrIdx %= len(peers)\n\t\t\tp := peers[w.rrIdx]\n\t\t\tif err := w.sync(p, interval); err != nil {\n\t\t\t\tlogger.Warn().Err(err).Msg(\"Failed to sync block.\")\n\t\t\t}\n\t\t\tw.rrIdx++\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e5cb4954c86f10084b9988e35cfcd59e", "score": "0.50856197", "text": "func (pm *ProtocolManager) syncMinerStatus(p *peer) {\n\tpm.minersyncCh <- &minersync{p}\n}", "title": "" }, { "docid": "3f786668abcf7b0882dc1320c720371a", "score": "0.50767446", "text": "func FindRecordsNotInSync() {\n Logger.Info(\"Find records not in sync\")\n wg := new(sync.WaitGroup)\n\n // Channel to store unsync record's info, max 100000*50 = 5MB record info at a time\n recordInfoChan := make(chan string, 100000)\n\n // Open unsync_record_info log file to write found unsync records\n var file *os.File = nil\n if UnsyncRecInfoFile != \"\" {\n file, err = os.OpenFile(UnsyncRecInfoFile, os.O_APPEND|os.O_WRONLY, 0600)\n if err != nil {\n PanicOnError(err)\n }\n defer file.Close()\n }\n\n // Add progress indicator\n go func() {\n fmt.Printf(\"Progress\")\n for {\n fmt.Printf(\".\")\n time.Sleep(100*time.Millisecond)\n }\n }()\n\n // Get replication factor\n replFact := getReplicationFact(SrcClient, Namespace)\n if replFact == 0 {\n PanicOnError(errors.New(\"Coundn't get replication factor for NS: \" + Namespace + \". check Config.\"))\n }\n\n // Parsed sets Stats fetched from source aesospike server\n allSetStatsMap := getSetMap(SrcClient, Namespace)\n\n // Scan records from source and validate them by running\n // multiple validation threads \n for setname, statsMap := range allSetStatsMap {\n\n if Set != \"\" && Set != setname {\n continue\n }\n\n // It gives all objects so divide by repl factor\n nObj := getObjectCount(statsMap, Namespace)\n nObj = nObj / replFact\n if nObj == 0 {\n continue\n }\n\n // Update set stats\n SetStats[setname] = &TStats{}\n SetStats[setname].NObj = nObj\n\n sz := 0\n if SamplePer != 0 {\n sz = nObj * SamplePer / 100\n Logger.Info(\"Sample percentage given, Sample Size: \" + strconv.Itoa(sz))\n } else {\n sz = SampleSz\n Logger.Info(\"Sample percentage not given, Sample Size: \" + strconv.Itoa(sz))\n }\n\n SetStats[setname].NSampleObj = sz\n\n srcRecordset := getRecordset(SrcClient, Namespace, setname, BinList, ModAfter, ModBefore)\n\n // Run multiple thread to fetch records from queryRecordQueue\n // and validate those records to see if they are in sync or not\n for w := 0; w < FindSyncThread; w++ {\n wg.Add(1)\n\n go func(setname string) {\n defer wg.Done()\n\n validateAndFindInsertedUpdated(srcRecordset, setname, BinList, DstClient, recordInfoChan)\n }(setname)\n }\n }\n\n // Wait for completing all threads and closing recordInfoChan\n go func() {\n wg.Wait()\n close(recordInfoChan)\n }()\n\n // Continue looping if record info log file doesn't exist.\n // This has to wait for closing recordInfoChan\n fileLineCount := 0\n for r := range recordInfoChan {\n if UnsyncRecInfoFile == \"\" {\n continue\n }\n\n // 250MB file\n if fileLineCount == UNSYNC_REC_INFO_FILE_LINES_COUNT {\n file.Close()\n // Init new file\n InitUnsyncRecInfoFile()\n\n file, err = os.OpenFile(UnsyncRecInfoFile, os.O_APPEND|os.O_WRONLY, 0600)\n if err != nil {\n PanicOnError(err)\n }\n fileLineCount = 0\n }\n\n if _, err = file.WriteString(r); err != nil {\n PanicOnError(err)\n }\n fileLineCount++\n }\n\n defer file.Close()\n}", "title": "" }, { "docid": "29b50ec406266b0771a4b00808681a7d", "score": "0.50578165", "text": "func sync() error {\n\n\t// Query latest block height saved in database\n\tblock, err := document.Block{}.QueryLatestBlockFromDB()\n\tif err != nil {\n\t\tlogger.Error(\"Block not found\")\n\t}\n\n\tdbHeight := block.Height\n\tfmt.Println(dbHeight)\n\tif dbHeight == -1 {\n\t\tlog.Fatal(errors.Wrap(err, \"failed to query the latest block height saved in database\"))\n\t}\n\n\tlatestBlockHeight, err := client.GetLatestBlockHeight()\n\tif err != nil {\n\t\tlogger.Error(\"Not found block from lcd\", logger.String(\"err\", err.Error()))\n\t}\n\t// Synchronizing blocks from the scratch will return 0 and will ingest accordingly.\n\t// Skip the first block since it has no pre-commits\n\tif dbHeight == 0 {\n\t\tdbHeight = 5200790\n\t}\n\n\t// Ingest all blocks up to the latest height\n\tfor i := dbHeight + 1; i <= latestBlockHeight; i++ {\n\t\terr = process(i)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfmt.Printf(\"synced block %d/%d \\n\", i, latestBlockHeight)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "339a4255e0f7813e70d57ad4324ea6c5", "score": "0.5057253", "text": "func (bnc *BaseNetworkController) syncNsMulticast(k8sNamespaces map[string]bool) error {\n\t// to find namespaces that have multicast enabled, we need to find corresponding port groups.\n\t// since we can't filter multicast port groups specifically, find multicast ACLs, and then find\n\t// port groups they are referenced from.\n\tpredicateIDs := libovsdbops.NewDbObjectIDs(libovsdbops.ACLMulticastNamespace, bnc.controllerName, nil)\n\tmcastAclPred := libovsdbops.GetPredicate[*nbdb.ACL](predicateIDs, nil)\n\tmcastACLs, err := libovsdbops.FindACLsWithPredicate(bnc.nbClient, mcastAclPred)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to find multicast ACLs for namespaces: %v\", err)\n\t}\n\tif len(mcastACLs) == 0 {\n\t\treturn nil\n\t}\n\n\tmcastAclUUIDs := sets.Set[string]{}\n\tfor _, acl := range mcastACLs {\n\t\tmcastAclUUIDs.Insert(acl.UUID)\n\t}\n\tstaleNamespaces := []string{}\n\n\t// pg.ExternalIDs[\"name\"] contains namespace (and pg.Name has hashed namespace)\n\tpgPred := func(item *nbdb.PortGroup) bool {\n\t\tfor _, aclUUID := range item.ACLs {\n\t\t\tif mcastAclUUIDs.Has(aclUUID) {\n\t\t\t\t// add namespace to the stale list\n\t\t\t\tif !k8sNamespaces[item.ExternalIDs[\"name\"]] {\n\t\t\t\t\tstaleNamespaces = append(staleNamespaces, item.ExternalIDs[\"name\"])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn false\n\t}\n\t_, err = libovsdbops.FindPortGroupsWithPredicate(bnc.nbClient, pgPred)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to find multicast port groups: %v\", err)\n\t}\n\n\tfor _, staleNs := range staleNamespaces {\n\t\tif err = bnc.deleteMulticastAllowPolicy(bnc.nbClient, staleNs); err != nil {\n\t\t\treturn fmt.Errorf(\"unable to delete multicast allow policy for stale ns %s: %v\", staleNs, err)\n\t\t}\n\t}\n\tklog.Infof(\"Sync multicast removed ACLs for %d stale namespaces\", len(staleNamespaces))\n\n\treturn nil\n}", "title": "" }, { "docid": "a136aaf3de4266d08c0b0d12b2adfd1c", "score": "0.50459594", "text": "func testNotEnoughServersForQuorum(wg *sync.WaitGroup) {\n\n\tdefer wg.Done()\n\n\tlog.Println(\"\")\n\tlog.Println(\"**STARTING** testNotEnoughServersForQuorum\")\n\n\t// first kill half the quorum of servers\n\tfor k := len(servers) - 1; k >= n/2; k-- {\n\t\tcmd := servers[k]\n\t\tservers = servers[0:k]\n\t\tkillProcess(cmd)\n\t}\n\n\t// launch a new server after some time\n\tgo func() {\n\t\ttime.Sleep(7 * time.Second)\n\t\tlog.Println(\"Launching extra server\")\n\t\tservers = append(servers, launchTestServers(n/2, 1)...)\n\t}()\n\n\tdm := dsync.NewDRWMutex(\"test\")\n\n\tlog.Println(\"Trying to acquire lock but too few servers active...\")\n\tdm.Lock()\n\tlog.Println(\"Acquired lock\")\n\n\ttime.Sleep(2 * time.Second)\n\n\t// kill extra server (quorum not available anymore)\n\tlog.Println(\"Killing extra server\")\n\tcmd := servers[n/2]\n\tservers = servers[0 : n/2]\n\tkillProcess(cmd)\n\n\tdm.Unlock()\n\tlog.Println(\"Released lock\")\n\n\t// launch new server again after some time\n\tgo func() {\n\t\ttime.Sleep(5 * time.Second)\n\t\tlog.Println(\"Launching extra server again\")\n\t\tservers = append(servers, launchTestServers(n/2, 1)...)\n\t}()\n\n\tlog.Println(\"Trying to acquire lock again but too few servers active...\")\n\tdm.Lock()\n\tlog.Println(\"Acquired lock again\")\n\n\tdm.Unlock()\n\tlog.Println(\"Released lock\")\n\n\t// spin up servers again\n\tfor k := len(servers); k < n; k++ {\n\t\tservers = append(servers, launchTestServers(k, 1)...)\n\t}\n\n\tlog.Println(\"**PASSED** testNotEnoughServersForQuorum\")\n}", "title": "" }, { "docid": "65ec262667ab5bc97a8e3e4ffc7b2168", "score": "0.5044576", "text": "func syncFilesFromServer(files []save) {\n\tfmt.Println(\"Downloaded saves\")\n\tfor _, s := range files {\n\t\tc, err := net.Dial(\"tcp\", downloadServer)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn\n\t\t}\n\n\t\tgob.NewEncoder(c).Encode(s)\n\n\t\tdecoded := syncObject{}\n\t\tgob.NewDecoder(c).Decode(&decoded)\n\n\t\t// todo: write data to minecraft save folder and unzip\n\t\tfmt.Println(decoded.Name)\n\t}\n}", "title": "" }, { "docid": "6d0507cd470b2c493cd74fece0352b23", "score": "0.50350255", "text": "func (mgr *NetworkPodToNodeMapMgr) SyncNetworkPodToNodeMap() bool {\n\n\t// load the contiv ksr pod to node map\n\tcontivNetworkPodToNodeMapMap := make(map[string]*NetworkPodToNodeMap)\n\tmgr.loadAllFromDatastore(mgr.ContivKsrNetworkPodToNodePrefix(), contivNetworkPodToNodeMapMap)\n\n // copy the ram cache into a temp\n\ttempNetworkPodToNodeMapMap := make(map[string]*NetworkPodToNodeMap)\n\tfor pod, entry := range ctlrPlugin.ramCache.NetworkPodToNodeMap {\n\t\ttempNetworkPodToNodeMapMap[pod] = entry\n\t}\n\n\t// clear the ram map, put the config cache into it, then put the contiv into it\n\tctlrPlugin.ramCache.NetworkPodToNodeMap = nil\n\tctlrPlugin.ramCache.NetworkPodToNodeMap = make(map[string]*NetworkPodToNodeMap)\n\n\tfor pod, entry := range ctlrPlugin.NetworkPodNodeMapMgr.networkPodNodeCache {\n\t\tctlrPlugin.ramCache.NetworkPodToNodeMap[pod] = entry\n\t}\n\tfor pod, entry := range contivNetworkPodToNodeMapMap {\n\t\tctlrPlugin.ramCache.NetworkPodToNodeMap[pod] = entry\n\t}\n\n // the ram cache has now the most accurate info, compare to temp and if different, we should render\n\trenderingRequired := false\n\tif len(tempNetworkPodToNodeMapMap) != len(ctlrPlugin.ramCache.NetworkPodToNodeMap) {\n\t\trenderingRequired = true\n\t} else {\n\t\tfor _, entry := range tempNetworkPodToNodeMapMap {\n\t\t\tramEntry, exists := ctlrPlugin.ramCache.NetworkPodToNodeMap[entry.Pod]\n\t\t\tif !exists || !ramEntry.ConfigEqual(entry) {\n\t\t\t\tlog.Debugf(\"SyncNetworkPodToNodeMap: new config: %v\", entry)\n\t\t\t\trenderingRequired = true\n\t\t\t}\n\t\t}\n\t}\n\n\tif renderingRequired {\n\t\tlog.Debugf(\"SyncNetworkPodToNodeMap: rendering not required as no change in node-pod map\")\n\n\t\t//ctlrPlugin.AddOperationMsgToQueue(\"\", OperationalMsgOpCodeRender, nil)\n\t} else {\n\t\tlog.Debugf(\"SyncNetworkPodToNodeMap: rendering not required as no change in node-pod map\")\n\t}\n\n\treturn renderingRequired\n}", "title": "" }, { "docid": "dedfbb54aee39800aebeab648b56c633", "score": "0.50346065", "text": "func (me *mirrorConnections) tryConnect() {\n\t// We want to max out capacity of each worker, as that helps\n\t// with cache hit rates on the worker.\n\twanted := me.wantedMaxJobs - me.maxJobs()\n\tif wanted <= 0 {\n\t\treturn\n\t}\n\n\tfor {\n\t\taddr := me.idleWorkerAddress()\n\t\tif addr == \"\" {\n\t\t\tbreak\n\t\t}\n\t\tme.Mutex.Unlock()\n\t\tlog.Printf(\"Creating mirror on %v, requesting %d jobs\", addr, wanted)\n\t\tmc, err := me.master.createMirror(addr, wanted)\n\t\tme.Mutex.Lock()\n\t\tif err != nil {\n\t\t\tdelete(me.workers, addr)\n\t\t\tlog.Println(\"nonfatal error creating mirror:\", err)\n\t\t} else {\n\t\t\t// This could happen in the unlikely event of\n\t\t\t// the workers having more capacity than our\n\t\t\t// parallelism.\n\t\t\tif _, ok := me.mirrors[addr]; ok {\n\t\t\t\tlog.Panicf(\"already have this mirror: %v\", addr)\n\t\t\t}\n\t\t\tmc.workerAddr = addr\n\t\t\tme.mirrors[addr] = mc\n\t\t\tme.master.attributes.AddClient(mc)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "748fce4c856603c38696b1e8d6173175", "score": "0.5034079", "text": "func (s *service) SyncNodeInfo(id int64) error {\n\tmgr, err := s.GetManager(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tjobtypes := []pb.JobType{}\n\tfor _, jt := range mgr.JobTypes {\n\t\tswitch jt {\n\t\tcase JobTypeFluxMonitor:\n\t\t\tjobtypes = append(jobtypes, pb.JobType_JOB_TYPE_FLUX_MONITOR)\n\t\tcase JobTypeOffchainReporting:\n\t\t\tjobtypes = append(jobtypes, pb.JobType_JOB_TYPE_OCR)\n\t\tdefault:\n\t\t\t// NOOP\n\t\t}\n\t}\n\n\tkeys, err := s.ethKeyStore.SendingKeys()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\taddresses := []string{}\n\tfor _, k := range keys {\n\t\taddresses = append(addresses, k.Address.String())\n\t}\n\n\tnodeVer, err := s.verORM.FindLatestNodeVersion()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"could not get latest node verion\")\n\t}\n\n\t// Make the remote call to FMS\n\tfmsClient, err := s.connMgr.GetClient(id)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"could not fetch client\")\n\t}\n\n\t// TODO: Update to support multiple chains\n\t// See: https://app.clubhouse.io/chainlinklabs/story/14615/add-ability-to-set-chain-id-in-all-pipeline-tasks-that-interact-with-evm\n\t_, err = fmsClient.UpdateNode(context.Background(), &pb.UpdateNodeRequest{\n\t\tJobTypes: jobtypes,\n\t\t// ChainID is deprecated but we still need to pass it in for backwards\n\t\t// compatability. We now use ChainIds in order to support multichain.\n\t\t//\n\t\t// We can remove it once the Feeds Manager has been updated and released\n\t\t// https://app.clubhouse.io/chainlinklabs/story/14983/support-multichain-nodes\n\t\tChainId: s.cfg.ChainID().Int64(),\n\t\tChainIds: []int64{s.cfg.ChainID().Int64()},\n\t\tAccountAddresses: addresses,\n\t\tIsBootstrapPeer: mgr.IsOCRBootstrapPeer,\n\t\tBootstrapMultiaddr: mgr.OCRBootstrapPeerMultiaddr.ValueOrZero(),\n\t\tVersion: nodeVer.Version,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "157e0ac73b06092b9aba461a0d96234f", "score": "0.501989", "text": "func launchServers(numW int) {\n\tnumWorkers = numW\n\n\tvar mrData MasterData\n\tmrData.numWorkers = numWorkers\n\tmrData.request = make([]chan ModelConfig, mrData.numWorkers) // worker <- master : for task assignment\n\tmrData.commands = make([]chan string, mrData.numWorkers) // master -> worker : master sends commands\n\tmrData.replies = make([]chan string, mrData.numWorkers) // master <- worker : worker reply for task completion\n\tmrData.corpses = make(chan []bool, mrData.numWorkers) // master <- heartbeat : workers that have died\n\tmrData.working = make([]string, mrData.numWorkers) // which tasks assigned to which workers\n\tmrData.training = make([]chan [][][]float64, mrData.numWorkers)\n\tmrData.test = make([]chan [][][]float64, mrData.numWorkers)\n\n\tvar hb1 = make([]chan [][]int64, mrData.numWorkers+3) // heartbeat channels to neighbors for read\n\tvar hb2 = make([]chan [][]int64, mrData.numWorkers+3) // heartbeat channels to neighbors for write\n\tkillMaster := make(chan string, 10) // channel to kill Master to verify replication and recovery from log\n\n\t// initialize heartbeat tables\n\tfor i := 0; i < mrData.numWorkers+3; i++ {\n\t\thb1[i] = make(chan [][]int64, 1024)\n\t\thb2[i] = make(chan [][]int64, 1024)\n\t}\n\tmrData.hb1 = hb1\n\tmrData.hb2 = hb2\n\n\t// initialize worker channels\n\tfor k := 0; k < mrData.numWorkers; k++ {\n\t\tmrData.request[k] = make(chan ModelConfig)\n\t\tmrData.replies[k] = make(chan string)\n\t\tmrData.working[k] = \"\"\n\t\tmrData.commands[k] = make(chan string)\n\t\tmrData.training[k] = make(chan [][][]float64)\n\t\tmrData.test[k] = make(chan [][][]float64)\n\t}\n\n\t// initialize shadowMasters\n\tnumShadowMasters := 2\n\n\t// channel shadowMaster <- master : replication\n\tmrData.toShadowMasters = make([]chan string, numShadowMasters)\n\tfor j := 0; j < numShadowMasters; j++ {\n\t\tmrData.toShadowMasters[j] = make(chan string, 10)\n\t}\n\n\tfor i := 0; i < windowData.ModelCount; i++ {\n\t\tif windowData.Models[i].Name != \"\" {\n\t\t\tvanilla := windowData.Models[i]\n\t\t\tvanilla.ModelID = i * 7\n\t\t\tmrData.models = append(mrData.models, vanilla)\n\n\t\t\tdoubleEpoch := windowData.Models[i]\n\t\t\tdoubleEpoch.NumEpochs *= 2\n\t\t\tdoubleEpoch.ModelID = (i * 7) + 1\n\t\t\tmrData.models = append(mrData.models, doubleEpoch)\n\n\t\t\thalfEpoch := windowData.Models[i]\n\t\t\thalfEpoch.NumEpochs /= 2\n\t\t\thalfEpoch.ModelID = (i * 7) + 2\n\t\t\tmrData.models = append(mrData.models, halfEpoch)\n\n\t\t\tdoubleLearningRate := windowData.Models[i]\n\t\t\tdoubleLearningRate.LearningRate *= 2\n\t\t\tdoubleLearningRate.ModelID = (i * 7) + 3\n\t\t\tmrData.models = append(mrData.models, doubleLearningRate)\n\n\t\t\thalfLearningRate := windowData.Models[i]\n\t\t\thalfLearningRate.LearningRate /= 2\n\t\t\thalfLearningRate.ModelID = (i * 7) + 4\n\t\t\tmrData.models = append(mrData.models, halfLearningRate)\n\n\t\t\tdoubleMomentum := windowData.Models[i]\n\t\t\tdoubleMomentum.Momentum *= 2\n\t\t\tdoubleMomentum.ModelID = (i * 7) + 5\n\t\t\tmrData.models = append(mrData.models, doubleMomentum)\n\n\t\t\thalfMomentum := windowData.Models[i]\n\t\t\thalfMomentum.Momentum /= 2\n\t\t\thalfMomentum.ModelID = (i * 7) + 6\n\t\t\tmrData.models = append(mrData.models, halfMomentum)\n\t\t}\n\t}\n\n\t// start nodes\n\tmasterlog := make([]string, 0)\n\tvar endrun = make(chan string)\n\tgo master(mrData, hb1, hb2, masterlog, killMaster, endrun)\n\n\tgo shadowMaster(mrData.toShadowMasters[0], hb1, hb2, mrData.numWorkers, mrData.numWorkers+1, mrData, killMaster)\n\n\tgo shadowMaster(mrData.toShadowMasters[1], hb1, hb2, mrData.numWorkers, mrData.numWorkers+2, mrData, killMaster)\n\n\tfor {\n\t\tselect {\n\t\tcase reply := <-endrun:\n\t\t\tif reply == \"end\" {\n\t\t\t\tui.QueueMain(func() {\n\t\t\t\t\tpbar.SetValue(0)\n\t\t\t\t})\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "91574e93f9c141cde117349b61c5df16", "score": "0.5014933", "text": "func (node *Node) check(ctx context.Context) error {\r\n\tif !node.state.VersionReceived() {\r\n\t\treturn nil // Still performing handshake\r\n\t}\r\n\r\n\tif !node.state.HandshakeComplete() {\r\n\t\t// Send header request to kick off sync\r\n\t\theaderRequest, err := buildHeaderRequest(ctx, node.state.ProtocolVersion(), node.blocks,\r\n\t\t\tnode.state, 0, 50)\r\n\t\tif err != nil {\r\n\t\t\treturn err\r\n\t\t}\r\n\r\n\t\tif node.queueOutgoing(headerRequest) {\r\n\t\t\tlogger.Verbose(ctx, \"Requesting headers\")\r\n\t\t\tnode.state.MarkHeadersRequested()\r\n\t\t\tnode.state.SetHandshakeComplete()\r\n\t\t}\r\n\t}\r\n\r\n\t// Check sync\r\n\tif node.state.IsReady() {\r\n\t\tnode.attempts = 0\r\n\r\n\t\tif !node.state.SentSendHeaders() {\r\n\t\t\t// Send sendheaders message to get headers instead of block inventories.\r\n\t\t\tsendheaders := wire.NewMsgSendHeaders()\r\n\t\t\tif node.queueOutgoing(sendheaders) {\r\n\t\t\t\tnode.state.SetSentSendHeaders()\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\tif !node.state.AddressesRequested() {\r\n\t\t\taddresses := wire.NewMsgGetAddr()\r\n\t\t\tif node.queueOutgoing(addresses) {\r\n\t\t\t\tnode.state.SetAddressesRequested()\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\tif node.config.RequestMempool && !node.state.MemPoolRequested() {\r\n\t\t\t// Send mempool request\r\n\t\t\t// This tells the peer to send inventory of all tx in their mempool.\r\n\t\t\tmempool := wire.NewMsgMemPool()\r\n\t\t\tif node.queueOutgoing(mempool) {\r\n\t\t\t\tnode.state.SetMemPoolRequested()\r\n\t\t\t}\r\n\t\t} else {\r\n\t\t\tif !node.state.WasInSync() {\r\n\t\t\t\tnode.reorgs.ClearActive(ctx)\r\n\t\t\t\tnode.state.SetWasInSync()\r\n\t\t\t}\r\n\r\n\t\t\tif !node.state.NotifiedSync() {\r\n\t\t\t\t// TODO Add method to wait for mempool to sync\r\n\t\t\t\tfor _, handler := range node.handlers {\r\n\t\t\t\t\thandler.HandleInSync(ctx)\r\n\t\t\t\t}\r\n\t\t\t\tnode.state.SetNotifiedSync()\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\tif err := node.txTracker.Check(ctx, node.memPool, node); err != nil {\r\n\t\t\treturn err\r\n\t\t}\r\n\t\tif node.isStopping() {\r\n\t\t\treturn nil\r\n\t\t}\r\n\t} else if node.state.HeadersRequested() == nil && node.state.TotalBlockRequestCount() < 5 {\r\n\t\t// Request more headers\r\n\t\theaderRequest, err := buildHeaderRequest(ctx, node.state.ProtocolVersion(), node.blocks,\r\n\t\t\tnode.state, 1, 50)\r\n\t\tif err != nil {\r\n\t\t\treturn err\r\n\t\t}\r\n\r\n\t\tif node.queueOutgoing(headerRequest) {\r\n\t\t\tlogger.Verbose(ctx, \"Requesting headers after : %s\",\r\n\t\t\t\theaderRequest.BlockLocatorHashes[0])\r\n\t\t\tnode.state.MarkHeadersRequested()\r\n\t\t}\r\n\t}\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "991e2d5afae8d06aa4b228fb39aaad85", "score": "0.5011175", "text": "func (m *mempool) LoadMempool() error {\n\ttxs, err := m.client.GetRawMempool()\n\tif err != nil {\n\t\tlog.Errorf(\"Unable to get raw mempool txs: %v\", err)\n\t\treturn err\n\t}\n\n\tm.Lock()\n\tdefer m.Unlock()\n\n\tfor _, txHash := range txs {\n\t\t// Grab full mempool transaction from hash.\n\t\ttx, err := m.client.GetRawTransaction(txHash)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"unable to fetch transaction %s for \"+\n\t\t\t\t\"mempool: %v\", txHash, err)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Add the transaction to our local mempool.\n\t\tm.add(tx.MsgTx())\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b83c245e070baa6ce4f9c4e64bdf1f44", "score": "0.5009264", "text": "func (sc *statusController) waitSync() {\n\t// wait for the min sync period time to elapse if needed.\n\twait := time.After(time.Until(sc.lastSyncStart.Add(sc.config().Tide.StatusUpdatePeriod.Duration)))\n\tfor {\n\t\tselect {\n\t\tcase <-wait:\n\t\t\tsc.statusUpdate.Lock()\n\t\t\tpool := sc.poolPRs\n\t\t\tblocks := sc.blocks\n\t\t\tbaseSHAs := sc.baseSHAs\n\t\t\tif baseSHAs == nil {\n\t\t\t\tbaseSHAs = map[string]string{}\n\t\t\t}\n\t\t\trequiredContexts := sc.requiredContexts\n\t\t\tsc.statusUpdate.Unlock()\n\t\t\tsc.sync(pool, blocks, baseSHAs, requiredContexts)\n\t\t\treturn\n\t\tcase more := <-sc.newPoolPending:\n\t\t\tif !more {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fe08c00e288f59a6e0ab6b126851ed3f", "score": "0.50077397", "text": "func (l *Ledger) SyncToLatestBlock() { // nolint:gocyclo,gocognit\n\tvoteWG := new(sync.WaitGroup)\n\n\tsnowballK := conf.GetSnowballK()\n\tsyncVotes := make(chan *syncVote, snowballK)\n\n\tlogger := log.Sync(\"sync\")\n\n\tgo CollectVotesForSync(l.accounts, l.syncer, syncVotes, voteWG, snowballK)\n\n\tsyncTimeoutMultiplier := 0\n\n\tfor {\n\t\tfor {\n\t\t\ttime.Sleep(5 * time.Millisecond)\n\n\t\t\tpeers, err := SelectPeers(l.client.ClosestPeers(), snowballK)\n\t\t\tif err != nil {\n\t\t\t\t<-time.After(1 * time.Second)\n\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tcurrent := l.blocks.Latest()\n\n\t\t\tvar wg sync.WaitGroup\n\n\t\t\twg.Add(len(peers))\n\n\t\t\tfor _, p := range peers {\n\t\t\t\tgo func(conn *grpc.ClientConn) {\n\t\t\t\t\tclient := NewWaveletClient(conn)\n\n\t\t\t\t\tctx, cancel := context.WithTimeout(context.Background(), conf.GetCheckOutOfSyncTimeout())\n\n\t\t\t\t\tp := &peer.Peer{}\n\n\t\t\t\t\tres, err := client.CheckOutOfSync(\n\t\t\t\t\t\tctx,\n\t\t\t\t\t\t&OutOfSyncRequest{BlockIndex: current.Index},\n\t\t\t\t\t\tgrpc.Peer(p),\n\t\t\t\t\t)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlogger.Error().\n\t\t\t\t\t\t\tErr(err).\n\t\t\t\t\t\t\tMsgf(\"error while checking out of sync with %v\", p.Addr)\n\n\t\t\t\t\t\tcancel()\n\t\t\t\t\t\twg.Done()\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\tcancel()\n\n\t\t\t\t\tinfo := noise.InfoFromPeer(p)\n\t\t\t\t\tif info == nil {\n\t\t\t\t\t\twg.Done()\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\tvoter, ok := info.Get(skademlia.KeyID).(*skademlia.ID)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\twg.Done()\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\tsyncVotes <- &syncVote{voter: voter, outOfSync: res.OutOfSync}\n\n\t\t\t\t\twg.Done()\n\t\t\t\t}(p.Conn())\n\t\t\t}\n\n\t\t\twg.Wait()\n\n\t\t\tif l.syncer.Decided() {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\t// Reset syncing Snowball sampler. Check if it is a false alarm such that we don't have to sync.\n\n\t\tcurrent := l.blocks.Latest()\n\t\tpreferred := l.syncer.Preferred()\n\n\t\toos := *preferred.Value().(*bool)\n\t\tif !oos {\n\t\t\tl.applySync(synced)\n\t\t\tl.syncer.Reset()\n\n\t\t\tif syncTimeoutMultiplier < 60 {\n\t\t\t\tsyncTimeoutMultiplier++\n\t\t\t}\n\n\t\t\t//logger.Debug().Msgf(\"Not out of sync, sleeping %d seconds\", syncTimeoutMultiplier)\n\n\t\t\ttime.Sleep(time.Duration(syncTimeoutMultiplier) * time.Second)\n\n\t\t\tcontinue\n\t\t}\n\n\t\tl.setSync(outOfSync)\n\n\t\tsyncTimeoutMultiplier = 0\n\n\t\tshutdown := func() {\n\t\t\tclose(l.sync)\n\t\t\tl.consensus.Wait() // Wait for all consensus-related workers to shutdown.\n\n\t\t\tvoteWG.Add(1)\n\t\t\tclose(syncVotes)\n\t\t\tvoteWG.Wait() // Wait for the vote processor worker to shutdown.\n\n\t\t\tl.finalizer.Reset() // Reset consensus Snowball sampler.\n\t\t\tl.syncer.Reset() // Reset syncing Snowball sampler.\n\t\t}\n\n\t\trestart := func() { // Respawn all previously stopped workers.\n\t\t\tsnowballK = conf.GetSnowballK()\n\n\t\t\tsyncVotes = make(chan *syncVote, snowballK)\n\t\t\tgo CollectVotesForSync(l.accounts, l.syncer, syncVotes, voteWG, snowballK)\n\n\t\t\tl.sync = make(chan struct{})\n\t\t\tl.PerformConsensus()\n\t\t}\n\n\t\tshutdown() // Shutdown all consensus-related workers.\n\n\t\tlogger.Info().\n\t\t\tUint64(\"current_block_index\", current.Index).\n\t\t\tMsg(\"Noticed that we are out of sync; downloading latest state Snapshot from our peer(s).\")\n\n\tSYNC:\n\t\tpeers, err := SelectPeers(l.client.ClosestPeers(), conf.GetSnowballK())\n\n\t\tif err != nil {\n\t\t\tlogger.Warn().Msg(\"It looks like there are no peers for us to sync with. Retrying...\")\n\n\t\t\ttime.Sleep(1 * time.Second)\n\n\t\t\tgoto SYNC\n\t\t}\n\n\t\treq := &SyncRequest{Data: &SyncRequest_BlockId{BlockId: current.Index}}\n\n\t\ttype response struct {\n\t\t\theader *SyncInfo\n\t\t\tlatest Block\n\t\t\tstream Wavelet_SyncClient\n\t\t}\n\n\t\tresponses := make([]response, 0, len(peers))\n\n\t\tfor _, p := range peers {\n\t\t\tstream, err := NewWaveletClient(p.Conn()).Sync(context.Background())\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif err := stream.Send(req); err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tres, err := stream.Recv()\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\theader := res.GetHeader()\n\n\t\t\tif header == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tlatest, err := UnmarshalBlock(bytes.NewReader(header.Block))\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif latest.Index == 0 || len(header.Checksums) == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tresponses = append(responses, response{header: header, latest: latest, stream: stream})\n\t\t}\n\n\t\tif len(responses) == 0 {\n\t\t\tgoto SYNC\n\t\t}\n\n\t\tdispose := func() {\n\t\t\tfor _, res := range responses {\n\t\t\t\tif err := res.stream.CloseSend(); err != nil {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tset := make(map[uint64][]response)\n\n\t\tfor _, v := range responses {\n\t\t\tset[v.latest.Index] = append(set[v.latest.Index], v)\n\t\t}\n\n\t\t// Select a block to sync to which the majority of peers are on.\n\n\t\tvar (\n\t\t\tlatest *Block\n\t\t\tmajority []response\n\t\t)\n\n\t\tfor _, votes := range set {\n\t\t\tif len(votes) >= len(set)*2/3 {\n\t\t\t\tlatest = &votes[0].latest\n\t\t\t\tmajority = votes\n\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\t// If there is no majority or a tie, dispose all streams and try again.\n\n\t\tif majority == nil {\n\t\t\tlogger.Warn().Msg(\"It looks like our peers could not decide on what the latest block currently is. Retrying...\")\n\n\t\t\tdispose()\n\n\t\t\tgoto SYNC\n\t\t}\n\n\t\tlogger.Debug().\n\t\t\tUint64(\"block_id\", latest.Index).\n\t\t\tHex(\"merkle_root\", latest.Merkle[:]).\n\t\t\tMsg(\"Discovered the latest block the majority of our peers ar eon.\")\n\n\t\ttype source struct {\n\t\t\tidx int\n\t\t\tchecksum [blake2b.Size256]byte\n\t\t\tstreams []Wavelet_SyncClient\n\t\t\tsize int\n\t\t}\n\n\t\tvar sources []source\n\n\t\tidx := 0\n\n\t\t// For each chunk checksum from the set of checksums provided by each\n\t\t// peer, pick the majority checksum.\n\n\t\tfor {\n\t\t\tset := make(map[[blake2b.Size256]byte][]Wavelet_SyncClient)\n\n\t\t\tfor _, response := range majority {\n\t\t\t\tif idx >= len(response.header.Checksums) {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tvar checksum [blake2b.Size256]byte\n\n\t\t\t\tcopy(checksum[:], response.header.Checksums[idx])\n\n\t\t\t\tset[checksum] = append(set[checksum], response.stream)\n\t\t\t}\n\n\t\t\tif len(set) == 0 {\n\t\t\t\tbreak // We have finished going through all responses. Engage in syncing.\n\t\t\t}\n\n\t\t\t// Figure out what the majority of peers believe the checksum is for a chunk\n\t\t\t// at index idx. If a majority is found, mark the peers as a viable source\n\t\t\t// for grabbing the chunks contents to then reassemble together an AVL+ tree\n\t\t\t// diff to apply to our ledger state to complete syncing.\n\n\t\t\tconsistent := false\n\n\t\t\tfor checksum, voters := range set {\n\t\t\t\tif len(voters) == 0 || len(voters) < len(majority)*2/3 {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tsources = append(sources, source{idx: idx, checksum: checksum, streams: voters})\n\t\t\t\tconsistent = true\n\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\t// If peers could not come up with a consistent checksum for some\n\t\t\t// chunk at a consistent idx, dispose all streams and try again.\n\n\t\t\tif !consistent {\n\t\t\t\tdispose()\n\t\t\t\tgoto SYNC\n\t\t\t}\n\n\t\t\tidx++\n\t\t}\n\n\t\t// Streams may not concurrently send and receive messages at once.\n\t\tstreamLocks := make(map[Wavelet_SyncClient]*sync.Mutex)\n\n\t\tvar streamLock sync.Mutex\n\n\t\tworkers := make(chan source, 16)\n\n\t\tvar workerWG sync.WaitGroup\n\n\t\tworkerWG.Add(cap(workers))\n\n\t\tvar chunkWG sync.WaitGroup\n\n\t\tchunkWG.Add(len(sources))\n\n\t\tlogger.Debug().\n\t\t\tInt(\"num_chunks\", len(sources)).\n\t\t\tInt(\"num_workers\", cap(workers)).\n\t\t\tMsg(\"Starting up workers to downloaded all chunks of data needed to sync to the latest block...\")\n\n\t\tvar chunksBufferLock sync.Mutex\n\n\t\tchunksBuffer, err := l.fileBuffers.GetBounded(int64(len(sources)) * sys.SyncChunkSize)\n\t\tif err != nil {\n\t\t\tlogger.Error().\n\t\t\t\tErr(err).\n\t\t\t\tMsg(\"Could not create paged buffer! Retrying...\")\n\n\t\t\tgoto SYNC\n\t\t}\n\n\t\tdiffBuffer := l.fileBuffers.GetUnbounded()\n\n\t\tcleanup := func() {\n\t\t\tl.fileBuffers.Put(chunksBuffer)\n\t\t\tl.fileBuffers.Put(diffBuffer)\n\t\t}\n\n\t\tfor i := 0; i < cap(workers); i++ {\n\t\t\tgo func() {\n\t\t\t\tfor src := range workers {\n\t\t\t\t\treq := &SyncRequest{Data: &SyncRequest_Checksum{Checksum: src.checksum[:]}}\n\n\t\t\t\t\tfor i := 0; i < len(src.streams); i++ {\n\t\t\t\t\t\tstream := src.streams[rand.Intn(len(src.streams))]\n\n\t\t\t\t\t\t// Lock the stream so that other workers may not concurrently interact\n\t\t\t\t\t\t// with the exact same stream at once.\n\n\t\t\t\t\t\tstreamLock.Lock()\n\t\t\t\t\t\tif _, exists := streamLocks[stream]; !exists {\n\t\t\t\t\t\t\tstreamLocks[stream] = new(sync.Mutex)\n\t\t\t\t\t\t}\n\t\t\t\t\t\tlock := streamLocks[stream]\n\t\t\t\t\t\tstreamLock.Unlock()\n\n\t\t\t\t\t\tlock.Lock()\n\n\t\t\t\t\t\tif err := stream.Send(req); err != nil {\n\t\t\t\t\t\t\tlock.Unlock()\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tres, err := stream.Recv()\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlock.Unlock()\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tlock.Unlock()\n\n\t\t\t\t\t\tchunk := res.GetChunk()\n\t\t\t\t\t\tif chunk == nil {\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tif len(chunk) > conf.GetSyncChunkSize() {\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tif blake2b.Sum256(chunk) != src.checksum {\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\t// We found the chunk! Store the chunks contents.\n\t\t\t\t\t\tchunksBufferLock.Lock()\n\t\t\t\t\t\t_, err = chunksBuffer.WriteAt(chunk, int64(src.idx)*sys.SyncChunkSize)\n\t\t\t\t\t\tchunksBufferLock.Unlock()\n\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tsources[src.idx].size = len(chunk)\n\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\n\t\t\t\t\tchunkWG.Done()\n\t\t\t\t}\n\n\t\t\t\tworkerWG.Done()\n\t\t\t}()\n\t\t}\n\n\t\tfor _, src := range sources {\n\t\t\tworkers <- src\n\t\t}\n\n\t\tchunkWG.Wait() // Wait until all chunks have been received.\n\t\tclose(workers)\n\t\tworkerWG.Wait() // Wait until all workers have been closed.\n\n\t\tlogger.Debug().\n\t\t\tInt(\"num_chunks\", len(sources)).\n\t\t\tInt(\"num_workers\", cap(workers)).\n\t\t\tMsg(\n\t\t\t\t\"Downloaded whatever chunks were available to sync to the latest block, and shutted down all \" +\n\t\t\t\t\t\"workers. Checking validity of chunks...\",\n\t\t\t)\n\n\t\tdispose() // Shutdown all streams as we no longer need them.\n\n\t\t// Check all chunks has been received\n\t\tvar diffSize int64\n\n\t\tfor i, src := range sources {\n\t\t\tif src.size == 0 {\n\t\t\t\tlogger.Error().\n\t\t\t\t\tUint64(\"target_block_id\", latest.Index).\n\t\t\t\t\tHex(\"chunk_checksum\", sources[i].checksum[:]).\n\t\t\t\t\tMsg(\"Could not download one of the chunks necessary to sync to the latest block! Retrying...\")\n\n\t\t\t\tcleanup()\n\n\t\t\t\tgoto SYNC\n\t\t\t}\n\n\t\t\tdiffSize += int64(src.size)\n\t\t}\n\n\t\tif _, err := io.CopyN(diffBuffer, chunksBuffer, diffSize); err != nil {\n\t\t\tlogger.Error().\n\t\t\t\tUint64(\"target_block_id\", latest.Index).\n\t\t\t\tErr(err).\n\t\t\t\tMsg(\"Failed to write chunks to bounded memory buffer. Restarting sync...\")\n\n\t\t\tcleanup()\n\n\t\t\tgoto SYNC\n\t\t}\n\n\t\tlogger.Info().\n\t\t\tInt(\"num_chunks\", len(sources)).\n\t\t\tUint64(\"target_block\", latest.Index).\n\t\t\tMsg(\"All chunks have been successfully verified and re-assembled into a diff. Applying diff...\")\n\n\t\tsnapshot := l.accounts.Snapshot()\n\t\tif err := snapshot.ApplyDiff(diffBuffer); err != nil {\n\t\t\tlogger.Error().\n\t\t\t\tUint64(\"target_block_id\", latest.Index).\n\t\t\t\tErr(err).\n\t\t\t\tMsg(\"Failed to apply re-assembled diff to our ledger state. Restarting sync...\")\n\n\t\t\tcleanup()\n\n\t\t\tgoto SYNC\n\t\t}\n\n\t\tif checksum := snapshot.Checksum(); checksum != latest.Merkle {\n\t\t\tlogger.Error().\n\t\t\t\tUint64(\"target_block_id\", latest.Index).\n\t\t\t\tHex(\"expected_merkle_root\", latest.Merkle[:]).\n\t\t\t\tHex(\"yielded_merkle_root\", checksum[:]).\n\t\t\t\tMsg(\"Failed to apply re-assembled diff to our ledger state. Restarting sync...\")\n\n\t\t\tcleanup()\n\n\t\t\tgoto SYNC\n\t\t}\n\n\t\t_, err = l.blocks.Save(latest)\n\t\tif err != nil {\n\t\t\tlogger.Error().\n\t\t\t\tErr(err).\n\t\t\t\tMsg(\"Failed to save finalized block to our database\")\n\n\t\t\tcleanup()\n\n\t\t\tgoto SYNC\n\t\t}\n\n\t\tif err := l.accounts.Commit(snapshot); err != nil {\n\t\t\tcleanup()\n\n\t\t\tlogger := log.Node()\n\t\t\tlogger.Fatal().Err(err).Msg(\"failed to commit collapsed state to our database\")\n\t\t}\n\n\t\tl.resetTransactionsSyncIndex()\n\n\t\tlogger = log.Sync(\"apply\")\n\t\tlogger.Info().\n\t\t\tInt(\"num_chunks\", len(sources)).\n\t\t\tUint64(\"old_block_index\", current.Index).\n\t\t\tUint64(\"new_block_index\", latest.Index).\n\t\t\tHex(\"new_block_id\", latest.ID[:]).\n\t\t\tHex(\"old_block_id\", current.ID[:]).\n\t\t\tHex(\"new_merkle_root\", latest.Merkle[:]).\n\t\t\tHex(\"old_merkle_root\", current.Merkle[:]).\n\t\t\tMsg(\"Successfully built a new state snapshot out of chunk(s) we have received from peers.\")\n\n\t\tcleanup()\n\t\trestart()\n\t}\n}", "title": "" }, { "docid": "c075db7e7b2a62c5b13fee57c873a664", "score": "0.50000805", "text": "func Graphsync(parallelTransfersForStorage uint64, parallelTransfersForRetrieval uint64) func(mctx helpers.MetricsCtx, lc fx.Lifecycle, r repo.LockedRepo, clientBs dtypes.ClientBlockstore, chainBs dtypes.ExposedBlockstore, h host.Host) (dtypes.Graphsync, error) {\n\treturn func(mctx helpers.MetricsCtx, lc fx.Lifecycle, r repo.LockedRepo, clientBs dtypes.ClientBlockstore, chainBs dtypes.ExposedBlockstore, h host.Host) (dtypes.Graphsync, error) {\n\t\tgraphsyncNetwork := gsnet.NewFromLibp2pHost(h)\n\t\tlsys := storeutil.LinkSystemForBlockstore(clientBs)\n\n\t\tgs := graphsyncimpl.New(helpers.LifecycleCtx(mctx, lc),\n\t\t\tgraphsyncNetwork,\n\t\t\tlsys,\n\t\t\tgraphsyncimpl.RejectAllRequestsByDefault(),\n\t\t\tgraphsyncimpl.MaxInProgressIncomingRequests(parallelTransfersForStorage),\n\t\t\tgraphsyncimpl.MaxInProgressOutgoingRequests(parallelTransfersForRetrieval),\n\t\t\tgraphsyncimpl.MaxLinksPerIncomingRequests(config.MaxTraversalLinks),\n\t\t\tgraphsyncimpl.MaxLinksPerOutgoingRequests(config.MaxTraversalLinks))\n\t\tchainLinkSystem := storeutil.LinkSystemForBlockstore(chainBs)\n\t\terr := gs.RegisterPersistenceOption(\"chainstore\", chainLinkSystem)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tgs.RegisterIncomingRequestHook(func(p peer.ID, requestData graphsync.RequestData, hookActions graphsync.IncomingRequestHookActions) {\n\t\t\t_, has := requestData.Extension(\"chainsync\")\n\t\t\tif has {\n\t\t\t\t// TODO: we should confirm the selector is a reasonable one before we validate\n\t\t\t\t// TODO: this code will get more complicated and should probably not live here eventually\n\t\t\t\thookActions.ValidateRequest()\n\t\t\t\thookActions.UsePersistenceOption(\"chainstore\")\n\t\t\t}\n\t\t})\n\t\tgs.RegisterOutgoingRequestHook(func(p peer.ID, requestData graphsync.RequestData, hookActions graphsync.OutgoingRequestHookActions) {\n\t\t\t_, has := requestData.Extension(\"chainsync\")\n\t\t\tif has {\n\t\t\t\thookActions.UsePersistenceOption(\"chainstore\")\n\t\t\t}\n\t\t})\n\n\t\tgraphsyncStats(mctx, lc, gs)\n\n\t\treturn gs, nil\n\t}\n}", "title": "" }, { "docid": "40b0474e7f87474d3857fa05549a801a", "score": "0.49981138", "text": "func (y *metasyncer) syncDone(si *meta.Snode, pairs []revsPair) {\n\tndr, ok := y.nodesRevs[si.ID()]\n\tsmap := y.p.owner.smap.get()\n\tif smap.GetActiveNode(si.ID()) == nil {\n\t\tif ok {\n\t\t\tdelete(y.nodesRevs, si.ID())\n\t\t}\n\t\treturn\n\t}\n\tif !ok {\n\t\tndr = make(map[string]int64, revsMaxTags)\n\t\ty.nodesRevs[si.ID()] = ndr\n\t}\n\tfor _, revsPair := range pairs {\n\t\trevs := revsPair.revs\n\t\tndr[revs.tag()] = revs.version()\n\t}\n}", "title": "" }, { "docid": "7ebeeec2318c8c87f67c2f8777c6b6c7", "score": "0.49844283", "text": "func (t *TrueHybrid) SyncMainMembers() {\n\t// sync current CommitteeMember \n\tdata,err := t.curCmm.ToByte()\n\tif err != nil {\n\t\t// send data \n\t}\n\t// sync old CommitteeMember???\n}", "title": "" }, { "docid": "42b2dc8ddd9af04b4a7161e7934934ac", "score": "0.498187", "text": "func checkSyncStreams(r *Registry, nodeProximities map[string]int) error {\n\tdepth := r.delivery.kad.NeighbourhoodDepth()\n\tmaxPO := r.delivery.kad.MaxProxDisplay\n\tfor id, po := range nodeProximities {\n\t\twantStreams := syncStreams(po, depth, maxPO)\n\t\tgotStreams := nodeStreams(r, id)\n\n\t\tif r.getPeer(enode.HexID(id)) == nil {\n\t\t\t// ignore removed peer\n\t\t\tcontinue\n\t\t}\n\n\t\tif !reflect.DeepEqual(gotStreams, wantStreams) {\n\t\t\treturn fmt.Errorf(\"node %s got streams %v, want %v\", id, gotStreams, wantStreams)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "877ac3cd32c90641ff491ae5fab3d1d5", "score": "0.49810925", "text": "func updateNodeSynced(latestSolidIndex, latestIndex milestone.Index) {\n\tif latestIndex == 0 || latestIndex < GetLatestSeenMilestoneIndexFromSnapshot() {\n\t\t// the node can't be sync if not all \"recentSeenMilestones\" from the snapshot file have been solidified.\n\t\tisNodeSynced = false\n\t\tisNodeSyncedThreshold = false\n\t\treturn\n\t}\n\n\tisNodeSynced = latestSolidIndex == latestIndex\n\tif isNodeSynced {\n\t\t// if the node is sync, signal all waiting routines at the end\n\t\tdefer func() {\n\t\t\twaitForNodeSyncedChannelsLock.Lock()\n\t\t\tdefer waitForNodeSyncedChannelsLock.Unlock()\n\n\t\t\t// signal all routines that are waiting\n\t\t\tfor _, channel := range waitForNodeSyncedChannels {\n\t\t\t\tclose(channel)\n\t\t\t}\n\n\t\t\t// create an empty slice for new signals\n\t\t\twaitForNodeSyncedChannels = make([]chan struct{}, 0)\n\t\t}()\n\t}\n\n\t// catch overflow\n\tif latestIndex < isNodeSyncedWithinThreshold {\n\t\tisNodeSyncedThreshold = true\n\t\treturn\n\t}\n\n\tisNodeSyncedThreshold = latestSolidIndex >= (latestIndex - isNodeSyncedWithinThreshold)\n}", "title": "" }, { "docid": "8c0880dea6e4c62ca1a4f1250da206ce", "score": "0.49806497", "text": "func (s *Server) Sync() {\n\tdefer base.CheckPanic()\n\tlog.Logger().Info(\"start meta sync\", zap.Duration(\"meta_timeout\", s.Config.Master.MetaTimeout))\n\tfor {\n\t\tvar meta *protocol.Meta\n\t\tvar err error\n\t\tif meta, err = s.masterClient.GetMeta(context.Background(),\n\t\t\t&protocol.NodeInfo{\n\t\t\t\tNodeType: protocol.NodeType_ServerNode,\n\t\t\t\tNodeName: s.serverName,\n\t\t\t\tHttpPort: int64(s.HttpPort),\n\t\t\t\tBinaryVersion: version.Version,\n\t\t\t}); err != nil {\n\t\t\tlog.Logger().Error(\"failed to get meta\", zap.Error(err))\n\t\t\tgoto sleep\n\t\t}\n\n\t\t// load master config\n\t\terr = json.Unmarshal([]byte(meta.Config), &s.Config)\n\t\tif err != nil {\n\t\t\tlog.Logger().Error(\"failed to parse master config\", zap.Error(err))\n\t\t\tgoto sleep\n\t\t}\n\n\t\t// connect to data store\n\t\tif s.dataPath != s.Config.Database.DataStore || s.dataPrefix != s.Config.Database.DataTablePrefix {\n\t\t\tlog.Logger().Info(\"connect data store\",\n\t\t\t\tzap.String(\"database\", log.RedactDBURL(s.Config.Database.DataStore)))\n\t\t\tif s.DataClient, err = data.Open(s.Config.Database.DataStore, s.Config.Database.DataTablePrefix); err != nil {\n\t\t\t\tlog.Logger().Error(\"failed to connect data store\", zap.Error(err))\n\t\t\t\tgoto sleep\n\t\t\t}\n\t\t\ts.dataPath = s.Config.Database.DataStore\n\t\t\ts.dataPrefix = s.Config.Database.DataTablePrefix\n\t\t}\n\n\t\t// connect to cache store\n\t\tif s.cachePath != s.Config.Database.CacheStore || s.cachePrefix != s.Config.Database.CacheTablePrefix {\n\t\t\tlog.Logger().Info(\"connect cache store\",\n\t\t\t\tzap.String(\"database\", log.RedactDBURL(s.Config.Database.CacheStore)))\n\t\t\tif s.CacheClient, err = cache.Open(s.Config.Database.CacheStore, s.Config.Database.CacheTablePrefix); err != nil {\n\t\t\t\tlog.Logger().Error(\"failed to connect cache store\", zap.Error(err))\n\t\t\t\tgoto sleep\n\t\t\t}\n\t\t\ts.cachePath = s.Config.Database.CacheStore\n\t\t\ts.cachePrefix = s.Config.Database.CacheTablePrefix\n\t\t}\n\n\t\t// create trace provider\n\t\tif !s.traceConfig.Equal(s.Config.Tracing) {\n\t\t\tlog.Logger().Info(\"create trace provider\", zap.Any(\"tracing_config\", s.Config.Tracing))\n\t\t\ttp, err := s.Config.Tracing.NewTracerProvider()\n\t\t\tif err != nil {\n\t\t\t\tlog.Logger().Fatal(\"failed to create trace provider\", zap.Error(err))\n\t\t\t}\n\t\t\totel.SetTracerProvider(tp)\n\t\t\totel.SetErrorHandler(log.GetErrorHandler())\n\t\t\totel.SetTextMapPropagator(propagation.NewCompositeTextMapPropagator(propagation.TraceContext{}, propagation.Baggage{}))\n\t\t\ts.traceConfig = s.Config.Tracing\n\t\t}\n\n\tsleep:\n\t\tif s.testMode {\n\t\t\treturn\n\t\t}\n\t\ttime.Sleep(s.Config.Master.MetaTimeout)\n\t}\n}", "title": "" }, { "docid": "a394ca26a06690c42632dc485d182691", "score": "0.49805528", "text": "func (db *SecretDatabase) SyncPeers() error {\n\terrors := make([]string, 0)\n\n\tfor _, peer := range db.app.Config.Peers {\n\t\tif !peer.SyncSecrets {\n\t\t\tcontinue\n\t\t}\n\n\t\terr := db.SyncPeer(peer)\n\t\tif err != nil {\n\t\t\tstr := fmt.Sprintf(\"peer %s: %s\", peer.Name, err)\n\t\t\terrors = append(errors, str)\n\t\t}\n\t}\n\n\tif len(errors) > 0 {\n\t\tmsg := strings.Join(errors, \", \")\n\t\treturn fmt.Errorf(\"failed to sync secrets: %s\", msg)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "256098d41fc259f24516c486bfb89641", "score": "0.4978849", "text": "func ProvideCreateFaceMempools() {\n\tnumaSockets := make(map[dpdk.NumaSocket]bool)\n\tfor _, numaSocket := range createface.ListRxTxNumaSockets() {\n\t\tnumaSockets[numaSocket] = true\n\t}\n\tif len(numaSockets) == 0 {\n\t\tnumaSockets[dpdk.NUMA_SOCKET_ANY] = true\n\t} else if len(numaSockets) > 1 && numaSockets[dpdk.NUMA_SOCKET_ANY] {\n\t\tdelete(numaSockets, dpdk.NUMA_SOCKET_ANY)\n\t}\n\tfor numaSocket := range numaSockets {\n\t\tcreateface.AddMempools(numaSocket,\n\t\t\tMakePktmbufPool(MP_ETHRX, numaSocket),\n\t\t\tiface.Mempools{\n\t\t\t\tIndirectMp: MakePktmbufPool(MP_IND, numaSocket),\n\t\t\t\tNameMp: MakePktmbufPool(MP_NAME, numaSocket),\n\t\t\t\tHeaderMp: MakePktmbufPool(MP_HDR, numaSocket),\n\t\t\t})\n\t}\n}", "title": "" }, { "docid": "344988573eb9ad82b0938e30b855f4fe", "score": "0.49774355", "text": "func Sync() {\n\n\tdb := database.GetDB()\n\n\tfor {\n\t\t// Get the directory block height in factomd and in our database\n\t\tfactomdHeight := getFactomdHeight()\n\t\tdatabaseHeight := GetDatabaseHeight(db)\n\n\t\tnow := time.Now()\n\t\tstartHeight := databaseHeight\n\n\t\tfor dbheight := databaseHeight; dbheight <= factomdHeight; dbheight++ {\n\t\t\tif err := AddDirectoryBlock(db, dbheight); err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\tif dbheight%1000 == 0 && factomdHeight-dbheight > 100 {\n\t\t\t\ttimeSpent := time.Now().Sub(now)\n\t\t\t\tpercentDone := float64(dbheight-startHeight) / float64(factomdHeight)\n\t\t\t\tt := float64(timeSpent.Seconds()) * (1 - percentDone) / (percentDone + .00001)\n\t\t\t\tfactomdHeight = getFactomdHeight()\n\t\t\t\tfmt.Printf(\"%20v | Processed %8d blocks, %4.3f percent complete time left %8.3f hrs\\n\",\n\t\t\t\t\ttimeSpent.String(),\n\t\t\t\t\tdbheight-startHeight,\n\t\t\t\t\tpercentDone,\n\t\t\t\t\tt/60/60)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7b7796e0c0d70a877a8586a23817790b", "score": "0.4969309", "text": "func ManageConnections(pop chan PropagateOpArgs, pblock chan PropagateBlockArgs, peerconn chan net.Addr) {\n\t// Send heartbeats at three times the timeout interval to be safe\n\tinterval := time.Duration(MinerInstance.Settings.HeartBeat / 5)\n\theartbeat := time.Tick(interval * time.Millisecond)\n\tcount := 0\n\tfor {\n\t\tselect {\n\t\tcase <-heartbeat:\n\t\t\tMinerInstance.MSI.ServerHeartBeat()\n\t\t\tif count >= 50 {\n\t\t\t\tPeerSync()\n\t\t\t\tcount = 0\n\t\t\t} else {\n\t\t\t\tcount++\n\t\t\t\tPeerHeartBeats()\n\t\t\t}\n\t\tcase addr := <-peerconn:\n\t\t\t// Connection request from peerRpc\n\t\t\taddrSet := []net.Addr{addr}\n\t\t\tMinerInstance.MSI.GetPeers(addrSet)\n\t\tcase op := <-pop:\n\t\t\tMinerInstance.MSI.ServerHeartBeat()\n\t\t\tPeerPropagateOp(op)\n\t\tcase block := <-pblock:\n\t\t\tMinerInstance.MSI.ServerHeartBeat()\n\t\t\tPeerPropagateBlock(block)\n\t\tdefault:\n\t\t\tCheckLiveliness()\n\t\t\tif len(PeerList) < int(MinerInstance.Settings.MinNumMinerConnections) {\n\t\t\t\tvar addrSet []net.Addr\n\t\t\t\tMinerInstance.MSI.Client.Call(\"RServer.GetNodes\", MinerInstance.PrivKey.PublicKey, &addrSet)\n\t\t\t\tMinerInstance.MSI.GetPeers(addrSet)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "8bad9ad97cf9460817366dd82ced75db", "score": "0.49683434", "text": "func (r *Reconciler) syncMachines(ctx context.Context, machineSet *clusterv1.MachineSet, machines []*clusterv1.Machine) error {\n\tlog := ctrl.LoggerFrom(ctx)\n\tfor i := range machines {\n\t\tm := machines[i]\n\t\t// If the machine is already being deleted, we don't need to update it.\n\t\tif !m.DeletionTimestamp.IsZero() {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Cleanup managed fields of all Machines.\n\t\t// We do this so that Machines that were created/patched before the controller adopted Server-Side-Apply (SSA)\n\t\t// (< v1.4.0) can also work with SSA. Otherwise, fields would be co-owned by our \"old\" \"manager\" and\n\t\t// \"capi-machineset\" and then we would not be able to e.g. drop labels and annotations.\n\t\tif err := ssa.CleanUpManagedFieldsForSSAAdoption(ctx, r.Client, m, machineSetManagerName); err != nil {\n\t\t\treturn errors.Wrapf(err, \"failed to update machine: failed to adjust the managedFields of the Machine %q\", m.Name)\n\t\t}\n\n\t\t// Update Machine to propagate in-place mutable fields from the MachineSet.\n\t\tupdatedMachine := r.computeDesiredMachine(machineSet, m)\n\t\terr := ssa.Patch(ctx, r.Client, machineSetManagerName, updatedMachine, ssa.WithCachingProxy{Cache: r.ssaCache, Original: m})\n\t\tif err != nil {\n\t\t\tlog.Error(err, \"failed to update Machine\", \"Machine\", klog.KObj(updatedMachine))\n\t\t\treturn errors.Wrapf(err, \"failed to update Machine %q\", klog.KObj(updatedMachine))\n\t\t}\n\t\tmachines[i] = updatedMachine\n\n\t\tinfraMachine, err := external.Get(ctx, r.UnstructuredCachingClient, &updatedMachine.Spec.InfrastructureRef, updatedMachine.Namespace)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"failed to get InfrastructureMachine %s\",\n\t\t\t\tklog.KRef(updatedMachine.Spec.InfrastructureRef.Namespace, updatedMachine.Spec.InfrastructureRef.Name))\n\t\t}\n\t\t// Cleanup managed fields of all InfrastructureMachines to drop ownership of labels and annotations\n\t\t// from \"manager\". We do this so that InfrastructureMachines that are created using the Create method\n\t\t// can also work with SSA. Otherwise, labels and annotations would be co-owned by our \"old\" \"manager\"\n\t\t// and \"capi-machineset\" and then we would not be able to e.g. drop labels and annotations.\n\t\tlabelsAndAnnotationsManagedFieldPaths := []contract.Path{\n\t\t\t{\"f:metadata\", \"f:annotations\"},\n\t\t\t{\"f:metadata\", \"f:labels\"},\n\t\t}\n\t\tif err := ssa.DropManagedFields(ctx, r.Client, infraMachine, machineSetManagerName, labelsAndAnnotationsManagedFieldPaths); err != nil {\n\t\t\treturn errors.Wrapf(err, \"failed to update machine: failed to adjust the managedFields of the InfrastructureMachine %s\", klog.KObj(infraMachine))\n\t\t}\n\t\t// Update in-place mutating fields on InfrastructureMachine.\n\t\tif err := r.updateExternalObject(ctx, infraMachine, machineSet); err != nil {\n\t\t\treturn errors.Wrapf(err, \"failed to update InfrastructureMachine %s\", klog.KObj(infraMachine))\n\t\t}\n\n\t\tif updatedMachine.Spec.Bootstrap.ConfigRef != nil {\n\t\t\tbootstrapConfig, err := external.Get(ctx, r.UnstructuredCachingClient, updatedMachine.Spec.Bootstrap.ConfigRef, updatedMachine.Namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrapf(err, \"failed to get BootstrapConfig %s\",\n\t\t\t\t\tklog.KRef(updatedMachine.Spec.Bootstrap.ConfigRef.Namespace, updatedMachine.Spec.Bootstrap.ConfigRef.Name))\n\t\t\t}\n\t\t\t// Cleanup managed fields of all BootstrapConfigs to drop ownership of labels and annotations\n\t\t\t// from \"manager\". We do this so that BootstrapConfigs that are created using the Create method\n\t\t\t// can also work with SSA. Otherwise, labels and annotations would be co-owned by our \"old\" \"manager\"\n\t\t\t// and \"capi-machineset\" and then we would not be able to e.g. drop labels and annotations.\n\t\t\tif err := ssa.DropManagedFields(ctx, r.Client, bootstrapConfig, machineSetManagerName, labelsAndAnnotationsManagedFieldPaths); err != nil {\n\t\t\t\treturn errors.Wrapf(err, \"failed to update machine: failed to adjust the managedFields of the BootstrapConfig %s\", klog.KObj(bootstrapConfig))\n\t\t\t}\n\t\t\t// Update in-place mutating fields on BootstrapConfig.\n\t\t\tif err := r.updateExternalObject(ctx, bootstrapConfig, machineSet); err != nil {\n\t\t\t\treturn errors.Wrapf(err, \"failed to update BootstrapConfig %s\", klog.KObj(bootstrapConfig))\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a4e155df8e91e9700fd5d93779e47235", "score": "0.49609557", "text": "func (n *Net) sync() {\n\ttotalUnits := 0\n\tfor _, v := range n.Arch {\n\t\ttotalUnits += v\n\t}\n\tfor ii := 0; ii < totalUnits; ii++ {\n\t\t<-n.stepDone\n\t}\n}", "title": "" }, { "docid": "ef97843f879532ea303b92f40bb0dd28", "score": "0.49519143", "text": "func testMultiple(t *testing.T, wt *workerTester) {\n\t// create a helper function that adds a host\n\tnumHosts := 0\n\taddHost := func() modules.Host {\n\t\ttestdir := filepath.Join(wt.rt.dir, fmt.Sprintf(\"host%d\", numHosts))\n\t\thost, err := wt.rt.addCustomHost(testdir, modules.ProdDependencies)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tnumHosts++\n\t\treturn host\n\t}\n\n\t// create a helper function that adds a random sector on a given host\n\taddSector := func(h modules.Host) crypto.Hash {\n\t\t// create a random sector\n\t\tsectorData := fastrand.Bytes(int(modules.SectorSize))\n\t\tsectorRoot := crypto.MerkleRoot(sectorData)\n\n\t\t// add the sector to the host\n\t\terr := h.AddSector(sectorRoot, sectorData)\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\treturn sectorRoot\n\t}\n\n\t// create a helper function that waits for an update\n\twaitForUpdate := func(ws *pcwsWorkerState) {\n\t\tws.mu.Lock()\n\t\twu := ws.registerForWorkerUpdate()\n\t\tws.mu.Unlock()\n\t\tselect {\n\t\tcase <-wu:\n\t\tcase <-time.After(time.Minute):\n\t\t\tt.Fatal(\"timed out\")\n\t\t}\n\t}\n\n\t// create a helper function that compares uint64 slices for equality\n\tisEqualTo := func(a, b []uint64) bool {\n\t\tif len(a) != len(b) {\n\t\t\treturn false\n\t\t}\n\t\tfor i, v := range a {\n\t\t\tif v != b[i] {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t\treturn true\n\t}\n\n\th1 := addHost()\n\th2 := addHost()\n\th3 := addHost()\n\n\th1PK := h1.PublicKey().String()\n\th2PK := h2.PublicKey().String()\n\th3PK := h3.PublicKey().String()\n\n\tr1 := addSector(h1)\n\tr2 := addSector(h1)\n\tr3 := addSector(h2)\n\tr4 := addSector(h3)\n\tr5 := crypto.MerkleRoot(fastrand.Bytes(int(modules.SectorSize)))\n\troots := []crypto.Hash{r1, r2, r3, r4, r5}\n\n\t// create an EC and a passhtrough cipher key\n\tec, err := modules.NewRSCode(1, 4)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tptck, err := crypto.NewSiaKey(crypto.TypePlain, nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// wait until the renter has a worker for all hosts\n\terr = build.Retry(600, 100*time.Millisecond, func() error {\n\t\tws, err := wt.renter.WorkerPoolStatus()\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tif ws.NumWorkers < 3 {\n\t\t\t_, err = wt.rt.miner.AddBlock()\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\treturn errors.New(\"workers not ready yet\")\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// wait until we're certain all workers are fit for duty\n\terr = build.Retry(100, 100*time.Millisecond, func() error {\n\t\tws, err := wt.renter.WorkerPoolStatus()\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tfor _, w := range ws.Workers {\n\t\t\tif w.AccountStatus.AvailableBalance.IsZero() ||\n\t\t\t\t!w.PriceTableStatus.Active ||\n\t\t\t\tw.MaintenanceOnCooldown {\n\t\t\t\treturn errors.New(\"worker is not ready yet\")\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n\n\t// create PCWS\n\tpcws, err := wt.renter.newPCWSByRoots(context.Background(), roots, ec, ptck, 0)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tws := pcws.managedWorkerState()\n\n\t// wait until all workers have resolved\n\tnumWorkers := len(ws.staticRenter.staticWorkerPool.callWorkers())\n\tfor {\n\t\twaitForUpdate(ws)\n\t\tws.mu.Lock()\n\t\tnumResolved := len(ws.resolvedWorkers)\n\t\tws.mu.Unlock()\n\t\tif numResolved == numWorkers {\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// fetch piece indices per host\n\tws.mu.Lock()\n\tresolved := ws.resolvedWorkers\n\tws.mu.Unlock()\n\tfor _, rw := range resolved {\n\t\tvar expected []uint64\n\t\tvar hostname string\n\t\tswitch rw.worker.staticHostPubKeyStr {\n\t\tcase h1PK:\n\t\t\texpected = []uint64{0, 1}\n\t\t\thostname = \"host1\"\n\t\tcase h2PK:\n\t\t\texpected = []uint64{2}\n\t\t\thostname = \"host2\"\n\t\tcase h3PK:\n\t\t\texpected = []uint64{3}\n\t\t\thostname = \"host3\"\n\t\tdefault:\n\t\t\thostname = \"other\"\n\t\t\tcontinue\n\t\t}\n\n\t\tif !isEqualTo(rw.pieceIndices, expected) {\n\t\t\tt.Error(\"unexpected pieces\", hostname, rw.worker.staticHostPubKeyStr[64:], rw.pieceIndices, rw.err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4e7d3b7d0853a58dc8e5f9e5e07fb073", "score": "0.49381396", "text": "func syncWalletTo(rpcClient *rpcclient.Client, desiredHeight int64) (int64, error) {\n\tvar count int64\n\tvar err error\n\tfor count != desiredHeight {\n\t\t//rpctest.Sleep(100)\n\t\tcount, err = rpcClient.GetBlockCount()\n\t\tif err != nil {\n\t\t\treturn -1, err\n\t\t}\n\t\tfmt.Println(\" sync to: \" + strconv.FormatInt(count, 10))\n\t}\n\treturn count, nil\n}", "title": "" }, { "docid": "f6f716032cd53991a62d2f99cad2c756", "score": "0.49364695", "text": "func main() {\n\twg := sync.WaitGroup{}\n\n\toneMap := &sync.Map{}\n\toneMap.Store(5, \"go\")\n\toneMap.Store(4, \"java\")\n\toneMap.Store(3, \"php\")\n\n\tfor i := 0; i < 50; i++ {\n\t\twg.Add(2)\n\t\tgo readMap(oneMap, &wg)\n\t\tgo writeMap(oneMap, &wg)\n\t}\n\twg.Wait()\n}", "title": "" }, { "docid": "1a2f6f84ef858626798967f2789f0e02", "score": "0.4928545", "text": "func testSync(tc *testContext) bool {\n\ttests := []struct {\n\t\tname string\n\t\thash *wire.ShaHash\n\t}{\n\t\t{\n\t\t\tname: \"Block 1\",\n\t\t\thash: newShaHash(\"00000000839a8e6886ab5951d76f411475428afc90947ee320161bbf18eb6048\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 2\",\n\t\t\thash: newShaHash(\"000000006a625f06636b8bb6ac7b960a8d03705d1ace08b1a19da3fdcc99ddbd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 3\",\n\t\t\thash: newShaHash(\"0000000082b5015589a3fdf2d4baff403e6f0be035a5d9742c1cae6295464449\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 4\",\n\t\t\thash: newShaHash(\"000000004ebadb55ee9096c9a2f8880e09da59c0d68b1c228da88e48844a1485\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 5\",\n\t\t\thash: newShaHash(\"000000009b7262315dbf071787ad3656097b892abffd1f95a1a022f896f533fc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 6\",\n\t\t\thash: newShaHash(\"000000003031a0e73735690c5a1ff2a4be82553b2a12b776fbd3a215dc8f778d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 7\",\n\t\t\thash: newShaHash(\"0000000071966c2b1d065fd446b1e485b2c9d9594acd2007ccbd5441cfc89444\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 8\",\n\t\t\thash: newShaHash(\"00000000408c48f847aa786c2268fc3e6ec2af68e8468a34a28c61b7f1de0dc6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 9\",\n\t\t\thash: newShaHash(\"000000008d9dc510f23c2657fc4f67bea30078cc05a90eb89e84cc475c080805\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 10\",\n\t\t\thash: newShaHash(\"000000002c05cc2e78923c34df87fd108b22221ac6076c18f3ade378a4d915e9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 11\",\n\t\t\thash: newShaHash(\"0000000097be56d606cdd9c54b04d4747e957d3608abe69198c661f2add73073\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 12\",\n\t\t\thash: newShaHash(\"0000000027c2488e2510d1acf4369787784fa20ee084c258b58d9fbd43802b5e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 13\",\n\t\t\thash: newShaHash(\"000000005c51de2031a895adc145ee2242e919a01c6d61fb222a54a54b4d3089\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 14\",\n\t\t\thash: newShaHash(\"0000000080f17a0c5a67f663a9bc9969eb37e81666d9321125f0e293656f8a37\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 15\",\n\t\t\thash: newShaHash(\"00000000b3322c8c3ef7d2cf6da009a776e6a99ee65ec5a32f3f345712238473\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 16\",\n\t\t\thash: newShaHash(\"00000000174a25bb399b009cc8deff1c4b3ea84df7e93affaaf60dc3416cc4f5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 17\",\n\t\t\thash: newShaHash(\"000000003ff1d0d70147acfbef5d6a87460ff5bcfce807c2d5b6f0a66bfdf809\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 18\",\n\t\t\thash: newShaHash(\"000000008693e98cf893e4c85a446b410bb4dfa129bd1be582c09ed3f0261116\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 19\",\n\t\t\thash: newShaHash(\"00000000841cb802ca97cf20fb9470480cae9e5daa5d06b4a18ae2d5dd7f186f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 20\",\n\t\t\thash: newShaHash(\"0000000067a97a2a37b8f190a17f0221e9c3f4fa824ddffdc2e205eae834c8d7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 21\",\n\t\t\thash: newShaHash(\"000000006f016342d1275be946166cff975c8b27542de70a7113ac6d1ef3294f\"),\n\t\t},\n\t}\n\n\t// Ensure there are enough test vectors to prove the maximum number of\n\t// recent hashes is working properly.\n\tmaxRecentHashes := waddrmgr.TstMaxRecentHashes\n\tif len(tests) < maxRecentHashes-1 {\n\t\ttc.t.Errorf(\"Not enough hashes to test max recent hashes - \"+\n\t\t\t\"need %d, have %d\", maxRecentHashes-1, len(tests))\n\t\treturn false\n\t}\n\n\tfor i, test := range tests {\n\t\tblockStamp := waddrmgr.BlockStamp{\n\t\t\tHeight: int32(i) + 1,\n\t\t\tHash: *test.hash,\n\t\t}\n\t\tif err := tc.manager.SetSyncedTo(&blockStamp); err != nil {\n\t\t\ttc.t.Errorf(\"SetSyncedTo unexpected err: %v\", err)\n\t\t\treturn false\n\t\t}\n\n\t\t// Ensure the manager now claims it is synced to the block stamp\n\t\t// that was just set.\n\t\tgotBlockStamp := tc.manager.SyncedTo()\n\t\tif gotBlockStamp != blockStamp {\n\t\t\ttc.t.Errorf(\"SyncedTo unexpected block stamp -- got \"+\n\t\t\t\t\"%v, want %v\", gotBlockStamp, blockStamp)\n\t\t\treturn false\n\t\t}\n\n\t\t// Ensure the recent blocks iterator works properly.\n\t\tj := 0\n\t\titer := tc.manager.NewIterateRecentBlocks()\n\t\tfor cont := iter != nil; cont; cont = iter.Prev() {\n\t\t\twantHeight := int32(i) - int32(j) + 1\n\t\t\tvar wantHash *wire.ShaHash\n\t\t\tif wantHeight == 0 {\n\t\t\t\twantHash = chaincfg.MainNetParams.GenesisHash\n\t\t\t} else {\n\t\t\t\twantHash = tests[wantHeight-1].hash\n\t\t\t}\n\n\t\t\tgotBS := iter.BlockStamp()\n\t\t\tif gotBS.Height != wantHeight {\n\t\t\t\ttc.t.Errorf(\"NewIterateRecentBlocks block \"+\n\t\t\t\t\t\"stamp height mismatch -- got %d, \"+\n\t\t\t\t\t\"want %d\", gotBS.Height, wantHeight)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tif gotBS.Hash != *wantHash {\n\t\t\t\ttc.t.Errorf(\"NewIterateRecentBlocks block \"+\n\t\t\t\t\t\"stamp hash mismatch -- got %v, \"+\n\t\t\t\t\t\"want %v\", gotBS.Hash, wantHash)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tj++\n\t\t}\n\n\t\t// Ensure the maximum number of recent hashes works as expected.\n\t\tif i >= maxRecentHashes-1 && j != maxRecentHashes {\n\t\t\ttc.t.Errorf(\"NewIterateRecentBlocks iterated more than \"+\n\t\t\t\t\"the max number of expected blocks -- got %d, \"+\n\t\t\t\t\"want %d\", j, maxRecentHashes)\n\t\t\treturn false\n\t\t}\n\t}\n\n\t// Ensure rollback to block in recent history works as expected.\n\tblockStamp := waddrmgr.BlockStamp{\n\t\tHeight: 10,\n\t\tHash: *tests[9].hash,\n\t}\n\tif err := tc.manager.SetSyncedTo(&blockStamp); err != nil {\n\t\ttc.t.Errorf(\"SetSyncedTo unexpected err on rollback to block \"+\n\t\t\t\"in recent history: %v\", err)\n\t\treturn false\n\t}\n\tgotBlockStamp := tc.manager.SyncedTo()\n\tif gotBlockStamp != blockStamp {\n\t\ttc.t.Errorf(\"SyncedTo unexpected block stamp on rollback -- \"+\n\t\t\t\"got %v, want %v\", gotBlockStamp, blockStamp)\n\t\treturn false\n\t}\n\n\t// Ensure syncing to a block that is in the future as compared to the\n\t// current block stamp clears the old recent blocks.\n\tblockStamp = waddrmgr.BlockStamp{\n\t\tHeight: 100,\n\t\tHash: *newShaHash(\"000000007bc154e0fa7ea32218a72fe2c1bb9f86cf8c9ebf9a715ed27fdb229a\"),\n\t}\n\tif err := tc.manager.SetSyncedTo(&blockStamp); err != nil {\n\t\ttc.t.Errorf(\"SetSyncedTo unexpected err on future block stamp: \"+\n\t\t\t\"%v\", err)\n\t\treturn false\n\t}\n\tnumRecentBlocks := 0\n\titer := tc.manager.NewIterateRecentBlocks()\n\tfor cont := iter != nil; cont; cont = iter.Prev() {\n\t\tnumRecentBlocks++\n\t}\n\tif numRecentBlocks != 1 {\n\t\ttc.t.Errorf(\"Unexpected number of blocks after future block \"+\n\t\t\t\"stamp -- got %d, want %d\", numRecentBlocks, 1)\n\t\treturn false\n\t}\n\n\t// Rollback to a block that is not in the recent block history and\n\t// ensure it results in only that block.\n\tblockStamp = waddrmgr.BlockStamp{\n\t\tHeight: 1,\n\t\tHash: *tests[0].hash,\n\t}\n\tif err := tc.manager.SetSyncedTo(&blockStamp); err != nil {\n\t\ttc.t.Errorf(\"SetSyncedTo unexpected err on rollback to block \"+\n\t\t\t\"not in recent history: %v\", err)\n\t\treturn false\n\t}\n\tgotBlockStamp = tc.manager.SyncedTo()\n\tif gotBlockStamp != blockStamp {\n\t\ttc.t.Errorf(\"SyncedTo unexpected block stamp on rollback to \"+\n\t\t\t\"block not in recent history -- got %v, want %v\",\n\t\t\tgotBlockStamp, blockStamp)\n\t\treturn false\n\t}\n\tnumRecentBlocks = 0\n\titer = tc.manager.NewIterateRecentBlocks()\n\tfor cont := iter != nil; cont; cont = iter.Prev() {\n\t\tnumRecentBlocks++\n\t}\n\tif numRecentBlocks != 1 {\n\t\ttc.t.Errorf(\"Unexpected number of blocks after rollback to \"+\n\t\t\t\"block not in recent history -- got %d, want %d\",\n\t\t\tnumRecentBlocks, 1)\n\t\treturn false\n\t}\n\n\t// Ensure syncing the manager to nil results in the synced to state\n\t// being the earliest block (genesis block in this case).\n\tif err := tc.manager.SetSyncedTo(nil); err != nil {\n\t\ttc.t.Errorf(\"SetSyncedTo unexpected err on nil: %v\", err)\n\t\treturn false\n\t}\n\tblockStamp = waddrmgr.BlockStamp{\n\t\tHeight: 0,\n\t\tHash: *chaincfg.MainNetParams.GenesisHash,\n\t}\n\tgotBlockStamp = tc.manager.SyncedTo()\n\tif gotBlockStamp != blockStamp {\n\t\ttc.t.Errorf(\"SyncedTo unexpected block stamp on nil -- \"+\n\t\t\t\"got %v, want %v\", gotBlockStamp, blockStamp)\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "02d8f5b9edf8dbdf54bd5da1dc92d40f", "score": "0.49215743", "text": "func (nmgr *natManager) doSync() {\n\tfor e := range nmgr.tracked {\n\t\tnmgr.tracked[e] = false\n\t}\n\tvar newAddresses []entry\n\tfor _, maddr := range nmgr.net.ListenAddresses() {\n\t\t// Strip the IP\n\t\tmaIP, rest := ma.SplitFirst(maddr)\n\t\tif maIP == nil || rest == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tswitch maIP.Protocol().Code {\n\t\tcase ma.P_IP6, ma.P_IP4:\n\t\tdefault:\n\t\t\tcontinue\n\t\t}\n\n\t\t// Only bother if we're listening on an unicast / unspecified IP.\n\t\tip := net.IP(maIP.RawValue())\n\t\tif !ip.IsGlobalUnicast() && !ip.IsUnspecified() {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Extract the port/protocol\n\t\tproto, _ := ma.SplitFirst(rest)\n\t\tif proto == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tvar protocol string\n\t\tswitch proto.Protocol().Code {\n\t\tcase ma.P_TCP:\n\t\t\tprotocol = \"tcp\"\n\t\tcase ma.P_UDP:\n\t\t\tprotocol = \"udp\"\n\t\tdefault:\n\t\t\tcontinue\n\t\t}\n\t\tport, err := strconv.ParseUint(proto.Value(), 10, 16)\n\t\tif err != nil {\n\t\t\t// bug in multiaddr\n\t\t\tpanic(err)\n\t\t}\n\t\te := entry{protocol: protocol, port: int(port)}\n\t\tif _, ok := nmgr.tracked[e]; ok {\n\t\t\tnmgr.tracked[e] = true\n\t\t} else {\n\t\t\tnewAddresses = append(newAddresses, e)\n\t\t}\n\t}\n\n\tvar wg sync.WaitGroup\n\tdefer wg.Wait()\n\n\t// Close old mappings\n\tfor e, v := range nmgr.tracked {\n\t\tif !v {\n\t\t\tnmgr.nat.RemoveMapping(nmgr.ctx, e.protocol, e.port)\n\t\t\tdelete(nmgr.tracked, e)\n\t\t}\n\t}\n\n\t// Create new mappings.\n\tfor _, e := range newAddresses {\n\t\tif err := nmgr.nat.AddMapping(nmgr.ctx, e.protocol, e.port); err != nil {\n\t\t\tlog.Errorf(\"failed to port-map %s port %d: %s\", e.protocol, e.port, err)\n\t\t}\n\t\tnmgr.tracked[e] = false\n\t}\n}", "title": "" }, { "docid": "4955dea15c0c1a0da6894131e86a6113", "score": "0.49202523", "text": "func processStateAndPipeToMMEs(lb *loadBalancer, UEStateStore map[uint64]rpcs.MMEState, NodesKeysStore map[uint64]*rpc.Client) {\n\tlb.semaphore <- 1\n\tnodes := make([]uint64, 0)\n\tfor k := range NodesKeysStore {\n\t\tnodes = append(nodes, k)\n\t}\n\tsort.Slice(nodes, func(i, j int) bool {\n\t\treturn nodes[i] < nodes[j]\n\t})\n\n\t//Calculating state share for each node\n\tnodeToStates := make(map[uint64]map[uint64]rpcs.MMEState) //MME hash -> (User's hashes -> User States)\n\tfor i := 0; i < len(nodes); i++ {\n\t\tnode := nodes[i]\n\t\tuserKeysToStates := make(map[uint64]rpcs.MMEState)\n\n\t\tminInd := i - 1\n\t\tmaxInd := i\n\t\tif minInd < 0 {\n\t\t\tminInd = len(nodes) - 1\n\t\t\tmaxInd = -1\n\t\t}\n\t\tmin := nodes[minInd]\n\t\tmax := nodes[minInd]\n\t\tmax = 18446744073709551614\n\t\tif maxInd != -1 {\n\t\t\tmax = nodes[maxInd]\n\t\t}\n\t\tlb.rangeMap[node] = rpcs.Range{Min: min, Max: max}\n\t\tfor user := range UEStateStore {\n\t\t\tif user > min && user <= max {\n\t\t\t\tuserKeysToStates[user] = UEStateStore[user]\n\t\t\t}\n\t\t}\n\t\tnodeToStates[node] = userKeysToStates\n\t}\n\n\t//calculating replicas for each node\n\tnodeToReplicas := make(map[uint64]string)\n\tif len(nodes) > 1 {\n\t\tfor i := 0; i < len(nodes); i++ {\n\t\t\treplicaFound := false\n\t\t\tfor j := i + 1; j < len(nodes); j++ {\n\t\t\t\tif lb.hashing.MMENodes[nodes[j]] != lb.hashing.MMENodes[nodes[i]] {\n\t\t\t\t\tnodeToReplicas[nodes[i]] = lb.hashing.MMENodes[nodes[j]]\n\t\t\t\t\treplicaFound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !replicaFound {\n\t\t\t\tfor j := 0; j < len(nodes); j++ {\n\t\t\t\t\tif lb.hashing.MMENodes[nodes[j]] != lb.hashing.MMENodes[nodes[i]] {\n\t\t\t\t\t\tnodeToReplicas[nodes[i]] = lb.hashing.MMENodes[nodes[j]]\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t//storing nodeToReplicas\n\tfor k, v := range nodeToReplicas {\n\t\tlb.nodeToReplicas[k] = v\n\t}\n\n\t//Sending the updates to each node\n\tfor _, node := range nodes {\n\t\tconn := lb.conns[lb.hashing.MMENodes[node]]\n\t\targ := rpcs.UpdateArgs{UEState: nodeToStates[node], Replica: nodeToReplicas[node], Key: node}\n\t\trep := new(rpcs.UpdateReply)\n\t\tconn.Call(\"MME.RecvUpdate\", arg, rep)\n\t}\n\t<-lb.semaphore\n}", "title": "" }, { "docid": "847387e5d132f3ec6c6492280e3e4782", "score": "0.49027497", "text": "func syncFully(tp *pool.TxnPool, reqAddrNonce map[common.Uint160]uint64) ([]*pb.Transaction, error) {\n\n\trespTxns := make([]*pb.Transaction, 0) // response txn list buffer\n\n\tmapMyTxnList := tp.GetAllTransactionLists()\n\tfor addr, myTxnList := range mapMyTxnList {\n\t\tnonce, _ := reqAddrNonce[addr]\n\t\tfor _, txn := range myTxnList {\n\t\t\tif txn.UnsignedTx.Nonce >= nonce {\n\t\t\t\trespTxns = append(respTxns, txn.Transaction)\n\t\t\t}\n\t\t}\n\t}\n\n\tlog.Info(\"Sync txn, send \", len(respTxns), \" txns to neighbor\")\n\n\treturn respTxns, nil\n}", "title": "" }, { "docid": "b04bd91f6b3d5981ac836bb5d010bb6d", "score": "0.49019036", "text": "func (cl *Client) managePeers() {\n\tfor {\n\t\tselect {\n\t\tcase newPeer := <-cl.peersCh:\n\t\t\tif len(cl.peers) >= MAX_PEERS {\n\t\t\t\tfmt.Println(\"Client: ignoring new peers, already at max\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// Already connected to this Peer.\n\t\t\tif _, ok := cl.peers[newPeer.IP.String()]; ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tnewPeer.PieceReqCh = cl.wantPieceCh\n\t\t\tnewPeer.GivePieceCh = cl.givePieceCh\n\t\t\terr := newPeer.Connect(cl.torrent.InfoHash, cl.peerID)\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tcl.peers[newPeer.IP.String()] = newPeer\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0d7d62fc467d66ea5bd8afe0a60be932", "score": "0.4895356", "text": "func (p *staticplus) Sync(add []cache.Container, del []cache.Container) error {\n\tp.Debug(\"synchronizing state...\")\n\tfor _, c := range del {\n\t\tp.ReleaseResources(c)\n\t}\n\tfor _, c := range add {\n\t\tp.AllocateResources(c)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "35c272a50d8ad13ac0dfe904a21e4a9d", "score": "0.48850545", "text": "func (p *policy) Sync(add []cache.Container, del []cache.Container) error {\n\tlog.Debug(\"synchronizing state...\")\n\tfor _, c := range del {\n\t\tp.ReleaseResources(c)\n\t}\n\tfor _, c := range add {\n\t\tp.AllocateResources(c)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9cd60dc3861b0df3accb8d7fc9051300", "score": "0.4861841", "text": "func (mem *Mempool) Wait() {\r\n\t<-mem.poolHeader\r\n\t//wait sync\r\n\t<-mem.poolHeader\r\n}", "title": "" }, { "docid": "7aed5d307ceecc050a87a212fc4fe4a6", "score": "0.48534462", "text": "func (m *ConsensusNetworkMock) MinimockWait(timeout time.Duration) {\n\ttimeoutCh := time.After(timeout)\n\tfor {\n\t\tok := true\n\t\tok = ok && m.GetNodeIDFinished()\n\t\tok = ok && m.NewRequestBuilderFinished()\n\t\tok = ok && m.PublicAddressFinished()\n\t\tok = ok && m.RegisterRequestHandlerFinished()\n\t\tok = ok && m.SendRequestFinished()\n\t\tok = ok && m.StartFinished()\n\t\tok = ok && m.StopFinished()\n\n\t\tif ok {\n\t\t\treturn\n\t\t}\n\n\t\tselect {\n\t\tcase <-timeoutCh:\n\n\t\t\tif !m.GetNodeIDFinished() {\n\t\t\t\tm.t.Error(\"Expected call to ConsensusNetworkMock.GetNodeID\")\n\t\t\t}\n\n\t\t\tif !m.NewRequestBuilderFinished() {\n\t\t\t\tm.t.Error(\"Expected call to ConsensusNetworkMock.NewRequestBuilder\")\n\t\t\t}\n\n\t\t\tif !m.PublicAddressFinished() {\n\t\t\t\tm.t.Error(\"Expected call to ConsensusNetworkMock.PublicAddress\")\n\t\t\t}\n\n\t\t\tif !m.RegisterRequestHandlerFinished() {\n\t\t\t\tm.t.Error(\"Expected call to ConsensusNetworkMock.RegisterRequestHandler\")\n\t\t\t}\n\n\t\t\tif !m.SendRequestFinished() {\n\t\t\t\tm.t.Error(\"Expected call to ConsensusNetworkMock.SendRequest\")\n\t\t\t}\n\n\t\t\tif !m.StartFinished() {\n\t\t\t\tm.t.Error(\"Expected call to ConsensusNetworkMock.Start\")\n\t\t\t}\n\n\t\t\tif !m.StopFinished() {\n\t\t\t\tm.t.Error(\"Expected call to ConsensusNetworkMock.Stop\")\n\t\t\t}\n\n\t\t\tm.t.Fatalf(\"Some mocks were not called on time: %s\", timeout)\n\t\t\treturn\n\t\tdefault:\n\t\t\ttime.Sleep(time.Millisecond)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "8949f14b6f504732cdd52df070577c3f", "score": "0.4852138", "text": "func (db *DB) SyncMarketBalances(eth *adapters.Ethereum, addr string) error {\n\tms, err := db.MarketsJoined()\n\tif err != nil {\n\t\tlog.Printf(\"Error fetching markets: %v\\n\", err)\n\t\treturn err\n\t}\n\n\tfor _, m := range ms {\n\t\tticker := time.NewTicker(10 * time.Second)\n\n\t\tgo func(m *Market) {\n\t\t\tfor {\n\t\t\t\t<-ticker.C\n\n\t\t\t\tbal := eth.ExchangeTokenBalance(m.Exchange.Name, m.Exchange.Address, m.Token.Address, addr)\n\t\t\t\tif err := db.setMarketBalance(m.ID, bal); err != nil {\n\t\t\t\t\tlog.Printf(\"Error updating balance: %v\\n\", err)\n\t\t\t\t}\n\t\t\t}\n\t\t}(m)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "51cc1edb4babc290c6841d865e7c23b9", "score": "0.48513013", "text": "func (p *SwarmProtocol) SendJoinToPeersAndWait(nodes []string) {\n\tlog.Println(\"Sending Join to the given peers... Peers: \", nodes)\n\tfor _, peerID := range nodes {\n\t\tif pID := libp2pID(peerID); p.p2pHost.ID() != pID { // exclude current node's ID\n\t\t\tp.Join(pID)\n\t\t}\n\t}\n\tlog.Print(\"Waiting for nodes to join swarm...\")\n\tfor i := 0; i < len(nodes); i++ {\n\t\t<-p.joinedNode\n\t\tlog.Print(\"One node joined just now!\")\n\t}\n\tlog.Print(\"SWARM READY!\")\n}", "title": "" }, { "docid": "8cda6bef0d10fd4b4a1a7063d8f08ba9", "score": "0.484356", "text": "func (rs storageServers) waitForAllWrites() {\n\tfor _, server := range rs {\n\t\tserver.impl.WriteExecuted()\n\t}\n}", "title": "" }, { "docid": "c217a2c40036cff7ee58a027bc8a2a61", "score": "0.48405802", "text": "func (clst *amazonCluster) wait(awsIDs []awsID, boot bool) error {\nOuterLoop:\n\tfor i := 0; i < 100; i++ {\n\t\tmachines, err := clst.List()\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Warn(\"Failed to get machines.\")\n\t\t\ttime.Sleep(10 * time.Second)\n\t\t\tcontinue\n\t\t}\n\n\t\texists := make(map[awsID]struct{})\n\t\tfor _, inst := range machines {\n\t\t\tid := awsID{\n\t\t\t\tspotID: inst.ID,\n\t\t\t\tregion: inst.Region,\n\t\t\t}\n\n\t\t\texists[id] = struct{}{}\n\t\t}\n\n\t\tfor _, id := range awsIDs {\n\t\t\tif _, ok := exists[id]; ok != boot {\n\t\t\t\ttime.Sleep(10 * time.Second)\n\t\t\t\tcontinue OuterLoop\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t}\n\n\treturn errors.New(\"timed out\")\n}", "title": "" }, { "docid": "4f8ba13dc300e0b6b6ac3c02d0b55705", "score": "0.48349053", "text": "func (sm *SimpleMonitor) SyncNodeStat() error {\n\t// create or get the version of zknode\n\tfmt.Printf(\"check zknode %s\\n\", gconst.GaiaRoot+\"/\"+sm.name)\n\texist, stat, err := sm.conn.Exists(gconst.GaiaRoot + \"/\" + sm.name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !exist {\n\t\t_, err := sm.conn.Create(gconst.GaiaRoot+\"/\"+sm.name, []byte{}, zk.FlagEphemeral, zk.WorldACL(zk.PermAll))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, stat, err = sm.conn.Get(gconst.GaiaRoot + \"/\" + sm.name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tfmt.Printf(\"has create znode %v\\n\", gconst.GaiaRoot+\"/\"+sm.name)\n\tfor {\n\t\tselect {\n\t\tcase <-sm.ctx.Done():\n\t\t\t{\n\t\t\t\treturn nil\n\t\t\t}\n\t\tdefault:\n\t\t\t{\n\t\t\t\targ, err := filters.ParseFlag(gconst.YurtFilter, filters.NewArgs())\n\t\t\t\tif err != nil {\n\t\t\t\t\tpanic(err)\n\t\t\t\t}\n\t\t\t\tcontainers, err := sm.client.ContainerList(sm.ctx, types.ContainerListOptions{\n\t\t\t\t\tFilters: arg,\n\t\t\t\t})\n\t\t\t\t//fmt.Printf(\"containers in check: %v\\n\", containers)\n\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"72 %s\\n\", err.Error())\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tMemory := float64(0)\n\t\t\t\tCPU := float64(0)\n\t\t\t\tfor _, container := range containers {\n\t\t\t\t\tid := container.ID\n\t\t\t\t\tstat, err := sm.client.ContainerStats(sm.ctx, id, false)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tfmt.Printf(\"81 %s\\n\", err.Error())\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tvar dat map[string]interface{}\n\t\t\t\t\tbuf := new(bytes.Buffer)\n\t\t\t\t\t_, err = buf.ReadFrom(stat.Body)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tfmt.Println(err.Error())\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tstr := buf.String()\n\t\t\t\t\terr = json.Unmarshal([]byte(str), &dat)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tfmt.Println(err.Error())\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tcpuStats := dat[\"cpu_stats\"]\n\t\t\t\t\tmcpuStats := cpuStats.(map[string]interface{})\n\t\t\t\t\ttotalUsage := mcpuStats[\"cpu_usage\"].(map[string]interface{})\n\t\t\t\t\tmemoryStats := dat[\"memory_stats\"].(map[string]interface{})\n\t\t\t\t\tif memoryStats[\"usage\"] != nil {\n\t\t\t\t\t\tMemory = Memory + memoryStats[\"usage\"].(float64)\n\t\t\t\t\t}\n\t\t\t\t\tif totalUsage[\"total_usage\"] != nil {\n\t\t\t\t\t\tCPU = CPU + totalUsage[\"total_usage\"].(float64)\n\t\t\t\t\t}\n\n\t\t\t\t\t// fmt.Printf(\"memory usage %v\\n\", memoryStats[\"usage\"].(float64))\n\t\t\t\t\t// fmt.Printf(\"cpu usage %v\\n\", totalUsage[\"total_usage\"].(float64))\n\t\t\t\t}\n\t\t\t\tnodeInfo := zookeeper.ZKNode{CPU: CPU, Memory: Memory, CreateAddr: sm.createAddr}\n\t\t\t\tbuf := new(bytes.Buffer)\n\t\t\t\tenc := gob.NewEncoder(buf)\n\t\t\t\terr = enc.Encode(nodeInfo)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tstat, err = sm.conn.Set(gconst.GaiaRoot+\"/\"+sm.name, buf.Bytes(), stat.Version)\n\t\t\t\t// TODO sync data to zookeeper\n\t\t\t\t//fmt.Printf(\"update value %v\\n\", nodeInfo)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "160e46e3bba41626d5f5a70300839926", "score": "0.48304906", "text": "func (this *P2PServer) syncPeerAddr() {\n\tchanged := false\n\tnetID := config.DefConfig.P2PNode.NetworkMagic\n\tfor i := 0; i < len(this.recentPeers[netID]); i++ {\n\t\tp := this.network.GetPeerFromAddr(this.recentPeers[netID][i])\n\t\tif p == nil || (p != nil && p.GetState() != common.ESTABLISH) {\n\t\t\tthis.recentPeers[netID] = append(this.recentPeers[netID][:i], this.recentPeers[netID][i+1:]...)\n\t\t\tchanged = true\n\t\t\ti--\n\t\t}\n\t}\n\tleft := common.RECENT_LIMIT - len(this.recentPeers[netID])\n\tif left > 0 {\n\t\tnp := this.network.GetNp()\n\t\tnp.Lock()\n\t\tvar ip net.IP\n\t\tfor _, p := range np.List {\n\t\t\taddr, _ := p.GetAddr16()\n\t\t\tip = addr[:]\n\t\t\tnodeAddr := ip.To16().String() + \":\" +\n\t\t\t\tstrconv.Itoa(int(p.GetPort()))\n\t\t\tfound := false\n\t\t\tfor i := 0; i < len(this.recentPeers[netID]); i++ {\n\t\t\t\tif nodeAddr == this.recentPeers[netID][i] {\n\t\t\t\t\tfound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !found {\n\t\t\t\tthis.recentPeers[netID] = append(this.recentPeers[netID], nodeAddr)\n\t\t\t\tleft--\n\t\t\t\tchanged = true\n\t\t\t\tif left == 0 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tnp.Unlock()\n\t} else {\n\t\tif left < 0 {\n\t\t\tleft = -left\n\t\t\tthis.recentPeers[netID] = append(this.recentPeers[netID][:0], this.recentPeers[netID][0+left:]...)\n\t\t\tchanged = true\n\t\t}\n\n\t}\n\tif changed {\n\t\tbuf, err := json.Marshal(this.recentPeers)\n\t\tif err != nil {\n\t\t\tlog.Warn(\"[p2p]package recent peer fail: \", err)\n\t\t\treturn\n\t\t}\n\t\terr = ioutil.WriteFile(common.RECENT_FILE_NAME, buf, os.ModePerm)\n\t\tif err != nil {\n\t\t\tlog.Warn(\"[p2p]write recent peer fail: \", err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "582f5558ba55b75368375c944b707c45", "score": "0.48283085", "text": "func Syncdata(db *sql.DB, client *consulapi.Client) (errnum int, err error) {\n\tsql := \"select hostname, ip, labels,monitor from machine where monitor != 1 and monitor !=4\"\n\trows, err := db.Query(sql)\n\tif err != nil {\n\t\tlog.Errorf(\"Query machine table Failed\")\n\t} else {\n\t\tdefer rows.Close()\n\t\tfor rows.Next() {\n\t\t\tvar (\n\t\t\t\thostname string\n\t\t\t\tip string\n\t\t\t\tlabels string\n\t\t\t\tmonitor int\n\t\t\t)\n\t\t\terr = rows.Scan(&hostname, &ip, &labels, &monitor)\n\t\t\tif err != nil {\n\t\t\t\tlog.Errorf(\"ERROR: %v\", err)\n\t\t\t\terrnum++\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif monitor == 0 {\n\t\t\t\tlog.Infof(\"Start register %s-%s\", hostname, ip)\n\t\t\t\terr := register(hostname, ip, labels, monitor, db, client)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorf(\"Register %s-%s failed errinfo %v\", hostname, ip, err)\n\t\t\t\t\terrnum++\n\t\t\t\t}\n\t\t\t} else if monitor == 2 {\n\t\t\t\terr := register(hostname, ip, labels, monitor, db, client)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorf(\"Register %s-%s failed errinfo %v\", hostname, ip, err)\n\t\t\t\t\terrnum++\n\t\t\t\t}\n\t\t\t} else if monitor == 3 {\n\t\t\t\tserviceid := md5V3(fmt.Sprintf(\"%s-%s\", hostname, ip))\n\t\t\t\terr := consul.ConsulFindServer(serviceid, client)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorf(\"ERR %v\", err)\n\t\t\t\t}\n\t\t\t\tlog.Infof(\"Service id is %s,Deregister it\", serviceid)\n\t\t\t\terr = consul.ConsulDeRegister(serviceid, client)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorf(\"Deregister service %s failed\", serviceid)\n\t\t\t\t\terrnum++\n\t\t\t\t}\n\t\t\t\tstmt, err := db.Prepare(`UPDATE machine set monitor=4 where ip=?`)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorf(\"Update prepare err %v\", err)\n\t\t\t\t\terrnum++\n\t\t\t\t}\n\t\t\t\t_, err = stmt.Exec(ip)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorf(\"Update exec err %v\", err)\n\t\t\t\t\terrnum++\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tlog.Infof(\"sync machineinfo success\")\n\t}\n\treturn errnum, err\n}", "title": "" }, { "docid": "bec6d3a1f943e53365edbcfbd7f014e9", "score": "0.48281854", "text": "func (s *service) SyncNodeInfo(ctx context.Context, id int64) error {\n\t// Get the FMS RPC client\n\tfmsClient, err := s.connMgr.GetClient(id)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"could not fetch client\")\n\t}\n\n\tcfgs, err := s.orm.ListChainConfigsByManagerIDs([]int64{id})\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"could not fetch chain configs\")\n\t}\n\n\tcfgMsgs := make([]*pb.ChainConfig, 0, len(cfgs))\n\tfor _, cfg := range cfgs {\n\t\tcfgMsg, msgErr := s.newChainConfigMsg(cfg)\n\t\tif msgErr != nil {\n\t\t\ts.lggr.Errorf(\"SyncNodeInfo: %v\", msgErr)\n\n\t\t\tcontinue\n\t\t}\n\n\t\tcfgMsgs = append(cfgMsgs, cfgMsg)\n\t}\n\n\tif _, err = fmsClient.UpdateNode(ctx, &pb.UpdateNodeRequest{\n\t\tVersion: s.version,\n\t\tChainConfigs: cfgMsgs,\n\t}); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0b694e272250f76f56a5e8805e375e14", "score": "0.48256916", "text": "func (syncObj *syncparams)JoinAllRoutines() {\n syncObj.appWaitGroups.Wait()\n\n}", "title": "" }, { "docid": "bf94796a853849873882386bf82be287", "score": "0.4825598", "text": "func (m *istioMonitor) sync() {\n\tdeletionCandidates := m.registry.GetRegisteredProcesses()\n\n\t_ = kernel.WithAllProcs(m.procRoot, func(pid int) error {\n\t\tif _, ok := deletionCandidates[uint32(pid)]; ok {\n\t\t\t// We have previously hooked into this process and it remains active,\n\t\t\t// so we remove it from the deletionCandidates list, and move on to the next PID\n\t\t\tdelete(deletionCandidates, uint32(pid))\n\t\t\treturn nil\n\t\t}\n\n\t\t// This is a new PID so we attempt to attach SSL probes to it\n\t\tm.handleProcessExec(uint32(pid))\n\t\treturn nil\n\t})\n\n\t// At this point all entries from deletionCandidates are no longer alive, so\n\t// we should dettach our SSL probes from them\n\tfor pid := range deletionCandidates {\n\t\tm.handleProcessExit(pid)\n\t}\n}", "title": "" }, { "docid": "cb541a24d17d63b4739870c88207701f", "score": "0.48159027", "text": "func (m *monitor) syncMirrorList(mirrorsIDs ...int) error {\n\tfor _, id := range mirrorsIDs {\n\t\tmir, err := m.cache.GetMirror(id)\n\t\tif err != nil && err != redis.ErrNil {\n\t\t\tlog.Errorf(\"Fetching mirror %s failed: %s\", id, err.Error())\n\t\t\tcontinue\n\t\t} else if err == redis.ErrNil {\n\t\t\t// Mirror has been deleted\n\t\t\tm.mapLock.Lock()\n\t\t\tdelete(m.mirrors, id)\n\t\t\tm.mapLock.Unlock()\n\t\t\tm.cluster.RemoveMirrorID(id)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Compute the space required to display the mirror names in the logs\n\t\tif len(mir.Name) > m.formatLongestID {\n\t\t\tm.formatLongestID = len(mir.Name)\n\t\t}\n\n\t\tm.cluster.AddMirror(&mir)\n\n\t\tm.mapLock.Lock()\n\t\tif _, ok := m.mirrors[mir.ID]; ok {\n\t\t\t// Update existing mirror\n\t\t\ttmp := m.mirrors[mir.ID]\n\t\t\ttmp.Mirror = mir\n\t\t\tm.mirrors[mir.ID] = tmp\n\t\t} else {\n\t\t\t// Add new mirror\n\t\t\tm.mirrors[mir.ID] = &mirror{\n\t\t\t\tMirror: mir,\n\t\t\t}\n\t\t}\n\t\tm.mapLock.Unlock()\n\t}\n\n\tlog.Debugf(\"%d mirror%s updated\", len(mirrorsIDs), utils.Plural(len(mirrorsIDs)))\n\treturn nil\n}", "title": "" }, { "docid": "62dc2e295b09b069882dcd318a9c3dcf", "score": "0.48086697", "text": "func (p *staticplus) updatePools() error {\n\tfor id, ca := range p.allocations {\n\t\tif ca.exclusive.IsEmpty() {\n\t\t\tcontinue\n\t\t}\n\n\t\tisolated := ca.exclusive.Intersection(p.sys.Isolated())\n\t\texcshare := ca.exclusive.Difference(isolated)\n\n\t\tif !isolated.IsEmpty() && !excshare.IsEmpty() {\n\t\t\treturn policyError(\"container %s has exclusive isolated (%s) and shareable (%s) cpus\",\n\t\t\t\tid, isolated.String(), excshare.String())\n\t\t}\n\n\t\tp.isolated = p.isolated.Difference(isolated)\n\t\tp.shared = p.shared.Difference(excshare)\n\t}\n\n\tif err := p.updateSharedAllocations(); err != nil {\n\t\treturn err\n\t}\n\n\tp.cache.SetPolicyEntry(keySharedPool, p.shared)\n\tp.cache.SetPolicyEntry(keyAllocations,\n\t\tcache.Cachable(&cachedAllocations{a: p.allocations}))\n\n\treturn nil\n}", "title": "" }, { "docid": "020ceda6fbbb2216be3900655e79d40e", "score": "0.48080048", "text": "func SyncDirtyAll(ctx context.Context, cache *FileRangeSet, dirty *DirtySet, max uint64, mem memmap.File, writeAt func(ctx context.Context, srcs safemem.BlockSeq, offset uint64) (uint64, error)) error {\n\tdseg := dirty.FirstSegment()\n\tfor dseg.Ok() {\n\t\tif err := syncDirtyRange(ctx, dseg.Range(), cache, max, mem, writeAt); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif dseg.Value().Keep {\n\t\t\tdseg = dseg.NextSegment()\n\t\t} else {\n\t\t\tdseg = dirty.Remove(dseg).NextSegment()\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0ecf47d8895ce662fedfb145faee5689", "score": "0.4800736", "text": "func testSync(tc *testContext) bool {\n\ttests := []struct {\n\t\tname string\n\t\thash *chainhash.Hash\n\t}{\n\t\t{\n\t\t\tname: \"Block 1\",\n\t\t\thash: newShaHash(\"00000000170c2da7cd7c9bb217f2513655756f72a869551b946d0987d4077605\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 2\",\n\t\t\thash: newShaHash(\"00000000e499abdc7671834bab04f7b0c345bc8aa6331976df76e5630ab7d510\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 3\",\n\t\t\thash: newShaHash(\"00000000a551b11041ca97ecf9c80b5cc0c440b557b8fd4b66ab5a96f77f6229\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 4\",\n\t\t\thash: newShaHash(\"00000000c7a90e89dc116ad11855eaedfc643212c3fbff56b808ab4b9edb652d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 5\",\n\t\t\thash: newShaHash(\"000000009b6ec88a92bc674430d7fbf74ebdbbbd0466db19d1ac4838d3c6d094\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 6\",\n\t\t\thash: newShaHash(\"00000000a15479476f74b2f5b04e9e36d2c0b9c1509cd17fc5a3cc0d3d39aff8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 7\",\n\t\t\thash: newShaHash(\"00000000a5b191372515a221e4e0624259fdb68e3491bd9d479a4f0cf070932a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 8\",\n\t\t\thash: newShaHash(\"00000000c6bd4452b81edae1bfec6fa8db61184b99407f23004c427fe9466b3b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 9\",\n\t\t\thash: newShaHash(\"000000006d7600588f7dbdb58675efe19e8f2c965050022aad933fcd68710541\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 10\",\n\t\t\thash: newShaHash(\"00000000952aa75a0872d64120d9c7fe1ed014a3d0dfeb6590ddbd8dd549665e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 11\",\n\t\t\thash: newShaHash(\"00000000d1acfbbbea537ced7f80b161e40d640992c604220dbd8f9acc6790cf\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 12\",\n\t\t\thash: newShaHash(\"00000000ed11b196c9b04bfbe7d8ccc3424173563f6739230509dce8249d182c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 13\",\n\t\t\thash: newShaHash(\"0000000060cf018ea57102a4b72de40b91fc670346f795e3fdea5fe0b86a5c75\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 14\",\n\t\t\thash: newShaHash(\"00000000446156f84e741cfcd2a920a6ecc684ec0eab88d2a4eafa9e8df53a36\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 15\",\n\t\t\thash: newShaHash(\"000000002cc3e751f98a4f90bc6153a64ea481e9f4766f19fb07c4edebc5d2f3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 16\",\n\t\t\thash: newShaHash(\"000000001ae60703b9d8165d84850f378f6bc23dd9f857b749c8c07e99dbf2ad\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 17\",\n\t\t\thash: newShaHash(\"00000000504d7fc7e392404d32c79084defa0b4e433205861b3d3cc5ef9a05b1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 18\",\n\t\t\thash: newShaHash(\"00000000e21d0ff9bddc4f24a51abb385bad1c017b8192c14d8094c7779d7f9f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 19\",\n\t\t\thash: newShaHash(\"0000000056ac2980bc16ffeb5f65baa8b15fd2a0123815ca6bb849e05c1faefc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 20\",\n\t\t\thash: newShaHash(\"000000000ff479d38b0685edc5adb0a126b35e04ffd81b4ac95c9135d8f81071\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 21\",\n\t\t\thash: newShaHash(\"00000000ea9c796a13745bab5d5255bbeb8fca5e3b49f7dfdd2fe6ae55488379\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 22\",\n\t\t\thash: newShaHash(\"0000000008a10bcb5d5013f6e81404df9ba592e8525c2dc4a6b8b0c4ba85c6a1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 23\",\n\t\t\thash: newShaHash(\"0000000026335b78322c7956831055900be53b080324fba163b180509789cf40\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 24\",\n\t\t\thash: newShaHash(\"00000000a4d4f7794db8dd5546ec9b9afb1b63ba660727a048263af5400aa6c7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 25\",\n\t\t\thash: newShaHash(\"000000004d49e2ed513d389f7c1a88aa798bd6a3529a57f1471e4cbed25ef838\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 26\",\n\t\t\thash: newShaHash(\"000000004a747915fd94baae58a3a8b61f08e11c8b7ac88326637cb2d8e48496\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 27\",\n\t\t\thash: newShaHash(\"000000005234aca9b558516e0aa1ad69387e267e9f6f6ba5e1d5b4ec7b8105ea\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 28\",\n\t\t\thash: newShaHash(\"00000000883fda4f52cd4f29760a2ec6d8a6b1bbdaa38aa98e6646713aff6c70\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 29\",\n\t\t\thash: newShaHash(\"00000000054b63e4612173806cc5a4f896d0728c5fb08b6dc664a635892a2d2c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 30\",\n\t\t\thash: newShaHash(\"000000008a4a02bc93eee9852aaf07dc2fb52a54ea029d14241d28bdd2175cbc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 31\",\n\t\t\thash: newShaHash(\"00000000744aaf54c6015a03fdd00776821be00626744a2608e320ceb8241f5e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 32\",\n\t\t\thash: newShaHash(\"00000000ca83f3a2fdb1e3a06b356aad5b70a5b1ee55d4fc7059b0d90aac39f0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 33\",\n\t\t\thash: newShaHash(\"00000000c3f5e1717007cd01d64ff7a44b01baa99ce80620f4678f162f4c40f5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 34\",\n\t\t\thash: newShaHash(\"00000000cfc908b9e6ac53e136b7048871b9452d410c26dc1fac7c08a5725f31\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 35\",\n\t\t\thash: newShaHash(\"00000000e87f1d969856b3b6f9d0e46cdd89534353fb8b1577b1fc5b0a49b2cd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 36\",\n\t\t\thash: newShaHash(\"0000000067aaa2be39a9b0c8aad5eeec2309d98a10862166ddd45ff795f98f1f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 37\",\n\t\t\thash: newShaHash(\"00000000a0006086880e42076017466c527413486e6bd662cfc16181ea7eca1b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 38\",\n\t\t\thash: newShaHash(\"00000000420e39561219423da246371a7b37babb99391b4c481081b899b5e0de\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 39\",\n\t\t\thash: newShaHash(\"00000000782a3d8923e87cc190f90629bb663108d5c0d220101c9d75b09e8422\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 40\",\n\t\t\thash: newShaHash(\"00000000812b7cc5cb726e4263c6a4000303a4f02130c08ea67073e8221a734a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 41\",\n\t\t\thash: newShaHash(\"000000006cb771ff8f4abe9c95d02b4d158dc52b8d57865a975b4c2b18b40654\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 42\",\n\t\t\thash: newShaHash(\"000000002df8f58def7198a97db366d69ea7a8e2f5a99108f96cb1080d66cacc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 43\",\n\t\t\thash: newShaHash(\"00000000d6c9284107b6fca52ab5dfd5bbbf52060c486b16984ac08726c2324e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 44\",\n\t\t\thash: newShaHash(\"00000000242dfd1b78a5a9716d0947b7b20e7a78101da0c02c413f920d31fbec\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 45\",\n\t\t\thash: newShaHash(\"00000000b558cb44dd9958d389e930a0d1f6b2164c4565508975e28b31ea6b80\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 46\",\n\t\t\thash: newShaHash(\"0000000021a05575ad072b044f320b59579a99e3c8fd83a9d350fd114dadd19c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 47\",\n\t\t\thash: newShaHash(\"00000000c2548772f30c536ac17e34d28af8c94998adf3c5ea9b3197dea5a161\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 48\",\n\t\t\thash: newShaHash(\"00000000d1f0b93b5039e80114e8ffeae07011c0481375db06973006515713c3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 49\",\n\t\t\thash: newShaHash(\"00000000207a32ef68a206096b389b7b6a01252f97271abe2049bd09a0d0a43b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 50\",\n\t\t\thash: newShaHash(\"0000000093bfb8f0239a477b2343ebb1bdcbb8a8d091dbff046a17ba4f1c4889\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 51\",\n\t\t\thash: newShaHash(\"000000001bf469edde4733dea106ff8c9263d1f7298c05cccc258f5da287d172\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 52\",\n\t\t\thash: newShaHash(\"000000009c8b9f74afce1bd3c5717bf50835eeeaeaac54714c220bee99575965\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 53\",\n\t\t\thash: newShaHash(\"000000003a15fbf71b03b8b3bb24d2d3bfae72a49a14a039dfe644599a52da54\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 54\",\n\t\t\thash: newShaHash(\"00000000590616afec0b30dd1026f35d6bbc4eeaa59c4c0dfbe5ae4c893b8458\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 55\",\n\t\t\thash: newShaHash(\"00000000329bd8c27c1d10258a00fa1cafdaadda295fdbae3346992a42eb29f7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 56\",\n\t\t\thash: newShaHash(\"0000000007bb8ca72cef316afcd623d56409e57e4f57c75dc8a08ce826d86d4e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 57\",\n\t\t\thash: newShaHash(\"00000000e315c956ec67be3169b4bb59b0b09ab5abce5f0e85495f1ea42eca8f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 58\",\n\t\t\thash: newShaHash(\"000000003c32bb5d3387dacf3ce8e7c882784fd6017862fedb71d692d7bf675c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 59\",\n\t\t\thash: newShaHash(\"00000000e566aca785f55a111b349bd56d293fa8332af8490e24f43d5ff52895\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 60\",\n\t\t\thash: newShaHash(\"00000000cf5048aa67b8fe5d1838d7f25335d335a22c2d3e7e738a1a77b174cd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 61\",\n\t\t\thash: newShaHash(\"000000007a6195659b6cac5d8da9b8d2a2542b67d6e2992c4d36c8362244f043\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 62\",\n\t\t\thash: newShaHash(\"00000000c46affe709edc22efce8e1840cf4b6bedc38d785384cf32560e892f8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 63\",\n\t\t\thash: newShaHash(\"000000009472fd78caf6e16d65df58e24194bd9407535422ebd6af58052ebfb2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 64\",\n\t\t\thash: newShaHash(\"000000009088923d075a8d8225d9b34f005de314994550679a499263cac7a50a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 65\",\n\t\t\thash: newShaHash(\"00000000aef50945837256f16ffa774bfd5007e03c3abad6d2fb2c5802b3e571\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 66\",\n\t\t\thash: newShaHash(\"0000000088bc63cad0ff6ed651df6dcc18e5aec57f69048e73fbf143d7e65bbd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 67\",\n\t\t\thash: newShaHash(\"0000000058be8771c6ea8063da502f41ff89c4c0fcffe98df55a9d54d5e64fdc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 68\",\n\t\t\thash: newShaHash(\"000000004b022b71f4c600a5187957c2af8fdaa76d667fff542f9639072e1b45\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 69\",\n\t\t\thash: newShaHash(\"00000000d505f5ae96ffa8ce15e46e1bb176391294e3f481478f39642a48dac7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 70\",\n\t\t\thash: newShaHash(\"0000000074b36c5a04ec4f1bba0e70625d5b0512f226705cbc7ba609de64c8c9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 71\",\n\t\t\thash: newShaHash(\"00000000ff3954b69e914a4949121f255a5f7c07040f08e3ec4cafe1ba391d5e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 72\",\n\t\t\thash: newShaHash(\"00000000d0aadee9491832d7527a8077e84a3fdbefbc7a4e57d88259021fa018\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 73\",\n\t\t\thash: newShaHash(\"00000000d0291a8f30d3403f26529ca4eceed3c7e7a9c378867e86410204c296\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 74\",\n\t\t\thash: newShaHash(\"00000000dc27af8e44ddb8fa6100331d824d4da104f2d47dfd2e3a7f70a38386\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 75\",\n\t\t\thash: newShaHash(\"00000000e5e5765eb93e5035c1ec162b815b5e0082d6b8e4dc710b10d9cbe83b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 76\",\n\t\t\thash: newShaHash(\"0000000041d8dbac203f33e3bc9d21ad2f81ef074b678601d0bd88b49861f14a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 77\",\n\t\t\thash: newShaHash(\"00000000635ac64af67dd31c1e5c1c3a7769e51cac299bfb71f2263e5538ccda\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 78\",\n\t\t\thash: newShaHash(\"00000000a2a16e3fa441075e78574addb0f4848743f9e8aa7f6e404ac80afefa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 79\",\n\t\t\thash: newShaHash(\"00000000f1764dd13216145998c5b87640a25a32cb0b3fe24374523f94f51fe7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 80\",\n\t\t\thash: newShaHash(\"00000000784bf9ecc7666b276a0cfd4e8e754949a461f544da7b05d4e840e196\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 81\",\n\t\t\thash: newShaHash(\"0000000020cff7f79438676da49080c5fce1a80cb0cb1389ac0e6733269f0a4d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 82\",\n\t\t\thash: newShaHash(\"0000000024ebe071f0ebda454d3513d26a457fe0a275742d630d57dae9d0e496\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 83\",\n\t\t\thash: newShaHash(\"00000000c982afeda66b4211d28b3b1e515f76a33320bbb160a9f8cd011ca689\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 84\",\n\t\t\thash: newShaHash(\"00000000d487d140440b6d78370130c7af0ffbb165988543697926e40a8755d4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 85\",\n\t\t\thash: newShaHash(\"00000000d7e7860c6d388ad3a364bf1da41f72baf292f6f05f36dd36c81b8592\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 86\",\n\t\t\thash: newShaHash(\"0000000019605cf12b68243a7e531801705a04a427ea312da3e85bc63044813e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 87\",\n\t\t\thash: newShaHash(\"000000000602f94bd9c5902fb4c18cf9bc84ca3dc2d6c267315cc99c41a8c1cf\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 88\",\n\t\t\thash: newShaHash(\"0000000031e5d306dba73d69d4966530ddb71ea36dc02af38d39437cc4c6bec7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 89\",\n\t\t\thash: newShaHash(\"00000000ab5379d06d181e30c08aa97c783d774bec2c6701398e37fd15bf02c3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 90\",\n\t\t\thash: newShaHash(\"00000000928b3fb988ced804d77cb703a2c6b0bfa51cc45952cd4f05442322d5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 91\",\n\t\t\thash: newShaHash(\"0000000073c1e26bbaaeb70918dee05003272bbc3a178c33b0d9925e04705dd2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 92\",\n\t\t\thash: newShaHash(\"000000005ecda28787e1b06491c2c5abca69ed9e1ef4cd51460b267867b30d73\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 93\",\n\t\t\thash: newShaHash(\"000000008f8868ecf94008d13e0cb3cd2bcf18bb854a9e9cc0a4f40cc29c1d3d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 94\",\n\t\t\thash: newShaHash(\"0000000049e59cdf55aa7ea0fb8306154bc59ce1931e84043e915408073113b6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 95\",\n\t\t\thash: newShaHash(\"00000000c579d29968562efd449115dc2ebeba6f4e6b30e50e829c7a76d0e1c1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 96\",\n\t\t\thash: newShaHash(\"00000000c075de4d70e94943f150b7a41bdd6e06dbd09f94d317b8885bfc5bc2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 97\",\n\t\t\thash: newShaHash(\"000000001ed0ea5782d3b88bfa46acd59ed2516b4005897035a475e113f23770\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 98\",\n\t\t\thash: newShaHash(\"00000000db10dff09916db7f84be5a16797a5a4d8ad618411cb6641e8823405f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 99\",\n\t\t\thash: newShaHash(\"000000006a82518ceeebd7e53a90c64a6a863d1580a1dc20c714e69e0cce4db8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 100\",\n\t\t\thash: newShaHash(\"000000005a2356fbcef6e798b11a16d2144a380128a1d0132b75b7cb0a9e470b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 101\",\n\t\t\thash: newShaHash(\"0000000029661ba4d75e4d1eeedc5ef88a2a1220c566a31d7c70c5d2d654a3b9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 102\",\n\t\t\thash: newShaHash(\"000000008cf786cba1b270ca075a6797ab256073f3c11aaff5a5582b2c179045\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 103\",\n\t\t\thash: newShaHash(\"00000000fcde8c96b09201c6d5f9ec26329ed007950681b88d8384d1ffb9b1bd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 104\",\n\t\t\thash: newShaHash(\"00000000fcde4decd678447dbb4faef4f48839177827c489b9d73acbcefbcb47\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 105\",\n\t\t\thash: newShaHash(\"0000000035b11696adb8ba0bf41351058c54e9e8928ca787f3f9ce9c9ba2874d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 106\",\n\t\t\thash: newShaHash(\"00000000dee780fee4e91430d9ae0fb631bded19b65d265b263eb010f1809229\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 107\",\n\t\t\thash: newShaHash(\"000000009ee7630e8dafc979ac741feddaadd030a8c8a749cac0c3c3e7856c9b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 108\",\n\t\t\thash: newShaHash(\"000000002600c29962b198078f3685c61e14e407873d738578c93c6c1b42d80d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 109\",\n\t\t\thash: newShaHash(\"0000000003b2804bae4a0acd5e6cd429e1a1c3b963409ea408354e87bd9944f1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 110\",\n\t\t\thash: newShaHash(\"00000000a6d9d841e2e2be246c793dabcbf02e1e5426ca07c4b31e1ee1d5160b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 111\",\n\t\t\thash: newShaHash(\"000000005e34ec2ea6213aa2dec0d43e558c8bcb077b020db29e07f5a585b397\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 112\",\n\t\t\thash: newShaHash(\"000000009d8c0d09db25f10dafde4009e7d7c09b4927bd7a627e5a5226b5c21a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 113\",\n\t\t\thash: newShaHash(\"00000000b6020715125f57855eacaa776b3eec95f8d5ee7d23877e391de74443\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 114\",\n\t\t\thash: newShaHash(\"00000000565a375cb75f9dfa8c05674cc3b2baf6790cfb67d790e1bd512417c4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 115\",\n\t\t\thash: newShaHash(\"00000000dc8b6d9a2c8774e234c5cac2f3f0ace6b2e93b1d609e74e42bc9840d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 116\",\n\t\t\thash: newShaHash(\"000000004312d34ce784ab7c081badb46be042ed599489e879bcfcca169ec028\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 117\",\n\t\t\thash: newShaHash(\"0000000064ccf33df3ffe6a0e4d754615db89004984fcf49ee61cde69233fb4e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 118\",\n\t\t\thash: newShaHash(\"00000000eaf5b0f30bed1a90c74540b365a1ffd3551372fc47a3cd14f0af368b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 119\",\n\t\t\thash: newShaHash(\"00000000a456273c52c65f55acfb7c19e53bcc9f09ea23c4a72299e01347d429\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 120\",\n\t\t\thash: newShaHash(\"000000005add75a68e6bac56cf97c601501aaee9f20be8222cc58ab4a5a4b6a4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 121\",\n\t\t\thash: newShaHash(\"00000000f490230b44752d8f49fd713b9f2c291ad2f7b5166867a5fe8eda6e57\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 122\",\n\t\t\thash: newShaHash(\"00000000f2a361d8e41c9151e8e5f8607756e95c69ce746d3f15cd6855330630\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 123\",\n\t\t\thash: newShaHash(\"000000007ab9f05db14d243d914ad041f81086de79f0c52bb37a77a8c68c86ec\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 124\",\n\t\t\thash: newShaHash(\"0000000026cf783939ad0678a38de4f20bdd35ed7f0db415209f337dfc473cc8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 125\",\n\t\t\thash: newShaHash(\"00000000570b4e99c3fb4959b3ab526ab5fb5b09705d0ed8c8fd5d005d4409f1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 126\",\n\t\t\thash: newShaHash(\"00000000fb93ed3436517bdc90b171fd13c7efbd3b4637b27659def790584e0e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 127\",\n\t\t\thash: newShaHash(\"000000009a53b83dfa755220716700559ea39d9c4e695e16f98f5ccf3050605d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 128\",\n\t\t\thash: newShaHash(\"00000000303234edac37f9ccba62ac101b3adfe31c2987c7e34985a210b30dae\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 129\",\n\t\t\thash: newShaHash(\"000000004073a1a48a7c184372e4bb9bebb401ac772a2ed2d6ca932fe3ccb792\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 130\",\n\t\t\thash: newShaHash(\"0000000086e8fab047978164e06c97795fcaaa72b47d2d76c9c135acd0cef70c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 131\",\n\t\t\thash: newShaHash(\"0000000042bcc05522d27245dd37115cfec7a4b06a0b6bc8497828596fa5d3ab\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 132\",\n\t\t\thash: newShaHash(\"00000000afb5938f023120f93ed65f833760313f88c5cfebd65cedba4cbb4767\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 133\",\n\t\t\thash: newShaHash(\"0000000052e0b88cd9c2b2292beea739778d677a4c7aab2c6666b6f33cb75222\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 134\",\n\t\t\thash: newShaHash(\"000000005df97f7456665e6792c39ac7fc7d838bce6569e809209e0a87031d44\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 135\",\n\t\t\thash: newShaHash(\"00000000f77d84611d1cff2cdbe6b51bedd2c77112dee90d5e47b60b0c4f0ef4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 136\",\n\t\t\thash: newShaHash(\"0000000015e649a56cce2d5b34a70f2fc11dc2acd5a5400b33dd742f2f602b72\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 137\",\n\t\t\thash: newShaHash(\"000000002edd93c3ee6e611ecdc1535497c5edba38a1bfcdf92c19b39b4951af\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 138\",\n\t\t\thash: newShaHash(\"0000000056e5c5f8b64095e8d803a156f4451360eba2c54cd0c863e559972ec5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 139\",\n\t\t\thash: newShaHash(\"00000000dc3dd6a75015f2edac34f3b2c83c544179ed7de39f6b802180a1e226\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 140\",\n\t\t\thash: newShaHash(\"00000000a9d4f47ec4e97ef74d19d8b39fd7d14e83eab2c4c2d74ccb41a34bdd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 141\",\n\t\t\thash: newShaHash(\"0000000061b6ada522a37d53878bcfa56467f81bb2485d8f3d1ad858e12d9c6a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 142\",\n\t\t\thash: newShaHash(\"000000007613aac902bdc5e03adfc7bca67edd8c29ecfd7992a0e6daebb033ed\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 143\",\n\t\t\thash: newShaHash(\"00000000da2ffdd7e638ed3c90263a26e080473a22504b8465d0edaac4eec8d6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 144\",\n\t\t\thash: newShaHash(\"0000000096a778f81708a33e4d1e248a919d125b8538480a02f0bfced49359ea\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 145\",\n\t\t\thash: newShaHash(\"00000000765299126c3869c155a4d9155500196f4e90b8c85fc54541e5816abe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 146\",\n\t\t\thash: newShaHash(\"00000000e9bb07942538985e9403f13a52e9042cfd2f08713f597235e371ef32\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 147\",\n\t\t\thash: newShaHash(\"00000000cbcee79b2df14d825e65fe906938b8b15f4e70f0bcac4bd76575eafb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 148\",\n\t\t\thash: newShaHash(\"00000000aa81ef699973799bd0c4fb937f4e9ca9310fa3dce0214e064b334e62\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 149\",\n\t\t\thash: newShaHash(\"0000000050c55c2728b3a7ba29bcd6c1d5dc0b868978dbf177305fcf587c97e8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 150\",\n\t\t\thash: newShaHash(\"00000000e04514187614d418cca31ef9f5a27ca60a770f0bb9d321057bb78d6b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 151\",\n\t\t\thash: newShaHash(\"0000000086ca78ff28902ed17a6b809ee40679bf3404901c01b382dc02b6f707\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 152\",\n\t\t\thash: newShaHash(\"00000000ec49431b046543bb8b5dbf83d722eff9e7a325e2526ed7a1d0737b66\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 153\",\n\t\t\thash: newShaHash(\"00000000eb4bd683ab5b392de44c0d223c406a8acbf9ff0aebdf8f07c2da41be\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 154\",\n\t\t\thash: newShaHash(\"00000000baed024eb0da5c7de77fb4bf59d90551805717f6efac461cce36bb4a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 155\",\n\t\t\thash: newShaHash(\"00000000df605c12fc2d15a1d4e5080d694ddb28409a0b723142d478b0e08df4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 156\",\n\t\t\thash: newShaHash(\"00000000f78360dfc887e0d242bb1485ccaab1233d16c3ce2b4047013c3d91da\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 157\",\n\t\t\thash: newShaHash(\"000000009e3cb139d0ef958f4545c2148c1c93f833f3dbb3f6cf6456fae09c58\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 158\",\n\t\t\thash: newShaHash(\"00000000b8286462588b1cb000f07d1e62140a8d6488d28007263fda214bdc94\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 159\",\n\t\t\thash: newShaHash(\"000000007b7bbe97a5ea507251cd14e2b2aa083e1d193e007bb66998c5dc331d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 160\",\n\t\t\thash: newShaHash(\"0000000037ded6441b6c2c025a1af1d94d14288185cdba3e54db700eb5ef493f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 161\",\n\t\t\thash: newShaHash(\"000000005df8a29994757e87ada7d4a3156471aade09b1a664b7daafb57205a4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 162\",\n\t\t\thash: newShaHash(\"00000000a00f40484aee30b1625091088864bbff36b62b29c711801b965999e3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 163\",\n\t\t\thash: newShaHash(\"000000009fdb3373dc1e03a911d4dd827e7f93d582a97d1bdd73b23b245d24f5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 164\",\n\t\t\thash: newShaHash(\"00000000524c9fe61e25cf9af8cb775f354bf33671f40431f657a3dc960bd8ef\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 165\",\n\t\t\thash: newShaHash(\"00000000c3443c19b834b1cbddb93104ae56f8c93265b0ecce38e019915bd1e8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 166\",\n\t\t\thash: newShaHash(\"000000002de4f4e6335d5223a4641cc2560fed5a078ca6e95e4a763690d7f07f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 167\",\n\t\t\thash: newShaHash(\"00000000a3d9fef29e58144247c3b762f9e559936532eb26edfd3f4649fb1ad1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 168\",\n\t\t\thash: newShaHash(\"00000000be20f60488800c8dd867ab95cc24934cbbb7ea029c848adb04083ef8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 169\",\n\t\t\thash: newShaHash(\"000000008ab1b294d2895b05cc0a423794d36044180bea1f589061f8122af632\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 170\",\n\t\t\thash: newShaHash(\"0000000019ff6d7cc11d17a1b55de2f77008bf0a24c40df38d03947958d6435c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 171\",\n\t\t\thash: newShaHash(\"00000000256224dd0d753dae5d9ddff2d261c38965e0b93b779366955cda526f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 172\",\n\t\t\thash: newShaHash(\"000000006801100f5c94753e87551ee89795d5e0eec5868d24a226191f90ede2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 173\",\n\t\t\thash: newShaHash(\"0000000015bafafa09aaca3ba1665ccc4fb1b686e22fbeb3fe7348d31a2b11d9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 174\",\n\t\t\thash: newShaHash(\"000000009ae7d840021eac9d65c16fc5b1a196835c2907d3c0a0d4da5923186c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 175\",\n\t\t\thash: newShaHash(\"00000000e6655c19d9dab9541a4443e2e79b2da05c8ac764ec7c7092dfb6ef6b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 176\",\n\t\t\thash: newShaHash(\"0000000031d3c86529222e380adb32a746d008c9fa03c05ee0ba40eda15290da\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 177\",\n\t\t\thash: newShaHash(\"000000009f641e70bf141f62917b5968a2d8810c9714456a881fe4ec0cb6703d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 178\",\n\t\t\thash: newShaHash(\"0000000038f49dc942975afee7e0abfe4f916b4dc187a5cbeebb41f80b9e6b20\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 179\",\n\t\t\thash: newShaHash(\"00000000b4b36fe4b5c8ec172d57fe4c65a61d2ab0a8c54430f9e807f8bd23b2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 180\",\n\t\t\thash: newShaHash(\"00000000ecbc50b6d868f3e018d6371ebfdc991e274ccc21cfcb36ffdd04009a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 181\",\n\t\t\thash: newShaHash(\"0000000049b30e7eaa426a6a3a8038a6b373a63f1187af9948abba223aa4a598\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 182\",\n\t\t\thash: newShaHash(\"00000000d7198c161c230f62bdac9e059d000b843b858063bf381176ada12cba\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 183\",\n\t\t\thash: newShaHash(\"00000000be871cf432bd0053294ca003850f440f4477acb7144ecdbd913301e4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 184\",\n\t\t\thash: newShaHash(\"00000000da932c4ff3ec216742a1bce5005dcc65cbabe49eeff923a38824441b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 185\",\n\t\t\thash: newShaHash(\"0000000042e628e4f822ee75ac0a341512cef4fe6ddbe5016434a3f2615f7e29\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 186\",\n\t\t\thash: newShaHash(\"000000009bc5b5a12be32098083dc9ea69143364de8551313a745d77e5025e75\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 187\",\n\t\t\thash: newShaHash(\"000000000d4c8ea6554bfec4aec6c20352f0695bd7c3576f83ce2ba0e8b57520\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 188\",\n\t\t\thash: newShaHash(\"00000049030681b947d58913c0feaa10a8ad30b7199bbbed4fe539d9270d014e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 189\",\n\t\t\thash: newShaHash(\"000000ae04e64f14fab146428d8ec2cdcef1f80990fc215f8a3735322a67cff8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 190\",\n\t\t\thash: newShaHash(\"000000c58773bf237152d5b310e7137f14131b163c99ba1cec04527253810806\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 191\",\n\t\t\thash: newShaHash(\"000000008ea27c59b81be35b936587d1d4d9d976b987f33c8cf04d67e79e99f0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 192\",\n\t\t\thash: newShaHash(\"00000000751eee2e7b8af6347de3a49f8384d1654eec644cb26fdfafc2df44fb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 193\",\n\t\t\thash: newShaHash(\"00000000b43e9545be63020bcb4b17acf2ec3c6efc008dec9dbc4d6a1bac1a0f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 194\",\n\t\t\thash: newShaHash(\"0000007444200850fafddd791eca6cdd1526a543c413c29454f8dbdf97742b24\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 195\",\n\t\t\thash: newShaHash(\"00000000ddf8d0951cbd1ccd00a88ce667c63bcb49299c9ba8c65eea841a2e2e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 196\",\n\t\t\thash: newShaHash(\"0000000095b52852bb44af67faa0c58ba9cde6d6760de71f1269ee34bf0dc1ea\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 197\",\n\t\t\thash: newShaHash(\"00000000e245780c0f2ad0569e9095684c82954f18e34ee13fafa2c2ef663a96\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 198\",\n\t\t\thash: newShaHash(\"000000004b37f749ad9a48f814e3eec1970dbaa8236e6a2c0a850831a1b30eb4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 199\",\n\t\t\thash: newShaHash(\"0000008002fbc83540a88ec487bb137b35cb43ade1af5afba7c8266049fa65cc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 200\",\n\t\t\thash: newShaHash(\"00000000c307e4d762dfad1cf9c271f2d84f5f7080e0eac4bcbd2f97217ae285\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 201\",\n\t\t\thash: newShaHash(\"00000000233b9d26c4b563145e0bb8cb180789fbd330be176cac323b17ac4faf\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 202\",\n\t\t\thash: newShaHash(\"00000000fd266ad3ec943d22d923a17c420a8bccc820c1ef91a7186b548eba9e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 203\",\n\t\t\thash: newShaHash(\"000000007808299f3f6a700a152f65677c32d49061716a50e16dbae38b1fae23\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 204\",\n\t\t\thash: newShaHash(\"0000000073a53f91ac5d166dac124ec5b10d301c82fbbe245b11d7009025c34c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 205\",\n\t\t\thash: newShaHash(\"0000003186f4cdcf473c76b55bbf97fc7d2535f972a09b9361d83cb5c1ccab41\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 206\",\n\t\t\thash: newShaHash(\"00000000a5ef4d5d5c96cd0732c9b16cc9fde361ddf269965ad0f9277d45d1ca\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 207\",\n\t\t\thash: newShaHash(\"0000000066a2ea0440c48080d516e6bc9e35fa002dfb376a087d84dad708c935\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 208\",\n\t\t\thash: newShaHash(\"00000000567b060de499538d15ccad34d06ea7d406ea3880172327611859b3cc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 209\",\n\t\t\thash: newShaHash(\"00000000c272b116f6c6f58f9106352f346182c346ffc4cb7422b7ca6087b07f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 210\",\n\t\t\thash: newShaHash(\"000000304bb25f336fee4edc620d0b40708653763473a25bf38596530dc916f1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 211\",\n\t\t\thash: newShaHash(\"000000006573352745b6c0b91cb44c3de71f42af10c1495bd854b49fd6c6c1f8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 212\",\n\t\t\thash: newShaHash(\"000000009f3d0296ba04a3aeb8cef471f743c68f531259df12cbabaeeba515a6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 213\",\n\t\t\thash: newShaHash(\"00000046ed9ecfc7183ec737e92b3373a1c1c722fd87e659dcae625cfdc45f03\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 214\",\n\t\t\thash: newShaHash(\"00000000c65023b9c5f2893f3f2c80da309b2146b29839cdcbcdc0d219987516\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 215\",\n\t\t\thash: newShaHash(\"00000000a3aeacfdbee68a758f12a438f98097a1fcdf9b40decdf8c6060ef724\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 216\",\n\t\t\thash: newShaHash(\"0000000062b196d94b1bdcbd92161bb2029c4ad4c82a06f1f27a42b8368a327f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 217\",\n\t\t\thash: newShaHash(\"00000000334fa0cf0884dbfd2d463930d621a71b3171bb3497ac3ce747d425c0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 218\",\n\t\t\thash: newShaHash(\"00000000aea1e6793dd420c9f3ad825d5545bf84666676de59d4c7b0126dc7d1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 219\",\n\t\t\thash: newShaHash(\"0000000046efb37cf87fc1941841e584928da16df0050c1d66647e0852e850e9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 220\",\n\t\t\thash: newShaHash(\"00000000418228040f208d5cc8e1e76d08e3a9ba7ac54c99e17721976373149d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 221\",\n\t\t\thash: newShaHash(\"00000000a51372e3db237215836e2d84f5e8486124c53e2745e33a8deaafcc3a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 222\",\n\t\t\thash: newShaHash(\"0000000051915ad238c6ef286668a12b64d17e95ebfdc96446188de50407fbbe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 223\",\n\t\t\thash: newShaHash(\"000000006173af8c07014b1e20b818b9a07b85c67741b82ad225df71d1bc4171\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 224\",\n\t\t\thash: newShaHash(\"000000007d9cb3a2ab679e67fcf8b85d5f0ccfb853f60f30db5e26249313f6fa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 225\",\n\t\t\thash: newShaHash(\"000000003c787a735f56f432b32616a8aba02f2128cb26c65cbeea347f727674\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 226\",\n\t\t\thash: newShaHash(\"00000000bde9bfdc948cde631d391902039c79f05efe557cbb0fc9b3b47b207a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 227\",\n\t\t\thash: newShaHash(\"00000000ec0752511ef2d2f0cb7bab463185f4045a4d37f300ebf89d577bdf8a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 228\",\n\t\t\thash: newShaHash(\"0000000062bbac4b5801a48b9b7b9cb73acb591932482a556301a2bf33cefa61\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 229\",\n\t\t\thash: newShaHash(\"00000000204525d390b1ada9a3de91edab97ed36efba723a86b4db6540ecb91e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 230\",\n\t\t\thash: newShaHash(\"0000000024030b11bf18ad8c0ab11c42f6b7ac83415428e6b8a6bfa6f70a9635\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 231\",\n\t\t\thash: newShaHash(\"00000043a9c931c76725514105b531cd3483ce2c52f5304798e8222346d0be44\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 232\",\n\t\t\thash: newShaHash(\"00000000ffca71639b4fbbca2af4b6b0e0164b21f9cf23e1cdc1a112754f46eb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 233\",\n\t\t\thash: newShaHash(\"00000000653d04496a2db44c459e9c5e1028774d0bc2fe0668081a4156ed8c00\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 234\",\n\t\t\thash: newShaHash(\"000000006095a50af5d0d79535440fd5eee7a0fdf2aaad985390f2b214b64bbd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 235\",\n\t\t\thash: newShaHash(\"000000004f8e0c541abf0ad132a4bb6b014404398edc55306ca9c26df7f01939\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 236\",\n\t\t\thash: newShaHash(\"0000000017e5be3f2d85d64c003ab08b5fb72ca41e5e740b5c87e64d08441da2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 237\",\n\t\t\thash: newShaHash(\"0000000064545bc6696a3e738e53aaaa501f46f147d01d191e5db1dfd23c493e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 238\",\n\t\t\thash: newShaHash(\"00000000dc1fb65996e768bf08f50e17654a2c5af08e22e967c102bf2151204e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 239\",\n\t\t\thash: newShaHash(\"000000004dec6f4346cb7beb63a7f116b18918a4ecef7c0c1417a28d7c55be69\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 240\",\n\t\t\thash: newShaHash(\"0000000090d78deafa8d6eb529751d565bf7acd47989a681927b4cda2cc7cc41\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 241\",\n\t\t\thash: newShaHash(\"00000000c6044195c8cb9f43b738601f067d0ab61f0562f00553200a8983ffa2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 242\",\n\t\t\thash: newShaHash(\"000000001d7128a0a6ff1125c1ad2bdd47386512d3691eb7c3909e90050272b3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 243\",\n\t\t\thash: newShaHash(\"000000002ad007361e20ab8535cfe6217d1509fa60360f36c9251bbc13c48144\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 244\",\n\t\t\thash: newShaHash(\"0000000015f097fe97118d7ac3fea1109770e4f588419abf235c9b48f1417deb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 245\",\n\t\t\thash: newShaHash(\"00000000328b767b03bc33a206acf8e52e52de6f81ef60c11085e956dd0899e1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 246\",\n\t\t\thash: newShaHash(\"00000000295587bb7c6331b9981aac68f025aeffb984e019b6d4932ac8dfb570\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 247\",\n\t\t\thash: newShaHash(\"000000002323d8745acd3a9d2efbffd32a7a31d8510ddb5aa51e146667faff2e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 248\",\n\t\t\thash: newShaHash(\"00000000669063a5205212c38727942c703866537e42b3e6e7bfe38e5f625f89\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 249\",\n\t\t\thash: newShaHash(\"000000007a56c70ed64e35a641a527123dfb55011e504f9ff4fede50258cfdfa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 250\",\n\t\t\thash: newShaHash(\"0000000036df49e3fd3dc148582fd704a110f5297240bb2dffb423295117c113\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 251\",\n\t\t\thash: newShaHash(\"0000000085c8f5f416e3ca0813286e805cb8472f450ed0d2f58935549fd0711e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 252\",\n\t\t\thash: newShaHash(\"000000d2b41a1662b724c2c8e146cc3f87b7ec9053b3f1ddb278eb2b808ca183\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 253\",\n\t\t\thash: newShaHash(\"00000000de18fe74c5153c32ec1259847c35f8fcf725da50252f2c4217f0c1e5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 254\",\n\t\t\thash: newShaHash(\"000000dd516de71f97f62d700f246370a42ef88828ae6f4082ba18ac43c8643f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 255\",\n\t\t\thash: newShaHash(\"000000e1aa0b37d4db3b908261ef46bf1ec776db30310f3404b7a3b378a2d663\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 256\",\n\t\t\thash: newShaHash(\"00000000b43fefbda1b41657747a70e7eb3f02774dd414d6a44b6f54cab1c8ac\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 257\",\n\t\t\thash: newShaHash(\"000000000fbc0fd6ea45307e9efe38bdb7ef3fd6a92a8be23bf9f8ef87475144\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 258\",\n\t\t\thash: newShaHash(\"0000000049be3842aa5f9e1f5006bf32d0740d2a63be8ed2bf409797928d4858\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 259\",\n\t\t\thash: newShaHash(\"0000000011153a2156b1a098821e8180389521229ba3584e08b26b0a0f206f09\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 260\",\n\t\t\thash: newShaHash(\"000000005619d4d393b4abb6b815fc9c0f6d8c8e39ae34c4376b11f0dae790da\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 261\",\n\t\t\thash: newShaHash(\"00000000b9d4eae6c14c048b9abc874cc08182499e4c846d476078dd549bc4b1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 262\",\n\t\t\thash: newShaHash(\"000000252f8c6581603b82fdd56aa612ad1338ecc6744f11b64c74c0fb2a4d32\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 263\",\n\t\t\thash: newShaHash(\"00000000409dceeb626b242736ce2b16938896fe0d35878e7b7ff43932f369a9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 264\",\n\t\t\thash: newShaHash(\"00000000fc6207e105f202d9f0b69cd461b94e01d4915bf89b6e29502d04255a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 265\",\n\t\t\thash: newShaHash(\"00000000f7f4b1b027bb2c5e0dcd828c7d68860554b0b6138b2df02abd7d8776\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 266\",\n\t\t\thash: newShaHash(\"000000000d473ac61ff95a303246d3257ed610d8dea17977431d9d810dd92762\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 267\",\n\t\t\thash: newShaHash(\"0000000061577c7db57d124f034e616783701ad1e34600476680f85d7832d5dc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 268\",\n\t\t\thash: newShaHash(\"00000000a7332e44e699ce9f408339e4b072e6c5935ad8fcf9791202ed1849ac\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 269\",\n\t\t\thash: newShaHash(\"0000008db88e28d0ce6f41aa60a21c58b177c9e39b3682aeaf7501eed6a30906\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 270\",\n\t\t\thash: newShaHash(\"000000001ba3438c9d524ea5145525b9ba54889c5efce4ba2aa6b030e895215b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 271\",\n\t\t\thash: newShaHash(\"00000000ec31c5e080a41836af726c4dba106f2e48e0d80022f475732a2b2e07\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 272\",\n\t\t\thash: newShaHash(\"0000000082b1994d8f4a68b6b9aa89cdd87f68186ae4e9b4902864f6d63da3b6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 273\",\n\t\t\thash: newShaHash(\"0000004a19abf11ac55d03d5c31ac7fa2eb8477f3c2b7ed50f7fc50334b8655f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 274\",\n\t\t\thash: newShaHash(\"00000000971df3309d31bf1b5d909cfc1d7acd26e05f95f5c281c6660afba297\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 275\",\n\t\t\thash: newShaHash(\"000000004fcbb84e7bd84608b3447d67d131c0479d9b4f65f73ea70307230588\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 276\",\n\t\t\thash: newShaHash(\"0000000095d5cbdea8e358839239e547ef8ed347154be427c785fb231063aff0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 277\",\n\t\t\thash: newShaHash(\"0000000090472adf04fe1d35c02e987e65aa9829f2eee1ed58107848692bed3f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 278\",\n\t\t\thash: newShaHash(\"00000000ad7c9aca2a8df1e11002472fe821aae291be7a1ce54b67bca0f49221\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 279\",\n\t\t\thash: newShaHash(\"0000000033b6be9bdd2929c890450bd53956caa0a96963ef51c1ca9f0a1ce90b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 280\",\n\t\t\thash: newShaHash(\"000000003efb417616dc83f6414de4baef5a858ff0e074fd1492fada3da7b574\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 281\",\n\t\t\thash: newShaHash(\"0000000038d398732c03a24412a9a49a53643017aafe057887ce770321d3c368\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 282\",\n\t\t\thash: newShaHash(\"000000c05c59ff928aa8e440e77ad54ded195d6fb65588fe63e5667b56365c6a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 283\",\n\t\t\thash: newShaHash(\"00000000312d83519ea07bfba57a6dbfe44c2b8a96a39dbece4363cd15a643a4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 284\",\n\t\t\thash: newShaHash(\"00000000471f327f9f644b55cfd7430995dda5ad4b94443dc3a7c0ec6f17e022\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 285\",\n\t\t\thash: newShaHash(\"000000008c4b18f694b3de40cd5f9883b84b7000fba4745ab43bc8e5fb1afa51\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 286\",\n\t\t\thash: newShaHash(\"0000000040d902c511cf5a666a13ef9f8020b28de88c14a726affac0e3478f0a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 287\",\n\t\t\thash: newShaHash(\"00000000b9fd40db917bb5c5a85747bd4ce11cde7bbaa70e3f52d0aaf3989a76\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 288\",\n\t\t\thash: newShaHash(\"00000000f6c200782ceada7e1b1c7518e61adacb17ffd48cfd4829b919468a5d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 289\",\n\t\t\thash: newShaHash(\"000000009b79311b0dac73fce4aa373d6c30879f4884a0ceb40f824b758ee400\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 290\",\n\t\t\thash: newShaHash(\"00000000c9a0836b67a8b1ff95b4d2683be4867dc2607fe047a16e4b95017e72\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 291\",\n\t\t\thash: newShaHash(\"00000000009f92dad85eb7053c286e241bd927801ed67f19ce0e21a077b6d055\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 292\",\n\t\t\thash: newShaHash(\"00000000dd97a9907a7f78885a741e963d302e73e2a7d9286276bc5a65669531\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 293\",\n\t\t\thash: newShaHash(\"00000000f14aaa58170665cd0a5fe0a2d205ee5a9f1b8bfc8a96f26c02a43e0d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 294\",\n\t\t\thash: newShaHash(\"0000000003c9b56aaae9cdb705e5d3c4a0a71b38dad9bb7b862e1e642e7d30bb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 295\",\n\t\t\thash: newShaHash(\"00000000e264ac7e8fc940e7317483d4652b41ce6ede7f3124cd5d8751da3249\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 296\",\n\t\t\thash: newShaHash(\"00000000332cf92df69a0b0088d1bfee2ad7eefe981d507707e6acdc319b53dc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 297\",\n\t\t\thash: newShaHash(\"00000000551b549c9f14561acf98ba64e1b4804c1f67c4be04b8344954497eaf\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 298\",\n\t\t\thash: newShaHash(\"00000000efd48c2461396f764e207b2d8ba5d33e0023da7e09bea9c540a23cd8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 299\",\n\t\t\thash: newShaHash(\"00000000dcbe1551acd09493978198bf122d93181530777630ced9aa98dcadea\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 300\",\n\t\t\thash: newShaHash(\"00000000db1e701fb86528477da533ff537b83e7d07222a21655ac672935aac3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 301\",\n\t\t\thash: newShaHash(\"0000000010ead596f084637d385ac84797a231794c57b74e409c5545be69432f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 302\",\n\t\t\thash: newShaHash(\"000000000aa72eebe7bbdaba98e633f452006b7f215c616040fec604dda1a86a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 303\",\n\t\t\thash: newShaHash(\"00000000a2252210a5bcaa29d8044b31ebff46ec39b503028a7202d675550a0e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 304\",\n\t\t\thash: newShaHash(\"000000009337197bf4f0546dee559acb28042be8296e5cb2ea5d1d62716a8287\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 305\",\n\t\t\thash: newShaHash(\"00000000cee1fe572d26512c6df2118e742c00375c9d34f089684494f9de0ea8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 306\",\n\t\t\thash: newShaHash(\"0000000035f29d747dc63e8dedda8bfbd5d02d5455ccb4fd54f6a670f7543c1f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 307\",\n\t\t\thash: newShaHash(\"00000000567c08915ce22123b12a0e1138da5832ec7eba80a4f90b6042dd4c98\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 308\",\n\t\t\thash: newShaHash(\"00000000b12362e9d4a6d3fbcef5186e480da29da675542d76c340b8fae619a9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 309\",\n\t\t\thash: newShaHash(\"0000000007adf010ba71f097c2ef6f81e704fba2ff021fbf025524b4ca2e4069\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 310\",\n\t\t\thash: newShaHash(\"00000000628937063c2fe4e2cac0ff51944af8984fe441505b6dfad0352c5dc8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 311\",\n\t\t\thash: newShaHash(\"000000005d615513e8f213717f96e4e79e79c8f0fb6d80ec70aa36f2557c3605\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 312\",\n\t\t\thash: newShaHash(\"00000000ecd989cc1b19caf707b686a1f007195282fb7c5d5d559da96137c8ce\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 313\",\n\t\t\thash: newShaHash(\"00000000d830a5c3af56991341074b9f8109f5d2a7b09877acc1b8636dc680ad\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 314\",\n\t\t\thash: newShaHash(\"000000002ce35ddf306bc9183fd55eb44ad093a9766f6543c3d9bee553c98a61\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 315\",\n\t\t\thash: newShaHash(\"000000004ed9a581a8e56cd60929b39938220a3eed839f9e116024e512d3816f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 316\",\n\t\t\thash: newShaHash(\"00000000ce8689bd3e2cc7b651d405b3fe93f1cbeabac3da78d578e33f92714b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 317\",\n\t\t\thash: newShaHash(\"00000000df455af238e98568e095026900acf1bcabd49d87555b59f8114bdf18\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 318\",\n\t\t\thash: newShaHash(\"00000000b18275b9421bebff7ad91b44a03ac5f2a16119d05a5d5b6f37777010\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 319\",\n\t\t\thash: newShaHash(\"000000007bc463468030ffa2a138f6d5a426f90ee8de8979924e2b67f029ab15\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 320\",\n\t\t\thash: newShaHash(\"00000000f5fa4c13dd22463d45b9ba2f46478fdc7d486f14169bc7401b23ab7c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 321\",\n\t\t\thash: newShaHash(\"000000864dcf1b763e07f5e350ec7e87a86512243ab8c99f21dcd74a132105d9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 322\",\n\t\t\thash: newShaHash(\"000000008b508d5d5c0624bd94f84be6fe676e6d816af57518bebb07742721be\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 323\",\n\t\t\thash: newShaHash(\"00000000927d610653896327f7bdb878e8c0a6bec73b39e1922d1de1022d8d9b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 324\",\n\t\t\thash: newShaHash(\"00000000720a3e4abac9ce41934c1442537572fa51e6d93de1ad811f0fce894a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 325\",\n\t\t\thash: newShaHash(\"000000003b84cd8f88354f2df510ae77d98d1356490e559abc8eaf14ff517112\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 326\",\n\t\t\thash: newShaHash(\"0000000015e0005d24ebc1453a3243d4bbb237f9ae0d9fb5f79c82f5fca9aeb6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 327\",\n\t\t\thash: newShaHash(\"000000003b0b4c44a797853458b2da80a333525b972b995276c98862698c3e97\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 328\",\n\t\t\thash: newShaHash(\"00000000a53711ee15f7778c7e8c4fe0ffe628237b247d4747dedbe91a01c893\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 329\",\n\t\t\thash: newShaHash(\"000000009c82cff6ab02c4a3b0d64ac7ca7e50aa2eb3162358b6186070dfd720\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 330\",\n\t\t\thash: newShaHash(\"00000000b1b2f0be01632a62f5730b4f3f550ed48435be4813e5f1d1e19485e3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 331\",\n\t\t\thash: newShaHash(\"0000000091c88fbd951e0730b542f01baf364532d2652f714488853c89f56daa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 332\",\n\t\t\thash: newShaHash(\"000000005ac974e83964ed302e74f1dc120d5d67849868cc939010586b46fdf5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 333\",\n\t\t\thash: newShaHash(\"00000000ae11014c31b4e52a4bc2427ddd84e55c6b089219a760f1f78a16028d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 334\",\n\t\t\thash: newShaHash(\"000000007a4721d94c2b90c137b9dcef589fab0d84d14d39a7f8d9f34f51f725\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 335\",\n\t\t\thash: newShaHash(\"000000001cfaad6cbb2c8e00e483bb2e4d5c3811bf5463d527c29f9f0326f1db\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 336\",\n\t\t\thash: newShaHash(\"00000000dfe8b312e2c8690e2a67434760d7b909afe189d9c872f154470ca126\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 337\",\n\t\t\thash: newShaHash(\"00000000d271058887dd6a8962a4db21dff8ec4d97b1039462b355112b15c037\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 338\",\n\t\t\thash: newShaHash(\"00000000cc5813b48d5b997d681a5c6ea78c52fa049d4fc8bbb5933a864f4d12\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 339\",\n\t\t\thash: newShaHash(\"00000000644887a67b063da9267140850d680a4d0b0b0be7e83d6b6959de8f17\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 340\",\n\t\t\thash: newShaHash(\"00000000070b420dcfc7195b13c5948aad2ec7dc8b687d7b2b0db7f400a5c406\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 341\",\n\t\t\thash: newShaHash(\"00000000ccf30de89c6533c3ade3c00468bf2ea16a4b74eece4daba6df9d7ae1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 342\",\n\t\t\thash: newShaHash(\"00000000e06e86f9f0b56a39c4892d397efc62ab24f976c5abd3d9f8987d8ecc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 343\",\n\t\t\thash: newShaHash(\"00000000576c6ee9293732fe4a3144ec163809cc011f0af142d64e96dda636b0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 344\",\n\t\t\thash: newShaHash(\"0000000075f24be3cf7511c77bfc39d24c447d2005d9eb4ceb5df1c290299415\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 345\",\n\t\t\thash: newShaHash(\"00000000312bf25ac657cd4468bdf2a3b307c45653e16e93242cb6a698c5f108\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 346\",\n\t\t\thash: newShaHash(\"000000009e7b17c75559de7932a6616812fb77ac5edba0e9fa51489c5c992b14\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 347\",\n\t\t\thash: newShaHash(\"00000000d75853e781611c9958d22fdbc7be2478a6af145c5fcde6b0e9a7b7c1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 348\",\n\t\t\thash: newShaHash(\"000000009814d8614fb11500aef99287bf4f4bb35187bb56f7cba0661f592bfe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 349\",\n\t\t\thash: newShaHash(\"0000000062f585f848f0c46ae8271cefab6c7f5f4e9a01bd4d921786129a48f7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 350\",\n\t\t\thash: newShaHash(\"000000000176caf39dd0792e173f61e3afc318a62859dc5bec11e2d65da723fa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 351\",\n\t\t\thash: newShaHash(\"00000000a0016c5d4c9393594736fa74fb4bc5024f967f51901bb12359ef9386\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 352\",\n\t\t\thash: newShaHash(\"0000003d95f75df68958f6903e795d201f24ddf6d66612c9f5ff5faf5cfccefb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 353\",\n\t\t\thash: newShaHash(\"00000000e45ca89ee1d40863e4f8d1290c385d1c8c8b52199ef25b2915e230f0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 354\",\n\t\t\thash: newShaHash(\"00000000d42c4ca4e58931dbf35a4ded833d1c046d3578cf728ae582ead0e597\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 355\",\n\t\t\thash: newShaHash(\"00000000537e4487b17a4c9e892fe7bd44555bc1519801bf1be8cdd6d4bdd307\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 356\",\n\t\t\thash: newShaHash(\"00000013f3f13066f1b6790cdfa412244965addbf9950712b7c34976370d6acc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 357\",\n\t\t\thash: newShaHash(\"00000000c4cd41cf59ff9064f8b9b55701493c43756be1e70fd683a4b4f61ce9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 358\",\n\t\t\thash: newShaHash(\"0000000072d0e4174e89e16182dcbbfe9918630ba0b2a37e7a8a032d1fc9c1b0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 359\",\n\t\t\thash: newShaHash(\"00000000ec898ff7597e89c6fa220ca57c231c1b3c27833bf295df92345a4aea\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 360\",\n\t\t\thash: newShaHash(\"00000000bbbfb0fef113d75449a881cfc94dfb67977f2f7a9053d8629779789d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 361\",\n\t\t\thash: newShaHash(\"00000000bb073052fe4f57f2e100723ef4056bb043687fca1d9136e3081e4182\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 362\",\n\t\t\thash: newShaHash(\"000000007ca09da81c8a31551d9e59df142e87d2fc7514be5fd24acf930e83b1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 363\",\n\t\t\thash: newShaHash(\"000000006ed9db6c5b427a3e0f0ed3f96f9a8e1d26a3c977d95a933c7f7ec793\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 364\",\n\t\t\thash: newShaHash(\"00000000b41d7876aeed47cb5d945f08a8639acec97833f315194558bab1f4d9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 365\",\n\t\t\thash: newShaHash(\"0000000032e1dddf2f49f912499b89c7e5b9891383ad6a19c269cb844b6ab5dc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 366\",\n\t\t\thash: newShaHash(\"000000006bc2627ab0609470bdb3a3b53f7a5de69c95f1bbbb62bf635d942242\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 367\",\n\t\t\thash: newShaHash(\"0000000098e7dcb6ff5a933801e17b0c2909748b24b4bc10bf4a899385404124\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 368\",\n\t\t\thash: newShaHash(\"000000614be52b60cf7b75aa8b900d1de7e129b4386313a87dd59e6d0fc37a75\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 369\",\n\t\t\thash: newShaHash(\"00000000a53096ef6a4eb335b902d563b9a4b4eb4e13baabbc12d5e2046b9f14\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 370\",\n\t\t\thash: newShaHash(\"00000000783a3a2d0f9ce7148bf666dbd715cfc61bbe6a4d21806fa4b2e479f4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 371\",\n\t\t\thash: newShaHash(\"00000054e0ccc432942dcfed93bf63fe34fb1d54d2579d8b3299939f7a0d8498\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 372\",\n\t\t\thash: newShaHash(\"00000000aaa92ac15433e0a660d56a76b67f2594e50e40e8c9666eb19a1613f7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 373\",\n\t\t\thash: newShaHash(\"000000399c51c6b6920569e81b96671588304b67a4741c479744c3fc89b34683\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 374\",\n\t\t\thash: newShaHash(\"00000089344d1693dbef33a43c9c464d0df71a9af7e6b78c2e702fcf9319df1c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 375\",\n\t\t\thash: newShaHash(\"00000000363f33d0f01ee74e5b017c5773e392e883f3dad5398c2ca25f600a57\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 376\",\n\t\t\thash: newShaHash(\"000000149125760a2d057cddcee739ba9a86abc8e4f4261045350b881573cfa8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 377\",\n\t\t\thash: newShaHash(\"000000001c1e88861eb30f1f881b0d1fcdd0d923b55b2cecb23f0527cf417d42\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 378\",\n\t\t\thash: newShaHash(\"0000000012ec248864d2d410c1709624646cde13f2901e88f38ffb4dcb8081c5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 379\",\n\t\t\thash: newShaHash(\"00000000d8db37b20cdb22a2b4f343e11aaad1db3018f41fef0808b23a2dfc7b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 380\",\n\t\t\thash: newShaHash(\"00000000ee0b05318d3ea10e693f556944d6923efb094bcbd14ea8f446ace105\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 381\",\n\t\t\thash: newShaHash(\"000000005545533df3b78ca2c37446686fc6c7e62c02d8b9acd7ddc31b04001a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 382\",\n\t\t\thash: newShaHash(\"00000000ab78975872ed521fc96599bd8bd741ab9b63276e9547fb910058e375\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 383\",\n\t\t\thash: newShaHash(\"00000000bef0cebe2b7c13d519a4c3ad82b6efedaa1003ed34bc6099aa4c512e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 384\",\n\t\t\thash: newShaHash(\"00000000acef3b4992d317a8612c81327d4191c649ac83c18af7874e1857a67b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 385\",\n\t\t\thash: newShaHash(\"000000006c7fff003e4288bc4a9aa98905bd629a14c0957a8f32479ecfc05ebe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 386\",\n\t\t\thash: newShaHash(\"00000000598a5b1600b7ed5a81bb6640e2f9fe80a8d5203b0f667544c287c6cc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 387\",\n\t\t\thash: newShaHash(\"0000000018b46787710df465e984a98944af55a036476f0798f7a14cdf466f34\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 388\",\n\t\t\thash: newShaHash(\"00000000825bbe3e6477e4de74c4f1fe0894427c4ecb4131ffd02f1854853891\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 389\",\n\t\t\thash: newShaHash(\"000000001ef69a54bb4a876fd0153ca535a8c87d71059e82832c1c57a1564664\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 390\",\n\t\t\thash: newShaHash(\"00000000ab2fe90248d6b5c11946bb4e79c5e28345cf78a94dc5005326c5b3fe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 391\",\n\t\t\thash: newShaHash(\"00000000b3d351358542db11e4aff6beb9ef72d7e55e3083466510c6e52e70ba\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 392\",\n\t\t\thash: newShaHash(\"00000000d7dc5eb8af81f51087e920535755ebbc1770964ee07bfa79fb45092e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 393\",\n\t\t\thash: newShaHash(\"00000000b8f2d0d521a61246bab50d75c0038a6ec876f1acfd04c141b649e9f8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 394\",\n\t\t\thash: newShaHash(\"00000000bf7e7acf467ffd9948771083b6e05fa970b90521d0a2a10799011b9e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 395\",\n\t\t\thash: newShaHash(\"00000000b073d2a1d90977d0eb062abd567d66a8da3f8d557376450ce54943d2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 396\",\n\t\t\thash: newShaHash(\"00000000e96f224e735ebe16992174f890726edfa15b0c91116415d105ccca4a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 397\",\n\t\t\thash: newShaHash(\"00000000c56031fa91d6f3312d110389c01b25faacce232b990e61502cd88030\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 398\",\n\t\t\thash: newShaHash(\"00000062f17d15a23d077c00b02b5399569a0e2459153d1c3b981ff25891af5f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 399\",\n\t\t\thash: newShaHash(\"0000004a2241593b7ecdfabdd743e4ac8130d9b6bd0f0347d0543425313f415b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 400\",\n\t\t\thash: newShaHash(\"000000009b16aaa5cc610b433cdee0ea8cf4e5aaf08475faec96ca37a1b8b572\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 401\",\n\t\t\thash: newShaHash(\"000000004e17107c3c80f75ca74376fcbe927f1f5d2457cd32b5a15cebfc2f20\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 402\",\n\t\t\thash: newShaHash(\"000000009fb54bbe8d337db2451d948920d02c7671471109ecc15b97e10f7f6d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 403\",\n\t\t\thash: newShaHash(\"00000000f5508a26141eca469802d7e65f500a09f1fd27e8ba44b785cf39ef3f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 404\",\n\t\t\thash: newShaHash(\"00000000206af73f8a1c3a8f887d619bdbad2e0a2c4db9d7332dafcfe78ec9d0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 405\",\n\t\t\thash: newShaHash(\"000000006028ccb34b6dfa311ee10b793ac1f97a0e9b3a04b0450c1c35b42c98\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 406\",\n\t\t\thash: newShaHash(\"000000003bb7d1e66969db6d6e9fcac8df1f6613ae2a102037f7d9e3394be86c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 407\",\n\t\t\thash: newShaHash(\"0000008c7bac766fa5d3820c8c1ad7518c7b846416d52bead3a14caac85d8404\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 408\",\n\t\t\thash: newShaHash(\"00000000a234457ca8f532e23bae6ff3c13ed9e7ec3de43b7f5020cc2bc255c8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 409\",\n\t\t\thash: newShaHash(\"000000005b67bce138133cba9e96483abefd63d3f751f81aeaf92929e7990990\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 410\",\n\t\t\thash: newShaHash(\"000000005fee5b1188c42bfc90ba2effa5ba724e938636bb0562ce4da591d57a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 411\",\n\t\t\thash: newShaHash(\"0000000074596947e02875dd4977088008eb6e432d459aa8ce4fbe55869a33a8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 412\",\n\t\t\thash: newShaHash(\"00000000e71dae580ff873492343606570de240bb1d13426e4fb869217d3e683\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 413\",\n\t\t\thash: newShaHash(\"00000075d715b5d663e819cb7e5aad8885cd1b725477b898f1a800ca8fbc34f6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 414\",\n\t\t\thash: newShaHash(\"000000009883ca98965900fadd346cb8f5f6b76aab6520ae355ac56be0c2317a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 415\",\n\t\t\thash: newShaHash(\"0000000047955435397a484cfa8e9a79cb7df3596e4f234a1f4fd698dd33e63a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 416\",\n\t\t\thash: newShaHash(\"00000000a66081494aa215f1aa41b7e87dc50cf3c332d49cb33691deee7efe49\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 417\",\n\t\t\thash: newShaHash(\"0000000096b264c07af129c842f4420b3efc015603caa4d436d5f96a11591c1c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 418\",\n\t\t\thash: newShaHash(\"0000007df067a6c6d3c791ee0ee37e5d8a49b83dc09302d932b2719f2ed534a6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 419\",\n\t\t\thash: newShaHash(\"0000001ef93228de88883f5d557515128e31b853cbc8a1d46df0a87f6747de28\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 420\",\n\t\t\thash: newShaHash(\"0000000047e6a1fb86149f84b7da0e6c0f6ccc13269e23c234db6bd4fc38e9ba\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 421\",\n\t\t\thash: newShaHash(\"00000000892f2bed52e915315a20163ead77ed396fa5c60354e34ef1caebc76a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 422\",\n\t\t\thash: newShaHash(\"00000000571b000ad164c62357360a5faaa362f38af978d8daa11817076c298e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 423\",\n\t\t\thash: newShaHash(\"00000000de53db2f9f5588ab96ce9b01f5a3cb19b6a7459128ac587f9f244e16\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 424\",\n\t\t\thash: newShaHash(\"0000000054de9a22ec37f886c7b39ded9e85c4a80797dca2db43c79b3ab6c124\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 425\",\n\t\t\thash: newShaHash(\"00000000cce8f92cb3c2733f4856b6b523222e576de131c60c5c7bbab1540d19\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 426\",\n\t\t\thash: newShaHash(\"0000000064ca7e8841da043d5e62dea642e17242ac3bddce23bfdac2801194ac\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 427\",\n\t\t\thash: newShaHash(\"000000008ce4e3492ec668768026ae997f9ba736ec1613393af3f5f5e3b6000f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 428\",\n\t\t\thash: newShaHash(\"0000000003d650e2da6dacf2aacaffec670e1489440582e43bbbd3a4d5146c3a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 429\",\n\t\t\thash: newShaHash(\"00000000f6677affe82be8b0dad74ebcda7619d0a346271c7635f0bfce6006a1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 430\",\n\t\t\thash: newShaHash(\"000000002c5a275cb209f6c2fe90c5027bd7ba57f524957c922d83c503397c12\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 431\",\n\t\t\thash: newShaHash(\"0000000043a46c576b4d9f72741786b3f86c8d92caaac677fcedca9f60fab0cd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 432\",\n\t\t\thash: newShaHash(\"00000000efdac59d9d0c043868abf32e1be888860fc0d9c000f8d94298205d64\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 433\",\n\t\t\thash: newShaHash(\"00000000554690e46379a1d9dce804a585cb9ce75e60a1bbe615fd9758cc87c6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 434\",\n\t\t\thash: newShaHash(\"0000001c82ec95a88314daf1c453522187bb7f1aae5eda52dc705a6b5cd2bb40\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 435\",\n\t\t\thash: newShaHash(\"0000002532948c9b69c320cf2268b95a6d8b7b8d0305008bf8554a6e4d4b07e6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 436\",\n\t\t\thash: newShaHash(\"000000002e70942d7307ffca4da2ad921c52a7f65d590953c082677f69ce25a1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 437\",\n\t\t\thash: newShaHash(\"0000000008501ef411058784e6ede04d99937b6fbdf0150dc3fb704c5e99b4ca\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 438\",\n\t\t\thash: newShaHash(\"0000000060aea7a23429f9d86a0a6c70a0c2ea46f8187b3e79a6c14632152560\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 439\",\n\t\t\thash: newShaHash(\"00000000ada357e85c658ca9c5481263cbb702d33e544360fc7879f1b1b35a44\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 440\",\n\t\t\thash: newShaHash(\"000000002e0273b53aa34969cba8282030c59f9e946972c5afb2956c4c335541\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 441\",\n\t\t\thash: newShaHash(\"00000000d0de00ee78ae64b9f980e668d20a2628bf3e0e6bf972d7b58636ff33\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 442\",\n\t\t\thash: newShaHash(\"000000001c528d9463180a7f2b277a0fe3339f0bcf686151fdbf0c931425fe28\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 443\",\n\t\t\thash: newShaHash(\"00000000122bc404b8c2e4d721590eeb0487ca7930adb601e67db220156b3a3a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 444\",\n\t\t\thash: newShaHash(\"00000000329cc5d8734d8717e2712779f314ff2e51416535730fe9d599c96e90\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 445\",\n\t\t\thash: newShaHash(\"00000000b6d11d642f8237aa58119a2c9a262c60c66f3df6a2c6dac323267175\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 446\",\n\t\t\thash: newShaHash(\"0000000054facdc0615716a15e729a58cec25017884f12065e15f50d2326888b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 447\",\n\t\t\thash: newShaHash(\"000000008c5193238d44b2694ce636c348ee6fada1e77cf93c83d1251c47f266\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 448\",\n\t\t\thash: newShaHash(\"00000000a19a9c91e1956b566758887864104fad077faaf05e7404804dc0bc9e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 449\",\n\t\t\thash: newShaHash(\"0000000029aa6dc08c9604af1eedc8a46e0508fd348b66692d3f04821c0e6493\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 450\",\n\t\t\thash: newShaHash(\"000000007cff48901e41dfa666feaecb3fd6c8fcc674e81ffee6b868125be9d8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 451\",\n\t\t\thash: newShaHash(\"00000000bf778e03a25953162994b2d510953f8c6daf5e946b48ad69107f58e4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 452\",\n\t\t\thash: newShaHash(\"000000003f2a021316900d172adbd8d9654c377b56820c4a53fca9997b71249f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 453\",\n\t\t\thash: newShaHash(\"00000000e733e4119640f6bf4b63429291d476ad4b3a1136ca0b06e2a9a5cec9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 454\",\n\t\t\thash: newShaHash(\"000000141c091311cd4cb3cc6932d4f7849f0aeb5b718dfb40b1cf076ffd9b2a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 455\",\n\t\t\thash: newShaHash(\"000000007aa700a96f033b4ede8caf87629a86b9b1bc19ced7f554e88c01ee53\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 456\",\n\t\t\thash: newShaHash(\"00000000f06c4bb0dece575ca349c80ae50dd8e0ea898e9af2e9896f42831b9d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 457\",\n\t\t\thash: newShaHash(\"0000000024f8a8e2eff773f2ed3018c98ff9451ccd4ce4de50e74b4cc11c937f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 458\",\n\t\t\thash: newShaHash(\"00000000d525da2fe373d19ab9f9ccb279a5be1768e9dded346d6ed6d3cb9b07\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 459\",\n\t\t\thash: newShaHash(\"00000000ce16f2f28ca42c7b697ef575d1543b431ef991df70739d815924b6b6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 460\",\n\t\t\thash: newShaHash(\"00000000d9b425f93f566bc55c11f87dbcdb655107a2bb951b6e0d1433bd1c28\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 461\",\n\t\t\thash: newShaHash(\"00000000c475a04702f35c5059e8192b56b1a4907dda73699b9b5ccaab9a78e6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 462\",\n\t\t\thash: newShaHash(\"000000009cec20df53628d85a6afbf049bd08f377afc28724b68dd75c3f983d5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 463\",\n\t\t\thash: newShaHash(\"00000000e85290f0392f9cd1f5cad6c54a70e670d56173799798568479f0791f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 464\",\n\t\t\thash: newShaHash(\"0000000008cc1c2424fdd1515ee5d7394d6dd8c16ddbdb2cef6224625e6ae270\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 465\",\n\t\t\thash: newShaHash(\"0000001a38945a36ce853a014218d293fdc03a9a71315d3569cd336051984b48\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 466\",\n\t\t\thash: newShaHash(\"0000000039461e1978678708390e001257f3a79bc1040de48a429b4e11e8038b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 467\",\n\t\t\thash: newShaHash(\"0000000039d006dbfb471982a49605c78eaace6146ada13b6bafc62a31c0d59b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 468\",\n\t\t\thash: newShaHash(\"000000008946041d8214a45744c213c7c476db6be77d7c884b7c88017b601c0e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 469\",\n\t\t\thash: newShaHash(\"000000008cd29320106e225bba03b392ac7cb5bb9d42a1571257c12d9b6bcc33\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 470\",\n\t\t\thash: newShaHash(\"000000007fee25e0e46ba5103ce3f05e7ad45df0042b4eeae84fe9aeeebc0089\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 471\",\n\t\t\thash: newShaHash(\"0000002e90641d4c071b7082b0bf6fa4a9fa42935193d4e5910f51e8d02d7162\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 472\",\n\t\t\thash: newShaHash(\"00000000a52c112209509e3250c418e6002c4f94144e6ce8221213ab45597b1a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 473\",\n\t\t\thash: newShaHash(\"00000000a7494a537b5078748a5b835469fbf1821795c1d795fe5d41a166251c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 474\",\n\t\t\thash: newShaHash(\"00000000342664714ee19117d6e83002596b18518db765fbe400d1eca52a9fef\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 475\",\n\t\t\thash: newShaHash(\"00000000cec8547c610ccecd55c1a7e721705d6176d6d74ff7eedb3dc585d9e5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 476\",\n\t\t\thash: newShaHash(\"00000000197d78b7d1180104e9c4cbe3270e0b46cf421bbb4ce75b29219e2f28\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 477\",\n\t\t\thash: newShaHash(\"0000000055745ec57c74c2ace3cc9f6b960e16639a632a4697c4d3b4a8e2807e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 478\",\n\t\t\thash: newShaHash(\"000000004bbc1565777180e041ffc1a7d5fd9c22171ceb5f88ca8f86bafb9348\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 479\",\n\t\t\thash: newShaHash(\"00000000c06cbecbb0e7efea6d42a5d5957846bc873432b52684d4e76f366ec1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 480\",\n\t\t\thash: newShaHash(\"00000000e540e843d98b0aba8f544ef39cf7c2b0225b8051865f4f70ce390ed0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 481\",\n\t\t\thash: newShaHash(\"000000008e14c94d45b3549df3e65f06e0428dba7851b5225af2340b1d020001\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 482\",\n\t\t\thash: newShaHash(\"00000000e288d9a513c77f74529895f2c0a0d0563bacb9e2efca2566f58e8c27\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 483\",\n\t\t\thash: newShaHash(\"000000000b368d10f030c3e536d399d32f7ec756b2852be4f5505ac49cbc9725\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 484\",\n\t\t\thash: newShaHash(\"0000000054042f4c8a866daee5e1ee0a328cf29e97a51633944b0c8bbe3cc948\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 485\",\n\t\t\thash: newShaHash(\"000000003a3a59777ebbe1407106a178884062ba4afd290bd7cdb5b21c855480\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 486\",\n\t\t\thash: newShaHash(\"00000000ae2f0191cb538e908294ab51890d538d742e3a55b8e5ad2c5dee3333\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 487\",\n\t\t\thash: newShaHash(\"00000000b6e7e9619d350c6081619dc8293e8da6b0e78e8b84874dc250e8fa5b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 488\",\n\t\t\thash: newShaHash(\"000000006f2ad19f65f83ea7bdd92e3a5d56c5c3d0c84407c2b143a0ffc147be\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 489\",\n\t\t\thash: newShaHash(\"000000003d34056e737c305684d73e76a2a4330489d9f36097e9386548260da8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 490\",\n\t\t\thash: newShaHash(\"0000000086522b2617bed840e8d6d0deef5998a676fb6c26dc9a0f1b94506c9a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 491\",\n\t\t\thash: newShaHash(\"000000004dbe453698d2beb10cd4112775c75467a3e38b00fa34bc6aff541b4a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 492\",\n\t\t\thash: newShaHash(\"000000002393dcc50192cfa862d3a46bd0d56ef06ccfbc99da23f5f13a151b31\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 493\",\n\t\t\thash: newShaHash(\"000000000a9e370662fba1baa2fb2cfd6e47a5f6d71f8e5468a90999034443e2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 494\",\n\t\t\thash: newShaHash(\"00000000b1f4847a1b3ee2566e1105ce67973929862d2b33afeb9ebdac3b5030\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 495\",\n\t\t\thash: newShaHash(\"000000005c017cba34f90178f9859dd1f920135a256dd59988cc10719d964131\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 496\",\n\t\t\thash: newShaHash(\"00000000c64e8f5f583fc1cf0d749e7777a39ce2e3f3970a8481234e437adf0d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 497\",\n\t\t\thash: newShaHash(\"00000000672ae608f58b357ee4ec0e213618f048d6d8a89e5a7c1595bfb4908d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 498\",\n\t\t\thash: newShaHash(\"00000000aa6b614e924287a3bb2e20c67c487bf02bdb9fdcf4b3d12483435ba9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 499\",\n\t\t\thash: newShaHash(\"00000000c193dd4acdab481126468442d9d9f1532ad8ddb342da52adc7d52bff\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 500\",\n\t\t\thash: newShaHash(\"00000000bae1a29190aba76f001a43081b6c4014fdb082ba7ff9e880314a212a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 501\",\n\t\t\thash: newShaHash(\"00000000622a52019d70858feb6416a1d494ed8a03a4015d6883592c2871be58\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 502\",\n\t\t\thash: newShaHash(\"0000000059ec98019f42e18f767de6e353c2b4ab0795f08ee4e1820a5bd9626a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 503\",\n\t\t\thash: newShaHash(\"0000000086e2c17ea510c2cdd422a817170a27abb5a723568691701f0c1ce993\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 504\",\n\t\t\thash: newShaHash(\"000000003152d3c20255eebece5cbaa2b03f189968265f2555eb4eac71771ae6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 505\",\n\t\t\thash: newShaHash(\"000000007d27f82d8c15abe94bd782f145fa5d611c01fc958829ca38125b6606\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 506\",\n\t\t\thash: newShaHash(\"00000000279afce8c5b718f722cf02cff5238cfee210688bf022e420534e008f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 507\",\n\t\t\thash: newShaHash(\"000000001382bdaf7aead389aae3f357fef78dd5c232a278d41caeed287eb68e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 508\",\n\t\t\thash: newShaHash(\"000000003e9a7d68550c87890d13a04aa9350ff9dc9b5aeda7fc9df1d0964380\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 509\",\n\t\t\thash: newShaHash(\"000000008fe74cbeae7fa75f48246c4226c700f5fbc3d28c1a37bde9b368c404\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 510\",\n\t\t\thash: newShaHash(\"00000000bcead376fba1f5a6a28b345503dcd61ee1118a30008b81aed6833a3c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 511\",\n\t\t\thash: newShaHash(\"0000002c0d722f2d0fecfc44effe96a0c63c05c74db3f1c8251b7c0dc87a937e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 512\",\n\t\t\thash: newShaHash(\"00000000fe6047e9ebf9dccf8d910360e2492365b320eca4c64ef16c6326c16a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 513\",\n\t\t\thash: newShaHash(\"0000001c3d0125d527276a8a8044b63b035584bef4d805f7abd75f0cd9f62688\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 514\",\n\t\t\thash: newShaHash(\"0000000077355db97e732df5e7aa7361305bfd810db5891bdc1d14879560ba7d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 515\",\n\t\t\thash: newShaHash(\"00000000fda51c2ce19d9ee8b97d632ec04c92d192b3b1b7b52320274bf5d27b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 516\",\n\t\t\thash: newShaHash(\"000000007d3e98f62ff6085af5cf30641ad530c39a32865afd5a0c176356f17e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 517\",\n\t\t\thash: newShaHash(\"00000000b3282a0a2ea3e699b2c021de203b74e1fb55dffc9cffed76a8a735cb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 518\",\n\t\t\thash: newShaHash(\"000000000075e64441a9b715a9836d21fa6c140342b6de3808eca379c94ac750\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 519\",\n\t\t\thash: newShaHash(\"000000001fcb9abc693ff5507b101ba82996f5cfbd8b82072d19f37e7f172cc3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 520\",\n\t\t\thash: newShaHash(\"00000000a15a41eee1e276bdc1f65876fd252a6c19e80cb3fe20da1d9ee33a43\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 521\",\n\t\t\thash: newShaHash(\"00000000520dcc8f09e5f73be0c426b66c0b0355a5c5b9fe943508d866412e59\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 522\",\n\t\t\thash: newShaHash(\"00000000499cbb31796586b7e4904dbfbcbaaedb80a7d5d1102de7c1c20307ca\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 523\",\n\t\t\thash: newShaHash(\"0000001c55730643128f3924778518fc6b1d1289511179ec5bee693b48e5d13b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 524\",\n\t\t\thash: newShaHash(\"0000002786eddff906bb37d794338775ea684085f5a27ab2b7b1a982102819b2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 525\",\n\t\t\thash: newShaHash(\"000000007b8becc4650729281be59008657019b5d367e47ac28605968c3aaaf5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 526\",\n\t\t\thash: newShaHash(\"0000000078fbe51b5f6ae762a8c431a859d3345a8254f204b7dcb897cb29f72b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 527\",\n\t\t\thash: newShaHash(\"0000000070013ce6acd7d12627dfad9cb0f643ca991e52cb7877f9e2aaf29f9a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 528\",\n\t\t\thash: newShaHash(\"0000000058a832d48cf93b2661e15ed5143380c1b14a7614a72a92ebba782d52\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 529\",\n\t\t\thash: newShaHash(\"0000000044c0254621c928c41495e2963ab610607f3db3b2a17b842b3a471fe9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 530\",\n\t\t\thash: newShaHash(\"00000000ec1b8d7a96ead139205d72b2a2f44072a7ca543cd3775a96e00d9284\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 531\",\n\t\t\thash: newShaHash(\"000000001f1e9de59fc9c4cef8add9c362e87fb242527e251043f83e1b1dfe83\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 532\",\n\t\t\thash: newShaHash(\"000000007d7f8d6e332a0f9df764be4ea34d86e84907a237199cc4dcdd0d74e9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 533\",\n\t\t\thash: newShaHash(\"000000001d5931b36278500a5f67e6719c9c8f2ed50d33a840593e19f29eb225\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 534\",\n\t\t\thash: newShaHash(\"00000005a054b525c39d2b9738d22fabb15979e7eb9efb5e330d8ecb6797d084\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 535\",\n\t\t\thash: newShaHash(\"00000000a20efb05f9f9f7a51b356a87aadc7d9f67f2b3bc1fd990db8ef4c5ee\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 536\",\n\t\t\thash: newShaHash(\"000000000f52d256c6202178d2efe560a00e162fb0d3ecc7093b7d3c78077d5d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 537\",\n\t\t\thash: newShaHash(\"0000000095facc787d0e57e7598dc33091db7a2eb47bed082a3093513ae57a31\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 538\",\n\t\t\thash: newShaHash(\"00000025b1b89650dbebe04b285ee1172cf48ece4f6258563054ae2bc22a7f7d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 539\",\n\t\t\thash: newShaHash(\"0000000017c5bfdd819afb833532923a8001f5229b75fff3fa872bc8d146857b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 540\",\n\t\t\thash: newShaHash(\"000000009bb709b7591449d6cf21b1e0a3615595f1c5ee3152b6d93cbdeb4d42\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 541\",\n\t\t\thash: newShaHash(\"00000000da6ea6c8355f855505a77a9e17f7383c3a73ba80f4ef1abc703c4684\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 542\",\n\t\t\thash: newShaHash(\"00000000189d662fab650549d908dee34c72c3127bf0682a34689d6723e931ed\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 543\",\n\t\t\thash: newShaHash(\"000000001e5e7df81da4714e37598aa299dff0cb8fa336574d721ce4c35094e6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 544\",\n\t\t\thash: newShaHash(\"000000007295652677c91e8811cb161708f3bc1794bfa5c56e50d828c74ad126\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 545\",\n\t\t\thash: newShaHash(\"000000000e6397171d98cb1aebb13f0e1dfe1c5de1eade98b7ed85f6ba5c60a1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 546\",\n\t\t\thash: newShaHash(\"000000004366db5e8ce00110eb2e4cbed3b34d0a87e66fefc86ef4f40143c0c0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 547\",\n\t\t\thash: newShaHash(\"0000000068764f65464e437a5b1e7c2f3b370c421a669620abfaea14187ef460\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 548\",\n\t\t\thash: newShaHash(\"000000004b0fba0e113202efbe0f5b41741a909200efc4497b3fbf2e9270bbc4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 549\",\n\t\t\thash: newShaHash(\"0000000081a3a025d059625e2fc91b28760a310b7a47d3ff208cdd6525534da7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 550\",\n\t\t\thash: newShaHash(\"000000005574e2dbc8882a38f4eaf7c9ac596296de65fac2f73e7c9db0b62a47\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 551\",\n\t\t\thash: newShaHash(\"000000000884280b14440e71f50c1332c9233a034e51d0ad5348984911775067\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 552\",\n\t\t\thash: newShaHash(\"00000000e958baafe18211c6abd0875b98920e71e7366fe3975a5e6a9c009d75\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 553\",\n\t\t\thash: newShaHash(\"00000000b9ee7a4af8178efb78b84e2f91cb4f2a51703d6fb296275aac2aa801\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 554\",\n\t\t\thash: newShaHash(\"00000000055c9dd21fcea1a915ee1f3394633021a284657f68e42d8e44a3543f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 555\",\n\t\t\thash: newShaHash(\"0000000083323481990925e5dd95c6cd06812277d5b7fdfb951913f12c1dfee2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 556\",\n\t\t\thash: newShaHash(\"000000000ef97dd049fd16a523eedb04d04304b527682953a73c6d1ae692bf10\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 557\",\n\t\t\thash: newShaHash(\"000000000f5fda8ac97f05d4a655d12d1fb55f7fc0572c2b947d671ee853af42\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 558\",\n\t\t\thash: newShaHash(\"000000002f876d963275929d8fb3be353ced8fad2c446f6daccbceed6ff3b8ce\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 559\",\n\t\t\thash: newShaHash(\"00000000026976ddb87e968afccd4c21ac2a99e087320a858ecdaa9aaf5e65cb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 560\",\n\t\t\thash: newShaHash(\"00000000ac77c62c30e47475e6462a47b3c37e2ed3b9df94e18881de3408eb9e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 561\",\n\t\t\thash: newShaHash(\"000000004b95f6d5b9ea69203a1928a9ecf23a42a7e6787461d9170b79bd548b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 562\",\n\t\t\thash: newShaHash(\"0000000013c69559436e11957baa5e296a597dd89c25ffbb9623a8c2a05e79a7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 563\",\n\t\t\thash: newShaHash(\"00000000e4ceafd7c1a4ff1b372d6e0e05882571df6e2e0f2c0a326361977380\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 564\",\n\t\t\thash: newShaHash(\"000000079f81cbb216cfdd0793e5749bf2d91b880197f5645e4a7cc789b0c10d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 565\",\n\t\t\thash: newShaHash(\"000000008b9d250a58b5439bad9872412366f4b9b17c6366505bce9b499ecac0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 566\",\n\t\t\thash: newShaHash(\"00000000970c9a4d7d204b2d32ccc6650fa32de9a173a548daa3b8ed582b5c9c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 567\",\n\t\t\thash: newShaHash(\"00000000fa19080e473e128e0ec20b3f5f327b91537b0656fe0aaf7400de5712\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 568\",\n\t\t\thash: newShaHash(\"0000000033791983b834e45bb2af5af37db0013499efdfe2919077ae67ef66b9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 569\",\n\t\t\thash: newShaHash(\"000000002c23b7a590e1f958f24490354ce5c53c886f937c5895bba2a7dfe675\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 570\",\n\t\t\thash: newShaHash(\"000000007c12c476c564d80e93bbe89e5d6f42b46d1ecf3e482e56cd03fa6c80\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 571\",\n\t\t\thash: newShaHash(\"0000000018b4be0f32f5e3142cb7da7e92dfd3f727aaa75206de0c89a93a6bdf\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 572\",\n\t\t\thash: newShaHash(\"00000000ca7b70b484417b7aeac30221a01266e9dceeb6bb48505ecf0a7b06fb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 573\",\n\t\t\thash: newShaHash(\"00000000da1f592e3fba5108d69e858d22da0ae4fb75b7e2aa0f966c27710556\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 574\",\n\t\t\thash: newShaHash(\"00000000711392b493eed97f2bb7fed4cc2ed49964d05fa549e0f6493ecb0a6e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 575\",\n\t\t\thash: newShaHash(\"0000000080f6aba86cad7a36b0ff56191a6a3b60ec522c52f5ce731a690c16df\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 576\",\n\t\t\thash: newShaHash(\"000000008ac87595446c781f4a3834e2dcf606a4dd5e1d9b36b9e22a8e4a8826\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 577\",\n\t\t\thash: newShaHash(\"00000000f2f683efbffcbeb299553d49a243bc34b8c39fd41081177fa710744e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 578\",\n\t\t\thash: newShaHash(\"00000000e641ce9cf7e6730774affbdcc065bab430afc9d278917bbf8a27af37\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 579\",\n\t\t\thash: newShaHash(\"0000000081cdad75df80e8eb0fd48a20b2c57ea049e0926ad3860b98da3bedd2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 580\",\n\t\t\thash: newShaHash(\"00000000ec8889c2b36b675a9bf23769a87b2bcf1a4ed684d638e2e7d431581a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 581\",\n\t\t\thash: newShaHash(\"00000000a78b8a76fcd9b03b5b66cfc08aac2124de5fc239b3da3bc4a04e7e96\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 582\",\n\t\t\thash: newShaHash(\"000000001a3c0a20252b99fe11abde01be65e91e73402196f87237d3d6237ffb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 583\",\n\t\t\thash: newShaHash(\"000000008e604663ec6f150b46a021c1758b900fbc3677b696fef8e765c2e1d3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 584\",\n\t\t\thash: newShaHash(\"000000004fa7ce07a2fe1cb70514de247f0404deb20dbd621f392c908a1b0b7c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 585\",\n\t\t\thash: newShaHash(\"00000000e6b07aa0ba287fd548356280e39d7acd6ec52f163483668960d506c1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 586\",\n\t\t\thash: newShaHash(\"0000000017f9ee543d4fce333b0b1649081600772308a6502ab2af6b73449a7b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 587\",\n\t\t\thash: newShaHash(\"00000000f90bbbb3714bf0d6e4684b79a10df4f3f833111daae9fd7779a3a561\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 588\",\n\t\t\thash: newShaHash(\"00000000a164600c17211cfaae52f92dd99151b98e37be8b01df750e21ae66fb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 589\",\n\t\t\thash: newShaHash(\"000000000d06cd76dfc04b0936fb6d080fbd180ba6d2929f9fed7914b12c228a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 590\",\n\t\t\thash: newShaHash(\"00000000c0bc2e8667d5c87db9348021f81a1fbc986c5dc8dece133b1b24418f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 591\",\n\t\t\thash: newShaHash(\"000000006ce70566a72a91e135fd9f2bd6faf53c600b57290ddcd52bd0db7832\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 592\",\n\t\t\thash: newShaHash(\"00000000c3c231e5afcb7f248614dd4f8716cee689041e1f971b4c9fc7479813\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 593\",\n\t\t\thash: newShaHash(\"0000000081ab3eb3e6abd9f28d88655aa8b88eaf3e4b52932577e6ec379ba58a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 594\",\n\t\t\thash: newShaHash(\"000000008c6140483bac65814a8c8150075168256352e1ae8755b44f91004bed\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 595\",\n\t\t\thash: newShaHash(\"0000000034fb3463c1c5b08c144b91444d9332d9723da583fb410c7e51b15501\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 596\",\n\t\t\thash: newShaHash(\"00000000be784066d4f93f08ed74a9c2bbafdcfec2bacdf65f23725524bf48e4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 597\",\n\t\t\thash: newShaHash(\"00000000a5049fe8e2d1f2f1432c8f4c3b9bd043e38fa141d0a94dc6ba1ad7a5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 598\",\n\t\t\thash: newShaHash(\"00000000a4d99ba0f36b996a40ab08283ea1055d31c771b5d0736415fbae6f63\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 599\",\n\t\t\thash: newShaHash(\"000000003f74f424dee28d4be29b39f5a3a3e2a69bfd95c829c1814f47d8c0e9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 600\",\n\t\t\thash: newShaHash(\"00000000ba5f4e3cc4099cb417fb78c2630d50726de2c30a1bbed44f1142d3dd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 601\",\n\t\t\thash: newShaHash(\"00000000fcd0f7c5bb84fc24fdd73f81da0e8bfc30d8db4af923aa0a93a6cbdf\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 602\",\n\t\t\thash: newShaHash(\"000000004f8abb50cba6934a08f0b8fd590c096ad4f552b74a6d3fc97b9cfbda\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 603\",\n\t\t\thash: newShaHash(\"00000000a56327c6459f1da84f004d4a4f22248d712d0368f0d6a8913e720bb1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 604\",\n\t\t\thash: newShaHash(\"00000000e2b08a47b6fe247f8bca0bddf4f42cdbd4e110d7da3de436eaaa1439\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 605\",\n\t\t\thash: newShaHash(\"00000000186dbab58a7e2773f2bc4fc1047f84801408d1b4ad9950c392188336\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 606\",\n\t\t\thash: newShaHash(\"00000000f546c3f960a45fd1e0f79f232a4917c3971de963c5dfc58aa7524014\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 607\",\n\t\t\thash: newShaHash(\"00000000394879dbab2bf11742f2273414fde02f306a86d8d7614e0bf654a955\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 608\",\n\t\t\thash: newShaHash(\"0000000006fa39388442f40c6d8e96e2150ef6337fd8f3b9cd2fea48eb1ab4a4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 609\",\n\t\t\thash: newShaHash(\"000000000fec2a99021d5980097e315282bd93f1077490d59c8cb6b279d9a0a0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 610\",\n\t\t\thash: newShaHash(\"000000004f91c548f5cc5d806b1ec5e6174d71ce84118feec3a7d02efaa3af49\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 611\",\n\t\t\thash: newShaHash(\"00000000148501ed8fde13a513d5b147e90506117540542ed00e3b458c810182\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 612\",\n\t\t\thash: newShaHash(\"000000006a68e821ec3afea2dccb45d10069c59d2deda5f78764dfa5ef1a25f8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 613\",\n\t\t\thash: newShaHash(\"00000000e5a6de4b4cf74f77482bc3232ccb27b3c794cee25ce467b02ffd7aeb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 614\",\n\t\t\thash: newShaHash(\"000000007d6dce0e3d6383dfc345efe5f057d2e162cbe522ba9df5c067ccb9bd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 615\",\n\t\t\thash: newShaHash(\"00000000f07b89f8af643bdea426b418021f081ca49867dfb60241445d3d4b1c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 616\",\n\t\t\thash: newShaHash(\"00000000e6c053600c0c2084881506dde7f1882b8e02514b963b19f172bca3fb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 617\",\n\t\t\thash: newShaHash(\"00000000d6006026389ef150a05b153d5bdc8d281f698ad2ec9eb4c0686d1a53\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 618\",\n\t\t\thash: newShaHash(\"0000000097a82abecfd80c11050f1b9c0c1b17efbe45b7d15b88cbf5ccca40b7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 619\",\n\t\t\thash: newShaHash(\"00000000022e7ccf24469fce51db9874437162eae6d5658c1260d2cf21ad95ea\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 620\",\n\t\t\thash: newShaHash(\"000000004ccfda9b651da860a9891df972f5d46091caf008cecc9391772ec00e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 621\",\n\t\t\thash: newShaHash(\"000000005920653af9b1e904f6bc1b334461e5f24ec84fae80b120e2d0a9d0a7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 622\",\n\t\t\thash: newShaHash(\"0000000001a2050c10e55c5bb3e1863b14aa951b2a420439059beaa2b8565b38\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 623\",\n\t\t\thash: newShaHash(\"00000000d03dd7d6edd5cf5d4a1b48ad52da1358968e76eb716ece921ffb0566\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 624\",\n\t\t\thash: newShaHash(\"000000000c96d2e6cebd046f2b7e109c5ef421355e083db7d45bfcdc2b43d2e7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 625\",\n\t\t\thash: newShaHash(\"000000001a00641b473a9bdb0841b1d3a98933bd532b9f27aeb04b36025fad9c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 626\",\n\t\t\thash: newShaHash(\"0000000013924b5bc1cbc4f7f5afca63ed4bf673e99208c0e7769fd95333f5d2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 627\",\n\t\t\thash: newShaHash(\"0000000065f5498d6bb6b611d337086942767dee5d1348baddb18b6271ce22f1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 628\",\n\t\t\thash: newShaHash(\"000000003c3a3b1e48a305a323b0512028a260f9e6d7c24485fec5f6ecd158b7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 629\",\n\t\t\thash: newShaHash(\"0000000071d5a00ae46dcd4319a9a79ad452513dbb1ff67e1e22e3ef21e05edd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 630\",\n\t\t\thash: newShaHash(\"00000000c01ecc8662a489e9925d06cd132ae73f607113477e57ef0c3fa57dc8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 631\",\n\t\t\thash: newShaHash(\"00000000d29962a5c054162c5a5cfe34ef8d54135a0137bf09d5d8624bcad594\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 632\",\n\t\t\thash: newShaHash(\"0000000053a7537b1f3061e506f127b2bc1df901e7fc5cceb39265fb3e7558ec\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 633\",\n\t\t\thash: newShaHash(\"000000003a5bcf175976ae69cbdaac2e1489087e379f17e80cddb5d0aae4b4d3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 634\",\n\t\t\thash: newShaHash(\"0000000066bbab93c4cc198f7a207e032f9c017ee11b6503edb20fc028fb6915\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 635\",\n\t\t\thash: newShaHash(\"0000000000fe83ec64a42871885548ae47c3eca009f3628b5cc1dc7f6757a9b7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 636\",\n\t\t\thash: newShaHash(\"000000008805b21f0a92824deb2a669ef143b03bd64212623ff6810215f77a2a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 637\",\n\t\t\thash: newShaHash(\"00000000c7a3cf6e1ca02b1683f933e615aac7cd2356d56189bbdae22507f403\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 638\",\n\t\t\thash: newShaHash(\"000000004295c33dad5030a0e10b3837bcfaee5ddfed780cdbb649c1c4639bb1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 639\",\n\t\t\thash: newShaHash(\"00000000f923bdfccce388ee60e15ef30455d53f2bb2e31d605c9218aa0de8c1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 640\",\n\t\t\thash: newShaHash(\"00000000221394c5b2b79e988e9d68ab2be26179d93430d7a6798c161616b951\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 641\",\n\t\t\thash: newShaHash(\"00000000f85bc406d95f89678e468f40d7f818f743e581e053f5c3d514694a3e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 642\",\n\t\t\thash: newShaHash(\"000000008a8b751679c58d12e669ac3945b9d7e21b57f849ab99c3fec0dc01e2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 643\",\n\t\t\thash: newShaHash(\"00000000a022136fada490e07576df6502d1da3d1437bbbb31dbe1200f7b4e00\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 644\",\n\t\t\thash: newShaHash(\"00000000df9e3e3f237bb5ebbede065357bb0c4d2c102762f721bcf8f285217f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 645\",\n\t\t\thash: newShaHash(\"0000000006829bf8ab467074865895747fa437dcc20757c1178f0b8c5ba444b6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 646\",\n\t\t\thash: newShaHash(\"0000000010e1cc5ca4001e4456b60399d3c1705056e75a5c151afc476cf7f2c6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 647\",\n\t\t\thash: newShaHash(\"000000004c37d0ce62181448ba7af4aad5a791f3fb15d694d6aff7513d46416d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 648\",\n\t\t\thash: newShaHash(\"00000000edcd999b3bc32de67349e33e4480545c4ee80541d35efd0347ea9524\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 649\",\n\t\t\thash: newShaHash(\"00000000941782a6ec45e1c1c12a1d75dcc939ca7dcefdf64ac27557c7c6cff5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 650\",\n\t\t\thash: newShaHash(\"0000000080b0fd9e62ea6ebcd07462b52fbf5cc9a447e6528d6cf59f1bcd50fc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 651\",\n\t\t\thash: newShaHash(\"000000004d790c7de574e641c93247d512961dabe4ffd9d0517f1760ec9a291a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 652\",\n\t\t\thash: newShaHash(\"000000004732e70b944b8c799ef40af0d784a4b0fd031b7bd346857be00e975b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 653\",\n\t\t\thash: newShaHash(\"00000000b4db318663970e1ef2cb8db1591820339b71c908dc0fc22c41cb1ab7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 654\",\n\t\t\thash: newShaHash(\"00000000ae691e4a0f5abaaffd7afee42d72aaec18e7bc64e2bc1d7a054cb367\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 655\",\n\t\t\thash: newShaHash(\"00000000ba8516e9be5241ff4679a36e06b29dc39be17ed2bef487d0ce483601\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 656\",\n\t\t\thash: newShaHash(\"0000000024c2fda40d779776c8e558e11f74091f9be63927e3379c8cfafc756b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 657\",\n\t\t\thash: newShaHash(\"00000000d3364c0605318a05e65cdfb138d4d622c9ffe8ef6bf6ccd03c83bd35\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 658\",\n\t\t\thash: newShaHash(\"00000000510458a5cd332ea329d6defadd2c278989813bd832e423347d872fd6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 659\",\n\t\t\thash: newShaHash(\"00000000f48cafaa6cca0bb96ac7dac0318daab39eb46363329f387d90523f00\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 660\",\n\t\t\thash: newShaHash(\"00000000effaae462e5289d92ec1d420cfe391b51739172bb5cf4709d44a8fe0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 661\",\n\t\t\thash: newShaHash(\"0000000076b320f047413031050d5d71e6edf23081031f09d86e352b99bf7007\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 662\",\n\t\t\thash: newShaHash(\"000000006e1d84beb15701b41bfd0c82b3dbed2c97d4d0f05b5f135559be8782\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 663\",\n\t\t\thash: newShaHash(\"0000000062b9d4d5f8bb56cb3b4962f2e98c2209f956a201edadbe1d1d5d462e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 664\",\n\t\t\thash: newShaHash(\"00000000356735bdda8d4cd1e37ead031695933b52e2c8d32f1fd6f562cae4f9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 665\",\n\t\t\thash: newShaHash(\"00000000f27f4572a4f65650028e8eb6c1c2b72c41be0af844960cc60e56f874\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 666\",\n\t\t\thash: newShaHash(\"000000005d826c88a68861558481734917e5908e067356fd540670dedb68e516\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 667\",\n\t\t\thash: newShaHash(\"000000006c1648e6170fc3407f725866ecb55a23108e238ec50ea02439a53cb9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 668\",\n\t\t\thash: newShaHash(\"000000008648e5b7d3acd01273fea8598c04e1f6af4bcffa959affabf12a5f08\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 669\",\n\t\t\thash: newShaHash(\"00000000e8512df5cd264475a32aebb5e8cdf12f9f4d01ff558d71e867c0d8f2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 670\",\n\t\t\thash: newShaHash(\"00000000e0af289d3ab3cb3c8396399cf7ce5954971a439371e173753d6602fb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 671\",\n\t\t\thash: newShaHash(\"0000000066e71db7bd95538fca8a43238d8fe2843292237dfba77241e34c9597\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 672\",\n\t\t\thash: newShaHash(\"00000000014feaa901dbc84c635686817d2478543a620bdab87713c70adb319a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 673\",\n\t\t\thash: newShaHash(\"000000007a5e244f9d924d81a34fcc444ffe1582b4c0c9f4006c6c25110b98cc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 674\",\n\t\t\thash: newShaHash(\"00000000d4c1873fff6579fc76fc31375d6c6f682a36ed908958ab4902f03d8f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 675\",\n\t\t\thash: newShaHash(\"00000000c587a095bab8ff700527f6b90e2f0a43f03c33b1359cc263ecc99a89\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 676\",\n\t\t\thash: newShaHash(\"0000000003ad6b0730461775b9339ef5077dd9b61f036c825c3993a28f868491\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 677\",\n\t\t\thash: newShaHash(\"000000007b0bf4611950267171a6f0fdc8dc2b3c42afafdbe9faf604dd46e0a3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 678\",\n\t\t\thash: newShaHash(\"00000000208a229ce17c9a0bc8ca927ae795b4cf46d116feb136e936a4c12623\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 679\",\n\t\t\thash: newShaHash(\"0000000000105f5a26f2cd3b8a77064360c229e638b03ba5caa5b2b108d9f8a8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 680\",\n\t\t\thash: newShaHash(\"00000000d2b67e9e4afbf79d16a739c8fee450d2a647dfe6c1e5fd53dd3d5504\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 681\",\n\t\t\thash: newShaHash(\"000000007ecfba209f9b661afb68f939363bead904fca84d5b71656f04af9497\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 682\",\n\t\t\thash: newShaHash(\"000000009e0cea5e95e982b2a6027139b3b07bff8c153d0905f02a52753ed51d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 683\",\n\t\t\thash: newShaHash(\"00000000108415a06070eb13597d445ce831324e8a85af09b1c5f5850d50461a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 684\",\n\t\t\thash: newShaHash(\"0000000063e88cb48b700d86b1a9a99a6305ad171c773f062b3ff2a839eadcdb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 685\",\n\t\t\thash: newShaHash(\"000000006d0189eb64e690b24884afa9ef3a33518af35498ae08cc7c7a72dba6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 686\",\n\t\t\thash: newShaHash(\"00000000dedc181600f8053974ecb93006b82d54c5b4cdde0a3d7bffec1ae027\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 687\",\n\t\t\thash: newShaHash(\"000000003d4bc06aa2679eae1632d090ab43c51fc2e5afd0083dab20e7b52e64\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 688\",\n\t\t\thash: newShaHash(\"00000000443b1b1103774d23837660831142ba6582e2b36ea59f29f9223daaa5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 689\",\n\t\t\thash: newShaHash(\"00000000d176ae8a7ba7f63ffd2643baa6a44885ab703ae285ce929d3110a52d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 690\",\n\t\t\thash: newShaHash(\"000000008c8133a482f5589d08b75b43f4bd18f433fd417620ffbd1639e2109a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 691\",\n\t\t\thash: newShaHash(\"00000000b1dece4b1feb1eeb4afd41890f92ff85e13b9f3ebfde6b29e0a7c1c8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 692\",\n\t\t\thash: newShaHash(\"00000000d036ec7a42824229a13cc98de12b7f9f6208dda815ecf9df34192087\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 693\",\n\t\t\thash: newShaHash(\"0000000092b3158834c9775a303eb759f0144465855482ba5cd223bea53b09a3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 694\",\n\t\t\thash: newShaHash(\"0000000060d8e9388dc871af88d58992859abacf370b12dc4bae9bcd2a03fc11\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 695\",\n\t\t\thash: newShaHash(\"0000000049c5a3d28b8239d007b869db254598b2d3b0c10a34cc7fd80f23c4b9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 696\",\n\t\t\thash: newShaHash(\"000000008d366984070af74a1bd5519abbb89e58ed39290b6ed6800348947b2c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 697\",\n\t\t\thash: newShaHash(\"000000007ab3d97920334364012e03d9cab0eba3138890ceb5f4302fd5396f21\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 698\",\n\t\t\thash: newShaHash(\"00000000b021e689aa9c919fe3fc45fa79e8a094827bed9c4d0a16beb6b0405d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 699\",\n\t\t\thash: newShaHash(\"0000000002b6f9998e07842f7a5b3e6b302b5148d8fc7c1600db23f2c7260ee2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 700\",\n\t\t\thash: newShaHash(\"00000000c10f9e728fd27b7b9417e04a2fdc3d388eb4127c4d869a8e70d8fdb5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 701\",\n\t\t\thash: newShaHash(\"00000000953fb920ee47a8b0b653956c732483377710ff4b93eb954244b07a2a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 702\",\n\t\t\thash: newShaHash(\"0000000052bf6a1590e124e3bc34b44732106bf2ae27890d8ed41c90a665cc2e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 703\",\n\t\t\thash: newShaHash(\"0000000093155f20c4b9041686ab5871070fd2dc5caff830e2dd6fec6905428e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 704\",\n\t\t\thash: newShaHash(\"00000000a5f41bbede3abebd65a5fd2f14f555db01b0432eebd01dde3d42a0a4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 705\",\n\t\t\thash: newShaHash(\"0000000065109ccaf6836dc233aad4153fcf410251cb33fbb09f0a74dd2ca3e8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 706\",\n\t\t\thash: newShaHash(\"000000003e335122d01ea0106a9cae48c0f2e5191d48a2fa2d083f2c8c7eb976\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 707\",\n\t\t\thash: newShaHash(\"0000000046c2f5d60220d7ad1ca082cbfcb4933b69c21e5560896175c0d22310\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 708\",\n\t\t\thash: newShaHash(\"00000000db74a91f23956e967c54f20c8632b457bad65cf7ea8064619fdd649a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 709\",\n\t\t\thash: newShaHash(\"00000000882636412dcac33c6ec5ba104970524ed46b2a2172702bb26ba35433\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 710\",\n\t\t\thash: newShaHash(\"0000000015e491abed4a573be613bff8d2b0e3b62b23487d7f1c726f17d8332d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 711\",\n\t\t\thash: newShaHash(\"0000000016cba11fcabf5ecdbe915de208cce362434ff39d5a4ce2179ebd2a5e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 712\",\n\t\t\thash: newShaHash(\"000000005abbb9bd765123e9133f89fd7da63bdea8e4b6e06b2bc4beeb497207\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 713\",\n\t\t\thash: newShaHash(\"000000002c97acdca0ce9c09957681617f9298eb240d9a52bf22036ff5eaf924\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 714\",\n\t\t\thash: newShaHash(\"00000000bc7ba92a69f4006cb204b71d0736512d44abf19e3078abad65a62d5b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 715\",\n\t\t\thash: newShaHash(\"00000000d0cbb629b3c6e4cf9dd260362503273f06c8c5e7f4edc501295ed5b5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 716\",\n\t\t\thash: newShaHash(\"000000001cce8a6aed1964db81c2bb97e1b31665aeea358d44bc1067ffc333ff\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 717\",\n\t\t\thash: newShaHash(\"000000006f72de62508a66186516090e2f9a81ffe461eaae8bdc50d845ede125\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 718\",\n\t\t\thash: newShaHash(\"0000000061f9b1174ffabfcfe9ea152d35fa30f2acf4d84cc4e0662bf79949fe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 719\",\n\t\t\thash: newShaHash(\"00000000234f574136c675640a5c645df758ad3d3fe6c2134fc407beda56f0be\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 720\",\n\t\t\thash: newShaHash(\"00000000594fdbf02b6d4543e992cc9be42bb02f35da20c85a264cf875f2e0b9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 721\",\n\t\t\thash: newShaHash(\"000000004914e4f8d244c522d99f31ccf7630e2fb82bdd6de73939102f07e57d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 722\",\n\t\t\thash: newShaHash(\"00000000cb29c457edfc2c9996cc729012e32135fe4dd7dde3c96aa2392afe4f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 723\",\n\t\t\thash: newShaHash(\"00000000c08d2603831094a867c1112b7b6c2f95383f078493c631d33b991387\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 724\",\n\t\t\thash: newShaHash(\"00000000d99cbf572ca136772d71c8dbe4ec87965ebfaec31cf4de6d5d38e84c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 725\",\n\t\t\thash: newShaHash(\"00000000b7fae41f3f0843e519376ab05528f933de9b257490344f2e95a8ea14\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 726\",\n\t\t\thash: newShaHash(\"0000000086cad78997907b5d15ac1fe0cad418c4af906ed20d74cbd4f9744038\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 727\",\n\t\t\thash: newShaHash(\"000000003e05061fa3c7cdac3363509036272a01a2ba09385bb2220a820f5807\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 728\",\n\t\t\thash: newShaHash(\"0000000011855addea9101b3576396283c387ee5c43cb5f069dcad676f4d43e6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 729\",\n\t\t\thash: newShaHash(\"0000000028096be26234a664f5e0610dd9aec861e9aab705fea1a0497c3fdaf7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 730\",\n\t\t\thash: newShaHash(\"00000000b412c2386d28f6e8eec79f5790fb53da6fd123d30d81dd0b30ce755c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 731\",\n\t\t\thash: newShaHash(\"000000006410e600b4df5d601e72c8e102ea72aaf053f30756bfc4ebbc58e72a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 732\",\n\t\t\thash: newShaHash(\"000000004d9f36fa87d3cf8d929739e97633aa6ced3278ccd7a3cc86df7135b0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 733\",\n\t\t\thash: newShaHash(\"00000000bb53e2acccc235e10c078d503581bef3a2f2978dedc3c0a7a7b89996\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 734\",\n\t\t\thash: newShaHash(\"00000000c46dee82ed88cb1b9f291545bb85dd3fb310b1ca20f2d4a1175b145d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 735\",\n\t\t\thash: newShaHash(\"000000006ee9d0afd4f06ba1ae6aae1a021f6e3b1f94d6ef784c7595b0225ade\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 736\",\n\t\t\thash: newShaHash(\"00000000945896f882a253920ea4dd9c13e2988bed72d351900071d41d33914e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 737\",\n\t\t\thash: newShaHash(\"00000000dc02777284212c8f6464731357c8869e4527f19db4afc1f25e7cac6f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 738\",\n\t\t\thash: newShaHash(\"00000000ced82b720d703fa91c077df5ae8e93a3dbaf8ee2240a672e475a66e0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 739\",\n\t\t\thash: newShaHash(\"0000000075d0ec22767d3104b9a051591f5892758eb22c6415924f77396d9cf8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 740\",\n\t\t\thash: newShaHash(\"00000000dd56673adcd6433737b4a6ec56b24fd346105c2f81443cdb14fdaf7d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 741\",\n\t\t\thash: newShaHash(\"000000000bf83f4032cac0efbb5593f58be9d03690251cb12870093c169c98f5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 742\",\n\t\t\thash: newShaHash(\"00000000d2cd1701caff34f6497a1917d762e40fb1e452e1622f7bdbb640ae3c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 743\",\n\t\t\thash: newShaHash(\"00000000070caff8875d0fab6081e9e21719c0a640546cc8cd4c11907b5a320f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 744\",\n\t\t\thash: newShaHash(\"000000000bd8d1d2279718c8a0962ef003291051abd984964940964bf58774e7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 745\",\n\t\t\thash: newShaHash(\"00000000a2a5984c5b4574c30fbbaa980a6c4fbb8fc1f9c48824592853564efe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 746\",\n\t\t\thash: newShaHash(\"00000000c2c733bf005caca36fb70965090c9351c2e44b3a2eb5fd080d1edca7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 747\",\n\t\t\thash: newShaHash(\"00000000333431160c883e568b0a31c398e95bd760906e9947ea1dd0c9cd3c3b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 748\",\n\t\t\thash: newShaHash(\"00000000697b9fd2f9a57157aaf9b509ec37d6009fe7acde48001f98bf8beb96\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 749\",\n\t\t\thash: newShaHash(\"00000000e9fa68e635a42b2fc36f47ce252b7a3b21d4c2492aa055877ac46428\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 750\",\n\t\t\thash: newShaHash(\"00000000209b8fe15ee333ac8d808c2b94cdc9efe41dc7c8225bc16bd20a0bec\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 751\",\n\t\t\thash: newShaHash(\"000000008e04e8caa381b2b1507e9d3d2b211894bd20e7dd179ac69e6e870be5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 752\",\n\t\t\thash: newShaHash(\"000000000aa8c7baf50a5e84479bff08d7d9d11ed95805130f14074fa02e82cc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 753\",\n\t\t\thash: newShaHash(\"00000000bbc55936ae51e30e7d524bfaa8c59f07bcd6d23195c8e9454a9f549b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 754\",\n\t\t\thash: newShaHash(\"00000000e7a8795c0c34f30bedfd7cb6c6e99e45a2bed3f19543068ceaa3fe5c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 755\",\n\t\t\thash: newShaHash(\"00000000cb8808d3d3eebd147521dd3c666e321aad94c34cd444d8e05362b71e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 756\",\n\t\t\thash: newShaHash(\"000000009365203a4c6690964b10757bbbf76c3a043c33ac702e9ebdb784f077\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 757\",\n\t\t\thash: newShaHash(\"00000000b6c52d22cffd292ffcd0613a883bb9b5be7d30eb44e27fab77fe548e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 758\",\n\t\t\thash: newShaHash(\"0000000009f7637367857936334651b9e78ef9c67356da405f2e32576141b0ca\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 759\",\n\t\t\thash: newShaHash(\"000000009061c99b9c2aad9820b2b8ba9ecb084769ed2c19d4a99b62b29c34f0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 760\",\n\t\t\thash: newShaHash(\"000000008bde43d6298d5297c1831a926475714936882aef3055d9431939054d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 761\",\n\t\t\thash: newShaHash(\"000000004d0095a63b3f2af221c24381b1aa5afa6cdd068038876b5108e27afe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 762\",\n\t\t\thash: newShaHash(\"000000004ff2c30918fc347d2972a0ebcd956ca8f2b0a17ecbff5f535e5d6396\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 763\",\n\t\t\thash: newShaHash(\"0000000074c1c1f5ac8e123dcb0eee5bb217209e87ae1dd1aea1cded7a9e6ad0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 764\",\n\t\t\thash: newShaHash(\"0000000088fe735b1519dadcd5a3a7789a924b5461c5701bf5ac12c741d41452\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 765\",\n\t\t\thash: newShaHash(\"0000000004919404a7f10b645964e763245988e15b2b371197cfce60085bb2fa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 766\",\n\t\t\thash: newShaHash(\"000000006336bb5907b141a00d94824f50090a25bad0ade968487d41c1a8811e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 767\",\n\t\t\thash: newShaHash(\"000000002a66a7dbbd4ffffdeed77d57109bfcc6e2ab11ec4b2439f69561327b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 768\",\n\t\t\thash: newShaHash(\"00000000e855e3cc104391c019cf5a174c63e705b888bf8430c1fcead6020e14\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 769\",\n\t\t\thash: newShaHash(\"0000000027804d4fd4e973387e9e6bb897bbf11737f1062b04745d2ac10f289b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 770\",\n\t\t\thash: newShaHash(\"000000000da6ba9642b68bff26b6cbca3ab2c1db0606a122a0f3df76e226b64f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 771\",\n\t\t\thash: newShaHash(\"000000002dc4a01bce235d68d8f396ec66126e292b141ae76d4d1a1ff25a948e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 772\",\n\t\t\thash: newShaHash(\"0000000066afe57d862d62bbb61e0881574cf276758f5a288ef6b9b1e1d22242\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 773\",\n\t\t\thash: newShaHash(\"0000000097a408816f31765d5a1aebf5e4333719be7c0b986ca7f19555b2ad1b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 774\",\n\t\t\thash: newShaHash(\"00000000bb9606dc3907b6915f1f10bbf248443c779c61a31f036217394d9525\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 775\",\n\t\t\thash: newShaHash(\"00000000a570762833438538af0f125c9112ab51c81cfbd8b593cd86b8097141\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 776\",\n\t\t\thash: newShaHash(\"000000002a415b8c1b0ef219c1627e314e7c592c24586aa47b22b88fec3744b9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 777\",\n\t\t\thash: newShaHash(\"000000004a9ff57280d2145e204c99f0c1eee6ae45bfd7cdd15feab8bf8e42aa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 778\",\n\t\t\thash: newShaHash(\"00000000c6dbc1e919fde57e306a37f109de9026bac892c00734098ebb070b9e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 779\",\n\t\t\thash: newShaHash(\"00000000344fe97ea1e647cc62fa34aa90021b739845b07840d2113d60c3e538\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 780\",\n\t\t\thash: newShaHash(\"00000000fe978446c2faacf8b36f56b7279f3ea239e4e902919d37d331fcb0b6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 781\",\n\t\t\thash: newShaHash(\"00000000273ed4a8fedd28e961839d3627a2e9c63df1599cadae2495eb74205d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 782\",\n\t\t\thash: newShaHash(\"0000000001ff77e09a703ddb08cbe8727fa179c8753655c9781dc7f39e4ac253\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 783\",\n\t\t\thash: newShaHash(\"00000000ffa3babad7cfe0099db6940f6c9bfcef7e083c304a9d6ab38289ac59\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 784\",\n\t\t\thash: newShaHash(\"000000007ab54d7ce4a0b13b00ce4ca814a54001938b425ff61003922f910c23\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 785\",\n\t\t\thash: newShaHash(\"000000001ff304f7168119db43dbf9d36a5cea636db9a17e243831e9b6d45ac1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 786\",\n\t\t\thash: newShaHash(\"000000007201adaf9c520dbcfd5b1950c1cd15513643dcb204d88e3f0bab65a2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 787\",\n\t\t\thash: newShaHash(\"000000002f0fb5ccd7ce159d494d967b8eeeb39f21d2ad997a5c26ddba1cca04\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 788\",\n\t\t\thash: newShaHash(\"000000006fae7a9ceb7f8b5b8abf4cc1edce0c2bff95e233a9aa9ffcc5c2da44\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 789\",\n\t\t\thash: newShaHash(\"00000000912fde4210d44530601b9da9696235730131aecdc7f109f45142ddc0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 790\",\n\t\t\thash: newShaHash(\"00000000c910beb1f90dd0daa3f3085550746bfa3085cd6f1eb54e4cad8d6e66\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 791\",\n\t\t\thash: newShaHash(\"000000007b26d2c7f5524c17d4483c50c371e5e6c1faa8ebb6f8e2efc9ce873f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 792\",\n\t\t\thash: newShaHash(\"00000000bc5d45be16b9a7beabe17e8437e0567cfd7c89369762c039e35b59a2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 793\",\n\t\t\thash: newShaHash(\"0000000000d24342cd82d50e969b74a219c4c4e95b72f721f138a55901b30bc2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 794\",\n\t\t\thash: newShaHash(\"000000007b48105c8f0c2197c3081cee306ab4ff9a021c814559a5a65bb81f51\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 795\",\n\t\t\thash: newShaHash(\"00000000422ba67e344ef36811d24fb677572c83aa7e46a6ac92bc14a9e6040b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 796\",\n\t\t\thash: newShaHash(\"00000000959f945eae4dd266018dfe6a91bebaed5cbefec9d58447a504e5ea33\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 797\",\n\t\t\thash: newShaHash(\"00000000c74c211a7c6595e5e8ee404f8358ee194c8c8a92526ba2efe8f6b782\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 798\",\n\t\t\thash: newShaHash(\"00000000a8c97660f11a4c7b244dec785016e755406d91605667cd6152bc6fd6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 799\",\n\t\t\thash: newShaHash(\"00000000cf73e44da64f2053e9309f84c528a6c217e06c66a6b2f9f83550951d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 800\",\n\t\t\thash: newShaHash(\"0000000023ad173d137b00d054f2cd1da15f66e731fdd72b3ea659be662004bd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 801\",\n\t\t\thash: newShaHash(\"0000000078bb14d64895e512db278992301b913b4f0f584d825ded43d300882b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 802\",\n\t\t\thash: newShaHash(\"000000002e19e65d051ff0d854f718f1d8566693e50ecfb492d5a8ede7985a80\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 803\",\n\t\t\thash: newShaHash(\"00000000506fc59337242ea10c7406f2acaf9ae2634aa8a598ecd89554cbb736\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 804\",\n\t\t\thash: newShaHash(\"00000000ace2ffcf32392787103a8c5312e896d0900ff9d8b775a9b56c3cf7e1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 805\",\n\t\t\thash: newShaHash(\"00000000956c0543c22f374d5b71567ccca4973bc64ca94cb0639ff3408d4f6f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 806\",\n\t\t\thash: newShaHash(\"00000000b1a599caf45e007349a0e390aa5269e2e3d780480d7ec6a4c159df49\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 807\",\n\t\t\thash: newShaHash(\"00000000f6b13b35cb497108fc93fcba75484ee262f2a3e0d74922fbe6213b33\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 808\",\n\t\t\thash: newShaHash(\"00000000cb5a18b046f18878d39bdfa55bf82252b95b68c608d75ffebecb428b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 809\",\n\t\t\thash: newShaHash(\"000000000297afc219a82ad678b7eeef0daf41d175e3b763ef4edd1ce167c4e0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 810\",\n\t\t\thash: newShaHash(\"000000007976dcf8aeabb817465178d5e55b55c6f1bebfac4de3bc316736e0d8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 811\",\n\t\t\thash: newShaHash(\"000000001eb529d514f39ee13ea7588a75b7ccf4a030079ae7c575ee004e54c7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 812\",\n\t\t\thash: newShaHash(\"00000000601c3d5d22dc78039a96c953f616fc85daf83d88236786745392e8de\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 813\",\n\t\t\thash: newShaHash(\"00000000014ed8bd9753c7c5726eadb6d0fdfb36907bfa512f245c95e459890b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 814\",\n\t\t\thash: newShaHash(\"00000000e41524e4867654ee372c90cf2effed44c886354fe4565bb388096662\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 815\",\n\t\t\thash: newShaHash(\"000000002a0dd4c75cf9102578d61aa91f270908e68f1617604b661c4febaafe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 816\",\n\t\t\thash: newShaHash(\"00000000d1e1512bcdcaf9471c6cd78a3e2441cf85b1ba8a86cb9fb22532971b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 817\",\n\t\t\thash: newShaHash(\"0000000037acf3d2c18feadc7a4adced66d0abaa55cb1a35e228d89de4b391b1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 818\",\n\t\t\thash: newShaHash(\"00000000dde2dacaae6180f0796fb4978855d7f13a3bf4ed2008167a466fea6c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 819\",\n\t\t\thash: newShaHash(\"00000000dcc76096ad38eb922364d5b6395df05dc1f69eeb3b9abc5e8257c538\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 820\",\n\t\t\thash: newShaHash(\"00000000fa15fd28acb1d4971813cdd72a0c01712f09b6f496148dc6715a7e55\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 821\",\n\t\t\thash: newShaHash(\"0000000056bef0349612727d3b7a12e46f585ca5542f21953c91a2961de4ccad\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 822\",\n\t\t\thash: newShaHash(\"0000000004a3b2bbb5d2744151865ca38952941a0abe4183f3d6096de267ca5e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 823\",\n\t\t\thash: newShaHash(\"000000003dada7d6af0cbca9157eeb191765eac2612d7893bd8731ed340b5289\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 824\",\n\t\t\thash: newShaHash(\"00000000011c26ce34ca3f4cb65fd971bc129d1de10a9accf90e5e7edca365ea\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 825\",\n\t\t\thash: newShaHash(\"00000000f4f93a4668dcfee82c45cbdbd0e6acfe6a38f5c34b465e5668c59bd1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 826\",\n\t\t\thash: newShaHash(\"00000000b895f10a75cf408e41107aac08531ba133bd4208a364686909da2010\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 827\",\n\t\t\thash: newShaHash(\"000000004dbc0256d929155c2d67896d2e21f18ab60d274e7613db2c0102fd61\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 828\",\n\t\t\thash: newShaHash(\"00000000f3c5fa9cda65c0bf92df199712a76b841f7bbd717fca52f3cd667eaa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 829\",\n\t\t\thash: newShaHash(\"00000000324f4212b5257021fe0f002ca9f329f391fecb2bc1e0cb05da21f300\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 830\",\n\t\t\thash: newShaHash(\"0000000013a08e4c1d7bf0ec10aa5f243dad6032c46e15eb2e17af32b629ff2a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 831\",\n\t\t\thash: newShaHash(\"0000000087be31141ddb8f36d85bbfed758125f00119428e8359ac6644f46127\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 832\",\n\t\t\thash: newShaHash(\"000000008547bbe22af13ec99ded3bf40c616d9c5a77b08ad139c4a6e6ed7b01\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 833\",\n\t\t\thash: newShaHash(\"0000000071cdcb38653f125be4a8e4287e32e6699e61c37b9c3635a69b021b7f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 834\",\n\t\t\thash: newShaHash(\"00000000a8b5b9411bb82d35ce15055a9b7090d88e208be1a3617ea81ce32e57\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 835\",\n\t\t\thash: newShaHash(\"00000000fcce29416f1806d58175ab8d9ddedf217f0afc54e8a07262882a1b60\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 836\",\n\t\t\thash: newShaHash(\"000000006ae453f848fb3a1f115f64f8a8ecf11c1fd27b7d64f8aaca4a5dfc5e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 837\",\n\t\t\thash: newShaHash(\"0000000097623a88e5051fedb9618db190ad7c2301956017c1846307fb7b2c67\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 838\",\n\t\t\thash: newShaHash(\"00000000ba8567d34475fd1540428940b8aeb140d15dcaa05a70399ea1e66b9f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 839\",\n\t\t\thash: newShaHash(\"00000000007d380810b53f24088d519b3f4e35a3ac6dd88b709215066fa7921a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 840\",\n\t\t\thash: newShaHash(\"000000007ffc7286785a828706a3bc46bbad667e6b2700eb777e744d57a94a94\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 841\",\n\t\t\thash: newShaHash(\"00000000b15c5f42c02cbf5f2aea5080defc7de4f37ed2b368e9e0360ae74f1f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 842\",\n\t\t\thash: newShaHash(\"0000000044cebc9d4d62e8a9792d895fab0da1d06979b4e293b63abda08853ed\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 843\",\n\t\t\thash: newShaHash(\"00000000f079d1f9ef5ea5ffeac055d237239a567c4da2c6107d7ce58d707f98\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 844\",\n\t\t\thash: newShaHash(\"00000000d558da6bf38e5124b6b5485f05929b0f103bd28f4290847c3f4649ab\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 845\",\n\t\t\thash: newShaHash(\"00000000f0fd525d821c1e6c6d32ad0f9cf8b503dd1d473e743a49a2e3a94965\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 846\",\n\t\t\thash: newShaHash(\"00000000fd1182321d123c0f8482dcf399aedce1f64e3aa6f81d6af48b60be57\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 847\",\n\t\t\thash: newShaHash(\"0000000065ce790a9a6cc7bc9d661fbe99a52342b9d6a3358a8c69b7b65a26c4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 848\",\n\t\t\thash: newShaHash(\"00000000e31225b32d618675f2ced11297cee159f1e0c5684bc4d40d560e96dd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 849\",\n\t\t\thash: newShaHash(\"0000000074d78f8366862d2db09f1f072d6d889552b83ccbc9db8ee211b8e3ff\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 850\",\n\t\t\thash: newShaHash(\"00000000b4dfdef1ff759fb37ac263a418c4670362064855649f70a3c0468815\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 851\",\n\t\t\thash: newShaHash(\"00000000348af56961a07ef705b9058e596b9a8d68cd94d9f4ff2989edbc5f69\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 852\",\n\t\t\thash: newShaHash(\"00000000bd60b1e768c09de18befd8d23ea022800cd6549a3827efce7e8c0df3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 853\",\n\t\t\thash: newShaHash(\"000000006a4151bd2a7a95b0df5a934990a3d0af34df6c785c2fd4f0c0440940\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 854\",\n\t\t\thash: newShaHash(\"00000000a9551c8d52927045404732b56bb4e71fb4bdaf0ee29214373b6899ca\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 855\",\n\t\t\thash: newShaHash(\"00000000968f880fa926db9ebeb3ba86ac363f2edbc132df46b615cf10c26af7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 856\",\n\t\t\thash: newShaHash(\"00000000bc980cb36fcfa2f79094d8b864f4074bed22af711643033397a725f7\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 857\",\n\t\t\thash: newShaHash(\"000000002ff348e9f25dde802295dfcdbdade05234f75f1c8d54ce209c8b3e97\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 858\",\n\t\t\thash: newShaHash(\"00000000aeb54247b6b364c716207926bf94cd80406e401e86ee70034d5c83f6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 859\",\n\t\t\thash: newShaHash(\"00000000708ffeb71a3616fe88c981120d98209e87bfe7e6d8cd620bec321a4e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 860\",\n\t\t\thash: newShaHash(\"00000000d7b875735df59844562be3a1861e86079243e3d5d12e2ff20a61474f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 861\",\n\t\t\thash: newShaHash(\"00000000c7eb9340a7d31ec86a4638a204fd1d878732c16db7f50528b34186d1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 862\",\n\t\t\thash: newShaHash(\"00000000f2a8ab0be833f38e01bcecd235c256767a8183fdbd92e66f4bf82b5d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 863\",\n\t\t\thash: newShaHash(\"00000000b7d03eb869d07be26a388381696ef7132ede12a14d76c8c0f7fdc4aa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 864\",\n\t\t\thash: newShaHash(\"000000002f9abd9ee4a7fe7b6e68152b4cf494d8c984aaf7b317607e056d6561\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 865\",\n\t\t\thash: newShaHash(\"00000000359b2a53a76740ee82df9858e23ddc3f6a121aeb0c2b1d4e1b0374f3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 866\",\n\t\t\thash: newShaHash(\"00000000993dea68d850b4e42fb769dfdf1fd241c30f18a407d1adad71b75c4f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 867\",\n\t\t\thash: newShaHash(\"00000000166151360d10ce10846a66a5c6ecb10c302b87288e4840990550d4ac\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 868\",\n\t\t\thash: newShaHash(\"000000004bf07350e7300b157a95bd92490b1fbef9a5cb28d6709b49d5c0eec0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 869\",\n\t\t\thash: newShaHash(\"0000000036aee0420025b9fe3cace63d46b1c3b1bd7e25938c80cafeff121c2b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 870\",\n\t\t\thash: newShaHash(\"000000002dbee7d4f7b41cfada7bd193e82a8c898c1f2bd01bce12e971c7b129\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 871\",\n\t\t\thash: newShaHash(\"000000000b14d30e12d5991ea20843b2d4451bf8670c77cf87e9aabc219d11c0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 872\",\n\t\t\thash: newShaHash(\"000000002884370582c1b700062e8f962a3f7fabdd60ecf02e9a3f6d1967e52e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 873\",\n\t\t\thash: newShaHash(\"000000004061f0da39132a84347d27d67da3ec62e95a67ddc747cd0be5d65606\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 874\",\n\t\t\thash: newShaHash(\"00000000a20025cc1540cb60f53067b41eeef1b4c52491c9634e2b201130f28c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 875\",\n\t\t\thash: newShaHash(\"00000000956c3ebbf4217c3243d5006a8c43786dcae8319408fbd55288d90da6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 876\",\n\t\t\thash: newShaHash(\"0000000083de312005ad73cb7186122d9ca2b50db664eeb6ed985d4c0559adb1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 877\",\n\t\t\thash: newShaHash(\"00000000927a42c274685388e2d7eef3da11e02e5b5791d28be9f77793e57d62\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 878\",\n\t\t\thash: newShaHash(\"00000000bc98e173504faa034ed832ae31e0264feae9a46520f3b8b7bcd29656\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 879\",\n\t\t\thash: newShaHash(\"000000001acbc7b552882673f72ef5a9c1f2a627d63bbe579eaca677604a0340\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 880\",\n\t\t\thash: newShaHash(\"000000008d48b080edee537be9849e5a3205a5aa6b1b68b35abd5182569dd6eb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 881\",\n\t\t\thash: newShaHash(\"00000000aace448535640d2169a9e977211b5a0106e9419531a3cb89c2b28e4f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 882\",\n\t\t\thash: newShaHash(\"0000000038600a35c7bb6309da8fb22b615b41589c958efefa65054f87c02eae\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 883\",\n\t\t\thash: newShaHash(\"0000000066f1ab1b0c2f66061d18f560add4b92c403d2804ba936b1474808f34\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 884\",\n\t\t\thash: newShaHash(\"0000000095379ffdd5b11f46ceedcd6e4a3857ab7efa176fed3cdde14d75bc28\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 885\",\n\t\t\thash: newShaHash(\"0000000066cbe9a0f3e80a8873c41a6a8ade44453ce3e8a7861a3d96d5d46116\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 886\",\n\t\t\thash: newShaHash(\"0000000089524363ffb0def24ca0ed3a7e82d6c91feb22f591a6844cb007011e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 887\",\n\t\t\thash: newShaHash(\"000000001bd64fc46b0fe4877e90cc12e6acbf32d378aee1b1ef31f086507d35\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 888\",\n\t\t\thash: newShaHash(\"000000000a193f641d0b3240634652ba393a41a45b67954f2975848121f3dffd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 889\",\n\t\t\thash: newShaHash(\"0000000011b5ad3e213d1306b42988a496f94db72dda08c23944e355f659827f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 890\",\n\t\t\thash: newShaHash(\"00000000a382118b9329e33515f376c9dec3b764ec4e5bfde76fdba85eb2edb0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 891\",\n\t\t\thash: newShaHash(\"000000000a36c22b00693ae2e12f7ac5b30b6522a7bbb1fd74f5daac50915f42\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 892\",\n\t\t\thash: newShaHash(\"00000000132ff67d848fc0150971f01d9082e115b2b35cee76ea609c2359d064\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 893\",\n\t\t\thash: newShaHash(\"00000000987117a2068df21a22692b46b45f4849bcda8ff8256804d3eda77737\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 894\",\n\t\t\thash: newShaHash(\"000000009428a46cdc6259f3e1303dab90b849e1be88bcd20258c2325b5d33b6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 895\",\n\t\t\thash: newShaHash(\"00000000ac62d49ccbdb76ec0723c0a4ed799603d671331e2e45eee7dfc0a62b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 896\",\n\t\t\thash: newShaHash(\"000000003677c5188bf14c9b421544ec3d42555dea43d6907cb99b456951ebc0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 897\",\n\t\t\thash: newShaHash(\"000000002e0a2167fef257c17757e372b5ebbc6627aee3aa607db4f26b6e7063\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 898\",\n\t\t\thash: newShaHash(\"0000000063d4b4c9fd3de50584a4f96451da040a11708a298ec7f4f76f5c826b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 899\",\n\t\t\thash: newShaHash(\"0000000039cf80b2f4d03578aaccf1ff6bc0da39dcbd5df9a8160384da943082\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 900\",\n\t\t\thash: newShaHash(\"00000000ae466009e0841623d5be369fb1770be8baccc41efcc753f340c6e41b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 901\",\n\t\t\thash: newShaHash(\"0000000028be0b4eda042b0fd368f1110eb23e2be3d2ddd5d4c2e8762f794295\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 902\",\n\t\t\thash: newShaHash(\"00000000ad0596458645a7d273fe4b0489219b0e20d3f642a0aa2f42c41677d3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 903\",\n\t\t\thash: newShaHash(\"000000007531f36f90af2ddeaf1c365e70c08c4d5e2f6027101a9ceb93e2524b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 904\",\n\t\t\thash: newShaHash(\"000000001bc7e8675752054e0c64674f720d925130bcce5b2e68e0873567cc20\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 905\",\n\t\t\thash: newShaHash(\"0000000083b7e2020e0f73e701f430945652bc39675255da93b0203e3244b0a1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 906\",\n\t\t\thash: newShaHash(\"00000000799d1b45e155b0606e01798b1d33729952fac1f639fed0e050b83cfb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 907\",\n\t\t\thash: newShaHash(\"0000000087d4fde530c36d2ab9409d950e0b980389def5aa2365180282bb32ea\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 908\",\n\t\t\thash: newShaHash(\"0000000032c58b2b48ce6e7dfe84e814178af01d51cc73bae77aafdc825ce5f6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 909\",\n\t\t\thash: newShaHash(\"000000001cd3809551d5ff03913c810af617a5c6a7da7827f2e1dd21139b62fc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 910\",\n\t\t\thash: newShaHash(\"0000000061e197e874c78c6eba9a82a8054fba5d049ce08e4a51a68f6fa52a3b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 911\",\n\t\t\thash: newShaHash(\"00000000105e8fb68442d8e27256bb4efbbe3714360e1ebb02feae538e7ee933\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 912\",\n\t\t\thash: newShaHash(\"000000003004e495307d6f7693f738459c48c18c662d79be210f7fd4642e8a82\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 913\",\n\t\t\thash: newShaHash(\"000000005a49ca85851724021d0bd81ab49f494da39472ffbc07a633d23282e2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 914\",\n\t\t\thash: newShaHash(\"000000001d5a9f518cfa208f7d0809e66d87c888433d1e98bc8b561176db9ede\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 915\",\n\t\t\thash: newShaHash(\"00000000061480fc9832ca568024e8e27c489c47f737c9d637d0595d3140cdd6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 916\",\n\t\t\thash: newShaHash(\"00000000059a8dcc6337a9cb9cde21e4bfe0faf138f4d0776a350f5e37e985a9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 917\",\n\t\t\thash: newShaHash(\"000000003c1006da3b9c12a3538c455220453190d15857695076140d4b56b836\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 918\",\n\t\t\thash: newShaHash(\"0000000043b05d1b39fbdfa1eaf9a4f24f87bcc7313f02e98dc435a1e6733655\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 919\",\n\t\t\thash: newShaHash(\"00000000b6a5022ccd522e5938ab6a69d6ef926829865d06206eb683861e74fe\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 920\",\n\t\t\thash: newShaHash(\"000000004281c639383edbcdea7f170c9127dcc3bf094f249c90dab3c3b43163\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 921\",\n\t\t\thash: newShaHash(\"000000002c29cd6dba596e37f7156dbd791a3eba7968a951fb5997b2a8d86855\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 922\",\n\t\t\thash: newShaHash(\"00000000220c9218956369136a7545adc6f2b3655e2dd1da3eed9e10737786f2\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 923\",\n\t\t\thash: newShaHash(\"0000000020f7b873a2d79183a1dd6bc4d77b26710a74d027cd5e9e2bf6f687c1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 924\",\n\t\t\thash: newShaHash(\"00000000c10d300c39cafef74fb88108dca525c8bc3eb7a83600d2fad0079b12\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 925\",\n\t\t\thash: newShaHash(\"0000000087dc6008e2ad3f484fbca61aae1762a820eea8dc971d58ae49c9a88f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 926\",\n\t\t\thash: newShaHash(\"000000004472ee15f60fcbbfee85c205b8a584306caac43fe1e45eb1917fc8b9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 927\",\n\t\t\thash: newShaHash(\"0000000007f11df70fba48dbadfe8c1c911bef3f989d7ec9866794161b8363ec\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 928\",\n\t\t\thash: newShaHash(\"000000000a5b25c8f0fa1635e054361ab6a00187834bafebcfe5c081c96c3809\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 929\",\n\t\t\thash: newShaHash(\"000000005df75206b90225e5361b4cf0da2571f707e88519610ee7772044577b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 930\",\n\t\t\thash: newShaHash(\"00000000a5c5191e83b0746f1af472ee4bdac75d683dfc1f776f27f31e3f95dc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 931\",\n\t\t\thash: newShaHash(\"000000005def3d90828cbdc583eb37f006d2f2654130b2abd3a24c2570537029\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 932\",\n\t\t\thash: newShaHash(\"0000000034ee0e57dac165780f79d63cb9a255bc45819ed5aa325bd2cf9214a6\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 933\",\n\t\t\thash: newShaHash(\"000000002d9eb7d8d82cea124f32deba82bfcbcea750ba099b1b16a2bdf7e2a0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 934\",\n\t\t\thash: newShaHash(\"000000002e0f67f4ea18b74353e4214f473181f0c3a0a29339eda8d226bf632e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 935\",\n\t\t\thash: newShaHash(\"000000006a397656f169d0629892a5c6f19cd6dc45afed17b9d1223056f71acd\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 936\",\n\t\t\thash: newShaHash(\"000000008308770406d21a2b0f03b2dadd1db33f55ee749aedbf529157140479\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 937\",\n\t\t\thash: newShaHash(\"00000000844150d9201554a8a1feaae2daae88980ad7b4a23d3b1a3daebe4c9e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 938\",\n\t\t\thash: newShaHash(\"00000000198d5c4e6ce69e30b5fd0564e5e47479e5f92eb80197a43049dc3fdc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 939\",\n\t\t\thash: newShaHash(\"000000003bea44f4102d0a0332255ca3ed8a1ae78b752ba01ca7d77deecc7ba3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 940\",\n\t\t\thash: newShaHash(\"00000000283685a25a9059b13ab13c5843ce02e6b34a2fff7f488ee505ee98f5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 941\",\n\t\t\thash: newShaHash(\"00000000173ca0ab2de46855e0321431c6ad1e78a92e990febef7a84a12b185d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 942\",\n\t\t\thash: newShaHash(\"000000005aaa838d702e62c82e82167bb643ec13213d3b1e15413ecfb830a9d9\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 943\",\n\t\t\thash: newShaHash(\"0000000036a8b9bd0509b8877c090155ec82636c7e75e4aef68ff64fe72dd760\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 944\",\n\t\t\thash: newShaHash(\"000000006b769503ac4904996e3960a732b2dabb0257685a79bf08d98d33ba8b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 945\",\n\t\t\thash: newShaHash(\"00000000b6f2f710c30a8cc515e72d587c0ba895ae86c97e5de226ce094bb686\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 946\",\n\t\t\thash: newShaHash(\"000000000272c141780ded91bb8565f482d7162e438ba5200903b2c5ac686e71\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 947\",\n\t\t\thash: newShaHash(\"000000005f65d84628c3b175021a120904f0b0a4551086b04da67bb3586a49ca\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 948\",\n\t\t\thash: newShaHash(\"000000001c349ba1cd95e1d4caa0d9b0a6d4656c5c431baec3a1469989420be3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 949\",\n\t\t\thash: newShaHash(\"000000009445c1a9212e76d7debf6422f7b7d8a2cd1e91ca732e6f5636cdf036\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 950\",\n\t\t\thash: newShaHash(\"00000000300e9fbb88d1c2a5a10d4c2fee531a0cbd3eef91f79cfa2849aee1b4\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 951\",\n\t\t\thash: newShaHash(\"000000004ee9124ef1ba479ff575bb9234305ecb99e5e3a3336fb19e9ba80d2a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 952\",\n\t\t\thash: newShaHash(\"0000000082d3ece955d3716d97cd6800ca0e02436c8f5f31a57591ae7f599792\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 953\",\n\t\t\thash: newShaHash(\"0000000033d9571407c7bdfa3dda6214c4281740520b2dcc153cd41023ea9719\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 954\",\n\t\t\thash: newShaHash(\"000000005b24858726ab9919e11661365d4469e0770bf4f0a759c2273c026dc8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 955\",\n\t\t\thash: newShaHash(\"000000000ae7361083268b88addea52dc17576c87724660d9dc6a0ede4399b7e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 956\",\n\t\t\thash: newShaHash(\"000000007cfc373ef7f438e72eafd53bea00c305091a9b89315fac89e8606588\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 957\",\n\t\t\thash: newShaHash(\"000000006fd0bde51de3aa582777c3ac62f6b6db8dd6788958afb6274d10543b\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 958\",\n\t\t\thash: newShaHash(\"00000000a5c652e5c5b2e194febd384e7661455e1bc8209c48c2a5c62de9ddab\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 959\",\n\t\t\thash: newShaHash(\"0000000005a210dc0d4a165c5a6973c2037dd21bdff0f8ecf37f3ff413bd35e3\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 960\",\n\t\t\thash: newShaHash(\"000000007b90b0cb4ebee7c8818cecab472a6cc237638bafed13d4ed1f319f78\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 961\",\n\t\t\thash: newShaHash(\"00000000a0d4abf8a9e01f339bbaad3a0627eeb63e63008eb0220a3f7a027dfa\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 962\",\n\t\t\thash: newShaHash(\"000000009b6301e39e2aaf89f066005737711c70259d55d550dbf68efbe20619\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 963\",\n\t\t\thash: newShaHash(\"00000000510feab6f8059e31977977420107e247b665b8bd454dd3ff71d9b8da\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 964\",\n\t\t\thash: newShaHash(\"0000000041762f447144ed17539a153a59db65ef13e35804d4eebef1d7bbfe6e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 965\",\n\t\t\thash: newShaHash(\"00000000777ab067c5d2dd8c82db1bd70983aa38ab243233f74748ead7078923\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 966\",\n\t\t\thash: newShaHash(\"0000000029ed440116a4392b737e8d80abbb13ff5078f1e165d9659e270ac893\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 967\",\n\t\t\thash: newShaHash(\"000000008bb4144f9c9e2937ad9c655b3f4a3f6d8742949d614e5dbdbf0e0633\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 968\",\n\t\t\thash: newShaHash(\"0000000008edce6fabb1bc5847c8a440bd379fe6ebed83dc45fb0b3042130c3a\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 969\",\n\t\t\thash: newShaHash(\"00000000b6949a410c1c5f7d94a38f7cc8a7371024a2ee005105b92d619c44a0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 970\",\n\t\t\thash: newShaHash(\"0000000073e43151164c0d502f5d1006c95f947a14658f50f79bf47492d221be\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 971\",\n\t\t\thash: newShaHash(\"000000003abbbcef95040e77568bc67647960bbb711ba7eaaad0c7e8a4bff7dc\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 972\",\n\t\t\thash: newShaHash(\"000000006071622651886bc6acdb36473a2b8bba3595480a0c47b68fb2a78c7e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 973\",\n\t\t\thash: newShaHash(\"00000000767191fbbcc4f541509926f34624d3bf1b312266cea864c95334e8d5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 974\",\n\t\t\thash: newShaHash(\"0000000045c72c5708938b366b31331a744adf08c0d89ea169a1603f267a8c99\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 975\",\n\t\t\thash: newShaHash(\"00000000b52e0580695d24ca2a38ee9020e64f2ee8fc15126bb9b9d1afda0c2e\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 976\",\n\t\t\thash: newShaHash(\"00000000612b46dc93f393d06f39b7cbc78a26c8ac9e7c59da72ca788af336ad\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 977\",\n\t\t\thash: newShaHash(\"000000009d6eda3209bde38f3b8de9a3f590fe3d3502f1de6475218354704d66\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 978\",\n\t\t\thash: newShaHash(\"00000000821247628ae980fe5dc7a077b01de66a19acef7417f3fef3a00fc476\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 979\",\n\t\t\thash: newShaHash(\"0000000091e83949c20939889493b68f58b939a89eddd5efbfc5ea10aafb9bb0\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 980\",\n\t\t\thash: newShaHash(\"000000009fe79d2edf8b999c115813778a9d4ec07fd85e8e1e0cdcb8bd5c9c64\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 981\",\n\t\t\thash: newShaHash(\"000000008a89d37e1f22af34287df3077d9386d6e264f33762db1a440755a0ba\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 982\",\n\t\t\thash: newShaHash(\"00000000399a8f307d40000c4d297f93bf9852b0fc69b7737549640493c0c064\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 983\",\n\t\t\thash: newShaHash(\"000000001e4ce7fd0664b37c6afa3c760c2b1c25956c13057154e62df5bf55c5\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 984\",\n\t\t\thash: newShaHash(\"00000000177be827305d4975c82876ffa4d0e208833e3544d7bfaaccafcc6147\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 985\",\n\t\t\thash: newShaHash(\"000000000dd0ebc9bf951c8a18b52ff4916fd68d2f877edd771e5a7d087b37eb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 986\",\n\t\t\thash: newShaHash(\"0000000032235fe2c1c8cb0688e865dd898baf2a46b68e937af91a744580b2f8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 987\",\n\t\t\thash: newShaHash(\"00000000333747ea44ce9ca4fe071ebcd07e57ad83d9b53325be9a181d5aac5d\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 988\",\n\t\t\thash: newShaHash(\"00000000694ebef6852dbbc1be348a2d821dea0756af7a079a8e198f4a534a90\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 989\",\n\t\t\thash: newShaHash(\"0000000076ac4b3cb2121030c79f6ec1dda1436cc8ce267020d289a2d943b4bb\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 990\",\n\t\t\thash: newShaHash(\"00000000c1021a293f727a35252dd3e9b439a43e5dd959880b17042c54924608\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 991\",\n\t\t\thash: newShaHash(\"000000005f6f344200e1bd892892bc2f44349cd31fa7362a63e3a93be640168c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 992\",\n\t\t\thash: newShaHash(\"000000001b12216b8e73a744165fcd9ec6287f0fea15ce9e9422643f58336b00\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 993\",\n\t\t\thash: newShaHash(\"000000004f4974f76696e670e2271516c74fcba3381c42d98a2bd822ee5541d8\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 994\",\n\t\t\thash: newShaHash(\"00000000367c851c05d96c30ade6dc5b0d327ef5be5cac29d7b1da8bb4b3d03f\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 995\",\n\t\t\thash: newShaHash(\"00000000867be75aedca090d71891784597d2ebb5924c9745e2e9d61039eeeb1\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 996\",\n\t\t\thash: newShaHash(\"000000004c5538f180ba55db2e2fbc8cb57df4631c9c85a120b07c303d5f5598\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 997\",\n\t\t\thash: newShaHash(\"00000000640fc7df58d8765dd4f7bf56f3b8284fe868cca6317cfc7a11b8a6ee\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 998\",\n\t\t\thash: newShaHash(\"000000008611261a8052cfe96fd41f92b230bb638a36497e053919136146cc1c\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 999\",\n\t\t\thash: newShaHash(\"00000000642ae51d012fb3119e5d467495a21ef8923cef3fb2d6e50eedd82036\"),\n\t\t},\n\t\t{\n\t\t\tname: \"Block 1000\",\n\t\t\thash: newShaHash(\"00000000b8d8dc9fc16b49901597fb0ae5241a2195f2298c9c929b8f7b8ebe42\"),\n\t\t},\n\t}\n\n\t// Ensure there are enough test vectors to prove the maximum number of\n\t// recent hashes is working properly.\n\tmaxRecentHashes := TstMaxRecentHashes\n\tif len(tests) < maxRecentHashes-1 {\n\t\ttc.t.Errorf(\"Not enough hashes to test max recent hashes - \"+\n\t\t\t\"need %d, have %d\", maxRecentHashes-1, len(tests))\n\t\treturn false\n\t}\n\n\tfor i, test := range tests {\n\t\tblockStamp := BlockStamp{\n\t\t\tHeight: int32(i) + 1,\n\t\t\tHash: *test.hash,\n\t\t}\n\t\tif err := tc.manager.SetSyncedTo(&blockStamp); err != nil {\n\t\t\ttc.t.Errorf(\"SetSyncedTo unexpected err: %v\", err)\n\t\t\treturn false\n\t\t}\n\n\t\t// Ensure the manager now claims it is synced to the block stamp\n\t\t// that was just set.\n\t\tgotBlockStamp := tc.manager.SyncedTo()\n\t\tif gotBlockStamp != blockStamp {\n\t\t\ttc.t.Errorf(\"SyncedTo unexpected block stamp -- got \"+\n\t\t\t\t\"%v, want %v\", gotBlockStamp, blockStamp)\n\t\t\treturn false\n\t\t}\n\n\t\t// Ensure the recent blocks iterator works properly.\n\t\tj := 0\n\t\titer := tc.manager.NewIterateRecentBlocks()\n\t\tfor cont := iter != nil; cont; cont = iter.Prev() {\n\t\t\twantHeight := int32(i) - int32(j) + 1\n\t\t\tvar wantHash *chainhash.Hash\n\t\t\tif wantHeight == 0 {\n\t\t\t\twantHash = chaincfg.TestNetParams.GenesisHash\n\t\t\t} else {\n\t\t\t\twantHash = tests[wantHeight-1].hash\n\t\t\t}\n\n\t\t\tgotBS := iter.BlockStamp()\n\t\t\tif gotBS.Height != wantHeight {\n\t\t\t\ttc.t.Errorf(\"NewIterateRecentBlocks block \"+\n\t\t\t\t\t\"stamp height mismatch -- got %d, \"+\n\t\t\t\t\t\"want %d\", gotBS.Height, wantHeight)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tif gotBS.Hash != *wantHash {\n\t\t\t\ttc.t.Errorf(\"NewIterateRecentBlocks block \"+\n\t\t\t\t\t\"stamp hash mismatch -- got %v, \"+\n\t\t\t\t\t\"want %v\", gotBS.Hash, wantHash)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tj++\n\t\t}\n\n\t\t// Ensure the maximum number of recent hashes works as expected.\n\t\tif i >= maxRecentHashes-1 && j != maxRecentHashes {\n\t\t\ttc.t.Errorf(\"NewIterateRecentBlocks iterated more than \"+\n\t\t\t\t\"the max number of expected blocks -- got %d, \"+\n\t\t\t\t\"want %d\", j, maxRecentHashes)\n\t\t\treturn false\n\t\t}\n\t}\n\n\t// Ensure rollback to block in recent history works as expected.\n\tblockStamp := BlockStamp{\n\t\tHeight: 10,\n\t\tHash: *tests[9].hash,\n\t}\n\tif err := tc.manager.SetSyncedTo(&blockStamp); err != nil {\n\t\ttc.t.Errorf(\"SetSyncedTo unexpected err on rollback to block \"+\n\t\t\t\"in recent history: %v\", err)\n\t\treturn false\n\t}\n\tgotBlockStamp := tc.manager.SyncedTo()\n\tif gotBlockStamp != blockStamp {\n\t\ttc.t.Errorf(\"SyncedTo unexpected block stamp on rollback -- \"+\n\t\t\t\"got %v, want %v\", gotBlockStamp, blockStamp)\n\t\treturn false\n\t}\n\n\t// Ensure syncing to a block that is in the future as compared to the\n\t// current block stamp clears the old recent blocks.\n\tblockStamp = BlockStamp{\n\t\tHeight: 100,\n\t\tHash: *newShaHash(\"000000007bc154e0fa7ea32218a72fe2c1bb9f86cf8c9ebf9a715ed27fdb229a\"),\n\t}\n\tif err := tc.manager.SetSyncedTo(&blockStamp); err != nil {\n\t\ttc.t.Errorf(\"SetSyncedTo unexpected err on future block stamp: \"+\n\t\t\t\"%v\", err)\n\t\treturn false\n\t}\n\tnumRecentBlocks := 0\n\titer := tc.manager.NewIterateRecentBlocks()\n\tfor cont := iter != nil; cont; cont = iter.Prev() {\n\t\tnumRecentBlocks++\n\t}\n\tif numRecentBlocks != 1 {\n\t\ttc.t.Errorf(\"Unexpected number of blocks after future block \"+\n\t\t\t\"stamp -- got %d, want %d\", numRecentBlocks, 1)\n\t\treturn false\n\t}\n\n\t// Rollback to a block that is not in the recent block history and\n\t// ensure it results in only that block.\n\tblockStamp = BlockStamp{\n\t\tHeight: 1,\n\t\tHash: *tests[0].hash,\n\t}\n\tif err := tc.manager.SetSyncedTo(&blockStamp); err != nil {\n\t\ttc.t.Errorf(\"SetSyncedTo unexpected err on rollback to block \"+\n\t\t\t\"not in recent history: %v\", err)\n\t\treturn false\n\t}\n\tgotBlockStamp = tc.manager.SyncedTo()\n\tif gotBlockStamp != blockStamp {\n\t\ttc.t.Errorf(\"SyncedTo unexpected block stamp on rollback to \"+\n\t\t\t\"block not in recent history -- got %v, want %v\",\n\t\t\tgotBlockStamp, blockStamp)\n\t\treturn false\n\t}\n\tnumRecentBlocks = 0\n\titer = tc.manager.NewIterateRecentBlocks()\n\tfor cont := iter != nil; cont; cont = iter.Prev() {\n\t\tnumRecentBlocks++\n\t}\n\tif numRecentBlocks != 1 {\n\t\ttc.t.Errorf(\"Unexpected number of blocks after rollback to \"+\n\t\t\t\"block not in recent history -- got %d, want %d\",\n\t\t\tnumRecentBlocks, 1)\n\t\treturn false\n\t}\n\n\t// Ensure syncing the manager to nil results in the synced to state\n\t// being the earliest block (genesis block in this case).\n\tif err := tc.manager.SetSyncedTo(nil); err != nil {\n\t\ttc.t.Errorf(\"SetSyncedTo unexpected err on nil: %v\", err)\n\t\treturn false\n\t}\n\tblockStamp = BlockStamp{\n\t\tHeight: 0,\n\t\tHash: *chaincfg.TestNetParams.GenesisHash,\n\t}\n\tgotBlockStamp = tc.manager.SyncedTo()\n\tif gotBlockStamp != blockStamp {\n\t\ttc.t.Errorf(\"SyncedTo unexpected block stamp on nil -- \"+\n\t\t\t\"got %v, want %v\", gotBlockStamp, blockStamp)\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" } ]
b7a6b4033776795e4df13e9a91d3f61d
Retrieve controller to get the secret note
[ { "docid": "a5086e329410d9fb36f0d509e10ffdc3", "score": "0.50165886", "text": "func (nc WebApi) Retrieve(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tparams := mux.Vars(r)\n\tnote, err := notesStorage.Pop(params[\"note\"])\n\n\tif nil != err {\n\t\tif \"note does not exist\" == err.Error() {\n\t\t\tw.WriteHeader(http.StatusNotFound)\n\t\t} else {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t}\n\n\t\treply := contracts.ErrorMessage{Status: false, Message: \"An error occurred retrieving your note!\"}\n\t\tjson.NewEncoder(w).Encode(&reply)\n\n\t\treturn\n\t}\n\n\treply := contracts.ContentMessage{Status: true, Content: note.Content}\n\n\tjson.NewEncoder(w).Encode(&reply)\n}", "title": "" } ]
[ { "docid": "74b979825b735a4a1858861d62925135", "score": "0.5923021", "text": "func (bbp *BuildBaronPlugin) getNote(w http.ResponseWriter, r *http.Request) {\n\ttaskId := mux.Vars(r)[\"task_id\"]\n\tn, err := model.NoteForTask(taskId)\n\tif err != nil {\n\t\tutil.WriteJSON(w, http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\tif n == nil {\n\t\tutil.WriteJSON(w, http.StatusOK, \"\")\n\t\treturn\n\t}\n\tutil.WriteJSON(w, http.StatusOK, n)\n}", "title": "" }, { "docid": "6f7e0e15a8d098f7a285d1bbd7fbb84d", "score": "0.5740207", "text": "func Get(ctx *pulumi.Context, key string) string {\n\tv, _ := get(ctx, key, \"GetSecret\", \"Get\")\n\treturn v\n}", "title": "" }, { "docid": "0db7a21ca597b30ba10b630a72bfbdb7", "score": "0.56828046", "text": "func GetSecret() string {\n\treturn secret\n}", "title": "" }, { "docid": "f2b4d77f6e19770056c7d8f9265d9c48", "score": "0.5673419", "text": "func GetNote(ng noteGetter) web.Handler {\n\treturn func(ctx context.Context, req web.Request) (web.Response, error) {\n\t\tnoteID := req.PathParameters[\"id\"]\n\t\tplainPwd := req.Headers[\"password\"]\n\n\t\tnote, err := ng.GetNote(ctx, noteID, plainPwd)\n\t\tif err != nil {\n\t\t\tswitch err {\n\n\t\t\tcase getting.ErrNotFound:\n\t\t\t\treturn web.Response{\n\t\t\t\t\tStatusCode: http.StatusNotFound,\n\t\t\t\t}, fmt.Errorf(\"get note from db: %w\", err)\n\n\t\t\tcase getting.ErrNotAuthorized:\n\t\t\t\treturn web.Response{\n\t\t\t\t\tStatusCode: http.StatusUnauthorized,\n\t\t\t\t}, fmt.Errorf(\"wrong password\")\n\n\t\t\tdefault:\n\t\t\t\treturn web.InternalServerError(), fmt.Errorf(\"get note from db: %w\", err)\n\t\t\t}\n\t\t}\n\n\t\tresp, err := getNoteResponse(note, err)\n\t\tif err != nil {\n\t\t\treturn web.InternalServerError(), fmt.Errorf(\"create response: %w\", err)\n\t\t}\n\n\t\treturn resp, nil\n\t}\n}", "title": "" }, { "docid": "812a208aaf910a6a4aeeefe1195f07dd", "score": "0.56209624", "text": "func (r *PhDeploymentReconciler) getSecret(ctx context.Context, secretKey client.ObjectKey) (*corev1.Secret, error) {\n\tsecret := &corev1.Secret{}\n\tif err := r.Client.Get(ctx, secretKey, secret); err != nil {\n\t\treturn nil, err\n\t}\n\treturn secret, nil\n}", "title": "" }, { "docid": "272af12ba0dbc9524ae3aec39e8c52c3", "score": "0.5600114", "text": "func getSecretHandler(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tsecretHash := vars[\"hash\"]\n\n\tvar sec models.Secret\n\tsec.Hash = secretHash\n\n\terr := sec.GetSecret()\n\n\tif err != nil {\n\t\tresp := utils.ErrorResponseObject{\n\t\t\tStatus: http.StatusNotFound,\n\t\t\tError: err.Error(),\n\t\t}\n\n\t\tutils.RequestResponder(w, r, http.StatusNotFound, resp)\n\t\treturn\n\t}\n\n\t// Decrypt the secret message with secret hash\n\tsecretText, err := utils.Decrypt([]byte(sec.SecretText), []byte(secretHash[:32]))\n\n\tif err != nil {\n\t\tlog.Print(\"Couldn't decrypt text \", err)\n\t\tresp := utils.ErrorResponseObject{\n\t\t\tStatus: http.StatusNotFound,\n\t\t\tError: err.Error(),\n\t\t}\n\n\t\tutils.RequestResponder(w, r, http.StatusNotFound, resp)\n\t\treturn\n\t}\n\n\tsec.SecretText = string(secretText)\n\n\t// Create an expired error response\n\texpiredResp := utils.ErrorResponseObject{\n\t\tStatus: http.StatusNotFound,\n\t\tError: \"Expired secret!\",\n\t}\n\tnow := time.Now().Unix()\n\n\tif sec.RemainingViews <= 0 {\n\t\tutils.RequestResponder(w, r, http.StatusNotFound, expiredResp)\n\t\treturn\n\t} else if now-sec.ExpiresAt >= 0 && sec.ExpiresAt != sec.CreatedAt {\n\t\tutils.RequestResponder(w, r, http.StatusNotFound, expiredResp)\n\t\treturn\n\t}\n\tutils.RequestResponder(w, r, http.StatusOK, sec)\n}", "title": "" }, { "docid": "4dcb0afa5c8e4ca8ac289d6e8194501c", "score": "0.5593447", "text": "func (_LegacyReputationToken *LegacyReputationTokenCaller) GetController(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _LegacyReputationToken.contract.Call(opts, out, \"getController\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "186e1625b69d8214091b514ec74b2f57", "score": "0.5572729", "text": "func (r *Reconciler) secret(log logr.Logger) runtime.Object {\n\n\treturn newSecret(r.Dast)\n}", "title": "" }, { "docid": "321673e119a84333c526ec007e109e75", "score": "0.5509408", "text": "func (h *Heroku) Secret() string {\n\treturn h.ClientSecret\n}", "title": "" }, { "docid": "a8b81242170a409a0c6fcd14376a3648", "score": "0.54942894", "text": "func (client *XenClient) SecretGetRecord(self string) (result Secret, err error) {\n\tobj, err := client.APICall(\"secret.get_record\", self)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tresult = *ToSecret(obj.(interface{}))\n\n\treturn\n}", "title": "" }, { "docid": "b4c644543b083a585543daed9480ccfe", "score": "0.5472028", "text": "func (a APIKey) Secret() string {\n\treturn a.secret\n}", "title": "" }, { "docid": "81f65af1c7e703d020c9071dd89fa345", "score": "0.54646504", "text": "func (c BearerTokenCredential) Secret() string {\n\treturn c.bearerToken\n}", "title": "" }, { "docid": "f2d4313f13f3e7123ea7993b39763774", "score": "0.54604256", "text": "func NewController(clientset kubernetes.Interface, ssclientset ssclientset.Interface, ssinformer ssinformer.SharedInformerFactory, keyRegistry *KeyRegistry) *Controller {\n\tqueue := workqueue.NewRateLimitingQueue(workqueue.DefaultControllerRateLimiter())\n\n\tssscheme.AddToScheme(scheme.Scheme)\n\teventBroadcaster := record.NewBroadcaster()\n\teventBroadcaster.StartLogging(log.Printf)\n\teventBroadcaster.StartRecordingToSink(&v1.EventSinkImpl{Interface: clientset.CoreV1().Events(\"\")})\n\trecorder := eventBroadcaster.NewRecorder(scheme.Scheme, corev1.EventSource{Component: \"sealed-secrets\"})\n\n\tinformer := ssinformer.Bitnami().V1alpha1().\n\t\tSealedSecrets().\n\t\tInformer()\n\n\tinformer.AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: func(obj interface{}) {\n\t\t\tkey, err := cache.MetaNamespaceKeyFunc(obj)\n\t\t\tif err == nil {\n\t\t\t\tqueue.Add(key)\n\t\t\t}\n\t\t},\n\t\tUpdateFunc: func(oldObj, newObj interface{}) {\n\t\t\tkey, err := cache.MetaNamespaceKeyFunc(newObj)\n\t\t\tif err == nil {\n\t\t\t\tqueue.Add(key)\n\t\t\t}\n\t\t},\n\t\tDeleteFunc: func(obj interface{}) {\n\t\t\tkey, err := cache.DeletionHandlingMetaNamespaceKeyFunc(obj)\n\t\t\tif err == nil {\n\t\t\t\tqueue.Add(key)\n\t\t\t}\n\t\t},\n\t})\n\n\treturn &Controller{\n\t\tinformer: informer,\n\t\tqueue: queue,\n\t\tsclient: clientset.CoreV1(),\n\t\tssclient: ssclientset.BitnamiV1alpha1(),\n\t\trecorder: recorder,\n\t\tkeyRegistry: keyRegistry,\n\t}\n}", "title": "" }, { "docid": "c08559f8c2dc07c34c3019d08d4bed12", "score": "0.54311216", "text": "func (ar *Aries) GetVerifiableController() (api.VerifiableController, error) {\n\tendpoints, ok := ar.endpoints[opverifiable.VerifiableOperationID]\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"no endpoints found for controller [%s]\", opverifiable.VerifiableOperationID)\n\t}\n\n\treturn &Verifiable{endpoints: endpoints, URL: ar.URL, Token: ar.Token, httpClient: &http.Client{}}, nil\n}", "title": "" }, { "docid": "f219fa096b9b40388280b8a86e93cad6", "score": "0.5416922", "text": "func notesHandler(gateway *daemon.Gateway) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t//ret := wallet.Wallets.ToPublicReadable()\n\t\tret := Ng.GetNotesReadable()\n\t\twh.SendOr404(w, ret)\n\t}\n}", "title": "" }, { "docid": "fa5b1b01bfd9d3c6f56f36d2b291dd50", "score": "0.5376798", "text": "func Secret() string {\n\treturn viper.GetString(\"secret\")\n}", "title": "" }, { "docid": "4bff16cc19ac1baacdfe21391979e5ee", "score": "0.5374548", "text": "func (t Transactor) RetrieveSecret(companyBcId string, id string) (entity.TxData, error) {\n\treturn t.apiHandler.RetrieveSecret(common.ConcatFqId(companyBcId, id))\n}", "title": "" }, { "docid": "938c210a20d79dedcba12d313fdf668e", "score": "0.5364976", "text": "func (r *AkoUserReconciler) getAVIControllerCA(ctx context.Context, obj *akoov1alpha1.AKODeploymentConfig) (*corev1.Secret, error) {\n\taviControllerCA := &corev1.Secret{}\n\terr := r.Client.Get(ctx, client.ObjectKey{\n\t\tName: obj.Spec.CertificateAuthorityRef.Name,\n\t\tNamespace: obj.Spec.CertificateAuthorityRef.Namespace,\n\t}, aviControllerCA)\n\treturn aviControllerCA, err\n}", "title": "" }, { "docid": "46eabccd6dbb1f068dab57ad172f6a3c", "score": "0.5356974", "text": "func GetSecret(c *gin.Context) {\n\torganizationID := auth.GetCurrentOrganization(c.Request).ID\n\n\tsecretID := getSecretID(c)\n\n\tif s, err := restricted.GlobalSecretStore.Get(organizationID, secretID); err != nil {\n\t\tstatus := http.StatusBadRequest\n\n\t\tif errors.Is(err, secret.ErrSecretNotExists) {\n\t\t\tstatus = http.StatusNotFound\n\t\t}\n\n\t\tlog.Errorf(\"Error during getting secret: %s\", err.Error())\n\t\tc.AbortWithStatusJSON(status, common.ErrorResponse{\n\t\t\tCode: status,\n\t\t\tMessage: \"Error during listing secret\",\n\t\t\tError: err.Error(),\n\t\t})\n\t} else {\n\t\tc.JSON(http.StatusOK, s)\n\t}\n}", "title": "" }, { "docid": "a5ae1aa75e5c3cc79d7fa0ca1815c0cb", "score": "0.53482145", "text": "func (c APITokenCredential) Secret() string {\n\treturn c.apiToken\n}", "title": "" }, { "docid": "a5ae1aa75e5c3cc79d7fa0ca1815c0cb", "score": "0.53482145", "text": "func (c APITokenCredential) Secret() string {\n\treturn c.apiToken\n}", "title": "" }, { "docid": "dfc1b737261331a99c231c85a8c2b13e", "score": "0.5335327", "text": "func (_LegacyReputationToken *LegacyReputationTokenCallerSession) GetController() (common.Address, error) {\n\treturn _LegacyReputationToken.Contract.GetController(&_LegacyReputationToken.CallOpts)\n}", "title": "" }, { "docid": "8194c0039b2a68d58d9fbef6ed4ccd84", "score": "0.53306764", "text": "func (g *Backend) Get(key string) (string, error) {\n\tctx := context.Background()\n\n\tname := fmt.Sprintf(\"projects/%s/secrets/%s/versions/%s\", g.projectID, key, \"latest\")\n\n\treq := &secretmanagerpb.AccessSecretVersionRequest{\n\t\tName: name,\n\t}\n\n\tresult, err := g.SecretManagerClient.AccessSecretVersion(ctx, req)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to access secret version: %v\", err)\n\t}\n\n\t// fmt.Fprintf(os.Stdout, \"Plaintext: %s\\n\", string(result.Payload.Data))\n\n\treturn string(result.Payload.Data), nil\n}", "title": "" }, { "docid": "a16861091c19626f0e4e0823d1487048", "score": "0.5323407", "text": "func (self *MainController) Get() {\n\tself.Ctx.WriteString(self.GetString(\"echostr\"))\n}", "title": "" }, { "docid": "8ea1178a7229b0f8f107c995a0d43e31", "score": "0.53097534", "text": "func (_LegacyReputationToken *LegacyReputationTokenSession) GetController() (common.Address, error) {\n\treturn _LegacyReputationToken.Contract.GetController(&_LegacyReputationToken.CallOpts)\n}", "title": "" }, { "docid": "0994556f7f24c1e15f1a3392ee569ea7", "score": "0.5306529", "text": "func GetSecretKey(w http.ResponseWriter) {\n\tst := &Status{\"abelana#status\", base64.URLEncoding.EncodeToString([]byte(abelanaConfig().ServerKey))}\n\treplyJSON(w, st)\n}", "title": "" }, { "docid": "21dcbe4c5d24676320ba58c120a660d6", "score": "0.52840996", "text": "func SecretKey(r *http.Request) string {\n\treturn ContextMap(r)[\"SecretKey\"]\n}", "title": "" }, { "docid": "ea76d237c0c884756541927ba24801be", "score": "0.52707255", "text": "func (r *ingress) GetIngressSecret(clusterNameOrID, secretName, secretNamespace string) (response Secret, err error) {\n\t_, err = r.client.Get(fmt.Sprintf(\"/ingress/v2/secret/getSecret?cluster=%s&name=%s&namespace=%s\", clusterNameOrID, secretName, secretNamespace), &response)\n\treturn\n}", "title": "" }, { "docid": "3b9658bb2da0a26587750fe30417d2e0", "score": "0.5260749", "text": "func PasteGetController(c *fiber.Ctx) error {\n\tuser := index.GetSession(c).Get(\"User\")\n\n\tif user != nil {\n\t\treturn c.Render(\"sites/paste/index\", fiber.Map{\n\t\t\t\"Title\": \"Paste\",\n\t\t\t\"Subtitle\": \"In publishing and graphic design, Lorem ipsum is a placeholder text commonly used to demonstrate the visual form of a document or a typeface without relying on meaningful content. Lorem ipsum may\",\n\t\t\t\"User\": user,\n\t\t\t\"Error\": c.Query(\"err\"),\n\t\t\t\"Breadcrumbs\": []map[string]string{\n\t\t\t\t{\"text\": \"Home\", \"linkTo\": \"/\"},\n\t\t\t\t{\"text\": \"Paste\", \"linkTo\": \"/site/paste\"},\n\t\t\t},\n\t\t\t\"Success\": c.Query(\"s\"),\n\t\t}, \"layouts/main\")\n\t}\n\n\treturn c.Redirect(\"/sign-in?err=please sign in\")\n}", "title": "" }, { "docid": "7149364b7f09d88f6731400447dc84c7", "score": "0.5259726", "text": "func (o NotificationPolicyWebhooksOutput) Secret() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *NotificationPolicyWebhooks) pulumi.StringPtrOutput { return v.Secret }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "00bca7608c02601ab0f605f8023e8b18", "score": "0.5237981", "text": "func (c *Config) GetSecret(name, version string) string {\n\n\tlog.Printf(\"Getting value %s from Secret Manager\\n\", name)\n\tctx := context.Background()\n\tclient, err := secretmanager.NewClient(ctx)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to setup client: %v\\n\", err)\n\t}\n\t//var secret *secretmanager.Secret\n\tpathname := fmt.Sprintf(\"projects/%s/secrets/%s/versions/%s\", c.ProjectId, name, version)\n\tlog.Println(\"pathname:\" + pathname)\n\treq := &secretmanagerpb.AccessSecretVersionRequest{\n\t\tName: pathname,\n\t}\n\tresult, err := client.AccessSecretVersion(ctx, req)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\treturn \"\"\n\t}\n\tvalue := string(result.Payload.Data)\n\tlog.Println(value)\n\treturn value\n}", "title": "" }, { "docid": "2aa5c93a0d36b6cf3801bb680c487fc4", "score": "0.5235072", "text": "func (c *Cluster) getSecret(ref *v1.SecretReference, MachineClassName string) (*v1.Secret, error) {\n\tif ref == nil {\n\t\treturn nil, nil\n\t}\n\tsecretRef, err := c.Clientset.CoreV1().Secrets(ref.Namespace).Get(context.Background(), ref.Name, metav1.GetOptions{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn secretRef, err\n}", "title": "" }, { "docid": "83defeafc601343ba463f589ff73e85d", "score": "0.5228044", "text": "func GetController(\n\tbot *tgbotapi.BotAPI,\n\tneo4jDriver neo4j.Driver,\n\tmongoClient *mongo.Client,\n) Controller {\n\n\t// Setup controller\n\tcontroller := controller{\n\t\tbot: bot,\n\t\tneo4jDriver: neo4jDriver,\n\t\tmongodb: mongoClient.Database(\"db\"),\n\n\t\tusers: make(map[string]types.UserData),\n\t}\n\n\t// Define allowed commands\n\tstartCmd := types.CommandDefinition{\n\t\tCommand: \"start\",\n\t\tDescription: \"The start command shows available commands\",\n\t\tInstantiation: controller.instantiateStartCmd,\n\t}\n\n\taddRouteCmd := types.CommandDefinition{\n\t\tCommand: \"addRoute\",\n\t\tDescription: \"The addRoute command will allow you to create a new route\",\n\t\tInstantiation: controller.instantiateAddRouteCmd,\n\t}\n\n\tclimbRouteCmd := types.CommandDefinition{\n\t\tCommand: \"climbRoute\",\n\t\tDescription: \"The climbRoute command will allow you to save an attempt\",\n\t\tInstantiation: controller.instantiateClimbRouteCmd,\n\t}\n\n\tfindRouteCmd := types.CommandDefinition{\n\t\tCommand: \"findRoute\",\n\t\tDescription: \"The findRoute command will allow you to find the name of routes\",\n\t\tInstantiation: controller.instantiateFindRouteCmd,\n\t}\n\n\tfollowCmd := types.CommandDefinition{\n\t\tCommand: \"follow\",\n\t\tDescription: \"The follow will allow you to follow another user\",\n\t\tInstantiation: controller.instantiateFollowCmd,\n\t}\n\n\tunfollowCmd := types.CommandDefinition{\n\t\tCommand: \"unfollow\",\n\t\tDescription: \"The unfollow will allow you to stop following another user\",\n\t\tInstantiation: controller.instantiateUnfollowCmd,\n\t}\n\n\tprofileCmd := types.CommandDefinition{\n\t\tCommand: \"profile\",\n\t\tDescription: \"The profile will allow you to see infos about an user, like best route climbed and follower numbers\",\n\t\tInstantiation: controller.instantiateProfileCmd,\n\t}\n\n\t// Update allowed commands in controller\n\tcontroller.availableCommands = append(\n\t\tcontroller.availableCommands,\n\t\tstartCmd,\n\t\taddRouteCmd,\n\t\tclimbRouteCmd,\n\t\tfindRouteCmd,\n\t\tfollowCmd,\n\t\tunfollowCmd,\n\t\tprofileCmd,\n\t)\n\n\treturn &controller\n}", "title": "" }, { "docid": "59a44df60d7b93d6316f0ae93e21a207", "score": "0.5217504", "text": "func GetNote() {\n\tproviderID := \"custom-provider\"\n\tnoteID := \"custom-note\"\n\n\tauthenticator := &core.IamAuthenticator{\n\t\tApiKey: apiKey,\n\t\tURL: url, //use for dev/preprod env\n\t}\n\tservice, _ := findingsapiv1.NewFindingsApiV1(&findingsapiv1.FindingsApiV1Options{\n\t\tAuthenticator: authenticator,\n\t\tURL: \"https://dev-dallas.secadvisor.test.cloud.ibm.com/findings\", //Specify url or use default\n\t})\n\n\tgetNotesOptions := service.NewGetNoteOptions(accountID, providerID, noteID)\n\n\tresult, response, err := service.GetNote(getNotesOptions)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tfmt.Println(response.Result)\n\t\treturn\n\t}\n\n\tfmt.Println(response.Result)\n\tfmt.Println(*result.Kind)\n\tfmt.Println(*result.ID)\n\n}", "title": "" }, { "docid": "c816a5cdbd8cd330d2957e9b90f169a0", "score": "0.52135706", "text": "func (this *MainController) Get() {\n\tthis.Ctx.WriteString(\"hello world\")\n}", "title": "" }, { "docid": "c5be1a6bcdfe1da7d13e5021e307e1ee", "score": "0.5207485", "text": "func Get(name string, e *model.Environment, c *kubernetes.Clientset) (*v1.Secret, error) {\n\ts, err := c.Core().Secrets(e.Name).Get(name, metav1.GetOptions{})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Error getting kubernetes secret: %s\", err)\n\t}\n\treturn s, nil\n}", "title": "" }, { "docid": "5a7ec47fc7abb69e5aa783ef9f2f7107", "score": "0.5206281", "text": "func GetController() *Controller {\n\treturn defaultCTM.GetController()\n}", "title": "" }, { "docid": "950db596da9d45951baaf0875cf66dd8", "score": "0.520048", "text": "func add(mgr manager.Manager, r reconcile.Reconciler) error {\n\t// Create a new controller\n\tc, err := controller.New(\"secret-controller\", mgr, controller.Options{Reconciler: r})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Watch for changes to Secrets that have controller specific annotations\n\terr = c.Watch(&source.Kind{Type: &corev1.Secret{}}, &handler.EnqueueRequestForObject{}, predicate.Funcs{\n\t\tCreateFunc: func(e event.CreateEvent) bool {\n\t\t\treturn utils.HasControllerAnnotations(e.Meta)\n\t\t},\n\t\tUpdateFunc: func(e event.UpdateEvent) bool {\n\t\t\treturn utils.HasControllerAnnotations(e.MetaOld) || utils.HasControllerAnnotations(e.MetaNew)\n\t\t},\n\t\tDeleteFunc: func(e event.DeleteEvent) bool {\n\t\t\treturn utils.HasControllerAnnotations(e.Meta)\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar mapper handler.ToRequestsFunc\n\tmapper = func(object handler.MapObject) []reconcile.Request {\n\t\tlabels := object.Meta.GetLabels()\n\t\treturn []reconcile.Request{\n\t\t\treconcile.Request{\n\t\t\t\tNamespacedName: types.NamespacedName{\n\t\t\t\t\tName: labels[utils.LabelSourceName],\n\t\t\t\t\tNamespace: labels[utils.LabelSourceNamespace],\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t}\n\n\t// Watch for delete events to \"reflected\" Secrets\n\terr = c.Watch(&source.Kind{Type: &corev1.Secret{}}, &handler.EnqueueRequestsFromMapFunc{\n\t\tToRequests: mapper,\n\t}, predicate.Funcs{\n\t\tCreateFunc: func(e event.CreateEvent) bool { return false },\n\t\tUpdateFunc: func(e event.UpdateEvent) bool { return false },\n\t\tDeleteFunc: func(e event.DeleteEvent) bool {\n\t\t\t// reconcile source Secret if one of its reflection is deleted\n\t\t\treturn utils.HasSourceLabels(e.Meta) && !utils.HasControllerAnnotations(e.Meta)\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c973d4f432df01918beb27b9298bb526", "score": "0.5197687", "text": "func GetEventController(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tassocationID := vars[\"id\"]\n\tvar res = GetEvent(bson.ObjectIdHex(assocationID))\n\tjson.NewEncoder(w).Encode(res)\n}", "title": "" }, { "docid": "97e4975de127d0cf31e34ea552f35812", "score": "0.5195252", "text": "func getSecret(secret *secret.SecretItemResponse) Secret {\n\treturn Secret{\n\t\tClientID: secret.Values[secrettype.AzureClientID],\n\t\tClientSecret: secret.Values[secrettype.AzureClientSecret],\n\t\tSubscriptionID: secret.Values[secrettype.AzureSubscriptionID],\n\t\tTenantID: secret.Values[secrettype.AzureTenantID],\n\t}\n}", "title": "" }, { "docid": "9068f713e993536df956817ea07f9dc4", "score": "0.51938313", "text": "func (_Trade *TradeSession) GetController() (common.Address, error) {\n\treturn _Trade.Contract.GetController(&_Trade.CallOpts)\n}", "title": "" }, { "docid": "bf5f8ba646d16585ef88c63a271fb1db", "score": "0.51918197", "text": "func ControllerName(kind string) string {\n\treturn \"secretpropagating/\" + strings.ToLower(kind)\n}", "title": "" }, { "docid": "44bfa4456ac32d737aa7ae793527a539", "score": "0.51866215", "text": "func (r *reconciler) currentRouterCASecret() (*corev1.Secret, error) {\n\tname := controller.RouterCASecretName(r.operatorNamespace)\n\tsecret := &corev1.Secret{}\n\tif err := r.client.Get(context.TODO(), name, secret); err != nil {\n\t\tif errors.IsNotFound(err) {\n\t\t\treturn nil, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\treturn secret, nil\n}", "title": "" }, { "docid": "909638ecc050691da8958d0db8e72ed3", "score": "0.5184642", "text": "func (e *external) getPayload(ctx context.Context, ref *v1alpha1.SecretReference) ([]byte, error) {\n\n\tnn := types.NamespacedName{\n\t\tName: ref.Name,\n\t\tNamespace: ref.Namespace,\n\t}\n\tsc := &corev1.Secret{}\n\tif err := e.kube.Get(ctx, nn, sc); err != nil {\n\t\treturn nil, errors.Wrap(err, errGetSecretFailed)\n\t}\n\tif ref.Key != \"\" {\n\t\tval, ok := sc.Data[ref.Key]\n\t\tif !ok {\n\t\t\treturn nil, errors.New(fmt.Sprintf(errFmtKeyNotFound, ref.Key))\n\t\t}\n\t\treturn val, nil\n\t}\n\n\treturn nil, nil\n}", "title": "" }, { "docid": "c2d3829cbac8e33b681ad5d8841731b4", "score": "0.5177425", "text": "func GetSecretKey(ctx *pulumi.Context) string {\n\treturn config.Get(ctx, \"rancher2:secretKey\")\n}", "title": "" }, { "docid": "e720d1a42bb68e1e89426e5ed8f9feb8", "score": "0.51738805", "text": "func (this *CommonController) Get() {\n\tre := this.Ctx.Input.Request\n\tbeego.Info(\"request method = get\")\n\n\turl := ProxyUrl(re)\n\tif url == \"\" {\n\t\tbeego.Info(\"Please setting url map in conf/app.cfg at first\")\n\t\treturn\n\t}\n\tbeego.Info(\"new url=\" + url)\n\n\tclient := NewClient()\n\tresp, err := client.Get(url)\n\tif err != nil {\n\t\tbeego.Info(err.Error())\n\t\tthis.Ctx.ResponseWriter.Write([]byte(err.Error() + \"\\n\"))\n\t\treturn\n\t}\n\n\tbeego.Info(\"reques head: \")\n\tresp.Header.Write(os.Stdout)\n\n\tbuf2 := new(bytes.Buffer)\n\tbuf2.ReadFrom(resp.Body)\n\tbeego.Info(\"len=\", len(buf2.Bytes()))\n\tbeego.Info(\"response=\", string(buf2.Bytes()))\n\tthis.Ctx.ResponseWriter.Write(buf2.Bytes())\n}", "title": "" }, { "docid": "43bf705c1aec1d02bb72a36f04cc33ed", "score": "0.51576895", "text": "func (_class SecretClass) GetRecord(sessionID SessionRef, self SecretRef) (_retval SecretRecord, _err error) {\n\tif IsMock {\n\t\treturn _class.GetRecordMock(sessionID, self)\n\t}\t\n\t_method := \"secret.get_record\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertSecretRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg, _selfArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertSecretRecordToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "title": "" }, { "docid": "cd23ec1aa2400f75daf35fbcb41a71a0", "score": "0.51563215", "text": "func (kfk Kafka) Controller() (*Broker, error) {\n\treturn kfk.client.Controller()\n}", "title": "" }, { "docid": "e62d3a309558a3984fbbb5cae52f15f3", "score": "0.5156093", "text": "func (c *client) Get(sType, org, name, path string) (*library.Secret, error) {\n\t// handle the secret based off the type\n\tswitch sType {\n\tcase constants.SecretOrg:\n\t\tc.Logger.WithFields(logrus.Fields{\n\t\t\t\"org\": org,\n\t\t\t\"secret\": path,\n\t\t\t\"type\": sType,\n\t\t}).Tracef(\"getting native %s secret %s for %s\", sType, path, org)\n\n\t\t// capture the org secret from the native service\n\t\treturn c.Database.GetSecretForOrg(org, path)\n\tcase constants.SecretRepo:\n\t\tc.Logger.WithFields(logrus.Fields{\n\t\t\t\"org\": org,\n\t\t\t\"repo\": name,\n\t\t\t\"secret\": path,\n\t\t\t\"type\": sType,\n\t\t}).Tracef(\"getting native %s secret %s for %s/%s\", sType, path, org, name)\n\n\t\t// create the repo with the information available\n\t\tr := new(library.Repo)\n\t\tr.SetOrg(org)\n\t\tr.SetName(name)\n\t\tr.SetFullName(fmt.Sprintf(\"%s/%s\", org, name))\n\n\t\t// capture the repo secret from the native service\n\t\treturn c.Database.GetSecretForRepo(path, r)\n\tcase constants.SecretShared:\n\t\tc.Logger.WithFields(logrus.Fields{\n\t\t\t\"org\": org,\n\t\t\t\"secret\": path,\n\t\t\t\"team\": name,\n\t\t\t\"type\": sType,\n\t\t}).Tracef(\"getting native %s secret %s for %s/%s\", sType, path, org, name)\n\n\t\t// capture the shared secret from the native service\n\t\treturn c.Database.GetSecretForTeam(org, name, path)\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"invalid secret type: %s\", sType)\n\t}\n}", "title": "" }, { "docid": "a80dae41a193dc597e3492c60ad352d7", "score": "0.5153356", "text": "func (s *service) Secret(w http.ResponseWriter, r *http.Request) (interface{}, error) {\n\tctx := r.Context()\n\tuserID := httpapi.GetUserID(r)\n\n\tuser, err := s.repoMngr.User().ByIdentity(ctx, \"ID\", userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif user.IsTOTPAllowed {\n\t\treturn nil, auth.ErrBadRequest(\"TOTP is already configured\")\n\t}\n\n\tclient, err := s.repoMngr.NewWithTransaction(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tentity, err := client.WithAtomic(func() (interface{}, error) {\n\t\tuser, err := client.User().GetForUpdate(ctx, userID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tsecret, err := s.otp.TOTPSecret(user)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tuser.TFASecret = secret\n\t\tif err = client.User().Update(ctx, user); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"cannot set tfa secret: %w\", err)\n\t\t}\n\n\t\treturn user, nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t*user = *entity.(*auth.User)\n\n\ttotpQRStr, err := s.otp.TOTPQRString(user)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Response{TOTP: totpQRStr}, nil\n}", "title": "" }, { "docid": "88926131d774daba71702fa9abdc1316", "score": "0.51492715", "text": "func (_m *Controller) Get() {\n\t_m.Called()\n}", "title": "" }, { "docid": "df6e79706c53fdcc5f4ca0c223e9ec92", "score": "0.51488733", "text": "func (_Trade *TradeCaller) GetController(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Trade.contract.Call(opts, out, \"getController\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "fc817abfe2e5b26bb9c5ceb4d88974ad", "score": "0.51334995", "text": "func GetSecret(s string) string {\n\tlog.Printf(\"Getting secret %v....\\n\", s)\n\tv, err := kv.GetSecret(context.Background(), GetKvURL(kvName), s, \"\")\n\tif err != nil {\n\t\tlog.Printf(\"Failed to get value for %v.\\n\", s)\n\t\tpanic(err.Error())\n\t}\n\treturn *v.Value\n}", "title": "" }, { "docid": "9897d0e22301f883515d2a7ebc0993d9", "score": "0.51285845", "text": "func (_Trade *TradeCallerSession) GetController() (common.Address, error) {\n\treturn _Trade.Contract.GetController(&_Trade.CallOpts)\n}", "title": "" }, { "docid": "693690f5f808876bf75de57b5da0e24a", "score": "0.51263475", "text": "func (c *Client) Secret() *Secret {\n\treturn &Secret{Interface: c.Interface, Namespace: c.Namespace}\n}", "title": "" }, { "docid": "693690f5f808876bf75de57b5da0e24a", "score": "0.51263475", "text": "func (c *Client) Secret() *Secret {\n\treturn &Secret{Interface: c.Interface, Namespace: c.Namespace}\n}", "title": "" }, { "docid": "8259353d38451a0209f171f455376a11", "score": "0.5125664", "text": "func readSecretKey(client kubernetes.Interface, secretName, namespace, key string) ([]byte, error) {\n\ttokenSecret, err := client.CoreV1().Secrets(namespace).Get(context.TODO(), secretName, metav1.GetOptions{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn tokenSecret.Data[key], nil\n}", "title": "" }, { "docid": "89a3fdb257a5d2bebc5cf31e4b6f7f9b", "score": "0.5120681", "text": "func GetSecretKey(ctx *pulumi.Context) string {\n\treturn config.Get(ctx, \"alicloud:secretKey\")\n}", "title": "" }, { "docid": "e3bdae34b75862ae9803601d80ff69fa", "score": "0.51083535", "text": "func GetAccessTokenController() (returnData utility.ReturnJson) {\n\n\tv, err := models.GetSpotifyByClientId(utility.ClientId)\n\tif err != nil {\n\t\treturnData.Code = utility.CODE_400\n\t\treturnData.Message = utility.FAIL\n\t}\n\n\treturnData.Code = utility.CODE_200\n\treturnData.Message = utility.SUCCESS\n\treturnData.Data = v\n\n\treturn\n}", "title": "" }, { "docid": "915066da626c33e6dd89bcd795c5a6e3", "score": "0.5097112", "text": "func (r *AzureIdentityTerminatorReconciler) SecretManfiest(t *terminatorv1alpha1.AzureIdentityTerminator, app *azuread.App) *corev1.Secret {\n\tsecret := &corev1.Secret{\n\t\tTypeMeta: v1.TypeMeta{\n\t\t\tKind: \"Secret\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: v1.ObjectMeta{\n\t\t\tName: t.Name,\n\t\t\tNamespace: t.Namespace,\n\t\t},\n\t\tImmutable: to.BoolPtr(false),\n\t\tStringData: map[string]string{\n\t\t\t\"clientSecret\": app.ServicePrincipal.ClientSecret,\n\t\t},\n\t}\n\n\treturn secret\n}", "title": "" }, { "docid": "db06a6b6b8274a2ddd620e8fc6e5daa8", "score": "0.5093167", "text": "func (_Map *MapSession) GetController() (common.Address, error) {\n\treturn _Map.Contract.GetController(&_Map.CallOpts)\n}", "title": "" }, { "docid": "810aca178165c9f987ef2860bef51652", "score": "0.50920343", "text": "func (c Client) Secret() int64 {\n\treturn c.secret\n}", "title": "" }, { "docid": "f6c3c860e76f70a78bd397ac580efc88", "score": "0.5079269", "text": "func (_FeeWindow *FeeWindowCaller) GetController(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _FeeWindow.contract.Call(opts, out, \"getController\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "798ac8798945a7a9ea93c2ff1cc55923", "score": "0.50769085", "text": "func (s *cookieStore) Secret() []byte {\n\treturn s.secret\n}", "title": "" }, { "docid": "454cd4a3986d3ff595a8c04eb53b09cc", "score": "0.507336", "text": "func (r User_Customer_External_Binding_Verisign) GetNote() (resp string, err error) {\n\terr = r.Session.DoRequest(\"SoftLayer_User_Customer_External_Binding_Verisign\", \"getNote\", nil, &r.Options, &resp)\n\treturn\n}", "title": "" }, { "docid": "4b7f0f8e5e1ec13beeea459e87b56cae", "score": "0.5072466", "text": "func (c *Controller) Get() {\n\tc.Logger.Info(\"Get endpoint !\")\n\t\n}", "title": "" }, { "docid": "4545e2234b1ae26b4045bcd90b9aa9f9", "score": "0.50720495", "text": "func (c KeyConfig) GetSecret() []byte {\n\treturn c.Secret\n}", "title": "" }, { "docid": "33265a029a6ff38ea5bb2bf2607e213d", "score": "0.50679034", "text": "func (controller BasicController) GetKind() ControllerKind {\r\n return controller.Kind\r\n}", "title": "" }, { "docid": "d769a44e08dbb0b10edd1042c661f6b4", "score": "0.50672215", "text": "func Get(db database.Storager, log logging.Handler) *Controller {\n\treturn &Controller{\n\t\tdb: db,\n\t\tLog: log,\n\t}\n}", "title": "" }, { "docid": "bf6b32bb75c6828a2b3859faae9d3215", "score": "0.5057491", "text": "func (_Map *MapCallerSession) GetController() (common.Address, error) {\n\treturn _Map.Contract.GetController(&_Map.CallOpts)\n}", "title": "" }, { "docid": "e13fe80fd9d561a72221f65d6ed62661", "score": "0.50459266", "text": "func (a *V2PolicyApiService) GetPolicyNote(ctx _context.Context, id string) (SuccessResultPolicyNote, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SuccessResultPolicyNote\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/v2/policy/policynote/{id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", id)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v SuccessResultPolicyNote\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "f3aab6ca8bbdfb126d8e21c082df7c47", "score": "0.5045896", "text": "func (mainController *MainController) Get() {\n\tbtn := bonree.GetCurrentTransaction(mainController.Ctx.ResponseWriter.ResponseWriter)\n\n\tsnapshotFunc := btn.SnapshotFuncStart(\"MainController\", \"Get\")\n\n\tdefer btn.SnapshotFuncEnd(snapshotFunc)\n\n\tmainController.Ctx.WriteString(\"hello world\")\n\n\ttime.Sleep(time.Duration(3)*time.Second)\n}", "title": "" }, { "docid": "6ea3b10e485505c1b41536b21421a475", "score": "0.50381106", "text": "func getSecretPhrase(accountName, participantId string) (string, error) {\n\n\tif os.Getenv(global_environment.ENV_KEY_ENVIRONMENT_VERSION) == \"\" {\n\t\terrorMsg := \"Please set environment variables: ENV_VERSION & HOME_DOMAIN_NAME correctly\"\n\t\tLOGGER.Errorf(errorMsg)\n\t\treturn \"\", errors.New(errorMsg)\n\t}\n\n\tcredential := utility.CredentialInfo{\n\t\tEnvironment: os.Getenv(global_environment.ENV_KEY_ENVIRONMENT_VERSION),\n\t\tDomain: participantId,\n\t\tService: \"killswitch\",\n\t\tVariable: \"accounts\",\n\t}\n\n\treturn secret_manager.GetSingleSecretEntry(credential, accountName)\n}", "title": "" }, { "docid": "a5bcf0e0733b2095181f363e5b1c379a", "score": "0.5024335", "text": "func (g *Backend) Get(key string, version string) (string, error) {\n\tctx := context.Background()\n\n\tif g.SecretManagerClient == nil {\n\t\treturn \"\", fmt.Errorf(\"backend is not initialized\")\n\t}\n\n\tvalidVersion := version\n\tif validVersion == \"\" {\n\t\tvalidVersion = \"latest\"\n\t}\n\n\tname := fmt.Sprintf(\"projects/%s/secrets/%s/versions/%s\", g.projectID, key, validVersion)\n\n\treq := &secretmanagerpb.AccessSecretVersionRequest{\n\t\tName: name,\n\t}\n\n\tresult, err := g.SecretManagerClient.AccessSecretVersion(ctx, req)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to access secret version: %v\", err)\n\t}\n\n\treturn string(result.Payload.Data), nil\n}", "title": "" }, { "docid": "1c3ae4933670b0a2f0e05d9a3522343b", "score": "0.5010749", "text": "func (m *ServicePrincipal) GetNotes()(*string) {\n val, err := m.GetBackingStore().Get(\"notes\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "5e7d335d752ed0ace47024382e5941a2", "score": "0.5010734", "text": "func NewSecretProtectionController(secretInformer coreinformers.SecretInformer, podInformer coreinformers.PodInformer, pvInformer coreinformers.PersistentVolumeInformer, pvcInformer coreinformers.PersistentVolumeClaimInformer, scInformer storageinformers.StorageClassInformer, cl clientset.Interface, storageObjectInUseProtectionFeatureEnabled bool) *Controller {\n\te := &Controller{\n\t\tclient: cl,\n\t\tqueue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), \"secretprotection\"),\n\t\tstorageObjectInUseProtectionEnabled: storageObjectInUseProtectionFeatureEnabled,\n\t}\n\tif cl != nil && cl.CoreV1().RESTClient().GetRateLimiter() != nil {\n\t\tratelimiter.RegisterMetricAndTrackRateLimiterUsage(\"secret_protection_controller\", cl.CoreV1().RESTClient().GetRateLimiter())\n\t}\n\n\te.secretLister = secretInformer.Lister()\n\te.secretListerSynced = secretInformer.Informer().HasSynced\n\tsecretInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: e.secretAddedUpdated,\n\t\tUpdateFunc: func(old, new interface{}) {\n\t\t\te.secretAddedUpdated(new)\n\t\t},\n\t})\n\n\te.podLister = podInformer.Lister()\n\te.podListerSynced = podInformer.Informer().HasSynced\n\tpodInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: func(obj interface{}) {\n\t\t\te.podAddedDeletedUpdated(nil, obj, false)\n\t\t},\n\t\tDeleteFunc: func(obj interface{}) {\n\t\t\te.podAddedDeletedUpdated(nil, obj, true)\n\t\t},\n\t\tUpdateFunc: func(old, new interface{}) {\n\t\t\te.podAddedDeletedUpdated(old, new, false)\n\t\t},\n\t})\n\n\te.pvLister = pvInformer.Lister()\n\te.pvListerSynced = pvInformer.Informer().HasSynced\n\tpvInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: func(obj interface{}) {\n\t\t\te.pvAddedDeletedUpdated(nil, obj, false)\n\t\t},\n\t\tDeleteFunc: func(obj interface{}) {\n\t\t\te.pvAddedDeletedUpdated(nil, obj, true)\n\t\t},\n\t\tUpdateFunc: func(old, new interface{}) {\n\t\t\te.pvAddedDeletedUpdated(old, new, false)\n\t\t},\n\t})\n\n\te.pvcLister = pvcInformer.Lister()\n\te.pvcListerSynced = pvcInformer.Informer().HasSynced\n\tpvcInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tDeleteFunc: func(obj interface{}) {\n\t\t\te.pvcDeleted()\n\t\t},\n\t})\n\n\te.scLister = scInformer.Lister()\n\te.scListerSynced = scInformer.Informer().HasSynced\n\n\treturn e\n}", "title": "" }, { "docid": "56bebc3caeb84aa0140dea37cd522fb9", "score": "0.5005283", "text": "func GetSecret(s Signator, domain string) (models.Secret, error) {\n\treq, err := http.NewRequest(\"GET\", domain+\"/api/secret\", nil)\n\tif err != nil {\n\t\treturn nilSecret, err\n\t}\n\n\ts.Sign(req)\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn nilSecret, err\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn models.Secret([]byte{}), responseError(resp)\n\t}\n\n\tvar dest bytes.Buffer\n\n\tdecoder := base64.NewDecoder(base64.URLEncoding, resp.Body)\n\t_, err = io.Copy(&dest, decoder)\n\tif err != nil {\n\t\treturn nilSecret, err\n\t}\n\n\treturn models.Secret(dest.Bytes()), nil\n}", "title": "" }, { "docid": "4e91a47bdf601e5e61e1a370aa06a8ff", "score": "0.5000459", "text": "func (c *Controller) fetchSecret(ctx context.Context, name string) (*v1.Secret, error) {\n\tsecret, err := c.kubeClient.CoreV1().Secrets(\"openshift-config\").Get(ctx, name, metav1.GetOptions{})\n\tif err != nil {\n\t\tif errors.IsNotFound(err) {\n\t\t\tklog.V(4).Infof(\"%s secret does not exist\", name)\n\t\t\terr = nil\n\t\t\tsecret = nil\n\t\t} else if errors.IsForbidden(err) {\n\t\t\tklog.V(2).Infof(\"Operator does not have permission to check %s: %v\", name, err)\n\t\t\terr = nil\n\t\t\tsecret = nil\n\t\t} else {\n\t\t\terr = fmt.Errorf(\"could not check %s: %v\", name, err)\n\t\t}\n\t}\n\n\treturn secret, err\n}", "title": "" }, { "docid": "663172f2a8f5b03ab152eda246f02da4", "score": "0.49985552", "text": "func (k *Kubernetes) GetSecret(clusterName, namespace, secName string) (*corev1.Secret, error) {\n\tclient, err := k.getK8sClient(clusterName)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"get cluster %s clientset error, %v\", clusterName, err)\n\t}\n\n\tcm, err := client.ClientSet.CoreV1().Secrets(namespace).Get(context.Background(), secName, v1.GetOptions{})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cluster %s get secret(namespace: %s) %s error, %v\", clusterName, namespace, secName, err)\n\t}\n\n\treturn cm, nil\n}", "title": "" }, { "docid": "3ce74dede628ff064e391aa36d1b3073", "score": "0.49981716", "text": "func GetTokenHandler(w http.ResponseWriter, r *http.Request) {\n\t//Create the token\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{\n\t\t\"admin\": true,\n\t\t\"name\": \"John Adams\",\n\t\t\"exp\": time.Now().Add(time.Hour * 24).Unix(),\n\t})\n\n\t//Sign the token with the secret\n\ttokenString, _ := token.SignedString(mySigningKey)\n\n\t//write the token to the browser window\n\tw.Write([]byte(tokenString))\n}", "title": "" }, { "docid": "26ea643d1a5091b71fad46b9b9b80c0b", "score": "0.49928626", "text": "func (C *Client) RetrieveSecret(request *RetrieveSecretRequest) (*RetrieveSecretResponse, error) {\n\tvar (\n\t\tu string\n\t\terr error\n\t\tresp = new(RetrieveSecretResponse)\n\t\thttpReq *http.Request\n\t\thttpResp *http.Response\n\t)\n\n\tif err := request.Validate(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tu = fmt.Sprintf(\"%s/api/v1/secret/%s\", C.otsURL, request.SecretKey)\n\n\tif request.Passphrase != \"\" {\n\t\tu = fmt.Sprintf(\"%s?passphrase=%s\", u, request.Passphrase)\n\t}\n\n\thttpReq, err = http.NewRequest(http.MethodPost, u, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thttpReq.SetBasicAuth(C.creds.Username, C.creds.APIToken)\n\n\thttpResp, err = C.httpClient.Do(httpReq)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif httpResp.StatusCode != http.StatusOK {\n\t\treturn nil, fmt.Errorf(\"service returned a non-200 status code: %d\", httpResp.StatusCode)\n\t}\n\n\tif err := resp.Unmarshal(httpResp.Body); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "bed7a06459238adea5c9a09dd615b8df", "score": "0.49912104", "text": "func GetNote(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *NoteState, opts ...pulumi.ResourceOption) (*Note, error) {\n\tvar resource Note\n\terr := ctx.ReadResource(\"google-native:containeranalysis/v1alpha1:Note\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "401ca42eb1bdee122d1ef343eca0c9cf", "score": "0.49904695", "text": "func getDaemonsetController(kc kubernetes.Interface, sr *v1.SerializedReference) (interface{}, error) {\n\tswitch sr.Reference.Kind {\n\tcase \"DaemonSet\":\n\t\treturn kc.ExtensionsV1beta1().DaemonSets(sr.Reference.Namespace).Get(sr.Reference.Name, v1meta.GetOptions{})\n\t}\n\treturn nil, fmt.Errorf(\"unknown controller kind %q\", sr.Reference.Kind)\n}", "title": "" }, { "docid": "9d4f905dd6fc1854f12914517d9cbc3e", "score": "0.4979825", "text": "func (o *WatchlistScreeningEntityListRequest) GetSecret() string {\n\tif o == nil || o.Secret == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Secret\n}", "title": "" }, { "docid": "cecc4b742e2bd87945fdb62156346891", "score": "0.4974111", "text": "func GetNote(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *NoteState, opts ...pulumi.ResourceOption) (*Note, error) {\n\tvar resource Note\n\terr := ctx.ReadResource(\"google-native:containeranalysis/v1:Note\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "d270c72a93b566f0b730308029fb997e", "score": "0.49723768", "text": "func (r *Router) GetController(route string) Controller {\n\tif val, ok := r.routes[route]; ok {\n\t\treturn val\n\t}\n\n\treturn unknownCommand\n}", "title": "" }, { "docid": "e026e2f9d7358269469c36a32ad38a97", "score": "0.49640852", "text": "func (s *SumoLogicConfig) GetSecret() string {\n\tif s == nil || s.Secret == nil {\n\t\treturn \"\"\n\t}\n\treturn *s.Secret\n}", "title": "" }, { "docid": "f7c22799b30623d7fe96261be31be759", "score": "0.49601847", "text": "func (_FeeWindow *FeeWindowCallerSession) GetController() (common.Address, error) {\n\treturn _FeeWindow.Contract.GetController(&_FeeWindow.CallOpts)\n}", "title": "" }, { "docid": "c1fddf8afcdb4aa3fce225ac0731ef5f", "score": "0.4955846", "text": "func SignInGetController(c *fiber.Ctx) error {\n\tuser := GetSession(c).Get(\"User\")\n\n\tif user != nil {\n\t\treturn c.Redirect(\"/?err=error\")\n\t}\n\n\treturn c.Render(\"sign-in\", fiber.Map{\n\t\t\"Title\": \"Sign In\",\n\t\t\"Subtitle\": \"In publishing and graphic design, Lorem ipsum is a placeholder text commonly used to demonstrate the visual form of a document or a typeface without relying on meaningful content. Lorem ipsum may\",\n\t\t\"User\": nil,\n\t\t\"Breadcrumbs\": []map[string]string{\n\t\t\t{\"text\": \"Home\", \"linkTo\": \"/\"},\n\t\t\t{\"text\": \"Sign In\", \"linkTo\": \"/sign-in\"},\n\t\t},\n\t\t\"Error\": c.Query(\"err\"),\n\t\t\"Success\": c.Query(\"s\"),\n\t}, \"layouts/main\")\n}", "title": "" }, { "docid": "c2c671b42928942d82ac80955ccf984a", "score": "0.49503598", "text": "func (a *V2PolicyApiService) GetPolicyHolderNote(ctx _context.Context, id string) (SuccessResultPolicyHolderNote, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SuccessResultPolicyHolderNote\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/v2/policy/policyholdernote/{id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", id)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v SuccessResultPolicyHolderNote\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "92d53ebd57b71c45adc053a4995bd7ca", "score": "0.49497813", "text": "func add(mgr manager.Manager, r reconcile.Reconciler) error {\n\t// Create a new controller\n\tc, err := controller.New(\"secret-controller\", mgr, controller.Options{Reconciler: r})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Watch for changes to primary resource Secret\n\terr = c.Watch(&source.Kind{Type: &corev1.Secret{}}, &handler.EnqueueRequestForObject{})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "07593a989cbbaf61b1c8bb5798770ec8", "score": "0.49470899", "text": "func getSecretValue(nv NameValue) string {\n\tif nv.ValueFrom != nil {\n\t\tif va, err := readFromKubernetesSecret(nv.ValueFrom.SecretKeyRef.Name, nv.ValueFrom.SecretKeyRef.Key); err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn \"\"\n\t\t} else {\n\t\t\treturn va\n\t\t}\n\t}\n\treturn nv.Value\n}", "title": "" }, { "docid": "57dc536045d4f930ad12a8bff961aaaf", "score": "0.49450845", "text": "func (_FeeWindow *FeeWindowSession) GetController() (common.Address, error) {\n\treturn _FeeWindow.Contract.GetController(&_FeeWindow.CallOpts)\n}", "title": "" }, { "docid": "6caf00e827a06298bd5cf32615213c75", "score": "0.49446654", "text": "func GetSecret(ctx *pulumi.Context, key string) pulumi.StringOutput {\n\tv, _ := get(ctx, key, \"\", \"\")\n\treturn pulumi.ToSecret(pulumi.String(v)).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "ec1759db8c0275dffffebd0a585eb594", "score": "0.49418467", "text": "func GetSecret(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *SecretState, opts ...pulumi.ResourceOption) (*Secret, error) {\n\tvar resource Secret\n\terr := ctx.ReadResource(\"rancher2:index/secret:Secret\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "844d954239e2f941285876a5af7394d5", "score": "0.4941334", "text": "func (c *client) Secret(repoID int64, secret string) (*Secret, error) {\n\tout := new(Secret)\n\turi := fmt.Sprintf(pathRepoSecret, c.addr, repoID, secret)\n\terr := c.get(uri, out)\n\treturn out, err\n}", "title": "" }, { "docid": "4f732093ccf6472ef5eaf433e6b23de1", "score": "0.4941103", "text": "func (th *ThirdSecretAPI) Get(key string) (string, error) {\n\tvar req, err = http.NewRequest(\"GET\", th.prepareURL(key), nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tvar res *http.Response\n\tres, err = th.Client.Do(req)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tdefer res.Body.Close()\n\n\tif res.StatusCode == http.StatusUnauthorized {\n\t\treturn \"\", ErrUnAuthorized\n\t}\n\n\tif res.StatusCode != 200 {\n\t\tif res.StatusCode == http.StatusNotFound {\n\t\t\treturn \"\", ErrNotFound\n\t\t}\n\n\t\treturn \"\", ErrFailedRequest\n\t}\n\n\tvar bu bytes.Buffer\n\tif _, err := io.Copy(&bu, res.Body); err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn bu.String(), nil\n}", "title": "" }, { "docid": "06cbf5b06c20edb43e18495cc26b3505", "score": "0.49387044", "text": "func (_Map *MapCaller) GetController(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Map.contract.Call(opts, out, \"getController\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "a42885ac13bd185fcc227bef1adedcdf", "score": "0.49250433", "text": "func (nginx *Controller) GetSecretFileName(name string) string {\n\treturn path.Join(nginx.nginxSecretsPath, name)\n}", "title": "" }, { "docid": "82c7d6af8310804d2d4c4d15b088fd79", "score": "0.49247235", "text": "func (o *IdentityVerificationRetryRequest) GetSecret() string {\n\tif o == nil || o.Secret == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Secret\n}", "title": "" } ]
61f6c40abbbb51045f457b86bb642c8f
NewMockIngredientsRepository creates a new mock instance.
[ { "docid": "8055857f13d73092d047c363899562e7", "score": "0.79064757", "text": "func NewMockIngredientsRepository(ctrl *gomock.Controller) *MockIngredientsRepository {\n\tmock := &MockIngredientsRepository{ctrl: ctrl}\n\tmock.recorder = &MockIngredientsRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" } ]
[ { "docid": "c63bf1e5ff3c7aa96036b0bd1266f425", "score": "0.6162649", "text": "func NewMockRepo(a *config.AppConfig) *Repository {\n\treturn &Repository{\n\t\tApp: a,\n\t\tDB: database.NewMockPostgres(a),\n\t}\n}", "title": "" }, { "docid": "8396a454758cb7bc54f5eed45fae0bd5", "score": "0.589488", "text": "func NewMockGormRatingRepository(conn *gorm.DB) rating.RatingRepository {\n\treturn &MockGormRatingRepository{conn: conn}\n}", "title": "" }, { "docid": "c66474842b7efb4e831d0063011dfaad", "score": "0.5727452", "text": "func NewRepositoryMock(repoMock RepositoryMock) Repository {\n\treturn Repository{\n\t\tUser: repoMock.User,\n\t}\n}", "title": "" }, { "docid": "8d32ce7097ce75012dc70e618db91f94", "score": "0.56258696", "text": "func NewIOrderRepository(t interface {\n\tmock.TestingT\n\tCleanup(func())\n}) *IOrderRepository {\n\tmock := &IOrderRepository{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "e85c3291e56af7dd6acea7c3768ae203", "score": "0.56027395", "text": "func MockRepo() *RepositoryMock {\n\tret := &RepositoryMock{\n\t\tmockBase: newMock(),\n\t}\n\n\treturn ret\n}", "title": "" }, { "docid": "913c0e2357a942c6fb67a4ce789a5138", "score": "0.5589383", "text": "func NewMock() UserRepo {\n\treturn &userRepoMock{\n\t\tusers: make(map[int]model.User),\n\t}\n}", "title": "" }, { "docid": "bfe2a5a5f786ad1067e544205ece8d72", "score": "0.5565151", "text": "func NewRepository(t mockConstructorTestingTNewRepository) *Repository {\n\tmock := &Repository{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "41e8f16e4bc28cef40a5b796a2207aa7", "score": "0.55516577", "text": "func (m *MockInterface) New() jorm.Interface {\n\tret := m.ctrl.Call(m, \"New\")\n\tret0, _ := ret[0].(jorm.Interface)\n\treturn ret0\n}", "title": "" }, { "docid": "3e8d97895150c25957e48489bd494f0d", "score": "0.5502848", "text": "func NewMockRepository(DbURL string, Db string, DbTimeout int) (*DbRepo, error) {\n\n\n //Mock db does not need connections but initialization\n Repo := DbRepo{\n Timeout : DbTimeout,\n Dbname: Db,\n dbUrl: DbURL,\n }\n\n ctx, cancel := context.WithTimeout(context.Background(), time.Duration(mongoTimeout)*time.Second)\n\tdefer cancel()\n\t\n client, err := mongo.Connect(ctx, options.Client().ApplyURI(DbURL))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t\n err = client.Ping(ctx, readpref.Primary())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t\n\tRepo.dbConn = client\n\n log.Println(\"Mock DB Repository Creation .....\")\n\n return &Repo, nil\n}", "title": "" }, { "docid": "6d824c7676d54aa471906ecdc488b8ee", "score": "0.5460095", "text": "func NewMock() *MockGeoDB {\n\tdb := &MockGeoDB{\n\t\texpectations: make([]*Expectation, 0),\n\t}\n\n\treturn db\n}", "title": "" }, { "docid": "15c952bae45e4890819b5582e61647da", "score": "0.540684", "text": "func NewMockClients() *MockClients {\n return &MockClients{\n SavedCreateSnapshots: make(map[string]cs.Snapshot),\n }\n}", "title": "" }, { "docid": "f1d94f22f25277e57b69ee2fda02a46b", "score": "0.53770113", "text": "func NewMockRepository(ctrl *gomock.Controller) *Repository {\n\tmock := &Repository{ctrl: ctrl}\n\tmock.recorder = &RepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "d42685171dfe15a0ee0a96cf64d89523", "score": "0.53473604", "text": "func NewRepository(db *sql.DB, tracer *zipkin.Tracer) gopher.Repository {\n\treturn gopherRepository{db: db, tracer: tracer}\n}", "title": "" }, { "docid": "d42685171dfe15a0ee0a96cf64d89523", "score": "0.53473604", "text": "func NewRepository(db *sql.DB, tracer *zipkin.Tracer) gopher.Repository {\n\treturn gopherRepository{db: db, tracer: tracer}\n}", "title": "" }, { "docid": "f3ca9850b9f47f22142aa4ce6f27cbac", "score": "0.5346784", "text": "func NewInMemoryRepository() domain.Repository {\n\treturn &InMemoryRepository{items: make([]*domain.Item, 0), currentID: 1}\n}", "title": "" }, { "docid": "60ba90815c498b2c23c11bbb74767533", "score": "0.5314563", "text": "func (m *MockIngredientsRepository) EXPECT() *MockIngredientsRepositoryMockRecorder {\n\treturn m.recorder\n}", "title": "" }, { "docid": "83c4f53a0a34c4dc030c54ca49443a54", "score": "0.5309946", "text": "func NewRepository(client *dynamodb.DynamoDB) *Repository {\n\treturn &Repository{client}\n}", "title": "" }, { "docid": "48abcda6ece4fe22bea78eaa81d2b050", "score": "0.5287146", "text": "func RepoMocker() *repoMocker {\n\treturn &repoMocker{}\n}", "title": "" }, { "docid": "c799241e234979216a7e5831443799b7", "score": "0.5263326", "text": "func NewBundleReferenceRepository(t mockConstructorTestingTNewBundleReferenceRepository) *BundleReferenceRepository {\n\tmock := &BundleReferenceRepository{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "f488b979c8c265436a2b3cc40a593bbd", "score": "0.5255474", "text": "func NewMockPatientDataRepository(t NewMockPatientDataRepositoryT) *MockPatientDataRepository {\n\tmock := &MockPatientDataRepository{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e1a2923dec398b3949ca88c619c633c8", "score": "0.5216425", "text": "func NewMockRepository(ctrl *gomock.Controller) *MockRepository {\n\tmock := &MockRepository{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "8a5244a87a088eaee634f12321633554", "score": "0.5204008", "text": "func NewInMemoryRepository() *InMemoryRepository {\n\treturn &InMemoryRepository{definitions: make(map[string]*Definition)}\n}", "title": "" }, { "docid": "39ba804dc9c5c463bebaa6e74ddd3197", "score": "0.52036494", "text": "func NewMockIPostgresRepository(ctrl *gomock.Controller) *MockIPostgresRepository {\n\tmock := &MockIPostgresRepository{ctrl: ctrl}\n\tmock.recorder = &MockIPostgresRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "d98d7f4fa9ebd9482d87d4fd6477aa7d", "score": "0.5192998", "text": "func newStoryRepository(conf utils.BuilderConf) (interface{}, error) {\n\treturn &inMemoryStoryRepository{}, nil\n}", "title": "" }, { "docid": "dc6ab22bdef6191a7ea0745f7309babe", "score": "0.5162606", "text": "func NewMock(votes service.Vote) Controller {\n\treturn Mock{votes: votes}\n}", "title": "" }, { "docid": "c0df99629daccf59034a47fc0bb48daa", "score": "0.5157449", "text": "func NewMock() Scope {\n\treturn &Mock{}\n}", "title": "" }, { "docid": "b07f109ffa755cc4d39186a2688b0ce5", "score": "0.5151889", "text": "func NewThingRepository() things.ThingRepository {\n\treturn &thingRepositoryMock{\n\t\tthings: make(map[string]things.Thing),\n\t}\n}", "title": "" }, { "docid": "c65bd367515fd350c6d06e563ed4a0c8", "score": "0.5146099", "text": "func New() generator.PathMatcherRepository {\n\treturn &Repository{}\n}", "title": "" }, { "docid": "5cf3c6826683c9bee3006370fb34a92f", "score": "0.51244456", "text": "func NewMockDataRepository(ctrl *gomock.Controller) *MockDataRepository {\n\tmock := &MockDataRepository{ctrl: ctrl}\n\tmock.recorder = &MockDataRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "7f437d7038c7d9257b96e879a701fa30", "score": "0.5096277", "text": "func NewRepository() *Repository {\n\treturn &Repository{productList}\n}", "title": "" }, { "docid": "9652beb40468ca496b3c77b279af36c9", "score": "0.50817245", "text": "func NewInMemoryRepository(msgs []MessageEnvelope) Repository {\n\treturn &inmemrepo{\n\t\tmsgs: msgs,\n\t}\n}", "title": "" }, { "docid": "6aed54c5b150a77aa9827766fe118f82", "score": "0.5068768", "text": "func NewGORMRepository() *GORMRepository {\n\treturn &GORMRepository{\n\t\t//conn: database.G,\n\t\tconn: GORMDB.G,\n\t}\n}", "title": "" }, { "docid": "7923bf89b7c8152b4854c6f8e0098bd6", "score": "0.50558114", "text": "func NewMemberRepository(db *sql.DB) (member.Repository, error) {\n\t// fmt.Println(1)\n\tpdb, err := mysql.New(db)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdbx := sqlx.NewDb(db, \"mysql\")\n\t// fmt.Println(1)\n\tr := memberRepository{pdb, dbx}\n\t// fmt.Println(1)\n\treturn &r, nil\n}", "title": "" }, { "docid": "26a388e63ef1d50ce1cf7897e570f1c0", "score": "0.50544184", "text": "func NewMockTheatreRepository(ctrl *gomock.Controller) *MockTheatreRepository {\n\tmock := &MockTheatreRepository{ctrl: ctrl}\n\tmock.recorder = &MockTheatreRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "2d035ce5987c9dd08871a038fe0c0482", "score": "0.5048583", "text": "func NewMockHallRepository(ctrl *gomock.Controller) *MockHallRepository {\n\tmock := &MockHallRepository{ctrl: ctrl}\n\tmock.recorder = &MockHallRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "6e3fe32326b5db3dbe5e25c9a13f8981", "score": "0.5046793", "text": "func NewMockDB() Storage {\n\treturn NewInMemStorage()\n}", "title": "" }, { "docid": "e078781fb01d54acc24634ac4dae39ff", "score": "0.5033555", "text": "func NewRepository(db *gorm.DB) GormRepository {\n\treturn GormRepository{DB: db}\n}", "title": "" }, { "docid": "ad1c5bea4856182926f417f7c49b3a85", "score": "0.50242764", "text": "func NewMock() *Mock {\n\treturn &Mock{}\n}", "title": "" }, { "docid": "5a2d41b2546a9c31384d9d62d90382ba", "score": "0.50184137", "text": "func newMockMandrillClient() mandrillInterface {\n\treturn &mockMandrillInterface{}\n}", "title": "" }, { "docid": "80e47d00befa09fe6b2bb7757677b9a2", "score": "0.5014538", "text": "func NewRepositoryInMemory() Repository {\n\tf := map[string]*ach.File{}\n\treturn &repositoryInMemory{\n\t\tfiles: f,\n\t}\n}", "title": "" }, { "docid": "be0dbfe28770ad6d3cea26b2a5ad2f03", "score": "0.50032276", "text": "func MakeInMemoryRepository(config common.Configuration) (ProductRepository, error) {\n\tvar err error\n\n\tproducts, err := loadInitInMemoryDataset(config.GetInitDataSet())\n\n\treturn &inMemoryProductRepository{products }, err\n}", "title": "" }, { "docid": "879500f63410ce6fd087ece03d77523a", "score": "0.49892718", "text": "func NewRepository() *GormRepository {\n\treturn &GormRepository{}\n}", "title": "" }, { "docid": "f077af695126b64037bf4e77a3a42559", "score": "0.4975249", "text": "func NewNotebooksRepo() (entity.LocalRemoteRepo, error) { return &Notebooks{}, nil }", "title": "" }, { "docid": "86c4a4cfa8cd62542be54737b9f7df1a", "score": "0.49713743", "text": "func NewexperienceRepository(Conn *sql.DB) experience_add_ons.Repository {\n\treturn &experienceAddOnsRepository{Conn}\n}", "title": "" }, { "docid": "e1ed2c631ac1ed68e4d4ff8586f93510", "score": "0.49607852", "text": "func (f *storageFactory) NewGreetingRepository() engine.GreetingRepository {\n\treturn newGreetingRepository(f.session)\n}", "title": "" }, { "docid": "ad02f09bcb34e0468cd97c6967e1e539", "score": "0.49598143", "text": "func NewWrapMock(t *testing.T) WrapMock {\n\treturn WrapMock{t: t}\n}", "title": "" }, { "docid": "e01a9100dd6fe24e1b8b8581633affbb", "score": "0.4957319", "text": "func NewLabelRepo(t mockConstructorTestingTNewLabelRepo) *LabelRepo {\n\tmock := &LabelRepo{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "c6fb5521c3ea7aad7ec43c9c785eac6b", "score": "0.49423546", "text": "func NewMemberRepository(db *sql.DB) (member.Repository, error) {\n\tsqlDB := sqlx.NewDb(db, \"postgres\")\n\tr := memberRepository{sqlDB}\n\treturn &r, nil\n}", "title": "" }, { "docid": "a2a1ec9625d6471687047e0ee699db26", "score": "0.4939316", "text": "func newInmem() *inmem {\n\tvar m = map[int]*Donation{}\n\treturn &inmem{\n\t\tm: m,\n\t}\n}", "title": "" }, { "docid": "ea344d6810d9b66e5110cf5001afae4c", "score": "0.49275973", "text": "func NewMockRepositoryInterface(ctrl *gomock.Controller) *MockRepositoryInterface {\n\tmock := &MockRepositoryInterface{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryInterfaceMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "ea344d6810d9b66e5110cf5001afae4c", "score": "0.49275973", "text": "func NewMockRepositoryInterface(ctrl *gomock.Controller) *MockRepositoryInterface {\n\tmock := &MockRepositoryInterface{ctrl: ctrl}\n\tmock.recorder = &MockRepositoryInterfaceMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "1cd02b8b829d74f0839ff99c9822fe94", "score": "0.4920161", "text": "func NewMockIRepo(ctrl *gomock.Controller) *MockIRepo {\n\tmock := &MockIRepo{ctrl: ctrl}\n\tmock.recorder = &MockIRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "fe82b7a7dc959f6ffdfdf6cceddfb346", "score": "0.49163073", "text": "func NewMockRepo(ctrl *gomock.Controller) *MockRepo {\n\tmock := &MockRepo{ctrl: ctrl}\n\tmock.recorder = &MockRepoMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "68189e31c824a680e1e61cc8a6295859", "score": "0.49109796", "text": "func NewFormationTemplateRepository(t mockConstructorTestingTNewFormationTemplateRepository) *FormationTemplateRepository {\n\tmock := &FormationTemplateRepository{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "9a9cfe6d1bed9e55c484f3b6f64c572c", "score": "0.48854378", "text": "func NewRepository(db *gorm.DB) *GormRepository {\n\treturn &GormRepository{db}\n}", "title": "" }, { "docid": "cedc4383f7d641f4ecd6667eb40c3a72", "score": "0.48812094", "text": "func New() repositories.PhoneRepository {\n\treturn &PhoneRepository{}\n}", "title": "" }, { "docid": "104a24e2e806dd91dd263d2a7d0bd866", "score": "0.48767337", "text": "func NewOrderRepository(mysqlInterface database.MysqlInterface, clientConn service_clients.ProductClientConn) OrderRepositoryInterface {\n\treturn &OrderRepository{mysqlInterface: mysqlInterface, clientConn: clientConn}\n}", "title": "" }, { "docid": "5d20173fe686af028c3f4e3c8994d5e0", "score": "0.48733294", "text": "func NewMockIPLimiterRepository(ctrl *gomock.Controller) *MockIPLimiterRepository {\n\tmock := &MockIPLimiterRepository{ctrl: ctrl}\n\tmock.recorder = &MockIPLimiterRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "3e3fd90d4ece5db92ee9ef19da18779c", "score": "0.48718804", "text": "func NewMockrepoer(ctrl *gomock.Controller) *Mockrepoer {\n\tmock := &Mockrepoer{ctrl: ctrl}\n\tmock.recorder = &MockrepoerMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "e52302dee3099881ead058cc38586f9b", "score": "0.4870978", "text": "func NewMockUsersRepository(ctrl *gomock.Controller) *MockUsersRepository {\n\tmock := &MockUsersRepository{ctrl: ctrl}\n\tmock.recorder = &MockUsersRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "41027f30d37cec583963c9c8e2fcb3f9", "score": "0.4870157", "text": "func NewRepository() vendor.Repository {\n\tdb, err := sql.Open(\"sqlite3\", \"./internal/database/test.sqlite\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn &repository{\n\t\tdb: db,\n\t}\n}", "title": "" }, { "docid": "23d58cf02f611735369f0ec9b93423d4", "score": "0.4865721", "text": "func NewRepository(client *sql.DB) (repository *Repository, err error) {\n\trepository = &Repository{client}\n\terr = repository.Migrate()\n\tif err != nil {\n\t\treturn repository, err\n\t}\n\treturn repository, nil\n}", "title": "" }, { "docid": "b534fc59335ea0030ffba15f1b399124", "score": "0.4856638", "text": "func NewMockObject(ctrl *gomock.Controller) *MockObject {\n\tmock := &MockObject{ctrl: ctrl}\n\tmock.recorder = &MockObjectMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "381db5bef559f1a839c17f5cfd8c54f7", "score": "0.48537838", "text": "func NewRepository(mgo config.MgoFn) Repository {\n\treturn repository{mgo: mgo}\n}", "title": "" }, { "docid": "5d90422c82ca02739bde731fb81d9c49", "score": "0.48446158", "text": "func NewMigrationRepoMock(t minimock.Tester) *MigrationRepoMock {\n\tm := &MigrationRepoMock{t: t}\n\tif controller, ok := t.(minimock.MockController); ok {\n\t\tcontroller.RegisterMocker(m)\n\t}\n\n\tm.CreateVersionTableMock = mMigrationRepoMockCreateVersionTable{mock: m}\n\n\tm.DeleteVersionMock = mMigrationRepoMockDeleteVersion{mock: m}\n\tm.DeleteVersionMock.callArgs = []*MigrationRepoMockDeleteVersionParams{}\n\n\tm.EnsureDBVersionMock = mMigrationRepoMockEnsureDBVersion{mock: m}\n\n\tm.GetDBMock = mMigrationRepoMockGetDB{mock: m}\n\n\tm.GetDBVersionMock = mMigrationRepoMockGetDBVersion{mock: m}\n\n\tm.GetMigrationsHistoryMock = mMigrationRepoMockGetMigrationsHistory{mock: m}\n\tm.GetMigrationsHistoryMock.callArgs = []*MigrationRepoMockGetMigrationsHistoryParams{}\n\n\tm.InsertUnAppliedVersionMock = mMigrationRepoMockInsertUnAppliedVersion{mock: m}\n\tm.InsertUnAppliedVersionMock.callArgs = []*MigrationRepoMockInsertUnAppliedVersionParams{}\n\n\tm.InsertVersionMock = mMigrationRepoMockInsertVersion{mock: m}\n\tm.InsertVersionMock.callArgs = []*MigrationRepoMockInsertVersionParams{}\n\n\tm.LockVersionMock = mMigrationRepoMockLockVersion{mock: m}\n\tm.LockVersionMock.callArgs = []*MigrationRepoMockLockVersionParams{}\n\n\tm.UpdateApplyTimeMock = mMigrationRepoMockUpdateApplyTime{mock: m}\n\tm.UpdateApplyTimeMock.callArgs = []*MigrationRepoMockUpdateApplyTimeParams{}\n\n\treturn m\n}", "title": "" }, { "docid": "ae5796ce526a9a5c209e7bfc5cd57f37", "score": "0.48400804", "text": "func NewMockLocalRepository(ctrl *gomock.Controller) *MockLocalRepository {\n\tmock := &MockLocalRepository{ctrl: ctrl}\n\tmock.recorder = &MockLocalRepositoryMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "86b4736a68b2aa51e87c1917add9c1db", "score": "0.48322302", "text": "func newMockInput() *mockInput {\n\treturn &mockInput{i: 0}\n}", "title": "" }, { "docid": "ae85eb8a849f544b1e04f650f8fa1df3", "score": "0.48285913", "text": "func NewMock(vals map[string]string, valslice map[string][]string) Backend {\n return mockBackend{\n vals: vals,\n valslice: valslice,\n }\n}", "title": "" }, { "docid": "24b0a59cf6a32c862c257da2b85ff6d5", "score": "0.482655", "text": "func (m *MockType) NewReader(arg0 *maxminddb_golang.Reader) (geodbtools.Reader, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"NewReader\", arg0)\n\tret0, _ := ret[0].(geodbtools.Reader)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" } ]
15ec0e8afb947baa2bb70c3446d2cd68
Use adds a list of mutation hooks to the hooks stack. A call to `Use(f, g, h)` equals to `device.Hooks(f(g(h())))`.
[ { "docid": "a771e81fa53228a8ffea96d0ecf6e26d", "score": "0.6917832", "text": "func (c *DeviceClient) Use(hooks ...Hook) {\n\tc.hooks.Device = append(c.hooks.Device, hooks...)\n}", "title": "" } ]
[ { "docid": "32e3f86cab9f48d1d41c2be525edbb48", "score": "0.71719205", "text": "func (c *DeveloperClient) Use(hooks ...Hook) {\n\tc.hooks.Developer = append(c.hooks.Developer, hooks...)\n}", "title": "" }, { "docid": "baa5e28c122a47edcc7373d78111da6c", "score": "0.7106569", "text": "func (c *ManagerClient) Use(hooks ...Hook) {\n\tc.hooks.Manager = append(c.hooks.Manager, hooks...)\n}", "title": "" }, { "docid": "1eb61af90734e087bbb6fc305e6811c8", "score": "0.71018165", "text": "func (c *FlowClient) Use(hooks ...Hook) {\n\tc.hooks.Flow = append(c.hooks.Flow, hooks...)\n}", "title": "" }, { "docid": "e0db0442c3f0d243fec94fdb5d3ece8b", "score": "0.70501846", "text": "func (c *DevelopperClient) Use(hooks ...Hook) {\n\tc.hooks.Developper = append(c.hooks.Developper, hooks...)\n}", "title": "" }, { "docid": "38db7e36f5109429ad470bd70394d007", "score": "0.6959679", "text": "func (c *StatisticClient) Use(hooks ...Hook) {\n\tc.hooks.Statistic = append(c.hooks.Statistic, hooks...)\n}", "title": "" }, { "docid": "38db7e36f5109429ad470bd70394d007", "score": "0.6959679", "text": "func (c *StatisticClient) Use(hooks ...Hook) {\n\tc.hooks.Statistic = append(c.hooks.Statistic, hooks...)\n}", "title": "" }, { "docid": "06e5a2d50e917056192db3d94704e18f", "score": "0.69418794", "text": "func (c *PromotionClient) Use(hooks ...Hook) {\n\tc.hooks.Promotion = append(c.hooks.Promotion, hooks...)\n}", "title": "" }, { "docid": "2fbf489ea55b29d40eaf1528b9c6c7df", "score": "0.69334465", "text": "func (c *TagClient) Use(hooks ...Hook) {\n\tc.hooks.Tag = append(c.hooks.Tag, hooks...)\n}", "title": "" }, { "docid": "2fbf489ea55b29d40eaf1528b9c6c7df", "score": "0.69334465", "text": "func (c *TagClient) Use(hooks ...Hook) {\n\tc.hooks.Tag = append(c.hooks.Tag, hooks...)\n}", "title": "" }, { "docid": "2fbf489ea55b29d40eaf1528b9c6c7df", "score": "0.69334465", "text": "func (c *TagClient) Use(hooks ...Hook) {\n\tc.hooks.Tag = append(c.hooks.Tag, hooks...)\n}", "title": "" }, { "docid": "d3484c58dcf186288e6a94c9dbd42e02", "score": "0.68997866", "text": "func (c *TagsClient) Use(hooks ...Hook) {\n\tc.hooks.Tags = append(c.hooks.Tags, hooks...)\n}", "title": "" }, { "docid": "017c0cec1d13907f577c273aa0b84bf4", "score": "0.68979186", "text": "func (c *LevelClient) Use(hooks ...Hook) {\n\tc.hooks.Level = append(c.hooks.Level, hooks...)\n}", "title": "" }, { "docid": "88c4e003f99615de02826118a5d3be8c", "score": "0.6875531", "text": "func (c *PredicamentClient) Use(hooks ...Hook) {\n\tc.hooks.Predicament = append(c.hooks.Predicament, hooks...)\n}", "title": "" }, { "docid": "65bed50cb033723f012d65f7cc865e41", "score": "0.68031555", "text": "func (c *InputClient) Use(hooks ...Hook) {\n\tc.hooks.Input = append(c.hooks.Input, hooks...)\n}", "title": "" }, { "docid": "f236bb691b38c01954d4a05bb17e2143", "score": "0.6801052", "text": "func (c *WorkflowClient) Use(hooks ...Hook) {\n\tc.hooks.Workflow = append(c.hooks.Workflow, hooks...)\n}", "title": "" }, { "docid": "83756dae10f0452c85bb025dbeddd61a", "score": "0.67414343", "text": "func (c *WidgetClient) Use(hooks ...Hook) {\n\tc.hooks.Widget = append(c.hooks.Widget, hooks...)\n}", "title": "" }, { "docid": "324a9ad43058b5547c6afba3c019e35b", "score": "0.6713214", "text": "func (c *SkillClient) Use(hooks ...Hook) {\n\tc.hooks.Skill = append(c.hooks.Skill, hooks...)\n}", "title": "" }, { "docid": "9eeb754dc23ef9e4123b3f06e8049d10", "score": "0.6677989", "text": "func (c *ExperienceClient) Use(hooks ...Hook) {\n\tc.hooks.Experience = append(c.hooks.Experience, hooks...)\n}", "title": "" }, { "docid": "fbc88733acb137656a86ae261bdf71fd", "score": "0.6669744", "text": "func (c *PatientClient) Use(hooks ...Hook) {\n\tc.hooks.Patient = append(c.hooks.Patient, hooks...)\n}", "title": "" }, { "docid": "fbc88733acb137656a86ae261bdf71fd", "score": "0.6669744", "text": "func (c *PatientClient) Use(hooks ...Hook) {\n\tc.hooks.Patient = append(c.hooks.Patient, hooks...)\n}", "title": "" }, { "docid": "c0a39d0992cb8ff03efd715f13ca59c2", "score": "0.66510373", "text": "func (c *MannerClient) Use(hooks ...Hook) {\n\tc.hooks.Manner = append(c.hooks.Manner, hooks...)\n}", "title": "" }, { "docid": "c85a09077dba63baaef6351db76faeea", "score": "0.66497374", "text": "func (c *TestClient) Use(hooks ...Hook) {\n\tc.hooks.Test = append(c.hooks.Test, hooks...)\n}", "title": "" }, { "docid": "9fd608df7cbc0e38543a5ed36f085273", "score": "0.66397405", "text": "func (c *WorkflowEventsClient) Use(hooks ...Hook) {\n\tc.hooks.WorkflowEvents = append(c.hooks.WorkflowEvents, hooks...)\n}", "title": "" }, { "docid": "e9f8824baa0854b7b1494d56640d2b33", "score": "0.6627383", "text": "func (c *ShortClient) Use(hooks ...Hook) {\n\tc.hooks.Short = append(c.hooks.Short, hooks...)\n}", "title": "" }, { "docid": "8d88fcbe5363d5270348717a18e8bd60", "score": "0.66111606", "text": "func (c *StaffClient) Use(hooks ...Hook) {\n\tc.hooks.Staff = append(c.hooks.Staff, hooks...)\n}", "title": "" }, { "docid": "4f298aec268e7808df0b1a3d7f26777b", "score": "0.6606205", "text": "func (c *CompetenceClient) Use(hooks ...Hook) {\n\tc.hooks.Competence = append(c.hooks.Competence, hooks...)\n}", "title": "" }, { "docid": "2a75aa696e648436f41ba406b2585309", "score": "0.65751237", "text": "func (c *PositionClient) Use(hooks ...Hook) {\n\tc.hooks.Position = append(c.hooks.Position, hooks...)\n}", "title": "" }, { "docid": "309ae681517f24fc98a4385984bc2b78", "score": "0.65723884", "text": "func (c *XxxDemoClient) Use(hooks ...Hook) {\n\tc.hooks.XxxDemo = append(c.hooks.XxxDemo, hooks...)\n}", "title": "" }, { "docid": "b253e9c9d715487f2b0c8512e136d90a", "score": "0.65723294", "text": "func (c *SysLoggingClient) Use(hooks ...Hook) {\n\tc.hooks.SysLogging = append(c.hooks.SysLogging, hooks...)\n}", "title": "" }, { "docid": "3fa4f70a805a313736468ec8f01e6922", "score": "0.65600204", "text": "func (c *DChatClient) Use(hooks ...Hook) {\n\tc.hooks.DChat = append(c.hooks.DChat, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "43aab45098c5eb4884a032621081400d", "score": "0.6555958", "text": "func (c *UserClient) Use(hooks ...Hook) {\n\tc.hooks.User = append(c.hooks.User, hooks...)\n}", "title": "" }, { "docid": "a4260e4991d54f785c3095545e8c1186", "score": "0.6550341", "text": "func (c *MedicineClient) Use(hooks ...Hook) {\n\tc.hooks.Medicine = append(c.hooks.Medicine, hooks...)\n}", "title": "" }, { "docid": "987ccb0a90b1c992ce43faae68d11e8d", "score": "0.6547641", "text": "func (c *WorkflowInstanceClient) Use(hooks ...Hook) {\n\tc.hooks.WorkflowInstance = append(c.hooks.WorkflowInstance, hooks...)\n}", "title": "" }, { "docid": "3967f3b2601219dc2700b02d3b86d967", "score": "0.6547523", "text": "func (c *StockClient) Use(hooks ...Hook) {\n\tc.hooks.Stock = append(c.hooks.Stock, hooks...)\n}", "title": "" }, { "docid": "8ec854abab80b055af680b05b90a39b4", "score": "0.65449756", "text": "func (c *DRoomClient) Use(hooks ...Hook) {\n\tc.hooks.DRoom = append(c.hooks.DRoom, hooks...)\n}", "title": "" }, { "docid": "c89982927b447defa749656f8ab13f9a", "score": "0.6532489", "text": "func (c *PersonClient) Use(hooks ...Hook) {\n\tc.hooks.Person = append(c.hooks.Person, hooks...)\n}", "title": "" }, { "docid": "dd0ef68e6077c7a7bb2033bcdb8cd185", "score": "0.6521666", "text": "func (c *SysJwtBlockClient) Use(hooks ...Hook) {\n\tc.hooks.SysJwtBlock = append(c.hooks.SysJwtBlock, hooks...)\n}", "title": "" }, { "docid": "36ba1d73277e008c15f4787ca2a3a6ab", "score": "0.6517627", "text": "func (c *ForumClient) Use(hooks ...Hook) {\n\tc.hooks.Forum = append(c.hooks.Forum, hooks...)\n}", "title": "" }, { "docid": "f6232f36dbc6c33af7a319b6c03daa43", "score": "0.6515559", "text": "func (c *RecruitmentClient) Use(hooks ...Hook) {\n\tc.hooks.Recruitment = append(c.hooks.Recruitment, hooks...)\n}", "title": "" }, { "docid": "d85649fae460ce288dc24c2afba22c31", "score": "0.6503351", "text": "func (c *DrugAllergyClient) Use(hooks ...Hook) {\n\tc.hooks.DrugAllergy = append(c.hooks.DrugAllergy, hooks...)\n}", "title": "" }, { "docid": "d376b6b6357070d040cbc7549c347944", "score": "0.64984936", "text": "func (c *QuestionClient) Use(hooks ...Hook) {\n\tc.hooks.Question = append(c.hooks.Question, hooks...)\n}", "title": "" }, { "docid": "8c62e13c9108d92cdc74a114323c6ef8", "score": "0.64740473", "text": "func (c *GenderClient) Use(hooks ...Hook) {\n\tc.hooks.Gender = append(c.hooks.Gender, hooks...)\n}", "title": "" }, { "docid": "4bf10dd769a8d17af5364a86292f770e", "score": "0.64704376", "text": "func (c *AnswerClient) Use(hooks ...Hook) {\n\tc.hooks.Answer = append(c.hooks.Answer, hooks...)\n}", "title": "" }, { "docid": "7d12f2e87f2899887268b627214e65f5", "score": "0.6465586", "text": "func (c *SysMenuClient) Use(hooks ...Hook) {\n\tc.hooks.SysMenu = append(c.hooks.SysMenu, hooks...)\n}", "title": "" }, { "docid": "b38d2cf66362cea6d2573429027182cc", "score": "0.64595133", "text": "func (c *TypeproductClient) Use(hooks ...Hook) {\n\tc.hooks.Typeproduct = append(c.hooks.Typeproduct, hooks...)\n}", "title": "" }, { "docid": "d8d9a6f69e19f3966bfeb5a5efee256d", "score": "0.6459257", "text": "func (c *DoctorClient) Use(hooks ...Hook) {\n\tc.hooks.Doctor = append(c.hooks.Doctor, hooks...)\n}", "title": "" }, { "docid": "6968b91f415c596aedfa10394f0dc451", "score": "0.64454645", "text": "func (c *EmployeeClient) Use(hooks ...Hook) {\n\tc.hooks.Employee = append(c.hooks.Employee, hooks...)\n}", "title": "" }, { "docid": "6968b91f415c596aedfa10394f0dc451", "score": "0.64454645", "text": "func (c *EmployeeClient) Use(hooks ...Hook) {\n\tc.hooks.Employee = append(c.hooks.Employee, hooks...)\n}", "title": "" }, { "docid": "6968b91f415c596aedfa10394f0dc451", "score": "0.64454645", "text": "func (c *EmployeeClient) Use(hooks ...Hook) {\n\tc.hooks.Employee = append(c.hooks.Employee, hooks...)\n}", "title": "" }, { "docid": "e3c9883fd25624d555ef23672e7e7d4a", "score": "0.64427906", "text": "func (c *WidgetTypeClient) Use(hooks ...Hook) {\n\tc.hooks.WidgetType = append(c.hooks.WidgetType, hooks...)\n}", "title": "" }, { "docid": "b5227a2d61847291e67e9f8c2959f4ba", "score": "0.64425266", "text": "func (c *AchievementClient) Use(hooks ...Hook) {\n\tc.hooks.Achievement = append(c.hooks.Achievement, hooks...)\n}", "title": "" }, { "docid": "49016e72981586bdd2f8699c788213d1", "score": "0.6441809", "text": "func (c *SourceClient) Use(hooks ...Hook) {\n\tc.hooks.Source = append(c.hooks.Source, hooks...)\n}", "title": "" }, { "docid": "8686e5bcb49a613ee414a004b5a84612", "score": "0.6432521", "text": "func (c *UserTypeClient) Use(hooks ...Hook) {\n\tc.hooks.UserType = append(c.hooks.UserType, hooks...)\n}", "title": "" }, { "docid": "479a3c50a13b53e9817b1645aa614b0d", "score": "0.64292204", "text": "func (c *RestaurantClient) Use(hooks ...Hook) {\n\tc.hooks.Restaurant = append(c.hooks.Restaurant, hooks...)\n}", "title": "" }, { "docid": "e0cf37f0b46635c9aea98c6c960ea3a1", "score": "0.64163965", "text": "func (c *ProductClient) Use(hooks ...Hook) {\n\tc.hooks.Product = append(c.hooks.Product, hooks...)\n}", "title": "" }, { "docid": "e0cf37f0b46635c9aea98c6c960ea3a1", "score": "0.64163965", "text": "func (c *ProductClient) Use(hooks ...Hook) {\n\tc.hooks.Product = append(c.hooks.Product, hooks...)\n}", "title": "" }, { "docid": "23dac6ca3928a940c2b9482939453339", "score": "0.6415308", "text": "func (c *ServicesClient) Use(hooks ...Hook) {\n\tc.hooks.Services = append(c.hooks.Services, hooks...)\n}", "title": "" }, { "docid": "56d8572beab5bad0339676d6d2eea502", "score": "0.64102507", "text": "func (c *SalaryClient) Use(hooks ...Hook) {\n\tc.hooks.Salary = append(c.hooks.Salary, hooks...)\n}", "title": "" }, { "docid": "04378384bb04903ea442056cd6588839", "score": "0.63884795", "text": "func (c *SysUserClient) Use(hooks ...Hook) {\n\tc.hooks.SysUser = append(c.hooks.SysUser, hooks...)\n}", "title": "" }, { "docid": "d23b42bfe621a83a4fe60a0925a70945", "score": "0.63872975", "text": "func (c *PostClient) Use(hooks ...Hook) {\n\tc.hooks.Post = append(c.hooks.Post, hooks...)\n}", "title": "" }, { "docid": "d23b42bfe621a83a4fe60a0925a70945", "score": "0.63872975", "text": "func (c *PostClient) Use(hooks ...Hook) {\n\tc.hooks.Post = append(c.hooks.Post, hooks...)\n}", "title": "" }, { "docid": "d5f8752578d72f2c5242896b155572ad", "score": "0.63858813", "text": "func (c *SFModelClient) Use(hooks ...Hook) {\n\tc.hooks.SFModel = append(c.hooks.SFModel, hooks...)\n}", "title": "" }, { "docid": "26b791767bfbf9fe31f3c40ab872368c", "score": "0.6384425", "text": "func (c *DUserClient) Use(hooks ...Hook) {\n\tc.hooks.DUser = append(c.hooks.DUser, hooks...)\n}", "title": "" }, { "docid": "b4699db22978c8f2afc1ce469e63daff", "score": "0.6372374", "text": "func (c *SysMenuActionClient) Use(hooks ...Hook) {\n\tc.hooks.SysMenuAction = append(c.hooks.SysMenuAction, hooks...)\n}", "title": "" }, { "docid": "e451de1e91f79f433b2315d508cdcc12", "score": "0.636665", "text": "func (c *Client) Use(hooks ...Hook) {\n\tc.Comments.Use(hooks...)\n\tc.Experience.Use(hooks...)\n\tc.Tags.Use(hooks...)\n\tc.User.Use(hooks...)\n}", "title": "" }, { "docid": "93088a116ed6e0ca90a857f10302d925", "score": "0.6361501", "text": "func (c *Client) Use(hooks ...Hook) {\n\tc.Achievement.Use(hooks...)\n\tc.Company.Use(hooks...)\n\tc.CompanyUser.Use(hooks...)\n\tc.Developer.Use(hooks...)\n\tc.Recruitment.Use(hooks...)\n\tc.User.Use(hooks...)\n}", "title": "" }, { "docid": "810525d4da772c604ba9edae680a6d06", "score": "0.6343126", "text": "func (c *OrderproductClient) Use(hooks ...Hook) {\n\tc.hooks.Orderproduct = append(c.hooks.Orderproduct, hooks...)\n}", "title": "" }, { "docid": "7f6b4f9ef68d0098ce0caed7c1d51738", "score": "0.6329777", "text": "func (c *SysDictClient) Use(hooks ...Hook) {\n\tc.hooks.SysDict = append(c.hooks.SysDict, hooks...)\n}", "title": "" }, { "docid": "8e8fddc3be4bb1feab103302b9a5737c", "score": "0.63175744", "text": "func (c *DomainClient) Use(hooks ...Hook) {\n\tc.hooks.Domain = append(c.hooks.Domain, hooks...)\n}", "title": "" }, { "docid": "75887369ec3a9427f2102947188d0828", "score": "0.6303231", "text": "func (c *OrderClient) Use(hooks ...Hook) {\n\tc.hooks.Order = append(c.hooks.Order, hooks...)\n}", "title": "" }, { "docid": "91bf0539f5529d5f438ec71f5fd2c071", "score": "0.6294398", "text": "func (c *ContagiousClient) Use(hooks ...Hook) {\n\tc.hooks.Contagious = append(c.hooks.Contagious, hooks...)\n}", "title": "" }, { "docid": "9d3011404d5032bc34c87ad4bf0c845c", "score": "0.62898237", "text": "func (c *CommentClient) Use(hooks ...Hook) {\n\tc.hooks.Comment = append(c.hooks.Comment, hooks...)\n}", "title": "" }, { "docid": "9d3011404d5032bc34c87ad4bf0c845c", "score": "0.62898237", "text": "func (c *CommentClient) Use(hooks ...Hook) {\n\tc.hooks.Comment = append(c.hooks.Comment, hooks...)\n}", "title": "" }, { "docid": "a5cc5b90f7525aa9b28434a818d050ab", "score": "0.6287594", "text": "func (c *GiveawayClient) Use(hooks ...Hook) {\n\tc.hooks.Giveaway = append(c.hooks.Giveaway, hooks...)\n}", "title": "" }, { "docid": "33d63a1dcd2d9cbccf76af357b873b2a", "score": "0.6284602", "text": "func (c *PaymentchannelClient) Use(hooks ...Hook) {\n\tc.hooks.Paymentchannel = append(c.hooks.Paymentchannel, hooks...)\n}", "title": "" }, { "docid": "16c1e0545c582fe3d5a2a0cc26d3f1d3", "score": "0.6268777", "text": "func (c *GlobalsettingsClient) Use(hooks ...Hook) {\n\tc.hooks.Globalsettings = append(c.hooks.Globalsettings, hooks...)\n}", "title": "" }, { "docid": "991d0c1ea8c562c7c1bba025a6fa0831", "score": "0.6263217", "text": "func (c *SysDictItemClient) Use(hooks ...Hook) {\n\tc.hooks.SysDictItem = append(c.hooks.SysDictItem, hooks...)\n}", "title": "" }, { "docid": "0bd0915c3cc3c89e751e5bb408954acc", "score": "0.6257403", "text": "func (c *ArticleClient) Use(hooks ...Hook) {\n\tc.hooks.Article = append(c.hooks.Article, hooks...)\n}", "title": "" }, { "docid": "b53c3fcfc175a8ea36165e5ef952def7", "score": "0.6257207", "text": "func (c *Client) Use(hooks ...Hook) {\n\tc.Tag.Use(hooks...)\n\tc.User.Use(hooks...)\n\tc.Video.Use(hooks...)\n}", "title": "" }, { "docid": "9d105ed54bee6a5a3bc1fbd50ef93bba", "score": "0.6255164", "text": "func (c *StartWorkClient) Use(hooks ...Hook) {\n\tc.hooks.StartWork = append(c.hooks.StartWork, hooks...)\n}", "title": "" }, { "docid": "a9b35c3f3c81ac7aefe52b46bdcde15c", "score": "0.6251874", "text": "func (s *Stack) Use(f ...Middleware) *Stack {\n\tstack := s\n\n\tfor _, m := range f {\n\t\tif m != nil {\n\t\t\tstack = &Stack{\n\t\t\t\tmiddleware: m,\n\t\t\t\tprevious: stack,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn stack\n}", "title": "" }, { "docid": "e6f2180cd35813e735e03b32b3c55372", "score": "0.62435925", "text": "func (c *VideoClient) Use(hooks ...Hook) {\n\tc.hooks.Video = append(c.hooks.Video, hooks...)\n}", "title": "" }, { "docid": "2dc287bb792f64d0da7bd4b59d7f18ad", "score": "0.62407047", "text": "func (c *CommentsClient) Use(hooks ...Hook) {\n\tc.hooks.Comments = append(c.hooks.Comments, hooks...)\n}", "title": "" }, { "docid": "e5429b621b0e8b7534c83a2393023137", "score": "0.6219593", "text": "func (c *StatuscarClient) Use(hooks ...Hook) {\n\tc.hooks.Statuscar = append(c.hooks.Statuscar, hooks...)\n}", "title": "" }, { "docid": "7ac1833c8f98be6cfa3ea7e904ffcd60", "score": "0.6196642", "text": "func (c *AreaClient) Use(hooks ...Hook) {\n\tc.hooks.Area = append(c.hooks.Area, hooks...)\n}", "title": "" }, { "docid": "7ac1833c8f98be6cfa3ea7e904ffcd60", "score": "0.6196642", "text": "func (c *AreaClient) Use(hooks ...Hook) {\n\tc.hooks.Area = append(c.hooks.Area, hooks...)\n}", "title": "" }, { "docid": "e9a19f8ded023545aded446ff842ae78", "score": "0.61915946", "text": "func Use(f ...Middleware) *Stack {\n\tvar stack *Stack\n\n\tfor _, m := range f {\n\t\tif m != nil {\n\t\t\tstack = &Stack{\n\t\t\t\tmiddleware: m,\n\t\t\t\tprevious: stack,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn stack\n}", "title": "" }, { "docid": "7e16b6b3e32f713a7b83053ac86d760a", "score": "0.618796", "text": "func (c *CarClient) Use(hooks ...Hook) {\n\tc.hooks.Car = append(c.hooks.Car, hooks...)\n}", "title": "" }, { "docid": "602f1a9924f0ef6723c2d250e644f63e", "score": "0.61872435", "text": "func (c *Client) Use(hooks ...Hook) {\n\tc.Widget.Use(hooks...)\n\tc.WidgetType.Use(hooks...)\n}", "title": "" }, { "docid": "d5d95254817c3df1655d8019a1bd9db5", "score": "0.61782557", "text": "func (c *DiscountClient) Use(hooks ...Hook) {\n\tc.hooks.Discount = append(c.hooks.Discount, hooks...)\n}", "title": "" }, { "docid": "f6d168e2271e5eba031bf19e8678fb90", "score": "0.6177323", "text": "func (c *CloudEventsClient) Use(hooks ...Hook) {\n\tc.hooks.CloudEvents = append(c.hooks.CloudEvents, hooks...)\n}", "title": "" } ]
d6f86d7796e18ca3ae063f62a6fad578
Sort sorts slice of UpdateStoryID.
[ { "docid": "5b3537c89dc600a2f00230a92d213110", "score": "0.7570037", "text": "func (s UpdateStoryIDArray) Sort(less func(a, b UpdateStoryID) bool) UpdateStoryIDArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" } ]
[ { "docid": "e5c0c328bb949b8fc0ecb1511111ba4b", "score": "0.70061433", "text": "func (s UpdateStoryArray) Sort(less func(a, b UpdateStory) bool) UpdateStoryArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "8a8ae4d127e37377271d876249a65ef3", "score": "0.65977335", "text": "func (resp *updateResponse) sort() {\n\tsort.Sort(byID(resp.Update))\n}", "title": "" }, { "docid": "a734815745bbdf363f4fe0f1556bc735", "score": "0.6554112", "text": "func (s UpdateStoryIDArray) SortByID() UpdateStoryIDArray {\n\treturn s.Sort(func(a, b UpdateStoryID) bool {\n\t\treturn a.GetID() < b.GetID()\n\t})\n}", "title": "" }, { "docid": "abd68ea4d4210f957c992269b4fa78eb", "score": "0.65412366", "text": "func (s UpdateStoryIDArray) SortStable(less func(a, b UpdateStoryID) bool) UpdateStoryIDArray {\n\tsort.SliceStable(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "4e43b45af67892f08ffc0ebd8f957ace", "score": "0.65102696", "text": "func (s UpdateStoryIDArray) SortStableByID() UpdateStoryIDArray {\n\treturn s.SortStable(func(a, b UpdateStoryID) bool {\n\t\treturn a.GetID() < b.GetID()\n\t})\n}", "title": "" }, { "docid": "66b9473232838b4d078c077dc79a5ac4", "score": "0.62668115", "text": "func (p IDSlice) Sort() { sort.Sort(p) }", "title": "" }, { "docid": "619b96576706fc7b8c9dfa223b1884f4", "score": "0.6252984", "text": "func (s UpdateReadStoriesArray) Sort(less func(a, b UpdateReadStories) bool) UpdateReadStoriesArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "f5d3b12f1d5ba02151ad08720642b8df", "score": "0.6111381", "text": "func (x int64Slice) Sort() { sort.Sort(x) }", "title": "" }, { "docid": "99d06c5879124928698e79a49a8af619", "score": "0.6106647", "text": "func (s UpdateMessageIDArray) Sort(less func(a, b UpdateMessageID) bool) UpdateMessageIDArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "66440f4109abee5415adc0626b4677c6", "score": "0.60830635", "text": "func (s UpdateStoriesStealthModeArray) Sort(less func(a, b UpdateStoriesStealthMode) bool) UpdateStoriesStealthModeArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "4b6288ea70ec867116dc33ac4f7a3b06", "score": "0.6060343", "text": "func (p int64Slice) Sort() { sort.Sort(p) }", "title": "" }, { "docid": "c6dde953fd819d13c452a6d315e2b5e8", "score": "0.6053805", "text": "func (h *HistoricResults) sort() {\n\tsort.Slice(h.Commits, func(i, j int) bool {\n\t\tif h.Commits[i].CommitTime.Before(h.Commits[j].CommitTime) {\n\t\t\treturn true\n\t\t}\n\t\tif h.Commits[j].CommitTime.Before(h.Commits[i].CommitTime) {\n\t\t\treturn false\n\t\t}\n\t\treturn h.Commits[i].CommitDescription < h.Commits[j].CommitDescription\n\t})\n}", "title": "" }, { "docid": "88379be03652fb679d4616d798a17475", "score": "0.6004278", "text": "func (s UpdatePrivacyArray) Sort(less func(a, b UpdatePrivacy) bool) UpdatePrivacyArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "526bf2210b13b534727ae51baf9fa127", "score": "0.59977496", "text": "func (s UpdateDeleteScheduledMessagesArray) Sort(less func(a, b UpdateDeleteScheduledMessages) bool) UpdateDeleteScheduledMessagesArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "a47785f38ce67295980a8d957d7b5388", "score": "0.5995774", "text": "func (s UpdateReadHistoryOutboxArray) Sort(less func(a, b UpdateReadHistoryOutbox) bool) UpdateReadHistoryOutboxArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "44f7dbd6f7103de2da66e248493c51bd", "score": "0.59822345", "text": "func (s UpdateStoryArray) SortStable(less func(a, b UpdateStory) bool) UpdateStoryArray {\n\tsort.SliceStable(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "b20c3f2fc3695bfc4d381a0fb59066b9", "score": "0.595132", "text": "func (s UpdateSentStoryReactionArray) Sort(less func(a, b UpdateSentStoryReaction) bool) UpdateSentStoryReactionArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "e58e876b25d35bf6a735909780013494", "score": "0.5951083", "text": "func (s UpdateReadChannelDiscussionOutboxArray) Sort(less func(a, b UpdateReadChannelDiscussionOutbox) bool) UpdateReadChannelDiscussionOutboxArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "9d87ee1448719df2d70971229b4fb6d0", "score": "0.592833", "text": "func (s UpdateChatArray) Sort(less func(a, b UpdateChat) bool) UpdateChatArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "bce37b1ecc619bad4d964d9ad7b98eb3", "score": "0.5926278", "text": "func (s HelpTermsOfServiceUpdateArray) Sort(less func(a, b HelpTermsOfServiceUpdate) bool) HelpTermsOfServiceUpdateArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "8d830a6f015d19daedf1ab1f2e9dfac0", "score": "0.5924458", "text": "func (s UpdateChatParticipantArray) Sort(less func(a, b UpdateChatParticipant) bool) UpdateChatParticipantArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "8eecbab6646d1c38ec472e400fa1f13a", "score": "0.5895925", "text": "func (s UpdateReadChannelDiscussionInboxArray) Sort(less func(a, b UpdateReadChannelDiscussionInbox) bool) UpdateReadChannelDiscussionInboxArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "920a88d677183a146d0163702ed70688", "score": "0.5869409", "text": "func (a *Archive) sort() {\n\tsort.SliceStable(a.chronological, func(i, j int) bool {\n\t\treturn a.chronological[i].Timestamp < a.chronological[j].Timestamp\n\t})\n}", "title": "" }, { "docid": "63538f370c6435e015197a4d198c1f06", "score": "0.586897", "text": "func (s UpdateGeoLiveViewedArray) Sort(less func(a, b UpdateGeoLiveViewed) bool) UpdateGeoLiveViewedArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "31d2be5c963785dac3dd06f48b331472", "score": "0.58642244", "text": "func (s UpdateReadHistoryInboxArray) Sort(less func(a, b UpdateReadHistoryInbox) bool) UpdateReadHistoryInboxArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "cd9d48ac23361634d410e9a7314c5af6", "score": "0.5850649", "text": "func (s UpdateDialogUnreadMarkArray) Sort(less func(a, b UpdateDialogUnreadMark) bool) UpdateDialogUnreadMarkArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "8b3747bccceb157a82e7c267e05f7840", "score": "0.5836406", "text": "func (s UpdateChatParticipantDeleteArray) Sort(less func(a, b UpdateChatParticipantDelete) bool) UpdateChatParticipantDeleteArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "2daff4e147cab2844558867902134bc2", "score": "0.58303255", "text": "func (s UpdateChatParticipantsArray) Sort(less func(a, b UpdateChatParticipants) bool) UpdateChatParticipantsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "14f8f2e64c155e1a79f11566b9d1cb6b", "score": "0.582946", "text": "func (s UpdatePinnedMessagesArray) Sort(less func(a, b UpdatePinnedMessages) bool) UpdatePinnedMessagesArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "de320487e0ec4fa24a141b17aaa00e19", "score": "0.5806528", "text": "func (s UpdateReadMessagesContentsArray) Sort(less func(a, b UpdateReadMessagesContents) bool) UpdateReadMessagesContentsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "dfd7e4f08d476bc4d2bf5aa4c5cc9f14", "score": "0.58024734", "text": "func (s UpdateChannelPinnedTopicArray) Sort(less func(a, b UpdateChannelPinnedTopic) bool) UpdateChannelPinnedTopicArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "2a5d3c75f73df9d911d34081ccf70905", "score": "0.5795356", "text": "func (s UpdateWebPageArray) Sort(less func(a, b UpdateWebPage) bool) UpdateWebPageArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "bdd445d7a828baa366cb5adc23586635", "score": "0.57916284", "text": "func (s UpdateChannelPinnedTopicsArray) Sort(less func(a, b UpdateChannelPinnedTopics) bool) UpdateChannelPinnedTopicsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "73404b9609bd3ec087dba3467b9de1cf", "score": "0.5790984", "text": "func (s UpdatePendingJoinRequestsArray) Sort(less func(a, b UpdatePendingJoinRequests) bool) UpdatePendingJoinRequestsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "5df630b4d44564186cbd2175ebcfc957", "score": "0.5788444", "text": "func (s UpdateDraftMessageArray) Sort(less func(a, b UpdateDraftMessage) bool) UpdateDraftMessageArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "e0aae7431eb78541b39e98772bf334c6", "score": "0.5777689", "text": "func (s UpdatePeerLocatedArray) Sort(less func(a, b UpdatePeerLocated) bool) UpdatePeerLocatedArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "bf2e3be21d5b4ff2425b2a8acaf33700", "score": "0.5742065", "text": "func (s UpdateChannelWebPageArray) Sort(less func(a, b UpdateChannelWebPage) bool) UpdateChannelWebPageArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "40aa4496bd1c9139f42ac6fcc54ef348", "score": "0.57395685", "text": "func (s UpdateNewScheduledMessageArray) Sort(less func(a, b UpdateNewScheduledMessage) bool) UpdateNewScheduledMessageArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "49fe7afc9e9cbc1916c67a758716e202", "score": "0.57368535", "text": "func (s UpdateDialogPinnedArray) Sort(less func(a, b UpdateDialogPinned) bool) UpdateDialogPinnedArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "334502ecdfa2a7cb8c4ddc4ebe8c0692", "score": "0.5736477", "text": "func (sra ShardReferenceArray) Sort() { sort.Sort(sra) }", "title": "" }, { "docid": "12b342d0cd3406f9f818babf8e5b612e", "score": "0.57231635", "text": "func SortHits(hits []*Hit) {\n\tsort.Slice(hits, func(i, j int) bool {\n\t\treturn hits[i].CreatedAt.Before(hits[j].CreatedAt)\n\t})\n}", "title": "" }, { "docid": "9ba259a2246b895b3fc05ee31eb0e035", "score": "0.5717652", "text": "func (r *CommitResults) sort() {\n\tsort.Slice(r.Benchmarks, func(i, j int) bool {\n\t\treturn r.Benchmarks[i].Name < r.Benchmarks[j].Name\n\t})\n}", "title": "" }, { "docid": "f97ae4c19c711e595b70a7e059e3fa72", "score": "0.5714632", "text": "func (s UpdateDeleteMessagesArray) Sort(less func(a, b UpdateDeleteMessages) bool) UpdateDeleteMessagesArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "b7f615757a1f4cd70e8b4c6b66e84201", "score": "0.5714196", "text": "func (s UpdateChannelReadMessagesContentsArray) Sort(less func(a, b UpdateChannelReadMessagesContents) bool) UpdateChannelReadMessagesContentsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "dda11ebabe878e461d70f432dae29b64", "score": "0.570682", "text": "func sortDateDesc(list []*Page) {\n\tsort.Slice(list, func(i, j int) bool {\n\t\treturn list[j].DateUpdated.Before(list[i].DateUpdated)\n\t})\n}", "title": "" }, { "docid": "0c973bcc891cce1a3d71b3999f08c48a", "score": "0.5706182", "text": "func (s UpdateChannelParticipantArray) Sort(less func(a, b UpdateChannelParticipant) bool) UpdateChannelParticipantArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "0f3a98245c9fe5b228ad8b681c69b23c", "score": "0.567625", "text": "func (s UpdateBotWebhookJSONQueryArray) Sort(less func(a, b UpdateBotWebhookJSONQuery) bool) UpdateBotWebhookJSONQueryArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "4aa4ac36389197d056547efa175b8726", "score": "0.5673998", "text": "func (s UpdateReadChannelInboxArray) Sort(less func(a, b UpdateReadChannelInbox) bool) UpdateReadChannelInboxArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "532aeb0cf59db79f46ace28f3598d885", "score": "0.56733024", "text": "func (s UpdateMessageIDArray) SortStable(less func(a, b UpdateMessageID) bool) UpdateMessageIDArray {\n\tsort.SliceStable(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "53c58315c7300cdf40b9ee3193a54545", "score": "0.5672951", "text": "func (s UpdatePeerHistoryTTLArray) Sort(less func(a, b UpdatePeerHistoryTTL) bool) UpdatePeerHistoryTTLArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "1e47bffbce541a5efb958521c4cbcaf0", "score": "0.56688994", "text": "func (s HelpTermsOfServiceUpdateEmptyArray) Sort(less func(a, b HelpTermsOfServiceUpdateEmpty) bool) HelpTermsOfServiceUpdateEmptyArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "a6277b3364044659ac9f2847b04b3956", "score": "0.5659011", "text": "func (s UpdateNotifySettingsArray) Sort(less func(a, b UpdateNotifySettings) bool) UpdateNotifySettingsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "e09b95e5b803b52dba3287884019c297", "score": "0.5650986", "text": "func (s UpdatePinnedDialogsArray) Sort(less func(a, b UpdatePinnedDialogs) bool) UpdatePinnedDialogsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "903c33a528182b79aa3b2cd4b1fdde97", "score": "0.56481606", "text": "func (s UpdateMessagePollArray) Sort(less func(a, b UpdateMessagePoll) bool) UpdateMessagePollArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "e540c7742b71964009af3ef4291d342b", "score": "0.5647678", "text": "func (s UpdateChannelArray) Sort(less func(a, b UpdateChannel) bool) UpdateChannelArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "21d1e8886ee07b16460e7638e1c9ada8", "score": "0.5633384", "text": "func (s UpdateServiceNotificationArray) Sort(less func(a, b UpdateServiceNotification) bool) UpdateServiceNotificationArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "90a1eb17c51679af68101d3063da84f1", "score": "0.56333345", "text": "func (s UpdateBotInlineQueryArray) Sort(less func(a, b UpdateBotInlineQuery) bool) UpdateBotInlineQueryArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "7bc6f337f9988e53eb22b207ff1991e0", "score": "0.5630885", "text": "func (s UpdateBotWebhookJSONArray) Sort(less func(a, b UpdateBotWebhookJSON) bool) UpdateBotWebhookJSONArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "bf25b3c893e4808afaecf6e89c1694c4", "score": "0.56276286", "text": "func (s Int64Slice) Sort() {\n\tsort.Sort(s)\n}", "title": "" }, { "docid": "fdba132e31fd0a1d0a4ce44efbccef48", "score": "0.5621434", "text": "func (s UpdatePinnedChannelMessagesArray) Sort(less func(a, b UpdatePinnedChannelMessages) bool) UpdatePinnedChannelMessagesArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "88d79e01df082308c953b3e88e3b8a7d", "score": "0.56188774", "text": "func SortByID(s []Item) {\n\tsort.Sort(ByID(s))\n}", "title": "" }, { "docid": "2851b591c0dcace288202a94c707cb04", "score": "0.56138647", "text": "func (s UpdateChannelTooLongArray) Sort(less func(a, b UpdateChannelTooLong) bool) UpdateChannelTooLongArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "3772036fcebff23a5c452f5dc1953c94", "score": "0.5611081", "text": "func (s HelpTermsOfServiceUpdateClassArray) Sort(less func(a, b HelpTermsOfServiceUpdateClass) bool) HelpTermsOfServiceUpdateClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "1ab54ffb7785bf6e1f8c7468637b3b18", "score": "0.5605185", "text": "func (s UpdateChatParticipantAdminArray) Sort(less func(a, b UpdateChatParticipantAdmin) bool) UpdateChatParticipantAdminArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "e51fc7db1292d431383a1c3a358fdb78", "score": "0.560164", "text": "func (s UpdateChatParticipantAddArray) Sort(less func(a, b UpdateChatParticipantAdd) bool) UpdateChatParticipantAddArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "f111f57ba69da17d4fe98e0f25524cad", "score": "0.5599522", "text": "func (s UpdateStickerSetsArray) Sort(less func(a, b UpdateStickerSets) bool) UpdateStickerSetsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "5839432829bc3f848ba78e3f447e029a", "score": "0.55987084", "text": "func (s UpdateMessagePollVoteArray) Sort(less func(a, b UpdateMessagePollVote) bool) UpdateMessagePollVoteArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "899420502556626274bb68abaaa1aa0b", "score": "0.5593838", "text": "func (s UpdateReadChannelOutboxArray) Sort(less func(a, b UpdateReadChannelOutbox) bool) UpdateReadChannelOutboxArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "89d3fa1486d260e84f60eddbf9af07d9", "score": "0.5593827", "text": "func (s *Uint32Slicer) Sort() {\n\tsort.Slice(s.slice, func(i, j int) bool { return s.slice[i] < s.slice[j] })\n}", "title": "" }, { "docid": "5d968c8dd5a8a4f25765e40daef553f4", "score": "0.5591692", "text": "func (s UpdateEncryptedChatTypingArray) Sort(less func(a, b UpdateEncryptedChatTyping) bool) UpdateEncryptedChatTypingArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "8255cfa87acc673fb2b1376a35a1c868", "score": "0.55903876", "text": "func (s UpdateDCOptionsArray) Sort(less func(a, b UpdateDCOptions) bool) UpdateDCOptionsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "ef7fa070c7f990c07b6e46ff061a923c", "score": "0.5587694", "text": "func (s UpdateStickerSetsOrderArray) Sort(less func(a, b UpdateStickerSetsOrder) bool) UpdateStickerSetsOrderArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "63df100b6a005b6dfe6ae424cdac3cf4", "score": "0.55752355", "text": "func (s MessageReplyStoryHeaderArray) Sort(less func(a, b MessageReplyStoryHeader) bool) MessageReplyStoryHeaderArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "4857499a252089448d156fda0f487060", "score": "0.5568633", "text": "func (s UpdateChannelMessageViewsArray) Sort(less func(a, b UpdateChannelMessageViews) bool) UpdateChannelMessageViewsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "4d34fbfd1ca5386202505009687fb8ec", "score": "0.55685943", "text": "func (s UpdateEditMessageArray) Sort(less func(a, b UpdateEditMessage) bool) UpdateEditMessageArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "cea5abdc816ecf2ce0473dfa6d620ad5", "score": "0.5562015", "text": "func (s UpdateNewStickerSetArray) Sort(less func(a, b UpdateNewStickerSet) bool) UpdateNewStickerSetArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "29f38b00da49469aa0e0e91390ec99a0", "score": "0.5560932", "text": "func (s UpdateEditChannelMessageArray) Sort(less func(a, b UpdateEditChannelMessage) bool) UpdateEditChannelMessageArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "ae9a18062d5ae04c790f72dc03ae62bc", "score": "0.5559409", "text": "func (s UpdateLangPackArray) Sort(less func(a, b UpdateLangPack) bool) UpdateLangPackArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "e8d0f7d93fef186977008df80aa20f09", "score": "0.5546171", "text": "func (s UpdateBotCommandsArray) Sort(less func(a, b UpdateBotCommands) bool) UpdateBotCommandsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "199b4cf1b7d1194224b3edaa88d5fe56", "score": "0.5545819", "text": "func (s UpdateMessageReactionsArray) Sort(less func(a, b UpdateMessageReactions) bool) UpdateMessageReactionsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "5fb239150bc7df80a4972738c680b687", "score": "0.55304146", "text": "func (sa SrvShardArray) Sort() { sort.Sort(sa) }", "title": "" }, { "docid": "ad85c122ff6d36e150a169de4a8f62ba", "score": "0.552362", "text": "func (s UpdateEncryptedMessagesReadArray) Sort(less func(a, b UpdateEncryptedMessagesRead) bool) UpdateEncryptedMessagesReadArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "177020a1304a67b17e0f9c00f3c0cb2c", "score": "0.5521936", "text": "func (s UpdateInlineBotCallbackQueryArray) Sort(less func(a, b UpdateInlineBotCallbackQuery) bool) UpdateInlineBotCallbackQueryArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "099e1e1696311cefd86943eaf47d259d", "score": "0.5510141", "text": "func (s UpdatePeerBlockedArray) Sort(less func(a, b UpdatePeerBlocked) bool) UpdatePeerBlockedArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "0998e8c99a694c172f538df7361b1437", "score": "0.55076915", "text": "func (s MessageReplyStoryHeaderArray) SortStable(less func(a, b MessageReplyStoryHeader) bool) MessageReplyStoryHeaderArray {\n\tsort.SliceStable(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "7fdc1b0e7376ff5662cc5f28b7ac9d8c", "score": "0.5505171", "text": "func (tv *TableView) SortSliceAction(fldIdx int) {\n\toswin.TheApp.Cursor(tv.ParentWindow().OSWin).Push(cursor.Wait)\n\tdefer oswin.TheApp.Cursor(tv.ParentWindow().OSWin).Pop()\n\n\twupdt := tv.TopUpdateStart()\n\tdefer tv.TopUpdateEnd(wupdt)\n\n\tupdt := tv.UpdateStart()\n\tsgh := tv.SliceHeader()\n\tsgh.SetFullReRender()\n\t_, idxOff := tv.RowWidgetNs()\n\n\tascending := true\n\n\tfor fli := 0; fli < tv.NCols; fli++ {\n\t\thdr := sgh.Child(idxOff + fli).(*gi.Action)\n\t\tif fli == fldIdx {\n\t\t\tif tv.SortIdx == fli {\n\t\t\t\ttv.SortDesc = !tv.SortDesc\n\t\t\t\tascending = !tv.SortDesc\n\t\t\t} else {\n\t\t\t\ttv.SortDesc = false\n\t\t\t}\n\t\t\tif ascending {\n\t\t\t\thdr.SetIcon(\"wedge-up\")\n\t\t\t} else {\n\t\t\t\thdr.SetIcon(\"wedge-down\")\n\t\t\t}\n\t\t} else {\n\t\t\thdr.SetIcon(\"none\")\n\t\t}\n\t}\n\n\ttv.SortIdx = fldIdx\n\tif fldIdx == -1 {\n\t\ttv.Table.SortIdxs()\n\t} else {\n\t\ttv.Table.SortCol(tv.SortIdx, !tv.SortDesc)\n\t}\n\ttv.UpdateSliceGrid()\n\ttv.UpdateEnd(updt)\n}", "title": "" }, { "docid": "bbff503a48e1c228cd624ffb4227712e", "score": "0.54996496", "text": "func (s UpdateGroupCallArray) Sort(less func(a, b UpdateGroupCall) bool) UpdateGroupCallArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "9f1081e70088416a0d05050c6dc13bc2", "score": "0.54990965", "text": "func (s UpdateBotInlineSendArray) Sort(less func(a, b UpdateBotInlineSend) bool) UpdateBotInlineSendArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "0287a642670b153f2518e488a74656ef", "score": "0.5492381", "text": "func (s UpdateDeleteChannelMessagesArray) Sort(less func(a, b UpdateDeleteChannelMessages) bool) UpdateDeleteChannelMessagesArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "18a511de717e9763511b531cbffee768", "score": "0.5491282", "text": "func (s UpdateWebViewResultSentArray) Sort(less func(a, b UpdateWebViewResultSent) bool) UpdateWebViewResultSentArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "9cfe3da56551b8a1695bb093fceca22d", "score": "0.54872227", "text": "func Sort(a []corev1.Toleration) {\n\tsort.SliceStable(a, func(i, j int) bool { return a[i].Key < a[j].Key })\n}", "title": "" }, { "docid": "d78d007fb1315a7c5f23e0029d80b430", "score": "0.5487214", "text": "func (s UpdateDialogFilterArray) Sort(less func(a, b UpdateDialogFilter) bool) UpdateDialogFilterArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "747458b488da7f39fb9c65076d61623c", "score": "0.5481575", "text": "func (s UpdateBotCallbackQueryArray) Sort(less func(a, b UpdateBotCallbackQuery) bool) UpdateBotCallbackQueryArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "7c4a09813d8b6f019210c96b9ec5dd31", "score": "0.5478458", "text": "func (s UpdateGroupCallParticipantsArray) Sort(less func(a, b UpdateGroupCallParticipants) bool) UpdateGroupCallParticipantsArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "472fd3f00ce895ee852eca5238b5e5f1", "score": "0.546835", "text": "func (s UpdateDialogFilterOrderArray) Sort(less func(a, b UpdateDialogFilterOrder) bool) UpdateDialogFilterOrderArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "8e0d2340251d4063122acf364b19ed81", "score": "0.54601645", "text": "func StableSortTrackList(w io.Writer, sortBy string) {\n\tvar sortFunc func(x, y *Track) bool\n\tswitch sortBy {\n\tcase \"title\":\n\t\tsortFunc = func(x, y *Track) bool { return x.Title < y.Title }\n\tcase \"artist\":\n\t\tsortFunc = func(x, y *Track) bool { return x.Artist < y.Artist }\n\tcase \"album\":\n\t\tsortFunc = func(x, y *Track) bool { return x.Album < y.Album }\n\tcase \"year\":\n\t\tsortFunc = func(x, y *Track) bool { return x.Year < y.Year }\n\tcase \"length\":\n\t\tsortFunc = func(x, y *Track) bool { return x.Length < y.Length }\n\tdefault:\n\t\tif err := printTracks(goTracks, w); err != nil {\n\t\t\tlog.Fatalf(\"Error generating html %v\", err)\n\t\t}\n\t\treturn\n\t}\n\n\tsort.Stable(customSort{goTracks, sortFunc})\n\tif err := printTracks(goTracks, w); err != nil {\n\t\tlog.Fatalf(\"Error generating html %v\", err)\n\t}\n}", "title": "" }, { "docid": "2ec904850de69517c911cf506191cc64", "score": "0.54523957", "text": "func (s UpdateMessageIDArray) SortStableByID() UpdateMessageIDArray {\n\treturn s.SortStable(func(a, b UpdateMessageID) bool {\n\t\treturn a.GetID() < b.GetID()\n\t})\n}", "title": "" }, { "docid": "c8fa1fa8066040b720d3a2c5672030cb", "score": "0.54433775", "text": "func (s UpdateReadStoriesArray) SortStable(less func(a, b UpdateReadStories) bool) UpdateReadStoriesArray {\n\tsort.SliceStable(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "ba79145e9e82c8d81d7781fafb35546b", "score": "0.5442666", "text": "func (s UpdateLangPackTooLongArray) Sort(less func(a, b UpdateLangPackTooLong) bool) UpdateLangPackTooLongArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "b851f9d2f1eb8206187e4dffde57927d", "score": "0.5437304", "text": "func sortWordCounts(wordCounts []WordCount) {\n sort.Slice(wordCounts, func(i, j int) bool {\n wc1 := wordCounts[i]\n wc2 := wordCounts[j]\n if wc1.Count == wc2.Count {\n return wc1.Word < wc2.Word\n }\n return wc1.Count > wc2.Count\n })\n}", "title": "" } ]
d5d45ab7466dca6100e7f449494a4b93
loadCATLSConfig preloads all TLSConfig bytes in certificate authorities
[ { "docid": "9998895f15c396248b0e853573c90070", "score": "0.8024122", "text": "func (c *IdentityConfig) loadCATLSConfig(configEntity *identityConfigEntity) error {\n\t//CA Config\n\tfor ca, caConfig := range configEntity.CertificateAuthorities {\n\t\t//resolve paths\n\t\tcaConfig.TLSCACerts.Path = pathvar.Subst(caConfig.TLSCACerts.Path)\n\t\tcaConfig.TLSCACerts.Client.Key.Path = pathvar.Subst(caConfig.TLSCACerts.Client.Key.Path)\n\t\tcaConfig.TLSCACerts.Client.Cert.Path = pathvar.Subst(caConfig.TLSCACerts.Client.Cert.Path)\n\t\t//pre load key and cert bytes\n\t\terr := caConfig.TLSCACerts.Client.Key.LoadBytes()\n\t\tif err != nil {\n\t\t\treturn errors.WithMessage(err, \"failed to load ca key\")\n\t\t}\n\n\t\terr = caConfig.TLSCACerts.Client.Cert.LoadBytes()\n\t\tif err != nil {\n\t\t\treturn errors.WithMessage(err, \"failed to load ca cert\")\n\t\t}\n\t\tconfigEntity.CertificateAuthorities[ca] = caConfig\n\t}\n\n\treturn nil\n}", "title": "" } ]
[ { "docid": "77443337846ea941f7f8215083a3887f", "score": "0.71148866", "text": "func loadTLSConfig(ca, cert, key string, verify bool) (*tls.Config, error) {\n\tvar config *tls.Config\n\n\tif verify {\n\t\tconfig = &tls.Config{\n\t\t\tMinVersion: tls.VersionTLS10,\n\t\t}\n\t\tc, err := tls.LoadX509KeyPair(cert, key)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Couldn't load X509 key pair (%s, %s): %s. Key encrypted?\",\n\t\t\t\tcert, key, err)\n\t\t}\n\t\tconfig.Certificates = []tls.Certificate{c}\n\n\t\tcertPool := x509.NewCertPool()\n\t\tfile, err := ioutil.ReadFile(ca)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Couldn't read CA certificate: %s\", err)\n\t\t}\n\t\tcertPool.AppendCertsFromPEM(file)\n\t\tconfig.RootCAs = certPool\n\t\tconfig.ClientAuth = tls.RequireAndVerifyClientCert\n\t\tconfig.ClientCAs = certPool\n\t\t//config.InsecureSkipVerify = true\n\t} else {\n\t\t// If --tlsverify is not supplied, disable CA validation.\n\t\tconfig = nil\n\t}\n\n\treturn config, nil\n}", "title": "" }, { "docid": "729ab9b002bea796a15d723a69357bcc", "score": "0.706483", "text": "func (c *MutableTLSCreds) loadNewTLSConfig(newConfig *tls.Config) error {\n\tnewSubject, err := GetAndValidateCertificateSubject(newConfig.Certificates)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.Lock()\n\tdefer c.Unlock()\n\tc.subject = newSubject\n\tc.config = newConfig\n\n\treturn nil\n}", "title": "" }, { "docid": "e26c00a4714d781f194e4ce71d766f29", "score": "0.65951234", "text": "func LoadTLSClientConfig(certFile, keyFile, caFile string) (*tls.Config, error) {\n\tif len(certFile) == 0 || len(keyFile) == 0 {\n\t\treturn nil, nil\n\t}\n\n\tcert, err := tls.LoadX509KeyPair(certFile, keyFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar caCertPool *x509.CertPool\n\tif len(caFile) > 0 {\n\t\tcaCert, err := ioutil.ReadFile(caFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcaCertPool = x509.NewCertPool()\n\t\tcaCertPool.AppendCertsFromPEM(caCert)\n\t}\n\n\ttlsConfig := &tls.Config{\n\t\tCertificates: []tls.Certificate{cert},\n\t\tRootCAs: caCertPool,\n\t}\n\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "23cc46318a3702d27592948c5ad52a0f", "score": "0.6455295", "text": "func tlsConfig(insecure bool, certf, keyf string, rootCerts []string) (*tls.Config, error) {\n\tvar err error\n\tfiles := map[string][]byte{}\n\tfilenames := append([]string{certf, keyf}, rootCerts...)\n\tfor _, f := range filenames {\n\t\tif f != \"\" {\n\t\t\tif files[f], err = ioutil.ReadFile(f); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\n\tc := tls.Config{InsecureSkipVerify: insecure}\n\tif cert, ok := files[certf]; ok {\n\t\tkey, ok := files[keyf]\n\t\tif !ok {\n\t\t\tkey = cert\n\t\t}\n\n\t\tcertificate, err := tls.X509KeyPair(cert, key)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tc.Certificates = append(c.Certificates, certificate)\n\t\tc.BuildNameToCertificate()\n\t}\n\n\tif len(rootCerts) > 0 {\n\t\tc.RootCAs = x509.NewCertPool()\n\t\tfor _, f := range rootCerts {\n\t\t\tif !c.RootCAs.AppendCertsFromPEM(files[f]) {\n\t\t\t\treturn nil, errBadCert\n\t\t\t}\n\t\t}\n\t}\n\n\treturn &c, nil\n}", "title": "" }, { "docid": "9e0142d0e6dec92205f0d41d22726588", "score": "0.6372649", "text": "func tlsConfig(t *TransportConfig) *tls.Config {\n\n\t// Check for TLS keys in config\n\tswitch {\n\tcase t.Ssl.CaCertFile == \"\":\n\t\tlog.Notice(\"TLS disabled. option missing: CaCertFile\")\n\t\treturn nil\n\tcase t.Ssl.CertChainFile == \"\":\n\t\tlog.Notice(\"TLS disabled. option missing: CertChainFile\")\n\t\treturn nil\n\tcase t.Ssl.PrivateKeyFile == \"\":\n\t\tlog.Notice(\"TLS disabled. option missing: PrivateKeyFile\")\n\t\treturn nil\n\t}\n\n\t// Create new tls config\n\ttlsCfg := new(tls.Config)\n\n\t// Load root CA\n\ttlsCfg.RootCAs = x509.NewCertPool()\n\n\tif ca, err := ioutil.ReadFile(t.Ssl.CaCertFile); err == nil {\n\t\ttlsCfg.RootCAs.AppendCertsFromPEM(ca)\n\t\tif len(tlsCfg.RootCAs.Subjects()) == 0 {\n\t\t\tlog.Fatalf(\n\t\t\t\t\"Invalid x509 CA certificate file: %s\",\n\t\t\t\tt.Ssl.CaCertFile,\n\t\t\t)\n\t\t}\n\t\tlog.Notice(\n\t\t\t\"Total CA certificates loaded in chain:\",\n\t\t\tlen(tlsCfg.RootCAs.Subjects()),\n\t\t)\n\t} else {\n\t\tlog.Fatalf(\n\t\t\t\"Failed to read specified CA certificate file: %s with error: %s\",\n\t\t\tt.Ssl.CaCertFile,\n\t\t\terr,\n\t\t)\n\t}\n\n\t// Load TLS KeyPair\n\tif cert, err := tls.LoadX509KeyPair(t.Ssl.CertChainFile, t.Ssl.PrivateKeyFile); err == nil {\n\t\ttlsCfg.Certificates = append(tlsCfg.Certificates, cert)\n\t\tlog.Notice(\"Successfully loaded TLS keypair\")\n\t} else {\n\t\tlog.Fatalf(\n\t\t\t\"Failed to load TLS keypair: %s and %s with error: %s\",\n\t\t\tt.Ssl.CertChainFile,\n\t\t\tt.Ssl.PrivateKeyFile,\n\t\t\terr,\n\t\t)\n\t}\n\n\treturn tlsCfg\n}", "title": "" }, { "docid": "f3e528b483b6c25777e64ea961c58830", "score": "0.63574827", "text": "func (hm *HelmManager) initTLSConfig() error {\n\tif len(hm.opt.ServerCert) != 0 && len(hm.opt.ServerKey) != 0 && len(hm.opt.ServerCa) != 0 {\n\t\ttlsConfig, err := ssl.ServerTslConfVerityClient(hm.opt.ServerCa, hm.opt.ServerCert,\n\t\t\thm.opt.ServerKey, static.ServerCertPwd)\n\t\tif err != nil {\n\t\t\tblog.Errorf(\"load helm manager server tls config failed, err %s\", err.Error())\n\t\t\treturn err\n\t\t}\n\t\thm.tlsConfig = tlsConfig\n\t\tblog.Infof(\"load helm manager server tls config successfully\")\n\t}\n\n\tif len(hm.opt.ClientCert) != 0 && len(hm.opt.ClientKey) != 0 && len(hm.opt.ClientCa) != 0 {\n\t\ttlsConfig, err := ssl.ClientTslConfVerity(hm.opt.ClientCa, hm.opt.ClientCert,\n\t\t\thm.opt.ClientKey, static.ClientCertPwd)\n\t\tif err != nil {\n\t\t\tblog.Errorf(\"load helm manager client tls config failed, err %s\", err.Error())\n\t\t\treturn err\n\t\t}\n\t\thm.clientTLSConfig = tlsConfig\n\t\tblog.Infof(\"load helm manager client tls config successfully\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4d35c3179e814d20c48624bbd86a2645", "score": "0.6325474", "text": "func kfAddTLSConfig(config *sarama.Config) error {\n\tcert, err := fileutils.ReadBytes(kafkaOpts.serverCert)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcerts, err := initSystemCertPool()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tconfig.Net.TLS.Config = &tls.Config{\n\t\tRootCAs: certs,\n\t}\n\n\tconfig.Net.TLS.Enable = true\n\n\tif !config.Net.TLS.Config.RootCAs.AppendCertsFromPEM(cert) {\n\t\treturn fmt.Errorf(\"failed to append server cert\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c5c2b5e98f15f48bf69e9e38f575a9bf", "score": "0.63148326", "text": "func LoadClientTLSConfig(configDir string, cfg *ClientConfig) (*tls.Config, error) {\n\tcertPEM, keyPEM, bundlePEM, err := loadCertificates(configDir, cfg.Certificate, cfg.PrivateKey, cfg.CABundle)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn BuildClientTLSConfig(certPEM, keyPEM, bundlePEM)\n}", "title": "" }, { "docid": "856b98dfd964def4af2b1b23c7139681", "score": "0.62937015", "text": "func (c *IdentityConfig) loadClientTLSConfig(configEntity *identityConfigEntity) error {\n\t//Clients Config\n\t//resolve paths and org name\n\tconfigEntity.Client.Organization = strings.ToLower(configEntity.Client.Organization)\n\tconfigEntity.Client.TLSCerts.Client.Key.Path = pathvar.Subst(configEntity.Client.TLSCerts.Client.Key.Path)\n\tconfigEntity.Client.TLSCerts.Client.Cert.Path = pathvar.Subst(configEntity.Client.TLSCerts.Client.Cert.Path)\n\n\t//pre load client key and cert bytes\n\terr := configEntity.Client.TLSCerts.Client.Key.LoadBytes()\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to load client key\")\n\t}\n\n\terr = configEntity.Client.TLSCerts.Client.Cert.LoadBytes()\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to load client cert\")\n\t}\n\n\tc.client = &msp.ClientConfig{\n\t\tOrganization: configEntity.Client.Organization,\n\t\tLogging: configEntity.Client.Logging,\n\t\tCryptoConfig: configEntity.Client.CryptoConfig,\n\t\tCredentialStore: configEntity.Client.CredentialStore,\n\t\tTLSKey: configEntity.Client.TLSCerts.Client.Key.Bytes(),\n\t\tTLSCert: configEntity.Client.TLSCerts.Client.Cert.Bytes(),\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7a1e71f03fbad0d115c16f183447aa6c", "score": "0.62467766", "text": "func parseTLSConfig(info logger.Info) (*tls.Config, error) {\n\tvar (\n\t\tskipVerify bool\n\t\tcaFile string = info.LogConfig[\"syslog-tls-ca-cert\"]\n\t\tcertFile string = info.LogConfig[\"syslog-tls-cert\"]\n\t\tkeyFile string = info.LogConfig[\"syslog-tls-key\"]\n\t\terr error\n\t)\n\n\t_, skipVerify = info.LogConfig[\"syslog-tls-skip-verify\"]\n\n\ttlsCfg := &tls.Config{\n\t\tMinVersion: tls.VersionTLS12,\n\t\tCipherSuites: defaultCipherSuites,\n\t\tInsecureSkipVerify: skipVerify,\n\t}\n\n\tif !skipVerify && caFile != \"\" {\n\t\tpool, err := getCertPool(caFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttlsCfg.RootCAs = pool\n\t}\n\n\tif tlsCfg.Certificates, err = getCert(certFile, keyFile); err != nil {\n\t\treturn nil, err\n\t}\n\treturn tlsCfg, nil\n}", "title": "" }, { "docid": "d339b6e485ae845ac464c64a1f8b20fa", "score": "0.6221526", "text": "func loadTLS(publicKeyPath, privateKeyPath string) (*tls.Config, error) {\n\tif publicKeyPath == \"\" {\n\t\treturn nil, errors.New(\"No public key provided for HTTPS\")\n\t}\n\tif privateKeyPath == \"\" {\n\t\treturn nil, errors.New(\"No private key provided for HTTPS\")\n\t}\n\tcrt, err := ioutil.ReadFile(publicKeyPath)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Could not open public key: \" + publicKeyPath)\n\t}\n\tkey, err := ioutil.ReadFile(privateKeyPath)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Could not open private key: \" + privateKeyPath)\n\t}\n\tcert, err := tls.X509KeyPair(crt, key)\n\tif err != nil {\n\t\treturn nil, errors.New(\"Could not load X509 key pair: \" + err.Error())\n\t}\n\n\treturn &tls.Config{\n\t\tCertificates: []tls.Certificate{cert}}, nil\n}", "title": "" }, { "docid": "5ec8989a4aaf29b7bcf84cf9ffe1fb05", "score": "0.62209284", "text": "func loadCACertificates(path string) (*x509.CertPool, error) {\n\trootCAs, _ := x509.SystemCertPool()\n\tif rootCAs == nil {\n\t\t// In some systems (like Windows) system cert pool is\n\t\t// not supported or no certificates are present on the\n\t\t// system - so we create a new cert pool.\n\t\trootCAs = x509.NewCertPool()\n\t}\n\tif path == \"\" {\n\t\treturn rootCAs, nil\n\t}\n\n\tstat, err := os.Stat(path)\n\tif err != nil {\n\t\tif os.IsNotExist(err) || os.IsPermission(err) {\n\t\t\treturn rootCAs, nil\n\t\t}\n\t\treturn nil, Errorf(\"crypto: cannot open '%s': %v\", path, err)\n\t}\n\n\t// If path is a file, parse as PEM-encoded certifcate\n\t// and try to add it to the CertPool. If this fails\n\t// return an error.\n\tif !stat.IsDir() {\n\t\tcert, err := ioutil.ReadFile(path)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif !rootCAs.AppendCertsFromPEM(cert) {\n\t\t\treturn nil, Errorf(\"crypto: '%s' is not a valid PEM-encoded certificate\", path)\n\t\t}\n\t\treturn rootCAs, nil\n\t}\n\n\t// If path is a directory then try\n\t// to parse each file as PEM-encoded\n\t// certificate and add it to the CertPool.\n\t// If a file is not a PEM-encoded certificate\n\t// we ignore it.\n\tfiles, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, file := range files {\n\t\tcert, err := ioutil.ReadFile(filepath.Join(path, file.Name()))\n\t\tif err != nil {\n\t\t\tcontinue // ignore files which are not readable\n\t\t}\n\t\trootCAs.AppendCertsFromPEM(cert) // ignore files which are not PEM certtificates\n\t}\n\treturn rootCAs, nil\n\n}", "title": "" }, { "docid": "ff6090ba7d62a95f1f6ac58da9c02d83", "score": "0.61979026", "text": "func TLSConfig(certFile, keyFile string) (*tls.Config, error) {\n\tcert, err := tls.LoadX509KeyPair(certFile, keyFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &tls.Config{\n\t\tCertificates: []tls.Certificate{cert},\n\t}, nil\n}", "title": "" }, { "docid": "496f81b441dbbce8d226d8b943db384f", "score": "0.61611915", "text": "func buildConfig(caBundlePath string) (*tls.Config, error) {\n\tcaBundleBytes, err := ioutil.ReadFile(caBundlePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcaBundle := x509.NewCertPool()\n\tcaBundle.AppendCertsFromPEM(caBundleBytes)\n\n\treturn &tls.Config{\n\t\t// Certificates\n\t\tRootCAs: caBundle,\n\t\tClientCAs: caBundle,\n\t\tClientAuth: tls.RequireAndVerifyClientCert,\n\t\tMinVersion: tls.VersionTLS12,\n\t}, nil\n}", "title": "" }, { "docid": "f55710a0fc2a6153659a3268e7fcc212", "score": "0.6159755", "text": "func TlsRuleConfLoad(filename string) (BfeTlsRuleConf, error) {\n\tvar config BfeTlsRuleConf\n\n\t// open the file\n\tfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn config, err\n\t}\n\tdefer file.Close()\n\n\t// decode the file\n\tdecoder := json.NewDecoder(file)\n\terr = decoder.Decode(&config)\n\tif err != nil {\n\t\treturn config, err\n\t}\n\n\t// check conf\n\terr = BfeTlsRuleConfCheck(&config)\n\tif err != nil {\n\t\treturn config, err\n\t}\n\n\treturn config, nil\n}", "title": "" }, { "docid": "66e4ae6a8c03f0d26ecb72f05df57944", "score": "0.6151398", "text": "func createTLSConfig(certFile, keyFile, caCertFile string) (*tls.Config, error) {\n\tvar err error\n\tconfig := &tls.Config{}\n\tconfig.Certificates = make([]tls.Certificate, 1)\n\tconfig.Certificates[0], err = tls.LoadX509KeyPair(certFile, keyFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif caCertFile != \"\" {\n\t\tasn1Data, err := ioutil.ReadFile(caCertFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tconfig.RootCAs = x509.NewCertPool()\n\t\tok := config.RootCAs.AppendCertsFromPEM([]byte(asn1Data))\n\t\tif !ok {\n\t\t\treturn nil, fmt.Errorf(\"failed to parse root certificate(s) in %q\", caCertFile)\n\t\t}\n\t}\n\treturn config, nil\n}", "title": "" }, { "docid": "8f24852f8e01f49ca561079785e23755", "score": "0.61243445", "text": "func TLSConfig(cert *x509.Certificate, serverName string, config fab.EndpointConfig) (*tls.Config, error) {\n\n\tif cert != nil {\n\t\tconfig.TLSCACertPool().Add(cert)\n\t}\n\n\tcertPool, err := config.TLSCACertPool().Get()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &tls.Config{RootCAs: certPool, Certificates: config.TLSClientCerts(), ServerName: serverName}, nil\n}", "title": "" }, { "docid": "82e15ade39dc17088b376b389cad57f7", "score": "0.6117733", "text": "func TLSConfig(identity string) (*tls.Config, error) {\n\tdir := ca.Dir()\n\tcapem, err := ioutil.ReadFile(dir + \"ca.cert\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tkeypem, err := ioutil.ReadFile(dir + identity + \".key\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcertpem, err := ioutil.ReadFile(dir + identity + \".cert\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tmycert, err := tls.X509KeyPair(certpem, keypem)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconfig := &tls.Config{}\n\tconfig.Certificates = make([]tls.Certificate, 1)\n\tconfig.Certificates[0] = mycert\n\tcertPool := x509.NewCertPool()\n\tif !certPool.AppendCertsFromPEM(capem) {\n\t\treturn nil, fmt.Errorf(\"Cannot append certs to TLS certificate pool\")\n\t}\n\tconfig.RootCAs = certPool\n\tconfig.ClientCAs = certPool\n\n\t//config.ClientAuth = tls.RequireAndVerifyClientCert\n\tconfig.ClientAuth = tls.VerifyClientCertIfGiven\n\n\tconfig.CipherSuites = []uint16{\n\t\ttls.TLS_RSA_WITH_AES_128_CBC_SHA,\n\t\ttls.TLS_RSA_WITH_AES_256_CBC_SHA,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\n\t}\n\tconfig.MinVersion = tls.VersionTLS12\n\tconfig.SessionTicketsDisabled = true\n\n\treturn config, nil\n}", "title": "" }, { "docid": "3047c708fa7c77c57e2d7f1bdb0369da", "score": "0.61121017", "text": "func (ctx *serveContext) tlsconfig(log logrus.FieldLogger) *tls.Config {\n\terr := ctx.verifyTLSFlags()\n\tif err != nil {\n\t\tlog.WithError(err).Fatal(\"failed to verify TLS flags\")\n\t}\n\n\t// Define a closure that lazily loads certificates and key at TLS handshake\n\t// to ensure that latest certificates are used in case they have been rotated.\n\tloadConfig := func() (*tls.Config, error) {\n\t\tcert, err := tls.LoadX509KeyPair(ctx.contourCert, ctx.contourKey)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tca, err := ioutil.ReadFile(ctx.caFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcertPool := x509.NewCertPool()\n\t\tif ok := certPool.AppendCertsFromPEM(ca); !ok {\n\t\t\treturn nil, fmt.Errorf(\"unable to append certificate in %s to CA pool\", ctx.caFile)\n\t\t}\n\n\t\treturn &tls.Config{\n\t\t\tCertificates: []tls.Certificate{cert},\n\t\t\tClientAuth: tls.RequireAndVerifyClientCert,\n\t\t\tClientCAs: certPool,\n\t\t\tMinVersion: tls.VersionTLS12,\n\t\t}, nil\n\t}\n\n\t// Attempt to load certificates and key to catch configuration errors early.\n\tif _, lerr := loadConfig(); lerr != nil {\n\t\tlog.WithError(lerr).Fatal(\"failed to load certificate and key\")\n\t}\n\n\treturn &tls.Config{\n\t\tClientAuth: tls.RequireAndVerifyClientCert,\n\t\tRand: rand.Reader,\n\t\tGetConfigForClient: func(*tls.ClientHelloInfo) (*tls.Config, error) {\n\t\t\treturn loadConfig()\n\t\t},\n\t}\n}", "title": "" }, { "docid": "52d61ebded55549b45006ef397f8df54", "score": "0.6072348", "text": "func LoadCertificates(directory string) ([]tls.Certificate, error) {\n\treturn loadCertificates(directory)\n}", "title": "" }, { "docid": "55204cd1731227ec0e56f9cfcdec5b75", "score": "0.60402924", "text": "func (s *Server) generateTLSConfig() (*tls.Config, error) {\n\t// Load in cert and private key\n\tcert, err := tls.LoadX509KeyPair(s.opts.CertFile, s.opts.KeyFile)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error parsing X509 certificate/key pair (%s, %s): %v\",\n\t\t\ts.opts.CertFile, s.opts.KeyFile, err)\n\t}\n\tcert.Leaf, err = x509.ParseCertificate(cert.Certificate[0])\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error parsing certificate (%s): %v\",\n\t\t\ts.opts.CertFile, err)\n\t}\n\t// Create our TLS configuration\n\tconfig := &tls.Config{\n\t\tCertificates: []tls.Certificate{cert},\n\t\tMinVersion: tls.VersionTLS12,\n\t}\n\n\tif s.opts.HTTPUsers != nil && len(s.opts.HTTPUsers) > 0 {\n\t\tconfig.ClientAuth = tls.RequireAndVerifyClientCert\n\t} else {\n\t\tconfig.ClientAuth = tls.NoClientCert\n\t}\n\n\t// Add in CAs if applicable.\n\tif s.opts.CaFile != \"\" {\n\t\trootPEM, err := os.ReadFile(s.opts.CaFile)\n\t\tif err != nil || rootPEM == nil {\n\t\t\treturn nil, fmt.Errorf(\"failed to load root ca certificate (%s): %v\", s.opts.CaFile, err)\n\t\t}\n\t\tpool := x509.NewCertPool()\n\t\tok := pool.AppendCertsFromPEM(rootPEM)\n\t\tif !ok {\n\t\t\treturn nil, fmt.Errorf(\"failed to parse root ca certificate\")\n\t\t}\n\t\tconfig.ClientCAs = pool\n\t}\n\treturn config, nil\n}", "title": "" }, { "docid": "3039c90698b37114be631c9793c63a83", "score": "0.6034966", "text": "func loadCertificates(certDirectory string) error {\n\tlog.Trace(\"attestationPlugin/vs_plugin:loadCertificates() Entering\")\n\tdefer log.Trace(\"attestationPlugin/vs_plugin:loadCertificates() Leaving\")\n\n\tcertPems, err := os.GetDirFileContents(certDirectory, \"*.pem\")\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"attestationPlugin/vs_plugin:loadCertificates() Error in reading certificate directory\")\n\t}\n\n\tfor _, certPem := range certPems {\n\t\tx509Certificate, err := crypt.GetCertFromPem(certPem)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"attestationPlugin/vs_plugin:loadCertificates() Unable to read X509 certificate\")\n\t\t}\n\t\tCertArray = append(CertArray, *x509Certificate)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c8a63c25a9041a543e6f60592dce7c7d", "score": "0.60257524", "text": "func tlsConfig() (*tls.Config, error) {\n\tcaPEMBytes, err := ioutil.ReadFile(\"ca/depot/ca.pem\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcaPool := x509.NewCertPool()\n\tcaPool.AppendCertsFromPEM(caPEMBytes)\n\n\ttlsConfig := &tls.Config{\n\t\tClientAuth: tls.RequireAndVerifyClientCert,\n\t\tClientCAs: caPool,\n\t}\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "3e063be8b671d48487b6ec280393f619", "score": "0.60051924", "text": "func loadSystemCAs() (pool *x509.CertPool, err error) {\n\tpool = x509.NewCertPool()\n\tpool.AppendCertsFromPEM(ssoCA1)\n\tpool.AppendCertsFromPEM(ssoCA2)\n\tpool.AppendCertsFromPEM(apiCA1)\n\tpool.AppendCertsFromPEM(apiCA2)\n\treturn\n}", "title": "" }, { "docid": "454541dedcbb3a3b48f27d58834b2e2d", "score": "0.6002027", "text": "func TLSConfig(crtName string) (*tls.Config, error) {\n\tcertNameConfig := GetAppConfig(crtName)\n\tif len(certNameConfig) == 0 {\n\t\tlog.Error(\"Certificate name is not set\")\n\t\treturn nil, errors.New(\"certificate name configuration is not set\")\n\t}\n\n\tcrt, err := ioutil.ReadFile(certNameConfig)\n\tif err != nil {\n\t\tlog.Error(\"Unable to read certificate file\")\n\t\treturn nil, err\n\t}\n\n\trootCAs := x509.NewCertPool()\n\tok := rootCAs.AppendCertsFromPEM(crt)\n\tif !ok {\n\t\tlog.Error(\"Failed to decode certificate file\")\n\t\treturn nil, errors.New(\"failed to decode certificate file\")\n\t}\n\n\tserverName := GetAppConfig(\"server_name\")\n\tserverNameIsValid, validateServerNameErr := validateServerName(serverName)\n\tif validateServerNameErr != nil || !serverNameIsValid {\n\t\tlog.Error(\"Server name validation failed\")\n\t\treturn nil, validateServerNameErr\n\t}\n\tsslCiphers := GetAppConfig(\"ssl_ciphers\")\n\tif len(sslCiphers) == 0 {\n\t\tlog.Error(\"SSL cipher configuration is not set\")\n\t\treturn nil, errors.New(\"ssl cipher configuration is not set\")\n\t}\n\tcipherSuites := getCipherSuites(sslCiphers)\n\tif cipherSuites == nil {\n\t\tlog.Error(\"Unable to get cipher suite\")\n\t\treturn nil, errors.New(\"unable to get cipher suite\")\n\t}\n\treturn &tls.Config{\n\t\tRootCAs: rootCAs,\n\t\tServerName: serverName,\n\t\tMinVersion: tls.VersionTLS12,\n\t\tCipherSuites: cipherSuites,\n\t}, nil\n}", "title": "" }, { "docid": "4ca0e5981ed5f426087ab440ecccac46", "score": "0.5997029", "text": "func ConfigToTLSConfig(c *TLSStruct) (*tls.Config, error) {\n\tif c.TLSCertPath == \"\" && c.TLSKeyPath == \"\" && c.ClientAuth == \"\" && c.ClientCAs == \"\" {\n\t\treturn nil, errNoTLSConfig\n\t}\n\n\tif c.TLSCertPath == \"\" {\n\t\treturn nil, errors.New(\"missing cert_file\")\n\t}\n\tif c.TLSKeyPath == \"\" {\n\t\treturn nil, errors.New(\"missing key_file\")\n\t}\n\tcfg := &tls.Config{\n\t\tMinVersion: tls.VersionTLS12,\n\t}\n\tloadCert := func() (*tls.Certificate, error) {\n\t\tcert, err := tls.LoadX509KeyPair(c.TLSCertPath, c.TLSKeyPath)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to load X509KeyPair\")\n\t\t}\n\t\treturn &cert, nil\n\t}\n\t// Confirm that certificate and key paths are valid.\n\tif _, err := loadCert(); err != nil {\n\t\treturn nil, err\n\t}\n\tcfg.GetCertificate = func(*tls.ClientHelloInfo) (*tls.Certificate, error) {\n\t\treturn loadCert()\n\t}\n\n\tif c.ClientCAs != \"\" {\n\t\tclientCAPool := x509.NewCertPool()\n\t\tclientCAFile, err := ioutil.ReadFile(c.ClientCAs)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tclientCAPool.AppendCertsFromPEM(clientCAFile)\n\t\tcfg.ClientCAs = clientCAPool\n\t}\n\n\tswitch c.ClientAuth {\n\tcase \"RequestClientCert\":\n\t\tcfg.ClientAuth = tls.RequestClientCert\n\tcase \"RequireClientCert\":\n\t\tcfg.ClientAuth = tls.RequireAnyClientCert\n\tcase \"VerifyClientCertIfGiven\":\n\t\tcfg.ClientAuth = tls.VerifyClientCertIfGiven\n\tcase \"RequireAndVerifyClientCert\":\n\t\tcfg.ClientAuth = tls.RequireAndVerifyClientCert\n\tcase \"\", \"NoClientCert\":\n\t\tcfg.ClientAuth = tls.NoClientCert\n\tdefault:\n\t\treturn nil, errors.New(\"Invalid ClientAuth: \" + c.ClientAuth)\n\t}\n\n\tif c.ClientCAs != \"\" && cfg.ClientAuth == tls.NoClientCert {\n\t\treturn nil, errors.New(\"Client CA's have been configured without a Client Auth Policy\")\n\t}\n\n\treturn cfg, nil\n}", "title": "" }, { "docid": "e46c0521ef7ce317296804160f1b7f48", "score": "0.5953024", "text": "func (source *FileTrustSource) loadCertificates() error {\n\tfor domain, paths := range source.domainPaths {\n\t\tdomainCertificates := make([]*x509.Certificate, 0)\n\n\t\tfor _, path := range paths {\n\t\t\tdata, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.New(\"Failed to load certificates for domain \" + domain + \" from file \" + path + \" - \" + err.Error())\n\t\t\t}\n\n\t\t\tcertificates := ExtractCertificatesFromPem(data)\n\t\t\tif len(certificates) == 0 {\n\t\t\t\tlogrus.Info(\"Did not load any certificates for domain \" + domain + \" from file \" + path)\n\t\t\t}\n\t\t\tdomainCertificates = append(domainCertificates, certificates...)\n\t\t}\n\n\t\tsource.domainCertificates[domain] = domainCertificates\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7447594a4395649359383b7b00b20976", "score": "0.5948348", "text": "func loadCA(cert, key string) (*tls.Certificate, error) {\n\tcaCert, err := ioutil.ReadFile(cert)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcaKey, err := ioutil.ReadFile(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tca, err := tls.X509KeyPair(caCert, caKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tca.Leaf, err = x509.ParseCertificate(ca.Certificate[0])\n\n\treturn &ca, err\n}", "title": "" }, { "docid": "eaacc32e485172a83b1566307c47c55c", "score": "0.5939944", "text": "func createTLSConfig(cert, key, rootCa []byte) (*tls.Config, error) {\n\tkeyPair, err := tls.X509KeyPair(cert, key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcaCertPool := x509.NewCertPool()\n\tcaCertPool.AppendCertsFromPEM(rootCa)\n\n\treturn &tls.Config{\n\t\tCertificates: []tls.Certificate{keyPair},\n\t\tRootCAs: caCertPool,\n\t}, nil\n}", "title": "" }, { "docid": "00c04faa82571fed09d0cc0b4d777434", "score": "0.59377795", "text": "func (c *IdentityConfig) loadIdentityConfigEntities() error {\n\tconfigEntity := identityConfigEntity{}\n\n\terr := c.backend.UnmarshalKey(\"client\", &configEntity.Client)\n\tlogger.Debugf(\"Client is: %+v\", configEntity.Client)\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to parse 'client' config item to identityConfigEntity.Client type\")\n\t}\n\n\terr = c.backend.UnmarshalKey(\"organizations\", &configEntity.Organizations)\n\tlogger.Debugf(\"organizations are: %+v\", configEntity.Organizations)\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to parse 'organizations' config item to identityConfigEntity.Organizations type\")\n\t}\n\n\terr = c.backend.UnmarshalKey(\"certificateAuthorities\", &configEntity.CertificateAuthorities)\n\tlogger.Debugf(\"certificateAuthorities are: %+v\", configEntity.CertificateAuthorities)\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to parse 'certificateAuthorities' config item to identityConfigEntity.CertificateAuthorities type\")\n\t}\n\n\t//compile CA matchers\n\terr = c.compileMatchers()\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to compile certificate authority matchers\")\n\t}\n\n\terr = c.loadClientTLSConfig(&configEntity)\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to load client TLSConfig \")\n\t}\n\n\terr = c.loadCATLSConfig(&configEntity)\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to load CA TLSConfig \")\n\t}\n\n\terr = c.loadAllCAConfigs(&configEntity)\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to load all CA configs \")\n\t}\n\n\tc.caKeyStorePath = pathvar.Subst(c.backend.GetString(\"client.credentialStore.cryptoStore.path\"))\n\tc.credentialStorePath = pathvar.Subst(c.backend.GetString(\"client.credentialStore.path\"))\n\n\treturn nil\n}", "title": "" }, { "docid": "9950d0d7ae00abf056bc7192e0c127ca", "score": "0.5934649", "text": "func LoadTLSClientConfigForServer(caFile string) (*tls.Config, error) {\n\tif len(caFile) == 0 {\n\t\treturn nil, nil\n\t}\n\n\tcaCert, err := ioutil.ReadFile(caFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcaCertPool := x509.NewCertPool()\n\tcaCertPool.AppendCertsFromPEM(caCert)\n\n\ttlsConfig := &tls.Config{\n\t\tClientCAs: caCertPool,\n\t\tClientAuth: tls.RequireAndVerifyClientCert,\n\t}\n\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "13521e6a7f6c0565aa8a2b0bb85c20d1", "score": "0.59195256", "text": "func (c *Config) buildStandardTLSConfig() error {\n\tif !c.Enabled {\n\t\treturn nil\n\t}\n\n\tconfig := new(tls.Config)\n\n\tciphersAdded := make(map[uint16]struct{})\n\tcurvesAdded := make(map[tls.CurveID]struct{})\n\n\t// add cipher suites\n\tfor _, ciph := range c.Ciphers {\n\t\tif _, ok := ciphersAdded[ciph]; !ok {\n\t\t\tciphersAdded[ciph] = struct{}{}\n\t\t\tconfig.CipherSuites = append(config.CipherSuites, ciph)\n\t\t}\n\t}\n\n\tconfig.PreferServerCipherSuites = c.PreferServerCipherSuites\n\n\t// add curve preferences\n\tfor _, curv := range c.CurvePreferences {\n\t\tif _, ok := curvesAdded[curv]; !ok {\n\t\t\tcurvesAdded[curv] = struct{}{}\n\t\t\tconfig.CurvePreferences = append(config.CurvePreferences, curv)\n\t\t}\n\t}\n\n\tconfig.MinVersion = c.ProtocolMinVersion\n\tconfig.MaxVersion = c.ProtocolMaxVersion\n\tconfig.ClientAuth = c.ClientAuth\n\tconfig.NextProtos = c.ALPN\n\tconfig.GetCertificate = c.GetCertificate\n\n\t// set up client authentication if enabled\n\tif config.ClientAuth != tls.NoClientCert {\n\t\tpool := x509.NewCertPool()\n\t\tclientCertsAdded := make(map[string]struct{})\n\n\t\tfor _, caFile := range c.ClientCerts {\n\t\t\t// don't add cert to pool more than once\n\t\t\tif _, ok := clientCertsAdded[caFile]; ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tclientCertsAdded[caFile] = struct{}{}\n\n\t\t\t// Any client with a certificate from this CA will be allowed to connect\n\t\t\tcaCrt, err := ioutil.ReadFile(caFile)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif !pool.AppendCertsFromPEM(caCrt) {\n\t\t\t\treturn fmt.Errorf(\"error loading client certificate '%s': no certificates were successfully parsed\", caFile)\n\t\t\t}\n\t\t}\n\n\t\tconfig.ClientCAs = pool\n\t}\n\n\t// default cipher suites\n\tif len(config.CipherSuites) == 0 {\n\t\tconfig.CipherSuites = getPreferredDefaultCiphers()\n\t}\n\n\t// for security, ensure TLS_FALLBACK_SCSV is always included first\n\tif len(config.CipherSuites) == 0 || config.CipherSuites[0] != tls.TLS_FALLBACK_SCSV {\n\t\tconfig.CipherSuites = append([]uint16{tls.TLS_FALLBACK_SCSV}, config.CipherSuites...)\n\t}\n\n\t// store the resulting new tls.Config\n\tc.tlsConfig = config\n\n\treturn nil\n}", "title": "" }, { "docid": "6666b20733e9aee5b2059db178336864", "score": "0.5891119", "text": "func (c *Config) LoadConfig(configBody *hcl.Body, evalContext *hcl.EvalContext) hcl.Diagnostics {\n\tif configBody == nil {\n\t\temptyConfig := hcl.EmptyBody()\n\t\tconfigBody = &emptyConfig\n\t}\n\n\tif diags := gohcl.DecodeBody(*configBody, evalContext, c); len(diags) != 0 {\n\t\treturn diags\n\t}\n\n\tfor i, k := range c.SSHPublicKeys {\n\t\tc.SSHPublicKeys[i] = strings.TrimSpace(k)\n\t}\n\n\tfor _, p := range c.WorkerPools {\n\t\tfor i, k := range p.SSHPublicKeys {\n\t\t\tp.SSHPublicKeys[i] = strings.TrimSpace(k)\n\t\t}\n\t}\n\n\treturn c.Validate()\n}", "title": "" }, { "docid": "6a7cabfc59bb6007c8c840f86657cc9f", "score": "0.58718896", "text": "func (c *ConfigGenerator) GenerateTLSConfig(clusterDir string) error {\n\tvar caKey *rsa.PrivateKey\n\tvar caCert *x509.Certificate\n\tvar err error\n\n\tif c.CA.RootCAKeyPath == \"\" && c.CA.RootCACertPath == \"\" {\n\t\tcaCert, caKey, err = generateRootCert(clusterDir)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to generate root CA certificate and key pair: %v\", err)\n\t\t}\n\t} else {\n\t\t// copy key and certificates\n\t\tcaCert, caKey, err = getCertFiles(clusterDir, c.CA.RootCACertPath, c.CA.RootCAKeyPath)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to process CA certificate and key pair: %v\", err)\n\t\t}\n\t}\n\n\t// generate kube CA\n\tcfg := &tls.CertCfg{KeyUsages: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign, IsCA: true}\n\tif err := generateCert(clusterDir, caKey, caCert, kubeCAKeyPath, kubeCACertPath, \"kube-ca\", \"bootkube\", cfg); err != nil {\n\t\treturn fmt.Errorf(\"failed to generate kube CAs: %v\", err)\n\t}\n\t// generate aggregator CA\n\tif err := generateCert(clusterDir, caKey, caCert, aggregatorCAKeyPath, aggregatorCACertPath, \"aggregator\", \"bootkube\", cfg); err != nil {\n\t\treturn fmt.Errorf(\"failed to generate aggregator CAs: %v\", err)\n\t}\n\t// generate service-serving CA\n\tif err := generateCert(clusterDir, caKey, caCert, serviceServiceCAKeyPath, serviceServiceCACertPath, \"service-serving\", \"bootkube\", cfg); err != nil {\n\t\treturn fmt.Errorf(\"failed to generate service-serving CAs: %v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0ed48c70403ca3451ea7d044212b417f", "score": "0.5843699", "text": "func newTLSConfig() *tls.Config {\n\n\t// Import trusted certificates from CAfile.pem.\n\t// Alternatively, manually add CA certificates to\n\t// default openssl CA bundle.\n\tcertpool := x509.NewCertPool()\n\tpemCerts, err := os.ReadFile(\"/SSL_certs/mqtt/ca.crt\")\n\tif err == nil {\n\t\tok := certpool.AppendCertsFromPEM(pemCerts)\n\t\tif !ok {\n\t\t\tzap.S().Errorf(\"Failed to parse root certificate\")\n\t\t}\n\t} else {\n\t\tzap.S().Errorf(\"Error reading CA certificate: %s\", err)\n\t}\n\n\tzap.S().Debugf(\"CA cert: %s\", pemCerts)\n\n\t// Import client certificate/key pair\n\tcert, err := tls.LoadX509KeyPair(\"/SSL_certs/mqtt/tls.crt\", \"/SSL_certs/mqtt/tls.key\")\n\tif err != nil {\n\t\t// Read /SSL_certs/mqtt/tls.crt\n\t\tvar file []byte\n\t\tfile, err = os.ReadFile(\"/SSL_certs/mqtt/tls.crt\")\n\t\tif err != nil {\n\t\t\tzap.S().Errorf(\"Error reading client certificate: %s\", err)\n\t\t}\n\t\tzap.S().Fatalf(\"Error reading client certificate: %s (File: %s)\", err, file)\n\t}\n\n\tzap.S().Debugf(\"Client cert: %v\", cert)\n\n\t// Just to print out the client certificate..\n\tcert.Leaf, err = x509.ParseCertificate(cert.Certificate[0])\n\tif err != nil {\n\t\tzap.S().Fatalf(\"Error parsing client certificate: %s\", err)\n\t}\n\n\tskipVerify, err := env.GetAsBool(\"INSECURE_SKIP_VERIFY\", false, true)\n\tif err != nil {\n\t\tzap.S().Error(err)\n\t}\n\n\t// Create tls.Config with desired tls properties\n\t/* #nosec G402 -- Remote verification is not yet implemented*/\n\treturn &tls.Config{\n\t\t// RootCAs = certs used to verify server cert.\n\t\tRootCAs: certpool,\n\t\t// ClientAuth = whether to request cert from server.\n\t\t// Since the server is set up for SSL, this happens\n\t\t// anyways.\n\t\t// ClientAuth: tls.NoClientCert,\n\t\t// ClientCAs = certs used to validate client cert.\n\t\t// ClientCAs: nil,\n\t\t// InsecureSkipVerify = verify that cert contents\n\t\t// match server. IP matches what is in cert etc.\n\t\t/* #nosec G402 -- Remote verification is not yet implemented*/\n\t\tInsecureSkipVerify: skipVerify,\n\t\t// Certificates = list of certs client sends to server.\n\t\tCertificates: []tls.Certificate{cert},\n\t\tClientAuth: tls.RequireAndVerifyClientCert,\n\t}\n}", "title": "" }, { "docid": "458d685a9de5d8229b298bf79408ac10", "score": "0.5838702", "text": "func TLSConfigFromFiles(certPath, keyPath, caPath string) (*tls.Config, error) {\n\tcert, key, ca, err := tlsBytesFromFiles(certPath, keyPath, caPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn TLSConfigFromBytes(cert, key, ca)\n}", "title": "" }, { "docid": "362c9184dba3cd292d37f349c1773e6c", "score": "0.5829682", "text": "func loadTLSCertificate(certPath string, TLSPrivateKeyPath string) (*x509.CertPool, tls.Certificate, error) {\n\tpool := x509.NewCertPool()\n\tfile, err := ioutil.ReadFile(certPath)\n\tif err != nil {\n\t\tlog.Error(\"error\", err)\n\t\treturn nil, tls.Certificate{}, err\n\t}\n\n\tif ok := pool.AppendCertsFromPEM(file); !ok {\n\t\tlog.Error(\"failed to parse root certificate\")\n\t\treturn nil, tls.Certificate{}, errors.New(\"failed to parse root certificate\")\n\t}\n\tcert, err := tls.LoadX509KeyPair(certPath, TLSPrivateKeyPath)\n\tif err != nil {\n\t\tlog.Error(\"Cannot load certificate. Path to CertificateFile or privateKeyFile might be invalid.\",\n\t\t\t\"CertPath\", certPath, \"KeyPath\", TLSPrivateKeyPath, \"error\", err)\n\t\treturn nil, tls.Certificate{}, err\n\t}\n\treturn pool, cert, nil\n}", "title": "" }, { "docid": "0688534ce7720f718445b09e9f3a8012", "score": "0.579442", "text": "func loadCertificates(path string) ([]*x509.Certificate, error) {\n\tdata, err := os.ReadFile(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar certs []*x509.Certificate\n\tfor {\n\t\tblk, rest := pem.Decode(data)\n\t\tif blk == nil {\n\t\t\treturn certs, nil\n\t\t}\n\t\tdata = rest\n\t\tif blk.Type != \"CERTIFICATE\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tcert, err := x509.ParseCertificate(blk.Bytes)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcerts = append(certs, cert)\n\t}\n}", "title": "" }, { "docid": "fd8a132fecca7baa955b83c3a616bb94", "score": "0.5790203", "text": "func loadCertsFromDir(s *X509FileStore) {\n\tcertFiles := s.fileStore.List()\n\tfor _, c := range certFiles {\n\t\ts.AddCertFromFile(c)\n\t}\n}", "title": "" }, { "docid": "ddf6b85b0c4b66cb5c93accf93db8347", "score": "0.5785035", "text": "func loadCertWithCreate(cfg *Config) (tls.Certificate, *x509.Certificate,\n\terror) {\n\n\t// Ensure we create TLS key and certificate if they don't exist.\n\tif !lnrpc.FileExists(cfg.TLSCertPath) &&\n\t\t!lnrpc.FileExists(cfg.TLSKeyPath) {\n\n\t\tlog.Infof(\"Generating TLS certificates...\")\n\t\terr := cert.GenCertPair(\n\t\t\tdefaultSelfSignedOrganization, cfg.TLSCertPath,\n\t\t\tcfg.TLSKeyPath, cfg.TLSExtraIPs,\n\t\t\tcfg.TLSExtraDomains, cfg.TLSDisableAutofill,\n\t\t\tcert.DefaultAutogenValidity,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn tls.Certificate{}, nil, err\n\t\t}\n\t\tlog.Infof(\"Done generating TLS certificates\")\n\t}\n\n\treturn cert.LoadCert(cfg.TLSCertPath, cfg.TLSKeyPath)\n}", "title": "" }, { "docid": "6153fad9890d43fc6f8255de80636ce5", "score": "0.5780222", "text": "func (c *ServerConfig) TLSConfig() (*tls.Config, error) {\n\tif c.TLSCert == \"\" && c.TLSKey == \"\" && len(c.TLSAllowedCACerts) == 0 {\n\t\treturn nil, nil\n\t}\n\n\ttlsConfig := &tls.Config{}\n\n\tif len(c.TLSAllowedCACerts) != 0 {\n\t\tpool, err := makeCertPool(c.TLSAllowedCACerts)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttlsConfig.ClientCAs = pool\n\t\ttlsConfig.ClientAuth = tls.RequireAndVerifyClientCert\n\t}\n\n\tif c.TLSCert != \"\" && c.TLSKey != \"\" {\n\t\terr := loadCertificate(tlsConfig, c.TLSCert, c.TLSKey)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "90adf77b7e51fcc4418ed63908f5c6cc", "score": "0.57547677", "text": "func (i *TiKVInstance) setTLSConfig(ctx context.Context, enableTLS bool, configs map[string]any, paths meta.DirPaths) (map[string]any, error) {\n\tif enableTLS {\n\t\tif configs == nil {\n\t\t\tconfigs = make(map[string]any)\n\t\t}\n\t\tconfigs[\"security.ca-path\"] = fmt.Sprintf(\n\t\t\t\"%s/tls/%s\",\n\t\t\tpaths.Deploy,\n\t\t\tTLSCACert,\n\t\t)\n\t\tconfigs[\"security.cert-path\"] = fmt.Sprintf(\n\t\t\t\"%s/tls/%s.crt\",\n\t\t\tpaths.Deploy,\n\t\t\ti.Role())\n\t\tconfigs[\"security.key-path\"] = fmt.Sprintf(\n\t\t\t\"%s/tls/%s.pem\",\n\t\t\tpaths.Deploy,\n\t\t\ti.Role())\n\t} else {\n\t\t// drainer tls config list\n\t\ttlsConfigs := []string{\n\t\t\t\"security.ca-path\",\n\t\t\t\"security.cert-path\",\n\t\t\t\"security.key-path\",\n\t\t}\n\t\t// delete TLS configs\n\t\tif configs != nil {\n\t\t\tfor _, config := range tlsConfigs {\n\t\t\t\tdelete(configs, config)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn configs, nil\n}", "title": "" }, { "docid": "4c4161681e42a544136951d953272636", "score": "0.5748266", "text": "func NewExternalCATLSConfig(certs []tls.Certificate, rootPool *x509.CertPool) *tls.Config {\n\treturn &tls.Config{\n\t\tCertificates: certs,\n\t\tRootCAs: rootPool,\n\t\tMinVersion: tls.VersionTLS12,\n\t}\n}", "title": "" }, { "docid": "cdbbbe249ea83a0bf12b6ca4b62b8505", "score": "0.5724854", "text": "func TrustBundleConfigMap(cfgMap *corev1.ConfigMap, caBundleKey string) ([]*x509.Certificate, []byte, error) {\n\tif _, ok := cfgMap.Data[caBundleKey]; !ok {\n\t\treturn nil, nil, fmt.Errorf(\"ConfigMap %q is missing %q\", cfgMap.Name, caBundleKey)\n\t}\n\ttrustBundleData := []byte(cfgMap.Data[caBundleKey])\n\tif len(trustBundleData) == 0 {\n\t\treturn nil, nil, fmt.Errorf(\"data key %q is empty from ConfigMap %q\", caBundleKey, cfgMap.Name)\n\t}\n\tcertBundle, err := CertificateData(trustBundleData)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"failed parsing certificate data from ConfigMap %q: %v\", cfgMap.Name, err)\n\t}\n\n\treturn certBundle, trustBundleData, nil\n}", "title": "" }, { "docid": "b6ee85e8404979f6acc3452a5db5a0d1", "score": "0.5702595", "text": "func GenTLSConfig(tc *TLSConfigOpts) (*tls.Config, error) {\n\n\t// Now load in cert and private key\n\tcert, err := tls.LoadX509KeyPair(tc.CertFile, tc.KeyFile)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error parsing X509 certificate/key pair: %v\", err)\n\t}\n\tcert.Leaf, err = x509.ParseCertificate(cert.Certificate[0])\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error parsing certificate: %v\", err)\n\t}\n\n\t// Create TLSConfig\n\t// We will determine the cipher suites that we prefer.\n\tconfig := tls.Config{\n\t\tCertificates: []tls.Certificate{cert},\n\t\tPreferServerCipherSuites: true,\n\t\tMinVersion: tls.VersionTLS12,\n\t\tCipherSuites: tc.Ciphers,\n\t}\n\n\t// Require client certificates as needed\n\tif tc.Verify {\n\t\tconfig.ClientAuth = tls.RequireAnyClientCert\n\t}\n\t// Add in CAs if applicable.\n\tif tc.CaFile != \"\" {\n\t\trootPEM, err := ioutil.ReadFile(tc.CaFile)\n\t\tif err != nil || rootPEM == nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tpool := x509.NewCertPool()\n\t\tok := pool.AppendCertsFromPEM([]byte(rootPEM))\n\t\tif !ok {\n\t\t\treturn nil, fmt.Errorf(\"failed to parse root ca certificate\")\n\t\t}\n\t\tconfig.RootCAs = pool\n\t}\n\n\treturn &config, nil\n}", "title": "" }, { "docid": "4cbf84e594e06fb0600a27fedadffba8", "score": "0.56997746", "text": "func tlsConfiguration(caCertPath string, certPath, keyPath string, clientAuthMode tls.ClientAuthType) (*tls.Config, error) {\n\tcfg := &tls.Config{}\n\tcertPool := x509.NewCertPool()\n\tcaCert, err := os.ReadFile(caCertPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcertPool.AppendCertsFromPEM(caCert)\n\n\tkeypem, err := os.ReadFile(keyPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcertpem, err := os.ReadFile(certPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif certpem != nil && keypem != nil {\n\t\tmycert, err := tls.X509KeyPair(certpem, keypem)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcfg.Certificates = make([]tls.Certificate, 1)\n\t\tcfg.Certificates[0] = mycert\n\t\tcfg.ClientCAs = certPool\n\t\tcfg.ClientAuth = clientAuthMode\n\t}\n\n\t// Use only modern ciphers.\n\tcfg.CipherSuites = []uint16{\n\t\ttls.TLS_AES_128_GCM_SHA256,\n\t\ttls.TLS_AES_256_GCM_SHA384,\n\t\ttls.TLS_CHACHA20_POLY1305_SHA256,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,\n\t\ttls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\n\t\ttls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,\n\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,\n\t}\n\n\t// Use TLS v1.2 and higher.\n\tcfg.MinVersion = tls.VersionTLS12\n\n\t// prefer HTTP/2 explicitly\n\tcfg.NextProtos = []string{\"h2\", \"http/1.1\"}\n\n\tcfg.PreferServerCipherSuites = true\n\n\t// Don't allow session resumption.\n\tcfg.SessionTicketsDisabled = true\n\treturn cfg, nil\n}", "title": "" }, { "docid": "2405bf003b8d4aeb3681fbf1766726eb", "score": "0.5696792", "text": "func TlsConfig(c *TlsParams) (*tls.Config, error) {\n\tif c == nil {\n\t\treturn nil, fmt.Errorf(\"TlsParams is empty\")\n\t}\n\n\tHardFail = c.HardFail\n\tcfg, err := ServerTlsConfig(c.CertFile, c.KeyFile, c.CACertFile)\n\tif err != nil {\n\t\treturn cfg, err\n\t}\n\n\tif c.ServerName != \"\" {\n\t\tcfg.ServerName = c.ServerName\n\t}\n\n\treturn cfg, err\n}", "title": "" }, { "docid": "ec668b0e9a1983f9e54e2d196b7c6efb", "score": "0.5694209", "text": "func RegisterCertEntriesFromConfig(configFilePath string) map[string]Entry {\n\tconfig := &BootConfigCert{}\n\n\trkcommon.UnmarshalBootConfig(configFilePath, config)\n\n\tres := make(map[string]Entry)\n\n\tfor i := range config.Cert {\n\t\telement := config.Cert[i]\n\n\t\tif len(element.Name) < 1 || !rkcommon.MatchLocaleWithEnv(element.Locale) {\n\t\t\tcontinue\n\t\t}\n\n\t\tzapLoggerEntry := GlobalAppCtx.GetZapLoggerEntry(element.Logger.ZapLogger.Ref)\n\t\tif zapLoggerEntry == nil {\n\t\t\tzapLoggerEntry = GlobalAppCtx.GetZapLoggerEntryDefault()\n\t\t}\n\n\t\teventLoggerEntry := GlobalAppCtx.GetEventLoggerEntry(element.Logger.EventLogger.Ref)\n\t\tif eventLoggerEntry == nil {\n\t\t\teventLoggerEntry = GlobalAppCtx.GetEventLoggerEntryDefault()\n\t\t}\n\n\t\tvar retriever Retriever\n\n\t\tswitch element.Provider {\n\t\tcase ProviderConsul:\n\t\t\tretriever = &CredRetrieverConsul{\n\t\t\t\tProvider: element.Provider,\n\t\t\t\tLocale: element.Locale,\n\t\t\t\tEndpoint: element.Endpoint,\n\t\t\t\tZapLoggerEntry: zapLoggerEntry,\n\t\t\t\tEventLoggerEntry: eventLoggerEntry,\n\t\t\t\tDatacenter: element.Datacenter,\n\t\t\t\tToken: element.Token,\n\t\t\t\tBasicAuth: element.BasicAuth,\n\t\t\t\tPaths: []string{\n\t\t\t\t\telement.ServerKeyPath,\n\t\t\t\t\telement.ServerCertPath,\n\t\t\t\t\telement.ClientKeyPath,\n\t\t\t\t\telement.ClientCertPath,\n\t\t\t\t},\n\t\t\t}\n\t\tcase ProviderEtcd:\n\t\t\tretriever = &CredRetrieverEtcd{\n\t\t\t\tProvider: element.Provider,\n\t\t\t\tZapLoggerEntry: zapLoggerEntry,\n\t\t\t\tEventLoggerEntry: eventLoggerEntry,\n\t\t\t\tLocale: element.Locale,\n\t\t\t\tEndpoint: element.Endpoint,\n\t\t\t\tBasicAuth: element.BasicAuth,\n\t\t\t\tPaths: []string{\n\t\t\t\t\telement.ServerKeyPath,\n\t\t\t\t\telement.ServerCertPath,\n\t\t\t\t\telement.ClientKeyPath,\n\t\t\t\t\telement.ClientCertPath,\n\t\t\t\t},\n\t\t\t}\n\t\tcase ProviderLocalFs:\n\t\t\tretriever = &CredRetrieverLocalFs{\n\t\t\t\tProvider: element.Provider,\n\t\t\t\tLocale: element.Locale,\n\t\t\t\tZapLoggerEntry: zapLoggerEntry,\n\t\t\t\tEventLoggerEntry: eventLoggerEntry,\n\t\t\t\tPaths: []string{\n\t\t\t\t\telement.ServerKeyPath,\n\t\t\t\t\telement.ServerCertPath,\n\t\t\t\t\telement.ClientKeyPath,\n\t\t\t\t\telement.ClientCertPath,\n\t\t\t\t},\n\t\t\t}\n\t\tcase ProviderRemoteFs:\n\t\t\tretriever = &CredRetrieverRemoteFs{\n\t\t\t\tProvider: element.Provider,\n\t\t\t\tZapLoggerEntry: zapLoggerEntry,\n\t\t\t\tEventLoggerEntry: eventLoggerEntry,\n\t\t\t\tLocale: element.Locale,\n\t\t\t\tEndpoint: element.Endpoint,\n\t\t\t\tBasicAuth: element.BasicAuth,\n\t\t\t\tPaths: []string{\n\t\t\t\t\telement.ServerKeyPath,\n\t\t\t\t\telement.ServerCertPath,\n\t\t\t\t\telement.ClientKeyPath,\n\t\t\t\t\telement.ClientCertPath,\n\t\t\t\t},\n\t\t\t}\n\t\t}\n\n\t\tentry := RegisterCertEntry(\n\t\t\tWithNameCert(element.Name),\n\t\t\tWithDescriptionCert(element.Description),\n\t\t\tWithZapLoggerEntryCert(zapLoggerEntry),\n\t\t\tWithEventLoggerEntryCert(eventLoggerEntry),\n\t\t\tWithRetrieverCert(retriever),\n\t\t\tWithServerKeyPath(element.ServerKeyPath),\n\t\t\tWithServerCertPath(element.ServerCertPath),\n\t\t\tWithClientKeyPath(element.ClientKeyPath),\n\t\t\tWithClientCertPath(element.ClientCertPath))\n\n\t\tres[entry.GetName()] = entry\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "ad95ebd854915bd6dfb4e8edc222eb34", "score": "0.5675608", "text": "func ConfigureTLS(certPemPath, keyPemPath, caCertPath string) (*tls.Config, error) {\n\tvar caCertParsed *x509.Certificate\n\tpemBytes, err := ioutil.ReadFile(caCertPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcertDERBlock, _ := pem.Decode(pemBytes)\n\tif certDERBlock == nil {\n\t\treturn nil, errors.New(\"No certificate data read from PEM\")\n\t}\n\tcaCertParsed, err = x509.ParseCertificate(certDERBlock.Bytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc := &tls.Config{\n\t\tMinVersion: tls.VersionTLS12,\n\t\tCurvePreferences: []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256},\n\t\tPreferServerCipherSuites: true,\n\t\tCipherSuites: []uint16{\n\t\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\n\t\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\n\t\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,\n\t\t\ttls.TLS_RSA_WITH_AES_256_GCM_SHA384,\n\t\t\ttls.TLS_RSA_WITH_AES_256_CBC_SHA,\n\t\t},\n\t\tVerifyPeerCertificate: CheckCertSignature(caCertParsed),\n\t\tInsecureSkipVerify: true,\n\t\tClientAuth: tls.RequestClientCert,\n\t}\n\n\tmainCert, err := tls.LoadX509KeyPair(certPemPath, keyPemPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tc.Certificates = []tls.Certificate{mainCert}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "6899a5ee979b0db5191e340fbcc0048d", "score": "0.5673716", "text": "func (e *ECU) controlTLSConfig() (*tls.Config, error) {\n\trootCACerts := x509.NewCertPool()\n\tdata, err := ioutil.ReadFile(e.cfg.CACertsFile)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to read CA cert file: %v\", err)\n\t}\n\tif ok := rootCACerts.AppendCertsFromPEM(data); !ok {\n\t\treturn nil, errors.New(\"failed to load CA certificates\")\n\t}\n\tcerts, err := tls.LoadX509KeyPair(e.cfg.ECUCertFile, e.cfg.ECUKeyFile)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to load X.509 key pair: %v\", err)\n\t}\n\t// TODO(jsing): Make the server name configurable.\n\ttlsConfig := &tls.Config{\n\t\tCertificates: []tls.Certificate{certs},\n\t\tRootCAs: rootCACerts,\n\t\tServerName: \"seesaw.example.com\",\n\t}\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "eed6a7a2655d105353675ca14018b999", "score": "0.56590664", "text": "func (s *Settings) TLSconfig() (*tls.Config, error) {\n\tcert, err := tls.LoadX509KeyPair(s.SSLCert, s.SSLKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconf := &tls.Config{\n\t\tCertificates: []tls.Certificate{cert},\n\t\tInsecureSkipVerify: !s.SSLVerify,\n\t\tMinVersion: tls.VersionTLS12,\n\t}\n\n\treturn conf, nil\n}", "title": "" }, { "docid": "98585c81607e1f544fc0c7efa11802d0", "score": "0.56569976", "text": "func (res *Resource) LoadConfig(cfg *pb.ResourceTemplate, expiryTime *time.Time) {\n\tres.mu.Lock()\n\tdefer res.mu.Unlock()\n\tres.config = cfg\n\tres.expiryTime = expiryTime\n\talgo := cfg.GetAlgorithm()\n\tres.algorithm = GetAlgorithm(algo)\n\tres.learner = Learn(algo)\n}", "title": "" }, { "docid": "f3db159db11079ace67330dc4cf62ab9", "score": "0.56557554", "text": "func initTLSConfig(ctx context.Context, srv *mysqlServer, mysqlSslCert, mysqlSslKey, mysqlSslCa, mysqlSslCrl, mysqlSslServerCA string, mysqlServerRequireSecureTransport bool, mysqlMinTLSVersion uint16) error {\n\tserverConfig, err := vttls.ServerConfig(mysqlSslCert, mysqlSslKey, mysqlSslCa, mysqlSslCrl, mysqlSslServerCA, mysqlMinTLSVersion)\n\tif err != nil {\n\t\tlog.Exitf(\"grpcutils.TLSServerConfig failed: %v\", err)\n\t\treturn err\n\t}\n\tsrv.tcpListener.TLSConfig.Store(serverConfig)\n\tsrv.tcpListener.RequireSecureTransport = mysqlServerRequireSecureTransport\n\tsrv.sigChan = make(chan os.Signal, 1)\n\tsignal.Notify(srv.sigChan, syscall.SIGHUP)\n\tgo func() {\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\tcase <-srv.sigChan:\n\t\t\t\tserverConfig, err := vttls.ServerConfig(mysqlSslCert, mysqlSslKey, mysqlSslCa, mysqlSslCrl, mysqlSslServerCA, mysqlMinTLSVersion)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorf(\"grpcutils.TLSServerConfig failed: %v\", err)\n\t\t\t\t} else {\n\t\t\t\t\tlog.Info(\"grpcutils.TLSServerConfig updated\")\n\t\t\t\t\tsrv.tcpListener.TLSConfig.Store(serverConfig)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}()\n\treturn nil\n}", "title": "" }, { "docid": "9ce30bcdc3d53a3aecffa8c31e2df874", "score": "0.56546825", "text": "func (l *Listener) initTLS() error {\n\tkeyFile := l.tls.KeyFile\n\tif keyFile == \"\" {\n\t\treturn nil // no TLS\n\t}\n\tcertFile := l.tls.CertFile\n\tif certFile == \"\" {\n\t\tcertFile = keyFile\n\t}\n\tcert, err := tls.LoadX509KeyPair(certFile, keyFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar clientCAs *x509.CertPool\n\tif l.tls.CaCertFile != \"\" {\n\t\tclientCAs = x509.NewCertPool()\n\t\tclientCAbytes, err := ioutil.ReadFile(l.tls.CaCertFile)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif ok := clientCAs.AppendCertsFromPEM(clientCAbytes); !ok {\n\t\t\treturn errors.New(\"Could not append CA certficates from PEM file\")\n\t\t}\n\t}\n\n\tserverName := l.tls.ServerName\n\tif serverName == \"\" {\n\t\tserverName, err = os.Hostname()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tvar minVersion uint16\n\tvar maxVersion uint16\n\tvar ok bool\n\tif l.tls.MinVersion != \"\" {\n\t\tminVersion, ok = tlsVersionMap[strings.ToLower(l.tls.MinVersion)]\n\t\tif !ok {\n\t\t\treturn errors.Newf(\"Bad minimum TLS version: '%s'\", l.tls.MinVersion)\n\t\t}\n\t}\n\tif l.tls.MaxVersion != \"\" {\n\t\tminVersion, ok = tlsVersionMap[strings.ToLower(l.tls.MaxVersion)]\n\t\tif !ok {\n\t\t\treturn errors.Newf(\"Bad maximum TLS version: '%s'\", l.tls.MaxVersion)\n\t\t}\n\t}\n\n\tvar clientAuth tls.ClientAuthType\n\tif l.tls.ClientAuth != \"\" {\n\t\tclientAuth, ok = tlsClientAuthMap[strings.ToLower(l.tls.ClientAuth)]\n\t\tif !ok {\n\t\t\treturn errors.Newf(\"Bad TLS client auth type: '%s'\", l.tls.ClientAuth)\n\t\t}\n\t}\n\n\tl.tlsconfig = &tls.Config{\n\t\tCertificates: []tls.Certificate{cert},\n\t\tServerName: serverName,\n\t\tClientAuth: clientAuth,\n\t\tClientCAs: clientCAs,\n\t\tMinVersion: minVersion,\n\t\tMaxVersion: maxVersion,\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b8b2a5df8cd491ec60764187496d39c2", "score": "0.5654354", "text": "func (c *ConfigToml) TLSReadCAFile(caCert string) (*x509.CertPool, error) {\n\n\tcaCertBytes, err := ioutil.ReadFile(caCert)\n\tif err != nil {\n\t\tlog.Errorf(\"Unable to read CA file %s : %s\", caCert, err.Error())\n\t\treturn nil, err\n\t}\n\n\tcaCertPool := x509.NewCertPool()\n\tif ok := caCertPool.AppendCertsFromPEM(caCertBytes); !ok {\n\t\tlog.Error(\"Unable to add CA certificate to certificate pool\")\n\t\treturn nil, err\n\t}\n\n\treturn caCertPool, nil\n}", "title": "" }, { "docid": "886b73320be1612cdb0d8867f5ebde35", "score": "0.56523633", "text": "func (p *Options) Config(logger *zap.Logger) (*tls.Config, error) {\n\tvar minVersionId, maxVersionId uint16\n\n\tcertPool, err := p.loadCertPool()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to load CA CertPool: %w\", err)\n\t}\n\n\tcipherSuiteIds, err := CipherSuiteNamesToIDs(p.CipherSuites)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get cipher suite ids from cipher suite names: %w\", err)\n\t}\n\n\tif p.MinVersion != \"\" {\n\t\tminVersionId, err = VersionNameToID(p.MinVersion)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"failed to get minimum tls version: %w\", err)\n\t\t}\n\t}\n\n\tif p.MaxVersion != \"\" {\n\t\tmaxVersionId, err = VersionNameToID(p.MaxVersion)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"failed to get maximum tls version: %w\", err)\n\t\t}\n\t}\n\n\tif p.MinVersion != \"\" && p.MaxVersion != \"\" {\n\t\tif minVersionId > maxVersionId {\n\t\t\treturn nil, fmt.Errorf(\"minimum tls version can't be greater than maximum tls version\")\n\t\t}\n\t}\n\n\t// #nosec G402\n\ttlsCfg := &tls.Config{\n\t\tRootCAs: certPool,\n\t\tServerName: p.ServerName,\n\t\tInsecureSkipVerify: p.SkipHostVerify,\n\t\tCipherSuites: cipherSuiteIds,\n\t\tMinVersion: minVersionId,\n\t\tMaxVersion: maxVersionId,\n\t}\n\n\tif p.ClientCAPath != \"\" {\n\t\t// TODO this should be moved to certWatcher, since it already loads key pair\n\t\tcertPool := x509.NewCertPool()\n\t\tif err := addCertToPool(p.ClientCAPath, certPool); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttlsCfg.ClientCAs = certPool\n\t\ttlsCfg.ClientAuth = tls.RequireAndVerifyClientCert\n\t}\n\n\tcertWatcher, err := newCertWatcher(*p, logger, tlsCfg.RootCAs, tlsCfg.ClientCAs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tp.certWatcher = certWatcher\n\n\tif (p.CertPath == \"\" && p.KeyPath != \"\") || (p.CertPath != \"\" && p.KeyPath == \"\") {\n\t\treturn nil, fmt.Errorf(\"for client auth via TLS, either both client certificate and key must be supplied, or neither\")\n\t}\n\tif p.CertPath != \"\" && p.KeyPath != \"\" {\n\t\ttlsCfg.GetCertificate = func(*tls.ClientHelloInfo) (*tls.Certificate, error) {\n\t\t\treturn p.certWatcher.certificate(), nil\n\t\t}\n\t\t// GetClientCertificate is used on the client side when server is configured with tls.RequireAndVerifyClientCert e.g. mTLS\n\t\ttlsCfg.GetClientCertificate = func(*tls.CertificateRequestInfo) (*tls.Certificate, error) {\n\t\t\treturn p.certWatcher.certificate(), nil\n\t\t}\n\t}\n\n\treturn tlsCfg, nil\n}", "title": "" }, { "docid": "7ba8b28ddcc18d5cf7d955cb2d01f5ff", "score": "0.56461525", "text": "func LoadConfig(ctx context.Context, v interface{}) error {\n\tconf := ctx.Value(CtxKeyConfig)\n\tif v == nil {\n\t\treturn fmt.Errorf(\"no config in context\")\n\t}\n\tdata, _ := json.Marshal(conf)\n\terr := json.Unmarshal(data, v)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "eb0d00a95831480bf5223d105d68f49b", "score": "0.564526", "text": "func tlsConfig() *tls.Config {\n\n\trootCAs := x509.NewCertPool()\n\trootCAs.AppendCertsFromPEM(a.Cert)\n\n\treturn &tls.Config{\n\t\tRootCAs: rootCAs,\n\t\tInsecureSkipVerify: false,\n\t\tServerName: \"localhost\",\n\t}\n}", "title": "" }, { "docid": "1e9cbeee0520762697e53a1500eea800", "score": "0.5642252", "text": "func ConfigureTLS(t *http.Transport, rootCertsFilePath string) error {\n\tcertPool := x509.NewCertPool()\n\tbuf, err := ioutil.ReadFile(rootCertsFilePath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcertPool.AppendCertsFromPEM(buf)\n\tt.TLSClientConfig = &tls.Config{RootCAs: certPool}\n\n\treturn nil\n}", "title": "" }, { "docid": "753c59887d4653c784378581af02778c", "score": "0.56363505", "text": "func (c ServerConfig) TLSConfig() (*tls.Config, error) {\n\tvar err error\n\tc.listenHost, c.listenPort, err = net.SplitHostPort(c.ServerAddr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif c.AutoCert {\n\t\thosts := append([]string{c.listenHost}, c.ExtraHosts...)\n\t\tm := autocert.Manager{\n\t\t\tPrompt: autocert.AcceptTOS,\n\t\t\tHostPolicy: autocert.HostWhitelist(hosts...),\n\t\t\tCache: autocert.DirCache(\"certs\"),\n\t\t}\n\t\treturn &tls.Config{GetCertificate: m.GetCertificate}, nil\n\t}\n\ttc := &tls.Config{}\n\ttc.InsecureSkipVerify = c.InsecureSkipVerify\n\ttc.NextProtos = []string{\"h2\"}\n\ttc.Certificates = make([]tls.Certificate, 1)\n\ttc.Certificates[0], err = tls.LoadX509KeyPair(c.CertFile, c.CertKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn tc, nil\n}", "title": "" }, { "docid": "9679246bd8e3c5471f02ea1ec6389511", "score": "0.5620827", "text": "func LoadCa(path string, numBootNodes, numRings uint32) (*Ca, error) {\n\tif numBootNodes < 1 {\n\t\treturn nil, errInvalidBootNodes\n\t}\n\n\tif numRings < 1 {\n\t\treturn nil, errInvalidNumRings\n\t}\n\tkeyPath := filepath.Join(path, \"key.pem\")\n\n\tfp, err := ioutil.ReadFile(keyPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Load private key\n\tkeyBlock, _ := pem.Decode(fp)\n\tkey, err := x509.ParsePKCS1PrivateKey(keyBlock.Bytes)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc := &Ca{\n\t\tprivKey: key,\n\t\tpubKey: key.Public(),\n\t\tpath: path,\n\t\tkeyFilePath: \"key.pem\",\n\t}\n\n\t// Load group certificates\n\tdirEntries, err := filepath.Glob(filepath.Join(path, \"*\"))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tgroupDirectories := make([]string, 0)\n\n\t// Find all group directories\n\tfor _, d := range dirEntries {\n\t\tif d == filepath.Join(path, c.keyFilePath) {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Group certificates\n\t\tif err := filepath.Walk(d, func(path string, info os.FileInfo, err error) error {\n\t\t\tif info.IsDir() {\n\t\t\t\tgroupDirectories = append(groupDirectories, info.Name())\n\t\t\t}\n\t\t\treturn nil\n\t\t}); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// Load all certs in all group directories\n\tfor _, groupDir := range groupDirectories {\n\t\tg := &group{\n\t\t\tknownCerts: make([]*x509.Certificate, numBootNodes),\n\t\t\tbootNodes: numBootNodes,\n\t\t\tnumRings: numRings,\n\t\t\texistingIds: make(map[string]bool),\n\t\t}\n\n\t\tfiles, err := ioutil.ReadDir(filepath.Join(path, groupDir))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfor _, file := range files {\n\t\t\tif file.Name() == \"ca-cert.pem\" {\n\n\t\t\t\t// Read group certificate\n\t\t\t\tfp, err := ioutil.ReadFile(filepath.Join(path, groupDir, file.Name()))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tcertBlock, _ := pem.Decode(fp)\n\t\t\t\tcert, err := x509.ParseCertificate(certBlock.Bytes)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\n\t\t\t\tg.groupCert = cert\n\n\t\t\t\t// Search for number of rings extension\n\t\t\t\tfor _, ext := range cert.Extensions {\n\t\t\t\t\tif ext.Id.Equal(RingNumberOid) {\n\t\t\t\t\t\tg.numRings = binary.LittleEndian.Uint32(ext.Value)\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\t// Add group object to CA\n\t\t\t\tlog.Info(\"Reloaded group certificate with serial id \", g.groupCert.SerialNumber.String())\n\t\t\t\tlog.Info(\"Number of rings in this group is \", g.numRings)\n\t\t\t}\n\t\t}\n\n\t\tc.groups = append(c.groups, g)\n\n\t\tif err := g.loadCertificates(filepath.Join(path, groupDir)); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "fe74e15b13afe8dd4ffd39fdb8edce81", "score": "0.56119895", "text": "func configureTLS() (tlsConfig tls.Config, err error) {\n\n\tif !viper.GetBool(\"server.tls.enabled\") {\n\t\tlog.Debug(\"TLS not enabled, skipping TLS config\")\n\t\treturn\n\t}\n\n\t// attempt to load configured cert/key\n\tlog.Info(\"TLS enabled, loading cert and key\")\n\tlog.Debugf(\"loading TLS cert and key: %s %s\", viper.GetString(\"server.tls.cert_chain\"), viper.GetString(\"server.tls.private_key\"))\n\tcert, err := tls.LoadX509KeyPair(viper.GetString(\"server.tls.cert_chain\"), viper.GetString(\"server.tls.private_key\"))\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// configure hardened TLS settings\n\ttlsConfig.Certificates = []tls.Certificate{cert}\n\ttlsConfig.MinVersion = tlsMinVersion\n\ttlsConfig.InsecureSkipVerify = false\n\ttlsConfig.PreferServerCipherSuites = true\n\ttlsConfig.CurvePreferences = tlsCurvePreferences\n\ttlsConfig.CipherSuites = tlsCiphers\n\n\treturn\n}", "title": "" }, { "docid": "05d11589bdd5bd25bdd5e2d50278fa9a", "score": "0.561116", "text": "func loadConfig() map[string]string {\n\tm := make(map[string]string)\n\terr := cfg.Load(\"21tweet.cfg\", m)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn m\n}", "title": "" }, { "docid": "5bc30cbe12d720c46428e4bec53870d2", "score": "0.56076235", "text": "func loadCertificates(private, public string) error {\n\tprivateBytes, err := ioutil.ReadFile(private)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tpublicBytes, err := ioutil.ReadFile(public)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn parseRSA(privateBytes, publicBytes)\n}", "title": "" }, { "docid": "36ae21d3f45705617589b2a701ec12ea", "score": "0.5605535", "text": "func (h *Handler) initializeTLS(setting *rancherv3api.Setting) error {\n\tinternalCACerts, err := h.RancherSettingCache.Get(internalCACertsSetting)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif internalCACerts.Value == \"\" {\n\t\t// Not initialized, enqueue\n\t\th.RancherSettingController.EnqueueAfter(caCertsSetting, 30*time.Second)\n\t\treturn nil\n\t}\n\n\tcaCertsCopy := setting.DeepCopy()\n\tcaCertsCopy.Default = internalCACerts.Value\n\tif _, err = h.RancherSettings.Update(caCertsCopy); err != nil {\n\t\treturn err\n\t}\n\n\tif err := h.addVIPToSAN(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e0170fb0d5b9cd4cb7b22118c75da183", "score": "0.55934924", "text": "func addCerts(platform *platform.Platform, cfg *konfigadm.Config) error {\n\tif platform.CA == nil {\n\t\treturn errors.New(noCAErrorText)\n\t}\n\n\tclusterCA := certs.NewCertificateBuilder(\"kubernetes-ca\").CA().Certificate\n\tclusterCA, err := platform.GetCA().SignCertificate(clusterCA, 10)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"addCerts: failed to sign certificate: %v\", err)\n\t}\n\n\t// plus any cert signed by this cluster specific CA\n\tcrt := string(clusterCA.EncodedCertificate()) + \"\\n\"\n\t// any cert signed by the global CA should be allowed\n\tcrt = crt + string(platform.GetCA().GetPublicChain()[0].EncodedCertificate()) + \"\\n\"\n\t// csrsigning controller doesn't like having more than 1 CA cert passed to it\n\tcfg.Files[\"/etc/kubernetes/pki/csr-ca.crt\"] = string(clusterCA.EncodedCertificate())\n\tcfg.Files[\"/etc/kubernetes/pki/csr-ca.key\"] = string(clusterCA.EncodedPrivateKey())\n\n\tcfg.Files[\"/etc/kubernetes/pki/ca.crt\"] = crt\n\tcfg.Files[\"/etc/kubernetes/pki/ca.key\"] = string(clusterCA.EncodedPrivateKey())\n\tcfg.Files[\"/etc/ssl/certs/openid-ca.pem\"] = string(platform.GetIngressCA().GetPublicChain()[0].EncodedCertificate())\n\treturn nil\n}", "title": "" }, { "docid": "d0505e722b4825a21f3e118f737cf796", "score": "0.55897695", "text": "func LoadConfig(ctx *context.Context) error {\n\tconfig := context.Storable{}\n\t_, err := toml.DecodeFile(ctx.ConfigPath, &config)\n\tif err != nil {\n\t\treturn ErrUnableToLoadConfig.Wrap(err)\n\t}\n\tctx.SetStorable(config)\n\treturn nil\n}", "title": "" }, { "docid": "c75d2055c3859c430c698378e16a0cb0", "score": "0.5586888", "text": "func LoadConfig(configFile string, disableAgent bool, disableAPI bool, quiet bool) (*csconfig.Config, error) {\n\tcConfig, _, err := csconfig.NewConfig(configFile, disableAgent, disableAPI, quiet)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif (cConfig.Common == nil || *cConfig.Common == csconfig.CommonCfg{}) {\n\t\treturn nil, fmt.Errorf(\"unable to load configuration: common section is empty\")\n\t}\n\n\tcConfig.Common.LogLevel = newLogLevel(cConfig.Common.LogLevel, flags)\n\n\tif dumpFolder != \"\" {\n\t\tparser.ParseDump = true\n\t\tparser.DumpFolder = dumpFolder\n\t\tleakybucket.BucketPourTrack = true\n\t\tdumpStates = true\n\t}\n\n\t// Configuration paths are dependency to load crowdsec configuration\n\tif err := cConfig.LoadConfigurationPaths(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif flags.SingleFileType != \"\" && flags.OneShotDSN != \"\" {\n\t\t// if we're in time-machine mode, we don't want to log to file\n\t\tcConfig.Common.LogMedia = \"stdout\"\n\t}\n\n\t// Configure logging\n\tif err := types.SetDefaultLoggerConfig(cConfig.Common.LogMedia,\n\t\tcConfig.Common.LogDir, *cConfig.Common.LogLevel,\n\t\tcConfig.Common.LogMaxSize, cConfig.Common.LogMaxFiles,\n\t\tcConfig.Common.LogMaxAge, cConfig.Common.CompressLogs,\n\t\tcConfig.Common.ForceColorLogs); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := csconfig.LoadFeatureFlagsFile(configFile, log.StandardLogger()); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !cConfig.DisableAgent {\n\t\tif err := cConfig.LoadCrowdsec(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif !cConfig.DisableAPI {\n\t\tif err := cConfig.LoadAPIServer(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif !cConfig.DisableAgent && (cConfig.API == nil || cConfig.API.Client == nil || cConfig.API.Client.Credentials == nil) {\n\t\treturn nil, errors.New(\"missing local API credentials for crowdsec agent, abort\")\n\t}\n\n\tif cConfig.DisableAPI && cConfig.DisableAgent {\n\t\treturn nil, errors.New(\"You must run at least the API Server or crowdsec\")\n\t}\n\n\tif flags.TestMode && !cConfig.DisableAgent {\n\t\tcConfig.Crowdsec.LintOnly = true\n\t}\n\n\tif flags.OneShotDSN != \"\" && flags.SingleFileType == \"\" {\n\t\treturn nil, errors.New(\"-dsn requires a -type argument\")\n\t}\n\n\tif flags.Transform != \"\" && flags.OneShotDSN == \"\" {\n\t\treturn nil, errors.New(\"-transform requires a -dsn argument\")\n\t}\n\n\tif flags.SingleFileType != \"\" && flags.OneShotDSN == \"\" {\n\t\treturn nil, errors.New(\"-type requires a -dsn argument\")\n\t}\n\n\tif flags.SingleFileType != \"\" && flags.OneShotDSN != \"\" {\n\t\tif cConfig.API != nil && cConfig.API.Server != nil {\n\t\t\tcConfig.API.Server.OnlineClient = nil\n\t\t}\n\t\t/*if the api is disabled as well, just read file and exit, don't daemonize*/\n\t\tif cConfig.DisableAPI {\n\t\t\tcConfig.Common.Daemonize = false\n\t\t}\n\t\tlog.Infof(\"single file mode : log_media=%s daemonize=%t\", cConfig.Common.LogMedia, cConfig.Common.Daemonize)\n\t}\n\n\tif cConfig.Common.PidDir != \"\" {\n\t\tlog.Warn(\"Deprecation warning: the pid_dir config can be safely removed and is not required\")\n\t}\n\n\tif cConfig.Common.Daemonize && runtime.GOOS == \"windows\" {\n\t\tlog.Debug(\"Daemonization is not supported on Windows, disabling\")\n\t\tcConfig.Common.Daemonize = false\n\t}\n\n\t// recap of the enabled feature flags, because logging\n\t// was not enabled when we set them from envvars\n\tif fflist := csconfig.ListFeatureFlags(); fflist != \"\" {\n\t\tlog.Infof(\"Enabled feature flags: %s\", fflist)\n\t}\n\n\treturn cConfig, nil\n}", "title": "" }, { "docid": "98394d27ffeabc3d38ffa8d73f811178", "score": "0.55638343", "text": "func LoadConfig(clsName string, cls *spec.ClusterMeta) error {\n\t// deal with tidb config\n\tconfigs := []map[string]any{}\n\tfor _, srv := range cls.Topology.TiDBServers {\n\t\tprefixkey := spec.ComponentTiDB\n\t\tfname := spec.ClusterPath(clsName, spec.AnsibleImportedConfigPath, fmt.Sprintf(\"%s-%s-%d.toml\", prefixkey, srv.Host, srv.Port))\n\t\tconfig, err := parseConfigFile(fname)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfigs = append(configs, config)\n\t}\n\tglobal, locals := diffConfigs(configs)\n\tcls.Topology.ServerConfigs.TiDB = spec.MergeConfig(cls.Topology.ServerConfigs.TiDB, global)\n\tfor i, local := range locals {\n\t\tcls.Topology.TiDBServers[i].Config = spec.MergeConfig(cls.Topology.TiDBServers[i].Config, local)\n\t}\n\n\t// deal with tikv config\n\tconfigs = []map[string]any{}\n\tfor _, srv := range cls.Topology.TiKVServers {\n\t\tprefixkey := spec.ComponentTiKV\n\t\tfname := spec.ClusterPath(clsName, spec.AnsibleImportedConfigPath, fmt.Sprintf(\"%s-%s-%d.toml\", prefixkey, srv.Host, srv.Port))\n\t\tconfig, err := parseConfigFile(fname)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfigs = append(configs, config)\n\t}\n\tglobal, locals = diffConfigs(configs)\n\tcls.Topology.ServerConfigs.TiKV = spec.MergeConfig(cls.Topology.ServerConfigs.TiKV, global)\n\tfor i, local := range locals {\n\t\tcls.Topology.TiKVServers[i].Config = spec.MergeConfig(cls.Topology.TiKVServers[i].Config, local)\n\t}\n\n\t// deal with pd config\n\tconfigs = []map[string]any{}\n\tfor _, srv := range cls.Topology.PDServers {\n\t\tprefixkey := spec.ComponentPD\n\t\tfname := spec.ClusterPath(clsName, spec.AnsibleImportedConfigPath, fmt.Sprintf(\"%s-%s-%d.toml\", prefixkey, srv.Host, srv.ClientPort))\n\t\tconfig, err := parseConfigFile(fname)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfigs = append(configs, config)\n\t}\n\tglobal, locals = diffConfigs(configs)\n\tcls.Topology.ServerConfigs.PD = spec.MergeConfig(cls.Topology.ServerConfigs.PD, global)\n\tfor i, local := range locals {\n\t\tcls.Topology.PDServers[i].Config = spec.MergeConfig(cls.Topology.PDServers[i].Config, local)\n\t}\n\n\t// deal with pump config\n\tconfigs = []map[string]any{}\n\tfor _, srv := range cls.Topology.PumpServers {\n\t\tprefixkey := spec.ComponentPump\n\t\tfname := spec.ClusterPath(clsName, spec.AnsibleImportedConfigPath, fmt.Sprintf(\"%s-%s-%d.toml\", prefixkey, srv.Host, srv.Port))\n\t\tconfig, err := parseConfigFile(fname)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfigs = append(configs, config)\n\t}\n\tglobal, locals = diffConfigs(configs)\n\tcls.Topology.ServerConfigs.Pump = spec.MergeConfig(cls.Topology.ServerConfigs.Pump, global)\n\tfor i, local := range locals {\n\t\tcls.Topology.PumpServers[i].Config = spec.MergeConfig(cls.Topology.PumpServers[i].Config, local)\n\t}\n\n\t// deal with drainer config\n\tconfigs = []map[string]any{}\n\tfor _, srv := range cls.Topology.Drainers {\n\t\tprefixkey := spec.ComponentDrainer\n\t\tfname := spec.ClusterPath(clsName, spec.AnsibleImportedConfigPath, fmt.Sprintf(\"%s-%s-%d.toml\", prefixkey, srv.Host, srv.Port))\n\t\tconfig, err := parseConfigFile(fname)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfigs = append(configs, config)\n\t}\n\tglobal, locals = diffConfigs(configs)\n\tcls.Topology.ServerConfigs.Drainer = spec.MergeConfig(cls.Topology.ServerConfigs.Drainer, global)\n\tfor i, local := range locals {\n\t\tcls.Topology.Drainers[i].Config = spec.MergeConfig(cls.Topology.Drainers[i].Config, local)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "efba7af9cd5277204e62157bf652b9fb", "score": "0.5562646", "text": "func loadConfig(configPath string) (Config, error) {\n\tvar c Config\n\tdata, err := ioutil.ReadFile(configPath)\n\tif err != nil {\n\t\treturn Config{}, err\n\t}\n\terr = yaml.Unmarshal(data, &c)\n\tif err != nil {\n\t\treturn Config{}, err\n\t}\n\n\t// Initialize map containing hostname[token]\n\tc.Tokens = make(map[string]string)\n\tc.MachineState = make(map[string]string)\n\tc.MachineBuild = make(map[string]string)\n\treturn c, nil\n}", "title": "" }, { "docid": "c158b44b0e0ee7c9338e49e083a6952f", "score": "0.5546966", "text": "func (ca *CertificateRequest) TLSConfigWithRootCA(rootCAPool *x509.CertPool, verifyClient bool) (*tls.Config, error) {\n\ttlsCert, err := ca.TLSCert()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar tlsConfig tls.Config\n\ttlsConfig.Certificates = append(tlsConfig.Certificates, tlsCert)\n\ttlsConfig.RootCAs = rootCAPool\n\n\tif verifyClient {\n\t\ttlsConfig.ClientAuth = tls.RequireAndVerifyClientCert\n\t}\n\n\treturn &tlsConfig, nil\n}", "title": "" }, { "docid": "392ee8d14a97d1d882cb0c7a71c4faf5", "score": "0.55469364", "text": "func (t *Transport) buildTLSConfig() (tlsConfig *tls.Config, err error) {\n\t// Verify TLS settings and populate tls config\n\ttlsCert := t.tlsCert.Get()\n\ttlsKey := t.tlsKey.Get()\n\tif tlsCert == \"\" || tlsKey == \"\" {\n\t\treturn nil, errMissingCertificate\n\t}\n\n\t// Load certificate\n\tcert, err := loadX509KeyPair(tlsCert, tlsKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttlsConfig = &tls.Config{Certificates: []tls.Certificate{cert}}\n\tif t.tlsStrictMode.Get() {\n\t\ttlsConfig.MinVersion = tls.VersionTLS12\n\t\ttlsConfig.CurvePreferences = []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256}\n\t\ttlsConfig.PreferServerCipherSuites = true\n\t\ttlsConfig.CipherSuites = []uint16{\n\t\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\n\t\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,\n\t\t\ttls.TLS_RSA_WITH_AES_256_GCM_SHA384,\n\t\t\ttls.TLS_RSA_WITH_AES_256_CBC_SHA,\n\t\t}\n\t}\n\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "a7927d48330b7dd73f8c95d731fe3018", "score": "0.5538607", "text": "func tlsConfig() *tls.Config {\n\trootCAs := x509.NewCertPool()\n\trootCAs.AppendCertsFromPEM([]byte(testCert))\n\n\treturn &tls.Config{\n\t\tRootCAs: rootCAs,\n\t\tInsecureSkipVerify: true,\n\t}\n}", "title": "" }, { "docid": "fdfd3a51bf0cda014ba1bc3324cedeee", "score": "0.5526852", "text": "func (s Server) tlsConfig() (*tls.Config, error) {\n\tvar tlsCerts []tls.Certificate\n\tvar err error\n\n\t// Load client Certificate Authority (CA) if we are requiring client\n\t// cert authentication.\n\tif s.ClientAuthType == tls.VerifyClientCertIfGiven ||\n\t\ts.ClientAuthType == tls.RequireAndVerifyClientCert {\n\t\tif s.CaCertPool == nil || len(s.CaCertPool.Subjects()) == 0 {\n\t\t\treturn nil, ErrMissingCACert\n\t\t}\n\t}\n\n\t// Parse and append all of the TLSCerts to the tls.Config\n\tfor _, cert := range s.TLSCerts {\n\t\tparsedCert, err := tls.X509KeyPair(cert.CertPEMBlock, cert.KeyPEMBlock)\n\t\tif err != nil {\n\t\t\ts.Logger.Error(\"failed to parse tls certificate\", zap.Error(err))\n\t\t\treturn nil, err\n\t\t}\n\t\ttlsCerts = append(tlsCerts, parsedCert)\n\t}\n\n\t// Follow Mozilla's \"modern\" server side TLS recommendations\n\t// https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility\n\t// https://statics.tls.security.mozilla.org/server-side-tls-conf-4.0.json\n\t// This configuration is compatible with Firefox 27, Chrome 30, IE 11 on\n\t// Windows 7, Edge, Opera 17, Safari 9, Android 5.0, and Java 8\n\ttlsConfig := &tls.Config{\n\t\tCipherSuites: []uint16{\n\t\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,\n\t\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\n\t\t\ttls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,\n\t\t\ttls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,\n\t\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\n\t\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\n\t\t},\n\t\tCertificates: tlsCerts,\n\t\tClientAuth: s.ClientAuthType,\n\t\tClientCAs: s.CaCertPool,\n\t\tCurvePreferences: []tls.CurveID{\n\t\t\ttls.CurveP256,\n\t\t\ttls.X25519,\n\t\t},\n\t\tMinVersion: tls.VersionTLS12,\n\t\tNextProtos: []string{\"h2\"},\n\t\tPreferServerCipherSuites: true,\n\t}\n\n\t// Map certificates with the CommonName / DNSNames to support\n\t// Subject Name Indication (SNI). In other words this will tell\n\t// the TLS listener to sever the appropriate certificate matching\n\t// the requested hostname.\n\ttlsConfig.BuildNameToCertificate()\n\n\treturn tlsConfig, err\n}", "title": "" }, { "docid": "1d9de1cea5a46ead8eb06779ddf86ecc", "score": "0.55205923", "text": "func NewClientTLSConfig(cfg HasTLSConfig, vault HasVaultConfig) (*tls.Config, error) {\n\tif !cfg.GetEnabled() {\n\t\tlog.Trace(\"tls disabled\")\n\t\treturn &tls.Config{}, nil\n\t}\n\n\tconfig := &tls.Config{\n\t\tServerName: cfg.GetOverride(),\n\t\tInsecureSkipVerify: cfg.GetInsecure(),\n\t\tMinVersion: tls.VersionTLS12,\n\t}\n\n\tvar err error\n\tt := CloneTLSConfig(cfg)\n\n\terr = GenerateCertificates(vault, cfg.GetGenerate(), &t.Cert.Secret, &t.Key.Secret)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcertPEMBlock, err := LoadKey(t.GetCert(), vault, \"certificate\")\n\tif err == nil {\n\t\tkeyPEMBlock, err := LoadKey(t.GetKey(), vault, \"private_key\")\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Error(\"error loading private key\")\n\t\t\treturn nil, err\n\t\t}\n\n\t\tconfig.RootCAs = x509.NewCertPool()\n\n\t\tif !config.RootCAs.AppendCertsFromPEM(certPEMBlock) {\n\t\t\tlog.WithError(err).Error(\"failed to append certificates\")\n\t\t\treturn nil, fmt.Errorf(\"tls: failed to append certificates\")\n\t\t}\n\n\t\tif t.GetRootCA().GetEnabled() {\n\t\t\trootcaPEMBlock, err := LoadKey(t.GetRootCA(), vault, \"issuing_ca\")\n\t\t\tif err == nil {\n\t\t\t\tif !config.RootCAs.AppendCertsFromPEM(rootcaPEMBlock) {\n\t\t\t\t\tlog.WithError(err).Error(\"failed to append root certificates\")\n\t\t\t\t\treturn nil, fmt.Errorf(\"tls: failed to append root certificates\")\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tlog.WithError(err).Error(\"error loading CA\")\n\t\t\t}\n\t\t}\n\n\t\tc, err := tls.X509KeyPair(certPEMBlock, keyPEMBlock)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Error(\"error creating key pair\")\n\t\t\treturn nil, err\n\t\t}\n\n\t\tconfig.Certificates = append(config.Certificates, c)\n\t} else {\n\t\tlog.WithError(err).Error(\"error loading certificate\")\n\t}\n\n\treturn config, nil\n}", "title": "" }, { "docid": "7f1fb1d94ee94e2ea1b5bbef9ba7aed2", "score": "0.55169255", "text": "func loadConfig(file string) (*config.ServiceConfig, error) {\n\tcfg := &config.ServiceConfig{}\n\terr := toolscfg.LoadConfigAs(file, cfg)\n\n\treturn cfg, err\n}", "title": "" }, { "docid": "336f0c52a66378bf4f6f1a6a0f3cdec4", "score": "0.55136013", "text": "func LoadConfig(filename string) (*ConfigData, error) {\n\tbuf, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc := &ConfigData{}\n\tif _, err := toml.Decode(string(buf), c); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Make files' path relative to the config file's directory.\n\tbasedir := filepath.Dir(filename)\n\trelativePath(basedir, &c.DocumentRoot)\n\trelativePath(basedir, &c.TemplatesDir)\n\trelativePath(basedir, &c.HTTPS.CertFile)\n\trelativePath(basedir, &c.HTTPS.KeyFile)\n\n\treturn c, nil\n}", "title": "" }, { "docid": "e81be9478f6284b66022d39b9a83d5bd", "score": "0.5507905", "text": "func LoadConfig(config []byte) (*Config, error) {\n\tvar cfg = &Config{}\n\terr := json.Unmarshal(config, &cfg)\n\tif err != nil {\n\t\treturn nil, cferr.Wrap(cferr.PolicyError, cferr.InvalidPolicy,\n\t\t\terrors.New(\"failed to unmarshal configuration: \"+err.Error()))\n\t}\n\n\tif cfg.Signing == nil {\n\t\treturn nil, errors.New(\"No \\\"signing\\\" field present\")\n\t}\n\n\tif cfg.Signing.Default == nil {\n\t\tlog.Debugf(\"no default given: using default config\")\n\t\tcfg.Signing.Default = DefaultConfig()\n\t} else {\n\t\tif err := cfg.Signing.Default.populate(cfg); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tfor k := range cfg.Signing.Profiles {\n\t\tif err := cfg.Signing.Profiles[k].populate(cfg); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif !cfg.Valid() {\n\t\treturn nil, cferr.Wrap(cferr.PolicyError, cferr.InvalidPolicy, errors.New(\"invalid configuration\"))\n\t}\n\n\tlog.Debugf(\"configuration ok\")\n\treturn cfg, nil\n}", "title": "" }, { "docid": "1d452b41767b76c5440a8716866f5d04", "score": "0.55068004", "text": "func newConfig(fpath string) (*client.Config, error) {\n\tcfg, err := clientyaml.NewConfig(fpath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif cfg.TLS == nil || cfg.TLS.RootCAs != nil {\n\t\treturn cfg, nil\n\t}\n\n\tyc := &yamlConfig{}\n\tb, err := os.ReadFile(fpath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = yaml.Unmarshal(b, yc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif yc.InsecureTransport {\n\t\treturn cfg, nil\n\t}\n\n\tif yc.CAfile != \"\" {\n\t\tcp, err := tlsutil.NewCertPool([]string{yc.CAfile})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcfg.TLS.RootCAs = cp\n\t}\n\treturn cfg, nil\n}", "title": "" }, { "docid": "e60ec5fe10bbaca014080d3ac7a3a0fc", "score": "0.55037993", "text": "func (pl PEMLoader) LoadCertificates() ([]Certificate, error) {\n\tcerts := make([]Certificate, 0, len(pl))\n\tfor i, pair := range pl {\n\t\tcert, err := tls.X509KeyPair([]byte(pair.CertificatePEM), []byte(pair.KeyPEM))\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"PEM pair %d: %v\", i, err)\n\t\t}\n\t\tcerts = append(certs, Certificate{\n\t\t\tCertificate: cert,\n\t\t\tTags: pair.Tags,\n\t\t})\n\t}\n\treturn certs, nil\n}", "title": "" }, { "docid": "d4d603c503dfc6ef7ad166f2290589fb", "score": "0.55031556", "text": "func (info TLSInfo) baseConfig() (*tls.Config, error) {\n\tif info.KeyFile == \"\" || info.CertFile == \"\" {\n\t\treturn nil, fmt.Errorf(\"KeyFile and CertFile must both be present[key: %v, cert: %v]\", info.KeyFile, info.CertFile)\n\t}\n\tif info.Logger == nil {\n\t\tinfo.Logger = zap.NewNop()\n\t}\n\n\t_, err := tlsutil.NewCert(info.CertFile, info.KeyFile, info.parseFunc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Perform prevalidation of client cert and key if either are provided. This makes sure we crash before accepting any connections.\n\tif (info.ClientKeyFile == \"\") != (info.ClientCertFile == \"\") {\n\t\treturn nil, fmt.Errorf(\"ClientKeyFile and ClientCertFile must both be present or both absent: key: %v, cert: %v]\", info.ClientKeyFile, info.ClientCertFile)\n\t}\n\tif info.ClientCertFile != \"\" {\n\t\t_, err := tlsutil.NewCert(info.ClientCertFile, info.ClientKeyFile, info.parseFunc)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tvar minVersion uint16\n\tif info.MinVersion != 0 {\n\t\tminVersion = info.MinVersion\n\t} else {\n\t\t// Default minimum version is TLS 1.2, previous versions are insecure and deprecated.\n\t\tminVersion = tls.VersionTLS12\n\t}\n\n\tcfg := &tls.Config{\n\t\tMinVersion: minVersion,\n\t\tMaxVersion: info.MaxVersion,\n\t\tServerName: info.ServerName,\n\t}\n\n\tif len(info.CipherSuites) > 0 {\n\t\tcfg.CipherSuites = info.CipherSuites\n\t}\n\n\t// Client certificates may be verified by either an exact match on the CN,\n\t// or a more general check of the CN and SANs.\n\tvar verifyCertificate func(*x509.Certificate) bool\n\tif info.AllowedCN != \"\" {\n\t\tif info.AllowedHostname != \"\" {\n\t\t\treturn nil, fmt.Errorf(\"AllowedCN and AllowedHostname are mutually exclusive (cn=%q, hostname=%q)\", info.AllowedCN, info.AllowedHostname)\n\t\t}\n\t\tverifyCertificate = func(cert *x509.Certificate) bool {\n\t\t\treturn info.AllowedCN == cert.Subject.CommonName\n\t\t}\n\t}\n\tif info.AllowedHostname != \"\" {\n\t\tverifyCertificate = func(cert *x509.Certificate) bool {\n\t\t\treturn cert.VerifyHostname(info.AllowedHostname) == nil\n\t\t}\n\t}\n\tif verifyCertificate != nil {\n\t\tcfg.VerifyPeerCertificate = func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error {\n\t\t\tfor _, chains := range verifiedChains {\n\t\t\t\tif len(chains) != 0 {\n\t\t\t\t\tif verifyCertificate(chains[0]) {\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn errors.New(\"client certificate authentication failed\")\n\t\t}\n\t}\n\n\t// this only reloads certs when there's a client request\n\t// TODO: support server-side refresh (e.g. inotify, SIGHUP), caching\n\tcfg.GetCertificate = func(clientHello *tls.ClientHelloInfo) (cert *tls.Certificate, err error) {\n\t\tcert, err = tlsutil.NewCert(info.CertFile, info.KeyFile, info.parseFunc)\n\t\tif os.IsNotExist(err) {\n\t\t\tif info.Logger != nil {\n\t\t\t\tinfo.Logger.Warn(\n\t\t\t\t\t\"failed to find peer cert files\",\n\t\t\t\t\tzap.String(\"cert-file\", info.CertFile),\n\t\t\t\t\tzap.String(\"key-file\", info.KeyFile),\n\t\t\t\t\tzap.Error(err),\n\t\t\t\t)\n\t\t\t}\n\t\t} else if err != nil {\n\t\t\tif info.Logger != nil {\n\t\t\t\tinfo.Logger.Warn(\n\t\t\t\t\t\"failed to create peer certificate\",\n\t\t\t\t\tzap.String(\"cert-file\", info.CertFile),\n\t\t\t\t\tzap.String(\"key-file\", info.KeyFile),\n\t\t\t\t\tzap.Error(err),\n\t\t\t\t)\n\t\t\t}\n\t\t}\n\t\treturn cert, err\n\t}\n\tcfg.GetClientCertificate = func(unused *tls.CertificateRequestInfo) (cert *tls.Certificate, err error) {\n\t\tcertfile, keyfile := info.CertFile, info.KeyFile\n\t\tif info.ClientCertFile != \"\" {\n\t\t\tcertfile, keyfile = info.ClientCertFile, info.ClientKeyFile\n\t\t}\n\t\tcert, err = tlsutil.NewCert(certfile, keyfile, info.parseFunc)\n\t\tif os.IsNotExist(err) {\n\t\t\tif info.Logger != nil {\n\t\t\t\tinfo.Logger.Warn(\n\t\t\t\t\t\"failed to find client cert files\",\n\t\t\t\t\tzap.String(\"cert-file\", certfile),\n\t\t\t\t\tzap.String(\"key-file\", keyfile),\n\t\t\t\t\tzap.Error(err),\n\t\t\t\t)\n\t\t\t}\n\t\t} else if err != nil {\n\t\t\tif info.Logger != nil {\n\t\t\t\tinfo.Logger.Warn(\n\t\t\t\t\t\"failed to create client certificate\",\n\t\t\t\t\tzap.String(\"cert-file\", certfile),\n\t\t\t\t\tzap.String(\"key-file\", keyfile),\n\t\t\t\t\tzap.Error(err),\n\t\t\t\t)\n\t\t\t}\n\t\t}\n\t\treturn cert, err\n\t}\n\treturn cfg, nil\n}", "title": "" }, { "docid": "7e16aa13394bfc7af9292a34862972c9", "score": "0.54990375", "text": "func loadCertficateAndKeyFromFile(path string) (*tls.Certificate, error) {\n\traw, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar cert tls.Certificate\n\tfor {\n\t\tblock, rest := pem.Decode(raw)\n\t\tif block == nil {\n\t\t\tbreak\n\t\t}\n\t\tif block.Type == \"CERTIFICATE\" {\n\t\t\tcert.Certificate = append(cert.Certificate, block.Bytes)\n\t\t} else {\n\t\t\tcert.PrivateKey, err = parsePrivateKey(block.Bytes)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"Failure reading private key from \\\"%s\\\": %s\", path, err)\n\t\t\t}\n\t\t}\n\t\traw = rest\n\t}\n\n\tif len(cert.Certificate) == 0 {\n\t\treturn nil, fmt.Errorf(\"No certificate found in \\\"%s\\\"\", path)\n\t} else if cert.PrivateKey == nil {\n\t\treturn nil, fmt.Errorf(\"No private key found in \\\"%s\\\"\", path)\n\t}\n\n\treturn &cert, nil\n}", "title": "" }, { "docid": "12e3772d219b3cd7330a22de89d3ba8a", "score": "0.54952925", "text": "func (r *BackupReconciler) loadConfig(ctx context.Context, ns string) (*v1alpha1.Config, error) {\n\tvar configs v1alpha1.ConfigList\n\tif err := r.List(ctx, &configs, client.InNamespace(ns)); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(configs.Items) == 0 {\n\t\treturn nil, nil\n\t}\n\n\tif len(configs.Items) > 1 {\n\t\treturn nil, fmt.Errorf(\"this release only supports a single customer provided config (received %d)\", len(configs.Items))\n\t}\n\n\treturn &configs.Items[0], nil\n}", "title": "" }, { "docid": "5f5853e1765f4d3149d9025af3b8f268", "score": "0.5483957", "text": "func loadCaCertificate(caFile string) (*x509.CertPool, error) {\n\tcaCert, err := ioutil.ReadFile(filepath.Clean(caFile))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcertificates := x509.NewCertPool()\n\tif ok := certificates.AppendCertsFromPEM(caCert); !ok {\n\t\treturn nil, errors.New(\"could not append x509 PEM certificate to pool\")\n\t}\n\treturn certificates, nil\n}", "title": "" }, { "docid": "2b32cbe79a7b6d0ef548d378aeff7e4b", "score": "0.548079", "text": "func SetupTLSConfig(tlsConfig *TLSConfig) (*tls.Config, error) {\n\ttlsClientConfig := &tls.Config{\n\t\tInsecureSkipVerify: tlsConfig.InsecureSkipVerify,\n\t}\n\n\tif tlsConfig.Address != \"\" {\n\t\tserver := tlsConfig.Address\n\t\thasPort := strings.LastIndex(server, \":\") > strings.LastIndex(server, \"]\")\n\t\tif hasPort {\n\t\t\tvar err error\n\t\t\tserver, _, err = net.SplitHostPort(server)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t\ttlsClientConfig.ServerName = server\n\t}\n\n\tif tlsConfig.CertFile != \"\" && tlsConfig.KeyFile != \"\" {\n\t\ttlsCert, err := tls.LoadX509KeyPair(tlsConfig.CertFile, tlsConfig.KeyFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttlsClientConfig.Certificates = []tls.Certificate{tlsCert}\n\t}\n\n\tif tlsConfig.CAFile != \"\" || tlsConfig.CAPath != \"\" {\n\t\trootConfig := &rootcerts.Config{\n\t\t\tCAFile: tlsConfig.CAFile,\n\t\t\tCAPath: tlsConfig.CAPath,\n\t\t}\n\t\tif err := rootcerts.ConfigureTLS(tlsClientConfig, rootConfig); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn tlsClientConfig, nil\n}", "title": "" }, { "docid": "d8c432cbc1deeafa75d34359066e527d", "score": "0.5472357", "text": "func loadConfiguration(file, service string) (types.JSONConfigurationTLS, error) {\n\tvar cfg types.JSONConfigurationTLS\n\tlog.Printf(\"Loading %s\", file)\n\t// Load file and read config\n\tviper.SetConfigFile(file)\n\tif err := viper.ReadInConfig(); err != nil {\n\t\treturn cfg, err\n\t}\n\t// TLS endpoint values\n\ttlsRaw := viper.Sub(service)\n\tif tlsRaw == nil {\n\t\treturn cfg, fmt.Errorf(\"JSON key %s not found in %s\", service, file)\n\t}\n\tif err := tlsRaw.Unmarshal(&cfg); err != nil {\n\t\treturn cfg, err\n\t}\n\t// Check if values are valid\n\tif !validAuth[cfg.Auth] {\n\t\treturn cfg, fmt.Errorf(\"Invalid auth method\")\n\t}\n\tif !validLogging[cfg.Logger] {\n\t\treturn cfg, fmt.Errorf(\"Invalid logging method\")\n\t}\n\tif !validCarver[cfg.Carver] {\n\t\treturn cfg, fmt.Errorf(\"Invalid carver method\")\n\t}\n\t// No errors!\n\treturn cfg, nil\n}", "title": "" }, { "docid": "c38dd26deb465676642768a9a230075d", "score": "0.54634106", "text": "func loadCACertAndKey(sslCA, sslCAKey string) (*x509.Certificate, crypto.PrivateKey, error) {\n\t// LoadX509KeyPair does a bunch of validation, including len(Certificates) != 0.\n\tcaCert, err := tls.LoadX509KeyPair(sslCA, sslCAKey)\n\tif err != nil {\n\t\treturn nil, nil, errors.Errorf(\"error loading CA certificate %s and key %s: %s\",\n\t\t\tsslCA, sslCAKey, err)\n\t}\n\n\t// Extract x509 certificate from tls cert.\n\tx509Cert, err := x509.ParseCertificate(caCert.Certificate[0])\n\tif err != nil {\n\t\treturn nil, nil, errors.Errorf(\"error parsing CA certificate %s: %s\", sslCA, err)\n\t}\n\treturn x509Cert, caCert.PrivateKey, nil\n}", "title": "" }, { "docid": "b9d13dd7338df3e0e9796df7ce51db81", "score": "0.5449528", "text": "func parseTLS(tlsm map[string]interface{}) (*TLSConfigOpts, error) {\n\ttc := TLSConfigOpts{}\n\tfor mk, mv := range tlsm {\n\t\tswitch strings.ToLower(mk) {\n\t\tcase \"cert_file\":\n\t\t\tcertFile, ok := mv.(string)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"error parsing tls config, expected 'cert_file' to be filename\")\n\t\t\t}\n\t\t\ttc.CertFile = certFile\n\t\tcase \"key_file\":\n\t\t\tkeyFile, ok := mv.(string)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"error parsing tls config, expected 'key_file' to be filename\")\n\t\t\t}\n\t\t\ttc.KeyFile = keyFile\n\t\tcase \"ca_file\":\n\t\t\tcaFile, ok := mv.(string)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"error parsing tls config, expected 'ca_file' to be filename\")\n\t\t\t}\n\t\t\ttc.CaFile = caFile\n\t\tcase \"verify\":\n\t\t\tverify, ok := mv.(bool)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"error parsing tls config, expected 'verify' to be a boolean\")\n\t\t\t}\n\t\t\ttc.Verify = verify\n\t\tcase \"cipher_suites\":\n\t\t\tra := mv.([]interface{})\n\t\t\tif len(ra) == 0 {\n\t\t\t\treturn nil, fmt.Errorf(\"error parsing tls config, 'cipher_suites' cannot be empty\")\n\t\t\t}\n\t\t\ttc.Ciphers = make([]uint16, 0, len(ra))\n\t\t\tfor _, r := range ra {\n\t\t\t\tcipher, err := parseCipher(r.(string))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\ttc.Ciphers = append(tc.Ciphers, cipher)\n\t\t\t}\n\t\tcase \"timeout\":\n\t\t\tat := float64(0)\n\t\t\tswitch mv.(type) {\n\t\t\tcase int64:\n\t\t\t\tat = float64(mv.(int64))\n\t\t\tcase float64:\n\t\t\t\tat = mv.(float64)\n\t\t\t}\n\t\t\ttc.Timeout = at\n\t\tdefault:\n\t\t\treturn nil, fmt.Errorf(\"error parsing tls config, unknown field [%q]\", mk)\n\t\t}\n\t}\n\n\t// If cipher suites were not specified then use the defaults\n\tif tc.Ciphers == nil {\n\t\ttc.Ciphers = defaultCipherSuites()\n\t}\n\n\treturn &tc, nil\n}", "title": "" }, { "docid": "8580c595d064ef380fb14cb5e10ab715", "score": "0.54487354", "text": "func getOrCreateTrustedCAConfigMap(n ClusterPolicyController, name string) (*corev1.ConfigMap, error) {\n\tctx := n.ctx\n\tconfigMap := &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"ConfigMap\",\n\t\t\tAPIVersion: corev1.SchemeGroupVersion.String(),\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: n.operatorNamespace,\n\t\t},\n\t\tData: map[string]string{\n\t\t\tTrustedCABundleFileName: \"\",\n\t\t},\n\t}\n\n\t// apply label \"config.openshift.io/inject-trusted-cabundle: true\", so that cert is automatically filled/updated.\n\tconfigMap.ObjectMeta.Labels = make(map[string]string)\n\tconfigMap.ObjectMeta.Labels[\"config.openshift.io/inject-trusted-cabundle\"] = \"true\"\n\n\tlogger := n.rec.Log.WithValues(\"ConfigMap\", configMap.ObjectMeta.Name, \"Namespace\", configMap.ObjectMeta.Namespace)\n\n\tif err := controllerutil.SetControllerReference(n.singleton, configMap, n.rec.Scheme); err != nil {\n\t\treturn nil, err\n\t}\n\n\tfound := &corev1.ConfigMap{}\n\terr := n.rec.Client.Get(ctx, types.NamespacedName{Namespace: configMap.ObjectMeta.Namespace, Name: configMap.ObjectMeta.Name}, found)\n\tif err != nil && apierrors.IsNotFound(err) {\n\t\tlogger.Info(\"Not found, creating\")\n\t\terr = n.rec.Client.Create(ctx, configMap)\n\t\tif err != nil {\n\t\t\tlogger.Info(\"Couldn't create\")\n\t\t\treturn nil, fmt.Errorf(\"failed to create trusted CA bundle config map %q: %s\", name, err)\n\t\t}\n\t\treturn configMap, nil\n\t} else if err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get trusted CA bundle config map %q: %s\", name, err)\n\t}\n\n\treturn found, nil\n}", "title": "" }, { "docid": "127843b404a1fb55b33bb50d9fe7bb04", "score": "0.54482436", "text": "func (p *Handler) tlsConfig() (*tls.Config, error) {\n\t//TODO(tcfw) - taken from the quic-go echo example; need to implement reading certs from files\n\tkey, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttemplate := x509.Certificate{SerialNumber: big.NewInt(1)}\n\tcertDER, err := x509.CreateCertificate(rand.Reader, &template, &template, &key.PublicKey, key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tkeyPEM := pem.EncodeToMemory(&pem.Block{Type: \"RSA PRIVATE KEY\", Bytes: x509.MarshalPKCS1PrivateKey(key)})\n\tcertPEM := pem.EncodeToMemory(&pem.Block{Type: \"CERTIFICATE\", Bytes: certDER})\n\n\ttlsCert, err := tls.X509KeyPair(certPEM, keyPEM)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &tls.Config{\n\t\tCertificates: []tls.Certificate{tlsCert},\n\t\tNextProtos: []string{nProto},\n\t}, nil\n}", "title": "" }, { "docid": "5d7a92e488d265654c737a0a8a5fc41c", "score": "0.5438287", "text": "func (eca *ExternalCA) UpdateTLSConfig(tlsConfig *tls.Config) {\n\teca.mu.Lock()\n\tdefer eca.mu.Unlock()\n\n\teca.client = &http.Client{\n\t\tTransport: &http.Transport{\n\t\t\tTLSClientConfig: tlsConfig,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "9668b30de65f981c345de3f106509815", "score": "0.5424809", "text": "func buildTLSConfigForClient(TLS *tlsPair) (*tlsData, error) {\n\tvar t *tlsData\n\n\tcaCertFile := TLS.CACert\n\n\tif len(caCertFile) == 0 {\n\t\tcaCertFile = TLS.Cert\n\t}\n\tcaCertPEM, err := os.ReadFile(caCertFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcaCert := x509.NewCertPool()\n\tok := caCert.AppendCertsFromPEM(caCertPEM)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"failed to parse CA cert\")\n\t}\n\n\tcert, err := tls.LoadX509KeyPair(TLS.Cert, TLS.Key)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"TLS configuration error: %s\", err.Error())\n\t}\n\n\tt = &tlsData{\n\t\tconfig: nil,\n\t\trootCA: caCert,\n\t\tcert: &cert,\n\t}\n\n\tt.config = &tls.Config{\n\t\tNextProtos: []string{\"ftp\"},\n\t\tCertificates: []tls.Certificate{cert},\n\t\tMinVersion: getTLSProtocol(TLS.MinProtocol),\n\t\tMaxVersion: getTLSProtocol(TLS.MaxProtocol),\n\t\tCipherSuites: getCiphers(TLS.CipherSuite),\n\t\tPreferServerCipherSuites: true,\n\t\tVerifyConnection: t.verifyTLSConnection,\n\t}\n\n\treturn t, nil\n}", "title": "" }, { "docid": "be507d73cd6cfb4732d5f449405373e3", "score": "0.5423505", "text": "func loadConfig(log *logrus.Logger, doLogOutput bool) (err error) {\n\terrs := ParseAllEnvVars()\n\tif len(errs) > 0 {\n\t\treturn fmt.Errorf(\"Environment parsing errors : %s\", errs)\n\t}\n\n\tlog.SetLevel(*LogLevel)\n\tif *LogFormat == \"pretty\" {\n\t\tformatter := &logrus.TextFormatter{\n\t\t\tDisableTimestamp: true,\n\t\t\tForceColors: true,\n\t\t}\n\t\tlog.SetFormatter(formatter)\n\t\tlogrus.SetFormatter(formatter)\n\t}\n\n\tif *InitScriptTemplate != \"\" {\n\t\t*HookScriptBeforeIfRead = *InitScriptTemplate\n\t}\n\n\tif doLogOutput {\n\t\tPrintAgentConfig(log)\n\n\t\tfor _, e := range os.Environ() {\n\t\t\tpair := strings.SplitN(e, \"=\", 2)\n\t\t\tif strings.Contains(pair[0], \"CALICOVPP_\") {\n\t\t\t\tif !isEnvVarSupported(pair[0]) {\n\t\t\t\t\tlog.Warnf(\"Environment variable %s is not supported\", pair[0])\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "236b8ba816efce70dc2082f2a09c9e29", "score": "0.5417601", "text": "func useTLS(mw *chi.Mux, server ConfigHTTP) *tls.Config {\n\tif server.SSL == nil {\n\t\tlog.Printf(\"[tls] %q no certs loaded (using HTTP) ...\", server.Name)\n\t\treturn nil\n\t}\n\n\tvar err error\n\tvar tlsConfig *tls.Config\n\n\tswitch {\n\tcase server.SSL.LetsEnc != nil:\n\t\tlog.Printf(\"[tls] %q loading lets encrypt certs ...\", server.Name)\n\n\t\t// provide an email address\n\t\tcertmagic.DefaultACME.Email = DefaultACMEEmail\n\t\tif server.SSL.LetsEnc.Email != nil {\n\t\t\tval, err := server.SSL.LetsEnc.Email.Expr.Value(&fileEvalCtx)\n\t\t\tif err != nil {\n\t\t\t\tpanic(fmt.Errorf(\"lets encrypt email: %v\", err))\n\t\t\t}\n\t\t\tcertmagic.DefaultACME.Email = val.AsString()\n\t\t}\n\n\t\t// use the staging endpoint while we're developing\n\t\tcertmagic.DefaultACME.CA = certmagic.LetsEncryptProductionCA\n\n\t\ttlsConfig, err = certmagic.TLS(server.SSL.LetsEnc.Hosts)\n\t\tif err != nil {\n\t\t\tpanic(fmt.Errorf(\"lets encrypt SSL certs: %v\", err))\n\t\t}\n\n\tcase server.SSL.Crt == \"\" && server.SSL.Key == \"\":\n\t\tlog.Printf(\"[tls] %q loading self-signed certs ...\", server.Name)\n\n\t\tvar pin []byte\n\t\ttlsConfig, pin, err = cert(server.SSL.CACrt, server.SSL.CAKey)\n\t\tif err != nil {\n\t\t\tpanic(fmt.Errorf(\"gen SSL certs: %v\", err))\n\t\t}\n\n\t\t// add Pinning Key to output ...\n\t\tmw.Use(func(next http.Handler) http.Handler {\n\t\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\t\tw.Header().Set(\"X-Pinned-Key\", fmt.Sprintf(\"sha256//%s\", string(pin)))\n\t\t\t\tnext.ServeHTTP(w, r)\n\t\t\t})\n\t\t})\n\n\tdefault:\n\t\tlog.Printf(\"[tls] %q loading external SSL certs ...\", server.Name)\n\t\tcer, err := tls.LoadX509KeyPair(server.SSL.Crt, server.SSL.Key)\n\t\tif err != nil {\n\t\t\tpanic(fmt.Errorf(\"load SSL certs: %v\", err)) // will stop the startup sequence...\n\t\t}\n\t\ttlsConfig = &tls.Config{Certificates: []tls.Certificate{cer}}\n\t}\n\n\treturn tlsConfig\n}", "title": "" }, { "docid": "4409487bb61cb95ac772bac38b4c36cc", "score": "0.541304", "text": "func configLoad(ctx context.Context, cluster *kubernetes.Cluster, appRef models.AppRef) (*v1.Secret, error) {\n\tsecretName := appRef.MakeConfigurationSecretName()\n\treturn loadOrCreateSecret(ctx, cluster, appRef, secretName, \"configuration\")\n}", "title": "" }, { "docid": "375823559271e11ac38dda8db57cccbd", "score": "0.5412317", "text": "func (c *Config) loadConfig(path string) {\n\tf, err := os.ReadFile(path)\n\tif err != nil {\n\t\tlog.Fatalf(\"os.ReadFile failed: %v\", err)\n\t}\n\terr = yaml.Unmarshal(f, c)\n\tif err != nil {\n\t\tlog.Fatalf(\"yaml.Unmarshal failed: %v\", err)\n\t}\n}", "title": "" }, { "docid": "059da0dc862add79736cca244af7617b", "score": "0.5396277", "text": "func loadConfig(cfgJSON *extapi.JSON) (coreDNSEtcdProviderConfig, error) {\n\tcfg := coreDNSEtcdProviderConfig{}\n\t// handle the 'base case' where no configuration has been provided\n\tif cfgJSON == nil {\n\t\treturn cfg, nil\n\t}\n\tif err := json.Unmarshal(cfgJSON.Raw, &cfg); err != nil {\n\t\treturn cfg, fmt.Errorf(\"error decoding solver config: %v\", err)\n\t}\n\n\tif cfg.EtcdEndpoint == \"\" {\n\t\tcfg.EtcdEndpoint = \"http://localhost:2379\"\n\t}\n\tif cfg.CoreDNSPrefix == \"\" {\n\t\tcfg.CoreDNSPrefix = \"/skydns/\"\n\t}\n\n\treturn cfg, nil\n}", "title": "" }, { "docid": "4666b2362730e97af2b183ab872bf49a", "score": "0.53886735", "text": "func (c *TLSConfig) Config() (*tls.Config, error) {\n\tif c.Certificate != nil {\n\t\tconfig := &tls.Config{\n\t\t\tCertificates: []tls.Certificate{*c.Certificate},\n\t\t}\n\t\tif c.CACertificate != nil {\n\t\t\tcaCertPool := x509.NewCertPool()\n\t\t\tcaCertPool.AddCert(c.CACertificate)\n\t\t\tconfig.RootCAs = caCertPool\n\t\t}\n\t\treturn config, nil\n\t}\n\treturn nil, errors.New(\"certificate not specified\")\n}", "title": "" }, { "docid": "0c25493834a7284bf6a6d8dab27ccc4e", "score": "0.5386387", "text": "func loadAllConfigs(cf CLIConf) (*TshConfig, error) {\n\t// default to globalTshConfigPathDefault\n\tglobalConfigPath := cf.GlobalTshConfigPath\n\tif globalConfigPath == \"\" {\n\t\tglobalConfigPath = globalTshConfigPathDefault\n\t}\n\n\tglobalConf, err := loadConfig(globalConfigPath)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err, \"failed to load global tsh config from %q\", globalConfigPath)\n\t}\n\n\tfullConfigPath := filepath.Join(profile.FullProfilePath(cf.HomePath), tshConfigPath)\n\tuserConf, err := loadConfig(fullConfigPath)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err, \"failed to load tsh config from %q\", fullConfigPath)\n\t}\n\n\tconfOptions := globalConf.Merge(userConf)\n\treturn &confOptions, nil\n}", "title": "" }, { "docid": "37964368c7ca1c80ae75604bbdcb78fd", "score": "0.538209", "text": "func MonitoringTLSConfig(c client.Client) (*tls.Config, error) {\n\tvar tls tls.Config\n\n\tcfgMap := &corev1.ConfigMap{}\n\terr := c.Get(context.TODO(), client.ObjectKey{Name: MonitoringCAConfigMapName, Namespace: MonitoringNS}, cfgMap)\n\tif err != nil {\n\t\treturn &tls, err\n\t}\n\n\tca := cfgMap.Data[MonitoringConfigField]\n\n\tif ca == \"\" {\n\t\treturn &tls, fmt.Errorf(\"monitoring service CA returned nil\")\n\t}\n\n\trootCAs, _ := x509.SystemCertPool()\n\tif rootCAs == nil {\n\t\trootCAs = x509.NewCertPool()\n\t}\n\n\tif ok := rootCAs.AppendCertsFromPEM([]byte(ca)); !ok {\n\t\treturn &tls, fmt.Errorf(\"failed to append certs\")\n\t}\n\n\ttls.RootCAs = rootCAs\n\n\treturn &tls, nil\n}", "title": "" } ]
df0e85ebea57f64855c57638c971ea5a
Description of the data source.
[ { "docid": "0dbeb886f5aa11a2997e5b9cd45e29c0", "score": "0.68419254", "text": "func (o DataSourceOutput) Description() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *DataSource) pulumi.StringPtrOutput { return v.Description }).(pulumi.StringPtrOutput)\n}", "title": "" } ]
[ { "docid": "ac275f3eb2d54a61a03f6265c464bc45", "score": "0.64581275", "text": "func (*DataSource) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_datacatalog_v1_data_source_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "5fe48e13c417d33ae10752821003b652", "score": "0.6290174", "text": "func (msg MsgCreateDataSource) Type() string { return \"create_data_source\" }", "title": "" }, { "docid": "927ab22230c82fd0a78ddaef04beb35d", "score": "0.6253684", "text": "func (s *Script) Description() string {\n\treturn s.SourceType\n}", "title": "" }, { "docid": "5e98f1bed5b9dbfb1f803b2810eb6f03", "score": "0.6236819", "text": "func (msg MsgEditDataSource) Type() string { return \"edit_data_source\" }", "title": "" }, { "docid": "6b4b09ecff4822f12477f8a48d645ca2", "score": "0.61558443", "text": "func (r RemoteUpdateSource) Description() string {\n\treturn \"Remote\"\n}", "title": "" }, { "docid": "b3814e9b52a3105bc976e06e47601a83", "score": "0.60664135", "text": "func (d *Datasource) String() string {\n\tvar builder strings.Builder\n\tbuilder.WriteString(\"Datasource(\")\n\tbuilder.WriteString(fmt.Sprintf(\"id=%v\", d.ID))\n\tbuilder.WriteString(\", name=\")\n\tbuilder.WriteString(d.Name)\n\tbuilder.WriteString(\", type=\")\n\tbuilder.WriteString(fmt.Sprintf(\"%v\", d.Type))\n\tbuilder.WriteString(\", detail=\")\n\tbuilder.WriteString(fmt.Sprintf(\"%v\", d.Detail))\n\tbuilder.WriteString(\", createdAt=\")\n\tbuilder.WriteString(d.CreatedAt.Format(time.ANSIC))\n\tbuilder.WriteString(\", updatedAt=\")\n\tbuilder.WriteString(d.UpdatedAt.Format(time.ANSIC))\n\tbuilder.WriteByte(')')\n\treturn builder.String()\n}", "title": "" }, { "docid": "e3c6db6eb2f0797ea08a8662cc4e779f", "score": "0.60554457", "text": "func (k UpdateSource) Description() string {\n\treturn \"Keybase.io\"\n}", "title": "" }, { "docid": "74a03bd7919899a49037383e627856dc", "score": "0.60045624", "text": "func DataSource(source string) Option {\n\treturn func(table *Table) error {\n\t\ttable.Builder.Datasource = &sdk.DatasourceRef{LegacyName: source}\n\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "24fe725332d7806ba73908e25941f594", "score": "0.59945697", "text": "func (s *SourceInfo) Description() string {\n\tif s == nil {\n\t\treturn \"\"\n\t}\n\treturn s.desc\n}", "title": "" }, { "docid": "d4e1c3a8a008103bc61b925ad0de3f76", "score": "0.5905025", "text": "func (o FunctionOutput) DataSource() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Function) pulumi.StringOutput { return v.DataSource }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "065940f91029401ae0d7e95d52fd4395", "score": "0.5883938", "text": "func (e *Elasticsearch) Description() string {\n\treturn \"an elasticsearch sink adaptor\"\n}", "title": "" }, { "docid": "9204a5aaca54bd5c26acd648b6f7a0cf", "score": "0.58483046", "text": "func (postgres *Source) String() string {\n\treturn \"postgres\"\n}", "title": "" }, { "docid": "986bc83b3a4b7a303dc1599acb8d23b7", "score": "0.5842551", "text": "func (s DataSource) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "986bc83b3a4b7a303dc1599acb8d23b7", "score": "0.5842551", "text": "func (s DataSource) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0e12efe6bb41eb926378f5a6484d1cfd", "score": "0.58238816", "text": "func (o EventSourceOutput) Description() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *EventSource) pulumi.StringPtrOutput { return v.Description }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a7c61a100cc344de81e1c551d36fa8ca", "score": "0.5814107", "text": "func (c *DatabaseConfig) DataSourceName() string {\n\treturn fmt.Sprintf(\"%s:%s@tcp(%s:%d)/%s?parseTime=%t\", c.User, c.Password, c.Host, c.Port, c.Name, c.ParseTime)\n}", "title": "" }, { "docid": "8902b30dc824639ef20b3eed1f23a31f", "score": "0.57935774", "text": "func (m *Mongodb) Description() string {\n\treturn \"a mongodb adaptor that functions as both a source and a sink\"\n}", "title": "" }, { "docid": "0f11f4c2abad7bdb401db7a3c7343518", "score": "0.5790693", "text": "func (cxt *ExecutionContext) Datasource(name string) Datasource {\n\treturn cxt.datasources[name]\n}", "title": "" }, { "docid": "da5a5142f9030f75c79af30f2427bdf2", "score": "0.5768835", "text": "func (s *sqlite) Description() string {\n\treturn \"sqlite\"\n}", "title": "" }, { "docid": "0a49f7afd88aeb0104fc58d185f6e1f9", "score": "0.57635707", "text": "func (s ReferenceDataSourceDescription) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "034c3c4001588dc737abc66a1c489709", "score": "0.5755973", "text": "func (*TracingServiceState_DataSource) Descriptor() ([]byte, []int) {\n\treturn file_perfetto_perfetto_trace_proto_rawDescGZIP(), []int{4, 1}\n}", "title": "" }, { "docid": "0ed4311a12f3822bdf4950cce3f8c404", "score": "0.57263917", "text": "func (h *Client) DataSource(dataSource string) *Client {\n\th.dataSource = dataSource\n\th.dataSourceSet = true\n\treturn h\n}", "title": "" }, { "docid": "7e409cfc9add2d1afeab2eb879d3fc66", "score": "0.5662038", "text": "func Description() string {\n\treturn description\n}", "title": "" }, { "docid": "6897e5c453f5073fddbdbc1255c1fea5", "score": "0.5646152", "text": "func NewDataSource(adaptor framework.DataAdaptor) framework.DataAdaptor {\n\tframeworkAdaptor := &dataAdaptor{client: adaptor, version: \"0.0.1\"}\n\n\tfmt.Println(\"-------------------------------------\")\n\tfmt.Println(\"\")\n\n\tc := color.New(color.FgGreen)\n\tc.Printf(\"Starting the framework %s \\n\", frameworkAdaptor.version)\n\n\tfmt.Println(\"\")\n\tfmt.Println(\"-------------------------------------\")\n\n\treturn frameworkAdaptor\n}", "title": "" }, { "docid": "25701a287e3af47d3eba2ce595af9e63", "score": "0.562803", "text": "func (ipset *Ipset) Description() string {\n return \"Gather packets and bytes throuput from ipsets\"\n}", "title": "" }, { "docid": "54ad3fefc2f4a8a427af53bf90badc58", "score": "0.5547677", "text": "func (*TraceConfig_DataSource) Descriptor() ([]byte, []int) {\n\treturn file_perfetto_perfetto_trace_proto_rawDescGZIP(), []int{22, 1}\n}", "title": "" }, { "docid": "81c3b6c5550a32251fb789a16f9b45f6", "score": "0.55352986", "text": "func (o DataSourceOutput) Name() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *DataSource) pulumi.StringOutput { return v.Name }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "81c3b6c5550a32251fb789a16f9b45f6", "score": "0.55352986", "text": "func (o DataSourceOutput) Name() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *DataSource) pulumi.StringOutput { return v.Name }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "35c2c462b70624651d1926e406834638", "score": "0.55176646", "text": "func (w *CollectionsModule) Description() string {\n\treturn \"Contains commands for manipulating Sweetie Bot's collections.\"\n}", "title": "" }, { "docid": "d9c1a48286f0731df593e55aff093da1", "score": "0.54947543", "text": "func (e *Elasticsearch) Description() string {\n\treturn \"Read stats from one or more Elasticsearch servers or clusters\"\n}", "title": "" }, { "docid": "65d847ffa5e21f76678bdd2ecbdbc28f", "score": "0.54926777", "text": "func (m *Module) Description() string {\n\treturn \"Perform a handshake with a PostgreSQL server\"\n}", "title": "" }, { "docid": "a42e11ef70170082e7f3a8dbdc7ef48f", "score": "0.54715717", "text": "func (cmd CpCmd) Description() string {\n\treturn \"Copies a table\"\n}", "title": "" }, { "docid": "5e002551f5d0fdc0826ee7d12b942b7a", "score": "0.54661864", "text": "func (d *jsiiProxy_DynamoDbDataSource) ToString() *string {\n\tvar returns *string\n\n\t_jsii_.Invoke(\n\t\td,\n\t\t\"toString\",\n\t\tnil, // no parameters\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "7a892f449f088122257cf35072965563", "score": "0.54598945", "text": "func pgDataSource(mod string, res string) tokens.ModuleMember {\n\tfn := string(unicode.ToLower(rune(res[0]))) + res[1:]\n\treturn pgMember(mod+\"/\"+fn, res)\n}", "title": "" }, { "docid": "237c435b2a98dffbb1a8ca8adb2e74c4", "score": "0.545746", "text": "func (this *Database) sourceString() (source string) {\n\tif this.dbType == SqLite {\n\t\tsource = this.Host\n\t} else {\n\t\tif this.Protocol == \"tcp\" {\n\t\t\tsource = this.Host + \":\" + int2Str(this.Port)\n\t\t} else {\n\t\t\tsource = this.Host\n\t\t}\n\n\t\tsource = this.Protocol + \"(\" + source + \")\"\n\t}\n\n\treturn source\n}", "title": "" }, { "docid": "6f11afaf266f3ddbf4a4483a4a083983", "score": "0.54530936", "text": "func (s *Solr) Description() string {\n\treturn \"Read stats from one or more Solr servers or cores\"\n}", "title": "" }, { "docid": "bbc570a6059edf6b208c38772d59f4a4", "score": "0.5450952", "text": "func (s ReferenceDataSource) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "2b70481e90de203724a4b38451d53577", "score": "0.5445267", "text": "func (n *Icecast) Description() string {\n\treturn \"Read listeners from an Icecast instance per mount\"\n}", "title": "" }, { "docid": "77233a0c461a8d98ab47e6b859ecc9a9", "score": "0.5432752", "text": "func (d *DataSourceName) String() string {\n\t// username:password@protocol(address)/dbname?param=value\n\tif len(d.Raw) > 0 {\n\t\t// mutate the DataSourceObject for logging elsewhere\n\t\t// we could populate the whole object, but yagni\n\t\ts := strings.Split(d.Raw, \"/\")\n\t\td.DBName = s[len(s)-1]\n\n\t\treturn d.Raw\n\t}\n\n\tvar hostAndPort string\n\tif len(d.Port) > 0 {\n\t\thostAndPort = fmt.Sprintf(\"@tcp(%s:%s)\", d.Host, d.Port)\n\t} else {\n\t\thostAndPort = d.Host\n\t}\n\n\tvar pw string\n\tif len(d.Password) > 0 {\n\t\tpw = \":\" + d.Password\n\t}\n\n\treturn fmt.Sprintf(\"%s%s%s/%s\", d.User, pw, hostAndPort, d.DBName)\n}", "title": "" }, { "docid": "498c9429155ade12df08d2d39cad2f7a", "score": "0.5414044", "text": "func (gnv gnverifier) DataSource(id int) (vlib.DataSource, error) {\n\treturn gnv.verifier.DataSource(context.Background(), id)\n}", "title": "" }, { "docid": "71e81bd8a82278ca9f0462f1c0ddf098", "score": "0.541272", "text": "func (a *CORSAdaptor) Description() string {\n\treturn \"CORSAdaptor adapts CORS stuff.\"\n}", "title": "" }, { "docid": "b796cc59b8d30dd37e5e78f6950b4d65", "score": "0.54049206", "text": "func (s *Source) Name() string {\n\treturn \"certspotter\"\n}", "title": "" }, { "docid": "8d357e75c3ca40b3fcf621c628dfe852", "score": "0.5402297", "text": "func (s *Source) Name() string {\n\treturn s.SourceName\n}", "title": "" }, { "docid": "8d357e75c3ca40b3fcf621c628dfe852", "score": "0.5402297", "text": "func (s *Source) Name() string {\n\treturn s.SourceName\n}", "title": "" }, { "docid": "3bbfb7277ada99d0080d6f684872f54d", "score": "0.54011583", "text": "func (o DataSourceOutput) DataSourceId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *DataSource) pulumi.StringOutput { return v.DataSourceId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "7f65c998298b38e431856a66dcd2b47f", "score": "0.5394633", "text": "func (rep *printfReporter) Source() source.DataSource {\n\treturn rep.src\n}", "title": "" }, { "docid": "22ebd247c45dad4f537a4af1ba57e9b4", "score": "0.5369585", "text": "func (rep *logfReporter) Source() source.DataSource {\n\treturn rep.src\n}", "title": "" }, { "docid": "b18a3d47bcab6ca11b8bd7b3bd4d6c07", "score": "0.5366855", "text": "func (*DataSourceDescriptor) Descriptor() ([]byte, []int) {\n\treturn file_perfetto_perfetto_trace_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "925b9ad88598d693775ece4f58be9830", "score": "0.53656906", "text": "func (base base) Source() string {\n\treturn base.source\n}", "title": "" }, { "docid": "a6419f57de250834a1acc1038529087e", "score": "0.53598464", "text": "func (c PsqlDSN) Source() string {\n\tu := url.URL{Scheme: \"postgres\"}\n\n\tvar host string\n\tif c.Host != \"\" {\n\t\thost = escaper.Replace(c.Host)\n\t}\n\tif c.Port != \"\" {\n\t\thost += \":\" + escaper.Replace(c.Port)\n\t}\n\tu.Host = host\n\n\tif c.Password != \"\" {\n\t\tif c.User != \"\" {\n\t\t\tu.User = url.UserPassword(escaper.Replace(c.User), escaper.Replace(c.Password))\n\t\t}\n\t} else {\n\t\tif c.User != \"\" {\n\t\t\tu.User = url.User(escaper.Replace(c.User))\n\t\t}\n\t}\n\n\tif c.DBName != \"\" {\n\t\tu.Path = \"/\" + escaper.Replace(c.DBName)\n\t}\n\n\tq := u.Query()\n\tif c.SSLMode != \"\" {\n\t\tfor _, valid := range validSSLModes {\n\t\t\tif valid == c.SSLMode {\n\t\t\t\tq.Set(\"sslmode\", escaper.Replace(c.SSLMode))\n\t\t\t}\n\t\t}\n\t} else {\n\t\tq.Set(\"sslmode\", \"disable\")\n\t}\n\n\tif c.FallbackApplicationName != \"\" {\n\t\tq.Set(\"fallback_application_name\", escaper.Replace(c.FallbackApplicationName))\n\t}\n\n\tif c.ConnectTimeout != 0 {\n\t\tq.Set(\"connect_timeout\", fmt.Sprintf(\"%d\", c.ConnectTimeout))\n\t}\n\n\tif c.SSLCert != \"\" {\n\t\tq.Set(\"sslcert\", escaper.Replace(c.SSLCert))\n\t}\n\n\tif c.SSLKey != \"\" {\n\t\tq.Set(\"sslkey\", escaper.Replace(c.SSLKey))\n\t}\n\n\tif c.SSLRootCert != \"\" {\n\t\tq.Set(\"sslrootcert\", escaper.Replace(c.SSLRootCert))\n\t}\n\tu.RawQuery = q.Encode()\n\treturn u.String()\n}", "title": "" }, { "docid": "34fa9f9d62940ae4a00174ae069da177", "score": "0.5359255", "text": "func (m *Mgd) Description() string {\n\treturn \"Read metrics from one or many mgd servers\"\n}", "title": "" }, { "docid": "c943fbb6bafe91a61aec4a6af7699269", "score": "0.5356538", "text": "func (zl *ZabbixLLD) Description() string {\n\treturn \"Send Zabbix lld info about metrics\"\n}", "title": "" }, { "docid": "b58a06e225be54f5091c9299c64556e8", "score": "0.53556466", "text": "func (b *jsiiProxy_BaseDataSource) ToString() *string {\n\tvar returns *string\n\n\t_jsii_.Invoke(\n\t\tb,\n\t\t\"toString\",\n\t\tnil, // no parameters\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "9a7c7222d4f30a53fa8d15424df1d595", "score": "0.5354449", "text": "func (e *Ephemeral) Description() string {\n\treturn \"ephemeral in-memory data store\"\n}", "title": "" }, { "docid": "63a58f1d63adec148a764323d87e42d9", "score": "0.53439754", "text": "func (s Source) Name() string { return \"network\" }", "title": "" }, { "docid": "4b57cfb327363eba0112e2b93ae51c50", "score": "0.53371525", "text": "func (s *Source) Type() string {\n\treturn TypeName\n}", "title": "" }, { "docid": "4b57cfb327363eba0112e2b93ae51c50", "score": "0.53371525", "text": "func (s *Source) Type() string {\n\treturn TypeName\n}", "title": "" }, { "docid": "70cfed0729b2566318f2d633f964224e", "score": "0.5334925", "text": "func (r *jsiiProxy_RdsDataSource) ToString() *string {\n\tvar returns *string\n\n\t_jsii_.Invoke(\n\t\tr,\n\t\t\"toString\",\n\t\tnil, // no parameters\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "403e9943c341c0b500fedbecf0d96b18", "score": "0.5321267", "text": "func (s S3ReferenceDataSourceDescription) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "26f898c228c3d399b431c08a1d4daccb", "score": "0.53009516", "text": "func (s *Source) Name() string {\n\treturn \"sitedossier\"\n}", "title": "" }, { "docid": "0974067b0a1231e32ded17222fedfb10", "score": "0.5292289", "text": "func (m *MongoDB) Description() string {\n\treturn description\n}", "title": "" }, { "docid": "ad19fe720e5576b7943fdf71e422de89", "score": "0.5291869", "text": "func (p *Postgres) createDataSourceName() string {\n\tparameters := []string{}\n\n\taddParam := func(key, val string) {\n\t\tparameters = append(parameters, fmt.Sprintf(\"%s=%s\", key, val))\n\t}\n\n\taddParam(\"connect_timeout\", strconv.Itoa(p.ConnectionTimeout))\n\n\t// detect host:port for backwards-compatibility\n\thost, port, err := net.SplitHostPort(p.Host)\n\tif err != nil {\n\t\t// not host:port, probably unix socket or bare address\n\n\t\thost = p.Host\n\n\t\tif p.Port != 0 {\n\t\t\tport = strconv.Itoa(int(p.Port))\n\t\t}\n\t}\n\n\tif host != \"\" {\n\t\taddParam(\"host\", dataSourceStr(host))\n\t}\n\n\tif port != \"\" {\n\t\taddParam(\"port\", port)\n\t}\n\n\tif p.User != \"\" {\n\t\taddParam(\"user\", dataSourceStr(p.User))\n\t}\n\n\tif p.Password != \"\" {\n\t\taddParam(\"password\", dataSourceStr(p.Password))\n\t}\n\n\tif p.Database != \"\" {\n\t\taddParam(\"dbname\", dataSourceStr(p.Database))\n\t}\n\n\tif p.SSL.Mode == \"\" {\n\t\t// Assume the strictest mode if unspecified.\n\t\taddParam(\"sslmode\", dataSourceStr(pgSSLVerifyFull))\n\t} else {\n\t\taddParam(\"sslmode\", dataSourceStr(p.SSL.Mode))\n\t}\n\n\tif p.SSL.CAFile != \"\" {\n\t\taddParam(\"sslrootcert\", dataSourceStr(p.SSL.CAFile))\n\t}\n\n\tif p.SSL.CertFile != \"\" {\n\t\taddParam(\"sslcert\", dataSourceStr(p.SSL.CertFile))\n\t}\n\n\tif p.SSL.KeyFile != \"\" {\n\t\taddParam(\"sslkey\", dataSourceStr(p.SSL.KeyFile))\n\t}\n\n\treturn strings.Join(parameters, \" \")\n}", "title": "" }, { "docid": "135c6ad196998b28b8890729296c6c9c", "score": "0.5290714", "text": "func (j *CopySourceJobHandler) Describe() string {\n\treturn fmt.Sprintf(\"Copy sources by id '%s' (rel: %d) in '%s' to '%s'\", j.Sources, j.Release, j.SrcRepo, j.DstRepo)\n}", "title": "" }, { "docid": "3d2249f11ea09721981398274e60b0a1", "score": "0.5290041", "text": "func (us *USL) Source() string {\n\treturn us.String()\n}", "title": "" }, { "docid": "1f218876cfec7c069204639e2a24f49d", "score": "0.52871233", "text": "func (this Scanner) Description() string {\n\treturn \"Template Protocol (TP)\"\n}", "title": "" }, { "docid": "8bee3be355d0b3d40b2ba0893ae7b85f", "score": "0.5286044", "text": "func (s *DataSource) Address() string {\n\treturn fmt.Sprintf(\"%s:%d\", s.Host, s.Port)\n}", "title": "" }, { "docid": "e8267d495de4bc55d5bede110e4638ec", "score": "0.52838653", "text": "func (module *Module) Description() string {\n\treturn \"Probe for Redis\"\n}", "title": "" }, { "docid": "1b9d918d2a1d83f40d807a46b8120417", "score": "0.52695465", "text": "func (g *Emailer) Description() string {\n\treturn \"GSuite Admin Domain API\"\n}", "title": "" }, { "docid": "131d09ef64dd984b021a43fd3cdb9a9a", "score": "0.5269472", "text": "func (r *Rancher) Description() string {\n\treturn `This plugin gets Host, Stack, and Service data from the rancher api`\n}", "title": "" }, { "docid": "79faec74181e7a6c0a7ac240576d5ec3", "score": "0.526414", "text": "func AddDataSource(data []byte, ct string) {\n\tm.AddDataSource(data, ct)\n}", "title": "" }, { "docid": "2f02fb1230b29fa81e4caa3a3a01691e", "score": "0.52618927", "text": "func (module *Necrobrowser) Description() string {\n\treturn Description\n}", "title": "" }, { "docid": "29678d6508b7aa61c87dc1a34ab15759", "score": "0.52454853", "text": "func (configuration DatabaseConfiguration) GetDataSourceName() string {\n\treturn fmt.Sprintf(\"host=%v port=%v dbname=%v user=%v password=%v sslmode=%v\",\n\t\tconfiguration.Host,\n\t\tconfiguration.Port,\n\t\tconfiguration.Name,\n\t\tconfiguration.User,\n\t\tconfiguration.Password,\n\t\tconfiguration.SslMode,\n\t)\n}", "title": "" }, { "docid": "78ed75e1bc4e4f7ae4b39fdd03215baa", "score": "0.52450967", "text": "func (*TraceConfig_BuiltinDataSource) Descriptor() ([]byte, []int) {\n\treturn file_perfetto_perfetto_trace_proto_rawDescGZIP(), []int{22, 2}\n}", "title": "" }, { "docid": "449f53585fc358fdcc3bd0d694402dd6", "score": "0.5227522", "text": "func (source *Source) Name() string {\n\treturn source.name\n}", "title": "" }, { "docid": "58f88ae1583366fc270bceee60bd59b5", "score": "0.522699", "text": "func (*DataSourceConfig) Descriptor() ([]byte, []int) {\n\treturn file_perfetto_perfetto_trace_proto_rawDescGZIP(), []int{21}\n}", "title": "" }, { "docid": "1cb7b3f563ad84075fa47c65d0e86588", "score": "0.52127427", "text": "func (cmd *DatasetDelete) Description() string { return cmd.Synopsis() }", "title": "" }, { "docid": "6e899b7867348b3f5245ae5f313fea13", "score": "0.5185592", "text": "func (source *ReaderSource) String() string {\n\treturn source.Description + \" reader\"\n}", "title": "" }, { "docid": "c6378f9f569dad946cac6b478fe3d3e2", "score": "0.51840174", "text": "func (h *jsiiProxy_HttpDataSource) ToString() *string {\n\tvar returns *string\n\n\t_jsii_.Invoke(\n\t\th,\n\t\t\"toString\",\n\t\tnil, // no parameters\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "23c97be3ea5d25c7cc8444b9de593d10", "score": "0.5180701", "text": "func (o ConnectionOutput) Description() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Connection) pulumi.StringPtrOutput { return v.Description }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "401ea179504663a973ae9bd1e0f6e05d", "score": "0.51767063", "text": "func (*StorageProperties) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_datacatalog_v1_data_source_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "8e27e34252741ac1885f12ad3905c797", "score": "0.51750064", "text": "func (n *jsiiProxy_NoneDataSource) ToString() *string {\n\tvar returns *string\n\n\t_jsii_.Invoke(\n\t\tn,\n\t\t\"toString\",\n\t\tnil, // no parameters\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "061a14a7fa8c1336260f025f3e769837", "score": "0.51705116", "text": "func (c *CredsImpl) Source() string {\n\tswitch c.source {\n\tcase \"admin\", \"ro_admin\":\n\t\treturn \"ns_server\"\n\t}\n\treturn c.source\n}", "title": "" }, { "docid": "7931f78c39dbe1c7f662724d39a575ab", "score": "0.5161408", "text": "func (l *jsiiProxy_LambdaDataSource) ToString() *string {\n\tvar returns *string\n\n\t_jsii_.Invoke(\n\t\tl,\n\t\t\"toString\",\n\t\tnil, // no parameters\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "dd11cdbbb18f6d157937adb15ef44d0e", "score": "0.5152957", "text": "func (c *jsiiProxy_CfnDataSource) ToString() *string {\n\tvar returns *string\n\n\t_jsii_.Invoke(\n\t\tc,\n\t\t\"toString\",\n\t\tnil, // no parameters\n\t\t&returns,\n\t)\n\n\treturn returns\n}", "title": "" }, { "docid": "a7c6432405662b8526671458960652ef", "score": "0.5141629", "text": "func (s *Source) Name() string {\n\treturn \"gitlab\"\n}", "title": "" }, { "docid": "bf2f914482fe1ba6337fd6dcbb5ba1f0", "score": "0.5134824", "text": "func (t *Twitter) Description() string {\n\treturn \"plugin for ingesting events from twitter\"\n}", "title": "" }, { "docid": "32822f7a540891702eeb308d63aabb16", "score": "0.5126905", "text": "func (res *Resource) DSN() string {\n\treturn fmt.Sprintf(\n\t\t\"root:%s@tcp(localhost:%d)/%s?parseTime=true\",\n\t\tres.Options.RootPassword,\n\t\tres.Options.HostPort,\n\t\tres.Options.DBName,\n\t)\n}", "title": "" }, { "docid": "8ce1aeea6c97a48078f73ea6d66bc386", "score": "0.51226664", "text": "func (e *Elasticsearch) Description() string {\n\treturn description\n}", "title": "" }, { "docid": "ce837cf00b0c600fbf192a76781a0115", "score": "0.5121875", "text": "func (cmd *ShowRefCommand) Description() string {\n\treturn \"List references in a local repository\"\n}", "title": "" }, { "docid": "4258d37012c32ea4bbd047e07b47eb0b", "score": "0.51187235", "text": "func (o FlowletDataFlowOutput) Description() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *FlowletDataFlow) pulumi.StringPtrOutput { return v.Description }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f172226f8038bdb588dae1aca641094c", "score": "0.51122767", "text": "func (Pipe) Description() string {\n\treturn \"Setting repositories\"\n}", "title": "" }, { "docid": "7886f7a0605fca788eec656f41433d88", "score": "0.5112095", "text": "func (this *Database) DSN() (dsn string) {\n\tif this.dbType != SqLite {\n\t\tdsn = this.authString()\n\t\tdsn += \"@\"\n\t}\n\n\tdsn += this.sourceString()\n\n\tif this.dbType != SqLite {\n\t\tdsn += \"/\" + this.Name\n\t}\n\n\tdsn += this.uriString()\n\n\treturn\n}", "title": "" }, { "docid": "a220b8b3a518807ad80c3fe4b4db34f5", "score": "0.5110318", "text": "func getDataSourceName() (dsn string) {\n\tconfigs := getDbConfigurations()\n\n\tswitch configs.dbdriver {\n\tcase \"mysql\":\n\t\tdsn = fmt.Sprintf(\n\t\t\t\"%s:%s@(%s)/%s?charset=utf8mb4&parseTime=True&loc=Local\",\n\t\t\tconfigs.dbuser, configs.dbpassword, configs.dbhost, configs.dbname,\n\t\t)\n\tcase \"postgres\":\n\t\tdsn = fmt.Sprintf(\n\t\t\t\"host=%s port=%s user=%s dbname=%s password=%s\",\n\t\t\tconfigs.dbhost, configs.dbport, configs.dbuser, configs.dbname, configs.dbpassword,\n\t\t)\n\tcase \"mssql\":\n\t\tdsn = fmt.Sprintf(\n\t\t\t\"sqlserver://%s:%s@%s:%s?database=%s\",\n\t\t\tconfigs.dbuser, configs.dbpassword, configs.dbhost, configs.dbport, configs.dbname,\n\t\t)\n\tcase \"sqlite\":\n\t\tdsn = fmt.Sprintf(\"/tmp/%s.db\", configs.dbname)\n\t}\n\n\treturn dsn\n}", "title": "" }, { "docid": "81d717a255f6cbbf1e336ef3b6e983d2", "score": "0.51097727", "text": "func (s *Source) Name() string {\n\treturn \"anubis\"\n}", "title": "" }, { "docid": "cd53078e2f55f32348b0e76420c5aa3c", "score": "0.51071316", "text": "func (s *SnmpMetric) GetDataSrcType() string {\n\treturn s.cfg.DataSrcType\n}", "title": "" }, { "docid": "7e11e0f0eb63214ec92749a3c25317d5", "score": "0.510598", "text": "func (c *jsiiProxy_CfnDataSource) Prepare() {\n\t_jsii_.InvokeVoid(\n\t\tc,\n\t\t\"prepare\",\n\t\tnil, // no parameters\n\t)\n}", "title": "" }, { "docid": "8ad1a121991cbf04e51afeee43b6aae3", "score": "0.5104653", "text": "func (client FoundationDBStatusConnectedClient) Description() string {\n\tif client.LogGroup == \"default\" || client.LogGroup == \"\" {\n\t\treturn client.Address\n\t}\n\treturn fmt.Sprintf(\"%s (%s)\", client.Address, client.LogGroup)\n}", "title": "" }, { "docid": "15f25bad43b9aefdef91bd22ff761e35", "score": "0.51026005", "text": "func (n *jsiiProxy_NoneDataSource) Prepare() {\n\t_jsii_.InvokeVoid(\n\t\tn,\n\t\t\"prepare\",\n\t\tnil, // no parameters\n\t)\n}", "title": "" }, { "docid": "a41a63ef6c9ffd3f07128677c0e43b75", "score": "0.50990766", "text": "func (object MajorObject) Description() string {\n\tcObject := object.cval\n\tdesc := C.GoString(C.GDALGetDescription(cObject))\n\treturn desc\n}", "title": "" }, { "docid": "5f7d6dacfd92c9bb2924276be3192b14", "score": "0.50861627", "text": "func NewDataSource(owner sdk.AccAddress, name string, description string, fee sdk.Coins, executable []byte) DataSource {\n\treturn DataSource{\n\t\tOwner: owner,\n\t\tName: name,\n\t\tDescription: description,\n\t\tFee: fee,\n\t\tExecutable: executable,\n\t}\n}", "title": "" } ]
942fe6a7eef7726166f01636ad398026
GetPath implements sophos.RestObject and returns the PacketfilterGroups GET path Returns all available group types
[ { "docid": "f2d786a120dddefe0212312fcc4e3ced", "score": "0.64830744", "text": "func (p *PacketfilterGroup) GetPath() string {\n\treturn fmt.Sprintf(\"/api/objects/packetfilter/group/%s\", p.Reference)\n}", "title": "" } ]
[ { "docid": "b3457efd3d303e0a9289846ea1010c22", "score": "0.8450211", "text": "func (*PacketfilterGroups) GetPath() string { return \"/api/objects/packetfilter/group/\" }", "title": "" }, { "docid": "c29c59c97aca171cf20441fedb8bb015", "score": "0.7329638", "text": "func (*AwscliGroups) GetPath() string { return \"/api/objects/awscli/group/\" }", "title": "" }, { "docid": "5971973cd9168c34ca18c6a69016e01a", "score": "0.7003951", "text": "func (*RouteGroups) GetPath() string { return \"/api/objects/route/group/\" }", "title": "" }, { "docid": "c5706fba0d220cfccc263b9a30cae397", "score": "0.6977436", "text": "func (*AaaGroups) GetPath() string { return \"/api/objects/aaa/group/\" }", "title": "" }, { "docid": "becdbc2ca590126479a7aaf323677d25", "score": "0.68260837", "text": "func (*IpsecConnectionGroups) GetPath() string { return \"/api/objects/ipsec_connection/group/\" }", "title": "" }, { "docid": "6d26d8f1bd997226d533307212d5073e", "score": "0.67498153", "text": "func (*PacketfilterPacketfilters) GetPath() string { return \"/api/objects/packetfilter/packetfilter/\" }", "title": "" }, { "docid": "a65f4906ab51b1d0e0c02fc2cc5c06fe", "score": "0.63181704", "text": "func (*PacketfilterRulesets) GetPath() string { return \"/api/objects/packetfilter/ruleset/\" }", "title": "" }, { "docid": "73c783e40f11f3fe3d45ae1823bedc35", "score": "0.62511003", "text": "func (*SchedulerGroups) GetPath() string { return \"/api/objects/scheduler/group/\" }", "title": "" }, { "docid": "2610e0dbe976c3750850cb566a2115e5", "score": "0.62351716", "text": "func (*PacketfilterGroup) PostPath() string {\n\treturn \"/api/objects/packetfilter/group/\"\n}", "title": "" }, { "docid": "fd3c65867b43936db8be7313479e6528", "score": "0.59705997", "text": "func (a *AaaGroup) GetPath() string { return fmt.Sprintf(\"/api/objects/aaa/group/%s\", a.Reference) }", "title": "" }, { "docid": "8c6b21e18942c0fd95602ed58c08dc17", "score": "0.5795741", "text": "func (a *AwscliGroup) GetPath() string {\n\treturn fmt.Sprintf(\"/api/objects/awscli/group/%s\", a.Reference)\n}", "title": "" }, { "docid": "0418ae795b4bfced9b500e1ce3ab8f65", "score": "0.57443196", "text": "func (*Packetfilter1to1Nats) GetPath() string { return \"/api/objects/packetfilter/1to1nat/\" }", "title": "" }, { "docid": "f546cf0462a0f9f23b884cbd97fea264", "score": "0.57401985", "text": "func (*PacketfilterNats) GetPath() string { return \"/api/objects/packetfilter/nat/\" }", "title": "" }, { "docid": "26f0af80c808778edd23f10fb500ca5a", "score": "0.5713774", "text": "func (m *Filter) GetGroups()([]FilterGroupable) {\n val, err := m.GetBackingStore().Get(\"groups\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]FilterGroupable)\n }\n return nil\n}", "title": "" }, { "docid": "5a142d687025ccad25dc68142d2512e4", "score": "0.5710644", "text": "func (r *RouteGroup) GetPath() string { return fmt.Sprintf(\"/api/objects/route/group/%s\", r.Reference) }", "title": "" }, { "docid": "b6dba6d55d73afa9d3e6c8159a5e7f8b", "score": "0.56818664", "text": "func (t tracing) GetGroups(w http.ResponseWriter, r *http.Request) {\n\tt.next.GetGroups(w, r)\n}", "title": "" }, { "docid": "2cb2b16203edafedaf1088b25610df6f", "score": "0.56447387", "text": "func (*PacketfilterMangles) GetPath() string { return \"/api/objects/packetfilter/mangle/\" }", "title": "" }, { "docid": "a492c9409a979f47a79a63322d6f546b", "score": "0.5598887", "text": "func (r *CallAudioRoutingGroupsCollectionRequest) Get(ctx context.Context) ([]AudioRoutingGroup, error) {\n\tvar query string\n\tif r.query != nil {\n\t\tquery = \"?\" + r.query.Encode()\n\t}\n\treturn r.Paging(ctx, \"GET\", query, nil)\n}", "title": "" }, { "docid": "7f228c9f3245ff35ab14b76e28eb2ca9", "score": "0.55628395", "text": "func (*PacketfilterMasqs) GetPath() string { return \"/api/objects/packetfilter/masq/\" }", "title": "" }, { "docid": "be89638b75c4ad5120e5ba042ed7fb7b", "score": "0.5551811", "text": "func (*PacketfilterGenericProxys) GetPath() string { return \"/api/objects/packetfilter/generic_proxy/\" }", "title": "" }, { "docid": "d7009430d1281215c07f4b6e47624c85", "score": "0.55359006", "text": "func (*PacketfilterLoadbalances) GetPath() string { return \"/api/objects/packetfilter/loadbalance/\" }", "title": "" }, { "docid": "28dfb87e1432a4dc1429b95d49743435", "score": "0.54833823", "text": "func (ts TypeSpec) Group() []string {\n\tparts := strings.Split(ts.apiVersion, \"/\")\n\tif len(parts) == 1 {\n\t\treturn []string{\"core\"}\n\t}\n\n\treturn []string{parts[0]}\n}", "title": "" }, { "docid": "aadbc4c2091525dbc00ec1d66717f9e1", "score": "0.5463191", "text": "func (*PacketfilterGroup) PatchPath(ref string) string {\n\treturn fmt.Sprintf(\"/api/objects/packetfilter/group/%s\", ref)\n}", "title": "" }, { "docid": "f483c6e34c920f9fc5b05dd0568ec44e", "score": "0.5460169", "text": "func (_obj *UserInfoService) GetGroupList(GroupInfo *map[int32]string, _opt ...map[string]string) (ret int32, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\tctx := context.Background()\n\terr = _obj.s.Tars_invoke(ctx, 0, \"GetGroupList\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = _is.Read_int32(&ret, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr, have = _is.SkipTo(codec.MAP, 1, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr = _is.Read_int32(&length, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\t(*GroupInfo) = make(map[int32]string)\n\tfor i0, e0 := int32(0), length; i0 < e0; i0++ {\n\t\tvar k0 int32\n\t\tvar v0 string\n\n\t\terr = _is.Read_int32(&k0, 0, false)\n\t\tif err != nil {\n\t\t\treturn ret, err\n\t\t}\n\n\t\terr = _is.Read_string(&v0, 1, false)\n\t\tif err != nil {\n\t\t\treturn ret, err\n\t\t}\n\n\t\t(*GroupInfo)[k0] = v0\n\t}\n\n\t_obj.setMap(len(_opt), _resp, _context, _status)\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "title": "" }, { "docid": "1c851330485d4987f0bb39a7dd08a14c", "score": "0.54492795", "text": "func Group(key string) string {\n\ts := PathGroup(key)\n\tswitch strings.ToLower(s) {\n\tcase \"air\":\n\t\treturn air.Name\n\tcase \"amplify\":\n\t\treturn amplify.Name\n\tcase \"arcade\":\n\t\treturn arcade.Name\n\tcase \"arctic\":\n\t\treturn arctic.Name\n\tcase \"df2\":\n\t\treturn \"Defacto2\"\n\tcase \"hexwars\":\n\t\treturn hexwars.Name\n\tcase \"spirit\":\n\t\treturn spirit.Name\n\tcase \"xdb\":\n\t\treturn xdb.Name\n\tcase \"zone\":\n\t\treturn zone.Name\n\tcase \"zwt\":\n\t\treturn zwt.Name\n\t}\n\treturn s\n}", "title": "" }, { "docid": "ae70c6f40488cdabba3bba1a01792487", "score": "0.5371523", "text": "func (*AwscliGroup) PostPath() string {\n\treturn \"/api/objects/awscli/group/\"\n}", "title": "" }, { "docid": "dc8ac1417653ecc2ae13a5a29be5d82d", "score": "0.5323265", "text": "func getPermissionsGroups() []*access.PermissionGroup {\n\tinfoPg := &access.PermissionGroup{\n\t\tName: \"info\",\n\t\tPermissions: []*access.PermissionGroup_Permissions{\n\t\t\tnewPermission(\"/\", GET),\n\t\t\tnewPermission(resturl.Version, GET),\n\t\t\tnewPermission(resturl.JSONSchema, GET),\n\t\t},\n\t}\n\tnbConfigValidationPg := &access.PermissionGroup{\n\t\tName: \"nbConfigValidation\",\n\t\tPermissions: []*access.PermissionGroup_Permissions{\n\t\t\tnewPermission(\"/\", GET),\n\t\t\tnewPermission(resturl.Validate, GET),\n\t\t},\n\t}\n\tnbConfigReadPg := &access.PermissionGroup{\n\t\tName: \"nbConfigRead\",\n\t\tPermissions: []*access.PermissionGroup_Permissions{\n\t\t\tnewPermission(\"/\", GET),\n\t\t\tnewPermission(resturl.Configuration, GET),\n\t\t},\n\t}\n\tnbConfigWritePg := &access.PermissionGroup{\n\t\tName: \"nbConfigWrite\",\n\t\tPermissions: []*access.PermissionGroup_Permissions{\n\t\t\tnewPermission(\"/\", PUT),\n\t\t\tnewPermission(resturl.Configuration, PUT),\n\t\t},\n\t}\n\ttracerPg := &access.PermissionGroup{\n\t\tName: \"stats\",\n\t\tPermissions: []*access.PermissionGroup_Permissions{\n\t\t\tnewPermission(\"/\", GET),\n\t\t\tnewPermission(resturl.ConfiguratorStats, GET),\n\t\t},\n\t}\n\ttelemetryPg := &access.PermissionGroup{\n\t\tName: \"telemetry\",\n\t\tPermissions: []*access.PermissionGroup_Permissions{\n\t\t\tnewPermission(\"/\", GET),\n\t\t\tnewPermission(resturl.Telemetry, GET),\n\t\t\tnewPermission(resturl.TMemory, GET),\n\t\t\tnewPermission(resturl.TRuntime, GET),\n\t\t\tnewPermission(resturl.TNodeCount, GET),\n\t\t},\n\t}\n\tdumpPg := &access.PermissionGroup{\n\t\tName: \"dump\",\n\t\tPermissions: []*access.PermissionGroup_Permissions{\n\t\t\tnewPermission(\"/\", GET),\n\t\t\tnewPermission(resturl.ABF, GET),\n\t\t\tnewPermission(resturl.ACLIP, GET),\n\t\t\tnewPermission(resturl.ACLMACIP, GET),\n\t\t\tnewPermission(resturl.Interface, GET),\n\t\t\tnewPermission(resturl.Loopback, GET),\n\t\t\tnewPermission(resturl.Ethernet, GET),\n\t\t\tnewPermission(resturl.Memif, GET),\n\t\t\tnewPermission(resturl.Tap, GET),\n\t\t\tnewPermission(resturl.VxLan, GET),\n\t\t\tnewPermission(resturl.AfPacket, GET),\n\t\t\tnewPermission(resturl.Bd, GET),\n\t\t\tnewPermission(resturl.Fib, GET),\n\t\t\tnewPermission(resturl.Xc, GET),\n\t\t\tnewPermission(resturl.Arps, GET),\n\t\t\tnewPermission(resturl.Routes, GET),\n\t\t\tnewPermission(resturl.PArpIfs, GET),\n\t\t\tnewPermission(resturl.PArpRngs, GET),\n\t\t},\n\t}\n\n\treturn []*access.PermissionGroup{infoPg, tracerPg, telemetryPg, dumpPg,\n\t\tnbConfigValidationPg, nbConfigReadPg, nbConfigWritePg}\n}", "title": "" }, { "docid": "7b3262c2ff34964e394b564a2bfe3e11", "score": "0.52911556", "text": "func (i *IpsecConnectionGroup) GetPath() string {\n\treturn fmt.Sprintf(\"/api/objects/ipsec_connection/group/%s\", i.Reference)\n}", "title": "" }, { "docid": "6c5eefd41679abeef026d0e58c2de34c", "score": "0.52611923", "text": "func (p *PacketfilterPacketfilter) GetPath() string {\n\treturn fmt.Sprintf(\"/api/objects/packetfilter/packetfilter/%s\", p.Reference)\n}", "title": "" }, { "docid": "048e489f9715ee947b695f88b4e3b039", "score": "0.5204748", "text": "func (g *groups) List() ([]string, error) {\n\tres, err := g.c.baseRequest(http.MethodGet, routes.groups, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar r groupListResponse\n\tres.JSON(&r)\n\treturn r.Ocs.Data.Groups, nil\n}", "title": "" }, { "docid": "1e3e311404037418e4837d10612a2fbd", "score": "0.5186955", "text": "func (api *Server) GetGroups(c echo.Context) error {\n\tlog.Debug(\"Get all Groups\")\n\n\tgroups := api.services.groupService.GetAllGroups()\n\treturn c.JSON(http.StatusOK ,groups)\n}", "title": "" }, { "docid": "b824cec8b2ac784776c2e5656811068f", "score": "0.51398826", "text": "func (m *Filter) GetCategoryFilterGroups()([]FilterGroupable) {\n val, err := m.GetBackingStore().Get(\"categoryFilterGroups\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]FilterGroupable)\n }\n return nil\n}", "title": "" }, { "docid": "e4ddaff5379b5788cba56fa79a8b67a4", "score": "0.51188713", "text": "func (o *AssetUpdateReqWeb) GetGroupPath() string {\n\tif o == nil || o.GroupPath == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.GroupPath\n}", "title": "" }, { "docid": "8743c51787ed0b5ea9527e977cd9cee9", "score": "0.5100825", "text": "func (*PacketfilterGroup) PutPath(ref string) string {\n\treturn fmt.Sprintf(\"/api/objects/packetfilter/group/%s\", ref)\n}", "title": "" }, { "docid": "1f5d80012694c6785defe486b90b7cce", "score": "0.5080835", "text": "func (m *PrinterShare) GetAllowedGroups()([]Groupable) {\n val, err := m.GetBackingStore().Get(\"allowedGroups\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]Groupable)\n }\n return nil\n}", "title": "" }, { "docid": "42b1d9ee5c2b3b5a0c2ed51e46cb6bce", "score": "0.50726634", "text": "func (p *PacketfilterRuleset) GetPath() string {\n\treturn fmt.Sprintf(\"/api/objects/packetfilter/ruleset/%s\", p.Reference)\n}", "title": "" }, { "docid": "086c715c630a9d81952c5de439eb1cb9", "score": "0.5072414", "text": "func GetAPIGroupList(c *gin.Context) {\n\tg := app.Gin{C: c}\n\n\t// instancing dynamic client\n\tcontext := lang.NVL(g.C.Param(\"CLUSTER\"), config.Value.CurrentContext)\n\tdiscoveryClient, err := discovery.NewDiscoveryClientForConfig(config.Value.KubeConfigs[context])\n\tif err != nil {\n\t\tg.SendMessage(http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\n\tgroups, err := discoveryClient.ServerGroups()\n\tif err != nil {\n\t\tg.SendMessage(http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\n\tg.Send(http.StatusOK, groups)\n\n}", "title": "" }, { "docid": "6e1de6fbba1581ddee99a2159ee6136f", "score": "0.50533235", "text": "func (gatewayGroup *FSGatewayGroup) GetType() string {\n\treturn utils.ResourceFSGatewayGroup\n}", "title": "" }, { "docid": "eaf507ac12ef1f316dd284fb077b0c74", "score": "0.50457716", "text": "func (t tracing) GetGroup(w http.ResponseWriter, r *http.Request) {\n\tt.next.GetGroup(w, r)\n}", "title": "" }, { "docid": "8eff865e7d68ce01a78eaf5856042bf6", "score": "0.5010639", "text": "func (r *R) Group(path string) *R {\n\treturn r.Resource(path)\n}", "title": "" }, { "docid": "41f75c896e68f2a5bdc6b00681df3f70", "score": "0.49910507", "text": "func (a *Client) GetGroupsByTypeUsingGET(params *GetGroupsByTypeUsingGETParams, authInfo runtime.ClientAuthInfoWriter) (*GetGroupsByTypeUsingGETOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetGroupsByTypeUsingGETParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getGroupsByTypeUsingGET\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/lcm/authzn/api/groups/type/{groupType}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &GetGroupsByTypeUsingGETReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*GetGroupsByTypeUsingGETOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for getGroupsByTypeUsingGET: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "e69c6e4be5b11b0fd90a41b25972c408", "score": "0.49886864", "text": "func (Ifm_Interfaces_Interface_Ipv4_Vrrp_Groups_Group_Type) EnumDescriptor() ([]byte, []int) {\n\treturn file_huaweiV8R12_ifm_proto_rawDescGZIP(), []int{0, 1, 0, 9, 2, 0, 0, 2}\n}", "title": "" }, { "docid": "4708b367d53da7045d4e6c0dd3136c44", "score": "0.49593064", "text": "func (o SpansMetricGroupByOutput) Path() pulumi.StringOutput {\n\treturn o.ApplyT(func(v SpansMetricGroupBy) string { return v.Path }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2b92a1c365452dea074c1f7a780d9192", "score": "0.49536222", "text": "func (*IpsecConnectionGroup) PostPath() string {\n\treturn \"/api/objects/ipsec_connection/group/\"\n}", "title": "" }, { "docid": "b3221d531e9489f9d8244fe4c1cd9aec", "score": "0.49112168", "text": "func (*RouteGroup) PostPath() string {\n\treturn \"/api/objects/route/group/\"\n}", "title": "" }, { "docid": "03c7e1b0f2f6147d2cd62b9535ba340d", "score": "0.4903538", "text": "func GetResourceGroups(c *gin.Context) {\n\torgID := auth.GetCurrentOrganization(c.Request).ID\n\tsecretId := getSecretIdFromHeader(c)\n\n\tlog := log.WithFields(logrus.Fields{\"secret\": secretId, \"org\": orgID})\n\n\tlog.Info(\"Start listing resource groups\")\n\n\tgroups, err := cluster.ListResourceGroups(orgID, secretId)\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, pkgCommon.ErrorResponse{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: \"Error during listing resource groups\",\n\t\t\tError: err.Error(),\n\t\t})\n\t\treturn\n\t}\n\n\tlog.Infof(\"resource groups found: %v\", groups)\n\n\tc.JSON(http.StatusOK, groups)\n}", "title": "" }, { "docid": "f7ecb58e051ec9a8fae085f33e94bc34", "score": "0.48988482", "text": "func (groupAPIExecutor) groups(w http.ResponseWriter, req *http.Request) {\n\tlogger.Logging(logger.DEBUG, \"[GROUP] Get All Groups\")\n\tresult, resp, err := managementExecutor.GetGroups()\n\tcommon.MakeResponse(w, result, common.ChangeToJson(resp), err)\n}", "title": "" }, { "docid": "9343552d93152161683c315d423b326a", "score": "0.48835266", "text": "func (o LogsMetricGroupByOutput) Path() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LogsMetricGroupBy) string { return v.Path }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "da7d39b976922bce255217955b1462b1", "score": "0.48742464", "text": "func (c *Client) GetRDFGroupList(ctx context.Context, symID string, queryParams types.QueryParams) (*types.RDFGroupList, error) {\n\tdefer c.TimeSpent(\"GetRdfGroupList\", time.Now())\n\tif _, err := c.IsAllowedArray(symID); err != nil {\n\t\treturn nil, err\n\t}\n\tURL := c.urlPrefix() + ReplicationX + SymmetrixX + symID + XRDFGroup\n\tif queryParams != nil {\n\t\tURL += \"?\"\n\t\tfor key, val := range queryParams {\n\t\t\tswitch val := val.(type) {\n\t\t\tcase int:\n\t\t\t\tURL += fmt.Sprintf(\"%s=%s\", key, strconv.Itoa(val))\n\t\t\tcase string:\n\t\t\t\tURL += fmt.Sprintf(\"%s=%s\", key, val)\n\t\t\t}\n\t\t\tURL += \"&\"\n\t\t}\n\t\tURL = URL[:len(URL)-1]\n\t}\n\tctx, cancel := c.GetTimeoutContext(ctx)\n\tdefer cancel()\n\tresp, err := c.api.DoAndGetResponseBody(ctx, http.MethodGet, URL, c.getDefaultHeaders(), nil)\n\tif err != nil {\n\t\tlog.Error(\"GetRdfGroupList failed: \" + err.Error())\n\t\treturn nil, err\n\t}\n\n\tif err = c.checkResponse(resp); err != nil {\n\t\treturn nil, err\n\t}\n\n\trdfGrpList := new(types.RDFGroupList)\n\tif err := json.NewDecoder(resp.Body).Decode(rdfGrpList); err != nil {\n\t\treturn nil, err\n\t}\n\terr = resp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn rdfGrpList, nil\n}", "title": "" }, { "docid": "c026fb5aebf91eb515958969debc60c3", "score": "0.4867242", "text": "func GroupListGet(c *Context, w http.ResponseWriter, r *http.Request) error {\n\t// Only admins can view this page\n\tif !c.User.IsAdmin() {\n\t\treturn ErrPermissionDenied.Here()\n\t}\n\n\tgroups, err := user.GetGroupsSliceWithoutUsers(c.Tx)\n\tif err != nil {\n\t\treturn err\n\t\t// return ErrInternal.Here()\n\t}\n\tdata := groupListData{User: *c.User, Groups: groups,\n\t\tMessage: c.NormalFlashMessage, Error: c.ErrorFlashMessage,\n\t}\n\tRender(w, \"group_list.html\", data)\n\treturn nil\n}", "title": "" }, { "docid": "3f5019e7ad53124e9d99abd75d439dac", "score": "0.48664597", "text": "func (a *GroupApiService) ListGroups(ctx _context.Context, localVarOptionals *ListGroupsOpts) (GroupPagination, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue GroupPagination\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups/\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Limit.IsSet() {\n\t\tlocalVarQueryParams.Add(\"limit\", parameterToString(localVarOptionals.Limit.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Offset.IsSet() {\n\t\tlocalVarQueryParams.Add(\"offset\", parameterToString(localVarOptionals.Offset.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Name.IsSet() {\n\t\tlocalVarQueryParams.Add(\"name\", parameterToString(localVarOptionals.Name.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.NameMatch.IsSet() {\n\t\tlocalVarQueryParams.Add(\"name_match\", parameterToString(localVarOptionals.NameMatch.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Scope.IsSet() {\n\t\tlocalVarQueryParams.Add(\"scope\", parameterToString(localVarOptionals.Scope.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Username.IsSet() {\n\t\tlocalVarQueryParams.Add(\"username\", parameterToString(localVarOptionals.Username.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Uuid.IsSet() {\n\t\tlocalVarQueryParams.Add(\"uuid\", parameterToString(localVarOptionals.Uuid.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.RoleNames.IsSet() {\n\t\tlocalVarQueryParams.Add(\"role_names\", parameterToString(localVarOptionals.RoleNames.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.RoleDiscriminator.IsSet() {\n\t\tlocalVarQueryParams.Add(\"role_discriminator\", parameterToString(localVarOptionals.RoleDiscriminator.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.OrderBy.IsSet() {\n\t\tlocalVarQueryParams.Add(\"order_by\", parameterToString(localVarOptionals.OrderBy.Value(), \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error403\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "8a0824eed6f661a18d8be268b6d623ef", "score": "0.48639166", "text": "func (client BaseClient) ListGroups(ctx context.Context, nextPageLink string, pageSize *int32) (result TrustGroupRegistrationListAPIModelPage, err error) {\n if tracing.IsEnabled() {\n ctx = tracing.StartSpan(ctx, fqdn + \"/BaseClient.ListGroups\")\n defer func() {\n sc := -1\n if result.tgrlam.Response.Response != nil {\n sc = result.tgrlam.Response.Response.StatusCode\n }\n tracing.EndSpan(ctx, sc, err)\n }()\n }\n result.fn = client.listGroupsNextResults\n req, err := client.ListGroupsPreparer(ctx, nextPageLink, pageSize)\n if err != nil {\n err = autorest.NewErrorWithError(err, \"azureiiotopcvault.BaseClient\", \"ListGroups\", nil , \"Failure preparing request\")\n return\n }\n\n resp, err := client.ListGroupsSender(req)\n if err != nil {\n result.tgrlam.Response = autorest.Response{Response: resp}\n err = autorest.NewErrorWithError(err, \"azureiiotopcvault.BaseClient\", \"ListGroups\", resp, \"Failure sending request\")\n return\n }\n\n result.tgrlam, err = client.ListGroupsResponder(resp)\n if err != nil {\n err = autorest.NewErrorWithError(err, \"azureiiotopcvault.BaseClient\", \"ListGroups\", resp, \"Failure responding to request\")\n }\n\n return\n }", "title": "" }, { "docid": "e15194adcf66b96a411a7bcca7e19349", "score": "0.48611715", "text": "func PathGroup(name string) string {\n\tn := strings.Split(name, string(filepath.Separator))\n\ts := strings.Split(n[0], \"-\")\n\tx := len(s) - 1\n\tif x > 0 {\n\t\treturn s[x]\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "af9fd0855236478d32d84652fcf0a389", "score": "0.48597932", "text": "func (a *Client) ListGatewayAPIGroups(params *ListGatewayAPIGroupsParams, authInfo runtime.ClientAuthInfoWriter) (*ListGatewayAPIGroupsOK, error) {\n\t// : Validate the params before sending\n\tif params == nil {\n\t\tparams = NewListGatewayAPIGroupsParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"listGatewayAPIGroups\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/admin/{tid}/gateways/{gw}/groups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ListGatewayAPIGroupsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*ListGatewayAPIGroupsOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for listGatewayAPIGroups: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "68aa2c8722a096cd0204e371d10bbbf5", "score": "0.48492727", "text": "func (s *TestSuite) TestGetGroups() {\n\tt := time.Now()\n\tresp := s.Get(\"/Groups\")\n\td := time.Since(t)\n\n\t// Assertion 0\n\ts.Run(\"StatusCode\", func() {\n\t\ts.StatusOK(resp.StatusCode)\n\t})\n\n\t// Assertion 1\n\ts.Run(\"ResponseTime\", func() {\n\t\ts.LessOrEqual(d.Milliseconds(), int64(600))\n\t})\n}", "title": "" }, { "docid": "3681b6e80a5c4c7675ef48e36722b457", "score": "0.48383975", "text": "func (c *Config) getGroup(conf reflect.Value, group string, fieldKey GetFieldKey) {\n\ttyp := conf.Type()\n\tfor i := 0; i < typ.NumField(); i++ { // Parsing all fields in type.\n\t\tc.getField(conf.Field(i), group, fieldKey(typ.Field(i)))\n\t}\n}", "title": "" }, { "docid": "0a9324625a8c63f67fe3481bf66bea06", "score": "0.48340634", "text": "func (Packetfilter) ApiRoutes() []string {\n\treturn []string{\n\t\t\"/api/objects/packetfilter/1to1nat/\",\n\t\t\"/api/objects/packetfilter/1to1nat/{ref}\",\n\t\t\"/api/objects/packetfilter/1to1nat/{ref}/usedby\",\n\t\t\"/api/objects/packetfilter/generic_proxy/\",\n\t\t\"/api/objects/packetfilter/generic_proxy/{ref}\",\n\t\t\"/api/objects/packetfilter/generic_proxy/{ref}/usedby\",\n\t\t\"/api/objects/packetfilter/group/\",\n\t\t\"/api/objects/packetfilter/group/{ref}\",\n\t\t\"/api/objects/packetfilter/group/{ref}/usedby\",\n\t\t\"/api/objects/packetfilter/loadbalance/\",\n\t\t\"/api/objects/packetfilter/loadbalance/{ref}\",\n\t\t\"/api/objects/packetfilter/loadbalance/{ref}/usedby\",\n\t\t\"/api/objects/packetfilter/mangle/\",\n\t\t\"/api/objects/packetfilter/mangle/{ref}\",\n\t\t\"/api/objects/packetfilter/mangle/{ref}/usedby\",\n\t\t\"/api/objects/packetfilter/masq/\",\n\t\t\"/api/objects/packetfilter/masq/{ref}\",\n\t\t\"/api/objects/packetfilter/masq/{ref}/usedby\",\n\t\t\"/api/objects/packetfilter/nat/\",\n\t\t\"/api/objects/packetfilter/nat/{ref}\",\n\t\t\"/api/objects/packetfilter/nat/{ref}/usedby\",\n\t\t\"/api/objects/packetfilter/packetfilter/\",\n\t\t\"/api/objects/packetfilter/packetfilter/{ref}\",\n\t\t\"/api/objects/packetfilter/packetfilter/{ref}/usedby\",\n\t\t\"/api/objects/packetfilter/ruleset/\",\n\t\t\"/api/objects/packetfilter/ruleset/{ref}\",\n\t\t\"/api/objects/packetfilter/ruleset/{ref}/usedby\",\n\t}\n}", "title": "" }, { "docid": "b497a3c15c7dbb2c568b181314921e2c", "score": "0.48303568", "text": "func (o *DeviceDeletedFilter) GetGroupPaths() []GroupPath {\n\tif o == nil || o.GroupPaths == nil {\n\t\tvar ret []GroupPath\n\t\treturn ret\n\t}\n\treturn *o.GroupPaths\n}", "title": "" }, { "docid": "3e2d3c114feba72bdb1d2535b942e7e0", "score": "0.4808739", "text": "func (g *RouterGroup) Group(path string, descs ...string) *RouterGroup {\n\treturn g.group(path, false, descs)\n}", "title": "" }, { "docid": "0584d8e89e50803a79bec3ff94b676f4", "score": "0.48056874", "text": "func (*AaaGroup) PostPath() string {\n\treturn \"/api/objects/aaa/group/\"\n}", "title": "" }, { "docid": "95617e17f9d5c867510a40889812970b", "score": "0.4793424", "text": "func (m MStub) GroupsGet() ([]*Group, error) {\n\treturn m.Groups, nil\n}", "title": "" }, { "docid": "589695b145e575832c9a72d905823939", "score": "0.47792396", "text": "func (o ServerClaimOutput) GroupFilterType() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ServerClaim) pulumi.StringPtrOutput { return v.GroupFilterType }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9e3aed09de2da14a752ed0b76f59f2d9", "score": "0.4770614", "text": "func GroupsList() http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tgroups, err := LDAPViewGroups()\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tw.Write([]byte(\"Error occurred: \" + err.Error()))\n\t\t\treturn\n\t\t}\n\t\tgroupstring := \"[\" + strings.Join(groups, \",\") + \"]\"\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write([]byte(groupstring))\n\t})\n}", "title": "" }, { "docid": "266f1cffcc87a4d4a1f98c4055e07ae5", "score": "0.47445926", "text": "func GetList(projectPath, wish string) ([]string, error) {\n\tvar available []string\n\t// list of all resources and function groups available in project\n\tinfo, err := ioutil.ReadDir(filepath.Join(projectPath, \"functions\"))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, f := range info {\n\t\tif f.IsDir() {\n\t\t\tavailable = append(available, f.Name())\n\t\t}\n\t}\n\n\tvar list []string\n\tif wish == \"all\" {\n\t\tlist = available\n\t} else {\n\t\t// split list of resources/ function groups\n\t\twishList := strings.Split(wish, \",\")\n\t\tfor _, r := range available {\n\t\t\tif Contains(wishList, r) {\n\t\t\t\tlist = append(list, r)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn list, nil\n}", "title": "" }, { "docid": "f37eddd980fd959cc2adb237a465208a", "score": "0.4743667", "text": "func (*AwscliGroup) PatchPath(ref string) string {\n\treturn fmt.Sprintf(\"/api/objects/awscli/group/%s\", ref)\n}", "title": "" }, { "docid": "d3cabc699f2cc173cd0cb0323b445751", "score": "0.4736565", "text": "func GroupGroupPath(project, group string) string {\n\treturn \"\" +\n\t\t\"projects/\" +\n\t\tproject +\n\t\t\"/groups/\" +\n\t\tgroup +\n\t\t\"\"\n}", "title": "" }, { "docid": "6b96dd79c8103dccdcb8609cb7aaa888", "score": "0.47281313", "text": "func getGroups(config Config, searchQuery string) GroupResults {\n\tvar path string\n\tif searchQuery != \"\" {\n\t\tpath = fmt.Sprintf(\"groups/?%s\", searchQuery)\n\t} else {\n\t\tpath = \"groups\"\n\t}\n\trequest, err := createAuthenticateAWXRequest(config, path, \"GET\", nil, false)\n\tresponse := sendRequest(request, err, config)\n\tif response.StatusCode != 200 {\n\t\tlog.Fatalf(\"Server returns error status %d\", response.StatusCode)\n\t}\n\tdecoder := json.NewDecoder(response.Body)\n\tvar results GroupResults\n\terr = decoder.Decode(&results)\n\tif err != nil {\n\t\tlog.Fatal(\"There was an error decoding the results\", err)\n\t}\n\treturn results\n}", "title": "" }, { "docid": "e733e6d060326e9cf44f5bb3033bdd3c", "score": "0.4722432", "text": "func getRealmGroups(dbClient *InMemClient, sessionToken *apitypes.SessionToken, values url.Values,\n\tfiles map[string][]*multipart.FileHeader) apitypes.RespIntfTp {\n\n\tvar failMsg apitypes.RespIntfTp\n\tsessionToken, failMsg = authenticateSession(dbClient, sessionToken, values)\n\tif failMsg != nil { return failMsg }\n\n\tvar groupDescs apitypes.GroupDescs = make([]*apitypes.GroupDesc, 0)\n\tvar realmId string\n\tvar err error\n\trealmId, err = apitypes.GetRequiredHTTPParameterValue(true, values, \"RealmId\")\n\tif err != nil { return apitypes.NewFailureDescFromError(err) }\n\t\n\tfailMsg = authorizeHandlerAction(dbClient, sessionToken, apitypes.ReadMask, realmId,\n\t\t\"getRealmGroups\")\n\tif failMsg != nil { return failMsg }\n\t\n\tvar realm Realm\n\trealm, err = dbClient.getRealm(realmId)\n\tif err != nil { return apitypes.NewFailureDescFromError(err) }\n\tif realm == nil { return apitypes.NewFailureDesc(http.StatusBadRequest,\n\t\t\"Realm with Id \" + realmId + \" not found\") }\n\tvar groupIds []string = realm.getGroupIds()\n\tfor _, groupId := range groupIds {\n\t\tvar group Group\n\t\tgroup, err = dbClient.getGroup(groupId)\n\t\tif err != nil { return apitypes.NewFailureDescFromError(err) }\n\t\tif group == nil {\n\t\t\tfmt.Println(\"Internal error: group with Id \" + groupId + \" not found\")\n\t\t\tcontinue\n\t\t}\n\t\tgroupDescs = append(groupDescs, group.asGroupDesc())\n\t}\n\treturn groupDescs\n}", "title": "" }, { "docid": "8501aad8c2c717f036625fdc6d9f4b84", "score": "0.4721656", "text": "func Group(path string, views ...Classy) (result Classy) {\n\tresult = group{\n\t\tchain: alice.New(),\n\t\tviews: views,\n\t}\n\tresult = result.Path(path)\n\n\treturn\n}", "title": "" }, { "docid": "aaaf77a08e71e71302438a868a5d7f34", "score": "0.47077277", "text": "func (*PacketfilterGroup) DeletePath(ref string) string {\n\treturn fmt.Sprintf(\"/api/objects/packetfilter/group/%s\", ref)\n}", "title": "" }, { "docid": "ca7135e8c267817a6720d5b81ad559c3", "score": "0.47030386", "text": "func (s *SchedulerGroup) GetPath() string {\n\treturn fmt.Sprintf(\"/api/objects/scheduler/group/%s\", s.Reference)\n}", "title": "" }, { "docid": "d583ab84be0298bb7908758a37173a79", "score": "0.46996775", "text": "func (costInsightsMockServer) GetUserGroups(context.Context, *pb.UserGroupsRequest) (*pb.UserGroupsResponse, error) {\n\tgroups := []*pb.Group{\n\t\t{Id: \"pied-piper\"},\n\t}\n\treturn &pb.UserGroupsResponse{Groups: groups}, nil\n}", "title": "" }, { "docid": "b0952697ca6ea3544e5a69612ee46c12", "score": "0.46986794", "text": "func (i *DefaultInfo) GetGroups() []string {\n\treturn i.Groups\n}", "title": "" }, { "docid": "9cefedc65c23db3fa9d74e769b091ca4", "score": "0.4695559", "text": "func (a *GroupApiService) GetGroup(ctx _context.Context, uuid string) (GroupWithPrincipalsAndRoles, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue GroupWithPrincipalsAndRoles\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups/{uuid}/\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"uuid\"+\"}\", _neturl.QueryEscape(parameterToString(uuid, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error403\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "b6cef7554608d62620cf808335ec5e81", "score": "0.46879718", "text": "func (*PacketfilterPacketfilter) PostPath() string {\n\treturn \"/api/objects/packetfilter/packetfilter/\"\n}", "title": "" }, { "docid": "d625ec73f2793ba52b1b35471fd20418", "score": "0.46846604", "text": "func GroupByFieldPath(gets []*Action) [][]*Action {\n\t// This is quadratic in the worst case, but it's unlikely that there would be\n\t// many Gets with different field paths.\n\tvar groups [][]*Action\n\tseen := map[*Action]bool{}\n\tfor len(seen) < len(gets) {\n\t\tvar g []*Action\n\t\tfor _, a := range gets {\n\t\t\tif !seen[a] {\n\t\t\t\tif len(g) == 0 || fpsEqual(g[0].FieldPaths, a.FieldPaths) {\n\t\t\t\t\tg = append(g, a)\n\t\t\t\t\tseen[a] = true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tgroups = append(groups, g)\n\t}\n\treturn groups\n}", "title": "" }, { "docid": "47256b204194944a160222c55e003f74", "score": "0.46846044", "text": "func (lj *LocalJSON) Groups() []*store.Group {\n\treturn lj.Data.Groups\n}", "title": "" }, { "docid": "3541e5540cc2dd2028b2ac7786226d7f", "score": "0.4683272", "text": "func (o *GetOperationGroupsURL) String() string {\n\treturn o.Must(o.Build()).String()\n}", "title": "" }, { "docid": "7aae46dbf8b4ef75d065089d37fe8b90", "score": "0.46797174", "text": "func (group *Group) Group() ([]Group, error) {\n\tc := \"list group\"\n\tb, err := cmd.RunCommand(c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tgroups := []Group{}\n\terr = json.Unmarshal(b, &groups)\n\tif err != nil {\n\t\t// it may have been just an empty output from the Frontend\n\t\tnullOutput := NullOutput{}\n\t\terr = json.Unmarshal(b, &nullOutput)\n\t\tif err != nil {\n\t\t\t// if we still can't recognize the output, return an error\n\t\t\treturn nil, err\n\t\t}\n\t\treturn groups, err\n\t}\n\treturn groups, err\n}", "title": "" }, { "docid": "dede83825d69fa38ae1530e40a0cb125", "score": "0.46789303", "text": "func (Chlorine) GetGroup() string {\n\tvar g groupType = a7\n\treturn g.get()\n}", "title": "" }, { "docid": "7103a6a8c8ba430ec59bce33cb8e2b94", "score": "0.46562296", "text": "func (c Client) GetGroup(id string, vanityURL string, page int) (resp GroupInfo, b []byte, err error) {\n\n\tvals := url.Values{}\n\tvals.Set(\"p\", strconv.Itoa(page))\n\t// vals.Set(\"xml\", \"1\") // Without this, it redirects to a slug, so we can get the type\n\n\tvar urlx string\n\tif id != \"\" {\n\t\tb, urlx, err = c.getFromCommunity(\"gid/\"+id+\"/memberslistxml\", vals)\n\t} else if vanityURL != \"\" {\n\t\tb, urlx, err = c.getFromCommunity(\"groups/\"+vanityURL+\"/memberslistxml\", vals)\n\t} else {\n\t\treturn resp, b, errors.New(\"missing id/vanity\")\n\t}\n\n\tif err != nil {\n\t\treturn resp, b, err\n\t}\n\n\tif string(b) == \"null\" {\n\t\treturn resp, b, ErrRateLimited\n\t}\n\n\terr = xml.Unmarshal(b, &resp)\n\n\tif strings.Contains(urlx, \"/games/\") {\n\t\tresp.Type = \"game\"\n\t} else if strings.Contains(urlx, \"/groups/\") {\n\t\tresp.Type = \"group\"\n\t}\n\n\treturn resp, b, err\n}", "title": "" }, { "docid": "e013d7124a2aebfdc65f8c7152e46ed1", "score": "0.4645211", "text": "func (r *RouterGroup) Path() (path string) {\n\treturn r.path\n}", "title": "" }, { "docid": "425accb9c1361c527b258d71ed20daff", "score": "0.46420494", "text": "func (device *IndustrialDigitalIn4Bricklet) GetGroup() (group [4]rune, err error) {\n\tvar buf bytes.Buffer\n\n\tresultBytes, err := device.device.Get(uint8(FunctionGetGroup), buf.Bytes())\n\tif err != nil {\n\t\treturn group, err\n\t}\n\tif len(resultBytes) > 0 {\n\t\tvar header PacketHeader\n\n\t\theader.FillFromBytes(resultBytes)\n\n\t\tif header.Length != 12 {\n\t\t\treturn group, fmt.Errorf(\"Received packet of unexpected size %d, instead of %d\", header.Length, 12)\n\t\t}\n\n\t\tif header.ErrorCode != 0 {\n\t\t\treturn group, DeviceError(header.ErrorCode)\n\t\t}\n\n\t\tresultBuf := bytes.NewBuffer(resultBytes[8:])\n\t\tcopy(group[:], ByteSliceToRuneSlice(resultBuf.Next(4)))\n\n\t}\n\n\treturn group, nil\n}", "title": "" }, { "docid": "123a2c257329166903e9f82c3623e627", "score": "0.46386138", "text": "func (*PacketfilterRuleset) PostPath() string {\n\treturn \"/api/objects/packetfilter/ruleset/\"\n}", "title": "" }, { "docid": "9576e4eca17f5e2346b54a0a92f00bce", "score": "0.4638069", "text": "func (o LookupGroupResultOutput) Path() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupGroupResult) string { return v.Path }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "fecd41258ba4d0ad21c4b9273f2e010e", "score": "0.4634714", "text": "func GetAllModuleGroups(repository persistence.Repository) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tdegreeID := r.FormValue(\"degree\")\n\t\temptyString := \"\"\n\t\tvar resp []persistence.ModuleGroupsResponse\n\t\tif degreeID == emptyString {\n\t\t\tif moduleGroups , err := repository.GetAllModuleGroups(); err !=nil {\n\t\t\t\tutil.LogErrorAndSendBadRequest(w,r,err)\n\t\t\t} else {\n\t\t\t\tfor _,group := range moduleGroups {\n\t\t\t\t\tresp = append(resp, ModuleGroupResponseBuilder(group))\n\t\t\t\t}\n\t\t\t\tutil.EncodeJSONandSendResponse(w,r,resp)\n\t\t\t}\n\t\t} else {\n\t\t\tif degree, err := repository.GetDegreeById(degreeID); err != nil {\n\t\t\t\tutil.LogErrorAndSendBadRequest(w,r,err)\n\t\t\t} else {\n\t\t\t\tfor _, degreeGroup := range degree.Groups {\n\t\t\t\t\tif group, err := repository.GetModuleGroupById(degreeGroup.GroupID); err != nil {\n\t\t\t\t\t\tutil.LogErrorAndSendBadRequest(w,r,err)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tresp = append(resp, ModuleGroupResponseBuilder(group))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tutil.EncodeJSONandSendResponse(w,r,resp)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4311308f97fd7471e4937fc24260dde1", "score": "0.46164873", "text": "func GetServiceGroupHandler(c *routing.Context) error {\r\n\tserviceGroupID := string(c.Param(\"group\"))\r\n\r\n\t// Create service group service\r\n\tserviceGroupService, _ := getServiceGroupsService(c)\r\n\t\r\n\tsg, err := serviceGroupService.GetServiceGroupById(serviceGroupID)\r\n\tif err != nil {\r\n\t\treturn http.Error(c, strconv.Quote(err.Error()), 400, ServiceDiscoveryServiceName())\r\n\t}\r\n\r\n\tsgByte, _ := json.Marshal(sg)\r\n\treturn http.Ok(c, string(sgByte), ServiceDiscoveryServiceName())\r\n}", "title": "" }, { "docid": "4a914dbc3e9ffd9182d3658d3bcd3383", "score": "0.46162724", "text": "func GetGroups(w http.ResponseWriter, r *http.Request) {\n res := struct {\n Groups []Group `json:\"groups\"`\n Errors []string `json:\"errors\"`\n }{}\n\n for _, id := range ids {\n g, err := fetch(id)\n if err != nil {\n res.Errors = append(res.Errors, err.Error())\n continue\n }\n res.Groups = append(res.Groups, *g)\n }\n\n // can use err := json.NewEncoder(w).Encode(res)\n data, err := json.Marshal(res)\n if err != nil {\n http.Error(w, \"internal server error\", http.StatusInternalServerError)\n return\n\n }\n fmt.Fprintln(w, string(data))\n}", "title": "" }, { "docid": "a6b75f89a585b09ae17bad4a9d2b8459", "score": "0.46157768", "text": "func (*Ifm_Interfaces_Interface_Ipv4_Vrrp_Groups) Descriptor() ([]byte, []int) {\n\treturn file_huaweiV8R12_ifm_proto_rawDescGZIP(), []int{0, 1, 0, 9, 2, 0}\n}", "title": "" }, { "docid": "c4c853e5b1f3032948616405143da2fb", "score": "0.46157727", "text": "func (a *DefaultApiService) GetGroupV1(ctx _context.Context) (model.Group, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue model.Group\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/group\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v model.Group\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "81e2a6138b24feb30ff9ec48d7e8e132", "score": "0.46123472", "text": "func (groups *Groups) Get() (GroupsResp, error) {\n\tclient := NewHTTPClient(groups.client)\n\treturn client.Get(groups.ToURL(), groups.config)\n}", "title": "" }, { "docid": "c454fcf711d28da2336f6631789b765b", "score": "0.46017247", "text": "func (c *ClusterTx) GetClusterGroupURIs(ctx context.Context, filter cluster.ClusterGroupFilter) ([]string, error) {\n\tvar args []any\n\tvar sql string\n\tif filter.Name != nil && filter.ID == nil {\n\t\tsql = `SELECT cluster_groups.name FROM cluster_groups\nWHERE cluster_groups.name = ? ORDER BY cluster_groups.name\n`\n\t\targs = []any{\n\t\t\tfilter.Name,\n\t\t}\n\t} else if filter.ID == nil && filter.Name == nil {\n\t\tsql = `SELECT cluster_groups.name FROM cluster_groups ORDER BY cluster_groups.name`\n\t\targs = []any{}\n\t} else {\n\t\treturn nil, fmt.Errorf(\"No statement exists for the given Filter\")\n\t}\n\n\tnames, err := query.SelectStrings(ctx, c.tx, sql, args...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\turis := make([]string, len(names))\n\tfor i, name := range names {\n\t\turis[i] = api.NewURL().Path(version.APIVersion, \"cluster\", \"groups\", name).String()\n\t}\n\n\treturn uris, nil\n}", "title": "" }, { "docid": "a67bf595388c41ae3f47d5b6c08c7f40", "score": "0.45957235", "text": "func GetAllGroups()(Groups []group.Group, err error) {\n Groups, err = group.GetAllGroups()\n changecontrol.ChangeControlInsertData(err, \"GetAllGroups\")\n return Groups, err\n}", "title": "" }, { "docid": "ca884b766b7eef070f698a044884f559", "score": "0.4593334", "text": "func getGroupsFromResource(cli *kubernetes.Client) (hgv map[kind][]groupversion, err error) {\n\thgv = make(map[kind][]groupversion)\n\tvar gl v1.APIGroupList\n\tgs, err := cli.KubeClient.RESTClient().Get().RequestURI(\"/apis\").Do(context.Background()).Raw()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = json.Unmarshal(gs, &gl)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, g := range gl.Groups {\n\t\tgroupName := g.Name\n\t\tvar apig v1.APIGroup\n\t\tapigbytes, err := cli.KubeClient.RESTClient().Get().RequestURI(\"/apis/\" + groupName).Do(context.Background()).Raw()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\terr = json.Unmarshal(apigbytes, &apig)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor _, v := range apig.Versions {\n\t\t\tapiRes, err := cli.KubeClient.DiscoveryClient.ServerResourcesForGroupVersion(v.GroupVersion)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tfor _, res := range apiRes.APIResources {\n\t\t\t\tif v.GroupVersion != \"\" {\n\t\t\t\t\thgv[kind(res.Kind)] = append(hgv[kind(res.Kind)], groupversion(v.GroupVersion))\n\t\t\t\t} else {\n\t\t\t\t\thgv[kind(res.Kind)] = append(hgv[kind(res.Kind)], groupversion(v.Version))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tapiRes, err := cli.KubeClient.DiscoveryClient.ServerResourcesForGroupVersion(\"v1\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor _, res := range apiRes.APIResources {\n\t\t\thgv[kind(res.Kind)] = append(hgv[kind(res.Kind)], groupversion(\"v1\"))\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "4080f5bd79e4a32d100862d49aaaf26e", "score": "0.45920065", "text": "func (p *PacketfilterMangle) GetPath() string {\n\treturn fmt.Sprintf(\"/api/objects/packetfilter/mangle/%s\", p.Reference)\n}", "title": "" }, { "docid": "c42f878c104749eea8596691def6c77d", "score": "0.45893532", "text": "func (g *Group) Get(path string, callback routeCallbackFunc) {\n\troutes.build(splitPath(path, \"GET\"), callback, g)\n}", "title": "" }, { "docid": "776fe6829e82bbdf5f7c17a4068676c8", "score": "0.4589163", "text": "func (a *UserManagementApiService) UmGroupsResourcesGet(ctx _context.Context, groupId string, optionals *UmGroupsResourcesGetOpts) (ResourceGroups, *APIResponse, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue ResourceGroups\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/um/groups/{groupId}/resources\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"groupId\"+\"}\", _neturl.PathEscape(parameterToString(groupId, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif optionals != nil && optionals.Pretty != nil {\n\t\tlocalVarQueryParams.Add(\"pretty\", parameterToString(*optionals.Pretty, \"\"))\n\t}\n\tif optionals != nil && optionals.Depth != nil {\n\t\tlocalVarQueryParams.Add(\"depth\", parameterToString(*optionals.Depth, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif optionals != nil && optionals.XContractNumber != nil {\n\t\tlocalVarHeaderParams[\"X-Contract-Number\"] = parameterToString(*optionals.XContractNumber, \"\")\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tlocalVarAPIResponse := &APIResponse {\n\t\tResponse: localVarHTTPResponse,\n\t\tMethod: localVarHTTPMethod,\n\t\tRequestURL: localVarPath,\n\t\tOperation: \"UmGroupsResourcesGet\",\n\t}\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarAPIResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarAPIResponse.Payload = localVarBody\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarAPIResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarAPIResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarAPIResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarAPIResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarAPIResponse, nil\n}", "title": "" }, { "docid": "d79e597795b8309c7ac1dfa59e36e9bd", "score": "0.45849577", "text": "func GetGroupPkgInfo(paths []string) ([]*PkgInfo, error) {\n\t// Connect to database.\n\tq := connDb()\n\tdefer q.Close()\n\n\tpinfos := make([]*PkgInfo, 0, len(paths))\n\tfor _, v := range paths {\n\t\tif len(v) > 0 {\n\t\t\tpinfo := new(PkgInfo)\n\t\t\terr := q.WhereEqual(\"path\", v).Find(pinfo)\n\t\t\tif err == nil {\n\t\t\t\tpinfos = append(pinfos, pinfo)\n\t\t\t} else {\n\t\t\t\tpinfos = append(pinfos, &PkgInfo{Path: v})\n\t\t\t}\n\t\t}\n\t}\n\treturn pinfos, nil\n}", "title": "" }, { "docid": "b6df8fdc1587be423ff523503b1e0f39", "score": "0.4581975", "text": "func (r *GroupPermissionGrantsCollectionRequest) Get(ctx context.Context) ([]ResourceSpecificPermissionGrant, error) {\n\treturn r.GetN(ctx, 0)\n}", "title": "" }, { "docid": "9e8d58e857ece664a563cc979c7e9394", "score": "0.45819268", "text": "func (o ResourceGroupOutput) GroupType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ResourceGroup) pulumi.StringOutput { return v.GroupType }).(pulumi.StringOutput)\n}", "title": "" } ]
e71ae98bf18d8fbdc7428e058b1bbba1
NewExpiringMessageWidget creates a new ExpiringMessageWidget struct
[ { "docid": "e85bc6b7ae356173ca695ad85c67c23e", "score": "0.8292384", "text": "func NewExpiringMessageWidget(y, screenWidth int, theme *ColorTheme) *ExpiringMessageWidget {\n\treturn &ExpiringMessageWidget{\n\t\ty: y,\n\t\tscreenWidth: screenWidth,\n\t\tclearTimer: nil,\n\t\tmarkup: NewMarkup(theme),\n\t}\n\n}", "title": "" } ]
[ { "docid": "14d1440f80ac18bce96975727d8d31d8", "score": "0.585569", "text": "func (s *ExpiringMessageWidget) Render() {\n\ts.Lock()\n\tdefer s.Unlock()\n\tif s.message != \"\" {\n\t\tw, _ := termbox.Size()\n\t\trenderLineWithMarkup(0, s.y, w, s.message, s.markup)\n\t}\n}", "title": "" }, { "docid": "329a6ed55205d1db3f19ed687595caa8", "score": "0.57920843", "text": "func (s *ExpiringMessageWidget) Message(msg string, clearDelay time.Duration) {\n\ts.Lock()\n\tdefer s.Unlock()\n\ts.stopTimer()\n\ts.message = msg\n\tif clearDelay != 0 {\n\t\ts.clearTimer = time.AfterFunc(clearDelay, func() {\n\t\t\tclearMessage := strings.Repeat(\" \", len(msg))\n\t\t\ts.message = \"\"\n\t\t\trenderString(0, s.y, s.screenWidth, clearMessage, termbox.Attribute(s.markup.theme.Fg), termbox.Attribute(s.markup.theme.Bg))\n\t\t})\n\t}\n}", "title": "" }, { "docid": "f23d93066fde8c176afcbb40987be9e3", "score": "0.5395245", "text": "func newExpiryQueue() *ExpiryQueue {\n\treturn &ExpiryQueue{\n\t\tmutex: &sync.Mutex{},\n\t}\n}", "title": "" }, { "docid": "55c26a355cf2deb7aad856a6fbc18884", "score": "0.52680457", "text": "func newMessage(msg string) *Message {\n\treturn &Message{\n\t\tId: ID,\n\t\tRts: time.Now(),\n\t\tContent: msg,\n\t}\n}", "title": "" }, { "docid": "50b3cb0106bc21839f27c1480304c281", "score": "0.49877924", "text": "func NewExpiringCnclContext(action func(), timeout time.Duration, bag ValueBag) *ExpiringCnclContext {\n\texp := &ExpiringCnclContext{close: make(chan struct{}), action: action, bag: bag, duration: timeout}\n\tgo exp.monitor()\n\treturn exp\n}", "title": "" }, { "docid": "d7b706b05624da326db005ffda625184", "score": "0.49793667", "text": "func NewFromContent(content IContent) *Widget {\n\tres := &Widget{\n\t\ttext: content,\n\t\tlinesFromTop: 0,\n\t\tCallbacks: gowid.NewCallbacks(),\n\t}\n\treturn res\n}", "title": "" }, { "docid": "a245ce90344d15e1ebbeb9cc130bfc18", "score": "0.4927019", "text": "func NewExpirationPattern()(*ExpirationPattern) {\n m := &ExpirationPattern{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "title": "" }, { "docid": "b45a0810a82289cf1106920c990c9603", "score": "0.49269012", "text": "func NewWidget() *Widget {\n\treturn &Widget{}\n}", "title": "" }, { "docid": "70bb62855011b95491bdd5e3a2bac054", "score": "0.48308858", "text": "func newReceivedMessage(ctxForLogging context.Context, amqpMsg *amqp.Message) *ReceivedMessage {\n\tmsg := &ReceivedMessage{\n\t\trawAMQPMessage: amqpMsg,\n\t}\n\n\tif amqpMsg.Properties != nil {\n\t\tif id, ok := amqpMsg.Properties.MessageID.(string); ok {\n\t\t\tmsg.MessageID = id\n\t\t}\n\t\tmsg.SessionID = amqpMsg.Properties.GroupID\n\t\t//msg.GroupSequence = &amqpMsg.Properties.GroupSequence\n\n\t\tif id, ok := amqpMsg.Properties.CorrelationID.(string); ok {\n\t\t\tmsg.CorrelationID = &id\n\t\t}\n\t\tmsg.ContentType = amqpMsg.Properties.ContentType\n\t\tmsg.Subject = amqpMsg.Properties.Subject\n\t\tmsg.To = amqpMsg.Properties.To\n\t\tmsg.ReplyTo = amqpMsg.Properties.ReplyTo\n\t\tmsg.ReplyToSessionID = amqpMsg.Properties.ReplyToGroupID\n\t\tif amqpMsg.Header != nil {\n\t\t\tmsg.DeliveryCount = amqpMsg.Header.DeliveryCount + 1\n\t\t\tmsg.TimeToLive = &amqpMsg.Header.TTL\n\t\t}\n\t}\n\n\tif amqpMsg.ApplicationProperties != nil {\n\t\tmsg.ApplicationProperties = make(map[string]interface{}, len(amqpMsg.ApplicationProperties))\n\t\tfor key, value := range amqpMsg.ApplicationProperties {\n\t\t\tmsg.ApplicationProperties[key] = value\n\t\t}\n\n\t\tif deadLetterErrorDescription, ok := amqpMsg.ApplicationProperties[\"DeadLetterErrorDescription\"]; ok {\n\t\t\tmsg.DeadLetterErrorDescription = to.StringPtr(deadLetterErrorDescription.(string))\n\t\t}\n\n\t\tif deadLetterReason, ok := amqpMsg.ApplicationProperties[\"DeadLetterReason\"]; ok {\n\t\t\tmsg.DeadLetterReason = to.StringPtr(deadLetterReason.(string))\n\t\t}\n\t}\n\n\tif amqpMsg.Annotations != nil {\n\t\tif lockedUntil, ok := amqpMsg.Annotations[lockedUntilAnnotation]; ok {\n\t\t\tt := lockedUntil.(time.Time)\n\t\t\tmsg.LockedUntil = &t\n\t\t}\n\n\t\tif sequenceNumber, ok := amqpMsg.Annotations[sequenceNumberAnnotation]; ok {\n\t\t\tmsg.SequenceNumber = to.Int64Ptr(sequenceNumber.(int64))\n\t\t}\n\n\t\tif partitionKey, ok := amqpMsg.Annotations[partitionKeyAnnotation]; ok {\n\t\t\tmsg.PartitionKey = to.StringPtr(partitionKey.(string))\n\t\t}\n\n\t\tif enqueuedTime, ok := amqpMsg.Annotations[enqueuedTimeAnnotation]; ok {\n\t\t\tt := enqueuedTime.(time.Time)\n\t\t\tmsg.EnqueuedTime = &t\n\t\t}\n\n\t\tif deadLetterSource, ok := amqpMsg.Annotations[deadLetterSourceAnnotation]; ok {\n\t\t\tmsg.DeadLetterSource = to.StringPtr(deadLetterSource.(string))\n\t\t}\n\n\t\tif scheduledEnqueueTime, ok := amqpMsg.Annotations[scheduledEnqueuedTimeAnnotation]; ok {\n\t\t\tt := scheduledEnqueueTime.(time.Time)\n\t\t\tmsg.ScheduledEnqueueTime = &t\n\t\t}\n\n\t\tif enqueuedSequenceNumber, ok := amqpMsg.Annotations[enqueuedSequenceNumberAnnotation]; ok {\n\t\t\tmsg.EnqueuedSequenceNumber = to.Int64Ptr(enqueuedSequenceNumber.(int64))\n\t\t}\n\n\t\tif viaPartitionKey, ok := amqpMsg.Annotations[viaPartitionKeyAnnotation]; ok {\n\t\t\tmsg.TransactionPartitionKey = to.StringPtr(viaPartitionKey.(string))\n\t\t}\n\n\t\t// TODO: annotation propagation is a thing. Currently these are only stored inside\n\t\t// of the underlying AMQP message, but not inside of the message itself.\n\n\t\t// If we didn't populate any system properties, set up the struct so we\n\t\t// can put the annotations in it\n\t\t// if msg.SystemProperties == nil {\n\t\t// \tmsg.SystemProperties = new(SystemProperties)\n\t\t// }\n\n\t\t// Take all string-keyed annotations because the protocol reserves all\n\t\t// numeric keys for itself and there are no numeric keys defined in the\n\t\t// protocol today:\n\t\t//\n\t\t//\thttp://www.amqp.org/sites/amqp.org/files/amqp.pdf (section 3.2.10)\n\t\t//\n\t\t// This approach is also consistent with the behavior of .NET:\n\t\t//\n\t\t//\thttps://docs.microsoft.com/en-us/dotnet/api/azure.messaging.eventhubs.eventdata.systemproperties?view=azure-dotnet#Azure_Messaging_EventHubs_EventData_SystemProperties\n\t\t// msg.SystemProperties.Annotations = make(map[string]interface{})\n\t\t// for key, val := range amqpMsg.Annotations {\n\t\t// \tif s, ok := key.(string); ok {\n\t\t// \t\tmsg.SystemProperties.Annotations[s] = val\n\t\t// \t}\n\t\t// }\n\t}\n\n\tif amqpMsg.DeliveryTag != nil && len(amqpMsg.DeliveryTag) > 0 {\n\t\tlockToken, err := lockTokenFromMessageTag(amqpMsg)\n\n\t\tif err == nil {\n\t\t\tmsg.LockToken = *(*amqp.UUID)(lockToken)\n\t\t} else {\n\t\t\ttab.For(ctxForLogging).Info(fmt.Sprintf(\"msg.DeliveryTag could not be converted into a UUID: %s\", err.Error()))\n\t\t}\n\t}\n\n\tif token, ok := amqpMsg.DeliveryAnnotations[lockTokenDeliveryAnnotation]; ok {\n\t\tif id, ok := token.(amqp.UUID); ok {\n\t\t\tmsg.LockToken = [16]byte(id)\n\t\t}\n\t}\n\n\tif msg.EnqueuedTime != nil && msg.TimeToLive != nil {\n\t\texpiresAt := msg.EnqueuedTime.Add(*msg.TimeToLive)\n\t\tmsg.ExpiresAt = &expiresAt\n\t}\n\n\treturn msg\n}", "title": "" }, { "docid": "73309b6af6dcabdfceced27a320f71ca", "score": "0.4769027", "text": "func newExpirationInfo(name string, cert *x509.Certificate, externallyManaged bool) *ExpirationInfo {\n\treturn &ExpirationInfo{\n\t\tName: name,\n\t\tExpirationDate: cert.NotAfter,\n\t\tExternallyManaged: externallyManaged,\n\t}\n}", "title": "" }, { "docid": "0cb5dec7cf631956a41f3f31f267a58c", "score": "0.47448808", "text": "func ExpireMessage(api keybase.ChatAPI, d time.Duration, id int) keybase.ChatAPI {\n\ttime.Sleep(d)\n\tchannel := keybase.Channel{\n\t\tName: api.Msg.Channel.Name,\n\t\tTopicName: api.Msg.Channel.TopicName,\n\t\tMembersType: api.Msg.Channel.MembersType,\n\t}\n\tchat := k.NewChat(channel)\n\tret, err := chat.Delete(id)\n\tif err != nil {\n\t\tlog.LogError(fmt.Sprintf(\"Error in ExpireMessage ```%+v```\"))\n\t\tlog.LogDebug(fmt.Sprintf(\"Deletion in @%s#%s to %s: %s\",\n\t\t\tchannel.Name,\n\t\t\tchannel.TopicName,\n\t\t\tapi.Msg.Sender.Username,\n\t\t\tapi.Msg.Content.Text.Body,\n\t\t))\n\t}\n\treturn ret\n\n}", "title": "" }, { "docid": "33ffe0799b77d2fb7c4a6f083c9718ff", "score": "0.47404325", "text": "func NewChatMessageHostedContent()(*ChatMessageHostedContent) {\n m := &ChatMessageHostedContent{\n TeamworkHostedContent: *NewTeamworkHostedContent(),\n }\n return m\n}", "title": "" }, { "docid": "227a32057278dc622b766631f8ddffeb", "score": "0.47194648", "text": "func NewSlidingWindow() *SlidingWindow { return &SlidingWindow{mc: make(chan *Message, 1)} }", "title": "" }, { "docid": "47f621eb9d0018474648a58aff94638b", "score": "0.4669556", "text": "func NewExpiration(month, day, year string) *Expiration {\n\te := &Expiration{\n\t\tDay: day,\n\t\tMonth: month,\n\t\tYear: year,\n\t}\n\te.setDate()\n\treturn e\n\n}", "title": "" }, { "docid": "8d4211f838cc697b81659a3adc989645", "score": "0.4654523", "text": "func NewTermsExpiration()(*TermsExpiration) {\n m := &TermsExpiration{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "title": "" }, { "docid": "3692d178164ad3290316f7f5a9cee71d", "score": "0.46475235", "text": "func NewMessage(msg string) Message {\n\treturn Message{\n\t\tID: \t\t\txid.New(), \n\t\tSender: \"Anonim\",\n\t\tContentMessage: msg,\n\t\tCreatedAt: time.Now(),\n\t}\n}", "title": "" }, { "docid": "530b5274730cbb72699dd63de1b59283", "score": "0.4626612", "text": "func NewExpirationPattern()(*ExpirationPattern) {\n m := &ExpirationPattern{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "title": "" }, { "docid": "e1159634e4f2eb57b54418fada94a0d3", "score": "0.4614476", "text": "func newReceivedMessage(amqpMsg *amqp.Message, receivingLinkName string) *ReceivedMessage {\n\tmsg := &ReceivedMessage{\n\t\tRawAMQPMessage: newAMQPAnnotatedMessage(amqpMsg, receivingLinkName),\n\t\tState: MessageStateActive,\n\t}\n\n\tif len(msg.RawAMQPMessage.Body.Data) == 1 {\n\t\tmsg.Body = msg.RawAMQPMessage.Body.Data[0]\n\t}\n\n\tif amqpMsg.Properties != nil {\n\t\tif id, ok := amqpMsg.Properties.MessageID.(string); ok {\n\t\t\tmsg.MessageID = id\n\t\t}\n\t\tmsg.SessionID = amqpMsg.Properties.GroupID\n\t\t//msg.GroupSequence = &amqpMsg.Properties.GroupSequence\n\n\t\tif id, ok := amqpMsg.Properties.CorrelationID.(string); ok {\n\t\t\tmsg.CorrelationID = &id\n\t\t}\n\t\tmsg.ContentType = amqpMsg.Properties.ContentType\n\t\tmsg.Subject = amqpMsg.Properties.Subject\n\t\tmsg.To = amqpMsg.Properties.To\n\t\tmsg.ReplyTo = amqpMsg.Properties.ReplyTo\n\t\tmsg.ReplyToSessionID = amqpMsg.Properties.ReplyToGroupID\n\t\tif amqpMsg.Header != nil {\n\t\t\tmsg.DeliveryCount = amqpMsg.Header.DeliveryCount + 1\n\t\t\tmsg.TimeToLive = &amqpMsg.Header.TTL\n\t\t}\n\t}\n\n\tif amqpMsg.ApplicationProperties != nil {\n\t\tmsg.ApplicationProperties = make(map[string]any, len(amqpMsg.ApplicationProperties))\n\t\tfor key, value := range amqpMsg.ApplicationProperties {\n\t\t\tmsg.ApplicationProperties[key] = value\n\t\t}\n\n\t\tif deadLetterErrorDescription, ok := amqpMsg.ApplicationProperties[\"DeadLetterErrorDescription\"]; ok {\n\t\t\tmsg.DeadLetterErrorDescription = to.Ptr(deadLetterErrorDescription.(string))\n\t\t}\n\n\t\tif deadLetterReason, ok := amqpMsg.ApplicationProperties[\"DeadLetterReason\"]; ok {\n\t\t\tmsg.DeadLetterReason = to.Ptr(deadLetterReason.(string))\n\t\t}\n\t}\n\n\tif amqpMsg.Annotations != nil {\n\t\tif lockedUntil, ok := amqpMsg.Annotations[lockedUntilAnnotation]; ok {\n\t\t\tt := lockedUntil.(time.Time)\n\t\t\tmsg.LockedUntil = &t\n\t\t}\n\n\t\tif sequenceNumber, ok := amqpMsg.Annotations[sequenceNumberAnnotation]; ok {\n\t\t\tmsg.SequenceNumber = to.Ptr(sequenceNumber.(int64))\n\t\t}\n\n\t\tif partitionKey, ok := amqpMsg.Annotations[partitionKeyAnnotation]; ok {\n\t\t\tmsg.PartitionKey = to.Ptr(partitionKey.(string))\n\t\t}\n\n\t\tif enqueuedTime, ok := amqpMsg.Annotations[enqueuedTimeAnnotation]; ok {\n\t\t\tt := enqueuedTime.(time.Time)\n\t\t\tmsg.EnqueuedTime = &t\n\t\t}\n\n\t\tif deadLetterSource, ok := amqpMsg.Annotations[deadLetterSourceAnnotation]; ok {\n\t\t\tmsg.DeadLetterSource = to.Ptr(deadLetterSource.(string))\n\t\t}\n\n\t\tif scheduledEnqueueTime, ok := amqpMsg.Annotations[scheduledEnqueuedTimeAnnotation]; ok {\n\t\t\tt := scheduledEnqueueTime.(time.Time)\n\t\t\tmsg.ScheduledEnqueueTime = &t\n\t\t}\n\n\t\tif enqueuedSequenceNumber, ok := amqpMsg.Annotations[enqueuedSequenceNumberAnnotation]; ok {\n\t\t\tmsg.EnqueuedSequenceNumber = to.Ptr(enqueuedSequenceNumber.(int64))\n\t\t}\n\n\t\tswitch asInt64(amqpMsg.Annotations[messageStateAnnotation], 0) {\n\t\tcase 1:\n\t\t\tmsg.State = MessageStateDeferred\n\t\tcase 2:\n\t\t\tmsg.State = MessageStateScheduled\n\t\tdefault:\n\t\t\tmsg.State = MessageStateActive\n\t\t}\n\n\t\t// TODO: annotation propagation is a thing. Currently these are only stored inside\n\t\t// of the underlying AMQP message, but not inside of the message itself.\n\n\t\t// If we didn't populate any system properties, set up the struct so we\n\t\t// can put the annotations in it\n\t\t// if msg.SystemProperties == nil {\n\t\t// \tmsg.SystemProperties = new(SystemProperties)\n\t\t// }\n\n\t\t// Take all string-keyed annotations because the protocol reserves all\n\t\t// numeric keys for itself and there are no numeric keys defined in the\n\t\t// protocol today:\n\t\t//\n\t\t//\thttp://www.amqp.org/sites/amqp.org/files/amqp.pdf (section 3.2.10)\n\t\t//\n\t\t// This approach is also consistent with the behavior of .NET:\n\t\t//\n\t\t//\thttps://docs.microsoft.com/en-us/dotnet/api/azure.messaging.eventhubs.eventdata.systemproperties?view=azure-dotnet#Azure_Messaging_EventHubs_EventData_SystemProperties\n\t\t// msg.SystemProperties.Annotations = make(map[string]any)\n\t\t// for key, val := range amqpMsg.Annotations {\n\t\t// \tif s, ok := key.(string); ok {\n\t\t// \t\tmsg.SystemProperties.Annotations[s] = val\n\t\t// \t}\n\t\t// }\n\t}\n\n\tif amqpMsg.DeliveryTag != nil && len(amqpMsg.DeliveryTag) > 0 {\n\t\tlockToken, err := lockTokenFromMessageTag(amqpMsg)\n\n\t\tif err == nil {\n\t\t\tmsg.LockToken = *(*amqp.UUID)(lockToken)\n\t\t} else {\n\t\t\tlog.Writef(EventReceiver, \"msg.DeliveryTag could not be converted into a UUID: %s\", err.Error())\n\t\t}\n\t}\n\n\tif token, ok := amqpMsg.DeliveryAnnotations[lockTokenDeliveryAnnotation]; ok {\n\t\tif id, ok := token.(amqp.UUID); ok {\n\t\t\tmsg.LockToken = [16]byte(id)\n\t\t}\n\t}\n\n\tif msg.EnqueuedTime != nil && msg.TimeToLive != nil {\n\t\texpiresAt := msg.EnqueuedTime.Add(*msg.TimeToLive)\n\t\tmsg.ExpiresAt = &expiresAt\n\t}\n\n\treturn msg\n}", "title": "" }, { "docid": "91f7926a059c53c079e76caa5a5515ae", "score": "0.45658836", "text": "func newMsg(opCode int16, receiver string, body string) *mirc.Message {\n\tmsg := mirc.NewMsg(opCode, receiver, body)\n\tmsg.Header.Sender = \"server\"\n\tmsg.Header.Timeout = timeout\n\treturn msg\n}", "title": "" }, { "docid": "1f923cbbeec607afddb57f9bf664d2f5", "score": "0.4520223", "text": "func New() Message {\n\treturn Message{\n\t\tMeta: Metadata{\n\t\t\tCreated: time.Now().UTC(),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "5b7a22e4f18cac5aa9df682fcdffc05a", "score": "0.45013192", "text": "func NewChatMessage()(*ChatMessage) {\n m := &ChatMessage{\n Entity: *NewEntity(),\n }\n return m\n}", "title": "" }, { "docid": "36fa10eb0fb2964bf306a4ea04d143ce", "score": "0.44943193", "text": "func NewMessage(user, channel, message string) *BotMessage {\n msg := &BotMessage {\n Channel: channel,\n User: user,\n Message: message,\n }\n return msg\n}", "title": "" }, { "docid": "eaebd39ad5f9ac383889bb1d41e6f349", "score": "0.44797197", "text": "func NewReceiver(client *admin.Client, updateChan chan<- interface{}) View {\n\tp := &Receiver{\n\t\tclient: client,\n\t\tupdateChan: updateChan,\n\t}\n\n\tp.view = newView()\n\tp.table = lcwidgets.NewTable()\n\tp.table.ColumnNames = []string{\"Remote\", \"Description\", \"Lines\", \"Pending\"}\n\n\treturn p\n}", "title": "" }, { "docid": "fbb067b5861e5c72eaf93c0b18852f31", "score": "0.4461975", "text": "func NewMessage(sz int) *Message {\n\tvar m *Message\n\tfor i := range messageCache {\n\t\tif sz <= messageCache[i].maxbody {\n\t\t\tm = messageCache[i].pool.Get().(*Message)\n\t\t\tbreak\n\t\t}\n\t}\n\tif m == nil {\n\t\tm = newMsg(sz)\n\t}\n\n\tm.Body = m.bbuf\n\tm.Header = m.hbuf\n\treturn m\n}", "title": "" }, { "docid": "c175ae6d186ecf0761c8ffa8b6b4f9ef", "score": "0.44535297", "text": "func New(msg string) E {\n\treturn create(msg, 4)\n}", "title": "" }, { "docid": "363e71293a734629c2ab4e15d850a639", "score": "0.44438425", "text": "func New(text string, opts ...Options) *Widget {\n\tvar opt Options\n\tif len(opts) > 0 {\n\t\topt = opts[0]\n\t}\n\tcontent := &ContentSegment{nil, text}\n\tholder := NewContent([]ContentSegment{*content})\n\treturn NewFromContentExt(holder, opt)\n}", "title": "" }, { "docid": "2411e240e0742bd2e378246920a753f4", "score": "0.4429459", "text": "func _NewEventQueueElement(event *MleEvent) (*_EventQueueElement) {\n\tp := new(_EventQueueElement)\n\tp.m_event = event\n\treturn p\n}", "title": "" }, { "docid": "5473edc06c4b8263dfd33987f0170741", "score": "0.44244495", "text": "func (s MessagesStickersNotModified) construct() MessagesStickersClass { return &s }", "title": "" }, { "docid": "691fa57fa44748d161e830f25cf82f15", "score": "0.44137093", "text": "func NewMessage(t string, d interface{}) Message {\n\treturn Message{\n\t\tID: id(),\n\t\tType: t,\n\t\tIData: d,\n\t}\n}", "title": "" }, { "docid": "bfd8551838274641ded71df9e90187be", "score": "0.44109693", "text": "func (op *OtherPublish) SetExpiration(expiration string) *OtherPublish {\n\top.Msg.Expiration = expiration\n\treturn op\n}", "title": "" }, { "docid": "7704b8a780f96e49aee871643ae3189c", "score": "0.44092202", "text": "func (r MessagesRecentStickersNotModified) construct() MessagesRecentStickersClass { return &r }", "title": "" }, { "docid": "553e1f4c6ed50b0fc4395752f03ed316", "score": "0.43999037", "text": "func createChatMessage(cli *Client, mess string) *ChatMessage {\n var chatMessage = ChatMessage{\n client: cli,\n message: mess,\n createdDate: time.Now(),\n }\n return &chatMessage;\n}", "title": "" }, { "docid": "553e1f4c6ed50b0fc4395752f03ed316", "score": "0.43999037", "text": "func createChatMessage(cli *Client, mess string) *ChatMessage {\n var chatMessage = ChatMessage{\n client: cli,\n message: mess,\n createdDate: time.Now(),\n }\n return &chatMessage;\n}", "title": "" }, { "docid": "b9c922aef2f9e2350aadb2b99d7b3044", "score": "0.4382983", "text": "func NewInvitation(email string) Invitation {\n invitation := Invitation{Email: email}\n return invitation\n}", "title": "" }, { "docid": "12723eb5684ea48c66402ad55735a1a2", "score": "0.43779364", "text": "func newPopupTemplateItem() *popupTemplateItem {\n\tret := new(popupTemplateItem)\n\tret.askewInit()\n\treturn ret\n}", "title": "" }, { "docid": "9eafaa137642e1158aa52c1595d88cc7", "score": "0.43738806", "text": "func NewReceiver() *Receiver {\n return NewReceiverWithBuffer(fbe.NewEmptyBuffer())\n}", "title": "" }, { "docid": "378692841b7faf0dddf3ad4a1442eb0f", "score": "0.43530214", "text": "func NewMessage(typ *MessageType) *Message {\n\treturn &Message{\n\t\ttyp: typ,\n\t\tfields: skylark.StringDict{},\n\t}\n}", "title": "" }, { "docid": "9be03a0dddeca4ad908daae1c3c591e3", "score": "0.4350969", "text": "func newMessage(s *discordgo.Session, m *discordgo.MessageCreate) {\n\n\t//State Messages -- don't notify when we're in the channel\n\tif m.ChannelID == State.Channel.ID && State.Enabled {\n\t\tState.AddMessage(m.Message)\n\n\t\tMessages := ReceivingMessageParser(m.Message)\n\n\t\tfor _, Msg := range Messages {\n\t\t\tMessagePrint(string(m.Timestamp), m.Author.Username, Msg)\n\t\t\t//log.Printf(\"> %s > %s\\n\", UserName(m.Author.Username), Msg)\n\t\t}\n\t\treturn\n\t}\n\n\t//Global Mentions\n\tMention := \"@\" + State.Session.User.Username\n\tif strings.Contains(m.ContentWithMentionsReplaced(), Mention) {\n\t\tgo Notify(m.Message)\n\t\treturn\n\t}\n\tDMs, err := Session.DiscordGo.UserChannels()\n\tif err != nil {\n\t\t// No DMs\n\t\treturn\n\t}\n\tfor _, channel := range DMs {\n\t\tif m.ChannelID == channel.ID {\n\t\t\tgo Notify(m.Message)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d3859da10cc23878f2cec836b7a0c9b5", "score": "0.4349203", "text": "func New() PushMessage {\n\treturn newMsg()\n}", "title": "" }, { "docid": "e66c94b47c14a59603c2a38aaddd0e2a", "score": "0.43260938", "text": "func (u UpdateNewScheduledMessage) construct() UpdateClass { return &u }", "title": "" }, { "docid": "42e7d3b23f96bb794e321fac4eb02e30", "score": "0.43233114", "text": "func NewMessage(payload string, headers map[string][]string) *Message {\n\treturn &Message{Payload: payload, Headers: headers, Time: time.Now()}\n}", "title": "" }, { "docid": "f61f7e0a3c2f634913b6e8f313e6ce5d", "score": "0.4322648", "text": "func newEmbedBox() *embedBox {\n\treturn &embedBox{storage: make(map[string][]byte)}\n}", "title": "" }, { "docid": "93a8e85b667ef6f49b1107f6150ef6cd", "score": "0.43172732", "text": "func New(clock v.VClock, b string, from string, to string) Msg {\n\treturn Msg{clock, b, from, to}\n}", "title": "" }, { "docid": "0a1a05cf1125cfdda6275009a20b6354", "score": "0.43136647", "text": "func newNotificiation(alert *dwh.Alert) *Notification {\n\tnotice := &Notification{\n\t\tFrom: \"Dead Man's Snitch\",\n\t\tFormat: \"text\",\n\t}\n\n\tsnitch := alert.Data.Snitch\n\n\t// Set colors and message based on the type of the alert\n\tswitch alert.Type {\n\tcase dwh.TypeSnitchReporting:\n\t\tnotice.Color = \"green\"\n\t\tnotice.Message = fmt.Sprintf(\"🎉 %s is reporting\", snitch.Name)\n\n\tcase dwh.TypeSnitchErrored:\n\t\tnotice.Color = \"red\"\n\t\tnotice.Message = fmt.Sprintf(\"🚨 %s has errored\", snitch.Name)\n\n\tcase dwh.TypeSnitchMissing:\n\t\tnotice.Color = \"yello\"\n\t\tnotice.Message = fmt.Sprintf(\"❓ %s is missing\", snitch.Name)\n\t}\n\n\t// TODO: Add tags\n\t// TODO: Add a link to the snitch\n\t// TODO: Add other stuff\n\n\treturn notice\n}", "title": "" }, { "docid": "0fb283657d90a29a2da41c5777aa91dd", "score": "0.43065885", "text": "func New(token string, appid string, secret string) *Weixin {\n\twx := &Weixin{}\n\twx.token = token\n\twx.appID = appid\n\twx.appSecret = secret\n\twx.refreshToken = 0\n\twx.encodingAESKey = []byte{}\n\tif len(appid) > 0 && len(secret) > 0 {\n\t\twx.tokenChan = make(chan AccessToken)\n\t\tgo wx.createAccessToken(wx.tokenChan, appid, secret)\n\t\twx.ticketChan = make(chan jsAPITicket)\n\t\tgo createJsAPITicket(wx.tokenChan, wx.ticketChan)\n\t}\n\treturn wx\n}", "title": "" }, { "docid": "80062c1f82c4fda34b7297f7a3a9691f", "score": "0.4305426", "text": "func newMessageExchangeSet(log Logger, name string) *messageExchangeSet {\n\treturn &messageExchangeSet{\n\t\tname: name,\n\t\tlog: log.WithFields(LogField{\"exchange\", name}),\n\t\texchanges: make(map[uint32]*messageExchange),\n\t\texpiredExchanges: make(map[uint32]struct{}),\n\t}\n}", "title": "" }, { "docid": "c6af205fe5b6d8d9d995024e68b6e792", "score": "0.43044314", "text": "func NewFromContentExt(content IContent, opts Options) *Widget {\n\tif opts.Align == nil {\n\t\topts.Align = gowid.HAlignLeft{}\n\t}\n\tres := &Widget{\n\t\ttext: content,\n\t\twrap: opts.Wrap,\n\t\talign: opts.Align,\n\t\topts: opts,\n\t\tCallbacks: gowid.NewCallbacks(),\n\t}\n\treturn res\n}", "title": "" }, { "docid": "41a8bfec0e03012362c8c705604e4f9b", "score": "0.42984858", "text": "func EventBoxNew() *EventBox {\n\tid := Candy().Guify(\"gtk_event_box_new\").String()\n\treturn NewEventBox(Candy(), id)\n}", "title": "" }, { "docid": "ecafd544f5198b993397d6afa6d21994", "score": "0.4292727", "text": "func (dao *GkvDB) NewSentEnvelopMessager(msg encoding.EnvelopMessager, receiver common.Address) {\n\techohash := utils.Sha3(msg.Pack(), receiver[:])\n\ttr := &models.SentEnvelopMessager{\n\t\tMessage: msg,\n\t\tReceiver: receiver,\n\t\tTime: time.Now(),\n\t\tEchoHash: echohash[:],\n\t}\n\tlog.Trace(fmt.Sprintf(\"NewSentEnvelopMessager EchoHash=%s\", utils.BPex(tr.EchoHash)))\n\terr := dao.saveKeyValueToBucket(models.BucketEnvelopMessager, tr.EchoHash, tr)\n\tif err != nil {\n\t\tlog.Error(fmt.Sprintf(\"NewSentEnvelopMessager err=%s\", err))\n\t}\n}", "title": "" }, { "docid": "1ca1ac58510ef17d4dc78078d15c5686", "score": "0.42902935", "text": "func newRegularMessage(payload []byte) *ab.KafkaMessage {\n\treturn &ab.KafkaMessage{\n\t\tType: &ab.KafkaMessage_Regular{\n\t\t\tRegular: &ab.KafkaMessageRegular{\n\t\t\t\tPayload: payload,\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "55f42d434c8f64d8728c5085d82aed42", "score": "0.42815077", "text": "func NewMessage(message string) Notification {\n\tvar title string\n\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\ttitle = \"Notigo\"\n\t} else {\n\t\ttitle = hostname\n\t}\n\n\treturn Notification{\n\t\tTitle: title,\n\t\tMessage: message,\n\t}\n}", "title": "" }, { "docid": "7da04614b5b26036deb6145f638f62c1", "score": "0.427971", "text": "func newTicketMutation(c config, op Op, opts ...ticketOption) *TicketMutation {\n\tm := &TicketMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeTicket,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "b46e6b6a26c1ca5794d4c1976ca0e385", "score": "0.4274012", "text": "func (mex *messageExchange) inboundExpired() {\n\tmex.mexset.expireExchange(mex.msgID)\n}", "title": "" }, { "docid": "0a66c9fce12f2f27748c426ca2cba577", "score": "0.42662174", "text": "func New(linesoftext int, text string) *Message {\n\tvar m Message\n\tm.SetLinesOfText(linesoftext)\n\tm.SetText(text)\n\treturn &m\n}", "title": "" }, { "docid": "9cda26b5b45fd082055867a6294f402b", "score": "0.4264366", "text": "func MaterialEmailInputWidget(attrs map[string]string) Widget {\n\tw := new(materialEmailInputWidget)\n\tw.Type = \"email\"\n\tif attrs == nil {\n\t\tattrs = map[string]string{}\n\t}\n\tw.Attrs = attrs\n\treturn w\n}", "title": "" }, { "docid": "7dc768abba59971e9e28512aeb14428c", "score": "0.4261132", "text": "func WithExpiration(timeExpr int) SendOption {\n\treturn func(h http.Header) {\n\t\th.Set(\"apns-expiration\", strconv.Itoa(timeExpr))\n\t}\n}", "title": "" }, { "docid": "7dc768abba59971e9e28512aeb14428c", "score": "0.4261132", "text": "func WithExpiration(timeExpr int) SendOption {\n\treturn func(h http.Header) {\n\t\th.Set(\"apns-expiration\", strconv.Itoa(timeExpr))\n\t}\n}", "title": "" }, { "docid": "b476eea7b40b610aa5e45f690430c099", "score": "0.4258177", "text": "func NewKvmsg(sequence int64) (kvmsg *Kvmsg) {\n\tkvmsg = &Kvmsg{\n\t\tpresent: make([]bool, kvmsg_FRAMES),\n\t\tframe: make([]string, kvmsg_FRAMES),\n\t}\n\tkvmsg.SetSequence(sequence)\n\treturn\n}", "title": "" }, { "docid": "2d4a3f1a32306a2b18ca97e9fafaaa0e", "score": "0.4257574", "text": "func NewMailBox(r Receiver) MailBox {\n\tbox := MailBox(make(chan Mail, 10))\n\tgo func() {\n\t\tfor {\n\t\t\tmail, ok := <-box\n\t\t\tif !ok {\n\t\t\t\treturn\n\t\t\t}\n\t\t\terr := r.Receive(mail.Msg, mail.From)\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"error while processing %v: %v\",\n\t\t\t\t\tmail.Msg.Header, err)\n\t\t\t}\n\t\t}\n\t}()\n\treturn box\n}", "title": "" }, { "docid": "5a8c2509e33523ee61dadc8ef33c3b8f", "score": "0.42501572", "text": "func NewCalendarSharingMessageAction()(*CalendarSharingMessageAction) {\n m := &CalendarSharingMessageAction{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "title": "" }, { "docid": "9663c9aeb4e419739001d4c620b2b9c8", "score": "0.4249194", "text": "func newPopupText(caption string, cb func()) *popupText {\n\tret := new(popupText)\n\tret.askewInit(caption, cb)\n\treturn ret\n}", "title": "" }, { "docid": "349af41da69ff5439298b43fc1c48557", "score": "0.42474082", "text": "func NewMail(e *db.QueueEntry, from string) *Mail {\n return &Mail{\n QueueEntry: e,\n From: from,\n headers: map[string]string{\n \"Content-Type\": \"text/plain; charset=UTF-8\",\n \"Date\": time.Now().Format(time.RFC1123Z),\n \"From\": from,\n \"To\": e.Email,\n \"Subject\": \"[\" + e.FeedTitle + \"] \" + e.Title,\n },\n }\n}", "title": "" }, { "docid": "25624e318c95d825b5b491be4d60ccbc", "score": "0.42441052", "text": "func TestNewKeyObjectExpired(t *testing.T) {\n\tdt := time.Now().Add(time.Second * -10)\n\tk := NewKeyObject(\"test\", dt.Unix()*1000)\n\n\tequals(t, \"test\", k.Key)\n\tequals(t, false, k.ExpiryTime.IsZero())\n\tequals(t, true, k.Expired())\n}", "title": "" }, { "docid": "10d01b43e985e1a4efb2008da845e94c", "score": "0.42378956", "text": "func newMessageBuffer() *messageBuffer {\n\treturn &messageBuffer{\n\t\tbuffer: ring.NewBuffer(maximumMessageSize),\n\t\tvarint64Buffer: make([]byte, binary.MaxVarintLen64),\n\t}\n}", "title": "" }, { "docid": "581648fa135cc5e2dc4ae643e41b1a1d", "score": "0.42367235", "text": "func newPopupInput(label string, cb func(input string)) *popupInput {\n\tret := new(popupInput)\n\tret.askewInit(label, cb)\n\treturn ret\n}", "title": "" }, { "docid": "57cbed828ff3cd8cc1d8292e7e3dd3b6", "score": "0.4234653", "text": "func NewMessage(content []byte, origin *Origin, status string) *Message {\n\treturn &Message{\n\t\tContent: content,\n\t\tOrigin: origin,\n\t\tstatus: status,\n\t}\n}", "title": "" }, { "docid": "f10df174ee802954e6458f785531802c", "score": "0.4223743", "text": "func newEditor(ui *UI, handler gocui.Editor) *editor {\n\tif handler == nil {\n\t\thandler = gocui.DefaultEditor\n\t}\n\treturn &editor{ui, handler, true}\n}", "title": "" }, { "docid": "bb3ce2db170e5079bfbee204995b166e", "score": "0.4222525", "text": "func newChatSummaryTiny(vres *chatterviews.ChatSummaryView) *ChatSummary {\n\tres := &ChatSummary{}\n\tif vres.Message != nil {\n\t\tres.Message = *vres.Message\n\t}\n\treturn res\n}", "title": "" }, { "docid": "916a79e1e7ad80507a82e58df1cab93c", "score": "0.42173436", "text": "func NewTelecomExpenseManagementPartner()(*TelecomExpenseManagementPartner) {\n m := &TelecomExpenseManagementPartner{\n Entity: *NewEntity(),\n }\n return m\n}", "title": "" }, { "docid": "b442ddecd51e5184989db06271f23a81", "score": "0.42141637", "text": "func NewServiceUpdateMessageViewpoint()(*ServiceUpdateMessageViewpoint) {\n m := &ServiceUpdateMessageViewpoint{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "title": "" }, { "docid": "c570328a4736acfcbc00567c9354a9f8", "score": "0.42092812", "text": "func NewGiveaway(session *discordgo.Session, creator *discordgo.User, channel *discordgo.Channel, winnerCount int, content, winMessage string, timeout time.Duration, emote string) (*Giveaway, error) {\r\n\r\n\tvar giveaway *Giveaway\r\n\t\r\n\texpires := time.Now().Add(timeout).Format(time.RFC1123)\r\n\r\n\tembed := &discordgo.MessageEmbed{\r\n\t\tTitle: \t\tLang.Classes.Giveaway.ActiveMessage.Title,\r\n\t\tDescription:\tcontent + \"\\n\\n\" + Lang.Classes.Giveaway.ActiveMessage.ParticipateInfo,\r\n\t\tColor: \t\t\tCOLOR_MAIN,\r\n\t\tFooter: &discordgo.MessageEmbedFooter{\r\n\t\t\tText: \t\tfmt.Sprintf(Lang.Classes.Giveaway.ActiveMessage.Expires, expires),\r\n\t\t},\r\n\t\tAuthor: &discordgo.MessageEmbedAuthor{\r\n\t\t\tName:\t\tcreator.Username,\r\n\t\t\tIconURL:\tfmt.Sprintf(\"https://cdn.discordapp.com/avatars/%s/%s.png\", creator.ID, creator.Avatar),\r\n\t\t},\r\n\t}\r\n\r\n\tmessage, err := session.ChannelMessageSendEmbed(channel.ID, embed)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\tsession.MessageReactionAdd(channel.ID, message.ID, emote)\r\n\r\n\ttimer := time.NewTimer(timeout)\r\n\tgo func() {\r\n\t\t<-timer.C\r\n\t\tgiveaway.Close(false)\r\n\t}()\r\n\r\n\tremover := session.AddHandler(func(s *discordgo.Session, e *discordgo.MessageReactionAdd) {\r\n\t\tif e.MessageID != giveaway.UID || e.UserID == session.State.User.ID {\r\n\t\t\treturn\r\n\t\t}\r\n\t\tif e.Emoji.Name != emote {\r\n\t\t\tsession.MessageReactionRemove(giveaway.Channel.ID, giveaway.UID, e.Emoji.Name, e.UserID)\r\n\t\t\treturn\r\n\t\t}\r\n\t\tif _, ok := giveaway.Participants[e.UserID]; ok {\r\n\t\t\tpchan, err := session.UserChannelCreate(e.UserID)\r\n\t\t\tif err == nil {\r\n\t\t\t\tSendEmbedError(session, pchan.ID, Lang.Classes.Giveaway.Notifications.MultiParticipation)\r\n\t\t\t\tsession.MessageReactionRemove(giveaway.Channel.ID, giveaway.UID, e.Emoji.Name, e.UserID)\r\n\t\t\t}\r\n\t\t\treturn\r\n\t\t}\r\n\t\tgiveaway.Participants[e.UserID], err = session.User(e.UserID)\r\n\t\tgiveaway.ParticipantsNumber++\r\n\t\tif err == nil {\r\n\t\t\tpchan, err := session.UserChannelCreate(e.UserID)\r\n\t\t\tif err == nil {\r\n\t\t\t\tSendEmbed(session, pchan.ID, Lang.Classes.Giveaway.Notifications.Participated)\r\n\t\t\t}\r\n\t\t}\r\n\t\tsession.MessageReactionRemove(giveaway.Channel.ID, giveaway.UID, e.Emoji.Name, e.UserID)\r\n\t})\r\n\r\n\tguild, err := session.Guild(channel.GuildID)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tgiveaway = &Giveaway{\r\n\t\tUID:\t\t \t message.ID,\r\n\t\tSession:\t\t\tsession,\r\n\t\tCreator: \t creator,\r\n\t\tMessage: \t message,\r\n\t\tChannel: \t channel,\r\n\t\tGuild:\t\t\t\tguild,\r\n\t\tContent: \t content,\r\n\t\tWinnerCount: \t winnerCount,\r\n\t\tWinMessage: \t winMessage,\r\n\t\tTimeout:\t \t timeout,\r\n\t\tExpires:\t\t\ttime.Now().Add(timeout),\r\n\t\tTimer:\t\t \t timer,\r\n\t\tHandlerRemover: remover,\r\n\t\tParticipants: \t map[string]*discordgo.User{},\r\n\t\tParticipantsNumber: 0,\r\n\t}\r\n\r\n\treturn giveaway, nil\r\n}", "title": "" }, { "docid": "09a886fcfbdb36fc2fa7d4a60c15d136", "score": "0.4208382", "text": "func (m *Message) Expired() bool {\n return m.ExpiresAt.Before(time.Now().UTC())\n}", "title": "" }, { "docid": "ce1cc7449e096294368a5d3dd7313d14", "score": "0.42014354", "text": "func newEmail(msgFields imap.FieldMap) (Email, error) {\n\t// parse the header\n\tvar message bytes.Buffer\n\n\tmessage.Write(imap.AsBytes(msgFields[\"RFC822.HEADER\"]))\n\tmessage.Write([]byte(\"\\n\\n\"))\n\trawBody := imap.AsBytes(msgFields[\"BODY[]\"])\n\tmessage.Write(rawBody)\n\n\tmsg, err := mail.ReadMessage(&message)\n\tif err != nil {\n\t\treturn Email{}, fmt.Errorf(\"unable to read header: %s\", err)\n\t}\n\n\temail := Email{\n\t\tID: msgFields[\"UID\"],\n\t\tMessage: msg,\n\t}\n\n\treturn email, nil\n}", "title": "" }, { "docid": "67cf9e9969229a385895a67a124ffa6c", "score": "0.4201233", "text": "func (r MessagesRecentStickers) construct() MessagesRecentStickersClass { return &r }", "title": "" }, { "docid": "50f1efcfa02e8e0deec58b19c71c838e", "score": "0.4196146", "text": "func New(src string, msg string) string {\n\tnew_msg := &Message{}\n\tnew_msg.Source = src\n\tnew_msg.Content = msg\n\n\treturn new_msg.encrypt()\n}", "title": "" }, { "docid": "6f3387a0477bebeff3eccb2f0813c7e0", "score": "0.41955742", "text": "func (self *EventList) newEvent(s *discordgo.Session, m *discordgo.MessageCreate, args string) error {\n const DISCORD_CODE_ENCLOSURE string = \"```\"\n\n /* find toml string */\n event_info := args\n event_str_start := strings.Index(event_info, DISCORD_CODE_ENCLOSURE)\n if event_str_start == -1 {\n return &command.CommandError { Reason: \"Could not find start of ```\" }\n }\n event_info = event_info[event_str_start + len(DISCORD_CODE_ENCLOSURE):]\n\n event_str_end := strings.Index(event_info, DISCORD_CODE_ENCLOSURE)\n if event_str_end == -1 {\n return &command.CommandError { Reason: \"Could not find end of ```\" }\n }\n event_info = event_info[:event_str_end]\n\n /* parse toml string */\n var eventToml EventToml\n if err := toml.Unmarshal([]byte(event_info), &eventToml); err != nil {\n return err\n }\n\n /* convert toml to event, add it to list of events and send a message */\n event := eventToml.toEvent()\n id := self.AddEvent(event)\n\n embed := event.ToDiscordEmbedWithID(id)\n\n s.ChannelMessageSend(m.ChannelID, \"New event has been added\")\n s.ChannelMessageSendEmbed(m.ChannelID, embed)\n/*\n s.MessageReactionAdd(msg.ChannelID, msg.ID, \"\\u2705\")\n s.MessageReactionAdd(msg.ChannelID, msg.ID, \"\\u274E\")\n*/\n return nil\n}", "title": "" }, { "docid": "4372a976ffcd21e9649a8935a6c07f8e", "score": "0.41932032", "text": "func NewMessages() *Messages {\n\treturn &Messages{\n\t\tmessages: make(map[string]string),\n\t\tlock: &sync.Mutex{},\n\t}\n}", "title": "" }, { "docid": "9b14232adb7a713bd19c1bb72284ba99", "score": "0.41927776", "text": "func New(confirmid string, tradedate string, transacttime time.Time, affirmstatus int) *Message {\n\tvar m Message\n\tm.SetConfirmID(confirmid)\n\tm.SetTradeDate(tradedate)\n\tm.SetTransactTime(transacttime)\n\tm.SetAffirmStatus(affirmstatus)\n\treturn &m\n}", "title": "" }, { "docid": "57a9388ff9502a0fc463c69712fe40a0", "score": "0.4192694", "text": "func New(summary, body string) *Notification {\n\tnoti := Notification{}\n\tnoti.summary = summary\n\tnoti.body = body\n\tnoti.urgency = UrgencyNormal\n\tnoti.timeout = ExpiresDefault\n\tnoti.hints = make(map[string]dbus.Variant, 1)\n\treturn &noti\n}", "title": "" }, { "docid": "8ab84b97287e2f5ddbd6859a86dddd47", "score": "0.4184501", "text": "func NewMessage(msg string) (m Message) {\n\tif len(msg) < 2 {\n\t\treturn\n\t}\n\n\tm.Type, m.ID = msg[0], msg[1:]\n\tif m.Type == TypeITunesID || m.Type == TypeBundleID || m.Type == TypeKeywords {\n\t\treturn\n\t} else {\n\t\tm.Type = TypeBundleID\n\t\tm.ID = msg\n\t}\n\treturn\n}", "title": "" }, { "docid": "0c8eea9d72a084ae2f645167b91362d2", "score": "0.41830984", "text": "func NewTimeCardBreak()(*TimeCardBreak) {\n m := &TimeCardBreak{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "title": "" }, { "docid": "ddc22a7375a10b1fefaa9da7f9039164", "score": "0.41755936", "text": "func newWeaponFireMessage(ps net.PlayerSession, ms net.MatchSession) *WeaponFireMessage {\n\treturn &WeaponFireMessage{\n\t\tMessageID: WeaponFireMessageID,\n\t\tPlayerID: ps.ID,\n\t\tMatch: ms.ID,\n\t\tToken: ms.Token,\n\t}\n}", "title": "" }, { "docid": "630c855d35856a502f63447c20896dec", "score": "0.41752306", "text": "func (app *elementBuilder) Now() (Element, error) {\n\tif app.rule == nil {\n\t\treturn nil, errors.New(\"the Rule is mandatory in order to build a Element instance\")\n\t}\n\n\tif app.code == \"\" {\n\t\treturn nil, errors.New(\"the code is mandatory in order to build a Element instance\")\n\t}\n\n\treturn createElement(app.rule, app.code), nil\n}", "title": "" }, { "docid": "805598b75102087da5b0e7a18f788816", "score": "0.41735852", "text": "func NewMsgRevoke(acc sdk.AccAddress, ucoins sdk.Int) MsgRevoke {\n\treturn MsgRevoke{\n\t\tAcc: acc,\n\t\tMicroCoins: ucoins,\n\t}\n}", "title": "" }, { "docid": "812008aac93d9c8b79125c28691ad97c", "score": "0.4167515", "text": "func NewMessage(im []byte) *Message {\n\treturn &Message{\n\t\tts: time.Now().UnixNano(),\n\t\tim: im,\n\t}\n}", "title": "" }, { "docid": "4c1256f02b1e195d60c65896235b1669", "score": "0.41674137", "text": "func NewRequestExpiry() *requestExpiry {\n\treturn &requestExpiry{\n\t\treqTime: time.Now(),\n\t}\n}", "title": "" }, { "docid": "7f6720b060222ece7bf279aa3fc73eaa", "score": "0.41633135", "text": "func NewChat()(*Chat) {\n m := &Chat{\n Entity: *NewEntity(),\n }\n return m\n}", "title": "" }, { "docid": "f6259b0332b56e0936049e9bbbf06f3f", "score": "0.41574603", "text": "func NewMessage(object types.Object) *Message {\n\n\tstrct := toStruct(object)\n\n\tif strct == nil {\n\t\treturn nil\n\t}\n\n\tmsg := Message{\n\t\tTypeName: baseTypeName(object),\n\t}\n\n\torder := 0\n\tfor i := 0; i < strct.NumFields(); i++ {\n\t\tgoField := strct.Field(i)\n\t\tif !goField.Exported() {\n\t\t\tcontinue\n\t\t}\n\t\torder++\n\t\tmsg.Fields = append(msg.Fields, NewField(goField, order, strct.Tag(i)))\n\t}\n\n\treturn &msg\n}", "title": "" }, { "docid": "b3b22b38ef696f8728b927e71377525e", "score": "0.41559306", "text": "func (c *CGI) PrintNewElementForm() {\n\tconst titleLimit = 30 //Charactors\n\n\tif !c.IsAdmin() && !c.IsFriend() {\n\t\treturn\n\t}\n\ts := struct {\n\t\tDatfile string\n\t\tTitleLimit int\n\t\tDefaults\n\t}{\n\t\t\"\",\n\t\ttitleLimit,\n\t\t*c.Defaults(),\n\t}\n\tRenderTemplate(\"new_element_form\", s, c.WR)\n}", "title": "" }, { "docid": "5312a8e2b812f51c8e64b11e8a218f2c", "score": "0.41517705", "text": "func NewMessage(typ *MessageType) *Message {\n\treturn &Message{\n\t\ttyp: typ,\n\t\tfields: starlark.StringDict{},\n\t}\n}", "title": "" }, { "docid": "8aee1eee4cb826ab0d51950b309d1984", "score": "0.41492796", "text": "func newButton(ui *PicoUi, text string, classAttributes []string, icon string, onClick clickHandler) *Button {\n\tid := \"button_\" + createId()\n\tbutton := Button{ui: ui, id: id, onClickHandler: onClick}\n\n\tmsg := Message{Cmd: \"addbutton\"}\n\tattributes := make(map[string]interface{})\n\tattributes[\"eid\"] = id\n\tattributes[\"txt\"] = text\n\tif classAttributes != nil {\n\t\tattributes[\"classAttr\"] = classAttributes\n\t}\n\tattributes[\"icon\"] = icon\n\tmsg.Attributes = attributes\n\tui.handlers.enqueue(msg)\n\n\treturn &button\n}", "title": "" }, { "docid": "7dfd48b67d7fb587d604721155d091ff", "score": "0.41477147", "text": "func NewExpirationHeap() *ExpirationHeap {\n\th := &ExpirationHeap{\n\t\tNotifyCh: make(chan struct{}),\n\t}\n\theap.Init(h)\n\treturn h\n}", "title": "" }, { "docid": "c5efa6afda10441b45bbed82654408c6", "score": "0.4147619", "text": "func (m *Message) Expired() bool {\n\treturn time.Now().UnixNano() > m.Expire\n}", "title": "" }, { "docid": "5979ef1a0edb8a1756ef5d64772c060b", "score": "0.4147264", "text": "func (s MessagesStickers) construct() MessagesStickersClass { return &s }", "title": "" }, { "docid": "e668d131eed22e595347fc32c9c7644c", "score": "0.4146056", "text": "func New() *X25 {\n\tx := &X25{}\n\tx.Reset()\n\treturn x\n}", "title": "" }, { "docid": "db41117bc447b54b16be8d14aa0f38f6", "score": "0.41403583", "text": "func NewMsgFulfillTrade(TradeID string, sender string, itemIDs []string) MsgFulfillTrade {\n\treturn MsgFulfillTrade{\n\t\tTradeID: TradeID,\n\t\tSender: sender,\n\t\tItemIDs: itemIDs,\n\t}\n}", "title": "" }, { "docid": "8934e4ec2bba4455ec80ae63f85358f4", "score": "0.41298702", "text": "func newDownloadBuffer(expire, tick time.Duration) *downloadBuffer {\n\tbuf := &downloadBuffer{\n\t\tbuffer: make(map[gfs.DataBufferID]downloadItem),\n\t\texpire: expire,\n\t\ttick: tick,\n\t}\n\n\t// cleanup\n\tgo func() {\n\t\tticker := time.Tick(tick)\n\t\tfor {\n\t\t\t<-ticker\n\t\t\tnow := time.Now()\n\t\t\tbuf.Lock()\n\t\t\tfor id, item := range buf.buffer {\n\t\t\t\tif item.expire.Before(now) {\n\t\t\t\t\tdelete(buf.buffer, id)\n\t\t\t\t}\n\t\t\t}\n\t\t\tbuf.Unlock()\n\t\t}\n\t}()\n\n\treturn buf\n}", "title": "" }, { "docid": "abeeb7d5475cee38e324f38f04a186d1", "score": "0.41278842", "text": "func newAlarm(cancel func()) *alarm {\n\treturn &alarm{\n\t\tcancel: cancel,\n\t\tc: make(chan time.Duration, 1),\n\t}\n}", "title": "" }, { "docid": "a0d2f2b94c4a8b02525a2756e8ec1fba", "score": "0.4124008", "text": "func (conn *EvenHubConn) ExpireNow() {\n}", "title": "" }, { "docid": "3b8488f88fcc7d473ec2a7f1a3c4bde7", "score": "0.41155288", "text": "func NewMessage(course uint16) interface{} {\n\treturn message{course: course}\n}", "title": "" } ]
1434724f79274b8b4de4290f75e20562
ImportMappingRulesOperation returns a new ImportMappingRulesOperation from a given name. The name must be that of a previously created ImportMappingRulesOperation, possibly from a different process.
[ { "docid": "32dcb26b63a40d8aba8773b3a24f5b3a", "score": "0.7080822", "text": "func (c *DataMigrationClient) ImportMappingRulesOperation(name string) *ImportMappingRulesOperation {\n\treturn c.internalClient.ImportMappingRulesOperation(name)\n}", "title": "" } ]
[ { "docid": "9bb64b9fb1449035baca2dc725b78bf2", "score": "0.74191844", "text": "func (c *dataMigrationGRPCClient) ImportMappingRulesOperation(name string) *ImportMappingRulesOperation {\n\treturn &ImportMappingRulesOperation{\n\t\tlro: longrunning.InternalNewOperation(*c.LROClient, &longrunningpb.Operation{Name: name}),\n\t}\n}", "title": "" }, { "docid": "34ba5fe354e433277bd5a3cd90396fec", "score": "0.56635183", "text": "func (c *DataMigrationClient) ImportMappingRules(ctx context.Context, req *clouddmspb.ImportMappingRulesRequest, opts ...gax.CallOption) (*ImportMappingRulesOperation, error) {\n\treturn c.internalClient.ImportMappingRules(ctx, req, opts...)\n}", "title": "" }, { "docid": "0bfd58e40baf5b72ed46ee249553e74d", "score": "0.55877787", "text": "func (op *ImportMappingRulesOperation) Name() string {\n\treturn op.lro.Name()\n}", "title": "" }, { "docid": "a29ac869ad568e53191e98ad228f624d", "score": "0.4810961", "text": "func NewImport(alias, name, path string) *Import {\n\treturn &Import{\n\t\talias: alias,\n\t\tname: name,\n\t\tpath: path,\n\t\tused: false,\n\t}\n}", "title": "" }, { "docid": "b99a1cebcf73075a003be0fd51724005", "score": "0.47332317", "text": "func NewImport(name string) *Import {\n\treturn &Import{name: name}\n}", "title": "" }, { "docid": "d5edd237bdeb49d6a43a663cc7c09659", "score": "0.4564624", "text": "func (a *PoliciesApiService) ImportPolicy(ctx _context.Context) ApiImportPolicyRequest {\n\treturn ApiImportPolicyRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "5bb9f80920cba45776b842eaca590425", "score": "0.45599434", "text": "func NewImport(name, path string) *ImportSpec {\n\treturn &ImportSpec{Name: name, Path: path}\n}", "title": "" }, { "docid": "4420b8cee2454bdbd0a97ae92cd3288d", "score": "0.45167053", "text": "func (op *ImportMappingRulesOperation) Poll(ctx context.Context, opts ...gax.CallOption) (*clouddmspb.ConversionWorkspace, error) {\n\tvar resp clouddmspb.ConversionWorkspace\n\tif err := op.lro.Poll(ctx, &resp, opts...); err != nil {\n\t\treturn nil, err\n\t}\n\tif !op.Done() {\n\t\treturn nil, nil\n\t}\n\treturn &resp, nil\n}", "title": "" }, { "docid": "4170eb838e7afb1d8ec8b1c61d9280d7", "score": "0.43170166", "text": "func (o *OktaService) GetOktaImportRule(ctx context.Context, name string) (types.OktaImportRule, error) {\n\treturn o.importRuleSvc.GetResource(ctx, name)\n}", "title": "" }, { "docid": "3a429306ba50ace9b831687200040756", "score": "0.4292877", "text": "func importRules(url *url.URL, roundTripper http.RoundTripper, start, end, outputDir string, evalInterval, maxBlockDuration time.Duration, files ...string) error {\n\tctx := context.Background()\n\tvar stime, etime time.Time\n\tvar err error\n\tif end == \"\" {\n\t\tetime = time.Now().UTC().Add(-3 * time.Hour)\n\t} else {\n\t\tetime, err = parseTime(end)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error parsing end time: %w\", err)\n\t\t}\n\t}\n\n\tstime, err = parseTime(start)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error parsing start time: %w\", err)\n\t}\n\n\tif !stime.Before(etime) {\n\t\treturn errors.New(\"start time is not before end time\")\n\t}\n\n\tcfg := ruleImporterConfig{\n\t\toutputDir: outputDir,\n\t\tstart: stime,\n\t\tend: etime,\n\t\tevalInterval: evalInterval,\n\t\tmaxBlockDuration: maxBlockDuration,\n\t}\n\tclient, err := api.NewClient(api.Config{\n\t\tAddress: url.String(),\n\t\tRoundTripper: roundTripper,\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"new api client error: %w\", err)\n\t}\n\n\truleImporter := newRuleImporter(log.NewLogfmtLogger(log.NewSyncWriter(os.Stderr)), cfg, v1.NewAPI(client))\n\terrs := ruleImporter.loadGroups(ctx, files)\n\tfor _, err := range errs {\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"rule importer parse error: %w\", err)\n\t\t}\n\t}\n\n\terrs = ruleImporter.importAll(ctx)\n\tfor _, err := range errs {\n\t\tfmt.Fprintln(os.Stderr, \"rule importer error:\", err)\n\t}\n\tif len(errs) > 0 {\n\t\treturn errors.New(\"error importing rules\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b9feac3a267147e9c348837a19ac4b09", "score": "0.4266779", "text": "func (r *ProjectsLocationsEntryGroupsEntriesService) Import(parent string, googleclouddatacatalogv1importentriesrequest *GoogleCloudDatacatalogV1ImportEntriesRequest) *ProjectsLocationsEntryGroupsEntriesImportCall {\n\tc := &ProjectsLocationsEntryGroupsEntriesImportCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.parent = parent\n\tc.googleclouddatacatalogv1importentriesrequest = googleclouddatacatalogv1importentriesrequest\n\treturn c\n}", "title": "" }, { "docid": "9795d28f05b75e201207d2dc49872717", "score": "0.4197549", "text": "func (c *dataMigrationGRPCClient) ApplyConversionWorkspaceOperation(name string) *ApplyConversionWorkspaceOperation {\n\treturn &ApplyConversionWorkspaceOperation{\n\t\tlro: longrunning.InternalNewOperation(*c.LROClient, &longrunningpb.Operation{Name: name}),\n\t}\n}", "title": "" }, { "docid": "05421a4a9a16475c0480ec3c40a54184", "score": "0.4135819", "text": "func (op *ImportMappingRulesOperation) Wait(ctx context.Context, opts ...gax.CallOption) (*clouddmspb.ConversionWorkspace, error) {\n\tvar resp clouddmspb.ConversionWorkspace\n\tif err := op.lro.WaitWithInterval(ctx, &resp, time.Minute, opts...); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resp, nil\n}", "title": "" }, { "docid": "11d285e81afe3f4d30b22465b5875f74", "score": "0.41301826", "text": "func FromName(name string, storage persistance.Storage) (Reducer, error) {\n\tswitch name {\n\tcase \"sum\":\n\t\treturn NewSum(storage), nil\n\tcase \"avg\":\n\t\treturn NewAvg(storage), nil\n\tcase \"min\":\n\t\treturn NewMin(storage), nil\n\tcase \"max\":\n\t\treturn NewMax(storage), nil\n\tdefault:\n\t\treturn nil, ErrUnsupportedReducerName\n\t}\n}", "title": "" }, { "docid": "07ed169fc1d4fab3fb9f757429ee9a04", "score": "0.41158798", "text": "func NewRule(name string) model.MutableRule {\n\trule := ruleImpl{}\n\trule.initRuleImpl(name)\n\treturn &rule\n}", "title": "" }, { "docid": "415a4f920b24ba38ec432a524e6d7e6b", "score": "0.4098196", "text": "func (o *OktaService) CreateOktaImportRule(ctx context.Context, importRule types.OktaImportRule) (types.OktaImportRule, error) {\n\tif err := validateOktaImportRuleRegexes(importRule); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\treturn importRule, o.importRuleSvc.CreateResource(ctx, importRule)\n}", "title": "" }, { "docid": "1c1ce79870873764564793f5a23fc979", "score": "0.4080618", "text": "func (op *ImportMappingRulesOperation) Metadata() (*clouddmspb.OperationMetadata, error) {\n\tvar meta clouddmspb.OperationMetadata\n\tif err := op.lro.Metadata(&meta); err == longrunning.ErrNoMetadata {\n\t\treturn nil, nil\n\t} else if err != nil {\n\t\treturn nil, err\n\t}\n\treturn &meta, nil\n}", "title": "" }, { "docid": "0c2696fa8d36aae6fcb7e1ad14bde356", "score": "0.40669814", "text": "func Get(name string) NewFunc {\n\trule, ok := Rules[name]\n\tif ok {\n\t\treturn New(rule)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4b80fc915a6c047a933b2deea69440b2", "score": "0.40298605", "text": "func (c *DataMigrationClient) ApplyConversionWorkspaceOperation(name string) *ApplyConversionWorkspaceOperation {\n\treturn c.internalClient.ApplyConversionWorkspaceOperation(name)\n}", "title": "" }, { "docid": "fda134dbebbf0b8ad0c7db7038b81570", "score": "0.4016186", "text": "func Init(name string, opts config.Config) (Rule, error) {\n\tif !Exists(name) {\n\t\treturn nil, ErrRuleNotFound\n\t}\n\treturn NewWithConfig(Rules[name], opts)\n}", "title": "" }, { "docid": "cefa42b9262e6d02a661056544760c3d", "score": "0.39879593", "text": "func (rim *RollingIndexMap) Import(other *RollingIndexMap) {\n\tfor _, key := range other.keys {\n\t\trim.mapping[key] = NewRollingIndex(fmt.Sprintf(\"%s[%d]\", rim.name, key), rim.size)\n\t\trim.mapping[key].lastIndex = other.mapping[key].lastIndex\n\t\trim.mapping[key].items = other.mapping[key].items\n\t\t// copy(rim.mapping[key].items[:len(other.mapping[key].items)], other.mapping[key].items)\n\t}\n}", "title": "" }, { "docid": "d5f3a2958de16d69e5ab0b73091e2476", "score": "0.39847028", "text": "func NewMappingRule(name string, registry string, repository string, image ImageRef) *MappingRule {\n\tthis := MappingRule{}\n\tthis.Name = name\n\tthis.Registry = registry\n\tthis.Repository = repository\n\tthis.Image = image\n\treturn &this\n}", "title": "" }, { "docid": "a100935c63d47a7cba7eff1edfaa6913", "score": "0.39708346", "text": "func NewInput(name string) *Input", "title": "" }, { "docid": "81da2ff8bc9cfc0a156e6a58aa0a41cb", "score": "0.3958825", "text": "func Import(ctx context.Context, db gorp.SqlExecutor, store cache.Store, proj *sdk.Project, w *sdk.Workflow, u *sdk.User, force bool, msgChan chan<- sdk.Message, dryRun bool) error {\n\tctx, end := observability.Span(ctx, \"workflow.Import\")\n\tdefer end()\n\n\tw.ProjectKey = proj.Key\n\tw.ProjectID = proj.ID\n\n\t// Default value of history length is 20\n\tif w.HistoryLength == 0 {\n\t\tw.HistoryLength = 20\n\t}\n\n\tdoUpdate, errE := Exists(db, proj.Key, w.Name)\n\tif errE != nil {\n\t\treturn sdk.WrapError(errE, \"Import> Cannot check if workflow exists\")\n\t}\n\n\t//Manage default payload\n\tvar err error\n\tif w.Root.Context == nil {\n\t\tw.Root.Context = &sdk.WorkflowNodeContext{}\n\t}\n\tif w.WorkflowData.Node.Context == nil {\n\t\tw.WorkflowData.Node.Context = &sdk.NodeContext{}\n\t}\n\n\t// TODO compute on WD.Node\n\tif w.Root.Context.DefaultPayload, err = DefaultPayload(ctx, db, store, proj, u, w); err != nil {\n\t\tlog.Warning(\"workflow.Import> Cannot set default payload : %v\", err)\n\t}\n\tw.WorkflowData.Node.Context.DefaultPayload = w.Root.Context.DefaultPayload\n\n\tif !doUpdate {\n\t\tif err := Insert(db, store, w, proj, u); err != nil {\n\t\t\treturn sdk.WrapError(err, \"Unable to insert workflow\")\n\t\t}\n\t\tif msgChan != nil {\n\t\t\tmsgChan <- sdk.NewMessage(sdk.MsgWorkflowImportedInserted, w.Name)\n\t\t}\n\n\t\t// HookRegistration after workflow.Update. It needs hooks to be created on DB\n\t\tif errHr := HookRegistration(ctx, db, store, nil, *w, proj); errHr != nil {\n\t\t\treturn sdk.WrapError(errHr, \"Import> Cannot register hook\")\n\t\t}\n\n\t\treturn importWorkflowGroups(db, w)\n\t}\n\n\tif !force {\n\t\treturn sdk.NewError(sdk.ErrConflict, fmt.Errorf(\"Workflow exists\"))\n\t}\n\n\toldW, errO := Load(ctx, db, store, proj, w.Name, u, LoadOptions{WithIcon: true})\n\tif errO != nil {\n\t\treturn sdk.WrapError(errO, \"Import> Unable to load old workflow\")\n\t}\n\n\tw.ID = oldW.ID\n\tif err := Update(ctx, db, store, w, oldW, proj, u); err != nil {\n\t\treturn sdk.WrapError(err, \"Unable to update workflow\")\n\t}\n\n\tif !dryRun {\n\t\t// HookRegistration after workflow.Update. It needs hooks to be created on DB\n\t\tif errHr := HookRegistration(ctx, db, store, oldW, *w, proj); errHr != nil {\n\t\t\treturn sdk.WrapError(errHr, \"Import> Cannot register hook\")\n\t\t}\n\t}\n\n\tif err := importWorkflowGroups(db, w); err != nil {\n\t\treturn err\n\t}\n\n\tif msgChan != nil {\n\t\tmsgChan <- sdk.NewMessage(sdk.MsgWorkflowImportedUpdated, w.Name)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "775452ce0247053e15e7c0df849294a8", "score": "0.39454252", "text": "func NewLayer(name string) Layer {\n\treturn &layer{name: name}\n}", "title": "" }, { "docid": "e612e002d79018383ba0180f6bd27889", "score": "0.3935445", "text": "func New(filePath string, allowResearch bool, forceFiltering bool, toleranceScaling float32, requiredColumnTypes []string) mappingParser {\n\tm := mappingParser{filePath, false, Mapping{}, \"\", forceFiltering, allowResearch, toleranceScaling, requiredColumnTypes}\n\treturn m\n}", "title": "" }, { "docid": "08c5635f4f86090c804376e2e65357fe", "score": "0.38808003", "text": "func New(ctx context.Context, name primitive.Name, partitions []net.Address, opts ...session.Option) (Lock, error) {\n\ti, err := util.GetPartitionIndex(name.Name, len(partitions))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn newLock(ctx, name, partitions[i], opts...)\n}", "title": "" }, { "docid": "8acf3549eeb5f9b2f19a5851aeab37b0", "score": "0.3869511", "text": "func New(aName string, aPriority int, aRegex string, aParams int,\r\n\taOperation Operation) (Command, error) {\r\n\r\n\t// Compile regex\r\n\trx, err := regexp.Compile(aRegex)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\treturn &SimpleCommand{aName, aPriority, rx, aParams, aOperation}, nil\r\n}", "title": "" }, { "docid": "55eb7850dbfbd271c20637c333e55343", "score": "0.3868048", "text": "func NewImportCommand(dockerCli command.Cli) *cobra.Command {\n\tvar options importOptions\n\n\tcmd := &cobra.Command{\n\t\tUse: \"import [OPTIONS] file|URL|- [REPOSITORY[:TAG]]\",\n\t\tShort: \"Import the contents from a tarball to create a filesystem image\",\n\t\tArgs: cli.RequiresMinArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\toptions.source = args[0]\n\t\t\tif len(args) > 1 {\n\t\t\t\toptions.reference = args[1]\n\t\t\t}\n\t\t\treturn runImport(dockerCli, options)\n\t\t},\n\t\tAnnotations: map[string]string{\n\t\t\t\"aliases\": \"docker image import, docker import\",\n\t\t},\n\t}\n\n\tflags := cmd.Flags()\n\n\toptions.changes = dockeropts.NewListOpts(nil)\n\tflags.VarP(&options.changes, \"change\", \"c\", \"Apply Dockerfile instruction to the created image\")\n\tflags.StringVarP(&options.message, \"message\", \"m\", \"\", \"Set commit message for imported image\")\n\tcommand.AddPlatformFlag(flags, &options.platform)\n\n\treturn cmd\n}", "title": "" }, { "docid": "67f5b0e3c88c598812b3a306f071de73", "score": "0.3864917", "text": "func Import(ctx context.Context, root string, batchSize int) *ImportChannels {\n\tresult := new(ImportChannels)\n\tresult.Concepts = make(chan []*Concept)\n\tresult.Descriptions = make(chan []*Description)\n\tresult.Relationships = make(chan []*Relationship)\n\tresult.Refsets = make(chan []*ReferenceSetItem)\n\n\ttaskc := walkFiles(ctx, root, batchSize)\n\n\t// processFiles: takes tasks from walkfiles and turn into rows\n\tbatchc := make(chan batch) // channel to handle batches of rows for processing\n\tvar wg sync.WaitGroup\n\tfor i := 0; i < runtime.NumCPU(); i++ {\n\t\twg.Add(1)\n\t\tgo func() {\n\t\t\tprocessFiles(ctx, taskc, batchc)\n\t\t\twg.Done()\n\t\t}()\n\t}\n\tgo func() {\n\t\twg.Wait()\n\t\tclose(batchc)\n\t}()\n\n\t// process batches: start some workers to process batches of data for import\n\tvar batchWg sync.WaitGroup\n\tfor i := 0; i < runtime.NumCPU(); i++ {\n\t\tbatchWg.Add(1)\n\t\tgo func() {\n\t\t\tprocessBatch(ctx, batchc, result)\n\t\t\tbatchWg.Done()\n\t\t}()\n\t}\n\tgo func() { // when all processBatch operations finish, close our output channels\n\t\tbatchWg.Wait()\n\t\tresult.Close()\n\t}()\n\n\treturn result\n}", "title": "" }, { "docid": "d57a515f89470a5386c88cc9158da2ce", "score": "0.38488653", "text": "func (g *Generator) NewRuleFromTemplate(name string, template *ast.Rule) *ast.Rule {\n\tid := g.ids[name]\n\tg.ids[name]++\n\n\tnewRule := template.Copy()\n\tnewRule.Head.Name = ast.Var(fmt.Sprintf(\"%s_%d\", name, id))\n\treturn newRule\n}", "title": "" }, { "docid": "8a2da3bc67cd7646a5afc12dc6b6cf6b", "score": "0.3829546", "text": "func (r *Request) Import(request *Request) error {\n\tif request.Actions == nil || request.Metadata == nil {\n\t\treturn errors.New(\"cannot import request: invalid request\")\n\t}\n\tif r.Actions == nil {\n\t\tr.Actions = &driver.TokenRequest{}\n\t}\n\tif r.Metadata == nil {\n\t\tr.Metadata = &driver.TokenRequestMetadata{}\n\t}\n\n\tr.Actions.Issues = append(r.Actions.Issues, request.Actions.Issues...)\n\tr.Actions.Transfers = append(r.Actions.Transfers, request.Actions.Transfers...)\n\tr.Metadata.Issues = append(r.Metadata.Issues, request.Metadata.Issues...)\n\tr.Metadata.Transfers = append(r.Metadata.Transfers, request.Metadata.Transfers...)\n\treturn nil\n}", "title": "" }, { "docid": "12aaf4d69583e555485cf7de88f9ed32", "score": "0.38240644", "text": "func importer(name string) (*wasm.Module, error) {\n\t//TODO add the path into config file\n\tif name != \"ONT\" {\n\t\treturn nil, errors.NewErr(\"import [\" + name + \"] is not supported! \")\n\t}\n\tf, err := os.Open(name + \".wasm\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer f.Close()\n\tm, err := wasm.ReadModule(f, nil)\n\terr = validate.VerifyModule(m)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn m, nil\n\n}", "title": "" }, { "docid": "790ba0eeb4a5fb0c198a76bfee391235", "score": "0.38146436", "text": "func importsym(s *Sym, op int) *Sym {\n\tif s.Def != nil && int(s.Def.Op) != op {\n\t\tpkgstr := fmt.Sprintf(\"during import %q\", importpkg.Path)\n\t\tredeclare(s, pkgstr)\n\t}\n\n\t// mark the symbol so it is not reexported\n\tif s.Def == nil {\n\t\tif exportname(s.Name) || initname(s.Name) {\n\t\t\ts.Flags |= SymExport\n\t\t} else {\n\t\t\ts.Flags |= SymPackage // package scope\n\t\t}\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "135aa93de8678a1afbe52935e033cc43", "score": "0.381243", "text": "func NewPoolImport() *PoolImport {\n\treturn &PoolImport{}\n}", "title": "" }, { "docid": "538bd9b0c91a7a72564c006dfdb567da", "score": "0.37988287", "text": "func (d *Docker) Import(r *om.Repository, reader io.ReadCloser) ([]*om.Layer, error) {\n\ttempdir, err := ioutil.TempDir(\"\", \"overmount-unpack-\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer os.RemoveAll(tempdir)\n\n\tif err := archive.Untar(reader, tempdir, &archive.TarOptions{}); err != nil {\n\t\treturn nil, err\n\t}\n\n\treader.Close()\n\n\tup, err := d.unpackLayers(r, tempdir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn d.constructImage(up)\n}", "title": "" }, { "docid": "3c93a52f4b9b7a4d6544416767e16cb7", "score": "0.3786711", "text": "func GenerateIngress(mattermost *mattermostv1alpha1.ClusterInstallation, name, ingressName string, ingressAnnotations map[string]string) *networkingv1.Ingress {\n\tingress := &networkingv1.Ingress{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: mattermost.Namespace,\n\t\t\tLabels: mattermost.ClusterInstallationLabels(name),\n\t\t\tOwnerReferences: []metav1.OwnerReference{\n\t\t\t\t*metav1.NewControllerRef(mattermost, schema.GroupVersionKind{\n\t\t\t\t\tGroup: mattermostv1alpha1.GroupVersion.Group,\n\t\t\t\t\tVersion: mattermostv1alpha1.GroupVersion.Version,\n\t\t\t\t\tKind: \"ClusterInstallation\",\n\t\t\t\t}),\n\t\t\t},\n\t\t\tAnnotations: ingressAnnotations,\n\t\t},\n\t\tSpec: networkingv1.IngressSpec{\n\t\t\tRules: []networkingv1.IngressRule{\n\t\t\t\t{\n\t\t\t\t\tHost: ingressName,\n\t\t\t\t\tIngressRuleValue: networkingv1.IngressRuleValue{\n\t\t\t\t\t\tHTTP: &networkingv1.HTTPIngressRuleValue{\n\t\t\t\t\t\t\tPaths: []networkingv1.HTTPIngressPath{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tPath: \"/\",\n\t\t\t\t\t\t\t\t\tBackend: networkingv1.IngressBackend{\n\t\t\t\t\t\t\t\t\t\tService: &networkingv1.IngressServiceBackend{\n\t\t\t\t\t\t\t\t\t\t\tName: mattermost.Name,\n\t\t\t\t\t\t\t\t\t\t\tPort: networkingv1.ServiceBackendPort{\n\t\t\t\t\t\t\t\t\t\t\t\tNumber: 8065,\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\tPathType: &defaultIngressPathType,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\tif mattermost.Spec.UseIngressTLS {\n\t\tingress.Spec.TLS = []networkingv1.IngressTLS{\n\t\t\t{\n\t\t\t\tHosts: []string{ingressName},\n\t\t\t\tSecretName: strings.ReplaceAll(ingressName, \".\", \"-\") + \"-tls-cert\",\n\t\t\t},\n\t\t}\n\t}\n\n\treturn ingress\n}", "title": "" }, { "docid": "69411a4735c60702f5acebc9abd6b4c9", "score": "0.37835053", "text": "func LoadByPipelineName(ctx context.Context, db gorp.SqlExecutor, projectKey string, pipName string) ([]sdk.WorkflowName, error) {\n\tquery := `SELECT distinct workflow.*, project.projectkey as \"project_key\", project.id as \"project_id\"\n\t\tfrom workflow\n\t\tjoin project on project.id = workflow.project_id\n\t\tjoin w_node on w_node.workflow_id = workflow.id\n \tjoin w_node_context on w_node_context.node_id = w_node.id\n\t\tjoin pipeline on pipeline.id = w_node_context.pipeline_id\n\t\twhere project.projectkey = $1 and pipeline.name = $2\n\t\tand workflow.to_delete = false\n\t\torder by workflow.name asc`\n\tvar result []sdk.WorkflowName // This struct is not registered as a gorpmapping entity so we can't use gorpmapping.Query\n\t_, err := db.Select(&result, query, projectKey, pipName)\n\treturn result, sdk.WithStack(err)\n}", "title": "" }, { "docid": "7b5edb7a812518df661f5914aaea50fb", "score": "0.37817827", "text": "func NewImportCmd(rootConf *RootConfig) *ImportCmd {\n\tconf := ImportConfig{\n\t\tRootConfig: rootConf,\n\t}\n\tcmd := ImportCmd{\n\t\tConf: &conf,\n\t}\n\tfs := flag.NewFlagSet(\"grafctl import\", flag.ExitOnError)\n\tcmd.RegisterFlags(fs)\n\n\tcmd.Command = &ffcli.Command{\n\t\tName: \"import\",\n\t\tShortUsage: \"grafctl import\",\n\t\tShortHelp: \"Import grafana dashboards and datasources\",\n\t\tFlagSet: fs,\n\t\tExec: cmd.Exec,\n\t\tSubcommands: []*ffcli.Command{},\n\t}\n\treturn &cmd\n}", "title": "" }, { "docid": "1df1f2847429ea6effe824efd6b920fc", "score": "0.37804642", "text": "func (c *dataMigrationGRPCClient) StartMigrationJobOperation(name string) *StartMigrationJobOperation {\n\treturn &StartMigrationJobOperation{\n\t\tlro: longrunning.InternalNewOperation(*c.LROClient, &longrunningpb.Operation{Name: name}),\n\t}\n}", "title": "" }, { "docid": "91f4d56216b0dd68f34fe39d4c8f0c42", "score": "0.37794712", "text": "func newImporter(ns Namespace) importer {\n\treturn importer{\n\t\tns: ns,\n\t\timports: make(map[string]*ast.ImportSpec),\n\t}\n}", "title": "" }, { "docid": "c37681d31da7e0bdd6d35c670c5c487b", "score": "0.37677774", "text": "func (i *ReadFormat) Import(db *DB, query string) (string, error) {\n\tctx := context.Background()\n\treturn i.ImportContext(ctx, db, query)\n}", "title": "" }, { "docid": "afd2d1ebaae978d0a0fa25542e111c8c", "score": "0.37667203", "text": "func (s *ServiceOp) ImportGKECluster(ctx context.Context, input *ImportGKEClusterInput) (*ImportGKEClusterOutput, error) {\n\tr := client.NewRequest(http.MethodPost, \"/gcp/gce/group/gke/import\")\n\n\tr.Params[\"clusterId\"] = []string{spotinst.StringValue(input.ClusterID)}\n\tr.Params[\"zone\"] = []string{spotinst.StringValue(input.ClusterZoneName)}\n\tr.Params[\"dryRun\"] = []string{strconv.FormatBool(spotinst.BoolValue(input.DryRun))}\n\n\tbody := &ImportGKEClusterInput{Group: input.Group}\n\tr.Obj = body\n\n\tresp, err := client.RequireOK(s.Client.Do(ctx, r))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tgs, err := groupsFromHttpResponse(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\toutput := new(ImportGKEClusterOutput)\n\tif len(gs) > 0 {\n\t\toutput.Group = gs[0]\n\t}\n\n\treturn output, nil\n}", "title": "" }, { "docid": "592b6e81836b29fed4e6fe26c4943140", "score": "0.37634608", "text": "func (r *ProjectsLocationsMigratableResourcesOperationsService) Get(name string) *ProjectsLocationsMigratableResourcesOperationsGetCall {\n\tc := &ProjectsLocationsMigratableResourcesOperationsGetCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.name = name\n\treturn c\n}", "title": "" }, { "docid": "6687e1a1f7b8d9adff6f408d2dfe4a28", "score": "0.37579393", "text": "func (r *ReadgroupsetsService) Import(importreadgroupsetsrequest *ImportReadGroupSetsRequest) *ReadgroupsetsImportCall {\n\tc := &ReadgroupsetsImportCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.importreadgroupsetsrequest = importreadgroupsetsrequest\n\treturn c\n}", "title": "" }, { "docid": "9e29fba790d754718dce17d33896f9b3", "score": "0.3757443", "text": "func NewInputDefinition(path, index, name string) (*InputDefinition, error) {\n\terr := ValidateName(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &InputDefinition{\n\t\tpath: path,\n\t\tindex: index,\n\t\tname: name,\n\t}, nil\n}", "title": "" }, { "docid": "1177a77de1b48de18b021bd73e4a344c", "score": "0.37523964", "text": "func (s *SharedFlowServiceOp) Import(name string, source string) (*SharedFlowRevision, *Response, error) {\n\tinfo, err := os.Stat(source)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tzipfileName := source\n\n\tlog.Printf(\"[INFO] *** Import *** isDir: %#v\\n\", info.IsDir())\n\n\tif info.IsDir() {\n\t\t// create a temporary zip file\n\t\tif name == \"\" {\n\t\t\tname = filepath.Base(source)\n\t\t}\n\t\tlog.Printf(\"[INFO] *** Import *** sharedFlowName: %#v\\n\", name)\n\t\ttempDir, err := ioutil.TempDir(\"\", \"go-apigee-edge-\")\n\t\tif err != nil {\n\t\t\tlog.Printf(\"[ERROR] *** Import *** error: %#v\\n\", err)\n\t\t\treturn nil, nil, fmt.Errorf(\"while creating temp dir, error: %#v\", err)\n\t\t}\n\t\tlog.Printf(\"[INFO] *** Import *** tempDir: %#v\\n\", tempDir)\n\t\tlog.Printf(\"[INFO] *** Import *** sourceDir: %#v\\n\", source)\n\t\tzipfileName = path.Join(tempDir, \"sharedflow.zip\")\n\t\terr = zipDirectory(path.Join(source, \"sharedflowbundle\"), zipfileName, smartFilter)\n\t\tif err != nil {\n\t\t\treturn nil, nil, fmt.Errorf(\"while creating temp dir, error: %#v\", err)\n\t\t}\n\t\tlog.Printf(\"[INFO] *** zipped %s into %s\\n\\n\", source, zipfileName)\n\t}\n\n\tif !strings.HasSuffix(zipfileName, \".zip\") {\n\t\treturn nil, nil, errors.New(\"source must be a zipfile\")\n\t}\n\n\tinfo, err = os.Stat(zipfileName)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\torigURL, err := url.Parse(sharedFlows)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tq := origURL.Query()\n\tq.Add(\"action\", \"import\")\n\tq.Add(\"name\", name)\n\torigURL.RawQuery = q.Encode()\n\tpath := origURL.String()\n\n\tioreader, err := os.Open(zipfileName)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tdefer ioreader.Close()\n\n\treq, err := s.client.NewRequest(\"POST\", path, ioreader, \"\")\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tsharedFlowRevision := SharedFlowRevision{}\n\tresp, err := s.client.Do(req, &sharedFlowRevision)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\treturn &sharedFlowRevision, resp, err\n}", "title": "" }, { "docid": "cbc07f8fd36931196a8b00cabbd198f2", "score": "0.37518978", "text": "func (node *Proxy) Import(ctx context.Context, req *milvuspb.ImportRequest) (*milvuspb.ImportResponse, error) {\n\tctx, sp := otel.Tracer(typeutil.ProxyRole).Start(ctx, \"Proxy-Import\")\n\tdefer sp.End()\n\n\tlog := log.Ctx(ctx)\n\n\tlog.Info(\"received import request\",\n\t\tzap.String(\"collectionName\", req.GetCollectionName()),\n\t\tzap.String(\"partition name\", req.GetPartitionName()),\n\t\tzap.Strings(\"files\", req.GetFiles()))\n\tresp := &milvuspb.ImportResponse{\n\t\tStatus: merr.Status(nil),\n\t}\n\tif !node.checkHealthy() {\n\t\tresp.Status = unhealthyStatus()\n\t\treturn resp, nil\n\t}\n\n\terr := importutil.ValidateOptions(req.GetOptions())\n\tif err != nil {\n\t\tlog.Error(\"failed to execute import request\",\n\t\t\tzap.Error(err))\n\t\tresp.Status.ErrorCode = commonpb.ErrorCode_UnexpectedError\n\t\tresp.Status.Reason = \"request options is not illegal \\n\" + err.Error() + \" \\nIllegal option format \\n\" + importutil.OptionFormat\n\t\treturn resp, nil\n\t}\n\n\tmethod := \"Import\"\n\ttr := timerecord.NewTimeRecorder(method)\n\tmetrics.ProxyFunctionCall.WithLabelValues(strconv.FormatInt(paramtable.GetNodeID(), 10), method,\n\t\tmetrics.TotalLabel).Inc()\n\n\t// Call rootCoord to finish import.\n\trespFromRC, err := node.rootCoord.Import(ctx, req)\n\tif err != nil {\n\t\tmetrics.ProxyFunctionCall.WithLabelValues(strconv.FormatInt(paramtable.GetNodeID(), 10), method, metrics.FailLabel).Inc()\n\t\tlog.Error(\"failed to execute bulk insert request\",\n\t\t\tzap.Error(err))\n\t\tresp.Status.ErrorCode = commonpb.ErrorCode_UnexpectedError\n\t\tresp.Status.Reason = err.Error()\n\t\treturn resp, nil\n\t}\n\n\tmetrics.ProxyFunctionCall.WithLabelValues(strconv.FormatInt(paramtable.GetNodeID(), 10), method, metrics.SuccessLabel).Inc()\n\tmetrics.ProxyReqLatency.WithLabelValues(strconv.FormatInt(paramtable.GetNodeID(), 10), method).Observe(float64(tr.ElapseSpan().Milliseconds()))\n\treturn respFromRC, nil\n}", "title": "" }, { "docid": "605f970fee09d324fbb53b816bcfe51c", "score": "0.37492302", "text": "func (m *Module) RunImport(operation ImportOperationEntity) error {\n\n\treturn nil\n}", "title": "" }, { "docid": "a0ae6449dcd65b87495bb08b100f8762", "score": "0.37346673", "text": "func (a *PoliciesApiService) ImportPolicyExecute(r ApiImportPolicyRequest) (SessionLink, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SessionLink\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"PoliciesApiService.ImportPolicy\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/api/v1/policies/import\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\tif r.xApiVersion == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"xApiVersion is required and must be specified\")\n\t}\n\tif r.policySpec == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"policySpec is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\", \"application/problem+json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tlocalVarHeaderParams[\"x-api-version\"] = parameterToString(*r.xApiVersion, \"\")\n\t// body params\n\tlocalVarPostBody = r.policySpec\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif apiKey, ok := auth[\"Bearer\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif apiKey.Prefix != \"\" {\n\t\t\t\t\tkey = apiKey.Prefix + \" \" + apiKey.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = apiKey.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "72bf347a0e94445559d354d7bb3c788f", "score": "0.37340578", "text": "func (b *Builder) NewInt32(name string) {\n\n\tif _, ok := b.info.Pos[name]; !ok {\n\t\tp := len(b.info.Pos)\n\t\tb.info.Names = append(b.info.Names, name)\n\t\tb.info.Pos[name] = p\n\t\tb.info.Dtypes = append(b.info.Dtypes, Int32)\n\t\tvar x, y []uint64\n\t\tb.info.Offsets = append(b.info.Offsets, x)\n\t\tb.info.Sizes = append(b.info.Sizes, y)\n\t} else {\n\t\tmsg := fmt.Sprintf(\"Name '%s' already exists\\n\", name)\n\t\tpanic(msg)\n\t}\n}", "title": "" }, { "docid": "a753bdbc01306f2849ddf11299069790", "score": "0.37338632", "text": "func (slimInterpreter *SlimInterpreter) DoImport(instruction *slimentity.SlimList) slimentity.SlimEntity {\n\tif instruction.Length() < 3 {\n\t\treturn malformedInstruction(instruction)\n\t}\n\tpathName := instruction.StringAt(2)\n\treturn slimInterpreter.processor.DoImport(pathName)\n}", "title": "" }, { "docid": "d019b245fd5a6bd231d307a767d637b6", "score": "0.3732482", "text": "func (o *OktaService) ListOktaImportRules(ctx context.Context, pageSize int, nextToken string) ([]types.OktaImportRule, string, error) {\n\treturn o.importRuleSvc.ListResources(ctx, pageSize, nextToken)\n}", "title": "" }, { "docid": "8ed8ca1ee203acc4fd63d70a8f2fda76", "score": "0.3728893", "text": "func NewActivatePredefinedRules(name string) *IE {\n\treturn newStringIE(ActivatePredefinedRules, name)\n}", "title": "" }, { "docid": "99b3cf41a792e96004f190208123e5c0", "score": "0.3722644", "text": "func (o ApiOutput) Import() ApiImportPtrOutput {\n\treturn o.ApplyT(func(v *Api) ApiImportPtrOutput { return v.Import }).(ApiImportPtrOutput)\n}", "title": "" }, { "docid": "69dbe1565075043918fbcfd058da6c11", "score": "0.36974293", "text": "func do_IMPORT_NAME(vm *Vm, namei int32) error {\n\tname := py.String(vm.frame.Code.Names[namei])\n\t__import__, ok := vm.frame.Builtins[\"__import__\"]\n\tif !ok {\n\t\treturn py.ExceptionNewf(py.ImportError, \"__import__ not found\")\n\t}\n\tv := vm.POP()\n\tu := vm.TOP()\n\tvar locals py.Object = py.None\n\tif vm.frame.Locals != nil {\n\t\tlocals = vm.frame.Locals\n\t}\n\tvar args py.Tuple\n\tif _, ok := u.(py.Int); ok {\n\t\targs = py.Tuple{name, vm.frame.Globals, locals, v, u}\n\t} else {\n\t\targs = py.Tuple{name, vm.frame.Globals, locals, v}\n\t}\n\tx, err := callInternal(__import__, args, nil, vm.frame)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvm.SET_TOP(x)\n\treturn nil\n}", "title": "" }, { "docid": "932a05c1d85c8ed550562d1c286f46be", "score": "0.36972243", "text": "func MakeOperator(name string, body []byte) (Operator, error) {\n\twhich_op, has_op := GetOperator(name)\n\n\tif !has_op {\n\t\treturn nil, fmt.Errorf(\"No operator for name %s\", name)\n\t}\n\n\tnew_op := which_op.New()\n\terr := new_op.UnmarshalJSON(body)\n\n\treturn new_op, err\n}", "title": "" }, { "docid": "ad1fe2af003958a994bcffc3b2af2581", "score": "0.36891994", "text": "func (r *ProjectsLocationsTrainingPipelinesOperationsService) Get(name string) *ProjectsLocationsTrainingPipelinesOperationsGetCall {\n\tc := &ProjectsLocationsTrainingPipelinesOperationsGetCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.name = name\n\treturn c\n}", "title": "" }, { "docid": "3e415b695ff61ca3b783b1d37f4f8e7e", "score": "0.36872146", "text": "func (d *Driver) importLayer(id string, layerData io.Reader, parentLayerPaths []string) (size int64, err error) {\n\tif !noreexec {\n\t\tcmd := reexec.Command(append([]string{\"docker-windows-write-layer\", d.info.HomeDir, id}, parentLayerPaths...)...)\n\t\toutput := bytes.NewBuffer(nil)\n\t\tcmd.Stdin = layerData\n\t\tcmd.Stdout = output\n\t\tcmd.Stderr = output\n\n\t\tif err = cmd.Start(); err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tif err = cmd.Wait(); err != nil {\n\t\t\treturn 0, fmt.Errorf(\"re-exec error: %v: output: %s\", err, output)\n\t\t}\n\n\t\treturn strconv.ParseInt(output.String(), 10, 64)\n\t}\n\treturn writeLayer(layerData, d.info.HomeDir, id, parentLayerPaths...)\n}", "title": "" }, { "docid": "509789bf96cff8f4fb96e1a02e8fd46b", "score": "0.36871886", "text": "func (s *UpdateDataSetInput) SetImportMode(v string) *UpdateDataSetInput {\n\ts.ImportMode = &v\n\treturn s\n}", "title": "" }, { "docid": "353e5fe0e201487bf7b6bfce66fc5475", "score": "0.36826873", "text": "func LoadByPipelineName(db gorp.SqlExecutor, projectKey string, pipName string) ([]sdk.Workflow, error) {\n\tdbRes := []Workflow{}\n\tquery := `\n\t\tselect distinct workflow.*\n\t\tfrom workflow\n\t\tjoin project on project.id = workflow.project_id\n\t\tjoin workflow_node on workflow_node.workflow_id = workflow.id\n\t\tjoin pipeline on pipeline.id = workflow_node.pipeline_id\n\t\twhere project.projectkey = $1 and pipeline.name = $2\n\t\torder by workflow.name asc`\n\n\tif _, err := db.Select(&dbRes, query, projectKey, pipName); err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn []sdk.Workflow{}, nil\n\t\t}\n\t\treturn nil, sdk.WrapError(err, \"LoadByPipelineName> Unable to load workflows for project %s and pipeline %s\", projectKey, pipName)\n\t}\n\n\tres := make([]sdk.Workflow, len(dbRes))\n\tfor i, w := range dbRes {\n\t\tw.ProjectKey = projectKey\n\t\tres[i] = sdk.Workflow(w)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "12f3313532e2d5b80c78151173d4e6b9", "score": "0.36785668", "text": "func LoadCanonicalOperationByTransactionHop(\n\tctx context.Context,\n\ttransaction string,\n\thop int8,\n) (*Operation, error) {\n\toperation := Operation{\n\t\tTransaction: &transaction,\n\t\tHop: &hop,\n\t\tPropagation: mint.PgTpCanonical,\n\t}\n\n\text := db.Ext(ctx, \"mint\")\n\tif rows, err := sqlx.NamedQuery(ext, `\nSELECT *\nFROM operations\nWHERE txn = :txn\n AND hop = :hop\n`, operation); err != nil {\n\t\treturn nil, errors.Trace(err)\n\t} else if !rows.Next() {\n\t\treturn nil, nil\n\t} else if err := rows.StructScan(&operation); err != nil {\n\t\tdefer rows.Close()\n\t\treturn nil, errors.Trace(err)\n\t} else if err := rows.Close(); err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\n\treturn &operation, nil\n}", "title": "" }, { "docid": "d378c0131c2ab0ceee5191f482da842c", "score": "0.367324", "text": "func (r *MongoRepository) Import(filename string) (int, error) {\n\tfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tdefer file.Close()\n\tscanner := bufio.NewScanner(file)\n\tvar rest = &domain.Restaurant{}\n\trecordcount := 0\n\tfor scanner.Scan() {\n\t\trecordcount += 1\n\t\tjson.Unmarshal([]byte(scanner.Text()), rest)\n\t\trest.DBID = domain.NewID()\n\t\t_, err := r.Store(rest)\n\t\tif err != nil {\n\t\t\treturn recordcount, err\n\t\t}\n\t}\n\tif err := scanner.Err(); err != nil {\n\t\treturn recordcount, err\n\t}\n\treturn recordcount, nil\n}", "title": "" }, { "docid": "63f291e6f7204c7a4c10b9bf254fed2f", "score": "0.36649603", "text": "func (i *Input) FromMap(values map[string]interface{}) error {\n\n\tvar err error\n\ti.DirName, err = coerce.ToString(values[\"dirname\"])\n\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ba051845e833ccd7e792539ed57057e9", "score": "0.3660458", "text": "func (g *Generator) NewRule(name string) *ast.Rule {\n\tid := g.ids[name]\n\tg.ids[name]++\n\treturn &ast.Rule{\n\t\tHead: &ast.Head{\n\t\t\tName: ast.Var(fmt.Sprintf(\"%s_%d\", name, id)),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "514426056e914edd4d01d676020914c0", "score": "0.36594152", "text": "func AddNamedImport(name, path string) FileTransformation {\r\n\treturn &genericTransformation{\r\n\t\tapply: func(context FileContext) error {\r\n\t\t\tastutil.AddNamedImport(context.FileSet, context.File, name, path)\r\n\t\t\treturn nil\r\n\t\t},\r\n\t}\r\n}", "title": "" }, { "docid": "cb662b1dfa6f14358874a57795140666", "score": "0.3655113", "text": "func (r *Repository) ImportNames(ctx context.Context, names []string) error {\n\treturn r.withTX(ctx, func(tx *sqlx.Tx) error {\n\n\t\tstmt, err := tx.PrepareContext(ctx, `\n\t\t\tINSERT INTO names (\n\t\t\t\tid,\n\t\t\t\tname\n\t\t\t) VALUES (\n\t\t\t\t$1,\n\t\t\t\t$2\n\t\t\t) ON CONFLICT (id) DO NOTHING\n\t\t`)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"Unable to prepare insert statement\")\n\t\t}\n\n\t\tfor i := 0; i < len(names); i++ {\n\t\t\t_, err := stmt.ExecContext(ctx, getIDForName(names[i]), names[i])\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, fmt.Sprintf(\"Unable to insert name %s\", names[i]))\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "33ddfac8319b3381ee6001afe0ca1589", "score": "0.3650506", "text": "func (importer *FileImporter) Import(file *backup.File, rewriteRules *restore_util.RewriteRules) error {\n\t// Rewrite the start key and end key of file to scan regions\n\tscanStartKey, startRule := rewriteRawKeyWithEncodedRules(file.GetStartKey(), rewriteRules)\n\tif startRule == nil {\n\t\tlog.Error(\"cannot find a rewrite rule for file start key\", zap.Stringer(\"file\", file))\n\t\treturn errRewriteRuleNotFound\n\t}\n\tscanEndKey, endRule := rewriteRawKeyWithEncodedRules(file.GetEndKey(), rewriteRules)\n\tif endRule == nil {\n\t\tlog.Error(\"cannot find a rewrite rule for file end key\", zap.Stringer(\"file\", file))\n\t\treturn errRewriteRuleNotFound\n\t}\n\terr := withRetry(func() error {\n\t\tctx, cancel := context.WithTimeout(importer.ctx, importScanResgionTime)\n\t\tdefer cancel()\n\t\t// Scan regions covered by the file range\n\t\tregionInfos, err := importer.metaClient.ScanRegions(ctx, scanStartKey, scanEndKey, 0)\n\t\tif err != nil {\n\t\t\treturn errors.Trace(err)\n\t\t}\n\t\t// Try to download and ingest the file in every region\n\t\tfor _, regionInfo := range regionInfos {\n\t\t\tvar downloadMeta *import_sstpb.SSTMeta\n\t\t\tinfo := regionInfo\n\t\t\t// Try to download file.\n\t\t\terr = withRetry(func() error {\n\t\t\t\tvar err error\n\t\t\t\tvar isEmpty bool\n\t\t\t\tdownloadMeta, isEmpty, err = importer.downloadSST(info, file, rewriteRules)\n\t\t\t\tif err != nil {\n\t\t\t\t\tif err != errRewriteRuleNotFound {\n\t\t\t\t\t\tlog.Warn(\"download file failed\",\n\t\t\t\t\t\t\tzap.Stringer(\"file\", file),\n\t\t\t\t\t\t\tzap.Stringer(\"region\", info.Region),\n\t\t\t\t\t\t\tzap.ByteString(\"scanStartKey\", scanStartKey),\n\t\t\t\t\t\t\tzap.ByteString(\"scanEndKey\", scanEndKey),\n\t\t\t\t\t\t\tzap.Error(err),\n\t\t\t\t\t\t)\n\t\t\t\t\t}\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tif isEmpty {\n\t\t\t\t\tlog.Info(\n\t\t\t\t\t\t\"file don't have any key in this region, skip it\",\n\t\t\t\t\t\tzap.Stringer(\"file\", file),\n\t\t\t\t\t\tzap.Stringer(\"region\", info.Region),\n\t\t\t\t\t)\n\t\t\t\t\treturn errRangeIsEmpty\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}, func(e error) bool {\n\t\t\t\t// Scan regions may return some regions which cannot match any rewrite rule,\n\t\t\t\t// like [t{tableID}, t{tableID}_r), those regions should be skipped\n\t\t\t\treturn e != errRewriteRuleNotFound && e != errRangeIsEmpty\n\t\t\t}, downloadSSTRetryTimes, downloadSSTWaitInterval, downloadSSTMaxWaitInterval)\n\t\t\tif err != nil {\n\t\t\t\tif err == errRewriteRuleNotFound || err == errRangeIsEmpty {\n\t\t\t\t\t// Skip this region\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\t\t\terr = importer.ingestSST(downloadMeta, info)\n\t\t\tif err != nil {\n\t\t\t\tlog.Warn(\"ingest file failed\",\n\t\t\t\t\tzap.Stringer(\"file\", file),\n\t\t\t\t\tzap.Stringer(\"range\", downloadMeta.GetRange()),\n\t\t\t\t\tzap.Stringer(\"region\", info.Region),\n\t\t\t\t\tzap.Error(err),\n\t\t\t\t)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tsummary.CollectSuccessUnit(summary.TotalKV, file.TotalKvs)\n\t\t\tsummary.CollectSuccessUnit(summary.TotalBytes, file.TotalBytes)\n\t\t}\n\t\treturn nil\n\t}, func(e error) bool {\n\t\treturn true\n\t}, importFileRetryTimes, importFileWaitInterval, importFileMaxWaitInterval)\n\treturn err\n}", "title": "" }, { "docid": "2b069d498edc8c4f0092e84d3d4ac0a0", "score": "0.36388895", "text": "func (r *Rule) FromReader(f io.Reader) error {\n\tscanner := bufio.NewScanner(f)\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\tseps := strings.Split(line, \" \")\n\t\tif len(seps) < 2 {\n\t\t\tcontinue\n\t\t}\n\t\tswitch seps[0] {\n\t\tcase \"#\":\n\t\tcase \"L\":\n\t\t\tfor _, e := range seps[1:] {\n\t\t\t\tr.L = append(r.L, Glob{Pattern: e, Road: daze.RoadLocale})\n\t\t\t}\n\t\tcase \"R\":\n\t\t\tfor _, e := range seps[1:] {\n\t\t\t\tr.L = append(r.L, Glob{Pattern: e, Road: daze.RoadRemote})\n\t\t\t}\n\t\tcase \"B\":\n\t\t\tfor _, e := range seps[1:] {\n\t\t\t\tr.L = append(r.L, Glob{Pattern: e, Road: daze.RoadFucked})\n\t\t\t}\n\t\t}\n\t}\n\treturn scanner.Err()\n}", "title": "" }, { "docid": "3c1256ce32e4f31d4bbd6cf5d806bdbf", "score": "0.3632991", "text": "func (f *Flow) Map(name string, fn func([]interface{}) error) *Flow {\n\tstep := &Step{\n\t\tName: name,\n\t\tFn: fn,\n\t\tType: Mapper,\n\t}\n\tf.steps = append(f.steps, step)\n\treturn f\n}", "title": "" }, { "docid": "e083f614f2be320d64d22c9c1ab4558e", "score": "0.36289218", "text": "func (c *Cluster) ImportCluster(cls *proto.Cluster, opt *cloudprovider.ImportClusterOption) (*proto.Task, error) {\n\t// call qcloud interface to create cluster\n\tif cls == nil {\n\t\treturn nil, fmt.Errorf(\"qcloud ImportCluster cluster is empty\")\n\t}\n\n\tif opt == nil || opt.Cloud == nil {\n\t\treturn nil, fmt.Errorf(\"qcloud ImportCluster cluster opt or cloud is empty\")\n\t}\n\n\tif len(opt.Key) == 0 || len(opt.Secret) == 0 || len(opt.Region) == 0 {\n\t\treturn nil, fmt.Errorf(\"qcloud CreateCluster opt lost valid crendential info\")\n\t}\n\n\tmgr, err := cloudprovider.GetTaskManager(opt.Cloud.CloudProvider)\n\tif err != nil {\n\t\tblog.Errorf(\"get cloud %s TaskManager when ImportCluster %d failed, %s\",\n\t\t\topt.Cloud.CloudID, cls.ClusterName, err.Error(),\n\t\t)\n\t\treturn nil, err\n\t}\n\n\t// build import cluster task\n\ttask, err := mgr.BuildImportClusterTask(cls, opt)\n\tif err != nil {\n\t\tblog.Errorf(\"build ImportCluster task for cluster %s with cloudprovider %s failed, %s\",\n\t\t\tcls.ClusterName, cls.Provider, err.Error(),\n\t\t)\n\t\treturn nil, err\n\t}\n\n\treturn task, nil\n}", "title": "" }, { "docid": "247919466227a27711b74305701b06a9", "score": "0.36276558", "text": "func NewCategoryImport(client sylius.IClient, memo cache.IMemo, logger log.ILogger) *CategoryImport {\n\treturn &CategoryImport{\n\t\tclient: client,\n\t\tmemo: memo,\n\t\tlogger: logger,\n\t}\n}", "title": "" }, { "docid": "ae70a63cc03b169e01c2ebc8b68e9f28", "score": "0.3620926", "text": "func (op *ApplyConversionWorkspaceOperation) Name() string {\n\treturn op.lro.Name()\n}", "title": "" }, { "docid": "117e2b6d5fe5cdab2594ab342c245a50", "score": "0.36208466", "text": "func NewMappingRequestFromURL(URL string) (*MappingRequest, error) {\n\tvar result = &MappingRequest{}\n\tlocation := url.Normalize(URL, file.Scheme)\n\terr := dsurl.Decode(location, result)\n\treturn result, err\n}", "title": "" }, { "docid": "5b0c33aba8e013093f3e275c96c36d52", "score": "0.36192158", "text": "func (c *CloudValidate) ImportClusterValidate(req *proto.ImportClusterReq, opt *cloudprovider.CommonOption) error {\n\t// call qcloud interface to check cluster\n\tif c == nil || req == nil {\n\t\treturn fmt.Errorf(\"%s ImportClusterValidate request is empty\", cloudName)\n\t}\n\n\tif opt == nil {\n\t\treturn fmt.Errorf(\"%s ImportClusterValidate options is empty\", cloudName)\n\t}\n\n\tif opt.Account == nil || len(opt.Account.SecretID) == 0 || len(opt.Account.SecretKey) == 0 || len(opt.Region) == 0 {\n\t\treturn fmt.Errorf(\"%s ImportClusterValidate opt lost valid crendential info\", cloudName)\n\t}\n\n\tif req.CloudMode.CloudID == \"\" && req.CloudMode.KubeConfig == \"\" {\n\t\treturn fmt.Errorf(\"%s ImportClusterValidate cluster cloudID & kubeConfig empty\", cloudName)\n\t}\n\n\tif req.CloudMode.CloudID != \"\" {\n\t\tcli, err := api.NewTkeClient(opt)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"%s ImportClusterValidate getTKEClient failed: %v\", cloudName, err)\n\t\t}\n\n\t\ttkeCluster, err := cli.GetTKECluster(req.CloudMode.CloudID)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"%s ImportClusterValidate GetTKECluster[%s] failed: %v\", cloudName,\n\t\t\t\treq.CloudMode.CloudID, err)\n\t\t}\n\n\t\t// 托管集群导入必须存在节点, 存在节点时才能打通集群链路\n\t\tif *tkeCluster.ClusterType == common.ClusterManageTypeManaged && *tkeCluster.ClusterNodeNum == 0 {\n\t\t\treturn fmt.Errorf(\"%s ImportClusterValidate ManageTypeCluster[%s] must exist worker nodes\",\n\t\t\t\treq.CloudMode.CloudID, cloudName)\n\t\t}\n\n\t\tblog.Infof(\"%s ImportClusterValidate CloudMode CloudID[%s] success\", cloudName, req.CloudMode.CloudID)\n\t\treturn nil\n\t}\n\n\tif req.CloudMode.KubeConfig != \"\" {\n\t\t_, err := types.GetKubeConfigFromYAMLBody(false, types.YamlInput{\n\t\t\tFileName: \"\",\n\t\t\tYamlContent: req.CloudMode.KubeConfig,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"%s ImportClusterValidate GetKubeConfigFromYAMLBody failed: %v\", cloudName, err)\n\t\t}\n\n\t\tkubeRet := base64.StdEncoding.EncodeToString([]byte(req.CloudMode.KubeConfig))\n\t\tkubeCli, err := clusterops.NewKubeClient(kubeRet)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"%s ImportClusterValidate NewKubeClient failed: %v\", cloudName, err)\n\t\t}\n\n\t\t_, err = kubeCli.Discovery().ServerVersion()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"%s ImportClusterValidate connect cluster by kubeConfig failed: %v\", cloudName, err)\n\t\t}\n\n\t\tblog.Infof(\"%s ImportClusterValidate CloudMode connect cluster ByKubeConfig success\", cloudName)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "00405b2bc0774dccb3790810d8bba564", "score": "0.36162657", "text": "func processOperationInput(r *bufio.Reader, name string, props map[string]interface{}, required []string) (rokka.Operation, error) {\n\top, err := rokka.NewOperationByName(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tps := reflect.ValueOf(op)\n\ts := ps.Elem()\n\n\tsortedProps := sortedKeysFromMap(props)\n\tfor _, propName := range sortedProps {\n\t\tif err := processOptionInput(r, props, required, propName, s); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif ok, err := op.Validate(); !ok {\n\t\tfmt.Printf(\"Validation failed with error: %s. Retry? [y|n]\", err)\n\t\tif !shouldRetry(r) {\n\t\t\treturn nil, nil\n\t\t}\n\t\treturn processOperationInput(r, name, props, required)\n\t}\n\treturn op, nil\n}", "title": "" }, { "docid": "d0562ed523b3aea27ff0bf16ec208710", "score": "0.36157125", "text": "func (m *MultiplexedPortMapping) Add(namespace, name string, port int32) (int32, error) {\n\tm.mu.Lock()\n\tdefer m.mu.Unlock()\n\n\tnamespaceName := serviceNamespaceName{namespace, name}\n\n\tmapping, found := m.table[namespaceName]\n\tif !found {\n\t\tmapping = make(map[int32]int32)\n\t\tm.table[namespaceName] = mapping\n\t}\n\n\t// Check if the port is not already mapped.\n\tfor targetPort, sourcePort := range mapping {\n\t\tif sourcePort == port {\n\t\t\treturn targetPort, nil\n\t\t}\n\t}\n\n\t// Find a target port available and assign it.\n\tfor i := m.minPort; i <= m.maxPort; i++ {\n\t\tif _, ok := mapping[i]; ok {\n\t\t\tcontinue\n\t\t}\n\n\t\tmapping[i] = port\n\n\t\treturn i, nil\n\t}\n\n\treturn 0, errors.New(\"unable to find an available port\")\n}", "title": "" }, { "docid": "8c82b6b652a7bd67fd7cd755099ad13c", "score": "0.36136028", "text": "func LoadByApplicationName(db gorp.SqlExecutor, projectKey string, appName string) ([]sdk.Workflow, error) {\n\tdbRes := []Workflow{}\n\tquery := `\n\t\tselect distinct workflow.*\n\t\tfrom workflow\n\t\tjoin project on project.id = workflow.project_id\n\t\tjoin workflow_node on workflow_node.workflow_id = workflow.id\n\t\tjoin workflow_node_context on workflow_node_context.workflow_node_id = workflow_node.id\n\t\tjoin application on workflow_node_context.application_id = application.id\n\t\twhere project.projectkey = $1 and application.name = $2\n\t\torder by workflow.name asc`\n\n\tif _, err := db.Select(&dbRes, query, projectKey, appName); err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn []sdk.Workflow{}, nil\n\t\t}\n\t\treturn nil, sdk.WrapError(err, \"LoadByApplicationName> Unable to load workflows for project %s and application %s\", projectKey, appName)\n\t}\n\n\tres := make([]sdk.Workflow, len(dbRes))\n\tfor i, w := range dbRes {\n\t\tw.ProjectKey = projectKey\n\t\tres[i] = sdk.Workflow(w)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "09f48f184cf11df2e37d8705ac3d8c8b", "score": "0.36108625", "text": "func (r *ImportRequest) ShallowCopy() Request {\n\tshallowCopy := *r\n\treturn &shallowCopy\n}", "title": "" }, { "docid": "2f2c920916d3853b6f0929a87c401f31", "score": "0.3609959", "text": "func (client *Client) importCertificateCreateRequest(ctx context.Context, certificateName string, parameters ImportCertificateParameters, options *ImportCertificateOptions) (*policy.Request, error) {\n\turlPath := \"/certificates/{certificate-name}/import\"\n\tif certificateName == \"\" {\n\t\treturn nil, errors.New(\"parameter certificateName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{certificate-name}\", url.PathEscape(certificateName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.endpoint, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.3\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, runtime.MarshalAsJSON(req, parameters)\n}", "title": "" }, { "docid": "c7f4c0cef0e3c5fbc85ba999804bb946", "score": "0.36020458", "text": "func (s *CreateDataSetInput) SetImportMode(v string) *CreateDataSetInput {\n\ts.ImportMode = &v\n\treturn s\n}", "title": "" }, { "docid": "1bf3fa593f7254e252a31b86cc6b3332", "score": "0.35988763", "text": "func (*DuplicatedImportsRule) Name() string {\n\treturn \"duplicated-imports\"\n}", "title": "" }, { "docid": "4874659bad14304fa1f36ec728c53940", "score": "0.35967296", "text": "func CreateListK8sIngressRulesRequest() (request *ListK8sIngressRulesRequest) {\n\trequest = &ListK8sIngressRulesRequest{\n\t\tRoaRequest: &requests.RoaRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Edas\", \"2017-08-01\", \"ListK8sIngressRules\", \"/pop/v5/k8s/acs/k8s_ingress\", \"Edas\", \"openAPI\")\n\trequest.Method = requests.GET\n\treturn\n}", "title": "" }, { "docid": "37355c7d6139993335034e81ac3e1946", "score": "0.35861066", "text": "func NewIngestion(ctx *pulumi.Context,\n\tname string, args *IngestionArgs, opts ...pulumi.ResourceOption) (*Ingestion, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.DisplayName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'DisplayName'\")\n\t}\n\tif args.IngestionName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'IngestionName'\")\n\t}\n\tif args.Interval == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Interval'\")\n\t}\n\tif args.Logstore == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Logstore'\")\n\t}\n\tif args.Project == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Project'\")\n\t}\n\tif args.RunImmediately == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'RunImmediately'\")\n\t}\n\tif args.Source == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Source'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Ingestion\n\terr := ctx.RegisterResource(\"alicloud:log/ingestion:Ingestion\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "d94ae056ec19c58395fb5a38e7e8adfa", "score": "0.35859385", "text": "func NewAclOperationFromValue(v string) (*AclOperation, error) {\n\tev := AclOperation(v)\n\tif ev.IsValid() {\n\t\treturn &ev, nil\n\t} else {\n\t\treturn nil, fmt.Errorf(\"invalid value '%v' for AclOperation: valid values are %v\", v, allowedAclOperationEnumValues)\n\t}\n}", "title": "" }, { "docid": "d05506f93eb43eb4a360b304ce7c1e56", "score": "0.358232", "text": "func Import(ctx *Context, args ...parser.Value) parser.Value {\n\tif len(args) == 0 {\n\t\tpanic(\"Invalid arguments\")\n\t}\n\n\tvar v parser.Value\n\tvar err error\n\tfor idx := range args {\n\t\tpackageName, ok := args[idx].Value().(string)\n\t\tif !ok {\n\t\t\tpanic(\"invalid package name\")\n\t\t}\n\t\tloadStdLib(packageName, ctx)\n\t\tv, err = ctx.TryEval(args[idx])\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "a9503186dd5cef6000f39ff56c019e66", "score": "0.3581691", "text": "func (op *CreateConversionWorkspaceOperation) Name() string {\n\treturn op.lro.Name()\n}", "title": "" }, { "docid": "147d3d639d2394af297faf6ca531adcf", "score": "0.35698974", "text": "func (k Keeper) ImportRequest(ctx sdk.Context, requests []types.Request) {\n\tstores := k.GetStoreRequestMap(ctx)\n\tfor _, request := range requests {\n\t\tappendedValue := k.cdc.MustMarshal(&request)\n\t\tstore, found := stores[request.Status]\n\t\tif !found {\n\t\t\tpanic(fmt.Sprintf(\"the status of imported request is invalid. Value %+v\", request))\n\t\t}\n\t\tstore.Set(GetRequestIDBytes(request.Id), appendedValue)\n\t}\n}", "title": "" }, { "docid": "a67387352e451f2569bfe7f3797e371c", "score": "0.35681093", "text": "func (r *ProjectsLocationsPersistentResourcesOperationsService) Get(name string) *ProjectsLocationsPersistentResourcesOperationsGetCall {\n\tc := &ProjectsLocationsPersistentResourcesOperationsGetCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.name = name\n\treturn c\n}", "title": "" }, { "docid": "459c41386b2cf19f8dad774bf72efee3", "score": "0.35661283", "text": "func LoadByApplicationName(ctx context.Context, db gorp.SqlExecutor, projectKey string, appName string) ([]sdk.WorkflowName, error) {\n\tquery := `SELECT distinct workflow.*, project.projectkey as \"project_key\", project.id as \"project_id\"\n\tfrom workflow\n\tjoin project on project.id = workflow.project_id\n\tjoin w_node on w_node.workflow_id = workflow.id\n\tjoin w_node_context on w_node_context.node_id = w_node.id\n\tjoin application on w_node_context.application_id = application.id\n\twhere project.projectkey = $1 and application.name = $2\n\tand workflow.to_delete = false\n\torder by workflow.name asc`\n\tvar result []sdk.WorkflowName // This struct is not registered as a gorpmapping entity so we can't use gorpmapping.Query\n\t_, err := db.Select(&result, query, projectKey, appName)\n\treturn result, sdk.WithStack(err)\n}", "title": "" }, { "docid": "cba82f84a96d223e3acd5b106b5af7bd", "score": "0.35632142", "text": "func (s *DataSetSummary) SetImportMode(v string) *DataSetSummary {\n\ts.ImportMode = &v\n\treturn s\n}", "title": "" }, { "docid": "64cfb888a305a0abd55280c2db94f583", "score": "0.3562781", "text": "func do_IMPORT_FROM(vm *Vm, namei int32) error {\n\tname := vm.frame.Code.Names[namei]\n\tmodule := vm.TOP()\n\tres, err := py.GetAttrString(module, name)\n\tif err != nil {\n\t\t// Catch AttributeError and rethrow as ImportError\n\t\tif py.IsException(py.AttributeError, err) {\n\t\t\terr = py.ExceptionNewf(py.ImportError, \"cannot import name %s\", name)\n\t\t}\n\t\treturn err\n\t}\n\tvm.PUSH(res)\n\treturn nil\n}", "title": "" }, { "docid": "1e1ed873e2574b29c3c532df1674c4ca", "score": "0.3562347", "text": "func newOperation(c *cli.Context) (*Operation, error) {\n\tif len(c.StringSlice(\"find\")) == 0 &&\n\t\tlen(c.StringSlice(\"replace\")) == 0 &&\n\t\t!c.Bool(\"undo\") {\n\t\treturn nil, errInvalidArgument\n\t}\n\n\top := &Operation{}\n\terr := setOptions(op, c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Get the current working directory\n\top.workingDir, err = filepath.Abs(\".\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif op.revert {\n\t\treturn op, nil\n\t}\n\n\tvar paths = make(map[string][]os.DirEntry)\n\tfor _, v := range op.directories {\n\t\tpaths[v], err = os.ReadDir(v)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// Use current directory\n\tif len(paths) == 0 {\n\t\tpaths[\".\"], err = os.ReadDir(\".\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif op.recursive {\n\t\tpaths, err = walk(paths, op.includeHidden, op.maxDepth)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\top.setPaths(paths)\n\treturn op, nil\n}", "title": "" }, { "docid": "093384b4505189d183c0d03d3aa99a24", "score": "0.3556406", "text": "func makeNewIngress(ingress *v1alpha1.Ingress, ingressClass string) *v1alpha1.Ingress {\n\toriginal := ingress.DeepCopy()\n\tsplits := make([]v1alpha1.IngressBackendSplit, 0, 1)\n\tsplits = append(splits, v1alpha1.IngressBackendSplit{\n\t\tIngressBackend: v1alpha1.IngressBackend{\n\t\t\tServiceName: kmeta.ChildName(ingress.Name, asyncSuffix),\n\t\t\tServiceNamespace: original.Namespace,\n\t\t\tServicePort: intstr.FromInt(80),\n\t\t},\n\t\tPercent: int(100),\n\t})\n\ttheRules := []v1alpha1.IngressRule{}\n\tfor _, rule := range original.Spec.Rules {\n\t\tnewRule := rule\n\t\tnewPaths := make([]v1alpha1.HTTPIngressPath, 0)\n\t\tif ingress.Annotations[AsyncModeAnnotationKey] == asyncAlwaysMode {\n\t\t\tfor _, path := range rule.HTTP.Paths {\n\t\t\t\tdefaultPath := path\n\t\t\t\tdefaultPath.Splits = splits\n\t\t\t\tdefaultPath.AppendHeaders = map[string]string{\n\t\t\t\t\tasyncOriginalHostHeader: network.GetServiceHostname(ingress.Name, ingress.Namespace),\n\t\t\t\t}\n\t\t\t\tdefaultPath.RewriteHost = network.GetServiceHostname(producerServiceName, system.Namespace())\n\t\t\t\tif path.Headers == nil {\n\t\t\t\t\tpath.Headers = map[string]v1alpha1.HeaderMatch{preferHeaderField: {Exact: preferSyncValue}}\n\t\t\t\t} else {\n\t\t\t\t\tpath.Headers[preferHeaderField] = v1alpha1.HeaderMatch{Exact: preferSyncValue}\n\t\t\t\t}\n\t\t\t\tnewPaths = append(newPaths, path, defaultPath)\n\t\t\t\tnewRule.HTTP.Paths = newPaths\n\t\t\t\ttheRules = append(theRules, newRule)\n\t\t\t}\n\t\t} else {\n\t\t\tnewPaths = append(newPaths, v1alpha1.HTTPIngressPath{\n\t\t\t\tHeaders: map[string]v1alpha1.HeaderMatch{preferHeaderField: {Exact: preferAsyncValue}},\n\t\t\t\tSplits: splits,\n\t\t\t\tAppendHeaders: map[string]string{\n\t\t\t\t\tasyncOriginalHostHeader: network.GetServiceHostname(ingress.Name, ingress.Namespace),\n\t\t\t\t},\n\t\t\t\tRewriteHost: network.GetServiceHostname(producerServiceName, system.Namespace()),\n\t\t\t})\n\t\t\tnewPaths = append(newPaths, newRule.HTTP.Paths...)\n\t\t\tnewRule.HTTP.Paths = newPaths\n\t\t\ttheRules = append(theRules, newRule)\n\t\t}\n\t}\n\treturn &v1alpha1.Ingress{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: original.Name + newSuffix,\n\t\t\tNamespace: original.Namespace,\n\t\t\tAnnotations: kmeta.FilterMap(kmeta.UnionMaps(map[string]string{\n\t\t\t\tnetworking.IngressClassAnnotationKey: ingressClass,\n\t\t\t}), func(key string) bool {\n\t\t\t\treturn key == corev1.LastAppliedConfigAnnotation\n\t\t\t}),\n\t\t\tLabels: original.Labels,\n\t\t\tOwnerReferences: original.OwnerReferences,\n\t\t},\n\t\tSpec: v1alpha1.IngressSpec{\n\t\t\tRules: theRules,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "24c34e6f5f3b2efe17f203d084658a1d", "score": "0.3556124", "text": "func NewOperation(op string) Operation {\n\tswitch op {\n\tcase \"insert-one\":\n\t\treturn OperationInsertOne\n\tcase \"delete-one\":\n\t\treturn OperationDeleteOne\n\tcase \"delete-many\":\n\t\treturn OperationDeleteMany\n\tcase \"replace-one\":\n\t\treturn OperationReplaceOne\n\tcase \"update-one\":\n\t\treturn OperationUpdateOne\n\tcase \"find-one\":\n\t\treturn OperationFindOne\n\tdefault:\n\t\treturn OperationInvalid\n\t}\n}", "title": "" }, { "docid": "4fb873f3d9c4d3aa25168d7e1bcc10a0", "score": "0.35542887", "text": "func (i importer) Import(path string) string {\n\tif imp, ok := i.imports[path]; ok {\n\t\tif imp.Name != nil {\n\t\t\treturn imp.Name.Name\n\t\t}\n\t\treturn filepath.Base(path)\n\t}\n\n\tname := i.ns.NewName(goast.DeterminePackageName(path))\n\tastImport := &ast.ImportSpec{\n\t\tName: ast.NewIdent(name),\n\t\tPath: stringLiteral(path),\n\t}\n\n\ti.imports[path] = astImport\n\treturn name\n}", "title": "" }, { "docid": "f4cf1edaac65e0520747d86a26ca5139", "score": "0.35542583", "text": "func CreateAKSClusterFromRequest(request *pkgCluster.CreateClusterRequest, orgID uint, userID uint) (*AKSCluster, error) {\n\tnodePools := make([]*azureadapter.AKSNodePoolModel, 0, len(request.Properties.CreateClusterAKS.NodePools))\n\tfor name, np := range request.Properties.CreateClusterAKS.NodePools {\n\t\tnodePools = append(nodePools, &azureadapter.AKSNodePoolModel{\n\t\t\tCreatedBy: userID,\n\t\t\tName: name,\n\t\t\tAutoscaling: np.Autoscaling,\n\t\t\tNodeMinCount: np.MinCount,\n\t\t\tNodeMaxCount: np.MaxCount,\n\t\t\tCount: np.Count,\n\t\t\tNodeInstanceType: np.NodeInstanceType,\n\t\t\tVNetSubnetID: np.VNetSubnetID,\n\t\t\tLabels: np.Labels,\n\t\t})\n\t}\n\n\tvar cluster AKSCluster\n\n\tcluster.modelCluster = &model.ClusterModel{\n\t\tName: request.Name,\n\t\tLocation: request.Location,\n\t\tCloud: request.Cloud,\n\t\tOrganizationId: orgID,\n\t\tCreatedBy: userID,\n\t\tSecretId: request.SecretId,\n\t\tDistribution: pkgCluster.AKS,\n\t\tAKS: azureadapter.AKSClusterModel{\n\t\t\tResourceGroup: request.Properties.CreateClusterAKS.ResourceGroup,\n\t\t\tKubernetesVersion: request.Properties.CreateClusterAKS.KubernetesVersion,\n\t\t\tNodePools: nodePools,\n\t\t},\n\t}\n\n\tcluster.log = log.WithField(\"cluster\", request.Name)\n\n\treturn &cluster, nil\n}", "title": "" }, { "docid": "00d91574897f20b577385141a8c854d2", "score": "0.35533965", "text": "func NewLock(name string) (*Lock, error) {\n\tfm, err := filemutex.New(DefaultLockPath + string(os.PathSeparator) + \"vxlan-\" + name + DefaultLockExt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Lock{\n\t\tName: name,\n\t\tmutex: fm,\n\t}, nil\n}", "title": "" }, { "docid": "9da8e7357fced92b84aa58f7ed73c7a9", "score": "0.35513985", "text": "func newOpenShiftClientConfigLoadingRules() *clientConfigLoadingRules {\n\tchain := []string{}\n\n\tenvVarFile := os.Getenv(\"KUBECONFIG\")\n\tif len(envVarFile) != 0 {\n\t\tchain = append(chain, filepath.SplitList(envVarFile)...)\n\t} else {\n\t\tchain = append(chain, recommendedHomeFile)\n\t}\n\n\treturn &clientConfigLoadingRules{\n\t\tPrecedence: chain,\n\t\t// REMOVED: Migration support; run (oc login) to trigger migration\n\t}\n}", "title": "" }, { "docid": "930e3614e516b50f9b3b1abe46a818dc", "score": "0.35490787", "text": "func (c *dataMigrationGRPCClient) RollbackConversionWorkspaceOperation(name string) *RollbackConversionWorkspaceOperation {\n\treturn &RollbackConversionWorkspaceOperation{\n\t\tlro: longrunning.InternalNewOperation(*c.LROClient, &longrunningpb.Operation{Name: name}),\n\t}\n}", "title": "" } ]
6e4bed7bdc10e6267c74cff3c2ed202b
SetOnChange is assigning a function to 'onchange'. This This method is returning allocated javascript function that need to be released.
[ { "docid": "8b92653d904963a3feaa999f666b5aeb", "score": "0.68373215", "text": "func (_this *CookieStore) SetOnChange(listener func(event *CookieChangeEvent, currentTarget *CookieStore)) js.Func {\n\tcb := eventFuncCookieStore_CookieChangeEvent(listener)\n\t_this.Value_JS.Set(\"onchange\", cb)\n\treturn cb\n}", "title": "" } ]
[ { "docid": "51977472f37bb7ba70af38cea2138277", "score": "0.6677285", "text": "func (_this *NetworkInformation) SetOnChange(listener func(event *domcore.Event, currentTarget *NetworkInformation)) js.Func {\n\tcb := eventFuncNetworkInformation_domcore_Event(listener)\n\t_this.Value_JS.Set(\"onchange\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "ecc7b53077b2c10ac44b91597c3281ee", "score": "0.6593098", "text": "func (_this *PermissionStatus) SetOnChange(listener func(event *domcore.Event, currentTarget *PermissionStatus)) js.Func {\n\tcb := eventFuncPermissionStatus_domcore_Event(listener)\n\t_this.Value_JS.Set(\"onchange\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "9ef4d40179278c312aea011a41f82539", "score": "0.62453467", "text": "func (session EditSession) OnChange(f func(obj *js.Object)) {\n\tsession.Call(\"on\", \"change\", f)\n}", "title": "" }, { "docid": "da9dbfff0319a117e899c62d7c4a29b6", "score": "0.6190369", "text": "func (e *HTMLElement) OnChange(v Action) *HTMLElement {\n\te.a[\"onchange\"] = v\n\treturn e\n}", "title": "" }, { "docid": "c1cd56b697909e98abb74863207850ed", "score": "0.61797947", "text": "func (_this *CookieStore) OnChange() domcore.EventHandlerFunc {\n\tvar ret domcore.EventHandlerFunc\n\tvalue := _this.Value_JS.Get(\"onchange\")\n\tif value.Type() != js.TypeNull && value.Type() != js.TypeUndefined {\n\t\tret = domcore.EventHandlerFromJS(value)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "02b64fb43e77542d4ef8f33c03fa088a", "score": "0.5959526", "text": "func OnChange(hook func()) Option {\n\treturn func(w *watcher) {\n\t\tw.onChange = hook\n\t}\n}", "title": "" }, { "docid": "0b2ce4e9cc5e3530495e66e3bb730f82", "score": "0.5799323", "text": "func (_this *PermissionStatus) OnChange() domcore.EventHandlerFunc {\n\tvar ret domcore.EventHandlerFunc\n\tvalue := _this.Value_JS.Get(\"onchange\")\n\tif value.Type() != js.TypeNull && value.Type() != js.TypeUndefined {\n\t\tret = domcore.EventHandlerFromJS(value)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "9d93bdbb7b0bf58510a6fa7bcb93ce5b", "score": "0.57724607", "text": "func (_this *NetworkInformation) OnChange() domcore.EventHandlerFunc {\n\tvar ret domcore.EventHandlerFunc\n\tvalue := _this.Value_JS.Get(\"onchange\")\n\tif value.Type() != js.TypeNull && value.Type() != js.TypeUndefined {\n\t\tret = domcore.EventHandlerFromJS(value)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "86740216b4dcc2f4e86c19818201735a", "score": "0.5554785", "text": "func (s *Slider) SetChangedFunc(handler func(value int)) {\n\ts.Lock()\n\tdefer s.Unlock()\n\n\ts.changed = handler\n}", "title": "" }, { "docid": "e24be5c108ab1dd7d7397793486bc455", "score": "0.55472875", "text": "func (_this *XR) SetOnDeviceChange(listener func(event *domcore.Event, currentTarget *XR)) js.Func {\n\tcb := eventFuncXR_domcore_Event(listener)\n\t_this.Value_JS.Set(\"ondevicechange\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "b5e9b9b2243687f64c00db5841dbc950", "score": "0.55282545", "text": "func (b *Bool) SetOnChange(fn BoolHook) *Bool {\n\tb.changeState = fn\n\treturn b\n}", "title": "" }, { "docid": "f1f2a7a345f53ec86fc5c9ab0628ad79", "score": "0.5387481", "text": "func (_this *BatteryManager) SetOnChargingChange(listener func(event *domcore.Event, currentTarget *BatteryManager)) js.Func {\n\tcb := eventFuncBatteryManager_domcore_Event(listener)\n\t_this.Value_JS.Set(\"onchargingchange\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "4b198508fc653a435f9f89d0362f34a8", "score": "0.53754073", "text": "func (_this *WakeLock) SetOnActiveChange(listener func(event *domcore.Event, currentTarget *WakeLock)) js.Func {\n\tcb := eventFuncWakeLock_domcore_Event(listener)\n\t_this.Value_JS.Set(\"onactivechange\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "b590b0192321b41faecbf8df008994f2", "score": "0.53457505", "text": "func (p *Pages) SetChangedFunc(handler func()) *Pages {\n\tp.changed = handler\n\treturn p\n}", "title": "" }, { "docid": "986bc559ca704ffd359a7b58ea746cd5", "score": "0.5258714", "text": "func (c *Checkbox) SetChangedFunc(handler func(checked bool)) *Checkbox {\n\tc.changed = handler\n\treturn c\n}", "title": "" }, { "docid": "eea7603c66ac62379a7f71a12677fb46", "score": "0.52284485", "text": "func (_this *XRSession) SetOnBlur(listener func(event *domcore.Event, currentTarget *XRSession)) js.Func {\n\tcb := eventFuncXRSession_domcore_Event(listener)\n\t_this.Value_JS.Set(\"onblur\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "8943991cd873f5c03559c596eb96018f", "score": "0.52056503", "text": "func SetCallbackFunc(func()) {\n}", "title": "" }, { "docid": "7ad4388d881c11cc5af511594e7e1ec0", "score": "0.51541525", "text": "func (this *CodeNode) Set_eval_function( value *GoNullable) {\n this.eval_function = value \n}", "title": "" }, { "docid": "7a48cfdb5ed0930d6a371168c3ec694c", "score": "0.51330453", "text": "func (js *JavascriptBuilder) setFunc(obj *otto.Object, token string, fn func(string, Node, otto.FunctionCall) (Node, error)) error {\n\treturn obj.Set(token, func(call otto.FunctionCall) otto.Value {\n\t\tthis, _ := call.This.Export()\n\n\t\tnode, err := CreateNode(this)\n\t\tif err != nil {\n\t\t\tjs.err = err\n\t\t\treturn otto.NullValue()\n\t\t}\n\n\t\tnode, err = fn(token, node, call)\n\t\tif err != nil {\n\t\t\tjs.err = err\n\t\t\treturn otto.NullValue()\n\t\t}\n\n\t\to, err := node.Object()\n\t\tif err != nil {\n\t\t\tjs.err = err\n\t\t\treturn otto.NullValue()\n\t\t}\n\n\t\tjs.setFunc(o, \"transform\", js.transform)\n\t\tjs.setFunc(o, \"save\", js.save)\n\n\t\treturn o.Value()\n\t})\n}", "title": "" }, { "docid": "c7f992f2e641116cbd931c8960bcc9db", "score": "0.5123258", "text": "func (updater *Updater) SetFunc(f func(*draw2dimg.GraphicContext) bool) {\n\tupdater.Func = f\n}", "title": "" }, { "docid": "39817deca08d0dbd47ead7d8ae99e046", "score": "0.51080966", "text": "func (_this *XRReferenceSpace) SetOnReset(listener func(event *XRReferenceSpaceEvent, currentTarget *XRReferenceSpace)) js.Func {\n\tcb := eventFuncXRReferenceSpace_XRReferenceSpaceEvent(listener)\n\t_this.Value_JS.Set(\"onreset\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "a23d96d1ff1e6ed61fe872d74ac3ca66", "score": "0.5059005", "text": "func (list *TodoList) OnChange(f func()) {\n\tlist.changeListeners = append(list.changeListeners, f)\n}", "title": "" }, { "docid": "37822de6586d68f948f96688806393af", "score": "0.50383574", "text": "func SetGetGoroutineIDFunc(f func() uint64) {\n\tif f != nil {\n\t\tgetGoroutineID = f\n\t}\n}", "title": "" }, { "docid": "f7586475f7c3c16a8e616fdbb9d0a013", "score": "0.5017991", "text": "func (m *mGlobalInsolarLockMockRelease) Set(f func(p context.Context)) *GlobalInsolarLockMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.ReleaseFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "0435af97087c579ae61f4a0710677b7c", "score": "0.49957165", "text": "func SetValidationFunc(name string, vf ValidationFunc) error {\n\treturn defaultValidator.SetValidationFunc(name, vf)\n}", "title": "" }, { "docid": "a295aa37e568a92e79df025ffb42782c", "score": "0.4995715", "text": "func (_this *BatteryManager) SetOnLevelChange(listener func(event *domcore.Event, currentTarget *BatteryManager)) js.Func {\n\tcb := eventFuncBatteryManager_domcore_Event(listener)\n\t_this.Value_JS.Set(\"onlevelchange\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "1a9c788bc1dfac2002fdd2efbd0c6818", "score": "0.4963862", "text": "func (p *PhidgetAccelerometer) SetOnAccelerationChangeHandler(f func(Phidget, interface{}, []float32, float32), ctx interface{}) error {\n\t//make a c function pointer to a go function pointer and pass it through the phidget context\n\tvar passthrough MotionPassthrough\n\tpassthrough.f = f\n\tpassthrough.ctx = ctx\n\tpassthrough.handle = p\n\tpt := gopointer.Save(passthrough)\n\tcerr := C.PhidgetAccelerometer_setOnAccelerationChangeHandler(p.handle, (C.callback_fcn)(unsafe.Pointer(C.ccallback)), pt)\n\tif cerr != C.EPHIDGET_OK {\n\t\treturn errors.New(p.getErrorDescription(cerr))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "564be75916baac27ac7dfc2e0fbfa561", "score": "0.49457398", "text": "func (session EditSession) OnChangeMode(f func()) {\n\tsession.Call(\"on\", \"changeMode\", f)\n}", "title": "" }, { "docid": "5756319f1a848941e464ff98a9473211", "score": "0.49453485", "text": "func (st *Store) OnChange(cb func(id string, before, after interface{})) {\n\tst.onChange = append(st.onChange, cb)\n}", "title": "" }, { "docid": "5aeeb3384920594a6acf75cd0bcfee13", "score": "0.49449068", "text": "func (oi *ObjectInfo) SetValueFunction() string {\n\tret := C.g_object_info_get_set_value_function((*C.GIObjectInfo)(oi.c))\n\treturn _CStringToGoString(ret)\n}", "title": "" }, { "docid": "ef4666f4e741bd184cd70bf0819e95a6", "score": "0.4942085", "text": "func (i *InputBarDef) OnChange(e *r.SyntheticEvent) {\n\tval := e.Target().(*dom.HTMLInputElement).Value\n\tst := i.State()\n\tst.Value = val\n\ti.SetState(st)\n}", "title": "" }, { "docid": "902005d33ed60b742d7f6c9a1e727418", "score": "0.4915395", "text": "func (c *Config) callOnChange(name string, oldValue string, newValue string) {\n\tif c.params[name].onChange == nil {\n\t\treturn\n\t}\n\terr := c.params[name].onChange(oldValue, newValue)\n\tif err != nil {\n\t\tc.logEntry.Errorf(\"OnChange handler failed for '%s' during value change from '%s' to '%s': %v\",\n\t\t\tname, oldValue, newValue, err)\n\t}\n\tc.m.Lock()\n\tdelete(c.errors, name)\n\tc.errors[name] = err\n\tc.m.Unlock()\n}", "title": "" }, { "docid": "d0b4db5bfea8690492bb13f7990a6e21", "score": "0.49046463", "text": "func (_this *XRSession) SetOninputsourceschange(value *domcore.EventHandler) {\n\tvar __callback0 js.Value\n\tif value != nil {\n\t\t__callback0 = (*value).Value\n\t} else {\n\t\t__callback0 = js.Null()\n\t}\n\tinput := __callback0\n\t_this.Value_JS.Set(\"oninputsourceschange\", input)\n}", "title": "" }, { "docid": "d7b042f58d818e98eebfddd166f7c03b", "score": "0.488587", "text": "func (_this *XR) OnDeviceChange() domcore.EventHandlerFunc {\n\tvar ret domcore.EventHandlerFunc\n\tvalue := _this.Value_JS.Get(\"ondevicechange\")\n\tif value.Type() != js.TypeNull && value.Type() != js.TypeUndefined {\n\t\tret = domcore.EventHandlerFromJS(value)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "ba1f7211b547970f0733f3003af7c631", "score": "0.48766807", "text": "func (m *mCalculatorMockGetGlobuleProof) Set(f func(p *merkle.GlobuleEntry) (r merkle.OriginHash, r1 *merkle.GlobuleProof, r2 error)) *CalculatorMock {\n\tm.mock.GetGlobuleProofFunc = f\n\tm.mockExpectations = nil\n\treturn m.mock\n}", "title": "" }, { "docid": "9717f0a772a5c7e118e52e0e18019692", "score": "0.48726252", "text": "func (_this *BatteryManager) SetOnChargingTimeChange(listener func(event *domcore.Event, currentTarget *BatteryManager)) js.Func {\n\tcb := eventFuncBatteryManager_domcore_Event(listener)\n\t_this.Value_JS.Set(\"onchargingtimechange\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "12f6c06e771cb4f607d41e98b4c9da23", "score": "0.4865234", "text": "func (c *Component) SetBlurFunc(handler func(key tcell.Key)) *Component {\n\tc.blur = handler\n\treturn c\n}", "title": "" }, { "docid": "e924ab559865d2b1b0663e714051c492", "score": "0.4865017", "text": "func (s *Slider) SetDoneFunc(handler func(key tcell.Key)) {\n\ts.Lock()\n\tdefer s.Unlock()\n\n\ts.done = handler\n}", "title": "" }, { "docid": "1197ee89faea1b1acb5858c29e438478", "score": "0.48622188", "text": "func (g *Glispy) SetFunc(key string, fn types.Function) {\n\tsetFunc(g.sc, key, fn)\n}", "title": "" }, { "docid": "38bc68d6ae3aa38cd506daedf40c7e26", "score": "0.4841802", "text": "func (m *mFullIntroductionReaderMockGetReference) Set(f func() (r insolar.Reference)) *FullIntroductionReaderMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.GetReferenceFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "997b4429c7c56d90aafaa58626374cd6", "score": "0.4841073", "text": "func SetDeferFunc(dFunc func(exitVal int)) {\n\t// Safely adjust the messenger func\n\tmutex.Lock()\n\t{\n\t\tdeferFunc = dFunc\n\t}\n\tmutex.Unlock()\n}", "title": "" }, { "docid": "a10053aafeb7ff4c180615b9f1214a5a", "score": "0.48329672", "text": "func (_this *WakeLock) OnActiveChange() domcore.EventHandlerFunc {\n\tvar ret domcore.EventHandlerFunc\n\tvalue := _this.Value_JS.Get(\"onactivechange\")\n\tif value.Type() != js.TypeNull && value.Type() != js.TypeUndefined {\n\t\tret = domcore.EventHandlerFromJS(value)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "e679f616c01638a5f9db82e717d7bbed", "score": "0.48099926", "text": "func (m *mGlobalInsolarLockMockAcquire) Set(f func(p context.Context)) *GlobalInsolarLockMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.AcquireFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "1cb009f81c731d3e6cc0aad348005201", "score": "0.48060212", "text": "func (s *Settings) AddOnChange(key string, cb OnChangeCallback) {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\tif s.onChangeCallbacks == nil {\n\t\ts.onChangeCallbacks = make(map[string]OnChangeCallback)\n\t}\n\ts.onChangeCallbacks[key] = cb\n}", "title": "" }, { "docid": "717b5dccf22e2043666b9ee139cca2a8", "score": "0.47994366", "text": "func (kv *KV) SetEventFunc(ef func(db.Event)) {\n\tkv.eF = ef\n}", "title": "" }, { "docid": "a7b1ff476afeab978562c40624ff3b89", "score": "0.47753802", "text": "func (mv *Validator) SetValidationFunc(name string, vf ValidationFunc) error {\n\tif name == \"\" {\n\t\treturn errors.New(\"name cannot be empty\")\n\t}\n\tif vf == nil {\n\t\tdelete(mv.validationFuncs, name)\n\t\treturn nil\n\t}\n\tmv.validationFuncs[name] = vf\n\treturn nil\n}", "title": "" }, { "docid": "a0a1d1d7ca7400827353a0402d055329", "score": "0.47679234", "text": "func (_this *XRSession) SetOnSelect(listener func(event *XRInputSourceEvent, currentTarget *XRSession)) js.Func {\n\tcb := eventFuncXRSession_XRInputSourceEvent(listener)\n\t_this.Value_JS.Set(\"onselect\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "2477fa9270c8fb9b64052c7ba9cde443", "score": "0.4766391", "text": "func NewSetRefClosure(ctx context.Context, vr types.ValueReader, ref types.Ref) (RefClosure, error) {\n\ts, err := transitiveClosure(ctx, vr, ref)\n\tif err != nil {\n\t\treturn setRefClosure{}, err\n\t}\n\n\treturn setRefClosure{HashSet: s}, nil\n}", "title": "" }, { "docid": "805685dbc96d597ff5569279a9f2f16d", "score": "0.4747761", "text": "func (session EditSession) OnChangeTabSize(f func()) {\n\tsession.Call(\"on\", \"changeTabSize\", f)\n}", "title": "" }, { "docid": "0e0f9e64987b103f98ff7622a27ef3a0", "score": "0.47474173", "text": "func (tb *TextBox) SetTextChanged(callback TextChangeCallback) {\n\ttb.textChangeCallback = callback\n}", "title": "" }, { "docid": "4ad2197609c346d89fdf01f57dc0701e", "score": "0.47299773", "text": "func (_this *XRReferenceSpace) OnReset() domcore.EventHandlerFunc {\n\tvar ret domcore.EventHandlerFunc\n\tvalue := _this.Value_JS.Get(\"onreset\")\n\tif value.Type() != js.TypeNull && value.Type() != js.TypeUndefined {\n\t\tret = domcore.EventHandlerFromJS(value)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "da321c4ae5ecc848514689188f2f3cea", "score": "0.46921757", "text": "func (interpreter *Interpreter) SetOnFunctionInvocationHandler(function OnFunctionInvocationFunc) {\n\tinterpreter.onFunctionInvocation = function\n}", "title": "" }, { "docid": "aa68ba470f45ca24d42d51adb1d4c2d1", "score": "0.46859238", "text": "func (session EditSession) OnChangeOverwrite(f func()) {\n\tsession.Call(\"on\", \"changeOverwrite\", f)\n}", "title": "" }, { "docid": "22bf8b17d00b6cd0c0175d4dde511844", "score": "0.46697664", "text": "func (l *SettableLimit) NotifyOnChange(consumer core.LimitChangeListener) {\n\tl.mu.Lock()\n\tl.listeners = append(l.listeners, consumer)\n\tl.mu.Unlock()\n}", "title": "" }, { "docid": "e125342ba3256a3417fdc1794c94dfc9", "score": "0.46614546", "text": "func SetImageInfoGetFunc(f ImageInfoGet) {\n\tImageInfoGetFunc = f\n}", "title": "" }, { "docid": "3f6b2ff0894f871ae85324ac3b274013", "score": "0.46608865", "text": "func (f *fakeSwarming) setCallback(fn func()) {\n\tf.callback = fn\n}", "title": "" }, { "docid": "1f72e24a99c8f3b7f04f47d370c088cc", "score": "0.46553487", "text": "func (s *Settings) ClearOnChange(key string) {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\tdelete(s.onChangeCallbacks, key)\n}", "title": "" }, { "docid": "4deb9fe11b883bf5fb7d504953f129ef", "score": "0.46173483", "text": "func (mock *Fsys) SetFuncOpen(impl func(p0 string) (io.ReadCloser, error)) *Fsys {\n\tmock.impl.Open = impl\n\treturn mock\n}", "title": "" }, { "docid": "46a8d46a19d932311b7808f046959b76", "score": "0.4613347", "text": "func (v *Value) Set(f func() interface{}) {\n\tv.mu.Lock()\n\tdefer v.mu.Unlock()\n\tv.value = f()\n}", "title": "" }, { "docid": "c82a28e8fb9752754e9fa563b7b7b8f7", "score": "0.4610448", "text": "func (st *Pool) SetWorkerFunc(fn PoolFunc) {\n\tst.defaultWorkerFunc = fn\n}", "title": "" }, { "docid": "08840b57d04a82ba69cee63b7e674414", "score": "0.4610251", "text": "func (m *mStorageMockClose) Set(f func(p context.Context) (r error)) *StorageMock {\n\tm.mock.CloseFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "598849d00be836d5e2a0c5de43828cad", "score": "0.4601897", "text": "func (session EditSession) OnChangeBreakpoint(f func()) {\n\tsession.Call(\"on\", \"changeBreakpoint\", f)\n}", "title": "" }, { "docid": "b2e44199f3e3ff838d112f7b88029130", "score": "0.4587386", "text": "func (m *mCoordinatorMockVirtualValidatorsForObject) Set(f func(p context.Context, p1 insolar.ID, p2 insolar.PulseNumber) (r []insolar.Reference, r1 error)) *CoordinatorMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.VirtualValidatorsForObjectFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "cfce4c83cae3162567fcf40c4cdf8590", "score": "0.45813492", "text": "func (pbr *PbReader) SetCb(cb audio.OnDataCb) {\n\tpbr.Lock()\n\tdefer pbr.Unlock()\n\tpbr.options.Callback = cb\n}", "title": "" }, { "docid": "b8a10f7de882b201ff2810bc3b9c4244", "score": "0.4564305", "text": "func (sm *StackManager) SetEventHandler(fn func(interface{})) {\n\tsm.emit = fn\n}", "title": "" }, { "docid": "ed576e9f23349022227e47d9effe533c", "score": "0.4553226", "text": "func (f funcValue) Set(s string) error { return f(s) }", "title": "" }, { "docid": "34b946d135d3bb92fbb69c3f1c1e9261", "score": "0.45453683", "text": "func SetImageSetFunc(f ImageSet) {\n\tImageSetFunc = f\n}", "title": "" }, { "docid": "884b760b4973cce06d2522d3d355f052", "score": "0.45238242", "text": "func (view *View) OnChangeURL(cb func(string)) {\n\tview.onChangeURL = cb\n\tp := unsafe.Pointer(view.view)\n\n\tif cb == nil {\n\t\tcallbackData[p] = nil\n\t\tC.set_view_change_url_callback(view.view, nil)\n\t} else {\n\t\tcallbackData[p] = view\n\t\tC.set_view_change_url_callback(view.view, p)\n\t}\n}", "title": "" }, { "docid": "d530ef2020d4793a905e52e95b240192", "score": "0.45173445", "text": "func (_this *BatteryManager) SetOnDischargingTimeChange(listener func(event *domcore.Event, currentTarget *BatteryManager)) js.Func {\n\tcb := eventFuncBatteryManager_domcore_Event(listener)\n\t_this.Value_JS.Set(\"ondischargingtimechange\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "eec88106af3d33a1ba51d91b1149537f", "score": "0.45121357", "text": "func (m *mCleanerMockNotifyAboutPulse) Set(f func(p context.Context, p1 insolar.PulseNumber)) *CleanerMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.NotifyAboutPulseFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "2b3d41626ecbaa8c71b2705a5999c109", "score": "0.45038334", "text": "func SetAcquireLoggerFunc(fn AcquireLoggerFunc) {\n\tacquireLoggerFuncMu.Lock()\n\tdefer acquireLoggerFuncMu.Unlock()\n\n\tacquireLoggerFunc = fn\n}", "title": "" }, { "docid": "f151b220a5d5cab3c8247d0dde778fc8", "score": "0.45016798", "text": "func (gm *StringInterfaceMap) GetOrSetFunc(key string, f func() interface{}) interface{} {\n\tif v := gm.Get(key); v == nil {\n\t\treturn gm.doSetWithLockCheck(key, f())\n\t} else {\n\t\treturn v\n\t}\n}", "title": "" }, { "docid": "1d730e8bb38654782b2e7ccaa19d9d0d", "score": "0.44950163", "text": "func (mmGetCode *mProxyImplementationMockGetCode) Set(f func(ctx context.Context, tp1 *common.Transcript, u1 rpctypes.UpGetCodeReq, up1 *rpctypes.UpGetCodeResp) (err error)) *ProxyImplementationMock {\n\tif mmGetCode.defaultExpectation != nil {\n\t\tmmGetCode.mock.t.Fatalf(\"Default expectation is already set for the ProxyImplementation.GetCode method\")\n\t}\n\n\tif len(mmGetCode.expectations) > 0 {\n\t\tmmGetCode.mock.t.Fatalf(\"Some expectations are already set for the ProxyImplementation.GetCode method\")\n\t}\n\n\tmmGetCode.mock.funcGetCode = f\n\treturn mmGetCode.mock\n}", "title": "" }, { "docid": "423cc8ccccc04048c8c9d413f41d8650", "score": "0.44795784", "text": "func (g *HttpGetter) SetCallback(f Callback) {\n\tif f == nil {\n\t\tg.OnResponse(nil)\n\t} else {\n\t\tg.OnResponse(ResponseCallback(f))\n\t}\n}", "title": "" }, { "docid": "7b55f689aa5ca01637a790807cf7f87f", "score": "0.4479345", "text": "func (m *mStorageMockWriteBlock) Set(f func(p context.Context, p1 block.Block) (r error)) *StorageMock {\n\tm.mock.WriteBlockFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "786c7740cf3f3c63a83f28e91f92773e", "score": "0.44666344", "text": "func (mock *Fsys) SetFuncWrite(impl func(p0 string, p1 []byte) error) *Fsys {\n\tmock.impl.Write = impl\n\treturn mock\n}", "title": "" }, { "docid": "7d9d28c67027c63ef94da3b127b79610", "score": "0.44618702", "text": "func (m *mNodeIntroProfileMockGetShortNodeID) Set(f func() (r insolar.ShortNodeID)) *NodeIntroProfileMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.GetShortNodeIDFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "0cd74463907e32085a68fee3bb3358b8", "score": "0.4460656", "text": "func (fn GetOnlyFunc) Set(string) []byte { return nil }", "title": "" }, { "docid": "cce26214cf2a564fd60940d259ea28e1", "score": "0.4456178", "text": "func KillOnChange() Config {\n\treturn func(rc *RunCommand) {\n\t\trc.killOnChange = true\n\t}\n}", "title": "" }, { "docid": "3d3ab2de3a013966dbb35fbd059c0f58", "score": "0.44556797", "text": "func (b *LocalBackend) SetDecompressor(fn func() (controlclient.Decompressor, error)) {\n\tb.newDecompressor = fn\n}", "title": "" }, { "docid": "38f39ad328229070e41ccb279a5c5e7a", "score": "0.44459596", "text": "func SetOpenFunc(f func(dsn string) (driver.Conn, error)) {\n\td.openFunc = f\n}", "title": "" }, { "docid": "10f81db3358037ee46856c6b8e07865b", "score": "0.44393864", "text": "func (m *mCoordinatorMockLightValidatorsForJet) Set(f func(p context.Context, p1 insolar.ID, p2 insolar.PulseNumber) (r []insolar.Reference, r1 error)) *CoordinatorMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.LightValidatorsForJetFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "cb5bbfabe1447398fb90a1e96f5fdef7", "score": "0.44143856", "text": "func SetCommitFunc(f func() error) {\n\td.conn.commitFunc = f\n}", "title": "" }, { "docid": "df59b8ec7786f96e7bcafebae36c4fa7", "score": "0.4405447", "text": "func (_this *BatteryManager) OnChargingChange() domcore.EventHandlerFunc {\n\tvar ret domcore.EventHandlerFunc\n\tvalue := _this.Value_JS.Get(\"onchargingchange\")\n\tif value.Type() != js.TypeNull && value.Type() != js.TypeUndefined {\n\t\tret = domcore.EventHandlerFromJS(value)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "bbee5f7de055a15311dc9d16ae264272", "score": "0.43902117", "text": "func (m *mHostNetworkMockRegisterRequestHandler) Set(f func(p types.PacketType, p1 network.RequestHandler)) *HostNetworkMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.RegisterRequestHandlerFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "62d8fda7d5eaf57cfbac8a424ded9b41", "score": "0.4387193", "text": "func (m *mCoordinatorMockLightValidatorsForObject) Set(f func(p context.Context, p1 insolar.ID, p2 insolar.PulseNumber) (r []insolar.Reference, r1 error)) *CoordinatorMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.LightValidatorsForObjectFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "f012959093e6557fc9d3a4986758513e", "score": "0.4383452", "text": "func (m *mCoordinatorMockHeavy) Set(f func(p context.Context) (r *insolar.Reference, r1 error)) *CoordinatorMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.HeavyFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "b5c1ffe379172c289819ef3a536493db", "score": "0.43828666", "text": "func (st *Store) callOnChange(id string, before, after interface{}) {\n\tfor _, cb := range st.onChange {\n\t\tcb(id, before, after)\n\t}\n}", "title": "" }, { "docid": "b73abcd135f5cdaa5b590d6f3af1e7ce", "score": "0.438278", "text": "func (tsr *String) SetFunc(fun EvalFunc) {\n\tfor j, vl := range tsr.Values {\n\t\tval := StringToFloat64(vl)\n\t\tif !tsr.IsNull1D(j) && !math.IsNaN(val) {\n\t\t\ttsr.Values[j] = Float64ToString(fun(j, val))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "51d4e3888096c0ebbbbc2bfeee86aae1", "score": "0.43801126", "text": "func (v Val) Funcref() *Func {\n\tif v.Kind() != KindFuncref {\n\t\tpanic(\"not a funcref\")\n\t}\n\tval := C.go_wasmtime_val_funcref_get(v.ptr())\n\tif val.store_id == 0 {\n\t\treturn nil\n\t} else {\n\t\treturn mkFunc(val)\n\t}\n}", "title": "" }, { "docid": "717601e10ed47335ad5f0d2cbfddd60e", "score": "0.43795675", "text": "func (m *Mon) RegisterChangeCallback(callback ChangeFunc) (unregister func()) {\n\thandle := new(callbackHandle)\n\tm.mu.Lock()\n\tdefer m.mu.Unlock()\n\tm.cbs[handle] = callback\n\treturn func() {\n\t\tm.mu.Lock()\n\t\tdefer m.mu.Unlock()\n\t\tdelete(m.cbs, handle)\n\t}\n}", "title": "" }, { "docid": "11ec0cd944c91d8dc41947dba2d885e7", "score": "0.4373062", "text": "func (c *Checkbox) SetDoneFunc(handler func(key tcell.Key)) *Checkbox {\n\tc.done = handler\n\treturn c\n}", "title": "" }, { "docid": "5eeaf1b5b57c1fcaabf7b65e6216a943", "score": "0.4366831", "text": "func (connection *WebSocketConnection) SetOnClose(cb func()) {\n\tconnection.onCloseCB = cb\n}", "title": "" }, { "docid": "deb51cd41d9cbaf57e1e0e2f79a90090", "score": "0.43626776", "text": "func (session EditSession) OnChangeBackMarker(f func()) {\n\tsession.Call(\"on\", \"changeBackMarker\", f)\n}", "title": "" }, { "docid": "742f15dffa47bcc7af7dc50651322ee5", "score": "0.435394", "text": "func (m *mStorageMockReadGenesisBlock) Set(f func(p context.Context) (r block.Block, r1 error)) *StorageMock {\n\tm.mock.ReadGenesisBlockFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "146b637b76e9813edbf6324bf28bf499", "score": "0.4349095", "text": "func (session EditSession) OnChangeAnnotation(f func()) {\n\tsession.Call(\"on\", \"changeAnnotation\", f)\n}", "title": "" }, { "docid": "87d095134a91c3bb707ab146ebffbfee", "score": "0.43476763", "text": "func (o *FunctionCall) SetFunctionG(ctx context.Context, insert bool, related *Function) error {\n\treturn o.SetFunction(ctx, boil.GetContextDB(), insert, related)\n}", "title": "" }, { "docid": "6d9392e072dfbe4e89792df2e6a30c52", "score": "0.43251616", "text": "func (_this *XRSession) SetOnFocus(listener func(event *domcore.Event, currentTarget *XRSession)) js.Func {\n\tcb := eventFuncXRSession_domcore_Event(listener)\n\t_this.Value_JS.Set(\"onfocus\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "5a8d406f26dc0b572aac7978d9d052f3", "score": "0.43244934", "text": "func (genA *GeneticAlgorithm) SetEncodeRulesFunc(f EncodeRulesFunc) {\n\tgenA.EncodeRules = f\n}", "title": "" }, { "docid": "0ccae777b66c368a92fb8743d2ef1682", "score": "0.43124467", "text": "func SetCopyFunc(f func(io.Writer) error) FileSetting {\n\treturn func(fi *file) {\n\t\tfi.CopyFunc = f\n\t}\n}", "title": "" } ]
a14919b58d1c12fd05a3fa05390209dd
UntagIPBlock indicates an expected call of UntagIPBlock
[ { "docid": "c30bb5c1bcdc8b0f6a2aaac94a8250e5", "score": "0.7472539", "text": "func (mr *MockNsxNetworkProvisionerMockRecorder) UntagIPBlock(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UntagIPBlock\", reflect.TypeOf((*MockNsxNetworkProvisioner)(nil).UntagIPBlock), arg0, arg1)\n}", "title": "" } ]
[ { "docid": "56a454f1fa836da20c68d3727ffac21d", "score": "0.67681414", "text": "func (m *MockNsxNetworkProvisioner) UntagIPBlock(arg0, arg1 string) error {\n\tret := m.ctrl.Call(m, \"UntagIPBlock\", arg0, arg1)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "8686215340a4af93ee26f7e369f48515", "score": "0.6419039", "text": "func (mr *MockNsxNetworkProvisionerMockRecorder) UntagExternalBlocks(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UntagExternalBlocks\", reflect.TypeOf((*MockNsxNetworkProvisioner)(nil).UntagExternalBlocks), arg0)\n}", "title": "" }, { "docid": "67f31110eaeb87134a5c24f0408b63f9", "score": "0.59075564", "text": "func (m *MockNsxNetworkProvisioner) UntagExternalBlocks(arg0 string) error {\n\tret := m.ctrl.Call(m, \"UntagExternalBlocks\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "9e5da04b16f1793b489f3986bcecfaa2", "score": "0.56061536", "text": "func (mr *MockClientMockRecorder) TagIPBlock(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"TagIPBlock\", reflect.TypeOf((*MockClient)(nil).TagIPBlock), arg0, arg1)\n}", "title": "" }, { "docid": "330ea1abf7cd07a063627a39a32ef547", "score": "0.55667865", "text": "func TestBlockHeaderAttackerDropping66(t *testing.T) { testBlockHeaderAttackerDropping(t, ent.ETH66) }", "title": "" }, { "docid": "065a9388e2c03b713372af6139a31491", "score": "0.53985846", "text": "func (mr *MockAppMeshAPIMockRecorder) UntagResource(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UntagResource\", reflect.TypeOf((*MockAppMeshAPI)(nil).UntagResource), arg0)\n}", "title": "" }, { "docid": "b5a1679e9b86cdc9c72e9949b626612f", "score": "0.5314475", "text": "func (mr *MockNsxNetworkProvisionerMockRecorder) UntagTransportZone(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UntagTransportZone\", reflect.TypeOf((*MockNsxNetworkProvisioner)(nil).UntagTransportZone), arg0, arg1)\n}", "title": "" }, { "docid": "1de40a32c000584a05505446bfda0cf8", "score": "0.5313008", "text": "func TestUnneededBuildBlock(t *testing.T) {\n\trequire := require.New(t)\n\tvm, _, _ := defaultVM(t)\n\tvm.ctx.Lock.Lock()\n\tdefer func() {\n\t\trequire.NoError(vm.Shutdown(context.Background()))\n\t\tvm.ctx.Lock.Unlock()\n\t}()\n\t_, err := vm.Builder.BuildBlock(context.Background())\n\trequire.ErrorIs(err, blockbuilder.ErrNoPendingBlocks)\n}", "title": "" }, { "docid": "0599f5218d6fd492efa0a6ddbb36a4bf", "score": "0.5219667", "text": "func (*naiveCryptoService) VerifyBlockAttestation(channelID string, signedBlock *cb.Block) error {\n\treturn nil\n}", "title": "" }, { "docid": "b7a78983dc070716b329598272d8d7ec", "score": "0.51743186", "text": "func (mr *MockAppMeshAPIMockRecorder) UntagResourceRequest(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UntagResourceRequest\", reflect.TypeOf((*MockAppMeshAPI)(nil).UntagResourceRequest), arg0)\n}", "title": "" }, { "docid": "472e5e3e0750812f26cf954edbf80697", "score": "0.5171686", "text": "func (mr *MockClientMockRecorder) UpdateIPBlock(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UpdateIPBlock\", reflect.TypeOf((*MockClient)(nil).UpdateIPBlock), arg0)\n}", "title": "" }, { "docid": "34e665f218f6f10ed7b017d4da3e3aaa", "score": "0.5111722", "text": "func runtime_procUnpin()", "title": "" }, { "docid": "50bdbccddee8c016f3a80fe75fd8008c", "score": "0.5095567", "text": "func TestInvalidBlock(t *testing.T) {\n\teb, rbus := eventbus.New(), rpcbus.New()\n\thlp, hash := Kickstart(eb, rbus, 10, 1*time.Second)\n\thlp.FailOnVerification(true)\n\tevs := hlp.Spawn(hash)\n\n\tres := make(chan struct{}, 1)\n\ttest := func(hash []byte, svs ...*message.StepVotes) {\n\t\tassert.Equal(t, emptyHash[:], hash)\n\t\tassert.Equal(t, 0, len(svs))\n\t\tres <- struct{}{}\n\t}\n\n\taggregator := newAggregator(test, hlp.Handler, hlp.RBus)\n\n\tfor _, ev := range evs {\n\t\tif !assert.NoError(t, aggregator.collectVote(ev)) {\n\t\t\tt.FailNow()\n\t\t}\n\t}\n\n\t<-res\n}", "title": "" }, { "docid": "c75a9676e6fb332cf14cf38cf291374a", "score": "0.5082661", "text": "func TestBlockedEvals_Block_ImmediateUnblock_UnseenClass_Before(t *testing.T) {\n\tt.Parallel()\n\tblocked, _ := testBlockedEvals(t)\n\n\t// Do an unblock prior to blocking\n\tblocked.Unblock(\"v1:123\", 500)\n\n\t// Create a blocked eval that is eligible on a specific node class and add\n\t// it to the blocked tracker.\n\te := mock.Eval()\n\te.Status = structs.EvalStatusBlocked\n\te.EscapedComputedClass = false\n\te.SnapshotIndex = 900\n\tblocked.Block(e)\n\n\t// Verify block caused the eval to be immediately unblocked\n\tblockedStats := blocked.Stats()\n\tif blockedStats.TotalBlocked != 1 && blockedStats.TotalEscaped != 0 {\n\t\tt.Fatalf(\"bad: %#v\", blockedStats)\n\t}\n}", "title": "" }, { "docid": "85f05453958302a19d46c15a097a8297", "score": "0.5066359", "text": "func (b RejectedBlock) FullBlockTestInstance() {}", "title": "" }, { "docid": "5ff628b8df67ead181ae831a7d531eb1", "score": "0.501128", "text": "func TestBlockedEvals_Block_ImmediateUnblock_UnseenClass_After(t *testing.T) {\n\tt.Parallel()\n\tblocked, broker := testBlockedEvals(t)\n\n\t// Do an unblock prior to blocking\n\tblocked.Unblock(\"v1:123\", 1000)\n\n\t// Create a blocked eval that is eligible on a specific node class and add\n\t// it to the blocked tracker.\n\te := mock.Eval()\n\te.Status = structs.EvalStatusBlocked\n\te.EscapedComputedClass = false\n\te.SnapshotIndex = 900\n\tblocked.Block(e)\n\n\t// Verify block caused the eval to be immediately unblocked\n\tblockedStats := blocked.Stats()\n\tif blockedStats.TotalBlocked != 0 && blockedStats.TotalEscaped != 0 {\n\t\tt.Fatalf(\"bad: %#v\", blockedStats)\n\t}\n\n\ttestutil.WaitForResult(func() (bool, error) {\n\t\t// Verify Unblock caused an enqueue\n\t\tbrokerStats := broker.Stats()\n\t\tif brokerStats.TotalReady != 1 {\n\t\t\treturn false, fmt.Errorf(\"bad: %#v\", brokerStats)\n\t\t}\n\n\t\treturn true, nil\n\t}, func(err error) {\n\t\tt.Fatalf(\"err: %s\", err)\n\t})\n}", "title": "" }, { "docid": "7efbaa3150478d035afb0ee373c82cd8", "score": "0.49978814", "text": "func (mock *IAMAPIMock) UntagUserRequestCalls() []struct {\n\tUntagUserInput *iam.UntagUserInput\n} {\n\tvar calls []struct {\n\t\tUntagUserInput *iam.UntagUserInput\n\t}\n\tmock.lockUntagUserRequest.RLock()\n\tcalls = mock.calls.UntagUserRequest\n\tmock.lockUntagUserRequest.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "62fe9e69b56534146be247f5b98cf950", "score": "0.49721122", "text": "func (mock *IAMAPIMock) UntagUserCalls() []struct {\n\tUntagUserInput *iam.UntagUserInput\n} {\n\tvar calls []struct {\n\t\tUntagUserInput *iam.UntagUserInput\n\t}\n\tmock.lockUntagUser.RLock()\n\tcalls = mock.calls.UntagUser\n\tmock.lockUntagUser.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "29e191267d8253ea875d91abea20a632", "score": "0.4949496", "text": "func (c *MockClient) UntagResourceRequest(i *secretsmanager.UntagResourceInput) secretsmanager.UntagResourceRequest {\n\treturn c.MockUntagResourceRequest(i)\n}", "title": "" }, { "docid": "01369c943bf4c21256add7abcdf816fe", "score": "0.49375764", "text": "func TestNewRolloutBlockWithoutOverrides(t *testing.T) {\n\tf := newFixture(t)\n\n\tapp := newApplication(testAppName)\n\trel := newRelease(testReleaseName, app)\n\n\trolloutblock := newRolloutBlock(testRolloutBlockName, shippertesting.TestNamespace)\n\tf.objects = append(f.objects, rolloutblock, app, rel)\n\n\texpectedRolloutBlock := rolloutblock.DeepCopy()\n\texpectedRolloutBlock.Status.Overrides.Application = \"\"\n\texpectedRolloutBlock.Status.Overrides.Release = \"\"\n\n\tf.expectRolloutBlockUpdate(expectedRolloutBlock)\n\tf.run()\n}", "title": "" }, { "docid": "b62de4658143f5b32705d4fb709f89d6", "score": "0.49354166", "text": "func (mr *MockNsxNetworkProvisionerMockRecorder) UntagExternalPools(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UntagExternalPools\", reflect.TypeOf((*MockNsxNetworkProvisioner)(nil).UntagExternalPools), arg0)\n}", "title": "" }, { "docid": "078b4c465b2b56a1be1add1662606fdf", "score": "0.49126107", "text": "func (mock *MockIpam) UnmapEndpointIP(\n\tctx context.Context,\n\tin *liqonetIpam.UnmapRequest,\n\topts ...grpc.CallOption) (*liqonetIpam.UnmapResponse, error) {\n\treturn &liqonetIpam.UnmapResponse{}, nil\n}", "title": "" }, { "docid": "f4fa8460999f35522f20417a8a0ca6dc", "score": "0.4912184", "text": "func TestIPUsedUPInSubnet(t *testing.T) {\n\tconf, allocator := setup(\"10.0.0.0/29\", \"\", \"\", t)\n\n\tgomock.InOrder(\n\t\tallocator.EXPECT().Exists(config.LastKnownIPKey).Return(true, nil),\n\t\tallocator.EXPECT().Get(config.LastKnownIPKey).Return(\"10.0.0.3\", nil),\n\t\tallocator.EXPECT().SetLastKnownIP(net.ParseIP(\"10.0.0.3\")),\n\t\tallocator.EXPECT().GetAvailableIP(gomock.Any()).Return(\"\", errors.New(\"no available ip in the subnet\")),\n\t)\n\n\tassignedAddress, err := getIPV4Address(allocator, conf)\n\tassert.Error(t, err, \"no available ip in the subnet should cause error\")\n\tassert.Nil(t, assignedAddress, \"error will cause ip not be assigned\")\n}", "title": "" }, { "docid": "12df6c39cf8e6ade708981236ebea047", "score": "0.48862654", "text": "func TestMsgUnbond(t *testing.T) {\n\ttests := []struct {\n\t\tname string\n\t\tdelegatorAddr sdk.Address\n\t\tcandidateAddr sdk.Address\n\t\tshares string\n\t\texpectPass bool\n\t}{\n\t\t{\"max unbond\", addrs[0], addrs[1], \"MAX\", true},\n\t\t{\"decimal unbond\", addrs[0], addrs[1], \"0.1\", true},\n\t\t{\"negative decimal unbond\", addrs[0], addrs[1], \"-0.1\", false},\n\t\t{\"zero unbond\", addrs[0], addrs[1], \"0.0\", false},\n\t\t{\"invalid decimal\", addrs[0], addrs[0], \"sunny\", false},\n\t\t{\"empty delegator\", emptyAddr, addrs[0], \"0.1\", false},\n\t\t{\"empty candidate\", addrs[0], emptyAddr, \"0.1\", false},\n\t}\n\n\tfor _, tc := range tests {\n\t\tmsg := NewMsgUnbond(tc.delegatorAddr, tc.candidateAddr, tc.shares)\n\t\tif tc.expectPass {\n\t\t\tassert.Nil(t, msg.ValidateBasic(), \"test: %v\", tc.name)\n\t\t} else {\n\t\t\tassert.NotNil(t, msg.ValidateBasic(), \"test: %v\", tc.name)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3e074527248e8059d9c50b657341de05", "score": "0.4879508", "text": "func (mr *MocktortoiseMockRecorder) OnBlock(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"OnBlock\", reflect.TypeOf((*Mocktortoise)(nil).OnBlock), arg0)\n}", "title": "" }, { "docid": "bf9e8087b2868e8bc59fd0b2b98b317d", "score": "0.48721042", "text": "func TestUnMarshal(t *testing.T) {\n\thash, _ := crypto.RandEntropy(32)\n\thdr := header.Mock()\n\thdr.BlockHash = hash\n\n\t// mock candidate\n\tgenesis := genesis.Decode()\n\tse := message.MockNewBlock(hdr, *genesis)\n\n\tbuf := new(bytes.Buffer)\n\tassert.NoError(t, message.MarshalNewBlock(buf, se))\n\n\tother := &message.NewBlock{}\n\tassert.NoError(t, message.UnmarshalNewBlock(buf, other))\n\tassert.True(t, se.Equal(*other))\n}", "title": "" }, { "docid": "099ed591c13be5558f72b8df13673739", "score": "0.4841249", "text": "func TestMissingHeaderAttack66Full(t *testing.T) { testMissingHeaderAttack(t, ent.ETH66, FullSync) }", "title": "" }, { "docid": "f3c0ed9330ba5cc143efc76fa972120a", "score": "0.48213214", "text": "func (mr *MockNsxNetworkProvisionerMockRecorder) CheckIPBlock(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"CheckIPBlock\", reflect.TypeOf((*MockNsxNetworkProvisioner)(nil).CheckIPBlock), arg0)\n}", "title": "" }, { "docid": "d80671e5518f088c16a3f13fb83a2de0", "score": "0.48207846", "text": "func handleUniswapTrade(tx *types.Transaction, client *ethclient.Client, topSnipe chan *big.Int) {\n\n\tUNISWAPBLOCK = true\n\ttxFunctionHash := [4]byte{}\n\tcopy(txFunctionHash[:], tx.Data()[:4])\n\tswitch txFunctionHash {\n\n\tcase swapExactETHForTokens:\n\t\tif global.Sandwicher == true {\n\t\t\tHandleSwapExactETHForTokens(tx, client)\n\t\t}\n\tcase addLiquidityETH:\n\t\tif global.PCS_ADDLIQ == true {\n\t\t\tHandleAddLiquidityETH(tx, client, topSnipe)\n\t\t}\n\tcase addLiquidity:\n\t\tif global.PCS_ADDLIQ == true {\n\t\t\tHandleAddLiquidity(tx, client, topSnipe)\n\t\t}\n\t}\n\tUNISWAPBLOCK = false\n}", "title": "" }, { "docid": "6a42f222609968dcdf9a857dfe7a747f", "score": "0.4818245", "text": "func (b AcceptedBlock) FullBlockTestInstance() {}", "title": "" }, { "docid": "31501b16b9249fd24585de9e21394b90", "score": "0.4805592", "text": "func (ts *TokenStaking) CallUndelegateAt(\n\t_operator common.Address,\n\t_undelegationTimestamp *big.Int,\n\tblockNumber *big.Int,\n) error {\n\tvar result interface{} = nil\n\n\terr := chainutil.CallAtBlock(\n\t\tts.transactorOptions.From,\n\t\tblockNumber, nil,\n\t\tts.contractABI,\n\t\tts.caller,\n\t\tts.errorResolver,\n\t\tts.contractAddress,\n\t\t\"undelegateAt\",\n\t\t&result,\n\t\t_operator,\n\t\t_undelegationTimestamp,\n\t)\n\n\treturn err\n}", "title": "" }, { "docid": "82113620a07732bd45371864c8f6753b", "score": "0.48042005", "text": "func (s *Session) unblockPin(pukpin []byte) error {\n\tif _, err := s.Channel.transmitEncrypted(claSCWallet, insUnblockPin, 0, 0, pukpin); err != nil {\n\t\treturn err\n\t}\n\ts.verified = true\n\treturn nil\n}", "title": "" }, { "docid": "62e221bcf04b2b15e0b5525b918ef284", "score": "0.4786854", "text": "func (mr *MockNsxNetworkProvisionerMockRecorder) DeleteIPBlockSubnet(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteIPBlockSubnet\", reflect.TypeOf((*MockNsxNetworkProvisioner)(nil).DeleteIPBlockSubnet), arg0)\n}", "title": "" }, { "docid": "366c1f6bbed4f2105b11dba5335ad7c6", "score": "0.47747213", "text": "func (mr *MockFactoryMockRecorder) DeleteTipBlock(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteTipBlock\", reflect.TypeOf((*MockFactory)(nil).DeleteTipBlock), arg0, arg1)\n}", "title": "" }, { "docid": "b92284d48962df16bca44135083000d3", "score": "0.475312", "text": "func (_IUniswapV2Callee *IUniswapV2CalleeTransactor) UniswapV2Call(opts *bind.TransactOpts, sender common.Address, amount0 *big.Int, amount1 *big.Int, data []byte) (*types.Transaction, error) {\n\treturn _IUniswapV2Callee.contract.Transact(opts, \"uniswapV2Call\", sender, amount0, amount1, data)\n}", "title": "" }, { "docid": "cecdecc841fff280961047cfc5e442c3", "score": "0.47461063", "text": "func DummyInternalCommitCallback(b *Block) error {\n\treturn nil\n}", "title": "" }, { "docid": "351b6a0783c30addbf4041a28ecc226d", "score": "0.47432554", "text": "func TestMsgRemoveLiquidity(t *testing.T) {\n\ttests := []struct {\n\t\tname string\n\t\tmsg MsgRemoveLiquidity\n\t\texpectPass bool\n\t}{\n\t\t{\"no withdraw coin\", NewMsgRemoveLiquidity(amt, sdk.Coin{}, sdk.OneInt(), deadline, sender), false},\n\t\t{\"zero withdraw coin\", NewMsgRemoveLiquidity(amt, sdk.NewCoin(unidenom, sdk.ZeroInt()), sdk.OneInt(), deadline, sender), false},\n\t\t{\"invalid minimum token amount\", NewMsgRemoveLiquidity(sdk.NewInt(-100), withdrawLiquidity, sdk.OneInt(), deadline, sender), false},\n\t\t{\"invalid minimum iris amount\", NewMsgRemoveLiquidity(amt, withdrawLiquidity, sdk.NewInt(-100), deadline, sender), false},\n\t\t{\"deadline not initialized\", NewMsgRemoveLiquidity(amt, withdrawLiquidity, sdk.OneInt(), emptyTime, sender), false},\n\t\t{\"empty sender\", NewMsgRemoveLiquidity(amt, withdrawLiquidity, sdk.OneInt(), deadline, emptyAddr), false},\n\t\t{\"valid MsgRemoveLiquidity\", NewMsgRemoveLiquidity(amt, withdrawLiquidity, sdk.OneInt(), deadline, sender), true},\n\t}\n\n\tfor _, tc := range tests {\n\t\tt.Run(tc.name, func(t *testing.T) {\n\t\t\terr := tc.msg.ValidateBasic()\n\t\t\tif tc.expectPass {\n\t\t\t\trequire.Nil(t, err)\n\t\t\t} else {\n\t\t\t\trequire.NotNil(t, err)\n\t\t\t}\n\t\t})\n\t}\n\n}", "title": "" }, { "docid": "5a12fbaa21bfe7ef34346a324f1bbadb", "score": "0.4743188", "text": "func TestNewGlobalRolloutBlockWithoutOverrides(t *testing.T) {\n\tf := newFixture(t)\n\n\tapp := newApplication(testAppName)\n\trel := newRelease(testReleaseName, app)\n\n\trolloutblock := newRolloutBlock(testRolloutBlockName, shipper.GlobalRolloutBlockNamespace)\n\tf.objects = append(f.objects, rolloutblock, app, rel)\n\n\texpectedRolloutBlock := rolloutblock.DeepCopy()\n\texpectedRolloutBlock.Status.Overrides.Application = \"\"\n\texpectedRolloutBlock.Status.Overrides.Release = \"\"\n\n\tf.expectRolloutBlockUpdate(expectedRolloutBlock)\n\tf.run()\n}", "title": "" }, { "docid": "949d36222996828d262801b39a7aa8b5", "score": "0.47204745", "text": "func DummyInternalCommitCallback(b *ttypes.Block) error {\n\treturn nil\n}", "title": "" }, { "docid": "99ece82e35d6d9230a2507d4047c0b40", "score": "0.47042286", "text": "func TestReadBlockAbort(t *testing.T) {\n\t// test subject with blocking pipe attached\n\tpr, pw := io.Pipe()\n\tdefer pw.Close()\n\tr := NewReader(pr, time.Hour)\n\n\t// ensure read routine\n\ttime.Sleep(9 * time.Millisecond)\n\tif dump := stackDump(); !strings.Contains(dump, readRoutineStackEl) {\n\t\tt.Fatalf(\"can't locate read routine element %q in:\\n%s\", readRoutineStackEl, dump)\n\t}\n\n\tr.Close()\n\tif dump := stackDump(); strings.Contains(dump, readRoutineStackEl) {\n\t\tt.Errorf(\"read routine element %q still present in:\\n%s\", readRoutineStackEl, dump)\n\t}\n}", "title": "" }, { "docid": "7ff988edea1711ca2bcbeb647c2b4c6a", "score": "0.46937063", "text": "func TestReadUnembeddedBlockChanges(t *testing.T) {\n\ttest(t,\n\t\tblockChangeSize(5), users(\"alice\", \"bob\"),\n\t\tas(alice,\n\t\t\twrite(\"a/b\", \"hello\"),\n\t\t),\n\t\tas(bob,\n\t\t\tread(\"a/b\", \"hello\"),\n\t\t\twrite(\"a/c\", \"hello2\"),\n\t\t\twrite(\"a/d\", \"hello3\"),\n\t\t\twrite(\"a/e\", \"hello4\"),\n\t\t\twrite(\"a/f\", \"hello5\"),\n\t\t),\n\t\tas(alice,\n\t\t\tlsdir(\"a\", m{\"b\": \"FILE\", \"c\": \"FILE\", \"d\": \"FILE\", \"e\": \"FILE\", \"f\": \"FILE\"}),\n\t\t\tread(\"a/b\", \"hello\"),\n\t\t\tread(\"a/c\", \"hello2\"),\n\t\t\tread(\"a/d\", \"hello3\"),\n\t\t\tread(\"a/e\", \"hello4\"),\n\t\t\tread(\"a/f\", \"hello5\"),\n\t\t),\n\t)\n}", "title": "" }, { "docid": "3c326c9a0669e943cb98aead5e067b43", "score": "0.46928066", "text": "func (uax14 *LineWrap) unblock() {\n\tuax14.blockedRI = false\n}", "title": "" }, { "docid": "5f38f5c284bf866ace1c575ad4272fa1", "score": "0.46833718", "text": "func (m *MockClient) TagIPBlock(arg0 string, arg1 []*models.Tag) (*models.IPBlock, error) {\n\tret := m.ctrl.Call(m, \"TagIPBlock\", arg0, arg1)\n\tret0, _ := ret[0].(*models.IPBlock)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "eb5b4909a18f8d165c086e977613a62c", "score": "0.46829122", "text": "func DisconnectTip(param *msg.BitcoinParams, state *core.ValidationState, fBare bool) bool {\n\n\tindexDelete := GChainState.ChainActive.Tip()\n\tif indexDelete == nil {\n\t\tpanic(\"the chain tip element should not equal nil\")\n\t}\n\t// Read block from disk.\n\tvar block core.Block\n\tif !ReadBlockFromDisk(&block, indexDelete, param) {\n\t\treturn AbortNode(state, \"Failed to read block\", \"\")\n\t}\n\n\t// Apply the block atomically to the chain state.\n\tnStart := utils.GetMockTimeInMicros()\n\t{\n\t\tview := utxo.NewCoinViewCacheByCoinview(GCoinsTip)\n\t\thash := indexDelete.GetBlockHash()\n\t\tif DisconnectBlock(&block, indexDelete, view) != DisconnectOk {\n\t\t\tlogs.Error(fmt.Sprintf(\"DisconnectTip(): DisconnectBlock %s failed \", hash.ToString()))\n\t\t\treturn false\n\t\t}\n\t\tflushed := view.Flush()\n\t\tif !flushed {\n\t\t\tpanic(\"view flush error !!!\")\n\t\t}\n\t}\n\t// replace implement with log.Print(in C++).\n\tlog.Print(\"bench\", \"debug\", \" - Disconnect block : %.2fms\\n\",\n\t\tfloat64(utils.GetMicrosTime()-nStart)*0.001)\n\n\t// Write the chain state to disk, if necessary.\n\tif !FlushStateToDisk(state, FlushStateIfNeeded, 0) {\n\t\treturn false\n\t}\n\n\tif !fBare {\n\t\t// Resurrect mempool transactions from the disconnected block.\n\t\tvHashUpdate := container.Vector{}\n\t\tfor _, tx := range block.Txs {\n\t\t\t// ignore validation errors in resurrected transactions\n\t\t\tvar stateDummy core.ValidationState\n\t\t\tif tx.IsCoinBase() || !AcceptToMemoryPool(param, GMemPool, &stateDummy, tx,\n\t\t\t\tfalse, nil, nil, true, 0) {\n\t\t\t\tGMemPool.Lock()\n\t\t\t\tGMemPool.RemoveTxRecursive(tx, mempool.REORG)\n\t\t\t\tGMemPool.Unlock()\n\t\t\t} else if GMemPool.Exists(tx.Hash) {\n\t\t\t\tvHashUpdate.PushBack(tx.Hash)\n\t\t\t}\n\t\t}\n\t\t// AcceptToMemoryPool/addUnchecked all assume that new memPool entries\n\t\t// have no in-memPool children, which is generally not true when adding\n\t\t// previously-confirmed transactions back to the memPool.\n\t\t// UpdateTransactionsFromBlock finds descendants of any transactions in\n\t\t// this block that were added back and cleans up the memPool state.\n\t\tGMemPool.UpdateTransactionsFromBlock(vHashUpdate)\n\t}\n\n\t// Update chainActive and related variables.\n\tUpdateTip(param, indexDelete.Prev)\n\t// Let wallets know transactions went from 1-confirmed to\n\t// 0-confirmed or conflicted:\n\tfor _, tx := range block.Txs {\n\t\t// todo !!! add GetMainSignals().SyncTransaction()\n\t\t_ = tx\n\t}\n\treturn true\n}", "title": "" }, { "docid": "86f39fb96b6d5b6ba89ce12dc956e8c5", "score": "0.46826002", "text": "func (mr *MockClientMockRecorder) ReadIPBlock(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ReadIPBlock\", reflect.TypeOf((*MockClient)(nil).ReadIPBlock), arg0)\n}", "title": "" }, { "docid": "052fb24823fb6dc27f8d0444d4562589", "score": "0.46669948", "text": "func TestBlocksProviderImpl_GetBlockFromTheOldest(t *testing.T) {\n\tmakeTestCase(uint64(0))(t)\n}", "title": "" }, { "docid": "3a8b2774425860e6affc226ff967cb3e", "score": "0.46659026", "text": "func (this *ElementaryCyclesSearch) unblock(node int) {\n\tthis.blocked[node] = false\n\tBnode := this.B[node]\n\tfor len(Bnode) > 0 {\n\t\tw := Bnode[0]\n\t\tBnode = append(Bnode[:0], Bnode[0+1:]...) // remove first element - TODO : check if element are shifted correctly (i.e index 1 becomes 0 etc.)\n\t\tif this.blocked[w] {\n\t\t\tthis.unblock(w)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1dc8229e412e7a313794279b5dbd5220", "score": "0.4663707", "text": "func TestAuthNetAuthVoid(t *testing.T) {\n\tclient := authorizenet.NewClient(getEnv(\"AUTH_NET_LOGIN_ID\"), getEnv(\"AUTH_NET_TXN_KEY\"), common.Sandbox)\n\tauthRequest := sleet_testing.BaseAuthorizationRequest()\n\tauthRequest.Amount.Amount = int64(randomdata.Number(100))\n\tauth, err := client.Authorize(authRequest)\n\tif err != nil {\n\t\tt.Error(\"Authorize request should not have failed\")\n\t}\n\n\tif !auth.Success {\n\t\tt.Error(\"Resulting auth should have been successful\")\n\t}\n\n\tvoidRequest := &sleet.VoidRequest{\n\t\tTransactionReference: auth.TransactionReference,\n\t}\n\tvoid, err := client.Void(voidRequest)\n\tif err != nil {\n\t\tt.Error(\"Void request should not have failed\")\n\t}\n\n\tif !void.Success {\n\t\tt.Error(\"Resulting void should have been successful\")\n\t}\n}", "title": "" }, { "docid": "e2ca7b0c9ae1cbe362cbafcc64edd8f6", "score": "0.4648461", "text": "func TestAuthNetAuthVoid(t *testing.T) {\n\tclient := authorizenet.NewClient(getEnv(\"AUTH_NET_LOGIN_ID\"), getEnv(\"AUTH_NET_TXN_KEY\"), common.Sandbox)\n\tauthRequest := sleet_testing.BaseAuthorizationRequestWithEmailPhoneNumber()\n\tauthRequest.Amount.Amount = int64(randomdata.Number(100))\n\tauth, err := client.Authorize(authRequest)\n\tif err != nil {\n\t\tt.Error(\"Authorize request should not have failed\")\n\t}\n\n\tif !auth.Success {\n\t\tt.Error(\"Resulting auth should have been successful\")\n\t}\n\n\tvoidRequest := &sleet.VoidRequest{\n\t\tTransactionReference: auth.TransactionReference,\n\t}\n\tvoid, err := client.Void(voidRequest)\n\tif err != nil {\n\t\tt.Error(\"Void request should not have failed\")\n\t}\n\n\tif !void.Success {\n\t\tt.Error(\"Resulting void should have been successful\")\n\t}\n}", "title": "" }, { "docid": "2b485cd3e7e197a13c1aa4ae7860d856", "score": "0.46325508", "text": "func TestIncrementMalformedPacketsReceived(t *testing.T) {\n\tc := context.New(t, []stack.TransportProtocolFactory{udp.NewProtocol, icmp.NewProtocol6, icmp.NewProtocol4})\n\tdefer c.Cleanup()\n\n\tc.CreateEndpoint(ipv6.ProtocolNumber, udp.ProtocolNumber)\n\t// Bind to wildcard.\n\tif err := c.EP.Bind(tcpip.FullAddress{Port: context.StackPort}); err != nil {\n\t\tc.T.Fatalf(\"Bind failed: %s\", err)\n\t}\n\n\tpayload := newRandomPayload(arbitraryPayloadSize)\n\th := context.UnicastV6.MakeHeader4Tuple(context.Incoming)\n\tbuf := context.BuildV6UDPPacket(payload, h, testTOS, testTTL, false)\n\n\t// Invalidate the UDP header length field.\n\tu := header.UDP(buf[header.IPv6MinimumSize:])\n\tu.SetLength(u.Length() + 1)\n\tc.InjectPacket(header.IPv6ProtocolNumber, buf)\n\n\tconst want = 1\n\tif got := c.Stack.Stats().UDP.MalformedPacketsReceived.Value(); got != want {\n\t\tt.Errorf(\"got stats.UDP.MalformedPacketsReceived.Value() = %d, want = %d\", got, want)\n\t}\n\tif got := c.EP.Stats().(*tcpip.TransportEndpointStats).ReceiveErrors.MalformedPacketsReceived.Value(); got != want {\n\t\tt.Errorf(\"got EP Stats.ReceiveErrors.MalformedPacketsReceived stats = %d, want = %d\", got, want)\n\t}\n}", "title": "" }, { "docid": "e313175158fbd716dddcce4356374c09", "score": "0.46256378", "text": "func (svc *Pinpoint) RawUntagResource(ctx context.Context, in *SDK.UntagResourceInput) (*SDK.UntagResourceResponse, error) {\n\treturn svc.client.UntagResourceRequest(in).Send(ctx)\n}", "title": "" }, { "docid": "ddfdb701ee121d53fb04b274d877bc5e", "score": "0.46172175", "text": "func (_Staking *StakingTransactor) NodeUnbond(opts *bind.TransactOpts, _tokenAmount *big.Int, _dropburnAmount *big.Int, _nodeAddr common.Address) (*types.Transaction, error) {\n\treturn _Staking.contract.Transact(opts, \"nodeUnbond\", _tokenAmount, _dropburnAmount, _nodeAddr)\n}", "title": "" }, { "docid": "912b1bc662682de1a061d867c729749f", "score": "0.46084496", "text": "func (mr *MockClientMockRecorder) DeleteIPBlockSubnet(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteIPBlockSubnet\", reflect.TypeOf((*MockClient)(nil).DeleteIPBlockSubnet), arg0)\n}", "title": "" }, { "docid": "d596eb4af683f32a0a44d39d76b2c230", "score": "0.46007243", "text": "func (s *VaultSuite) TestWithdrawToVoidWithdrawal() {\n\treceiver := s.account[2]\n\n\t// Do this for a few ERC20s\n\tbalance, err := s.erc20s[0].BalanceOf(nil, s.vaultAddress)\n\ts.Require().NoError(err)\n\n\tval := bigInt(0)\n\texpected := balance\n\n\t// Make transfer.\n\ts.requireTxWithStrictEvents(\n\t\ts.vault.WithdrawTo(s.signer, s.erc20Addresses[0], val, receiver.address()),\n\t)(\n\t\tabi.BasicERC20Transfer{\n\t\t\tFrom: s.vaultAddress, To: receiver.address(), Value: val,\n\t\t},\n\t\tabi.VaultWithdrawal{\n\t\t\tToken: s.erc20Addresses[0], Amount: val, To: receiver.address(),\n\t\t},\n\t)\n\n\t// Check that resultant balance is as expected.\n\tbalance, err = s.erc20s[0].BalanceOf(nil, s.vaultAddress)\n\ts.Require().NoError(err)\n\ts.Equal(expected, balance)\n}", "title": "" }, { "docid": "e705b0e9bed81f686bc3c1d94aca71ee", "score": "0.4597052", "text": "func (s *Sign) Unplace(v *nvim.Nvim, id int, file string) error {\n\tplace := fmt.Sprintf(\"sign unplace %d file=%s\", id, file)\n\tif err := v.Command(place); err != nil {\n\t\treturn errors.Wrap(err, pkgNvimSign)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "908773931fe3cd2ff5ff61775fadafc3", "score": "0.45922914", "text": "func (p *PendingPool) UnsafeRemove(i *metaTx) {\n\tif p.Len() == 0 {\n\t\treturn\n\t}\n\tif p.Len() == 1 && i.bestIndex == 0 {\n\t\tp.worst.Pop()\n\t\tp.best = p.best.UnsafeRemove(i)\n\t\treturn\n\t}\n\t// manually call funcs instead of heap.Pop\n\tp.worst.Swap(i.worstIndex, p.worst.Len()-1)\n\tp.worst.Pop()\n\tp.best.Swap(i.bestIndex, p.best.Len()-1)\n\tp.best = p.best.UnsafeRemove(i)\n}", "title": "" }, { "docid": "5e2dc673daaea3d0360d28c80fb845d1", "score": "0.45633963", "text": "func (mr *MockCloudWatchLogsAPIMockRecorder) UntagLogGroup(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UntagLogGroup\", reflect.TypeOf((*MockCloudWatchLogsAPI)(nil).UntagLogGroup), arg0)\n}", "title": "" }, { "docid": "01c7db53042262c84c84d722534ea58c", "score": "0.45628664", "text": "func (f *feature) whenICallNodeUnstageVolume() error {\n\tf.nodeUnstageVolumeRequest = nil\n\treq := new(csi.NodeUnstageVolumeRequest)\n\tif f.createVolumeResponse == nil {\n\t\treq.VolumeId = \"NoID\"\n\t} else {\n\t\treq.VolumeId = f.volID\n\t}\n\tif f.nodeStageVolumeRequest == nil {\n\t\treq.StagingTargetPath = \"\"\n\t} else {\n\t\treq.StagingTargetPath = f.nodeStageVolumeRequest.StagingTargetPath\n\t}\n\tf.nodeUnstageVolumeRequest = req\n\n\tctx := context.Background()\n\tclient := csi.NewNodeClient(grpcClient)\n\t_, err := client.NodeUnstageVolume(ctx, req)\n\tif err != nil {\n\t\tfmt.Printf(\"Node unstage volume failed: %s\\n\", err.Error())\n\t\tf.addError(err)\n\t} else {\n\t\tfmt.Printf(\"Node unstage volume completed successfully\\n\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "100ede0cf76266a6cbef2495fa839427", "score": "0.45503467", "text": "func (ci *CoreIpfs) Unpin(ctx context.Context, iid ffs.APIID, c cid.Cid) error {\n\tci.lock.Lock()\n\tdefer ci.lock.Unlock()\n\n\treturn ci.removeAndUnpinIfApplies(ctx, iid, c)\n}", "title": "" }, { "docid": "e06a4c312236c3a2ec9478941ccc1de1", "score": "0.45466784", "text": "func (m *MockNsxNetworkProvisioner) UntagTransportZone(arg0, arg1 string) error {\n\tret := m.ctrl.Call(m, \"UntagTransportZone\", arg0, arg1)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4d01224fdd7e6fbb78b49a5b63f738b5", "score": "0.45413902", "text": "func (f *feature) whenICallNodeUnPublishVolume() error {\n\tf.nodeUnpublishVolumeRequest = nil\n\treq := new(csi.NodeUnpublishVolumeRequest)\n\tif f.createVolumeResponse != nil {\n\t\treq.VolumeId = f.volID\n\t} else {\n\t\treq.VolumeId = \"\"\n\t}\n\tif f.nodePublishVolumeRequest != nil {\n\t\treq.TargetPath = f.nodePublishVolumeRequest.TargetPath\n\t} else {\n\t\treq.TargetPath = \"\"\n\t}\n\tf.nodeUnpublishVolumeRequest = req\n\n\tctx := context.Background()\n\tclient := csi.NewNodeClient(grpcClient)\n\t_, err := client.NodeUnpublishVolume(ctx, req)\n\tif err != nil {\n\t\tfmt.Printf(\"Node unpublish volume failed: %s\\n\", err.Error())\n\t\tf.addError(err)\n\t} else {\n\t\tfmt.Printf(\"Node unpublish volume completed successfully\\n\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8286c34df5528d60006173ae960b4c6a", "score": "0.4528609", "text": "func TestCancel66Full(t *testing.T) { testCancel(t, ent.ETH66, FullSync) }", "title": "" }, { "docid": "6c7c9cb72cb6c3fe8c1fad14d8ed4c28", "score": "0.45272282", "text": "func TestMissedTarget(t *testing.T) {\n\tif testing.Short() {\n\t\tt.SkipNow()\n\t}\n\tcst, err := createConsensusSetTester(\"TestMissedTarget\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer cst.closeCst()\n\n\t// Mine a block that doesn't meet the target.\n\tblock, _, target, err := cst.miner.BlockForWork()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tfor block.CheckTarget(target) && block.Nonce[0] != 255 {\n\t\tblock.Nonce[0]++\n\t}\n\tif block.CheckTarget(target) {\n\t\tt.Fatal(\"unable to find a failing target\")\n\t}\n\terr = cst.cs.acceptBlock(block)\n\tif err != ErrMissedTarget {\n\t\tt.Fatalf(\"expected %v, got %v\", ErrMissedTarget, err)\n\t}\n}", "title": "" }, { "docid": "39c6adf89c1681683a154241882be8f3", "score": "0.45206556", "text": "func (mp *metaPartition) UnlinkInode(req *UnlinkInoReq, p *Packet) (err error) {\n\tvar r interface{}\n\tvar val []byte\n\tif req.UniqID > 0 {\n\t\tval = InodeOnceUnlinkMarshal(req)\n\t\tr, err = mp.submit(opFSMUnlinkInodeOnce, val)\n\t} else {\n\t\tino := NewInode(req.Inode, 0)\n\t\tval, err = ino.Marshal()\n\t\tif err != nil {\n\t\t\tp.PacketErrorWithBody(proto.OpErr, []byte(err.Error()))\n\t\t\treturn\n\t\t}\n\t\tr, err = mp.submit(opFSMUnlinkInode, val)\n\t}\n\n\tif err != nil {\n\t\tp.PacketErrorWithBody(proto.OpAgain, []byte(err.Error()))\n\t\treturn\n\t}\n\tmsg := r.(*InodeResponse)\n\tstatus := msg.Status\n\tvar reply []byte\n\tif status == proto.OpOk {\n\t\tresp := &UnlinkInoResp{\n\t\t\tInfo: &proto.InodeInfo{},\n\t\t}\n\t\treplyInfo(resp.Info, msg.Msg, make([]uint32, 0))\n\t\tif reply, err = json.Marshal(resp); err != nil {\n\t\t\tstatus = proto.OpErr\n\t\t\treply = []byte(err.Error())\n\t\t}\n\t}\n\tp.PacketErrorWithBody(status, reply)\n\treturn\n}", "title": "" }, { "docid": "dfeb98bab342831f9ee6c5c75271c996", "score": "0.4516911", "text": "func TestInvalidHeaderRollback66Snap(t *testing.T) { testInvalidHeaderRollback(t, ent.ETH66, SnapSync) }", "title": "" }, { "docid": "25aca5f86df333de6f0c77031d6cf0e4", "score": "0.4515366", "text": "func (bpos *Bpos) verifyIrreversibleInfo(block *types.Block) error {\n\n\tirreversibleInfo := block.IrreversibleInfo\n\tif irreversibleInfo != nil {\n\t\tdynasty := bpos.context.verifyDynasty\n\t\tif len(irreversibleInfo.Signatures) < 2*len(dynasty.delegates)/3 {\n\t\t\tlogger.Errorf(\"the number of irreversibleInfo signatures is not enough. \"+\n\t\t\t\t\"signatures len: %d dynasty len: %d\", len(irreversibleInfo.Signatures),\n\t\t\t\tlen(dynasty.delegates))\n\t\t\treturn errors.New(\"the number of irreversibleInfo signatures is not enough\")\n\t\t}\n\n\t\tremains := []types.AddressHash{}\n\t\tfor _, v := range irreversibleInfo.Signatures {\n\t\t\tif pubkey, ok := crypto.RecoverCompact(irreversibleInfo.Hash[:], v); ok {\n\t\t\t\taddrPubKeyHash, err := types.NewAddressFromPubKey(pubkey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\taddr := *addrPubKeyHash.Hash160()\n\t\t\t\tif types.InAddresses(addr, dynasty.addrs) {\n\t\t\t\t\tif !types.InAddresses(addr, remains) {\n\t\t\t\t\t\tremains = append(remains, addr)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tlogger.Errorf(\"Duplicated irreversible signature %v in block. Hash: %s, Height: %d\",\n\t\t\t\t\t\t\tv, block.BlockHash().String(), block.Header.Height)\n\t\t\t\t\t\treturn errors.New(\"Duplicated irreversible signature in block\")\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tlogger.Errorf(\"Invalid irreversible signature %v in block. Hash: %s, Height: %d\",\n\t\t\t\t\t\tv, block.BlockHash().String(), block.Header.Height)\n\t\t\t\t\treturn errors.New(\"Invalid irreversible signature in block\")\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\treturn errors.New(\"Invalid irreversible signature in block\")\n\t\t\t}\n\t\t}\n\t\tif len(remains) < 2*len(dynasty.delegates)/3 {\n\t\t\tlogger.Errorf(\"Invalid irreversible info in block. Hash: %s, Height: %d,\"+\n\t\t\t\t\" remains: %d\", block.BlockHash().String(), block.Header.Height, len(remains))\n\t\t\treturn errors.New(\"Invalid irreversible info in block\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0b8740d3cb8bccbe3f996e1137a7e541", "score": "0.45021215", "text": "func (p *Policy) unblockAccount(ic *interop.Context, args []stackitem.Item) stackitem.Item {\n\tif !p.NEO.checkCommittee(ic) {\n\t\tpanic(\"invalid committee signature\")\n\t}\n\thash := toUint160(args[0])\n\tif !p.IsBlockedInternal(ic.DAO, hash) {\n\t\treturn stackitem.NewBool(false)\n\t}\n\tkey := append([]byte{blockedAccountPrefix}, hash.BytesBE()...)\n\tp.lock.Lock()\n\tdefer p.lock.Unlock()\n\terr := ic.DAO.DeleteStorageItem(p.ID, key)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tp.isValid = false\n\treturn stackitem.NewBool(true)\n}", "title": "" }, { "docid": "7ef70f69f39692c919181a4d2982070f", "score": "0.45013344", "text": "func TestEventsForCloseSecretUnkown(t *testing.T) {\n\tvar amount int64 = 3\n\tvar expire int64 = 10\n\tinitiator := utest.HOP1\n\tourAddress := utest.ADDR\n\n\tfromRoute, fromTransfer := utest.MakeFrom(big.NewInt(amount), ourAddress, expire, initiator, utils.EmptyHash)\n\n\tstate := &mediatedtransfer.TargetState{\n\t\tOurAddress: ourAddress,\n\t\tFromRoute: fromRoute,\n\t\tFromTransfer: fromTransfer,\n\t\tBlockNumber: expire,\n\t}\n\tevents := eventsForRegisterSecret(state)\n\tassert(t, len(events), 0)\n\tevents = eventsForRegisterSecret(state)\n\tassert(t, len(events), 0)\n\tassert(t, fromTransfer.Secret, utils.EmptyHash)\n}", "title": "" }, { "docid": "2a8e2731af8730e3d4d4490597c7e326", "score": "0.44802687", "text": "func TestIpamDeleteFail(t *testing.T) {\n\tplugin := GetTestResources()\n\n\ttests := []struct {\n\t\tname string\n\t\targs *cniSkel.CmdArgs\n\t\twantErr bool\n\t\twantErrMsg string\n\t}{\n\t\t{\n\t\t\tname: \"ipv4 delete fail\",\n\t\t\targs: &cniSkel.CmdArgs{\n\t\t\t\tStdinData: nwCfg.Serialize(),\n\t\t\t\tContainerID: \"test-container\",\n\t\t\t\tNetns: \"test-container\",\n\t\t\t\tArgs: fmt.Sprintf(\"K8S_POD_NAME=%v;K8S_POD_NAMESPACE=%v\", \"test-pod\", \"test-pod-ns\"),\n\t\t\t\tIfName: eth0IfName,\n\t\t\t},\n\t\t\twantErr: true,\n\t\t\twantErrMsg: \"delete fail\",\n\t\t},\n\t}\n\n\tfor _, tt := range tests {\n\t\ttt := tt\n\t\tt.Run(tt.name, func(t *testing.T) {\n\t\t\terr := plugin.Add(tt.args)\n\t\t\trequire.NoError(t, err)\n\n\t\t\tplugin.ipamInvoker = NewMockIpamInvoker(false, true, false)\n\t\t\terr = plugin.Delete(args)\n\t\t\tif tt.wantErr {\n\t\t\t\trequire.Error(t, err)\n\t\t\t\tassert.Contains(t, err.Error(), tt.wantErrMsg)\n\n\t\t\t\tendpoints, _ := plugin.nm.GetAllEndpoints(nwCfg.Name)\n\t\t\t\trequire.Condition(t, assert.Comparison(func() bool { return len(endpoints) == 0 }), \"Expected 0 but got %v\", len(endpoints))\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "8631bba21d54a2801db2d2e16c5eaf85", "score": "0.4477667", "text": "func TestRemoveOpcodeByData(t *testing.T) {\n\tt.Parallel()\n\n\ttests := []struct {\n\t\tname string\n\t\tbefore []byte\n\t\tremove []byte\n\t\terr error\n\t\tafter []byte\n\t}{\n\t\t{\n\t\t\tname: \"nothing to do\",\n\t\t\tbefore: []byte{txscript.OP_NOP},\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\tafter: []byte{txscript.OP_NOP},\n\t\t},\n\t\t{\n\t\t\tname: \"simple case\",\n\t\t\tbefore: []byte{txscript.OP_DATA_4, 1, 2, 3, 4},\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\tafter: nil,\n\t\t},\n\t\t{\n\t\t\tname: \"simple case (miss)\",\n\t\t\tbefore: []byte{txscript.OP_DATA_4, 1, 2, 3, 4},\n\t\t\tremove: []byte{1, 2, 3, 5},\n\t\t\tafter: []byte{txscript.OP_DATA_4, 1, 2, 3, 4},\n\t\t},\n\t\t{\n\t\t\t// padded to keep it canonical.\n\t\t\tname: \"simple case (pushdata1)\",\n\t\t\tbefore: append(append([]byte{txscript.OP_PUSHDATA1, 76},\n\t\t\t\tbytes.Repeat([]byte{0}, 72)...),\n\t\t\t\t[]byte{1, 2, 3, 4}...),\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\tafter: nil,\n\t\t},\n\t\t{\n\t\t\tname: \"simple case (pushdata1 miss)\",\n\t\t\tbefore: append(append([]byte{txscript.OP_PUSHDATA1, 76},\n\t\t\t\tbytes.Repeat([]byte{0}, 72)...),\n\t\t\t\t[]byte{1, 2, 3, 4}...),\n\t\t\tremove: []byte{1, 2, 3, 5},\n\t\t\tafter: append(append([]byte{txscript.OP_PUSHDATA1, 76},\n\t\t\t\tbytes.Repeat([]byte{0}, 72)...),\n\t\t\t\t[]byte{1, 2, 3, 4}...),\n\t\t},\n\t\t{\n\t\t\tname: \"simple case (pushdata1 miss noncanonical)\",\n\t\t\tbefore: []byte{txscript.OP_PUSHDATA1, 4, 1, 2, 3, 4},\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\tafter: []byte{txscript.OP_PUSHDATA1, 4, 1, 2, 3, 4},\n\t\t},\n\t\t{\n\t\t\tname: \"simple case (pushdata2)\",\n\t\t\tbefore: append(append([]byte{txscript.OP_PUSHDATA2, 0, 1},\n\t\t\t\tbytes.Repeat([]byte{0}, 252)...),\n\t\t\t\t[]byte{1, 2, 3, 4}...),\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\tafter: nil,\n\t\t},\n\t\t{\n\t\t\tname: \"simple case (pushdata2 miss)\",\n\t\t\tbefore: append(append([]byte{txscript.OP_PUSHDATA2, 0, 1},\n\t\t\t\tbytes.Repeat([]byte{0}, 252)...),\n\t\t\t\t[]byte{1, 2, 3, 4}...),\n\t\t\tremove: []byte{1, 2, 3, 4, 5},\n\t\t\tafter: append(append([]byte{txscript.OP_PUSHDATA2, 0, 1},\n\t\t\t\tbytes.Repeat([]byte{0}, 252)...),\n\t\t\t\t[]byte{1, 2, 3, 4}...),\n\t\t},\n\t\t{\n\t\t\tname: \"simple case (pushdata2 miss noncanonical)\",\n\t\t\tbefore: []byte{txscript.OP_PUSHDATA2, 4, 0, 1, 2, 3, 4},\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\tafter: []byte{txscript.OP_PUSHDATA2, 4, 0, 1, 2, 3, 4},\n\t\t},\n\t\t{\n\t\t\t// This is padded to make the push canonical.\n\t\t\tname: \"simple case (pushdata4)\",\n\t\t\tbefore: append(append([]byte{txscript.OP_PUSHDATA4, 0, 0, 1, 0},\n\t\t\t\tbytes.Repeat([]byte{0}, 65532)...),\n\t\t\t\t[]byte{1, 2, 3, 4}...),\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\tafter: nil,\n\t\t},\n\t\t{\n\t\t\tname: \"simple case (pushdata4 miss noncanonical)\",\n\t\t\tbefore: []byte{txscript.OP_PUSHDATA4, 4, 0, 0, 0, 1, 2, 3, 4},\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\tafter: []byte{txscript.OP_PUSHDATA4, 4, 0, 0, 0, 1, 2, 3, 4},\n\t\t},\n\t\t{\n\t\t\t// This is padded to make the push canonical.\n\t\t\tname: \"simple case (pushdata4 miss)\",\n\t\t\tbefore: append(append([]byte{txscript.OP_PUSHDATA4, 0, 0, 1, 0},\n\t\t\t\tbytes.Repeat([]byte{0}, 65532)...), []byte{1, 2, 3, 4}...),\n\t\t\tremove: []byte{1, 2, 3, 4, 5},\n\t\t\tafter: append(append([]byte{txscript.OP_PUSHDATA4, 0, 0, 1, 0},\n\t\t\t\tbytes.Repeat([]byte{0}, 65532)...), []byte{1, 2, 3, 4}...),\n\t\t},\n\t\t{\n\t\t\tname: \"invalid opcode \",\n\t\t\tbefore: []byte{txscript.OP_UNKNOWN187},\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\tafter: []byte{txscript.OP_UNKNOWN187},\n\t\t},\n\t\t{\n\t\t\tname: \"invalid length (instruction)\",\n\t\t\tbefore: []byte{txscript.OP_PUSHDATA1},\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\terr: txscript.ErrStackShortScript,\n\t\t},\n\t\t{\n\t\t\tname: \"invalid length (data)\",\n\t\t\tbefore: []byte{txscript.OP_PUSHDATA1, 255, 254},\n\t\t\tremove: []byte{1, 2, 3, 4},\n\t\t\terr: txscript.ErrStackShortScript,\n\t\t},\n\t}\n\n\tfor _, test := range tests {\n\t\tresult, err := txscript.TstRemoveOpcodeByData(test.before,\n\t\t\ttest.remove)\n\t\tif test.err != nil {\n\t\t\tif err != test.err {\n\t\t\t\tt.Errorf(\"%s: got unexpected error. exp: \\\"%v\\\" \"+\n\t\t\t\t\t\"got: \\\"%v\\\"\", test.name, test.err, err)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tif err != nil {\n\t\t\tt.Errorf(\"%s: unexpected failure: \\\"%v\\\"\", test.name, err)\n\t\t\treturn\n\t\t}\n\t\tif !bytes.Equal(test.after, result) {\n\t\t\tt.Errorf(\"%s: value does not equal expected: exp: \\\"%v\\\"\"+\n\t\t\t\t\" got: \\\"%v\\\"\", test.name, test.after, result)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9583f900ebb0934317b6f471473b33d3", "score": "0.44737834", "text": "func TestGetUnprocessedAddress(t *testing.T) {\n\tid := []byte{0}\n\tnd := &nodeData{Id: id}\n\n\terr := nd.Insert([]byte{1}, \"addr1\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\terr = nd.Insert([]byte{1}, \"addr2\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\terr = nd.Insert([]byte{2}, \"addr2\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tdata1, err := nd.GetUnprocessedAddress()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tif data1.Address != \"addr2\" {\n\t\tt.Fatal(\"addr2 had more votes\")\n\t}\n\n\tif err := nd.MarkAddressProcessed(data1.Address); err != nil {\n\t\tt.Fatalf(\"error marking as processed %s\", err)\n\t}\n\n\tdata2, err := nd.GetUnprocessedAddress()\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tif data1.Address == data2.Address {\n\t\tt.Fatal(\"Returned the same address\")\n\t}\n\n}", "title": "" }, { "docid": "2c3bd4b614907d7a7a3d858dc998e230", "score": "0.44685832", "text": "func (mr *MockNsxNetworkProvisionerMockRecorder) UntagT0Router(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UntagT0Router\", reflect.TypeOf((*MockNsxNetworkProvisioner)(nil).UntagT0Router), arg0, arg1)\n}", "title": "" }, { "docid": "c2ab64cc23ee741610ee939ab702cf54", "score": "0.44652447", "text": "func (m *MockAppMeshAPI) UntagResourceRequest(arg0 *appmesh.UntagResourceInput) (*request.Request, *appmesh.UntagResourceOutput) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UntagResourceRequest\", arg0)\n\tret0, _ := ret[0].(*request.Request)\n\tret1, _ := ret[1].(*appmesh.UntagResourceOutput)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "cdc5d886ba923837b34ec8a5c17a592e", "score": "0.44502595", "text": "func Test_ioUngetbyte(t *testing.T) {\n}", "title": "" }, { "docid": "32a5fab230b9f7e25fb84ef4550a9831", "score": "0.44501933", "text": "func (tbg *transactionBlockGroup) VerifyExceptUTXO() bool {\n\n\tif !tbg.TransactionBlockStructs[0].verifyExceptUTXO(true) {\n\t\treturn false\n\t}\n\n\tfor _, tb := range tbg.TransactionBlockStructs[1:] {\n\t\tif !tb.verifyExceptUTXO(false) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n\n}", "title": "" }, { "docid": "861975c592818b328844bd287b2908ef", "score": "0.44467145", "text": "func AssertUnnumberedInterface(swIfIndex uint32, interfaceDescriptiveName string, vpp *vpplink.VppLink) {\n\tunnumberedDetails, err := vpp.InterfaceGetUnnumbered(swIfIndex)\n\tExpect(err).ToNot(HaveOccurred(),\n\t\tfmt.Sprintf(\"can't get unnumbered details of %s\", interfaceDescriptiveName))\n\tExpect(unnumberedDetails).ToNot(BeEmpty(), \"can't find unnumbered interface\")\n\tExpect(unnumberedDetails[0].IPSwIfIndex).To(Equal(\n\t\tinterface_types.InterfaceIndex(common.VppManagerInfo.GetMainSwIfIndex())),\n\t\tfmt.Sprintf(\"Unnumberred %s doesn't get IP address from expected interface\", interfaceDescriptiveName))\n}", "title": "" }, { "docid": "2055dd1e0074d6d45e4761577b7659c5", "score": "0.44456547", "text": "func FuzzUncompressBlock(data []byte) int {\n\tdecomp := make([]byte, len(data)+16-len(data)%8)\n\tfor i := range decomp {\n\t\tdecomp[i] = byte(i)\n\t}\n\tdecomp = decomp[:len(data)]\n\n\tn, err := lz4.UncompressBlock(data, decomp)\n\tif n > len(decomp) {\n\t\tpanic(\"uncompressed length greater than buffer\")\n\t}\n\n\tdecomp = decomp[:cap(decomp)]\n\tfor i := len(data); i < len(decomp); i++ {\n\t\tif decomp[i] != byte(i) {\n\t\t\tpanic(\"UncompressBlock wrote out of bounds\")\n\t\t}\n\t}\n\n\tif err != nil {\n\t\treturn 0\n\t}\n\treturn 1\n}", "title": "" }, { "docid": "2055dd1e0074d6d45e4761577b7659c5", "score": "0.44456547", "text": "func FuzzUncompressBlock(data []byte) int {\n\tdecomp := make([]byte, len(data)+16-len(data)%8)\n\tfor i := range decomp {\n\t\tdecomp[i] = byte(i)\n\t}\n\tdecomp = decomp[:len(data)]\n\n\tn, err := lz4.UncompressBlock(data, decomp)\n\tif n > len(decomp) {\n\t\tpanic(\"uncompressed length greater than buffer\")\n\t}\n\n\tdecomp = decomp[:cap(decomp)]\n\tfor i := len(data); i < len(decomp); i++ {\n\t\tif decomp[i] != byte(i) {\n\t\t\tpanic(\"UncompressBlock wrote out of bounds\")\n\t\t}\n\t}\n\n\tif err != nil {\n\t\treturn 0\n\t}\n\treturn 1\n}", "title": "" }, { "docid": "ade6b779abe0687f46c1b5806bd5c519", "score": "0.44326997", "text": "func VerifyZeroTearDownDeviceCallCount(fakeVolumePlugin *FakeVolumePlugin) error {\n\tfor _, unmapper := range fakeVolumePlugin.GetBlockVolumeUnmapper() {\n\t\tactualCallCount := unmapper.GetTearDownDeviceCallCount()\n\t\tif actualCallCount != 0 {\n\t\t\treturn fmt.Errorf(\n\t\t\t\t\"At least one unmapper has non-zero TearDownDeviceCallCount: <%v>.\",\n\t\t\t\tactualCallCount)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "495743bbcf5d01cd8fe0e398bd583ad6", "score": "0.44318867", "text": "func (*NetworkInstance_Afts_LabelEntry_PoppedMplsLabelStack_Union_Uint32) Is_NetworkInstance_Afts_LabelEntry_PoppedMplsLabelStack_Union() {\n}", "title": "" }, { "docid": "ad407a5d4cd733dbc75f6fe957b186c6", "score": "0.44261342", "text": "func UnbanIP(ip string) error {\n\t_, err := runFail2banClient(nil, \"unban\", ip)\n\treturn err\n}", "title": "" }, { "docid": "e947af1e0b0918921189efd2379863a0", "score": "0.44256306", "text": "func verifyNoUnconfirmed(t *testing.T, client *AttestClient) {\n\tunconfRe, unconfTxidRe, unconfReErr := client.getUnconfirmedTx()\n\tassert.Equal(t, nil, unconfReErr)\n\tassert.Equal(t, false, unconfRe)\n\tassert.Equal(t, chainhash.Hash{}, unconfTxidRe) // new tx no longer unconfirmed\n}", "title": "" }, { "docid": "154208fdcb90737a1442784b928a7d8f", "score": "0.44240826", "text": "func Un(p *Dbg) {\n\tp.indent--\n\tp.Trace(\")\")\n}", "title": "" }, { "docid": "8c365df41ab0f1ab05b0a2c6da31c4fe", "score": "0.44240403", "text": "func VerifyUnmapPodDeviceCallCount(\n\texpectedUnmapPodDeviceCallCount int,\n\tfakeVolumePlugin *FakeVolumePlugin) error {\n\tfor _, unmapper := range fakeVolumePlugin.GetBlockVolumeUnmapper() {\n\t\tactualCallCount := unmapper.GetUnmapPodDeviceCallCount()\n\t\tif actualCallCount >= expectedUnmapPodDeviceCallCount {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn fmt.Errorf(\n\t\t\"No Unmapper have expected UnmapPodDeviceCallCount. Expected: <%v>.\",\n\t\texpectedUnmapPodDeviceCallCount)\n}", "title": "" }, { "docid": "549df1cccd44f5adf8f2c851cf560f07", "score": "0.4423608", "text": "func ShouldBeRPCUnauthenticated(actual any, expected ...any) string {\n\treturn ShouldHaveRPCCode(actual, prepend(codes.Unauthenticated, expected)...)\n}", "title": "" }, { "docid": "dfead30a3909dd2c50cfa0de97b75bff", "score": "0.44226968", "text": "func (*Interface_RoutedVlan_Ipv4_Unnumbered) IsYANGGoStruct() {}", "title": "" }, { "docid": "c434eed022a18119853600ff91e0ee2e", "score": "0.44215202", "text": "func (_IUniswapV2Callee *IUniswapV2CalleeTransactorSession) UniswapV2Call(sender common.Address, amount0 *big.Int, amount1 *big.Int, data []byte) (*types.Transaction, error) {\n\treturn _IUniswapV2Callee.Contract.UniswapV2Call(&_IUniswapV2Callee.TransactOpts, sender, amount0, amount1, data)\n}", "title": "" }, { "docid": "60827c268cd5d2d9f3699735fea0e288", "score": "0.4417407", "text": "func (_AddressFactory *AddressFactoryTransactor) Unpause(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _AddressFactory.contract.Transact(opts, \"unpause\")\n}", "title": "" }, { "docid": "4377ac34ea8461181d5169bc7832722d", "score": "0.4415603", "text": "func (_BondingManager *BondingManagerTransactor) UnbondWithHint(opts *bind.TransactOpts, _amount *big.Int, _newPosPrev common.Address, _newPosNext common.Address) (*types.Transaction, error) {\n\treturn _BondingManager.contract.Transact(opts, \"unbondWithHint\", _amount, _newPosPrev, _newPosNext)\n}", "title": "" }, { "docid": "3cc7a6fad4fdc24c1ed2a107b09d8734", "score": "0.44150552", "text": "func TestValidateBlockRollback(t *testing.T) {\n\tcleanAndPrepare()\n\n\tb := newBlock([32]byte{}, [crypto.COMM_PROOF_LENGTH]byte{}, 1)\n\n\t//Make state snapshot\n\taccsBefore := make(map[[64]byte]protocol.Account)\n\taccsBefore2 := make(map[[64]byte]protocol.Account)\n\taccsAfter := make(map[[64]byte]protocol.Account)\n\n\tfor _, acc := range storage.State {\n\t\taccsBefore[acc.Address] = *acc\n\t}\n\n\t//Fill block with random transactions, finalize (PoW etc.) and validate (state change)\n\tcreateBlockWithTxs(b)\n\tif err := finalizeBlock(b); err != nil {\n\t\tt.Errorf(\"Could not finalize block: %v\\n\", err)\n\t}\n\tif err := validate(b, false); err != nil {\n\t\tt.Errorf(\"Could not validate block: %v\\n\", err)\n\t}\n\n\tfor _, acc := range storage.State {\n\t\taccsAfter[acc.Address] = *acc\n\t}\n\n\tif reflect.DeepEqual(accsBefore, accsAfter) {\n\t\tt.Errorf(\"State wasn't changed despite validating a block!\\n%v\\n\\n%v\", accsBefore, accsAfter)\n\t}\n\n\terr := rollback(b)\n\tif err != nil {\n\t\tt.Errorf(\"%v\\n\", err)\n\t}\n\n\tfor _, acc := range storage.State {\n\t\taccsBefore2[acc.Address] = *acc\n\t}\n\taccsBefore2 = resetStakingBlockHeight(accsBefore2)\n\taccsBefore = resetStakingBlockHeight(accsBefore)\n\tif !reflect.DeepEqual(accsBefore, accsBefore2) {\n\t\tt.Error(\"State wasn't rolled back\")\n\t}\n}", "title": "" }, { "docid": "16fd4617d9fc7263dcbcf3673f55ad79", "score": "0.4412927", "text": "func (m *MockRepositoryClient) UntagResource(ctx context.Context, input *ecr.UntagResourceInput, opts ...func(*ecr.Options)) (*ecr.UntagResourceOutput, error) {\n\treturn m.MockUntag(ctx, input, opts)\n}", "title": "" }, { "docid": "205039d6fd1fcfeec291837506c636d3", "score": "0.44120592", "text": "func TestRefundInconsistentTx(t *testing.T) {\n\tinput := CreateTestEnv(t)\n\tctx := input.Context\n\tvar (\n\t\tmySender, _ = sdk.AccAddressFromBech32(\"cosmos1ahx7f8wyertuus9r20284ej0asrs085case3kn\")\n\t\tmyReceiver, _ = types.NewEthAddress(\"0xd041c41EA1bf0F006ADBb6d2c9ef9D425dE5eaD7\")\n\t\tmyTokenContractAddr, _ = types.NewEthAddress(\"0x429881672B9AE42b8EbA0E26cD9C73711b891Ca5\")\n\t)\n\n\t//////// Refund an inconsistent tx ////////\n\tamountToken, err := types.NewInternalERC20Token(sdk.NewInt(100), myTokenContractAddr.GetAddress())\n\trequire.NoError(t, err)\n\tbadTokenContractAddr, _ := types.NewEthAddress(\"0x429881672B9AE42b8EbA0E26cD9C73711b891Ca6\") // different last char\n\tbadFeeToken, err := types.NewInternalERC20Token(sdk.NewInt(2), badTokenContractAddr.GetAddress())\n\trequire.NoError(t, err)\n\n\t// This way should fail\n\tr, err := input.GravityKeeper.AddToOutgoingPool(ctx, mySender, *myReceiver, amountToken.GravityCoin(), badFeeToken.GravityCoin())\n\trequire.Zero(t, r)\n\trequire.Error(t, err)\n\t// But this unsafe override won't fail\n\terr = input.GravityKeeper.addUnbatchedTX(ctx, &types.InternalOutgoingTransferTx{\n\t\tId: uint64(5),\n\t\tSender: mySender,\n\t\tDestAddress: myReceiver,\n\t\tErc20Token: amountToken,\n\t\tErc20Fee: badFeeToken,\n\t})\n\torigBalances := input.BankKeeper.GetAllBalances(ctx, mySender)\n\trequire.NoError(t, err, \"someone added validation to addUnbatchedTx\")\n\terr = input.GravityKeeper.RemoveFromOutgoingPoolAndRefund(ctx, uint64(5), mySender)\n\trequire.Error(t, err)\n\tnewBalances := input.BankKeeper.GetAllBalances(ctx, mySender)\n\trequire.Equal(t, origBalances, newBalances)\n}", "title": "" }, { "docid": "84d2d9b9b89ace2b141e32f59a5d4be9", "score": "0.44098854", "text": "func (*Interface_RoutedVlan_Ipv6_Unnumbered) IsYANGGoStruct() {}", "title": "" }, { "docid": "18e5b770a80fe2629bd8ef5634f81095", "score": "0.4402363", "text": "func (m *MockAppMeshAPI) UntagResource(arg0 *appmesh.UntagResourceInput) (*appmesh.UntagResourceOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UntagResource\", arg0)\n\tret0, _ := ret[0].(*appmesh.UntagResourceOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "fdbfd3c5528fc8c486f08cb138e5e4bc", "score": "0.4400521", "text": "func (*NetworkInstance_Mpls_Global_ReservedLabelBlock_UpperBound_Union_E_OpenconfigMpls_ReservedLabelBlock_UpperBound) Is_NetworkInstance_Mpls_Global_ReservedLabelBlock_UpperBound_Union() {\n}", "title": "" }, { "docid": "b1ad65c89fd8e6aff28fb6b16681adbd", "score": "0.43971887", "text": "func (mr *MockCloudWatchLogsAPIMockRecorder) UntagLogGroupRequest(arg0 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"UntagLogGroupRequest\", reflect.TypeOf((*MockCloudWatchLogsAPI)(nil).UntagLogGroupRequest), arg0)\n}", "title": "" }, { "docid": "ca8cbb24f1e66b151e596ec3d3684318", "score": "0.4376343", "text": "func (mr *MockStakingHooksMockRecorder) AfterValidatorBeginUnbonding(ctx, consAddr, valAddr interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"AfterValidatorBeginUnbonding\", reflect.TypeOf((*MockStakingHooks)(nil).AfterValidatorBeginUnbonding), ctx, consAddr, valAddr)\n}", "title": "" }, { "docid": "1bc5a19971c8ac39ee73da606a100b46", "score": "0.43753156", "text": "func TestV4UnknownDestination(t *testing.T) {\n\tc := context.New(t, []stack.TransportProtocolFactory{udp.NewProtocol, icmp.NewProtocol6, icmp.NewProtocol4})\n\tdefer c.Cleanup()\n\n\ttestCases := []struct {\n\t\tflow context.TestFlow\n\t\ticmpRequired bool\n\t\t// largePayload if true, will result in a payload large enough\n\t\t// so that the final generated IPv4 packet is larger than\n\t\t// header.IPv4MinimumProcessableDatagramSize.\n\t\tlargePayload bool\n\t\t// badChecksum if true, will set an invalid checksum in the\n\t\t// header.\n\t\tbadChecksum bool\n\t}{\n\t\t{context.UnicastV4, true, false, false},\n\t\t{context.UnicastV4, true, true, false},\n\t\t{context.UnicastV4, false, false, true},\n\t\t{context.UnicastV4, false, true, true},\n\t\t{context.MulticastV4, false, false, false},\n\t\t{context.MulticastV4, false, true, false},\n\t\t{context.Broadcast, false, false, false},\n\t\t{context.Broadcast, false, true, false},\n\t}\n\tchecksumErrors := uint64(0)\n\tfor _, tc := range testCases {\n\t\tt.Run(fmt.Sprintf(\"flow:%s icmpRequired:%t largePayload:%t badChecksum:%t\", tc.flow, tc.icmpRequired, tc.largePayload, tc.badChecksum), func(t *testing.T) {\n\t\t\tpayloadSize := arbitraryPayloadSize\n\t\t\tif tc.largePayload {\n\t\t\t\tpayloadSize += header.IPv4MinimumProcessableDatagramSize\n\t\t\t}\n\t\t\tpayload := newRandomPayload(payloadSize)\n\t\t\tc.InjectPacket(tc.flow.NetProto(), context.BuildUDPPacket(payload, tc.flow, context.Incoming, testTOS, testTTL, tc.badChecksum))\n\t\t\tif tc.badChecksum {\n\t\t\t\tchecksumErrors++\n\t\t\t\tif got, want := c.Stack.Stats().UDP.ChecksumErrors.Value(), checksumErrors; got != want {\n\t\t\t\t\tt.Fatalf(\"got stats.UDP.ChecksumErrors.Value() = %d, want = %d\", got, want)\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !tc.icmpRequired {\n\t\t\t\tif p := c.LinkEP.Read(); !p.IsNil() {\n\t\t\t\t\tt.Fatalf(\"unexpected packet received: %+v\", p)\n\t\t\t\t}\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// ICMP required.\n\t\t\tp := c.LinkEP.Read()\n\t\t\tif p.IsNil() {\n\t\t\t\tt.Fatalf(\"packet wasn't written out\")\n\t\t\t}\n\n\t\t\tbuf := p.ToBuffer()\n\t\t\tdefer buf.Release()\n\t\t\tp.DecRef()\n\t\t\tpkt := buf.Flatten()\n\t\t\tif got, want := len(pkt), header.IPv4MinimumProcessableDatagramSize; got > want {\n\t\t\t\tt.Fatalf(\"got an ICMP packet of size: %d, want: sz <= %d\", got, want)\n\t\t\t}\n\n\t\t\thdr := buffer.NewViewWithData(pkt)\n\t\t\tdefer hdr.Release()\n\t\t\tchecker.IPv4(t, hdr, checker.ICMPv4(\n\t\t\t\tchecker.ICMPv4Type(header.ICMPv4DstUnreachable),\n\t\t\t\tchecker.ICMPv4Code(header.ICMPv4PortUnreachable)))\n\n\t\t\t// We need to compare the included data part of the UDP packet that is in\n\t\t\t// the ICMP packet with the matching original data.\n\t\t\ticmpPkt := header.ICMPv4(header.IPv4(hdr.AsSlice()).Payload())\n\t\t\tpayloadIPHeader := header.IPv4(icmpPkt.Payload())\n\t\t\tincomingHeaderLength := header.IPv4MinimumSize + header.UDPMinimumSize\n\t\t\twantLen := len(payload)\n\t\t\tif tc.largePayload {\n\t\t\t\t// To work out the data size we need to simulate what the sender would\n\t\t\t\t// have done. The wanted size is the total available minus the sum of\n\t\t\t\t// the headers in the UDP AND ICMP packets, given that we know the test\n\t\t\t\t// had only a minimal IP header but the ICMP sender will have allowed\n\t\t\t\t// for a maximally sized packet header.\n\t\t\t\twantLen = header.IPv4MinimumProcessableDatagramSize - header.IPv4MaximumHeaderSize - header.ICMPv4MinimumSize - incomingHeaderLength\n\t\t\t}\n\n\t\t\t// In the case of large payloads the IP packet may be truncated. Update\n\t\t\t// the length field before retrieving the udp datagram payload.\n\t\t\t// Add back the two headers within the payload.\n\t\t\tpayloadIPHeader.SetTotalLength(uint16(wantLen + incomingHeaderLength))\n\n\t\t\torigDgram := header.UDP(payloadIPHeader.Payload())\n\t\t\tif got, want := len(origDgram.Payload()), wantLen; got != want {\n\t\t\t\tt.Fatalf(\"unexpected payload length got: %d, want: %d\", got, want)\n\t\t\t}\n\t\t\tif got, want := origDgram.Payload(), payload[:wantLen]; !bytes.Equal(got, want) {\n\t\t\t\tt.Fatalf(\"unexpected payload got: %d, want: %d\", got, want)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "20898146e82905dbbf061b59e3e0cab9", "score": "0.43704763", "text": "func (blck MsgBlock) Verify() error {\n\ttarget := blck.unpackBits()\n\n\thash, err := blck.Hash()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttargetNum := big.NewInt(0).SetBytes(target)\n\thashNum := big.NewInt(0).SetBytes(hash)\n\n\t// Block hash must be <= target threshold\n\tif hashNum.Cmp(targetNum) > 0 {\n\t\treturn errInvalidBlockHash\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cc07ad704fae908bdffc2e32f3b88ae4", "score": "0.4363279", "text": "func (mr *MockClientMockRecorder) ReleaseLoadBalancerVirtualServerIP(arg0, arg1 interface{}) *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ReleaseLoadBalancerVirtualServerIP\", reflect.TypeOf((*MockClient)(nil).ReleaseLoadBalancerVirtualServerIP), arg0, arg1)\n}", "title": "" } ]
84ff629028569f70b4035bd4064a7a5d
FillFrom fills EmojiKeywordDeleted from given interface.
[ { "docid": "9c3402c7fd3140d862582119226ae7b9", "score": "0.80644935", "text": "func (e *EmojiKeywordDeleted) FillFrom(from interface {\n\tGetKeyword() (value string)\n\tGetEmoticons() (value []string)\n}) {\n\te.Keyword = from.GetKeyword()\n\te.Emoticons = from.GetEmoticons()\n}", "title": "" } ]
[ { "docid": "e9b6a1b7b4d5983193e7adf77753c364", "score": "0.71352714", "text": "func (e *EmojiKeyword) FillFrom(from interface {\n\tGetKeyword() (value string)\n\tGetEmoticons() (value []string)\n}) {\n\te.Keyword = from.GetKeyword()\n\te.Emoticons = from.GetEmoticons()\n}", "title": "" }, { "docid": "9b0eb18924963cadc4ce937fdc3bc69d", "score": "0.5687794", "text": "func (e EmojiKeywordDeleted) construct() EmojiKeywordClass { return &e }", "title": "" }, { "docid": "d065a9d54877b7eb1d20e537e4149132", "score": "0.53465164", "text": "func (i *InputBotInlineMessageID) FillFrom(from interface {\n\tGetDCID() (value int)\n\tGetID() (value int64)\n\tGetAccessHash() (value int64)\n}) {\n\ti.DCID = from.GetDCID()\n\ti.ID = from.GetID()\n\ti.AccessHash = from.GetAccessHash()\n}", "title": "" }, { "docid": "d065a9d54877b7eb1d20e537e4149132", "score": "0.53465164", "text": "func (i *InputBotInlineMessageID) FillFrom(from interface {\n\tGetDCID() (value int)\n\tGetID() (value int64)\n\tGetAccessHash() (value int64)\n}) {\n\ti.DCID = from.GetDCID()\n\ti.ID = from.GetID()\n\ti.AccessHash = from.GetAccessHash()\n}", "title": "" }, { "docid": "f5b6d0055bf3bbef0cfe60b5e7128c41", "score": "0.5198276", "text": "func (i *InputMediaDice) FillFrom(from interface {\n\tGetEmoticon() (value string)\n}) {\n\ti.Emoticon = from.GetEmoticon()\n}", "title": "" }, { "docid": "68fbd870d411a3baafeb1dd95598acae", "score": "0.5175672", "text": "func (i *InputBotInlineMessageID64) FillFrom(from interface {\n\tGetDCID() (value int)\n\tGetOwnerID() (value int64)\n\tGetID() (value int)\n\tGetAccessHash() (value int64)\n}) {\n\ti.DCID = from.GetDCID()\n\ti.OwnerID = from.GetOwnerID()\n\ti.ID = from.GetID()\n\ti.AccessHash = from.GetAccessHash()\n}", "title": "" }, { "docid": "4cad8dc7448443f7639c5b0532047d2d", "score": "0.5136016", "text": "func (d *ChannelsDeleteMessagesRequest) FillFrom(from interface {\n\tGetChannel() (value InputChannelClass)\n\tGetID() (value []int)\n}) {\n\td.Channel = from.GetChannel()\n\td.ID = from.GetID()\n}", "title": "" }, { "docid": "683937c0db40f254e43a4c213b1a08a5", "score": "0.5059705", "text": "func UnmarshalKeyReferenceDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(KeyReferenceDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "3e68eca7d5f5241ee6fb477f9650bd07", "score": "0.4984217", "text": "func UnmarshalIkePolicyReferenceDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(IkePolicyReferenceDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "a8023633abad88bcf866132fee062afc", "score": "0.49051017", "text": "func (s ForumTopicClassArray) FillForumTopicDeletedMap(to map[int]*ForumTopicDeleted) {\n\tfor _, elem := range s {\n\t\tvalue, ok := elem.(*ForumTopicDeleted)\n\t\tif !ok {\n\t\t\tcontinue\n\t\t}\n\t\tto[value.GetID()] = value\n\t}\n}", "title": "" }, { "docid": "e05ec2a96700305e5ab311af1e56b495", "score": "0.4878931", "text": "func (k *KeyboardButton) FillFrom(from interface {\n\tGetText() (value string)\n}) {\n\tk.Text = from.GetText()\n}", "title": "" }, { "docid": "dcc4fa8df5797e100a3ce57c2cace554", "score": "0.48487017", "text": "func (k *KeyboardButtonGame) FillFrom(from interface {\n\tGetText() (value string)\n}) {\n\tk.Text = from.GetText()\n}", "title": "" }, { "docid": "e27fbb97a174c105f3532edd0a4f42f1", "score": "0.48368496", "text": "func (k *KeyboardButtonBuy) FillFrom(from interface {\n\tGetText() (value string)\n}) {\n\tk.Text = from.GetText()\n}", "title": "" }, { "docid": "b3879d080fad9a0a18ebd70bb9c3888a", "score": "0.48260024", "text": "func (g *ChannelsGetForumTopicsRequest) FillFrom(from interface {\n\tGetChannel() (value InputChannelClass)\n\tGetQ() (value string, ok bool)\n\tGetOffsetDate() (value int)\n\tGetOffsetID() (value int)\n\tGetOffsetTopic() (value int)\n\tGetLimit() (value int)\n}) {\n\tg.Channel = from.GetChannel()\n\tif val, ok := from.GetQ(); ok {\n\t\tg.Q = val\n\t}\n\n\tg.OffsetDate = from.GetOffsetDate()\n\tg.OffsetID = from.GetOffsetID()\n\tg.OffsetTopic = from.GetOffsetTopic()\n\tg.Limit = from.GetLimit()\n}", "title": "" }, { "docid": "80ec4400b692d60c3b7f1f7a082774f0", "score": "0.48116854", "text": "func (k *KeyboardButtonCallback) FillFrom(from interface {\n\tGetRequiresPassword() (value bool)\n\tGetText() (value string)\n\tGetData() (value []byte)\n}) {\n\tk.RequiresPassword = from.GetRequiresPassword()\n\tk.Text = from.GetText()\n\tk.Data = from.GetData()\n}", "title": "" }, { "docid": "ca5f065f023ab1059db1a6441b6fa83e", "score": "0.47709134", "text": "func UnmarshalNetworkInterfaceReferenceTargetContextDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(NetworkInterfaceReferenceTargetContextDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "2bedd361696bc84698ebbdc8d08a7206", "score": "0.47622165", "text": "func (m *MessagesMessageEditData) FillFrom(from interface {\n\tGetCaption() (value bool)\n}) {\n\tm.Caption = from.GetCaption()\n}", "title": "" }, { "docid": "776481b395dcf6cc45890a60f1de3b1a", "score": "0.47478378", "text": "func (k *KeyboardButtonUserProfile) FillFrom(from interface {\n\tGetText() (value string)\n\tGetUserID() (value int64)\n}) {\n\tk.Text = from.GetText()\n\tk.UserID = from.GetUserID()\n}", "title": "" }, { "docid": "dc362e7c0b9e604f8ad9f38178309733", "score": "0.47427714", "text": "func (i *InputMediaDocument) FillFrom(from interface {\n\tGetSpoiler() (value bool)\n\tGetID() (value InputDocumentClass)\n\tGetTTLSeconds() (value int, ok bool)\n\tGetQuery() (value string, ok bool)\n}) {\n\ti.Spoiler = from.GetSpoiler()\n\ti.ID = from.GetID()\n\tif val, ok := from.GetTTLSeconds(); ok {\n\t\ti.TTLSeconds = val\n\t}\n\n\tif val, ok := from.GetQuery(); ok {\n\t\ti.Query = val\n\t}\n\n}", "title": "" }, { "docid": "18257b6fed0ae189312259129655fc61", "score": "0.4736874", "text": "func (k *KeyboardButtonURL) FillFrom(from interface {\n\tGetText() (value string)\n\tGetURL() (value string)\n}) {\n\tk.Text = from.GetText()\n\tk.URL = from.GetURL()\n}", "title": "" }, { "docid": "927fbaffe8a68d9b032a54ef3b89b266", "score": "0.4724061", "text": "func (x *ForKeyword) UnmarshalJSON(b []byte) error {\n\tnum, err := protoimpl.X.UnmarshalJSONEnum(x.Descriptor(), b)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*x = ForKeyword(num)\n\treturn nil\n}", "title": "" }, { "docid": "a272d17d4a516575c9dcd5cd78f4100a", "score": "0.4696967", "text": "func (i *InputGameID) FillFrom(from interface {\n\tGetID() (value int64)\n\tGetAccessHash() (value int64)\n}) {\n\ti.ID = from.GetID()\n\ti.AccessHash = from.GetAccessHash()\n}", "title": "" }, { "docid": "da7e88793a843eba5b2dfe364a825c00", "score": "0.46904272", "text": "func UnmarshalNetworkInterfaceReferenceDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(NetworkInterfaceReferenceDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "411c76a9259fe3a7d12626734e7915af", "score": "0.46845505", "text": "func (a *MessagesAffectedFoundMessages) FillFrom(from interface {\n\tGetPts() (value int)\n\tGetPtsCount() (value int)\n\tGetOffset() (value int)\n\tGetMessages() (value []int)\n}) {\n\ta.Pts = from.GetPts()\n\ta.PtsCount = from.GetPtsCount()\n\ta.Offset = from.GetOffset()\n\ta.Messages = from.GetMessages()\n}", "title": "" }, { "docid": "4eed7423de1d998438e6e971553c431a", "score": "0.46814096", "text": "func (a *HelpAcceptTermsOfServiceRequest) FillFrom(from interface {\n\tGetID() (value DataJSON)\n}) {\n\ta.ID = from.GetID()\n}", "title": "" }, { "docid": "ef29ffa41938ee83d07681e3f4b1bcdd", "score": "0.46599627", "text": "func (b *BotCommand) FillFrom(from interface {\n\tGetCommand() (value string)\n\tGetDescription() (value string)\n}) {\n\tb.Command = from.GetCommand()\n\tb.Description = from.GetDescription()\n}", "title": "" }, { "docid": "7e34b859a9dd2cf7f7667d71c9d84aa6", "score": "0.46454877", "text": "func (i *InputBotAppID) FillFrom(from interface {\n\tGetID() (value int64)\n\tGetAccessHash() (value int64)\n}) {\n\ti.ID = from.GetID()\n\ti.AccessHash = from.GetAccessHash()\n}", "title": "" }, { "docid": "b170b36c86e5160d3f03f6e657cad5be", "score": "0.46315554", "text": "func (k *KeyboardButtonRequestGeoLocation) FillFrom(from interface {\n\tGetText() (value string)\n}) {\n\tk.Text = from.GetText()\n}", "title": "" }, { "docid": "b34c35898d92b28326ad39040bf497f1", "score": "0.46147275", "text": "func (*EmojiKeywordDeleted) TypeID() uint32 {\n\treturn EmojiKeywordDeletedTypeID\n}", "title": "" }, { "docid": "b4986cae336be9720d55e51abe0371b3", "score": "0.45997292", "text": "func (d *MessagesDeleteExportedChatInviteRequest) FillFrom(from interface {\n\tGetPeer() (value InputPeerClass)\n\tGetLink() (value string)\n}) {\n\td.Peer = from.GetPeer()\n\td.Link = from.GetLink()\n}", "title": "" }, { "docid": "bf162b459a87400b86aab508dbed5337", "score": "0.45840108", "text": "func UnmarshalNetworkInterfaceInstanceContextReferenceDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(NetworkInterfaceInstanceContextReferenceDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "a5ce42a56cfe43220bdb19152b0c3d34", "score": "0.45832664", "text": "func (i *InputMediaGame) FillFrom(from interface {\n\tGetID() (value InputGameClass)\n}) {\n\ti.ID = from.GetID()\n}", "title": "" }, { "docid": "38410332efc28a2bb1781239df796a45", "score": "0.4579139", "text": "func (e EmojiKeyword) construct() EmojiKeywordClass { return &e }", "title": "" }, { "docid": "0730b6663d72f5f9cc915995e2d7833e", "score": "0.4575574", "text": "func (c *ChannelsCreateForumTopicRequest) FillFrom(from interface {\n\tGetChannel() (value InputChannelClass)\n\tGetTitle() (value string)\n\tGetIconColor() (value int, ok bool)\n\tGetIconEmojiID() (value int64, ok bool)\n\tGetRandomID() (value int64)\n\tGetSendAs() (value InputPeerClass, ok bool)\n}) {\n\tc.Channel = from.GetChannel()\n\tc.Title = from.GetTitle()\n\tif val, ok := from.GetIconColor(); ok {\n\t\tc.IconColor = val\n\t}\n\n\tif val, ok := from.GetIconEmojiID(); ok {\n\t\tc.IconEmojiID = val\n\t}\n\n\tc.RandomID = from.GetRandomID()\n\tif val, ok := from.GetSendAs(); ok {\n\t\tc.SendAs = val\n\t}\n\n}", "title": "" }, { "docid": "8e5dfe1d75e9d08122b1cf638c586d36", "score": "0.4572175", "text": "func (k *KeyboardButtonRequestPeer) FillFrom(from interface {\n\tGetText() (value string)\n\tGetButtonID() (value int)\n\tGetPeerType() (value RequestPeerTypeClass)\n}) {\n\tk.Text = from.GetText()\n\tk.ButtonID = from.GetButtonID()\n\tk.PeerType = from.GetPeerType()\n}", "title": "" }, { "docid": "3aa68130c9d6bc28f876595f4ec4571c", "score": "0.45670947", "text": "func (k *KeyboardButtonURLAuth) FillFrom(from interface {\n\tGetText() (value string)\n\tGetFwdText() (value string, ok bool)\n\tGetURL() (value string)\n\tGetButtonID() (value int)\n}) {\n\tk.Text = from.GetText()\n\tif val, ok := from.GetFwdText(); ok {\n\t\tk.FwdText = val\n\t}\n\n\tk.URL = from.GetURL()\n\tk.ButtonID = from.GetButtonID()\n}", "title": "" }, { "docid": "e7eea745cf008a1bc3bd73bb344de7ca", "score": "0.45609275", "text": "func (i *InputKeyboardButtonUserProfile) FillFrom(from interface {\n\tGetText() (value string)\n\tGetUserID() (value InputUserClass)\n}) {\n\ti.Text = from.GetText()\n\ti.UserID = from.GetUserID()\n}", "title": "" }, { "docid": "67198f070c4be6754a661afacd8132ac", "score": "0.45459554", "text": "func (d *DeletedKeyItem) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"attributes\":\n\t\t\terr = unpopulate(val, &d.Attributes)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deletedDate\":\n\t\t\terr = unpopulateTimeUnix(val, &d.DeletedDate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kid\":\n\t\t\terr = unpopulate(val, &d.Kid)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"managed\":\n\t\t\terr = unpopulate(val, &d.Managed)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryId\":\n\t\t\terr = unpopulate(val, &d.RecoveryID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"scheduledPurgeDate\":\n\t\t\terr = unpopulateTimeUnix(val, &d.ScheduledPurgeDate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, &d.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "22044e1e4aeff19f7ac38d16f3a50082", "score": "0.45324346", "text": "func (v *VitessKeyRange) FillFromByteKeyRange(kr topodatapb.KeyRange) {\n\tv.Start = hex.EncodeToString(kr.Start)\n\tv.End = hex.EncodeToString(kr.End)\n}", "title": "" }, { "docid": "e7696c708bcf2de028d9c400a20be8a8", "score": "0.45187744", "text": "func (a *MessagesAvailableReactions) FillFrom(from interface {\n\tGetHash() (value int)\n\tGetReactions() (value []AvailableReaction)\n}) {\n\ta.Hash = from.GetHash()\n\ta.Reactions = from.GetReactions()\n}", "title": "" }, { "docid": "d34bae028f9f0e7107372604ac91aa61", "score": "0.45101267", "text": "func (g *MessagesGetDocumentByHashRequest) FillFrom(from interface {\n\tGetSHA256() (value []byte)\n\tGetSize() (value int64)\n\tGetMimeType() (value string)\n}) {\n\tg.SHA256 = from.GetSHA256()\n\tg.Size = from.GetSize()\n\tg.MimeType = from.GetMimeType()\n}", "title": "" }, { "docid": "ca18b6813b2383eedd8ad1ea1854fe14", "score": "0.45085585", "text": "func UnmarshalFloatingIPReferenceDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(FloatingIPReferenceDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "22adb5207cf879cc16c8eda2a681ffff", "score": "0.450512", "text": "func (*EmojiKeywordDeleted) TypeName() string {\n\treturn \"emojiKeywordDeleted\"\n}", "title": "" }, { "docid": "a8efb48f76af798bd82fa5b941a993d5", "score": "0.4503582", "text": "func (i *InputMediaGeoLive) FillFrom(from interface {\n\tGetStopped() (value bool)\n\tGetGeoPoint() (value InputGeoPointClass)\n\tGetHeading() (value int, ok bool)\n\tGetPeriod() (value int, ok bool)\n\tGetProximityNotificationRadius() (value int, ok bool)\n}) {\n\ti.Stopped = from.GetStopped()\n\ti.GeoPoint = from.GetGeoPoint()\n\tif val, ok := from.GetHeading(); ok {\n\t\ti.Heading = val\n\t}\n\n\tif val, ok := from.GetPeriod(); ok {\n\t\ti.Period = val\n\t}\n\n\tif val, ok := from.GetProximityNotificationRadius(); ok {\n\t\ti.ProximityNotificationRadius = val\n\t}\n\n}", "title": "" }, { "docid": "89dda23657ab4f4440c7df52a667fbb0", "score": "0.44987458", "text": "func (a *MessagesAffectedHistory) FillFrom(from interface {\n\tGetPts() (value int)\n\tGetPtsCount() (value int)\n\tGetOffset() (value int)\n}) {\n\ta.Pts = from.GetPts()\n\ta.PtsCount = from.GetPtsCount()\n\ta.Offset = from.GetOffset()\n}", "title": "" }, { "docid": "d6ac4a4631170db8b39fa7a86194dd32", "score": "0.4496458", "text": "func (obj *GlobalConfigListUpdate) UnmarshalFrom(data []byte) (int, error) {\n\tvar n int\n\n\tif len(obj.Key) > 20 {\n\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigListUpdate.Key\")\n\t}\n\n\tif len(data[n:]) < 1 {\n\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigListUpdate.Key\")\n\t}\n\t{\n\t\tiL, ni := binary.Uvarint(data[n:])\n\t\tif ni <= 0 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"Obtaining length of GlobalConfigListUpdate.Key\")\n\t\t}\n\t\tn += ni\n\t\tif iL > 20 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigListUpdate.Key\")\n\t\t}\n\n\t\tif iL > uint64(len(data[n:])) {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigListUpdate.Key\")\n\t\t}\n\t\tbyt := make([]byte, iL)\n\t\tn += copy(byt, data[n:uint64(n)+iL])\n\t\tobj.Key = string(byt)\n\t}\n\n\t{\n\t\tiLen, ni := binary.Uvarint(data[n:])\n\t\tif ni <= 0 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"Obtaining length of GlobalConfigListUpdate.Deletions\")\n\t\t}\n\t\tn += ni\n\t\tif iLen > 20 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigListUpdate.Deletions\")\n\t\t}\n\t\tobj.Deletions = make([]uint64, iLen)\n\t\tfor i := uint64(0); i < iLen; i++ {\n\n\t\t\tif len(data[n:]) < 1 {\n\t\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigListUpdate.Deletions\")\n\t\t\t}\n\t\t\t{\n\t\t\t\tiL, ni := binary.Uvarint(data[n:])\n\t\t\t\tif ni <= 0 {\n\t\t\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigListUpdate.Deletions\")\n\t\t\t\t}\n\t\t\t\tif iL&math.MaxUint64 != iL {\n\t\t\t\t\treturn 0, errors.Wrap(ranger.ErrTooLarge, \"GlobalConfigListUpdate.Deletions\")\n\t\t\t\t}\n\t\t\t\tobj.Deletions[i] = uint64(iL)\n\t\t\t\tn += ni\n\t\t\t}\n\t\t}\n\t}\n\n\t{\n\t\tiLen, ni := binary.Uvarint(data[n:])\n\t\tif ni <= 0 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"Obtaining length of GlobalConfigListUpdate.Insertions\")\n\t\t}\n\t\tn += ni\n\t\tif iLen > 20 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigListUpdate.Insertions\")\n\t\t}\n\t\tobj.Insertions = make([]*GlobalConfigListInsertion, iLen)\n\t\tfor i := uint64(0); i < iLen; i++ {\n\t\t\tobj.Insertions[i] = &GlobalConfigListInsertion{}\n\n\t\t\tif len(data[n:]) < 2 {\n\t\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigListUpdate.Insertions\")\n\t\t\t}\n\t\t\t{\n\t\t\t\tni, err := obj.Insertions[i].UnmarshalFrom(data[n:])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn 0, errors.Wrap(err, \"GlobalConfigListUpdate.Insertions\")\n\t\t\t\t}\n\t\t\t\tn += ni\n\t\t\t}\n\t\t}\n\t}\n\n\treturn n, nil\n}", "title": "" }, { "docid": "b6cd6d539ab113ad2612a9d64922baf1", "score": "0.44902936", "text": "func (s *SearchResultPosition) FillFrom(from interface {\n\tGetMsgID() (value int)\n\tGetDate() (value int)\n\tGetOffset() (value int)\n}) {\n\ts.MsgID = from.GetMsgID()\n\ts.Date = from.GetDate()\n\ts.Offset = from.GetOffset()\n}", "title": "" }, { "docid": "9487c821c72e4515c68f3cef8794196c", "score": "0.44815743", "text": "func (c *MessagesChats) FillFrom(from interface {\n\tGetChats() (value []ChatClass)\n}) {\n\tc.Chats = from.GetChats()\n}", "title": "" }, { "docid": "9f9d935be0c65f966ade51e18e9a4a01", "score": "0.4481043", "text": "func UnmarshalNetworkInterfaceBareMetalServerContextReferenceDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(NetworkInterfaceBareMetalServerContextReferenceDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "ffd48b4bb07eb77634df93852b214146", "score": "0.44802526", "text": "func (k *KeyboardButtonSwitchInline) FillFrom(from interface {\n\tGetSamePeer() (value bool)\n\tGetText() (value string)\n\tGetQuery() (value string)\n\tGetPeerTypes() (value []InlineQueryPeerTypeClass, ok bool)\n}) {\n\tk.SamePeer = from.GetSamePeer()\n\tk.Text = from.GetText()\n\tk.Query = from.GetQuery()\n\tif val, ok := from.GetPeerTypes(); ok {\n\t\tk.PeerTypes = val\n\t}\n\n}", "title": "" }, { "docid": "22e8fe2e85026d4774b92a915eecee93", "score": "0.44592893", "text": "func (k *KeyboardButtonRequestPhone) FillFrom(from interface {\n\tGetText() (value string)\n}) {\n\tk.Text = from.GetText()\n}", "title": "" }, { "docid": "9063919347c68a4ff0f9d087da3c876f", "score": "0.44558117", "text": "func (e *MessagesExportedChatInviteReplaced) FillFrom(from interface {\n\tGetInvite() (value ExportedChatInviteClass)\n\tGetNewInvite() (value ExportedChatInviteClass)\n\tGetUsers() (value []UserClass)\n}) {\n\te.Invite = from.GetInvite()\n\te.NewInvite = from.GetNewInvite()\n\te.Users = from.GetUsers()\n}", "title": "" }, { "docid": "bde154ba776868edb8ed37e13415d3c0", "score": "0.4452065", "text": "func (i *InputMediaDocumentExternal) FillFrom(from interface {\n\tGetSpoiler() (value bool)\n\tGetURL() (value string)\n\tGetTTLSeconds() (value int, ok bool)\n}) {\n\ti.Spoiler = from.GetSpoiler()\n\ti.URL = from.GetURL()\n\tif val, ok := from.GetTTLSeconds(); ok {\n\t\ti.TTLSeconds = val\n\t}\n\n}", "title": "" }, { "docid": "453a790b545170b061a5786236ab25be", "score": "0.44465482", "text": "func (r *MessagesReactions) FillFrom(from interface {\n\tGetHash() (value int64)\n\tGetReactions() (value []ReactionClass)\n}) {\n\tr.Hash = from.GetHash()\n\tr.Reactions = from.GetReactions()\n}", "title": "" }, { "docid": "46db523b33074ed0489cececb836373b", "score": "0.44387856", "text": "func (ec *executionContext) unmarshalInputDeleteItem(ctx context.Context, obj interface{}) (DeleteItem, error) {\n\tvar it DeleteItem\n\tvar asMap = obj.(map[string]interface{})\n\n\tfor k, v := range asMap {\n\t\tswitch k {\n\t\tcase \"id\":\n\t\t\tvar err error\n\t\t\tit.ID, err = ec.unmarshalNID2string(ctx, v)\n\t\t\tif err != nil {\n\t\t\t\treturn it, err\n\t\t\t}\n\t\tcase \"table\":\n\t\t\tvar err error\n\t\t\tit.Table, err = ec.unmarshalNID2string(ctx, v)\n\t\t\tif err != nil {\n\t\t\t\treturn it, err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn it, nil\n}", "title": "" }, { "docid": "5dc39e728e08ddcfe84d348b76c0c014", "score": "0.44104728", "text": "func (i *InputKeyboardButtonURLAuth) FillFrom(from interface {\n\tGetRequestWriteAccess() (value bool)\n\tGetText() (value string)\n\tGetFwdText() (value string, ok bool)\n\tGetURL() (value string)\n\tGetBot() (value InputUserClass)\n}) {\n\ti.RequestWriteAccess = from.GetRequestWriteAccess()\n\ti.Text = from.GetText()\n\tif val, ok := from.GetFwdText(); ok {\n\t\ti.FwdText = val\n\t}\n\n\ti.URL = from.GetURL()\n\ti.Bot = from.GetBot()\n}", "title": "" }, { "docid": "e5911272ab7f17575d66718a51341fbe", "score": "0.43980527", "text": "func (s ForumTopicDeletedArray) FillMap(to map[int]ForumTopicDeleted) {\n\tfor _, value := range s {\n\t\tto[value.GetID()] = value\n\t}\n}", "title": "" }, { "docid": "60343e91c57fdeedfa2f8ff7fcfffef8", "score": "0.43914318", "text": "func (g *MessagesGetWebPagePreviewRequest) FillFrom(from interface {\n\tGetMessage() (value string)\n\tGetEntities() (value []MessageEntityClass, ok bool)\n}) {\n\tg.Message = from.GetMessage()\n\tif val, ok := from.GetEntities(); ok {\n\t\tg.Entities = val\n\t}\n\n}", "title": "" }, { "docid": "643574dd0492903bacdbbdef2fc89502", "score": "0.43896607", "text": "func (i *ImportedContact) FillFrom(from interface {\n\tGetUserID() (value int64)\n\tGetClientID() (value int64)\n}) {\n\ti.UserID = from.GetUserID()\n\ti.ClientID = from.GetClientID()\n}", "title": "" }, { "docid": "4c9ca7589e6f569a123185ff76b72dd0", "score": "0.43876857", "text": "func (i *InputMediaUploadedDocument) FillFrom(from interface {\n\tGetNosoundVideo() (value bool)\n\tGetForceFile() (value bool)\n\tGetSpoiler() (value bool)\n\tGetFile() (value InputFileClass)\n\tGetThumb() (value InputFileClass, ok bool)\n\tGetMimeType() (value string)\n\tGetAttributes() (value []DocumentAttributeClass)\n\tGetStickers() (value []InputDocumentClass, ok bool)\n\tGetTTLSeconds() (value int, ok bool)\n}) {\n\ti.NosoundVideo = from.GetNosoundVideo()\n\ti.ForceFile = from.GetForceFile()\n\ti.Spoiler = from.GetSpoiler()\n\ti.File = from.GetFile()\n\tif val, ok := from.GetThumb(); ok {\n\t\ti.Thumb = val\n\t}\n\n\ti.MimeType = from.GetMimeType()\n\ti.Attributes = from.GetAttributes()\n\tif val, ok := from.GetStickers(); ok {\n\t\ti.Stickers = val\n\t}\n\n\tif val, ok := from.GetTTLSeconds(); ok {\n\t\ti.TTLSeconds = val\n\t}\n\n}", "title": "" }, { "docid": "bd5c66a1fd094bc277765db1a73c4976", "score": "0.43799546", "text": "func (i *InputGameShortName) FillFrom(from interface {\n\tGetBotID() (value InputUserClass)\n\tGetShortName() (value string)\n}) {\n\ti.BotID = from.GetBotID()\n\ti.ShortName = from.GetShortName()\n}", "title": "" }, { "docid": "0321502f70d1ce8d469c7c16f06bd2ca", "score": "0.43753543", "text": "func (i *InputPeerChannel) FillFrom(from interface {\n\tGetChannelID() (value int64)\n\tGetAccessHash() (value int64)\n}) {\n\ti.ChannelID = from.GetChannelID()\n\ti.AccessHash = from.GetAccessHash()\n}", "title": "" }, { "docid": "551661c21e02e19654778b0cc4dae330", "score": "0.43733555", "text": "func (i *InputMediaStory) FillFrom(from interface {\n\tGetUserID() (value InputUserClass)\n\tGetID() (value int)\n}) {\n\ti.UserID = from.GetUserID()\n\ti.ID = from.GetID()\n}", "title": "" }, { "docid": "ca776803d322f622aad02f924e8675cf", "score": "0.43622583", "text": "func (k *KeyboardButtonRequestPoll) FillFrom(from interface {\n\tGetQuiz() (value bool, ok bool)\n\tGetText() (value string)\n}) {\n\tif val, ok := from.GetQuiz(); ok {\n\t\tk.Quiz = val\n\t}\n\n\tk.Text = from.GetText()\n}", "title": "" }, { "docid": "c9ec9b0e0ec8119de22d7ef80c7f35f9", "score": "0.43400037", "text": "func (x *Keyword) UnmarshalJSON(b []byte) error {\n\tnum, err := protoimpl.X.UnmarshalJSONEnum(x.Descriptor(), b)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*x = Keyword(num)\n\treturn nil\n}", "title": "" }, { "docid": "e9ded08a86022ffd37e174b9264dd609", "score": "0.43332106", "text": "func (i *InputReplyToMessage) FillFrom(from interface {\n\tGetReplyToMsgID() (value int)\n\tGetTopMsgID() (value int, ok bool)\n}) {\n\ti.ReplyToMsgID = from.GetReplyToMsgID()\n\tif val, ok := from.GetTopMsgID(); ok {\n\t\ti.TopMsgID = val\n\t}\n\n}", "title": "" }, { "docid": "5bad7649442b3b29015fb10fe2a20349", "score": "0.43331546", "text": "func (i *InputMediaPhoto) FillFrom(from interface {\n\tGetSpoiler() (value bool)\n\tGetID() (value InputPhotoClass)\n\tGetTTLSeconds() (value int, ok bool)\n}) {\n\ti.Spoiler = from.GetSpoiler()\n\ti.ID = from.GetID()\n\tif val, ok := from.GetTTLSeconds(); ok {\n\t\ti.TTLSeconds = val\n\t}\n\n}", "title": "" }, { "docid": "e37b03dd32bf896714c43df9a723bef4", "score": "0.43273395", "text": "func (g *MessagesGetMessageEditDataRequest) FillFrom(from interface {\n\tGetPeer() (value InputPeerClass)\n\tGetID() (value int)\n}) {\n\tg.Peer = from.GetPeer()\n\tg.ID = from.GetID()\n}", "title": "" }, { "docid": "9c71890f6194415831797b3e1325fb56", "score": "0.43100995", "text": "func (i *InputUserFromMessage) FillFrom(from interface {\n\tGetPeer() (value InputPeerClass)\n\tGetMsgID() (value int)\n\tGetUserID() (value int)\n}) {\n\ti.Peer = from.GetPeer()\n\ti.MsgID = from.GetMsgID()\n\ti.UserID = from.GetUserID()\n}", "title": "" }, { "docid": "73c33f34926ba17dff9aebc0dc4f1359", "score": "0.43058094", "text": "func UnmarshalReservedIPReferenceDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(ReservedIPReferenceDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "d5d76942af044452626b98483d8b2307", "score": "0.43044588", "text": "func (u *Username) FillFrom(from interface {\n\tGetEditable() (value bool)\n\tGetActive() (value bool)\n\tGetUsername() (value string)\n}) {\n\tu.Editable = from.GetEditable()\n\tu.Active = from.GetActive()\n\tu.Username = from.GetUsername()\n}", "title": "" }, { "docid": "0cfcfd745cda0145b1fe8d0f1e6a7a2b", "score": "0.4302786", "text": "func (a *AvailableReaction) FillFrom(from interface {\n\tGetInactive() (value bool)\n\tGetPremium() (value bool)\n\tGetReaction() (value string)\n\tGetTitle() (value string)\n\tGetStaticIcon() (value DocumentClass)\n\tGetAppearAnimation() (value DocumentClass)\n\tGetSelectAnimation() (value DocumentClass)\n\tGetActivateAnimation() (value DocumentClass)\n\tGetEffectAnimation() (value DocumentClass)\n\tGetAroundAnimation() (value DocumentClass, ok bool)\n\tGetCenterIcon() (value DocumentClass, ok bool)\n}) {\n\ta.Inactive = from.GetInactive()\n\ta.Premium = from.GetPremium()\n\ta.Reaction = from.GetReaction()\n\ta.Title = from.GetTitle()\n\ta.StaticIcon = from.GetStaticIcon()\n\ta.AppearAnimation = from.GetAppearAnimation()\n\ta.SelectAnimation = from.GetSelectAnimation()\n\ta.ActivateAnimation = from.GetActivateAnimation()\n\ta.EffectAnimation = from.GetEffectAnimation()\n\tif val, ok := from.GetAroundAnimation(); ok {\n\t\ta.AroundAnimation = val\n\t}\n\n\tif val, ok := from.GetCenterIcon(); ok {\n\t\ta.CenterIcon = val\n\t}\n\n}", "title": "" }, { "docid": "5a5336d876e0b6b884ce0a22d10da77e", "score": "0.428824", "text": "func (c *MessagesChatsSlice) FillFrom(from interface {\n\tGetCount() (value int)\n\tGetChats() (value []ChatClass)\n}) {\n\tc.Count = from.GetCount()\n\tc.Chats = from.GetChats()\n}", "title": "" }, { "docid": "66283be63fba2c9e81e2a72ac4b6ea68", "score": "0.42780086", "text": "func (i *InputReplyToStory) FillFrom(from interface {\n\tGetUserID() (value InputUserClass)\n\tGetStoryID() (value int)\n}) {\n\ti.UserID = from.GetUserID()\n\ti.StoryID = from.GetStoryID()\n}", "title": "" }, { "docid": "b452d86210accfaf273c91fbb511fbac", "score": "0.42655173", "text": "func (b *BotInfo) FillFrom(from interface {\n\tGetUserID() (value int64, ok bool)\n\tGetDescription() (value string, ok bool)\n\tGetDescriptionPhoto() (value PhotoClass, ok bool)\n\tGetDescriptionDocument() (value DocumentClass, ok bool)\n\tGetCommands() (value []BotCommand, ok bool)\n\tGetMenuButton() (value BotMenuButtonClass, ok bool)\n}) {\n\tif val, ok := from.GetUserID(); ok {\n\t\tb.UserID = val\n\t}\n\n\tif val, ok := from.GetDescription(); ok {\n\t\tb.Description = val\n\t}\n\n\tif val, ok := from.GetDescriptionPhoto(); ok {\n\t\tb.DescriptionPhoto = val\n\t}\n\n\tif val, ok := from.GetDescriptionDocument(); ok {\n\t\tb.DescriptionDocument = val\n\t}\n\n\tif val, ok := from.GetCommands(); ok {\n\t\tb.Commands = val\n\t}\n\n\tif val, ok := from.GetMenuButton(); ok {\n\t\tb.MenuButton = val\n\t}\n\n}", "title": "" }, { "docid": "ccd8a562abb912d6dda4e67924a98e1e", "score": "0.42615396", "text": "func (c *MessagesChatInviteImporters) FillFrom(from interface {\n\tGetCount() (value int)\n\tGetImporters() (value []ChatInviteImporter)\n\tGetUsers() (value []UserClass)\n}) {\n\tc.Count = from.GetCount()\n\tc.Importers = from.GetImporters()\n\tc.Users = from.GetUsers()\n}", "title": "" }, { "docid": "f2ef7dd18141dce0002e44f74bd451c1", "score": "0.42596504", "text": "func (i *ContactsImportContactTokenRequest) FillFrom(from interface {\n\tGetToken() (value string)\n}) {\n\ti.Token = from.GetToken()\n}", "title": "" }, { "docid": "06efecc111a0cc77aeca7a5673ed57e7", "score": "0.4255971", "text": "func (i *InputPeerChannelFromMessage) FillFrom(from interface {\n\tGetPeer() (value InputPeerClass)\n\tGetMsgID() (value int)\n\tGetChannelID() (value int64)\n}) {\n\ti.Peer = from.GetPeer()\n\ti.MsgID = from.GetMsgID()\n\ti.ChannelID = from.GetChannelID()\n}", "title": "" }, { "docid": "71e7b3ac6c8f7f6af0145e8734e0962d", "score": "0.4244136", "text": "func (k *KeyboardButtonWebView) FillFrom(from interface {\n\tGetText() (value string)\n\tGetURL() (value string)\n}) {\n\tk.Text = from.GetText()\n\tk.URL = from.GetURL()\n}", "title": "" }, { "docid": "730b439ba70ebcd5c71bc333a1f25efd", "score": "0.4234976", "text": "func (c *ChannelMessagesFilter) FillFrom(from interface {\n\tGetExcludeNewMessages() (value bool)\n\tGetRanges() (value []MessageRange)\n}) {\n\tc.ExcludeNewMessages = from.GetExcludeNewMessages()\n\tc.Ranges = from.GetRanges()\n}", "title": "" }, { "docid": "b594d11f70bf01358ab98999d42bd92d", "score": "0.42340767", "text": "func (k *KeyQueue) Clear() {\n\tk.Keys = []rune{}\n}", "title": "" }, { "docid": "05065433cfdca9698ad602c1d472ed5f", "score": "0.42329642", "text": "func (i *InputMediaPhotoExternal) FillFrom(from interface {\n\tGetSpoiler() (value bool)\n\tGetURL() (value string)\n\tGetTTLSeconds() (value int, ok bool)\n}) {\n\ti.Spoiler = from.GetSpoiler()\n\ti.URL = from.GetURL()\n\tif val, ok := from.GetTTLSeconds(); ok {\n\t\ti.TTLSeconds = val\n\t}\n\n}", "title": "" }, { "docid": "b7ec2d7e6865d1ceeda70a34178d3624", "score": "0.42302242", "text": "func (i *InputMediaVenue) FillFrom(from interface {\n\tGetGeoPoint() (value InputGeoPointClass)\n\tGetTitle() (value string)\n\tGetAddress() (value string)\n\tGetProvider() (value string)\n\tGetVenueID() (value string)\n\tGetVenueType() (value string)\n}) {\n\ti.GeoPoint = from.GetGeoPoint()\n\ti.Title = from.GetTitle()\n\ti.Address = from.GetAddress()\n\ti.Provider = from.GetProvider()\n\ti.VenueID = from.GetVenueID()\n\ti.VenueType = from.GetVenueType()\n}", "title": "" }, { "docid": "132f01add76fea32eeaa4b74c54305de", "score": "0.42237344", "text": "func (e *MessagesExportedChatInvite) FillFrom(from interface {\n\tGetInvite() (value ExportedChatInviteClass)\n\tGetUsers() (value []UserClass)\n}) {\n\te.Invite = from.GetInvite()\n\te.Users = from.GetUsers()\n}", "title": "" }, { "docid": "e8d19ad1b75d5ecdc6b2304252025638", "score": "0.4222151", "text": "func (r *BotsReorderUsernamesRequest) FillFrom(from interface {\n\tGetBot() (value InputUserClass)\n\tGetOrder() (value []string)\n}) {\n\tr.Bot = from.GetBot()\n\tr.Order = from.GetOrder()\n}", "title": "" }, { "docid": "28a8dddad3d32fc8c9692fdb2e98825b", "score": "0.42139855", "text": "func (i *InputUser) FillFrom(from interface {\n\tGetUserID() (value int)\n\tGetAccessHash() (value int64)\n}) {\n\ti.UserID = from.GetUserID()\n\ti.AccessHash = from.GetAccessHash()\n}", "title": "" }, { "docid": "37c9537ebc906553f42a45eb36f6f191", "score": "0.42137337", "text": "func (x *fastReflection_ExampleTable_ExampleMessage) Clear(fd protoreflect.FieldDescriptor) {\n\tswitch fd.FullName() {\n\tcase \"testpb.ExampleTable.ExampleMessage.foo\":\n\t\tx.Foo = \"\"\n\tcase \"testpb.ExampleTable.ExampleMessage.bar\":\n\t\tx.Bar = int32(0)\n\tdefault:\n\t\tif fd.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: testpb.ExampleTable.ExampleMessage\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message testpb.ExampleTable.ExampleMessage does not contain field %s\", fd.FullName()))\n\t}\n}", "title": "" }, { "docid": "6dcd4d7910cb8fe19b215347e919faff", "score": "0.41962522", "text": "func UnmarshalImageReferenceDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(ImageReferenceDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "6277a7f95dab769d12986162400ade79", "score": "0.41866368", "text": "func (i *InputMediaUploadedPhoto) FillFrom(from interface {\n\tGetSpoiler() (value bool)\n\tGetFile() (value InputFileClass)\n\tGetStickers() (value []InputDocumentClass, ok bool)\n\tGetTTLSeconds() (value int, ok bool)\n}) {\n\ti.Spoiler = from.GetSpoiler()\n\ti.File = from.GetFile()\n\tif val, ok := from.GetStickers(); ok {\n\t\ti.Stickers = val\n\t}\n\n\tif val, ok := from.GetTTLSeconds(); ok {\n\t\ti.TTLSeconds = val\n\t}\n\n}", "title": "" }, { "docid": "f8f5301ed8efd762e0652619587b4073", "score": "0.41845536", "text": "func (p *PollAnswer) FillFrom(from interface {\n\tGetText() (value string)\n\tGetOption() (value []byte)\n}) {\n\tp.Text = from.GetText()\n\tp.Option = from.GetOption()\n}", "title": "" }, { "docid": "405e0b9ac7f6d60d6fa0d2eeb52c4f8a", "score": "0.41748405", "text": "func (i *AuthImportAuthorizationRequest) FillFrom(from interface {\n\tGetID() (value int64)\n\tGetBytes() (value []byte)\n}) {\n\ti.ID = from.GetID()\n\ti.Bytes = from.GetBytes()\n}", "title": "" }, { "docid": "36cdfe6faa1fd33143993794eb3637af", "score": "0.41725802", "text": "func UnmarshalChannelDelete(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(ChannelDelete)\n\terr = core.UnmarshalPrimitive(m, \"channel_id\", &obj.ChannelID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"message\", &obj.Message)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "cb275ad910594b76f20dc1f006e25a19", "score": "0.41701543", "text": "func (m *MessagesMessageViews) FillFrom(from interface {\n\tGetViews() (value []MessageViews)\n\tGetChats() (value []ChatClass)\n\tGetUsers() (value []UserClass)\n}) {\n\tm.Views = from.GetViews()\n\tm.Chats = from.GetChats()\n\tm.Users = from.GetUsers()\n}", "title": "" }, { "docid": "2bb3f1a268ebcbbd6a45787f72cd0cb5", "score": "0.41671568", "text": "func (i *InputMediaContact) FillFrom(from interface {\n\tGetPhoneNumber() (value string)\n\tGetFirstName() (value string)\n\tGetLastName() (value string)\n\tGetVcard() (value string)\n}) {\n\ti.PhoneNumber = from.GetPhoneNumber()\n\ti.FirstName = from.GetFirstName()\n\ti.LastName = from.GetLastName()\n\ti.Vcard = from.GetVcard()\n}", "title": "" }, { "docid": "867eccb0d23abfefe49d43c8672f9df0", "score": "0.4155", "text": "func (i *InputPeerChat) FillFrom(from interface {\n\tGetChatID() (value int64)\n}) {\n\ti.ChatID = from.GetChatID()\n}", "title": "" }, { "docid": "d396b6428388b3f757affea2196c0c96", "score": "0.41511872", "text": "func (a *BotsAnswerWebhookJSONQueryRequest) FillFrom(from interface {\n\tGetQueryID() (value int64)\n\tGetData() (value DataJSON)\n}) {\n\ta.QueryID = from.GetQueryID()\n\ta.Data = from.GetData()\n}", "title": "" }, { "docid": "9c08fba3c1487fb97bfb61765c2048c7", "score": "0.41386563", "text": "func UnmarshalPublicGatewayReferenceDeleted(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(PublicGatewayReferenceDeleted)\n\terr = core.UnmarshalPrimitive(m, \"more_info\", &obj.MoreInfo)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "be93f40db2e5ce54d116a18dd41e35c3", "score": "0.41364175", "text": "func (i *InputMediaGeoPoint) FillFrom(from interface {\n\tGetGeoPoint() (value InputGeoPointClass)\n}) {\n\ti.GeoPoint = from.GetGeoPoint()\n}", "title": "" }, { "docid": "3820474b243c33f6634830e67f62f90a", "score": "0.4124247", "text": "func (i *InputPeerNotifySettings) FillFrom(from interface {\n\tGetShowPreviews() (value bool, ok bool)\n\tGetSilent() (value bool, ok bool)\n\tGetMuteUntil() (value int, ok bool)\n\tGetSound() (value string, ok bool)\n}) {\n\tif val, ok := from.GetShowPreviews(); ok {\n\t\ti.ShowPreviews = val\n\t}\n\n\tif val, ok := from.GetSilent(); ok {\n\t\ti.Silent = val\n\t}\n\n\tif val, ok := from.GetMuteUntil(); ok {\n\t\ti.MuteUntil = val\n\t}\n\n\tif val, ok := from.GetSound(); ok {\n\t\ti.Sound = val\n\t}\n\n}", "title": "" }, { "docid": "a216cfa6d2b6022863a4b48b4630dca2", "score": "0.4123269", "text": "func (g *MessagesGetExportedChatInvitesRequest) FillFrom(from interface {\n\tGetRevoked() (value bool)\n\tGetPeer() (value InputPeerClass)\n\tGetAdminID() (value InputUserClass)\n\tGetOffsetDate() (value int, ok bool)\n\tGetOffsetLink() (value string, ok bool)\n\tGetLimit() (value int)\n}) {\n\tg.Revoked = from.GetRevoked()\n\tg.Peer = from.GetPeer()\n\tg.AdminID = from.GetAdminID()\n\tif val, ok := from.GetOffsetDate(); ok {\n\t\tg.OffsetDate = val\n\t}\n\n\tif val, ok := from.GetOffsetLink(); ok {\n\t\tg.OffsetLink = val\n\t}\n\n\tg.Limit = from.GetLimit()\n}", "title": "" } ]
842d17d57adceb3cd06104205c8b5124
AddPost handler adds a new Post
[ { "docid": "9dbf3ff0830816e8a014054b06dbedd7", "score": "0.7842215", "text": "func (*postController) AddPost(response http.ResponseWriter, request *http.Request) {\n\tresponse.Header().Set(\"content-type\", \"application/json\")\n\tvar post entity.Post\n\terr := json.NewDecoder(request.Body).Decode(&post)\n\tif err != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(response).Encode(errors.ServiceError{Message: \"Error unmarshalling request\"})\n\t\treturn\n\t}\n\terr1 := postService.Validate(&post)\n\tif err1 != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(response).Encode(errors.ServiceError{Message: err1.Error()})\n\t\treturn\n\t}\n\tresult, err2 := postService.Create(&post)\n\tif err2 != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(response).Encode(errors.ServiceError{Message: \"Error saving the post\"})\n\t\treturn\n\t}\n\tresponse.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(response).Encode(result)\n}", "title": "" } ]
[ { "docid": "ad2540a9df1ce23ba341d642ce5deaa0", "score": "0.8196535", "text": "func (h postHandler) AddPost(w http.ResponseWriter, r *http.Request) {\n\tvar post adding.Post\n\n\tdecoder := json.NewDecoder(r.Body)\n\tif err := decoder.Decode(&post); err != nil {\n\t\thttp.Error(w, \"Failed to parse post\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tcredentials := r.Context().Value(\"credentials\").(*auth.AppClaims)\n\tpost.AuthorID = credentials.ID\n\n\tif err := h.a.AddPost(post); err != nil {\n\t\thttp.Error(w, \"Failed to add post\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(\"New post added.\")\n}", "title": "" }, { "docid": "a30fb7d202c6af52f5f94b63876c584c", "score": "0.7680823", "text": "func addPost(\n\ttitle, content, author, timestamp string, context ServerContext, access Access,\n) error {\n\t// Check character limits\n\n\tif utf8.RuneCountInString(title) > TITLE_LIMIT {\n\t\treturn fmt.Errorf(\"post title length is over %d chars\", TITLE_LIMIT)\n\t}\n\n\tif utf8.RuneCountInString(content) > CONTENT_LIMIT {\n\t\treturn fmt.Errorf(\"post content length is over %d chars\", CONTENT_LIMIT)\n\t}\n\n\tthis := &post{\n\t\ttitle: title,\n\t\tcontent: content,\n\t\tauthor: author,\n\t\ttimestamp: timestamp,\n\t\twasEdited: false,\n\t}\n\n\t// Update data\n\terr := access.SaveWithDir(this, this.GetDir(), true, context)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Printf(\"Created %s\", this)\n\n\treturn nil\n}", "title": "" }, { "docid": "c9ee6d909c8f78bc2f7811c2a1c8bd99", "score": "0.703577", "text": "func AddPost(inputPost *PostAdding) (interface{}, error) {\n\n\tresult, err := database.PostCollection.InsertOne(context.TODO(), inputPost)\n\n\treturn result.InsertedID, err\n}", "title": "" }, { "docid": "06780669e81134be9bbd9cb315f3e468", "score": "0.7010705", "text": "func (db ElectionDatabase) AddNewPost(post *models.Post) error {\n postsCollection := db.Session.DB(config.MongoDbName).C(\"posts\")\n err := postsCollection.Insert(&post)\n return err\n}", "title": "" }, { "docid": "bd66c6546b4e5f59c255865d22011e68", "score": "0.6832407", "text": "func createNewPost(w http.ResponseWriter, r *http.Request) {\n\tfmt.Println(\"Add new post\")\n\tbody, err := ioutil.ReadAll(r.Body)\n\n\tif err == nil {\n\t\tnewPost := &PetGagPost{}\n\t\terr = json.Unmarshal(body, &newPost)\n\n\t\tif err == nil {\n\t\t\tid := newPost.ImageURL\n\n\t\t\tif id == \"\" {\n\t\t\t\tbadRequest(w, errors.New(\"Missing ImageURL\"))\n\t\t\t\treturn\n\t\t\t}\n\t\t\tprimary, _:= primaryNode(id)\n\t\t\tinfra.SendUnicast(primary.Hostname, string(body), KIND_FORWARD)\n\t\t\tok := waitFor(ForwardAckChan, TIME_OUT)\n\n\t\t\tif ok {\n\t\t\t\trequestOk(w)\n\t\t\t\treturn\n\t\t\t} else {\n\t\t\t\tinternalError(w, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\tbadRequest(w, err)\n}", "title": "" }, { "docid": "96afc1447d563779d9e1e5fdc5d10662", "score": "0.6688252", "text": "func (s *PostDB) AddPost(ctx context.Context, req *pb.AddPostReq) (*pb.PostResp, error) {\n\tr := &pb.PostResp{}\n\tif err := s.upsertPost(ctx, \"\", req, r); err != nil {\n\t\treturn nil, err\n\t}\n\treturn r, nil\n}", "title": "" }, { "docid": "3e32c3ecec69d59c8718cd2f3eacae3e", "score": "0.6670606", "text": "func (p *Storage) AddPost(ctx context.Context, post *entities.Post) (uint64, error) {\n resp, err := p.TNT.Insert(\"posts\",[]interface{}{nil,post.UserID, post.Content, post.Created})\n if err != nil {\n \treturn 0, err\n\t}\n id, ok := resp.Tuples()[0][0].(uint64)\n if !ok {\n \treturn 0, exceptions.NotInt64\n\t}\n\treturn id, nil\n}", "title": "" }, { "docid": "8c1e9bf4ef5c7dac1c62fdc75b564968", "score": "0.6571329", "text": "func NewPost(w http.ResponseWriter, r *http.Request) {\n\tvar m models.SendPost\n\terr := json.NewDecoder(r.Body).Decode(&m)\n\tif err != nil {\n\t\thttp.Error(w, \"Error en el json \"+err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif len(m.Message) == 0 {\n\t\thttp.Error(w, \"El post esta vacio\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tpost := models.Post{\n\t\tUserID: IDUser,\n\t\tBody: m.Message,\n\t\tDate: time.Now(),\n\t}\n\n\t_, status, err := db.InsertPost(post)\n\tif err != nil {\n\t\thttp.Error(w, \"Error al insertar post \"+err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif !status {\n\t\thttp.Error(w, \"No se inserto post\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusCreated)\n}", "title": "" }, { "docid": "969a5a1bf39f4e386d622fd67c38311a", "score": "0.6564751", "text": "func NewPost() *Post {\n\treturn &Post{}\n}", "title": "" }, { "docid": "dfb8735afffbf2f41c9a5b0930f58157", "score": "0.6466768", "text": "func (r *Router) Post(args ...interface{}) {\n\tr.addHandle(\"POST\", args...)\n}", "title": "" }, { "docid": "7c391e6e070ad17f7f05b24cacc9e97e", "score": "0.64402163", "text": "func (router *Router) Post(route string, h HandlerFunc) *RouteHandler {\n\treturn router.add(\"POST\", route, h)\n}", "title": "" }, { "docid": "e81bd3de7f672935a29f429f0b3f476f", "score": "0.6432806", "text": "func CreatePost(w http.ResponseWriter, r *http.Request, db *scribble.Driver) {\n\n\tparams := mux.Vars(r)\n\tvar post Post\n\t_ = json.NewDecoder(r.Body).Decode(&post)\n\tpost.ID = params[\"id\"]\n\n\t// create the new post\n\terr := db.Write(\"post\", post.ID, post)\n\tLogError(err)\n\n\t// return the updated posts\n\tposts, err := db.ReadAll(\"post\")\n\tjson.NewEncoder(w).Encode(posts)\n}", "title": "" }, { "docid": "98a41eac0ca508ffd7762ae5b66481fb", "score": "0.6350941", "text": "func (server *Server) CreatePost(w http.ResponseWriter, r *http.Request) {\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponse.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tpost := model.Post{}\n\tif err = json.Unmarshal(body, &post); err != nil {\n\t\tresponse.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tpost.Prepare()\n\tif err = post.Validate(); err != nil {\n\t\tresponse.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tuid, err := auth.ExtractTokenID(r)\n\tif err != nil {\n\t\tresponse.ERROR(w, http.StatusUnauthorized, errors.New(\"Unauthorized\"))\n\t\treturn\n\t}\n\tif uid != post.AuthorID {\n\t\tresponse.ERROR(w, http.StatusUnauthorized, errors.New(http.StatusText(http.StatusUnauthorized)))\n\t\treturn\n\t}\n\tpostCreated, err := post.CreatePost(server.DB)\n\tif err != nil {\n\t\tformattedErr := formaterror.FormatError(err.Error())\n\t\tresponse.ERROR(w, http.StatusInternalServerError, formattedErr)\n\t\treturn\n\t}\n\tw.Header().Set(\"Location\", fmt.Sprintf(\"%s%s/%d\", r.Host, r.URL.Path, postCreated.ID))\n\tresponse.JSON(w, http.StatusCreated, postCreated)\n}", "title": "" }, { "docid": "d027a881c68620f956c97c1c14c5009a", "score": "0.6343509", "text": "func addPost(uname string, post string) bool{\n\tpostsLock.Lock()\n\tdefer postsLock.Unlock()\n\tfile, err := ioutil.ReadFile(\"posts_main.txt\")\n\tif(err != nil){\n\t\tfmt.Fprintln(os.Stderr,\"Failed to open post file\")\n\t\treturn false\n\t}\n\t//Cast slice of entire byte array to a string\n\tfileString := string(file)\n\t//Split on the : delimeter \n\tfileString += uname + \":\" + post + \"\\n\"\n\t//Write back the file the contents in addition the post\n\terr = ioutil.WriteFile(\"posts_main.txt\", []byte(fileString), 0644)\n\treturn err == nil\n}", "title": "" }, { "docid": "e4b0e39dd3a4b397846fe0c50854bd50", "score": "0.63070345", "text": "func (s *server) createPost(w http.ResponseWriter, r *http.Request) {\n\tvar p db.Post\n\tif err := json.NewDecoder(r.Body).Decode(&p); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ts.dbase.CreatePost(p)\n\tjson.NewEncoder(w).Encode(p)\n}", "title": "" }, { "docid": "56389af935d06ce4f8eb54fefaad53d6", "score": "0.6298271", "text": "func CreatePost(c *gin.Context) {\n\tvar user models.User\n\tvar payload models.PostPayload\n\n\t// 01: check if payload is valid json\n\tif err := c.ShouldBindJSON(&payload); err != nil {\n\t\tc.JSON(400, gin.H{\n\t\t\t\"msg\": \"invalid json\",\n\t\t})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\t// 02: check user and get user id and user name\n\t// since it's a protected route and user data is set\n\t// I can get the user data from gin context\n\temail, _ := c.Get(\"email\")\n\tif err := database.DBClient.Get(&user, getDBUserQuery, email); err != nil {\n\t\tlog.Println(err)\n\t\tc.JSON(400, gin.H{\n\t\t\t\"msg\": \"error getting user in db\",\n\t\t})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\t// 03: insert data\n\t// INSERT INTO posts (id, title, intro, stack, content, user_id, user_name) VALUES (uuid_generate_v4(), 'post1', 'some short description', 'stack', '# post title', 'user_id', 'user_name');\n\t_, err := database.DBClient.Exec(createPostQuery, &payload.Title, &payload.Intro, &payload.Stack, &payload.Content, &user.ID, &user.Name)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tc.JSON(500, gin.H{\n\t\t\t\"msg\": \"error adding post, check log\",\n\t\t})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tc.JSON(200, gin.H{\n\t\t\"msg\": \"success\",\n\t})\n}", "title": "" }, { "docid": "f7c2ed0f3eca51181a78ece2cdf1ba72", "score": "0.6274227", "text": "func AddPost(topicID, user, content string) (string, error) {\n\tdefer SetLastUpdateTopicPost()\n\ttopicIntID, err := strconv.ParseInt(topicID, 10, 64)\n\tif err != nil {\n\t\treturn \"\", errors.New(fmt.Sprintln(\"Can not convert ID:\", err))\n\t}\n\n\tdate := time.Now().Unix()\n\tr, err := db.Exec(\"INSERT INTO post (content, poster, time, topic) VALUES (?, ?, ?, ?)\", content, user, date, topicIntID)\n\tif err != nil {\n\t\treturn \"\", errors.New(fmt.Sprintln(\"Database error:\", err))\n\t}\n\n\tid, err := r.LastInsertId()\n\tif err != nil {\n\t\treturn \"\", errors.New(fmt.Sprintln(\"Database id error:\", err))\n\t}\n\n\treturn strconv.FormatInt(id, 10), nil\n}", "title": "" }, { "docid": "6152d53bf295b35b315fbe9bf38698b6", "score": "0.6231058", "text": "func CreatePost(w http.ResponseWriter, r *http.Request) {\n\tvar (\n\t\trepo repository.PostRepo = crud.NewPostRepoCRUD()\n\t\tuserCtx models.UserCtx = utils.GetUserFromCtx(r)\n\t\tinput models.InputPostCreateUpdate\n\t\tpost models.Post\n\t\tnewPost *models.Post\n\t\tstatus int\n\t\terr error\n\t)\n\tif err = json.NewDecoder(r.Body).Decode(&input); err != nil {\n\t\tresponse.Error(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\tpost = models.Post{\n\t\tTitle: input.Title,\n\t\tContent: input.Content,\n\t\tIsImage: input.IsImage,\n\t\tAuthorID: userCtx.ID,\n\t\tCreated: utils.CurrentUnixTime(),\n\t\tEdited: utils.CurrentUnixTime(),\n\t\tRating: 0,\n\t}\n\tif newPost, status, err = repo.Create(&post, input.Categories); err != nil {\n\t\tresponse.Error(w, status, err)\n\t\treturn\n\t}\n\n\tresponse.Success(w, fmt.Sprintf(\"post has been created\"), newPost)\n}", "title": "" }, { "docid": "a9173c13c8b371580eaadaf24335d70a", "score": "0.62004423", "text": "func NewPostHandler(app *fiber.App, p domain.PostUsecase) {\n\thandler := &PostHandler{\n\t\tPUsecase: p,\n\t}\n\n\tapp.Get(\"/posts\", handler.FetchPost)\n\tapp.Post(\"/posts\", handler.Store)\n\tapp.Get(\"/posts/:id\", handler.GetByID)\n\tapp.Delete(\"/posts/:id\", handler.Delete)\n}", "title": "" }, { "docid": "34da05847fff521bedcb1287dbd2bbfc", "score": "0.61627775", "text": "func (g *Gateway) NewPost(bpk cipher.PubKey, tRef skyobject.Reference, post *typ.Post) (e error) {\n\t// Check post.\n\tuc := g.userSaver.GetCurrent()\n\tif e = post.Sign(uc.GetPK(), uc.GetSK()); e != nil {\n\t\treturn\n\t}\n\tpost.Touch()\n\t// Check board.\n\tbi, has := g.boardSaver.Get(bpk)\n\tif has == false {\n\t\treturn errors.New(\"not subscribed to board\")\n\t}\n\t// Check if this BBS Node owns the board.\n\tif bi.Config.Master == true {\n\t\t// Via Container.\n\t\treturn g.container.NewPost(bpk, bi.Config.GetSK(), tRef, post)\n\t} else {\n\t\t// Via RPC Client.\n\t\treturn g.queueSaver.AddNewPostReq(bpk, tRef, post)\n\t}\n}", "title": "" }, { "docid": "07511c28d7c607a8adc690f9f6209c04", "score": "0.6162676", "text": "func (s *Server) Post(route string, handler interface{}) {\n\ts.addRoute(route, \"POST\", handler)\n}", "title": "" }, { "docid": "24e96087b4466397761404f79a710a6d", "score": "0.6159446", "text": "func (uc UserController) CreatePost(w http.ResponseWriter, r *http.Request) {\n\n\tlock.Lock()\n\tu := models.Posts{}\n\n\tjson.NewDecoder(r.Body).Decode(&u) //decode the body of the post request, decode it and store it in u\n\n\tu.PostId = primitive.NewObjectID() // generate new bson Id\n\tu.PostTime = time.Now() // time.Time() returns the current date time, that is added to the PostTime field\n\n\tuc.Session.Database(\"appointy\").Collection(\"posts\").InsertOne(context.Background(), &u) //inserts data into the collection of posts in mongo db\n\n\tuj, err := json.Marshal(u) // converts it back into json file\n\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusCreated) // sends successful creation message through http\n\tfmt.Fprintf(w, \"%s\\n\", uj) // sends the object back in the form of json\n\tlock.Unlock()\n}", "title": "" }, { "docid": "3623f7989c9faf37b67980c9b1f2353e", "score": "0.61546487", "text": "func (r *Router) Post(handlers ...PostHandlerFunc) {\n\tr.postHandlers = append(r.postHandlers, handlers...)\n}", "title": "" }, { "docid": "8aba4c45ee1b7b50c84a2f10946cbbee", "score": "0.61497545", "text": "func Post(route string, handler interface{}) {\n\tmainServer.addRoute(route, \"POST\", handler)\n}", "title": "" }, { "docid": "a2e0a124341948127f1d9566cc5735e0", "score": "0.6138661", "text": "func PostsCreateHandler(rw http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\tfmt.Fprintln(rw, \"posts create\")\n}", "title": "" }, { "docid": "5bd089a47fa0ff29db4f98097fb26cb8", "score": "0.61070836", "text": "func CreatePost(w http.ResponseWriter, r *http.Request) {\n\tfmt.Println(\"Endpoint Hit: create new post\")\n\n\treqBody, _ := ioutil.ReadAll(r.Body)\n\tvar post models.Post\n\tjson.Unmarshal(reqBody, &post)\n\n\terr := post.Validate()\n\tif err != nil {\n\t\tresponses.RespondWithError(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tresult := DB.Create(&post)\n\tif result.Error != nil {\n\t\tlog.Println(result.Error)\n\t\tresponses.RespondWithError(w, http.StatusBadRequest, result.Error)\n\t\treturn\n\t}\n\n\tresponses.RespondWithJSON(w, http.StatusOK, post)\n}", "title": "" }, { "docid": "52d1e611aaf2d5be79c9493b1ac3976e", "score": "0.60956675", "text": "func (b Blog) HandlePost(w http.ResponseWriter, r *http.Request) {\n\tvar form BlogForm\n\tvar data views.Data\n\tif err := ParseForm(r, &form); err != nil {\n\t\tpanic(err)\n\t}\n\tblog := models.BlogModel{\n\t\tTitle: form.Title,\n\t\tBody: form.Body,\n\t}\n\tif err := b.bs.Create(&blog); err != nil {\n\t\tfmt.Println(\"something went wrong\")\n\t\tdata.Alert = &views.Alert{\n\t\t\tLevel: \"info\",\n\t\t\tMessage: err.Error(),\n\t\t}\n\t\tb.PostView.Render(w, data)\n\t\treturn\n\t}\n\thttp.Redirect(w, r, \"/\", http.StatusFound)\n}", "title": "" }, { "docid": "ec1f5e322f84be89b3801f15ab0dbfd3", "score": "0.6090635", "text": "func AddDataToPost(w http.ResponseWriter, posts []Post) []Post {\n\n\tfor i, post := range posts {\n\t\terr := config.DB.QueryRow(\"SELECT username FROM users WHERE id=?\",\n\t\t\tpost.Author).Scan(&posts[i].AuthorName)\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t\ttempTimeArray := strings.Split(post.Timestamp, \"T\")\n\t\tposts[i].Timestamp = tempTimeArray[0]\n\n\t\terr = config.DB.QueryRow(\"SELECT name FROM categories WHERE id=?\",\n\t\t\tpost.Category).Scan(&posts[i].CategoryName)\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn posts\n}", "title": "" }, { "docid": "4452d209fa8bce9273cd9108cf47adfd", "score": "0.6073327", "text": "func (br *BlogRouter) Post(c *gin.Context) {\n\tif page, ok := models.MPages[c.Param(\"slug\")]; ok {\n\t\tdata := br.GenerateCtx()\n\t\tdata[\"post\"] = page\n\t\tdata[\"share_url\"] = page.GetShare()\n\t\tc.HTML(http.StatusOK, \"post.tmpl\", data)\n\t} else {\n\t\tc.String(http.StatusNotFound, \"404 not found\")\n\t}\n}", "title": "" }, { "docid": "23a7fe7c1b2d8056ce6548bb17546fa4", "score": "0.6069726", "text": "func postHandler(w http.ResponseWriter, r *http.Request, d handlerDeps) {\n\tpathStrings := strings.Split(r.URL.Path, \"/\")\n\tpostIDString := pathStrings[2]\n\tpostID, err := strconv.ParseInt(postIDString, 10, 64)\n\tif err != nil {\n\t\td.logger.Warn(\"Cannot parse post id\", zap.Error(err))\n\t\trollbar.RequestError(rollbar.WARN, r, err)\n\t\thttp.NotFound(w, r)\n\t\treturn\n\t}\n\tvar post *model.Post\n\tfor _, p := range d.board.Posts {\n\t\tif p.ID == postID {\n\t\t\tpost = &p\n\t\t\tbreak\n\t\t}\n\t}\n\tif post == nil {\n\t\terr = errors.New(\"Cannot find post\")\n\t\td.logger.Warn(\"Cannot find post\", zap.Error(err))\n\t\trollbar.RequestError(rollbar.WARN, r, err)\n\t\thttp.NotFound(w, r)\n\t\treturn\n\t}\n\n\theaders := []metaHeader{\n\t\t{\"og:title\", post.Title},\n\t\t{\"og:image\", post.Image},\n\t}\n\n\tindexHandlerWithHeaders(w, r, d, headers)\n}", "title": "" }, { "docid": "e03493bd16dfd061a7bd36a9535af0f0", "score": "0.60559535", "text": "func AddPostHook(hook PostHook) {\n\tpostHooks = append(postHooks, hook)\n}", "title": "" }, { "docid": "145a6c7e8568931302781daac9cab093", "score": "0.60133535", "text": "func (r *Router) Post(path string, handler http.Handler) {\n\tr.AddRoute(\"POST\", path, handler)\n}", "title": "" }, { "docid": "ed199c16872fcc83ba97e2d1a1fc9885", "score": "0.6004632", "text": "func (r *Router) Post(pattern string, handlers ...Handler) *Router {\n\treturn r.Add(pattern, \"POST\", handlers...)\n}", "title": "" }, { "docid": "d4c9f109ff395bc34f6cf782eff58e35", "score": "0.5985722", "text": "func CreatePost(w http.ResponseWriter, r *http.Request) {\n\tpost := &models.Post{}\n\tutils.ReadBodyAndUnmarshalData(r, post)\n\tpost.CreatedAt = time.Now().UTC()\n\n\t// Insert new post\n\tdb.Insert(post, \"posts\", w)\n\n}", "title": "" }, { "docid": "310fcfd2ff902fbadd3479f09a5123b1", "score": "0.59745973", "text": "func NewPost(a Adapter) *Post {\n\tvar o Post\n\to._table = fmt.Sprintf(\"%sposts\", a.DatabasePrefix())\n\to._adapter = a\n\to._pkey = \"ID\"\n\to._new = false\n\treturn &o\n}", "title": "" }, { "docid": "a63418bf85f527374dfb2e303332b3ed", "score": "0.5967009", "text": "func (server *Server) SavePost(w http.ResponseWriter, r *http.Request) {\n\tif r.Method != http.MethodPost {\n\t\tw.WriteHeader(405) // Method not allowed\n\t\treturn\n\t}\n\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\t// Decode the token\n\tuserID, err := auth.ExtractTokenID(r)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to extract token from request: %v\", err)\n\t}\n\n\t// Get the user blog\n\tuserModel := repo.User{}\n\towner, err := userModel.FindUserByID(server.DB, userID)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, errors.New(\"post owner (user) does not exist: \"+err.Error()))\n\t\treturn\n\t}\n\n\tfreshPost := repo.Post{}\n\n\terr = json.Unmarshal(body, &freshPost)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tfreshPost.Prepare()\n\n\terr = freshPost.Validate()\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\t// If the user doesnt have a blog, he cannot create posts\n\tif owner.BlogID <= 0 {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, errors.New(\"user does not belong to a blog\"))\n\t\treturn\n\t}\n\n\tfreshPost.Author = *owner\n\tfreshPost.BlogID = owner.BlogID\n\n\t_, err = freshPost.SavePost(server.DB)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, errors.New(\"error saving the post: \"+err.Error()))\n\t\treturn\n\t}\n\n\tres := presenters.SavePostPresenter(freshPost)\n\n\tresponses.JSON(w, http.StatusOK, res)\n}", "title": "" }, { "docid": "6eae1e6c30a569c539ebb3576bbe70f4", "score": "0.5934504", "text": "func (app *App) Post(path string, handlers ...Handler) Router {\n\treturn app.Add(MethodPost, path, handlers...)\n}", "title": "" }, { "docid": "58c075a48dc12cbee138dcbd5d7815f6", "score": "0.59333855", "text": "func (f *engineFactory) NewPost() Post {\n\tpostOnce.Do(func() {\n\t\tpostInstance = &post{\n\t\t\trepository: f.NewPostRepository(),\n\t\t\t// jwt: f.JWTSignParser,\n\t\t}\n\t})\n\treturn postInstance\n}", "title": "" }, { "docid": "ecc40c1c2fc1784972b49b913c1a5bad", "score": "0.5929179", "text": "func (b *APIGWProxyWorkflowBuilder) AddPostHandler(path string, handler interface{}) *APIGWPrePostHandlerActionBuilder {\n\treturn b.AddMethodHandler(http.MethodPost, path, handler)\n}", "title": "" }, { "docid": "3e062712720e60b0afc468af4aa44bd0", "score": "0.59284925", "text": "func (ph *ProductHandler) Post(w http.ResponseWriter, r *http.Request) {\n\tproduct := r.Context().Value(Product{}).(product.Product)\n\tph.products = append(ph.products, product)\n}", "title": "" }, { "docid": "ec655fdccc00afc4895e9095ecd6bf77", "score": "0.59252626", "text": "func createPost(w http.ResponseWriter, r *http.Request) {\n\n\tsession := sessions.Start(w, r)\n\n\tuser_id := session.GetString(\"user_id\")\n\tcommunity_id := r.FormValue(\"community\")\n\tbody := r.FormValue(\"body\")\n\timage := r.FormValue(\"image\")\n\turl := r.FormValue(\"url\")\n\n\tif len(body) > 2000 {\n\t\thttp.Error(w, \"Your post is too long. (2000 characters maximum)\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tif len(body) == 0 && len(image) == 0 {\n\t\thttp.Error(w, \"Your post is empty.\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tstmt, err := db.Prepare(\"INSERT posts SET created_by=?, community_id=?, body=?, image=?, url=?\")\n\tif err == nil {\n\n\t\t// If there's no errors, we can go ahead and execute the statement.\n\t\t_, err := stmt.Exec(&user_id, &community_id, &body, &image, &url)\n\t\tif err != nil {\n\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\n\t\t}\n\n\t\tvar posts = post{}\n\t\tvar timestamp time.Time\n\n\t\tdb.QueryRow(\"SELECT posts.id, created_by, created_at, body, image, username, nickname, avatar FROM posts LEFT JOIN users ON users.id = created_by WHERE created_by = ? ORDER BY created_at DESC LIMIT 1\", user_id).\n\t\t\tScan(&posts.ID, &posts.CreatedBy, &timestamp, &posts.Body, &posts.Image, &posts.PosterUsername, &posts.PosterNickname, &posts.PosterIcon)\n\t\tposts.CreatedAt = humanTiming(timestamp)\n\n\t\tvar data = map[string]interface{}{\n\n\t\t\t\"Post\": posts,\n\t\t}\n\n\t\terr = templates.ExecuteTemplate(w, \"create_post.html\", data)\n\n\t\tif err != nil {\n\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\n\t\t}\n\n\t\tvar postTpl bytes.Buffer\n\n\t\ttemplates.ExecuteTemplate(&postTpl, \"create_post.html\", data)\n\n\t\tvar msg wsMessage\n\n\t\tmsg.Type = \"post\"\n\t\tmsg.Content = postTpl.String()\n\n\t\tfor client := range clients {\n\t\t\tif clients[client].OnPage == \"/communities/\"+community_id && clients[client].UserID != strconv.Itoa(posts.CreatedBy) {\n\t\t\t\terr := client.WriteJSON(msg)\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Println(err)\n\t\t\t\t\tclient.Close()\n\t\t\t\t\tdelete(clients, client)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\treturn\n\n\t}\n\n}", "title": "" }, { "docid": "a6fd103644e2774ecbb5b3a8d139ecdd", "score": "0.59037006", "text": "func (pr *PostRouter) CreateHandler(w http.ResponseWriter, r *http.Request) {\n\tvar p post.Post\n\terr := json.NewDecoder(r.Body).Decode(&p)\n\tif err != nil {\n\t\tresponse.HTTPError(w, r, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\n\tdefer r.Body.Close()\n\n\tctx := r.Context()\n\terr = pr.Repository.Create(ctx, &p)\n\tif err != nil {\n\t\tresponse.HTTPError(w, r, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\n\tw.Header().Add(\"Location\", fmt.Sprintf(\"%s%d\", r.URL.String(), p.ID))\n\tresponse.JSON(w, r, http.StatusCreated, response.Map{\"post\": p})\n}", "title": "" }, { "docid": "e07d05144d0b8235df71daba201cfd48", "score": "0.5902046", "text": "func (f *feed) Add(body string, timestamp float64) {\n\n\tdefer f.lock.Unlock()\n\n\tf.lock.Lock()\n\tnPost := newPost(body, timestamp, nil)\n\n\tpred := f.start\n\tcurr := pred.next\n\t// fmt.Println(curr.timestamp)\n\t// fmt.Println(timestamp)\n\n\tfor (curr.timestamp > timestamp) {\n\t\tpred = curr\n\t\tcurr = curr.next\n\t} \n\t\n\tnPost.next = curr\t\t//posts at same time?\n\tpred.next = nPost\n\t\n\n}", "title": "" }, { "docid": "385a7bbb499c9665b8843604cf5c8cde", "score": "0.589645", "text": "func AddPostmeta(iMetaId int64, iPostId int64, iMetaKey string, iMetaValue string) error {\n\t_Postmeta := &Postmeta{MetaId: iMetaId, PostId: iPostId, MetaKey: iMetaKey, MetaValue: iMetaValue}\n\tif _, err := Engine.Insert(_Postmeta); err != nil {\n\t\treturn err\n\t} else {\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "9ffe69d47a04a7fc801bed1d826fd3f9", "score": "0.58954024", "text": "func (h *HttpHandler) AppendPostHandler(handler Handler) {\n\th.Handlers[2] = h.PostHandlersPipe().AppendHandler(handler)\n}", "title": "" }, { "docid": "bf360dcd17784c2a138203e94e15ed35", "score": "0.5894143", "text": "func (b Blog) Post(w http.ResponseWriter, r *http.Request) {\n\tb.PostView.Render(w, nil)\n}", "title": "" }, { "docid": "d2ffe43fe11428d729ab5768d883ae52", "score": "0.5886218", "text": "func (c *Client) CreatePost(post *model.Post) error {\n\tif _, err := c.API.CreatePost(post); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3050ff15b7790230058a4f9417b25d29", "score": "0.5877454", "text": "func PostNew(title, content, category, format string, creator *User, towns []data.Key, images []data.UUID, featuredImage data.UUID,\n\tallowComments, notifyOnComment, draft bool) (*Post, error) {\n\tpost := &Post{\n\t\tTitle: title,\n\t\tContent: content,\n\t\tCategory: category,\n\t\tFormat: format,\n\t\tTownKeys: towns,\n\t\tImages: images,\n\t\tFeaturedImage: featuredImage,\n\t\tCreator: creator.Username,\n\t\tcreatorUser: creator,\n\t\tAllowComments: allowComments,\n\t\tNotifyOnComment: notifyOnComment,\n\t}\n\n\tif !allowComments {\n\t\tpost.NotifyOnComment = false\n\t}\n\n\tif draft {\n\t\tpost.Status = PostStatusDraft\n\t} else {\n\t\tpost.Status = PostStatusPublished\n\t}\n\n\terr := post.validate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpost.Rev()\n\n\tif !draft && len(post.Moderation) != 0 {\n\t\t// New post has been automoderated in at least one town\n\t\t// if they are publishing this, auto-set to draft so they have a\n\t\t// chance to fix the post before publishing\n\t\tpost.Status = PostStatusDraft\n\t}\n\n\tkey, err := data.PostInsert(post)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpost.Key = key\n\n\tif post.Status != PostStatusDraft {\n\t\terr = post.publish()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t// double write needed as post key is required\n\t\t// for notifications and search indexing, I may reconsider this\n\t\t// if I generate my own keys\n\t\terr = post.Update()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn post, nil\n}", "title": "" }, { "docid": "cf0ec8976636d166464bdfdd2d18f31e", "score": "0.5871844", "text": "func (api *PostAPIHandler) CreatePostHandler() http.Handler {\n\tlogInfo := api.logInfo\n\tlogError := api.logError\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t//userRole := r.Context().Value(CtxRoleKey).(models.UserRole)\n\t\t//if userRole != roleAdmin {\n\t\t//\tlogError.Printf(\"User role doesn't have permissions to create posts. User role: %s\", userRole)\n\t\t//\tRespondWithError(w, http.StatusForbidden, NoPermissions)\n\t\t//\treturn\n\t\t//}\n\n\t\trequest := models.CreatePostRequest{}\n\t\terr := json.NewDecoder(r.Body).Decode(&request)\n\t\tif err != nil {\n\t\t\tRespondWithError(w, http.StatusBadRequest, BadRequestBody)\n\t\t\treturn\n\t\t}\n\n\t\tlogInfo.Printf(\"Got new post creation request. Request: %+v\", request)\n\n\t\t// trim spaces in all tags\n\t\tfor tagIndex, tag := range request.Tags {\n\t\t\trequest.Tags[tagIndex] = strings.TrimSpace(tag)\n\t\t}\n\n\t\t// trim spaces in all meta keywords\n\t\tfor keywordIndex, keyword := range request.Metadata.Keywords {\n\t\t\trequest.Metadata.Keywords[keywordIndex] = strings.TrimSpace(keyword)\n\t\t}\n\n\t\tvalidatePostError := validateCreatePostRequest(&request)\n\t\tif validatePostError != nil {\n\t\t\tlogInfo.Printf(\"Can't create post: invalid request. Error: %s\", validatePostError)\n\t\t\tRespondWithError(w, http.StatusBadRequest, validatePostError)\n\t\t\treturn\n\t\t}\n\n\t\tsaveRequest := &postService.SaveRequest{\n\t\t\tTitle: request.Title,\n\t\t\tSnippet: request.Snippet,\n\t\t\tContent: request.Content,\n\t\t\tContentMD: request.ContentMD,\n\t\t\tMetadata: request.Metadata,\n\t\t\tTags: request.Tags,\n\t\t}\n\t\tcreatedPost, err := postService.Save(api.db, saveRequest)\n\t\tif err != nil {\n\t\t\tlogError.Printf(\"Error saving post in database: %s\", err)\n\t\t\tRespondWithError(w, http.StatusInternalServerError, TechnicalError)\n\t\t\treturn\n\t\t}\n\n\t\tlogInfo.Printf(\"Post saved. Post: %+v\", createdPost)\n\t\tRespondWithBody(w, http.StatusCreated, createdPost)\n\t})\n}", "title": "" }, { "docid": "f84153f6dfb749a4c08a831cdc574a63", "score": "0.5867386", "text": "func NewPost()(*Post) {\n m := &Post{\n OutlookItem: *NewOutlookItem(),\n }\n odataTypeValue := \"#microsoft.graph.post\"\n m.SetOdataType(&odataTypeValue)\n return m\n}", "title": "" }, { "docid": "b9cf3955bb3d3fd0d9aefd0831909859", "score": "0.5857659", "text": "func (app *Webapp) Post(pattern string, handler RouteHandler) {\n\tapp.registerRoute(pattern, \"POST\", handler)\n}", "title": "" }, { "docid": "6a2755f84c1af0c0a00eeaa313cf20c0", "score": "0.58529234", "text": "func (m *Mux) Post(s string, h http.HandlerFunc) {\n\tr := NewRoute(s, h)\n\tr.Post()\n\tm.Routes = append(m.Routes, r)\n}", "title": "" }, { "docid": "961cb297fed6dd872e6a556ef88eb958", "score": "0.5833709", "text": "func (b *BlogRef) CreatePost(params url.Values) (*PostRef, error) {\n\treturn CreatePost(b.client, b.Name, params)\n}", "title": "" }, { "docid": "ce0a11734e7790e7106da7d1fc2d09bc", "score": "0.5815681", "text": "func (router *defaultRouter) Post(pattern string, callback RouteFunc) *Route {\n\treturn router.addRoute(\"POST\", pattern, callback)\n}", "title": "" }, { "docid": "d9138242df12585154fa3e9fec396f22", "score": "0.5812161", "text": "func newPostGet(w http.ResponseWriter, r *http.Request) {\n\tuser := auth.UserFor(r)\n\n\tfeedId := r.URL.Query().Get(\"feed\")\n\tif feedId == \"\" || len(feedId) != 24 {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tfeed := new(Feed)\n\terr := db.Current.Find(feed, bson.M{\"_id\": bson.ObjectIdHex(r.URL.Query().Get(\"feed\"))}).One(&feed)\n\tif err != nil || feed == nil {\n\t\t//no feed?\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tpost := NewPost(\"\", \"\", \"\", \"\", user.Id)\n\n\tdoPostEditor(post, []Feed{*feed}, w, r)\n}", "title": "" }, { "docid": "ccf0b65595019a02c6cc9327cb5ea820", "score": "0.58092195", "text": "func MakePostPostHandler(svc service.Service) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\trequest := struct {\n\t\t\tID int `json:\"id\"`\n\t\t\tTitle string `json:\"title\"`\n\t\t\tMarkdown string `json:\"markdown\"`\n\t\t}{}\n\t\terr := json.NewDecoder(r.Body).Decode(&request)\n\t\tif err != nil {\n\t\t\tJSON(w, 400, message{\"error\": \"Invalid request, missing required arguments\"})\n\t\t\treturn\n\t\t}\n\n\t\tpost := &models.Post{\n\t\t\tID: request.ID,\n\t\t\tTitle: request.Title,\n\t\t\tMarkdown: request.Markdown,\n\t\t}\n\n\t\terr = svc.CreatePost(r.Context(), post)\n\t\tif err != nil {\n\t\t\tJSON(w, 500, message{\"error\": \"Failed creating post\"})\n\t\t\treturn\n\t\t}\n\n\t\tJSON(w, 200, message{\"data\": \"success\"})\n\t}\n}", "title": "" }, { "docid": "d804f3f4d3fb155738b2af2e3bf462b9", "score": "0.5806865", "text": "func (engine *Engine) POST(pattern string, handler HandlerFunc) {\n\tengine.addRoute(\"POST\", pattern, handler)\n}", "title": "" }, { "docid": "03b49cb0bcdb705057605a52ff477141", "score": "0.5803357", "text": "func (m *methods) Post(path string, fn handler) *Route {\n\treturn m.add(path, fn, POST)\n}", "title": "" }, { "docid": "99bb31d3bb25905c13fe94ccea32659d", "score": "0.5801071", "text": "func (c *Client) AddPostBookmark(ctx context.Context, path string, payload *BookmarkParams, contentType string) (*http.Response, error) {\n\treq, err := c.NewAddPostBookmarkRequest(ctx, path, payload, contentType)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c.Client.Do(ctx, req)\n}", "title": "" }, { "docid": "c80d29b7c7178ddd41cb28b2cca817e9", "score": "0.5794737", "text": "func (g *Grinder) POST(e string, f Handler, m ...Middleware) {\n\tg.add(\"POST\", e, f, m)\n}", "title": "" }, { "docid": "d8462134e82388b17c19773cfaa7bef4", "score": "0.5788339", "text": "func InsertNewPost(ID int, Title, Text string) {\n\tinsReq, err := db.Prepare(\"Insert into posts values(?,?,?)\")\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tinsReq.Exec(ID, Title, Text)\n\n\tdefer db.Close()\n\n}", "title": "" }, { "docid": "8ea495ad042cf1d446fb751999237a46", "score": "0.57521236", "text": "func (v PostsResource) Create(c buffalo.Context) error {\n\t// Allocate an empty Post\n\tpost := &models.Post{}\n\t// Bind post to the html form elements\n\terr := c.Bind(post)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// setting author field\n\tuser := c.Get(\"user\").(*models.User)\n\tpost.UserID = user.ID\n\n\t// Get the DB connection from the context\n\ttx := c.Value(\"tx\").(*pop.Connection)\n\t// Validate the data from the html form\n\tverrs, err := tx.ValidateAndCreate(post)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif verrs.HasAny() {\n\t\t// Make post available inside the html template\n\t\tc.Set(\"post\", post)\n\t\t// Make the errors available inside the html template\n\t\tc.Set(\"errors\", verrs)\n\t\t// Render again the new.html template that the user can\n\t\t// correct the input.\n\t\treturn c.Render(422, r.HTML(\"posts/new.html\"))\n\t}\n\t// If there are no errors set a success message\n\tc.Flash().Add(\"success\", \"Post was created successfully\")\n\t// and redirect to the posts index page\n\treturn c.Redirect(302, \"/posts/%s\", post.ID)\n}", "title": "" }, { "docid": "c93d7e31c8d0551f9aae5c14fe5d8fc5", "score": "0.57293797", "text": "func (s *BlogService) CreatePost(ctx context.Context,\n\tpost *proto.Post) (*proto.ResponsePost, error) {\n\n\terr := CreatePostDB(ctx, post)\n\tif err != nil {\n\t\treturn &proto.ResponsePost{StatusCode: 400,\n\t\t\tMessage: \"Bad Request\", Post: nil}, err\n\t}\n\treturn &proto.ResponsePost{StatusCode: 200,\n\t\tMessage: \"Success\", Post: post}, nil\n}", "title": "" }, { "docid": "9066cab3f0cbd6a555b7526c06627228", "score": "0.5727349", "text": "func NewPostHandler(_ HandlerOptions) (sdk.PostHandler, error) {\n\tpostDecorators := []sdk.PostDecorator{}\n\n\treturn sdk.ChainPostDecorators(postDecorators...), nil\n}", "title": "" }, { "docid": "db3827f8b24242bb91cf166259ab6876", "score": "0.5725324", "text": "func (e *Echo) Post(path string, h interface{}, m ...interface{}) IRouter {\n\treturn e.Add(POST, path, h, m...)\n}", "title": "" }, { "docid": "d8cbeb55394a417e1597aecd55b3df04", "score": "0.5722128", "text": "func (m *MockDB) CreatePost(post *models.Post) error {\n\tfor i := range m.posts {\n\t\tif m.posts[i].ID == post.ID {\n\t\t\tm.posts[i] = post\n\t\t\treturn nil\n\t\t}\n\t}\n\tm.posts = append(m.posts, post)\n\treturn nil\n}", "title": "" }, { "docid": "5f69fbbfbf14821515c3ef577753dda9", "score": "0.57076234", "text": "func (g *RouterGroup) Post(path string, handler http.HandlerFunc) {\n\tg.NewHandler(http.MethodPost, path, handler)\n}", "title": "" }, { "docid": "8f35c9d2672371b54b8d86415c075133", "score": "0.57016665", "text": "func newPost(body string, timestamp float64, next *post) *post {\n\treturn &post{body, timestamp, next}\n}", "title": "" }, { "docid": "2e0e1806212b9c1578bd83fc261dbe76", "score": "0.56960166", "text": "func (p *PublicationServiceImpl) addUniquePost(pub entities.Publication, post entities.Post) entities.Publication {\n\tfor _, item := range pub.Posts {\n\t\tif item.URL == post.URL {\n\t\t\treturn pub\n\t\t}\n\t}\n\n\tif post.ID == \"\" {\n\t\tpost.ID = p.generateID()\n\t}\n\tpost.AddedAt = time.Now()\n\tpost.UpdatedAt = time.Now()\n\n\tpub.AddPost(post)\n\tp.search.Index(SearchObject{ID: post.ID, Type: \"Post\", Content: post.Title})\n\n\treturn pub\n}", "title": "" }, { "docid": "45d6641bd7aac0dd270e3525427f84bb", "score": "0.5692035", "text": "func (auo *AdminUpdateOne) AddPosts(p ...*Post) *AdminUpdateOne {\n\tids := make([]int, len(p))\n\tfor i := range p {\n\t\tids[i] = p[i].ID\n\t}\n\treturn auo.AddPostIDs(ids...)\n}", "title": "" }, { "docid": "2d5b9edd611857f78ae3ea3a76967b00", "score": "0.56801295", "text": "func (c *client) Post(ctx context.Context, path string, data, resource interface{}) error {\n\treturn c.CreateAndDo(ctx, \"POST\", path, data, nil, resource)\n}", "title": "" }, { "docid": "f5025d64aaead5a74c9b4edbf55ccb0d", "score": "0.56729317", "text": "func (engine *Engine) POST(pattern string,handler HandlerFunc){\n\tengine.addRoute(\"POST\",pattern,handler)\n}", "title": "" }, { "docid": "7512b7442ab82a9095aeb451b2f327c8", "score": "0.5665637", "text": "func (r *APIRoute) Post() *APIRoute {\n\tr.methods = append(r.methods, post)\n\treturn r\n}", "title": "" }, { "docid": "12716e543ed8eb8c390570a7cbad36b6", "score": "0.56653833", "text": "func (a myApp) InsertPost(ctx context.Context, title, body string) (*mongo.InsertOneResult, error) {\n\tpost := Post{Title: title, Body: body}\n\n\tcollection := a.client.Database(\"test\").Collection(\"test\")\n\tinsertResult, err := collection.InsertOne(ctx, post)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to insert\")\n\t}\n\n\treturn insertResult, nil\n}", "title": "" }, { "docid": "3f25c7106760d6bdcbaab4b79bfaafdd", "score": "0.56435215", "text": "func (r *Router) Post(path string, handlers ...ResponseHandler) *Options {\n\treturn r.addRoute(path, []string{\"POST\"}, handlers...)\n}", "title": "" }, { "docid": "243d491cf10f1b96de6449c71dfea37e", "score": "0.56407976", "text": "func savePostHandler(w http.ResponseWriter, r *http.Request) {\n\n\t// read all of the bytes from the request body into a byte array\n\tbody, err := ioutil.ReadAll(r.Body)\n\n\t// print out JSON\n//fmt.Println(\"JSON: \" + string(body))\n\n\t// make post struct\n\t//var post Post\n\tvar postData PostData\n\tvar post Post\n\n\t// Unmarshal the JSON into the struct\n\tif err = json.Unmarshal(body, &postData); err != nil {\n\t\tlog.Println(err)\n\t}\n\n\tpost = postData.Post\n\n\t// set a id for the post\n\ttheId, err := newUUID() // generate a UUID\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\tpost.Id = theId\n\n\t//\"https://couchdb-e195fb.smileupps.com/posts/_design/post/_update/addPost/a6df9fd5-3aaa-4cb8-b08f-b4daa83d406b\"\n\n\t// URL vars\n\tdomainUrl := \"https://\" + couchDBUrl + \"/\"\n\tupdatePostUrl := \"posts/_design/post/_update/addPost/\"\n\tthreadPostsID := post.ThreadPostId\n\n\ttheUrl := domainUrl + updatePostUrl + threadPostsID\n\n\t// send the Post request to couch, get the response and then close the response body\n\tresp := sendPostRequestToCouch(theUrl, post)\n\tdefer resp.Body.Close()\n\n\t//fmt.Println(\"response Status:\", resp.Status)\n\t//fmt.Println(\"response Headers:\", resp.Header)\n\n\t// read the bytes from the response body of POST request\n\tbody, _ = ioutil.ReadAll(resp.Body)\n\n\t//fmt.Println(\"response Body:\", string(body))\n\n\tvar id = post.ThreadPostId\n\tvar posts Posts\n\n\t// set connection timeout\n\tvar timeout = time.Duration(500 * 100000000)\n\n\t// create connection\n\tconn, err := couchdb.NewSSLConnection(couchDBUrl, 443, timeout)\n\n\t// get cookie into correct format\n\tauth := couchdb.CookieAuth{AuthToken: postData.Cookie.AuthToken, UpdatedAuthToken: postData.Cookie.UpdatedAuthToken}\n\n\t//fmt.Println(\"Used Session Cookie to authenticate\")\n\n\t// select the posts DB\n\tdb := conn.SelectDB(\"posts\", &auth)\n\n\t// get the posts\n\t_, err = db.Read(id, &posts, nil)\n\n\t// check errors\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tvar jsonBytes []byte\n\n\t// marshal the struct into json byte array\n\tjsonBytes, err = json.Marshal(posts)\n\n\t// error checks\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Write content-type, statuscode, payload\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(200)\n\tfmt.Fprintf(w, string(jsonBytes))\n\n}", "title": "" }, { "docid": "244cc914a32210ca9cf8c12a3c069730", "score": "0.5636486", "text": "func (s *Client) CreatePost(post CreatePost) (string, error) {\n\treq := &createPostRequest{\n\t\tAPIKey: s.APIKey,\n\t\tCreatePost: post,\n\t}\n\tvar resp response\n\terr := s.post(fmt.Sprintf(\"%s/api/v1/posts/create\", s.BaseURL), req, &resp)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn resp.ID, err\n}", "title": "" }, { "docid": "bdb030fd45e0ca3cbd8eb51263187e20", "score": "0.56341046", "text": "func saveHandler(render render.Render, request *http.Request) {\n\n\tid := request.FormValue(\"id\")\n\ttitle := request.FormValue(\"title\")\n\tcontent := request.FormValue(\"content\")\n\n\tvar post *model.Post\n\n\tif id != \"\" {\n\t\tpost = posts[id]\n\t\tpost.Title = title\n\t\tpost.Content = content\n\t} else {\n\t\tid := GenerateId(8)\n\t\tposts[id] = model.Create(id, title, content)\n\t}\n\n\trender.Redirect(\"/\")\n}", "title": "" }, { "docid": "419644a95c421cf7cf1350ec46b403ed", "score": "0.5625878", "text": "func (s *Server) CreatePost(ctx context.Context, req *pb.CreatePostRequest) (*pb.SinglePost, error) {\n\tvalid, err := s.checkToken(req.Token)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !valid {\n\t\treturn nil, statusInvalidToken\n\t}\n\n\tif req.Title == \"\" {\n\t\treturn nil, statusNoPostTitle\n\t}\n\n\tuserUID, err := uuid.Parse(req.UserUid)\n\tif err != nil {\n\t\treturn nil, statusInvalidUUID\n\t}\n\n\tpost, err := s.db.create(req.Title, req.Url, userUID)\n\tif err != nil {\n\t\treturn nil, internalError(err)\n\t}\n\n\treturn post.SinglePost()\n}", "title": "" }, { "docid": "43ee7220b42dd658f73992cbf5506fb2", "score": "0.56104535", "text": "func CreatePost(c postspb.PostsServiceClient, content string) []byte {\n\treq := &postspb.CreatePostRequest{\n\t\tText: content,\n\t\tAuthorId: 1,\n\t}\n\n\tres, err := c.CreatePost(context.Background(), req)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn getJSON(res)\n}", "title": "" }, { "docid": "4f80d1199c25c0d34ed08cc097f6edf7", "score": "0.5609037", "text": "func (router *BaseAdminRouter) Post() {\n\trouter.TplName = \"Post.tpl\"\n}", "title": "" }, { "docid": "6c98bfe7f715adf17415da9a7473b38a", "score": "0.5593007", "text": "func (uuo *UserUpdateOne) AddPosts(p ...*Post) *UserUpdateOne {\n\tids := make([]int, len(p))\n\tfor i := range p {\n\t\tids[i] = p[i].ID\n\t}\n\treturn uuo.AddPostIDs(ids...)\n}", "title": "" }, { "docid": "686e826222fc82e8596e2fda28ffb7de", "score": "0.5592401", "text": "func (h *postHandler) Get(w http.ResponseWriter, r *http.Request) {\r\n\tmatches := getPostRe.FindStringSubmatch(r.URL.Path)\r\n\tif len(matches) < 2 {\r\n\t\tnotFound(w, r)\r\n\t\treturn\r\n\t}\r\n\th.store.RLock()\r\n\tu, ok := h.store.m1[matches[1]]\r\n\th.store.RUnlock()\r\n\tif !ok {\r\n\t\tw.WriteHeader(http.StatusNotFound)\r\n\t\tw.Write([]byte(\"post not found\"))\r\n\t\treturn\r\n\t}\r\n\tjsonBytes, err := json.Marshal(u)\r\n\tif err != nil {\r\n\t\tinternalServerError(w, r)\r\n\t\treturn\r\n\t}\r\n\tw.WriteHeader(http.StatusOK)\r\n\tw.Write(jsonBytes)\r\n}", "title": "" }, { "docid": "6791bc2efcbb13c8f407723085e03a4e", "score": "0.5591818", "text": "func NewPostService(postRepo Repository) Service {\n\treturn &postService{\n\t\tpostRepo,\n\t}\n}", "title": "" }, { "docid": "f4a49f1989373105b20ce391c771f7c8", "score": "0.5590266", "text": "func CreatePost(c *gin.Context) {\n\t// fmt.Println(c.PostForm(\"stuff\"))\n\t// fmt.Println(c.PostForm(\"astuff\"))\n\t// c.JSON(http.StatusOK, gin.H{\"response\": c.PostForm(\"stuff\")})\n\n\t// type Req struct {\n\t// \tContent string `form:\"content\" json:\"content\" binding:\"required\"`\n\t// \tPhoto string `form:\"photo\" json:\"photo\" binding:\"required\"`\n\t// }\n\t// var req Req\n\n\tdb := InitDb()\n\tdefer db.Close()\n\tvar user models.User\n\tvar post models.Post\n\tc.Bind(&post)\n\tvar res models.Response\n\n\t// type PostReq struct {\n\t// \tContent string `form:\"content\" json:\"content\" binding:\"required\"`\n\t// \tPhoto string `form:\"photo\" json:\"photo\" binding:\"required\"`\n\t// }\n\n\ttoken := c.Request.Header.Get(\"token\")\n\tif err := db.Where(\"token = ?\", token).First(&user).Error; err != nil {\n\t\tc.AbortWithStatus(404)\n\t\tfmt.Println(err)\n\t}\n\t// c.BindJSON(&post)\n\t// var form PostReq\n\tc.Bind(&post)\n\tfmt.Println(post.Content)\n\n\tif post.Content == \"\" {\n\t\tfmt.Println(\"Ga entuk\")\n\t\tfmt.Println(\"Ga entuk\")\n\t}\n\n\tif post.Content == \"\" && post.Photo == \"\" {\n\t\tres.Code = \"401\"\n\t\tres.Message = \"Content must not blank!\"\n\t\tc.JSON(400, res)\n\t} else {\n\t\tt := time.Now().Add(7 * time.Hour)\n\t\tpost.Date = t\n\t\tpost.IDUser = user.ID\n\t\tif err := db.Create(&post).Error; err != nil {\n\t\t\tc.AbortWithStatus(404)\n\t\t\tfmt.Println(err)\n\t\t} else {\n\t\t\tres.Code = \"200\"\n\t\t\tres.Message = \"Post Success!\"\n\t\t\tc.JSON(200, res)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "5d59145bdd7d5a63619f0e5184f7298c", "score": "0.5582786", "text": "func (au *AdminUpdate) AddPosts(p ...*Post) *AdminUpdate {\n\tids := make([]int, len(p))\n\tfor i := range p {\n\t\tids[i] = p[i].ID\n\t}\n\treturn au.AddPostIDs(ids...)\n}", "title": "" }, { "docid": "eefe749f001cd472deb84cd617d9c1e9", "score": "0.5570881", "text": "func CreatePost(post *Post) (*Post, error) {\n\terr := db.Insert(post)\n\treturn post, err\n}", "title": "" }, { "docid": "7e0c93e5f91fc73962594968ff103ab1", "score": "0.5568871", "text": "func (r *Router) Post(path string, h baseHandler) *Route { return r.HandleFunc(\"POST\", path, h) }", "title": "" }, { "docid": "0ca6f342cd2e59b2c5e8cba85c5c609e", "score": "0.5559979", "text": "func handlePost(h *nntpHandler,args [][]byte) error {\n\t// Check Permissions\n\tif !h.h.AuthinfoCheckPrivilege(LoginPriv_Post,h.h) { return h.issueCommandNotPermitted() }\n\t\n\tif !h.h.CheckPost() { return h.writeError(ErrPostingNotPermitted) }\n\tif e := h.writeMessage(340, \"Send article to be posted\"); e!=nil { return e }\n\tdotr := h.r.DotReader()\n\tr,f := h.h.PerformPost(nil, dotr)\n\tio.Copy(ioutil.Discard,dotr) // Eat up excess data.\n\t\n\tif r||f { return h.writeError(ErrPostingFailed) }\n\treturn h.writeMessage(240, \"Article received OK\")\n}", "title": "" }, { "docid": "3c88fd0dc1040126c4521d03d0dc91e7", "score": "0.55504185", "text": "func (m *DatabaseDAO) InsertPost(post Post) error {\n\t// mongo indexing\n\tindex := mgo.Index{\n\t\tKey: []string{\"id\"}, // needs other unique identifiers as keys\n\t\tUnique: true,\n\t\tDropDups: true,\n\t\tBackground: true,\n\t\tSparse: true,\n\t}\n\tdb.C(PostsCollections).EnsureIndex(index)\n\n\terr := db.C(PostsCollections).Insert(&post)\n\n\treturn err\n}", "title": "" }, { "docid": "5481aa732c790bcf9e8acea2da009931", "score": "0.55400836", "text": "func (r *Router) Post(path string, handler http.Handler) {\n\tr.POST(path, wrapHandler(handler))\n}", "title": "" }, { "docid": "06653ea0f9a8dcbe9029838cc8a135e7", "score": "0.5539297", "text": "func (frame *Framework) NewPOST(pattern string, handlers ...Handler) *MuxAPI {\r\n\treturn frame.NewAPI(\"POST\", pattern, handlers...)\r\n}", "title": "" }, { "docid": "d092d8daaec2dc02ce018590a0dc25d4", "score": "0.553671", "text": "func (r *Router) Post(path string, handle http.HandlerFunc) {\n\tr.Handle(\"POST\", path, handle)\n}", "title": "" }, { "docid": "2e3c6507d644b9d12550738e398c4cf4", "score": "0.5534642", "text": "func (p *GardenParty) Post(path string, handlersFn ...HandlerFunc) {\n\tp.HandleFunc(HTTPMethods.POST, path, handlersFn...)\n}", "title": "" }, { "docid": "9341888bdca6751cc7f5b32da43d395c", "score": "0.5531788", "text": "func (r *Route) Post(pattern string, handler interface{}) {\n\tr.Add(Method(\"POST\"), pattern, handler)\n}", "title": "" }, { "docid": "af4403b744428fd7c3f7ed42d35f2027", "score": "0.5529066", "text": "func (h *PostFeedsHandler) CreateHangoPost(c *fiber.Ctx) error {\n\t// Get data from context fiber and Convert type\n\tpostDoc, _ := c.Locals(\"bodyData\").(*model.InputPost)\n\n\t// Get hgId from conetext fiber\n\ttk := c.Locals(\"user\").(*jwt.Token)\n\tclaims := tk.Claims.(jwt.MapClaims)\n\thgId := claims[\"hgId\"].(string)\n\n\tres, err := h.postUc.CreateHangoPost(c.Context(), *postDoc, hgId)\n\tif err != nil {\n\t\treturn reponseError(c, err)\n\t}\n\n\treturn reponseHandler.ReponseMsg(c, fiber.StatusCreated, \"success\", \"\", res)\n}", "title": "" }, { "docid": "7a8db4dd0e0bd558179ba05ed0683aa4", "score": "0.5524191", "text": "func (server *WebServer) Post(pattern string, handler http.HandlerFunc) {\n\taddRoute(pattern, http.MethodPost, handler)\n}", "title": "" }, { "docid": "5ba1a6196a40157a511b47355b7c7401", "score": "0.5523016", "text": "func (r *buysaleBot) Post(p *reddit.Post) error {\r\n\t\tif parse.IdentifyPost(p.Title, *title, *automod) {\r\n\t\t\terr := findLatestThread(r, p.Permalink)\r\n\t\t\tif err != nil {\r\n\t\t\t\tlogger.Print(\"find last thread broke\")\r\n\t\t\t}\r\n\t\t\tlogger.Print(\"current poste date \",r.cur.postDate,\" new post date: \", p.CreatedUTC)\r\n\t\t\tif r.cur.postDate < p.CreatedUTC {\r\n\t\t\t\tr.cur.sheet = sheets.Create(p.Title)\r\n\t\t\t\tsheets.ShareLink(r.cur.sheet)\r\n\t\t\t\tr.cur.postDate = p.CreatedUTC\r\n\t\t\t\tlogger.Print(\"Setting new postDate: \",r.cur.postDate )\r\n\t\t\t\tr.cur.postID = p.ID\r\n\t\t\t\tlogger.Print(\"Setting new postID: \",r.cur.postID )\r\n\t\t\t}\r\n\t\t}\r\n\treturn nil\r\n}", "title": "" }, { "docid": "071dd44300e33b2bbe84d217734776d1", "score": "0.5522349", "text": "func Create(c echo.Context) error {\n\tpost := PostModel{}\n\tdefer c.Request().Body.Close()\n\terr := json.NewDecoder(c.Request().Body).Decode(&post)\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed reading request body %s\", err)\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, err.Error)\n\t}\n\tlog.Printf(\"Post Creation Object %#v\", post)\n\tsqlStatement := `INSERT INTO public.post(id, \"userId\", title, description, created) sVALUES ($1, $2, $3, $4,$5)`\n\t_, err = DB.Exec(sqlStatement, post.ID, post.UserID, post.Title, post.Description, time.Now())\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tuser := User{\n\t\tUserID: post.UserID,\n\t\tIncPostCount: true,\n\t}\n\t// Initialize http client\n\tclient := &http.Client{}\n\t// marshal User to json\n\tjson, err := json.Marshal(user)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t//set HTTP method, url, and request body\n\treq, err := http.NewRequest(http.MethodPut, \"http://localhost:8000/updatepost\", bytes.NewBuffer(json))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t// set request header Content-Type for json\n\treq.Header.Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\t_, err = client.Do(req)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn c.JSON(http.StatusOK, \"Post Created ...\")\n}", "title": "" }, { "docid": "3233d8cb5bb8a3f7e8ae34e7491703f6", "score": "0.55198145", "text": "func InsertNewPost(Title, Text string) {\n\tqq := OpenConnection()\n\n\tvar newPost = NewPostStr{Title, Text}\n\tresult, err := qq.DB.InsertOne(qq.Cntx, newPost)\n\tfmt.Println(result, err)\n\n}", "title": "" } ]
8621d895ffffbe4e43e3d51c6ce2a3f3
Context sets the context to be used in this call's Do method. Any pending HTTP request will be aborted if the provided context is canceled.
[ { "docid": "6fa3ad76549d8a582da05abee48308ca", "score": "0.0", "text": "func (c *AlbumsListCall) Context(ctx context.Context) *AlbumsListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" } ]
[ { "docid": "0dfc7b3f6fd53d3ac1bc6c89738d9296", "score": "0.630221", "text": "func (c *OrderreturnsListCall) Context(ctx context.Context) *OrderreturnsListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "ddd312ce4cde6e434b050bc5dae01197", "score": "0.62853646", "text": "func (c *MarketplacedealsListCall) Context(ctx context.Context) *MarketplacedealsListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "b2e50ddb09629480e29fd0ea0c3ea130", "score": "0.6256645", "text": "func (c *MarketplacedealsInsertCall) Context(ctx context.Context) *MarketplacedealsInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "515db04553c998b507e2639dd8a3059f", "score": "0.6205845", "text": "func (c *OrdersUpdatemerchantorderidCall) Context(ctx context.Context) *OrdersUpdatemerchantorderidCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "bd4baca45778b39a13df360acb33f60e", "score": "0.6189886", "text": "func (c *OrdersCreatetestorderCall) Context(ctx context.Context) *OrdersCreatetestorderCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "bb30cd0aa29a583c3283a4c020bfdd30", "score": "0.6161039", "text": "func (c *OrdersCustombatchCall) Context(ctx context.Context) *OrdersCustombatchCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "e6a7db83bba931a5a6b790a434c4a5a3", "score": "0.61600316", "text": "func (c *BiddersListCall) Context(ctx context.Context) *BiddersListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "64045df6d2704948fdfb3fb8b808e2c3", "score": "0.61560583", "text": "func (c *OrdersAdvancetestorderCall) Context(ctx context.Context) *OrdersAdvancetestorderCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "8a0e1cc7e5321b3d66d0fa960c296092", "score": "0.6127817", "text": "func (c *BiddersBiddingFunctionsArchiveCall) Context(ctx context.Context) *BiddersBiddingFunctionsArchiveCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "9d4fb6b05930e73da3183a913d346eb4", "score": "0.61240125", "text": "func (c *MarketplacenotesInsertCall) Context(ctx context.Context) *MarketplacenotesInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "0c9e7f515fd3ef336364a63547318fee", "score": "0.61219764", "text": "func (c *OrdersListCall) Context(ctx context.Context) *OrdersListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "be4f319387df50ddbcdf50162825fb02", "score": "0.611088", "text": "func (c *BlobsBatchUpdateCall) Context(ctx context.Context) *BlobsBatchUpdateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "8cae1dab404d8ba451a529544af198ea", "score": "0.60914886", "text": "func (c *OrdersCancellineitemCall) Context(ctx context.Context) *OrdersCancellineitemCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "b909e0d953a15a4a130d3aee33caa202", "score": "0.60754275", "text": "func (c *OrdersReturnlineitemCall) Context(ctx context.Context) *OrdersReturnlineitemCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "3244aabf4a1cab8686b8a031184eeab6", "score": "0.6067859", "text": "func (c *MarketplacedealsDeleteCall) Context(ctx context.Context) *MarketplacedealsDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "8202c5a836eb60c26564c9a21e9b8346", "score": "0.6056504", "text": "func (c *BiddersEndpointsListCall) Context(ctx context.Context) *BiddersEndpointsListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "1f627c6c497c4823aa18005a3714f101", "score": "0.6056268", "text": "func (c *TemplateDeleteCall) Context(ctx context.Context) *TemplateDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "14e790b1c65802ec0e7a66654145a817", "score": "0.60540384", "text": "func (c *TableDeleteCall) Context(ctx context.Context) *TableDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "c4464cb4a5cbd3f0a68c8488728efcdb", "score": "0.6052255", "text": "func (c *LiensDeleteCall) Context(ctx context.Context) *LiensDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "95fd1f1f9eca35865c046fc3c95703c3", "score": "0.60522485", "text": "func (c *OrdersReturnrefundlineitemCall) Context(ctx context.Context) *OrdersReturnrefundlineitemCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "50a4b4f95932c0b71a5a67b5a0bd9eae", "score": "0.6046117", "text": "func (c *MarketplacedealsUpdateCall) Context(ctx context.Context) *MarketplacedealsUpdateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "bbfc5c60debdbd9d70e29a4ba177b9db", "score": "0.6042948", "text": "func (c *OrdersCancelCall) Context(ctx context.Context) *OrdersCancelCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "d615c7ee0232b7736979396dfd5a1ec9", "score": "0.6035217", "text": "func (c *QueriesDeleteCall) Context(ctx context.Context) *QueriesDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "e6202d5c15c5eb38acaa5b092d372889", "score": "0.6029378", "text": "func (c *ServicesDeleteCall) Context(ctx context.Context) *ServicesDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "886c19edca012a3f7d60fa58bb2a3577", "score": "0.60269475", "text": "func (c *ServicesUndeleteCall) Context(ctx context.Context) *ServicesUndeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "8df5c95c816ab50ba2a190092c58f22a", "score": "0.6007638", "text": "func (c *OrderpaymentsNotifyauthdeclinedCall) Context(ctx context.Context) *OrderpaymentsNotifyauthdeclinedCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "798adab87fe12b879d0272624dbf9b52", "score": "0.60045016", "text": "func (c *OrdersCreatetestreturnCall) Context(ctx context.Context) *OrdersCreatetestreturnCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "9097a8c517551e410175f91a5c9381b4", "score": "0.6000278", "text": "func (c *CreativesAddDealCall) Context(ctx context.Context) *CreativesAddDealCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "cc453457cec3f6e5c1f900f56f970d04", "score": "0.59989834", "text": "func (c *OrdersRejectreturnlineitemCall) Context(ctx context.Context) *OrdersRejectreturnlineitemCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "f2aa28259d1fae4ebba4e5a545d2671a", "score": "0.5997911", "text": "func (c *OrdersRefundCall) Context(ctx context.Context) *OrdersRefundCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "ade48d68970ab57deabee112014d96ba", "score": "0.5996455", "text": "func (c *InstancesDeleteCall) Context(ctx context.Context) *InstancesDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "54c6b5df96c8156b7ba705817de7b2e6", "score": "0.59882903", "text": "func (c *OrdersGettestordertemplateCall) Context(ctx context.Context) *OrdersGettestordertemplateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "d5e11ebe18adcddd45d166b861695e8c", "score": "0.598518", "text": "func (c *OrderpaymentsNotifyauthapprovedCall) Context(ctx context.Context) *OrderpaymentsNotifyauthapprovedCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "786cd6e8f8a62ee2b346fce0759ea9e7", "score": "0.5982885", "text": "func (c *TaskDeleteCall) Context(ctx context.Context) *TaskDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "cfc471dbf8bc7059b017a7dd762b62ce", "score": "0.596928", "text": "func (c *OrderreturnsGetCall) Context(ctx context.Context) *OrderreturnsGetCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "36f70d82877a65887b8059f057426516", "score": "0.5967122", "text": "func (c *OrdersUpdateshipmentCall) Context(ctx context.Context) *OrdersUpdateshipmentCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "5a5cc9e075798f3d79bdf906427d72a7", "score": "0.596532", "text": "func (c *MediaDownloadCall) Context(ctx context.Context) *MediaDownloadCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "7b3e904aea9bb2079aad108eb3995b97", "score": "0.5963356", "text": "func (c *OrderinvoicesCreaterefundinvoiceCall) Context(ctx context.Context) *OrderinvoicesCreaterefundinvoiceCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "a6e94b65fa5d97ec3e83a99516bf5fd9", "score": "0.5962947", "text": "func (c *BiddersEndpointsPatchCall) Context(ctx context.Context) *BiddersEndpointsPatchCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "2e780e70683505437d5faa871d68ebf0", "score": "0.59611934", "text": "func (c *MarketplacenotesListCall) Context(ctx context.Context) *MarketplacenotesListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "d5e706e86e4411c85eb768527a6cfcf4", "score": "0.59594536", "text": "func (c *InstancesDemoteMasterCall) Context(ctx context.Context) *InstancesDemoteMasterCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "183b6d52efe14f95ef009b45221c753a", "score": "0.5956276", "text": "func (c *CreativesInsertCall) Context(ctx context.Context) *CreativesInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "698351cfde60513c290f3e05f511ceb9", "score": "0.59554434", "text": "func (c *OrdersInstorerefundlineitemCall) Context(ctx context.Context) *OrdersInstorerefundlineitemCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "28d40e5518a57f767959d6028ace3326", "score": "0.5953714", "text": "func (c *TagValuesListCall) Context(ctx context.Context) *TagValuesListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "f593035e004c9b0fc8f93c1e3c887890", "score": "0.5951548", "text": "func (c *BudgetUpdateCall) Context(ctx context.Context) *BudgetUpdateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "eb7c4604e02dd4d18ca979a2d1e5c53d", "score": "0.5949167", "text": "func (c *OrdersAcknowledgeCall) Context(ctx context.Context) *OrdersAcknowledgeCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "0438ff751e6c3cd59c1452e3ced0c281", "score": "0.59447336", "text": "func (c *OrdersCanceltestorderbycustomerCall) Context(ctx context.Context) *OrdersCanceltestorderbycustomerCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "b5d9bc69d27b2eae0fa59b1521e22fcb", "score": "0.5942613", "text": "func (c *BiddersGetCall) Context(ctx context.Context) *BiddersGetCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "8e2763563e63ef1cd9fa6aa04b472cb4", "score": "0.59414756", "text": "func (c *OrdersGetbymerchantorderidCall) Context(ctx context.Context) *OrdersGetbymerchantorderidCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "04eaeed8660c27252c38cb6b72c87180", "score": "0.5933101", "text": "func (c *AckCall) Context(ctx context.Context) *AckCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "a3150f8c806c37034fdbeeddfa14dcad", "score": "0.5927303", "text": "func (c *TableListCall) Context(ctx context.Context) *TableListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "4e89bb7a1a0a1f54eaa30a46e9b1f380", "score": "0.5920548", "text": "func (c *BackupRunsDeleteCall) Context(ctx context.Context) *BackupRunsDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "dce17641cee207a3fd6ee2753daa58d6", "score": "0.5915909", "text": "func (c *TemplateUpdateCall) Context(ctx context.Context) *TemplateUpdateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "bdee5098ece7f324ca2080f52b08247d", "score": "0.59091735", "text": "func (c *TagKeysDeleteCall) Context(ctx context.Context) *TagKeysDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "f2dd5f8c3b14065c448e2638298e2ad6", "score": "0.5904434", "text": "func (c *FilesInsertCall) Context(ctx context.Context) *FilesInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "fc25fcd040385ffa25478eaac316e24f", "score": "0.5903448", "text": "func (c *OrdersShiplineitemsCall) Context(ctx context.Context) *OrdersShiplineitemsCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "69f8472b239048bed6082d35ab87735a", "score": "0.5903329", "text": "func (c *DatabasesDeleteCall) Context(ctx context.Context) *DatabasesDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "6bb69d9ec59cfe12244b84bf8d86ecef", "score": "0.5900643", "text": "func (c *ReportsInsertCall) Context(ctx context.Context) *ReportsInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "65327653e6ebcb7cb86df6ef9a9c790c", "score": "0.5893614", "text": "func (c *InstancesInsertCall) Context(ctx context.Context) *InstancesInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "fa140978dc26ea7ea5d9a9ba54ffc518", "score": "0.5887127", "text": "func (c *TemplateInsertCall) Context(ctx context.Context) *TemplateInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "9711b7375aeaa665dcdf7c77d4b6850a", "score": "0.5886034", "text": "func (c *OrdersSetlineitemmetadataCall) Context(ctx context.Context) *OrdersSetlineitemmetadataCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "79e50001549506ae58502859c8e562a9", "score": "0.588571", "text": "func (c *AccountsListCall) Context(ctx context.Context) *AccountsListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "9b982a7d68f0b70e5538df8cf2abfeca", "score": "0.5884671", "text": "func (c *TableUpdateCall) Context(ctx context.Context) *TableUpdateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "54cf9510450e9b0fa82bbc5e3afda49a", "score": "0.58779466", "text": "func (c *TagKeysListCall) Context(ctx context.Context) *TagKeysListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "395621201dfce9227ab7f72265932b60", "score": "0.5871713", "text": "func (c *BillingAccountsBudgetsDeleteCall) Context(ctx context.Context) *BillingAccountsBudgetsDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "c89c86b4bb1e770d5b72cff0f134ccf7", "score": "0.5870036", "text": "func (c *TagBindingsDeleteCall) Context(ctx context.Context) *TagBindingsDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "19ec6eca5bac103bba1a6b50b184f920", "score": "0.5868041", "text": "func (c *OrdersGetCall) Context(ctx context.Context) *OrdersGetCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "801052e8ef3fc846566e1b475b704acf", "score": "0.5865837", "text": "func (c *TemplateListCall) Context(ctx context.Context) *TemplateListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "c696e61293c461946be83e1fc5bed05b", "score": "0.5864317", "text": "func (c *InstancesListCall) Context(ctx context.Context) *InstancesListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "d05204ce9b625cf7470d29c16fe47c58", "score": "0.5864163", "text": "func (c *TagValuesDeleteCall) Context(ctx context.Context) *TagValuesDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "73ceca66ef5653ffaf1177dcc7041fad", "score": "0.58639544", "text": "func (c *TagBindingsListCall) Context(ctx context.Context) *TagBindingsListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "05bd6d5e0152f60397bb04dc9954ae60", "score": "0.5858153", "text": "func (c *CreativesListCall) Context(ctx context.Context) *CreativesListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "db5536d6c972890bd846f215ce2c9a57", "score": "0.5854089", "text": "func (c *InstancesUpdateCall) Context(ctx context.Context) *InstancesUpdateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "415b0e97ed070aa0e0bfca5973bb58ab", "score": "0.58540404", "text": "func (c *OrderpaymentsNotifychargeCall) Context(ctx context.Context) *OrderpaymentsNotifychargeCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "5a8ac2b9abb436f7dda2c7c313bb9f38", "score": "0.58540344", "text": "func (c *DatabasesInsertCall) Context(ctx context.Context) *DatabasesInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "e52fa6c5b3b364da923555e81d5d98fb", "score": "0.58439326", "text": "func (c *BillingInfoListCall) Context(ctx context.Context) *BillingInfoListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "49954843fd9461a389988afdb850e3a7", "score": "0.58435315", "text": "func (c *BlobsBatchReadCall) Context(ctx context.Context) *BlobsBatchReadCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "77d7bfe8605c6883df4d3b6bbe40f629", "score": "0.5841929", "text": "func (c *BudgetGetCall) Context(ctx context.Context) *BudgetGetCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "8117e07d0482b83e35a271f827db6b65", "score": "0.5836295", "text": "func (c *BackupRunsListCall) Context(ctx context.Context) *BackupRunsListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "ba6f4aec2bff5c98bba102413da71143", "score": "0.58355325", "text": "func (c *InvitationsDeleteCall) Context(ctx context.Context) *InvitationsDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "c12ce2292784111ee46ff5876bd9ba9a", "score": "0.58308256", "text": "func (c *BiddersCreativesListCall) Context(ctx context.Context) *BiddersCreativesListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "636bac87485b867089b7208fd018a3d7", "score": "0.5826869", "text": "func (c *CoursesTeachersDeleteCall) Context(ctx context.Context) *CoursesTeachersDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "96047f8f67a619e0ea344a9f8d590013", "score": "0.58263737", "text": "func (c *ServicesDisableCall) Context(ctx context.Context) *ServicesDisableCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "bda79e7d0d995a2379154e0e497639d0", "score": "0.5823237", "text": "func (c *BackupRunsInsertCall) Context(ctx context.Context) *BackupRunsInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "31c2f1ba48f619d0b8ae326737f55903", "score": "0.5823175", "text": "func (c *TableInsertCall) Context(ctx context.Context) *TableInsertCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "24ebab818f248c67c133815bcf7a1184", "score": "0.581284", "text": "func (c *FilesListCall) Context(ctx context.Context) *FilesListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "8a458b9b6f6b425ce4c99f229d6c88f7", "score": "0.5811529", "text": "func (c *BiddersBiddingFunctionsCreateCall) Context(ctx context.Context) *BiddersBiddingFunctionsCreateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "9653a8ba4b3bd4f38e66567eeace1a4c", "score": "0.5802454", "text": "func (c *BuyersListCall) Context(ctx context.Context) *BuyersListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "e814f70a766fd89a08892b23700ebab1", "score": "0.5802146", "text": "func (c *ServicesListCall) Context(ctx context.Context) *ServicesListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "e814f70a766fd89a08892b23700ebab1", "score": "0.5802146", "text": "func (c *ServicesListCall) Context(ctx context.Context) *ServicesListCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "ec4dc5c276825c29363b3a0afc1d7a27", "score": "0.58018214", "text": "func (c *DeploymentsDeleteCall) Context(ctx context.Context) *DeploymentsDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "2cca7792850175de1db0ce1bdacc0e5a", "score": "0.58014894", "text": "func (c *BiddersCreativesWatchCall) Context(ctx context.Context) *BiddersCreativesWatchCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "47c3bdc41d1cdef40ce24c98f4eae7a3", "score": "0.58005136", "text": "func (c *ActionResultsUpdateCall) Context(ctx context.Context) *ActionResultsUpdateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "916529a9dcc4db97ce72dae06d8f9004", "score": "0.57965446", "text": "func (c *ProvidersNotesDeleteCall) Context(ctx context.Context) *ProvidersNotesDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "78c37c2fc133f385bb40b0c4c187c3ce", "score": "0.5795821", "text": "func (r *Response) Context() context.Context {\n\treturn r.ctx\n}", "title": "" }, { "docid": "233bae5960b0b04f1c3b1861897a33f5", "score": "0.5794116", "text": "func (c *OrdersUpdatelineitemshippingdetailsCall) Context(ctx context.Context) *OrdersUpdatelineitemshippingdetailsCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "d9ae6a5ba36a0d7ce2ca0e94d634d01a", "score": "0.5792076", "text": "func (c *OrderpaymentsNotifyrefundCall) Context(ctx context.Context) *OrderpaymentsNotifyrefundCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "cf70dd8191f52e432284191bccf3c893", "score": "0.5789695", "text": "func (c *PresentationsBatchUpdateCall) Context(ctx context.Context) *PresentationsBatchUpdateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "1ab8f7a3e1ac7e61ac928c06138bb4b1", "score": "0.57893264", "text": "func (c *BudgetPatchCall) Context(ctx context.Context) *BudgetPatchCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "7ed8c41fac703a80e3dfe4739966cf58", "score": "0.5786849", "text": "func (c *UsersDeleteCall) Context(ctx context.Context) *UsersDeleteCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" }, { "docid": "a5077397b53296b37251e657d1d36597", "score": "0.57850724", "text": "func (c *DatabasesUpdateCall) Context(ctx context.Context) *DatabasesUpdateCall {\n\tc.ctx_ = ctx\n\treturn c\n}", "title": "" } ]
4f8f88c2c94e7fdacb5877b27ebccbdc
TypeOne returns a new multi.TypeOne populated with scanned values.
[ { "docid": "67c9dcde8f09341d857c6b24a8471af9", "score": "0.7626609", "text": "func (x *TypeOneScanner) TypeOne() *multi.TypeOne {\n\ty := &multi.TypeOne{}\n\n\ty.ScalarInt32 = x.ScalarInt32\n\ty.ScalarInt64 = x.ScalarInt64\n\ty.ScalarFloat32 = x.ScalarFloat32\n\ty.ScalarFloat64 = x.ScalarFloat64\n\ty.ScalarString = x.ScalarString\n\ty.ScalarBool = x.ScalarBool\n\ty.ScalarEnum = x.ScalarEnum\n\ty.ObjMessage = x.ObjMessage\n\n\ty.Renamed = x.Renamed\n\ty.IgnoredPostgres = x.IgnoredPostgres\n\ty.RenamedPostgres = x.RenamedPostgres\n\n\ty.RenamedRest = x.RenamedRest\n\treturn y\n}", "title": "" } ]
[ { "docid": "a87f627bbf176cf91385585a8fb4a059", "score": "0.57327133", "text": "func NewTypeOneMap(name string) (*TypeOneMap, error) {\n\treturn &TypeOneMap{\n\t\tname: name,\n\t\tcache: map[TypeOneKey]*multi.TypeOne{},\n\t}, nil\n}", "title": "" }, { "docid": "2561d0c3a705bced21f41e91c0d0b405", "score": "0.57021695", "text": "func (q djangoContentTypeQuery) One() (*DjangoContentType, error) {\n\to := &DjangoContentType{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for django_content_type\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "ea2e9a24aa5b436f11d654caff6f5c33", "score": "0.54443365", "text": "func (ts TypeSet) Single() (Type, bool) {\n\tif len(ts.types) != 1 {\n\t\treturn nil, false\n\t}\n\n\treturn ts.types[0], true\n}", "title": "" }, { "docid": "4186cd7cc62c6246c7884f3ae895aa27", "score": "0.5439999", "text": "func (q operationTypeQuery) One(exec boil.Executor) (*OperationType, error) {\n\to := &OperationType{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"mdbmodels: failed to execute a one query for operation_types\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "807c336d111715fa713c8a63228a042d", "score": "0.5244991", "text": "func (tcr *TypeCatalogReport) writeOneOfType(\n\trpt *StructureReport,\n\toneOf *astmodel.OneOfType,\n\tcurrentPackage astmodel.PackageReference,\n\tparentTypes astmodel.TypeNameSet,\n) {\n\tif oneOf.HasDiscriminatorProperty() {\n\t\trpt.Addf(\"discriminator: %s\", oneOf.DiscriminatorProperty())\n\t}\n\n\tif oneOf.HasDiscriminatorValue() {\n\t\trpt.Addf(\"discriminator value: %s\", oneOf.DiscriminatorValue())\n\t}\n\n\tif propertyObjects := oneOf.PropertyObjects(); len(propertyObjects) > 0 {\n\t\t// We expect the order of PropertyObjects() to be consistent, so no need to sort\n\t\tsub := rpt.Addf(\"Property Objects (%s):\", tcr.formatCount(len(propertyObjects), \"object\", \"objects\"))\n\t\tfor _, t := range propertyObjects {\n\t\t\tsubsub := sub.Addf(\"%s\", tcr.asShortNameForType(t, currentPackage, parentTypes))\n\t\t\ttcr.writeComplexType(subsub, t, currentPackage, parentTypes)\n\t\t}\n\t}\n\n\t// The order of entries in oneOf.Types() can vary but isn't significant\n\t// So we pull them out and write them in sorted order\n\toptions := oneOf.Types()\n\tif options.Len() > 0 {\n\t\toptionTypes := make([]astmodel.Type, 0, options.Len())\n\t\ttypesToNames := make(map[astmodel.Type]string, options.Len())\n\t\toptions.ForEach(func(t astmodel.Type, _ int) {\n\t\t\tname := tcr.asShortNameForType(t, currentPackage, parentTypes)\n\t\t\toptionTypes = append(optionTypes, t)\n\t\t\ttypesToNames[t] = name\n\t\t})\n\n\t\tsort.Slice(optionTypes, func(i, j int) bool {\n\t\t\tiname := typesToNames[optionTypes[i]]\n\t\t\tjname := typesToNames[optionTypes[j]]\n\t\t\treturn iname < jname\n\t\t})\n\n\t\tsub := rpt.Addf(\"Options (%s):\", tcr.formatCount(len(optionTypes), \"option\", \"options\"))\n\t\tfor index, t := range optionTypes {\n\t\t\tsubsub := sub.Addf(\"Option %d: %s\", index, tcr.asShortNameForType(t, currentPackage, parentTypes))\n\t\t\ttcr.writeComplexType(subsub, t, currentPackage, parentTypes)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a2cfb1b466a4a6ef31ab429a49c7e36c", "score": "0.51799375", "text": "func (q inputQuery) One(exec boil.Executor) (*Input, error) {\n\to := &Input{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"model: failed to execute a one query for input\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "b280fc30b442b9d7e36e9d25f6de837b", "score": "0.51098007", "text": "func (s *DB) One(fieldName string, value interface{}, to interface{}) error {\n\treturn s.root.One(fieldName, value, to)\n}", "title": "" }, { "docid": "dfdc9e7cefc1866ff4a46fcc5db5460b", "score": "0.5047793", "text": "func (b *Builder) One(value interface{}) error {\n\tsql := b.buildSQL()\n\n\trows, err := b.executor.Queryx(sql, b.params...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer rows.Close()\n\n\tcount := 0\n\tfor rows.Next() {\n\t\tcount++\n\t\tif count > 1 {\n\t\t\treturn ErrTooManyRows\n\t\t}\n\n\t\tv := reflect.ValueOf(value).Elem()\n\t\tif v.Type().Kind() == reflect.Struct {\n\t\t\tif err := rows.StructScan(value); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tif err := rows.Scan(value); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif err := rows.Err(); err != nil {\n\t\treturn err\n\t}\n\n\tif count == 0 {\n\t\treturn ErrNoRows\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e30faaaf1e7a91e3fae26e1cf43d0276", "score": "0.5027183", "text": "func (q *Query) One(dest interface{}) error {\n\tdestv := reflect.ValueOf(dest)\n\tif destv.Kind() != reflect.Ptr {\n\t\tpanic(\"dali: dest must be a pointer to a struct\")\n\t}\n\tv := reflect.Indirect(destv)\n\tif v.Kind() != reflect.Struct {\n\t\tpanic(\"dali: dest must be a pointer to a struct\")\n\t}\n\treturn q.loadStruct(v)\n}", "title": "" }, { "docid": "acf4a895021b3a956752b051fcceb32b", "score": "0.50121814", "text": "func (d *Db) One(record []map[string]interface{}, rows *sql.Rows, r Record) (metadata *Metatada, err error) {\n\tmetadata = &Metatada{}\n\tif len(record) > 0 {\n\t\tmetadata.Exist = true\n\t\tif err = mapstructure.WeakDecode(record[0], r); err != nil {\n\t\t\treturn\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "4f48246421d68d1fff507467508abab6", "score": "0.50121486", "text": "func (x *TypeOneCollection) DoReq(ctx context.Context, label string, req *http.Request) ([]*multi.TypeOne, error) {\n\tvar err error\n\tvar resp *http.Response\n\n\tstart := time.Now()\n\tctx, _ = tag.New(ctx,\n\t\ttag.Upsert(rest.TagCollection, \"type_one\"),\n\t\ttag.Upsert(rest.TagInstance, x.name),\n\t\ttag.Upsert(rest.TagMethod, label),\n\t\ttag.Upsert(rest.TagRestMethod, req.Method),\n\t)\n\tstats.Record(ctx, rest.MeasureInflight.M(1))\n\tdefer func(ctx context.Context) {\n\t\tif resp != nil {\n\t\t\tctx, _ = tag.New(ctx,\n\t\t\t\ttag.Upsert(rest.TagResponseCode, strconv.Itoa(resp.StatusCode)),\n\t\t\t)\n\t\t}\n\n\t\tstop := time.Now()\n\t\tdur := float64(stop.Sub(start).Nanoseconds()) / float64(time.Millisecond)\n\t\tstats.Record(ctx, rest.MeasureLatency.M(dur), rest.MeasureInflight.M(-1))\n\t}(ctx)\n\n\tctx, cancel := context.WithTimeout(ctx, x.config.Timeout)\n\tdefer cancel()\n\n\tresp, err = x.client.Do(req.WithContext(ctx))\n\tif err != nil {\n\t\trest.Logs().Error(\"could not execute rest request:\", err)\n\t\tstats.Record(ctx, rest.MeasureError.M(1))\n\t\treturn nil, err\n\t}\n\n\tbuff, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\trest.Logs().Error(\"could not read rest response:\", err)\n\t\tstats.Record(ctx, rest.MeasureError.M(1))\n\t\treturn nil, err\n\t}\n\n\tTypeOneScanners := []*TypeOneScanner{}\n\tif err := json.Unmarshal(buff, &TypeOneScanners); err != nil {\n\t\trest.Logs().Error(\"could not unmarshal rest response:\", err)\n\t\tstats.Record(ctx, rest.MeasureError.M(1))\n\t\treturn nil, err\n\t}\n\n\tTypeOnes := []*multi.TypeOne{}\n\tfor _, c := range TypeOneScanners {\n\t\tTypeOnes = append(TypeOnes, c.TypeOne())\n\t}\n\treturn TypeOnes, nil\n}", "title": "" }, { "docid": "a6e9d7eb8f1fd84039372c47f7d78d00", "score": "0.5004606", "text": "func (q djangoContentTypeQuery) OneP() *DjangoContentType {\n\to, err := q.One()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "8d2d28d03987d26f55689cd21bf6679e", "score": "0.49926677", "text": "func (x *TypeOneMap) All(ctx context.Context) ([]*multi.TypeOne, error) {\n\tstart := time.Now()\n\tctx, _ = tag.New(ctx,\n\t\ttag.Upsert(cache.TagCollection, \"type_one\"),\n\t\ttag.Upsert(cache.TagInstance, x.name),\n\t\ttag.Upsert(cache.TagMethod, \"all\"),\n\t\ttag.Upsert(cache.TagType, \"map\"),\n\t)\n\tstats.Record(ctx, cache.MeasureInflight.M(1))\n\tdefer func() {\n\t\tstop := time.Now()\n\t\tdur := float64(stop.Sub(start).Nanoseconds()) / float64(time.Millisecond)\n\t\tstats.Record(ctx, cache.MeasureLatency.M(dur), cache.MeasureInflight.M(-1))\n\t}()\n\n\treturn x.all, nil\n}", "title": "" }, { "docid": "41be8ffaeb4abe263f4111ffba5371fa", "score": "0.49853265", "text": "func (api *API) ScanOne(dst interface{}, rows Rows) error {\n\treturn api.processRows(dst, rows, false /* multipleRows. */)\n}", "title": "" }, { "docid": "c1724c19088b9f4d9f7fea2f1666c040", "score": "0.49429846", "text": "func RelationOne(wrapper *ModelWrapper, db *DB, data interface{}) error {\n\trefVal := reflect.Indirect(reflect.ValueOf(data))\n\tt := refVal.Type()\n\n\treturn eachField(t, func(field reflect.StructField, val string, name string, relations []string, connection string) error {\n\t\tvar foreignModel reflect.Value\n\t\t// if field type is slice then one-to-many ,eg: []*Struct\n\t\tif field.Type.Kind() == reflect.Slice {\n\t\t\tforeignModel = reflect.New(field.Type)\n\t\t\t// m := newModel(foreignModel, connection)\n\t\t\tm := newModelWithWrapper(wrapper, db, foreignModel, connection)\n\n\t\t\tif chainFn, ok := db.RelationMap[name]; ok {\n\t\t\t\tchainFn(m)\n\t\t\t}\n\n\t\t\t// batch get field values\n\t\t\t// Since the structure is slice, there is no need to new Value\n\t\t\terr := m.Where(fmt.Sprintf(\"%s=%s\", relations[1], m.dialect.Placeholder()), mapper.FieldByName(refVal, relations[0]).Interface()).All()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif reflect.Indirect(foreignModel).Len() == 0 {\n\t\t\t\t// If relation data is empty, must set empty slice\n\t\t\t\t// Otherwise, the JSON result will be null instead of []\n\t\t\t\trefVal.FieldByName(name).Set(reflect.MakeSlice(field.Type, 0, 0))\n\t\t\t} else {\n\t\t\t\trefVal.FieldByName(name).Set(foreignModel.Elem())\n\t\t\t}\n\n\t\t} else {\n\t\t\t// If field type is struct the one-to-one,eg: *Struct\n\t\t\tforeignModel = reflect.New(field.Type.Elem())\n\t\t\t// m := newModel(foreignModel, connection)\n\t\t\tm := newModelWithWrapper(wrapper, db, foreignModel, connection)\n\t\t\tif chainFn, ok := db.RelationMap[name]; ok {\n\t\t\t\tchainFn(m)\n\t\t\t}\n\n\t\t\terr := m.Where(fmt.Sprintf(\"%s=%s\", relations[1], m.dialect.Placeholder()), mapper.FieldByName(refVal, relations[0]).Interface()).Get()\n\t\t\t// If one-to-one NoRows is not an error that needs to be terminated\n\t\t\tif err != nil && err != sql.ErrNoRows {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif err == nil {\n\t\t\t\trefVal.FieldByName(name).Set(foreignModel)\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "7067e98bba5a730c7f8b2d5cc244164a", "score": "0.49068367", "text": "func Constructor() AllOne {\n\treturn AllOne{\n\t\tval: make(map[string]int),\n\t\tlist: list.New(),\n\t\tele: make(map[string]*list.Element),\n\t}\n}", "title": "" }, { "docid": "c503cd133a2b92e54556f87e0ea80ec1", "score": "0.489403", "text": "func NewType(values dvid.DataValues, interpolable bool) *Type {\n\tdtype := &Type{\n\t\tvalues: values,\n\t\tinterpolable: interpolable,\n\t}\n\tdtype.Type = datastore.Type{\n\t\tRequirements: &storage.Requirements{\n\t\t\tBatcher: true,\n\t\t},\n\t}\n\treturn dtype\n}", "title": "" }, { "docid": "49ac3cd15d0222b5674ad0a54d37db3e", "score": "0.48809037", "text": "func (q userKycDocumentQuery) One(exec boil.Executor) (*UserKycDocument, error) {\n\to := &UserKycDocument{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for user_kyc_document\")\n\t}\n\n\tif err := o.doAfterSelectHooks(exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "826e5bc3d7e699df176dead37f6aed76", "score": "0.48379704", "text": "func (Stateless) GetOne(txn *ndgo.Txn, predicate, value, dgTypes string, result interface{}) (err error) {\n\tresp, err := ndgo.Query{}.GetPredExpandType(\"q\", \"eq\", predicate, value, \",first:1\", \"\", \"uid dgraph.type\", dgTypes).Run(txn)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn json.Unmarshal(ndgo.Unsafe{}.FlattenRespToObject(resp.GetJson()), &result)\n}", "title": "" }, { "docid": "2c400031b7bb09b1e1fdc1886e0086f5", "score": "0.4816969", "text": "func (q phenotypeComparisonQuery) One() (*PhenotypeComparison, error) {\n\to := &PhenotypeComparison{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"chado: failed to execute a one query for phenotype_comparison\")\n\t}\n\n\tif err := o.doAfterSelectHooks(queries.GetExecutor(q.Query)); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "35cb977d8a66f48950471015af192d27", "score": "0.4814969", "text": "func (b *SelectBuilder) One(dest interface{}) error {\n\tb.Limit(1)\n\treturn b.loader.One(dest)\n}", "title": "" }, { "docid": "004dac9b960f0d9adeaf357b9f01a4b6", "score": "0.48143792", "text": "func (q datumQuery) One() (*Datum, error) {\n\to := &Datum{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for data\")\n\t}\n\n\tif err := o.doAfterSelectHooks(queries.GetExecutor(q.Query)); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "65df23469b40b4d5d94f03a1cadfbfe2", "score": "0.47861597", "text": "func (q userDomainQuery) One(ctx context.Context, exec boil.ContextExecutor) (*UserDomain, error) {\n\to := &UserDomain{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"datamodels_raw: failed to execute a one query for user_domain\")\n\t}\n\n\tif err := o.doAfterSelectHooks(ctx, exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "1af539c4dcfb13578758402c6622d401", "score": "0.47841713", "text": "func (heapType *Type) Scan(value interface{}) {\n\tswitch value.(type) {\n\tcase int:\n\t\t*heapType = Type(value.(int))\n\t\tbreak\n\tdefault:\n\t\t*heapType = Type(None)\n\t}\n}", "title": "" }, { "docid": "f18425ff820c4f77074d1f6a3a185181", "score": "0.47685364", "text": "func GetOne(dbNAME ,tableNAME string ,field string,query map[string]interface{}) (interface{},error) {\n\n\tif dbNAME == \"\" || tableNAME == \"\" {\n\n\t}\n\n\tqueryField := strings.Split(field,\",\")\n\n\tfields := FieldInfo(dbNAME,tableNAME)\n\tneedQueryFields := []string{}\n\tfor _,field := range queryField {\n\t\tfor _, f := range fields {\n if field == f.fieldName {\n\t\t\t\t//fmt.Println(\"v.fieldName ,v.dataType \",f.fieldName ,f.dataType)\n\t\t\t\tneedQueryFields = append(needQueryFields,field)\n\t\t\t}\n\t\t}\n\t}\n\n\tqueryString := []string{}\n\tqueryStr := \"\"\n\tif len(query) > 0 {\n\t\tfor k,v := range query{\n\t\t\tqueryString = append(queryString,fmt.Sprintf(\"%s=%v\",k,v))\n\t\t}\n\t\tfmt.Println(\"queryString\",queryString)\n\t\tif len(queryString) > 0 {\n\t\t\tqueryStr = strings.Join(queryString,\" and \")\n\t\t}\n\t}\n\n\tneedQueryFieldsStr := strings.Join(needQueryFields,\",\")\n\tif len(needQueryFieldsStr) == 0 {\n\t\tneedQueryFieldsStr = \"*\"\n\t}\n\tsqlStr := \"\"\n\tif queryStr != \"\" {\n\t\tsqlStr = fmt.Sprintf(\"select id,a,b,c,d,status from %s where %s\" , tableNAME,queryStr)\n\t}else{\n\t\tsqlStr = fmt.Sprintf(\"select * from %s limit 100\" , tableNAME)\n\t}\n\n\tfmt.Println(\"sql\",sqlStr)\n\n rows ,err := core.Instance().Db.Query(sqlStr)\n defer rows.Close()\n if err != nil {\n\n\t}\n\n\tresult := []TestTableName{}\n\tfor rows != nil && rows.Next() {\n\t\ttt := TestTableName{}\n\t\tif err := rows.Scan(&tt.id,&tt.a,&tt.b,&tt.c,&tt.d,&tt.status); err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tresult = append(result, tt)\n\t}\n\tfor _,v := range result {\n\t\tfmt.Println(fmt.Sprintf(\"v=%v\",v))\n\t}\n return result,err\n}", "title": "" }, { "docid": "65ffaa6e6851d694a3760df6b457a11c", "score": "0.47683668", "text": "func (type_ VariantType) First() VariantType {\n\tret0 := C.g_variant_type_first(type_.native())\n\treturn wrapVariantType(ret0)\n}", "title": "" }, { "docid": "129efbc4a07142c74deb97d9ea096d7d", "score": "0.4763592", "text": "func (c *TypetreatmentClient) UpdateOne(t *Typetreatment) *TypetreatmentUpdateOne {\n\tmutation := newTypetreatmentMutation(c.config, OpUpdateOne, withTypetreatment(t))\n\treturn &TypetreatmentUpdateOne{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "f5f239e57061b96084a6f0b7eb0e2ab6", "score": "0.4757188", "text": "func (q *Query) One(out interface{}) error {\n\tctx, cancel := defaultContext()\n\tdefer cancel()\n\treturn q.OneWithContext(ctx, out)\n}", "title": "" }, { "docid": "7bb1e8a93b192ea3cd7bb42ea22f5d8c", "score": "0.47498018", "text": "func ScanOne(dst interface{}, rows Rows) error {\n\treturn DefaultAPI.ScanOne(dst, rows)\n}", "title": "" }, { "docid": "4e548d49322236bcf22b27980ccca9af", "score": "0.47404826", "text": "func (t *DatatypeText) Source(includeName bool) (interface{}, error) {\n\t// {\n\t// \t\"test\": {\n\t// \t\t\"type\": \"text\",\n\t// \t\t\"copy_to\": [\"field_1\", \"field_2\"],\n\t// \t\t\"analyzer\": \"my_analyzer\",\n\t// \t\t\"boost\": 2,\n\t// \t\t\"eager_global_ordinals\": true,\n\t// \t\t\"fielddata\": true,\n\t// \t\t\"fielddata_frequency_filter\": {\n\t// \t\t\t\"min\": 0.001,\n\t// \t\t\t\"max\": 0.1,\n\t// \t\t\t\"min_segment_size\": 500\n\t// \t\t},\n\t// \t\t\"fields\": {\n\t// \t\t\t\"field_name\": {\n\t// \t\t\t\t\"type\": \"text\",\n\t// \t\t\t\t\"analyzer\": \"standard\"\n\t// \t\t\t}\n\t// \t\t},\n\t// \t\t\"index\": true,\n\t// \t\t\"index_options\": \"positions\",\n\t// \t\t\"index_prefixes\": {\n\t// \t\t\t\"min_chars\": 2,\n\t// \t\t\t\"max_chars\": 20,\n\t// \t\t},\n\t// \t\t\"index_phrases\": true,\n\t// \t\t\"norms\": true,\n\t// \t\t\"position_increment_gap\": 1,\n\t// \t\t\"store\": true,\n\t// \t\t\"search_analyzer\": \"my_stop_analyzer\",\n\t// \t\t\"search_quote_analyzer\": \"my_analyzer\",\n\t// \t\t\"similarity\": \"BM25\",\n\t// \t\t\"term_vector\": \"no\"\n\t// \t}\n\t// }\n\toptions := make(map[string]interface{})\n\toptions[\"type\"] = \"text\"\n\n\tif len(t.copyTo) > 0 {\n\t\tvar copyTo interface{}\n\t\tswitch {\n\t\tcase len(t.copyTo) > 1:\n\t\t\tcopyTo = t.copyTo\n\t\t\tbreak\n\t\tcase len(t.copyTo) == 1:\n\t\t\tcopyTo = t.copyTo[0]\n\t\t\tbreak\n\t\tdefault:\n\t\t\tcopyTo = \"\"\n\t\t}\n\t\toptions[\"copy_to\"] = copyTo\n\t}\n\tif t.analyzer != \"\" {\n\t\toptions[\"analyzer\"] = t.analyzer\n\t}\n\tif t.boost != nil {\n\t\toptions[\"boost\"] = t.boost\n\t}\n\tif t.eagerGlobalOrdinals != nil {\n\t\toptions[\"eager_global_ordinals\"] = t.eagerGlobalOrdinals\n\t}\n\tif t.fielddata != nil {\n\t\toptions[\"fielddata\"] = t.fielddata\n\t}\n\tif t.fielddataFrequencyFilter != nil {\n\t\tfielddataFrequencyFilter, err := t.fielddataFrequencyFilter.Source(false)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\toptions[\"fielddata_frequency_filter\"] = fielddataFrequencyFilter\n\t}\n\tif len(t.fields) > 0 {\n\t\tfields := make(map[string]interface{})\n\t\tfor _, f := range t.fields {\n\t\t\tfield, err := f.Source(false)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tfields[f.Name()] = field\n\t\t}\n\t\toptions[\"fields\"] = fields\n\t}\n\tif t.index != nil {\n\t\toptions[\"index\"] = t.index\n\t}\n\tif t.indexOptions != \"\" {\n\t\toptions[\"index_options\"] = t.indexOptions\n\t}\n\tif t.indexPrefixes != nil {\n\t\tindexPrefixes, err := t.indexPrefixes.Source(false)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\toptions[\"index_prefixes\"] = indexPrefixes\n\t}\n\tif t.indexPhrases != nil {\n\t\toptions[\"index_phrases\"] = t.indexPhrases\n\t}\n\tif t.norms != nil {\n\t\toptions[\"norms\"] = t.norms\n\t}\n\tif t.positionIncrementGap != nil {\n\t\toptions[\"position_increment_gap\"] = t.positionIncrementGap\n\t}\n\tif t.store != nil {\n\t\toptions[\"store\"] = t.store\n\t}\n\tif t.searchAnalyzer != \"\" {\n\t\toptions[\"search_analyzer\"] = t.searchAnalyzer\n\t}\n\tif t.searchQuoteAnalyzer != \"\" {\n\t\toptions[\"search_quote_analyzer\"] = t.searchQuoteAnalyzer\n\t}\n\tif t.similarity != \"\" {\n\t\toptions[\"similarity\"] = t.similarity\n\t}\n\tif t.termVector != \"\" {\n\t\toptions[\"term_vector\"] = t.termVector\n\t}\n\n\tif !includeName {\n\t\treturn options, nil\n\t}\n\n\tsource := make(map[string]interface{})\n\tsource[t.name] = options\n\treturn source, nil\n}", "title": "" }, { "docid": "9ada295c38bf112518e9a822b7a2989e", "score": "0.47331208", "text": "func (u *DBUserType) Scan(value interface{}) error {\n\t*u = DBUserType(value.([]byte))\n\treturn nil\n}", "title": "" }, { "docid": "0ea5920fc76901e3f84813cde2777f05", "score": "0.47239995", "text": "func (q userQuery) One(exec boil.Executor) (*User, error) {\n\to := &User{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"mdbmodels: failed to execute a one query for users\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "cf0195705e9f9f9bdb39830032194dda", "score": "0.47024477", "text": "func (q subcriberQuery) One(ctx context.Context, exec boil.ContextExecutor) (*Subcriber, error) {\n\to := &Subcriber{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"orm: failed to execute a one query for subcribers\")\n\t}\n\n\tif err := o.doAfterSelectHooks(ctx, exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "0faaeb4d976f4fde6e4e192c94d84145", "score": "0.46987602", "text": "func (this *Field) Type() value.Type { return value.JSON }", "title": "" }, { "docid": "9900b69cfb844ecd5fba58afb98bd435", "score": "0.46942157", "text": "func (api *API) ScanOne(dst interface{}, rows pgx.Rows) error {\n\terr := api.dbscanAPI.ScanOne(dst, NewRowsAdapter(rows))\n\tif dbscan.NotFound(err) {\n\t\treturn errors.WithStack(pgx.ErrNoRows)\n\t}\n\treturn errors.WithStack(err)\n}", "title": "" }, { "docid": "4bc3a88686a8f52e4dda9e2d657e0377", "score": "0.46914724", "text": "func (this *Iter_Amazing_SelectByName) One() *Row_Amazing_SelectByName {\n\tfirst, hasFirst := this.Next()\n\tdefer this.rows.Close()\n\tif first != nil && first.err != nil && first.err != io.EOF {\n\t\treturn &Row_Amazing_SelectByName{err: first.err}\n\t}\n\t_, hasSecond := this.Next()\n\tif !hasFirst || hasSecond {\n\t\tamount := \"none\"\n\t\tif hasSecond {\n\t\t\tamount = \"multiple\"\n\t\t}\n\t\treturn &Row_Amazing_SelectByName{err: persist.NotFound{Msg: fmt.Sprintf(\"expected exactly 1 result from query 'SelectByName' found %s\", amount)}}\n\t}\n\treturn first\n}", "title": "" }, { "docid": "aff0fae4e03c90735745a695dc69e96a", "score": "0.4688356", "text": "func (m *Metadata) Scan1(src interface{}) error {\n\ts, err := ScanToString(src)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"invalid type for Metadata scan\")\n\t}\n\ts = strings.Trim(s, \"()\")\n\tparts := strings.Split(s, \",\")\n\tif len(parts) != 4 {\n\t\treturn errors.New(\"invalid count for Metadata scan\")\n\t}\n\tfor i, part := range parts {\n\t\tparts[i] = strings.Trim(part, `\"`)\n\t}\n\townerID := uuid.Parse(parts[0])\n\tif ownerID == nil {\n\t\treturn errors.New(\"invalid owner_id for Metadata scan\")\n\t}\n\tm.Owner = &User{ID: ownerID}\n\n\treturn m.TimeMetadata.Scan1(\"(\" + strings.Join(parts[1:], \",\") + \")\")\n}", "title": "" }, { "docid": "cfb957bdad58c0fca66e84f242d431c3", "score": "0.46842578", "text": "func (r *Result) One(dst interface{}) error {\n\tone := r.Limit(1).(*Result)\n\tquery, err := one.Paginator()\n\tif err != nil {\n\t\tr.setErr(err)\n\t\treturn err\n\t}\n\n\terr = query.Iterator().One(dst)\n\tr.setErr(err)\n\treturn err\n}", "title": "" }, { "docid": "ad167e579b2ce570dfb153bd0443904f", "score": "0.46761227", "text": "func (o *Phenstatement) Type(exec boil.Executor, mods ...qm.QueryMod) cvtermQuery {\n\tqueryMods := []qm.QueryMod{\n\t\tqm.Where(\"cvterm_id=$1\", o.TypeID),\n\t}\n\n\tqueryMods = append(queryMods, mods...)\n\n\tquery := Cvterms(exec, queryMods...)\n\tqueries.SetFrom(query.Query, \"\\\"cvterm\\\"\")\n\n\treturn query\n}", "title": "" }, { "docid": "51015d0f8f7fc9032e5930db53f497ba", "score": "0.467393", "text": "func (r *Type) Scan(value interface{}) error {\n\tswitch t := value.(type) {\n\tcase nil:\n\t\t*r = TypeUnknown\n\tcase []byte:\n\t\t*r = Type(t)\n\tcase string:\n\t\t*r = Type(t)\n\tdefault:\n\t\treturn fmt.Errorf(\"could not process unknown type for role %T\", t)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "fa54d443410e883ec95024ca76378cf4", "score": "0.46721914", "text": "func (t *Type) Scan(value interface{}) error {\n\tswitch _t := value.(type) {\n\tcase []byte:\n\t\t*t = Type(_t)\n\tcase string:\n\t\t*t = Type(_t)\n\tdefault:\n\t\treturn fmt.Errorf(\"could not process unknown type for Type(%T)\", t)\n\t}\n\treturn t.validate()\n}", "title": "" }, { "docid": "05c7044e908c8f477bf12ef8a95fa314", "score": "0.46469346", "text": "func SelectOne() SelectQuery {\n\treturn SelectQuery{\n\t\tSelectFields: Fields{FieldLiteral(\"1\")},\n\t}\n}", "title": "" }, { "docid": "c22da6e80cdeacfb3b67d9e526586df4", "score": "0.46451187", "text": "func (q countryQuery) One(exec boil.Executor) (*Country, error) {\n\to := &Country{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for countries\")\n\t}\n\n\tif err := o.doAfterSelectHooks(exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "f1482ad087476702d19d2e52810353fa", "score": "0.4643347", "text": "func (g *Generator) OneOf(values ...any) any {\n\tif len(values) == 0 {\n\t\treturn 0\n\t}\n\ti := g.Int(0, len(values)-1)\n\treturn values[i]\n}", "title": "" }, { "docid": "c445c9ab69bd4635b2ca59168b8a57cb", "score": "0.4640797", "text": "func (qt *QuestionType) Scan(value interface{}) error {\n\tswitch v := value.(type) {\n\tcase string:\n\t\t*qt = QuestionType(v)\n\tcase []byte:\n\t\t*qt = QuestionType(v)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "56976faeb28d5673a6a100082e25ba19", "score": "0.4638633", "text": "func (q eventOneQuery) One() (*EventOne, error) {\n\to := &EventOne{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for event_one\")\n\t}\n\n\tif err := o.doAfterSelectHooks(queries.GetExecutor(q.Query)); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "7bbb62b194f1b31c97d09d5dea31dc34", "score": "0.4635719", "text": "func (q recordQuery) One() (*Record, error) {\n\to := &Record{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for record\")\n\t}\n\n\tif err := o.doAfterSelectHooks(queries.GetExecutor(q.Query)); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "bdc6767eb237816430ec072199c79640", "score": "0.4632705", "text": "func (p *QueryExampleItem) BuildOneQuery(in *Query, field string) (string, []interface{}) {\n\treturn p.BuildQuery(in, field, false, true)\n}", "title": "" }, { "docid": "882ad4c9ca095c43cd22fefa9b42bde7", "score": "0.46324942", "text": "func (q claimTagQuery) One(exec boil.Executor) (*ClaimTag, error) {\n\to := &ClaimTag{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"model: failed to execute a one query for claim_tag\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "3d958c18f980041536380a053735186e", "score": "0.46322405", "text": "func (s *Schema) Typed(tpe, format string) *Schema {\r\n\ts.Type = []string{tpe}\r\n\ts.Format = format\r\n\treturn s\r\n}", "title": "" }, { "docid": "9e29b127d3dbb66e967057229ca4bb9d", "score": "0.4630729", "text": "func dbQueryOne(ctx context.Context, dest interface{}, query string, bindVars map[string]interface{}, db driver.Database) (*driver.DocumentMeta, errstack.E) {\n\tcursor, err := db.Query(ctx, query, bindVars)\n\tif err != nil {\n\t\treturn nil, errstack.WrapAsInf(err, \"Can not execute the query\")\n\t}\n\tdefer errstack.CallAndLog(logger, cursor.Close)\n\tif !cursor.HasMore() {\n\t\treturn nil, NewNotFound(\"\")\n\t}\n\tmeta, err := cursor.ReadDocument(ctx, dest)\n\treturn &meta, errstack.WrapAsDomainF(err, \"Can't parse result (%s) into %t type\", query, dest)\n}", "title": "" }, { "docid": "ff20c6991d183f54f79f4fea986b0b6a", "score": "0.46279746", "text": "func Constructor() AllOne {\n\treturn AllOne{m: make(map[string]*entry),\n\t\tmax: maxPQ{},\n\t\tmin: minPQ{},\n\t}\n}", "title": "" }, { "docid": "8c7a7fcc591b82425aac448c7fa67d43", "score": "0.46179304", "text": "func (q SelectQuery) SelectOne() SelectQuery {\n\tq.SelectFields = Fields{FieldLiteral(\"1\")}\n\treturn q\n}", "title": "" }, { "docid": "0c6129b86ad20694837084f7a1bcde62", "score": "0.4613859", "text": "func (q infectedEncounterQuery) One(ctx context.Context, exec boil.ContextExecutor) (*InfectedEncounter, error) {\n\to := &InfectedEncounter{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for infected_encounter\")\n\t}\n\n\tif err := o.doAfterSelectHooks(ctx, exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "35981e9d169c97526066c76caff1ace8", "score": "0.45983535", "text": "func Constructor() AllOne {\n\treturn AllOne{M: make(map[string]int), Q: []map[string]int{}}\n}", "title": "" }, { "docid": "b85f1b89e64897cc63c0c49db65733d2", "score": "0.45981923", "text": "func (x *TypeOneMap) WithReader(r TypeOneReader) {\n\tx.reader = r\n}", "title": "" }, { "docid": "67ced9edebe7ecf6db16b455000aac73", "score": "0.45896795", "text": "func singleFieldStruct(id int16, value wire.Value) wire.Value {\n\treturn wire.NewValueStruct(wire.Struct{Fields: []wire.Field{\n\t\t{ID: id, Value: value},\n\t}})\n}", "title": "" }, { "docid": "204ada5c3295a11f85cdfd34e955a569", "score": "0.45875737", "text": "func ScanOne(dst interface{}, rows pgx.Rows) error {\n\treturn errors.WithStack(DefaultAPI.ScanOne(dst, rows))\n}", "title": "" }, { "docid": "033c473696c90eed4f965ea4aeb30888", "score": "0.45849484", "text": "func (bl BLElasticSearch) SearchOne(reqCtx common.RequestContext, emp model.Employee, source string) (result []model.ElasticSearchResult, err error) {\n\tlogger.LogInfo(fmt.Sprintf(\"Searching for employee %d Source %s\", emp.ID, source), reqCtx.Xid())\n\tinput := bl.getSearchModel(reqCtx, emp, source)\n\tswitch source {\n\tcase constant.Source_OIG:\n\t\tresult, err = bl.SearchOIG(reqCtx, input)\n\tdefault:\n\t\tlogger.LogError(fmt.Sprintf(\"Source %s not implemented\", source), reqCtx.Xid())\n\t\terr = eh.NewError(eh.ErrElasticSearchNotImplemented, \"\")\n\t}\n\tif len(result) > 0 {\n\t\tlogger.LogInfo(fmt.Sprintf(\"employee %d found in Source %s Result: %+v \", emp.ID, source, result), reqCtx.Xid())\n\n\t} else {\n\t\tlogger.LogInfo(fmt.Sprintf(\"employee %d NOT found in Source %s \", emp.ID, source), reqCtx.Xid())\n\t}\n\treturn\n}", "title": "" }, { "docid": "1764e33d30dcb10ee3af1319e538e759", "score": "0.45846346", "text": "func Constructor() AllOne {\r\n\treturn AllOne{\r\n\t\tkeys: make(map[string]int),\r\n\t}\r\n}", "title": "" }, { "docid": "1d88eca07c2918e13fad82d8d58132fb", "score": "0.45813775", "text": "func (q userQuery) One(ctx context.Context, exec boil.ContextExecutor) (*User, error) {\n\to := &User{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"dal: failed to execute a one query for user\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "6a8e640d416b119bd607471610ef59d2", "score": "0.45796126", "text": "func (q skillQuery) One(ctx context.Context, exec boil.ContextExecutor) (*Skill, error) {\n\to := &Skill{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for skill\")\n\t}\n\n\tif err := o.doAfterSelectHooks(ctx, exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "0503e0d0e6981457a546a3441d6f8b61", "score": "0.45792103", "text": "func (q judgementPartiesAQuery) One(ctx context.Context, exec boil.ContextExecutor) (*JudgementPartiesA, error) {\n\to := &JudgementPartiesA{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for JudgementPartiesA\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "f466e17e43af1deab4be2194e8a5afd0", "score": "0.4578687", "text": "func (c *PromotiontypeClient) UpdateOne(pr *Promotiontype) *PromotiontypeUpdateOne {\n\tmutation := newPromotiontypeMutation(c.config, OpUpdateOne, withPromotiontype(pr))\n\treturn &PromotiontypeUpdateOne{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "2b20c56b929d88c9f7404711530e1715", "score": "0.45786667", "text": "func (a *Aggregate) One(result interface{}) (err error) {\n\terr = a.brk.Do(a.config.Addr, func() error {\n\t\tnow := time.Now()\n\t\ta.span = a.span.SetOperationName(\"aggregate_one\")\n\t\tdefer a.span.Finish()\n\n\t\terr = a.ai.One(result)\n\t\tif ok, elapse := slowLog(now, a.config.SlowQueryDuration); ok {\n\t\t\text.Error.Set(a.span, true)\n\t\t\ta.span.LogFields(log.String(\"event\", \"slow_query\"), log.Int64(\"elapse\", int64(elapse)))\n\t\t}\n\t\treturn err\n\t}, accept)\n\treturn\n}", "title": "" }, { "docid": "4635e669f705a8294aa46b8112166a42", "score": "0.4578606", "text": "func (q accountdatumQuery) One(exec boil.Executor) (*Accountdatum, error) {\n\to := &Accountdatum{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"stellarcore: failed to execute a one query for accountdata\")\n\t}\n\n\tif err := o.doAfterSelectHooks(exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "43d2ecbc5f1865081d8672669f3bf4e4", "score": "0.45752338", "text": "func (q outputQuery) One(exec boil.Executor) (*Output, error) {\n\to := &Output{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"model: failed to execute a one query for output\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "946ca404d0171c0d36813e7a455d7867", "score": "0.45655864", "text": "func (q optionKindQuery) One(ctx context.Context, exec boil.ContextExecutor) (*OptionKind, error) {\n\to := &OptionKind{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for option_kinds\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "56cb73cfe38bd14c223f77b3319b9bfe", "score": "0.45634055", "text": "func (q tagI18nQuery) One() (*TagI18n, error) {\n\to := &TagI18n{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"mdbmdbmodels: failed to execute a one query for tag_i18n\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "677af719353d443c027397706f9c2f68", "score": "0.4558539", "text": "func (q metricQuery) One() (*Metric, error) {\n\to := &Metric{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"public: failed to execute a one query for metric\")\n\t}\n\n\tif err := o.doAfterSelectHooks(queries.GetExecutor(q.Query)); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "0241246fc6c7fa2e8680d73b96cb781d", "score": "0.4556823", "text": "func (r *Resource) SelectOne(db orm.DB) *Query {\n\treturn r.newQuery(db, typeSelect, false)\n}", "title": "" }, { "docid": "2733f73bad1e5c6c1e89822add2ce84d", "score": "0.4554517", "text": "func (o *Cvtermprop) Type(exec boil.Executor, mods ...qm.QueryMod) cvtermQuery {\n\tqueryMods := []qm.QueryMod{\n\t\tqm.Where(\"cvterm_id=$1\", o.TypeID),\n\t}\n\n\tqueryMods = append(queryMods, mods...)\n\n\tquery := Cvterms(exec, queryMods...)\n\tqueries.SetFrom(query.Query, \"\\\"cvterm\\\"\")\n\n\treturn query\n}", "title": "" }, { "docid": "1ac59bcf2bf7f7e525ffda3394004642", "score": "0.4554272", "text": "func NewTypeOneCollection(instance string, client *http.Client, urls TypeOneUrlTemplateProvider, config *TypeOneConfig) (*TypeOneCollection, error) {\n\tcoll := &TypeOneCollection{\n\t\tname: instance,\n\t\tclient: client,\n\t\tconfig: config,\n\t}\n\n\tu, err := url.Parse(config.URL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcoll.url = u\n\n\tcoll.urlAll = urls.All()\n\tif urls.OneParam() != \"\" {\n\t\turlTmplOneParam, err := template.New(\"urlTmplOneParam\").\n\t\t\tFuncs(template.FuncMap{}).\n\t\t\tParse(urls.OneParam())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcoll.urlTmplOneParam = urlTmplOneParam\n\t}\n\n\tif urls.MultipleParam() != \"\" {\n\t\turlTmplMultipleParam, err := template.New(\"urlTmplMultipleParam\").\n\t\t\tFuncs(template.FuncMap{}).\n\t\t\tParse(urls.MultipleParam())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcoll.urlTmplMultipleParam = urlTmplMultipleParam\n\t}\n\n\tif urls.MessageParam() != \"\" {\n\t\turlTmplMessageParam, err := template.New(\"urlTmplMessageParam\").\n\t\t\tFuncs(template.FuncMap{}).\n\t\t\tParse(urls.MessageParam())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcoll.urlTmplMessageParam = urlTmplMessageParam\n\t}\n\n\tif urls.WithComparator() != \"\" {\n\t\turlTmplWithComparator, err := template.New(\"urlTmplWithComparator\").\n\t\t\tFuncs(template.FuncMap{}).\n\t\t\tParse(urls.WithComparator())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcoll.urlTmplWithComparator = urlTmplWithComparator\n\t}\n\n\tif urls.WithRest() != \"\" {\n\t\turlTmplWithRest, err := template.New(\"urlTmplWithRest\").\n\t\t\tFuncs(template.FuncMap{}).\n\t\t\tParse(urls.WithRest())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcoll.urlTmplWithRest = urlTmplWithRest\n\t}\n\n\tif urls.ProviderStubOnly() != \"\" {\n\t\turlTmplProviderStubOnly, err := template.New(\"urlTmplProviderStubOnly\").\n\t\t\tFuncs(template.FuncMap{}).\n\t\t\tParse(urls.ProviderStubOnly())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcoll.urlTmplProviderStubOnly = urlTmplProviderStubOnly\n\t}\n\n\treturn coll, nil\n}", "title": "" }, { "docid": "01d96a93fe04bb0c25c03e0aa7986490", "score": "0.45515952", "text": "func (f *Finder) One(ctx context.Context, result interface{}) error {\n\tfindOpts := &mopt.FindOptions{}\n\tif len(f.projection) != 0 {\n\t\tfindOpts.Projection = f.projection\n\t}\n\tif f.start != 0 {\n\t\tfindOpts.SetSkip(f.start)\n\t}\n\tfindOpts.SetLimit(1)\n\tif len(f.sort) != 0 {\n\t\tfindOpts.SetSort(f.sort)\n\t}\n\n\tvar err error\n\tvar cursor *mongo.Cursor\n\tstartTime := time.Now()\n\tdefer func() {\n\t\treportMongdbMetrics(\"findOne\", err, startTime)\n\t}()\n\n\t// convert condition to filter\n\tfilter := f.condition.Combine(leafNodeProcessor, branchNodeProcessor)\n\tcursor, err = f.mCli.Database(f.dbName).Collection(f.collectionName).Find(ctx, filter, findOpts)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer func() {\n\t\tcursor.Close(ctx)\n\t}()\n\tfor cursor.Next(ctx) {\n\t\treturn cursor.Decode(result)\n\t}\n\treturn drivers.ErrTableRecordNotFound\n}", "title": "" }, { "docid": "fe437280b13b940b1db7b90930a06f6c", "score": "0.45458776", "text": "func (p *Parser) MatchOne(typ TokenType, vals ...string) *Token {\n\tfor _, val := range vals {\n\t\tif t := p.Peek(typ, val); t != nil {\n\t\t\tp.Consume()\n\t\t\treturn t\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "101d7dba2f72c194870dedf751d96f2c", "score": "0.45442423", "text": "func (q labelI18nQuery) One(exec boil.Executor) (*LabelI18n, error) {\n\to := &LabelI18n{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"mdbmodels: failed to execute a one query for label_i18n\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "b95594a15f91a0fa1460586c4451741d", "score": "0.45403498", "text": "func (p *QueryExample) BuildOneQuery(in *Query, field string) (string, []interface{}) {\n\treturn p.BuildQuery(in, field, false, true)\n}", "title": "" }, { "docid": "506398c055c14e5ff60dbbb0dcd3bf02", "score": "0.45386836", "text": "func (c *PatientrightstypeClient) UpdateOne(pa *Patientrightstype) *PatientrightstypeUpdateOne {\n\tmutation := newPatientrightstypeMutation(c.config, OpUpdateOne, withPatientrightstype(pa))\n\treturn &PatientrightstypeUpdateOne{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "7398427b054275314f6dc7ed6cc018fc", "score": "0.45363507", "text": "func (q adminKnownInflationDestinationQuery) One(exec boil.Executor) (*AdminKnownInflationDestination, error) {\n\to := &AdminKnownInflationDestination{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for admin_known_inflation_destinations\")\n\t}\n\n\tif err := o.doAfterSelectHooks(exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "ea2fb7a86d04384a8d617d6e4512442b", "score": "0.45280185", "text": "func Constructor() AllOne {\n\treturn AllOne{\n\t\tm: make(map[string]int),\n\t\trev: make(map[int]map[string]bool),\n\t\tmax: make([]int, 0),\n\t\tmin: make([]int, 0),\n\t}\n}", "title": "" }, { "docid": "d015e135b9b6c6b1eeb5578528423b88", "score": "0.45235693", "text": "func (rs *ObjectResultSet) One() (*Object, error) {\n\tif !rs.Next() {\n\t\treturn nil, kallax.ErrNotFound\n\t}\n\n\trecord, err := rs.Get()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := rs.Close(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn record, nil\n}", "title": "" }, { "docid": "dfbee359377c17b72e921116a0a36a1d", "score": "0.45194808", "text": "func (q ogpQuery) One(ctx context.Context, exec boil.ContextExecutor) (*Ogp, error) {\n\to := &Ogp{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for ogp\")\n\t}\n\n\tif err := o.doAfterSelectHooks(ctx, exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "22193e7dc9580665deb9aed820eac5d1", "score": "0.45189434", "text": "func (q contentUnitQuery) One() (*ContentUnit, error) {\n\to := &ContentUnit{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"mdbmdbmodels: failed to execute a one query for content_units\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "88902c8e90b59b1c62fe229aba95f24c", "score": "0.45179826", "text": "func (q claimQuery) One(exec boil.Executor) (*Claim, error) {\n\to := &Claim{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(nil, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"model: failed to execute a one query for claim\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "cd0bd9b48b1e578e2e623224725e313b", "score": "0.45171773", "text": "func ScanOne(dst interface{}, rows pgx.Rows) error {\n\terr := processRows(dst, rows, false /* multipleRows */)\n\treturn errors.WithStack(err)\n}", "title": "" }, { "docid": "6e05f6c19338a1a3d3e4113e3cf0dd84", "score": "0.45158333", "text": "func (e *PublisherType) Scan(src interface{}) error {\n\tvar b []byte\n\tswitch src.(type) {\n\tcase []byte:\n\t\tb = src.([]byte)\n\tcase string:\n\t\tb = []byte(src.(string))\n\tcase nil:\n\t\tb = make([]byte, 0)\n\tdefault:\n\t\treturn t9e.G(\"unsupported type\")\n\t}\n\tif !PublisherType(b).IsValid() {\n\t\treturn t9e.G(\"invalid value\")\n\t}\n\t*e = PublisherType(b)\n\treturn nil\n}", "title": "" }, { "docid": "4a88dbaf7e31b4bd8f765352b79609c2", "score": "0.45125294", "text": "func (q userQuery) One(ctx context.Context, exec boil.ContextExecutor) (*User, error) {\n\to := &User{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for users\")\n\t}\n\n\tif err := o.doAfterSelectHooks(ctx, exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "277704934f300445771735a665a17e29", "score": "0.45068812", "text": "func (c *SurgerytypeClient) UpdateOne(s *Surgerytype) *SurgerytypeUpdateOne {\n\tmutation := newSurgerytypeMutation(c.config, OpUpdateOne, withSurgerytype(s))\n\treturn &SurgerytypeUpdateOne{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "17f011499eb8adf188db102c46c4586d", "score": "0.44937512", "text": "func (q postTemplateQuery) One(ctx context.Context, exec boil.ContextExecutor) (*PostTemplate, error) {\n\to := &PostTemplate{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"orm: failed to execute a one query for post_templates\")\n\t}\n\n\tif err := o.doAfterSelectHooks(ctx, exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "336ce486be6482829c9962d4a90d2382", "score": "0.44919884", "text": "func (q saleQuery) One(ctx context.Context, exec boil.ContextExecutor) (*Sale, error) {\n\to := &Sale{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for sale\")\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "bd47fa0aa20f41923601ca7fe2332138", "score": "0.44875592", "text": "func (q upepBlastDBQuery) One() (*UpepBlastDB, error) {\n\to := &UpepBlastDB{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for upep_blast_db\")\n\t}\n\n\tif err := o.doAfterSelectHooks(queries.GetExecutor(q.Query)); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "0366b9e84f2db490a624825507572fb3", "score": "0.44850475", "text": "func (o *Cvprop) Type(exec boil.Executor, mods ...qm.QueryMod) cvtermQuery {\n\tqueryMods := []qm.QueryMod{\n\t\tqm.Where(\"cvterm_id=$1\", o.TypeID),\n\t}\n\n\tqueryMods = append(queryMods, mods...)\n\n\tquery := Cvterms(exec, queryMods...)\n\tqueries.SetFrom(query.Query, \"\\\"cvterm\\\"\")\n\n\treturn query\n}", "title": "" }, { "docid": "37333f78428de91dbbaf8e56989f8321", "score": "0.44841006", "text": "func (q dailyDatumQuery) One(ctx context.Context, exec boil.ContextExecutor) (*DailyDatum, error) {\n\to := &DailyDatum{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"db: failed to execute a one query for daily_data\")\n\t}\n\n\tif err := o.doAfterSelectHooks(ctx, exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "9099e9bbb13008b50087064906658f8c", "score": "0.44821277", "text": "func (reader *UserDataReader) ReadOne(filter bson.M) (*model.UserData, error) {\n\tuserData := &model.UserData{}\n\tif err := mgm.Coll(&model.UserData{}).First(filter, userData); err != nil {\n\t\tlog.Print(err)\n\t\treturn nil, err\n\t}\n\treturn userData, nil\n}", "title": "" }, { "docid": "412440a0a37cdcdd8970cc92ce9f1c5e", "score": "0.4480983", "text": "func (q cvtermpropQuery) One() (*Cvtermprop, error) {\n\to := &Cvtermprop{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"chado: failed to execute a one query for cvtermprop\")\n\t}\n\n\tif err := o.doAfterSelectHooks(queries.GetExecutor(q.Query)); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" }, { "docid": "06d7675609544baf6bc24275b10f846a", "score": "0.44768244", "text": "func New() *Type {\n\treturn &Type{}\n}", "title": "" }, { "docid": "79228dfb25083382f7cb0be172c0ae6d", "score": "0.44760817", "text": "func (c *RoomtypeClient) UpdateOne(r *Roomtype) *RoomtypeUpdateOne {\n\tmutation := newRoomtypeMutation(c.config, OpUpdateOne, withRoomtype(r))\n\treturn &RoomtypeUpdateOne{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "79228dfb25083382f7cb0be172c0ae6d", "score": "0.44760817", "text": "func (c *RoomtypeClient) UpdateOne(r *Roomtype) *RoomtypeUpdateOne {\n\tmutation := newRoomtypeMutation(c.config, OpUpdateOne, withRoomtype(r))\n\treturn &RoomtypeUpdateOne{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "title": "" }, { "docid": "4fb81a88e7fb2421dd6e5f288fa5bda4", "score": "0.447347", "text": "func (ob *OneBundle) CursorType(ct mongoopt.CursorType) *OneBundle {\n\tbundle := &OneBundle{\n\t\toption: CursorType(ct),\n\t\tnext: ob,\n\t}\n\n\treturn bundle\n}", "title": "" }, { "docid": "f6747e2c586bcb94d6dc227cc20ce3e9", "score": "0.44726208", "text": "func (q mastUserQuery) One(ctx context.Context, exec boil.ContextExecutor) (*MastUser, error) {\n\to := &MastUser{}\n\n\tqueries.SetLimit(q.Query, 1)\n\n\terr := q.Bind(ctx, exec, o)\n\tif err != nil {\n\t\tif errors.Cause(err) == sql.ErrNoRows {\n\t\t\treturn nil, sql.ErrNoRows\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"models: failed to execute a one query for mast_users\")\n\t}\n\n\tif err := o.doAfterSelectHooks(ctx, exec); err != nil {\n\t\treturn o, err\n\t}\n\n\treturn o, nil\n}", "title": "" } ]
995f4067ff50d2a85ed3f5d4e6d055e3
GetPosts retrieves list of Posts
[ { "docid": "79812051141b517bb58fe64637ef2276", "score": "0.7386745", "text": "func GetPosts(limit int) ([]*microblog.Post, error) {\n\tif limit > len(Posts) {\n\t\tlimit = len(Posts)\n\t}\n\treturn Posts[0:limit], nil\n}", "title": "" } ]
[ { "docid": "603c08c7f519f96382560384ef65e74a", "score": "0.80166155", "text": "func GetPosts(c *gin.Context) {\n\tvar post []models.Posts\n\terr := models.GetAllPosts(&post)\n\tcontrollerhandling.ReturnObject(c, err, post)\n\n}", "title": "" }, { "docid": "fac879e47c89ad1410d28642241dd6b4", "score": "0.78784496", "text": "func (svc *Service) GetPosts() ([]*models.Post, error) {\n\n\tresponse, err := svc.svcdb.GetAllPosts()\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to fetch the Posts %w\", err)\n\t}\n\n\treturn response, nil\n\n}", "title": "" }, { "docid": "deb276167121a0ec02968d7b51742482", "score": "0.784591", "text": "func GetPosts(ctx context.Context, limitPosts, page int) ([]*proto.Post, error) {\n\tif limitPosts < 10 {\n\t\tlimitPosts = 10\n\t}\n\tif page < 1 {\n\t\tpage = 1\n\t}\n\tlimit := limitPosts\n\toffset := limit*page - limit\n\tquery := \"SELECT * FROM posts LIMIT $1 OFFSET $2\"\n\n\trows, err := databaseService.QueryContext(ctx, query, limit, offset)\n\tif err != nil {\n\t\treturn nil, sql.ErrNoRows\n\t}\n\tdefer rows.Close()\n\n\tvar posts []*proto.Post\n\tif errR := rows.Next(); errR {\n\t\tvar comments []uint8\n\t\tvar post proto.Post\n\t\tif err := rows.Scan(&post.Id, &post.Author, &post.Title,\n\t\t\t&post.Content, &post.Timestemp, &post.Published,\n\t\t\t&comments); err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn nil, errors.New(errScanPost)\n\t\t}\n\t\tif errM := json.Unmarshal(comments, &post.Comments); errM != nil {\n\t\t\treturn nil, errors.New(errUnMarshal)\n\t\t}\n\t\tposts = append(posts, &post)\n\t}\n\treturn posts, nil\n}", "title": "" }, { "docid": "c79bdfad7827bf4d63522846c167426b", "score": "0.78113014", "text": "func GetPosts(ctx *gin.Context){\n\tctx.JSON(http.StatusOK,gin.H{\n\t\t\"posts\":populate(),\n\t})\n}", "title": "" }, { "docid": "b2c2ae3911a6f2a5ca123283c23d233b", "score": "0.7799486", "text": "func (pc *PostController) GetPosts(w http.ResponseWriter, r *http.Request) {\n\tlimit, _ := strconv.Atoi(r.FormValue(\"limit\"))\n\toffset, _ := strconv.Atoi(r.FormValue(\"offset\"))\n\tif limit <= 0 {\n\t\tlimit = 50\n\t}\n\tif offset < 0 {\n\t\toffset = 0\n\t}\n\tposts, err := pc.PostRepo.Find(limit, offset)\n\tif err != nil {\n\t\trender.Render(w, r, ErrServerInternal(err))\n\t\treturn\n\t}\n\t// if len(posts) == 0 {\n\t// \terr = fmt.Errorf(\"not found no one post in the repository\")\n\t// \trender.Render(w, r, ErrNotFound(err))\n\t// \treturn\n\t// }\n\tfor i, p := range posts {\n\t\tposts[i].Content = template.HTML(bf.Run([]byte(p.Content)))\n\t}\n\tdata := templatePostsFill{\n\t\tTitle: \"POSTS\",\n\t\tPosts: posts,\n\t}\n\tctx := context.WithValue(r.Context(), StatusCtxKey, http.StatusOK)\n\tr.WithContext(ctx)\n\ttmpl := template.Must(template.New(\"indexPOST\").ParseGlob(templatePATH))\n\ttmpl.ExecuteTemplate(w, \"indexPOST\", data)\n}", "title": "" }, { "docid": "f4e579a17e34050289565ddb21a6c7c2", "score": "0.7781321", "text": "func GetPosts(c *gin.Context) {\n\tposts, err := database.Posts(bson.M{\n\t\t\"is_publish\": true,\n\t})\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\tStatus: http.StatusInternalServerError,\n\t\t\tMessage: \"Internal server error\",\n\t\t})\n\t\treturn\n\t}\n\n\tfor i := range posts {\n\t\tif posts[i].CategoryID != nil {\n\t\t\t// retrieve post's category\n\t\t\tcategories, err := database.Categories(bson.M{\n\t\t\t\t\"_id\": posts[i].CategoryID,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\t\t\tStatus: http.StatusInternalServerError,\n\t\t\t\t\tMessage: \"Internal server error\",\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif len(categories) > 0 {\n\t\t\t\tcategories[0].PostCount, err = database.PostCount(bson.M{\n\t\t\t\t\t\"category_id\": categories[0].ID,\n\t\t\t\t\t\"is_publish\": true,\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\t\t\t\tStatus: http.StatusInternalServerError,\n\t\t\t\t\t\tMessage: \"Internal server error\",\n\t\t\t\t\t})\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tposts[i].Category = &categories[0]\n\t\t\t}\n\t\t}\n\n\t\tif posts[i].UserID != nil {\n\t\t\t// retrieve post's owner\n\t\t\tuser, err := database.User(bson.M{\n\t\t\t\t\"_id\": posts[i].UserID,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\t\t\tStatus: http.StatusInternalServerError,\n\t\t\t\t\tMessage: \"Internal server error\",\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\t}\n\t\t\tposts[i].User = &user\n\t\t}\n\t}\n\n\tc.JSON(http.StatusOK, posts)\n}", "title": "" }, { "docid": "b3613c394b0891c53f146b4969f625f2", "score": "0.7715668", "text": "func (g *Generator) GetPosts() []*Post {\n\treturn g.posts\n}", "title": "" }, { "docid": "27ba7811e6292d4fe91e25d0cc042e49", "score": "0.76550466", "text": "func (v Fave) GetPosts(params FaveGetPostsParams) (*FaveGetPostsResponse, error) {\n\tr, err := v.API.Request(\"fave.getPosts\", params)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar resp FaveGetPostsResponse\n\terr = json.Unmarshal(r, &resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resp, nil\n}", "title": "" }, { "docid": "3cf29116f7ba9372a610be819b2a7ba6", "score": "0.76451695", "text": "func GetPosts(w http.ResponseWriter, r *http.Request) {\n\n\tw.Header().Set(\"Content- Type\", \"application/json\")\n\tvar posts models.Posts\n\tdbs.DB.Find(&posts)\n\tjson.NewEncoder(w).Encode(posts)\n\n}", "title": "" }, { "docid": "8324c5c7c79cc48e449e53392759d7b0", "score": "0.7515402", "text": "func (s *PostService) GetPosts(page, perPage uint) ([]*Post, error) {\n\tp := PaginateParams{}\n\tp.Limit, p.Offset = calculateLimitOffset(page, perPage)\n\treturn s.SearchPosts(\"\", \"\", p)\n}", "title": "" }, { "docid": "5d7e6f89f403516c5a96cf658fbc8f29", "score": "0.7456869", "text": "func (wrapper Wrapper) GetPosts() ([]Post, error) {\n\treturn wrapper.queryPosts(func() (*sql.Rows, error) {\n\t\tstatement := `\n\t\tSELECT\n\t\t\tpost_id, author_id, body, created_on\n\t\tFROM\n\t\t\tpost\n\t\tORDER BY\n\t\t\tcreated_on DESC;\n\t\t`\n\n\t\treturn wrapper.DB.Query(statement)\n\t})\n}", "title": "" }, { "docid": "8cadc39c339ce7bfef9f87573cc2d9ab", "score": "0.7455392", "text": "func GetPosts(c *gin.Context) {\n\n\tqueryTag := c.Query(model.KeyTag)\n\tfmt.Printf(\"Listing posts for tag [%s]\\n\", queryTag)\n\tdb := c.MustGet(model.KeyDb).(*jgorm.DB)\n\n\t// countLimit := c.Query(\"count\")\n\t// count, err := strconv.Atoi(countLimit)\n\t// if err != nil {\n\t// \tfmt.Printf(\"Could not deserialize count %s: %s\\n\", countLimit, err.Error())\n\t// \tc.Error(err)\n\t// }\n\t// fmt.Println(\"Got a count...\" + countLimit)\n\n\tvar posts []model.Post\n\tvar err error\n\n\tif queryTag == \"\" {\n\t\terr = db.Order(\"updated_at desc\").Find(&posts).Error\n\t} else {\n\t\terr = db.Where(model.KeyTags+\" LIKE ?\", \"%\"+queryTag+\"%\").Order(\"updated_at desc\").Find(&posts).Error\n\t\t// fmt.Printf(\"Query: [%v]\\n\", db.Where(\"tags LIKE ?\", queryTag).Find(&posts).QueryExpr())\n\t}\n\n\tfmt.Printf(\"Found %d posts for query\", len(posts))\n\n\tif err != nil {\n\t\tc.Error(err)\n\t\tc.AbortWithStatus(500)\n\t} else {\n\t\tc.JSON(200, gin.H{\"posts\": posts})\n\t}\n\n\t// might be enhanced using https://stackoverflow.com/questions/37562873/most-idiomatic-way-to-select-elements-from-an-array-in-golang\n\t//\tvar updatedPosts []model.Post\n\t//\tfor _, post := range posts {\n\t//\t\t// if i > count {\n\t//\t\t// \tbreak\n\t//\t\t// }\n\t//\t\tquery := bson.M{model.KeyParentID: bson.RegEx{post.Path, \"\"}}\n\t//\t\tpost.CommentCount, err = db.C(model.CommentCollection).Find(query).Count()\n\t//\t\tupdatedPosts = append(updatedPosts, post)\n\t//\t\tfmt.Printf(\"retrieving post at %s with %d comments \\n\", post.Path, post.CommentCount)\n\t//\t\t// TODO also filter by rights\n\t//\t}\n\n}", "title": "" }, { "docid": "b3d516494ef0904b75f454b0231d8854", "score": "0.742855", "text": "func (k Keeper) GetPosts(ctx sdk.Context) []types.Post {\n\tvar posts []types.Post\n\tk.IteratePosts(ctx, func(_ int64, post types.Post) (stop bool) {\n\t\tposts = append(posts, post)\n\t\treturn false\n\t})\n\n\treturn posts\n}", "title": "" }, { "docid": "7e8c65abe9058b321dcc406ab27758c5", "score": "0.74097043", "text": "func (u *User) GetPosts() (Error error) {\n\tError = DB.Select(&u.Posts, \"SELECT * FROM posts WHERE userID = ? ORDER BY created DESC\", u.ID)\n\treturn\n}", "title": "" }, { "docid": "d55aba63b0cbe2f070a0e6e9c8ae6e09", "score": "0.73363274", "text": "func (client *Client) GetAllPosts() ([]api.Post, error) {\n\tvar resp []api.Post\n\n\turl := client.Host + \"/v1/posts\"\n\tr, err := makeRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn resp, err\n\t}\n\n\terr = processResponseEntity(r, &resp, 200)\n\treturn resp, err\n}", "title": "" }, { "docid": "d0e3299c2f421f48c325e08790826b8b", "score": "0.7323882", "text": "func (db *DB) GetPosts(start int, end int) (*[]Post, error) {\n\ttotal := end - start\n\tp := new([]Post)\n\tsql := \"SELECT * FROM posts OFFSET $1 LIMIT $2\"\n\terr := db.Select(p, sql, start, total)\n\treturn p, err\n}", "title": "" }, { "docid": "4f6dc86057b5959bbbfcb1e64eb452c6", "score": "0.73140657", "text": "func GetPosts(retriever Retriever, blogUrl string) ([]blog.Post, error) {\n\trawData, err := retriever.Fetch(blogUrl)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trss := parsePostsXML(rawData)\n\n\tblogPosts, err := extractPostsFromRss(rss)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn blogPosts, nil\n}", "title": "" }, { "docid": "43229df668210f29e05209609ecd4b38", "score": "0.72897696", "text": "func getPosts() []Post {\n\tresult := []Post{}\n\tfetch(\"posts\", &result, \"posts?context=view&_fields=id,date_gmt,slug,status,title,content,excerpt,author,categories,tags,link\")\n\n\trm := map[int]struct{}{}\n\tfor _, r := range result {\n\t\t_, ok := rm[r.ID]\n\t\tif ok {\n\t\t\tfatal(\"duplicate post: %d\", r.ID)\n\t\t}\n\t\trm[r.ID] = struct{}{}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "175d3acc5bb6cf53cd67824f0754a97d", "score": "0.72709286", "text": "func (b *Blog) GetPostList(w http.ResponseWriter, _ *http.Request) {\n\tif err := b.Views.ExecuteTemplate(w, \"index.gohtml\", b.Pm.IndexedPosts); err != nil {\n\t\tlog.Println(err)\n\t\thttp.Error(w, \"An internal server error occurred.\", 500)\n\t}\n}", "title": "" }, { "docid": "d002a2e941406779d62296635cda278f", "score": "0.72374797", "text": "func GetPosts() []Post {\n\tdb := Connect()\n\tdefer db.Close()\n\tvar posts []Post\n\tdb.Order(\"id ASC\").Find(&posts)\n\tfor i := range posts {\n\t\tdb.Model(&posts[i]).Related(&posts[i].User)\n\t\tposts[i].Feedbacks = GetFeedbacksByPost(posts[i])\n\t}\n\treturn posts\n}", "title": "" }, { "docid": "2fbacd06a83989450c20cb39405cb816", "score": "0.714734", "text": "func (p *Profile) GetPosts() (posts []*adn.Post, err error) {\n\tvar args adn.EpArgs\n\treq := p.NewJSONRequest()\n\tposts = make([]*adn.Post, 0)\n\n\terr = p.App.Do(req, \"retrieve user personalized stream\", args, &posts)\n\treturn\n}", "title": "" }, { "docid": "a23d16dbab219c0b864f884d3351e4ae", "score": "0.7065254", "text": "func (service *PostService) Posts() ([]*domain.Post, error) {\n\tvar posts []*domain.Post\n\tfor _, p := range service.posts {\n\t\tposts = append(posts, p)\n\t}\n\treturn posts, nil\n}", "title": "" }, { "docid": "9d12163f1bff818fa2d49959057af815", "score": "0.690434", "text": "func (s *PostService) List() ([]models.Post, error) {\n\tvar posts []models.Post\n\n\terr := s.store.DB.Select(&posts, \"SELECT * FROM post\")\n\n\treturn posts, err\n}", "title": "" }, { "docid": "5c364011574bbd3f8a063cd6cd52f9d8", "score": "0.6853654", "text": "func getBlogPosts(w http.ResponseWriter, req *http.Request) {\n\t//create array which holds results:\n\tvar posts []Post\n\n\t//select all rows from database with query command and store\n\tvar err error\n\trows, err := db.Query(\"Select post_id, title, body FROM posts\")\n\tif err != nil { //perhaps rows are empty\n\t\tlog.Fatal(\"Error, could not retrieve any rows from database - \", err)\n\t}\n\n\t//iterate through rows, and append each to posts to an array to be returned later\n\tvar tempPost Post\n\tfor rows.Next() {\n\t\trows.Scan(&tempPost.Post_id, &tempPost.Title, &tempPost.Body)\n\t\tposts = append(posts, tempPost)\n\t}\n\n\trows.Close()\n\n\tjson.NewEncoder(w).Encode(posts)\n}", "title": "" }, { "docid": "c4c52411e63af9ffd86ab23d8eb5b956", "score": "0.68351513", "text": "func getAllPosts(response http.ResponseWriter, request *http.Request) {\r\n\r\n\tif request.Method == \"GET\" {\r\n\t\tvar posts []Post\r\n\t\tcollection := client.Database(\"test\").Collection(\"Post\")\r\n\t\tctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)\r\n\t\tdefer cancel()\r\n\t\tcursor, err := collection.Find(ctx, bson.M{})\r\n\t\tif err != nil {\r\n\t\t\tresponse.WriteHeader(http.StatusInternalServerError)\r\n\t\t\tresponse.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\r\n\t\t\treturn\r\n\t\t}\r\n\t\tdefer cursor.Close(ctx)\r\n\t\tfor cursor.Next(ctx) {\r\n\t\t\tvar post Post\r\n\t\t\tcursor.Decode(&post)\r\n\t\t\tposts = append(posts, post)\r\n\t\t}\r\n\t\tif err = cursor.Err(); err != nil {\r\n\t\t\tresponse.WriteHeader(http.StatusInternalServerError)\r\n\t\t\tresponse.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\r\n\t\t\treturn\r\n\t\t}\r\n\t\tfmt.Println(\"Endpoint Hit: Post Article\")\r\n\t\tjson.NewEncoder(response).Encode(posts)\r\n\t}\r\n\r\n}", "title": "" }, { "docid": "e947d36e8810e42f94e3fb0ce5987e52", "score": "0.6764242", "text": "func GetPost(response http.ResponseWriter, request *http.Request) {\r\n\tresponse.Header().Set(\"content-type\", \"application/json\")\r\n\tvar NewPosts []Post\r\n\tcollection := client.Database(\"InstagramUser\").Collection(\"NewPosts\")\r\n\tctx, _ := context.WithTimeout(context.Background(), 30*time.Second)\r\n\tcursor, err := collection.Find(ctx, bson.M{})\r\n\tif err != nil {\r\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\r\n\t\tresponse.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\r\n\t\treturn\r\n\t}\r\n\tdefer cursor.Close(ctx)\r\n\tfor cursor.Next(ctx) {\r\n\t\tvar post Post\r\n\t\tcursor.Decode(&post)\r\n\t\tNewPosts = append(NewPosts, post)\r\n\t}\r\n\r\n\r\n\tif err := cursor.Err(); err != nil {\r\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\r\n\t\tresponse.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\r\n\t\treturn\r\n\t}\r\n\tjson.NewEncoder(response).Encode(NewPosts)\r\n}", "title": "" }, { "docid": "a82e1f05fd02564ca6917c7c8e97f1cb", "score": "0.67627835", "text": "func (h *Handler) ListPost(c *gin.Context) {\n\tuid, err := strconv.Atoi(c.Param(\"uid\"))\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, map[string]interface{}{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tposts := []Post{}\n\tif result := h.DB.Where(\"user_id = ?\", uid).Find(&posts); result.Error != nil {\n\t\tc.JSON(http.StatusInternalServerError, map[string]interface{}{\n\t\t\t\"error\": result.Error.Error(),\n\t\t})\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, posts)\n}", "title": "" }, { "docid": "a609f3e1e386d0b36ece8e5a509b67e4", "score": "0.676149", "text": "func getAllPosts(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"get all posts called!\")\n\t// json encode and send header application/json ?\n\tjson.NewEncoder(w).Encode(posts)\n}", "title": "" }, { "docid": "973f31115fe401e103337cfa9bd24d6d", "score": "0.6750825", "text": "func Get(tags []string, page, limit int) (*Posts, error) {\n\ttagsStr := url.QueryEscape(strings.Join(tags, \" \"))\n\tres, err := http.Get(fmt.Sprintf(rootUri, tagsStr, page, limit))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer res.Body.Close()\n\n\tvar posts Posts\n\terr = xml.NewDecoder(res.Body).Decode(&posts)\n\n\treturn &posts, err\n}", "title": "" }, { "docid": "879b91a359c0a49485bbd9593b4480ea", "score": "0.6745028", "text": "func GetPublishedPosts() []Post {\n\treturn getPosts(false)\n}", "title": "" }, { "docid": "d5e93aa14d895b006ec825f17087696f", "score": "0.6733808", "text": "func GetPost(c *gin.Context) {\n\t// parse object id from url path\n\tif !bson.IsObjectIdHex(c.Param(\"id\")) {\n\t\tc.JSON(http.StatusBadRequest, errRes{\n\t\t\tStatus: http.StatusBadRequest,\n\t\t\tMessage: \"Invaild id\",\n\t\t})\n\t\treturn\n\t}\n\n\toid := bson.ObjectIdHex(c.Param(\"id\"))\n\n\tposts, err := database.Posts(bson.M{\n\t\t\"_id\": oid,\n\t\t\"is_publish\": true,\n\t})\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\tStatus: http.StatusInternalServerError,\n\t\t\tMessage: \"Internal server error\",\n\t\t})\n\t\treturn\n\t}\n\n\tif len(posts) < 1 {\n\t\tc.JSON(http.StatusNotFound, errRes{\n\t\t\tStatus: http.StatusNotFound,\n\t\t\tMessage: \"No post found\",\n\t\t})\n\t\treturn\n\t}\n\n\tif posts[0].CategoryID != nil {\n\t\t// retrieve post's category\n\t\tcategories, err := database.Categories(bson.M{\n\t\t\t\"_id\": posts[0].CategoryID,\n\t\t})\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\t\tStatus: http.StatusInternalServerError,\n\t\t\t\tMessage: \"Internal server error\",\n\t\t\t})\n\t\t\treturn\n\t\t}\n\t\tif len(categories) > 0 {\n\t\t\tcategories[0].PostCount, err = database.PostCount(bson.M{\n\t\t\t\t\"category_id\": categories[0].ID,\n\t\t\t\t\"is_publish\": true,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\t\t\tStatus: http.StatusInternalServerError,\n\t\t\t\t\tMessage: \"Internal server error\",\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tposts[0].Category = &categories[0]\n\t\t}\n\t}\n\n\tif posts[0].UserID != nil {\n\t\t// retrieve post's owner\n\t\tuser, err := database.User(bson.M{\n\t\t\t\"_id\": posts[0].UserID,\n\t\t})\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\t\tStatus: http.StatusInternalServerError,\n\t\t\t\tMessage: \"Internal server error\",\n\t\t\t})\n\t\t\treturn\n\t\t}\n\t\tposts[0].User = &user\n\t}\n\n\tc.JSON(http.StatusOK, posts[0])\n}", "title": "" }, { "docid": "19a3c02d183cdacdd66a3b0773ad5b45", "score": "0.6702861", "text": "func (s *Client) GetPosts(topic string, parallel int, postCB PostLoadedCallback, errCB PostLoadingErrorCallback) ([]*Post, []error, error) {\n\tposts := make([]*Post, 0)\n\terrs := make([]error, 0)\n\tif s.Users == nil {\n\t\ts.Users = make(map[int64]*User)\n\t}\n\tloadPostsCh := make(chan *Post)\n\tloadedPostsCh, usersCh, errorsCh := s.detailsLoader(loadPostsCh, parallel)\n\tvar routinesWG sync.WaitGroup\n\troutinesWG.Add(3)\n\tgo func() {\n\t\tfor loadedPost := range loadedPostsCh {\n\t\t\tposts = append(posts, loadedPost)\n\t\t\tif postCB != nil {\n\t\t\t\tpostCB(loadedPost)\n\t\t\t}\n\t\t}\n\t\troutinesWG.Done()\n\t}()\n\tgo func() {\n\t\tfor loadErr := range errorsCh {\n\t\t\terrs = append(errs, loadErr)\n\t\t\tif errCB != nil {\n\t\t\t\terrCB(loadErr)\n\t\t\t}\n\t\t}\n\t\troutinesWG.Done()\n\t}()\n\tusersToLoad := make([]int64, 0)\n\tgo func() {\n\t\tfor userID := range usersCh {\n\t\t\tif _, ok := s.Users[userID]; !ok {\n\t\t\t\ts.Users[userID] = nil // we are loading it\n\t\t\t\tusersToLoad = append(usersToLoad, userID)\n\t\t\t}\n\t\t}\n\t\troutinesWG.Done()\n\t}()\n\turl := fmt.Sprintf(\"%s/api/v2/community/topics/%s/posts.json?sort_by=created_at\", s.BaseURL, topic)\n\tpage := 0\n\tvar fatalError error\n\tfor true {\n\t\tvar response postsResponse\n\t\terr := s.get(url, &response)\n\t\tif err != nil {\n\t\t\tfatalError = fmt.Errorf(\"error while getting page %d of posts: %w\", page, err)\n\t\t\tbreak\n\t\t}\n\t\tif response.Posts == nil && response.NextPage != \"\" {\n\t\t\tfatalError = fmt.Errorf(\"posts are not found on page %d while next page is present\", page)\n\t\t\tbreak\n\t\t}\n\t\tfor _, post := range response.Posts {\n\t\t\tpostVar := post\n\t\t\tloadPostsCh <- &postVar\n\t\t}\n\t\tif response.NextPage == \"\" {\n\t\t\tbreak\n\t\t}\n\t\turl = response.NextPage\n\t\tpage++\n\t}\n\tclose(loadPostsCh)\n\troutinesWG.Wait()\n\terr := s.loadUsers(usersToLoad)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\ts.setUsers(posts)\n\treturn posts, errs, fatalError\n}", "title": "" }, { "docid": "f28a70677d3f0ea767529a9230f4b600", "score": "0.6674158", "text": "func GetAllPosts(db *gorm.DB) model.Output {\n\tvar out model.Output\n\tout.Code = 200\n\tout.Data, out.Error = repo.AllPosts(db)\n\tif out.Error != \"\" {\n\t\tout.Code = 400\n\t}\n\treturn out\n}", "title": "" }, { "docid": "95232e8c16905162ac161b41cdb323d9", "score": "0.6645039", "text": "func (f Feed) Posts() (Posts, error) {\n\tpost := new(Post)\n\tvar results Posts\n\terr := db.Current.Find(post, bson.M{\"_id\": bson.M{\"$in\": f.visiblePostIds()}}).All(&results)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn results, nil\n}", "title": "" }, { "docid": "f3eb524c0f0eac995bc71e8921a7d60a", "score": "0.6631563", "text": "func listPosts(w http.ResponseWriter, r *http.Request) {\r\n\tvar allposts []Post\r\n\tparams := mux.Vars(r) // Gets params\r\n\tw.Header().Set(\"Content-Type\", \"application/json\")\r\n\tcollection := client.Database(\"Instagram\").Collection(\"posts\") //connecting to database\r\n\tctx, _ := context.WithTimeout(context.Background(), 30*time.Second)\r\n\tcursor, err := collection.Find(ctx, bson.M{})\r\n\tif err != nil {\r\n\t\tw.WriteHeader(http.StatusInternalServerError)\r\n\t\tw.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\r\n\t\treturn\r\n\t}\r\n\tdefer cursor.Close(ctx)\r\n\tfor cursor.Next(ctx) {\r\n\t\tvar photo Post\r\n\t\tcursor.Decode(&photo)\r\n\t\tif photo.ID == params[\"id\"] {\r\n\t\t\tallposts = append(allposts, photo)\r\n\t\t}\r\n\r\n\t}\r\n\tif err := cursor.Err(); err != nil {\r\n\t\tw.WriteHeader(http.StatusInternalServerError)\r\n\t\tw.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\r\n\t\treturn\r\n\t}\r\n\tjson.NewEncoder(w).Encode(allposts)\r\n\r\n}", "title": "" }, { "docid": "2cf20a9e8f3bff4fb19c0f922dbe5314", "score": "0.66267633", "text": "func (PostsAPI) List(c context.Context) (*Posts, error) {\n\tif err := checkReferer(c); err != nil {\n\t\treturn nil, err\n\t}\n\n\tposts := []Post{}\n\tkeys, err := datastore.NewQuery(\"Post\").GetAll(c, &posts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor i, k := range keys {\n\t\tposts[i].UID = k\n\t}\n\treturn &Posts{posts}, nil\n}", "title": "" }, { "docid": "cde825010e48e5fa3f9a05579f6bef2d", "score": "0.66245794", "text": "func (db *MongoDB) GetAllPosts() ([]*models.Post, error) {\n\n\tvar post *models.Post\n\tposts := []*models.Post{}\n\n\tcursor, err := db.DB.Collection(PostCollection).Find(context.Background(), bson.M{})\n\n\tif err != nil {\n\t\tlog.Printf(\"Error while getting all posts, Reason: %v\\n\", err)\n\n\t\treturn nil, err\n\t}\n\n\t// Iterate through the returned cursor.\n\tfor cursor.Next(context.Background()) {\n\t\tvar repoPost *repo.Post\n\t\tcursor.Decode(&repoPost)\n\t\tpost = utils.ParsePost(*repoPost)\n\t\tposts = append(posts, post)\n\t}\n\n\treturn posts, nil\n}", "title": "" }, { "docid": "7c67d24874fd7722c3fc98927479765c", "score": "0.6617617", "text": "func (p *PostController) List() {\n\tposts := models.AllPosts()\n\tlog.Infof(\"%v posts found\", len(posts))\n\tp.Reply().JSON(aah.Data{\n\t\t\"posts\": posts,\n\t})\n}", "title": "" }, { "docid": "a595eff31dd68f342dc5aceacbbd0ad8", "score": "0.65602463", "text": "func (m *Manager) ListPosts(discID string) ([]*Post, error) {\n\treturn m.selectPosts(\"SELECT * FROM posts WHERE discussion_id = ? ORDER BY created ASC\", discID)\n}", "title": "" }, { "docid": "2fadc21a9a19ef10c3001183e7af3db6", "score": "0.65537924", "text": "func (svc *postService) GetAll() (*models.Posts, *apperror.AppError) {\n\treturn svc.repo.GetAll()\n}", "title": "" }, { "docid": "350b7d9f31d40a0abfbf72effaf940c2", "score": "0.653121", "text": "func PostListGET(w http.ResponseWriter, r *http.Request) {\r\n\r\n\t// Get session\r\n\tvar params httprouter.Params\r\n\tparams = context.Get(r, \"params\").(httprouter.Params)\r\n\tsort := params.ByName(\"sort\")\r\n\thashtag := params.ByName(\"hashtag\")\r\n\tspageNum := params.ByName(\"page\")\r\n\tpageNum, _ := strconv.Atoi(spageNum)\r\n\r\n\tif pageNum == 0 {\r\n\t\tpageNum = 1\r\n\t}\r\n\r\n\tposts, err, isLastPage := model.PostsSearch(sort, pageNum, hashtag,\"\")\r\n\tif err != nil {\r\n\t\tlog.Println(err)\r\n\t\tposts = []model.Post{}\r\n\t}\r\n\r\n\t// Display the view\r\n\tv := view.New(r)\r\n\tv.Vars[\"posts\"] = posts\r\n\tv.Vars[\"pageNum\"] = pageNum\r\n\r\n\tv.Vars[\"nextPageURL\"] = \"\"\r\n\tv.Vars[\"previousPageURL\"] = \"\"\r\n\tv.Vars[\"nextPageURLForJson\"] = \"\"\r\n\tv.Vars[\"previousPageURLForJson\"] = \"\"\r\n\r\n\turlBase := stringhelpers.FastConcat([]string{\"/posts/\", sort, \"/\", hashtag, \"/\"})\r\n\r\n\tv.Vars[\"thisPageURL\"] = stringhelpers.FastConcat([]string{urlBase, strconv.Itoa(pageNum)})\r\n\tif(!isLastPage){\r\n\r\n\r\n\t\t//Next and previous page urls for infinite scroll SEO\r\n\r\n\r\n\t\tnextPage := pageNum + 1\r\n\t\tnext := strconv.Itoa(nextPage)\r\n\t\tv.Vars[\"nextPageURL\"] = stringhelpers.FastConcat([]string{urlBase, next})\r\n\t\tv.Vars[\"nextPageURLForJson\"] = stringhelpers.FastConcat([]string{v.Vars[\"nextPageURL\"].(string), \"?type=json\"})\r\n\t}\r\n\r\n\tpreviousPage := pageNum - 1\r\n\t\tif previousPage > 0 {\r\n\t\t\tprev := strconv.Itoa(previousPage)\r\n\t\t\tv.Vars[\"previousPageURL\"] = stringhelpers.FastConcat([]string{urlBase, prev})\r\n\t\t\tv.Vars[\"previousPageURLForJson\"] = stringhelpers.FastConcat([]string{v.Vars[\"previousPageURL\"].(string), \"?type=json\"})\r\n\t\t}\r\n\r\n\tif strings.ToLower(r.Header.Get(\"X-Requested-With\")) == \"xmlhttprequest\" {\r\n\t\t//AJAX Request\r\n\t\tv.Name = \"partial/posts\"\r\n\t\tresult := v.RenderSingle(w,true)\r\n\t\tfinalResult := JsonResult{\r\n\t\t\tResponse: result,\r\n\t\t\tNext_data_url: v.Vars[\"nextPageURLForJson\"].(string),\r\n\t\t\tPrev_data_url: v.Vars[\"previousPageURLForJson\"].(string),\r\n\t\t}\r\n\t\t//w.Header().Set(\"Content-Type\", \"application/json\")\r\n\r\n\t\tjson.NewEncoder(w).Encode(finalResult)\r\n\t} else {\r\n\r\n\t\tv.Name = \"post/list\"\r\n\t\tv.Vars[\"pagetitle\"] = stringhelpers.FastConcat([]string{localize.GetInstance().TranslateFunc(\"posts_\" + sort) , \" \" , hashtag})\r\n\r\n\t\tv.Render(w)\r\n\t}\r\n\r\n\r\n\r\n}", "title": "" }, { "docid": "bb9fa792fefd041ce1b015848fb7c59f", "score": "0.6531149", "text": "func GetCategoryPosts(c *gin.Context) {\n\t// parse object id from url path\n\tif !bson.IsObjectIdHex(c.Param(\"id\")) {\n\t\tc.JSON(http.StatusBadRequest, errRes{\n\t\t\tStatus: http.StatusBadRequest,\n\t\t\tMessage: \"Invaild id\",\n\t\t})\n\t\treturn\n\t}\n\toid := bson.ObjectIdHex(c.Param(\"id\"))\n\n\tcategories, err := database.Categories(bson.M{\n\t\t\"_id\": oid,\n\t})\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\tStatus: http.StatusInternalServerError,\n\t\t\tMessage: \"Internal server error\",\n\t\t})\n\t\treturn\n\t}\n\n\tif len(categories) < 1 {\n\t\tc.JSON(http.StatusNotFound, errRes{\n\t\t\tStatus: http.StatusNotFound,\n\t\t\tMessage: \"No category found\",\n\t\t})\n\t\treturn\n\t}\n\n\tcategories[0].PostCount, err = database.PostCount(bson.M{\n\t\t\"category_id\": oid,\n\t\t\"is_publish\": true,\n\t})\n\n\tposts, err := database.Posts(bson.M{\n\t\t\"category_id\": oid,\n\t\t\"is_publish\": true,\n\t})\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\tStatus: http.StatusInternalServerError,\n\t\t\tMessage: \"Internal server error\",\n\t\t})\n\t\treturn\n\t}\n\n\tfor i := range posts {\n\t\tposts[i].Category = &categories[0]\n\n\t\tif posts[i].UserID != nil {\n\t\t\t// retrieve user\n\t\t\tposts[i].User = new(structure.User)\n\t\t\t*posts[i].User, _ = database.User(bson.M{\n\t\t\t\t\"_id\": posts[i].UserID,\n\t\t\t})\n\t\t}\n\t}\n\n\tc.JSON(http.StatusOK, posts)\n}", "title": "" }, { "docid": "af1dbe512f28c8285064ea7b3cac0b47", "score": "0.6526684", "text": "func GetAll() []Post {\n\tsession := getDb()\n\tdefer session.Close()\n\n\tvar posts []Post\n\n\tc := session.DB(config.DbName).C(config.DbPosts)\n\titer := c.Find(nil).Iter()\n\terr := iter.All(&posts)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn posts\n}", "title": "" }, { "docid": "f9a20474467b6453759fcd3f31271579", "score": "0.65115714", "text": "func GetAll(w http.ResponseWriter, r *http.Request) {\n\tposts := postsRepository.GetAll()\n\thandler.RespondJSON(w, http.StatusOK, posts)\n}", "title": "" }, { "docid": "4c7f3e4906416c8b6e0af8872704d6e7", "score": "0.65021014", "text": "func GetAdminPosts(c *gin.Context) {\n\tidStr, ok := c.Get(\"user_id\")\n\tif !ok || !bson.IsObjectIdHex(idStr.(string)) {\n\t\tc.JSON(http.StatusUnauthorized, errRes{\n\t\t\tStatus: http.StatusUnauthorized,\n\t\t\tMessage: \"Invalid JWT token\",\n\t\t})\n\t\treturn\n\t}\n\tuserID := bson.ObjectIdHex(idStr.(string))\n\n\tposts, err := database.Posts(bson.M{\n\t\t\"$or\": []bson.M{\n\t\t\tbson.M{\n\t\t\t\t\"is_publish\": true,\n\t\t\t},\n\t\t\tbson.M{\n\t\t\t\t\"is_publish\": false,\n\t\t\t\t\"user_id\": userID,\n\t\t\t},\n\t\t},\n\t})\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\tStatus: http.StatusInternalServerError,\n\t\t\tMessage: \"Internal server error\",\n\t\t})\n\t\treturn\n\t}\n\n\tfor i := range posts {\n\t\tif posts[i].CategoryID != nil {\n\t\t\t// retrieve post's category\n\t\t\tcategories, err := database.Categories(bson.M{\n\t\t\t\t\"_id\": posts[i].CategoryID,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\t\t\tStatus: http.StatusInternalServerError,\n\t\t\t\t\tMessage: \"Internal server error\",\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif len(categories) > 0 {\n\t\t\t\tcategories[0].PostCount, err = database.PostCount(bson.M{\n\t\t\t\t\t\"$or\": []bson.M{\n\t\t\t\t\t\tbson.M{\n\t\t\t\t\t\t\t\"category_id\": categories[0].ID,\n\t\t\t\t\t\t\t\"is_publish\": true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\tbson.M{\n\t\t\t\t\t\t\t\"category_id\": categories[0].ID,\n\t\t\t\t\t\t\t\"is_publish\": false,\n\t\t\t\t\t\t\t\"user_id\": userID,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\t\t\t\tStatus: http.StatusInternalServerError,\n\t\t\t\t\t\tMessage: \"Internal server error\",\n\t\t\t\t\t})\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tposts[i].Category = &categories[0]\n\t\t\t}\n\t\t}\n\n\t\tif posts[i].UserID != nil {\n\t\t\t// retrieve post's owner\n\t\t\tuser, err := database.User(bson.M{\n\t\t\t\t\"_id\": posts[i].UserID,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\t\t\tStatus: http.StatusInternalServerError,\n\t\t\t\t\tMessage: \"Internal server error\",\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\t}\n\t\t\tposts[i].User = &user\n\t\t}\n\t}\n\n\tc.JSON(http.StatusOK, posts)\n}", "title": "" }, { "docid": "e5088f0f25217d6191158d867d737501", "score": "0.64295644", "text": "func (c *PostController) List(ctx *app.ListPostContext) error {\n\t// PostController_List: start_implement\n\n\t// Put your logic here\n\topts := stores.PostOptions{Status: ctx.Status}\n\tposts, err := stores.FindPosts(ctx.Limit, ctx.Offset, opts)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn ctx.InternalServerError()\n\t}\n\tcount, err := stores.CountPosts(opts)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn ctx.InternalServerError()\n\t}\n\n\tmaxPage := 1\n\tif count > 1 {\n\t\tmaxPage = (count-1)/ctx.Limit + 1\n\t}\n\n\tctx.ResponseData.Header().Set(\"X-Pagination-Limit\", fmt.Sprint(ctx.Limit))\n\tctx.ResponseData.Header().Set(\"X-Pagination-Total-Pages\", fmt.Sprint(maxPage))\n\tctx.ResponseData.Header().Set(\"X-Pagination-Current-Page\", fmt.Sprint(ctx.Offset/ctx.Limit+1))\n\n\treturn ctx.OK(posts)\n\t// PostController_List: end_implement\n}", "title": "" }, { "docid": "942376e514793764ac8b0a842d86b4aa", "score": "0.6427766", "text": "func Getusersposts(response http.ResponseWriter, request *http.Request) {\r\n\tresponse.Header().Set(\"content-type\", \"application/json\")\r\n\tparams := mux.Vars(request)\r\n\tAuth, _ := params[\"id\"]\r\n\tvar post []Post\r\n\tcollection := client.Database(\"instauserdatabase\").Collection(\"posts\")\r\n\tctx, _ := context.WithTimeout(context.Background(), 30*time.Second)\r\n\tcursor, err := collection.Find(ctx, Post{Authid: Auth})\r\n\tif err != nil {\r\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\r\n\t\tresponse.Write([]byte(`{ \"message\": \" + err.Error() + \" }`))\r\n\t\treturn\r\n\t}\r\n\tdefer cursor.Close(ctx)\r\n\tfor cursor.Next(ctx) {\r\n\t\tvar posts Post\r\n\t\tcursor.Decode(&posts)\r\n\t\tpost = append(post, posts)\r\n\t}\r\n\tif err := cursor.Err(); err != nil {\r\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\r\n\t\tresponse.Write([]byte(`{ \"message\": \" + err.Error() + \" }`))\r\n\t\treturn\r\n\t}\r\n\tjson.NewEncoder(response).Encode(post)\r\n}", "title": "" }, { "docid": "9a990ad284681f3ce77f25def340d071", "score": "0.64120054", "text": "func GetAllPosts(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"text/html; charset=utf-8\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t// get all the users in the db\n posts, err := getAllPosts()\n\n if err != nil {\n log.Fatalf(\"Unable to get all user. %v\", err)\n }\n\n // send all the users as response\n json.NewEncoder(w).Encode(posts)\n}", "title": "" }, { "docid": "686e360be6bda4eb01e3e3190ce0d3f2", "score": "0.63877034", "text": "func AllPosts() ([]Post, error) {\n\tposts := []Post{}\n\terr := config.Posts.Find(bson.M{}).All(&posts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treverse(posts)\n\n\treturn posts, nil\n}", "title": "" }, { "docid": "14bf4a51ac82fe02a413691cedd1333f", "score": "0.63679886", "text": "func PostsList(includeFuture bool, page int, perPage int, year int, month int, timeLocation *time.Location, staticPages bool) ([]*Post, error) {\n\tredisConn := redisPool.Get()\n\tdefer redisConn.Close()\n\n\tif page < 0 {\n\t\treturn nil, errors.New(\"page < 0\")\n\t}\n\n\tif perPage < 1 {\n\t\treturn nil, errors.New(\"perPage < 1\")\n\t}\n\n\tnow := int(time.Now().Unix())\n\n\tstart := int64(-1)\n\tend := int64(-1)\n\n\tif year != -1 && month != -1 {\n\t\tstart = time.Date(year, time.Month(month), 1, 0, 0, 0, 0, timeLocation).Unix()\n\t\tnextMonth := month + 1\n\t\tnextYear := year\n\t\tif nextMonth > 12 {\n\t\t\tnextMonth = 1\n\t\t\tnextYear++\n\t\t}\n\t\tend = time.Date(nextYear, time.Month(nextMonth), 1, 0, 0, 0, 0, timeLocation).Unix()\n\t}\n\n\tres, err := scriptPostList.Do(redisConn, now, includeFuture, start, end, page, perPage, staticPages)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbyteSlice, ok := res.([]byte)\n\tif !ok {\n\t\treturn nil, errors.New(\"can't cast response\")\n\t}\n\n\t// empty Lua array is returned as \"{}\"\n\t// we should convert it to \"[]\" (empty json array)\n\tif len(byteSlice) == 2 {\n\t\tbyteSlice = []byte(\"[]\")\n\t}\n\n\tvar posts []*Post\n\terr = json.Unmarshal(byteSlice, &posts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// All static pages are returned when calling scriptPostList,\n\t// not considering perPage argument.\n\t// It would be better to update the logic elsewhere, but\n\t// let's filter posts here for now:\n\tif staticPages {\n\t\tfrom := page * perPage\n\t\tto := (page + 1) * perPage\n\t\tif to > len(posts) {\n\t\t\tto = len(posts)\n\t\t}\n\t\tposts = posts[from:to]\n\t}\n\n\treturn posts, nil\n}", "title": "" }, { "docid": "8544dcf3025611ddfd33655d9854ec18", "score": "0.6353563", "text": "func (service *Service) AllPosts() []*entity.Post {\n\treturn service.postRepo.All()\n}", "title": "" }, { "docid": "d9c17692053011ffba98a64780950450", "score": "0.6351789", "text": "func GetAllPost() []Post {\n\tvar posts []Post\n\tcollection := mdb.FiberDB.Collection(TablePost)\n\tfilter := bson.D{}\n\tcur, err := collection.Find(context.Background(), filter)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tdefer cur.Close(context.Background())\n\tfor cur.Next(context.Background()) {\n\t\t// To decode into a struct, use cursor.Decode()\n\t\tvar post Post\n\t\terr := cur.Decode(&post)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\t// do something with result...\n\t\tposts = append(posts, post)\n\t}\n\tif err := cur.Err(); err != nil {\n\t\tlog.Println(err)\n\t}\n\treturn posts\n}", "title": "" }, { "docid": "63d04842c10aee1e5b1dcde8272eb6b1", "score": "0.63376594", "text": "func (service *BlogService) BlogPosts() (blogPosts *model.BlogPosts, err error) {\n\tposts := make(model.BlogPosts, 0)\n\n\trows, err := service.DB.Query(\"SELECT id, title, body FROM blog_post\")\n\n\tfor rows.Next() {\n\t\tblogPost := model.BlogPost{}\n\n\t\terr = rows.Scan(&blogPost.ID, &blogPost.Title, &blogPost.Body)\n\t\tposts = append(posts, blogPost)\n\t}\n\n\tblogPosts = &posts\n\n\treturn\n}", "title": "" }, { "docid": "82a53fd57c0bf1a1fae4a3f0f278229c", "score": "0.633622", "text": "func (e Endpoints) GetPost(ctx context.Context, must []*model.Query, should []*model.Query, not []*model.Query, filter []*model.Query, token string) (posts []model.Post, message string, status string, err error) {\n\trequest := GetPostRequest{\n\t\tFilter: filter,\n\t\tMust: must,\n\t\tNot: not,\n\t\tShould: should,\n\t\tToken: token,\n\t}\n\tresponse, err := e.GetPostEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn response.(GetPostResponse).Posts, response.(GetPostResponse).Message, response.(GetPostResponse).Status, response.(GetPostResponse).Err\n}", "title": "" }, { "docid": "c51684beb955825a8930651e56cd9979", "score": "0.63254184", "text": "func (s *PostService) SearchPosts(pattern string, by SortPostsBy, params PaginateParams) ([]*Post, error) {\n\tvar (\n\t\tmethod = http.MethodGet\n\t\tpath = fmt.Sprintf(\"/posts\")\n\t)\n\n\tqueries := url.Values{}\n\n\t// use params only if not default values\n\tif params.Limit != 0 || params.Offset != 0 {\n\t\tqueries.Set(\"limit\", strconv.FormatUint(uint64(params.Limit), 10))\n\t\tqueries.Set(\"offset\", strconv.FormatUint(uint64(params.Offset), 10))\n\t}\n\tif pattern != \"\" {\n\t\tqueries.Set(\"pattern\", url.QueryEscape(pattern))\n\t}\n\tif by != \"\" {\n\t\tvar qString string\n\t\tif params.SortOrder != \"\" {\n\t\t\tqString = fmt.Sprintf(\"%s_%s\", by, params.SortOrder)\n\t\t} else {\n\t\t\tqString = string(by)\n\t\t}\n\t\tqueries.Set(\"sort\", qString)\n\t}\n\n\treq := s.client.newRequest(path, method)\n\treq.URL.RawQuery = queries.Encode()\n\n\tjs, statusCode, err := s.client.do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tswitch js.Status {\n\tcase \"success\":\n\t\tbreak\n\tcase \"fail\":\n\t\tjF, ok := js.Data.(*jSendFailData)\n\t\tif !ok {\n\t\t\treturn nil, ErrRESTServerError\n\t\t}\n\t\ts.client.Logger.Printf(\"%+v\", jF)\n\t\tswitch statusCode {\n\t\tcase http.StatusBadRequest:\n\t\t\tswitch jF.ErrorReason {\n\t\t\tcase \"limit\":\n\t\t\t\tfallthrough\n\t\t\tcase \"offset\":\n\t\t\t\tfallthrough\n\t\t\tdefault:\n\t\t\t}\n\t\tdefault:\n\t\t\treturn nil, ErrRESTServerError\n\t\t}\n\tcase \"error\":\n\t\tfallthrough\n\tdefault:\n\t\treturn nil, ErrRESTServerError\n\t}\n\n\tposts := make([]*Post, 0)\n\tdata, ok := js.Data.(*json.RawMessage)\n\tif !ok {\n\t\treturn nil, ErrRESTServerError\n\t}\n\terr = json.Unmarshal(*data, &posts)\n\tif err != nil {\n\t\treturn nil, ErrRESTServerError\n\t}\n\treturn posts, nil\n}", "title": "" }, { "docid": "23866946f3e80af35ba389a4a1b91aab", "score": "0.6308701", "text": "func GetAll(filter bson.M, page int) ([]GetPostStruct, error) {\n\tsort := bson.D{{\"$sort\", bson.M{\"created_at\": -1}}}\n\tmatch := bson.D{{\"$match\", filter}}\n\townerLookup := bson.D{{\"$lookup\", bson.M{\n\t\t\"from\": \"users\",\n\t\t\"localField\": \"user_id\",\n\t\t\"foreignField\": \"_id\",\n\t\t\"as\": \"owner\",\n\t}}}\n\tprojectData := bson.D{{\"$project\", bson.M{\n\t\t\"_id\": 1,\n\t\t\"title\": 1,\n\t\t\"description\": 1,\n\t\t\"image_url\": 1,\n\t\t\"owner\": 1,\n\t\t\"comment_count\": bson.M{\n\t\t\t\"$size\": \"$comments_id\",\n\t\t},\n\t\t\"enquiry_count\": bson.M{\n\t\t\t\"$size\": \"$enquiry_id\",\n\t\t},\n\t\t\"likes\": 1,\n\t\t\"like_count\": bson.M{\n\t\t\t\"$size\": \"$likes\",\n\t\t},\n\t\t\"comments\": 1,\n\t\t\"status\": 1,\n\t\t\"created_at\": 1,\n\t\t\"updated_at\": 1,\n\t}}}\n\tunwrapOwner := bson.D{{\"$unwind\", \"$owner\"}}\n\tvar skip bson.D\n\tif page > 0 {\n\t\tskip = bson.D{{\"$skip\", (page * 20) - 20}}\n\t} else {\n\t\tskip = bson.D{{\"$skip\", 0}}\n\t}\n\n\tlimit := bson.D{{\"$limit\", 20}}\n\n\taggregateFilter := mongo.Pipeline{\n\t\tmatch,\n\t\tsort,\n\t\townerLookup,\n\t\tunwrapOwner,\n\t\tprojectData,\n\t\tskip,\n\t\tlimit,\n\t}\n\n\tcursor, err := collections.\n\t\tPost().\n\t\tAggregate(context.TODO(), aggregateFilter)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar posts []GetPostStruct\n\n\tfor cursor.Next(context.TODO()) {\n\t\tvar post GetPostStruct\n\t\terr := cursor.Decode(&post)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tposts = append(posts, post)\n\t}\n\n\treturn posts, nil\n}", "title": "" }, { "docid": "ad41871464581b58cf1a87f9414e58e6", "score": "0.6288469", "text": "func (db *DB) PublishedPosts(start int, end int) (*[]Post, error) {\n\ttotal := end - start\n\tp := new([]Post)\n\tsql := \"SELECT * FROM posts WHERE published = true OFFSET $1 LIMIT $2\"\n\terr := db.Get(p, sql, start, total)\n\treturn p, err\n}", "title": "" }, { "docid": "865102361c0df9b54e4433fcfbc3fa07", "score": "0.62812626", "text": "func PostGet(c *gin.Context) {\n\tpost, err := models.GetPost(c.Param(\"id\"))\n\tif err != nil || !post.Published {\n\t\tc.HTML(http.StatusNotFound, \"errors/404\", nil)\n\t\treturn\n\t}\n\th := helpers.DefaultH(c)\n\th[\"Title\"] = post.Name\n\th[\"Description\"] = template.HTML(string(blackfriday.MarkdownCommon([]byte(post.Description))))\n\th[\"Post\"] = post\n\th[\"Active\"] = fmt.Sprintf(\"posts/%d\", post.ID)\n\tc.HTML(http.StatusOK, \"posts/show\", h)\n}", "title": "" }, { "docid": "e062caa63d108260b5467d954f0a1a1a", "score": "0.6260499", "text": "func QuickGetPosts() []*Post {\n\tdb := QuickOpenDB()\n\tdefer db.Close()\n\n\tposts, err := GetPosts(db)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn posts\n}", "title": "" }, { "docid": "e9d6a670815b09133fb781bf3f209bb2", "score": "0.6232343", "text": "func getPostsByIds(c *Context, w http.ResponseWriter, r *http.Request) {\n\tpostIDs := model.ArrayFromJSON(r.Body)\n\n\tif len(postIDs) == 0 {\n\t\tc.SetInvalidParam(\"post_ids\")\n\t\treturn\n\t}\n\n\tif len(postIDs) > 1000 {\n\t\tc.Err = model.NewAppError(\"getPostsByIds\", \"api.post.posts_by_ids.invalid_body.request_error\", map[string]any{\"MaxLength\": 1000}, \"\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tpostsList, firstInaccessiblePostTime, err := c.App.GetPostsByIds(postIDs)\n\tif err != nil {\n\t\tc.Err = err\n\t\treturn\n\t}\n\n\tvar posts = []*model.Post{}\n\tchannelMap := make(map[string]*model.Channel)\n\n\tfor _, post := range postsList {\n\t\tvar channel *model.Channel\n\t\tif val, ok := channelMap[post.ChannelId]; ok {\n\t\t\tchannel = val\n\t\t} else {\n\t\t\tchannel, err = c.App.GetChannel(c.AppContext, post.ChannelId)\n\t\t\tif err != nil {\n\t\t\t\tc.Err = err\n\t\t\t\treturn\n\t\t\t}\n\t\t\tchannelMap[channel.Id] = channel\n\t\t}\n\n\t\tif !c.App.SessionHasPermissionToChannel(c.AppContext, *c.AppContext.Session(), channel.Id, model.PermissionReadChannel) {\n\t\t\tif channel.Type != model.ChannelTypeOpen || (channel.Type == model.ChannelTypeOpen && !c.App.SessionHasPermissionToTeam(*c.AppContext.Session(), channel.TeamId, model.PermissionReadPublicChannel)) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tpost = c.App.PreparePostForClient(c.AppContext, post, false, false)\n\t\tpost.StripActionIntegrations()\n\t\tposts = append(posts, post)\n\t}\n\n\tw.Header().Set(model.HeaderFirstInaccessiblePostTime, strconv.FormatInt(firstInaccessiblePostTime, 10))\n\n\tif err := json.NewEncoder(w).Encode(posts); err != nil {\n\t\tc.Logger.Warn(\"Error while writing response\", mlog.Err(err))\n\t}\n}", "title": "" }, { "docid": "cf627b98f73e193faedf413beb272e93", "score": "0.62208843", "text": "func GetDraftPosts() []Post {\n\treturn getPosts(true)\n}", "title": "" }, { "docid": "52db8ae138af788cd6ec6661dba9007f", "score": "0.62005395", "text": "func (pc PostController) GetPostsOfUser(w http.ResponseWriter, r *http.Request) {\n\tsplitPath := strings.Split(r.URL.Path, \"/\")\n\tid := splitPath[len(splitPath)-1]\n\tpq := r.URL.Query().Get(\"page\")\n\tif pq == \"\" {\n\t\tpq = \"1\"\n\t}\n\t// Get current page from URL query params\n\tpage, _ := strconv.Atoi(pq)\n\tvar perPage int64 = 5\n\n\toid, err := primitive.ObjectIDFromHex(id)\n\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\n\tfilters := bson.M{\"author\": oid}\n\toptions := options.Find()\n\t// Set options to limit and skip for pagination\n\toptions.SetLimit(perPage)\n\toptions.SetSkip((int64(page) - 1) * perPage)\n\n\tp := [](models.Post){}\n\n\terr = FindAll(pc.client.Database(\"InstagramCloneAPI\").Collection(\"posts\"), filters, options, &p)\n\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\n\t// Get total documents and total pages for pagination\n\tcount, _ := GetTotalCount(pc.client.Database(\"InstagramCloneAPI\").Collection(\"posts\"), filters)\n\ttotal_pages := math.Ceil(float64(count) / float64(perPage))\n\n\t// Include necessary information to provide pagination on client side.\n\trs := bson.M{\n\t\t\"result\": p,\n\t\t\"page\": page,\n\t\t\"total_count\": count,\n\t\t\"total_pages\": total_pages,\n\t\t\"has_next_page\": (page != int(total_pages)),\n\t}\n\n\tresult, err := json.Marshal(rs)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(result)\n}", "title": "" }, { "docid": "1e1b642aa06d148785c537c395826804", "score": "0.6190358", "text": "func GetPostEndpoint(response http.ResponseWriter, request *http.Request) {\r\n\tfmt.Println(\"Function Ran..\")\r\n\tresponse.Header().Set(\"content-type\", \"application/json\")\r\n\tvar post []Post\r\n\tcollection := client.Database(\"instauserdatabase\").Collection(\"posts\")\r\n\tctx, _ := context.WithTimeout(context.Background(), 30*time.Second)\r\n\tcursor, err := collection.Find(ctx, bson.M{})\r\n\tif err != nil {\r\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\r\n\t\tresponse.Write([]byte(`{ \"message\": \" + err.Error() + \" }`))\r\n\t\treturn\r\n\t}\r\n\tdefer cursor.Close(ctx)\r\n\tfor cursor.Next(ctx) {\r\n\t\tvar posts Post\r\n\t\tcursor.Decode(&posts)\r\n\t\tpost = append(post, posts)\r\n\t}\r\n\tif err := cursor.Err(); err != nil {\r\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\r\n\t\tresponse.Write([]byte(`{ \"message\": \" + err.Error() + \" }`))\r\n\t\treturn\r\n\t}\r\n\tjson.NewEncoder(response).Encode(post)\r\n}", "title": "" }, { "docid": "1fa46ba55cb6840b057f06a0ae71ef6b", "score": "0.61868477", "text": "func (a *Api) Posts(w http.ResponseWriter, r *http.Request) {\n\tvar err error\n\n\ta.logger.Printf(\"got request %s %s\", r.Method, r.URL.Path)\n\n\t// measure runtime\n\tstart := time.Now()\n\tdefer func() {\n\t\ta.logger.Printf(\"request took %s\", time.Now().Sub(start))\n\t}()\n\n\tif r.Method != http.MethodGet {\n\t\thttp.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed)\n\t\treturn\n\t}\n\n\tctxValue := context.WithValue(r.Context(), \"id\", 1)\n\n\tremotePosts, err := a.seaBackend.LoadPosts(ctxValue)\n\tif err != nil {\n\t\ta.logger.Printf(\"error loading seaBackend: %s\", err)\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// retrieve query parameter 'filterValue' from URL\n\tfilterValue := r.URL.Query().Get(\"filter\")\n\n\tresponsePosts := make([]Post, 0)\n\t// Create channel to pass remotePosts to be processed to loadUserFunc\n\tremotePostsChan := make(chan seabackend.RemotePost)\n\t// Create channel to pass responsePosts back from loadUserFunc\n\tresponsePostsChan := make(chan Post)\n\n\t// create function to enhance remotePosts with user data\n\tloadUserFunc := func(workerId int, wg *sync.WaitGroup) {\n\t\twg.Add(1)\n\t\tdefer wg.Done()\n\n\t\tfor remotePost := range remotePostsChan {\n\t\t\tuser, err := a.seaBackend.LoadUser(ctxValue, remotePost.UserID.String())\n\t\t\tif err != nil {\n\t\t\t\ta.logger.Printf(\"could not load user %s from backend\", remotePost.UserID)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tpost := Post{\n\t\t\t\tTitle: remotePost.Title,\n\t\t\t\tBody: remotePost.Body,\n\t\t\t\tUsername: user.Username,\n\t\t\t\tCompanyName: user.Company.Name,\n\t\t\t}\n\n\t\t\t// pass back post into responsePostChan\n\t\t\tresponsePostsChan <- post\n\t\t}\n\t\ta.logger.Printf(\"lodUserFunc %d stopped\", workerId)\n\t}\n\n\t// create waitGroup wg to keep track of go routines\n\twg := &sync.WaitGroup{}\n\n\t// create workerCount number of go routines processing loadUserFunc()\n\tfor i := 0; i < workerCount; i++ {\n\t\tgo loadUserFunc(i, wg)\n\t}\n\n\t// create a signaling channel transfering empty structs to determine, when processing of responsePosts ended\n\tresponsePostProcessingEndedChan := make(chan struct{})\n\n\t// create anonymous go routine to process responsePosts passed back from loadUserFunc()\n\tgo func() {\n\t\tfor post := range responsePostsChan {\n\t\t\tresponsePosts = append(responsePosts, post)\n\t\t}\n\t\t// put empty struct into responsePostProcessingEndedChan to indicate that responsePost processing ended\n\t\tresponsePostProcessingEndedChan <- struct{}{}\n\t\ta.logger.Print(\"append posts stopped\")\n\t}()\n\n\t// start processing remotePosts\n\tfor _, remotePost := range remotePosts {\n\t\t// if current remotePost dies not match the filter, skip it\n\t\tif !remotePost.Contains(filterValue, seabackend.FieldTitle) {\n\t\t\tcontinue\n\t\t}\n\t\t// put remotePost into remotePostChan as input for loadUserFunc()\n\t\tremotePostsChan <- remotePost\n\t}\n\t// close remotePostsChan to trigger stop of for loop in loadUserFunc() go routines\n\tclose(remotePostsChan)\n\n\t// wait for all go routines belonging to wg to end\n\twg.Wait()\n\n\t// close responsePostsChan after all loadUserFunc() go routines have stopped\n\tclose(responsePostsChan)\n\t// wait for empty struct in channel responsePostProcessingEndedChan indicating that\n\t// the go routine processing responsePosts ended\n\t<-responsePostProcessingEndedChan\n\n\tw.Header().Set(\"content-type\", \"application/json\")\n\n\t// encoder enc to convert our responsePosts slice to json\n\tenc := json.NewEncoder(w)\n\terr = enc.Encode(responsePosts)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "e813200e139775a529f396e1d90f359a", "score": "0.61758083", "text": "func Posts(limit int) (posts []Post, err error) {\n\trows, err := db.Query(SQL_ALL_POSTS, limit)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tpost, author, date := new(Post), new(User), new(mysql.NullTime)\n\t\terr = rows.Scan(&post.Slug, &post.Title, &post.Abstract, date, &author.Id, &author.Name)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tpost.Author = *author\n\t\tif date.Valid {\n\t\t\tpost.Date = date.Time\n\t\t}\n\n\t\tposts = append(posts, *post)\n\t}\n\n\terr = nil\n\treturn\n}", "title": "" }, { "docid": "97fb5612860be9b8b8f2d02014c11b61", "score": "0.61392474", "text": "func GetBlogs(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprintln(w, \"AddBlog\")\n}", "title": "" }, { "docid": "da53103574cfd6a3b4d65b93f0f46685", "score": "0.6137813", "text": "func (sc SearchClient) SearchPosts(query string, page int) ([]Post, error) {\n\tif page < 1 {\n\t\tpage = 1\n\t}\n\n\tendpoint := fmt.Sprintf(\"%s/search/posts\", sc.Client.BaseURL)\n\tqueryParams := sc.QueryParams()\n\tqueryParams.Add(\"q\", query)\n\n\tif page > 1 {\n\t\tqueryParams.Add(\"page\", strconv.Itoa(page))\n\t}\n\n\tvar posts SearchPostsResponse\n\tresponse, err := apiGet(endpoint, queryParams)\n\tif err != nil {\n\t\treturn []Post{}, err\n\t}\n\n\tjson.Unmarshal(response, &posts)\n\treturn posts.Posts, nil\n}", "title": "" }, { "docid": "4bed4764512f08c938ab51719dc48e1e", "score": "0.6128071", "text": "func (u *urlgen) Posts(start, limit int) string {\n\tvalues := url.Values{}\n\tvalues.Add(OFFSET_PARAM, fmt.Sprint(start))\n\tvalues.Add(LIMIT_PARAM, fmt.Sprint(limit))\n\treturn \"/rest/post?\" + values.Encode()\n}", "title": "" }, { "docid": "efb45db1da332e2a1cc3443d2619a71b", "score": "0.61117566", "text": "func (nc *NewsController) GetCategoriesPosts(c *gin.Context) {\n\tvar rtn map[string]interface{}\n\tvar ch = make(chan map[string]interface{})\n\tvar cats = map[string]string{\n\t\tglobals.HumanRightsAndSociety: configs.HumanRightsAndSocietyListID,\n\t\tglobals.EnvironmentAndEducation: configs.EnvironmentAndEducationListID,\n\t\tglobals.PoliticsAndEconomy: configs.PoliticsAndEconomyListID,\n\t\tglobals.CultureAndArt: configs.CultureAndArtListID,\n\t\tglobals.International: configs.InternationalListID,\n\t\tglobals.LivingAndMedicalCare: configs.LivingAndMedicalCareListID,\n\t}\n\n\tvar parts = make(map[string]IndexPageQueryStruct)\n\n\tfor name, ID := range cats {\n\t\tparts[name] = IndexPageQueryStruct{\n\t\t\tMongoQuery: models.MongoQuery{\n\t\t\t\tState: \"published\",\n\t\t\t\tCategories: models.MongoQueryComparison{\n\t\t\t\t\tIn: []bson.ObjectId{\n\t\t\t\t\t\tbson.ObjectIdHex(ID),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tLimit: 5,\n\t\t\tOffset: 0,\n\t\t\tSort: \"-publishedDate\",\n\t\t\tResourceType: \"posts\",\n\t\t}\n\t}\n\n\tgo func(parts map[string]IndexPageQueryStruct) {\n\t\tch <- nc._GetContentConcurrently(parts)\n\t}(parts)\n\tselect {\n\t// read the section content from channel\n\tcase rtn = <-ch:\n\tcase <-time.After(configs.TimeoutOfIndexPageController * time.Second):\n\t\tlog.Info(\"The requests for fetching sections index page needed timeouts\")\n\t}\n\n\tc.JSON(http.StatusOK, gin.H{\"status\": \"ok\", \"records\": rtn})\n}", "title": "" }, { "docid": "a0771d3d453053ab308192e4bb637000", "score": "0.61053216", "text": "func (l *Label) Posts() ([]Post, error) {\n\tvar posts []Post\n\n\tdb, err := openDatabase(&l.db)\n\tif err != nil {\n\t\treturn posts, err\n\t}\n\tdefer db.Close()\n\n\tstmt, err := db.Prepare(findPostsByLabelId)\n\tif err != nil {\n\t\treturn posts, err\n\t}\n\tdefer stmt.Close()\n\n\trows, err := stmt.Query(l.Id())\n\tif err != nil {\n\t\treturn posts, err\n\t}\n\n\tfor rows.Next() {\n\t\tvar id int64\n\t\tvar authorId int64\n\t\tvar title string\n\t\tvar content string\n\t\tvar imageURL string\n\t\tvar date time.Time\n\t\terr := rows.Scan(&id, &authorId, &title, &content, &imageURL, &date)\n\t\tif err != nil {\n\t\t\treturn posts, err\n\t\t}\n\t\tp := Post{\n\t\t\tid: id,\n\t\t\tauthorId: authorId,\n\t\t\ttitle: title,\n\t\t\tcontent: content,\n\t\t\timageURL: imageURL,\n\t\t\tdate: date,\n\t\t\tdb: l.db,\n\t\t}\n\t\tposts = append(posts, p)\n\t}\n\n\treturn posts, nil\n}", "title": "" }, { "docid": "911cf90493d0096f1a9ebd5d46341af5", "score": "0.60907525", "text": "func (t *Thread) Posts() (posts []Post, err error) {\n\tquery := `\n\t\tSELECT\n\t\t\tid, uuid, body, user_id, thread_id, created_at\n\t\tFROM\n\t\t\tposts\n\t\tWHERE\n\t\t\tthread_id = $1\n\t`\n\trows, err := Db.Query(query, t.ID)\n\tdefer rows.Close()\n\tif err != nil {\n\t\treturn\n\t}\n\tfor rows.Next() {\n\t\tvar p Post\n\t\terr = rows.Scan(\n\t\t\t&p.ID, &p.UUID, &p.Body, &p.UserID, &p.ThreadID, &p.CreatedAt,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tposts = append(posts, p)\n\t}\n\treturn\n}", "title": "" }, { "docid": "31a0d5348939047ab0e2d80ed99f25e8", "score": "0.6073396", "text": "func (p PostPersistence) GetAll() ([]model.Post, int, error) {\n\tdb := db.DbManager()\n\n\tvar (\n\t\tposts []model.Post\n\t\tcount int\n\t)\n\n\tif err := db.Find(&posts).Error; err != nil {\n\t\treturn posts, 0, err\n\t}\n\n\tdb.Model(&posts).Count(&count)\n\n\treturn posts, count, nil\n}", "title": "" }, { "docid": "bd23a70d0df023abadabc1a069152049", "score": "0.60672253", "text": "func GetUserPosts(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content- Type\", \"application/json\")\n\n\tvar getuser models.User\n\tparams := mux.Vars(r)\n\tuserposts := []models.PostComplete{}\n\tvar post []models.Posts\n\tpostimage := []models.PostImage{}\n\tdbs.DB.Model(&getuser).Where(\"username=?\", params[\"username\"]).First(&getuser)\n\n\tdbs.DB.Model(&post).Where(\"user_id=?\", getuser.ID).Find(&post)\n\n\tfor _, v := range post {\n\t\tdbs.DB.Model(&postimage).Where(\"posts_id=?\", v.ID).Find(&postimage)\n\n\t\tvar temp models.PostComplete\n\t\ttemp.Postmodel = v\n\t\ttemp.Imagemodel = postimage\n\t\tuserposts = append(userposts, temp)\n\t}\n\tjson.NewEncoder(w).Encode(userposts)\n\n}", "title": "" }, { "docid": "e63518b7291ceecd6169514817762151", "score": "0.60560393", "text": "func (c *Client) GetUserPosts(username string) []*Post {\n\tks := \"publish = :publish and created > :created\"\n\tfs := \"username = :username\"\n\tvals := map[string]interface{}{\n\t\t\":publish\": 1,\n\t\t\":created\": 0,\n\t\t\":username\": username,\n\t}\n\n\tout, err := c.Query(\"publish_index\", ks, fs, vals, false, 0)\n\tif err != nil || len(out.Items) == 0 {\n\t\treturn nil\n\t}\n\n\tvar posts []*Post\n\t_ = dynamodbattribute.UnmarshalListOfMaps(out.Items, &posts)\n\treturn posts\n}", "title": "" }, { "docid": "e8009df877711dbbb7781a6f26cb1883", "score": "0.60428935", "text": "func (s *postService) SearchPosts(query string, language string, page int) []*post.Post {\n\treturn nil\n}", "title": "" }, { "docid": "8394442df789724a847051278ba45d2d", "score": "0.6039214", "text": "func getPost(w http.ResponseWriter, r *http.Request) {\r\n\tw.Header().Set(\"Content-Type\", \"application/json\")\r\n\tparams := mux.Vars(r) // Gets params\r\n\tcollection := client.Database(\"Instagram\").Collection(\"posts\") //connecting to database\r\n\tctx, _ := context.WithTimeout(context.Background(), 30*time.Second)\r\n\tcursor, err := collection.Find(ctx, bson.M{})\r\n\tif err != nil {\r\n\t\tw.WriteHeader(http.StatusInternalServerError)\r\n\t\tw.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\r\n\t\treturn\r\n\t}\r\n\tdefer cursor.Close(ctx)\r\n\tfor cursor.Next(ctx) {\r\n\t\tvar photo Post\r\n\t\tcursor.Decode(&photo)\r\n\t\tposts = append(posts, photo)\r\n\t}\r\n\tif err := cursor.Err(); err != nil {\r\n\t\tw.WriteHeader(http.StatusInternalServerError)\r\n\t\tw.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\r\n\t\treturn\r\n\t}\r\n\tfor _, item := range posts {\r\n\t\tif item.ID == params[\"id\"] {\r\n\t\t\tjson.NewEncoder(w).Encode(item)\r\n\t\t\treturn\r\n\t\t}\r\n\t}\r\n\tjson.NewEncoder(w).Encode(&Post{})\r\n\r\n}", "title": "" }, { "docid": "2c48bc18c9f279493327b85f3b4a729c", "score": "0.6014982", "text": "func GetPostListByCate(limit, offset int, CateId int32) ([]Post, int64, error) {\n\tdatas := make([]Post, 0)\n\ttotal, err := global.Store.Count(&Post{})\n\terr = global.Store.Where(\" status = 3 and is_public = true and id in (select post_id from \"+PostCate{}.TableName()+\" where cate_id = ? ) \", CateId).OrderBy(\"create_time desc\").Limit(limit, offset).Find(&datas)\n\treturn datas, total, err\n}", "title": "" }, { "docid": "67fd047f1df917aac7d20994001fbb4a", "score": "0.6012098", "text": "func (site *Site) FindPublishedPosts() *PostsList {\n\treturn site.FindPosts(0, 0, true)\n}", "title": "" }, { "docid": "a6935a1fb7e3e476a6970ba2cc50eafd", "score": "0.59611475", "text": "func (repository *DiscussionQueryRepositoryCircuitBreaker) SelectPosts() ([]entity.Post, error) {\n\toutput := make(chan []entity.Post, 1)\n\thystrix.ConfigureCommand(\"select_post\", config.Settings())\n\terrors := hystrix.Go(\"select_post\", func() error {\n\t\tposts, err := repository.DiscussionQueryRepositoryInterface.SelectPosts()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\toutput <- posts\n\t\treturn nil\n\t}, nil)\n\n\tselect {\n\tcase out := <-output:\n\t\treturn out, nil\n\tcase err := <-errors:\n\t\treturn []entity.Post{}, err\n\t}\n}", "title": "" }, { "docid": "f367e5875a3a5c2f70bfb8ca6cd78f61", "score": "0.5954565", "text": "func getPosts(isDraft bool) []Post {\n\tvar posts []Post\n\tfileInfos, err := ioutil.ReadDir(MarkdownPath)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tfor _, info := range fileInfos {\n\t\tif !info.IsDir() && strings.HasSuffix(info.Name(), \".md\") {\n\t\t\tpost, err := NewPostFromFile(info)\n\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\n\t\t\tif post.Draft() == isDraft {\n\t\t\t\tposts = append(posts, post)\n\t\t\t}\n\t\t}\n\t}\n\n\tsort.Sort(PostsByDate(posts))\n\treturn posts\n}", "title": "" }, { "docid": "13ad909b3dcc4a13e162e79e0b6cb94f", "score": "0.5938553", "text": "func (k Keeper) GetPostsFiltered(ctx sdk.Context, params types.QueryPostsParams) []types.Post {\n\tvar filteredPosts []types.Post\n\tk.IteratePosts(ctx, func(_ int64, post types.Post) (stop bool) {\n\t\tmatchParentID, matchCreationTime, matchSubspace, matchCreator, matchHashtags := true, true, true, true, true\n\n\t\t// match parent id if valid\n\t\tif types.IsValidPostID(params.ParentId) {\n\t\t\tmatchParentID = params.ParentId == post.ParentId\n\t\t}\n\n\t\t// match creation time if valid height\n\t\tif params.CreationTime != nil {\n\t\t\tmatchCreationTime = params.CreationTime.Equal(post.Created)\n\t\t}\n\n\t\t// match subspace if provided\n\t\tif strings.TrimSpace(params.Subspace) != \"\" {\n\t\t\tmatchSubspace = params.Subspace == post.Subspace\n\t\t}\n\n\t\t// match creator address (if supplied)\n\t\tif strings.TrimSpace(params.Creator) != \"\" {\n\t\t\tmatchCreator = params.Creator == post.Creator\n\t\t}\n\n\t\t// match hashtags if provided\n\t\tif params.Hashtags != nil {\n\t\t\tpostHashtags := post.GetPostHashtags()\n\t\t\tmatchHashtags = len(postHashtags) == len(params.Hashtags)\n\t\t\tsort.Strings(postHashtags)\n\t\t\tsort.Strings(params.Hashtags)\n\t\t\tfor index := 0; index < len(params.Hashtags) && matchHashtags; index++ {\n\t\t\t\tmatchHashtags = postHashtags[index] == params.Hashtags[index]\n\t\t\t}\n\t\t}\n\n\t\tif matchParentID && matchCreationTime && matchSubspace && matchCreator && matchHashtags {\n\t\t\tfilteredPosts = append(filteredPosts, post)\n\t\t}\n\n\t\treturn false\n\t})\n\n\t// Sort the posts\n\tsort.Slice(filteredPosts, func(i, j int) bool {\n\t\tvar result bool\n\t\tfirst, second := filteredPosts[i], filteredPosts[j]\n\n\t\tswitch params.SortBy {\n\t\tcase types.PostSortByCreationDate:\n\t\t\tresult = first.Created.Before(second.Created)\n\t\t\tif params.SortOrder == types.PostSortOrderDescending {\n\t\t\t\tresult = first.Created.After(second.Created)\n\t\t\t}\n\n\t\tdefault:\n\t\t\tresult = first.PostId < second.PostId\n\t\t\tif params.SortOrder == types.PostSortOrderDescending {\n\t\t\t\tresult = first.PostId > second.PostId\n\t\t\t}\n\t\t}\n\n\t\t// This should never be reached\n\t\treturn result\n\t})\n\n\t// Default page\n\tpage := params.Page\n\tif page == 0 {\n\t\tpage = 1\n\t}\n\n\tstart, end := client.Paginate(len(filteredPosts), int(page), int(params.Limit), 100)\n\tif start < 0 || end < 0 {\n\t\tfilteredPosts = []types.Post{}\n\t} else {\n\t\tfilteredPosts = filteredPosts[start:end]\n\t}\n\n\treturn filteredPosts\n}", "title": "" }, { "docid": "75acb58ee4c49f4991f6894c6b4d8f8d", "score": "0.5927364", "text": "func getPosts(cPost chan Post) {\r\n\tresp, _ := http.Get(\"https://jsonplaceholder.typicode.com/posts\")\r\n\tbody, _ := ioutil.ReadAll(resp.Body)\r\n\tdefer resp.Body.Close()\r\n\r\n\tvar posts Posts\r\n\tjson.Unmarshal(body, &posts)\r\n\tfor _, post := range posts {\r\n\t\tif post.Body != \"\" {\r\n\t\t\tc := make(chan Post)\r\n\t\t\tgo post.savePost(c)\r\n\t\t\tdata := <-c\r\n\t\t\tcPost <- data\r\n\t\t} else {\r\n\t\t\tfmt.Println(\"Fatal Error - Data not found in body \" + strconv.FormatInt(post.UserID, 10) + \"_\" + strconv.FormatInt(post.ID, 10))\r\n\t\t}\r\n\t}\r\n\tclose(cPost)\r\n}", "title": "" }, { "docid": "8f099c75c54e64103498ea38d9c5246e", "score": "0.5921194", "text": "func (s *Server) allPosts() hr.Handle {\n\treturn func(w http.ResponseWriter, r *http.Request, _ hr.Params) {\n\n\t\tctx := r.Context()\n\n\t\t//set limit of 10 results\n\t\tlimit := 10\n\n\t\t//default prevDate is now to start at most recent result.\n\t\tprevDate := time.Now().UTC().Format(time.RFC3339)\n\n\t\t//if previous date is in the query then update prevDate to get results from that point in time back.\n\t\tprevDateQuery, ok := r.URL.Query()[\"prev\"]\n\n\t\tif ok && len(prevDateQuery[0]) >= 1 && strings.TrimSpace(prevDateQuery[0]) != \"\" {\n\t\t\tprevDate = prevDateQuery[0]\n\t\t}\n\n\t\t////create a postsCh to communicate results and an error channe to communicate errors\n\t\tpostsCh := make(chan []*models.Post)\n\t\terrCh := make(chan error)\n\n\t\t//send a separate goroutine to search the database.\n\t\tgo func() {\n\n\t\t\t//check if the request context is cancelled by the time we get to here.\n\t\t\tif ctx.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t//call the database\n\t\t\tposts, err := s.DB.AllPosts(prevDate, limit)\n\n\t\t\t//check if the request context is cancelled by the time we're done searching the database.\n\t\t\tif ctx.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t//if the database search returns an error then send an error back on the error channel.\n\t\t\tif err != nil {\n\t\t\t\terrCh <- err\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t//if the database search returns post results successfully then send the results back on the post channel.\n\t\t\tpostsCh <- posts\n\t\t\treturn\n\n\t\t}()\n\n\t\t//listen for three options in our program:\n\t\tselect {\n\t\t//1. the context was cancelled.\n\t\tcase <-ctx.Done():\n\t\t\ts.Log.Errorln(ctx.Err())\n\t\t\thttp.Error(w, \"We could not process your request at this time. Please try again later.\", http.StatusRequestTimeout)\n\t\t\treturn\n\t\t//2. there was an error searching the database.\n\t\tcase err := <-errCh:\n\t\t\ts.Log.Errorln(err)\n\t\t\thttp.Error(w, http.StatusText(500), http.StatusInternalServerError)\n\t\t\treturn\n\t\t//3. success\n\t\tcase posts := <-postsCh:\n\t\t\t//send the results as JSON data to the client\n\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\terr = json.NewEncoder(w).Encode(posts)\n\t\t\tif err != nil {\n\t\t\t\ts.Log.Errorln(err)\n\t\t\t\thttp.Error(w, http.StatusText(500), http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "15604347a8d73426ba85166d553fa6a5", "score": "0.5911121", "text": "func (site *Site) FindAllPosts() *PostsList {\n\treturn site.FindPosts(0, 0, false)\n}", "title": "" }, { "docid": "9599a8c14810eb6bee69119c693070fc", "score": "0.5909816", "text": "func GetRecentPosts() (Posts []Post, Error error) {\n\tError = DB.Select(&Posts, \"SELECT * FROM posts ORDER BY created DESC LIMIT 50\")\n\treturn\n}", "title": "" }, { "docid": "17b433ea7a00657f0a37bda38307df9a", "score": "0.58827454", "text": "func getposts(db *bolt.DB, min int, max int) ([]Post) {\n\n posts := []Post{}\n post := Post{}\n\n for i := max; i >= min; i-- {\n b, e := rdb(db, i, pbuc)\n json.Unmarshal(b, &post)\n cherr(e)\n posts = append(posts, post)\n }\n\n return posts\n}", "title": "" }, { "docid": "f375d4a27f3ff01f13dcbec62667243a", "score": "0.5871848", "text": "func GetRecentPosts(n int, getContent bool, domain string) []Info {\n\tvar posts = make([]Info, n)\n\tcount := 0\n\tfor i := len(pages) - 1; i >= 0; i-- {\n\t\tp := pages[i]\n\t\tif p.Status == Published && p.Template == \"post\" {\n\t\t\tif getContent {\n\t\t\t\tp.Content = LoadContent(domain, p.ID, p.Format)\n\t\t\t}\n\t\t\tposts[count] = p\n\t\t\tcount++\n\t\t\tif count == n {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\treturn posts\n}", "title": "" }, { "docid": "8f955a1dbe25af7076f49bea40be7430", "score": "0.5861935", "text": "func (r *Reddit) GetNPosts(subreddit string, count int) []models.Meme {\n\n\turl := GetSubredditAPIURL(subreddit, count)\n\n\tbody, statusCode := r.MakeGetRequest(url)\n\n\t// Check if the access Token has been expired\n\tif statusCode == 401 {\n\t\t// Get new access token\n\t\tr.GetNewAccessToken()\n\n\t\t// Make request Again\n\t\tbody, _ = r.MakeGetRequest(url)\n\t}\n\n\tvar redditResponse reddit.Response\n\n\tif err := json.Unmarshal(body, &redditResponse); err != nil {\n\t\tlog.Println(\"Error while Parsing Reddit Response\")\n\t\treturn nil\n\t}\n\n\tvar memes []models.Meme\n\n\tfor _, post := range redditResponse.Data.Children {\n\t\tmeme := models.Meme{\n\t\t\tTitle: post.Data.Title,\n\t\t\tPostLink: post.Data.GetShortLink(),\n\t\t\tSubReddit: post.Data.Subreddit,\n\t\t\tURL: post.Data.URL,\n\t\t}\n\n\t\tmemes = append(memes, meme)\n\t}\n\n\treturn memes\n}", "title": "" }, { "docid": "6784e392d9e38dbb11dbc64738667a52", "score": "0.58511966", "text": "func GetPost(id int) (*microblog.Post, error) {\n\tfor _, post := range Posts {\n\t\tif post.ID == id {\n\t\t\treturn post, nil\n\t\t}\n\t}\n\treturn nil, fmt.Errorf(\"Post (id: %v) not found\", id)\n}", "title": "" }, { "docid": "0edabfe607798ae0177c5e8a688fc13f", "score": "0.58456606", "text": "func GetVotablePosts(c *gin.Context) {\n\troll, err := utils.GetSessionID(c)\n\tif err != nil {\n\t\tc.String(http.StatusForbidden, \"You are not authorized to use this API.\")\n\t\treturn\n\t}\n\n\tvotablePosts := GetPostsForVoter(roll)\n\tc.JSON(http.StatusOK, votablePosts)\n}", "title": "" }, { "docid": "fd9d063f8761d2946b5bc5dfa73cd117", "score": "0.58440566", "text": "func PostIndex(c *gin.Context) {\n\tlist, err := models.GetPosts()\n\tif err != nil {\n\t\tc.HTML(http.StatusInternalServerError, \"errors/500\", nil)\n\t\tlogrus.Error(err)\n\t\treturn\n\t}\n\th := helpers.DefaultH(c)\n\th[\"Title\"] = \"List of blog posts\"\n\th[\"List\"] = list\n\th[\"Active\"] = \"posts\"\n\tc.HTML(http.StatusOK, \"posts/index\", h)\n}", "title": "" }, { "docid": "ef0037d786c057a6b38eb6cd7d30ac40", "score": "0.5837836", "text": "func SearchPosts(w http.ResponseWriter, r *http.Request) {\n\tuserID, err := utils.ExtractUserID(r)\n\tif err != nil {\n\t\tresponses.ReturnError(w, http.StatusUnauthorized, err)\n\t\treturn\n\t}\n\n\tdb, err := db.Connect()\n\tif err != nil {\n\t\tresponses.ReturnError(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\tdefer db.Close()\n\n\tpostRepository := repositories.NewPostsRepository(db)\n\tposts, err := postRepository.Search(userID)\n\tif err != nil {\n\t\tresponses.ReturnError(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tresponses.ReturnJSON(w, http.StatusOK, posts)\n}", "title": "" }, { "docid": "453ac82064151c47346eccfd1ca49900", "score": "0.58336735", "text": "func GetUserPosts(response http.ResponseWriter, request *http.Request) {\n\tresponse.Header().Set(\"content-type\", \"application/json\")\n\tvar userpost []Post\n\tparams := mux.Vars(request)\n\tuserid, _ := primitive.ObjectIDFromHex(params[\"id\"])\n\tcollection := client.Database(\"instagram\").Collection(\"people\")\n\tctx, _ := context.WithTimeout(context.Background(), 30*time.Second)\n\tcursor, err := collection.Find(ctx, bson.D{{\"id\", userid}})\n\tif err != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tresponse.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\n\t\treturn\n\t}\n\tdefer cursor.Close(ctx)\n\tfor cursor.Next(ctx) {\n\t\tvar post Post\n\t\tcursor.Decode(&post)\n\t\tuserpost = append(userpost, post)\n\t}\n\tif err := cursor.Err(); err != nil {\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\n\t\tresponse.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\n\t\treturn\n\t}\n\tjson.NewEncoder(response).Encode(userpost)\n}", "title": "" }, { "docid": "717e7512690428c686fb7c1d6f895a55", "score": "0.58295965", "text": "func (h *Handler) GetPost(c *gin.Context) {\n\tuid, err := strconv.Atoi(c.Param(\"uid\"))\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, map[string]interface{}{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tpid, err := strconv.Atoi(c.Param(\"pid\"))\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, map[string]interface{}{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tpost := Post{}\n\tif result := h.DB.Where(\"user_id = ? and id = ?\", uid, pid).First(&post); result.Error != nil {\n\t\tif errors.Is(result.Error, gorm.ErrRecordNotFound) {\n\t\t\tc.JSON(http.StatusNotFound, map[string]interface{}{\n\t\t\t\t\"error\": result.Error.Error(),\n\t\t\t})\n\t\t\treturn\n\t\t}\n\t\tc.JSON(http.StatusInternalServerError, map[string]interface{}{\n\t\t\t\"error\": result.Error.Error(),\n\t\t})\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, post)\n}", "title": "" }, { "docid": "7e30dbd344dde64ea10bffc39496ca64", "score": "0.5825369", "text": "func GetAdminCategoryPosts(c *gin.Context) {\n\t// parse object id from url path\n\tif !bson.IsObjectIdHex(c.Param(\"id\")) {\n\t\tc.JSON(http.StatusBadRequest, errRes{\n\t\t\tStatus: http.StatusBadRequest,\n\t\t\tMessage: \"Invaild id\",\n\t\t})\n\t\treturn\n\t}\n\toid := bson.ObjectIdHex(c.Param(\"id\"))\n\n\t// get user id\n\tidStr, ok := c.Get(\"user_id\")\n\tif !ok || !bson.IsObjectIdHex(idStr.(string)) {\n\t\tc.JSON(http.StatusUnauthorized, errRes{\n\t\t\tStatus: http.StatusUnauthorized,\n\t\t\tMessage: \"Invalid JWT token\",\n\t\t})\n\t\treturn\n\t}\n\tuserID := bson.ObjectIdHex(idStr.(string))\n\n\tcategories, err := database.Categories(bson.M{\n\t\t\"_id\": oid,\n\t})\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\tStatus: http.StatusInternalServerError,\n\t\t\tMessage: \"Internal server error\",\n\t\t})\n\t\treturn\n\t}\n\n\tif len(categories) < 1 {\n\t\tc.JSON(http.StatusNotFound, errRes{\n\t\t\tStatus: http.StatusNotFound,\n\t\t\tMessage: \"No category found\",\n\t\t})\n\t\treturn\n\t}\n\n\tcategories[0].PostCount, err = database.PostCount(bson.M{\n\t\t\"$or\": []bson.M{\n\t\t\tbson.M{\n\t\t\t\t\"category_id\": oid,\n\t\t\t\t\"is_publish\": true,\n\t\t\t},\n\t\t\tbson.M{\n\t\t\t\t\"category_id\": oid,\n\t\t\t\t\"is_publish\": false,\n\t\t\t\t\"user_id\": userID,\n\t\t\t},\n\t\t},\n\t})\n\n\tposts, err := database.Posts(bson.M{\n\t\t\"$or\": []bson.M{\n\t\t\tbson.M{\n\t\t\t\t\"category_id\": oid,\n\t\t\t\t\"is_publish\": true,\n\t\t\t},\n\t\t\tbson.M{\n\t\t\t\t\"category_id\": oid,\n\t\t\t\t\"is_publish\": false,\n\t\t\t\t\"user_id\": userID,\n\t\t\t},\n\t\t},\n\t})\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, errRes{\n\t\t\tStatus: http.StatusInternalServerError,\n\t\t\tMessage: \"Internal server error\",\n\t\t})\n\t\treturn\n\t}\n\n\tfor i := range posts {\n\t\tposts[i].Category = &categories[0]\n\n\t\tif posts[i].UserID != nil {\n\t\t\tposts[i].User = new(structure.User)\n\t\t\t*posts[i].User, _ = database.User(bson.M{\n\t\t\t\t\"_id\": posts[i].UserID,\n\t\t\t})\n\t\t}\n\t}\n\n\tc.JSON(http.StatusOK, posts)\n}", "title": "" }, { "docid": "840f6fe2e15a670754018999d344825c", "score": "0.58242375", "text": "func (p *Post) GetAllContents()(blogPosts []Post, err error) {\n\trows, err := db.Query(`SELECT ID,Title,Body,Author,CreatedAt,LastUpdate FROM posts`)\n\tif err != nil{\n\t\treturn\n\t}\n\tfor rows.Next(){\n\t\tbp := Post{}\n\t\terr = rows.Scan(&p.ID, p.Author, p.Title, p.Body, p.Author, p.CreatedAt, p.LastUpdate)\n\t\tif err != nil{\n\t\t\treturn\n\t\t}\n\t\tblogPosts = append(blogPosts,bp)\n\t}\n\trows.Close()\n\treturn\n\n}", "title": "" }, { "docid": "ddfbb1388e10b88e0ee2f7156da870e6", "score": "0.58146536", "text": "func (a *PostsApiService) FetchPosts(ctx _context.Context) ApiFetchPostsRequest {\n\treturn ApiFetchPostsRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "7b96a23868f422347d4a91f57c210724", "score": "0.5790812", "text": "func GetPost(response http.ResponseWriter, request *http.Request) {\r\n\tresponse.Header().Set(\"content-type\", \"application/json\")\r\n\tparams := mux.Vars(request)\r\n\tid, _ := primitive.ObjectIDFromHex(params[\"id\"])\r\n\tvar post Posts\r\n\tcollection := client.Database(\"AppointyDB\").Collection(\"post\")\r\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\r\n\terr := collection.FindOne(ctx, Posts{ID: id}).Decode(&post)\r\n\tif err != nil {\r\n\t\tresponse.WriteHeader(http.StatusInternalServerError)\r\n\t\tresponse.Write([]byte(`{ \"message\": \"` + err.Error() + `\" }`))\r\n\t\treturn\r\n\t}\r\n\tjson.NewEncoder(response).Encode(post)\r\n}", "title": "" }, { "docid": "b24b4ce3482070a6616d786b216cf0ab", "score": "0.5761039", "text": "func (c *PostClient) Get(ctx context.Context, id int) (*Post, error) {\n\treturn c.Query().Where(post.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "2f2294e576cfb1a267afced1f1dd130b", "score": "0.57587487", "text": "func (r *crudRepository) Getall_Post_of_Page(ctx context.Context, pageId string, access_token string) ([]byte, error) {\n\tres, err := http.NewRequest(\"GET\", \"https://graph.facebook.com/\"+pageId+\"?fields=id,name,feed{created_time,message,attachments}&access_token=\"+access_token, nil)\n\tres.Header.Set(\"Content-Type\", \"application/json\")\n\tclient := &http.Client{}\n\tresponse, err := client.Do(res)\n\tif err != nil {\n\t\tfmt.Printf(\"error %s\\n\", err)\n\t} else {\n\t\tdata, _ := ioutil.ReadAll(response.Body)\n\t\tfmt.Println(string(data), \"enterrer\")\n\t\treturn data, nil\n\t}\n\n\tdefer res.Body.Close()\n\treturn nil, err\n}", "title": "" } ]
a12a66c2a66c7a6b62503f3a6b31dbfc
diffStrings returns the unique strings in all of the lists which aren't in the first
[ { "docid": "656067cc671a8c7bf06b4dd922700351", "score": "0.75048333", "text": "func diffStrings(src ...[]string) []string {\n\tfirst := make(map[string]struct{})\n\tunique := make(map[string]struct{})\n\n\tfor i, srci := range src {\n\t\tfor _, v := range srci {\n\t\t\tif i == 0 {\n\t\t\t\tfirst[v] = struct{}{}\n\t\t\t} else {\n\t\t\t\tif _, ok := first[v]; !ok {\n\t\t\t\t\tunique[v] = struct{}{}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tkeys := make([]string, len(unique))\n\ti := 0\n\n\tfor k := range unique {\n\t\tkeys[i] = k\n\t\ti++\n\t}\n\n\treturn keys\n}", "title": "" } ]
[ { "docid": "362896bce425f52185a03d0c5c7f8bb8", "score": "0.75794816", "text": "func diffStrings(new, old []string) (added, removed []string) {\nAdd:\n\tfor _, x := range new {\n\t\tfor _, y := range old {\n\t\t\tif x == y {\n\t\t\t\tcontinue Add\n\t\t\t}\n\t\t}\n\t\tadded = append(added, x)\n\t}\nRem:\n\tfor _, x := range old {\n\t\tfor _, y := range new {\n\t\t\tif x == y {\n\t\t\t\tcontinue Rem\n\t\t\t}\n\t\t}\n\t\tremoved = append(removed, x)\n\t}\n\n\treturn added, removed\n}", "title": "" }, { "docid": "362896bce425f52185a03d0c5c7f8bb8", "score": "0.75794816", "text": "func diffStrings(new, old []string) (added, removed []string) {\nAdd:\n\tfor _, x := range new {\n\t\tfor _, y := range old {\n\t\t\tif x == y {\n\t\t\t\tcontinue Add\n\t\t\t}\n\t\t}\n\t\tadded = append(added, x)\n\t}\nRem:\n\tfor _, x := range old {\n\t\tfor _, y := range new {\n\t\t\tif x == y {\n\t\t\t\tcontinue Rem\n\t\t\t}\n\t\t}\n\t\tremoved = append(removed, x)\n\t}\n\n\treturn added, removed\n}", "title": "" }, { "docid": "657e0b3a5acc12247ccdbd4165a57875", "score": "0.7492142", "text": "func stringSetDifference(aa, bb []string) []string {\n\trr := []string{}\n\nLoopStrings:\n\tfor _, a := range aa {\n\t\tfor _, b := range bb {\n\t\t\tif reflect.DeepEqual(a, b) {\n\t\t\t\tcontinue LoopStrings\n\t\t\t}\n\t\t}\n\n\t\trr = append(rr, a)\n\t}\n\n\treturn rr\n}", "title": "" }, { "docid": "aa848673a88aad1269c1c240bf394b63", "score": "0.7347279", "text": "func GetStringListsDiff(stringLists ...[]string) []string {\n\tif len(stringLists) == 0 {\n\t\treturn []string{}\n\t}\n\tleftValues := make(map[string]bool)\n\tfor _, value := range stringLists[0] {\n\t\tleftValues[value] = true\n\t}\n\tfor _, stringList := range stringLists[1:] {\n\t\tfor _, value := range stringList {\n\t\t\tdelete(leftValues, value)\n\t\t}\n\t}\n\tresult := make([]string, 0)\n\tfor _, value := range stringLists[0] {\n\t\tif _, ok := leftValues[value]; ok {\n\t\t\tresult = append(result, value)\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "2ecf0735290e70c359d2bcc08e3163d9", "score": "0.7163555", "text": "func stringDifference(slice1 []string, slice2 []string) []string {\n var diff []string\n\n // Loop two times, first to find slice1 strings not in slice2,\n // second loop to find slice2 strings not in slice1\n for i := 0; i < 2; i++ {\n for _, s1 := range slice1 {\n found := false\n for _, s2 := range slice2 {\n if s1 == s2 {\n found = true\n break\n }\n }\n // String not found. We add it to return slice\n if !found {\n diff = append(diff, s1)\n }\n }\n // Swap the slices, only if it was the first loop\n if i == 0 {\n slice1, slice2 = slice2, slice1\n }\n }\n\n return diff\n}", "title": "" }, { "docid": "2ecf0735290e70c359d2bcc08e3163d9", "score": "0.7163555", "text": "func stringDifference(slice1 []string, slice2 []string) []string {\n var diff []string\n\n // Loop two times, first to find slice1 strings not in slice2,\n // second loop to find slice2 strings not in slice1\n for i := 0; i < 2; i++ {\n for _, s1 := range slice1 {\n found := false\n for _, s2 := range slice2 {\n if s1 == s2 {\n found = true\n break\n }\n }\n // String not found. We add it to return slice\n if !found {\n diff = append(diff, s1)\n }\n }\n // Swap the slices, only if it was the first loop\n if i == 0 {\n slice1, slice2 = slice2, slice1\n }\n }\n\n return diff\n}", "title": "" }, { "docid": "c15b87cd2ea0c6e4de8fa72efb0594ef", "score": "0.70533186", "text": "func difference(xs, ys []string) []string {\n\tm := make(map[string]struct{}, len(ys))\n\tfor _, y := range ys {\n\t\tm[y] = struct{}{}\n\t}\n\trs := make([]string, 0, len(ys))\n\tfor _, x := range xs {\n\t\tif _, ok := m[x]; !ok {\n\t\t\trs = append(rs, x)\n\t\t}\n\t}\n\treturn rs\n}", "title": "" }, { "docid": "cdfbebc8bbc439114080ef61480c85f0", "score": "0.70358413", "text": "func (s String) Difference(strings ...String) (difference String) {\n\tdifference = s.Copy()\n\tfor _, set := range strings {\n\t\tfor key := range set {\n\t\t\tdelete(difference, key)\n\t\t}\n\t}\n\treturn difference\n}", "title": "" }, { "docid": "c76721b64a117aaddcaaa7c045988c78", "score": "0.703308", "text": "func differenceStringSlice(sliceA []string, sliceB []string) []string {\n\tvar diff []string\n\n\tfor _, a := range sliceA {\n\t\tfound := false\n\t\tfor _, b := range sliceB {\n\t\t\tif a == b {\n\t\t\t\tfound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !found {\n\t\t\tdiff = append(diff, a)\n\t\t}\n\t}\n\n\treturn diff\n}", "title": "" }, { "docid": "3730ad130f1e5fe2403ea2ede7fb5dcc", "score": "0.6886106", "text": "func difference(slice1 []string, slice2 []string) []string {\n\tvar diff []string\n\n\t// Loop two times, first to find slice1 strings not in slice2,\n\t// second loop to find slice2 strings not in slice1\n\tfor i := 0; i < 2; i++ {\n\t\tfor _, s1 := range slice1 {\n\t\t\tfound := false\n\t\t\tfor _, s2 := range slice2 {\n\t\t\t\tif s1 == s2 {\n\t\t\t\t\tfound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\t// String not found. We add it to return slice\n\t\t\tif !found {\n\t\t\t\tdiff = append(diff, s1)\n\t\t\t}\n\t\t}\n\t\t// Swap the slices, only if it was the first loop\n\t\tif i == 0 {\n\t\t\tslice1, slice2 = slice2, slice1\n\t\t}\n\t}\n\n\treturn diff\n}", "title": "" }, { "docid": "46f5f73f19a4ddb45594a276b424a0a6", "score": "0.6857746", "text": "func difference(a, b []string) []string {\n\tmb := make(map[string]struct{}, len(b))\n\tfor _, x := range b {\n\t\tmb[x] = struct{}{}\n\t}\n\tvar diff []string\n\tfor _, x := range a {\n\t\tif _, found := mb[x]; !found {\n\t\t\tdiff = append(diff, x)\n\t\t}\n\t}\n\treturn diff\n}", "title": "" }, { "docid": "ecd03d07568b71a7c7ee13c830e2927f", "score": "0.6729527", "text": "func SubtractString(x []string, y []string) []string {\n\tif len(x) == 0 {\n\t\treturn []string{}\n\t}\n\n\tif len(y) == 0 {\n\t\treturn x\n\t}\n\n\tvar slice []string\n\thash := map[string]struct{}{}\n\n\tfor _, v := range x {\n\t\thash[v] = struct{}{}\n\t}\n\n\tfor _, v := range y {\n\t\t_, ok := hash[v]\n\t\tif ok {\n\t\t\tdelete(hash, v)\n\t\t}\n\t}\n\n\tfor _, v := range x {\n\t\t_, ok := hash[v]\n\t\tif ok {\n\t\t\tslice = append(slice, v)\n\t\t}\n\t}\n\n\treturn slice\n}", "title": "" }, { "docid": "945cfca6fa2a95e0aa1709cf36274e5a", "score": "0.6690344", "text": "func listDifference(lines1, lines2 []string) []string {\n\tdifference := []string{}\n\tfor _, l1 := range lines1 {\n\t\tfound := false\n\t\tfor _, l2 := range lines2 {\n\t\t\tif strings.Contains(l2, l1) {\n\t\t\t\tfound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !found {\n\t\t\tdifference = append(difference, l1)\n\t\t}\n\t}\n\n\treturn difference\n}", "title": "" }, { "docid": "ae884d10f5a02bb7438c7022d1e713b1", "score": "0.6679319", "text": "func StringSliceDifference(slice1, slice2 []string) []string {\n\tvar diff []string\n\tfor i := 0; i < 2; i++ {\n\t\tfor _, s1 := range slice1 {\n\t\t\tfound := false\n\t\t\tfor _, s2 := range slice2 {\n\t\t\t\tif s1 == s2 {\n\t\t\t\t\tfound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !found {\n\t\t\t\tdiff = append(diff, s1)\n\t\t\t}\n\t\t}\n\t\tif i == 0 {\n\t\t\tslice1, slice2 = slice2, slice1\n\t\t}\n\t}\n\treturn diff\n}", "title": "" }, { "docid": "3ffc6b53a8e5d2b6df486ab13985b229", "score": "0.6670309", "text": "func DiffStringsOneWay(compareWhat, compareTo []string) []string {\n\tcompareToMap := make(map[string]struct{}, len(compareTo))\n\tfor _, x := range compareTo {\n\t\tcompareToMap[x] = struct{}{}\n\t}\n\n\tvar diff []string\n\tfor _, x := range compareWhat {\n\t\tif _, found := compareToMap[x]; !found {\n\t\t\tdiff = append(diff, x)\n\t\t}\n\t}\n\n\treturn diff\n}", "title": "" }, { "docid": "b9821cf7421e8b402fdd085a2caf260b", "score": "0.6637773", "text": "func StringSliceDifference(one, two []string) []string {\n\tvar difference []string\n\tfor _, str := range one {\n\t\tif SliceContainsString(two, str) {\n\t\t\tcontinue\n\t\t} else {\n\t\t\tdifference = append(difference, str)\n\t\t}\n\t}\n\treturn difference\n}", "title": "" }, { "docid": "7db1f7520f3fa8c8bcc1c7c0cece481b", "score": "0.6581739", "text": "func LastUniqueStrings(list []string) []string {\n\ttotalSkip := 0\n\tfor i := len(list) - 1; i >= totalSkip; i-- {\n\t\tskip := 0\n\t\tfor j := i - 1; j >= totalSkip; j-- {\n\t\t\tif list[i] == list[j] {\n\t\t\t\tskip++\n\t\t\t} else {\n\t\t\t\tlist[j+skip] = list[j]\n\t\t\t}\n\t\t}\n\t\ttotalSkip += skip\n\t}\n\treturn list[totalSkip:]\n}", "title": "" }, { "docid": "039265a92917be0b6eafb61159ac8a1b", "score": "0.6544398", "text": "func diffStrings(a, b string) (string, int) {\n\tcount := 0\n\tsame := \"\"\n\n\tfor i := 0; i < len(a); i++ {\n\t\tif a[i] == b[i] {\n\t\t\tsame += string(a[i])\n\t\t} else {\n\t\t\tcount++\n\t\t}\n\t}\n\n\treturn same, count\n}", "title": "" }, { "docid": "c59d891cfd178e3a07f8366ed25489ff", "score": "0.6532279", "text": "func Diff(a, b []string) (diff []string) {\n\tfor _, e := range a {\n\t\tif !Contains(b, e) {\n\t\t\tdiff = append(diff, e)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "38a791bf5a39a0be5bba38169298dce9", "score": "0.64861983", "text": "func Difference(a, b []string) []string {\n\tmb := make(map[string]struct{}, len(b))\n\tfor _, x := range b {\n\t\tmb[x] = struct{}{}\n\t}\n\tvar diff []string\n\tfor _, x := range a {\n\t\tif _, found := mb[x]; !found {\n\t\t\tdiff = append(diff, x)\n\t\t}\n\t}\n\treturn diff\n}", "title": "" }, { "docid": "9e61c1a2366e11c035e05370042f639f", "score": "0.6469086", "text": "func UniqueStrings(vs []string) (r []string) {\n\tm := map[string]struct{}{}\n\tvar ok bool\n\tfor _, v := range vs {\n\t\tif _, ok = m[v]; !ok {\n\t\t\tm[v] = struct{}{}\n\t\t\tr = append(r, v)\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "cad5a7397940d6de6ff7f602be3cd34a", "score": "0.6466437", "text": "func minus(slice1, slice2 []string) []string {\n\trtn := []string{}\n\tfor _, elem1 := range slice1 {\n\t\tfound := false\n\t\tfor _, elem2 := range slice2 {\n\t\t\tif elem1 == elem2 {\n\t\t\t\tfound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !found {\n\t\t\trtn = append(rtn, elem1)\n\t\t}\n\t}\n\treturn rtn\n}", "title": "" }, { "docid": "5e29d1d43d3cb39bc962fbcf4600563d", "score": "0.6452043", "text": "func setDifference(former []string, latter []string) []string {\n\tvar result []string\n\tformerSet := make(map[string]struct{})\n\tlatterSet := make(map[string]struct{})\n\n\tfor _, item := range former {\n\t\tformerSet[item] = struct{}{}\n\t}\n\tfor _, item := range latter {\n\t\tlatterSet[item] = struct{}{}\n\t}\n\tfor k := range formerSet {\n\t\tif _, ok := latterSet[k]; !ok {\n\t\t\tresult = append(result, k)\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "2aed5dc1d9a626a19ed5146b8b2a8ce8", "score": "0.6440865", "text": "func (s *StrSet) Difference(o *StrSet) StrSet {\n\tn := NewStr()\n\tfor el := range s.els {\n\t\tif _, ok := o.els[el]; !ok {\n\t\t\tn.Add(el)\n\t\t}\n\t}\n\treturn n\n}", "title": "" }, { "docid": "a1610118cd424c09a8e1b01209be1d20", "score": "0.64365095", "text": "func (list List_str) Difference(lists ...List_str) List_str {\n \n vsf := make(List_str, 0)\n \n //iterate over main list to get values\n for _, lval := range list {\n \n var is_inter bool\n \n if len(lval) > 0 {\n \n //iterate over all passed in lists\n for _, lst := range lists {\n is_inter = lst.Contains(lval)\n if is_inter == true {\n break\n }\n }\n \n if is_inter == false {\n vsf = append(vsf, lval)\n }\n \n }\n \n }\n \n return vsf\n}", "title": "" }, { "docid": "c2a585aa97cc5edab2faa7aa1be98285", "score": "0.6412959", "text": "func DiffStrings(compareWhat, compareTo []string) []string {\n\tdiff := DiffStringsOneWay(compareWhat, compareTo)\n\n\treturn append(diff, DiffStringsOneWay(compareTo, compareWhat)...)\n}", "title": "" }, { "docid": "25d0a26fab9b46239ff3186dd28200c8", "score": "0.63871145", "text": "func (d *DeltaStrSet) Diff(l []string) *DeltaStrSet {\n\t// clone and initialize values to false for old\n\t// false means deleted, true means added\n\tdiff := &DeltaStrSet{\n\t\titems: make(map[string]bool, len(d.items)),\n\t}\n\n\tfor k := range d.items {\n\t\tdiff.items[k] = false\n\t}\n\n\t// remove items that are in l and d.\n\t// add items that are only in l with value set to true\n\n\tfor _, k := range l {\n\t\tif _, found := diff.items[k]; found {\n\t\t\tdelete(diff.items, k)\n\t\t} else {\n\t\t\tdiff.items[k] = true\n\t\t}\n\t}\n\n\treturn diff\n}", "title": "" }, { "docid": "27be3e322097b4e8a5177fbaa5e642dc", "score": "0.636019", "text": "func dedupStrings(s []string) []string {\n\tp := len(s) - 1\n\tif p <= 0 {\n\t\treturn s\n\t}\n\n\tfor i := p - 1; i >= 0; i-- {\n\t\tif s[p] != s[i] {\n\t\t\tp--\n\t\t\ts[p] = s[i]\n\t\t}\n\t}\n\n\treturn s[p:]\n}", "title": "" }, { "docid": "8cc916d3415fbe53b3f799e5736ff661", "score": "0.6334958", "text": "func uncommonFromSentences(A string, B string) []string {\n \n}", "title": "" }, { "docid": "0c56942cce6c50fef183d6c31a0f6288", "score": "0.6325319", "text": "func StringSliceDelete(slice1 []string, slice2 []string) []string {\n\n\tvar diff []string\n\n\tfor _, s1 := range slice1 {\n\t\tfound := false\n\t\tfor _, s2 := range slice2 {\n\t\t\tif s1 == s2 {\n\t\t\t\tfound = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\t// String not found. We add it to return slice\n\t\tif !found {\n\t\t\tdiff = append(diff, s1)\n\t\t}\n\t}\n\n\treturn diff\n}", "title": "" }, { "docid": "cb05df40c7580d4ace28e4c59346aa1f", "score": "0.6291335", "text": "func dedupStr(in []string) []string {\n\tsort.Strings(in)\n\n\tj := 0\n\tfor i := 1; i < len(in); i++ {\n\t\tif in[j] == in[i] {\n\t\t\tcontinue\n\t\t}\n\t\tj++\n\t\tin[j] = in[i]\n\t}\n\n\treturn in[:j+1]\n}", "title": "" }, { "docid": "8a650bbe804be36908806187f9cafec6", "score": "0.62762064", "text": "func (ss *StringSet) Difference(other *StringSet) *StringSet {\n\tdiff := NewStringSet()\n\tif other == nil {\n\t\tfor k := range ss.members {\n\t\t\tdiff.Add(k)\n\t\t}\n\t\treturn diff\n\t}\n\n\tfor k := range ss.members {\n\t\tif !other.Contains(k) {\n\t\t\tdiff.Add(k)\n\t\t}\n\t}\n\treturn diff\n}", "title": "" }, { "docid": "6877ec9ae14cda32ee32eb0418ed010f", "score": "0.6244685", "text": "func uniqueStrings(s []string) []string {\n\tunique := make(map[string]bool, len(s))\n\tus := make([]string, len(unique))\n\tfor _, elem := range s {\n\t\tif len(elem) != 0 {\n\t\t\tif !unique[elem] {\n\t\t\t\tus = append(us, elem)\n\t\t\t\tunique[elem] = true\n\t\t\t}\n\t\t}\n\t}\n\treturn us\n}", "title": "" }, { "docid": "9362ae44d4cdf25a94ff2c0289c11306", "score": "0.61908364", "text": "func Subtract(ss []string, str ...string) []string {\n\totherElems := map[string]struct{}{}\n\n\tfor _, e := range str {\n\t\totherElems[e] = struct{}{}\n\t}\n\n\tres := []string{}\n\tfor _, e := range ss {\n\t\tif _, contains := otherElems[e]; !contains {\n\t\t\tres = append(res, e)\n\t\t}\n\t}\n\treturn res\n}", "title": "" }, { "docid": "985a411b5ff7bff453bf2ab0b84a3ac7", "score": "0.6188481", "text": "func (oss *OrderedStringSet) Difference(setB *OrderedStringSet) *OrderedStringSet {\n\tdiff := NewOrderedStringSet()\n\tif setB == nil {\n\t\treturn oss.Clone()\n\t}\n\n\tfor _, m := range oss.Elements() {\n\t\tif !setB.Contains(m) {\n\t\t\tdiff.Add(m)\n\t\t}\n\t}\n\n\treturn diff\n}", "title": "" }, { "docid": "2ab5a680cdeabba740eecd5f37ccf4cb", "score": "0.6187665", "text": "func cleanseIdentical(ss []string) []string {\n\n\tcounted := map[string]int{}\n\tret := []string{}\n\tfor _, s := range ss {\n\t\tcounted[s]++\n\t\tif counted[s] < 2 {\n\t\t\tret = append(ret, s)\n\t\t}\n\t}\n\n\treturn ret\n\n}", "title": "" }, { "docid": "8b9ac950ee8356c129dfab7e35209992", "score": "0.6178883", "text": "func UniqString(list []string) []string {\n\tsort.Strings(list)\n\tvar last string\n\tl := list[:0]\n\tfor _, str := range list {\n\t\tif str != last {\n\t\t\tl = append(l, str)\n\t\t}\n\t\tlast = str\n\t}\n\treturn l\n}", "title": "" }, { "docid": "94051321a4f469e8653f5c768a0543e7", "score": "0.6159078", "text": "func Fdifference(lista, listb []string) []string {\n\tlistx := []string{}\n\tFcompress(&lista)\n\tFcompress(&listb)\n\tfor _, i := range lista {\n\t\tif !Fmember(listb, i) {\n\t\t\tlistx = append(listx, i)\n\t\t}\n\t}\n\treturn listx\n}", "title": "" }, { "docid": "ca51607a8316ad03249a11c184e36ca4", "score": "0.6150345", "text": "func (c StringArrayCollection) Diff(m interface{}) Collection {\n\tms := m.([]string)\n\tvar d = make([]string, 0)\n\tfor _, value := range c.value {\n\t\texist := false\n\t\tfor i := 0; i < len(ms); i++ {\n\t\t\tif ms[i] == value {\n\t\t\t\texist = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !exist {\n\t\t\td = append(d, value)\n\t\t}\n\t}\n\treturn StringArrayCollection{\n\t\tvalue: d,\n\t}\n}", "title": "" }, { "docid": "5f68fc74b9b8ae95e43693e6f6d9a4c7", "score": "0.6144959", "text": "func Difference(a []string, b []string) []string {\n\tdiffStr := []string{}\n\tm := map[string]int{}\n\n\tfor _, aVal := range a {\n\t\tm[aVal] = 1\n\t}\n\tfor _, bVal := range b {\n\t\tm[bVal] = m[bVal] + 1\n\t}\n\n\tfor mKey, mVal := range m {\n\t\tif mVal == 1 {\n\t\t\tdiffStr = append(diffStr, mKey)\n\t\t}\n\t}\n\n\treturn diffStr\n}", "title": "" }, { "docid": "5cea288505f06682a64b7b40b14c3f69", "score": "0.61371636", "text": "func StringsRemove(ss []string, s string) []string {\n\tvar ns []string\n\tfor _, v := range ss {\n\t\tif v != s {\n\t\t\tns = append(ns, v)\n\t\t}\n\t}\n\n\treturn ns\n}", "title": "" }, { "docid": "5cea288505f06682a64b7b40b14c3f69", "score": "0.61371636", "text": "func StringsRemove(ss []string, s string) []string {\n\tvar ns []string\n\tfor _, v := range ss {\n\t\tif v != s {\n\t\t\tns = append(ns, v)\n\t\t}\n\t}\n\n\treturn ns\n}", "title": "" }, { "docid": "a3a8a6bd4ca570fe76ad881d253068e7", "score": "0.61001366", "text": "func GetStringListsUnion(stringLists ...[]string) []string {\n\tif len(stringLists) == 0 {\n\t\treturn []string{}\n\t}\n\n\tvalues := make([]string, 0)\n\n\tuniqueValues := make(map[string]bool)\n\tfor _, stringList := range stringLists {\n\t\tfor _, value := range stringList {\n\t\t\tif _, ok := uniqueValues[value]; !ok {\n\t\t\t\tvalues = append(values, value)\n\t\t\t\tuniqueValues[value] = true\n\t\t\t}\n\t\t}\n\t}\n\n\treturn values\n}", "title": "" }, { "docid": "5cc1fe4c04655c87ab314562a9e404fa", "score": "0.6083508", "text": "func (u *Utils) UniqueStrings(input []string) []string {\n\tr := make([]string, 0, len(input))\n\tm := make(map[string]bool)\n\tfor _, val := range input {\n\t\tif _, ok := m[val]; !ok {\n\t\t\tm[val] = true\n\t\t\tr = append(r, val)\n\t\t}\n\t}\n\treturn r\n}", "title": "" }, { "docid": "b6a29221cea4f2b1c49f935a57b63cbf", "score": "0.6067876", "text": "func Diff(base, exclude []string) (result []string) {\n\texcludeMap := make(map[string]bool)\n\tfor _, s := range exclude {\n\t\texcludeMap[s] = true\n\t}\n\tfor _, s := range base {\n\t\tif !excludeMap[s] {\n\t\t\tresult = append(result, s)\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "e19de5536573048b11da0384ef37dfc0", "score": "0.60620487", "text": "func stringsRemove(a []string, s string) []string {\n\ti := 0\n\tfor _, t := range a {\n\t\tif t != s {\n\t\t\ta[i] = t\n\t\t\ti++\n\t\t}\n\t}\n\treturn a[:i]\n}", "title": "" }, { "docid": "065f75c93e88e5c3ec9fc46288d1be30", "score": "0.60429114", "text": "func UniqueStrings(input []string) []string {\n\tkeys := make(map[string]bool)\n\tlist := []string{}\n\tfor _, entry := range input {\n\t\tif _, value := keys[entry]; !value {\n\t\t\tkeys[entry] = true\n\t\t\tlist = append(list, entry)\n\t\t}\n\t}\n\treturn list\n}", "title": "" }, { "docid": "b8e3ea0235b9c82395733f9a0b67fcde", "score": "0.6041714", "text": "func removeDuplicates(inputs []string) []string {\n\tdistinctInputs := make([]string, 0)\n\tseenTexts := make(map[string]bool)\n\tfor _, input := range inputs {\n\t\tif _, seen := seenTexts[input]; !seen {\n\t\t\tseenTexts[input] = true\n\t\t\tdistinctInputs = append(distinctInputs, input)\n\t\t}\n\t}\n\n\treturn distinctInputs\n}", "title": "" }, { "docid": "0cb6d28e4bb16207ffa4922557b821ea", "score": "0.60095996", "text": "func UniqueString(a []string) []string {\n\tr := make([]string, 0, len(a))\n\n\tsort.Strings(a)\n\n\tr = append(r, a[0])\n\ti := a[0]\n\n\tfor _, v := range a {\n\t\tif v != i {\n\t\t\tr = append(r, v)\n\t\t\ti = v\n\t\t}\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "d2c78fc75f56b0b136ca7ab2f6ab2f48", "score": "0.6007675", "text": "func FirstUniqueStrings(list []string) []string {\n\tk := 0\nouter:\n\tfor i := 0; i < len(list); i++ {\n\t\tfor j := 0; j < k; j++ {\n\t\t\tif list[i] == list[j] {\n\t\t\t\tcontinue outer\n\t\t\t}\n\t\t}\n\t\tlist[k] = list[i]\n\t\tk++\n\t}\n\treturn list[:k]\n}", "title": "" }, { "docid": "4ce754126e7cb1bffb9742b596b6019f", "score": "0.5997592", "text": "func (list List_str) Uniq() List_str {\n \n vsf := make(List_str, 0)\n \n for _, lval := range list {\n if vsf.Contains(lval) == false {\n vsf = append(vsf, lval)\n }\n }\n \n return vsf\n}", "title": "" }, { "docid": "1f566c30bcff10191180288d25f31217", "score": "0.59926206", "text": "func Unique(ss []string) []string {\n\tr := make([]string, 0)\n\tfor _, s := range ss {\n\t\tif Search(s, r) == -1 {\n\t\t\tr = append(r, s)\n\t\t}\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "dd3d1416ac5d1304fb6512d60a4d1ba2", "score": "0.59897906", "text": "func Difference[T comparable](slice1 []T, slice2 []T) []T {\n\tvar diff []T\n\n\t// Loop two times, first to find slice1 strings not in slice2,\n\t// second loop to find slice2 strings not in slice1\n\tfor i := 0; i < 2; i++ {\n\t\tfor _, s1 := range slice1 {\n\t\t\tfound := false\n\t\t\tfor _, s2 := range slice2 {\n\t\t\t\tif s1 == s2 {\n\t\t\t\t\tfound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\t// String not found. We add it to return slice\n\t\t\tif !found {\n\t\t\t\tdiff = append(diff, s1)\n\t\t\t}\n\t\t}\n\t\t// Swap the slices, only if it was the first loop\n\t\tif i == 0 {\n\t\t\tslice1, slice2 = slice2, slice1\n\t\t}\n\t}\n\n\treturn diff\n}", "title": "" }, { "docid": "49c3ee2f7eb09b6277fcbe491b090345", "score": "0.5980551", "text": "func ExcludeStrings(strs []string, excludes []string) []string {\n\tcache := make(map[string]bool)\n\tfor _, s := range excludes {\n\t\tcache[s] = true\n\t}\n\tss := make([]string, 0, len(strs))\n\tfor _, s := range strs {\n\t\tif _, ok := cache[s]; ok == false {\n\t\t\tss = append(ss, s)\n\t\t}\n\t}\n\treturn ss\n}", "title": "" }, { "docid": "ad4644b679572c43baa27cdc8490d951", "score": "0.59733695", "text": "func DiffSlice(slice1, slice2 []string) []string {\n\tvar result []string\n\tfor _, s1 := range slice1 {\n\t\tinSlice2 := false\n\t\tfor _, s2 := range slice2 {\n\t\t\tif s2 == s1 {\n\t\t\t\tinSlice2 = true\n\t\t\t}\n\t\t}\n\t\tif !inSlice2 {\n\t\t\tresult = append(result, s1)\n\t\t}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "82294239d9806a0945e984c3a7835efa", "score": "0.5961023", "text": "func Diff(left, right []string) (leftOnly, rightOnly []string) {\n\treturn CollectDifferent(left, right, GetAll, GetAll)\n}", "title": "" }, { "docid": "deae90f838e592b67847b1bb139cbdbe", "score": "0.59582216", "text": "func Sub(s1 []string, s2 []string) []string {\n\tmb := make(map[string]struct{}, len(s2))\n\tfor _, v := range s2 {\n\t\tmb[v] = struct{}{}\n\t}\n\n\tdiff := make([]string, 0)\n\tfor _, v := range s1 {\n\t\tif _, ok := mb[v]; !ok {\n\t\t\tdiff = append(diff, v)\n\t\t}\n\t}\n\treturn diff\n}", "title": "" }, { "docid": "4f6d939491b2c88344f7e39c5bc65113", "score": "0.59543943", "text": "func UniqueStrings(xs []string) []string {\n\ttype void struct{}\n\tvar member void\n\n\tkeys := map[string]void{}\n\tres := []string{}\n\tfor _, x := range xs {\n\t\tif _, ok := keys[x]; !ok {\n\t\t\tkeys[x] = member\n\t\t\tres = append(res, x)\n\t\t}\n\t}\n\treturn res\n}", "title": "" }, { "docid": "5c40b41c604a31d3a26501573ba93fff", "score": "0.59374917", "text": "func deduplicate(s []string) []string {\n\tencountered := map[string]bool{}\n\tret := make([]string, 0)\n\tfor i := range s {\n\t\tif encountered[s[i]] {\n\t\t\tcontinue\n\t\t}\n\t\tencountered[s[i]] = true\n\t\tret = append(ret, s[i])\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "5c40b41c604a31d3a26501573ba93fff", "score": "0.59374917", "text": "func deduplicate(s []string) []string {\n\tencountered := map[string]bool{}\n\tret := make([]string, 0)\n\tfor i := range s {\n\t\tif encountered[s[i]] {\n\t\t\tcontinue\n\t\t}\n\t\tencountered[s[i]] = true\n\t\tret = append(ret, s[i])\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "42b35f34f438f48d13d1631695fc1fe4", "score": "0.59366316", "text": "func uniq(sortedList []stringSortKey) []stringSortKey {\n\tout := sortedList[:0]\n\tfor _, sk := range sortedList {\n\t\tif len(out) == 0 || sk.value != out[len(out)-1].value {\n\t\t\tout = append(out, sk)\n\t\t}\n\t}\n\treturn out\n}", "title": "" }, { "docid": "d892e71f5567bdec2e381e79f983c27c", "score": "0.5928667", "text": "func SubtractStringSlice(ss []string, str string) []string {\n\tvar res []string\n\tfor _, s := range ss {\n\t\tif strings.EqualFold(s, str) {\n\t\t\tcontinue\n\t\t}\n\t\tres = append(res, s)\n\t}\n\treturn res\n}", "title": "" }, { "docid": "a215f03d2b1eac912b944cd3fadac771", "score": "0.591604", "text": "func CommonStrings(xs []string, ys []string) []string {\n\tss := make([]string, 0, len(xs))\n\tcache := make(map[string]bool)\n\tfor _, x := range xs {\n\t\tcache[x] = true\n\t}\n\tfor _, y := range ys {\n\t\tif _, ok := cache[y]; ok {\n\t\t\tss = append(ss, y)\n\t\t}\n\t}\n\treturn ss\n}", "title": "" }, { "docid": "bf953a5eddfb22c56050ec4feaffc26f", "score": "0.5907498", "text": "func StrUniq(l []string) []string {\n\tif len(l) == 0 {\n\t\treturn nil\n\t}\n\n\tset := map[string]struct{}{}\n\tfor i := range l {\n\t\tset[l[i]] = struct{}{}\n\t}\n\n\tresult := make([]string, 0, len(set))\n\tfor k := range set {\n\t\tresult = append(result, k)\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "73d91daa02cfc5d3fe9dfd70ca657e6f", "score": "0.5903195", "text": "func Complement(set1 []string, set2 []string) []string {\n\thelperSet := make(map[string]bool)\n\n\tfor _, entry := range set2 {\n\t\thelperSet[entry] = true\n\t}\n\n\tvar sub []string\n\n\tfor _, entry := range set1 {\n\t\tif _, contained := helperSet[entry]; !contained {\n\t\t\tsub = append(sub, entry)\n\t\t}\n\t}\n\n\treturn sub\n}", "title": "" }, { "docid": "a7baa1d30986cc9bced6f0df4ed4673c", "score": "0.5880515", "text": "func DedupStrings(src []string) []string {\n\tm := make(map[string]struct{}, len(src))\n\tdst := make([]string, 0, len(src))\n\n\tfor _, v := range src {\n\t\t// Skip empty items\n\t\tif len(v) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\t// Skip duplicates\n\t\tif _, ok := m[v]; ok {\n\t\t\tcontinue\n\t\t}\n\t\tm[v] = struct{}{}\n\t\tdst = append(dst, v)\n\t}\n\n\treturn dst\n}", "title": "" }, { "docid": "571a935d55f9c0cc098bbd87eec88c0e", "score": "0.5860238", "text": "func UniqueStrings(s []string) []string {\n\tkeys := make(map[string]bool, len(s))\n\tlist := []string{}\n\n\tfor _, entry := range s {\n\t\tif _, value := keys[entry]; !value {\n\t\t\tkeys[entry] = true\n\t\t\tlist = append(list, entry)\n\t\t}\n\t}\n\n\treturn list\n}", "title": "" }, { "docid": "1857fff9584c84e8f60a4bdc073190f7", "score": "0.58442587", "text": "func compare(a, b []string) []string {\n\tfor i := len(a) - 1; i >= 0; i-- {\n\t\tfor _, v := range b {\n\t\t\tif a[i] == v {\n\t\t\t\ta = append(a[:i], a[i+1:]...)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\treturn a\n}", "title": "" }, { "docid": "0403ce7e34f56b32ae6c975253811667", "score": "0.5844148", "text": "func DiffOfLists(list1 []string, list2 []string) []string {\n\tdiffMap := map[string]int{}\n\tvar diffString []string\n\tfor _, l1 := range list1 {\n\t\tdiffMap[l1] = 1\n\t}\n\tfor _, l2 := range list2 {\n\t\tdiffMap[l2] = diffMap[l2] + 1\n\t}\n\tvar diffNum int\n\tfor key, val := range diffMap {\n\t\tif val == 1 {\n\t\t\tdiffNum = diffNum + 1\n\t\t\tdiffString = append(diffString, key)\n\t\t}\n\t}\n\treturn diffString\n}", "title": "" }, { "docid": "5a07e05ea4a8d0ebe36e330e2d87b763", "score": "0.58360636", "text": "func Difference(s1, s2 Set) Set {\n\ttoReturn := New()\n\tfor k := range s1 {\n\t\tif _, ok := s2[k]; !ok {\n\t\t\ttoReturn.Add(k)\n\t\t}\n\t}\n\treturn toReturn\n}", "title": "" }, { "docid": "f5fb7161955320568bd245b33068be15", "score": "0.582877", "text": "func (us UniqueStrings) Strings() []string {\n\tsort.Strings(us.result)\n\treturn us.result\n}", "title": "" }, { "docid": "9b28f96ebe661647171c0a3fb5ebd263", "score": "0.5824002", "text": "func CommonStrings(s1, s2 []string) []string {\n\n\tvar common []string\n\tfor _, v := range s1 {\n\t\tif ContainsString(s2, v) {\n\t\t\tcommon = append(common, v)\n\t\t}\n\t}\n\n\treturn common\n\n}", "title": "" }, { "docid": "88852c8e74e3322cd7a3bbee41e0ac21", "score": "0.5822102", "text": "func RemovedDuplicates(input []string) (output []string) {\n\toutput = []string{}\n\tfor _, inputItem := range input {\n\t\texsists := false\n\tcheckArr:\n\t\tfor _, outputItem := range output {\n\t\t\tif inputItem == outputItem {\n\t\t\t\texsists = true\n\t\t\t\tbreak checkArr\n\t\t\t}\n\t\t}\n\t\tif !exsists {\n\t\t\toutput = append(output, inputItem)\n\t\t}\n\t}\n\treturn output\n}", "title": "" }, { "docid": "94643a8754186690ba36a42b08e84e6d", "score": "0.58200306", "text": "func (s StringSet) Complement(other StringSet) StringSet {\n\tresultSet := make(StringSet, len(s))\n\tfor val := range s {\n\t\tif !other[val] {\n\t\t\tresultSet[val] = true\n\t\t}\n\t}\n\n\treturn resultSet\n}", "title": "" }, { "docid": "13b9d5787bd75153cd4dae9e041b867f", "score": "0.58159363", "text": "func removeDuplicates(stringSlices ...[]string) []string {\n\tuniqueMap := map[string]bool{}\n\n\tfor _, stringSlice := range stringSlices {\n\t\tfor _, str := range stringSlice {\n\t\t\tuniqueMap[str] = true\n\t\t}\n\t}\n\n\t// Create a slice with the capacity of unique items\n\t// This capacity make appending flow much more efficient\n\tresult := make([]string, 0, len(uniqueMap))\n\n\tfor key := range uniqueMap {\n\t\tresult = append(result, key)\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "fff05598239608fd69233ee4ab26733c", "score": "0.5812552", "text": "func Strings(tst *testing.T, msg string, a, b []string) {\n\tif len(a) != len(b) {\n\t\tPrintFail(\"%s error len(%q)=%d != len(%q)=%d\\n\", msg, a, len(a), b, len(b))\n\t\ttst.Errorf(\"%s failed: slices have different lengths: %v != %v\", msg, a, b)\n\t\treturn\n\t}\n\tfor i := 0; i < len(a); i++ {\n\t\tif a[i] != b[i] {\n\t\t\tPrintFail(\"%s error %v != %v\\n\", msg, a[i], b[i])\n\t\t\ttst.Errorf(\"%s failed: slices are different: %dth comp %v != %v\\n%v != \\n%v\", msg, i, a[i], b[i], a, b)\n\t\t\treturn\n\t\t}\n\t}\n\tPrintOk(msg)\n}", "title": "" }, { "docid": "c5bb332706764844ce89e2c499f6a5d9", "score": "0.5810415", "text": "func deduplicate(in []string) []string {\n\tvar lastValue string\n\tout := in[:0]\n\tfor _, value := range in {\n\t\tif value == lastValue {\n\t\t\tcontinue\n\t\t}\n\t\tout = append(out, value)\n\t\tlastValue = value\n\t}\n\treturn out\n}", "title": "" }, { "docid": "e07d690e3facdffae0ebdcbfc859a4c5", "score": "0.57976484", "text": "func Diff(before, after []string) (pairs []DiffPair) {\n\tbeforeIndexMap := make(map[string][]int)\n\tfor i, str := range before {\n\t\tif _, ok := beforeIndexMap[str]; ok {\n\t\t\tbeforeIndexMap[str] = append(beforeIndexMap[str], i)\n\t\t} else {\n\t\t\tbeforeIndexMap[str] = []int{i}\n\t\t}\n\t}\n\n\t// Fine longest common subsequence (LCS)\n\tvar overlap map[int]int\n\tsubStartBefore := 0\n\tsubStartAfter := 0\n\tsubLength := 0\n\n\tfor iafter, str := range after {\n\t\toverlap_ := make(map[int]int)\n\t\tif ids, ok := beforeIndexMap[str]; ok {\n\t\t\tfor _, ibefore := range ids {\n\t\t\t\tif val, ok := overlap[ibefore-1]; ok {\n\t\t\t\t\tif ibefore > val {\n\t\t\t\t\t\toverlap_[ibefore] = ibefore + 1\n\t\t\t\t\t} else {\n\t\t\t\t\t\toverlap_[ibefore] = val + 1\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\toverlap_[ibefore] = ibefore + 1\n\t\t\t\t}\n\n\t\t\t\tif overlap_[ibefore] > subLength {\n\t\t\t\t\t// this is the largest substring seen so\n\t\t\t\t\t// far, so store its indices\n\t\t\t\t\tsubLength = overlap_[ibefore]\n\t\t\t\t\tsubStartBefore = ibefore - subLength + 1\n\t\t\t\t\tsubStartAfter = iafter - subLength + 1\n\t\t\t\t}\n\t\t\t}\n\t\t\toverlap = overlap_\n\t\t}\n\t}\n\n\tif subLength == 0 {\n\t\tif len(before) > 0 {\n\t\t\tpairs = append(pairs, DiffPair{typ: \"-\", items: before})\n\t\t}\n\t\tif len(after) > 0 {\n\t\t\tpairs = append(pairs, DiffPair{typ: \"+\", items: after})\n\t\t}\n\t} else {\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "5b4c7010206ebebb686ff8a137e063b8", "score": "0.5792957", "text": "func deduplicateStringExprs(list []Expr) []Expr {\n\tvar comments []Comment\n\talreadySeen := make(map[string]bool)\n\tvar deduplicated []Expr\n\tfor _, value := range list {\n\t\tstr, ok := value.(*StringExpr)\n\t\tif !ok {\n\t\t\tdeduplicated = append(deduplicated, value)\n\t\t\tcontinue\n\t\t}\n\t\tstrVal := str.Value\n\t\tif _, ok := alreadySeen[strVal]; ok {\n\t\t\t// This is a duplicate of a string above.\n\t\t\t// Collect comments so that they're not lost.\n\t\t\tcomments = append(comments, str.Comment().Before...)\n\t\t\tcomments = append(comments, str.Comment().After...)\n\t\t\tcontinue\n\t\t}\n\t\talreadySeen[strVal] = true\n\t\tif len(comments) > 0 {\n\t\t\tcomments = append(comments, value.Comment().Before...)\n\t\t\tvalue.Comment().Before = comments\n\t\t\tcomments = nil\n\t\t}\n\t\tdeduplicated = append(deduplicated, value)\n\t}\n\treturn deduplicated\n}", "title": "" }, { "docid": "3c49effbf9fe1d23c2a11808067c967a", "score": "0.577337", "text": "func removeSubstrings(input []string) []string {\n\t// Make a copy of input.\n\tss := append(make([]string, 0, len(input)), input...)\n\tsort.Sort(byLength(ss))\n\n\tfor i, shortString := range ss {\n\t\t// For each string, only consider strings higher than it in sort order, i.e.\n\t\t// of equal length or greater.\n\t\tfor _, longString := range ss[i+1:] {\n\t\t\tif strings.Contains(longString, shortString) {\n\t\t\t\tss[i] = \"\"\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\t// Remove the empty strings.\n\tsort.Strings(ss)\n\tfor len(ss) > 0 && ss[0] == \"\" {\n\t\tss = ss[1:]\n\t}\n\treturn ss\n}", "title": "" }, { "docid": "4ada8ecbad2cc256f63b111f9d8dd1a7", "score": "0.5771203", "text": "func unique(ss []string) []string {\n\tvar us []string\n\tset := make(map[string]bool)\n\tfor _, s := range ss {\n\t\tif !set[s] {\n\t\t\tus = append(us, s)\n\t\t}\n\t\tset[s] = true\n\t}\n\treturn us\n}", "title": "" }, { "docid": "a9249aa4821a07a976d7957fa89e276b", "score": "0.57681", "text": "func TestCompareStrings(t *testing.T) {\n\tstrings1 := []string{\"one\", \"two\", \"three\"}\n\tstrings2 := []string{\"one\", \"two\"}\n\tstrings3 := []string{\"one\", \"two\", \"THREE\"}\n\n\tif !compareStrings(strings1, strings1) {\n\t\tt.Error(\"Equal slices fail check!\")\n\t}\n\n\tif compareStrings(strings1, strings2) {\n\t\tt.Error(\"Different size slices are OK!\")\n\t}\n\n\tif compareStrings(strings1, strings3) {\n\t\tt.Error(\"Slice with different strings are OK!\")\n\t}\n}", "title": "" }, { "docid": "05c0b2c83a46c15a104fe3992ee219ff", "score": "0.5761399", "text": "func subtractSlices(s1, s2 []string) []string {\n\tresult := make([]string, 0, len(s1))\n\n\tm := map[string]bool{}\n\tfor _, e2 := range s2 {\n\t\tm[e2] = true\n\t}\n\n\tfor _, e1 := range s1 {\n\t\tif !m[e1] {\n\t\t\tresult = append(result, e1)\n\t\t}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "11b4f9617e070d3e3ea2ecba0c0abed9", "score": "0.5755653", "text": "func (j *DSGit) UniqueStringArray(ary []interface{}) []interface{} {\n\tm := map[string]struct{}{}\n\tfor _, i := range ary {\n\t\tm[i.(string)] = struct{}{}\n\t}\n\tret := []interface{}{}\n\tfor i := range m {\n\t\tret = append(ret, i)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "c7ce011040a631d89c55b41f0f116518", "score": "0.5752458", "text": "func RemoveDuplicatedStrings(slice []string) []string {\n\tresult := []string{}\n\n\tcheck := make(map[string]bool)\n\tfor _, element := range slice {\n\t\tcheck[element] = true\n\t}\n\n\tfor key := range check {\n\t\tresult = append(result, key)\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "aaf42e0b850729fef578e41eabeaef07", "score": "0.5751112", "text": "func ArrayStringUniq(arr []string) []string {\n\tm := make(map[string]bool)\n\tuniq := []string{}\n\tfor _, v := range arr {\n\t\tif !m[v] {\n\t\t\tm[v] = true\n\t\t\tuniq = append(uniq, v)\n\t\t}\n\t}\n\treturn uniq\n}", "title": "" }, { "docid": "481fe244544b574e53435c434a72c3b4", "score": "0.5717788", "text": "func MergeUnique(dest, source []string) []string {\n\tfor _, str := range source {\n\t\tif !Contain(dest, str) {\n\t\t\tdest = append(dest, str)\n\t\t}\n\t}\n\treturn dest\n}", "title": "" }, { "docid": "19c2ecc969343b30f685727d32a740d6", "score": "0.57171756", "text": "func UniqueStringSlice(ins ...[]string) []string {\n\tkeys := make(map[string]bool)\n\tlist := []string{}\n\tfor _, in := range ins {\n\t\tfor _, k := range in {\n\t\t\tif _, value := keys[k]; !value {\n\t\t\t\tkeys[k] = true\n\t\t\t\tlist = append(list, k)\n\t\t\t}\n\t\t}\n\t}\n\treturn list\n}", "title": "" }, { "docid": "49660fc693a53b68d5f2a3f77f35ef6e", "score": "0.57157254", "text": "func missing(a, b []string) []string {\n\t// create map with length of the 'a' slice\n\tma := make(map[string]void, len(a))\n\tdiffs := []string{}\n\t// Convert first slice to map with empty struct (0 bytes)\n\tfor _, ka := range a {\n\t\tma[ka] = void{}\n\t}\n\t// find missing values in a\n\tfor _, kb := range b {\n\t\tif _, ok := ma[kb]; !ok {\n\t\t\tdiffs = append(diffs, kb)\n\t\t}\n\t}\n\treturn diffs\n}", "title": "" }, { "docid": "0ae1a14b8a0092c549612ab433c38c62", "score": "0.5714336", "text": "func StringSliceSubstract(a, b []string) []string {\n\taMap := make(map[string]struct{})\n\tfor _, item := range a {\n\t\taMap[item] = struct{}{}\n\t}\n\tfor _, item := range b {\n\t\tdelete(aMap, item)\n\t}\n\tres := make([]string, 0, len(aMap))\n\tfor key := range aMap {\n\t\tres = append(res, key)\n\t}\n\treturn res\n}", "title": "" }, { "docid": "0dcba87f05bf70626cf3e58dece37f89", "score": "0.5684968", "text": "func distinct(s []string) []string {\n\tnewSlice := make([]string, 0, len(s))\n\tencountered := map[string]interface{}{}\n\tfor _, v := range s {\n\t\tif _, found := encountered[v]; !found {\n\t\t\tnewSlice = append(newSlice, v)\n\t\t\tencountered[v] = nil\n\t\t}\n\t}\n\treturn newSlice\n}", "title": "" }, { "docid": "ee728e227f0b2e39712ffadd3a56fd6f", "score": "0.56802183", "text": "func removeDuplicates(s []string) []string {\n\tresult := make([]string, 0, len(s))\n\n\tused := map[string]bool{}\n\tfor _, elem := range s {\n\t\tif !used[elem] {\n\t\t\tresult = append(result, elem)\n\t\t\tused[elem] = true\n\t\t}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "db6d5f7126f0207b6f6ab34d79ff4a16", "score": "0.56772614", "text": "func Difference(a, b []string) (onlyA, onlyB []string) {\n\tsort.Strings(a)\n\tsort.Strings(b)\n\tfor {\n\t\tif len(b) == 0 {\n\t\t\tonlyA = append(onlyA, a...)\n\t\t\treturn\n\t\t}\n\t\tif len(a) == 0 {\n\t\t\tonlyB = append(onlyB, b...)\n\t\t\treturn\n\t\t}\n\t\txA := a[0]\n\t\txB := b[0]\n\t\tif xA < xB {\n\t\t\tonlyA = append(onlyA, xA)\n\t\t\ta = a[1:]\n\t\t} else if xA > xB {\n\t\t\tonlyB = append(onlyB, xB)\n\t\t\tb = b[1:]\n\t\t} else {\n\t\t\ta = a[1:]\n\t\t\tb = b[1:]\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7a95e355a9a2f0005430a5fac28db9fb", "score": "0.5676588", "text": "func differences(server, local []string) ([]string, []string) {\n\tnewPackages := []string{}\n\tinstalledPackages := []string{}\n\tfor _, s := range server {\n\t\tif util.In(s, local) {\n\t\t\tinstalledPackages = append(installedPackages, s)\n\t\t} else {\n\t\t\tnewPackages = append(newPackages, s)\n\t\t}\n\t}\n\treturn newPackages, installedPackages\n}", "title": "" }, { "docid": "dc18b8524c5c0c1ba1c90ad9d79ac960", "score": "0.56747156", "text": "func SortedUniqueStrings(list []string) []string {\n\tunique := FirstUniqueStrings(list)\n\tsort.Strings(unique)\n\treturn unique\n}", "title": "" }, { "docid": "c725fef09348c5c3ce3b33a95af8f6ca", "score": "0.56736517", "text": "func (queryParametersBag) uniqueStringsSlice(in []string) []string {\n\tkeys := make(map[string]bool)\n\tout := make([]string, 0)\n\n\tfor _, entry := range in {\n\t\tif _, ok := keys[entry]; !ok {\n\t\t\tkeys[entry] = true\n\t\t\tout = append(out, entry)\n\t\t}\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "99e9d6ced85f17b72b7d21936cc1234c", "score": "0.56597555", "text": "func Uniq(ss []string) []string {\n\treturn SortedUniq(Sort(ss)) // TODO: uniq without sorting.\n}", "title": "" }, { "docid": "1851058988d5e1835986c523bedc32a6", "score": "0.5625178", "text": "func RemoveDuplicateStr(strSlice []string) []string {\n\tallKeys := make(map[string]bool)\n\tlist := []string{}\n\tfor _, item := range strSlice {\n\t\tif _, value := allKeys[item]; !value {\n\t\t\tallKeys[item] = true\n\t\t\tlist = append(list, item)\n\t\t}\n\t}\n\treturn list\n}", "title": "" }, { "docid": "bdcdb94d517b55ec510aa1b6390d257b", "score": "0.56220025", "text": "func Strings(data []string) []string {\n\tsort.Strings(data)\n\tn := Uniq(sort.StringSlice(data))\n\treturn data[:n]\n}", "title": "" }, { "docid": "0307368dc9622c2e198b6b26d248b3e2", "score": "0.56077474", "text": "func Strings(in []string) {\n\tvar mi int\n\n\tfor i := 0; i < len(in); i++ {\n\t\tmi = i\n\n\t\tfor j := i; j < len(in); j++ {\n\t\t\tif in[j] < in[mi] {\n\t\t\t\tmi = j\n\t\t\t}\n\t\t}\n\n\t\tif i != mi {\n\t\t\tin[i], in[mi] = in[mi], in[i]\n\t\t}\n\t}\n}", "title": "" } ]
947477cf9397318c904fba39709cadfa
VersionNumber sets the version number of the clickwraps to return
[ { "docid": "e71e033c30655e2d40f601d788432eb6", "score": "0.6464933", "text": "func (op *ListOp) VersionNumber(val int32) *ListOp {\n\tif op != nil {\n\t\top.QueryOpts.Set(\"version_number\", strconv.Itoa(int(val)))\n\t}\n\treturn op\n}", "title": "" } ]
[ { "docid": "17b33b26a99f824751f1246990cbeb89", "score": "0.68338764", "text": "func SetBuildNumber(number string) {\n\tVersionNumber = number\n}", "title": "" }, { "docid": "cc203fa3552cf16c6c168a368f20a58e", "score": "0.66424066", "text": "func (m *IosLobApp) SetVersionNumber(value *string)() {\n err := m.GetBackingStore().Set(\"versionNumber\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "37283b118dfadf74c8538e68a7bdf408", "score": "0.6623694", "text": "func (s *Service) GetClickwrapVersionByNumber(clickwrapID string, versionNumber string) *GetClickwrapVersionByNumberOp {\n\treturn &GetClickwrapVersionByNumberOp{\n\t\tCredential: s.credential,\n\t\tMethod: \"GET\",\n\t\tPath: strings.Join([]string{\"clickwraps\", clickwrapID, \"versions\", versionNumber}, \"/\"),\n\t\tAccept: \"application/json\",\n\t\tQueryOpts: make(url.Values),\n\t\tVersion: esign.ClickV1,\n\t}\n}", "title": "" }, { "docid": "b960e9ce2fb9f370e1256a964003d6ab", "score": "0.6586142", "text": "func (t PAT) VersionNumber() int {\n\treturn VersionNumber(t)\n}", "title": "" }, { "docid": "122c46646e4989f1c1f48ae08e1ac771", "score": "0.64819545", "text": "func (t CAT) VersionNumber() int {\n\treturn VersionNumber(t)\n}", "title": "" }, { "docid": "7dfc03d42c8174578d8b1d4ec648dd76", "score": "0.64378923", "text": "func SetVersion(v string) {\n\tversion = v\n}", "title": "" }, { "docid": "7dfc03d42c8174578d8b1d4ec648dd76", "score": "0.64378923", "text": "func SetVersion(v string) {\n\tversion = v\n}", "title": "" }, { "docid": "7dfc03d42c8174578d8b1d4ec648dd76", "score": "0.64378923", "text": "func SetVersion(v string) {\n\tversion = v\n}", "title": "" }, { "docid": "7dfc03d42c8174578d8b1d4ec648dd76", "score": "0.64378923", "text": "func SetVersion(v string) {\n\tversion = v\n}", "title": "" }, { "docid": "7dfc03d42c8174578d8b1d4ec648dd76", "score": "0.64378923", "text": "func SetVersion(v string) {\n\tversion = v\n}", "title": "" }, { "docid": "378f63af56d002dc281b89da82f3a5ed", "score": "0.6405487", "text": "func getVersionNumber(ctx context.Context) (string, error) {\n\tconst field = \"version\"\n\treturn getPathParameter(ctx, field)\n}", "title": "" }, { "docid": "bac9ab231f430a93781e187c85d2c3e3", "score": "0.62145454", "text": "func SetVersion(version string) {\n\tNewMosnMetrics().Gauge(Version + version).Update(1)\n}", "title": "" }, { "docid": "c8c71bfb2e7e3708655294667e2400e2", "score": "0.61990345", "text": "func SetVersion(version string) {\n\trc.Lock()\n\tdefer rc.Unlock()\n\trc.version = version\n}", "title": "" }, { "docid": "0831bf3717c577bf30774bb921e3eb69", "score": "0.6196685", "text": "func (t PMT) VersionNumber() int {\n\treturn VersionNumber(t)\n}", "title": "" }, { "docid": "6ba7449cde2410fa719a944b7781673e", "score": "0.6188205", "text": "func (t EIT) VersionNumber() int {\n\treturn ts.VersionNumber(t)\n}", "title": "" }, { "docid": "143a73cdeb770660cede448ef227e5c3", "score": "0.61822945", "text": "func SetVersion(v string) {\n\tif v != \"\" {\n\t\tversion = v\n\t}\n}", "title": "" }, { "docid": "b84a7a6114b5a6ffa1a58ba33fb8f5cb", "score": "0.6171766", "text": "func (mock MockTemplateArg) Version() string {\n\treturn domain.Version\n}", "title": "" }, { "docid": "fd5e646926471716b9531b31a1021ec5", "score": "0.6141574", "text": "func Version() string { return defaultVersion }", "title": "" }, { "docid": "8208ac1b7585c9675e5f7d3e37e2255e", "score": "0.6139889", "text": "func (m *TeamsAppDefinition) SetVersion(value *string)() {\n m.version = value\n}", "title": "" }, { "docid": "88f3d381886b4dd1d36d3ace6a3bd823", "score": "0.6126909", "text": "func (m *TermsAndConditions) SetVersion(value *int32)() {\n m.version = value\n}", "title": "" }, { "docid": "28b7d5160c4b8afea619962b74e9807a", "score": "0.6111338", "text": "func (i *InitInfo) VersionNumber () string {\n return C.GoString(&((*i).pj.version)[0])\n}", "title": "" }, { "docid": "8f9019ab251cc764ce51fd430a871ff8", "score": "0.61068225", "text": "func SetVersion(version string) {\n\tname := fmt.Sprintf(\"balerter_info_version{version=%q}\", version)\n\tmetrics.GetOrCreateGauge(name, func() float64 {\n\t\treturn 1\n\t})\n}", "title": "" }, { "docid": "c3f28f0ae62af22feb6f96b28ee134fa", "score": "0.6103625", "text": "func (f *HandlerFuncTest) SetVersion(version string) {\n\tf.version = version\n}", "title": "" }, { "docid": "b05082e9eb28612d4168c1a53173b5d2", "score": "0.6072621", "text": "func (s *Service) DeleteClickwrapVersionByNumber(clickwrapID string, versionNumber string) *DeleteClickwrapVersionByNumberOp {\n\treturn &DeleteClickwrapVersionByNumberOp{\n\t\tCredential: s.credential,\n\t\tMethod: \"DELETE\",\n\t\tPath: strings.Join([]string{\"clickwraps\", clickwrapID, \"versions\", versionNumber}, \"/\"),\n\t\tAccept: \"application/json\",\n\t\tQueryOpts: make(url.Values),\n\t\tVersion: esign.ClickV1,\n\t}\n}", "title": "" }, { "docid": "a7ebab7a56ae2d4858c8571bcc3c6794", "score": "0.60637593", "text": "func (s *Service) GetClickwrapVersionAgreementsByNumber(clickwrapID string, versionNumber string) *GetClickwrapVersionAgreementsByNumberOp {\n\treturn &GetClickwrapVersionAgreementsByNumberOp{\n\t\tCredential: s.credential,\n\t\tMethod: \"GET\",\n\t\tPath: strings.Join([]string{\"clickwraps\", clickwrapID, \"versions\", versionNumber, \"users\"}, \"/\"),\n\t\tAccept: \"application/json\",\n\t\tQueryOpts: make(url.Values),\n\t\tVersion: esign.ClickV1,\n\t}\n}", "title": "" }, { "docid": "6c10cf731fe49801f8bc1b6b493afb6b", "score": "0.60026926", "text": "func Version() string {\n\treturn \"1.0.3\"\n}", "title": "" }, { "docid": "f1ca6848596a4786251afc27d237e1b5", "score": "0.5989322", "text": "func (g *EventGenerator) SetVersion(version int64) {\n\n\tg.version = version\n}", "title": "" }, { "docid": "15c1506cf6c6dda71d30a3e55ca3a074", "score": "0.5987767", "text": "func (p *PublishBuilder) Version(version int) *PublishBuilder {\n\tp.version = version\n\treturn p\n}", "title": "" }, { "docid": "f733fdd300d719cc1d8c229fb6bd16e9", "score": "0.5964603", "text": "func (s *Service) UpdateClickwrapVersionByNumber(clickwrapID string, versionNumber string, clickwrapRequest ClickwrapRequest) *UpdateClickwrapVersionByNumberOp {\n\treturn &UpdateClickwrapVersionByNumberOp{\n\t\tCredential: s.credential,\n\t\tMethod: \"PUT\",\n\t\tPath: strings.Join([]string{\"clickwraps\", clickwrapID, \"versions\", versionNumber}, \"/\"),\n\t\tPayload: clickwrapRequest,\n\t\tAccept: \"application/json\",\n\t\tQueryOpts: make(url.Values),\n\t\tVersion: esign.ClickV1,\n\t}\n}", "title": "" }, { "docid": "ed1e0aeee061df252fe30db65613a586", "score": "0.59591573", "text": "func (_Standard *StandardCaller) Version(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _Standard.contract.Call(opts, out, \"version\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "fea37d779e3fee7421f209f192613c4b", "score": "0.5958035", "text": "func (c *Cli) Version(name, version string) {\n\tcheckNilCli(c)\n\tc.name = name\n\tc.version = version\n\tc.cmd.version = appVersion\n}", "title": "" }, { "docid": "c4484af2d8411ab980555a4069725640", "score": "0.5942679", "text": "func SetVersion(v *Version) {\n\tversion = v\n}", "title": "" }, { "docid": "56b6f08737a5b073dbc139bf64021816", "score": "0.59269977", "text": "func (rb *NodeOperatingSystemInfoBuilder) Version(version VersionString) *NodeOperatingSystemInfoBuilder {\n\trb.v.Version = version\n\treturn rb\n}", "title": "" }, { "docid": "06b1dc022c186a16f1c5ed8074907055", "score": "0.5925047", "text": "func (_MockETHLINKAggregator *MockETHLINKAggregatorCaller) Version(opts *bind.CallOpts) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _MockETHLINKAggregator.contract.Call(opts, &out, \"version\")\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "7184ba8194aa5968323df01a43588a72", "score": "0.59166425", "text": "func (o *GetFlowVersionParams) SetVersionNumber(versionNumber int32) {\n\to.VersionNumber = versionNumber\n}", "title": "" }, { "docid": "6408c253aad5f56d9ab8c73c5b8a2b49", "score": "0.59043133", "text": "func Version() string {\n\treturn \"0.1.0\"\n}", "title": "" }, { "docid": "7f95ef00cf4bd59e948cdd21b9165bdc", "score": "0.5889045", "text": "func Version(c *gin.Context) {\n\tcommon.SuccessString(c,\n\t\tfmt.Sprintf(\"version:%v, platform:%v, buildStamp:%v\",\n\t\t\tconf.ApplicationConfig.Version,\n\t\t\tconf.ApplicationConfig.BuildPlatform,\n\t\t\tconf.ApplicationConfig.BuildStamp))\n}", "title": "" }, { "docid": "eb1940ff5a592d16309c3c3926949141", "score": "0.5887922", "text": "func SetVersion(version string) {\r\n\tconfig.AppVersion = version\r\n}", "title": "" }, { "docid": "77dc73c3d70946cf0a1258486f94d76c", "score": "0.58793813", "text": "func SetVersion(releaseVersion string) {\n\tcurrentVersion = semver.Must(semver.NewVersion(releaseVersion))\n}", "title": "" }, { "docid": "3cbe99ca271e2cd3fd3f814b69b1a805", "score": "0.5877678", "text": "func (rb *TrainedModelConfigBuilder) Version(version VersionString) *TrainedModelConfigBuilder {\n\trb.v.Version = &version\n\treturn rb\n}", "title": "" }, { "docid": "e6b4b7ab8ea6aff144fcb1419c86cc27", "score": "0.5877418", "text": "func (m *ManagedAppStatus) SetVersion(value *string)() {\n m.version = value\n}", "title": "" }, { "docid": "03ba85dd2a26c0a8c402b417e2d0f4d1", "score": "0.58729655", "text": "func (sb *PluginBuilder) Version(version int64) *PluginBuilder {\n\tsb.value.Version = version\n\treturn sb\n}", "title": "" }, { "docid": "32b474755a4d91ed009eadf62e6bf7da", "score": "0.5872343", "text": "func Version() string {\n\treturn \"0.5.3\"\n}", "title": "" }, { "docid": "b6ca32b800a5fd13e46f6bf721fb5af0", "score": "0.58638114", "text": "func Version() string {\n\treturn \"0.3.0\"\n}", "title": "" }, { "docid": "74eafadfb69909eb4f9b703ece6cf3be", "score": "0.58579427", "text": "func (b *OpenAPIMutator) Version(v string) *OpenAPIMutator {\n\tb.proxy.version = v\n\treturn b\n}", "title": "" }, { "docid": "d0858d558437c3d79f167bc65b59a4da", "score": "0.58382404", "text": "func VersionNumber () string {\n return C.GoString((*projInfo).pj.version)\n}", "title": "" }, { "docid": "0fb17e2b1a09dba6775ffa529b5c99d5", "score": "0.5834703", "text": "func (b *NodePoolUpgradePolicyBuilder) Version(value string) *NodePoolUpgradePolicyBuilder {\n\tb.version = value\n\tb.bitmap_ |= 8192\n\treturn b\n}", "title": "" }, { "docid": "d56ef8b65a2caa35d8f2fb2552cda47e", "score": "0.58322954", "text": "func (_MockETHLINKAggregator *MockETHLINKAggregatorCallerSession) Version() (*big.Int, error) {\n\treturn _MockETHLINKAggregator.Contract.Version(&_MockETHLINKAggregator.CallOpts)\n}", "title": "" }, { "docid": "c04f7548733f850c972e1c27e90a03f9", "score": "0.5821195", "text": "func Version() string {\n\treturn \"0.10.1\"\n}", "title": "" }, { "docid": "9066d867f625eb28e9aad5d40909d4d1", "score": "0.58159554", "text": "func (b *UpdateTFServingJobBuilder) Version(version string) *UpdateTFServingJobBuilder {\n\tif version != \"\" {\n\t\tb.args.Version = version\n\t}\n\treturn b\n}", "title": "" }, { "docid": "31aaa39f925296234585fc811459969f", "score": "0.580472", "text": "func (o *GetActionTemplateLogoVersionSpacesParams) SetVersion(version int32) {\n\to.Version = version\n}", "title": "" }, { "docid": "5c9d409447e0c87503e02eda6c484883", "score": "0.5799098", "text": "func Version() string {\n\treturn \"0.2.0\"\n}", "title": "" }, { "docid": "7c4e3ce24c5596fe1599f3d6353333a0", "score": "0.5780777", "text": "func Version(x *data.Version, opts Options) string {\n\treturn formatObject(opts,\n\t\tkv{\"version\", x.GetVersion()},\n\t)\n}", "title": "" }, { "docid": "5ba312a667b13ca58fba0c49f7a9f6f8", "score": "0.5766241", "text": "func Version() string {\n\treturn \"v1.2.0\"\n}", "title": "" }, { "docid": "a9a686c77ff843e2612bb9cf4fb7bf08", "score": "0.5761378", "text": "func (handler *HealthCheckHandler) Version(w http.ResponseWriter, r *http.Request) {\n\tio.WriteString(w, utils.GetConfig().Version)\n}", "title": "" }, { "docid": "fe86ba2933d625f48569c00cb192ac98", "score": "0.575349", "text": "func Version() string {\n\treturn \"3.0.0\"\n}", "title": "" }, { "docid": "2b1f5d31e22458123014431dbfbf00a7", "score": "0.57534176", "text": "func Version(versioner Versioner) Option {\n\treturn func(args *releaser) {\n\t\targs.version = versioner\n\t}\n}", "title": "" }, { "docid": "eb73e6b12d2292516cb0aec73db8a234", "score": "0.57440245", "text": "func Version(cmd *cobra.Command, args []string) {\n\tclientVer := GetClientVersion()\n\n\t//TODO: Support output formats\n\tfmt.Printf(\"%+v\\n\", clientVer)\n}", "title": "" }, { "docid": "244153b65094ee947ed9a5a9aacc879e", "score": "0.57437444", "text": "func Version() string {\n\tif linkVersion == \"\" {\n\t\treturn \"development\"\n\t}\n\n\treturn linkVersion\n}", "title": "" }, { "docid": "6aec247c18cd8331ee0b180d6ad265c1", "score": "0.5735419", "text": "func (_SystemConfig *SystemConfigCaller) Version(opts *bind.CallOpts) (string, error) {\n\tvar out []interface{}\n\terr := _SystemConfig.contract.Call(opts, &out, \"version\")\n\n\tif err != nil {\n\t\treturn *new(string), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(string)).(*string)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "b49ef83e5d82d6b6f38ff71872741c94", "score": "0.57075715", "text": "func BuildVersion(buildVersion string) Option {\n\treturn func(o *Options) {\n\t\to.BuildVersion = buildVersion\n\t}\n}", "title": "" }, { "docid": "8b562d163aa765d33dbb4e82b07508ea", "score": "0.5707111", "text": "func Version(buildVer, buildDate, commitHash string) Option {\n\treturn func(o *Options) {\n\t\tBuildVersion = buildVer\n\t\tBuildDate = buildDate\n\t\tCommitHash = commitHash\n\t}\n}", "title": "" }, { "docid": "7f0722038f83728e73f1cc2e6a628d1d", "score": "0.5700526", "text": "func BuildVersion() string {\n\treturn buildVersion\n}", "title": "" }, { "docid": "1ab0e66160f54fe5c76536e44fc9b82b", "score": "0.5700464", "text": "func (c *CommonController) Version(e echo.Context) error {\n\trequest := e.Request()\n\twriter := e.Response()\n\tvar response interface{}\n\tif c.version.sdkVersion != \"\" {\n\t\tresponse = commonDTO.NewVersionSdkResponse(c.version.serviceVersion, c.version.sdkVersion, c.serviceName)\n\t} else {\n\t\tresponse = commonDTO.NewVersionResponse(c.version.serviceVersion, c.serviceName)\n\t}\n\treturn utils.SendJsonResp(c.lc, writer, request, response, http.StatusOK)\n}", "title": "" }, { "docid": "eddeeed4f8ca4a49e047b88ada34d2d5", "score": "0.5697734", "text": "func (this *VCache) getVersionNum() string {\n\tversionNum, _ := get(this.GetKey(this.versionKey))\n\tif versionNum == \"\" {\n\t\tversionNum = \"0\"\n\t}\n\treturn versionNum\n}", "title": "" }, { "docid": "92cda46624041a513ef5f739e8c0819d", "score": "0.5695412", "text": "func (o *GetActionTemplateVersion1Params) SetVersion(version int32) {\n\to.Version = version\n}", "title": "" }, { "docid": "e024f91ab574f624fca83b4506467e6a", "score": "0.5694915", "text": "func Version() string {\n\treturn \"0.2\"\n}", "title": "" }, { "docid": "586e09b203e5b6dead9fd77da508a6f4", "score": "0.56901747", "text": "func Version() string {\n\treturn \"0.8.0\"\n}", "title": "" }, { "docid": "bd9e92bc87712a4ee4cc0f9f8e3c672b", "score": "0.56869054", "text": "func Version() error {\n\tfmt.Println(\"v\" + applicationVersion)\n\treturn nil\n}", "title": "" }, { "docid": "e2467d958cb15ba4ea989649ca639532", "score": "0.5677284", "text": "func (c *Check) Version(w http.ResponseWriter, r *http.Request) {\n\n\tctx := r.Context()\n\n\thealth := struct {\n\t\tBuild string `json:\"build\"`\n\t\tVersion string `json:\"version\"`\n\t}{\n\t\tBuild: c.build,\n\t\tVersion: c.version,\n\t}\n\n\tRespond(ctx, w, health, http.StatusOK)\n\treturn\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.5656145", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "1e2f4958ca71f421bf46b9956780ec09", "score": "0.56501603", "text": "func (c *FusemlClient) Version() error {\n\tlog := c.Log.WithName(\"version\")\n\tlog.Info(\"start\")\n\tdefer log.Info(\"return\")\n\n\tversion := version.GetInfo()\n\n\tc.ui.Success().\n\t\tWithStringValue(\"Version\", version.Version).\n\t\tWithStringValue(\"GitCommit\", version.GitCommit).\n\t\tWithStringValue(\"Build Date\", version.BuildDate).\n\t\tWithStringValue(\"Go Version\", version.GoVersion).\n\t\tWithStringValue(\"Compiler\", version.Compiler).\n\t\tWithStringValue(\"Platform\", version.Platform).\n\t\tMsg(\"Fuseml Installer\")\n\n\treturn nil\n}", "title": "" }, { "docid": "e4b87255c7c1a14da54fcfc0550b150d", "score": "0.5649659", "text": "func Version() string {\n\treturn \"0.12.1\"\n}", "title": "" }, { "docid": "8ea1ea801160f57531b3ea17f1fa7cb7", "score": "0.5646456", "text": "func (service *AvaxAPI) Version(r *http.Request, args *struct{}, reply *VersionReply) error {\n\treply.Version = Version\n\treturn nil\n}", "title": "" }, { "docid": "fa0e18bb42e14448cba2c94c24612466", "score": "0.56317055", "text": "func (op *GetClickwrapVersionAgreementsOp) PageNumber(val string) *GetClickwrapVersionAgreementsOp {\n\tif op != nil {\n\t\top.QueryOpts.Set(\"page_number\", val)\n\t}\n\treturn op\n}", "title": "" }, { "docid": "f318cbb0da717d7985a1dbf56a659124", "score": "0.5626058", "text": "func Version() string {\n\treturn version.Version\n}", "title": "" }, { "docid": "ca4587aee16bb1f62e5d84772f6947f3", "score": "0.5624231", "text": "func VersionNumber(b []byte) int {\n\treturn int(b[5] & 0x3E >> 1)\n}", "title": "" }, { "docid": "056cd0d40a5e5869b07f615044c9090b", "score": "0.5613213", "text": "func (_MockETHLINKAggregator *MockETHLINKAggregatorSession) Version() (*big.Int, error) {\n\treturn _MockETHLINKAggregator.Contract.Version(&_MockETHLINKAggregator.CallOpts)\n}", "title": "" }, { "docid": "9c37105519ee21b0d68e48fadfb12335", "score": "0.56104565", "text": "func Version() string {\n\tif build.Version == \"\" {\n\t\treturn \"v0.0.0-unknown\"\n\t}\n\treturn build.Version\n}", "title": "" }, { "docid": "38604c95bdf61f84660cf2d2572071ca", "score": "0.5610355", "text": "func Version(config map[string]interface{}) string {\n\tversion, ok := config[versionField]\n\tif !ok {\n\t\treturn defaultVersion\n\t}\n\treturn normalizeVersion(fmt.Sprintf(\"%v\", version))\n}", "title": "" }, { "docid": "df171ccadb410c453d89762255a2836e", "score": "0.5609027", "text": "func (_Governance *GovernanceCallerSession) GetVersionNumber() (*big.Int, *big.Int, *big.Int, *big.Int, error) {\n\treturn _Governance.Contract.GetVersionNumber(&_Governance.CallOpts)\n}", "title": "" }, { "docid": "34a0e7031dcccf2690e3ec4e80e07b56", "score": "0.5600885", "text": "func Version() string {\n\treturn \"0.5.0-alpha\"\n}", "title": "" }, { "docid": "a632ae4ffc5a63af26fd56490f90d9a5", "score": "0.55956286", "text": "func Version() string {\n\treturn build.Version\n}", "title": "" }, { "docid": "9844e7476b8f25a6b38719000005f6c7", "score": "0.55949837", "text": "func Version(v string) Option {\n\treturn func(o *Options) {\n\t\to.Version = v\n\t}\n}", "title": "" }, { "docid": "9844e7476b8f25a6b38719000005f6c7", "score": "0.55949837", "text": "func Version(v string) Option {\n\treturn func(o *Options) {\n\t\to.Version = v\n\t}\n}", "title": "" }, { "docid": "f32489a3fe131954b973bd3fc93ac1ce", "score": "0.55942386", "text": "func Version() string {\n\treturn \"0.102.8\"\n}", "title": "" }, { "docid": "e503a34ac5ffd1695af058cd350d5b8f", "score": "0.5593507", "text": "func (o *ViewNotebookVersion) GetVersionNumber() int32 {\n\tif o == nil || o.VersionNumber == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.VersionNumber\n}", "title": "" }, { "docid": "59d23ea32d163f01d2bdda7bd08b201f", "score": "0.5593437", "text": "func (app *BaseApp) SetVersion(v string) {\n\tif app.sealed {\n\t\tpanic(\"SetVersion() on sealed BaseApp\")\n\t}\n\tapp.version = v\n}", "title": "" } ]
47436d1595987042a2dad75fa641c02c
decodeSamples2 decodes the samples of a Layer II frame.
[ { "docid": "bb876c049b1e3d14270d62e39cc85db9", "score": "0.78423935", "text": "func (d *Decoder) decodeSamples2() error {\n\tfor gr := 0; gr < 12; gr++ {\n\t\tfor sb := 0; sb < 32; sb++ {\n\t\t\tnch := d.nChannels\n\t\t\tif sb >= d.bound {\n\t\t\t\tnch = 1\n\t\t\t}\n\n\t\t\tfor ch := 0; ch < nch; ch++ {\n\t\t\t\tif alloc := d.allocation[ch][sb]; alloc > 0 {\n\t\t\t\t\tfor s := 0; s < 3; s++ {\n\t\t\t\t\t\tsample, err := d.stream.readBits(alloc)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn err\n\t\t\t\t\t\t}\n\t\t\t\t\t\td.sample[ch][32*(3*gr+s)+sb] = float32(sample)\n\t\t\t\t\t}\n\t\t\t\t} else if alloc < 0 {\n\t\t\t\t\tsample, err := d.stream.readBits(-alloc)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t\tnLevels := levelsPerGroupedSample[-alloc]\n\t\t\t\t\td.sample[ch][32*(3*gr+0)+sb] = float32(sample % nLevels)\n\t\t\t\t\tsample /= nLevels\n\t\t\t\t\td.sample[ch][32*(3*gr+1)+sb] = float32(sample % nLevels)\n\t\t\t\t\td.sample[ch][32*(3*gr+2)+sb] = float32(sample / nLevels)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfor sb := d.bound; sb < 32; sb++ {\n\t\t\td.sample[1][32*(3*gr+0)+sb] = d.sample[0][32*(3*gr+0)+sb]\n\t\t\td.sample[1][32*(3*gr+1)+sb] = d.sample[0][32*(3*gr+1)+sb]\n\t\t\td.sample[1][32*(3*gr+2)+sb] = d.sample[0][32*(3*gr+2)+sb]\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" } ]
[ { "docid": "92e0472d41aaba4cbce0c8b04314f53b", "score": "0.69333375", "text": "func (d *Decoder) decodeSamples1() error {\n\tfor s := 0; s < 12; s++ {\n\t\tfor sb := 0; sb < 32; sb++ {\n\t\t\tnch := d.nChannels\n\t\t\tif sb >= d.bound {\n\t\t\t\tnch = 1\n\t\t\t}\n\n\t\t\tfor ch := 0; ch < nch; ch++ {\n\t\t\t\tif d.allocation[ch][sb] != 0 {\n\t\t\t\t\tsample, err := d.stream.readBits(d.allocation[ch][sb])\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t\td.sample[ch][32*s+sb] = float32(sample)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfor sb := d.bound; sb < 32; sb++ {\n\t\t\td.sample[1][32*s+sb] = d.sample[0][32*s+sb]\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d3c81b8f70820ade4c3b0e08fd85cd16", "score": "0.6756634", "text": "func (d *Decoder) decodeFrame2() error {\n\tif d.mode == ModeJointStereo {\n\t\td.bound = 4 * (d.modeExtension + 1)\n\t} else {\n\t\td.bound = 32\n\t}\n\n\tif err := d.decodeAllocation2(); err != nil {\n\t\treturn err\n\t}\n\n\tif err := d.decodeScalefactorSelectionInformation2(); err != nil {\n\t\treturn err\n\t}\n\n\tif err := d.decodeScalefactors2(); err != nil {\n\t\treturn err\n\t}\n\n\tif err := d.decodeSamples2(); err != nil {\n\t\treturn err\n\t}\n\n\td.dequantize12()\n\n\treturn nil\n}", "title": "" }, { "docid": "1d673835bbf1cc471cb2e1cca804fb5d", "score": "0.56262696", "text": "func (d *intRLV2Decoder) decode(in BufferedReader) error {\n\t// header from MSB to LSB\n\tfirstByte, err := in.ReadByte()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsub := firstByte >> 6\n\tswitch sub {\n\tcase Encoding_SHORT_REPEAT:\n\t\theader := firstByte\n\t\twidth := 1 + (header>>3)&0x07 // width 3bit at position 3\n\t\trepeatCount := int(3 + (header & 0x07))\n\t\tlogger.Tracef(\"decoding: int rl v2 Short Repeat of count %d\", repeatCount)\n\n\t\tvar v uint64\n\t\tfor i := width; i > 0; { // big endian\n\t\t\ti--\n\t\t\tb, err := in.ReadByte()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tv |= uint64(b) << (8 * i)\n\t\t}\n\n\t\tfor i := 0; i < repeatCount; i++ {\n\t\t\td.uvs = append(d.uvs, v)\n\t\t}\n\n\tcase Encoding_DIRECT: // numbers encoding in big-endian\n\t\tb1, err := in.ReadByte()\n\t\tif err != nil {\n\t\t\treturn errors.WithStack(err)\n\t\t}\n\t\theader := uint16(firstByte)<<8 | uint16(b1) // 2 byte header\n\t\tw := (header >> 9) & 0x1F // width 5bits, bit 3 to 8\n\t\twidth, err := widthDecoding(byte(w), false)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tlength := int(header&0x1FF + 1)\n\t\tlogger.Tracef(\"decoding: int rl v2 Direct width %d length %d\", width, length)\n\n\t\td.forgetBits()\n\t\tfor i := 0; i < length; i++ {\n\t\t\tv, err := d.readBits(in, int(width))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\td.uvs = append(d.uvs, v)\n\t\t}\n\n\tcase Encoding_PATCHED_BASE:\n\t\t// rethink: according to base value is a signed smallest value, patch should always signed?\n\t\tif !d.signed {\n\t\t\treturn errors.New(\"decoding: int rl v2 patch signed setting should not false\")\n\t\t}\n\n\t\tif err = d.readPatched(in, firstByte); err != nil {\n\t\t\treturn err\n\t\t}\n\n\tcase Encoding_DELTA:\n\t\t// header: 2 bytes, base value: varint, delta base: signed varint\n\t\theader := make([]byte, 2)\n\t\theader[0] = firstByte\n\t\tif header[1], err = in.ReadByte(); err != nil {\n\t\t\treturn errors.WithStack(err)\n\t\t}\n\t\twidth, err := widthDecoding(header[0]>>1&0x1f, true)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tlength := int(header[0])&0x01<<8 | int(header[1]) + 1\n\n\t\tlogger.Tracef(\"decoding: irl v2 Delta length %d, width %d\", length, width)\n\n\t\tvar ubase uint64\n\t\tvar base int64\n\t\tif d.signed {\n\t\t\tbase, err = binary.ReadVarint(in)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\t\t\tubase = Zigzag(base)\n\t\t} else {\n\t\t\tubase, err = binary.ReadUvarint(in)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\t\t}\n\t\td.uvs = append(d.uvs, ubase)\n\n\t\tdeltaBase, err := binary.ReadVarint(in)\n\t\tif err != nil {\n\t\t\treturn errors.WithStack(err)\n\t\t}\n\n\t\tif d.signed {\n\t\t\td.uvs = append(d.uvs, Zigzag(base+deltaBase))\n\t\t} else {\n\t\t\tif deltaBase >= 0 {\n\t\t\t\td.uvs = append(d.uvs, ubase+uint64(deltaBase))\n\t\t\t} else {\n\t\t\t\td.uvs = append(d.uvs, ubase-uint64(-deltaBase))\n\t\t\t}\n\t\t}\n\n\t\t// delta values: W * (L-2)\n\t\td.forgetBits()\n\t\tfor i := 2; i < length; i++ {\n\t\t\tif width == 0 { //fixed delta\n\t\t\t\tif d.signed {\n\t\t\t\t\td.uvs = append(d.uvs, Zigzag(base+deltaBase))\n\t\t\t\t} else {\n\t\t\t\t\tif deltaBase >= 0 {\n\t\t\t\t\t\td.uvs = append(d.uvs, ubase+uint64(deltaBase))\n\t\t\t\t\t} else {\n\t\t\t\t\t\td.uvs = append(d.uvs, ubase-uint64(-deltaBase))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tdelta, err := d.readBits(in, int(width))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tif d.signed {\n\t\t\t\t\tprev := UnZigzag(d.uvs[len(d.uvs)-1])\n\t\t\t\t\tif deltaBase >= 0 {\n\t\t\t\t\t\td.uvs = append(d.uvs, Zigzag(prev+int64(delta)))\n\t\t\t\t\t} else {\n\t\t\t\t\t\td.uvs = append(d.uvs, Zigzag(prev-int64(delta)))\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tprev := d.uvs[len(d.uvs)-1]\n\t\t\t\t\tif deltaBase >= 0 {\n\t\t\t\t\t\td.uvs = append(d.uvs, prev+delta)\n\t\t\t\t\t} else {\n\t\t\t\t\t\td.uvs = append(d.uvs, prev-delta)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\tdefault:\n\t\treturn errors.Errorf(\"decoding: int rl v2 encoding sub %d not recognized\", sub)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "eaf205978980b34e3f8e2eda2bd4892f", "score": "0.55262387", "text": "func decodeUnicam(audioDataUnicam []byte, sampleSizeBits int) *[]int16 {\n var numBlocks int\n var blockOffset int\n var blockCount int\n var shiftValues byte\n var shift byte\n var peakShift byte\n var sample int16\n var sourceIndex int\n var compressedSampleBitShift uint = 0\n \n // Work out how much audio data is present\n for x := 0; x < len(audioDataUnicam) * 8; x += SAMPLES_PER_UNICAM_BLOCK * sampleSizeBits + UNICAM_CODED_SHIFT_SIZE_BITS {\n numBlocks++;\n }\n \n // Allocate space\n audio := make([]int16, numBlocks * SAMPLES_PER_UNICAM_BLOCK)\n \n log.Printf(\"UNICAM: %d byte(s) containing %d block(s), expanding to a total of %d samples(s) of uncompressed audio.\\n\", len(audioDataUnicam), numBlocks, len(audio))\n \n // Decode the blocks\n for blockCount < numBlocks { \n // Get the compressed values\n for x := 0; x < SAMPLES_PER_UNICAM_BLOCK; x++ {\n if sampleSizeBits != 8 {\n // Have to juggle bits to unpack 10-bit samples\n // uint(0xFF) here to avoid sign extension, not sure if it's required\n sample = int16(((audioDataUnicam[sourceIndex]) & byte((uint(0xFF) >> compressedSampleBitShift)))) << (compressedSampleBitShift + (uint(sampleSizeBits) - 8))\n //log.Printf(\"UNICAM block %d:%02d, partial unpacked value %d (0x%x), from initial input value 0x%x.\\n\", blockCount, x, sample, sample, audioDataUnicam[sourceIndex])\n sourceIndex++\n sample |= int16(audioDataUnicam[sourceIndex] >> (8 - (compressedSampleBitShift + uint(sampleSizeBits) - 8))) \n audio[blockOffset + x] = sample\n //log.Printf(\"UNICAM block %d:%02d, unpacked value %d (0x%x) with a bit of the next input value 0x%x.\\n\", blockCount, x, sample, sample, audioDataUnicam[sourceIndex])\n compressedSampleBitShift += uint(sampleSizeBits) - 8;\n if (compressedSampleBitShift >= 8) {\n compressedSampleBitShift = 0;\n sourceIndex++\n }\n } else {\n // Do it the easy way for 8 bit compression\n audio[blockOffset + x] = int16(audioDataUnicam[sourceIndex])\n sourceIndex++\n }\n }\n \n // Get the shift value\n if (blockCount % 2 == 0) {\n // Even block\n shiftValues = audioDataUnicam[sourceIndex] \n sourceIndex++\n shift = shiftValues >> 4\n } else {\n shift = shiftValues & 0x0F\n }\n \n if shift > peakShift {\n peakShift = shift\n }\n \n //log.Printf(\"UNICAM block %d, shift value %d.\\n\", blockCount, shift)\n // Shift the values to uncompress them\n for x := 0; x < SAMPLES_PER_UNICAM_BLOCK; x++ {\n // Check if the top bit is set and, if so, sign extend\n sample = audio[blockOffset + x]\n if sample & (1 << (uint(sampleSizeBits) - 1)) != 0 {\n for y := uint(sampleSizeBits); y < uint(URTP_SAMPLE_SIZE) * 8; y++ {\n sample |= (1 << y)\n }\n }\n audio[blockOffset + x] = sample << shift\n \n //log.Printf(\"UNICAM block %d:%02d, compressed value %d (0x%x) becomes %d (0x%x).\\n\",\n // blockCount, x, sample, sample, audio[blockOffset + x], audio[blockOffset + x])\n }\n \n blockOffset += SAMPLES_PER_UNICAM_BLOCK\n blockCount++\n }\n log.Printf(\"UNICAM highest shift value was %d.\\n\", peakShift)\n \n return &audio \n}", "title": "" }, { "docid": "f2bf8871445392dce285f71746975062", "score": "0.54394734", "text": "func (d *Decoder) decodeScalefactorSelectionInformation2() error {\n\tfor sb := 0; sb < 32; sb++ {\n\t\tfor ch := 0; ch < d.nChannels; ch++ {\n\t\t\tif d.allocation[ch][sb] != 0 {\n\t\t\t\tscfsi, err := d.stream.readBits(2)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\td.scfsi2[ch][sb] = scfsi\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3a02799cce571c4e0ff7e1dab9f1f4f5", "score": "0.5347484", "text": "func decode() {\n\tvar (\n\t\tictx *gmf.FmtCtx\n\t\tist *gmf.Stream\n\t\tpkt *gmf.Packet\n\t\tframes []*gmf.Frame\n\t\terr error\n\t)\n\n\tif ictx, err = gmf.NewInputCtx(input); err != nil {\n\t\tlog.Fatalf(\"Error creating context - %s\\n\", err)\n\t}\n\tdefer ictx.Free()\n\n\tfor {\n\t\tif pkt, err = ictx.GetNextPacket(); err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t} else {\n\t\t\t\tlog.Fatalln(pkt, err)\n\t\t\t}\n\t\t}\n\n\t\tist, err = ictx.GetStream(pkt.StreamIndex())\n\t\tif err != nil {\n\t\t\tlog.Fatalln(err)\n\t\t}\n\n\t\tif frames, err = ist.CodecCtx().Decode(pkt); err != nil {\n\t\t\tlog.Fatalln(err)\n\t\t}\n\n\t\tfor i, _ := range frames {\n\t\t\tframes[i].Free()\n\t\t}\n\n\t\tpkt.Free()\n\t}\n\n\tif frames, err = ist.CodecCtx().Decode(nil); err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\tfor i, _ := range frames {\n\t\tframes[i].Free()\n\t}\n\n\tist.CodecCtx().Free()\n\tist.Free()\n\n\tframes = nil\n}", "title": "" }, { "docid": "b5642393bd17fed4bc0ab1eb421a372f", "score": "0.53353393", "text": "func (d *Decoder) decodeFrame1() error {\n\tif d.mode == ModeJointStereo {\n\t\td.bound = 4 * (d.modeExtension + 1)\n\t} else {\n\t\td.bound = 32\n\t}\n\n\tif err := d.decodeAllocation1(); err != nil {\n\t\treturn err\n\t}\n\n\tif err := d.decodeScalefactors1(); err != nil {\n\t\treturn err\n\t}\n\n\tif err := d.decodeSamples1(); err != nil {\n\t\treturn err\n\t}\n\n\td.dequantize12()\n\n\treturn nil\n}", "title": "" }, { "docid": "e81d77ac476dd4721317d4e41f17efd9", "score": "0.53244287", "text": "func decodeSample() {\n\t// text := []byte{0xe6, 0xe5, 0x56, 0xdf, 0xc7, 0xd9, 0xe0,\n\t// \t0xd9, 0xef, 0x48, 0xdf, 0xcc, 0xd4}\n\n}", "title": "" }, { "docid": "391a38afdbc95e32cf546eb1c3f03cba", "score": "0.5301071", "text": "func (d *Decoder) NSamples() int {\n\tif d.layer == 1 {\n\t\treturn 384\n\t} else {\n\t\treturn 1152\n\t}\n}", "title": "" }, { "docid": "8241983e396c1d4c7b9ebf97f7c8f077", "score": "0.5244802", "text": "func (d *Decoder) decodeScalefactors2() error {\n\tfor sb := 0; sb < 32; sb++ {\n\t\tfor ch := 0; ch < d.nChannels; ch++ {\n\t\t\tif d.allocation[ch][sb] != 0 {\n\t\t\t\tsf, err := d.stream.readBits(6)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\td.scalefactor12[ch][sb][0] = sf\n\n\t\t\t\tif d.scfsi2[ch][sb] == 0 || d.scfsi2[ch][sb] == 3 {\n\t\t\t\t\tif sf, err = d.stream.readBits(6); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\td.scalefactor12[ch][sb][1] = sf\n\n\t\t\t\tif d.scfsi2[ch][sb] <= 1 {\n\t\t\t\t\tif sf, err = d.stream.readBits(6); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\td.scalefactor12[ch][sb][2] = sf\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "10cc63a1a6bf710bddf696c5315cf68b", "score": "0.52220714", "text": "func Part2(height, width int, fileName string) Img {\n\timg := loadImg(height, width, fileName)\n\tdecoded := newImg(1, height, width)\n\tonlyLayer := decoded[0]\n\tfor h := range onlyLayer {\n\t\tfor w := range onlyLayer[h] {\n\t\t\tpixel, err := findFirstNonTransparent(h, w, img)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\tonlyLayer[h][w] = pixel\n\t\t}\n\t}\n\tdecoded.readableDisplay(false)\n\treturn decoded\n}", "title": "" }, { "docid": "f3aae9edada112beb63863fac4c65f0e", "score": "0.5199221", "text": "func (codec *codec2) DecodedLen(n int) int {\n\tvar (\n\t\tsamples = codec.mode.SamplesPerFrame()\n\t\tbytes = codec.mode.BytesPerFrame()\n\t)\n\tif n == 0 || n%bytes != 0 {\n\t\treturn 0\n\t}\n\treturn (n * samples) / bytes\n}", "title": "" }, { "docid": "ed04bbea421300558f2e79bc21d73c26", "score": "0.51697356", "text": "func DecodeList2Response(decoder func(*http.Response) goahttp.Decoder, restoreBody bool) func(*http.Response) (interface{}, error) {\n\treturn func(resp *http.Response) (interface{}, error) {\n\t\tif restoreBody {\n\t\t\tb, err := io.ReadAll(resp.Body)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tresp.Body = io.NopCloser(bytes.NewBuffer(b))\n\t\t\tdefer func() {\n\t\t\t\tresp.Body = io.NopCloser(bytes.NewBuffer(b))\n\t\t\t}()\n\t\t} else {\n\t\t\tdefer resp.Body.Close()\n\t\t}\n\t\tswitch resp.StatusCode {\n\t\tcase http.StatusOK:\n\t\t\tvar (\n\t\t\t\tbody List2ResponseBody\n\t\t\t\terr error\n\t\t\t)\n\t\t\terr = decoder(resp).Decode(&body)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, goahttp.ErrDecodingError(\"demo\", \"list2\", err)\n\t\t\t}\n\t\t\terr = ValidateList2ResponseBody(&body)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, goahttp.ErrValidationError(\"demo\", \"list2\", err)\n\t\t\t}\n\t\t\tres := NewList2ResultOK(&body)\n\t\t\treturn res, nil\n\t\tdefault:\n\t\t\tbody, _ := io.ReadAll(resp.Body)\n\t\t\treturn nil, goahttp.ErrInvalidResponse(\"demo\", \"list2\", resp.StatusCode, string(body))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3663f6ccaf7b47869a76febde025ed08", "score": "0.5166795", "text": "func (ctx *CodecContext) AVCodecDecodeSubtitle2(s *Subtitle, g *int, a *Packet) int {\n\treturn int(C.avcodec_decode_subtitle2((*C.struct_AVCodecContext)(ctx), (*C.struct_AVSubtitle)(s), (*C.int)(unsafe.Pointer(g)), (*C.struct_AVPacket)(a)))\n}", "title": "" }, { "docid": "d7f72b045298e507a31ef8d87f193d31", "score": "0.50759995", "text": "func (conn *connV2) readFrames() {\n\tfor {\n\n\t\t// This is the mechanism for handling too many benign errors.\n\t\t// By default MaxBenignErrors is 0, which ignores errors.\n\t\tif conn.numBenignErrors > MaxBenignErrors && MaxBenignErrors > 0 {\n\t\t\tlog.Println(\"Warning: Too many invalid stream IDs received. Ending connection.\")\n\t\t\tconn.protocolError(0)\n\t\t\treturn\n\t\t}\n\n\t\t// ReadFrame takes care of the frame parsing for us.\n\t\tconn.refreshReadTimeout()\n\t\tframe, err := readFrameV2(conn.buf)\n\t\tif err != nil {\n\t\t\tconn.handleReadWriteError(err)\n\t\t\treturn\n\t\t}\n\n\t\t// Print frame type.\n\t\tdebug.Printf(\"Receiving %s:\\n\", frame.Name())\n\n\t\t// Decompress the frame's headers, if there are any.\n\t\terr = frame.Decompress(conn.decompressor)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Error in decompression: %v (%T).\\n\", err, frame)\n\t\t\tconn.protocolError(0)\n\t\t\treturn\n\t\t}\n\n\t\t// Print frame once the content's been decompressed.\n\t\tdebug.Println(frame)\n\n\t\t// This is the main frame handling.\n\t\tif conn.processFrame(frame) {\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "74345e1aa3d9362dd97948f95191980a", "score": "0.5064447", "text": "func (d *Decoder) decodeAllocation2() error {\n\taTab := allocationTables[d.nChannels-1][d.samplingFreq][d.bitrateIndex]\n\tif aTab == nil {\n\t\treturn MalformedStream(\"illegal combination of bitrate and mode\")\n\t}\n\n\tfor sb := 0; sb < 32; sb++ {\n\t\tnch := d.nChannels\n\t\tif sb >= d.bound {\n\t\t\tnch = 1\n\t\t}\n\n\t\tfor ch := 0; ch < nch; ch++ {\n\t\t\tindex, err := d.stream.readBits(aTab[sb].nbal)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\td.allocation[ch][sb] = int(aTab[sb].bits[index])\n\t\t}\n\n\t}\n\tfor sb := d.bound; sb < 32; sb++ {\n\t\td.allocation[1][sb] = d.allocation[0][sb]\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7d935bc507df0cded206d628cffd8174", "score": "0.5053343", "text": "func (d *Decoder) decodeFrame3() error {\n\tif err := d.decodeSideInformation3(); err != nil {\n\t\treturn err\n\t}\n\n\tif err := d.updateReservoir3(); err != nil {\n\t\treturn err\n\t}\n\n\t// If window_switching_flag == 1 and block_type == 0, we only report the\n\t// error after reading the side information through and updating the bit\n\t// reservoir, so the decoder is more likely to stay in sync.\n\tfor gr := 0; gr < 2; gr++ {\n\t\tfor ch := 0; ch < d.nChannels; ch++ {\n\t\t\tif d.windowSwitchingFlag[gr][ch] == 1 && d.blockType[gr][ch] == 0 {\n\t\t\t\treturn MalformedStream(\"block_type == 0\")\n\t\t\t}\n\t\t}\n\t}\n\n\tif err := d.decodeMainData3(); err != nil {\n\t\treturn err\n\t}\n\n\t// Parsing done, now do the math:\n\td.dequantize3()\n\td.stereo3()\n\td.reorder3()\n\td.antialias3()\n\td.imdctFilter3()\n\n\treturn nil\n}", "title": "" }, { "docid": "603b31d93dda7839089dc25c9453c822", "score": "0.5048779", "text": "func (d *Decoder) Samples(rec []byte, samples []RefSample) ([]RefSample, error) {\n\tdec := encoding.Decbuf{B: rec}\n\n\tif Type(dec.Byte()) != Samples {\n\t\treturn nil, errors.New(\"invalid record type\")\n\t}\n\tif dec.Len() == 0 {\n\t\treturn samples, nil\n\t}\n\tvar (\n\t\tbaseRef = dec.Be64()\n\t\tbaseTime = dec.Be64int64()\n\t)\n\tfor len(dec.B) > 0 && dec.Err() == nil {\n\t\tdref := dec.Varint64()\n\t\tdtime := dec.Varint64()\n\t\tval := dec.Be64()\n\n\t\tsamples = append(samples, RefSample{\n\t\t\tRef: chunks.HeadSeriesRef(int64(baseRef) + dref),\n\t\t\tT: baseTime + dtime,\n\t\t\tV: math.Float64frombits(val),\n\t\t})\n\t}\n\n\tif dec.Err() != nil {\n\t\treturn nil, errors.Wrapf(dec.Err(), \"decode error after %d samples\", len(samples))\n\t}\n\tif len(dec.B) > 0 {\n\t\treturn nil, errors.Errorf(\"unexpected %d bytes left in entry\", len(dec.B))\n\t}\n\treturn samples, nil\n}", "title": "" }, { "docid": "f33a75c66af0db8151dadc08510ac607", "score": "0.5032242", "text": "func (d *Decoder) decodeSideInformation3() error {\n\tvar err error\n\n\tif d.mainDataBegin, err = d.stream.readBits(9); err != nil {\n\t\treturn err\n\t}\n\n\t// private_bits (ignored)\n\tif d.mode == ModeMono {\n\t\t_, err = d.stream.readBits(5)\n\t} else {\n\t\t_, err = d.stream.readBits(3)\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor ch := 0; ch < d.nChannels; ch++ {\n\t\tfor scfsiBand := 0; scfsiBand < 4; scfsiBand++ {\n\t\t\tif d.scfsi3[ch][scfsiBand], err = d.stream.readBits(1); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tfor gr := 0; gr < 2; gr++ {\n\t\tfor ch := 0; ch < d.nChannels; ch++ {\n\t\t\td.part23Length[gr][ch], err = d.stream.readBits(12)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\td.bigValues[gr][ch], err = d.stream.readBits(9)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\td.globalGain[gr][ch], err = d.stream.readBits(8)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\td.scalefacCompress[gr][ch], err = d.stream.readBits(4)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\td.windowSwitchingFlag[gr][ch], err = d.stream.readBits(1)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif d.windowSwitchingFlag[gr][ch] == 1 {\n\t\t\t\td.blockType[gr][ch], err = d.stream.readBits(2)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\td.mixedBlockFlag[gr][ch], err = d.stream.readBits(1)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\t// We don't set region0_count and region1_count to their default\n\t\t\t\t// values here. Instead, we take window_switching_flag into\n\t\t\t\t// account when decoding the Huffman data.\n\n\t\t\t\tfor region := 0; region < 2; region++ {\n\t\t\t\t\td.tableSelect[gr][ch][region], err = d.stream.readBits(5)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tfor window := 0; window < 3; window++ {\n\t\t\t\t\td.subblockGain[gr][ch][window], err = d.stream.readBits(3)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\td.blockType[gr][ch] = 0\n\n\t\t\t\tfor region := 0; region < 3; region++ {\n\t\t\t\t\td.tableSelect[gr][ch][region], err = d.stream.readBits(5)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\td.region0Count[gr][ch], err = d.stream.readBits(4)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\td.region1Count[gr][ch], err = d.stream.readBits(3)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\n\t\t\td.preflag[gr][ch], err = d.stream.readBits(1)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\td.scalefacScale[gr][ch], err = d.stream.readBits(1)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\td.count1TableSelect[gr][ch], err = d.stream.readBits(1)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4963c42aa3e4e0f0bfde2bdb720d6a86", "score": "0.49806124", "text": "func DecodeUcs2(octets []byte) (str string, err error) {\n\tif len(octets)%2 != 0 {\n\t\terr = errors.New(\"DecodeUcs2: Uneven number of octets\")\n\t\treturn\n\t}\n\tbuf := make([]uint16, 0, len(octets)/2)\n\tfor i := 0; i < len(octets); i += 2 {\n\t\tbuf = append(buf, uint16(octets[i])<<8|uint16(octets[i+1]))\n\t}\n\trunes := utf16.Decode(buf)\n\treturn string(runes), nil\n}", "title": "" }, { "docid": "92b2142b75f77457963329428090a3da", "score": "0.4969849", "text": "func GenLayer2(hex string) Layer2{\n\tl2 := Layer2{}\n\tinfo := new(LayerInfo)\n\tinfo.Start = 0\n\n\t//Destination Address\n\t//first 9 chars are just line numbers and spacing, so skip them.\n\tstr := hex[0:2]\n\tdec := HexToDec(str)\n\tl2.DestType = dec\n\n\t// # 0's\n\tstr = hex[2:4]\n\tdec = HexToDec(str)\n\tl2.PadZeros = dec\n\n\t// # Blocks\n\tstr = hex[4:6]\n\tdec = HexToDec(str)\n\tl2.NumBlocks = dec\n\n\t// CRC\n\tl2.Crc = hex[6:10]\n\n\tinfo.End = 10\n\tinfo.Size = 10 // 10 bytes = 2 bytes + 2 + 2 + 4\n\tl2.Info = info\n\treturn l2\n}", "title": "" }, { "docid": "1340066f90949b32f1e2eb054e7da592", "score": "0.49307647", "text": "func (r *Reader) convert(samples *[2][1152]float32) {\n\tnSamples := r.Decoder.NSamples()\n\tnChannels := 2\n\tif r.Mono {\n\t\tnChannels = 1\n\t}\n\n\tformat := formatDescriptions[r.Format]\n\toffset := float32(1)\n\tif format.signed {\n\t\toffset = 0\n\t}\n\tmultiplier := float32(int(1) << uint(format.bits-1))\n\tmax := (1 + offset) * multiplier\n\tle := format.le\n\tsize := format.size\n\tjump := size\n\tif !r.Mono {\n\t\tjump *= 2\n\t}\n\n\tfor outCh := 0; outCh < nChannels; outCh++ {\n\t\tinCh := outCh\n\t\tif r.Swap {\n\t\t\tinCh = 1 - outCh\n\t\t}\n\t\tptr := outCh * size\n\n\t\tfor t := 0; t < nSamples; t++ {\n\t\t\ts := (samples[inCh][t] + offset) * multiplier\n\t\t\tif s >= max {\n\t\t\t\ts--\n\t\t\t}\n\t\t\tvar si int\n\t\t\tif s < 0 {\n\t\t\t\tsi = int(s - 0.5)\n\t\t\t} else {\n\t\t\t\tsi = int(s + 0.5)\n\t\t\t}\n\t\t\tif le {\n\t\t\t\tfor i := 0; i < size; i++ {\n\t\t\t\t\tr.buffer[ptr+i] = byte(si & 0xff)\n\t\t\t\t\tsi >>= 8\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tfor i := 0; i < size; i++ {\n\t\t\t\t\tr.buffer[ptr+size-1-i] = byte(si & 0xff)\n\t\t\t\t\tsi >>= 8\n\t\t\t\t}\n\t\t\t}\n\t\t\tptr += jump\n\t\t}\n\n\t\tif r.Mono {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tr.unread = r.buffer[0 : jump*nSamples]\n}", "title": "" }, { "docid": "fd2158472627d1c1cede9aabc25df497", "score": "0.48946238", "text": "func decodeStep() {\n\tvar (\n\t\tictx *gmf.FmtCtx\n\t\tist *gmf.Stream\n\t\tpkt *gmf.Packet\n\t\tframes []*gmf.Frame\n\t\terr error\n\t)\n\n\tif ictx, err = gmf.NewInputCtx(input); err != nil {\n\t\tlog.Fatalf(\"Error creating context - %s\\n\", err)\n\t}\n\tdefer ictx.Free()\n\n\tif pkt, err = ictx.GetNextPacket(); err != nil {\n\t\tif err == io.EOF {\n\t\t} else {\n\t\t\tlog.Fatalln(pkt, err)\n\t\t}\n\t}\n\n\tist, err = ictx.GetStream(pkt.StreamIndex())\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\tif frames, err = ist.CodecCtx().Decode(pkt); err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\tfor i, _ := range frames {\n\t\tframes[i].Free()\n\t}\n\n\tpkt.Free()\n\n\tif frames, err = ist.CodecCtx().Decode(nil); err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\tfor i, _ := range frames {\n\t\tframes[i].Free()\n\t}\n\n\tist.CodecCtx().Free()\n\tist.Free()\n\n\tframes = nil\n}", "title": "" }, { "docid": "b9380060857f372ca9314ad88846b9d1", "score": "0.48795298", "text": "func (v *Recur2) Decode(sr stream.Reader) error {\n\n\tfield21IsSet := false\n\n\tif err := sr.ReadStructBegin(); err != nil {\n\t\treturn err\n\t}\n\n\tfh, ok, err := sr.ReadFieldBegin()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor ok {\n\t\tswitch {\n\t\tcase fh.ID == 1 && fh.Type == wire.TStruct:\n\t\t\tv.Field21, err = _Recur3_Decode(sr)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfield21IsSet = true\n\t\tcase fh.ID == 2 && fh.Type == wire.TStruct:\n\t\t\tv.Field22, err = _Recur3_Decode(sr)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\tdefault:\n\t\t\tif err := sr.Skip(fh.Type); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tif err := sr.ReadFieldEnd(); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif fh, ok, err = sr.ReadFieldBegin(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif err := sr.ReadStructEnd(); err != nil {\n\t\treturn err\n\t}\n\n\tif !field21IsSet {\n\t\treturn errors.New(\"field Field21 of Recur2 is required\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8365617091189a9fa634b15cc685db08", "score": "0.4866081", "text": "func Mixer2(src1, src2 source.Source, gain1, gain2 float32) source.Source {\n\treturn Sum2(\n\t\tGain(src1, gain1),\n\t\tGain(src2, gain2),\n\t)\n}", "title": "" }, { "docid": "c2ffd5ddc85cd5faa41272e0fb44e21f", "score": "0.486143", "text": "func (ctx *CodecContext) AVCodecDecodeVideo2(f *AVFrame, g *int, a *Packet) int {\n\treturn int(C.avcodec_decode_video2((*C.struct_AVCodecContext)(ctx), (*C.struct_AVFrame)(f), (*C.int)(unsafe.Pointer(g)), (*C.struct_AVPacket)(a)))\n}", "title": "" }, { "docid": "4f2a0e75359aaa06247e7a295c003792", "score": "0.4852139", "text": "func (samples *Samples) TimeSeries2Samples(timeSeries []*prompb.TimeSeries) {\n\tfor _, ts := range timeSeries {\n\t\t//构建Metric\n\t\tmetric := make(model.Metric, len(ts.Labels))\n\t\tfor _, label := range ts.Labels {\n\t\t\tmetric[model.LabelName(label.Name)] = model.LabelValue(label.Value)\n\t\t}\n\n\t\t//构建samples\n\t\tfor _, sample := range ts.Samples {\n\t\t\tif math.IsNaN(sample.Value) {\n\t\t\t\tsample.Value = 0\n\t\t\t}\n\t\t\t*samples = append(*samples,\n\t\t\t\t&Sample{metric, sample.Value, sample.Timestamp})\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e57a3760e82f85d905f59b5ed54762cc", "score": "0.48253906", "text": "func (rwops *RWops) Read2(buf []byte, size, maxnum uint) (n int, err error) {\n\tif rwops == nil || buf == nil {\n\t\treturn 0, ErrInvalidParameters\n\t}\n\n\theader := (*reflect.SliceHeader)(unsafe.Pointer(&buf))\n\t_data := unsafe.Pointer(header.Data)\n\n\tn = int(C.RWread(rwops.cptr(), _data, C.size_t(size), C.size_t(maxnum)))\n\tif n == 0 {\n\t\terr = GetError()\n\t}\n\treturn\n}", "title": "" }, { "docid": "89a45c524a4574d50e95c4532b2821ab", "score": "0.48187956", "text": "func (d *Decoder) loadBinInt2() error {\n\tvar b [2]byte\n\t_, err := io.ReadFull(d.r, b[:])\n\tif err != nil {\n\t\treturn err\n\t}\n\tv := binary.LittleEndian.Uint16(b[:])\n\td.push(int64(v))\n\treturn nil\n}", "title": "" }, { "docid": "d54ced51f32acfe207fc389039531f07", "score": "0.48153177", "text": "func BenchmarkZipkinV2TraceDecoder(b *testing.B) {\n\tspanJSON := `\n\t {\n \"traceId\": \"0123456789abcdef\",\n \"name\": \"span1\",\n \"id\": \"abc1234567890def\",\n \"kind\": \"CLIENT\",\n \"timestamp\": 1000,\n \"duration\": 100,\n \"debug\": true,\n \"shared\": true,\n \"localEndpoint\": {\n \"serviceName\": \"myclient\",\n \"ipv4\": \"127.0.0.1\"\n },\n \"remoteEndpoint\": {\n \"serviceName\": \"myserver\",\n \"ipv4\": \"127.0.1.1\",\n \"port\": 443\n },\n \"annotations\": [\n {\n \"timestamp\": 1001,\n \"value\": \"something happened\"\n },\n {\n \"timestamp\": 1010,\n \"value\": \"something else happened\"\n }\n ],\n \"tags\": {\n \"additionalProp1\": \"string\",\n \"additionalProp2\": \"string\",\n \"additionalProp3\": \"string\"\n }\n }`\n\n\tconst numSpans = 100\n\treqBody := `[`\n\tfor i := 0; i < numSpans; i++ {\n\t\treqBody += spanJSON + \",\"\n\t}\n\n\treqBody = strings.TrimSuffix(reqBody, \",\") + `]`\n\n\tdecoder := JSONTraceDecoderV1{\n\t\tSink: &fakeSink{\n\t\t\thandler: func(_ []*trace.Span) {},\n\t\t},\n\t}\n\n\treq := http.Request{\n\t\tBody: ioutil.NopCloser(bytes.NewBufferString(reqBody)),\n\t}\n\tb.ResetTimer()\n\tfor i := 0; i < b.N; i++ {\n\t\terr := decoder.Read(context.Background(), &req)\n\t\tif err != nil {\n\t\t\tfmt.Println(i)\n\t\t\tb.Fatal(err)\n\t\t}\n\t\treq = http.Request{\n\t\t\tBody: ioutil.NopCloser(bytes.NewBufferString(reqBody)),\n\t\t}\n\t}\n\tb.StopTimer()\n}", "title": "" }, { "docid": "65b784968be9e65cd5e59324531bd189", "score": "0.48121592", "text": "func (v *Recur2) Decode(sr stream.Reader) error {\n\n\tfield21IsSet := false\n\tfield22IsSet := false\n\n\tif err := sr.ReadStructBegin(); err != nil {\n\t\treturn err\n\t}\n\n\tfh, ok, err := sr.ReadFieldBegin()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor ok {\n\t\tswitch {\n\t\tcase fh.ID == 1 && fh.Type == wire.TStruct:\n\t\t\tv.Field21, err = _Recur3_Decode(sr)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfield21IsSet = true\n\t\tcase fh.ID == 2 && fh.Type == wire.TStruct:\n\t\t\tv.Field22, err = _Recur3_Decode(sr)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfield22IsSet = true\n\t\tdefault:\n\t\t\tif err := sr.Skip(fh.Type); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tif err := sr.ReadFieldEnd(); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif fh, ok, err = sr.ReadFieldBegin(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif err := sr.ReadStructEnd(); err != nil {\n\t\treturn err\n\t}\n\n\tif !field21IsSet {\n\t\treturn errors.New(\"field Field21 of Recur2 is required\")\n\t}\n\n\tif !field22IsSet {\n\t\treturn errors.New(\"field Field22 of Recur2 is required\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3ca2c3457eee0b91009e68348a58568e", "score": "0.4812128", "text": "func DecoderGetNbSamples(dec *Decoder, packet string, len int32) int32 {\n\tcdec, cdecAllocMap := (*C.OpusDecoder)(unsafe.Pointer(dec)), cgoAllocsUnknown\n\tcpacket, cpacketAllocMap := unpackPUcharString(packet)\n\tclen, clenAllocMap := (C.opus_int32)(len), cgoAllocsUnknown\n\t__ret := C.opus_decoder_get_nb_samples(cdec, cpacket, clen)\n\truntime.KeepAlive(clenAllocMap)\n\truntime.KeepAlive(cpacketAllocMap)\n\truntime.KeepAlive(cdecAllocMap)\n\t__v := (int32)(__ret)\n\treturn __v\n}", "title": "" }, { "docid": "8d2393f81dbf05f92f31abef86355fdc", "score": "0.48042637", "text": "func decodeV2Tag(r io.Reader) (v2Tags []V2Tag, err error) {\n\tx := new(List)\n\terr = json.NewDecoder(r).Decode(x)\n\tfor _, tag := range []string(x.Tags) {\n\t\tvar v2Tag = new(V2Tag)\n\t\tv2Tag.Name = tag\n\t\tv2Tags = append(v2Tags, *v2Tag)\n\t}\n\treturn\n}", "title": "" }, { "docid": "033d3f5477631d5036ce77b4fb53ab21", "score": "0.47581413", "text": "func tx2Decoder(cdc *codec.Codec) sdk.TxDecoder {\n\treturn func(txBytes []byte) (sdk.Tx, sdk.Error) {\n\t\tvar tx app2Tx\n\t\terr := cdc.UnmarshalBinaryLengthPrefixed(txBytes, &tx)\n\t\tif err != nil {\n\t\t\treturn nil, sdk.ErrTxDecode(err.Error())\n\t\t}\n\t\treturn tx, nil\n\t}\n}", "title": "" }, { "docid": "a06764dfe9ac6f0bf137a4199f9889e6", "score": "0.47202998", "text": "func (streamDecoder *fetchResponseStreamDecoder) decodeRecordsMagic2(topicName string, partitionID int32, header17 []byte) (offset int, err error) {\n\tbytesBeforeRecordsLength := 44 // (magic, records count]\n\tbytesBeforeRecords, n, err := streamDecoder.read(bytesBeforeRecordsLength)\n\tif err != nil {\n\t\treturn offset, err\n\t}\n\n\toffset += n\n\tif n < bytesBeforeRecordsLength {\n\t\treturn offset, errFetchResponseTooShortNoRecordsMeta\n\t}\n\tbuf := make([]byte, len(bytesBeforeRecords)+len(header17))\n\tcopy(buf, header17)\n\tcopy(buf[len(header17):], bytesBeforeRecords)\n\n\tbaseOffset := int64(binary.BigEndian.Uint64(buf))\n\tbatchLength := binary.BigEndian.Uint32(buf[8:])\n\t// partitionLeaderEpoch := binary.BigEndian.Uint32(buf[12:])\n\t// magic := buf[16]\n\t// crc := binary.BigEndian.Uint32(buf[17:])\n\tattributes := binary.BigEndian.Uint16(buf[21:])\n\tcompress := attributes & 0b11\n\t// lastOffsetDelta := binary.BigEndian.Uint32(buf[23:])\n\tbaseTimestamp := binary.BigEndian.Uint64(buf[27:])\n\t// maxTimestamp := binary.BigEndian.Uint64(buf[35:])\n\t// producerID := binary.BigEndian.Uint64(buf[43:])\n\t// producerEpoch := binary.BigEndian.Uint16(buf[51:])\n\t// baseSequence := binary.BigEndian.Uint32(buf[53:])\n\n\t// count is not accurate, payload maybe truncated by maxsize parameter in fetch request\n\tcount := int(binary.BigEndian.Uint32(buf[57:]))\n\t// if glog.V(15) {\n\t// \tglog.Infof(\"baseTimestamp: %d, baseOffset: %d, batchLength: %d, compress: %d, count: %d\", baseTimestamp, baseOffset, batchLength, compress, count)\n\t// }\n\n\tif count <= 0 {\n\t\treturn\n\t}\n\n\t// 49 is length of (batchLength, records count]\n\tif int(batchLength)-49 > streamDecoder.totalLength-streamDecoder.offset {\n\t\tglog.V(15).Infof(\"limit reader length: %d rest bytes length: %d\", int64(batchLength)-49, streamDecoder.totalLength-streamDecoder.offset)\n\t\tn, err = streamDecoder.readAll()\n\t\toffset += n\n\t\treturn offset, err\n\t}\n\n\tr := io.LimitReader(streamDecoder, int64(batchLength)-49)\n\tuncompressedBytes, err := uncompress(int8(compress), r)\n\tif err != nil {\n\t\treturn offset, fmt.Errorf(\"uncompress records bytes error: %w\", err)\n\t}\n\toffset += int(batchLength) - 49\n\n\tuncompressedBytesOffset := 0\n\tfor i := 0; i < count; i++ {\n\t\trecord, o, err := DecodeToRecord(uncompressedBytes[uncompressedBytesOffset:])\n\t\tif err != nil {\n\t\t\tif err == errUncompleteRecord {\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\treturn offset, err\n\t\t}\n\t\tuncompressedBytesOffset += o\n\t\tmessage := &Message{\n\t\t\tOffset: int64(record.offsetDelta) + baseOffset,\n\t\t\tTimestamp: uint64(record.timestampDelta) + baseTimestamp,\n\t\t\tAttributes: record.attributes,\n\t\t\tMagicByte: 2,\n\t\t\tKey: record.key,\n\t\t\tValue: record.value,\n\t\t}\n\t\tif message.Offset >= streamDecoder.startOffset {\n\t\t\tmsg := &FullMessage{\n\t\t\t\tTopicName: topicName,\n\t\t\t\tPartitionID: partitionID,\n\t\t\t\tMessage: message,\n\t\t\t}\n\t\t\tif err = streamDecoder.putMessage(msg); err != nil {\n\t\t\t\treturn offset, err\n\t\t\t}\n\t\t\tstreamDecoder.hasOneMessage = true\n\t\t}\n\t}\n\n\treturn offset, nil\n}", "title": "" }, { "docid": "106a909bfe6998c17f72309dd5b54b06", "score": "0.46951437", "text": "func pack_samples(wpc *WavpackContext, buffer []int, sample_count uint) uint {\n\tvar wps WavpackStream = wpc.stream\n\n\tvar flags = wps.wphdr.flags\n\n\tvar tcount int\n\tvar lossy int = 0\n\tvar m int\n\tvar byte_idx int = 0\n\tvar dpp_idx int = 0\n\tvar crc int\n\tvar crc2 int\n\tvar i uint\n\tvar bptr []int\n\tvar block_samples uint\n\n\tif sample_count == 0 {\n\t\treturn 0\n\t}\n\n\tbyte_idx = wpc.Byte_idx // Get the index position for the buffer holding the input WAV data\n\n\ti = 0\n\n\tblock_samples = uint((int(wps.blockbuff[23]) & 0xFF) << 24)\n\tblock_samples += uint((int(wps.blockbuff[22]) & 0xFF) << 16)\n\tblock_samples += uint((int(wps.blockbuff[21]) & 0xFF) << 8)\n\tblock_samples += uint(int(wps.blockbuff[20]) & 0XFF)\n\tm = (int(block_samples) & (MAX_TERM - 1))\n\n\tcrc = int((int(wps.blockbuff[31]) & 0xFF) << 24)\n\tcrc += int((int(wps.blockbuff[30]) & 0xFF) << 16)\n\tcrc += int((int(wps.blockbuff[29]) & 0xFF) << 8)\n\tcrc += int(int(wps.blockbuff[28]) & 0xFF)\n\n\tcrc2 = 0\n\n\tif wpc.wvc_flag != 0 {\n\t\tcrc2 = int(int(wps.block2buff[31]&0xFF) << 24)\n\t\tcrc2 += int(int(wps.block2buff[30]&0xFF) << 16)\n\t\tcrc2 += int(int(wps.block2buff[29]&0xFF) << 8)\n\t\tcrc2 += int(int(wps.block2buff[28]) & 0xFF)\n\t}\n\n\t/////////////////////// handle lossless mono mode /////////////////////////\n\tif ((flags & HYBRID_FLAG) == 0) &&\n\t\t((flags & (MONO_FLAG | FALSE_STEREO)) != 0) {\n\n\t\tbptr = buffer\n\t\tfor i = 0; i < sample_count; i++ {\n\t\t\tvar code uint\n\n\t\t\tif bs_remain_write(wps.wvbits) < 64 {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tcode = uint(bptr[byte_idx])\n\t\t\tcrc = (crc * 3) + int(code)\n\t\t\tbyte_idx++\n\n\t\t\tdpp_idx = 0\n\n\t\t\tfor tcount = wps.num_terms; tcount > 0; tcount-- {\n\t\t\t\tvar sam int\n\n\t\t\t\tif wps.decorr_passes[dpp_idx].term > MAX_TERM {\n\t\t\t\t\tif (wps.decorr_passes[dpp_idx].term & 1) != 0 {\n\t\t\t\t\t\tsam = (2 * wps.decorr_passes[dpp_idx].samples_A[0]) -\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1]\n\t\t\t\t\t} else {\n\t\t\t\t\t\tsam = ((3 * wps.decorr_passes[dpp_idx].samples_A[0]) -\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1]) >> 1\n\t\t\t\t\t}\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1] = wps.decorr_passes[dpp_idx].samples_A[0]\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0] = int(code)\n\t\t\t\t} else {\n\t\t\t\t\tsam = wps.decorr_passes[dpp_idx].samples_A[m]\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[(m+wps.decorr_passes[dpp_idx].term)&\n\t\t\t\t\t\t(MAX_TERM-1)] = int(code)\n\t\t\t\t}\n\n\t\t\t\tcode -= uint(apply_weight(wps.decorr_passes[dpp_idx].weight_A, sam))\n\t\t\t\twps.decorr_passes[dpp_idx].weight_A = update_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\twps.decorr_passes[dpp_idx].delta, sam, int(code))\n\n\t\t\t\tdpp_idx++\n\t\t\t}\n\n\t\t\tm = (m + 1) & (MAX_TERM - 1)\n\n\t\t\tsend_word_lossless(&wps, int(code), 0)\n\t\t}\n\n\t\twpc.Byte_idx = byte_idx\n\n\t\t//////////////////// handle the lossless stereo mode //////////////////////\n\t} else if ((flags & HYBRID_FLAG) == 0) &&\n\t\t((flags & (MONO_FLAG | FALSE_STEREO)) == 0) {\n\t\tbptr = buffer\n\t\tfor i = 0; i < sample_count; i++ {\n\t\t\tvar left int\n\t\t\tvar right int\n\t\t\tvar sam_A int\n\t\t\tvar sam_B int\n\n\t\t\tif bs_remain_write(wps.wvbits) < 128 {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tleft = int(bptr[byte_idx])\n\t\t\tcrc = (crc * 3) + int(left)\n\t\t\tright = int(bptr[byte_idx+1])\n\t\t\tcrc = (crc * 3) + int(right)\n\n\t\t\tif (flags & JOINT_STEREO) > 0 {\n\t\t\t\tleft -= right\n\t\t\t\tright += (left >> 1)\n\t\t\t}\n\n\t\t\tdpp_idx = 0\n\n\t\t\tfor tcount = wps.num_terms; tcount > 0; tcount-- {\n\t\t\t\tif wps.decorr_passes[dpp_idx].term > 0 {\n\t\t\t\t\tif wps.decorr_passes[dpp_idx].term > MAX_TERM {\n\t\t\t\t\t\tif (wps.decorr_passes[dpp_idx].term & 1) != 0 {\n\t\t\t\t\t\t\tsam_A = (2 * wps.decorr_passes[dpp_idx].samples_A[0]) -\n\t\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1]\n\t\t\t\t\t\t\tsam_B = (2 * wps.decorr_passes[dpp_idx].samples_B[0]) -\n\t\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[1]\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tsam_A = ((3 * wps.decorr_passes[dpp_idx].samples_A[0]) -\n\t\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1]) >> 1\n\t\t\t\t\t\t\tsam_B = ((3 * wps.decorr_passes[dpp_idx].samples_B[0]) -\n\t\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[1]) >> 1\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1] = wps.decorr_passes[dpp_idx].samples_A[0]\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[1] = wps.decorr_passes[dpp_idx].samples_B[0]\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0] = left\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[0] = right\n\t\t\t\t\t} else {\n\t\t\t\t\t\tvar k int = (m + wps.decorr_passes[dpp_idx].term) & (MAX_TERM - 1)\n\n\t\t\t\t\t\tsam_A = wps.decorr_passes[dpp_idx].samples_A[m]\n\t\t\t\t\t\tsam_B = wps.decorr_passes[dpp_idx].samples_B[m]\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[k] = left\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[k] = right\n\t\t\t\t\t}\n\n\t\t\t\t\tleft -= apply_weight(wps.decorr_passes[dpp_idx].weight_A, sam_A)\n\t\t\t\t\tright -= apply_weight(wps.decorr_passes[dpp_idx].weight_B, sam_B)\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_A = update_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta, sam_A, left)\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_B = update_weight(wps.decorr_passes[dpp_idx].weight_B,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta, sam_B, right)\n\t\t\t\t} else {\n\t\t\t\t\tif wps.decorr_passes[dpp_idx].term == -2 {\n\t\t\t\t\t\tsam_A = right\n\t\t\t\t\t} else {\n\t\t\t\t\t\tsam_A = wps.decorr_passes[dpp_idx].samples_A[0]\n\t\t\t\t\t}\n\n\t\t\t\t\tif wps.decorr_passes[dpp_idx].term == -1 {\n\t\t\t\t\t\tsam_B = left\n\t\t\t\t\t} else {\n\t\t\t\t\t\tsam_B = wps.decorr_passes[dpp_idx].samples_B[0]\n\t\t\t\t\t}\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0] = right\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[0] = left\n\t\t\t\t\tleft -= apply_weight(wps.decorr_passes[dpp_idx].weight_A, sam_A)\n\t\t\t\t\tright -= apply_weight(wps.decorr_passes[dpp_idx].weight_B, sam_B)\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_A = update_weight_clip(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta, sam_A, uint(left))\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_B = update_weight_clip(wps.decorr_passes[dpp_idx].weight_B,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta, sam_B, uint(right))\n\t\t\t\t}\n\n\t\t\t\tdpp_idx++\n\t\t\t}\n\n\t\t\tm = (m + 1) & (MAX_TERM - 1)\n\t\t\tsend_word_lossless(&wps, left, 0)\n\t\t\tsend_word_lossless(&wps, right, 1)\n\n\t\t\tbyte_idx += 2\n\t\t}\n\n\t\twpc.Byte_idx = byte_idx\n\n\t\t/////////////////// handle the lossy/hybrid mono mode /////////////////////\n\t} else if ((flags & HYBRID_FLAG) != 0) &&\n\t\t((flags & (MONO_FLAG | FALSE_STEREO)) != 0) {\n\t\tbptr = buffer\n\t\tfor i = 0; i < sample_count; i++ {\n\t\t\tvar code int\n\t\t\tvar temp int\n\n\t\t\tif (bs_remain_write(wps.wvbits) < 64) ||\n\t\t\t\t((wpc.wvc_flag != 0) && (bs_remain_write(wps.wvcbits) < 64)) {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tcode = int(bptr[byte_idx])\n\t\t\tcrc2 = (crc2 * 3) + code\n\t\t\tbyte_idx++\n\n\t\t\tif (flags & HYBRID_SHAPE) != 0 {\n\t\t\t\twps.dc.shaping_acc[0] += wps.dc.shaping_delta[0]\n\t\t\t\tvar shaping_weight int = (wps.dc.shaping_acc[0]) >> 16\n\t\t\t\ttemp = -apply_weight(shaping_weight, wps.dc.error[0])\n\n\t\t\t\tif ((flags & NEW_SHAPING) != 0) && (shaping_weight < 0) &&\n\t\t\t\t\t(temp != 0) {\n\t\t\t\t\tif temp == wps.dc.error[0] {\n\t\t\t\t\t\tif temp < 0 {\n\t\t\t\t\t\t\ttemp = temp + 1\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\ttemp = temp - 1\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\twps.dc.error[0] = -code\n\t\t\t\t\tcode += temp\n\t\t\t\t} else {\n\t\t\t\t\tcode += temp\n\t\t\t\t\twps.dc.error[0] = -(code)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdpp_idx = 0\n\n\t\t\tfor tcount = wps.num_terms; tcount > 0; tcount-- {\n\t\t\t\tif wps.decorr_passes[dpp_idx].term > MAX_TERM {\n\t\t\t\t\tif (wps.decorr_passes[dpp_idx].term & 1) != 0 {\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[2] = (2 * wps.decorr_passes[dpp_idx].samples_A[0]) -\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1]\n\t\t\t\t\t} else {\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[2] = ((3 * wps.decorr_passes[dpp_idx].samples_A[0]) -\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1]) >> 1\n\t\t\t\t\t}\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_A = apply_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[2])\n\t\t\t\t\tcode -= (wps.decorr_passes[dpp_idx].aweight_A)\n\t\t\t\t} else {\n\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_A = apply_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[m])\n\t\t\t\t\tcode -= (wps.decorr_passes[dpp_idx].aweight_A)\n\t\t\t\t}\n\n\t\t\t\tdpp_idx++\n\t\t\t}\n\n\t\t\tcode = send_word(&wps, code, 0)\n\n\t\t\tdpp_idx--\n\n\t\t\tfor dpp_idx >= 0 {\n\t\t\t\tif wps.decorr_passes[dpp_idx].term > MAX_TERM {\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_A = update_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[2], code)\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1] = wps.decorr_passes[dpp_idx].samples_A[0]\n\t\t\t\t\tcode += wps.decorr_passes[dpp_idx].aweight_A\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0] = code\n\t\t\t\t} else {\n\t\t\t\t\tvar sam int = wps.decorr_passes[dpp_idx].samples_A[m]\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_A = update_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta, sam, code)\n\n\t\t\t\t\tcode += wps.decorr_passes[dpp_idx].aweight_A\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[(m+wps.decorr_passes[dpp_idx].term)&\n\t\t\t\t\t\t(MAX_TERM-1)] = code\n\t\t\t\t}\n\n\t\t\t\tdpp_idx--\n\t\t\t}\n\n\t\t\twps.dc.error[0] += code\n\t\t\tm = (m + 1) & (MAX_TERM - 1)\n\n\t\t\tcrc = (crc * 3) + int(code)\n\t\t\tif crc != int(crc2) {\n\t\t\t\tlossy = TRUE\n\t\t\t}\n\t\t}\n\n\t\twpc.Byte_idx = byte_idx\n\n\t\t/////////////////// handle the lossy/hybrid stereo mode ///////////////////\n\t} else if ((flags & HYBRID_FLAG) != 0) &&\n\t\t((flags & (MONO_FLAG | FALSE_STEREO)) == 0) {\n\t\tbptr = buffer\n\t\tfor i = 0; i < sample_count; i++ {\n\t\t\tvar left int\n\t\t\tvar right int\n\t\t\tvar temp int\n\t\t\tvar shaping_weight int\n\n\t\t\tif (bs_remain_write(wps.wvbits) < 128) ||\n\t\t\t\t((wpc.wvc_flag != 0) && (bs_remain_write(wps.wvcbits) < 128)) {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tleft = int(bptr[byte_idx])\n\t\t\tbyte_idx++\n\t\t\tright = int(bptr[byte_idx])\n\t\t\tcrc2 = (((crc2 * 3) + left) * 3) + right\n\t\t\tbyte_idx++\n\n\t\t\tif (flags & HYBRID_SHAPE) != 0 {\n\t\t\t\twps.dc.shaping_acc[0] += wps.dc.shaping_delta[0]\n\t\t\t\tshaping_weight = (wps.dc.shaping_acc[0]) >> 16\n\t\t\t\ttemp = -apply_weight(shaping_weight, wps.dc.error[0])\n\n\t\t\t\tif ((flags & NEW_SHAPING) != 0) && (shaping_weight < 0) &&\n\t\t\t\t\t(temp != 0) {\n\t\t\t\t\tif temp == wps.dc.error[0] {\n\t\t\t\t\t\tif temp < 0 {\n\t\t\t\t\t\t\ttemp = temp + 1\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\ttemp = temp - 1\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\twps.dc.error[0] = -left\n\t\t\t\t\tleft += temp\n\t\t\t\t} else {\n\t\t\t\t\tleft += temp\n\t\t\t\t\twps.dc.error[0] = -(left)\n\t\t\t\t}\n\n\t\t\t\twps.dc.shaping_acc[1] += wps.dc.shaping_delta[1]\n\t\t\t\tshaping_weight = (wps.dc.shaping_acc[1]) >> 16\n\t\t\t\ttemp = -apply_weight(shaping_weight, wps.dc.error[1])\n\n\t\t\t\tif ((flags & NEW_SHAPING) != 0) && (shaping_weight < 0) &&\n\t\t\t\t\t(temp != 0) {\n\t\t\t\t\tif temp == wps.dc.error[1] {\n\t\t\t\t\t\tif temp < 0 {\n\t\t\t\t\t\t\ttemp = temp + 1\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\ttemp = temp - 1\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\twps.dc.error[1] = -right\n\t\t\t\t\tright += temp\n\t\t\t\t} else {\n\t\t\t\t\tright += temp\n\t\t\t\t\twps.dc.error[1] = -(right)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif (flags & JOINT_STEREO) != 0 {\n\t\t\t\tleft -= right\n\t\t\t\tright += (left >> 1)\n\t\t\t}\n\n\t\t\tdpp_idx = 0\n\n\t\t\tfor tcount = wps.num_terms; tcount > 0; tcount-- {\n\t\t\t\tif wps.decorr_passes[dpp_idx].term > MAX_TERM {\n\t\t\t\t\tif (wps.decorr_passes[dpp_idx].term & 1) != 0 {\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[2] = (2 * wps.decorr_passes[dpp_idx].samples_A[0]) -\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1]\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[2] = (2 * wps.decorr_passes[dpp_idx].samples_B[0]) -\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[1]\n\t\t\t\t\t} else {\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[2] = ((3 * wps.decorr_passes[dpp_idx].samples_A[0]) -\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1]) >> 1\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[2] = ((3 * wps.decorr_passes[dpp_idx].samples_B[0]) -\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[1]) >> 1\n\t\t\t\t\t}\n\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_A = apply_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[2])\n\t\t\t\t\tleft -= (wps.decorr_passes[dpp_idx].aweight_A)\n\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_B = apply_weight(wps.decorr_passes[dpp_idx].weight_B,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[2])\n\t\t\t\t\tright -= (wps.decorr_passes[dpp_idx].aweight_B)\n\t\t\t\t} else if wps.decorr_passes[dpp_idx].term > 0 {\n\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_A = apply_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[m])\n\t\t\t\t\tleft -= (wps.decorr_passes[dpp_idx].aweight_A)\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_B = apply_weight(wps.decorr_passes[dpp_idx].weight_B,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[m])\n\t\t\t\t\tright -= (wps.decorr_passes[dpp_idx].aweight_B)\n\t\t\t\t} else {\n\t\t\t\t\tif wps.decorr_passes[dpp_idx].term == -1 {\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[0] = left\n\t\t\t\t\t} else if wps.decorr_passes[dpp_idx].term == -2 {\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0] = right\n\t\t\t\t\t}\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_A = apply_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0])\n\t\t\t\t\tleft -= wps.decorr_passes[dpp_idx].aweight_A\n\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_B = apply_weight(wps.decorr_passes[dpp_idx].weight_B,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[0])\n\t\t\t\t\tright -= wps.decorr_passes[dpp_idx].aweight_B\n\t\t\t\t}\n\n\t\t\t\tdpp_idx++\n\t\t\t}\n\n\t\t\tleft = send_word(&wps, left, 0)\n\t\t\tright = send_word(&wps, right, 1)\n\n\t\t\tdpp_idx--\n\n\t\t\tfor dpp_idx >= 0 {\n\t\t\t\tif wps.decorr_passes[dpp_idx].term > MAX_TERM {\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_A = update_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[2], left)\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_B = update_weight(wps.decorr_passes[dpp_idx].weight_B,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[2], right)\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[1] = wps.decorr_passes[dpp_idx].samples_A[0]\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[1] = wps.decorr_passes[dpp_idx].samples_B[0]\n\n\t\t\t\t\tleft += wps.decorr_passes[dpp_idx].aweight_A\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0] = left\n\t\t\t\t\tright += wps.decorr_passes[dpp_idx].aweight_B\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[0] = right\n\t\t\t\t} else if wps.decorr_passes[dpp_idx].term > 0 {\n\t\t\t\t\tvar k int = (m + wps.decorr_passes[dpp_idx].term) & (MAX_TERM - 1)\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_A = update_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[m], left)\n\t\t\t\t\tleft += wps.decorr_passes[dpp_idx].aweight_A\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[k] = left\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_B = update_weight(wps.decorr_passes[dpp_idx].weight_B,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[m], right)\n\t\t\t\t\tright += wps.decorr_passes[dpp_idx].aweight_B\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[k] = right\n\t\t\t\t} else {\n\t\t\t\t\tif wps.decorr_passes[dpp_idx].term == -1 {\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[0] = left +\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_A\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_B = apply_weight(wps.decorr_passes[dpp_idx].weight_B,\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[0])\n\t\t\t\t\t} else if wps.decorr_passes[dpp_idx].term == -2 {\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0] = right +\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_B\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].aweight_A = apply_weight(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0])\n\t\t\t\t\t}\n\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_A = update_weight_clip(wps.decorr_passes[dpp_idx].weight_A,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0], uint(left))\n\t\t\t\t\twps.decorr_passes[dpp_idx].weight_B = update_weight_clip(wps.decorr_passes[dpp_idx].weight_B,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].delta,\n\t\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[0], uint(right))\n\t\t\t\t\tleft += wps.decorr_passes[dpp_idx].aweight_A\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_B[0] = left\n\t\t\t\t\tright += wps.decorr_passes[dpp_idx].aweight_B\n\t\t\t\t\twps.decorr_passes[dpp_idx].samples_A[0] = right\n\t\t\t\t}\n\n\t\t\t\tdpp_idx--\n\t\t\t}\n\n\t\t\tif (flags & JOINT_STEREO) != 0 {\n\t\t\t\tright -= (left >> 1)\n\t\t\t\tleft += right\n\t\t\t}\n\n\t\t\twps.dc.error[0] += left\n\t\t\twps.dc.error[1] += right\n\t\t\tm = (m + 1) & (MAX_TERM - 1)\n\n\t\t\tcrc = (((crc * 3) + int(left)) * 3) + int(right)\n\t\t\tif crc != crc2 {\n\t\t\t\tlossy = TRUE\n\t\t\t}\n\t\t}\n\n\t\twpc.Byte_idx = byte_idx\n\t}\n\n\tblock_samples = uint((int(wps.blockbuff[23]) & 0xFF) << 24)\n\tblock_samples += uint((int(wps.blockbuff[22]) & 0xFF) << 16)\n\tblock_samples += uint((int(wps.blockbuff[21]) & 0xFF) << 8)\n\tblock_samples += uint(int(wps.blockbuff[20]) & 0XFF)\n\n\tblock_samples = block_samples + i\n\n\twps.blockbuff[20] = byte(block_samples)\n\twps.blockbuff[21] = byte(block_samples >> 8)\n\twps.blockbuff[22] = byte(block_samples >> 16)\n\twps.blockbuff[23] = byte(block_samples >> 24)\n\n\twps.blockbuff[28] = byte(crc)\n\twps.blockbuff[29] = byte(crc >> 8)\n\twps.blockbuff[30] = byte(crc >> 16)\n\twps.blockbuff[31] = byte(crc >> 24)\n\n\tif wpc.wvc_flag != 0 {\n\t\tblock_samples = uint(int(wps.block2buff[23]&0xFF) << 24)\n\t\tblock_samples += uint(int(wps.block2buff[22]&0xFF) << 16)\n\t\tblock_samples += uint(int(wps.block2buff[21]&0xFF) << 8)\n\t\tblock_samples += uint(int(wps.block2buff[20] & 0XFF))\n\n\t\tblock_samples = block_samples + i\n\n\t\twps.block2buff[20] = byte(block_samples)\n\t\twps.block2buff[21] = byte(block_samples >> 8)\n\t\twps.block2buff[22] = byte(block_samples >> 16)\n\t\twps.block2buff[23] = byte(block_samples >> 24)\n\n\t\twps.block2buff[28] = byte(crc2)\n\t\twps.block2buff[29] = byte(crc2 >> 8)\n\t\twps.block2buff[30] = byte(crc2 >> 16)\n\t\twps.block2buff[31] = byte(crc2 >> 24)\n\t}\n\n\tif lossy != 0 {\n\t\twps.lossy_block = TRUE\n\t}\n\n\twps.sample_index += int(i)\n\n\twpc.stream = wps\n\n\treturn i\n}", "title": "" }, { "docid": "5ce9c63ab14a3f73a1997932c0a0318a", "score": "0.46868548", "text": "func (v *Mp4Decoder) readSample(mp4Url string) (s *SrsMp4Sample, err error) {\n s = NewSrsMp4Smaple()\n\n if !v.avccWritten && (len(v.pavcc) != 0) {\n v.avccWritten = true\n s.handlerType = SrsMp4HandlerTypeVIDE\n s.nbSample = uint32(len(v.pavcc))\n s.sample = append(s.sample, v.pavcc...)\n s.frameType = SrsVideoAvcFrameTypeKeyFrame\n s.frameTrait = SrsVideoAvcFrameTraitSequenceHeader\n ol.T(nil, fmt.Sprintf(\"make a video sh\"))\n return\n }\n\n if !v.ascWritten && len(v.pasc) != 0 {\n v.ascWritten = true\n s.handlerType = SrsMp4HandlerTypeSOUN\n s.nbSample = uint32(len(v.pasc))\n s.sample = append(s.sample, v.pasc...)\n s.frameType = 0x00\n s.frameTrait = SrsAudioAacFrameTraitSequenceHeader\n ol.T(nil, fmt.Sprintf(\"make a audio sh\"))\n return\n }\n\n v.curIndex ++\n if v.curIndex >= uint32(len(v.samples.samples)) {\n return nil, fmt.Errorf(\"sample reach end\")\n }\n ms := v.samples.samples[v.curIndex]\n\n if ms.sampleType == SrsFrameTypeVideo {\n s.handlerType = SrsMp4HandlerTypeVIDE\n s.frameTrait = SrsVideoAvcFrameTraitNALU\n } else {\n s.handlerType = SrsMp4HandlerTypeSOUN\n s.frameTrait = SrsAudioAacFrameTraitRawData\n }\n\n s.dts = ms.dts_ms()\n s.pts = ms.pts_ms()\n s.frameType = uint16(ms.frameType)\n\n\n s.nbSample = ms.nbData\n var data []byte\n if data, err = readAt(mp4Url, int64(ms.offset), int(ms.nbData)); err != nil {\n return\n }\n s.sample = append(s.sample, data...)\n return\n}", "title": "" }, { "docid": "f366f16309dfea55801d87cf7ec0df39", "score": "0.4680309", "text": "func (i *JP2Image) rawDecode() (jp2 *C.opj_image_t, err error) {\n\t// Make sure we're at the beginning of the stream\n\ti.streamer.Seek(0, 0)\n\n\t// Setup the parameters for decode\n\tvar parameters C.opj_dparameters_t\n\tC.opj_set_default_decoder_parameters(&parameters)\n\n\t// Calculate cp_reduce - this seems smarter to put in a parameter than to call an extra function\n\tparameters.cp_reduce = C.OPJ_UINT32(i.computeProgressionLevel())\n\n\t// Setup the stream for openjpeg\n\tstream, err := i.initializeStream()\n\tif err != nil {\n\t\treturn jp2, err\n\t}\n\tdefer C.opj_stream_destroy(stream)\n\n\t// Create codec\n\tcodec := C.opj_create_decompress(C.OPJ_CODEC_JP2)\n\tdefer C.opj_destroy_codec(codec)\n\n\t// Connect our info/warning/error handlers\n\tC.set_handlers(codec)\n\n\t// Fill in codec configuration from parameters\n\tif C.opj_setup_decoder(codec, &parameters) == C.OPJ_FALSE {\n\t\treturn jp2, fmt.Errorf(\"unable to setup decoder\")\n\t}\n\n\t// Read the header to set up the image data\n\tif C.opj_read_header(stream, codec, &jp2) == C.OPJ_FALSE {\n\t\treturn jp2, fmt.Errorf(\"failed to read the header\")\n\t}\n\n\t// Set the decode area if it isn't the full image\n\tif i.decodeArea != i.srcRect {\n\t\tr := i.decodeArea\n\t\tif C.opj_set_decode_area(codec, jp2, C.OPJ_INT32(r.Min.X), C.OPJ_INT32(r.Min.Y), C.OPJ_INT32(r.Max.X), C.OPJ_INT32(r.Max.Y)) == C.OPJ_FALSE {\n\t\t\treturn jp2, fmt.Errorf(\"failed to set the decoded area\")\n\t\t}\n\t}\n\n\t// Decode the JP2 into the image stream\n\tif C.opj_decode(codec, stream, jp2) == C.OPJ_FALSE || C.opj_end_decompress(codec, stream) == C.OPJ_FALSE {\n\t\treturn jp2, fmt.Errorf(\"failed to decode image\")\n\t}\n\n\treturn jp2, nil\n}", "title": "" }, { "docid": "27a0fbb74f7bcb01fd650da8c13d86c8", "score": "0.46777174", "text": "func (m *MLDv2MulticastAddressRecord) decode(data []byte, df gopacket.DecodeFeedback) (int, error) {\n\tif len(data) < 20 {\n\t\tdf.SetTruncated()\n\t\treturn 0, errors.New(\n\t\t\t\"Multicast Listener Report Message V2 layer less than 4 bytes for Multicast Address Record\")\n\t}\n\n\tm.RecordType = MLDv2MulticastAddressRecordType(data[0])\n\tm.AuxDataLen = data[1]\n\tm.N = binary.BigEndian.Uint16(data[2:4])\n\tm.MulticastAddress = data[4:20]\n\n\tfor i := uint16(0); i < m.N; i++ {\n\t\tbegin := 20 + (int(i) * 16)\n\t\tend := begin + 16\n\n\t\tif len(data) < end {\n\t\t\tdf.SetTruncated()\n\t\t\treturn begin, fmt.Errorf(\n\t\t\t\t\"Multicast Listener Report Message V2 layer less than %d bytes for Multicast Address Record\", end)\n\t\t}\n\n\t\tm.SourceAddresses = append(m.SourceAddresses, data[begin:end])\n\t}\n\n\texpectedLengthWithouAuxData := 20 + (int(m.N) * 16)\n\texpectedTotalLength := (int(m.AuxDataLen) * 4) + expectedLengthWithouAuxData // *4 because AuxDataLen are 32bit words\n\tif len(data) < expectedTotalLength {\n\t\treturn expectedLengthWithouAuxData, fmt.Errorf(\n\t\t\t\"Multicast Listener Report Message V2 layer less than %d bytes for Multicast Address Record\",\n\t\t\texpectedLengthWithouAuxData)\n\t}\n\n\tm.AuxiliaryData = data[expectedLengthWithouAuxData:expectedTotalLength]\n\n\treturn expectedTotalLength, nil\n}", "title": "" }, { "docid": "2793ad1fd1d20e121200b04fc5c59801", "score": "0.46756682", "text": "func UA_RegisterServer2Response_decodeBinary(src []UA_ByteString, offset []uint, dst []UA_RegisterServer2Response) UA_StatusCode {\n\treturn UA_decodeBinary(src, offset, dst, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[165]))[:], 0, nil)\n}", "title": "" }, { "docid": "b3f31ecf8b886787becc1efa39eb63e2", "score": "0.4659378", "text": "func (d *Decoder) decodeHuffmanData3(gr, ch int) error {\n\tvar (\n\t\tregions [3]int\n\t\tN = 0\n\t\tbits = d.part23Length[gr][ch] - d.part2Length[gr][ch]\n\t)\n\n\t// Compute the region boundaries in the big_values partition\n\tif d.windowSwitchingFlag[gr][ch] == 0 {\n\t\tregions = [3]int{\n\t\t\td.region0Count[gr][ch] + 1,\n\t\t\td.region0Count[gr][ch] + d.region1Count[gr][ch] + 2,\n\t\t\t2 * d.bigValues[gr][ch],\n\t\t}\n\t\tif regions[1] > 22 {\n\t\t\treturn MalformedStream(\"region0_count + region1_count > 20\")\n\t\t}\n\t\tregions[0] = scfBandsL[d.samplingFreq][regions[0]]\n\t\tregions[1] = scfBandsL[d.samplingFreq][regions[1]]\n\t} else {\n\t\tregions = [3]int{36, 576, 2 * d.bigValues[gr][ch]}\n\t}\n\tif regions[2] > 576 {\n\t\treturn MalformedStream(\"big_values too large\")\n\t}\n\tif regions[1] > regions[2] {\n\t\tregions[1] = regions[2]\n\t}\n\tif regions[0] > regions[1] {\n\t\tregions[0] = regions[1]\n\t}\n\n\t// Decode the big_values partition\n\tfor r := 0; r < 3; r++ {\n\t\thtree := huffmanTrees[d.tableSelect[gr][ch][r]]\n\t\tlbits := linbits[d.tableSelect[gr][ch][r]]\n\n\t\tif htree == nil {\n\t\t\tif d.tableSelect[gr][ch][r] != 0 {\n\t\t\t\treturn MalformedStream(\"invalid table_select\")\n\t\t\t}\n\t\t\tfor ; N < regions[r]; N++ {\n\t\t\t\td.huffmanData[gr][ch][N] = 0\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\tfor ; N < regions[r]; N += 2 {\n\t\t\tcode, err := d.reservoir.readCode(htree)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tbits -= code >> 16\n\n\t\t\tfor i := 0; i < 2; i++ {\n\t\t\t\tvalue := (code >> uint(8-8*i)) & 0xff\n\t\t\t\tif value == 15 {\n\t\t\t\t\tlin, err := d.reservoir.readBits(lbits)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t\tvalue += lin\n\t\t\t\t\tbits -= lbits\n\t\t\t\t}\n\t\t\t\t// We perform the first step of dequantization here, so we don't\n\t\t\t\t// need two separate buffers for the Huffman coded integers and\n\t\t\t\t// the dequantized floats.\n\t\t\t\tvalueFl := pow43[value]\n\t\t\t\tif value != 0 {\n\t\t\t\t\tsign, err := d.reservoir.readBits(1)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t\tif sign == 1 {\n\t\t\t\t\t\tvalueFl = -valueFl\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\td.huffmanData[gr][ch][N+i] = valueFl\n\t\t\t}\n\t\t}\n\t}\n\n\t// Decode the count1 partition\n\thtree := htreeA\n\tif d.count1TableSelect[gr][ch] == 1 {\n\t\thtree = htreeB\n\t}\n\n\t// To avoid overindexing huffmanData, we quit the loop when N > 572, i.e.\n\t// when there's no room for another 4 values.\n\tfor ; bits > 0 && N <= 572; N += 4 {\n\t\tcode, err := d.reservoir.readCode(htree)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbits -= code >> 8\n\n\t\tfor i := 0; i < 4; i++ {\n\t\t\tvalue := (code >> uint(3-i)) & 1\n\t\t\tvalueFl := float32(value)\n\t\t\tif value != 0 {\n\t\t\t\tsign, err := d.reservoir.readBits(1)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tif sign == 1 {\n\t\t\t\t\tvalueFl = -1\n\t\t\t\t}\n\t\t\t}\n\t\t\td.huffmanData[gr][ch][N+i] = valueFl\n\t\t}\n\t}\n\n\t// rzero\n\tfor ; N < 576; N++ {\n\t\td.huffmanData[gr][ch][N] = 0\n\t}\n\n\t// Skip over any stuffing. We don't need these bits, so we don't care much\n\t// if the read is successful or not.\n\tif bits < 0 {\n\t\treturn MalformedStream(\"Huffman data overread\")\n\t}\n\td.reservoir.readBits(bits)\n\n\treturn nil\n}", "title": "" }, { "docid": "40d3cc4651e36f3b1e137648a4bb6dbb", "score": "0.46590456", "text": "func (e *ListennerT) Unsubscribe2(eventType string) {\n\treturn\n}", "title": "" }, { "docid": "a1e3b8a473b576c891e7b27b223ad767", "score": "0.4657874", "text": "func Decode(r io.Reader) (sound.Tags, error) {\n\t// log.Print(\"decode id3 header\")\n\t//r := &countReader{r: rr}\n\th, padding, err := readHeader(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// log.Printf(\"%d bytes of padding\", padding)\n\n\t// calls from mp3 package should always be bufio.Reader\n\tvar br *bufio.Reader\n\n\tif _br, ok := r.(*bufio.Reader); ok {\n\t\t// log.Print(\"reader is *bufio.Reader\")\n\t\tbr = _br\n\t} else {\n\t\tbr = bufio.NewReader(r)\n\t}\n\n\t// Make sure we don't read more than we need to, so that subsequent readers\n\t// can get the audio data from the file\n\t// totalSize := int64(h.Size)\n\tif h.Flags&flagFooterPresent != 0 {\n\t\t// we're not using the footer (which is used only to aid in searching\n\t\t// for the ID3 tags backwards from EOF), so discard it\n\t\th.Size -= footerSize\n\t\tpadding += footerSize\n\t}\n\n\t// Operate on entire tag in memory. Simplest way we can reliably limit\n\t// bytes read from *bufio.Reader (wrapping with limited reader will take\n\t// chunks at a time and not be accurate).\n\ttag := make([]byte, h.Size)\n\tio.ReadFull(br, tag)\n\tlr := bytes.NewReader(tag)\n\t// lr := &limitedBufioReader{br, int64(h.Size)}\n\n\t//log.Print(\"data left: \", lr.N)\n\n\t// log.Print(\"reading frames\")\n\tframes, err := readFrames(lr, h)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"read frames\")\n\t}\n\n\tif padding > 0 {\n\t\t_, err = io.CopyN(ioutil.Discard, br, int64(padding))\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"discard padding\")\n\t\t}\n\t}\n\n\treturn makeTags(h, frames)\n}", "title": "" }, { "docid": "0e526782d288cc41d5fd8307c530bd68", "score": "0.46523917", "text": "func (ctx *CodecContext) AVParserParse2(ctxtp *CodecParserContext, p **uint8, ps *int, b *uint8, bs int, pt, dt, po int64) int {\n\treturn int(C.av_parser_parse2((*C.struct_AVCodecParserContext)(ctxtp), (*C.struct_AVCodecContext)(ctx), (**C.uint8_t)(unsafe.Pointer(p)), (*C.int)(unsafe.Pointer(ps)), (*C.uint8_t)(b), C.int(bs), (C.int64_t)(pt), (C.int64_t)(dt), (C.int64_t)(po)))\n}", "title": "" }, { "docid": "ede35a5968aa630f98e51b74dc4a21c6", "score": "0.46277413", "text": "func decode(src []byte) (traceID []byte, spanID uint64, opts byte, ok bool) {\n\tif len(src) < Len {\n\t\treturn traceID, spanID, 0, false\n\t}\n\tvar offset = 0\n\treadByte := func() byte { b := src[offset]; offset++; return b }\n\treadUint64 := func() uint64 { v := binary.LittleEndian.Uint64(src[offset:]); offset += 8; return v }\n\n\tif readByte() != versionID {\n\t\treturn traceID, spanID, 0, false\n\t}\n\tfor offset < len(src) {\n\t\tswitch readByte() {\n\t\tcase traceIDField:\n\t\t\ttraceID = src[offset : offset+traceIDLen]\n\t\t\toffset += traceIDLen\n\t\tcase spanIDField:\n\t\t\tspanID = readUint64()\n\t\tcase optsField:\n\t\t\topts = readByte()\n\t\t}\n\t}\n\treturn traceID, spanID, opts, true\n}", "title": "" }, { "docid": "efe683c1a0193a4e077ef419dcbf6562", "score": "0.46258956", "text": "func (c *JSONSocket) Receive2(t1, t2 PacketType) (*Packet, error) {\n\tif t1 < 0 || t1 >= PacketType(len(c.incoming)) || t2 < 0 || t2 >= PacketType(len(c.incoming)) {\n\t\tpanic(\"invalid packet type\")\n\t}\n\tvar res Packet\n\tvar ok bool\n\tselect {\n\tcase res, ok = <-c.incoming[t1]:\n\tcase res, ok = <-c.incoming[t2]:\n\t}\n\tif !ok {\n\t\treturn nil, io.EOF\n\t} else {\n\t\treturn &res, nil\n\t}\n}", "title": "" }, { "docid": "de1dc0a8b47be7731360a017fbcbb0f0", "score": "0.46141934", "text": "func (kr *KeyPhraseRecognition) fillBufferForDownsample() {\n\tkr.pcmBuffer = append(kr.pcmBuffer, silencePacketPCM...)\n\tneededSamplesLength := amountOfSamplesNeededToResample - len(kr.pcmBuffer)\n\tif neededSamplesLength > 0 {\n\t\tnumberOfSilenceFramesNeeded := neededSamplesLength / frameSizeStereo\n\t\tfor i := 0; i < numberOfSilenceFramesNeeded; i++ {\n\t\t\tkr.pcmBuffer = append(kr.pcmBuffer, silencePacketPCM...)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "22df43260942c08dfdc96ad9b6946dae", "score": "0.4611372", "text": "func (i *IGMPv1or2) decodeResponse(data []byte) error {\n\tif len(data) < 8 {\n\t\treturn errors.New(\"IGMP packet too small\")\n\t}\n\n\ti.MaxResponseTime = igmpTimeDecode(data[1])\n\ti.Checksum = binary.BigEndian.Uint16(data[2:4])\n\ti.GroupAddress = net.IP(data[4:8])\n\n\treturn nil\n}", "title": "" }, { "docid": "9f83a4fa7bdbfe41eb63f329e422abc3", "score": "0.46103477", "text": "func (d *Decoder) ReadSamples(ch int, dst []float32) {\n\tif ch < 0 || ch >= d.nChannels {\n\t\tch = 0\n\t}\n\tcopy(dst, d.sample[ch][0:d.NSamples()])\n}", "title": "" }, { "docid": "90719147b6b2d4b9a3d8a03d374ec48e", "score": "0.46099904", "text": "func (d *Decoder) Decode(m *Dnstap) error {\n\tfor {\n\t\tn, err := d.r.ReadFrame(d.buf)\n\n\t\tswitch err {\n\t\tcase framestream.ErrDataFrameTooLarge:\n\t\t\tcontinue\n\t\tcase nil:\n\t\t\tbreak\n\t\tdefault:\n\t\t\treturn err\n\t\t}\n\n\t\treturn proto.Unmarshal(d.buf[:n], m)\n\t}\n}", "title": "" }, { "docid": "a196b79a1d354f657245a76d88eff0aa", "score": "0.4585907", "text": "func NewBCJ2Decoder(main, call, jump, rangedecoder io.Reader, limit int64) (*BCJ2Decoder, error) {\n\trd, err := newRangeDecoder(rangedecoder)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdecoder := &BCJ2Decoder{\n\t\tmain: bufio.NewReader(main),\n\t\tcall: call,\n\t\tjump: jump,\n\t\trangeDecoder: rd,\n\t\tstatusDecoder: make([]*statusDecoder, 256+2),\n\t\tbuf: new(bytes.Buffer),\n\t}\n\tdecoder.buf.Grow(1 << 16)\n\n\tfor i := range decoder.statusDecoder {\n\t\tdecoder.statusDecoder[i] = newStatusDecoder()\n\t}\n\n\treturn decoder, nil\n}", "title": "" }, { "docid": "fce1b2785e45e835f1f23905a7d8a1a2", "score": "0.45693886", "text": "func UA_RegisterServer2Request_decodeBinary(src []UA_ByteString, offset []uint, dst []UA_RegisterServer2Request) UA_StatusCode {\n\treturn UA_decodeBinary(src, offset, dst, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[190]))[:], 0, nil)\n}", "title": "" }, { "docid": "ae66e29a056662d945725006e9b74b5e", "score": "0.45662114", "text": "func Morton2DDecode(n, d uint) (uint, uint) {\n\tvar x, y uint\n\ts := uint(1)\n\tfor i := uint(0); i < n; i++ {\n\t\tx |= (d >> i) & s\n\t\ty |= (d >> (i + 1)) & s\n\t\ts <<= 1\n\t}\n\treturn x, y\n}", "title": "" }, { "docid": "de7fb7871f83f651c6d1a1de79bc7378", "score": "0.45624354", "text": "func TestPayloadDecode(t *testing.T) {\n\tassert := assert.New(t)\n\tfor _, n := range []int{10, 1 << 10} {\n\t\tt.Run(strconv.Itoa(n), func(t *testing.T) {\n\t\t\tp := newPayload()\n\t\t\tfor i := 0; i < n; i++ {\n\t\t\t\tp.push(newSpanList(i%5 + 1))\n\t\t\t}\n\t\t\tvar got spanLists\n\t\t\terr := msgp.Decode(p, &got)\n\t\t\tassert.NoError(err)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "b58fe5ffe6b88d421764d0493337cf5d", "score": "0.45476094", "text": "func (d *Decoder) dequantize3() {\n\tfor gr := 0; gr < 2; gr++ {\n\t\tfor ch := 0; ch < d.nChannels; ch++ {\n\t\t\tlongLow, longHigh := 0, 22\n\t\t\tshortLow, shortHigh := 0, 13\n\t\t\tif d.blockType[gr][ch] == 2 {\n\t\t\t\tif d.mixedBlockFlag[gr][ch] == 1 {\n\t\t\t\t\tlongHigh = 8\n\t\t\t\t\tshortLow = 3\n\t\t\t\t} else {\n\t\t\t\t\tlongLow = 22\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tshortLow = 13\n\t\t\t}\n\n\t\t\tfor sfb := longLow; sfb < longHigh; sfb++ {\n\t\t\t\texp := 326 - 210 + d.globalGain[gr][ch]\n\t\t\t\tif sfb < 21 {\n\t\t\t\t\tk := d.scalefacL[gr][ch][sfb]\n\t\t\t\t\tk += d.preflag[gr][ch] * pretab[sfb]\n\t\t\t\t\tk <<= uint(d.scalefacScale[gr][ch] + 1)\n\t\t\t\t\texp -= k\n\t\t\t\t}\n\t\t\t\tq := exp2[exp]\n\t\t\t\tlow := scfBandsL[d.samplingFreq][sfb]\n\t\t\t\thigh := scfBandsL[d.samplingFreq][sfb+1]\n\t\t\t\tfor n := low; n < high; n++ {\n\t\t\t\t\td.huffmanData[gr][ch][n] *= q\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor sfb := shortLow; sfb < shortHigh; sfb++ {\n\t\t\t\tlow := scfBandsS[d.samplingFreq][sfb]\n\t\t\t\tlength := scfBandsS[d.samplingFreq][sfb+1] - low\n\t\t\t\tfor window := 0; window < 3; window++ {\n\t\t\t\t\texp := 326 - 210 + d.globalGain[gr][ch]\n\t\t\t\t\texp -= 8 * d.subblockGain[gr][ch][window]\n\t\t\t\t\tif sfb < 12 {\n\t\t\t\t\t\tk := d.scalefacS[gr][ch][sfb][window]\n\t\t\t\t\t\tk <<= uint(d.scalefacScale[gr][ch] + 1)\n\t\t\t\t\t\texp -= k\n\t\t\t\t\t}\n\t\t\t\t\tq := exp2[exp]\n\t\t\t\t\twinLow := 3*low + window*length\n\t\t\t\t\twinHigh := winLow + length\n\t\t\t\t\tfor n := winLow; n < winHigh; n++ {\n\t\t\t\t\t\td.huffmanData[gr][ch][n] *= q\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0a64dfb2b91ab3392498f0f3045f4c9d", "score": "0.45305064", "text": "func (s *decoder) decode() ([]Trace, error) {\n\tvar traces []Trace\n\tfor {\n\t\tline, err := s.reader.ReadSlice('\\n')\n\t\tif err != nil {\n\t\t\treturn traces, err\n\t\t}\n\t\tline = bytes.TrimSpace(line)\n\t\tif len(line) > 0 {\n\t\t\tevent, err := s.parseLine(line)\n\t\t\tif err != nil {\n\t\t\t\treturn traces, err\n\t\t\t}\n\t\t\ttraces = s.addEvent(traces, event)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e9cdc7127bf0e32236e722d0d173f8cf", "score": "0.45298094", "text": "func TestDecoder_SuccessfullyDecodesSpanWhenTraceContextIsPresent(t *testing.T) {\n\ttestFinish := make(chan struct{})\n\tmsgChan := make(chan msgWithContext)\n\tr := Receiver(ChanReceiver{\n\t\tc: msgChan,\n\t})\n\n\tctx, cancel := context.WithCancel(context.Background())\n\tdefer cancel()\n\n\tsc, b64Sc := makeSpanContext()\n\n\t// Construct a message with base64 encoding (YWJjMTIz == abc123)\n\tm := &msg.Message{\n\t\tBody: bytes.NewBufferString(\"hello\"),\n\t\tAttributes: msg.Attributes{},\n\t}\n\tm.Attributes.Set(\"Tracecontext\", b64Sc)\n\n\t// Wait for ChanReceiver to write the message to msgChan, assert on the body\n\tgo func() {\n\t\tresult := <-msgChan\n\n\t\texpectedBody := \"hello\"\n\t\tactual, _ := ioutil.ReadAll(result.msg.Body)\n\t\tif string(actual) != expectedBody {\n\t\t\tt.Errorf(\"Expected Body to be %v, got %v\", expectedBody, string(actual))\n\t\t}\n\n\t\tspan := trace.FromContext(result.ctx)\n\t\tif span == nil {\n\t\t\tt.Errorf(\"span was not expected to be nil\")\n\t\t}\n\n\t\treceivedSC := span.SpanContext()\n\n\t\tif receivedSC.TraceID != sc.TraceID {\n\t\t\tt.Errorf(cmp.Diff(receivedSC.TraceID, sc.TraceID))\n\t\t}\n\n\t\tif receivedSC.Tracestate != sc.Tracestate {\n\t\t\tt.Errorf(cmp.Diff(receivedSC.TraceID, sc.TraceID))\n\t\t}\n\n\t\ttestFinish <- struct{}{}\n\t}()\n\n\t// Receive the message!\n\terr := r.Receive(ctx, m)\n\tif err != nil {\n\t\tt.Error(err)\n\t\treturn\n\t}\n\t<-testFinish\n}", "title": "" }, { "docid": "0d73a162414a6e6019c9c3117017d74c", "score": "0.45270303", "text": "func ParseBs2Int8TwoComplement(bs *[]byte, offset int) (int8, error) {\n\t// error handling\n\tif len(*bs) < offset+1 {\n\t\treturn 0, fmt.Errorf(\"ParseBs2Int8TwoComplement invalid length of slice %#x , slice len %v , want %v\", (*bs), len(*bs), offset+1)\n\t}\n\tvar sum int8\n\tvar signed bool\n\t// mask last Bit with mask (1000 0000) then shift by 7 bits and check sign bit\n\tif (*bs)[offset]&0x80>>7 == 1 {\n\t\tsigned = true\n\t}\n\t// convert hex byte slice to int8\n\tcb := (*bs)[offset]\n\t// if signed do a XOR operation on every single Byte\n\tif signed {\n\t\tcb ^= 0xFF\n\t}\n\tsum = int8(cb)\n\t// finally if signed, increment with complement 1 and multiply by -1\n\tif signed {\n\t\tsum++\n\t\tsum = sum * -1\n\t}\n\treturn sum, nil\n}", "title": "" }, { "docid": "1caca88a8804897f1c40a39564fff851", "score": "0.45267236", "text": "func (d *Decoder) DecodeFrame() error {\n\tif d.stream.input != d.Input {\n\t\t*d = Decoder{\n\t\t\tInput: d.Input,\n\t\t\tstream: bitReader{input: d.Input},\n\t\t\treservoir: reservoirReader{stream: &d.stream},\n\t\t}\n\t}\n\n\tvar err error\n\n\tif err = d.decodeHeader(); err != nil {\n\t\treturn err\n\t}\n\n\tif d.protectionBit == 0 {\n\t\t// Skip over crc_check.\n\t\tfor i := 0; i < 2; i++ {\n\t\t\tif _, err = d.stream.readByte(); err == io.EOF {\n\t\t\t\treturn io.ErrUnexpectedEOF\n\t\t\t} else if err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tswitch d.layer {\n\tcase 1:\n\t\terr = d.decodeFrame1()\n\tcase 2:\n\t\terr = d.decodeFrame2()\n\tcase 3:\n\t\terr = d.decodeFrame3()\n\t}\n\n\tif err == io.EOF {\n\t\treturn io.ErrUnexpectedEOF\n\t} else if err != nil {\n\t\treturn err\n\t}\n\n\t// Any ancillary data is ignored.\n\n\td.synthetizeOutput()\n\n\treturn nil\n}", "title": "" }, { "docid": "b16bfc9a463edd8da0f10a8646f10fec", "score": "0.4525342", "text": "func (d *lubyDecoder) Decode() []byte {\n\tif !d.matrix.determined() {\n\t\treturn nil\n\t}\n\n\td.matrix.reduce()\n\n\tlenLong, lenShort, numLong, numShort := partition(d.messageLength, d.codec.SourceBlocks())\n\treturn d.matrix.reconstruct(d.messageLength, lenLong, lenShort, numLong, numShort)\n}", "title": "" }, { "docid": "bb043ac5fb98da34544a94aa540d2fe6", "score": "0.4516969", "text": "func NewFormat2(padding PinBlockPadding) *Iso2PinBlockAlgorithm {\n\treturn &Iso2PinBlockAlgorithm{\n\t\tPadding: padding,\n\t}\n}", "title": "" }, { "docid": "1309b8682e7d88e6be91c5e0bd700968", "score": "0.4507215", "text": "func ExampleDecode() {\n\tsrc := trinary.Trits{1, 0, -1, -1, -1, 1}\n\t// allocate a slice for the output\n\tdst := make([]byte, b1t6.DecodedLen(len(src)))\n\t_, err := b1t6.Decode(dst, src)\n\tif err != nil {\n\t\t// handle error\n\t\treturn\n\t}\n\tfmt.Println(dst)\n\t// output: [127]\n}", "title": "" }, { "docid": "95a96880d8e76a4291d177651c7f6e59", "score": "0.45035562", "text": "func TestDecoder_SuccessfullyDecodesSpanWhenTraceContextAndSpanIsPresent(t *testing.T) {\n\ttestFinish := make(chan struct{})\n\tmsgChan := make(chan msgWithContext)\n\tr := Receiver(ChanReceiver{\n\t\tc: msgChan,\n\t})\n\n\tctx, cancel := context.WithCancel(context.Background())\n\tdefer cancel()\n\n\tsc, b64Sc := makeSpanContext()\n\n\t// Construct a message with base64 encoding (YWJjMTIz == abc123)\n\tm := &msg.Message{\n\t\tBody: bytes.NewBufferString(\"hello\"),\n\t\tAttributes: msg.Attributes{},\n\t}\n\tm.Attributes.Set(\"Tracecontext\", b64Sc)\n\tm.Attributes.Set(\"Tracestate\", \"debug=true,log=false\")\n\n\t// Wait for ChanReceiver to write the message to msgChan, assert on the body\n\tgo func() {\n\t\tresult := <-msgChan\n\n\t\texpectedBody := \"hello\"\n\t\tactual, _ := ioutil.ReadAll(result.msg.Body)\n\t\tif string(actual) != expectedBody {\n\t\t\tt.Errorf(\"Expected Body to be %v, got %v\", expectedBody, string(actual))\n\t\t}\n\n\t\tspan := trace.FromContext(result.ctx)\n\t\tif span == nil {\n\t\t\tt.Errorf(\"span was not expected to be nil\")\n\t\t}\n\n\t\treceivedSC := span.SpanContext()\n\n\t\tif receivedSC.TraceID != sc.TraceID {\n\t\t\tt.Errorf(cmp.Diff(receivedSC.TraceID, sc.TraceID))\n\t\t}\n\n\t\tif receivedSC.Tracestate == nil {\n\t\t\tt.Errorf(\"tracestate was nil, expecting non-nil\")\n\t\t}\n\n\t\treceivedTS := receivedSC.Tracestate\n\n\t\tentries := receivedTS.Entries()\n\t\tif len(entries) != 2 {\n\t\t\tt.Errorf(\"expected tracestate entries to be 2\")\n\t\t}\n\n\t\te1 := receivedTS.Entries()[0]\n\t\tif e1.Key != \"debug\" || e1.Value != \"true\" {\n\t\t\tt.Errorf(\"tracestate entry unexpected, got %s %s\", e1.Key, e1.Value)\n\t\t}\n\n\t\te2 := receivedTS.Entries()[1]\n\t\tif e2.Key != \"log\" || e2.Value != \"false\" {\n\t\t\tt.Errorf(\"tracestate entry unexpected, got %s %s\", e2.Key, e2.Value)\n\t\t}\n\n\t\ttestFinish <- struct{}{}\n\t}()\n\n\t// Receive the message!\n\terr := r.Receive(ctx, m)\n\tif err != nil {\n\t\tt.Error(err)\n\t\treturn\n\t}\n\t<-testFinish\n}", "title": "" }, { "docid": "45817dcd47cc986c5875ed9e3cefc2a1", "score": "0.44934934", "text": "func (subframe *Subframe) decodeRicePart(br *bits.Reader, paramSize uint) error {\n\t// 4 bits: Partition order.\n\tx, err := br.Read(4)\n\tif err != nil {\n\t\treturn unexpected(err)\n\t}\n\tpartOrder := x\n\n\t// Parse Rice partitions; in total 2^partOrder partitions.\n\t//\n\t// ref: https://www.xiph.org/flac/format.html#rice_partition\n\t// ref: https://www.xiph.org/flac/format.html#rice2_partition\n\tnparts := 1 << partOrder\n\tfor i := 0; i < nparts; i++ {\n\t\t// (4 or 5) bits: Rice parameter.\n\t\tx, err = br.Read(paramSize)\n\t\tif err != nil {\n\t\t\treturn unexpected(err)\n\t\t}\n\t\tparam := uint(x)\n\n\t\t// Determine the number of Rice encoded samples in the partition.\n\t\tvar nsamples int\n\t\tif partOrder == 0 {\n\t\t\tnsamples = subframe.NSamples - subframe.Order\n\t\t} else if i != 0 {\n\t\t\tnsamples = subframe.NSamples / nparts\n\t\t} else {\n\t\t\tnsamples = subframe.NSamples/nparts - subframe.Order\n\t\t}\n\n\t\t// TODO(u): Verify that decoding of subframes with Rice parameter escape\n\t\t// codes have been implemented correctly.\n\t\tif paramSize == 4 && param == 0xF || paramSize == 5 && param == 0x1F {\n\t\t\t// 1111 or 11111: Escape code, meaning the partition is in unencoded\n\t\t\t// binary form using n bits per sample; n follows as a 5-bit number.\n\t\t\tx, err := br.Read(5)\n\t\t\tif err != nil {\n\t\t\t\treturn unexpected(err)\n\t\t\t}\n\t\t\tn := uint(x)\n\t\t\tfor j := 0; j < nsamples; j++ {\n\t\t\t\tsample, err := br.Read(n)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn unexpected(err)\n\t\t\t\t}\n\t\t\t\tsubframe.Samples = append(subframe.Samples, int32(sample))\n\t\t\t}\n\t\t\t// TODO(u): Remove log message when the test cases have been extended.\n\t\t\tlog.Print(\"frame.Subframe.decodeRicePart: The flac library test cases do not yet include any audio files with Rice parameter escape codes. If possible please consider contributing this audio sample to improve the reliability of the test cases.\")\n\t\t\treturn nil\n\t\t}\n\n\t\t// Decode the Rice encoded residuals of the partition.\n\t\tfor j := 0; j < nsamples; j++ {\n\t\t\tif err = subframe.decodeRiceResidual(br, param); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7b5c3ae0c8ef9c05bd313dafaea06d3b", "score": "0.4488366", "text": "func Bzip2Decompressor(r io.Reader) (io.ReadCloser, error) {\n\treturn io.NopCloser(bzip2.NewReader(r)), nil\n}", "title": "" }, { "docid": "0c15dd1137884b143df5d05f870a439b", "score": "0.4485961", "text": "func DecompressG2(c [96]byte) (*G2Affine, error) {\n\taffine, err := DecompressG2Unchecked(c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !affine.IsInCorrectSubgroupAssumingOnCurve() {\n\t\treturn nil, errors.New(\"point is not in correct subgroup\")\n\t}\n\treturn affine, nil\n}", "title": "" }, { "docid": "85db6d3b771729af42b53e981ad143e2", "score": "0.44857204", "text": "func (e *Encoder) Samples(samples []RefSample, b []byte) []byte {\n\tbuf := encoding.Encbuf{B: b}\n\tbuf.PutByte(byte(Samples))\n\n\tif len(samples) == 0 {\n\t\treturn buf.Get()\n\t}\n\n\t// Store base timestamp and base reference number of first sample.\n\t// All samples encode their timestamp and ref as delta to those.\n\tfirst := samples[0]\n\n\tbuf.PutBE64(uint64(first.Ref))\n\tbuf.PutBE64int64(first.T)\n\n\tfor _, s := range samples {\n\t\tbuf.PutVarint64(int64(s.Ref) - int64(first.Ref))\n\t\tbuf.PutVarint64(s.T - first.T)\n\t\tbuf.PutBE64(math.Float64bits(s.V))\n\t}\n\treturn buf.Get()\n}", "title": "" }, { "docid": "7ae66a93a73e1960a7006e12e3818719", "score": "0.44792485", "text": "func decodeLayer(p *nn.Path, cIn, cOut int64, skip *ts.Tensor) ts.ModuleT {\n\tbnConfig := nn.DefaultBatchNormConfig()\n\tbnConfig.Eps = 0.001\n\n\tconv1 := nn.SeqT()\n\tconv1.Add(conv2dNoBias(p, cIn, cOut, 3, 1, 1))\n\tconv1.Add(nn.BatchNorm2D(p.Sub(\"conv1_bn\"), cOut, bnConfig))\n\tconv1.AddFn(nn.NewFunc(func(xs *ts.Tensor) *ts.Tensor {\n\t\treturn xs.MustRelu(false)\n\t}))\n\n\tattn1 := squeezeExcite(p, cIn, 16)\n\n\tconv2 := nn.SeqT()\n\tconv2.Add(conv2dNoBias(p, cOut, cOut, 3, 1, 1))\n\tconv2.Add(nn.BatchNorm2D(p.Sub(\"conv2_bn\"), cOut, bnConfig))\n\tconv2.AddFn(nn.NewFunc(func(xs *ts.Tensor) *ts.Tensor {\n\t\treturn xs.MustRelu(false)\n\t}))\n\tattn2 := squeezeExcite(p, cOut, 16)\n\n\treturn nn.NewFuncT(func(x *ts.Tensor, train bool) *ts.Tensor {\n\t\t// concat\n\t\tvar catTs *ts.Tensor = x\n\t\tif skip != nil {\n\t\t\tcatTs = ts.MustCat([]ts.Tensor{*x, *skip}, 1)\n\t\t}\n\n\t\tfwdAttn1 := catTs.ApplyT(attn1, train)\n\t\tfwdConv1 := fwdAttn1.ApplyT(conv1, train)\n\t\tfwdConv2 := fwdConv1.ApplyT(conv2, train)\n\t\tout := fwdConv2.ApplyT(attn2, train)\n\n\t\tif skip != nil {\n\t\t\tcatTs.MustDrop()\n\t\t}\n\t\tfwdAttn1.MustDrop()\n\t\tfwdConv1.MustDrop()\n\t\tfwdConv2.MustDrop()\n\t\treturn out\n\t})\n}", "title": "" }, { "docid": "40d36eed47f4561383203a534a016eb8", "score": "0.44782722", "text": "func (d *Decoder) Read(p []byte) (n int, err error){\n\t\n\tif d.inputCount == 0{\n\t\treturn 0,ErrNoInput\n\t}else if d.outputCount == 0{\n\t\treturn 0,ErrDecoding\n\t}else{\n\t\treturn d.output.Read(p)\n\t}\n\t\n\t/*\n\t//Make buffers\n\tbuff := new(bytes.Buffer)\n\t\n\tcount := 0\n\t\n\t//Loop through bytes needed\n\tfor count < (len(p)/2){\n\t\tsample,more := <-d.output\n\t\t\n\t\tif !more{\n\t\t\tfmt.Println(\"Channel Closed\")\n\t\t\treturn 0,io.EOF\n\t\t}else{\t\t\t\n\t\t\t//Write to buffer\n\t\t\tbinary.Write(buff, binary.LittleEndian, sample)\n\t\t\tcount++\n\t\t}\n\t}\n\t\t\n\tcopy(p,buff.Bytes())\n\t\n\treturn len(p),nil\n\t*/\n}", "title": "" }, { "docid": "3ecf46c1d07deed01e492f3a5ba6010e", "score": "0.4477753", "text": "func readListPackV2(slice *sliceBuffer) (value []byte, err error) {\n\tvar special byte\n\tif special, err = slice.ReadByte(); err != nil {\n\t\treturn nil, err\n\t}\n\tif (special & rdbLpEncoding7BitUintMask) == rdbLpEncoding7BitUint { // mask 128 -> 0xxx xxxx\n\t\tslice.Skip(1)\n\t\tvalue = i642bytes((uint64(special) & 0x7f)) // 0x7f 127\n\n\t} else if (special & rdbLpEncoding6BitStrMask) == rdbLpEncoding6BitStr { // mask 192 -> 00xx xxxx\n\t\tlen := special & 0x3f // 0x3f 63\n\t\tskip := 1 + int(len)\n\t\tvalue, err = slice.First(int(len))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tslice.Skip(int(skip))\n\n\t} else if (special & rdbLpEncoding13BitIntMask) == rdbLpEncoding13BitInt { // mask 224 -> 000x xxxx\n\t\tnext, err := slice.ReadByte()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvalue = i642bytes(((uint64(special&0x1f) << 8) | uint64(next)))\n\t\tslice.Skip(2)\n\n\t} else if (special & rdbLpEncoding16BitIntMask) == rdbLpEncoding16BitInt { // mask 255\n\t\tvalue, err = slice.First(2)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tslice.Skip(3)\n\n\t} else if (special & rdbLpEncoding24BitIntMask) == rdbLpEncoding24BitInt {\n\t\tvalue, err = slice.First(3)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tslice.Skip(4)\n\n\t} else if (special & rdbLpEncoding32BitIntMask) == rdbLpEncoding32BitInt {\n\t\tvalue, err = slice.First(4)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tslice.Skip(5)\n\n\t} else if (special & rdbLpEncoding64BitIntMask) == rdbLpEncoding64BitInt {\n\t\tvalue, err = slice.First(8)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tslice.Skip(9)\n\n\t} else if (special & rdbLpEncoding12BitStrMask) == rdbLpEncoding12BitStr {\n\t\tb, err := slice.ReadByte()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tlen := ((uint64(special) & 0x0f) << 8) | uint64(b)\n\t\tvalue, err = slice.First(int(len))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tslice.Skip(2 + int(len))\n\n\t} else if (special & rdbLpEncoding32BitStrMask) == rdbLpEncoding32BitStr {\n\t\tlen, err := slice.First(4)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\trealLength, err := readuInt(len)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tvalue, err = slice.First(int(realLength))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tslice.Skip(5 + int(realLength))\n\n\t} else {\n\t\treturn nil, fmt.Errorf(\"Unsupported operation exception %q\", special)\n\t}\n\t// <element-tot-len>\n\n\treturn value, nil\n}", "title": "" }, { "docid": "46a52f39fc40e6c6a18e2a6a5acd5867", "score": "0.44664502", "text": "func decoder(data []byte) io.Reader {\n\treturn bzip2.NewReader(bytes.NewReader(append([]byte{'B', 'Z', 'h', '1'}, data[6:]...)))\n}", "title": "" }, { "docid": "2d1b3110c7a78d0d4543620b5c1cb19d", "score": "0.44601452", "text": "func CelDecodeFrameWithHeaderAndLight2(screenX, screenY int, celBuf unsafe.Pointer, frame, frameWidth, a6, direction int) {\n\tif UseGUI {\n\t\tcelDecodeFrameWithHeaderAndLight2(screenX, screenY, celBuf, frame, frameWidth, a6, direction)\n\t}\n\tC.engine_cel_decode_frame_with_header_and_light2(C.int(screenX), C.int(screenY), (*C.uint8_t)(celBuf), C.int(frame), C.int(frameWidth), C.int(a6), C.int(direction))\n}", "title": "" }, { "docid": "14a7d1654301e22591a2cb3917e45a81", "score": "0.4457372", "text": "func (ctx *CodecContext) AVCodecAlignDimensions2(w, h *int, l int) {\n\tC.avcodec_align_dimensions2((*C.struct_AVCodecContext)(ctx), (*C.int)(unsafe.Pointer(w)), (*C.int)(unsafe.Pointer(h)), (*C.int)(unsafe.Pointer(&l)))\n}", "title": "" }, { "docid": "99d17a76320dc96db082435281f5d59e", "score": "0.44522077", "text": "func ReverseComp2(dst, src []byte) {\n\tnByte := len(src)\n\tif len(dst) != len(src) {\n\t\tpanic(\"ReverseComp2() requires len(dst) == len(src).\")\n\t}\n\tif nByte < 16 {\n\t\tsimd.Reverse8(dst, src)\n\t\tsimd.XorConst8Inplace(dst, 3)\n\t\treturn\n\t}\n\tsrcHeader := (*reflect.SliceHeader)(unsafe.Pointer(&src))\n\tdstHeader := (*reflect.SliceHeader)(unsafe.Pointer(&dst))\n\treverseCompLookupSSSE3Asm(unsafe.Pointer(dstHeader.Data), unsafe.Pointer(srcHeader.Data), &revComp2Table, nByte)\n}", "title": "" }, { "docid": "51f37d25a8fe2533a95bc652dd8a567c", "score": "0.4451098", "text": "func (c *Codec2) decode(shortUrl string) string {\n\treturn c.tinyToOrigin[shortUrl]\n}", "title": "" }, { "docid": "a6def38e024d8ed170a34c987494e156", "score": "0.4448373", "text": "func TestDecodeUncompressedWIF_1(t *testing.T) {\n\t//http://gobittest.appspot.com/PrivateKey\n\tencodedKey := \"5HueCGU8rMjxEXxiPuD5BDku4MkFqeZyd4dZ1jvhTVqvbTLvyTJ\"\n\tprivateKey := strings.ToLower(\"0C28FCA386C7A227600B2FE50B7CAE11EC86D3BF1FBE471BE89827E19D72AA1D\")\n\tdecoded, compressed, err := PrivateFromWIF(encodedKey)\n\tif err != nil {\n\t\tt.Errorf(\"Failed because: %v\", err)\n\t}\n\tdecodedAsString := hex.EncodeToString(decoded)\n\tif decodedAsString != privateKey {\n\t\tt.Errorf(\"Failed because decoded key is not correct: %v %x\", decodedAsString, decoded)\n\t}\n\tif compressed != false {\n\t\tt.Errorf(\"Failed because decoded key is not compressed\")\n\t}\n}", "title": "" }, { "docid": "965383e9d571b5ba4472fda0cb375c00", "score": "0.44444504", "text": "func DeserializeDecoder(d []byte) (*Decoder, error) {\n\tvar b anyrnn.Stack\n\tvar m anynet.Layer\n\tif err := serializer.DeserializeAny(d, &b, &m); err != nil {\n\t\treturn nil, errors.New(\"deserialize Decoder: \" + err.Error())\n\t}\n\treturn &Decoder{Block: b, StateMapper: m}, nil\n}", "title": "" }, { "docid": "84feb45a37e32ac8a26e03cd1b8cf490", "score": "0.4426156", "text": "func Part2(fish []uint64) uint64 {\n\treturn Simulate(fish, 256)\n}", "title": "" }, { "docid": "213c6d2a53ebcb033b0657da017d8914", "score": "0.4423525", "text": "func (d *DT1) decodeTileGraphics() {\n\tyOffset := d.determineYOffset()\n\n\tfor _, tile := range d.Tiles {\n\t\ttw, th := tile.Width, tile.Height\n\t\tif th < 0 {\n\t\t\tth *= -1\n\t\t}\n\n\t\tfor _, block := range tile.Blocks {\n\t\t\tblock.PixelData = make([]byte, tw * th)\n\n\t\t\tif block.Format == BlockFormatIsometric {\n\t\t\t\tblock.decodeIsometric(tw, yOffset)\n\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tblock.decodeRunLengthEncoded(tw, yOffset)\n\n\t\t\tblock.image = image.NewRGBA(image.Rect(0, 0, int(tw), int(th)))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a70460e832f1bd19f26f84b749a97432", "score": "0.44135955", "text": "func (subframe *Subframe) decodeVerbatim(br *bits.Reader, bps uint) error {\n\t// Parse the unencoded audio samples of the subframe.\n\tfor i := 0; i < subframe.NSamples; i++ {\n\t\t// (bits-per-sample) bits: Unencoded constant value of the subblock.\n\t\tx, err := br.Read(bps)\n\t\tif err != nil {\n\t\t\treturn unexpected(err)\n\t\t}\n\t\tsample := signExtend(x, bps)\n\t\tsubframe.Samples = append(subframe.Samples, sample)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0b349c7931fe2a10d876e2a70bd62a87", "score": "0.44114116", "text": "func UnmarshalSM2PrivateKey(data []byte) (PrivKey, error) {\n\tpriv, err := sm2.ParsePKCS8UnecryptedPrivateKey(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &SM2PrivateKey{priv}, nil\n}", "title": "" }, { "docid": "e71616d67d2eac29af98467521a971a2", "score": "0.4409899", "text": "func CelDecodeFrameWithHeaderLightAndTransparencyIntoBuf2(dstBuf, celBuf unsafe.Pointer, frame, frameWidth, a5, direction int) {\n\tif UseGUI {\n\t\tcelDecodeFrameWithHeaderLightAndTransparencyIntoBuf2(dstBuf, celBuf, frame, frameWidth, a5, direction)\n\t}\n\tC.engine_cel_decode_frame_with_header_light_and_transparency_into_buf2((*C.uint8_t)(dstBuf), (*C.uint8_t)(celBuf), C.int(frame), C.int(frameWidth), C.int(a5), C.int(direction))\n}", "title": "" }, { "docid": "e54d50ad7feca419e97a21e1f1daa2f5", "score": "0.44057468", "text": "func Decode(r io.Reader) (m image.Image, err error) {\n\td, err := newDecoder(r)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// fmt.Println(\"=================\")\n\t// fmt.Println(d.String())\n\t// fmt.Println(\"=================\")\n\n\t// ==============================================================\n\tblockPadding := false\n\tblockWidth := d.config.Width\n\tblockHeight := d.config.Height\n\tblocksAcross := 1\n\tblocksDown := 1\n\n\tif d.config.Width == 0 {\n\t\tblocksAcross = 0\n\t}\n\tif d.config.Height == 0 {\n\t\tblocksDown = 0\n\t}\n\n\tvar blockOffsets, blockCounts []uint\n\n\tif int(d.firstVal(tTileWidth)) != 0 {\n\t\tblockPadding = true\n\n\t\tblockWidth = int(d.firstVal(tTileWidth))\n\t\tblockHeight = int(d.firstVal(tTileLength))\n\n\t\tif blockWidth != 0 {\n\t\t\tblocksAcross = (d.config.Width + blockWidth - 1) / blockWidth\n\t\t}\n\t\tif blockHeight != 0 {\n\t\t\tblocksDown = (d.config.Height + blockHeight - 1) / blockHeight\n\t\t}\n\n\t\tblockCounts = d.features[tTileByteCounts].val\n\t\tblockOffsets = d.features[tTileOffsets].val\n\n\t} else {\n\t\tif int(d.firstVal(tRowsPerStrip)) != 0 {\n\t\t\tblockHeight = int(d.firstVal(tRowsPerStrip))\n\t\t}\n\n\t\tif blockHeight != 0 {\n\t\t\tblocksDown = (d.config.Height + blockHeight - 1) / blockHeight\n\t\t}\n\n\t\tblockOffsets = d.features[tStripOffsets].val\n\t\tblockCounts = d.features[tStripByteCounts].val\n\t}\n\n\t// Check if we have the right number of strips/tiles, offsets and counts.\n\tif n := blocksAcross * blocksDown; len(blockOffsets) < n || len(blockCounts) < n {\n\t\treturn nil, FormatError(\"inconsistent header\")\n\t}\n\n\t// ==============================================================\n\n\tbounds := image.Rect(0, 0, d.config.Width, d.config.Height)\n\tswitch d.mode {\n\tcase mRGB:\n\t\tif d.bpp == 32 {\n\t\t\tm = hdr.NewRGB(bounds)\n\t\t} else {\n\t\t\terr = FormatError(\"Invalid BitsPerSample for RGB 32 bits floating-point format\")\n\t\t\treturn\n\t\t}\n\tcase mLogL:\n\t\tif d.bpp == 16 {\n\t\t\tm = hdr.NewXYZ(bounds)\n\t\t} else {\n\t\t\terr = FormatError(\"Invalid BitsPerSample for LogL format\")\n\t\t\treturn\n\t\t}\n\tcase mLogLuv:\n\t\tif d.bpp == 16 {\n\t\t\tm = hdr.NewXYZ(bounds)\n\t\t} else {\n\t\t\terr = FormatError(\"Invalid BitsPerSample for LogLuv format\")\n\t\t\treturn\n\t\t}\n\tcase mColorFilterArray:\n\t\tif d.bpp == 16 || d.bpp == 8 {\n\t\t\tm = hdr.NewXYZ(bounds)\n\t\t} else {\n\t\t\terr = FormatError(\"Invalid BitsPerSample for ColorFilterArray format\")\n\t\t\treturn\n\t\t}\n\t}\n\n\t// ==============================================================\n\n\tfor i := 0; i < blocksAcross; i++ {\n\t\tblkW := blockWidth\n\t\tif !blockPadding && i == blocksAcross-1 && d.config.Width%blockWidth != 0 {\n\t\t\tblkW = d.config.Width % blockWidth\n\t\t}\n\t\tfor j := 0; j < blocksDown; j++ {\n\t\t\tblkH := blockHeight\n\t\t\tif !blockPadding && j == blocksDown-1 && d.config.Height%blockHeight != 0 {\n\t\t\t\tblkH = d.config.Height % blockHeight\n\t\t\t}\n\t\t\toffset := int64(blockOffsets[j*blocksAcross+i])\n\t\t\tn := int64(blockCounts[j*blocksAcross+i])\n\n\t\t\tif err = d.decompress(offset, n, blkW, blkH); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\txmin := i * blockWidth\n\t\t\tymin := j * blockHeight\n\t\t\txmax := xmin + blkW\n\t\t\tymax := ymin + blkH\n\t\t\terr = d.decode(m, xmin, ymin, xmax, ymax)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "46275308c0377e98af10f81e6795c040", "score": "0.4402869", "text": "func (subframe *Subframe) decodeConstant(br *bits.Reader, bps uint) error {\n\t// (bits-per-sample) bits: Unencoded constant value of the subblock.\n\tx, err := br.Read(bps)\n\tif err != nil {\n\t\treturn unexpected(err)\n\t}\n\n\t// Each sample of the subframe has the same constant value.\n\tsample := signExtend(x, bps)\n\tfor i := 0; i < subframe.NSamples; i++ {\n\t\tsubframe.Samples = append(subframe.Samples, sample)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e365d3f6d0d0189bbaf6e39b76c0925a", "score": "0.43855238", "text": "func TestDataReadSamples(t *testing.T) {\n\tdescription := \"Samples are read correctly from a data chunk\"\n\n\t// Prepare 4096 bytes of sample data\n\tsamples := make([]byte, 4096)\n\tfor i, _ := range samples {\n\t\tsamples[i] = byte(i)\n\t}\n\n\t// Prepare a decoder to use\n\tvar d decoder\n\td.audio = new(audio.Audio)\n\n\t// Only log the chunk contents if verbose is enabled\n\tif testing.Verbose() {\n\t\td.logger = log.New(os.Stdout, \"\", 0)\n\t} else {\n\t\td.logger = log.New(ioutil.Discard, \"\", 0)\n\t}\n\n\t// Start with a valid chunk\n\tc := make([]byte, len(validDataChunk))\n\tcopy(c, validDataChunk)\n\n\t// Use the 4096 bytes of sample data prepared previously\n\tcopy(c[4:], []byte{0x0C, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00})\n\tc = append(c, samples...)\n\n\t// Prepare the decoder to expect 4096 bytes of sample data\n\t// This is normally done when reading a fmt chunk, omitted in this test\n\td.audio.EncodedSamples = make([]byte, 4096)\n\n\t// Reading the chunk should not throw an error\n\td.reader = bytes.NewReader(c)\n\terr := d.readDataChunk()\n\tif err != nil {\n\t\tt.Fatalf(\"FAIL Test %v: %v:\\nWant: nil\\nActual: %v\", len(dataChunkTests)+3, description, err.Error())\n\t} else {\n\t\tt.Logf(\"PASS Test %v: %v:\\nWant: nil\\nActual: nil\", len(dataChunkTests)+3, description)\n\t}\n\n\t// Verify the samples were read correctly\n\tfor j, sample := range samples {\n\t\tif d.audio.EncodedSamples[j] != sample {\n\t\t\tt.Fatalf(\"FAIL Test %v: %v:\\nIncorrect sample data at byte %v: %v != %v\",\n\t\t\t\tlen(dataChunkTests)+2, description, j, d.audio.EncodedSamples[j], sample)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b36a85bfbb4533021497430a5fc48150", "score": "0.43855125", "text": "func (d *FFTDecoder) Decode(input Message) Message {\n\tdata := input.Data()\n\tfor i := 0; i < d.phaseCount; i++ {\n\t\tdata = d.applyPhase(data)\n\t}\n\treturn NewMessage(data[:8], 0)\n}", "title": "" }, { "docid": "23a7bcfbee980b06258d31524bcde58b", "score": "0.4385173", "text": "func Part2(fileName string) int {\n\treturn calcOpSig(fileName, []int{5, 6, 7, 8, 9}, loopedOutputSignal)\n}", "title": "" }, { "docid": "6c4a9d26756931f46b10384a46700337", "score": "0.4381751", "text": "func (d *binaryDecoder) Decode() []byte {\n\tif !d.matrix.determined() {\n\t\treturn nil\n\t}\n\n\td.matrix.reduce()\n\n\tlenLong, lenShort, numLong, numShort := partition(d.messageLength, d.codec.numSourceBlocks)\n\treturn d.matrix.reconstruct(d.messageLength, lenLong, lenShort, numLong, numShort)\n}", "title": "" }, { "docid": "106f589d20eb84c6911883ec22a4a8a2", "score": "0.43810162", "text": "func decodeInitMessage(m *initMessage, data []uint8) error {\n\tif len(data) > 4 && data[0] == initMessageType &&\n\t\tdata[2] == 0 && data[3] == 2 {\n\t\t// protocol version 2\n\t\tvar m2 initMessageV2\n\t\terr := decode(&m2, data)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tm.MessageType = m2.MessageType\n\t\tm.More = m2.More\n\t\tm.ProtocolVersion = m2.ProtocolVersion\n\t\tm.MaxMessageSize = m2.MaxMessageSize\n\t\tm.CreationMode = m2.CreationMode\n\t\tm.Offset = m2.Offset\n\t\tm.DocIDLength = uint32(m2.DocIDLength)\n\t\tm.DocID = m2.DocID\n\t\tm.Data = m2.Data\n\t\treturn nil\n\t}\n\n\treturn decode(m, data)\n}", "title": "" }, { "docid": "37864f4e567427c6866c588df3492f76", "score": "0.43770304", "text": "func benchmarkDecoderDecode(fileName string, b *testing.B) {\n\tfor n := 0; n < b.N; n++ {\n\t\tfile, err := os.Open(fileName)\n\t\tif err != nil {\n\t\t\tb.Fatal(err)\n\t\t}\n\n\t\tif _, err := NewDecoder(file, DecodeValidators()).Decode(); err != nil {\n\t\t\tb.Fatal(err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c564b6ba474c3e113bbd1b0f9ef56495", "score": "0.43571085", "text": "func CelDecodeFrameWithHeaderAndLightNotEquipable2(screenX, screenY int, celBuf unsafe.Pointer, frame, frameWidth, always0, direction int, always1 int8) {\n\tif UseGUI {\n\t\tcelDecodeFrameWithHeaderAndLightNotEquipable2(screenX, screenY, celBuf, frame, frameWidth, always0, direction, always1)\n\t}\n\tC.engine_cel_decode_frame_with_header_and_light_not_equipable2(C.int(screenX), C.int(screenY), (*C.uint8_t)(celBuf), C.int(frame), C.int(frameWidth), C.int(always0), C.int(direction), C.int8_t(always1))\n}", "title": "" }, { "docid": "5825f9b6ecac0232d4843d3d7b590e2c", "score": "0.43514478", "text": "func (t *Terminal) ProcessSamples(in [][]float32, length int) (output [][]float32) {\n\tfor i := 0; i < len(in); i++ {\n\t\tfor j := 0; j < length; j++ {\n\t\t\tt.samples[i][j] = in[i][j]\n\t\t}\n\t}\n\treturn in\n}", "title": "" }, { "docid": "616c6be5a84f44d74413f203fca0f085", "score": "0.4348917", "text": "func (ctx *CodecContext) AVCodecGetPktTimebase2() Rational {\n\treturn ctx.AVCodecGetPktTimebase()\n}", "title": "" }, { "docid": "5960716d2935333a7a65d9b6fc606852", "score": "0.43472618", "text": "func (d *decoder) decode(r io.Reader, configOnly bool) (image.Image, error) {\n\tif rr, ok := r.(Reader); ok {\n\t\td.r = rr\n\t} else {\n\t\td.r = bufio.NewReader(r)\n\t}\n\n\t// Check for the Start Of Image marker.\n\t_, err := io.ReadFull(d.r, d.tmp[0:2])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif d.tmp[0] != 0xff || d.tmp[1] != soiMarker {\n\t\treturn nil, errors.New(\"missing SOI marker\")\n\t}\n\n\t// Process the remaining segments until the End Of Image marker.\n\tfor {\n\t\t_, err := io.ReadFull(d.r, d.tmp[0:2])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif d.tmp[0] != 0xff {\n\t\t\treturn nil, errors.New(\"missing 0xff marker start\")\n\t\t}\n\t\tmarker := d.tmp[1]\n\t\tif marker == eoiMarker { // End Of Image.\n\t\t\tbreak\n\t\t}\n\n\t\t// Read the 16-bit length of the segment. The value includes the 2 bytes for the\n\t\t// length itself, so we subtract 2 to get the number of remaining bytes.\n\t\t_, err = io.ReadFull(d.r, d.tmp[0:2])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tn := int(d.tmp[0])<<8 + int(d.tmp[1]) - 2\n\t\tif n < 0 {\n\t\t\treturn nil, errors.New(\"short segment length\")\n\t\t}\n\n\t\tswitch {\n\t\tcase marker == sof0Marker: // Start Of Frame (Baseline).\n\t\t\terr = d.processSOF(n)\n\t\t\tif configOnly {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\tcase marker == sof2Marker: // Start Of Frame (Progressive).\n\t\t\terr = errors.New(\"progressive mode\")\n\t\tcase marker == dhtMarker: // Define Huffman Table.\n\t\t\terr = d.processDHT(n)\n\t\tcase marker == dqtMarker: // Define Quantization Table.\n\t\t\terr = d.processDQT(n)\n\t\tcase marker == sosMarker: // Start Of Scan.\n\t\t\terr = d.processSOS(n)\n\t\tcase marker == driMarker: // Define Restart Interval.\n\t\t\terr = d.processDRI(n)\n\t\tcase marker >= app0Marker && marker <= app15Marker || marker == comMarker: // APPlication specific, or COMment.\n\t\t\terr = d.ignore(n)\n\t\tdefault:\n\t\t\terr = errors.New(\"unknown marker\")\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn d.img, nil\n}", "title": "" }, { "docid": "787a7e6044d971a83a1cdda76ab07065", "score": "0.43466482", "text": "func (nc *NaiveCommunicator) ExchangePhase2(ctx context.Context, participants []core.Node, packet *packets.Phase2Packet) (map[core.RecordRef]*packets.Phase2Packet, error) {\n\tresult := make(map[core.RecordRef]*packets.Phase2Packet, len(participants))\n\n\tresult[nc.ConsensusNetwork.GetNodeID()] = packet\n\n\tpacketBuffer, err := packet.Serialize()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"[ExchangePhase2] Failed to serialize Phase2Packet.\")\n\t}\n\n\trequestBuilder := nc.ConsensusNetwork.NewRequestBuilder()\n\trequest := requestBuilder.Type(types.Phase2).Data(packetBuffer).Build()\n\n\tnc.sendRequestToNodes(participants, request)\n\n\tinslogger.FromContext(ctx).Infof(\"result len %d\", len(result))\n\tfor {\n\t\tselect {\n\t\tcase res := <-nc.phase2result:\n\t\t\tif res.packet.GetPulseNumber() != core.PulseNumber(nc.currentPulseNumber) {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif val, ok := result[res.id]; !ok || val == nil {\n\t\t\t\t// send response\n\t\t\t\terr := nc.ConsensusNetwork.SendRequest(request, res.id)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Errorln(err.Error())\n\t\t\t\t}\n\t\t\t}\n\t\t\tresult[res.id] = res.packet\n\n\t\t\tif len(result) == len(participants) {\n\t\t\t\treturn result, nil\n\t\t\t}\n\n\t\tcase <-ctx.Done():\n\t\t\treturn result, nil\n\t\t}\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "687946a9db5985e8d4d309e8978ae97a", "score": "0.43439677", "text": "func (subframe *Subframe) decodeLPC(coeffs []int32, shift int32) error {\n\tif len(coeffs) != subframe.Order {\n\t\treturn fmt.Errorf(\"frame.Subframe.decodeLPC: prediction order (%d) differs from number of coefficients (%d)\", subframe.Order, len(coeffs))\n\t}\n\tif shift < 0 {\n\t\treturn fmt.Errorf(\"frame.Subframe.decodeLPC: invalid negative shift\")\n\t}\n\tif subframe.NSamples != len(subframe.Samples) {\n\t\treturn fmt.Errorf(\"frame.Subframe.decodeLPC: subframe sample count mismatch; expected %d, got %d\", subframe.NSamples, len(subframe.Samples))\n\t}\n\tfor i := subframe.Order; i < subframe.NSamples; i++ {\n\t\tvar sample int64\n\t\tfor j, c := range coeffs {\n\t\t\tsample += int64(c) * int64(subframe.Samples[i-j-1])\n\t\t}\n\t\tsubframe.Samples[i] += int32(sample >> uint(shift))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5745d16e068e73b06ad418bdea3e0d9c", "score": "0.43403175", "text": "func ReadPrefix2(r io.Reader, b *[]byte) (err error) {\n\tvar length uint16\n\terr = binary.Read(r, o, &length)\n\n\tvar buf []byte = make([]byte, int(length))\n\tbinary.Read(r, o, buf)\n\n\t*b = buf\n\treturn\n}", "title": "" }, { "docid": "d4d9ca1824b5f9f67b5789529daa1a37", "score": "0.4331988", "text": "func (s *Stack2) Pop2(flag int) *int {\n\tif s.IsEmpty2(flag) {\n\t\treturn nil\n\t}\n\n\tif flag == 1 {\n\t\ti := s.tos1\n\t\ts.tos1--\n\t\treturn &s.arr[i]\n\t}\n\ti := s.tos2\n\ts.tos2--\n\treturn &s.arr[i]\n}", "title": "" }, { "docid": "d0b69b7797da8b2693ea25157cb61075", "score": "0.43302733", "text": "func TestDecoder_SuccessfullySetsSpanWhenNoTraceContext(t *testing.T) {\n\ttestFinish := make(chan struct{})\n\tmsgChan := make(chan msgWithContext)\n\tr := Receiver(ChanReceiver{\n\t\tc: msgChan,\n\t})\n\n\tctx, cancel := context.WithCancel(context.Background())\n\tdefer cancel()\n\n\t// Construct a message without base64 encoding\n\tm := &msg.Message{\n\t\tBody: bytes.NewBufferString(\"abc123\"),\n\t\tAttributes: msg.Attributes{},\n\t}\n\n\t// Wait for ChanReceiver to write the message to msgChan, assert on the body\n\tgo func() {\n\t\tresult := <-msgChan\n\t\texpectedBody := \"abc123\"\n\t\tactual, _ := ioutil.ReadAll(result.msg.Body)\n\t\tif string(actual) != expectedBody {\n\t\t\tt.Errorf(\"Expected Body to be %v, got %v\", expectedBody, string(actual))\n\t\t}\n\n\t\tspan := trace.FromContext(result.ctx)\n\t\tif span == nil {\n\t\t\tt.Errorf(\"span was not expected to be nil\")\n\t\t}\n\n\t\ttestFinish <- struct{}{}\n\t}()\n\n\t// Receive the message!\n\terr := r.Receive(ctx, m)\n\tif err != nil {\n\t\tt.Error(err)\n\t\treturn\n\t}\n\t<-testFinish\n}", "title": "" }, { "docid": "8053fe2e244a65f7d5d08e69fd906930", "score": "0.43282938", "text": "func TestDecodeFrame(t *testing.T) {\n\tfor _, test := range frameTests {\n\t\ta := assert.New(t)\n\t\tr := bytes.NewReader(test.payload)\n\t\tf, err := lifx.DecodeFrame(r)\n\t\ta.Nil(err)\n\t\ta.Equal(test.frame, *f)\n\t}\n}", "title": "" } ]
6fe5f57c689f56c77d6b4f93bb027f8b
Header returns an http.Header that can be modified by the caller to add HTTP headers to the request.
[ { "docid": "f7d3b2a92138169922e8c46cefc5770c", "score": "0.0", "text": "func (c *ProjectsLocationsTrainingPipelinesOperationsCancelCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" } ]
[ { "docid": "b973e3b3eeaa43589511b9cce0b88860", "score": "0.7400927", "text": "func (c *ManagementFiltersInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "3598e89805a005288e3bf52e5a036522", "score": "0.73782426", "text": "func (c *PutCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a447b5b5b5a903729ebab4f29dc64b98", "score": "0.73730797", "text": "func (c *ManagementFiltersUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "045e01c7ac2a095dfbd89a1e7048f3f3", "score": "0.73640347", "text": "func (c *UsersAddPublicKeyCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0549ded1d94a267f20ac442d072e45a6", "score": "0.7288299", "text": "func (c *EntriesWriteCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "038840d2f4a3dcf44270aacd0fdc30ef", "score": "0.7286992", "text": "func (c *ManagementWebpropertiesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a6fb7bedda3ee65134080a5600d42b6c", "score": "0.72703767", "text": "func (c *ManagementWebpropertiesInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "5fee7bfc11ca616e01e17a8920f86014", "score": "0.72620857", "text": "func (c *ManagementFiltersGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4e1b427a151e2ab56c50d7a6c9317aa0", "score": "0.72523546", "text": "func (rh *RequestHeader) Header() *RequestHeader {\n\treturn rh\n}", "title": "" }, { "docid": "00af6056250b035c781af019a64c9a57", "score": "0.72441643", "text": "func (c *ActionResultsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "edb2848791635353f797cd210d8f3aa6", "score": "0.7240301", "text": "func (c *MediaInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "29c911a4d8ddf8a0df6a8d02ead41dbf", "score": "0.7237186", "text": "func (c *RelyingpartySignupNewUserCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "e524f7e3ae41c2b5ba5d0dd05b0bb797", "score": "0.72287565", "text": "func (c *DevicesCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "7cc695b17590eaaf05e3a268d81b4891", "score": "0.722768", "text": "func (h *HTTP) Header(n string, v string) {\n\th.Mutex.Lock()\n\tdefer h.Mutex.Unlock()\n\th.Headers[n] = v\n}", "title": "" }, { "docid": "808deb3402e68f936e5c8791e97447f0", "score": "0.722313", "text": "func (c *GroupsAddMemberCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "b7441a5573da408299e351a3b5800bf5", "score": "0.72155344", "text": "func (c *ManagementFiltersPatchCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "36a9e5c4c80638ced45de331f20f1c55", "score": "0.7213245", "text": "func (c *UsersInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "9799914787ca8fa327cd5c69b3b265d2", "score": "0.72112715", "text": "func (c *ManagementUploadsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "5523d932a52b2acb19a6a8c9ad5587a1", "score": "0.7209832", "text": "func (c *GetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a6ba5577a7ba428ca85f45c47cd8838f", "score": "0.71953624", "text": "func (c *ActionsExecuteCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4c558964fa0819db2be9f230d3cb747e", "score": "0.7189663", "text": "func (c *UsersGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a000f3701599977053ef299c548b86f4", "score": "0.7176816", "text": "func (c *ManagementExperimentsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "eb23d722327b449d1200329e1b211124", "score": "0.71738523", "text": "func (c *PoliciesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "64a7dd29fae0129937efa81d5fb2a519", "score": "0.7167418", "text": "func (c *ActionResultsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "6229209318692aeaff0235121b0715d6", "score": "0.7161618", "text": "func (c *ManagementProfileFilterLinksInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "2b4cf53cc072813b397450982469591e", "score": "0.71492255", "text": "func (c *ManagementProfilesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "ebb4d371c85c25890944194c86c03037", "score": "0.71458316", "text": "func (c *LeaseCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f0a27f700a96d3fc97fdb63d277b99bd", "score": "0.71454734", "text": "func (c *OperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f0a27f700a96d3fc97fdb63d277b99bd", "score": "0.71454734", "text": "func (c *OperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f0a27f700a96d3fc97fdb63d277b99bd", "score": "0.71454734", "text": "func (c *OperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f0a27f700a96d3fc97fdb63d277b99bd", "score": "0.71454734", "text": "func (c *OperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f0a27f700a96d3fc97fdb63d277b99bd", "score": "0.71454734", "text": "func (c *OperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "08cc54442d4ee0f94bae009f18ab45c7", "score": "0.71454513", "text": "func (c *RelyingpartyCreateAuthUriCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "d203a2ff3c6300185e229b0c680e0591", "score": "0.7143745", "text": "func (wreq *WebRequest) Header() *Values {\n\tif wreq.header == nil {\n\t\twreq.header = newValues(wreq.wa)\n\t}\n\treturn wreq.header\n}", "title": "" }, { "docid": "50e3669bf80ba7e258d7a061aa903ac4", "score": "0.7138895", "text": "func (c *PoliciesCreatePolicyCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0061cd441fef6e29276db6fbb0b3f26f", "score": "0.7138501", "text": "func (c *GroupsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "72d13a2d5fd656edfd67dba529106226", "score": "0.7136596", "text": "func (c *ManagementWebpropertyUserLinksUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "e3d745c266c9d473bd61f2df380ce477", "score": "0.71354705", "text": "func (c *ManagementProfileFilterLinksUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "55bf3506a83cbac776e4154bbb476c79", "score": "0.7132637", "text": "func (c *ManagementCustomMetricsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0ff99e5e31f4636006c3269cabd92575", "score": "0.71302307", "text": "func (c *AppsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "101faf59020673872a747a469c5a30b4", "score": "0.71277064", "text": "func (c *ProjectsInstancesSetIamPolicyCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "6839c3e0620ed933726982d00be8f51e", "score": "0.7126151", "text": "func (c *ManagementWebpropertiesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "7b34153537803799958146f50f79fb2e", "score": "0.7120749", "text": "func (c *StartCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "76e7613548b82f3b48f964128c718aff", "score": "0.71142256", "text": "func (c *ManagementWebpropertiesPatchCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "2d32d50b31071ab537ddc7f4bc5dab72", "score": "0.71114177", "text": "func (c *ManagementProfilesInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "98019fe34c4934499736050ebdf25903", "score": "0.71084887", "text": "func (c *PushtokensUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "e0374a2af94ce555735690997be19f06", "score": "0.7104653", "text": "func (c *ProjectsMetricsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "c4a1e1789e5ef33fb388c5b3dd4bbe3b", "score": "0.71039736", "text": "func (w *cachingResponseWriter) Header() http.Header { return w.w.Header() }", "title": "" }, { "docid": "93031fbcafa441d3d5ec61bce062b6a1", "score": "0.71000695", "text": "func (c *SearchCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "cc4883c9fa26c3a75996dede23f46ca6", "score": "0.7097404", "text": "func (c *EventsRecordCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "961380ca25487d95364e4e3e06c3dff4", "score": "0.709471", "text": "func (c *ManagementGoalsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "822f4852744c5ab3838b929dd58a3d69", "score": "0.7091517", "text": "func (c *UserinfoGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "b3de8431a04521f6cb59bd892cb4ce80", "score": "0.7091432", "text": "func (b *B) Header() http.Header {\n\tb.once.Do(func() {\n\t\tb.headers = make(http.Header)\n\t})\n\treturn b.headers\n}", "title": "" }, { "docid": "dc22b005b4dc2441ee400af0a515db57", "score": "0.70901704", "text": "func (c *EventsListByPlayerCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "1aa6c46a06634a9913cd8ceeeddf0871", "score": "0.7085808", "text": "func (c *ManagementWebpropertyUserLinksInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "9b758d8d9870d533afe3516a7ee6e1d2", "score": "0.7082584", "text": "func (c *ManagementGoalsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "ad937979658d25058c54f45bfc8baa65", "score": "0.7079149", "text": "func (c *QuestsListCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "987f05c8b9fe98dd89dafe58b6c56725", "score": "0.7075003", "text": "func (c *AccountsCreativesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "be87469c771d814bc920f556ea22fb01", "score": "0.7072909", "text": "func (c *DevicesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "bd8a7691b4433975819f2ead4967e17e", "score": "0.70719236", "text": "func (c *RevisionsCheckCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "d9e7927ebb60ea39d0a550f611f989ef", "score": "0.7068133", "text": "func (c *SucceedCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "6b1c20ecf302c3711362f23d1e20ff2c", "score": "0.70582825", "text": "func (c *ProjectsMetricsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "b5b9e90cbceca24f2f4856d9882abcfb", "score": "0.7055862", "text": "func (c *AchievementsResetAllCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "435487323a4379d9dd2bcf377f317729", "score": "0.7054144", "text": "func (c *ManagementFiltersListCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "cd0fec104c020cd6543052c2fb9b219a", "score": "0.70534116", "text": "func (c *GroupsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "8820bbfbcbed8bbc481a398e6d6308d2", "score": "0.7048243", "text": "func (c *QuestsAcceptCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "c3ede8caa85ac40b1df01d72264eb36f", "score": "0.7046782", "text": "func (c *ServicesCheckCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "2111d6371fdcc3c5defbea82dfec91e2", "score": "0.7046257", "text": "func (c *ActivitiesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "7b89f3887178dda91ef40045f5659d50", "score": "0.70461524", "text": "func (c *PushtokensRemoveCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "7d47657daa1f9ce490625e2950065c1d", "score": "0.7042404", "text": "func (c *ManagementExperimentsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "281a1c39db9ae645f73379c285a01465", "score": "0.7042058", "text": "func (c *ScoresResetAllCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "cd9b8762fa0ba2459f22e23a93c86242", "score": "0.7040965", "text": "func (c *SitesVersionsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "26ec326a2a66f4856d89be26f989209b", "score": "0.70395565", "text": "func (c *PoliciesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "c3f6506a91cc0a5ae85d1521b364ae7c", "score": "0.70393246", "text": "func (c *ProjectsOperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "c3f6506a91cc0a5ae85d1521b364ae7c", "score": "0.70393246", "text": "func (c *ProjectsOperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "90eebd17828323731f44a49286cf934d", "score": "0.7038481", "text": "func (c *ProjectsInstructionsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a6dd8ec61aaaf9cdc8e30c4f9efcacdd", "score": "0.703513", "text": "func (c *AccountsCreativesWatchCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "ff42fff728568c76795114b7f040c4e9", "score": "0.7032643", "text": "func (c *ManagementGoalsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "2f2846db1f1083264522d73aede77b45", "score": "0.7032012", "text": "func (c *ManagementExperimentsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4e85d152c220a0fff11767a159e3981b", "score": "0.7029315", "text": "func (c *FeaturetilesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "c6a836071e87ad9a6be52f370b324e49", "score": "0.702768", "text": "func (c *ManagementProfilesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "329aafae072f437cb7c7ebe9dd7bd431", "score": "0.70267737", "text": "func (c *ProjectsLocationsInstancesCheckUpgradabilityCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "d88b8c43caf123a423a1edf995c373d2", "score": "0.7026406", "text": "func (c *DataMcfGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "235b9cdc7967caff155557e679aea277", "score": "0.70245355", "text": "func (c *ProjectsServiceAccountsSignJwtCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "235b9cdc7967caff155557e679aea277", "score": "0.70245355", "text": "func (c *ProjectsServiceAccountsSignJwtCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "40720f5276af5787b6f6369a79ef3307", "score": "0.701703", "text": "func (w *Web) Header() http.Header {\n\treturn w.web.Header()\n}", "title": "" }, { "docid": "c1f0fbf77a8aab7417bde6289e7f3dac", "score": "0.70159245", "text": "func (c *ChallengeGenerateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0aa77953c299e3fdad50f794314d51fc", "score": "0.7014884", "text": "func (c *ManagementCustomMetricsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a5773fd6b9190a4366c8426ab4ebc05c", "score": "0.7012105", "text": "func (c *EventsResetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "e128396acec9868964cfdf44b1bed10d", "score": "0.70110124", "text": "func (c *ProjectsInstancesCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "963eedb7c241b47399f0eec69fecde7e", "score": "0.70088977", "text": "func (c *EventsResetAllCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "9017baf57be5641f247eadd34ba2aeb1", "score": "0.7006438", "text": "func (c *AppsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "27961a4b40edded8ad578b1100d29c0d", "score": "0.7003224", "text": "func (c *GroupsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "27961a4b40edded8ad578b1100d29c0d", "score": "0.7003224", "text": "func (c *GroupsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "80d847848b1b96c7338e23718f3f28d0", "score": "0.70030123", "text": "func (c *ManagementProfilesPatchCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "e06d1f34b07df9c22905fac34aba34ee", "score": "0.69995916", "text": "func (c *TurnBasedMatchesCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "dc3d03d1c9155e1fefa64fd6bef3bf04", "score": "0.6998978", "text": "func (c *SitesReleasesCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "09394d5ce5061057d1fefebec7dcaae3", "score": "0.69982475", "text": "func (c *TokeninfoCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "798169f7d1f85c1e087abb6acb500e7a", "score": "0.6997772", "text": "func (w etagWriter) Header() http.Header {\n\treturn w.rw.Header()\n}", "title": "" }, { "docid": "1ee12dde879956070634779f7dcfe070", "score": "0.69976896", "text": "func (c *SnapshotsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "06d5ab8608e0713efb87e7af968c563a", "score": "0.6997075", "text": "func (c *GroupsUpdateSecuritySettingsCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" } ]
d768261b1017f7c7639ea54474d63100
stops and removes the provided container id
[ { "docid": "71d91e2b5a3bdf70f79f76460da40a03", "score": "0.7196581", "text": "func stopRemoveContainer(id string, cli *client.Client, ctx context.Context) {\n\n\terr := cli.ContainerStop(context.Background(), id, nil)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\terr = cli.ContainerRemove(ctx, id, types.ContainerRemoveOptions{\n\t\tRemoveVolumes: false,\n\t\tRemoveLinks: false,\n\t\tForce: false,\n\t})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" } ]
[ { "docid": "85f1dce60314e4967ecf4611bfb2b23d", "score": "0.7561211", "text": "func stopContainerByID(ctx context.Context, contID string, cli *client.Client) {\n\n\t// TODO: I have a stop time here, when the stoptime was nil, the processes\n\t// took noticeably long.. I need to investigate what, if any, problems this\n\t// causes.\n\tstopTime := time.Duration(100) * time.Millisecond\n\terr := cli.ContainerStop(ctx, contID, &stopTime)\n\tif err != nil {\n\t\tfmt.Println(\"ERROR: can't stop container\")\n\t}\n}", "title": "" }, { "docid": "af205af96989e1584dca86a5c3f89759", "score": "0.7109925", "text": "func removeContainerByID(ctx context.Context, contID string, cli *client.Client) {\n\t// TODO: Weigh the advantages of using the `force: true` flag here\n\terr := cli.ContainerRemove(ctx, contID, types.ContainerRemoveOptions{Force: true})\n\tif err != nil {\n\t\tfmt.Println(\"ERROR: can't remove container\")\n\t}\n}", "title": "" }, { "docid": "2c07bd6b66e6783c6b2fbb30f050f544", "score": "0.70131", "text": "func removeContainer(id string) {\n\tclient := getDockerClient()\n\tif err := client.RemoveContainer(id, true, true); err != nil {\n\t\tlog.Println(err)\n\t}\n}", "title": "" }, { "docid": "8e19c1f1549aadd67bdd28a12ee0648f", "score": "0.6919228", "text": "func StopContainer(id string) {\n\terr := DockerClient.ContainerRemove(context.Background(), id, types.ContainerRemoveOptions{\n\t\tForce: true,\n\t})\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n}", "title": "" }, { "docid": "3826e950c529f371bdca3256f4c13abf", "score": "0.68646884", "text": "func stopContainer(id string) error {\n\tdisplay.StartTask(\"Stopping docker container\")\n\tdefer display.StopTask()\n\n\tif err := docker.ContainerStop(id); err != nil {\n\t\tdisplay.ErrorTask()\n\t\tlumber.Error(\"component:Stop:docker.ContainerStop(%s): %s\", id, err.Error())\n\t\treturn util.ErrorAppend(err, \"failed to stop docker container\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e2a39e0923e65b424ffc248b2c863102", "score": "0.680179", "text": "func RemoveContinerID(client *docker.Client, cid string) error {\n\terr := client.StopContainer(cid, 5)\n\tif err != nil {\n\t\tlog.Println(\"err %s\", err.Error())\n\t}\n\n\treturn client.RemoveContainer(docker.RemoveContainerOptions{ID: cid})\n}", "title": "" }, { "docid": "88e345519969c3fa9dfa403147b5122e", "score": "0.6786676", "text": "func Stop(id string) error {\n\ttimeout := time.Duration(1) * time.Minute\n\tif err := c.ContainerStop(ctx, id, &timeout); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e62f92f97eb7db78bdb7bc9c6aa2f8e5", "score": "0.66056234", "text": "func (c client) Stop(id string) error {\n\tc.URL.Path = APIVersionPrefix + APIStopContainerPath\n\tc.URL.Path = strings.Replace(c.URL.Path, \":id\", id, 1)\n\n\treq, err := http.NewRequest(\"POST\", c.URL.String(), nil)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"problem constructing HTTP request (%s)\", err)\n\t}\n\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"agent unavailable (%s)\", err)\n\t}\n\tdefer resp.Body.Close()\n\n\tswitch resp.StatusCode {\n\tcase http.StatusAccepted:\n\t\treturn nil\n\n\tcase http.StatusNotFound:\n\t\treturn ErrContainerNotExist\n\n\tcase http.StatusConflict:\n\t\treturn ErrContainerAlreadyStopped\n\n\tdefault:\n\t\tbuf, _ := ioutil.ReadAll(resp.Body)\n\t\treturn fmt.Errorf(\"HTTP %d (%s)\", resp.StatusCode, bytes.TrimSpace(buf))\n\t}\n}", "title": "" }, { "docid": "76199d86dc971ffa847b4228a42dd64b", "score": "0.6551513", "text": "func StopContainerById(params martini.Params, resp http.ResponseWriter) {\n\tclient, err := CheckParamsWithId(params)\n\tif err != nil {\n\t\tglog.Errorln(err.Error())\n\t\tresp.WriteHeader(400)\n\t\treturn\n\t}\n\tid := params[\"id\"]\n\tvar timeout uint\n\tif timeoutstr, ok := params[\"timeout\"]; ok {\n\t\ttimeoutint, err := strconv.Atoi(timeoutstr)\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"Error timeout: %s\", err)\n\t\t\tresp.WriteHeader(400)\n\t\t\treturn\n\t\t}\n\t\ttimeout = uint(timeoutint)\n\t} else {\n\t\ttimeout = 0\n\t}\n\n\terr = client.StopContainer(id, timeout)\n\tif err != nil {\n\t\tglog.Errorf(\"Error stopping container: %s\", err)\n\t\tresp.WriteHeader(500)\n\t\treturn\n\t}\n\tresp.WriteHeader(204)\n}", "title": "" }, { "docid": "3ebd8d16b3f2c56a6cc07fc52399b3f8", "score": "0.65059876", "text": "func stopContainer(containerID string) {\n\tcli, err := client.NewClientWithOpts(client.FromEnv)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tif err := cli.ContainerStop(context.Background(), containerID, nil); err != nil {\n\t\tlog.Printf(\"Unable to stop container %s: %s\", containerID, err)\n\t}\n}", "title": "" }, { "docid": "db18db075a9bd6b6c553ef8ac584a682", "score": "0.6437299", "text": "func UnpauseContainerById(params martini.Params, resp http.ResponseWriter) {\n\tclient, err := CheckParamsWithId(params)\n\tif err != nil {\n\t\tglog.Errorln(err.Error())\n\t\tresp.WriteHeader(400)\n\t\treturn\n\t}\n\tid := params[\"id\"]\n\terr = client.UnpauseContainer(id)\n\tif err != nil {\n\t\tglog.Errorf(\"Error unpausing container: %s\", err.Error())\n\t\tresp.WriteHeader(500)\n\t\treturn\n\t}\n\tresp.WriteHeader(204)\n}", "title": "" }, { "docid": "5bb510f70017863d54e1861f2c44c5e8", "score": "0.64253354", "text": "func stopContainer(t *testing.T, container *docker.Container) {\n\tt.Helper()\n\n\tclient := getClient()\n\tremoveConfig := docker.RemoveContainerOptions{ID: container.ID, Force: true}\n\tif err := client.RemoveContainer(removeConfig); err != nil {\n\t\tt.Fatalf(\"Stopping container: %v\", err)\n\t}\n}", "title": "" }, { "docid": "4fe2511f3a7be2de52221e1f34596c87", "score": "0.63576716", "text": "func startContainerByID(ctx context.Context, contID string, cli *client.Client) {\n\tif contID != \"\" {\n\t\terr := cli.ContainerStart(ctx, contID, types.ContainerStartOptions{})\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t} else {\n\t\tfmt.Println(\"Error: no container created\")\n\t}\n}", "title": "" }, { "docid": "4981fc1e95de6fc68a2842b4ac0b53bd", "score": "0.6357266", "text": "func DelContainerById(params martini.Params, resp http.ResponseWriter) {\n\tclient, err := CheckParamsWithId(params)\n\tif err != nil {\n\t\tglog.Errorln(err.Error())\n\t\tresp.WriteHeader(400)\n\t\treturn\n\t}\n\n\topts := new(docker.RemoveContainerOptions)\n\topts.RemoveVolumes = false\n\topts.Force = true\n\tfor key, value := range params {\n\t\tswitch strings.ToLower(key) {\n\t\tcase \"id\":\n\t\t\topts.ID = value\n\t\tcase \"removevolumes\":\n\t\t\tremovevolumes, err := strconv.ParseBool(value)\n\t\t\tif err != nil {\n\t\t\t\tglog.Errorf(\"Error removevolumes: %s\", err)\n\t\t\t\tresp.WriteHeader(400)\n\t\t\t\treturn\n\t\t\t}\n\t\t\topts.RemoveVolumes = removevolumes\n\t\tcase \"force\":\n\t\t\tforce, err := strconv.ParseBool(value)\n\t\t\tif err != nil {\n\t\t\t\tglog.Errorf(\"Error force: %s\", err)\n\t\t\t\tresp.WriteHeader(400)\n\t\t\t\treturn\n\t\t\t}\n\t\t\topts.Force = force\n\t\tdefault:\n\t\t\tcontinue\n\t\t}\n\t}\n\terr = client.RemoveContainer(*opts)\n\tif err != nil {\n\t\tglog.Errorf(\"Error removing running container: %s\", err.Error())\n\t\tresp.WriteHeader(500)\n\t\treturn\n\t}\n\tresp.WriteHeader(204)\n}", "title": "" }, { "docid": "92bae756dfa850717d09ac343103e38b", "score": "0.6347575", "text": "func (c *container) remove() error {\n\taddress := c.getAddress()\n\tlog.Printf(\"Removing container %s from docker\", c.ID)\n\terr := dockerCluster().RemoveContainer(c.ID)\n\tif err != nil {\n\t\tlog.Printf(\"Failed to remove container from docker: %s\", err)\n\t\treturn err\n\t}\n\trunCmd(\"ssh-keygen\", \"-R\", c.IP)\n\tlog.Printf(\"Removing container %s from database\", c.ID)\n\tcoll := collection()\n\tdefer coll.Database.Session.Close()\n\tif err := coll.RemoveId(c.ID); err != nil {\n\t\tlog.Printf(\"Failed to remove container from database: %s\", err.Error())\n\t\treturn err\n\t}\n\tr, err := Router()\n\tif err != nil {\n\t\tlog.Printf(\"Failed to obtain router: %s\", err.Error())\n\t\treturn err\n\t}\n\tif err := r.RemoveRoute(c.AppName, address); err != nil {\n\t\tlog.Printf(\"Failed to remove route: %s\", err.Error())\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e52e0336225ac0876c93dfce88aa5300", "score": "0.61515474", "text": "func removeContainer(ID string) error {\n\tctx := context.Background()\n\tdocker, err := client.NewEnvClient()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"ERROR: couldn't create docker client\\n%+v\", err)\n\t}\n\n\toptions := types.ContainerRemoveOptions{\n\t\tRemoveVolumes: true,\n\t\tForce: true,\n\t}\n\n\tif err := docker.ContainerRemove(ctx, ID, options); err != nil {\n\t\treturn fmt.Errorf(\"FAILURE: couldn't delete container [%s] -> %+v\", ID, err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "db21530790ee9b507825ca397032c840", "score": "0.6146476", "text": "func (c *Cluster) UnpauseContainer(id string) error {\n\tnode, err := c.getNodeForContainer(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn wrapError(node, node.UnpauseContainer(id))\n}", "title": "" }, { "docid": "f1d347bc04460df0ef0562fe264e2aab", "score": "0.6130135", "text": "func (m *DockerContainerClient) ContainerStop(_ context.Context, _ string, _ *time.Duration) error {\n\tpanic(\"not implemented!\")\n}", "title": "" }, { "docid": "0951bd373652b4822e198cf217e9f60d", "score": "0.6124552", "text": "func CleanupContainer(name string) error {\n\tcmd := exec.Command(\n\t\t\"/bin/bash\",\n\t\t\"-c\",\n\t\tfmt.Sprintf(`docker stop $(docker ps --filter=\"name=^/%s$\" --format=\"{{.ID}}\")`, name),\n\t)\n\n\tvar b bytes.Buffer\n\tcmd.Stderr = &b\n\n\terr := cmd.Run()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error in command : %s -- %s\", err, b.String())\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "31ad9325fd62c58372160cb04a4b0d94", "score": "0.6119566", "text": "func (cli *Client) ContainerStop(ctx context.Context, containerID string, timeout *time.Duration) error {\n\tquery := url.Values{}\n\tif timeout != nil {\n\t\tquery.Set(\"t\", timetypes.DurationToSecondsString(*timeout))\n\t}\n\tresp, err := cli.post(ctx, \"/containers/\"+containerID+\"/stop\", query, nil, nil)\n\tensureReaderClosed(resp)\n\treturn err\n}", "title": "" }, { "docid": "47aa1cefe9bc85677ed96316497b79a7", "score": "0.61167014", "text": "func (h *hyper) stopContainer(pod Pod, c Container) error {\n\tif _, _, err := h.proxy.connect(pod, false); err != nil {\n\t\treturn err\n\t}\n\n\tif err := h.stopOneContainer(pod.id, c.id); err != nil {\n\t\treturn err\n\t}\n\n\tif err := h.proxy.disconnect(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1eda0d05a471714f9234a0ab30fa038b", "score": "0.6094949", "text": "func (c *gcsCore) forceDeleteContainer(id string) error {\n\texists, err := c.Rtime.ContainerExists(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif exists {\n\t\tstate, err := c.Rtime.GetContainerState(id)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tstatus := state.Status\n\t\t// If the container is paused, resume it.\n\t\tif status == \"paused\" {\n\t\t\tif err := c.Rtime.ResumeContainer(id); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tstatus = \"running\"\n\t\t}\n\t\tif status == \"running\" {\n\t\t\tif err := c.Rtime.KillContainer(id, oslayer.SIGKILL); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tc.Rtime.WaitOnContainer(id)\n\t\t} else if status == \"created\" {\n\t\t\t// If we don't wait on a created container before deleting it, it\n\t\t\t// will become unblocked, and delete will fail.\n\t\t\tgo c.Rtime.WaitOnContainer(id)\n\t\t}\n\t\tif err := c.Rtime.DeleteContainer(id); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "576ad2c4d83573379d82c323c3388378", "score": "0.6087047", "text": "func (e *fileExtractor) removeContainer(ctx context.Context, containerID string) error {\n\treturn e.client.RemoveContainer(ctx, docker.RemoveContainerOptions{\n\t\tID: containerID,\n\t})\n}", "title": "" }, { "docid": "7cc323715c04b92ac1ab72bfdc7d1c66", "score": "0.60790706", "text": "func (daemon *DockerDaemon) Rm(id string) error {\n\n\topts := dockerTypes.ContainerRemoveOptions{\n\t\tRemoveVolumes: false,\n\t\tRemoveLinks: false,\n\t\tForce: true,\n\t}\n\tctx, cancel := context.WithTimeout(context.Background(), defaultOperationTimeout)\n\tdefer cancel()\n\terr := daemon.client.ContainerRemove(ctx, id, opts)\n\tif err == nil {\n\t\tdaemon.store().Remove(id)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "ce91023bb89622fa7f09ee86bbc41e21", "score": "0.6074073", "text": "func StopContainer(name string) error {\n\t_, _, err := Run(\"./pouch\", \"stop\", name)\n\treturn err\n}", "title": "" }, { "docid": "029e15974fcfef3e68cc29db63917a64", "score": "0.60427904", "text": "func StopContainer(containerUID string) {\n\tdocker.Stop(containerUID)\n}", "title": "" }, { "docid": "3213a7858385b6555a0e2a875ea7fa61", "score": "0.60136193", "text": "func KillContainerById(params martini.Params, resp http.ResponseWriter) {\n\tclient, err := CheckParamsWithId(params)\n\tif err != nil {\n\t\tglog.Errorln(err.Error())\n\t\tresp.WriteHeader(400)\n\t\treturn\n\t}\n\tid := params[\"id\"]\n\topts := new(docker.KillContainerOptions)\n\topts.ID = id\n\topts.Signal = docker.SIGKILL\n\terr = client.KillContainer(*opts)\n\tif err != nil {\n\t\tglog.Errorf(\"Error killing container: %s\", err)\n\t\tresp.WriteHeader(500)\n\t\treturn\n\t}\n\tresp.WriteHeader(204)\n}", "title": "" }, { "docid": "9c5f89cf81cc3040e5baf2a8778b3ed0", "score": "0.59859115", "text": "func RemoveContainerHandler(w http.ResponseWriter, r *http.Request) error {\n\n}", "title": "" }, { "docid": "8a394a52bad00d032f01aeff43003b58", "score": "0.59858507", "text": "func PauseContainerById(params martini.Params, resp http.ResponseWriter) {\n\tclient, err := CheckParamsWithId(params)\n\tif err != nil {\n\t\tglog.Errorln(err.Error())\n\t\tresp.WriteHeader(400)\n\t\treturn\n\t}\n\tid := params[\"id\"]\n\terr = client.PauseContainer(id)\n\tif err != nil {\n\t\tglog.Errorf(\"Error pausing container: %s\", err.Error())\n\t\tresp.WriteHeader(500)\n\t\treturn\n\t}\n\tresp.WriteHeader(204)\n}", "title": "" }, { "docid": "59c401c869a1f0254ef28f2ac4c39f7f", "score": "0.5957281", "text": "func (c *container) stop() error {\n\terr := dockerCluster().StopContainer(c.ID, 10)\n\tif err != nil {\n\t\tlog.Printf(\"error on stop container %s: %s\", c.ID, err)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "31d158c9efe5da9b71c68728b7e5661d", "score": "0.59488976", "text": "func deleteContainer(w http.ResponseWriter, req *http.Request) {\n\tvars := mux.Vars(req)\n\tif container, exists := Containers[vars[\"name\"]]; exists {\n\t\tglog.Infof(\"Deleting cached Nuage Container: %s\", container.Name)\n\t\t////\n\t\t//// ... Any additional processing when deleting a container\n\t\t////\n\t\tdelete(Containers, vars[\"name\"])\n\t} else {\n\t\tglog.Warningf(\"Cannot find Nuage Container: %s\", vars[\"name\"])\n\t\tSendjson(w, bambou.NewBambouError(errors.ContainerNotFound+vars[\"name\"], \"\"), http.StatusNotFound)\n\t}\n\n}", "title": "" }, { "docid": "730b033d9bab6b6a299cb74dc25aedeb", "score": "0.59260935", "text": "func RestartContainerById(params martini.Params, resp http.ResponseWriter) {\n\tclient, err := CheckParamsWithId(params)\n\tif err != nil {\n\t\tglog.Errorln(err.Error())\n\t\tresp.WriteHeader(400)\n\t\treturn\n\t}\n\tid := params[\"id\"]\n\tvar timeout uint\n\tif timeoutstr, ok := params[\"timeout\"]; ok {\n\t\ttimeoutint, err := strconv.Atoi(timeoutstr)\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"Error timeout: %s\", err)\n\t\t\tresp.WriteHeader(400)\n\t\t\treturn\n\t\t}\n\t\ttimeout = uint(timeoutint)\n\t} else {\n\t\ttimeout = 0\n\t}\n\terr = client.RestartContainer(id, timeout)\n\tif err != nil {\n\t\tglog.Errorf(\"Error restarting container: %s\", err.Error())\n\t\tresp.WriteHeader(500)\n\t\treturn\n\t}\n\tresp.WriteHeader(204)\n}", "title": "" }, { "docid": "f7ae1022cc076fdac554fe677f0de56e", "score": "0.59171546", "text": "func (c Container) Kill(ctx context.Context, id string) error {\n\treturn c.cli.ContainerKill(ctx, id, \"SIGKILL\")\n}", "title": "" }, { "docid": "6ecd033e72d6737582b34c12503cd928", "score": "0.58982", "text": "func (a *Client) ContainerStop(params *ContainerStopParams) (*ContainerStopNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewContainerStopParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"ContainerStop\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/containers/{id}/stop\",\n\t\tProducesMediaTypes: []string{\"application/json\", \"text/plain\"},\n\t\tConsumesMediaTypes: []string{\"application/json\", \"text/plain\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &ContainerStopReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*ContainerStopNoContent), nil\n\n}", "title": "" }, { "docid": "fa06d0c90854cfa0d13630f34db091ed", "score": "0.58763874", "text": "func DgraphStop(t *testing.T, config *DgraphConfig) {\n\tt.Log(\"Stopping and removing dgraph container\")\n\tcli, err := client.NewClientWithOpts(client.FromEnv, client.WithAPIVersionNegotiation())\n\trequire.NoError(t, err)\n\terr = cli.ContainerStop(context.Background(), config.ContainerID, nil)\n\trequire.NoError(t, err)\n\terr = cli.ContainerRemove(context.Background(), config.ContainerID, types.ContainerRemoveOptions{})\n\trequire.NoError(t, err)\n}", "title": "" }, { "docid": "3deb364a6fadcd1a86bcc4da543c7ad8", "score": "0.58438754", "text": "func (c *Cluster) StopContainer(id string, timeout uint) error {\n\tnode, err := c.getNodeForContainer(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn wrapError(node, node.StopContainer(id, timeout))\n}", "title": "" }, { "docid": "d248e578c57146924947355d59a54443", "score": "0.5832122", "text": "func StopContainer() echo.HandlerFunc {\n\treturn func(c echo.Context) error {\n\t\tcli := container.New(ContainerRemote)\n\t\tcontainerID := c.Param(\"id\")\n\t\tcontainerJSON := new(common.Container)\n\t\tcontainerJSON = cli.StopContainer(containerID)\n\t\treturn c.JSON(200, containerJSON)\n\t}\n}", "title": "" }, { "docid": "ccabe3e8df0c259d98d99f8d093da811", "score": "0.58316714", "text": "func (c *gcsCore) CleanupContainer(id string) error {\n\tvar errToReturn error\n\tif err := c.forceDeleteContainer(id); err != nil {\n\t\tlogrus.Warn(err)\n\t\tif errToReturn == nil {\n\t\t\terrToReturn = err\n\t\t}\n\t}\n\n\tdiskMap := c.containerCache[id].MappedVirtualDisks\n\tdisks := make([]prot.MappedVirtualDisk, 0, len(diskMap))\n\tfor _, disk := range diskMap {\n\t\tdisks = append(disks, disk)\n\t}\n\tif err := c.unmountMappedVirtualDisks(disks); err != nil {\n\t\tlogrus.Warn(err)\n\t\tif errToReturn == nil {\n\t\t\terrToReturn = err\n\t\t}\n\t}\n\n\tif err := c.unmountLayers(id); err != nil {\n\t\tlogrus.Warn(err)\n\t\tif errToReturn == nil {\n\t\t\terrToReturn = err\n\t\t}\n\t}\n\n\tif err := c.destroyContainerStorage(id); err != nil {\n\t\tlogrus.Warn(err)\n\t\tif errToReturn == nil {\n\t\t\terrToReturn = err\n\t\t}\n\t}\n\n\treturn errToReturn\n}", "title": "" }, { "docid": "cb9af47da71a945bf0ede6eeba6022ba", "score": "0.5823938", "text": "func DeleteContainerHandler(buffer *circularbuffer.CircularBuffer[OutgoingMessage], msg IncomingMessage) {\n\t// Stop the container\n\terr := StopContainerHandler(buffer, msg)\n\tif err != nil {\n\t\t// The other handler would have taken care of the message\n\t\treturn\n\t}\n\n\t// Delete the container, moved to before DNS since if we fail to delete the container after\n\t// we remove DNS and someone makes a new container we could end up with multiple containers\n\t// on the network with the same IP and thats more annoying than alternatives\n\tid := time.Now().UnixNano()\n\tif buffer != nil {\n\t\tbuffer.Enqueue(OutgoingMessage{ID: id, Message: \"Deleting container\", Success: true})\n\t}\n\n\terr = lxd.DeleteContainer(msg.Data[\"host\"], msg.Data[\"name\"])\n\tif err != nil {\n\t\tif buffer != nil {\n\t\t\tbuffer.Enqueue(OutgoingMessage{ID: id, Message: \"failed: \" + err.Error(), Success: false})\n\t\t}\n\t\treturn\n\t}\n\n\t// DNS if we aren't using DHCP\n\tif strings.ToLower(Conf.DNS.Provider) != \"dhcp\" {\n\t\tid := time.Now().UnixNano()\n\t\tif buffer != nil {\n\t\t\tbuffer.Enqueue(OutgoingMessage{ID: id, Message: \"Deleting DNS entry\", Success: true})\n\t\t}\n\n\t\td := dns.New(Conf)\n\t\tif d == nil {\n\t\t\tif buffer != nil {\n\t\t\t\tbuffer.Enqueue(OutgoingMessage{ID: id, Message: \"failed to create DNS object for provider: \" + Conf.DNS.Provider, Success: false})\n\t\t\t}\n\t\t} else {\n\t\t\terr := d.RemoveARecord(msg.Data[\"name\"])\n\t\t\tif err != nil {\n\t\t\t\tif buffer != nil {\n\t\t\t\t\tbuffer.Enqueue(OutgoingMessage{ID: id, Message: \"failed: \" + err.Error(), Success: false})\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif buffer != nil {\n\t\t\t\t\tbuffer.Enqueue(OutgoingMessage{ID: id, Message: \"done\", Success: true})\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif buffer != nil {\n\t\tbuffer.Enqueue(OutgoingMessage{ID: id, Message: \"done\", Success: true, Redirect: \"/containers\"})\n\t\tbuffer.Enqueue(OutgoingMessage{Redirect: \"/containers\"})\n\t}\n}", "title": "" }, { "docid": "c9c2669d1c2cd86c24ba3f8c9bfe310e", "score": "0.5822443", "text": "func (d *Dockmon) StopContainer(ctx context.Context, id string) error {\n\treturn d.client.ContainerStop(\n\t\tctx,\n\t\tid,\n\t\tcontainer_types.StopOptions{},\n\t)\n}", "title": "" }, { "docid": "961a50475484fefab1ede317f0d408d9", "score": "0.5810501", "text": "func (daemon *Daemon) ContainerStop(name string, seconds int) error {\n\tcontainer, err := daemon.Get(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !container.IsRunning() {\n\t\treturn derr.ErrorCodeStopped\n\t}\n\tif err := container.Stop(seconds); err != nil {\n\t\treturn derr.ErrorCodeCantStop.WithArgs(name, err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "74b06495c5999e8c0edf33aef479d093", "score": "0.5798217", "text": "func (h *hyper) killContainer(pod Pod, c Container, signal syscall.Signal) error {\n\tif _, _, err := h.proxy.connect(pod, false); err != nil {\n\t\treturn err\n\t}\n\n\tif err := h.killOneContainer(c.id, signal); err != nil {\n\t\treturn err\n\t}\n\n\tif err := h.proxy.disconnect(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7eb793d51d9a62d126276e0f388bceda", "score": "0.5792601", "text": "func (p *plugin) removeContainer(ctx context.Context, req *api.RemoveContainerRequest) error {\n\tif !p.handlesEvent(removeContainer) {\n\t\treturn nil\n\t}\n\t_, err := p.client.RemoveContainer(ctx, req)\n\tif err == ttrpc.ErrClosed {\n\t\tp.closed = true\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" }, { "docid": "3a7877bd7a7347e67a36f416c29097c5", "score": "0.57814956", "text": "func Remove(ID string) error {\n\tif util.IsEmpty(ID) {\n\t\treturn errors.New(\"Empty container ID\")\n\t}\n\tif !IsaID(ID) {\n\t\treturn errors.New(\"Invalid container ID: \" + ID)\n\t}\n\tif !rootFSExists(ID) {\n\t\treturn errors.New(\"RootFS of container\" + ID + \" doesn't exist\")\n\t}\n\treturn removeContainer(ID)\n}", "title": "" }, { "docid": "185131a0037cfcee9d94dff2a9435735", "score": "0.5776117", "text": "func (daemon *DockerDaemon) StopContainer(id string) error {\n\tctx, cancel := context.WithTimeout(context.Background(), defaultOperationTimeout)\n\tdefer cancel()\n\terr := daemon.client.ContainerStop(ctx, id, &containerOpTimeout)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn daemon.refreshAndWait()\n}", "title": "" }, { "docid": "1e8ca84e6b10f8006b1d44e883a1f5eb", "score": "0.5753523", "text": "func RemoveContainer(name string) error {\n\t_, _, err := Run(\"./pouch\", \"rm\", name)\n\treturn err\n}", "title": "" }, { "docid": "efa4ee0db5a05e508f86d9f70bc27e16", "score": "0.57470363", "text": "func (m *DockerContainerClient) ContainerKill(_ context.Context, _ string, _ string) error {\n\tpanic(\"not implemented!\")\n}", "title": "" }, { "docid": "bea3f3cec73d34f2a3f882634ecf49d7", "score": "0.5738491", "text": "func KillAux(ctx context.Context, dockerClient *client.Client, id string) error {\n\tstart := time.Now()\n\tvar err error\n\tfor time.Since(start) < 10*time.Second {\n\t\terr = dockerClient.ContainerKill(ctx, id, \"SIGKILL\")\n\t\tif err == nil {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "701dcba1969ee5fe2f71d5b3e26fbaf9", "score": "0.5723953", "text": "func handleContainerExit(ctx context.Context, e *eventtypes.TaskExit, cntr containerstore.Container, sandboxID string, c *criService) error {\n\t// Attach container IO so that `Delete` could cleanup the stream properly.\n\ttask, err := cntr.Container.Task(ctx,\n\t\tfunc(*containerdio.FIFOSet) (containerdio.IO, error) {\n\t\t\t// We can't directly return cntr.IO here, because\n\t\t\t// even if cntr.IO is nil, the cio.IO interface\n\t\t\t// is not.\n\t\t\t// See https://tour.golang.org/methods/12:\n\t\t\t// Note that an interface value that holds a nil\n\t\t\t// concrete value is itself non-nil.\n\t\t\tif cntr.IO != nil {\n\t\t\t\treturn cntr.IO, nil\n\t\t\t}\n\t\t\treturn nil, nil\n\t\t},\n\t)\n\tif err != nil {\n\t\tif !errdefs.IsNotFound(err) {\n\t\t\treturn fmt.Errorf(\"failed to load task for container: %w\", err)\n\t\t}\n\t} else {\n\t\t// TODO(random-liu): [P1] This may block the loop, we may want to spawn a worker\n\t\tif _, err = task.Delete(ctx, c.nri.WithContainerExit(&cntr), containerd.WithProcessKill); err != nil {\n\t\t\tif !errdefs.IsNotFound(err) {\n\t\t\t\treturn fmt.Errorf(\"failed to stop container: %w\", err)\n\t\t\t}\n\t\t\t// Move on to make sure container status is updated.\n\t\t}\n\t}\n\n\t// NOTE: Both sb.Container.Task and task.Delete interface always ensures\n\t// that the status of target task. However, the interfaces return\n\t// ErrNotFound, which doesn't mean that the shim instance doesn't exist.\n\t//\n\t// There are two caches for task in containerd:\n\t//\n\t// 1. io.containerd.service.v1.tasks-service\n\t// 2. io.containerd.runtime.v2.task\n\t//\n\t// First one is to maintain the shim connection and shutdown the shim\n\t// in Delete API. And the second one is to maintain the lifecycle of\n\t// task in shim server.\n\t//\n\t// So, if the shim instance is running and task has been deleted in shim\n\t// server, the sb.Container.Task and task.Delete will receive the\n\t// ErrNotFound. If we don't delete the shim instance in io.containerd.service.v1.tasks-service,\n\t// shim will be leaky.\n\t//\n\t// Based on containerd/containerd#7496 issue, when host is under IO\n\t// pressure, the umount2 syscall will take more than 10 seconds so that\n\t// the CRI plugin will cancel this task.Delete call. However, the shim\n\t// server isn't aware about this. After return from umount2 syscall, the\n\t// shim server continue delete the task record. And then CRI plugin\n\t// retries to delete task and retrieves ErrNotFound and marks it as\n\t// stopped. Therefore, The shim is leaky.\n\t//\n\t// It's hard to handle the connection lost or request canceled cases in\n\t// shim server. We should call Delete API to io.containerd.service.v1.tasks-service\n\t// to ensure that shim instance is shutdown.\n\t//\n\t// REF:\n\t// 1. https://github.com/containerd/containerd/issues/7496#issuecomment-1671100968\n\t// 2. https://github.com/containerd/containerd/issues/8931\n\tif errdefs.IsNotFound(err) {\n\t\t_, err = c.client.TaskService().Delete(ctx, &apitasks.DeleteTaskRequest{ContainerID: cntr.Container.ID()})\n\t\tif err != nil {\n\t\t\terr = errdefs.FromGRPC(err)\n\t\t\tif !errdefs.IsNotFound(err) {\n\t\t\t\treturn fmt.Errorf(\"failed to cleanup container %s in task-service: %w\", cntr.Container.ID(), err)\n\t\t\t}\n\t\t}\n\t\tlogrus.Infof(\"Ensure that container %s in task-service has been cleanup successfully\", cntr.Container.ID())\n\t}\n\n\terr = cntr.Status.UpdateSync(func(status containerstore.Status) (containerstore.Status, error) {\n\t\tif status.FinishedAt == 0 {\n\t\t\tstatus.Pid = 0\n\t\t\tstatus.FinishedAt = protobuf.FromTimestamp(e.ExitedAt).UnixNano()\n\t\t\tstatus.ExitCode = int32(e.ExitStatus)\n\t\t}\n\n\t\t// Unknown state can only transit to EXITED state, so we need\n\t\t// to handle unknown state here.\n\t\tif status.Unknown {\n\t\t\tlogrus.Debugf(\"Container %q transited from UNKNOWN to EXITED\", cntr.ID)\n\t\t\tstatus.Unknown = false\n\t\t}\n\t\treturn status, nil\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to update container state: %w\", err)\n\t}\n\t// Using channel to propagate the information of container stop\n\tcntr.Stop()\n\tc.generateAndSendContainerEvent(ctx, cntr.ID, sandboxID, runtime.ContainerEventType_CONTAINER_STOPPED_EVENT)\n\treturn nil\n}", "title": "" }, { "docid": "d16af81a6defcda8199f843d2bcfe8d3", "score": "0.57220155", "text": "func (s *Store) CleanContainer(id string) error {\n\ts.Lock()\n\tdefer s.Unlock()\n\n\t// Do not care about all the errors whiling cleaning the container,\n\t// just return one if the error occurs.\n\tvar finalErr error\n\tif _, uerr := s.Unmount(id, false); uerr != nil {\n\t\tfinalErr = uerr\n\t\tlogrus.Warnf(\"Unmount container store failed while cleaning %q\", id)\n\t}\n\tif derr := s.DeleteContainer(id); derr != nil {\n\t\tfinalErr = derr\n\t\tlogrus.Warnf(\"Delete container store failed while cleaning %q\", id)\n\t}\n\n\treturn finalErr\n}", "title": "" }, { "docid": "c2ec47f2088e2a6abaeba78cf12d2f4a", "score": "0.5719494", "text": "func (l *Location) RemoveContainer(id string) error {\n\tif err := l.client.Bucket(id).Delete(l.ctx); err != nil {\n\t\tif e, ok := err.(*googleapi.Error); ok && e.Code == 404 {\n\t\t\treturn stow.ErrNotFound\n\t\t}\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4b80790389e7e0545942ac406b0a96ea", "score": "0.5678897", "text": "func SetContainerID(id string) {\n\tviper.Set(\"containerID\", id)\n}", "title": "" }, { "docid": "88fab47ce62e895ead2daa7143d132b5", "score": "0.5673807", "text": "func (r *ResizeTTYRequest) SetContainerId(containerId string) {\n r.ContainerId = containerId\n}", "title": "" }, { "docid": "82c398c0ca6795f250ccbd8fd0966295", "score": "0.5671993", "text": "func (p *plugin) stopContainer(ctx context.Context, req *api.StopContainerRequest) (*api.StopContainerResponse, error) {\n\tif !p.handlesEvent(stopContainer) {\n\t\treturn nil, nil\n\t}\n\n\trpl, err := p.client.StopContainer(ctx, req)\n\tif err == ttrpc.ErrClosed {\n\t\tp.closed = true\n\t\treturn nil, nil\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn rpl, nil\n}", "title": "" }, { "docid": "1c96b1cf37bde32ce818e3f229edc987", "score": "0.5670749", "text": "func (m *DockerContainerClient) ContainerUnpause(_ context.Context, _ string) error {\n\tpanic(\"not implemented!\")\n}", "title": "" }, { "docid": "06dbef4dc7c8ad6690af41880dd148dd", "score": "0.5630631", "text": "func TestDockerContainerById(t *testing.T) {\n\tfm := framework.New(t)\n\tdefer fm.Cleanup()\n\n\tcontainerId := fm.Docker().RunPause()\n\n\t// Wait for the container to show up.\n\twaitForContainer(containerId, fm)\n\n\trequest := &info.ContainerInfoRequest{\n\t\tNumStats: 1,\n\t}\n\tcontainerInfo, err := fm.Cadvisor().Client().DockerContainer(containerId, request)\n\trequire.NoError(t, err)\n\n\tsanityCheck(containerId, containerInfo, t)\n}", "title": "" }, { "docid": "8923d105b4166a3318cbd25cfc6f5fb5", "score": "0.5618581", "text": "func (r *RebuildContainerRequest) SetContainerId(containerId string) {\n r.ContainerId = containerId\n}", "title": "" }, { "docid": "b65688e219b1ce18513fde7c1e10915c", "score": "0.56158036", "text": "func (r *RuntimeProxy) StopContainer(ctx context.Context, in *runtimeapi.StopContainerRequest) (*runtimeapi.StopContainerResponse, error) {\n\tclient, unprefixed, err := r.clientForId(in.ContainerId)\n\tif err != nil {\n\t\tglog.V(2).Infof(\"FAIL: StopContainer: %v\", err)\n\t\treturn nil, err\n\t}\n\tglog.V(3).Infof(\"ENTER: StopContainer() [%s]: %s\", client.id, spew.Sdump(in))\n\tin.ContainerId = unprefixed\n\n\tresp, err := client.StopContainer(ctx, in)\n\tif err != nil {\n\t\tglog.V(2).Infof(\"FAIL: StopContainer() [%s]: StopContainer %q from runtime service failed: %v\", client.id, in.ContainerId, err)\n\t\treturn nil, client.handleError(err, false)\n\t}\n\n\tglog.V(3).Infof(\"LEAVE: StopContainer() [%s]: %s\", client.id, spew.Sdump(resp))\n\treturn resp, nil\n}", "title": "" }, { "docid": "e630fa07f258cd1bb0e8c64577c44918", "score": "0.56122005", "text": "func (daemon *DockerDaemon) Kill(id string) error {\n\tctx, cancel := context.WithTimeout(context.Background(), defaultOperationTimeout)\n\tdefer cancel()\n\t//TODO Send signal?\n\terr := daemon.client.ContainerKill(ctx, id, \"\")\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn daemon.refreshAndWait()\n}", "title": "" }, { "docid": "4d6b432ac5e3f96bdce1751d44f83f34", "score": "0.5602059", "text": "func (d *FakeDockerClient) ContainerKill(ctx context.Context, containerID, signal string) error {\n\treturn nil\n}", "title": "" }, { "docid": "7953105486ce4ba0a7f57b8d06e04f42", "score": "0.5601602", "text": "func (m *DockerContainerClient) ContainerRemove(_ context.Context, _ string, _ types.ContainerRemoveOptions) error {\n\tpanic(\"not implemented!\")\n}", "title": "" }, { "docid": "2694977db885cde399f17a713b61edd4", "score": "0.5591671", "text": "func Clean(ctx context.Context, cli *client.Client, opts CleanOpts) error {\n\topts.applyDefaults()\n\topts.Logger.Debug(\"down\", zap.Any(\"opts\", opts))\n\n\tcontainersInfo, err := GetContainersInfo(ctx, cli)\n\tif err != nil {\n\t\treturn errcode.ErrComposeGetContainersInfo.Wrap(err)\n\t}\n\n\ttoRemove := map[string]container{}\n\n\tif opts.RemoveNginx && containersInfo.NginxContainer.ID != \"\" {\n\t\ttoRemove[containersInfo.NginxContainer.ID] = containersInfo.NginxContainer\n\t}\n\n\tif len(opts.ContainerIDs) == 0 { // all containers\n\t\tfor _, container := range containersInfo.RunningContainers {\n\t\t\ttoRemove[container.ID] = container\n\t\t}\n\t} else { // only specific ones\n\t\tfor _, id := range opts.ContainerIDs {\n\t\t\tfor _, flavor := range containersInfo.RunningFlavors {\n\t\t\t\tif id == flavor.Name || id == flavor.ChallengeID() {\n\t\t\t\t\tfor _, container := range flavor.Containers {\n\t\t\t\t\t\ttoRemove[container.ID] = container\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tfor _, container := range containersInfo.RunningContainers {\n\t\t\t\tif id == container.ID || id == container.ID[0:7] {\n\t\t\t\t\ttoRemove[container.ID] = container\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tfor _, container := range toRemove {\n\t\terr := cli.ContainerRemove(ctx, container.ID, types.ContainerRemoveOptions{\n\t\t\tForce: true,\n\t\t\tRemoveVolumes: opts.RemoveVolumes,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn errcode.ErrDockerAPIContainerRemove.Wrap(err)\n\t\t}\n\t\topts.Logger.Debug(\"container removed\", zap.String(\"ID\", container.ID))\n\t\tif opts.RemoveImages {\n\t\t\t_, err := cli.ImageRemove(ctx, container.ImageID, types.ImageRemoveOptions{\n\t\t\t\tForce: false,\n\t\t\t\tPruneChildren: true,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\treturn errcode.ErrDockerAPIImageRemove.Wrap(err)\n\t\t\t}\n\t\t\topts.Logger.Debug(\"image removed\", zap.String(\"ID\", container.ImageID))\n\t\t}\n\t}\n\n\tif opts.RemoveNginx && containersInfo.NginxNetwork.ID != \"\" {\n\t\terr = cli.NetworkRemove(ctx, containersInfo.NginxNetwork.ID)\n\t\tif err != nil {\n\t\t\treturn errcode.ErrDockerAPINetworkRemove.Wrap(err)\n\t\t}\n\t\topts.Logger.Debug(\"network removed\", zap.String(\"ID\", containersInfo.NginxNetwork.ID))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6eb065bbdef80f870fabe2ea1dc17cd3", "score": "0.5584057", "text": "func delConn(d *Daemon, w http.ResponseWriter, r *http.Request) *HttpErr {\n\tvars := mux.Vars(r)\n\tcontainerId := vars[\"id\"]\n\n\tcon := d.connections.Get(containerId)\n\n\tif con == nil {\n\t\treturn &HttpErr{http.StatusNotFound, \"container not found\"}\n\t}\n\n\tctx := &ConnectionCtx{\n\t\tdeleteConn,\n\t\tcon.(*Connection),\n\t\tmake(chan *Connection),\n\t}\n\n\td.connectionChan <- ctx\n\t<-ctx.Result\n\n\treturn nil\n}", "title": "" }, { "docid": "8d69f03f68faede3cf315cdaf3626cc0", "score": "0.557982", "text": "func StopAndRemoveContainer(ctx context.Context, cli *client.Client, c Container) error {\n\terr := cli.ContainerStop(ctx, c.ID, nil)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to stop %s - %s\", c.Hostname, err)\n\t}\n\n\terr = cli.ContainerRemove(ctx, c.ID, types.ContainerRemoveOptions{})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to remove %s - %s\", c.Hostname, err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c71cc2914b13b1828c55cc4319df85ac", "score": "0.55683327", "text": "func (puo *ProcessUpdateOne) SetContainerId(s string) *ProcessUpdateOne {\n\tpuo.mutation.SetContainerId(s)\n\treturn puo\n}", "title": "" }, { "docid": "55c87166b056d07bcb6ad9602bff828b", "score": "0.5565934", "text": "func (a *Client) ContainerKill(params *ContainerKillParams) (*ContainerKillNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewContainerKillParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"ContainerKill\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/containers/{id}/kill\",\n\t\tProducesMediaTypes: []string{\"application/json\", \"text/plain\"},\n\t\tConsumesMediaTypes: []string{\"application/json\", \"text/plain\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &ContainerKillReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*ContainerKillNoContent), nil\n\n}", "title": "" }, { "docid": "267b3c534797a95784e3e3db99779ec2", "score": "0.556036", "text": "func (c *ShellClient) StopContainer(containerID string) error {\n\tc.logger.DebugWith(\"Stopping container\", \"containerID\", containerID)\n\n\t// containerID is ID or name\n\tif !containerIDRegex.MatchString(containerID) && !restrictedNameRegex.MatchString(containerID) {\n\t\treturn errors.New(\"Invalid container ID to stop\")\n\t}\n\n\t_, err := c.runCommand(nil, \"docker stop %s\", containerID)\n\treturn err\n}", "title": "" }, { "docid": "f8fb7fea38d2ead97485457aae3a6838", "score": "0.5560035", "text": "func StartContainerById(params martini.Params, req *http.Request, resp http.ResponseWriter) {\n\tclient, err := CheckParamsWithId(params)\n\tif err != nil {\n\t\tglog.Errorln(err.Error())\n\t\tresp.WriteHeader(400)\n\t\treturn\n\t}\n\tid := params[\"id\"]\n\tbody, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tglog.Errorf(\"Error req: %s\", err.Error())\n\t\tresp.WriteHeader(400)\n\t\treturn\n\t}\n\n\tif len(body) == 0 {\n\t\terr = client.StartContainer(id, nil)\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"Error hostconfig: %s\", err.Error())\n\t\t\tresp.WriteHeader(500)\n\t\t\treturn\n\t\t}\n\t\tresp.WriteHeader(204)\n\t\treturn\n\t}\n\n\topts := new(docker.HostConfig)\n\terr = json.Unmarshal(body, &opts)\n\tif err != nil {\n\t\tglog.Errorf(\"Error starting opts: %s\", err)\n\t\tresp.WriteHeader(400)\n\t\treturn\n\t}\n\terr = client.StartContainer(id, opts)\n\tif err != nil {\n\t\tglog.Errorf(\"Error starting container: %s\", err.Error())\n\t\tresp.WriteHeader(500)\n\t\treturn\n\t}\n\tresp.WriteHeader(204)\n}", "title": "" }, { "docid": "b86ac8e7127f9316addb8835f73a3804", "score": "0.5547084", "text": "func KillService(ctx context.Context, dockerClient *client.Client, svcID string) {\n\tstart := time.Now()\n\tfor time.Since(start) < 10*time.Second {\n\t\terr := dockerClient.ServiceRemove(ctx, svcID)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\t\ttime.Sleep(time.Second)\n\t}\n\tfor time.Since(start) < 15*time.Second {\n\t\tcontainers, err := dockerClient.ContainerList(ctx, types.ContainerListOptions{})\n\t\tif err == nil {\n\t\t\tif len(containers) == 0 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tfor _, c := range containers {\n\t\t\t\terr = dockerClient.ContainerKill(ctx, c.ID, \"\")\n\t\t\t\tif err == nil {\n\t\t\t\t\tdockerClient.ContainerRemove(ctx, c.ID, types.ContainerRemoveOptions{Force: true})\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\ttime.Sleep(time.Second)\n\t}\n}", "title": "" }, { "docid": "c67900983adb7633b204d9d95697059a", "score": "0.55239487", "text": "func (do *Docker) ContainerRm(name string) *CmdRes {\n\treturn do.execCmd(fmt.Sprintf(\"docker rm -f %s\", name))\n}", "title": "" }, { "docid": "beee45ea4e7f42c683d91215d60312fb", "score": "0.55232", "text": "func (impl *VCImpl) StopContainer(ctx context.Context, sandboxID, containerID string) (VCContainer, error) {\n\treturn StopContainer(ctx, sandboxID, containerID)\n}", "title": "" }, { "docid": "84ad2aabd4e0aa218b97811935f9f897", "score": "0.549995", "text": "func (r *RemoteRuntimeService) StopContainer(rawContainerID string, timeout int64) error {\n\tctx, cancel := getContextWithTimeout(r.timeout)\n\tdefer cancel()\n\n\t_, err := r.runtimeClient.StopContainer(ctx, &runtimeApi.StopContainerRequest{\n\t\tContainerId: &rawContainerID,\n\t\tTimeout: &timeout,\n\t})\n\tif err != nil {\n\t\tglog.Errorf(\"StopContainer %q from runtime service failed: %v\", rawContainerID, err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d9d178843346e2eabc669c7cc3ee5ac3", "score": "0.5498649", "text": "func (pm *ProcessManager) Stop(deviceID string, databasePrefix string) error {\n\tcl := docker.NewSocketClient(docker.Log(g.Log), docker.Host(\"unix:///var/run/docker.sock\"))\n\n\tcontainer, err := cl.ContainerGet(deviceID)\n\tif err != nil {\n\t\tif dockerErrors.IsErrNotFound(err) {\n\t\t\tg.Log.Info(\"container not found to be stopeed\", err)\n\t\t\treturn models.ErrProcessNotFound\n\t\t}\n\t}\n\n\t// waits up to 10 minutes to stop the container, otherwise kills after 30 seconds\n\tkillAfer := time.Second * 5\n\terr = cl.ContainerStop(container.ID, &killAfer)\n\tif err != nil {\n\t\tif dockerErrors.IsErrNotFound(err) {\n\t\t\tg.Log.Warn(\"container doesn't exist. probably stopped before\", err)\n\t\t\treturn nil\n\t\t}\n\t}\n\n\terr = pm.storage.Del(databasePrefix, deviceID)\n\tif err != nil {\n\t\tg.Log.Error(\"Failed to delete rtsp proces\", err)\n\t\treturn err\n\t}\n\n\tfl := filters.NewArgs()\n\tpruneReport, pruneErr := cl.ContainersPrune(fl)\n\tif pruneErr != nil {\n\t\tg.Log.Error(\"container prunning fialed\", pruneErr)\n\t\treturn pruneErr\n\t}\n\tg.Log.Info(\"prune successfull. Report and space reclaimed:\", pruneReport.ContainersDeleted, pruneReport.SpaceReclaimed)\n\n\treturn nil\n}", "title": "" }, { "docid": "65de8ba0a97236f7a132e0ff9e828283", "score": "0.54979837", "text": "func (client *Client) RemoveContainerRequest(ctx context.Context, containerid string) error {\n\n\tquery := map[string][]string{\"force\": []string{\"true\"}}\n\trespRemoved, err := client.c.Delete(ctx, \"http://\"+client.ApiAddr+\"/v1/containers/\"+containerid, query, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer respRemoved.Close()\n\tif respRemoved.StatusCode() >= http.StatusBadRequest {\n\t\treturn fmt.Errorf(\"remove container %s request, %s\", ShortContainerID(containerid), ctypes.ParseHTTPResponseError(respRemoved))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6527221fc1d41ca7ef5de9c5e2161099", "score": "0.54963523", "text": "func podmanRemove(cid string) {\n\texec.Command(\"podman\", \"kill\", cid)\n\texec.Command(\"podman\", \"rm\", \"-f\", cid)\n}", "title": "" }, { "docid": "48a7218f804bab1dc6a60ce2a333d9a3", "score": "0.54754555", "text": "func CointainerdPidFromID(id string) (pid uint32, retErr error) {\n\tpid = 0\n\tretErr = nil\n\n\tctx := namespaces.WithNamespace(context.Background(), \"k8s.io\")\n\tclient, err := containerd.New(\"/run/containerd/containerd.sock\")\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"error creating containerd client\")\n\t}\n\tdefer func() {\n\t\terr := client.Close()\n\t\tif retErr != nil {\n\t\t\tretErr = errors.Wrap(retErr, fmt.Sprintf(\"error closing containerd client: %v\", err))\n\t\t} else {\n\t\t\tretErr = errors.Wrap(err, \"error closing containerd client\")\n\t\t}\n\t}()\n\n\tcontainers, err := client.Containers(ctx)\n\tif err != nil {\n\t\tretErr = errors.Wrap(err, \"error listing containerd containers\")\n\t\treturn\n\t}\n\n\tfor _, container := range containers {\n\t\tif container.ID() == id {\n\t\t\tin := strings.NewReader(\"\")\n\t\t\tvar outBuf bytes.Buffer\n\t\t\tvar errBuf bytes.Buffer\n\t\t\ttsk, err := container.Task(ctx, cio.NewAttach(cio.WithStreams(in, &outBuf, &errBuf)))\n\t\t\tif err != nil {\n\t\t\t\tretErr = errors.Wrap(err, \"error getting task of container\")\n\t\t\t\treturn\n\t\t\t}\n\t\t\tpid = tsk.Pid()\n\t\t\terr = tsk.CloseIO(ctx)\n\t\t\tif err != nil {\n\t\t\t\tretErr = errors.Wrap(err, \"error closing container task\")\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\tif pid == 0 {\n\t\tretErr = errors.New(\"could not find pid for container; no container with such id found\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "15a1c3169c6e6b05f85ad063af73239b", "score": "0.54485834", "text": "func StopRemove(ctx context.Context, cli *client.Client, cntName string) error {\n\terr := cli.ContainerStop(ctx, cntName, DurationPtr(time.Second))\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed to stop container %v: %w\", cntName, err)\n\t}\n\n\terr = cli.ContainerRemove(ctx, cntName, types.ContainerRemoveOptions{})\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed to remove container %v: %w\", cntName, err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "986ae903ea827c5b37aef71e0c3cfed0", "score": "0.5443884", "text": "func (d *FakeDockerClient) ContainerRemove(ctx context.Context, containerID string, options dockertypes.ContainerRemoveOptions) error {\n\td.Calls = append(d.Calls, \"remove\")\n\n\tif _, exists := d.Containers[containerID]; exists {\n\t\tdelete(d.Containers, containerID)\n\t\treturn nil\n\t}\n\treturn errors.New(\"container does not exist\")\n}", "title": "" }, { "docid": "481c387ad126a3364f442140629ca3e6", "score": "0.54425067", "text": "func FnKillContainer(client *docker.Client, containerID string) (err error) {\n\terr = client.KillContainer(docker.KillContainerOptions{ID: containerID})\n\treturn\n}", "title": "" }, { "docid": "c9675e8dc286ea6b2a805fe35bd1e348", "score": "0.542324", "text": "func (pu *ProcessUpdate) SetContainerId(s string) *ProcessUpdate {\n\tpu.mutation.SetContainerId(s)\n\treturn pu\n}", "title": "" }, { "docid": "c7df78f776b009317dd3aa855911b7be", "score": "0.5418613", "text": "func (client MockClient) StopContainer(c t.Container, _ time.Duration) error {\n\tif c.Name() == client.TestData.NameOfContainerToKeep {\n\t\treturn errors.New(\"tried to stop the instance we want to keep\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a11fa7c4b455ffe7be5f2793b0639f3b", "score": "0.5415432", "text": "func (s *SingularityRuntime) StopContainer(_ context.Context, req *k8s.StopContainerRequest) (*k8s.StopContainerResponse, error) {\n\tcont, err := s.findContainer(req.ContainerId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := cont.Stop(req.Timeout); err != nil {\n\t\treturn nil, status.Errorf(codes.Internal, \"could not stop container: %v\", err)\n\t}\n\treturn &k8s.StopContainerResponse{}, nil\n}", "title": "" }, { "docid": "a479f36f7c2b4edefc0b4ea92f51dc4a", "score": "0.5412644", "text": "func (r *Containerd) StopContainers(ids []string) error {\n\treturn stopCRIContainers(r.Runner, ids)\n}", "title": "" }, { "docid": "ce4cb3830cdb88d3f531b282d4c7ee2d", "score": "0.54091936", "text": "func detachServiceContainer(tenantName, networkName string) error {\n\tdocker, err := utils.GetDockerClient()\n\tif err != nil {\n\t\tlog.Errorf(\"Unable to connect to docker. Error %v\", err)\n\t\treturn errors.New(\"Unable to connect to docker\")\n\t}\n\n\tdnsContName := getDNSName(tenantName)\n\tcinfo, err := docker.InspectContainer(dnsContName)\n\tif err != nil {\n\t\tlog.Errorf(\"Error inspecting the container %s. Err: %v\", dnsContName, err)\n\t\treturn err\n\t}\n\n\t// Trim default tenant\n\tdnetName := docknet.GetDocknetName(tenantName, networkName, \"\")\n\n\t// inspect docker network\n\tnwState, err := docker.InspectNetwork(dnetName)\n\tif err != nil {\n\t\tlog.Errorf(\"Error while inspecting network: %+v\", dnetName)\n\t\treturn err\n\t}\n\n\tlog.Infof(\"Containers in network: %+v are {%+v}\", dnetName, nwState.Containers)\n\tdnsServerIP := strings.Split(nwState.Containers[cinfo.Id].IPv4Address, \"/\")[0]\n\n\tstateDriver, err := utils.GetStateDriver()\n\tif err != nil {\n\t\tlog.Errorf(\"Could not get StateDriver while trying to disconnect dnsContainer from %+v\", networkName)\n\t\treturn err\n\t}\n\n\t// Read network config and get DNSServer information\n\tnwCfg := &mastercfg.CfgNetworkState{}\n\tnwCfg.StateDriver = stateDriver\n\tnetworkID := networkName + \".\" + tenantName\n\terr = nwCfg.Read(networkID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Infof(\"dnsServerIP: %+v, nwCfg.dnsip: %+v\", dnsServerIP, nwCfg.DNSServer)\n\t// Remove dns container from network if all other endpoints are withdrawn\n\tif len(nwState.Containers) == 1 && (dnsServerIP == nwCfg.DNSServer) {\n\t\tlog.Infof(\"Disconnecting dns container from network as all other endpoints are removed: %+v\", networkName)\n\t\terr = docker.DisconnectNetwork(dnetName, dnsContName, false)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Could not detach container(%s) from network %s. Error: %s\",\n\t\t\t\tdnsContName, dnetName, err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "80a09b20a4e637e9c5f32991f3fe8125", "score": "0.5407725", "text": "func TeardownDatabase(t *testing.T, c *Container) {\n\tt.Helper()\n\n\tif err := exec.Command(\"docker\", \"stop\", c.ID).Run(); err != nil {\n\t\tfmt.Println(\"could not stop container\")\n\t\tt.Fatalf(\"could not stop container: %v\", err)\n\t}\n\tt.Log(\"Stopped:\", c.ID)\n\n\tif err := exec.Command(\"docker\", \"rm\", c.ID, \"-v\").Run(); err != nil {\n\t\tfmt.Println(\"could not remove container\")\n\t\tt.Fatalf(\"could not remove container: %v\", err)\n\t}\n\tt.Log(\"Removed:\", c.ID)\n}", "title": "" }, { "docid": "e776b7ea2f3aaa97a59f15ebedeb69cd", "score": "0.5406756", "text": "func (d *Driver) Remove() error {\n\tid, err := d.nodeID(d.MachineName)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"container %s not found\", d.MachineName)\n\t}\n\tcmd := exec.Command(d.OciBinary, \"rm\", \"-f\", \"-v\", id)\n\tif out, err := cmd.CombinedOutput(); err != nil {\n\t\treturn errors.Wrapf(err, \"removing container %s output: %q\", d.MachineName, string(out))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7e1c079048e8e41e8104ff94c302e057", "score": "0.54053247", "text": "func (pc *ProcesCreate) SetContainerId(s string) *ProcesCreate {\n\tpc.mutation.SetContainerId(s)\n\treturn pc\n}", "title": "" }, { "docid": "266741aea2df2e863cdf4fc99f34a75b", "score": "0.5403593", "text": "func (r *ContainerdDriver) Remove(ctx context.Context, ctr Container) (string, time.Duration, error) {\n\tstart := time.Now()\n\tctx = namespaces.WithNamespace(ctx, containerdNamespace)\n\n\tcontainer, err := r.client.LoadContainer(ctx, ctr.Name())\n\tif err != nil {\n\t\treturn \"\", 0, err\n\t}\n\n\tif err = stopTask(ctx, container); err != nil {\n\t\treturn \"\", 0, err\n\t}\n\n\terr = container.Delete(ctx, containerd.WithSnapshotCleanup)\n\tif err != nil {\n\t\treturn \"\", 0, err\n\t}\n\n\telapsed := time.Since(start)\n\treturn \"\", elapsed, nil\n}", "title": "" }, { "docid": "ab6abe73c813fa572eddcf2e870be5e4", "score": "0.5400442", "text": "func (s *Server) ContainerRemoved(ctx context.Context, in *pb.ContainerRemovedRequest) (*pb.ContainerRemovedResponse, error) {\n\tdef := script.CreateDefinitionFromContainerRemove(in)\n\n\tctx, reqID := util.AddDefaultRequestID(ctx)\n\tpeerAddr := util.PeerAddr(ctx)\n\tlogger := logrus.WithFields(logrus.Fields{\"peer\": peerAddr, \"reqID\": reqID, \"id\": in.GetId(), \"script\": def, \"containerID\": in.GetContainerId()})\n\n\tlogger.Debug(\"grpc:lb:ContainerRemoved\")\n\n\tcur := s.workers.Get(in.Id)\n\tif cur == nil {\n\t\treturn nil, ErrUnknownWorkerID\n\t}\n\n\tif s.removeCache(cur.(*Worker), def, in.ContainerId) {\n\t\tlogger.Info(\"Removed container from worker cache\")\n\t} else {\n\t\tlogger.Warn(\"Container not found in worker cache!\")\n\t}\n\n\treturn &pb.ContainerRemovedResponse{}, nil\n}", "title": "" }, { "docid": "1966bc69c20e9fe6bb26d600a0aa62e0", "score": "0.5395927", "text": "func (c *containerLogManager) Clean(ctx context.Context, containerID string) error {\n\tc.mutex.Lock()\n\tdefer c.mutex.Unlock()\n\tresp, err := c.runtimeService.ContainerStatus(ctx, containerID, false)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to get container status %q: %v\", containerID, err)\n\t}\n\tif resp.GetStatus() == nil {\n\t\treturn fmt.Errorf(\"container status is nil for %q\", containerID)\n\t}\n\tpattern := fmt.Sprintf(\"%s*\", resp.GetStatus().GetLogPath())\n\tlogs, err := c.osInterface.Glob(pattern)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to list all log files with pattern %q: %v\", pattern, err)\n\t}\n\n\tfor _, l := range logs {\n\t\tif err := c.osInterface.Remove(l); err != nil && !os.IsNotExist(err) {\n\t\t\treturn fmt.Errorf(\"failed to remove container %q log %q: %v\", containerID, l, err)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "630f254c855012854e3dc9d044894208", "score": "0.5395076", "text": "func getContainerID() string {\n\treturn containerID\n}", "title": "" }, { "docid": "0dd72fc0b44b282b71a7d6bbad3e2dab", "score": "0.5388869", "text": "func Rm(container string) error {\n\tlog.Debugf(\"docker rm: %s\", container)\n\tcli, err := Client()\n\tif err != nil {\n\t\treturn errors.New(\"could not initialize Docker API client\")\n\t}\n\tif err = cli.ContainerRemove(context.Background(), container, dockertypes.ContainerRemoveOptions{}); err != nil {\n\t\treturn err\n\t}\n\tlog.Debugf(\"docker rm: %s...Done\", container)\n\treturn nil\n}", "title": "" }, { "docid": "a9eb89e076a83964ea8e0f0e12f783a1", "score": "0.53866494", "text": "func (l *location) RemoveContainer(id string) error {\n\tparams := &s3.DeleteBucketInput{\n\t\tBucket: aws.String(id),\n\t}\n\n\t_, err := l.client.DeleteBucket(params)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"RemoveContainer, deleting the bucket\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f0d61bf02aadcddb2e167dd8287ee309", "score": "0.53823006", "text": "func (r *RemoteRuntimeService) RemoveContainer(rawContainerID string) error {\n\tctx, cancel := getContextWithTimeout(r.timeout)\n\tdefer cancel()\n\n\t_, err := r.runtimeClient.RemoveContainer(ctx, &runtimeApi.RemoveContainerRequest{\n\t\tContainerId: &rawContainerID,\n\t})\n\tif err != nil {\n\t\tglog.Errorf(\"RemoveContainer %q from runtime service failed: %v\", rawContainerID, err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "87a7ff3a31f7a0631fe23ae0025df6fb", "score": "0.5372964", "text": "func (ds *DCOSStatsd) RemoveContainer(c containers.Container) error {\n\tctr, ok := ds.GetContainer(c.Id)\n\tif !ok {\n\t\treturn fmt.Errorf(\"container %s not found\", c.Id)\n\t}\n\n\tif ds.ContainersDir != \"\" {\n\t\tif err := os.Remove(ds.ContainersDir + \"/\" + c.Id); err != nil {\n\t\t\tlog.Printf(\"E! Could not remove container file %s from disk: %s\", c.Id, err)\n\t\t\treturn err\n\t\t}\n\t}\n\tctr.Server.Stop()\n\n\tds.rwmu.Lock()\n\tdelete(ds.containers, c.Id)\n\tds.rwmu.Unlock()\n\n\treturn nil\n}", "title": "" }, { "docid": "ed5457ddc7990f7b7683cd25e05c53fb", "score": "0.53680325", "text": "func ContainerID(s *PodContainerStatus) string {\n\tcID, _ := ContainerIDWithRuntime(s)\n\treturn cID\n}", "title": "" }, { "docid": "0e6cddf40c09be635a2d452393d730e0", "score": "0.5357113", "text": "func (d *DockerContainer) Stop(dopts []string) error {\n\tgotrace.Trace(\"Stopping container '%s'\", d.name)\n\td.dockerCmd.SetArgs(d.configureDockerObjectsCli(\"stop\", dopts, d.Name()))\n\treturn d.dockerCmd.runFlow(d.outFunc, d.errFunc)\n}", "title": "" }, { "docid": "392ddc484b31bdd31b1e5a540a87b517", "score": "0.53526783", "text": "func removeDanglingMicroservices(t *testing.T, dockerClient *docker.Client) {\n\t// remove any running microservices prior to starting a new test\n\tcontainers, err := dockerClient.ContainerList(context.Background(), moby.ContainerListOptions{\n\t\tFilters: filters.NewArgs(filters.Arg(\"label\", msLabelKey)),\n\t\tAll: true,\n\t})\n\tif err != nil {\n\t\tt.Fatalf(\"failed to list existing microservices: %v\", err)\n\t}\n\tfor _, container := range containers {\n\t\terr = dockerClient.ContainerRemove(context.Background(), container.ID, moby.ContainerRemoveOptions{Force: true})\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"failed to remove existing microservices: %v\", err)\n\t\t} else {\n\t\t\tt.Logf(\"removed existing microservice: %s\", container.Labels[msLabelKey])\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2ee1ec31f26daa5e4b9b2dff6bc63905", "score": "0.53473514", "text": "func (l *ContainerList) Remove(id string) *Container {\n\tl.mux.Lock()\n\tdefer l.mux.Unlock()\n\t// Get index of container by ID.\n\tfor k, v := range l.list {\n\t\tif v.ID != id {\n\t\t\tcontinue\n\t\t}\n\t\t// Order is not important so we can swap the last element with the one\n\t\t// removed and shorten the slice.\n\t\tl.list[k] = l.list[len(l.list)-1]\n\t\tl.list = l.list[:len(l.list)-1]\n\t\treturn v\n\t}\n\t// Remove is idempotent.\n\treturn nil\n}", "title": "" }, { "docid": "1ecf40ff9ada47b65b324b23437fa5af", "score": "0.5331432", "text": "func (r *ConmonOCIRuntime) ExecStopContainer(ctr *Container, sessionID string, timeout uint) error {\n\tpid, err := ctr.getExecSessionPID(sessionID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlogrus.Debugf(\"Going to stop container %s exec session %s\", ctr.ID(), sessionID)\n\n\t// Is the session dead?\n\t// Ping the PID with signal 0 to see if it still exists.\n\tif err := unix.Kill(pid, 0); err != nil {\n\t\tif err == unix.ESRCH {\n\t\t\treturn nil\n\t\t}\n\t\treturn fmt.Errorf(\"pinging container %s exec session %s PID %d with signal 0: %w\", ctr.ID(), sessionID, pid, err)\n\t}\n\n\tif timeout > 0 {\n\t\t// Use SIGTERM by default, then SIGSTOP after timeout.\n\t\tlogrus.Debugf(\"Killing exec session %s (PID %d) of container %s with SIGTERM\", sessionID, pid, ctr.ID())\n\t\tif err := unix.Kill(pid, unix.SIGTERM); err != nil {\n\t\t\tif err == unix.ESRCH {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn fmt.Errorf(\"killing container %s exec session %s PID %d with SIGTERM: %w\", ctr.ID(), sessionID, pid, err)\n\t\t}\n\n\t\t// Wait for the PID to stop\n\t\tif err := waitPidStop(pid, time.Duration(timeout)*time.Second); err != nil {\n\t\t\tlogrus.Infof(\"Timed out waiting for container %s exec session %s to stop, resorting to SIGKILL: %v\", ctr.ID(), sessionID, err)\n\t\t} else {\n\t\t\t// No error, container is dead\n\t\t\treturn nil\n\t\t}\n\t}\n\n\t// SIGTERM did not work. On to SIGKILL.\n\tlogrus.Debugf(\"Killing exec session %s (PID %d) of container %s with SIGKILL\", sessionID, pid, ctr.ID())\n\tif err := unix.Kill(pid, unix.SIGTERM); err != nil {\n\t\tif err == unix.ESRCH {\n\t\t\treturn nil\n\t\t}\n\t\treturn fmt.Errorf(\"killing container %s exec session %s PID %d with SIGKILL: %w\", ctr.ID(), sessionID, pid, err)\n\t}\n\n\t// Wait for the PID to stop\n\tif err := waitPidStop(pid, killContainerTimeout); err != nil {\n\t\treturn fmt.Errorf(\"timed out waiting for container %s exec session %s PID %d to stop after SIGKILL: %w\", ctr.ID(), sessionID, pid, err)\n\t}\n\n\treturn nil\n}", "title": "" } ]